Abstract
Recent trends such as the Internet of Things and pervasive computing demand for novel engineering approaches able to support the specification and scalable runtime execution of adaptive behaviour of large collections of interacting devices. Aggregate computing is one such approach, formally founded in the field calculus, which enables programming of device aggregates by a global stance, through a functional composition of self-organisation patterns that is turned automatically into repetitive local computations and gossip-like interactions. However, the logically decentralised and open nature of such algorithms and systems presumes a fundamental cooperation of the devices involved: an error in a device or a focused attack may significantly compromise the computation outcome and hence the algorithms built on top of it. We propose trust as a framework to detect, ponder or isolate voluntary/involuntary misbehaviours, with the goal of mitigating the influence on the overall computation. To better understand the fragility of aggregate systems in face of attacks and investigate possible countermeasures, in this paper we consider the paradigmatic case of the gradient algorithm, analysing the impact of offences and the mitigation afforded by the adoption of trust mechanisms.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
- 2.
The semantics of the field calculus has been implemented in a slightly different but largely equivalent way with respect to the “standard” one, due to design choices as well as technicalities involved in the DSL embedding.
- 3.
Actually, fields do not explicitly appear in the method signatures: there are no “first-class” fields in ScaFi; rather, that notion (which still can be used while reasoning about code) has been replaced with that of neighbour-dependent expression.
- 4.
Note that the actual communication between devices is matter of the platform and is usually performed through export broadcasting (and not during program execution).
- 5.
The amount of time that neighbour exports are retained depends on the platform configuration for a particular application.
- 6.
The experimental setup is available at the following repository: https://bitbucket.org/metaphori/trusted-ac-experiments.
References
Aldini, A.: Modeling and verification of trust and reputation systems. J. Secur. Commun. Netw. 8(16), 2933–2946 (2015)
Beal, J., Pianini, D., Viroli, M.: Aggregate programming for the internet of things. IEEE Comput. 48(9), 22–30 (2015)
Buchegger, S., Boudec, J.Y.L.: A robust reputation system for peer-to-peer and mobile ad-hoc networks. In: 2nd Workshop on the Economics of Peer-to-Peer Systems, P2PEcon (2004)
Casadei, R., Pianini, D., Viroli, M.: Simulating large-scale aggregate mass with alchemist and scala. In: 2016 Federated Conference on Computer Science and Information Systems (FedCSIS), pp. 1495–1504. IEEE (2016)
Casadei, R., Viroli, M.: Towards aggregate programming in scala. In: 1st Workshop on Programming Models and Languages for Distributed Computing, p. 5. ACM (2016)
Cho, J.H., Swami, A., Chen, I.R.: A survey on trust management for mobile ad hoc networks. Commun. Surv. Tutor. 13(4), 562–583 (2011)
Damiani, F., Viroli, M., Beal, J.: A type-sound calculus of computational fields. Sci. Comput. Program. 117, 17–44 (2016)
Ganeriwal, S., Balzano, L.K., Srivastava, M.B.: Reputation-based framework for high integrity sensor networks. ACM Trans. Sens. Netw. 4(3), 1–37 (2008)
Han, G., Jiang, J., Shu, L., Niu, J., Chao, H.C.: Management and applications of trust in wireless sensor networks: a survey. J. Comput. Syst. Sci. 80(3), 602–617 (2014). Special Issue on Wireless Network Intrusion
Huang, J.: A formal-semantics-based calculus of trust. Internet Comput. 14(5), 38–46 (2010)
Jøsang, A.: A logic for uncertain probabilities. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 9(3), 279–311 (2001)
Jøsang, A., Ismail, R.: The beta reputation system. In: 15th Bled Conference on Electronic Commerce (2002)
Li, J., Li, R., Kato, J.: Future trust management framework for mobile ad hoc networks. IEEE Commun. Mag. 46(4), 108–114 (2008)
Li, Z., Shen, H.: Game-theoretic analysis of cooperation incentives strategies in mobile ad hoc networks. Trans. Mob. Comput. 11(8), 1287–1303 (2012)
Marmol, F.G., Perez, G.M.: Security threats scenarios in trust and reputation models for distributed systems. Comput. Secur. 28(7), 545–556 (2009)
Mousa, H., Mokhtar, S.B., Hasan, O., Younes, O., Hadhoud, M., Brunie, L.: Trust management and reputation systems in mobile participatory sensing applications: a survey. Comput. Netw. 90, 49–73 (2015)
Perrig, A., Szewczyk, R., Tygar, J., Wen, V., Culler, D.: SPINS: security protocols for sensor networks. Wirel. Netw. 8(5), 521–534 (2002)
Pianini, D., Montagna, S., Viroli, M.: Chemical-oriented simulation of computational systems with ALCHEMIST. J. Simul. 7(3), 202–215 (2013)
Priayoheswari, B., Kulothungan, K., Kannan, A.: Beta reputation and direct trust model for secure communication in wireless sensor networks. In: International Conference on Informatics and Analytics, ICIA 2016, pp. 1–5. ACM (2016)
Trcek, D.: A formal apparatus for modeling trust in computing environments. Math. Comput. Model. 49(1–2), 226–233 (2009)
Viroli, M., Beal, J., Damiani, F., Pianini, D.: Efficient engineering of complex self-organising systems by self-stabilising fields. In: IEEE 9th International Conference on Self-Adaptive and Self-Organizing Systems (SASO), pp. 81–90. IEEE (2015)
Viroli, M., Casadei, R., Pianini, D.: On execution platforms for large-scale aggregate computing. In: Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct, pp. 1321–1326. ACM (2016)
Viroli, M., Damiani, F., Beal, J.: A calculus of computational fields. In: Canal, C., Villari, M. (eds.) ESOCC 2013. CCIS, vol. 393, pp. 114–128. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-45364-9_11
Yu, Y., Li, K., Zhoub, W., Lib, P.: Trust mechanisms in wireless sensor networks: attack analysis and countermeasures. J. Netw. Comput. Appl. 35(3), 867–880 (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Casadei, R., Aldini, A., Viroli, M. (2018). Combining Trust and Aggregate Computing. In: Cerone, A., Roveri, M. (eds) Software Engineering and Formal Methods. SEFM 2017. Lecture Notes in Computer Science(), vol 10729. Springer, Cham. https://doi.org/10.1007/978-3-319-74781-1_34
Download citation
DOI: https://doi.org/10.1007/978-3-319-74781-1_34
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-74780-4
Online ISBN: 978-3-319-74781-1
eBook Packages: Computer ScienceComputer Science (R0)