SlideShare a Scribd company logo
Introduction Cheat Detection Distributed Ledger Performance Conclusions
Distributed Ledger and Robust Consensus for
Agreements
M. Rebollo,C. Carrascosa, A. Palomares
Grupo de Tec. Inform´atica – Inteligencia Artificial
Universitat Polit`ecnica de Val`encia
{mrebollo,carrasco,apalomares}@dsic.upv.es
AT, Bergen 2018
c b a
@mrebollo UPV
Distributed Ledger and Robust Consensus for Agreements
Introduction Cheat Detection Distributed Ledger Performance Conclusions
Overview
1 Introduction
2 Cheat Detection
3 Consensus for Distributed Ledger
4 Performance
5 Conclusions
@mrebollo UPV
Distributed Ledger and Robust Consensus for Agreements
Introduction Cheat Detection Distributed Ledger Performance Conclusions
What consensus is?
@mrebollo UPV
Distributed Ledger and Robust Consensus for Agreements
Introduction Cheat Detection Distributed Ledger Performance Conclusions
@mrebollo UPV
Distributed Ledger and Robust Consensus for Agreements
Introduction Cheat Detection Distributed Ledger Performance Conclusions
@mrebollo UPV
Distributed Ledger and Robust Consensus for Agreements
Introduction Cheat Detection Distributed Ledger Performance Conclusions
@mrebollo UPV
Distributed Ledger and Robust Consensus for Agreements
Introduction Cheat Detection Distributed Ledger Performance Conclusions
@mrebollo UPV
Distributed Ledger and Robust Consensus for Agreements
Introduction Cheat Detection Distributed Ledger Performance Conclusions
What are consensus used for?
@mrebollo UPV
Distributed Ledger and Robust Consensus for Agreements
Introduction Cheat Detection Distributed Ledger Performance Conclusions
@mrebollo UPV
Distributed Ledger and Robust Consensus for Agreements
Introduction Cheat Detection Distributed Ledger Performance Conclusions
@mrebollo UPV
Distributed Ledger and Robust Consensus for Agreements
Introduction Cheat Detection Distributed Ledger Performance Conclusions
@mrebollo UPV
Distributed Ledger and Robust Consensus for Agreements
Introduction Cheat Detection Distributed Ledger Performance Conclusions
@mrebollo UPV
Distributed Ledger and Robust Consensus for Agreements
Introduction Cheat Detection Distributed Ledger Performance Conclusions
Consensus algorithm (Olfati, 2007)
Given
undirected graph
G = (V , E)
set of initial values
x = (x1, . . . , xn)T
@mrebollo UPV
Distributed Ledger and Robust Consensus for Agreements
Introduction Cheat Detection Distributed Ledger Performance Conclusions
Consensus algorithm (Olfati, 2007)
1 each node has its initial
value
1 2
3 4
x1 = 0.4 x2 = 0.2
x3 = 0.3 x4 = 0.9
x1 = 0.4
@mrebollo UPV
Distributed Ledger and Robust Consensus for Agreements
Introduction Cheat Detection Distributed Ledger Performance Conclusions
Consensus algorithm (Olfati, 2007)
1 each node has its initial
value
2 pass the value to its
neighbors
1 2
3 4
x1 = 0.4 x2 = 0.2
x3 = 0.3 x4 = 0.9
x1 = 0.4
x1 = 0.4
x1 = 0.4
@mrebollo UPV
Distributed Ledger and Robust Consensus for Agreements
Introduction Cheat Detection Distributed Ledger Performance Conclusions
Consensus algorithm (Olfati, 2007)
1 each node has its initial
value
2 pass the value to its
neighbors
3 receive the values from its
neighbors
1 2
3 4
x1 = 0.4 x2 = 0.2
x3 = 0.3 x4 = 0.9
x2 = 0.2
x4 = 0.9
