SlideShare a Scribd company logo
1 of 36
Facoltà di Ingegneria dell’Informazione, Informatica e Statistica
Corso di Laurea Magistrale in Computer Science
Reliable Broadcast on Multihop Networks
in presence of Mobile Byzantine attackers
Reliable Broadcast on Multihop Networks
in presence of Mobile Byzantine attackers
2
The IT landscape is changing
Cloud Apps
Reliable Broadcast on Multihop Networks
in presence of Mobile Byzantine attackers
3
Applications are transforming
~2000 Today
Loosely
coupled
services
Many small
servers and
devices
Monolithic
Slow
changing
Big
servers
Reliable Broadcast on Multihop Networks
in presence of Mobile Byzantine attackers
4
Mobile adversaries in loosely connected networks
The real world
is a multihop
network of
microservices
and apps
Our daily life
depends on the
correct behavior
of these
networks
Reliable Broadcast on Multihop Networks
in presence of Mobile Byzantine attackers
4
Mobile adversaries in loosely connected networks
Reliable Broadcast on Multihop Networks
in presence of Mobile Byzantine attackers
4
Mobile adversaries in loosely connected networks
Reliable Broadcast on Multihop Networks
in presence of Mobile Byzantine attackers
4
Mobile adversaries in loosely connected networks
Mobile adversaries in loosely connected networks
Reliable Broadcast on Multihop Networks
in presence of Mobile Byzantine attackers
4
How to ensure that an authentic
message sent by a server is correctly
delivered by each other component of
the network, also in presence of
component failures?
Problem
5
Related works
Reliable Broadcast on Multihop Networks
in presence of Mobile Byzantine attackers
• Garay’s model
• Buhrman’s model
• Bonnet’s model
• Sasaki’s model
Round-based models
Round-free models
Bonomi et al. model
• Assuming f Byzantines
o Sparse networks (trigger protocol, Maurer et al.)
o Dense networks (Disjoint path protocol, Lamport)
• Assuming f locally-bounded Byzantines
o CPA family of algorithms
Byzantine-tolerant Reliable
Broadcast protocols
5
Related works
Reliable Broadcast on Multihop Networks
in presence of Mobile Byzantine attackers
• Garay’s model
• Buhrman’s model
• Bonnet’s model
• Sasaki’s model
Round-based models
Round-free models
Bonomi et al. model
• Assuming f Byzantines
o Sparse networks (trigger protocol, Maurer et al.)
o Dense network (Disjoint path protocol, Lamport)
• Assuming f locally-bounded Byzantines
o CPA family of algorithms
Byzantine-tolerant Reliable
Broadcast protocols
The problem has never been
solved on multihop network
with mobile adversaries!
The real world is composed
by multihop networks!
6
My contribution
Reliable Broadcast on Multihop Networks
in presence of Mobile Byzantine attackers
1
Extension of Mobile
Byzantine attacker Models
to multihop networks
2
Design of some protocol
to cope with Mobile
Byzantine attackers
3
Correctness proofs
for the protocol
4
Study on the topological
requirements of
the protocol
7
System model
Reliable Broadcast on Multihop Networks
in presence of Mobile Byzantine attackers
Synchronous
computational
model
Mobile Byzantine Failure
aversary model
Reliable communication
only between directly
linked processes
8
Problem definition
Reliable Broadcast on Multihop Networks
in presence of Mobile Byzantine attackers
Reliable Broadcast
problem
Safety
Non-faulty processes never
deliver a malicious message
Reliability
Every non-faulty process
eventually delivers the
authentic message
9
Trigger protocol (Maurer et al.)
s
Reliable Broadcast on Multihop Networks in presence of Mobile Byzantine attackers
* Maurer and Tixeuil, On Byzantine Broadcast in Loosely Connected Networks, HAL
The protocol is based on the
following operations:
• Reception of a message;
• Transmission of a valid trigger
message to the neighbors;
• Decision (delivery of a message).
It deals with static Byzantine Failures on Multihop networks.
Types of messages: standard messages and trigger messages.
Memory structures required: the set Trig and the set Wait.
9Reliable Broadcast on Multihop Networks in presence of Mobile Byzantine attackers
* Maurer and Tixeuil, On Byzantine Broadcast in Loosely Connected Networks, HAL
The protocol is based on the
following operations:
• Reception of a message;
• Transmission of a valid trigger
message to the neighbors;
• Decision (delivery of a message).
Trigger protocol (Maurer et al.)
s
It deals with static Byzantine Failures on Multihop networks.
Types of messages: standard messages and trigger messages.
Memory structures required: the set Trig and the set Wait.
9Reliable Broadcast on Multihop Networks in presence of Mobile Byzantine attackers
* Maurer and Tixeuil, On Byzantine Broadcast in Loosely Connected Networks, HAL
The protocol is based on the
following operations:
• Reception of a message;
• Transmission of a valid trigger
message to the neighbors;
• Decision (delivery of a message).
Trigger protocol (Maurer et al.)
s
It deals with static Byzantine Failures on Multihop networks.
Types of messages: standard messages and trigger messages.
Memory structures required: the set Trig and the set Wait.
The protocol is based on the
following operations:
• Reception of a message;
• Transmission of a valid trigger
message to the neighbors;
• Decision (delivery of a message).
