-
Multilevel Modeling as a Methodology for the Simulation of Human Mobility
Authors:
Luca Serena,
Moreno Marzolla,
Gabriele D'Angelo,
Stefano Ferretti
Abstract:
Multilevel modeling is increasingly relevant in the context of modelling and simulation since it leads to several potential benefits, such as software reuse and integration, the split of semantically separated levels into sub-models, the possibility to employ different levels of detail, and the potential for parallel execution. The coupling that inevitably exists between the sub-models, however, i…
▽ More
Multilevel modeling is increasingly relevant in the context of modelling and simulation since it leads to several potential benefits, such as software reuse and integration, the split of semantically separated levels into sub-models, the possibility to employ different levels of detail, and the potential for parallel execution. The coupling that inevitably exists between the sub-models, however, implies the need for maintaining consistency between the various components, more so when different simulation paradigms are employed (e.g., sequential vs parallel, discrete vs continuous). In this paper we argue that multilevel modelling is well suited for the simulation of human mobility, since it naturally leads to the decomposition of the model into two layers, the "micro" and "macro" layer, where individual entities (micro) and long-range interactions (macro) are described. In this paper we investigate the challenges of multilevel modeling, and describe some preliminary results using prototype implementations of multilayer simulators in the context of epidemic diffusion and vehicle pollution.
△ Less
Submitted 25 March, 2024;
originally announced March 2024.
-
Design Patterns for Multilevel Modeling and Simulation
Authors:
Luca Serena,
Moreno Marzolla,
Gabriele D'Angelo,
Stefano Ferretti
Abstract:
Multilevel modeling and simulation (M&S) is becoming increasingly relevant due to the benefits that this methodology offers. Multilevel models allow users to describe a system at multiple levels of detail. From one side, this can make better use of computational resources, since the more detailed and time-consuming models can be executed only when/where required. From the other side, multilevel mo…
▽ More
Multilevel modeling and simulation (M&S) is becoming increasingly relevant due to the benefits that this methodology offers. Multilevel models allow users to describe a system at multiple levels of detail. From one side, this can make better use of computational resources, since the more detailed and time-consuming models can be executed only when/where required. From the other side, multilevel models can be assembled from existing components, cutting down development and verification/validation time. A downside of multilevel M&S is that the development process becomes more complex due to some recurrent issues caused by the very nature of multilevel models: how to make sub-models interoperate, how to orchestrate execution, how state variables are to be updated when changing scale, and so on. In this paper, we address some of these issues by presenting a set of design patterns that provide a systematic approach for designing and implementing multilevel models. The proposed design patterns cover multiple aspects, including how to represent different levels of detail, how to combine incompatible models, how to exchange data across models, and so on. Some of the patterns are derived from the general software engineering literature, while others are specific to the multilevel M&S application area.
△ Less
Submitted 25 March, 2024;
originally announced March 2024.
-
Cryptocurrencies Activity as a Complex Network: Analysis of Transactions Graphs
Authors:
Luca Serena,
Stefano Ferretti,
Gabriele D'Angelo
Abstract:
The number of users approaching the world of cryptocurrencies exploded in the last years, and consequently the daily interactions on their underlying distributed ledgers have intensified. In this paper, we analyze the flow of these digital transactions in a certain period of time, trying to discover important insights on the typical use of these technologies by studying, through complex network th…
▽ More
The number of users approaching the world of cryptocurrencies exploded in the last years, and consequently the daily interactions on their underlying distributed ledgers have intensified. In this paper, we analyze the flow of these digital transactions in a certain period of time, trying to discover important insights on the typical use of these technologies by studying, through complex network theory, the patterns of interactions in four prominent and different Distributed Ledger Technologies (DLTs), namely Bitcoin, DogeCoin, Ethereum, Ripple. In particular, we describe the Distributed Ledger Network Analyzer (DiLeNA), a software tool for the investigation of the transactions network recorded in DLTs. We show that studying the network characteristics and peculiarities is of paramount importance, in order to understand how users interact in the DLT. For instance, our analyses reveal that all transaction graphs exhibit small world properties.
△ Less
Submitted 14 September, 2021;
originally announced October 2021.