x3 = 0.3
@mrebollo UPV
Distributed Ledger and Robust Consensus for Agreements
Introduction Cheat Detection Distributed Ledger Performance Conclusions
Consensus algorithm (Olfati, 2007)
1 each node has its initial
value
2 pass the value to its
neighbors
3 receive the values from its
neighbors
4 calculates the new value
1 2
3 4
x1 = 0.45 x2 = 0.425
x3 = 0.325 x4 = 0.6
x1 = 0.4
x(t + 1) = x(t) + ε
j∈Ni
[xj(t) − xi (t)]
@mrebollo UPV
Distributed Ledger and Robust Consensus for Agreements
Introduction Cheat Detection Distributed Ledger Performance Conclusions
Consensus algorithm (Olfati, 2007)
The network converges to
the mean value
lim
t→∞
xi (t) =
1
n i
xi (0)
0 5 10 15 20 25 30
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
x = 0.45
@mrebollo UPV
Distributed Ledger and Robust Consensus for Agreements
Introduction Cheat Detection Distributed Ledger Performance Conclusions
Problem
Failure detection on consensus process
Only with one agent not following the algorithm, the network
converges to a value different from the average
@mrebollo UPV
Distributed Ledger and Robust Consensus for Agreements
Introduction Cheat Detection Distributed Ledger Performance Conclusions
Altering Consensus
xi (t + 1) = xi (t) + ε
j∈Ni
[xj(t) − xi (t)] + ui (t)
1
23
4
5
6
7 8
9
10
0 10 20 30 40 50
time
0
2
4
6
8
10
xi
Consensus with Malicious Agent
10 agents, x = (1, 2, . . . , 10)T , ∆x5 = 4
@mrebollo UPV
Distributed Ledger and Robust Consensus for Agreements
Introduction Cheat Detection Distributed Ledger Performance Conclusions
Altering Consensus
xi (t + 1) = xi (t) + ε
j∈Ni
[xj(t) − xi (t)] + ui (t)
1
23
4
5
6
7 8
9
10
0 10 20 30 40 50
time
0
2
4
6
8
10
xi
Consensus with Malicious Agent
10 agents, x = (1, 2, . . . , 10)T , ∆x5 = 4
@mrebollo UPV
Distributed Ledger and Robust Consensus for Agreements
Introduction Cheat Detection Distributed Ledger Performance Conclusions
Cheat Detection
From
xi (t + 1) = xi (t) + ε
j∈Ni
[xj(t) − xi (t)]
clearing
0 = xi (t + 1) + (εdeg(i) − 1)xi (t) − ε
j∈Ni
xj(t)
dvi (t)
and the process must fulfil that
dvi (t) = 0 ∀t > 0
@mrebollo UPV
Distributed Ledger and Robust Consensus for Agreements
Introduction Cheat Detection Distributed Ledger Performance Conclusions
Correction of the Deviations
xi (t + 1) = xi (t) + ε
j∈Ni
[xj(t) − xi (t)] + ui (t), with ui (t) > 0
ui (t) is divided into the neighbors as follows
the agent keeps (1 − εdeg(i))ui (t)
each neighbor receives εui (t)
therefore, dvi (t) = εui (t) → ui (t) = dvi (t)
ε
in general dvi (t)
ε = j∈Ni
uj(t)
total deviation Di (t) = t
s=0 dvi (s)
@mrebollo UPV
Distributed Ledger and Robust Consensus for Agreements
Introduction Cheat Detection Distributed Ledger Performance Conclusions
Correction of the Deviation
Consensus over (Di |wi )
Di cumulated deviation
wi number of detected deviations
Corrected value
ˆxi(t) = xi (t) −
Di (t)
εwi (t)
ci (t))
@mrebollo UPV
Distributed Ledger and Robust Consensus for Agreements
Introduction Cheat Detection Distributed Ledger Performance Conclusions
Failure Causes in Distributed Networks
stop: the agent stops sending information
byzantine failures: unexpected erratic behavior or deliberate
errors
unfair behavior, but admitted because of rationality,
self-interest or incentive policies.