9Reliable Broadcast on Multihop Networks in presence of Mobile Byzantine attackers
* Maurer and Tixeuil, On Byzantine Broadcast in Loosely Connected Networks, HAL
Trigger protocol (Maurer et al.)
s
It deals with static Byzantine Failures on Multihop networks.
Types of messages: standard messages and trigger messages.
Memory structures required: the set Trig and the set Wait.
10Reliable Broadcast on Multihop Networks
in presence of Mobile Byzantine attackers
Garay’s model
pi
pj
round i+1round i
Reliable Broadcast on Multihop Networks
in presence of Mobile Byzantine attackers
pi
pj
S R C S R C
10
Garay’s model
Reliable Broadcast on Multihop Networks
in presence of Mobile Byzantine attackers
pi
pj
S R C S R C
10
Garay’s model
Reliable Broadcast on Multihop Networks
in presence of Mobile Byzantine attackers
pi
pj
S R C S R C
10
Garay’s model
Reliable Broadcast on Multihop Networks
in presence of Mobile Byzantine attackers
pi
pj
S R C S R C
10
Garay’s model
Reliable Broadcast on Multihop Networks
in presence of Mobile Byzantine attackers
pi
pj
S R C S R C
10
Garay’s model
11
Critical issues
Reliable Broadcast on Multihop Networks
in presence of Mobile Byzantine attackers
Switching from
BF to MBF model
Making active the
cured processes
12
Improvements within the protocol
Reliable Broadcast on Multihop Networks
in presence of Mobile Byzantine attackers
New memory structures required: Tail FIFO list
Reporting Maintainance
Main correct
state operations:
Removal Initial decision
Main cured
state operations:
Final decision
12
Improvements within the protocol
Reliable Broadcast on Multihop Networks
in presence of Mobile Byzantine attackers
New memory structures required: Tail FIFO list
Main correct
state operations:
Removal
Main cured
state operations:
Final decision
R
Initial decision
Reporting
12
Improvements within the protocol
Reliable Broadcast on Multihop Networks
in presence of Mobile Byzantine attackers
New memory structures required: Tail FIFO list
Main correct
state operations:
Removal
Main cured
state operations:
Final decision
Signal of a
cured process
Initially decided
process
R+1
Initial decision
Reporting
12
Improvements within the protocol
Reliable Broadcast on Multihop Networks
in presence of Mobile Byzantine attackers
New memory structures required: Tail FIFO list
Reporting
Main correct
state operations:
Removal Initial decision
Main cured
state operations:
Final decision
R+2
12
Improvements within the protocol
Reliable Broadcast on Multihop Networks
in presence of Mobile Byzantine attackers
New memory structures required: Tail FIFO list
Main correct
state operations:
Main cured
state operations:
R
Maintainance
12
Improvements within the protocol
Reliable Broadcast on Multihop Networks
in presence of Mobile Byzantine attackers
New memory structures required: Tail FIFO list
Main correct
state operations:
Main cured
state operations:
R+1
Maintainance
Initially decided
process
12
Improvements within the protocol
Reliable Broadcast on Multihop Networks
in presence of Mobile Byzantine attackers
New memory structures required: Tail FIFO list
Main correct
state operations:
Main cured
state operations:
R+2
Maintainance
1
13
Results
Reliable Broadcast on Multihop Networks
in presence of Mobile Byzantine attackers
The constraints required to provide
the Safety property are:
Given the following constraints:
• distance between the attackers (D)
• period of movement for the attackers (𝚫)
• maximum movement length (H)
• distance for valid triggers (h)
• ∆ ≥ R
• D ≥ 4 • H = 1
• h = 2
The constraints required to provide the
Reliability property are:
• ∆ ≥ 2R
• D ≥ 5 • H = 1
• h = 2
13
Results
Reliable Broadcast on Multihop Networks
in presence of Mobile Byzantine attackers
The constraints required to provide
the Safety property are:
Given the following constraints:
• distance between the attackers (D)
• period of movement for the attackers (𝚫)
• maximum movement length (H)
• distance for valid triggers (h)
• ∆ ≥ R
• D ≥ 4 • H = 1
• h = 2
The constraints required to provide the
Reliability property are:
• ∆ ≥ 2R
• D ≥ 5 • H = 1
• h = 2
These constraints are
the same obtained
dealing with static
Byzantine adversaries!
14
Correctness proofs
Reliable Broadcast on Multihop Networks
in presence of Mobile Byzantine attackers
Theorem (Reliability): If h = 2, D ≥ 5, H = 1 and 𝚫 ≥ 2R, then all non-faulty processes of the
network eventually deliver the authentic message.
Theorem (Reliability impossibility with D = 4): If D = 4 and the trigger parameter of the protocol is
h = 2, then some non-faulty process may never deliver the authentic message.
Theorem (Safety impossibility with D = 3): If D = 3 and the trigger parameter of the protocol is h =
2, then some correct process may deliver a malicious message.
Theorem (Safety): If h = 2, D ≥ 4, H = 1 and 𝚫 ≥ R, then no correct process delivers a malicious
message.
15Reliable Broadcast on Multihop Networks
in presence of Mobile Byzantine attackers
Topological requirements
Network requirement:
k-connected planar
networks (k ≥ 4),
composed by
triangles and squares
Thanks!
Candidate:
Simone Santacroce
santacroce.1542338@studenti.uniroma1.it
Thesis Advisor:
Silvia Bonomi
bonomi@diag.uniroma1.it
Academic Year 2016/2017

