SlideShare a Scribd company logo
1 of 35
Download to read offline
Introduction Cheat Detection Distributed Ledger Performance Conclusions
Distributed Ledger and Robust Consensus for
Agreements
M. Rebollo,C. Carrascosa, A. Palomares
Grupo de Tec. Inform´atica – Inteligencia Artificial
Universitat Polit`ecnica de Val`encia
{mrebollo,carrasco,apalomares}@dsic.upv.es
AT, Bergen 2018
c b a
@mrebollo UPV
Distributed Ledger and Robust Consensus for Agreements
Introduction Cheat Detection Distributed Ledger Performance Conclusions
Overview
1 Introduction
2 Cheat Detection
3 Consensus for Distributed Ledger
4 Performance
5 Conclusions
@mrebollo UPV
Distributed Ledger and Robust Consensus for Agreements
Introduction Cheat Detection Distributed Ledger Performance Conclusions
What consensus is?
@mrebollo UPV
Distributed Ledger and Robust Consensus for Agreements
Introduction Cheat Detection Distributed Ledger Performance Conclusions
@mrebollo UPV
Distributed Ledger and Robust Consensus for Agreements
Introduction Cheat Detection Distributed Ledger Performance Conclusions
@mrebollo UPV
Distributed Ledger and Robust Consensus for Agreements
Introduction Cheat Detection Distributed Ledger Performance Conclusions
@mrebollo UPV
Distributed Ledger and Robust Consensus for Agreements
Introduction Cheat Detection Distributed Ledger Performance Conclusions
@mrebollo UPV
Distributed Ledger and Robust Consensus for Agreements
Introduction Cheat Detection Distributed Ledger Performance Conclusions
What are consensus used for?
@mrebollo UPV
Distributed Ledger and Robust Consensus for Agreements
Introduction Cheat Detection Distributed Ledger Performance Conclusions
@mrebollo UPV
Distributed Ledger and Robust Consensus for Agreements
Introduction Cheat Detection Distributed Ledger Performance Conclusions
@mrebollo UPV
Distributed Ledger and Robust Consensus for Agreements
Introduction Cheat Detection Distributed Ledger Performance Conclusions
@mrebollo UPV
Distributed Ledger and Robust Consensus for Agreements
Introduction Cheat Detection Distributed Ledger Performance Conclusions
@mrebollo UPV
Distributed Ledger and Robust Consensus for Agreements
Introduction Cheat Detection Distributed Ledger Performance Conclusions
Consensus algorithm (Olfati, 2007)
Given
undirected graph
G = (V , E)
set of initial values
x = (x1, . . . , xn)T
@mrebollo UPV
Distributed Ledger and Robust Consensus for Agreements
Introduction Cheat Detection Distributed Ledger Performance Conclusions
Consensus algorithm (Olfati, 2007)
1 each node has its initial
value
1 2
3 4
x1 = 0.4 x2 = 0.2
x3 = 0.3 x4 = 0.9
x1 = 0.4
@mrebollo UPV
Distributed Ledger and Robust Consensus for Agreements
Introduction Cheat Detection Distributed Ledger Performance Conclusions
Consensus algorithm (Olfati, 2007)
1 each node has its initial
value
2 pass the value to its
neighbors
1 2
3 4
x1 = 0.4 x2 = 0.2
x3 = 0.3 x4 = 0.9
x1 = 0.4
x1 = 0.4
x1 = 0.4
@mrebollo UPV
Distributed Ledger and Robust Consensus for Agreements
Introduction Cheat Detection Distributed Ledger Performance Conclusions
Consensus algorithm (Olfati, 2007)
1 each node has its initial
value
2 pass the value to its
neighbors
3 receive the values from its
neighbors
1 2
3 4
x1 = 0.4 x2 = 0.2
x3 = 0.3 x4 = 0.9
x2 = 0.2
x4 = 0.9
x3 = 0.3
@mrebollo UPV
Distributed Ledger and Robust Consensus for Agreements
Introduction Cheat Detection Distributed Ledger Performance Conclusions
Consensus algorithm (Olfati, 2007)
1 each node has its initial
value
2 pass the value to its
neighbors
3 receive the values from its
neighbors
4 calculates the new value
1 2
3 4
x1 = 0.45 x2 = 0.425
x3 = 0.325 x4 = 0.6
x1 = 0.4
x(t + 1) = x(t) + ε
j∈Ni
[xj(t) − xi (t)]
@mrebollo UPV
Distributed Ledger and Robust Consensus for Agreements
Introduction Cheat Detection Distributed Ledger Performance Conclusions
Consensus algorithm (Olfati, 2007)
The network converges to
the mean value
lim
t→∞
xi (t) =
1
n i
xi (0)
0 5 10 15 20 25 30
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
x = 0.45
@mrebollo UPV
Distributed Ledger and Robust Consensus for Agreements
Introduction Cheat Detection Distributed Ledger Performance Conclusions
Problem
Failure detection on consensus process
Only with one agent not following the algorithm, the network
converges to a value different from the average
@mrebollo UPV
Distributed Ledger and Robust Consensus for Agreements
Introduction Cheat Detection Distributed Ledger Performance Conclusions
Altering Consensus
xi (t + 1) = xi (t) + ε
j∈Ni
[xj(t) − xi (t)] + ui (t)
1
23
4
5
6
7 8
9
10
0 10 20 30 40 50
time
0
2
4
6
8
10
xi
Consensus with Malicious Agent
10 agents, x = (1, 2, . . . , 10)T , ∆x5 = 4
@mrebollo UPV
Distributed Ledger and Robust Consensus for Agreements
Introduction Cheat Detection Distributed Ledger Performance Conclusions
Altering Consensus
xi (t + 1) = xi (t) + ε
j∈Ni
[xj(t) − xi (t)] + ui (t)
1
23
4
5
6
7 8
9
10
0 10 20 30 40 50
time
0
2
4
6
8
10
xi
Consensus with Malicious Agent