@mrebollo UPV
Distributed Ledger and Robust Consensus for Agreements
Introduction Cheat Detection Distributed Ledger Performance Conclusions
Application to Distributed Ledger Technology (DLT)
L1 L2 L3 L4 L5 L6
Hash 1+2 Hash 3+4 Hash 5+6
Hash
1+2+3+4
Hash 5+6
Hash
1+2+3+4+5+6
Distributed ledger stored in a Merkle tree
only leaves have information
each brach from root belongs to one agent
@mrebollo UPV
Distributed Ledger and Robust Consensus for Agreements
Introduction Cheat Detection Distributed Ledger Performance Conclusions
Sample Merkle tree for 4 nodes
@mrebollo UPV
Distributed Ledger and Robust Consensus for Agreements
Introduction Cheat Detection Distributed Ledger Performance Conclusions
DLT by consensus
agent i creates a block with its transactions s
inserts the block in its tree
obtains the hash of the root hr
generates (s|hr |yi = 1)
the rest do ( | |yi = 0)
@mrebollo UPV
Distributed Ledger and Robust Consensus for Agreements
Introduction Cheat Detection Distributed Ledger Performance Conclusions
Proof-of-concept
{ "@iot.count": 1,
"value": [{
"@iot.id": 1,
"phenomenonTime": 2018-10-05T08:55.08.504Z,
"result": 0.9058
}]}
Hash
0183A1ACBB765DB82EF98833872BA455F4D3B4037F...
@mrebollo UPV
Distributed Ledger and Robust Consensus for Agreements
Introduction Cheat Detection Distributed Ledger Performance Conclusions
Malicious agent changes the block
[commandchars={}]
{ "@iot.count": 1,
"value": [{
"@iot.id": 1,
"phenomenonTime": 2018-10-05T08:55.08.504Z,
"result": 0.9312
}]}
Hash
028AF8FD383E3E30EF73B141DB28100E2837DCA9B9...
@mrebollo UPV
Distributed Ledger and Robust Consensus for Agreements
Introduction Cheat Detection Distributed Ledger Performance Conclusions
0 20 40 60 80 100
time
1160
1180
1200
1220
1240
1260
x
i
DLT by Consensus with Cheating
10 15 20 25 30
1190
1200
1210
1220
1230
0 20 40 60 80 100
time
0
0.05
0.1
0.15
0.2
0.25
x
i
Evolution of Corrections for DLT
@mrebollo UPV
Distributed Ledger and Robust Consensus for Agreements
Introduction Cheat Detection Distributed Ledger Performance Conclusions
Result after final correction
{"iotcount":2,"readings":[{"iotid":1,
"result":0.9058,
"phenomenonTime":"2018-10-05T08:55.08.504Z"}
{"iotcount":2,"readings":[{"iotid":1,
"result":0.9058,
"phenomenonTime":"2018-10-05T08:55.08.504Z"}
{"iotcount":2,"readings":[{"iotid":1,
"result":0.9058,
"phenomenonTime":"2018-10-05T08:55.08.504Z"}
...
@mrebollo UPV
Distributed Ledger and Robust Consensus for Agreements
Introduction Cheat Detection Distributed Ledger Performance Conclusions
Differences
test over random
networks
if m cheat,
then
n ≥ 3 + 1
half the
neighbors are
confident
@mrebollo UPV
Distributed Ledger and Robust Consensus for Agreements
Introduction Cheat Detection Distributed Ledger Performance Conclusions
Successful Corrections
1,000
repetitions
corrections of
100% follow
a Power-law
with
γ = −0.44
0 20 40 60 80 100
#cheating nodes
200
400
600
800
1000
freq.
