-
Two-Fold Byzantine Fault Tolerance Algorithm: Byzantine Consensus in Blockchain
Authors:
Mohammad R. Shakournia,
Pooya Jamshidi,
Hamid Reza Faragardi,
Nasser Yazdani
Abstract:
Blockchain technology offers a decentralized and secure method for storing and authenticating data, rendering it well-suited for various applications such as digital currencies, supply chain management, and voting systems. However, the decentralized nature of blockchain also exposes it to vulnerabilities, particularly Byzantine faults, which arise when nodes in the network behave maliciously or en…
▽ More
Blockchain technology offers a decentralized and secure method for storing and authenticating data, rendering it well-suited for various applications such as digital currencies, supply chain management, and voting systems. However, the decentralized nature of blockchain also exposes it to vulnerabilities, particularly Byzantine faults, which arise when nodes in the network behave maliciously or encounter unexpected failures. Such incidents can result in inconsistencies within the blockchain and, in extreme scenarios, lead to a breakdown in consensus. Byzantine fault-tolerant consensus algorithms are crafted to tackle this challenge by ensuring that network nodes can agree on the blockchain's state even in the presence of faulty or malicious nodes. To bolster the system's resilience against these faults, it is imperative to detect them within the system. However, our examination of existing literature reveals a prevalent assumption: solutions typically operate under constraints regarding the number of faulty nodes. Such constraints confine the proposed solutions to ideal environments, limiting their practical applicability. In response, we propose a novel approach inspired by social paradigms, employing a trusted and fully monitored communication sub-process to detect Byzantine nodes. Upon detection, these nodes can be either disregarded in the consensus-building process, subjected to penalties, or undergo modifications as per the system's policy. Finally, we statistically demonstrate that our approach achieves a detection probability that exceeds 95\% for Byzantine nodes. In essence, our methodology ensures that if Byzantine nodes exhibit malicious behavior, healthy nodes can identify them with a confidence level of 95\%.
△ Less
Submitted 22 April, 2025;
originally announced April 2025.
-
A Conceptual Model of Intelligent Multimedia Data Rendered using Flying Light Specks
Authors:
Nima Yazdani,
Hamed Alimohammadzadeh,
Shahram Ghandeharizadeh
Abstract:
A Flying Light Speck, FLS, is a miniature sized drone configured with light sources to illuminate 3D multimedia objects in a fixed volume, an FLS display. A swarm of FLSs may provide haptic interactions by exerting force back at a user's touch. This paper presents a conceptual model for the multimedia data to enable content-based queries. The model empowers users of an FLS display to annotate the…
▽ More
A Flying Light Speck, FLS, is a miniature sized drone configured with light sources to illuminate 3D multimedia objects in a fixed volume, an FLS display. A swarm of FLSs may provide haptic interactions by exerting force back at a user's touch. This paper presents a conceptual model for the multimedia data to enable content-based queries. The model empowers users of an FLS display to annotate the illuminations by adding semantics to the data, extending a multimedia repository with information and knowledge. We present a core conceptual model and demonstrate its extensions for two diverse applications, authoring tools with entertainment and MRI scans with healthcare.
△ Less
Submitted 17 December, 2024;
originally announced December 2024.
-
Energy Efficient Data Recovery from Corrupted LoRa Frames
Authors:
Niloofar Yazdani,
Nikolaos Kouvelas,
R Venkatesha Prasad,
Daniel E. Lucani
Abstract:
High frame-corruption is widely observed in Long Range Wide Area Networks (LoRaWAN) due to the coexistence with other networks in ISM bands and an Aloha-like MAC layer. LoRa's Forward Error Correction (FEC) mechanism is often insufficient to retrieve corrupted data. In fact, real-life measurements show that at least one-fourth of received transmissions are corrupted. When more frames are dropped,…
▽ More
High frame-corruption is widely observed in Long Range Wide Area Networks (LoRaWAN) due to the coexistence with other networks in ISM bands and an Aloha-like MAC layer. LoRa's Forward Error Correction (FEC) mechanism is often insufficient to retrieve corrupted data. In fact, real-life measurements show that at least one-fourth of received transmissions are corrupted. When more frames are dropped, LoRa nodes usually switch over to higher spreading factors (SF), thus increasing transmission times and increasing the required energy. This paper introduces ReDCoS, a novel coding technique at the application layer that improves recovery of corrupted LoRa frames, thus reducing the overall transmission time and energy invested by LoRa nodes by several-fold. ReDCoS utilizes lightweight coding techniques to pre-encode the transmitted data. Therefore, the inbuilt Cyclic Redundancy Check (CRC) that follows is computed based on an already encoded data. At the receiver, we use both the CRC and the coded data to recover data from a corrupted frame beyond the built-in Error Correcting Code (ECC). We compare the performance of ReDCoS to (I) the standard FEC of vanilla-LoRaWAN, and to (ii) RS coding applied as ECC to the data of LoRaWAN. The results indicated a 54x and 13.5x improvement of decoding ratio, respectively, when 20 data symbols were sent. Furthermore, we evaluated ReDCoS on-field using LoRa SX1261 transceivers showing that it outperformed RS-coding by factor of at least 2x (and up to 6x) in terms of the decoding ratio while consuming 38.5% less energy per correctly received transmission.