10 agents, x = (1, 2, . . . , 10)T , ∆x5 = 4
@mrebollo UPV
Distributed Ledger and Robust Consensus for Agreements
Introduction Cheat Detection Distributed Ledger Performance Conclusions
Cheat Detection
From
xi (t + 1) = xi (t) + ε
j∈Ni
[xj(t) − xi (t)]
clearing
0 = xi (t + 1) + (εdeg(i) − 1)xi (t) − ε
j∈Ni
xj(t)
dvi (t)
and the process must fulfil that
dvi (t) = 0 ∀t > 0
@mrebollo UPV
Distributed Ledger and Robust Consensus for Agreements
Introduction Cheat Detection Distributed Ledger Performance Conclusions
Correction of the Deviations
xi (t + 1) = xi (t) + ε
j∈Ni
[xj(t) − xi (t)] + ui (t), with ui (t) > 0
ui (t) is divided into the neighbors as follows
the agent keeps (1 − εdeg(i))ui (t)
each neighbor receives εui (t)
therefore, dvi (t) = εui (t) → ui (t) = dvi (t)
ε
in general dvi (t)
ε = j∈Ni
uj(t)
total deviation Di (t) = t
s=0 dvi (s)
@mrebollo UPV
Distributed Ledger and Robust Consensus for Agreements
Introduction Cheat Detection Distributed Ledger Performance Conclusions
Correction of the Deviation
Consensus over (Di |wi )
Di cumulated deviation
wi number of detected deviations
Corrected value
ˆxi(t) = xi (t) −
Di (t)
εwi (t)
ci (t))
@mrebollo UPV
Distributed Ledger and Robust Consensus for Agreements
Introduction Cheat Detection Distributed Ledger Performance Conclusions
Failure Causes in Distributed Networks
stop: the agent stops sending information
byzantine failures: unexpected erratic behavior or deliberate
errors
unfair behavior, but admitted because of rationality,
self-interest or incentive policies.
@mrebollo UPV
Distributed Ledger and Robust Consensus for Agreements
Introduction Cheat Detection Distributed Ledger Performance Conclusions
Application to Distributed Ledger Technology (DLT)
L1 L2 L3 L4 L5 L6
Hash 1+2 Hash 3+4 Hash 5+6
Hash
1+2+3+4
Hash 5+6
Hash
1+2+3+4+5+6
Distributed ledger stored in a Merkle tree
only leaves have information
each brach from root belongs to one agent
@mrebollo UPV
Distributed Ledger and Robust Consensus for Agreements
Introduction Cheat Detection Distributed Ledger Performance Conclusions
Sample Merkle tree for 4 nodes
@mrebollo UPV
Distributed Ledger and Robust Consensus for Agreements
Introduction Cheat Detection Distributed Ledger Performance Conclusions
DLT by consensus
agent i creates a block with its transactions s
inserts the block in its tree
obtains the hash of the root hr
generates (s|hr |yi = 1)
the rest do ( | |yi = 0)
@mrebollo UPV
Distributed Ledger and Robust Consensus for Agreements
Introduction Cheat Detection Distributed Ledger Performance Conclusions
Proof-of-concept
{ "@iot.count": 1,
"value": [{
"@iot.id": 1,
"phenomenonTime": 2018-10-05T08:55.08.504Z,
"result": 0.9058
}]}
Hash
0183A1ACBB765DB82EF98833872BA455F4D3B4037F...
@mrebollo UPV
Distributed Ledger and Robust Consensus for Agreements
Introduction Cheat Detection Distributed Ledger Performance Conclusions
Malicious agent changes the block
[commandchars={}]
{ "@iot.count": 1,
"value": [{
"@iot.id": 1,
"phenomenonTime": 2018-10-05T08:55.08.504Z,
"result": 0.9312
}]}
Hash
028AF8FD383E3E30EF73B141DB28100E2837DCA9B9...
@mrebollo UPV
Distributed Ledger and Robust Consensus for Agreements
Introduction Cheat Detection Distributed Ledger Performance Conclusions
0 20 40 60 80 100
time
1160
1180
1200
1220
1240
1260
x
i
DLT by Consensus with Cheating
10 15 20 25 30
1190
1200
1210
1220
1230
0 20 40 60 80 100
time
0
0.05
0.1
0.15
0.2
0.25
x
i
Evolution of Corrections for DLT
@mrebollo UPV
Distributed Ledger and Robust Consensus for Agreements
Introduction Cheat Detection Distributed Ledger Performance Conclusions
Result after final correction
{"iotcount":2,"readings":[{"iotid":1,
"result":0.9058,
"phenomenonTime":"2018-10-05T08:55.08.504Z"}
{"iotcount":2,"readings":[{"iotid":1,
"result":0.9058,
"phenomenonTime":"2018-10-05T08:55.08.504Z"}
{"iotcount":2,"readings":[{"iotid":1,
"result":0.9058,
"phenomenonTime":"2018-10-05T08:55.08.504Z"}
...
@mrebollo UPV
Distributed Ledger and Robust Consensus for Agreements
Introduction Cheat Detection Distributed Ledger Performance Conclusions
Differences
test over random
networks
if m cheat,
then
n ≥ 3 + 1
half the
neighbors are
confident
@mrebollo UPV
Distributed Ledger and Robust Consensus for Agreements
Introduction Cheat Detection Distributed Ledger Performance Conclusions
Successful Corrections
1,000
repetitions
corrections of
100% follow
a Power-law
with
γ = −0.44
0 20 40 60 80 100
#cheating nodes
200
400
600
800
1000
freq.
Successful corrections
@mrebollo UPV
Distributed Ledger and Robust Consensus for Agreements
Introduction Cheat Detection Distributed Ledger Performance Conclusions
Conclusions
Extension of consensus algorithm
robust algorithm for consensus in networks
deviation from expected values detected
correction mover the final result
applied to DLT
Limitations
1st exchange must be correct
correction possible if m < n
3 and m < |Ni |
2
cheating agents undetected if only cheat once
@mrebollo UPV
Distributed Ledger and Robust Consensus for Agreements

