Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3284869.3284870acmotherconferencesArticle/Chapter ViewAbstractPublication PagesgoodtechsConference Proceedingsconference-collections
research-article

Transparent Protection of Aggregate Computations from Byzantine Behaviours via Blockchain

Published: 28 November 2018 Publication History

Abstract

Aggregate Computing is a promising paradigm for coordinating large numbers of possibly situated devices, typical of scenarios related to the Internet of Things, smart cities, drone coordination, and mass urban events. Currently, little work has been devoted to study and improve security in aggregate programs, and existing works focus solely on application-level countermeasures. Those security systems work under the assumption that the underlying computational model is respected; however, so-called Byzantine behaviour violates such assumption. In this paper, we discuss how Byzantine behaviours can hinder an aggregate program, and exploit application-level protection for creating bigger disruption. We discuss how the blockchain technology can mitigate these attacks by enforcing behaviours consistent with the expected operational semantics, with no impact on the application logic.

References

[1]
Elli Androulaki, Artem Barger, Vita Bortnikov, Christian Cachin, Konstantinos Christidis, Angelo De Caro, David Enyeart, Christopher Ferris, Gennady Laventman, Yacov Manevich, Srinivasan Muralidharan, Chet Murthy, Binh Nguyen, Manish Sethi, Gari Singh, Keith Smith, Alessandro Sorniotti, Chrysoula Stathakopoulou, Marko Vukolić, Sharon Weed Cocco, and Jason Yellick. 2018. Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains. In 13th EuroSys Conference (EuroSys '18). ACM, Article 30, 15 pages.
[2]
Pierre-Louis Aublin, Rachid Guerraoui, Nikola Knežević, Vivien Quéma, and Marko Vukolić. 2015. The Next 700 BFT Protocols. ACM Transactions on Computer Systems 32, 4 (Jan. 2015), 1--45. arXiv:1710.03346
[3]
Giorgio Audrito, Ferruccio Damiani, Mirko Viroli, and Roberto Casadei. 2016. Run-Time Management of Computation Domains in Field Calculus, See {16}, 192--197.
[4]
Jonathan Bachrach, Jacob Beal, and James McLurkin. 2010. Composable continuous-space programs for robotic swarms. Neural Computing and Applications 19, 6 (2010), 825--847.
[5]
Adam Back. 2002. Hashcash - A Denial of Service Counter-Measure. http://www.hashcash.org/hashcash.pdf
[6]
Jacob Beal, Danilo Pianini, and Mirko Viroli. 2015. Aggregate Programming for the Internet of Things. IEEE Computer 48, 9 (2015), 22--30.
[7]
Jacob Beal, Kyle Usbeck, Joseph Loyall, Mason Rowe, and James Metzler. 2016. Adaptive Task Reallocation for Airborne Sensor Sharing, See {16}, 168--173.
[8]
Jacob Beal, Mirko Viroli, Danilo Pianini, and Ferruccio Damiani. 2017. Self-Adaptation to Device Distribution in the Internet of Things. ACM Transactions on Autonomous and Adaptive Systems (TAAS) 12, 3, Article 12 (Sept. 2017), 29 pages.
[9]
S. Boyd, A. Ghosh, B. Prabhakar, and D. Shah. 2005. Gossip algorithms: design, analysis and applications. In IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies, Vol. 3. IEEE, 1653--1664.
[10]
Christian Cachin and Marko Vukolić. 2017. Blockchain Consensus Protocols in the Wild. In 31st International Symposium on Distributed Computing (DISC 2017) (Leibniz International Proceedings in Informatics (LIPIcs)), Andréa W. Richa (Ed.), Vol. 91. Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik, Dagstuhl, Germany, Article 1, 16 pages.
[11]
Roberto Casadei, Alessandro Aldini, and Mirko Viroli. 2018. Towards Attack-Resistant Aggregate Computing Using Trust Mechanisms. Science of Computer Programming 167 (2018), 114--137.
[12]
Roberto Casadei, Giancarlo Fortino, Danilo Pianini, Wilma Russo, Claudio Savaglio, and Mirko Viroli. 2019. Modelling and Simulation of Opportunistic IoT Services with Aggregate Computing. Future Generation Computer Systems 91 (Feb. 2019), 252--262.
[13]
Roberto Casadei, Danilo Pianini, and Mirko Viroli. 2016. Simulating Large-scale Aggregate MASs with Alchemist and Scala. In 2016 Federated Conference on Computer Science and Information Systems, FedCSIS 2016, Gdańsk, Poland, September 11-14, 2016. (ACSIS), Vol. 8. Polish Information Processing Society, 1495--1504.
[14]
Jin-Hee Cho, Ananthram Swami, and Ray Chen. 2011. A survey on trust management for mobile ad hoc networks. IEEE Communications Surveys & Tutorials 13, 4 (2011), 562--583.
[15]
John R. Douceur. 2002. The Sybil Attack. In 1st International Workshop on Peer-to-Peer Systems (IPTPS '01). Springer, 251--260. http://dl.acm.org/citation.cfm?id=687813 Revised Papers.
[16]
Sameh Elnikety, Peter R. Lewis, and Christian Müller-Schloer (Eds.). 2016. 1st International Workshops on Foundations and Applications of Self* Systems (FAS*W 2016). IEEE.
[17]
Leslie Lamport, Robert Shostak, and Marshall Pease. 1982. The Byzantine Generals Problem. ACM Transactions on Programming Languages and Systems (TOPLAS) 4, 3 (July 1982), 382--401.
[18]
Félix Gómez Mármol and Gregorio Martínez Pérez. 2009. Security threats scenarios in trust and reputation models for distributed systems. computers & security 28, 7 (2009), 545--556.
[19]
Satoshi Nakamoto. 2008. Bitcoin: A Peer-to-Peer Electronic Cash System. http://bitcoin.org/bitcoin.pdf
[20]
Danilo Pianini, Jacob Beal, and Mirko Viroli. 2016. Improving Gossip Dynamics Through Overlapping Replicates. In Coordination Models and Languages (LNCS), Alberto Lluch Lafuente and José Proença (Eds.), Vol. 9686. Springer, 192--207.
[21]
Danilo Pianini, Mirko Viroli, and Jacob Beal. 2015. Protelis: practical aggregate programming. In 30th Annual ACM Symposium on Applied Computing (SAC 2015). ACM Press, 1846--1853.
[22]
Fred B. Schneider. 1990. Implementing Fault-tolerant Services Using the State Machine Approach: A Tutorial. Comput. Surveys 22, 4 (Dec. 1990), 299--319.
[23]
Robert W. Shirey. 2007. Internet Security Glossary, Version 2. RFC 4949.
[24]
Mirko Viroli, Giorgio Audrito, Ferruccio Damiani, Danilo Pianini, and Jacob Beal. 2016. A Higher-order Calculus of Computational Fields. CoRR abs/1610.08116 (2016), 39. http://arxiv.org/abs/1610.08116
[25]
Mirko Viroli, Jacob Beal, Ferruccio Damiani, Giorgio Audrito, Roberto Casadei, and Danilo Pianini. 2018. From Field-Based Coordination to Aggregate Computing. In Coordination Models and Languages, Giovanna Di Marzo Serugendo and Michele Loreti (Eds.). LNCS, Vol. 10852. Springer, 252--279.
[26]
Mirko Viroli, Roberto Casadei, and Danilo Pianini. 2016. On execution platforms for large-scale aggregate computing. In 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing. ACM, 1321--1326.
[27]
Marko Vukolić. 2016. The Quest for Scalable Blockchain Fabric: Proof-of-Work vs. BFT Replication. In Open Problems in Network Security. LNCS, Vol. 9591. Springer, 112--125.
[28]
Gavin Wood. 2014. Ethereum: a secure decentralised generalised transaction ledger. http://ethereum.github.io/yellowpaper/paper.pdf
[29]
Zibin Zheng, Shaoan Xie, Hong-Ning Dai, Xiangping Chen, and Huaimin Wang. 2017. An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends. In 2017 IEEE International Congress on Big Data. IEEE, 557--564.

