System Model. Because MANET nodes are mobile, the nodes may move away from the MANET or return at any time. In our system, model a node that moves away from the MANET in the message-exchange phase is called an “away node.” A node that returns to the MANET before the decision-making phase is called a “return node.” The BA problem is considered in a MANET with fallible nodes and the fallible node type is the malicious fault. A MANET example is shown in Figure 1. The assumptions and parameters of the MAHAP protocols are listed as follows: ■ Each node in the MANET can be identified as unique. ■ Let N be the set of all nodes in the network and |N|= n, where n is the number of nodes in the underlying MANET, and n≧4. ■ The nodes in the underlying MANET are assumed fallible. ■ A node that transmits messages is called the sender node. ■ There is only one source node that transmits a message in the first message exchange round in the BA problem. ■ Let fm be the maximum number of malicious faulty nodes. ■ Let fa be the maximum number of away nodes. ■ Each node can detect any node that moves away from the MANET. ■ A node does not know the fault status of other nodes. ■ Let vs be the initial value of the source. ■ Let t be the maximum number of allowed faulty nodes. ■ Let δi be the absent value in the i-th round of a message exchange. Node b Node g Node f Node a Node s Node e Node d : fault-free node : malicious faulty node Node c Node h
Appears in 1 contract
Samples: Visiting Byzantine Agreement
System Model. Because MANET nodes are mobile, the nodes may move away from the MANET or return at any time. In our system, model a node that moves away from the MANET in the message-exchange phase is called an “away node.” A node that returns to the MANET before the decision-making phase is called a “return node.” The BA problem is considered in a MANET with fallible nodes and the fallible node type is the malicious fault. A MANET example is shown in Figure 1. The assumptions and parameters of the MAHAP protocols are listed as follows: ■ Each node in the MANET can be identified as unique. ■ Let N be the set of all nodes in the network and |N|= n, where n is the number of nodes in the underlying MANET, and n≧4. ■ The nodes in the underlying MANET are assumed fallible. ■ A node that transmits messages is called the sender node. ■ There is only one source node that transmits a message in the first message exchange round in the BA problem. ■ Let fm be the maximum number of malicious faulty nodes. ■ Let fa be the maximum number of away nodes. ■ Each node can detect any node that moves away from the MANET. ■ A node does not know the fault status of other nodes. ■ Let vs be the initial value of the source. ■ Let t be the maximum number of allowed faulty nodes. ■ Let δi be the absent value in the i-th round of a message exchange. Node f Node b Node g Node f Node a Node s Node e Node d : fault-free node : malicious faulty node Node c Node h
Appears in 1 contract
Samples: Visiting Byzantine Agreement
System Model. Because the nodes of MANET nodes are mobile, the nodes may move away from the MANET or return at any time. In our system, model a node that moves away from the MANET in the message-exchange phase is called an “away node.” A ”, while a node that returns to the MANET before the decision-making phase is called a “return node.” ”. Because an away node moves away from the MANET, an away node cannot transmit and receive messages from other nodes in the MANET. The detailed descriptions of the message-exchange phase and decision-making phase will be presented in Section 3.1 and 3.2. The BA problem is and FDA problems are considered in a an MANET with fallible nodes and the nodes. The faulty type of a fallible node type is the malicious fault(worst case). A An MANET example is shown in Figure 1. The assumptions and parameters of the MAHAP protocols system are listed as follows: ■ ◼ Each node in the MANET can be identified as uniqueuniquely identified. ■ ◼ Let N be the set of all nodes in the network and |N|= ∣N∣= n, where n is the number of nodes in the underlying MANET, and n≧4n≥4. ■ ◼ One of nodes is designated as the source node that holds an initial value. ◼ The nodes in of the underlying MANET are assumed fallible. ■ a sender node. ◼ A node that transmits messages is called the sender node. ■ ◼ There is only one source node that transmits a message in the BA problem. messages in the first message exchange round in the BA problem. ■ ◼ Let fm be the maximum number of malicious faulty nodes. ■ ◼ Let fa be the maximum number of away nodes. ■ ◼ Each node can detect any a node that moves away from is not in the MANET. ■ ◼ A node does not know the fault faulty status of other nodes. ■ Let vs be the initial value of the source. ■ Let t be the maximum number of allowed faulty nodes. ■ Let δi be the absent value in the i-th round of a message exchange. Node b Node g Node f Node a Node s Node e Node d : fault-free node : malicious faulty node Node c Node h.
Appears in 1 contract
Samples: Byzantine Agreement
System Model. Because the nodes of MANET nodes are mobile, the nodes may move away from the MANET or return at any time. In our system, model a node that moves away from the MANET in the message-exchange phase is called an “away node.” A ”, while a node that returns to the MANET before the decision-making phase is called a “return node.” ”. Because an away node moves away from the MANET, an away node cannot transmit and receive messages from other nodes in the MANET. The detailed descriptions of the message-exchange phase and decision-making phase will be presented in Section 3.1 and 3.2. The BA problem is and FDA problems are considered in a an MANET with fallible nodes and the nodes. The faulty type of a fallible node type is the malicious fault(worst case). A An MANET example is shown in Figure 1. The assumptions and parameters of the MAHAP protocols system are listed as follows: ■ Each node in the MANET can be identified as uniqueuniquely identified. ■ Let N be the set of all nodes in the network and |N|= ∣N∣= n, where n is the number of nodes in the underlying MANET, and n≧4n≥4. ■ One of nodes is designated as the source node that holds an initial value. ■ The nodes in of the underlying MANET are assumed fallible. a sender node. ■ A node that transmits messages is called the sender node. ■ There is only one source node that transmits a message in the BA problem. messages in the first message exchange round in the BA problem. ■ Let fm be the maximum number of malicious faulty nodes. ■ Let fa be the maximum number of away nodes. ■ Each node can detect any a node that moves away from is not in the MANET. ■ A node does not know the fault faulty status of other nodes. ■ Let vs be the initial value of the source. ■ Let t be the maximum number of allowed faulty nodes. ■ Let δi be the absent value in the i-th round of a message exchange. Node b Node g Node f Node a Node s Node e Node d : fault-free node : malicious faulty node Node c Node h.
Appears in 1 contract
Samples: Byzantine Agreement