Rethinking Safety in Autonomous Ecosystems
David Halasz, Barbora Buhnova
Citation: Position Papers of the 17th Conference on Computer Science and Intelligence Systems, M. Ganzha, L. Maciaszek, M. Paprzycki, D. Ślęzak (eds). ACSIS, Vol. 31, pages 81–87 (2022)
Abstract. As autonomous cyber-physical systems are responding to the dynamism of our hyper-connected digital world, they are forming so called dynamic autonomous ecosystems, which require a change in methods ensuring their safe behavior. Within this change, reactions to predictable scenarios need to be replaced with adaptability to the unpredictable context, with gradual safety mechanisms, able to decide whether or not to trigger a certain mitigation procedure. In this paper, we outline our vision towards evolution of safety mechanisms to support dynamic and self-adaptive architectures of autonomous ecosystems. We are proposing an approach to address this research problem with the help of trust and reputation combined with gradual adaptation of safety procedures at runtime.
- R. Capilla, E. Cioroaica, B. Buhnova, and J. Bosch, “On autonomous dynamic software ecosystems,” IEEE Transactions on Engineering Management, pp. 1–15, 2021. http://dx.doi.org/10.1109/TEM.2021.3116873
- D. Halasz, “From systems to ecosystems: Rethinking adaptive safety,” in 17th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS ’22). IEEE, 2022. doi: 10.1145/3524844.3528067
- E. Cioroaica, T. Kuhn, and B. Buhnova, “(do not) trust in ecosystems,” in 2019 IEEE/ACM 41st International Conference on Software Engineering: New Ideas and Emerging Results (ICSE-NIER). IEEE, 2019. http://dx.doi.org/10.1109/ICSE-NIER.2019.00011 pp. 9–12.
- M. Contag, G. Li, A. Pawlowski, F. Domke, K. Levchenko, T. Holz, and S. Savage, “How they did it: An analysis of emission defeat devices in modern automobiles,” in 2017 IEEE Symposium on Security and Privacy (SP), 2017. http://dx.doi.org/10.1109/SP.2017.66 pp. 231–250.
- P. McKinley, S. Sadjadi, E. Kasten, and B. Cheng, “Composing adaptive software,” Computer, vol. 37, no. 7, pp. 56–64, 2004. http://dx.doi.org/10.1109/MC.2004.48
- A. Banerjee, K. K. Venkatasubramanian, T. Mukherjee, and S. K. S. Gupta, “Ensuring safety, security, and sustainability of mission-critical cyber–physical systems,” Proceedings of the IEEE, vol. 100, no. 1, pp. 283–299, 2012. http://dx.doi.org/10.1109/JPROC.2011.2165689
- G. Li, Y. Yang, T. Zhang, X. Qu, D. Cao, B. Cheng, and K. Li, “Risk assessment based collision avoidance decision-making for autonomous vehicles in multi-scenarios,” Transportation Research Part C: Emerging Technologies, vol. 122, p. 102820, 2021. http://dx.doi.org/10.1016/j.trc.2020.102820. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S0968090X20307257
- S. Bouchelaghem, A. Bouabdallah, and M. Omar, “Autonomous Vehicle Security: Literature Review of Real Attack Experiments,” in The 15th International Conference on Risks and Security of Internet and Systems, Paris, France, 2020. [Online]. Available: https://hal.archives-ouvertes.fr/hal-03034640
- J. Cui, L. S. Liew, G. Sabaliauskaite, and F. Zhou, “A review on safety failures, security attacks, and available countermeasures for autonomous vehicles,” Ad Hoc Networks, vol. 90, p. 101823, 2019. http://dx.doi.org/10.1016/j.adhoc.2018.12.006 Recent advances on security and privacy in Intelligent Transportation Systems. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S1570870518309260
- J. Axelsson, “Safety in vehicle platooning: A systematic literature review,” IEEE Transactions on Intelligent Transportation Systems, vol. 18, pp. 1–13, 08 2016. http://dx.doi.org/10.1109/TITS.2016.2598873
- L. Sha, “Using simplicity to control complexity,” IEEE Software, vol. 18, no. 4, pp. 20–28, 2001. http://dx.doi.org/10.1109/MS.2001.936213
- D. Seto, B. Krogh, L. Sha, and A. Chutinan, “The simplex architecture for safe online control system upgrades,” in Proceedings of the 1998 American Control Conference. ACC (IEEE Cat. No.98CH36207), vol. 6, 1998. http://dx.doi.org/10.1109/ACC.1998.703255 pp. 3504–3508 vol.6.
- P. Vivekanandan, G. Garcia, H. Yun, and S. Keshmiri, “A simplex architecture for intelligent and safe unmanned aerial vehicles,” in 2016 IEEE 22nd International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA), 2016. http://dx.doi.org/10.1109/RTCSA.2016.17 pp. 69–75.
- D. Phan, J. Yang, M. Clark, R. Grosu, J. Schierman, S. Smolka, and S. Stoller, “A component-based simplex architecture for high-assurance cyber-physical systems,” in 2017 17th International Conference on Application of Concurrency to System Design (ACSD), 2017. doi: 10.1109/ACSD.2017.23 pp. 49–58.
- H. Muccini, M. Sharaf, and D. Weyns, “Self-adaptation for cyber-physical systems: A systematic literature review,” in 2016 IEEE/ACM 11th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS), 2016. http://dx.doi.org/10.1145/2897053.2897069 pp. 75–81.
- N. Bencomo, R. France, B. Cheng, and U. Aßmann, Eds., Models@run.time: foundations, applications, and roadmaps, ser. Lecture notes in computer science. Germany: Springer, Dec. 2014. ISBN 978-3-319-08914-0 Dagstuhl Seminar 11481 on firstname.lastname@example.org held in November/December 2011.