More Related Content

What's hot

Chapter 4 Powerpoint
Chapter 4 PowerpointChapter 4 Powerpoint
Chapter 4 Powerpoint
Gus Sandoval
 
論文紹介 Fast imagetagging
論文紹介 Fast imagetagging論文紹介 Fast imagetagging
論文紹介 Fast imagetagging
Takashi Abe
 
Deep Learning Opening Workshop - ProxSARAH Algorithms for Stochastic Composit...
Deep Learning Opening Workshop - ProxSARAH Algorithms for Stochastic Composit...Deep Learning Opening Workshop - ProxSARAH Algorithms for Stochastic Composit...
Deep Learning Opening Workshop - ProxSARAH Algorithms for Stochastic Composit...
The Statistical and Applied Mathematical Sciences Institute
 
Compact binary-tree-representation-of-logic-function-with-enhanced-throughput-
Compact binary-tree-representation-of-logic-function-with-enhanced-throughput-Compact binary-tree-representation-of-logic-function-with-enhanced-throughput-
Compact binary-tree-representation-of-logic-function-with-enhanced-throughput-
Cemal Ardil
 

What's hot (20)

Presentation Slides - Genetic algorithm based key generation for fully homomo...
Presentation Slides - Genetic algorithm based key generation for fully homomo...Presentation Slides - Genetic algorithm based key generation for fully homomo...
Presentation Slides - Genetic algorithm based key generation for fully homomo...
 
N-gram IDF: A Global Term Weighting Scheme Based on Information Distance (WWW...
N-gram IDF: A Global Term Weighting Scheme Based on Information Distance (WWW...N-gram IDF: A Global Term Weighting Scheme Based on Information Distance (WWW...
N-gram IDF: A Global Term Weighting Scheme Based on Information Distance (WWW...
 
BLIND SIGNATURE SCHEME BASED ON CHEBYSHEV POLYNOMIALS
BLIND SIGNATURE SCHEME BASED ON CHEBYSHEV POLYNOMIALSBLIND SIGNATURE SCHEME BASED ON CHEBYSHEV POLYNOMIALS
BLIND SIGNATURE SCHEME BASED ON CHEBYSHEV POLYNOMIALS
 
THE KEY EXCHANGE CRYPTOSYSTEM USED WITH HIGHER ORDER DIOPHANTINE EQUATIONS
THE KEY EXCHANGE CRYPTOSYSTEM USED WITH HIGHER ORDER DIOPHANTINE EQUATIONSTHE KEY EXCHANGE CRYPTOSYSTEM USED WITH HIGHER ORDER DIOPHANTINE EQUATIONS
THE KEY EXCHANGE CRYPTOSYSTEM USED WITH HIGHER ORDER DIOPHANTINE EQUATIONS
 
Pert 05 aplikasi clustering
Pert 05 aplikasi clusteringPert 05 aplikasi clustering
Pert 05 aplikasi clustering
 
Chapter 4 Powerpoint
Chapter 4 PowerpointChapter 4 Powerpoint
Chapter 4 Powerpoint
 