Successful corrections
@mrebollo UPV
Distributed Ledger and Robust Consensus for Agreements
Introduction Cheat Detection Distributed Ledger Performance Conclusions
Conclusions
Extension of consensus algorithm
robust algorithm for consensus in networks
deviation from expected values detected
correction mover the final result
applied to DLT
Limitations
1st exchange must be correct
correction possible if m < n
3 and m < |Ni |
2
cheating agents undetected if only cheat once
@mrebollo UPV
Distributed Ledger and Robust Consensus for Agreements

More Related Content

PDF
Java Basics - Part2
PDF
A survey on Fully Homomorphic Encryption
PDF
Lattice Cryptography
PDF
Lattice Based Cryptography - GGH Cryptosystem
PDF
Introduction - Lattice-based Cryptography
PPTX
Homomorphic encryption and Private Machine Learning Classification
PDF
Lattice-Based Cryptography: CRYPTANALYSIS OF COMPACT-LWE
PPTX
Linear block coding
Java Basics - Part2
A survey on Fully Homomorphic Encryption
Lattice Cryptography
Lattice Based Cryptography - GGH Cryptosystem
Introduction - Lattice-based Cryptography
Homomorphic encryption and Private Machine Learning Classification
Lattice-Based Cryptography: CRYPTANALYSIS OF COMPACT-LWE
Linear block coding

What's hot (20)

PDF
Presentation Slides - Genetic algorithm based key generation for fully homomo...
PDF
N-gram IDF: A Global Term Weighting Scheme Based on Information Distance (WWW...
PDF
BLIND SIGNATURE SCHEME BASED ON CHEBYSHEV POLYNOMIALS
PDF
THE KEY EXCHANGE CRYPTOSYSTEM USED WITH HIGHER ORDER DIOPHANTINE EQUATIONS
PPTX
Pert 05 aplikasi clustering
PPT
Chapter 4 Powerpoint
PDF
Hands-on Tutorial of Deep Learning
PDF
Auto encoding-variational-bayes
PPT
Chapter 03 cyclic codes
PDF
Privacy-Preserving Multi-Keyword Fuzzy Search over Encrypted Data in the Cloud
PDF
Model-Based Decision Making: On Supporting Deliberation with Metaheuristics
PPT
Ch10 1 v1
PPTX
論文紹介 Fast imagetagging
PPTX
Cloud computing and security final
PDF
Deep Learning Opening Workshop - ProxSARAH Algorithms for Stochastic Composit...
PDF
Error Control coding
PDF
Compact binary-tree-representation-of-logic-function-with-enhanced-throughput-
PDF
Goodfellow, Bengio, Couville (2016) "Deep Learning", Chap. 7
PPTX
Deep Learning Opening Workshop - Deep ReLU Networks Viewed as a Statistical M...
PDF
MUMS: Bayesian, Fiducial, and Frequentist Conference - Model Selection in the...
Presentation Slides - Genetic algorithm based key generation for fully homomo...
N-gram IDF: A Global Term Weighting Scheme Based on Information Distance (WWW...
BLIND SIGNATURE SCHEME BASED ON CHEBYSHEV POLYNOMIALS
THE KEY EXCHANGE CRYPTOSYSTEM USED WITH HIGHER ORDER DIOPHANTINE EQUATIONS
Pert 05 aplikasi clustering
Chapter 4 Powerpoint
Hands-on Tutorial of Deep Learning
Auto encoding-variational-bayes
Chapter 03 cyclic codes
Privacy-Preserving Multi-Keyword Fuzzy Search over Encrypted Data in the Cloud
Model-Based Decision Making: On Supporting Deliberation with Metaheuristics
Ch10 1 v1
論文紹介 Fast imagetagging
Cloud computing and security final
Deep Learning Opening Workshop - ProxSARAH Algorithms for Stochastic Composit...
Error Control coding
Compact binary-tree-representation-of-logic-function-with-enhanced-throughput-
Goodfellow, Bengio, Couville (2016) "Deep Learning", Chap. 7
Deep Learning Opening Workshop - Deep ReLU Networks Viewed as a Statistical M...
MUMS: Bayesian, Fiducial, and Frequentist Conference - Model Selection in the...