Cited By

View all
  • (2022)A Collective Adaptive Approach to Decentralised k-Coverage in Multi-robot SystemsACM Transactions on Autonomous and Adaptive Systems10.1145/354714517:1-2(1-39)Online publication date: 18-Jul-2022
  • (2020)Pulverization in Cyber-Physical Systems: Engineering the Self-Organizing Logic Separated from DeploymentFuture Internet10.3390/fi1211020312:11(203)Online publication date: 19-Nov-2020
  • (2020)On the Social Implications of Collective Adaptive SystemsIEEE Technology and Society Magazine10.1109/MTS.2020.301232439:3(36-46)Online publication date: Sep-2020
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
Goodtechs '18: Proceedings of the 4th EAI International Conference on Smart Objects and Technologies for Social Good
November 2018
316 pages
ISBN:9781450365819
DOI:10.1145/3284869
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

In-Cooperation

  • EAI: The European Alliance for Innovation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 28 November 2018

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Aggregate Programming
  2. Blockchain
  3. Byzantine fault tolerance
  4. Security

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

Goodtechs '18

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 21 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2022)A Collective Adaptive Approach to Decentralised k-Coverage in Multi-robot SystemsACM Transactions on Autonomous and Adaptive Systems10.1145/354714517:1-2(1-39)Online publication date: 18-Jul-2022
  • (2020)Pulverization in Cyber-Physical Systems: Engineering the Self-Organizing Logic Separated from DeploymentFuture Internet10.3390/fi1211020312:11(203)Online publication date: 19-Nov-2020
  • (2020)On the Social Implications of Collective Adaptive SystemsIEEE Technology and Society Magazine10.1109/MTS.2020.301232439:3(36-46)Online publication date: Sep-2020
  • (2019)Engineering Resilient Collaborative Edge-Enabled IoT2019 IEEE International Conference on Services Computing (SCC)10.1109/SCC.2019.00019(36-45)Online publication date: Jul-2019
  • (2019)Security in Collective Adaptive Systems: A Roadmap2019 IEEE 4th International Workshops on Foundations and Applications of Self* Systems (FAS*W)10.1109/FAS-W.2019.00034(86-91)Online publication date: Jun-2019
  • (2019)From distributed coordination to field calculus and aggregate computingJournal of Logical and Algebraic Methods in Programming10.1016/j.jlamp.2019.100486(100486)Online publication date: Sep-2019

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media