More Related Content

What's hot

Informal Presentation on WPA-TKIP
Informal Presentation on WPA-TKIPInformal Presentation on WPA-TKIP
Informal Presentation on WPA-TKIPvanhoefm
 
MulteFire Technology Progress and Benefits
MulteFire Technology Progress and BenefitsMulteFire Technology Progress and Benefits
MulteFire Technology Progress and BenefitsQualcomm Research
 
HITB Labs: Practical Attacks Against 3G/4G Telecommunication Networks
HITB Labs: Practical Attacks Against 3G/4G Telecommunication NetworksHITB Labs: Practical Attacks Against 3G/4G Telecommunication Networks
HITB Labs: Practical Attacks Against 3G/4G Telecommunication NetworksJim Geovedi
 
Hallowed be thy packets by Paul Coggin
Hallowed be thy packets by Paul CogginHallowed be thy packets by Paul Coggin
Hallowed be thy packets by Paul CogginEC-Council
 
Where is the 6 GHz beef?
Where is the 6 GHz beef?Where is the 6 GHz beef?
Where is the 6 GHz beef?Jeff Green
 
Paving the path to Narrowband 5G with LTE Internet of Things
Paving the path to Narrowband 5G with LTE Internet of ThingsPaving the path to Narrowband 5G with LTE Internet of Things
Paving the path to Narrowband 5G with LTE Internet of ThingsQualcomm Research
 
On her majesty's secret service - GRX and a Spy Agency
On her majesty's secret service - GRX and a Spy AgencyOn her majesty's secret service - GRX and a Spy Agency
On her majesty's secret service - GRX and a Spy AgencyStephen Kho
 
Philippe Langlois - Hacking HLR HSS and MME core network elements
Philippe Langlois - Hacking HLR HSS and MME core network elementsPhilippe Langlois - Hacking HLR HSS and MME core network elements
Philippe Langlois - Hacking HLR HSS and MME core network elementsP1Security
 
OPTIMIZING PERFORMANCE OF 4G NETWORK USING VERTICAL HANDOFF
OPTIMIZING PERFORMANCE OF 4G NETWORK USING VERTICAL HANDOFFOPTIMIZING PERFORMANCE OF 4G NETWORK USING VERTICAL HANDOFF
OPTIMIZING PERFORMANCE OF 4G NETWORK USING VERTICAL HANDOFFHarshal Solao
 
DASH7 Alliance Protocol Technical Presentation
DASH7 Alliance Protocol Technical PresentationDASH7 Alliance Protocol Technical Presentation
DASH7 Alliance Protocol Technical PresentationMaarten Weyn
 