-
Security Analysis of Distributed Ledgers and Blockchains through Agent-based Simulation
Authors:
Luca Serena,
Gabriele D'Angelo,
Stefano Ferretti
Abstract:
In this paper we describe LUNES-Blockchain, an agent-based simulator of blockchains that relies on Parallel and Distributed Simulation (PADS) techniques to obtain high scalability. The software is organized as a multi-level simulator that permits to simulate a virtual environment, made of many nodes running the protocol of a specific Distributed Ledger Technology (DLT), such as the Bitcoin or the…
▽ More
In this paper we describe LUNES-Blockchain, an agent-based simulator of blockchains that relies on Parallel and Distributed Simulation (PADS) techniques to obtain high scalability. The software is organized as a multi-level simulator that permits to simulate a virtual environment, made of many nodes running the protocol of a specific Distributed Ledger Technology (DLT), such as the Bitcoin or the Ethereum blockchains. This virtual environment is executed on top of a lower-level Peer-to-Peer (P2P) network overlay, which can be structured based on different topologies and with a given number of nodes and edges. Functionalities at different levels of abstraction are managed separately, by different software modules and with different time granularity. This allows for accurate simulations, where (and when) it is needed, and enhances the simulation performance. Using LUNES-Blockchain, it is possible to simulate different types of attacks on the DLT. In this paper, we specifically focus on the P2P layer, considering the selfish mining, the 51% attack and the Sybil attack. For which concerns selfish mining and the 51% attack, our aim is to understand how much the hash-rate (i.e. a general measure of the processing power in the blockchain network) of the attacker can influence the outcome of the misbehaviour. On the other hand, in the filtering denial of service (i.e. Sybil Attack), we investigate which dissemination protocol in the underlying P2P network makes the system more resilient to a varying number of nodes that drop the messages. The results confirm the viability of the simulation-based techniques for the investigation of security aspects of DLTs.
△ Less
Submitted 17 September, 2021;
originally announced September 2021.
-
Simulation of Hybrid Edge Computing Architectures
Authors:
Luca Serena,
Mirko Zichichi,
Gabriele D'Angelo,
Stefano Ferretti
Abstract:
Dealing with a growing amount of data is a crucial challenge for the future of information and communication technologies. More and more devices are expected to transfer data through the Internet, therefore new solutions have to be designed in order to guarantee low latency and efficient traffic management. In this paper, we propose a solution that combines the edge computing paradigm with a decen…
▽ More
Dealing with a growing amount of data is a crucial challenge for the future of information and communication technologies. More and more devices are expected to transfer data through the Internet, therefore new solutions have to be designed in order to guarantee low latency and efficient traffic management. In this paper, we propose a solution that combines the edge computing paradigm with a decentralized communication approach based on Peer-to-Peer (P2P). According to the proposed scheme, participants to the system are employed to relay messages of other devices, so as to reach a destination (usually a server at the edge of the network) even in absence of an Internet connection. This approach can be useful in dynamic and crowded environments, allowing the system to outsource part of the traffic management from the Cloud servers to end-devices. To evaluate our proposal, we carry out some experiments with the help of LUNES, an open source discrete events simulator specifically designed for distributed environments. In our simulations, we tested several system configurations in order to understand the impact of the algorithms involved in the data dissemination and some possible network arrangements.
△ Less
Submitted 28 August, 2021;
originally announced August 2021.
-
Governing Decentralized Complex Queries Through a DAO
Authors:
Mirko Zichichi,
Luca Serena,
Stefano Ferretti,
Gabriele D'Angelo
Abstract:
Recently, a new generation of P2P systems capable of addressing data integrity and authenticity has emerged for the development of new applications for a "more" decentralized Internet, i.e., Distributed Ledger Technologies (DLT) and Decentralized File Systems (DFS). However, these technologies still have some unanswered issues, mostly related to data lookup and discovery. In this paper, first, we…
▽ More
Recently, a new generation of P2P systems capable of addressing data integrity and authenticity has emerged for the development of new applications for a "more" decentralized Internet, i.e., Distributed Ledger Technologies (DLT) and Decentralized File Systems (DFS). However, these technologies still have some unanswered issues, mostly related to data lookup and discovery. In this paper, first, we propose a Distributed Hash Table (DHT) system that efficiently manages decentralized keyword-based queries executed on data stored in DFS. Through a hypercube logical layout, queries are efficiently routed among the network, where each node is responsible for a specific keywords set and the related contents. Second, we provide a framework for the governance of the above network, based on a Decentralized Autonomous Organization (DAO) implementation. We show how the use of smart contracts enables organizational decision making and rewards for nodes that have actively contributed to the DHT. Finally, we provide experimental validation of an implementation of our proposal, where the execution of the same protocol for different logical nodes of the hypercube allows us to evaluate the efficiency of communication within the network.
△ Less
Submitted 10 September, 2021; v1 submitted 14 July, 2021;
originally announced July 2021.
