Logo PTI Logo FedCSIS

Position Papers of the 17th Conference on Computer Science and Intelligence Systems

Annals of Computer Science and Information Systems, Volume 31

Rethinking Safety in Autonomous Ecosystems


DOI: http://dx.doi.org/10.15439/2022F273

Citation: Position Papers of the 17th Conference on Computer Science and Intelligence Systems, M. Ganzha, L. Maciaszek, M. Paprzycki, D. Ślęzak (eds). ACSIS, Vol. 31, pages 8187 ()

Full text

Abstract. As autonomous cyber-physical systems are responding to the dynamism of our hyper-connected digital world, they are forming so called dynamic autonomous ecosystems, which require a change in methods ensuring their safe behavior. Within this change, reactions to predictable scenarios need to be replaced with adaptability to the unpredictable context, with gradual safety mechanisms, able to decide whether or not to trigger a certain mitigation procedure. In this paper, we outline our vision towards evolution of safety mechanisms to support dynamic and self-adaptive architectures of autonomous ecosystems. We are proposing an approach to address this research problem with the help of trust and reputation combined with gradual adaptation of safety procedures at runtime.


  1. R. Capilla, E. Cioroaica, B. Buhnova, and J. Bosch, “On autonomous dynamic software ecosystems,” IEEE Transactions on Engineering Management, pp. 1–15, 2021. http://dx.doi.org/10.1109/TEM.2021.3116873
  2. D. Halasz, “From systems to ecosystems: Rethinking adaptive safety,” in 17th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS ’22). IEEE, 2022. doi: 10.1145/3524844.3528067
  3. E. Cioroaica, T. Kuhn, and B. Buhnova, “(do not) trust in ecosystems,” in 2019 IEEE/ACM 41st International Conference on Software Engineering: New Ideas and Emerging Results (ICSE-NIER). IEEE, 2019. http://dx.doi.org/10.1109/ICSE-NIER.2019.00011 pp. 9–12.
  4. M. Contag, G. Li, A. Pawlowski, F. Domke, K. Levchenko, T. Holz, and S. Savage, “How they did it: An analysis of emission defeat devices in modern automobiles,” in 2017 IEEE Symposium on Security and Privacy (SP), 2017. http://dx.doi.org/10.1109/SP.2017.66 pp. 231–250.
  5. P. McKinley, S. Sadjadi, E. Kasten, and B. Cheng, “Composing adaptive software,” Computer, vol. 37, no. 7, pp. 56–64, 2004. http://dx.doi.org/10.1109/MC.2004.48
  6. A. Banerjee, K. K. Venkatasubramanian, T. Mukherjee, and S. K. S. Gupta, “Ensuring safety, security, and sustainability of mission-critical cyber–physical systems,” Proceedings of the IEEE, vol. 100, no. 1, pp. 283–299, 2012. http://dx.doi.org/10.1109/JPROC.2011.2165689
  7. G. Li, Y. Yang, T. Zhang, X. Qu, D. Cao, B. Cheng, and K. Li, “Risk assessment based collision avoidance decision-making for autonomous vehicles in multi-scenarios,” Transportation Research Part C: Emerging Technologies, vol. 122, p. 102820, 2021. http://dx.doi.org/10.1016/j.trc.2020.102820. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S0968090X20307257
  8. S. Bouchelaghem, A. Bouabdallah, and M. Omar, “Autonomous Vehicle Security: Literature Review of Real Attack Experiments,” in The 15th International Conference on Risks and Security of Internet and Systems, Paris, France, 2020. [Online]. Available: https://hal.archives-ouvertes.fr/hal-03034640
