{"title":"Distributed binary majority voting via exponential distribution","authors":"Saber Salehkaleybar, S. J. Golestani","doi":"10.1049/iet-spr.2015.0021","DOIUrl":null,"url":null,"abstract":"In the binary majority voting problem, each node initially chooses between two alternative choices. The goal is to design a distributed algorithm that informs nodes which choice is in majority. In this study, the authors formulate this problem as a hypothesis testing problem and propose fixed-size and sequential solutions using classical and Bayesian approaches. In the sequential version, the proposed mechanism enables nodes to test which choice is in majority, successively in time. Hence, termination of the algorithm is embedded within it, contrary to the existing approaches which require a monitoring algorithm to indicate the termination. This property makes the algorithm more efficient in terms of message complexity. Furthermore, the authors show that the proposed solution is resilient to Byzantine attacks if network connectivity is F + 1 in the presence of F adversarial nodes. Thus, the proposed algorithm is more robust compared with the previous works which are vulnerable to the existence of adversarial nodes.","PeriodicalId":272888,"journal":{"name":"IET Signal Process.","volume":"32 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IET Signal Process.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1049/iet-spr.2015.0021","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
In the binary majority voting problem, each node initially chooses between two alternative choices. The goal is to design a distributed algorithm that informs nodes which choice is in majority. In this study, the authors formulate this problem as a hypothesis testing problem and propose fixed-size and sequential solutions using classical and Bayesian approaches. In the sequential version, the proposed mechanism enables nodes to test which choice is in majority, successively in time. Hence, termination of the algorithm is embedded within it, contrary to the existing approaches which require a monitoring algorithm to indicate the termination. This property makes the algorithm more efficient in terms of message complexity. Furthermore, the authors show that the proposed solution is resilient to Byzantine attacks if network connectivity is F + 1 in the presence of F adversarial nodes. Thus, the proposed algorithm is more robust compared with the previous works which are vulnerable to the existence of adversarial nodes.