Emerging distributed ledger technologies are often not based on Proof of Work (PoW) or Proof of Stake (PoS) consensus protocols. The lightweight protocols, based on the voter model, are typically used for handling contention. However, such protocols are fraught with a particular type of Byzantine adversary known as Berserk adversaries who intend to break the consensus. The existing method of Berserk detection involves the exchange of signatures. This in turn requires key servers, subject to a single point of failure. This paper investigates a new method of Berserk detection. Unlike most of the existing deterministic detection methodologies, the proposed method does not use signatures for the detection of Berserk behavior. The proposed solution is based on two-hop neighborhood opinion information gathering and detects Berserk nodes with some degree of certitude. We also try to ensure that the proposed approach detects most of the Berserk nodes and at the same time keeps the number of false detections marginal.

A Two-Hop Neighborhood Based Berserk Detection Algorithm for Probabilistic Model of Consensus in Distributed Ledger Systems

Cortesi A.;Chaki N.
2023-01-01

Abstract

Emerging distributed ledger technologies are often not based on Proof of Work (PoW) or Proof of Stake (PoS) consensus protocols. The lightweight protocols, based on the voter model, are typically used for handling contention. However, such protocols are fraught with a particular type of Byzantine adversary known as Berserk adversaries who intend to break the consensus. The existing method of Berserk detection involves the exchange of signatures. This in turn requires key servers, subject to a single point of failure. This paper investigates a new method of Berserk detection. Unlike most of the existing deterministic detection methodologies, the proposed method does not use signatures for the detection of Berserk behavior. The proposed solution is based on two-hop neighborhood opinion information gathering and detects Berserk nodes with some degree of certitude. We also try to ensure that the proposed approach detects most of the Berserk nodes and at the same time keeps the number of false detections marginal.
2023
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
File in questo prodotto:
File Dimensione Formato  
iccci23_deepanjan_published.pdf

non disponibili

Tipologia: Versione dell'editore
Licenza: Copyright dell'editore
Dimensione 3.14 MB
Formato Adobe PDF
3.14 MB Adobe PDF   Visualizza/Apri

I documenti in ARCA sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/10278/5039700
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 1
  • ???jsp.display-item.citation.isi??? 0
social impact