  9. J. Cui, L. S. Liew, G. Sabaliauskaite, and F. Zhou, “A review on safety failures, security attacks, and available countermeasures for autonomous vehicles,” Ad Hoc Networks, vol. 90, p. 101823, 2019. http://dx.doi.org/10.1016/j.adhoc.2018.12.006 Recent advances on security and privacy in Intelligent Transportation Systems. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S1570870518309260
  10. J. Axelsson, “Safety in vehicle platooning: A systematic literature review,” IEEE Transactions on Intelligent Transportation Systems, vol. 18, pp. 1–13, 08 2016. http://dx.doi.org/10.1109/TITS.2016.2598873
  11. L. Sha, “Using simplicity to control complexity,” IEEE Software, vol. 18, no. 4, pp. 20–28, 2001. http://dx.doi.org/10.1109/MS.2001.936213
  12. D. Seto, B. Krogh, L. Sha, and A. Chutinan, “The simplex architecture for safe online control system upgrades,” in Proceedings of the 1998 American Control Conference. ACC (IEEE Cat. No.98CH36207), vol. 6, 1998. http://dx.doi.org/10.1109/ACC.1998.703255 pp. 3504–3508 vol.6.
  13. P. Vivekanandan, G. Garcia, H. Yun, and S. Keshmiri, “A simplex architecture for intelligent and safe unmanned aerial vehicles,” in 2016 IEEE 22nd International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA), 2016. http://dx.doi.org/10.1109/RTCSA.2016.17 pp. 69–75.
  14. D. Phan, J. Yang, M. Clark, R. Grosu, J. Schierman, S. Smolka, and S. Stoller, “A component-based simplex architecture for high-assurance cyber-physical systems,” in 2017 17th International Conference on Application of Concurrency to System Design (ACSD), 2017. doi: 10.1109/ACSD.2017.23 pp. 49–58.
  15. H. Muccini, M. Sharaf, and D. Weyns, “Self-adaptation for cyber-physical systems: A systematic literature review,” in 2016 IEEE/ACM 11th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS), 2016. http://dx.doi.org/10.1145/2897053.2897069 pp. 75–81.
  16. N. Bencomo, R. France, B. Cheng, and U. Aßmann, Eds., Models@run.time: foundations, applications, and roadmaps, ser. Lecture notes in computer science. Germany: Springer, Dec. 2014. ISBN 978-3-319-08914-0 Dagstuhl Seminar 11481 on models@run.time held in November/December 2011.
  17. P. Arcaini, E. Riccobene, and P. Scandurra, “Modeling and analyzing mape-k feedback loops for self-adaptation,” in 2015 IEEE/ACM 10th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, 2015. http://dx.doi.org/10.1109/SEAMS.2015.10 pp. 13–23.
  18. M. Salehie, L. Pasquale, I. Omoronyia, R. Ali, and B. Nuseibeh, “Requirements-driven adaptive security: Protecting variable assets at runtime,” in 2012 20th IEEE International Requirements Engineering Conference (RE), 2012. http://dx.doi.org/10.1109/RE.2012.6345794 pp. 111–120.
  19. A. J. Taylor and A. D. Ames, “Adaptive safety with control barrier functions,” in 2020 American Control Conference (ACC), 2020. http://dx.doi.org/10.23919/ACC45564.2020.9147463 pp. 1399–1405.
  20. L. S. Rutledge and L. J. Hoffman, “A survey of issues in computer network security,” Computers & Security, vol. 5, no. 4, pp. 296–308, 1986. http://dx.doi.org/10.1016/0167-4048(86)90050-7. [Online]. Available: https://www.sciencedirect.com/science/article/pii/0167404886900507
  21. M. S. Siddiqui, “Security issues in wireless mesh networks,” in 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE’07), 2007. http://dx.doi.org/10.1109/MUE.2007.187 pp. 717–722.
  22. A. J. Fehske, I. Viering, J. Voigt, C. Sartori, S. Redana, and G. P. Fettweis, “Small-cell self-organizing wireless networks,” Proceedings of the IEEE, vol. 102, no. 3, pp. 334–350, 2014. http://dx.doi.org/10.1109/JPROC.2014.2301595