△ Less
Submitted 19 July, 2021;
originally announced July 2021.
-
ZipLine: In-Network Compression at Line Speed
Authors:
Sébastien Vaucher,
Niloofar Yazdani,
Pascal Felber,
Daniel E. Lucani,
Valerio Schiavoni
Abstract:
Network appliances continue to offer novel opportunities to offload processing from computing nodes directly into the data plane. One popular concern of network operators and their customers is to move data increasingly faster. A common technique to increase data throughput is to compress it before its transmission. However, this requires compression of the data -- a time and energy demanding pre-…
▽ More
Network appliances continue to offer novel opportunities to offload processing from computing nodes directly into the data plane. One popular concern of network operators and their customers is to move data increasingly faster. A common technique to increase data throughput is to compress it before its transmission. However, this requires compression of the data -- a time and energy demanding pre-processing phase -- and decompression upon reception -- a similarly resource consuming operation. Moreover, if multiple nodes transfer similar data chunks across the network hop (e.g., a given pair of switches), each node effectively wastes resources by executing similar steps. This paper proposes ZipLine, an approach to design and implement (de)compression at line speed leveraging the Tofino hardware platform which is programmable using the P4_16 language. We report on lessons learned while building the system and show throughput, latency and compression measurements on synthetic and real-world traces, showcasing the benefits and trade-offs of our design.
△ Less
Submitted 13 January, 2021;
originally announced January 2021.
-
Bet and Attack: Incentive Compatible Collaborative Attacks Using Smart Contracts
Authors:
Z. Motaqy,
G. Almashaqbeh,
B. Bahrak,
N. Yazdani
Abstract:
Smart contract-enabled blockchains allow building decentralized applications in which mutually-distrusted parties can work together. Recently, oracle services emerged to provide these applications with real-world data feeds. Unfortunately, these capabilities have been used for malicious purposes under what is called criminal smart contracts. A few works explored this dark side and showed a variety…
▽ More
Smart contract-enabled blockchains allow building decentralized applications in which mutually-distrusted parties can work together. Recently, oracle services emerged to provide these applications with real-world data feeds. Unfortunately, these capabilities have been used for malicious purposes under what is called criminal smart contracts. A few works explored this dark side and showed a variety of such attacks. However, none of them considered collaborative attacks against targets that reside outside the blockchain ecosystem. In this paper, we bridge this gap and introduce a smart contract-based framework that allows a sponsor to orchestrate a collaborative attack among (pseudo)anonymous attackers and reward them for that. While all previous works required a technique to quantify an attacker's individual contribution, which could be infeasible with respect to real-world targets, our framework avoids that. This is done by developing a novel scheme for trustless collaboration through betting. That is, attackers bet on an event (i.e., the attack takes place) and then work on making that event happen (i.e., perform the attack). By taking DDoS as a usecase, we formulate attackers' interaction as a game, and formally prove that these attackers will collaborate in proportion to the amount of their bets in the game's unique equilibrium. We also model our framework and its reward function as an incentive mechanism and prove that it is a strategy proof and budget-balanced one. Finally, we conduct numerical simulations to demonstrate the equilibrium behavior of our framework.
△ Less
Submitted 23 September, 2021; v1 submitted 23 October, 2020;
originally announced October 2020.