- P. Arcaini, E. Riccobene, and P. Scandurra, “Modeling and analyzing mape-k feedback loops for self-adaptation,” in 2015 IEEE/ACM 10th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, 2015. http://dx.doi.org/10.1109/SEAMS.2015.10 pp. 13–23.
- M. Salehie, L. Pasquale, I. Omoronyia, R. Ali, and B. Nuseibeh, “Requirements-driven adaptive security: Protecting variable assets at runtime,” in 2012 20th IEEE International Requirements Engineering Conference (RE), 2012. http://dx.doi.org/10.1109/RE.2012.6345794 pp. 111–120.
- A. J. Taylor and A. D. Ames, “Adaptive safety with control barrier functions,” in 2020 American Control Conference (ACC), 2020. http://dx.doi.org/10.23919/ACC45564.2020.9147463 pp. 1399–1405.
- L. S. Rutledge and L. J. Hoffman, “A survey of issues in computer network security,” Computers & Security, vol. 5, no. 4, pp. 296–308, 1986. http://dx.doi.org/10.1016/0167-4048(86)90050-7. [Online]. Available: https://www.sciencedirect.com/science/article/pii/0167404886900507
- M. S. Siddiqui, “Security issues in wireless mesh networks,” in 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE’07), 2007. http://dx.doi.org/10.1109/MUE.2007.187 pp. 717–722.
- A. J. Fehske, I. Viering, J. Voigt, C. Sartori, S. Redana, and G. P. Fettweis, “Small-cell self-organizing wireless networks,” Proceedings of the IEEE, vol. 102, no. 3, pp. 334–350, 2014. http://dx.doi.org/10.1109/JPROC.2014.2301595
- R. Katulski, J. Stefański, J. Sadowski, S. Ambroziak, and B. Miszewska, Self-Organizing Wireless Monitoring System for Containers. Springer, 08 2009, pp. 164–172. ISBN 978-3-642-03840-2
- S. Desilva and R. Boppana, “Mitigating malicious control packet floods in ad hoc networks,” in IEEE Wireless Communications and Networking Conference, 2005, vol. 4, 2005. http://dx.doi.org/10.1109/WCNC.2005.1424844 pp. 2112–2117 Vol. 4.
- M.-Y. Su, K.-L. Chiang, and W.-C. Liao, “Mitigation of black-hole nodes in mobile ad hoc networks,” in International Symposium on Parallel and Distributed Processing with Applications, 2010. http://dx.doi.org/10.1109/ISPA.2010.74 pp. 162–167.
- A. Naveena and K. R. L. Reddy, “Malicious node prevention and mitigation in manets using a hybrid security model,” Information Security Journal: A Global Perspective, vol. 27, no. 2, pp. 92–101, 2018. http://dx.doi.org/10.1080/19393555.2017.1415399. [Online]. Available: 10.1080/19393555.2017.1415399
- S. Kent, “Model driven engineering,” in Integrated Formal Methods, M. Butler, L. Petre, and K. Sere, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. ISBN 978-3-540-47884-3 pp. 286–298.
- M. Barkowsky, T. Brand, and H. Giese, “Improving adaptive monitoring with incremental runtime model queries,” in 2021 International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS), 2021. http://dx.doi.org/10.1109/SEAMS51251.2021.00019 pp. 71–77.
- L. Liu, M. Loper, Y. Ozkaya, A. Yasar, and E. Yigitoglu, “Machine to machine trust in the iot era,” in Proceedings of the 18th International Conference on Trust in Agent Societies - Volume 1578, ser. TRUST’16. Aachen, DEU: CEUR-WS.org, 2016, p. 18–29.
- D. Iqbal and B. Buhnova, “Model-based approach for building trust in autonomous drones through digital twins,” in 2022 IEEE International Conference on Systems, Man, and Cybernetics (SMC). IEEE, 2022.
- J.-H. Cho, K. Chan, and S. Adali, “A survey on trust modeling,” ACM Comput. Surv., vol. 48, no. 2, oct 2015. http://dx.doi.org/10.1145/2815595. [Online]. Available: 10.1145/2815595
- J. B. Rotter, “Interpersonal trust, trustworthiness, and gullibility.” American psychologist, vol. 35, no. 1, p. 1, 1980. http://dx.doi.org/10.1037/0003-066X.35.1.1
- B. Lahno, “On the emotional character of trust,” Ethical theory and moral practice, vol. 4, no. 2, pp. 171–189, 2001.
- R. C. Mayer, J. H. Davis, and F. D. Schoorman, “An integrative model of organizational trust,” The Academy of Management Review, vol. 20, no. 3, pp. 709–734, 1995. http://dx.doi.org/10.2307/258792. [Online]. Available: http://www.jstor.org/stable/258792
- A. I. A. Ahmed, S. H. Ab Hamid, A. Gani, M. K. Khan et al., “Trust and reputation for internet of things: Fundamentals, taxonomy, and open research challenges,” Journal of Network and Computer Applications, vol. 145, p. 102409, 2019. http://dx.doi.org/10.1016/j.jnca.2019.102409
- A. Hbaieb, S. Ayed, and L. Chaari, “A survey of trust management in the internet of vehicles,” Computer Networks, vol. 203, p. 108558, 2022. http://dx.doi.org/10.1016/j.comnet.2021.108558. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S1389128621004758
- W. Abdelghani, C. A. Zayani, I. Amous, and F. Sèdes, “Trust management in social internet of things: a survey,” in Conference on e-Business, e-Services and e-Society. Springer, 2016. http://dx.doi.org/10.1007/978-3-319-45234-0_39 pp. 430–441.