10
Views
0
CrossRef citations to date
0
Altmetric
Original Articles

An algorithm for identification of maliciously faulty units

&
Pages 21-29 | Received 17 Mar 1992, Published online: 19 Mar 2007
 

Abstract

The paper proposes an algorithm for identification of malicious units in a fully connected system. The assumed scenario is the same as in an execution of a full information gathering algorithm for Byzantine agreement without authentication. A criterion that can be used by a fault-free unit to identify a malicious unit is described. The exact bound of the maximum number of equal values that a unit which can be identified as malicious, sends to the other units, is calculated. It is proved that if a unit can be identified as malicious by sending some different messages to the other units, then this can be done in the two consecutive phases. These results form the core of the proposed algorithm.

*Supported in part by the Research Council of Slovenia

*Supported in part by the Research Council of Slovenia

*Supported in part by the Research Council of Slovenia

*Supported in part by the Research Council of Slovenia

Notes

*Supported in part by the Research Council of Slovenia

*Supported in part by the Research Council of Slovenia

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.