-
Proof Repair across Type Equivalences
Authors:
Talia Ringer,
RanDair Porter,
Nathaniel Yazdani,
John Leo,
Dan Grossman
Abstract:
We describe a new approach to automatically repairing broken proofs in the Coq proof assistant in response to changes in types. Our approach combines a configurable proof term transformation with a decompiler from proof terms to tactic scripts. The proof term transformation implements transport across equivalences in a way that removes references to the old version of the changed type and does not…
▽ More
We describe a new approach to automatically repairing broken proofs in the Coq proof assistant in response to changes in types. Our approach combines a configurable proof term transformation with a decompiler from proof terms to tactic scripts. The proof term transformation implements transport across equivalences in a way that removes references to the old version of the changed type and does not rely on axioms beyond those Coq assumes.
We have implemented this approach in PUMPKIN Pi, an extension to the PUMPKIN PATCH Coq plugin suite for proof repair. We demonstrate PUMPKIN Pi's flexibility on eight case studies, including supporting a benchmark from a user study, easing development with dependent types, porting functions and proofs between unary and binary numbers, and supporting an industrial proof engineer to interoperate between Coq and other verification tools more easily.
△ Less
Submitted 11 May, 2021; v1 submitted 2 October, 2020;
originally announced October 2020.
-
Memory-aware Online Compression of CAN Bus Data for Future Vehicular Systems
Authors:
Niloofar Yazdani,
Lars Nielsen,
Daniel E. Lucani
Abstract:
Vehicles generate a large amount of data from their internal sensors. This data is not only useful for a vehicle's proper operation, but it provides car manufacturers with the ability to optimize performance of individual vehicles and companies with fleets of vehicles (e.g., trucks, taxis, tractors) to optimize their operations to reduce fuel costs and plan repairs. This paper proposes algorithms…
▽ More
Vehicles generate a large amount of data from their internal sensors. This data is not only useful for a vehicle's proper operation, but it provides car manufacturers with the ability to optimize performance of individual vehicles and companies with fleets of vehicles (e.g., trucks, taxis, tractors) to optimize their operations to reduce fuel costs and plan repairs. This paper proposes algorithms to compress CAN bus data, specifically, packaged as MDF4 files. In particular, we propose lightweight, online and configurable compression algorithms that allow limited devices to choose the amount of RAM and Flash allocated to them. We show that our proposals can outperform LZW for the same RAM footprint, and can even deliver comparable or better performance to DEFLATE under the same RAM limitations.
△ Less
Submitted 20 July, 2020;
originally announced July 2020.
-
Hermes: Enabling Energy-efficient IoT Networks with Generalized Deduplication
Authors:
Christian Göttel,
Lars Nielsen,
Niloofar Yazdani,
Pascal Felber,
Daniel E. Lucani,
Valerio Schiavoni
Abstract:
With the advent of the Internet of Things (IoT), the ever growing number of connected devices observed in recent years and foreseen for the next decade suggests that more and more data will have to be transmitted over a network, before being processed and stored in data centers. Generalized deduplication (GD) is a novel technique to effectively reduce the data storage cost by identifying similar d…
▽ More
With the advent of the Internet of Things (IoT), the ever growing number of connected devices observed in recent years and foreseen for the next decade suggests that more and more data will have to be transmitted over a network, before being processed and stored in data centers. Generalized deduplication (GD) is a novel technique to effectively reduce the data storage cost by identifying similar data chunks, and able to gradually reduce the pressure from the network infrastructure by limiting the data that needs to be transmitted.
This paper presents Hermes, an application-level protocol for the data-plane that can operate over generalized deduplication, as well as over classic deduplication. Hermes significantly reduces the data transmission traffic while effectively decreasing the energy footprint, a relevant matter to consider in the context of IoT deployments. We fully implemented Hermes and evaluated its performance using consumer-grade IoT devices (e.g., Raspberry Pi 4B models). Our results highlight several trade-offs that must be taken into account when considering real-world workloads.
△ Less
Submitted 20 July, 2020; v1 submitted 22 May, 2020;
originally announced May 2020.