The known unknowns of SS7 and beyond
The known unknowns of SS7 and beyondThe known unknowns of SS7 and beyond
The known unknowns of SS7 and beyondSiddharth Rao
 
Dash7 alliance protocol - where rfid meets wsn
Dash7 alliance protocol -  where rfid meets wsnDash7 alliance protocol -  where rfid meets wsn
Dash7 alliance protocol - where rfid meets wsnMaarten Weyn
 
Making 5G New Radio a Reality - by Qualcomm
Making 5G New Radio a Reality - by QualcommMaking 5G New Radio a Reality - by Qualcomm
Making 5G New Radio a Reality - by QualcommAydin Karaer
 
Diameter Penetration Test Lab
Diameter Penetration Test LabDiameter Penetration Test Lab
Diameter Penetration Test Labfrcarlson
 
Building a unified 5G platform
Building a unified 5G platformBuilding a unified 5G platform
Building a unified 5G platformQualcomm Research
 
Alpha Wireless - Global Leader in CBRS
Alpha Wireless - Global Leader in CBRS Alpha Wireless - Global Leader in CBRS
Alpha Wireless - Global Leader in CBRS AlphaWirelessLtd
 

What's hot (20)

Informal Presentation on WPA-TKIP
Informal Presentation on WPA-TKIPInformal Presentation on WPA-TKIP
Informal Presentation on WPA-TKIP
 
MulteFire Technology Progress and Benefits
MulteFire Technology Progress and BenefitsMulteFire Technology Progress and Benefits
MulteFire Technology Progress and Benefits
 
HITB Labs: Practical Attacks Against 3G/4G Telecommunication Networks
HITB Labs: Practical Attacks Against 3G/4G Telecommunication NetworksHITB Labs: Practical Attacks Against 3G/4G Telecommunication Networks
HITB Labs: Practical Attacks Against 3G/4G Telecommunication Networks
 
Hallowed be thy packets by Paul Coggin
Hallowed be thy packets by Paul CogginHallowed be thy packets by Paul Coggin
Hallowed be thy packets by Paul Coggin
 
Where is the 6 GHz beef?
Where is the 6 GHz beef?Where is the 6 GHz beef?
Where is the 6 GHz beef?
 
Paving the path to Narrowband 5G with LTE Internet of Things
Paving the path to Narrowband 5G with LTE Internet of ThingsPaving the path to Narrowband 5G with LTE Internet of Things
Paving the path to Narrowband 5G with LTE Internet of Things
 
On her majesty's secret service - GRX and a Spy Agency
On her majesty's secret service - GRX and a Spy AgencyOn her majesty's secret service - GRX and a Spy Agency
On her majesty's secret service - GRX and a Spy Agency
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Philippe Langlois - Hacking HLR HSS and MME core network elements
Philippe Langlois - Hacking HLR HSS and MME core network elementsPhilippe Langlois - Hacking HLR HSS and MME core network elements
Philippe Langlois - Hacking HLR HSS and MME core network elements
 
Wifi- technology_moni
Wifi- technology_moniWifi- technology_moni
Wifi- technology_moni
 
OPTIMIZING PERFORMANCE OF 4G NETWORK USING VERTICAL HANDOFF
OPTIMIZING PERFORMANCE OF 4G NETWORK USING VERTICAL HANDOFFOPTIMIZING PERFORMANCE OF 4G NETWORK USING VERTICAL HANDOFF
OPTIMIZING PERFORMANCE OF 4G NETWORK USING VERTICAL HANDOFF
 
DASH7 Alliance Protocol Technical Presentation
DASH7 Alliance Protocol Technical PresentationDASH7 Alliance Protocol Technical Presentation
DASH7 Alliance Protocol Technical Presentation
 
The known unknowns of SS7 and beyond
The known unknowns of SS7 and beyondThe known unknowns of SS7 and beyond
The known unknowns of SS7 and beyond
 
Dash7 alliance protocol - where rfid meets wsn
Dash7 alliance protocol -  where rfid meets wsnDash7 alliance protocol -  where rfid meets wsn
Dash7 alliance protocol - where rfid meets wsn
 
Making 5G New Radio a Reality - by Qualcomm
Making 5G New Radio a Reality - by QualcommMaking 5G New Radio a Reality - by Qualcomm
Making 5G New Radio a Reality - by Qualcomm
 