Ad

More from Miguel Rebollo (20)

PDF
Multilayered Asynchronous Consensus-based Federated Learning
PDF
Percepción del alumnado de actividades de alto impacto en un primer curso de ...
PPTX
IA en entornos rurales aplicada a la viticultura
PDF
Inteligencia artificial para una transformación inteligente
PDF
GTG-CoL: A Decentralized Federated Learning Based on Consensus for Dynamic N...
PDF
Co-Learning: Consensus-based Learning for Multi-Agent Systems
PPTX
Análisis de la red de autores de ciencia ficción de Clarkesworld
PDF
Y sin embargo... se mueve. Dinámica de las redes complejas
PDF
Exámenes en grupo y pruebas de corrección como alternativas a la evaluación
PDF
Gamification. Key Concepts
PDF
Using Distributed Risk Maps by Consensus as a Complement to Contact Tracing Apps
PDF
Detección de nodos tramposos en procesos de consenso en redes
PDF
La hora del código: ApS para fomentar el pensamiento computacional
PDF
Procesos de enseñanza-aprendizaje en red
PDF
desarrollo de competencias a través de narrativas transmedia
PDF
Distributed Group Analytical Hierarchical Process by Consensus
PDF
Análisis de ciudades a través de su actividad en redes sociales
PDF
Análisis de datos en redes sociales
PDF
The multigent Layer for CALMeD SURF
PDF
Narrativa transmedia en el aula
Multilayered Asynchronous Consensus-based Federated Learning
Percepción del alumnado de actividades de alto impacto en un primer curso de ...
IA en entornos rurales aplicada a la viticultura
Inteligencia artificial para una transformación inteligente
GTG-CoL: A Decentralized Federated Learning Based on Consensus for Dynamic N...
Co-Learning: Consensus-based Learning for Multi-Agent Systems
Análisis de la red de autores de ciencia ficción de Clarkesworld
Y sin embargo... se mueve. Dinámica de las redes complejas
Exámenes en grupo y pruebas de corrección como alternativas a la evaluación
Gamification. Key Concepts
Using Distributed Risk Maps by Consensus as a Complement to Contact Tracing Apps
Detección de nodos tramposos en procesos de consenso en redes
La hora del código: ApS para fomentar el pensamiento computacional
Procesos de enseñanza-aprendizaje en red
desarrollo de competencias a través de narrativas transmedia
Distributed Group Analytical Hierarchical Process by Consensus
Análisis de ciudades a través de su actividad en redes sociales
Análisis de datos en redes sociales
The multigent Layer for CALMeD SURF
Narrativa transmedia en el aula
Ad

Recently uploaded (20)

PDF
KodekX | Application Modernization Development
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
Big Data Technologies - Introduction.pptx
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Approach and Philosophy of On baking technology
PDF
Machine learning based COVID-19 study performance prediction
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
sap open course for s4hana steps from ECC to s4
PPT
Teaching material agriculture food technology
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
KodekX | Application Modernization Development
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Big Data Technologies - Introduction.pptx
Encapsulation_ Review paper, used for researhc scholars
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
Diabetes mellitus diagnosis method based random forest with bat algorithm
Reach Out and Touch Someone: Haptics and Empathic Computing
Spectral efficient network and resource selection model in 5G networks
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Approach and Philosophy of On baking technology
Machine learning based COVID-19 study performance prediction
“AI and Expert System Decision Support & Business Intelligence Systems”
MYSQL Presentation for SQL database connectivity
sap open course for s4hana steps from ECC to s4
Teaching material agriculture food technology
Unlocking AI with Model Context Protocol (MCP)
Network Security Unit 5.pdf for BCA BBA.