  23. R. Katulski, J. Stefański, J. Sadowski, S. Ambroziak, and B. Miszewska, Self-Organizing Wireless Monitoring System for Containers. Springer, 08 2009, pp. 164–172. ISBN 978-3-642-03840-2
  24. S. Desilva and R. Boppana, “Mitigating malicious control packet floods in ad hoc networks,” in IEEE Wireless Communications and Networking Conference, 2005, vol. 4, 2005. http://dx.doi.org/10.1109/WCNC.2005.1424844 pp. 2112–2117 Vol. 4.
  25. M.-Y. Su, K.-L. Chiang, and W.-C. Liao, “Mitigation of black-hole nodes in mobile ad hoc networks,” in International Symposium on Parallel and Distributed Processing with Applications, 2010. http://dx.doi.org/10.1109/ISPA.2010.74 pp. 162–167.
  26. A. Naveena and K. R. L. Reddy, “Malicious node prevention and mitigation in manets using a hybrid security model,” Information Security Journal: A Global Perspective, vol. 27, no. 2, pp. 92–101, 2018. http://dx.doi.org/10.1080/19393555.2017.1415399. [Online]. Available: 10.1080/19393555.2017.1415399
  27. S. Kent, “Model driven engineering,” in Integrated Formal Methods, M. Butler, L. Petre, and K. Sere, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. ISBN 978-3-540-47884-3 pp. 286–298.
  28. M. Barkowsky, T. Brand, and H. Giese, “Improving adaptive monitoring with incremental runtime model queries,” in 2021 International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS), 2021. http://dx.doi.org/10.1109/SEAMS51251.2021.00019 pp. 71–77.
  29. L. Liu, M. Loper, Y. Ozkaya, A. Yasar, and E. Yigitoglu, “Machine to machine trust in the iot era,” in Proceedings of the 18th International Conference on Trust in Agent Societies - Volume 1578, ser. TRUST’16. Aachen, DEU: CEUR-WS.org, 2016, p. 18–29.
  30. D. Iqbal and B. Buhnova, “Model-based approach for building trust in autonomous drones through digital twins,” in 2022 IEEE International Conference on Systems, Man, and Cybernetics (SMC). IEEE, 2022.
  31. J.-H. Cho, K. Chan, and S. Adali, “A survey on trust modeling,” ACM Comput. Surv., vol. 48, no. 2, oct 2015. http://dx.doi.org/10.1145/2815595. [Online]. Available: 10.1145/2815595
  32. J. B. Rotter, “Interpersonal trust, trustworthiness, and gullibility.” American psychologist, vol. 35, no. 1, p. 1, 1980. http://dx.doi.org/10.1037/0003-066X.35.1.1
  33. B. Lahno, “On the emotional character of trust,” Ethical theory and moral practice, vol. 4, no. 2, pp. 171–189, 2001.
  34. R. C. Mayer, J. H. Davis, and F. D. Schoorman, “An integrative model of organizational trust,” The Academy of Management Review, vol. 20, no. 3, pp. 709–734, 1995. http://dx.doi.org/10.2307/258792. [Online]. Available: http://www.jstor.org/stable/258792
  35. A. I. A. Ahmed, S. H. Ab Hamid, A. Gani, M. K. Khan et al., “Trust and reputation for internet of things: Fundamentals, taxonomy, and open research challenges,” Journal of Network and Computer Applications, vol. 145, p. 102409, 2019. http://dx.doi.org/10.1016/j.jnca.2019.102409
  36. A. Hbaieb, S. Ayed, and L. Chaari, “A survey of trust management in the internet of vehicles,” Computer Networks, vol. 203, p. 108558, 2022. http://dx.doi.org/10.1016/j.comnet.2021.108558. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S1389128621004758
  37. W. Abdelghani, C. A. Zayani, I. Amous, and F. Sèdes, “Trust management in social internet of things: a survey,” in Conference on e-Business, e-Services and e-Society. Springer, 2016. http://dx.doi.org/10.1007/978-3-319-45234-0_39 pp. 430–441.