What is Wi-Fi 6? - C&T RF Antennas Inc
What is Wi-Fi 6? - C&T RF Antennas IncWhat is Wi-Fi 6? - C&T RF Antennas Inc
What is Wi-Fi 6? - C&T RF Antennas Inc
 
Assaulting diameter IPX network
Assaulting diameter IPX networkAssaulting diameter IPX network
Assaulting diameter IPX network
 
Diameter Penetration Test Lab
Diameter Penetration Test LabDiameter Penetration Test Lab
Diameter Penetration Test Lab
 
Building a unified 5G platform
Building a unified 5G platformBuilding a unified 5G platform
Building a unified 5G platform
 
Alpha Wireless - Global Leader in CBRS
Alpha Wireless - Global Leader in CBRS Alpha Wireless - Global Leader in CBRS
Alpha Wireless - Global Leader in CBRS
 

Similar to Reliable Broadcast on Multihop Networks in presence of Mobile Byzantine attackers

Security in IoT
Security in IoTSecurity in IoT
Security in IoTgr9293
 
LookingAroundCorners-DAS Simplified-final- BICSI Sept 2015
LookingAroundCorners-DAS Simplified-final- BICSI Sept 2015LookingAroundCorners-DAS Simplified-final- BICSI Sept 2015
LookingAroundCorners-DAS Simplified-final- BICSI Sept 2015Mark Niehus, RCDD
 
4 g technologies
4 g technologies4 g technologies
4 g technologiesSonalPorwal
 
Multi Bandwidth Data path design for 5G Wireless Systems
Multi Bandwidth Data path design for 5G Wireless SystemsMulti Bandwidth Data path design for 5G Wireless Systems
Multi Bandwidth Data path design for 5G Wireless SystemsChaitanya Krishna
 
Important questions on mobile computing
Important questions on mobile computingImportant questions on mobile computing
Important questions on mobile computingBhupesh Rawat
 
PriveComms PriveIN mesh digital operation field overview 2020
PriveComms PriveIN mesh digital operation field overview 2020PriveComms PriveIN mesh digital operation field overview 2020
PriveComms PriveIN mesh digital operation field overview 2020Arimo Koivisto
 
전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-
전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-
전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-JM code group
 
92863888 5g-technology-ppt-by-nasar
92863888 5g-technology-ppt-by-nasar92863888 5g-technology-ppt-by-nasar
92863888 5g-technology-ppt-by-nasarNasar Mohammed
 
Network and network types6.pdf got from cbse site
Network and network types6.pdf got from cbse siteNetwork and network types6.pdf got from cbse site
Network and network types6.pdf got from cbse siteomkhedekxr
 
mobile ip, Mobile COmmunication Internet Protocol
mobile ip, Mobile COmmunication Internet Protocolmobile ip, Mobile COmmunication Internet Protocol
mobile ip, Mobile COmmunication Internet ProtocolGaurav Dwivedi
 
InfiltrateCon 2016 - Why Nation-State Hack Telco Networks
InfiltrateCon 2016 - Why Nation-State Hack Telco NetworksInfiltrateCon 2016 - Why Nation-State Hack Telco Networks
InfiltrateCon 2016 - Why Nation-State Hack Telco NetworksOmer Coskun
 
Wireless sensor network wireless network
Wireless sensor network wireless networkWireless sensor network wireless network
Wireless sensor network wireless networkTeced Ce
 

Similar to Reliable Broadcast on Multihop Networks in presence of Mobile Byzantine attackers (20)

Security in IoT
Security in IoTSecurity in IoT
Security in IoT
 
EC 8004 - WN - Unit V.pptx
EC 8004 - WN - Unit V.pptxEC 8004 - WN - Unit V.pptx
EC 8004 - WN - Unit V.pptx
 
Securing VoIP Networks
Securing VoIP NetworksSecuring VoIP Networks
Securing VoIP Networks
 
5G
5G5G
5G
 
LookingAroundCorners-DAS Simplified-final- BICSI Sept 2015
LookingAroundCorners-DAS Simplified-final- BICSI Sept 2015LookingAroundCorners-DAS Simplified-final- BICSI Sept 2015
LookingAroundCorners-DAS Simplified-final- BICSI Sept 2015
 
PPT-5.11.09
PPT-5.11.09PPT-5.11.09
PPT-5.11.09
 
4 g technologies
4 g technologies4 g technologies
4 g technologies
 
5g TECHNOLOY
5g TECHNOLOY5g TECHNOLOY
5g TECHNOLOY
 
Multi Bandwidth Data path design for 5G Wireless Systems
Multi Bandwidth Data path design for 5G Wireless SystemsMulti Bandwidth Data path design for 5G Wireless Systems
Multi Bandwidth Data path design for 5G Wireless Systems
 
