-
Byzantine Fault Tolerance in Distributed Machine Learning : a Survey
Authors:
Djamila Bouhata,
Hamouma Moumen,
Jocelyn Ahmed Mazari,
Ahcène Bounceur
Abstract:
Byzantine Fault Tolerance (BFT) is one of the most challenging problems in Distributed Machine Learning (DML), defined as the resilience of a fault-tolerant system in the presence of malicious components. Byzantine failures are still difficult to deal with due to their unrestricted nature, which results in the possibility of generating arbitrary data. Significant research efforts are constantly be…
▽ More
Byzantine Fault Tolerance (BFT) is one of the most challenging problems in Distributed Machine Learning (DML), defined as the resilience of a fault-tolerant system in the presence of malicious components. Byzantine failures are still difficult to deal with due to their unrestricted nature, which results in the possibility of generating arbitrary data. Significant research efforts are constantly being made to implement BFT in DML. Some recent studies have considered various BFT approaches in DML. However, some aspects are limited, such as the few approaches analyzed, and there is no classification of the techniques used in the studied approaches. In this paper, we present a survey of recent work surrounding BFT in DML, mainly in first-order optimization methods, especially Stochastic Gradient Descent(SGD). We highlight key techniques as well as fundamental approaches. We provide an illustrative description of the techniques used in BFT in DML, with a proposed classification of BFT approaches in the context of their fundamental techniques. This classification is established on specific criteria such as communication process, optimization method, and topology setting, which characterize future work methods addressing open challenge
△ Less
Submitted 4 December, 2022; v1 submitted 5 May, 2022;
originally announced May 2022.
-
Self-stabilizing Algorithm for Maximal Distance-2 Independent Set
Authors:
Badreddine Benreguia,
Hamouma Moumen,
Soheila Bouam,
Chafik Arar
Abstract:
In graph theory, an independent set is a subset of nodes where there are no two adjacent nodes. The independent set is maximal if no node outside the independent set can join it. In network applications, maximal independent sets can be used as cluster heads in ad hoc and wireless sensor networks. In order to deal with any failure in networks, self-stabilizing algorithms have been proposed in the l…
▽ More
In graph theory, an independent set is a subset of nodes where there are no two adjacent nodes. The independent set is maximal if no node outside the independent set can join it. In network applications, maximal independent sets can be used as cluster heads in ad hoc and wireless sensor networks. In order to deal with any failure in networks, self-stabilizing algorithms have been proposed in the literature to calculate the maximal independent set under different hypotheses. In this paper, we propose a self-stabilizing algorithm to compute a maximal independent set where nodes of the independent set are far from each other at least with distance 3. We prove the correctness and the convergence of the proposed algorithm. Simulation tests show the ability of our algorithm to find a reduced number of nodes in large scale networks which allows strong control of networks
△ Less
Submitted 28 January, 2021; v1 submitted 26 January, 2021;
originally announced January 2021.
-
Self-stabilizing Algorithm for Minimal $α$-Dominating Set
Authors:
Badreddine Benreguia,
Hamouma Moumen
Abstract:
A self-stabilizing algorithm for the minimal $α$-dominating set is proposed in this paper. The $α$-domination parameter has not used before in self-stabilization paradigm. Using an arbitrary graph with $n$ nodes and $m$ edges, the proposed algorithm converges in $O(nm)$ moves under distributed daemon. Simulation tests and mathematical proofs show the efficiency of the algorithm.
A self-stabilizing algorithm for the minimal $α$-dominating set is proposed in this paper. The $α$-domination parameter has not used before in self-stabilization paradigm. Using an arbitrary graph with $n$ nodes and $m$ edges, the proposed algorithm converges in $O(nm)$ moves under distributed daemon. Simulation tests and mathematical proofs show the efficiency of the algorithm.
△ Less
Submitted 1 June, 2020;
originally announced June 2020.
-
Tracking COVID-19 by Tracking Infectious Trajectories
Authors:
Badreddine Benreguia,
Hamouma Moumen,
Mohammed Amine Merzoug
Abstract:
Nowadays, the coronavirus pandemic has and is still causing large numbers of deaths and infected people. Although governments all over the world have taken severe measurements to slow down the virus spreading (e.g., travel restrictions, suspending all sportive, social, and economic activities, quarantines, social distancing, etc.), a lot of persons have died and a lot more are still in danger. Ind…
▽ More
Nowadays, the coronavirus pandemic has and is still causing large numbers of deaths and infected people. Although governments all over the world have taken severe measurements to slow down the virus spreading (e.g., travel restrictions, suspending all sportive, social, and economic activities, quarantines, social distancing, etc.), a lot of persons have died and a lot more are still in danger. Indeed, a recently conducted study~\cite{ref2} has reported that 79\% of the confirmed infections in China were caused by undocumented patients who had no symptoms. In the same context, in numerous other countries, since coronavirus takes several days before the emergence of symptoms, it has also been reported that the known number of infections is not representative of the real number of infected people (the actual number is expected to be much higher). That is to say, asymptomatic patients are the main factor behind the large quick spreading of coronavirus and are also the major reason that caused governments to lose control over this critical situation. To contribute to remedying this global pandemic, in this paper, we propose an IoT (Internet of Things) investigation system that was specifically designed to spot both undocumented patients and infectious places. The goal is to help the authorities to disinfect high-contamination sites and confine persons even if they have no apparent symptoms. The proposed system also allows determining all persons who had close contact with infected or suspected patients. Consequently, rapid isolation of suspicious cases and more efficient control over any pandemic propagation can be achieved.
△ Less
Submitted 11 May, 2020;
originally announced May 2020.
-
Time-Free and Timer-Based Assumptions Can Be Combined to Solve Authenticated Byzantine Consensus
Authors:
Hamouma Moumen
Abstract:
To circumvent the FLP impossibility result in a deterministic way several protocols have been proposed on top of an asynchronous distributed system enriched with additional assumptions. In the context of Byzantine failures for systems where at most t processes may exhibit a Byzantine behavior, two approaches have been investigated to solve the consensus problem.The first, relies on the addition of…
▽ More
To circumvent the FLP impossibility result in a deterministic way several protocols have been proposed on top of an asynchronous distributed system enriched with additional assumptions. In the context of Byzantine failures for systems where at most t processes may exhibit a Byzantine behavior, two approaches have been investigated to solve the consensus problem.The first, relies on the addition of synchrony, called Timer-Based, but the second is based on the pattern of the messages that are exchanged, called Time-Free. This paper shows that both types of assumptions are not antagonist and can be combined to solve authenticated Byzantine consensus. This combined assumption considers a correct process pi, called 2t-BW, and a set X of 2t processes such that, eventually, for each query broadcasted by a correct process pj of X, pj receives a response from pi 2 X among the (n- t) first responses to that query or both links connecting pi and pj are timely. Based on this combination, a simple hybrid authenticated Byzantine consensus protocol,benefiting from the best of both worlds, is proposed. Whereas many hybrid protocols have been designed for the consensus problem in the crash model, this is, to our knowledge, the first hybrid deterministic solution to the Byzantine consensus problem.
△ Less
Submitted 30 January, 2015;
originally announced February 2015.