Trust Propagation using Cellular Automata for UbiComp 28 th May 2004 —————— Dr. David Llewellyn-Jones, Prof. Madjid Merabti, Dr. Qi Shi, Dr. Bob Askwith.

Slides:



Advertisements
Similar presentations
SOCELLBOT: A New Botnet Design to Infect Smartphones via Online Social Networking th IEEE Canadian Conference on Electrical and Computer Engineering(CCECE)
Advertisements

Dealing with Complexity Robert Love, Venkat Jayaraman July 24, 2008 SSTP Seminar – Lecture 10.
Generated Waypoint Efficiency: The efficiency considered here is defined as follows: As can be seen from the graph, for the obstruction radius values (200,
Scale-free networks Péter Kómár Statistical physics seminar 07/10/2008.
Using Cellular Automata and Influence Maps in Games
Secure Component Composition for Personal Ubiquitous Computing Project Summary —————— 21 st April 2006 —————— David Llewellyn-Jones, Madjid Merabti, Qi.
1 Chapter 13 Artificial Life: Learning through Emergent Behavior.
Network Statistics Gesine Reinert. Yeast protein interactions.
CELLULAR AUTOMATON Presented by Rajini Singh.
Peer-to-Peer and Grid Computing Exercise Session 3 (TUD Student Use Only) ‏
Cellular Automata MATH 800 Fall “Cellular Automata” 588,000 results in 94,600 results in 61,500 results in 2.
Multimodal Interfaces in a Ubiquitous Computing Environment 3 rd UK-Ubinet Workshop —————— 9 th – 11 th February 2005 —————— Fausto. J. Sainz Salces, Dr.
Joanne Turner 15 Nov 2005 Introduction to Cellular Automata.
Statistical Treatment of Data Significant Figures : number of digits know with certainty + the first in doubt. Rounding off: use the same number of significant.
Today’s Plan Introduction to Artificial Life Cellular Automata
Cellular Automata Avi Swartz 2015 UNC Awards Ceremony.
Nawaf M Albadia Introduction. Components. Behavior & Characteristics. Classes & Rules. Grid Dimensions. Evolving Cellular Automata using Genetic.
General Purpose 3D Cellular Automata Modeller. A Regular Lattice of Cells, each obeying the same set of rules Simple rules for individual cells can produce.
Parallelization: Conway’s Game of Life. Cellular automata: Important for science Biology – Mapping brain tumor growth Ecology – Interactions of species.
Peer-to-Peer and Social Networks Random Graphs. Random graphs E RDÖS -R ENYI MODEL One of several models … Presents a theory of how social webs are formed.
MASS: From Social Science to Environmental Modelling Hazel Parry
Large-scale organization of metabolic networks Jeong et al. CS 466 Saurabh Sinha.
Information Networks Power Laws and Network Models Lecture 3.
(Social) Networks Analysis III Prof. Dr. Daning Hu Department of Informatics University of Zurich Oct 16th, 2012.
The Role of Artificial Life, Cellular Automata and Emergence in the study of Artificial Intelligence Ognen Spiroski CITY Liberal Studies 2005.
Pushing the Security Boundaries of Ubiquitous Computing ACSF 2006 —————— 13 th July 2006 —————— David Llewellyn-Jones, Madjid Merabti, Qi Shi, Bob Askwith.
Lukasz Grzegorz Maciak Micheal Alexis
Complex systems complexity chaos the butterfly effect emergence determinism vs. non-determinism & observational non-determinism.
Analysis and Detection of Access Violations in Componentised Systems David Llewellyn-Jones, Madjid Merabti, Qi Shi, Bob Askwith Advances in Computer Security.
Governor’s School for the Sciences Mathematics Day 13.
CS 484 – Artificial Intelligence1 Announcements Lab 4 due today, November 8 Homework 8 due Tuesday, November 13 ½ to 1 page description of final project.
Glasgow 02/02/04 NN k networks for content-based image retrieval Daniel Heesch.