MIND Revenue Release Quarter 2 2025 Press Release
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf

Distributed Ledger and Robust Consensus for Agreements

  • 1. Introduction Cheat Detection Distributed Ledger Performance Conclusions Distributed Ledger and Robust Consensus for Agreements M. Rebollo,C. Carrascosa, A. Palomares Grupo de Tec. Inform´atica – Inteligencia Artificial Universitat Polit`ecnica de Val`encia {mrebollo,carrasco,apalomares}@dsic.upv.es AT, Bergen 2018 c b a @mrebollo UPV Distributed Ledger and Robust Consensus for Agreements
  • 2. Introduction Cheat Detection Distributed Ledger Performance Conclusions Overview 1 Introduction 2 Cheat Detection 3 Consensus for Distributed Ledger 4 Performance 5 Conclusions @mrebollo UPV Distributed Ledger and Robust Consensus for Agreements
  • 3. Introduction Cheat Detection Distributed Ledger Performance Conclusions What consensus is? @mrebollo UPV Distributed Ledger and Robust Consensus for Agreements
  • 4. Introduction Cheat Detection Distributed Ledger Performance Conclusions @mrebollo UPV Distributed Ledger and Robust Consensus for Agreements
  • 5. Introduction Cheat Detection Distributed Ledger Performance Conclusions @mrebollo UPV Distributed Ledger and Robust Consensus for Agreements
  • 6. Introduction Cheat Detection Distributed Ledger Performance Conclusions @mrebollo UPV Distributed Ledger and Robust Consensus for Agreements
  • 7. Introduction Cheat Detection Distributed Ledger Performance Conclusions @mrebollo UPV Distributed Ledger and Robust Consensus for Agreements
  • 8. Introduction Cheat Detection Distributed Ledger Performance Conclusions What are consensus used for? @mrebollo UPV Distributed Ledger and Robust Consensus for Agreements
  • 9. Introduction Cheat Detection Distributed Ledger Performance Conclusions @mrebollo UPV Distributed Ledger and Robust Consensus for Agreements
  • 10. Introduction Cheat Detection Distributed Ledger Performance Conclusions @mrebollo UPV Distributed Ledger and Robust Consensus for Agreements
  • 11. Introduction Cheat Detection Distributed Ledger Performance Conclusions @mrebollo UPV Distributed Ledger and Robust Consensus for Agreements
  • 12. Introduction Cheat Detection Distributed Ledger Performance Conclusions @mrebollo UPV Distributed Ledger and Robust Consensus for Agreements
  • 13. Introduction Cheat Detection Distributed Ledger Performance Conclusions Consensus algorithm (Olfati, 2007) Given undirected graph G = (V , E) set of initial values x = (x1, . . . , xn)T @mrebollo UPV Distributed Ledger and Robust Consensus for Agreements
  • 14. Introduction Cheat Detection Distributed Ledger Performance Conclusions Consensus algorithm (Olfati, 2007) 1 each node has its initial value 1 2 3 4 x1 = 0.4 x2 = 0.2 x3 = 0.3 x4 = 0.9 x1 = 0.4 @mrebollo UPV Distributed Ledger and Robust Consensus for Agreements
  • 15. Introduction Cheat Detection Distributed Ledger Performance Conclusions Consensus algorithm (Olfati, 2007) 1 each node has its initial value 2 pass the value to its neighbors 1 2 3 4 x1 = 0.4 x2 = 0.2 x3 = 0.3 x4 = 0.9 x1 = 0.4 x1 = 0.4 x1 = 0.4 @mrebollo UPV Distributed Ledger and Robust Consensus for Agreements
  • 16. Introduction Cheat Detection Distributed Ledger Performance Conclusions Consensus algorithm (Olfati, 2007) 1 each node has its initial value 2 pass the value to its neighbors 3 receive the values from its neighbors 1 2 3 4 x1 = 0.4 x2 = 0.2 x3 = 0.3 x4 = 0.9 x2 = 0.2 x4 = 0.9 x3 = 0.3 @mrebollo UPV Distributed Ledger and Robust Consensus for Agreements