Heterogenous Networks
Heterogenous NetworksHeterogenous Networks
Heterogenous Networks
 
Important questions on mobile computing
Important questions on mobile computingImportant questions on mobile computing
Important questions on mobile computing
 
Accessing remote networks
Accessing remote networksAccessing remote networks
Accessing remote networks
 
PriveComms PriveIN mesh digital operation field overview 2020
PriveComms PriveIN mesh digital operation field overview 2020PriveComms PriveIN mesh digital operation field overview 2020
PriveComms PriveIN mesh digital operation field overview 2020
 
전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-
전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-
전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-
 
92863888 5g-technology-ppt-by-nasar
92863888 5g-technology-ppt-by-nasar92863888 5g-technology-ppt-by-nasar
92863888 5g-technology-ppt-by-nasar
 
Network and network types6.pdf got from cbse site
Network and network types6.pdf got from cbse siteNetwork and network types6.pdf got from cbse site
Network and network types6.pdf got from cbse site
 
IT6601 MOBILE COMPUTING UNIT1
IT6601 MOBILE COMPUTING UNIT1IT6601 MOBILE COMPUTING UNIT1
IT6601 MOBILE COMPUTING UNIT1
 
mobile ip, Mobile COmmunication Internet Protocol
mobile ip, Mobile COmmunication Internet Protocolmobile ip, Mobile COmmunication Internet Protocol
mobile ip, Mobile COmmunication Internet Protocol
 
InfiltrateCon 2016 - Why Nation-State Hack Telco Networks
InfiltrateCon 2016 - Why Nation-State Hack Telco NetworksInfiltrateCon 2016 - Why Nation-State Hack Telco Networks
InfiltrateCon 2016 - Why Nation-State Hack Telco Networks
 
Wireless sensor network wireless network
Wireless sensor network wireless networkWireless sensor network wireless network
Wireless sensor network wireless network
 

Recently uploaded

UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxUNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxkalpana413121
 
Computer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesComputer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesChandrakantDivate1
 
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptxrouholahahmadi9876
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxMuhammadAsimMuhammad6
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityMorshed Ahmed Rahath
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.Kamal Acharya
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdfKamal Acharya
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
Ground Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementGround Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementDr. Deepak Mudgal
 
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesLinux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesRashidFaridChishti
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdfKamal Acharya
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueBhangaleSonal
 
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...gragchanchal546
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Ramkumar k
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
 

Recently uploaded (20)

Signal Processing and Linear System Analysis
Signal Processing and Linear System AnalysisSignal Processing and Linear System Analysis
Signal Processing and Linear System Analysis
 
UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxUNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptx
 
Computer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesComputer Graphics Introduction To Curves
Computer Graphics Introduction To Curves
 
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Ground Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementGround Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth Reinforcement
 
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesLinux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 

Reliable Broadcast on Multihop Networks in presence of Mobile Byzantine attackers

