Follow us on Facebook

Header Ads

Bounding the Impact of Unbounded Attacks in Stabilization


Bounding the Impact of Unbounded Attacks in Stabilization

ABSTRACT:
Self-stabilization is a versatile approach to fault-tolerance since it permits a distributed system to recover from any transient fault that arbitrarily corrupts the contents of all memories in the system. Byzantine tolerance is an attractive feature of distributed systems that permit to cope with arbitrary malicious behaviors. Combining these two properties proved difficult: it is impossible to contain the spatial impact of Byzantine nodes in a self-stabilizing context for global tasks such as tree orientation and tree construction. We present and illustrate a new concept of Byzantine containment in stabilization. Our property, called Strong Stabilization enables to contain the impact of Byzantine nodes if they actually perform too many Byzantine actions. We derive impossibility results for strong stabilization and present strongly stabilizing protocols for tree orientation and tree construction that are optimal with respect to the number of Byzantine nodes that can be tolerated in a self-stabilizing context.

INTRODUCTION

The advent of ubiquitous large-scale distributed systems advocates that tolerance to various kinds of faults and hazards must be included from the very early design of such systems. Self-stabilization is a versatile technique that permits forward recovery from any kind of transient faults, while Byzantine Fault-tolerance is traditionally used to mask the effect of a limited number of malicious faults. Making distributed systems tolerant to both transient and malicious faults is appealing yet proved difficult as impossibility results are expected in many cases.

EXITSING SYSTEM

Two main paths have been followed to study the impact of Byzantine faults in the context of self- stabilization.

The first one is Byzantine fault masking. In completely connected synchronous systems, one of the most studied problems in the context of self-stabilization with Byzantine faults is that of clock synchronization. Probabilistic self stabilizing protocols were proposed for up to one third of Byzantine processors, while deterministic solutions tolerate up to one fourth and one third of Byzantine processors, respectively.

The second one is Byzantine containment. For local tasks (i.e. tasks whose correctness can be checked locally, such as vertex coloring, link coloring, or dining philosophers), the notion of strict stabilization was proposed. Strict stabilization guarantees that there exists a containment radius outside which the effect of permanent faults is masked. Authors show that this Byzantine containment scheme is possible only for local tasks. As many problems are not local, it turns out that it is impossible to provide strict stabilization for those.





PROPOSED SYSTEM

§  Investigate the possibility of Byzantine containment in a self stabilizing setting for tasks that are global, and focus on two global problems, namely tree orientation and tree construction.

§  Recall that strict stabilization requires that processes beyond the containment radius eventually achieve their desired behavior and are never disturbed by Byzantine processes afterwards.

§  Allowed these correct processes beyond the containment radius to be disturbed by Byzantine processes, but only a limited number of times, even if Byzantine nodes take an infinite number of actions.

§  To present new possibility results for containing the influence of unbounded Byzantine behaviors.

MODULES:
v Network Creation and Socket Connection module
v Link-Failure Detection
v Byzantine containment



MODULES DESCRIPTION:

Network Creation and Socket Connection
In this module, we first create the simulation environment by creating the network as three entities viz: Source node, Router Node and Destination Node. The source node is created with the properties of sending the files using socket connection using IP Address provided by the user. Then the router node and destination node is created with the socket connection of using their properties.

Link-Failure Detection:

In this module, in every node monitors the quality of its outgoing wireless links at every tm (e.g., 10 sec) and reports the results to a gateway via a management message. Second, once it detects a link failure(s), in the detector node(s) triggers the formation of a group among local mesh routers that use a faulty channel, and one of the group members is elected as a leader and coordinating the reconfiguration.

Byzantine containment:
In this paper, we investigate the possibility of Byzantine containment in a self-stabilizing setting for tasks that are global (i.e., for with there exists a causality chain of size r, where r depends on n the size of the network), and focus on two global problems, namely tree orientation and tree construction. As strict stabilization is impossible with such global tasks, we weaken the containment constraint by limiting the number of times that correct processes can be disturbed by Byzantine ones. Recall that strict stabilization requires that processes beyond the containment radius eventually achieve their desired behavior and are never disturbed by Byzantine processes afterward. We relax this requirement in the following sense: we allow these correct processes beyond the containment radius to be disturbed by Byzantine processes, but only a limited number of times, even if
Byzantine nodes take an infinite number of actions. The main contribution of this paper is to present new possibility results for containing the influence of unbounded Byzantine behaviors.

SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:

         System                 : Pentium IV 2.4 GHz.
         Hard Disk            : 40 GB.
         Floppy Drive       : 1.44 Mb.
         Monitor                : 15 VGA Colour.
         Mouse                  : Logitech.
         Ram                     : 512 Mb.

SOFTWARE REQUIREMENTS:

         Operating system           : - Windows XP.
         Coding Language :  C#.Net.
         TOOL USED       : Visual Studio 2008
REFERENCE:
Swan Dubois, Toshimitsu Masuzawa, Member, IEEE, and Se´ bastien Tixeuil, “Bounding the Impact of Unbounded Attacks in Stabilization”, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 23, NO. 3, MARCH 2012.