1995
DOI: 10.1145/200836.200870
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic fault-tolerant clock synchronization

Abstract: This paper gives two simple efficient distributed algorithms: one for keeping clocks in a network synchronized and one for allowing new processors to join the network with their clocks synchronized. Assuming a fault-tolerant authentication protocol, the algorithms tolerate both link and processor failures of any type. The algorithm for maintaining synchronization works for arbitra~networks (rather than just completely connected networks) and tolerates any number of processor or communication link faults as lon… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
66
0

Year Published

2003
2003
2023
2023

Publication Types

Select...
6
1
1

Relationship

3
5

Authors

Journals

citations
Cited by 62 publications
(66 citation statements)
references
References 13 publications
0
66
0
Order By: Relevance
“…Consider the Byzantine clock synchronization algorithm in [10]. Informally that algorithm operates as follows: The processes resynchronize their clocks every PER time period.…”
Section: Example Of Stabilizing a Non-stabilizing Algorithmmentioning
confidence: 99%
“…Consider the Byzantine clock synchronization algorithm in [10]. Informally that algorithm operates as follows: The processes resynchronize their clocks every PER time period.…”
Section: Example Of Stabilizing a Non-stabilizing Algorithmmentioning
confidence: 99%
“…Each node then sets its clock on its local outcome of the agreement procedure. Dolev et al [9] presented an algorithm that can cope with dynamic networks. However, they require that each correct node can communicate with each other correct node in bounded time; a property that is violated, e.g., in leader-based topologies like a directed star-graph.…”
Section: Introductionmentioning
confidence: 99%
“…It is natural to consider fault-tolerant clock synchronization techniques, which have been studied extensively in the context of distributed systems (e.g., [12]- [16]). However, these techniques require either digital signatures (e.g., HSSD [16]and CSM [15]), exponential copies of messages (e.g., COM [15]), or a completely connected network (e.g., CNV [15]) to prevent malicious nodes from modifying or destroying clock information sent by normal nodes.…”
Section: Introductionmentioning
confidence: 99%
“…However, these techniques require either digital signatures (e.g., HSSD [16]and CSM [15]), exponential copies of messages (e.g., COM [15]), or a completely connected network (e.g., CNV [15]) to prevent malicious nodes from modifying or destroying clock information sent by normal nodes. Thus, they are not practical in wireless sensor networks.…”
Section: Introductionmentioning
confidence: 99%