...
首页> 外文期刊>Science of Computer Programming >Towards attack-resistant Aggregate Computing using trust mechanisms
【24h】

Towards attack-resistant Aggregate Computing using trust mechanisms

机译:使用信任机制实现抗攻击的聚合计算

获取原文
获取原文并翻译 | 示例
   

获取外文期刊封面封底 >>

       

摘要

Recent trends such as the Internet of Things and pervasive computing demand for novel engineering approaches able to support the specification and scalable runtime execution of adaptive behaviour for large collections of interacting devices. Aggregate Computing is one such approach, formally founded in the field calculus, which enables programming of device aggregates by a global stance, through functional composition of self-organisation patterns that is turned automatically into repetitive local computations and gossip-like interactions. However, the logically decentralised and open nature of such algorithms and systems presumes a fundamental cooperation of the devices involved: an error in a device or a focused attack may significantly compromise the computation outcome and hence the algorithms built on top. For this reason, in this paper, we move the first steps towards attack-resistant aggregate computations. We propose trust as a framework to detect, ponder or isolate voluntary/involuntary misbehaviours, with the goal of mitigating the influence on the overall computation. On top of this, we consider recommendations in order to provide more reactivity and stability through the sharing of individual perceptions. To better understand the fragility of aggregate systems in face of attacks and investigate the extent of the mitigation afforded by the adoption of trust mechanisms, we consider the paradigmatic case of the gradient algorithm. Experiments are carried out to analyse the sensitivity of the adopted trust framework to malevolent actions and to study the impact of different factors on the error committed by trust-based gradients under attack. Finally, in a case study of the spatial channel algorithm, it is shown how the protection afforded by attack-resistant gradients can be effectively propagated to higher-level building blocks. (C) 2018 Elsevier B.V. All rights reserved.
机译:诸如物联网和普及计算之类的最新趋势对新颖的工程方法的需求,这些新颖的工程方法能够支持针对大量交互设备的自适应行为的规范和可伸缩运行时执行。聚合计算是一种这样的方法,它正式建立在现场演算中,它通过自组织模式的功能组成自动实现重复的本地计算和类似八卦的交互,从而以全局立场对设备聚合进行编程。但是,此类算法和系统的逻辑分散和开放性质假定所涉及设备的基本协作:设备中的错误或有针对性的攻击可能会严重损害计算结果,并因此损害构建在顶部的算法。因此,在本文中,我们将第一步迈向抗攻击的聚合计算。我们建议将信任作为检测,思考或隔离自愿/非自愿行为的框架,以减轻对整体计算的影响。在此之上,我们考虑了一些建议,以便通过分享个人的看法来提供更多的反应性和稳定性。为了更好地理解面对攻击的聚合系统的脆弱性,并调查采用信任机制所提供的缓解程度,我们考虑了梯度算法的典型案例。进行了实验,以分析所采用的信任框架对恶意行为的敏感性,并研究不同因素对受攻击的基于信任的梯度所犯错误的影响。最后,在空间信道算法的案例研究中,说明了如何将抗攻击梯度提供的保护有效地传播到更高级别的构建块。 (C)2018 Elsevier B.V.保留所有权利。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号