-
Simulation of Dissemination Strategies on Temporal Networks
Authors:
Luca Serena,
Mirko Zichichi,
Gabriele D'Angelo,
Stefano Ferretti
Abstract:
In distributed environments, such as distributed ledgers technologies and other peer-to-peer architectures, communication represents a crucial topic. The ability to efficiently disseminate contents is strongly influenced by the type of system architecture, the protocol used to spread such contents over the network and the actual dynamicity of the communication links (i.e. static vs. temporal nets)…
▽ More
In distributed environments, such as distributed ledgers technologies and other peer-to-peer architectures, communication represents a crucial topic. The ability to efficiently disseminate contents is strongly influenced by the type of system architecture, the protocol used to spread such contents over the network and the actual dynamicity of the communication links (i.e. static vs. temporal nets). In particular, the dissemination strategies either focus on achieving an optimal coverage, minimizing the network traffic or providing assurances on anonymity (that is a fundamental requirement of many cryptocurrencies). In this work, the behaviour of multiple dissemination protocols is discussed and studied through simulation. The performance evaluation has been carried out on temporal networks with the help of LUNES-temporal, a discrete event simulator that allows to test algorithms running on a distributed environment. The experiments show that some gossip protocols allow to either save a considerable number of messages or to provide better anonymity guarantees, at the cost of a little lower coverage achieved and/or a little increase of the delivery time.
△ Less
Submitted 14 July, 2021;
originally announced July 2021.
-
Towards Decentralized Complex Queries over Distributed Ledgers: a Data Marketplace Use-case
Authors:
Mirko Zichichi,
Luca Serena,
Stefano Ferretti,
Gabriele D'Angelo
Abstract:
Distributed Ledger Technologies (DLT) and Decentralized File Storages (DFS) are becoming increasingly used to create common, decentralized and trustless infrastructures where participants interact and collaborate in Peer-to-Peer interactions. A prominent use case is represented by decentralized data marketplaces, where users are consumers and providers at the same time, and trustless interactions…
▽ More
Distributed Ledger Technologies (DLT) and Decentralized File Storages (DFS) are becoming increasingly used to create common, decentralized and trustless infrastructures where participants interact and collaborate in Peer-to-Peer interactions. A prominent use case is represented by decentralized data marketplaces, where users are consumers and providers at the same time, and trustless interactions are required. However, data in DLTs and DFS are usually unstructured and there are no efficient mechanisms to query a certain type of data for the search in the market. In this paper, we propose the use of a Distributed Hash Table (DHT) as a layer on top of DLTs where, once the data are acquired and stored in the ledger, these can be searched through multiple keyword based queries, thanks to the lookup functionalities offered by the DHT. The DHT network is a hypercube overlay structure, organized for an efficient processing of multiple keyword-based queries. We provide the architecture of such solution for a decentralized data marketplace and an analysis based on a simulation that proves the viability of the proposed approach.
△ Less
Submitted 10 September, 2021; v1 submitted 28 April, 2021;
originally announced April 2021.
-
Implications of Dissemination Strategies on the Security of Distributed Ledgers
Authors:
Luca Serena,
Gabriele D'Angelo,
Stefano Ferretti
Abstract:
This paper describes a simulation study on security attacks over Distributed Ledger Technologies (DLTs). We specifically focus on attacks at the underlying peer-to-peer layer of these systems, that is in charge of disseminating messages containing data and transaction to be spread among all participants. In particular, we consider the Sybil attack, according to which a malicious node creates many…
▽ More
This paper describes a simulation study on security attacks over Distributed Ledger Technologies (DLTs). We specifically focus on attacks at the underlying peer-to-peer layer of these systems, that is in charge of disseminating messages containing data and transaction to be spread among all participants. In particular, we consider the Sybil attack, according to which a malicious node creates many Sybils that drop messages coming from a specific attacked node, or even all messages from honest nodes. Our study shows that the selection of the specific dissemination protocol, as well as the amount of connections each peer has, have an influence on the resistance to this attack.
△ Less
Submitted 30 July, 2020;
originally announced July 2020.
-
DiLeNA: Distributed Ledger Network Analyzer
Authors:
Luca Serena,
Stefano Ferretti,
Gabriele D'Angelo
Abstract:
This paper describes the Distributed Ledger Network Analyzer (DiLeNA), a new software tool for the analysis of the transactions network recorded in Distributed Ledger Technologies (DLTs). The set of transactions in a DLT forms a complex network. Studying its characteristics and peculiarities is of paramount importance, in order to understand how users interact in the distributed ledger system. The…
▽ More
This paper describes the Distributed Ledger Network Analyzer (DiLeNA), a new software tool for the analysis of the transactions network recorded in Distributed Ledger Technologies (DLTs). The set of transactions in a DLT forms a complex network. Studying its characteristics and peculiarities is of paramount importance, in order to understand how users interact in the distributed ledger system. The tool design and implementation is introduced and some results are provided. In particular, the Bitcoin and Ethereum blockchains, i.e. the most famous and used DLTs at the time of writing, have been analyzed and compared.
△ Less
Submitted 29 July, 2020;
originally announced July 2020.