{"title":"Key issues in service systems resilience","authors":"K. Furuta, T. Kanno","doi":"10.1109/DSNW.2013.6615534","DOIUrl":"https://doi.org/10.1109/DSNW.2013.6615534","url":null,"abstract":"The center of industries is gradually shifting toward services rather than agriculture or manufacturing particularly in industrialized countries. In addition, since our life is now heavily depends on modern service systems, resilience of service systems is a key issue for safe and secure living. Since interlinks between service systems are intangible as well as physical, it is often harder to establish resilience of service systems than other systems. This paper discusses two aspects that should be considered in terms of service systems resilience: the interdependencies between different service systems and different interests of people. We will show that it is necessary to consider the both aspects using cases of recovering infrastructures after disaster.","PeriodicalId":377784,"journal":{"name":"2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128596711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Negin Fathollahnejad, E. Villani, R. Pathan, R. Barbosa, J. Karlsson
{"title":"On reliability analysis of leader election protocols for virtual traffic lights","authors":"Negin Fathollahnejad, E. Villani, R. Pathan, R. Barbosa, J. Karlsson","doi":"10.1109/DSNW.2013.6615529","DOIUrl":"https://doi.org/10.1109/DSNW.2013.6615529","url":null,"abstract":"This paper addresses the problem of leader election in virtual traffic lights. A virtual traffic light (VTL) is a self-organizing traffic control system that allows road vehicles equipped with vehicle-to-vehicle communication facilities to implement the function of a traffic light without the support of a roadside installation. Previous research has shown that it is impossible to construct a leader election protocol that guarantees agreement among the participating vehicles in the presence of massive communication failures. The paper addresses the problem of calculating the probability of disagreement in situations where a large number of protocol messages are lost due to communication interference, so-called communication grey-outs. To this end, we present a probabilistic analysis of a family of simple round-based consensus algorithms that solve the 1-of-n selection problem. We propose to use these algorithms for the core logic of a VTL leader election protocol (LEP). Our analysis shows that the probability of disagreement depends on: i) the number of vehicles involved in the leader election, ii) the number of rounds of message exchange, iii) the probability of message loss, and iv) the decision criterion used by the LEP. We propose an optimistic and a pessimistic decision criteria for the proposed 1-of-n selection algorithms. The analysis encompass two probabilistic failure models, one for symmetric communication failures and one for asymmetric communication failures.","PeriodicalId":377784,"journal":{"name":"2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128082869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Model-based evaluation of system resilience","authors":"J. F. Meyer","doi":"10.1109/DSNW.2013.6615535","DOIUrl":"https://doi.org/10.1109/DSNW.2013.6615535","url":null,"abstract":"The notion of system resilience is receiving increased attention in domains ranging from safety-critical applications to ubiquitous computing. After reviewing how resilience has been defined in various contexts, we focus on a dependability-based definition and a performability-based extension thereof. Modeling problems posed by the quantitative evaluation of system resilience are then discussed, along with some suggestions as to how they might be solved.","PeriodicalId":377784,"journal":{"name":"2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133907731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards evaluating the impact of data quality on service applications","authors":"N. Ivaki, N. Laranjeiro, M. Vieira","doi":"10.1109/DSNW.2013.6615509","DOIUrl":"https://doi.org/10.1109/DSNW.2013.6615509","url":null,"abstract":"Service applications frequently make use of a relational database to store and retrieve data and rely on the correctness of this data to deliver service to clients. Despite this, relational databases do not provide support for complex data integrity restrictions, which have to be controlled by the application. As such, bugs present in service applications can easily lead to the storage of incorrect data that, at random instants can cause applications to fail and stop delivering service, which can severely impact clients, other applications, and even the reputation or finance of the service provider. The goal of this work is to set the basis for an approach that is able to assess how vulnerable a service application can be to incorrect data. We expect that the results can also be used to suggest solutions for applications showing failures in presence of poor data and to define problem