Directed-Graph Epidemiological Models of Computer Viruses Presented by: (Kelvin) Weiguo Jin “… (we) adapt the techniques of mathematical epidemiology to.
Secure Component Composition for Personal Ubiquitous Computing ProgNet Workshop December 2003 —————— 16 th December 2003 —————— Dr. David Llewellyn-Jones,
1 Chapter 13 Artificial Life: Learning through Emergent Behavior.
Cascading Payment Content Exchange (CasPaCE) Framework for P2P Networks Gurleen Arora Supervisors: Dr. M. Hanneghan & Prof. M. Merabti Networked Appliances.
Introduction to Lattice Simulations. Cellular Automata What are Cellular Automata or CA? A cellular automata is a discrete model used to study a range.
Playing God: The Engineering of Functional Designs in the Game of Life Liban Mohamed Computer Systems Research Lab
Cellular Automata Spatio-Temporal Information for Society Münster, 2014.
CELLULAR AUTOMATA A Presentation By CSC. OUTLINE History One Dimension CA Two Dimension CA Totalistic CA & Conway’s Game of Life Classification of CA.
SUPERCOMPUTING CHALLENGE KICKOFF 2015 A Model for Computational Science Investigations Oct 2015 © challenge.org Supercomputing Around.
Cellular Automata based Edge Detection. Cellular Automata Definition A discrete mathematical system characterized by local interaction and an inherently.
Security Mechanisms for Distributed Computing Systems A9ID1007, Xu Ling Kobayashi Laboratory GSIS, TOHOKU UNIVERSITY 2011/12/15 1.
Social Network Analysis Prof. Dr. Daning Hu Department of Informatics University of Zurich Mar 5th, 2013.
Unifying Dynamical Systems and Complex Networks Theories ~ A Proposal of “Generative Network Automata (GNA)” ~ Unifying Dynamical Systems and Complex Networks.
Robustness of complex networks with the local protection strategy against cascading failures Jianwei Wang Adviser: Frank,Yeong-Sung Lin Present by Wayne.
Agent Based Modeling (ABM) in Complex Systems George Kampis ETSU, 2007 Spring Semester.
Scheduling Architecture and Algorithms within ICENI Laurie Young, Stephen McGough, Steven Newhouse, John Darlington London e-Science Centre Department.
Cellular Automata Introduction  Cellular Automata originally devised in the late 1940s by Stan Ulam (a mathematician) and John von Neumann.  Originally.
MA354 An Introduction to Math Models (more or less corresponding to 1.0 in your book)
CS851 – Biological Computing February 6, 2003 Nathanael Paul Randomness in Cellular Automata.
Cellular Automata BIOL/CMSC 361: Emergence 2/12/08.
Pedro R. Andrade Münster, 2013
Conway’s Game of Life Jess Barak Game Theory. History Invented by John Conway in 1970 Wanted to simplify problem from 1940s presented by John von Neumann.
Informatics tools in network science
MA354 Math Modeling Introduction. Outline A. Three Course Objectives 1. Model literacy: understanding a typical model description 2. Model Analysis 3.
Hierarchical Organization in Complex Networks by Ravasz and Barabasi İlhan Kaya Boğaziçi University.
Modelling Complex Systems Video 4: A simple example in a complex way.
Hiroki Sayama NECSI Summer School 2008 Week 2: Complex Systems Modeling and Networks Network Models Hiroki Sayama
Spatio-Temporal Information for Society Münster, 2014
Cellular Automata Pedro R. Andrade Tiago Garcia de Senna Carneiro
Pedro Ribeiro de Andrade Münster, 2013
Trusted Routing in IoT Dr Ivana Tomić In collaboration with:
Pedro R. Andrade Münster, 2013
with Daniel L. Silver, Ph.D. Christian Frey, BBA April 11-12, 2017
Globecom 2004 —————— 1st December 2004
Cellular Automata.
Pedro R. Andrade Münster, 2013
Department of Computer Science University of York
Presentation transcript:

Trust Propagation using Cellular Automata for UbiComp 28 th May 2004 —————— Dr. David Llewellyn-Jones, Prof. Madjid Merabti, Dr. Qi Shi, Dr. Bob Askwith —————— School of Computing and Mathematical Statistics Liverpool John Moores University James Parsons Building Byrom Street Liverpool, L3 3AF, UK {D.Llewellyn-Jones, M.Merabti, Q.Shi,

Problem Traditional security applied to –Individual computers –Domains of computers Improved by allowing multiple computers to work together –Particularly relevant in a UbiComp environment

Trust How can a large number of loosely affiliated devices trust each other? We propose a simple, scalable method for propagating trust in a UbiComp environment Example – using direct connections

Trust If a does not trust b, it is useful to propagate this information Developed to allow distributed analysis of components for maintaining security Could be used –to ensure correct analysis of components (is b returning correct results?) –to prevent viruses spreading (does b have a virus?) –to improve privacy through encryption (is b encrypting data?)

Solution We use a system of cellular automata to maintain and propagate trust information around the network What are cellular automata? –Studied mathematically, e.g. by John von Neumann (1949), Stephen Wolfram (1983) –Used to discretely model differential equations and real world systems –Each cell has a state and transition function –A cell applies its transition function to its state and the state of the cells around it –Every cell does this at each step

Cellular Automata Important properties: –Cells only need to know about a small neighbourhood – e.g. adjacent cells –Transition functions are very simple –With many cells, produces complex emergent behaviour The whole is more than the sum of its parts Example: Conway’s “Game of Life”

Cellular Automata Important properties: –Cells only need to know about a small neighbourhood – e.g. adjacent cells –Transition functions are very simple –With many cells, produces complex emergent behaviour The whole is more than the sum of its parts Example: Conway’s “Game of Life”

Cellular Automata Important properties: –Cells only need to know about a small neighbourhood – e.g. adjacent cells –Transition functions are very simple –With many cells, produces complex emergent behaviour The whole is more than the sum of its parts Example: Conway’s “Game of Life” –Created by John Conway in 1970 –Studied by mathematicians and computer scientists –Very simple rules, but complex result

Cellular Automata How can we use cellular automata? –Each node in the UbiComp environment represents a cell of the cellular automaton –Each node executes a simple transition function –We want to harness the complex emergent properties to manage and distribute the trust information The “Game of Life” network

Cellular Automata For an effective system, we must choose the correct transition function This will determine the emergent behaviour

Emergent Behaviour A security breach causes a reduction of the trust in the node The effect is like pulling down on an elasticated blanket This localises the effect of a security breach

Generating Networks Networks are normally far more complex than nodes arranged in a grid –For an effective system, more complex structures must be considered –Transition function is updated to handle such structures Experiments used the Klemm-Eguíluz method for generating a network topology –Small-World graph –Small average distance between nodes –High clustering coefficient –Scale-free network –Satisfies power-law connectivity distribution

Experimental results Malicious code propagation experiment –Malicious code reproduces itself to neighbouring nodes –Some nodes are able to detect the malicious code –Nodes only spend a certain proportion of time checking for malicious code –If detected, the nodes trust is adversely affected Experiment details –19600 node Klemm-Eguíluz network –Control experiment: same network but no Cellular Automata effect –Initially malicious code added to five random nodes –Experimental run of 2000 cycles

Experimental results 100% enabled, fast propagation

Experimental results 85% enabled, fast propagation

Experimental results 85% enabled, fast propagation, 20% active

Conclusion Initial tests show that trust can be effectively propagated using cellular automata techniques The process relies on the emergent properties of the system There is little theory properly relating transition functions with emergent properties in a network environment We hope to use the system described to allow distributed code analysis in a UbiComp environment

The End Thankyou for your time