-
Availability Evaluation of IoT Systems with Byzantine Fault-Tolerance for Mission-critical Applications
Authors:
Marco Marcozzi,
Orhan Gemikonakli,
Eser Gemikonakli,
Enver Ever,
Leonardo Mostarda
Abstract:
Byzantine fault-tolerant (BFT) systems are able to maintain the availability and integrity of IoT systems, in presence of failure of individual components, random data corruption or malicious attacks. Fault-tolerant systems in general are essential in assuring continuity of service for mission critical applications. However, their implementation may be challenging and expensive. In this study, IoT…
▽ More
Byzantine fault-tolerant (BFT) systems are able to maintain the availability and integrity of IoT systems, in presence of failure of individual components, random data corruption or malicious attacks. Fault-tolerant systems in general are essential in assuring continuity of service for mission critical applications. However, their implementation may be challenging and expensive. In this study, IoT Systems with Byzantine Fault-Tolerance are considered. Analytical models and solutions are presented as well as a detailed analysis for the evaluation of the availability. Byzantine Fault Tolerance is particularly important for blockchain mechanisms, and in turn for IoT, since it can provide a secure, reliable and decentralized infrastructure for IoT devices to communicate and transact with each other. The proposed model is based on continuous-time Markov chains, and it analyses the availability of Byzantine Fault-Tolerant systems. While the availability model is based on a continuous-time Markov chain where the breakdown and repair times follow exponential distributions, the number of the Byzantine nodes in the network studied follows various distributions. The numerical results presented report availability as a function of the number of participants and the relative number of honest actors in the system. It can be concluded from the model that there is a non-linear relationship between the number of servers and network availability; i.e. the availability is inversely proportional to the number of nodes in the system. This relationship is further strengthened as the ratio of break-down rate over repair rate increases.
△ Less
Submitted 27 June, 2023; v1 submitted 16 May, 2023;
originally announced May 2023.
-
Reasoning about inter-procedural security requirements in IoT applications
Authors:
Mattia Paccamiccio,
Leonardo Mostarda
Abstract:
The importance of information security dramatically increased and will further grow due to the shape and nature of the modern computing industry. Software is published at a continuously increasing pace. The Internet of Things and security protocols are two examples of domains that pose a great security challenge, due to how diverse the needs for those software may be, and a generalisation of the c…
▽ More
The importance of information security dramatically increased and will further grow due to the shape and nature of the modern computing industry. Software is published at a continuously increasing pace. The Internet of Things and security protocols are two examples of domains that pose a great security challenge, due to how diverse the needs for those software may be, and a generalisation of the capabilities regarding the toolchain necessary for testing is becoming a necessity. Oftentimes, these software are designed starting from a formal model, which can be verified with appropriate model checkers. These models, though, do not represent the actual implementation, which can deviate from the model and hence certain security properties might not be inherited from the model, or additional issues could be introduced in the implementation. In this paper we describe a proposal for a novel technique to assess software security properties from LLVM bitcode. We perform various static analyses, such as points-to analysis, call graph and control-flow graph, with the aim of deriving from them an 'accurate enough' formal model of the paths taken by the program, which are then going to be examined via consolidated techniques by matching them against a set of defined rules. The proposed workflow then requires further analysis with more precise methods if a rule is violated, in order to assess the actual feasibility of such path(s). This step is required as the analyses performed to derive the model to analyse are over-approximating the behaviour of the software.
△ Less
Submitted 7 May, 2022;
originally announced May 2022.
-
Light Communication for Controlling Industrial Robots
Authors:
Fadi Al-Turjman,
Diletta Cacciagrano,
Leonardo Mostarda,
Mattia Paccamiccio,
Zaib Ullah
Abstract:
Optical Wireless Communication (OWC) is regarded as an auspicious communication approach that can outperform the existing wireless technology. It utilizes LED lights, whose subtle variation in radiant intensity generate a binary data stream. This is perceived by a photodiode, that converts it to electric signals for further interpretation. This article aims at exploring the use of this emerging te…
▽ More
Optical Wireless Communication (OWC) is regarded as an auspicious communication approach that can outperform the existing wireless technology. It utilizes LED lights, whose subtle variation in radiant intensity generate a binary data stream. This is perceived by a photodiode, that converts it to electric signals for further interpretation. This article aims at exploring the use of this emerging technology in order to control wirelessly industrial robots, overcoming the need for wires, especially in environments where radio waves are not working due to environmental factors or not allowed for safety reasons. We performed experiments to ensure the suitability and efficiency of OWC based technology for the aforementioned scope and "in vitro" tests in various Line-of-Sight (LoS) and Non-Line-of-Sight (NLoS) configurations to observe the system throughput and reliability. The technology performance in the "clear LoS" and in the presence of a transparent barrier, were also analyzed.
△ Less
Submitted 7 May, 2022;
originally announced May 2022.
-
Quantum Consensus: an overview
Authors:
Marco Marcozzi,
Leonardo Mostarda
Abstract:
We review the literature about reaching agreement in quantum networks, also called quantum consensus. After a brief introduction to the key feature of quantum computing, allowing the reader with no quantum theory background to have minimal tools to understand, we report a formal definition of quantum consensus and the protocols proposed. Proposals are classified according to the quantum feature us…
▽ More
We review the literature about reaching agreement in quantum networks, also called quantum consensus. After a brief introduction to the key feature of quantum computing, allowing the reader with no quantum theory background to have minimal tools to understand, we report a formal definition of quantum consensus and the protocols proposed. Proposals are classified according to the quantum feature used to achieve agreement.
△ Less
Submitted 11 January, 2021;
originally announced January 2021.