  • 17. Introduction Cheat Detection Distributed Ledger Performance Conclusions Consensus algorithm (Olfati, 2007) 1 each node has its initial value 2 pass the value to its neighbors 3 receive the values from its neighbors 4 calculates the new value 1 2 3 4 x1 = 0.45 x2 = 0.425 x3 = 0.325 x4 = 0.6 x1 = 0.4 x(t + 1) = x(t) + ε j∈Ni [xj(t) − xi (t)] @mrebollo UPV Distributed Ledger and Robust Consensus for Agreements
  • 18. Introduction Cheat Detection Distributed Ledger Performance Conclusions Consensus algorithm (Olfati, 2007) The network converges to the mean value lim t→∞ xi (t) = 1 n i xi (0) 0 5 10 15 20 25 30 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 x = 0.45 @mrebollo UPV Distributed Ledger and Robust Consensus for Agreements
  • 19. Introduction Cheat Detection Distributed Ledger Performance Conclusions Problem Failure detection on consensus process Only with one agent not following the algorithm, the network converges to a value different from the average @mrebollo UPV Distributed Ledger and Robust Consensus for Agreements
  • 20. Introduction Cheat Detection Distributed Ledger Performance Conclusions Altering Consensus xi (t + 1) = xi (t) + ε j∈Ni [xj(t) − xi (t)] + ui (t) 1 23 4 5 6 7 8 9 10 0 10 20 30 40 50 time 0 2 4 6 8 10 xi Consensus with Malicious Agent 10 agents, x = (1, 2, . . . , 10)T , ∆x5 = 4 @mrebollo UPV Distributed Ledger and Robust Consensus for Agreements
  • 21. Introduction Cheat Detection Distributed Ledger Performance Conclusions Altering Consensus xi (t + 1) = xi (t) + ε j∈Ni [xj(t) − xi (t)] + ui (t) 1 23 4 5 6 7 8 9 10 0 10 20 30 40 50 time 0 2 4 6 8 10 xi Consensus with Malicious Agent 10 agents, x = (1, 2, . . . , 10)T , ∆x5 = 4 @mrebollo UPV Distributed Ledger and Robust Consensus for Agreements
  • 22. Introduction Cheat Detection Distributed Ledger Performance Conclusions Cheat Detection From xi (t + 1) = xi (t) + ε j∈Ni [xj(t) − xi (t)] clearing 0 = xi (t + 1) + (εdeg(i) − 1)xi (t) − ε j∈Ni xj(t) dvi (t) and the process must fulfil that dvi (t) = 0 ∀t > 0 @mrebollo UPV Distributed Ledger and Robust Consensus for Agreements
  • 23. Introduction Cheat Detection Distributed Ledger Performance Conclusions Correction of the Deviations xi (t + 1) = xi (t) + ε j∈Ni [xj(t) − xi (t)] + ui (t), with ui (t) > 0 ui (t) is divided into the neighbors as follows the agent keeps (1 − εdeg(i))ui (t) each neighbor receives εui (t) therefore, dvi (t) = εui (t) → ui (t) = dvi (t) ε in general dvi (t) ε = j∈Ni uj(t) total deviation Di (t) = t s=0 dvi (s) @mrebollo UPV Distributed Ledger and Robust Consensus for Agreements
  • 24. Introduction Cheat Detection Distributed Ledger Performance Conclusions Correction of the Deviation Consensus over (Di |wi ) Di cumulated deviation wi number of detected deviations Corrected value ˆxi(t) = xi (t) − Di (t) εwi (t) ci (t)) @mrebollo UPV Distributed Ledger and Robust Consensus for Agreements
  • 25. Introduction Cheat Detection Distributed Ledger Performance Conclusions Failure Causes in Distributed Networks stop: the agent stops sending information byzantine failures: unexpected erratic behavior or deliberate errors unfair behavior, but admitted because of rationality, self-interest or incentive policies. @mrebollo UPV Distributed Ledger and Robust Consensus for Agreements