Hands-on Tutorial of Deep Learning
Hands-on Tutorial of Deep LearningHands-on Tutorial of Deep Learning
Hands-on Tutorial of Deep Learning
 
Auto encoding-variational-bayes
Auto encoding-variational-bayesAuto encoding-variational-bayes
Auto encoding-variational-bayes
 
Chapter 03 cyclic codes
Chapter 03   cyclic codesChapter 03   cyclic codes
Chapter 03 cyclic codes
 
Privacy-Preserving Multi-Keyword Fuzzy Search over Encrypted Data in the Cloud
Privacy-Preserving Multi-Keyword Fuzzy Search over Encrypted Data in the CloudPrivacy-Preserving Multi-Keyword Fuzzy Search over Encrypted Data in the Cloud
Privacy-Preserving Multi-Keyword Fuzzy Search over Encrypted Data in the Cloud
 
Model-Based Decision Making: On Supporting Deliberation with Metaheuristics
Model-Based Decision Making: On Supporting Deliberation with MetaheuristicsModel-Based Decision Making: On Supporting Deliberation with Metaheuristics
Model-Based Decision Making: On Supporting Deliberation with Metaheuristics
 
Ch10 1 v1
Ch10 1 v1Ch10 1 v1
Ch10 1 v1
 
論文紹介 Fast imagetagging
論文紹介 Fast imagetagging論文紹介 Fast imagetagging
論文紹介 Fast imagetagging
 
Cloud computing and security final
Cloud computing and security finalCloud computing and security final
Cloud computing and security final
 
Deep Learning Opening Workshop - ProxSARAH Algorithms for Stochastic Composit...
Deep Learning Opening Workshop - ProxSARAH Algorithms for Stochastic Composit...Deep Learning Opening Workshop - ProxSARAH Algorithms for Stochastic Composit...
Deep Learning Opening Workshop - ProxSARAH Algorithms for Stochastic Composit...
 
Error Control coding
Error Control codingError Control coding
Error Control coding
 
Compact binary-tree-representation-of-logic-function-with-enhanced-throughput-
Compact binary-tree-representation-of-logic-function-with-enhanced-throughput-Compact binary-tree-representation-of-logic-function-with-enhanced-throughput-
Compact binary-tree-representation-of-logic-function-with-enhanced-throughput-
 
Goodfellow, Bengio, Couville (2016) "Deep Learning", Chap. 7
Goodfellow, Bengio, Couville (2016) "Deep Learning", Chap. 7Goodfellow, Bengio, Couville (2016) "Deep Learning", Chap. 7
Goodfellow, Bengio, Couville (2016) "Deep Learning", Chap. 7
 
Deep Learning Opening Workshop - Deep ReLU Networks Viewed as a Statistical M...
Deep Learning Opening Workshop - Deep ReLU Networks Viewed as a Statistical M...Deep Learning Opening Workshop - Deep ReLU Networks Viewed as a Statistical M...
Deep Learning Opening Workshop - Deep ReLU Networks Viewed as a Statistical M...
 
MUMS: Bayesian, Fiducial, and Frequentist Conference - Model Selection in the...
MUMS: Bayesian, Fiducial, and Frequentist Conference - Model Selection in the...MUMS: Bayesian, Fiducial, and Frequentist Conference - Model Selection in the...
MUMS: Bayesian, Fiducial, and Frequentist Conference - Model Selection in the...
 

Similar to Distributed Ledger and Robust Consensus for Agreements

Fpga 11-sequence-detector-fir-iir-filter
Fpga 11-sequence-detector-fir-iir-filterFpga 11-sequence-detector-fir-iir-filter
Fpga 11-sequence-detector-fir-iir-filter
Malik Tauqir Hasan
 

Similar to Distributed Ledger and Robust Consensus for Agreements (20)

PODS 2013 - Montali - Verification of Relational Data-Centric Dynamic Systems...
PODS 2013 - Montali - Verification of Relational Data-Centric Dynamic Systems...PODS 2013 - Montali - Verification of Relational Data-Centric Dynamic Systems...
PODS 2013 - Montali - Verification of Relational Data-Centric Dynamic Systems...
 
IRJET- Optimization of 1-Bit ALU using Ternary Logic
IRJET- Optimization of 1-Bit ALU using Ternary LogicIRJET- Optimization of 1-Bit ALU using Ternary Logic
IRJET- Optimization of 1-Bit ALU using Ternary Logic
 
Network and risk spillovers: a multivariate GARCH perspective
Network and risk spillovers: a multivariate GARCH perspectiveNetwork and risk spillovers: a multivariate GARCH perspective
Network and risk spillovers: a multivariate GARCH perspective
 
Fpga 11-sequence-detector-fir-iir-filter
Fpga 11-sequence-detector-fir-iir-filterFpga 11-sequence-detector-fir-iir-filter
Fpga 11-sequence-detector-fir-iir-filter
 