  • 1. Facoltà di Ingegneria dell’Informazione, Informatica e Statistica Corso di Laurea Magistrale in Computer Science Reliable Broadcast on Multihop Networks in presence of Mobile Byzantine attackers
  • 2. Reliable Broadcast on Multihop Networks in presence of Mobile Byzantine attackers 2 The IT landscape is changing Cloud Apps
  • 3. Reliable Broadcast on Multihop Networks in presence of Mobile Byzantine attackers 3 Applications are transforming ~2000 Today Loosely coupled services Many small servers and devices Monolithic Slow changing Big servers
  • 4. Reliable Broadcast on Multihop Networks in presence of Mobile Byzantine attackers 4 Mobile adversaries in loosely connected networks The real world is a multihop network of microservices and apps Our daily life depends on the correct behavior of these networks
  • 5. Reliable Broadcast on Multihop Networks in presence of Mobile Byzantine attackers 4 Mobile adversaries in loosely connected networks
  • 6. Reliable Broadcast on Multihop Networks in presence of Mobile Byzantine attackers 4 Mobile adversaries in loosely connected networks
  • 7. Reliable Broadcast on Multihop Networks in presence of Mobile Byzantine attackers 4 Mobile adversaries in loosely connected networks
  • 8. Mobile adversaries in loosely connected networks Reliable Broadcast on Multihop Networks in presence of Mobile Byzantine attackers 4 How to ensure that an authentic message sent by a server is correctly delivered by each other component of the network, also in presence of component failures? Problem
  • 9. 5 Related works Reliable Broadcast on Multihop Networks in presence of Mobile Byzantine attackers • Garay’s model • Buhrman’s model • Bonnet’s model • Sasaki’s model Round-based models Round-free models Bonomi et al. model • Assuming f Byzantines o Sparse networks (trigger protocol, Maurer et al.) o Dense networks (Disjoint path protocol, Lamport) • Assuming f locally-bounded Byzantines o CPA family of algorithms Byzantine-tolerant Reliable Broadcast protocols
  • 10. 5 Related works Reliable Broadcast on Multihop Networks in presence of Mobile Byzantine attackers • Garay’s model • Buhrman’s model • Bonnet’s model • Sasaki’s model Round-based models Round-free models Bonomi et al. model • Assuming f Byzantines o Sparse networks (trigger protocol, Maurer et al.) o Dense network (Disjoint path protocol, Lamport) • Assuming f locally-bounded Byzantines o CPA family of algorithms Byzantine-tolerant Reliable Broadcast protocols The problem has never been solved on multihop network with mobile adversaries! The real world is composed by multihop networks!
  • 11. 6 My contribution Reliable Broadcast on Multihop Networks in presence of Mobile Byzantine attackers 1 Extension of Mobile Byzantine attacker Models to multihop networks 2 Design of some protocol to cope with Mobile Byzantine attackers 3 Correctness proofs for the protocol 4 Study on the topological requirements of the protocol
  • 12. 7 System model Reliable Broadcast on Multihop Networks in presence of Mobile Byzantine attackers Synchronous computational model Mobile Byzantine Failure aversary model Reliable communication only between directly linked processes
  • 13. 8 Problem definition Reliable Broadcast on Multihop Networks in presence of Mobile Byzantine attackers Reliable Broadcast problem Safety Non-faulty processes never deliver a malicious message Reliability Every non-faulty process eventually delivers the authentic message
  • 14. 9 Trigger protocol (Maurer et al.) s Reliable Broadcast on Multihop Networks in presence of Mobile Byzantine attackers * Maurer and Tixeuil, On Byzantine Broadcast in Loosely Connected Networks, HAL The protocol is based on the following operations: • Reception of a message; • Transmission of a valid trigger message to the neighbors; • Decision (delivery of a message). It deals with static Byzantine Failures on Multihop networks. Types of messages: standard messages and trigger messages. Memory structures required: the set Trig and the set Wait.
  • 15. 9Reliable Broadcast on Multihop Networks in presence of Mobile Byzantine attackers * Maurer and Tixeuil, On Byzantine Broadcast in Loosely Connected Networks, HAL The protocol is based on the following operations: • Reception of a message; • Transmission of a valid trigger message to the neighbors; • Decision (delivery of a message). Trigger protocol (Maurer et al.) s It deals with static Byzantine Failures on Multihop networks. Types of messages: standard messages and trigger messages. Memory structures required: the set Trig and the set Wait.
  • 16. 9Reliable Broadcast on Multihop Networks in presence of Mobile Byzantine attackers * Maurer and Tixeuil, On Byzantine Broadcast in Loosely Connected Networks, HAL The protocol is based on the following operations: • Reception of a message; • Transmission of a valid trigger message to the neighbors; • Decision (delivery of a message). Trigger protocol (Maurer et al.) s It deals with static Byzantine Failures on Multihop networks. Types of messages: standard messages and trigger messages. Memory structures required: the set Trig and the set Wait.
