Security and reliability of rational players in distributed consensus

dc.contributor.advisorGamage CD
dc.contributor.authorKehelwala KGJH
dc.date.accept2021
dc.date.accessioned2021
dc.date.available2021
dc.date.issued2021
dc.description.abstractDistributed ledgers and their applications in solving centralization problems in both financial and non-financial domains has been in the forefront of information security research since the emergence and the subsequent popularity of Blockchain. While the Proof of Work protocol has been successfully utilized for cryptocurrencies, the requirement for higher throughputs in non-financial domain based distributed ledgers favor alternate protocols whose consensus assumptions usually come with thresholds of Byzantine agents (faulty inputs) the consensus can withstand. Proof of Work is designed so that financial gain from conducting a successful attack is less than what honest participation would provide, eliminating any motivation an adversary might have to attack (within the context of direct gain). This assumption fails for non-financial solutions since resourceful malicious participants may exist where their gain may lie in manipulation of the distributed ledger or the order in which the transactions are recorded. A resourceful attacker could selectively convert rational agents to byzantine agents until the tolerance threshold is exceeded. Therefore, we propose that completeness assurance, and the overall reliability of distributed consensus requires rational and foresighted players to be sufficiently incentivized in affording costs of self-protection. We present a dynamic, complete, and imperfect information game to study the relationships between individual costs and utilities, tolerance threshold of the protocol and environment volatility in terms of exogenous attack probabilities, and observe conditions under which a mixed strategy equilibrium that preserves completeness would be stable. Our research extends existing literature by obtaining realistic resilience measures when considering rational player behavior in volatile environments, and provide a better understanding of mandatory security requirements that need to be implemented by a protocol designer for security in distributed consensus. We evaluate our proposed model using efficiency measurement concepts such as Price of Anarchy and Price of Malice, alongside learning methodologies such as regret matching and bounded rationality for extended insight. Our evaluations follow the theoretical predictions of the proposed model. Our results confirm reputation optimization to be capable of completeness assurance when the benefits are carefully assigned with consideration to tolerance threshold of the network. Our experiments also indicate that reputation optimization has attractive stability and convergence properties that are absent in other learning methodologies considered for evaluationen_US
dc.identifier.accnoTH4656en_US
dc.identifier.citationKehelwala, K.G.J.H. (2021). Security and reliability of rational players in distributed consensus [Master's theses, University of Moratuwa]. Institutional Repository University of Moratuwa. http://dl.lib.uom.lk/handle/123/20440
dc.identifier.degreeMSc in Computer Science and Engineeringen_US
dc.identifier.departmentDepartment of Computer Science & Engineeringen_US
dc.identifier.facultyEngineeringen_US
dc.identifier.urihttp://dl.lib.uom.lk/handle/123/20440
dc.language.isoenen_US
dc.subjectINCENTIVE COMPATIBILITYen_US
dc.subjectMIXED STRATEGY EQUILIBRIAen_US
dc.subjectSOCIAL TRUST NETWORKen_US
dc.subjectBOUNDED RATIONALITYen_US
dc.subjectPRICE OF MALICEen_US
dc.subjectGAME THEORYen_US
dc.subjectDISTRIBUTED CONSENSUSen_US
dc.subjectMECHANISM DESIGNen_US
dc.subjectCOMPUTER SCIENCE - Dissertationen_US
dc.subjectCOMPUTER SCIENCE & ENGINEERING - Dissertationen_US
dc.subjectINFORMATION TECHNOLOGY – Dissertationen_US
dc.titleSecurity and reliability of rational players in distributed consensusen_US
dc.typeThesis-Abstracten_US

Files

Original bundle

Now showing 1 - 3 of 3
Loading...
Thumbnail Image
Name:
TH4656-1.pdf
Size:
174.41 KB
Format:
Adobe Portable Document Format
Description:
Pre-text
Loading...
Thumbnail Image
Name:
TH4656-2.pdf
Size:
188.86 KB
Format:
Adobe Portable Document Format
Description:
Post-text
Loading...
Thumbnail Image
Name:
TH4656.pdf
Size:
4.59 MB
Format:
Adobe Portable Document Format
Description:
Full-thesis