Friedlander et al. Evolution of Bow-Tie Architectures in Biology (2015)
Friedlander et al. Evolution of Bow-Tie Architectures in Biology (2015)Friedlander et al. Evolution of Bow-Tie Architectures in Biology (2015)
Friedlander et al. Evolution of Bow-Tie Architectures in Biology (2015)
 
New edge prediction and anomaly-detection in large computer networks
New edge prediction and anomaly-detection in large computer networksNew edge prediction and anomaly-detection in large computer networks
New edge prediction and anomaly-detection in large computer networks
 
How to valuate and determine standard essential patents
How to valuate and determine standard essential patentsHow to valuate and determine standard essential patents
How to valuate and determine standard essential patents
 
Data-Driven Recommender Systems
Data-Driven Recommender SystemsData-Driven Recommender Systems
Data-Driven Recommender Systems
 
Ethereum Blockchain and DApps - Workshop at Software University
Ethereum Blockchain and DApps  - Workshop at Software UniversityEthereum Blockchain and DApps  - Workshop at Software University
Ethereum Blockchain and DApps - Workshop at Software University
 
Complement.pdf
Complement.pdfComplement.pdf
Complement.pdf
 
2019 GDRR: Blockchain Data Analytics - Modeling Cryptocurrency Markets with T...
2019 GDRR: Blockchain Data Analytics - Modeling Cryptocurrency Markets with T...2019 GDRR: Blockchain Data Analytics - Modeling Cryptocurrency Markets with T...
2019 GDRR: Blockchain Data Analytics - Modeling Cryptocurrency Markets with T...
 
CoopLoc Technical Presentation
CoopLoc Technical PresentationCoopLoc Technical Presentation
CoopLoc Technical Presentation
 
New Design Architecture of Chaotic Secure Communication System Combined with ...
New Design Architecture of Chaotic Secure Communication System Combined with ...New Design Architecture of Chaotic Secure Communication System Combined with ...
New Design Architecture of Chaotic Secure Communication System Combined with ...
 
Efficient Re-computation of Big Data Analytics Processes in the Presence of C...
Efficient Re-computation of Big Data Analytics Processes in the Presence of C...Efficient Re-computation of Big Data Analytics Processes in the Presence of C...
Efficient Re-computation of Big Data Analytics Processes in the Presence of C...
 
[JPDC,JCC@LMN22] Ad hoc systems Management and specification with distributed...
[JPDC,JCC@LMN22] Ad hoc systems Management and specification with distributed...[JPDC,JCC@LMN22] Ad hoc systems Management and specification with distributed...
[JPDC,JCC@LMN22] Ad hoc systems Management and specification with distributed...
 
paper
paperpaper
paper
 
Technical aptitude questions_e_book1
Technical aptitude questions_e_book1Technical aptitude questions_e_book1
Technical aptitude questions_e_book1
 
Advanced Econometrics L13-14.pptx
Advanced Econometrics L13-14.pptxAdvanced Econometrics L13-14.pptx
Advanced Econometrics L13-14.pptx
 
Essentials of jitter part 3 webinar slides
Essentials of jitter part 3 webinar slidesEssentials of jitter part 3 webinar slides
Essentials of jitter part 3 webinar slides
 
A GARCH analysis of dark-pool trades - Philippe de Peretti, Oren J. Tapiero ....
A GARCH analysis of dark-pool trades - Philippe de Peretti, Oren J. Tapiero ....A GARCH analysis of dark-pool trades - Philippe de Peretti, Oren J. Tapiero ....
A GARCH analysis of dark-pool trades - Philippe de Peretti, Oren J. Tapiero ....
 

More from Miguel Rebollo

More from Miguel Rebollo (20)

GTG-CoL: A Decentralized Federated Learning Based on Consensus for Dynamic N...
 GTG-CoL: A Decentralized Federated Learning Based on Consensus for Dynamic N... GTG-CoL: A Decentralized Federated Learning Based on Consensus for Dynamic N...
GTG-CoL: A Decentralized Federated Learning Based on Consensus for Dynamic N...
 
Co-Learning: Consensus-based Learning for Multi-Agent Systems
 Co-Learning: Consensus-based Learning for Multi-Agent Systems Co-Learning: Consensus-based Learning for Multi-Agent Systems
Co-Learning: Consensus-based Learning for Multi-Agent Systems
 
Análisis de la red de autores de ciencia ficción de Clarkesworld
Análisis de la red de autores de ciencia ficción de ClarkesworldAnálisis de la red de autores de ciencia ficción de Clarkesworld
Análisis de la red de autores de ciencia ficción de Clarkesworld
 
Y sin embargo... se mueve. Dinámica de las redes complejas
Y sin embargo... se mueve. Dinámica de las redes complejasY sin embargo... se mueve. Dinámica de las redes complejas
Y sin embargo... se mueve. Dinámica de las redes complejas
 
Exámenes en grupo y pruebas de corrección como alternativas a la evaluación
Exámenes en grupo y pruebas de corrección como alternativas a la evaluaciónExámenes en grupo y pruebas de corrección como alternativas a la evaluación
Exámenes en grupo y pruebas de corrección como alternativas a la evaluación
 
