2021
DOI: 10.1109/tpds.2021.3056718
|View full text |Cite
|
Sign up to set email alerts
|

PISTIS: An Event-Triggered Real-Time Byzantine-Resilient Protocol Suite

Abstract: The accelerated digitalisation of society along with technological evolution have extended the geographical span of cyber-physical systems. Two main threats have made the reliable and real-time control of these systems challenging: (i) uncertainty in the communication infrastructure induced by scale, and heterogeneity of the environment and devices; and (ii) targeted attacks maliciously worsening the impact of the above-mentioned communication uncertainties, disrupting the correctness of realtime applications.… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
4

Relationship

2
7

Authors

Journals

citations
Cited by 18 publications
(5 citation statements)
references
References 35 publications
(58 reference statements)
0
5
0
Order By: Relevance
“…Reliable broadcast [8,32] in addition requires that if a correct node delivers 𝑚 then all correct nodes eventually deliver it, regardless of whether the sender is correct or not. A total order (or atomic) broadcast protocol additionally guarantees that correct nodes deliver messages in the same order [11,33]. Total order can be provided by a consensus protocol [10,51,53].…”
Section: Byzantine Committees and Broadcastmentioning
confidence: 99%
“…Reliable broadcast [8,32] in addition requires that if a correct node delivers 𝑚 then all correct nodes eventually deliver it, regardless of whether the sender is correct or not. A total order (or atomic) broadcast protocol additionally guarantees that correct nodes deliver messages in the same order [11,33]. Total order can be provided by a consensus protocol [10,51,53].…”
Section: Byzantine Committees and Broadcastmentioning
confidence: 99%
“…When the user cannot obtain the desired information by using one role, he is likely to access it through another role to achieve his purpose, that is, this class The model is very vulnerable to Sybil attack. At the same time, the permissions corresponding to roles in the model are static and cannot change with the change of different conditions, so the model is less dynamic [17][18]. The basic architecture of RBAC is shown in Figure 4:…”
Section: Figure 2 Tbac Basic Architecturementioning
confidence: 99%
“…Recently, Contagion [17] replaced quorums by smaller stochastic samples, and described an abstraction whose properties can be violated with a probability that depends on the size of the samples. Differently, RT-ByzCast [18] and PISTIS [19] aimed at providing real-time guarantees in probabilistically synchronous and reliable networks. The idea of using pseudorandomized message dissemination has been used to tolerate malicious or selfish behaviors in several works [20,21], which however only provide probabilistic guarantees, while we target exact deterministic guarantees.…”
Section: Related Workmentioning
confidence: 99%