prevention techniques during the development of new applications.","PeriodicalId":377784,"journal":{"name":"2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114545012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Interoperability in fingerprint recognition: A large-scale empirical study","authors":"L. Lugini, Emanuela Marasco, B. Cukic, Ilir Gashi","doi":"10.1109/DSNW.2013.6615516","DOIUrl":"https://doi.org/10.1109/DSNW.2013.6615516","url":null,"abstract":"Biometric systems are widely deployed in governmental, military and commercial/civilian applications. There are a multitude of sensors and matching algorithms available from different vendors. This creates a competitive market for these products, which is good for the consumers but emphasizes the importance of interoperability. Interoperability is the ability of a biometric system to handle variations introduced in the biometric data due to the deployment of different capture devices. The use of different biometric devices may increase error rates. In this paper, we perform a large-scale empirical study of the status of interoperability between fingerprint sensors and assess the performance consequence when interoperability is lacking.","PeriodicalId":377784,"journal":{"name":"2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126715732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Community-based resilient electricity sharing: Optimal spatial clustering","authors":"Y. Yamagata, H. Seya","doi":"10.1109/DSNW.2013.6615539","DOIUrl":"https://doi.org/10.1109/DSNW.2013.6615539","url":null,"abstract":"This paper extends our proposing (Yamagata and Seya 2012) concept of a community-based disaster resilient electricity sharing system (DRESS) as a complement or an alternative to the feed-in-tariff (FiT) to achieve CO2 neutral in cities. In this system, electricity generated from widely introduced solar photovoltaic panels (PVs) is stored to the “cars not in use” in a city. In the central part of the Tokyo metropolitan area, almost half of the cars is used only on weekends and are kept parking during the weekdays. Hence, there exists a huge new potential if those cars are replaced by electric vehicles (EVs) in the future, namely they may be used as new battery storages using vehicle to grid (V2G) at a community level. This study extends our previous paper. Firstly, by using actual ground areas of buildings, we estimate PVs supply potential more accurately. The result shows that the hourly electricity surplus (PV supply minus demand) can be fully stored without waste if 27% of the parking EVs are used as battery storage at the whole city level, although there exist significant spatial differences at local district level. Secondly, based on the geographical demand-supply estimates, we check the possibility of local electricity sharing by combing high and low storage potential districts to form electricity self-sufficient resilient communities. Finally, we analyze the optimal community clustering using Moran's I index. We show that the 40%, instead of 27%, is an optimal EV electricity sharing rate, if we consider the resilience against black-out risk.","PeriodicalId":377784,"journal":{"name":"2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122663790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Massimiliano Albanese, S. Jajodia, R. Jhawar, V. Piuri
{"title":"Reliable mission deployment in vulnerable distributed systems","authors":"Massimiliano Albanese, S. Jajodia, R. Jhawar, V. Piuri","doi":"10.1109/DSNW.2013.6615514","DOIUrl":"https://doi.org/10.1109/DSNW.2013.6615514","url":null,"abstract":"Recent years have seen a growing interest in mission-centric operation of large-scale distributed systems. However, due to their complexity, these systems are prone to failures and vulnerable to a wide range of cyber-attacks. Current solutions focus either on the infrastructure itself or on mission analysis, but fail to consider information about the complex interdependencies existing between system components and mission tasks. In this paper, we take a different approach, and present a solution for deploying mission tasks in a distributed computing environment in a way that minimizes a mission's exposure to vulnerabilities by taking into account available information about vulnerabilities and dependencies. We model the mission deployment problem as a task allocation problem, subject to various dependability constraints. The proposed solution is based on the A* algorithm for searching the solution space, but we also introduce a heuristic to significantly improve the search performance. We validate our approach, and show that our algorithm scales linearly with the size of both missions and networks.","PeriodicalId":377784,"journal":{"name":"2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124071024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Casimiro, J. Kaiser, E. Schiller, Pedro Costa, José Parizi, Rolf Johansson, R. Librino