Gamification. Key Concepts
Gamification. Key ConceptsGamification. Key Concepts
Gamification. Key Concepts
 
Using Distributed Risk Maps by Consensus as a Complement to Contact Tracing Apps
Using Distributed Risk Maps by Consensus as a Complement to Contact Tracing AppsUsing Distributed Risk Maps by Consensus as a Complement to Contact Tracing Apps
Using Distributed Risk Maps by Consensus as a Complement to Contact Tracing Apps
 
Detección de nodos tramposos en procesos de consenso en redes
Detección de nodos tramposos en procesos de consenso en redesDetección de nodos tramposos en procesos de consenso en redes
Detección de nodos tramposos en procesos de consenso en redes
 
La hora del código: ApS para fomentar el pensamiento computacional
La hora del código: ApS para fomentar el pensamiento computacionalLa hora del código: ApS para fomentar el pensamiento computacional
La hora del código: ApS para fomentar el pensamiento computacional
 
Procesos de enseñanza-aprendizaje en red
Procesos de enseñanza-aprendizaje en redProcesos de enseñanza-aprendizaje en red
Procesos de enseñanza-aprendizaje en red
 
desarrollo de competencias a través de narrativas transmedia
desarrollo de competencias a través de narrativas transmediadesarrollo de competencias a través de narrativas transmedia
desarrollo de competencias a través de narrativas transmedia
 
Distributed Group Analytical Hierarchical Process by Consensus
 Distributed Group Analytical Hierarchical Process by Consensus Distributed Group Analytical Hierarchical Process by Consensus
Distributed Group Analytical Hierarchical Process by Consensus
 
Análisis de ciudades a través de su actividad en redes sociales
Análisis de ciudades a través de su actividad en redes socialesAnálisis de ciudades a través de su actividad en redes sociales
Análisis de ciudades a través de su actividad en redes sociales
 
Análisis de datos en redes sociales
Análisis de datos en redes socialesAnálisis de datos en redes sociales
Análisis de datos en redes sociales
 
The multigent Layer for CALMeD SURF
The multigent Layer for CALMeD SURFThe multigent Layer for CALMeD SURF
The multigent Layer for CALMeD SURF
 
Narrativa transmedia en el aula
Narrativa transmedia en el aulaNarrativa transmedia en el aula
Narrativa transmedia en el aula
 
Using geo-tagged sentiment to better understand social interactions
 Using geo-tagged sentiment to better understand social interactions Using geo-tagged sentiment to better understand social interactions
Using geo-tagged sentiment to better understand social interactions
 
Transport Network Analysis for Smart Open Fleets
Transport Network Analysis for Smart Open FleetsTransport Network Analysis for Smart Open Fleets
Transport Network Analysis for Smart Open Fleets
 
Análisis de sentimientos en Twitter mediante HMM
Análisis de sentimientos en Twitter mediante HMMAnálisis de sentimientos en Twitter mediante HMM
Análisis de sentimientos en Twitter mediante HMM
 
La (poca) soledad del corredor de fondo
La (poca) soledad del corredor de fondoLa (poca) soledad del corredor de fondo
La (poca) soledad del corredor de fondo
 

Recently uploaded

Recently uploaded (20)

Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 

Distributed Ledger and Robust Consensus for Agreements

  • 1. Introduction Cheat Detection Distributed Ledger Performance Conclusions Distributed Ledger and Robust Consensus for Agreements M. Rebollo,C. Carrascosa, A. Palomares Grupo de Tec. Inform´atica – Inteligencia Artificial Universitat Polit`ecnica de Val`encia {mrebollo,carrasco,apalomares}@dsic.upv.es AT, Bergen 2018 c b a @mrebollo UPV Distributed Ledger and Robust Consensus for Agreements
  • 2. Introduction Cheat Detection Distributed Ledger Performance Conclusions Overview 1 Introduction 2 Cheat Detection 3 Consensus for Distributed Ledger 4 Performance 5 Conclusions @mrebollo UPV Distributed Ledger and Robust Consensus for Agreements
  • 3. Introduction Cheat Detection Distributed Ledger Performance Conclusions What consensus is? @mrebollo UPV Distributed Ledger and Robust Consensus for Agreements
  • 4. Introduction Cheat Detection Distributed Ledger Performance Conclusions @mrebollo UPV Distributed Ledger and Robust Consensus for Agreements
  • 5. Introduction Cheat Detection Distributed Ledger Performance Conclusions @mrebollo UPV Distributed Ledger and Robust Consensus for Agreements
  • 6. Introduction Cheat Detection Distributed Ledger Performance Conclusions @mrebollo UPV Distributed Ledger and Robust Consensus for Agreements
  • 7. Introduction Cheat Detection Distributed Ledger Performance Conclusions @mrebollo UPV Distributed Ledger and Robust Consensus for Agreements
  • 8. Introduction Cheat Detection Distributed Ledger Performance Conclusions What are consensus used for? @mrebollo UPV Distributed Ledger and Robust Consensus for Agreements
  • 9. Introduction Cheat Detection Distributed Ledger Performance Conclusions @mrebollo UPV Distributed Ledger and Robust Consensus for Agreements
  • 10. Introduction Cheat Detection Distributed Ledger Performance Conclusions @mrebollo UPV Distributed Ledger and Robust Consensus for Agreements
  • 11. Introduction Cheat Detection Distributed Ledger Performance Conclusions @mrebollo UPV Distributed Ledger and Robust Consensus for Agreements
  • 12. Introduction Cheat Detection Distributed Ledger Performance Conclusions @mrebollo UPV Distributed Ledger and Robust Consensus for Agreements
  • 13. Introduction Cheat Detection Distributed Ledger Performance Conclusions Consensus algorithm (Olfati, 2007) Given undirected graph G = (V , E) set of initial values x = (x1, . . . , xn)T @mrebollo UPV Distributed Ledger and Robust Consensus for Agreements
  • 14. Introduction Cheat Detection Distributed Ledger Performance Conclusions Consensus algorithm (Olfati, 2007) 1 each node has its initial value 1 2 3 4 x1 = 0.4 x2 = 0.2 x3 = 0.3 x4 = 0.9 x1 = 0.4 @mrebollo UPV Distributed Ledger and Robust Consensus for Agreements
  • 15. Introduction Cheat Detection Distributed Ledger Performance Conclusions Consensus algorithm (Olfati, 2007) 1 each node has its initial value 2 pass the value to its neighbors 1 2 3 4 x1 = 0.4 x2 = 0.2 x3 = 0.3 x4 = 0.9 x1 = 0.4 x1 = 0.4 x1 = 0.4 @mrebollo UPV Distributed Ledger and Robust Consensus for Agreements
  • 16. Introduction Cheat Detection Distributed Ledger Performance Conclusions Consensus algorithm (Olfati, 2007) 1 each node has its initial value 2 pass the value to its neighbors 3 receive the values from its neighbors 1 2 3 4 x1 = 0.4 x2 = 0.2 x3 = 0.3 x4 = 0.9 x2 = 0.2 x4 = 0.9 x3 = 0.3 @mrebollo UPV Distributed Ledger and Robust Consensus for Agreements
  • 17. Introduction Cheat Detection Distributed Ledger Performance Conclusions Consensus algorithm (Olfati, 2007) 1 each node has its initial value 2 pass the value to its neighbors 3 receive the values from its neighbors 4 calculates the new value 1 2 3 4 x1 = 0.45 x2 = 0.425 x3 = 0.325 x4 = 0.6 x1 = 0.4 x(t + 1) = x(t) + ε j∈Ni [xj(t) − xi (t)] @mrebollo UPV Distributed Ledger and Robust Consensus for Agreements
  • 18. Introduction Cheat Detection Distributed Ledger Performance Conclusions Consensus algorithm (Olfati, 2007) The network converges to the mean value lim t→∞ xi (t) = 1 n i xi (0) 0 5 10 15 20 25 30 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 x = 0.45 @mrebollo UPV Distributed Ledger and Robust Consensus for Agreements
  • 19. Introduction Cheat Detection Distributed Ledger Performance Conclusions Problem Failure detection on consensus process Only with one agent not following the algorithm, the network converges to a value different from the average @mrebollo UPV Distributed Ledger and Robust Consensus for Agreements
  • 20. Introduction Cheat Detection Distributed Ledger Performance Conclusions Altering Consensus xi (t + 1) = xi (t) + ε j∈Ni [xj(t) − xi (t)] + ui (t) 1 23 4 5 6 7 8 9 10 0 10 20 30 40 50 time 0 2 4 6 8 10 xi Consensus with Malicious Agent 10 agents, x = (1, 2, . . . , 10)T , ∆x5 = 4 @mrebollo UPV Distributed Ledger and Robust Consensus for Agreements
  • 21. Introduction Cheat Detection Distributed Ledger Performance Conclusions Altering Consensus xi (t + 1) = xi (t) + ε j∈Ni [xj(t) − xi (t)] + ui (t) 1 23 4 5 6 7 8 9 10 0 10 20 30 40 50 time 0 2 4 6 8 10 xi Consensus with Malicious Agent 10 agents, x = (1, 2, . . . , 10)T , ∆x5 = 4 @mrebollo UPV Distributed Ledger and Robust Consensus for Agreements