  • 17. The protocol is based on the following operations: • Reception of a message; • Transmission of a valid trigger message to the neighbors; • Decision (delivery of a message). 9Reliable Broadcast on Multihop Networks in presence of Mobile Byzantine attackers * Maurer and Tixeuil, On Byzantine Broadcast in Loosely Connected Networks, HAL Trigger protocol (Maurer et al.) s It deals with static Byzantine Failures on Multihop networks. Types of messages: standard messages and trigger messages. Memory structures required: the set Trig and the set Wait.
  • 18. 10Reliable Broadcast on Multihop Networks in presence of Mobile Byzantine attackers Garay’s model pi pj round i+1round i
  • 19. Reliable Broadcast on Multihop Networks in presence of Mobile Byzantine attackers pi pj S R C S R C 10 Garay’s model
  • 20. Reliable Broadcast on Multihop Networks in presence of Mobile Byzantine attackers pi pj S R C S R C 10 Garay’s model
  • 21. Reliable Broadcast on Multihop Networks in presence of Mobile Byzantine attackers pi pj S R C S R C 10 Garay’s model
  • 22. Reliable Broadcast on Multihop Networks in presence of Mobile Byzantine attackers pi pj S R C S R C 10 Garay’s model
  • 23. Reliable Broadcast on Multihop Networks in presence of Mobile Byzantine attackers pi pj S R C S R C 10 Garay’s model
  • 24. 11 Critical issues Reliable Broadcast on Multihop Networks in presence of Mobile Byzantine attackers Switching from BF to MBF model Making active the cured processes
  • 25. 12 Improvements within the protocol Reliable Broadcast on Multihop Networks in presence of Mobile Byzantine attackers New memory structures required: Tail FIFO list Reporting Maintainance Main correct state operations: Removal Initial decision Main cured state operations: Final decision
  • 26. 12 Improvements within the protocol Reliable Broadcast on Multihop Networks in presence of Mobile Byzantine attackers New memory structures required: Tail FIFO list Main correct state operations: Removal Main cured state operations: Final decision R Initial decision Reporting
  • 27. 12 Improvements within the protocol Reliable Broadcast on Multihop Networks in presence of Mobile Byzantine attackers New memory structures required: Tail FIFO list Main correct state operations: Removal Main cured state operations: Final decision Signal of a cured process Initially decided process R+1 Initial decision Reporting
  • 28. 12 Improvements within the protocol Reliable Broadcast on Multihop Networks in presence of Mobile Byzantine attackers New memory structures required: Tail FIFO list Reporting Main correct state operations: Removal Initial decision Main cured state operations: Final decision R+2
  • 29. 12 Improvements within the protocol Reliable Broadcast on Multihop Networks in presence of Mobile Byzantine attackers New memory structures required: Tail FIFO list Main correct state operations: Main cured state operations: R Maintainance
  • 30. 12 Improvements within the protocol Reliable Broadcast on Multihop Networks in presence of Mobile Byzantine attackers New memory structures required: Tail FIFO list Main correct state operations: Main cured state operations: R+1 Maintainance Initially decided process
  • 31. 12 Improvements within the protocol Reliable Broadcast on Multihop Networks in presence of Mobile Byzantine attackers New memory structures required: Tail FIFO list Main correct state operations: Main cured state operations: R+2 Maintainance 1
  • 32. 13 Results Reliable Broadcast on Multihop Networks in presence of Mobile Byzantine attackers The constraints required to provide the Safety property are: Given the following constraints: • distance between the attackers (D) • period of movement for the attackers (𝚫) • maximum movement length (H) • distance for valid triggers (h) • ∆ ≥ R • D ≥ 4 • H = 1 • h = 2 The constraints required to provide the Reliability property are: • ∆ ≥ 2R • D ≥ 5 • H = 1 • h = 2
  • 33. 13 Results Reliable Broadcast on Multihop Networks in presence of Mobile Byzantine attackers The constraints required to provide the Safety property are: Given the following constraints: • distance between the attackers (D) • period of movement for the attackers (𝚫) • maximum movement length (H) • distance for valid triggers (h) • ∆ ≥ R • D ≥ 4 • H = 1 • h = 2 The constraints required to provide the Reliability property are: • ∆ ≥ 2R • D ≥ 5 • H = 1 • h = 2 These constraints are the same obtained dealing with static Byzantine adversaries!
  • 34. 14 Correctness proofs Reliable Broadcast on Multihop Networks in presence of Mobile Byzantine attackers Theorem (Reliability): If h = 2, D ≥ 5, H = 1 and 𝚫 ≥ 2R, then all non-faulty processes of the network eventually deliver the authentic message. Theorem (Reliability impossibility with D = 4): If D = 4 and the trigger parameter of the protocol is h = 2, then some non-faulty process may never deliver the authentic message. Theorem (Safety impossibility with D = 3): If D = 3 and the trigger parameter of the protocol is h = 2, then some correct process may deliver a malicious message. Theorem (Safety): If h = 2, D ≥ 4, H = 1 and 𝚫 ≥ R, then no correct process delivers a malicious message.
  • 35. 15Reliable Broadcast on Multihop Networks in presence of Mobile Byzantine attackers Topological requirements Network requirement: k-connected planar networks (k ≥ 4), composed by triangles and squares