{"title":"The KARYON project: Predictable and safe coordination in cooperative vehicular systems","authors":"A. Casimiro, J. Kaiser, E. Schiller, Pedro Costa, José Parizi, Rolf Johansson, R. Librino","doi":"10.1109/DSNW.2013.6615530","DOIUrl":"https://doi.org/10.1109/DSNW.2013.6615530","url":null,"abstract":"KARYON, a kernel-based architecture for safety-critical control, is a European project that proposes a new perspective to improve performance of smart vehicle coordination. The key objective of KARYON is to provide system solutions for predictable and safe coordination of smart vehicles that autonomously cooperate and interact in an open and inherently uncertain environment. One of the main challenges is to ensure high performance levels of vehicular functionality in the presence of uncertainties and failures. This paper describes some of the steps being taken in KARYON to address this challenge, from the definition of a suitable architectural pattern to the development of proof-of-concept prototypes intended to show the applicability of the KARYON solutions. The project proposes a safety architecture that exploits the concept of architectural hybridization to define systems in which a small local safety kernel can be built for guaranteeing functional safety along a set of safety rules. KARYON is also developing a fault model and fault semantics for distributed, continuous-valued sensor systems, which allows abstracting specific sensor faults and facilitates the definition of safety rules in terms of quality of perception. Solutions for improved communication predictability are proposed, ranging from network inaccessibility control at lower communication levels to protocols for assessment of cooperation state at the process level. KARYON contributions include improved simulation and fault-injection tools for evaluating safety assurance according to the ISO 26262 safety standard. The results will be assessed using selected use cases in the automotive and avionic domains.","PeriodicalId":377784,"journal":{"name":"2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127176268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fault-tolerant broadcast algorithms for the virtual hypercube topology","authors":"L. A. Rodrigues","doi":"10.1109/DSNW.2013.6615520","DOIUrl":"https://doi.org/10.1109/DSNW.2013.6615520","url":null,"abstract":"Broadcast algorithms are used by network applications to disseminate information. Best-effort broadcast ensures that every correct process delivers the same set of messages if the sender of these messages is correct. Reliable broadcast offers the same guaranties even when the senders fail during the transmission. To improve the scalability of broadcast solutions, this work proposes an algorithm that builds virtual spanning trees connecting the processes, through which messages are propagated. These trees are dynamically built embedded on a virtual hypercube-like topology. Processes can can fail by crashing, and up to n - 1 nodes may crash at any given time. The processes continuously monitor each other with Hi-ADSD. Besides best-effort and reliable broadcast, uniform, FIFO, causal and atomic broadcast algorithms are discussed. A solution for distributed k-mutual exclusion using the hierarchical and fault-tolerant approach is also presented.","PeriodicalId":377784,"journal":{"name":"2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133729598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ivan Studnia, V. Nicomette, E. Alata, Y. Deswarte, M. Kaâniche, Youssef Laarouchi
{"title":"Survey on security threats and protection mechanisms in embedded automotive networks","authors":"Ivan Studnia, V. Nicomette, E. Alata, Y. Deswarte, M. Kaâniche, Youssef Laarouchi","doi":"10.1109/DSNW.2013.6615528","DOIUrl":"https://doi.org/10.1109/DSNW.2013.6615528","url":null,"abstract":"Embedded electronic components, so-called ECU (Electronic Controls Units), are nowadays a prominent part of a car's architecture. These ECUs, monitoring and controlling the different subsystems of a car, are interconnected through several gateways and compose the global internal network of the car. Moreover, modern cars are now able to communicate with other devices through wired or wireless interfaces such as USB, Bluetooth, WiFi or even 3G. Such interfaces may expose the internal network to the outside world and can be seen as entry points for cyber attacks. In this paper, we present a survey on security threats and protection mechanisms in embedded automotive networks. After introducing the different protocols being used in the embedded networks of current vehicles, we then analyze the potential threats targeting these networks and describe how the attackers' opportunities can be enhanced by the new communication abilities of modern cars. Finally, we present the security solutions currently being devised to address these problems.","PeriodicalId":377784,"journal":{"name":"2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114073255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}