  • 26. Introduction Cheat Detection Distributed Ledger Performance Conclusions Application to Distributed Ledger Technology (DLT) L1 L2 L3 L4 L5 L6 Hash 1+2 Hash 3+4 Hash 5+6 Hash 1+2+3+4 Hash 5+6 Hash 1+2+3+4+5+6 Distributed ledger stored in a Merkle tree only leaves have information each brach from root belongs to one agent @mrebollo UPV Distributed Ledger and Robust Consensus for Agreements
  • 27. Introduction Cheat Detection Distributed Ledger Performance Conclusions Sample Merkle tree for 4 nodes @mrebollo UPV Distributed Ledger and Robust Consensus for Agreements
  • 28. Introduction Cheat Detection Distributed Ledger Performance Conclusions DLT by consensus agent i creates a block with its transactions s inserts the block in its tree obtains the hash of the root hr generates (s|hr |yi = 1) the rest do ( | |yi = 0) @mrebollo UPV Distributed Ledger and Robust Consensus for Agreements
  • 29. Introduction Cheat Detection Distributed Ledger Performance Conclusions Proof-of-concept { "@iot.count": 1, "value": [{ "@iot.id": 1, "phenomenonTime": 2018-10-05T08:55.08.504Z, "result": 0.9058 }]} Hash 0183A1ACBB765DB82EF98833872BA455F4D3B4037F... @mrebollo UPV Distributed Ledger and Robust Consensus for Agreements
  • 30. Introduction Cheat Detection Distributed Ledger Performance Conclusions Malicious agent changes the block [commandchars={}] { "@iot.count": 1, "value": [{ "@iot.id": 1, "phenomenonTime": 2018-10-05T08:55.08.504Z, "result": 0.9312 }]} Hash 028AF8FD383E3E30EF73B141DB28100E2837DCA9B9... @mrebollo UPV Distributed Ledger and Robust Consensus for Agreements
  • 31. Introduction Cheat Detection Distributed Ledger Performance Conclusions 0 20 40 60 80 100 time 1160 1180 1200 1220 1240 1260 x i DLT by Consensus with Cheating 10 15 20 25 30 1190 1200 1210 1220 1230 0 20 40 60 80 100 time 0 0.05 0.1 0.15 0.2 0.25 x i Evolution of Corrections for DLT @mrebollo UPV Distributed Ledger and Robust Consensus for Agreements
  • 32. Introduction Cheat Detection Distributed Ledger Performance Conclusions Result after final correction {"iotcount":2,"readings":[{"iotid":1, "result":0.9058, "phenomenonTime":"2018-10-05T08:55.08.504Z"} {"iotcount":2,"readings":[{"iotid":1, "result":0.9058, "phenomenonTime":"2018-10-05T08:55.08.504Z"} {"iotcount":2,"readings":[{"iotid":1, "result":0.9058, "phenomenonTime":"2018-10-05T08:55.08.504Z"} ... @mrebollo UPV Distributed Ledger and Robust Consensus for Agreements
  • 33. Introduction Cheat Detection Distributed Ledger Performance Conclusions Differences test over random networks if m cheat, then n ≥ 3 + 1 half the neighbors are confident @mrebollo UPV Distributed Ledger and Robust Consensus for Agreements
  • 34. Introduction Cheat Detection Distributed Ledger Performance Conclusions Successful Corrections 1,000 repetitions corrections of 100% follow a Power-law with γ = −0.44 0 20 40 60 80 100 #cheating nodes 200 400 600 800 1000 freq. Successful corrections @mrebollo UPV Distributed Ledger and Robust Consensus for Agreements
  • 35. Introduction Cheat Detection Distributed Ledger Performance Conclusions Conclusions Extension of consensus algorithm robust algorithm for consensus in networks deviation from expected values detected correction mover the final result applied to DLT Limitations 1st exchange must be correct correction possible if m < n 3 and m < |Ni | 2 cheating agents undetected if only cheat once @mrebollo UPV Distributed Ledger and Robust Consensus for Agreements