-
Overlapping Communities and the Prediction of Missing Links in Multiplex Networks
Authors:
Amir Mahdi Abdolhosseini-Qomi,
Naser Yazdani,
Masoud Asadpour
Abstract:
Multiplex networks are a representation of real-world complex systems as a set of entities (i.e. nodes) connected via different types of connections (i.e. layers). The observed connections in these networks may not be complete and the link prediction task is about locating the missing links across layers. Here, the main challenge is about collecting relevant evidence from different layers to assis…
▽ More
Multiplex networks are a representation of real-world complex systems as a set of entities (i.e. nodes) connected via different types of connections (i.e. layers). The observed connections in these networks may not be complete and the link prediction task is about locating the missing links across layers. Here, the main challenge is about collecting relevant evidence from different layers to assist the link prediction task. It is known that co-membership in communities increases the likelihood of connectivity between nodes. We discuss that co-membership in the communities of the similar layers augments the chance of connectivity. The layers are considered similar if they show significant inter-layer community overlap. Moreover, we found that although the presence of link is correlated in layers but the extent of this correlation is not the same across different communities. Our proposed, ML-BNMTF, as a link prediction method in multiplex networks, is devised based on these findings. ML-BNMTF outperforms baseline methods specifically when the global link overlap is low.
△ Less
Submitted 15 May, 2020; v1 submitted 7 December, 2019;
originally announced December 2019.
-
SimBins: An information-theoretic approach to link prediction in real multiplex networks
Authors:
Seyed Hossein Jafari,
Amir Mahdi Abdolhosseini-Qomi,
Maseud Rahgozar,
Masoud Asadpour,
Naser Yazdani
Abstract:
The entities of real-world networks are connected via different types of connections (i.e. layers). The task of link prediction in multiplex networks is about finding missing connections based on both intra-layer and inter-layer correlations. Our observations confirm that that in a wide range of real-world multiplex networks, from social to biological and technological, a positive correlation exis…
▽ More
The entities of real-world networks are connected via different types of connections (i.e. layers). The task of link prediction in multiplex networks is about finding missing connections based on both intra-layer and inter-layer correlations. Our observations confirm that that in a wide range of real-world multiplex networks, from social to biological and technological, a positive correlation exists between connection probability in one layer and similarity in other layers. Accordingly, a similarity-based automatic general-purpose multiplex link prediction method -- SimBins -- is devised that quantifies the amount of connection uncertainty based on observed inter-layer correlations in a multiplex network. Moreover, SimBins enhances the prediction quality in the target layer by incorporating the effect of link overlap across layers. Applied to various datasets from different domains, SimBins proves to be robust and superior than compared methods in majority of experimented cases in terms of accuracy of link prediction. Furthermore, it is discussed that SimBins imposes minor computational overhead to the base similarity measures making it a potentially fast method, suitable for large-scale multiplex networks.
△ Less
Submitted 4 December, 2020; v1 submitted 27 August, 2019;
originally announced August 2019.
-
Link Prediction in Real-World Multiplex Networks via Layer Reconstruction Method
Authors:
Amir Mahdi Abdolhosseini-Qomi,
Seyed Hossein Jafari,
Amirheckmat Taghizadeh,
Naser Yazdani,
Masoud Asadpour,
Masoud Rahgozar
Abstract:
A large body of research on link prediction problem is devoted to finding missing links in single-layer (simplex) networks. The proposed link prediction methods compute a similarity measure between unconnected node pairs based on the observed structure of the network. However, extension of notion of similarity to multiplex networks is a two-fold challenge. The layers of real-world multiplex networ…
▽ More
A large body of research on link prediction problem is devoted to finding missing links in single-layer (simplex) networks. The proposed link prediction methods compute a similarity measure between unconnected node pairs based on the observed structure of the network. However, extension of notion of similarity to multiplex networks is a two-fold challenge. The layers of real-world multiplex networks do not have the same organization yet are not of totally different organizations. So, it should be determined that how similar are the layers of a multiplex network. On the other hand, it is needed to be known that how similar layers can contribute in link prediction task on a target layer with missing links. Eigenvectors are known to well reflect the structural features of networks. Therefore, two layers of a multiplex network are similar w.r.t. structural features if they share similar eigenvectors. Experiments show that layers of real-world multiplex networks are similar w.r.t. structural features and the value of similarity is far beyond their randomized counterparts. Furthermore, it is shown that missing links are highly predictable if their addition or removal do not significantly change the network structural features. Otherwise, if the change is significant a similar copy of structural features may come to help. Based on this concept, Layer Reconstruction Method (LRM) finds the best reconstruction of the observed structure of the target layer with structural features of other similar layers. Experiments on real multiplex networks from different disciplines show that this method benefits from information redundancy in the networks and helps the performance of link prediction to stay robust even under high fraction of missing links.
△ Less
Submitted 22 June, 2019;
originally announced June 2019.