  • 22. Introduction Cheat Detection Distributed Ledger Performance Conclusions Cheat Detection From xi (t + 1) = xi (t) + ε j∈Ni [xj(t) − xi (t)] clearing 0 = xi (t + 1) + (εdeg(i) − 1)xi (t) − ε j∈Ni xj(t) dvi (t) and the process must fulfil that dvi (t) = 0 ∀t > 0 @mrebollo UPV Distributed Ledger and Robust Consensus for Agreements
  • 23. Introduction Cheat Detection Distributed Ledger Performance Conclusions Correction of the Deviations xi (t + 1) = xi (t) + ε j∈Ni [xj(t) − xi (t)] + ui (t), with ui (t) > 0 ui (t) is divided into the neighbors as follows the agent keeps (1 − εdeg(i))ui (t) each neighbor receives εui (t) therefore, dvi (t) = εui (t) → ui (t) = dvi (t) ε in general dvi (t) ε = j∈Ni uj(t) total deviation Di (t) = t s=0 dvi (s) @mrebollo UPV Distributed Ledger and Robust Consensus for Agreements
  • 24. Introduction Cheat Detection Distributed Ledger Performance Conclusions Correction of the Deviation Consensus over (Di |wi ) Di cumulated deviation wi number of detected deviations Corrected value ˆxi(t) = xi (t) − Di (t) εwi (t) ci (t)) @mrebollo UPV Distributed Ledger and Robust Consensus for Agreements
  • 25. Introduction Cheat Detection Distributed Ledger Performance Conclusions Failure Causes in Distributed Networks stop: the agent stops sending information byzantine failures: unexpected erratic behavior or deliberate errors unfair behavior, but admitted because of rationality, self-interest or incentive policies. @mrebollo UPV Distributed Ledger and Robust Consensus for Agreements
  • 26. Introduction Cheat Detection Distributed Ledger Performance Conclusions Application to Distributed Ledger Technology (DLT) L1 L2 L3 L4 L5 L6 Hash 1+2 Hash 3+4 Hash 5+6 Hash 1+2+3+4 Hash 5+6 Hash 1+2+3+4+5+6 Distributed ledger stored in a Merkle tree only leaves have information each brach from root belongs to one agent @mrebollo UPV Distributed Ledger and Robust Consensus for Agreements
  • 27. Introduction Cheat Detection Distributed Ledger Performance Conclusions Sample Merkle tree for 4 nodes @mrebollo UPV Distributed Ledger and Robust Consensus for Agreements
  • 28. Introduction Cheat Detection Distributed Ledger Performance Conclusions DLT by consensus agent i creates a block with its transactions s inserts the block in its tree obtains the hash of the root hr generates (s|hr |yi = 1) the rest do ( | |yi = 0) @mrebollo UPV Distributed Ledger and Robust Consensus for Agreements
  • 29. Introduction Cheat Detection Distributed Ledger Performance Conclusions Proof-of-concept { "@iot.count": 1, "value": [{ "@iot.id": 1, "phenomenonTime": 2018-10-05T08:55.08.504Z, "result": 0.9058 }]} Hash 0183A1ACBB765DB82EF98833872BA455F4D3B4037F... @mrebollo UPV Distributed Ledger and Robust Consensus for Agreements
  • 30. Introduction Cheat Detection Distributed Ledger Performance Conclusions Malicious agent changes the block [commandchars={}] { "@iot.count": 1, "value": [{ "@iot.id": 1, "phenomenonTime": 2018-10-05T08:55.08.504Z, "result": 0.9312 }]} Hash 028AF8FD383E3E30EF73B141DB28100E2837DCA9B9... @mrebollo UPV Distributed Ledger and Robust Consensus for Agreements
  • 31. Introduction Cheat Detection Distributed Ledger Performance Conclusions 0 20 40 60 80 100 time 1160 1180 1200 1220 1240 1260 x i DLT by Consensus with Cheating 10 15 20 25 30 1190 1200 1210 1220 1230 0 20 40 60 80 100 time 0 0.05 0.1 0.15 0.2 0.25 x i Evolution of Corrections for DLT @mrebollo UPV Distributed Ledger and Robust Consensus for Agreements
  • 32. Introduction Cheat Detection Distributed Ledger Performance Conclusions Result after final correction {"iotcount":2,"readings":[{"iotid":1, "result":0.9058, "phenomenonTime":"2018-10-05T08:55.08.504Z"} {"iotcount":2,"readings":[{"iotid":1, "result":0.9058, "phenomenonTime":"2018-10-05T08:55.08.504Z"} {"iotcount":2,"readings":[{"iotid":1, "result":0.9058, "phenomenonTime":"2018-10-05T08:55.08.504Z"} ... @mrebollo UPV Distributed Ledger and Robust Consensus for Agreements
  • 33. Introduction Cheat Detection Distributed Ledger Performance Conclusions Differences test over random networks if m cheat, then n ≥ 3 + 1 half the neighbors are confident @mrebollo UPV Distributed Ledger and Robust Consensus for Agreements
  • 34. Introduction Cheat Detection Distributed Ledger Performance Conclusions Successful Corrections 1,000 repetitions corrections of 100% follow a Power-law with γ = −0.44 0 20 40 60 80 100 #cheating nodes 200 400 600 800 1000 freq. Successful corrections @mrebollo UPV Distributed Ledger and Robust Consensus for Agreements
  • 35. Introduction Cheat Detection Distributed Ledger Performance Conclusions Conclusions Extension of consensus algorithm robust algorithm for consensus in networks deviation from expected values detected correction mover the final result applied to DLT Limitations 1st exchange must be correct correction possible if m < n 3 and m < |Ni | 2 cheating agents undetected if only cheat once @mrebollo UPV Distributed Ledger and Robust Consensus for Agreements