The Community for Technology Leaders
Green Image
Issue No. 01 - January-February (2011 vol. 8)
ISSN: 1545-5971
pp: 122-136
Paulo Verissimo , Universidade de Lisboa, Lisboa
Miguel Correia , Universidade de Lisboa, Lisboa
Henrique Moniz , Universidade de Lisboa, Lisboa
Nuno Ferreira Neves , Universidade de Lisboa, Lisboa
ABSTRACT
Randomized agreement protocols have been around for more than two decades. Often assumed to be inefficient due to their high expected communication and computation complexities, they have remained overlooked by the community-at-large as a valid solution for the deployment of fault-tolerant distributed systems. This paper aims to demonstrate that randomization can be a very competitive approach even in hostile environments where arbitrary faults can occur. A stack of randomized intrusion-tolerant protocols is described and its performance evaluated under several settings in both local-area-network (LAN) and wide-area-network environments. The stack provides a set of relevant services ranging from basic communication primitives up to atomic broadcast. The experimental evaluation shows that the protocols are efficient, especially in LAN environments where no performance reduction is observed under certain Byzantine faults.
INDEX TERMS
Intrusion tolerance, Byzantine agreement, randomized protocols, performance evaluation.
CITATION
Paulo Verissimo, Miguel Correia, Henrique Moniz, Nuno Ferreira Neves, "RITAS: Services for Randomized Intrusion Tolerance", IEEE Transactions on Dependable and Secure Computing, vol. 8, no. , pp. 122-136, January-February 2011, doi:10.1109/TDSC.2008.76
96 ms
(Ver 3.1 (10032016))