Skip to main content

Security and Robustness for Collaborative Monitors

  • Conference paper
  • First Online:
Coordination, Organizations, Institutions, and Norms in Agent Systems XI (COIN 2015)

Abstract

Decentralized monitors can be subject to robustness and security risks. Robustness risks include attacks on the monitor’s infrastructure in order to disable parts of its functionality. Security risks include attacks that try to extract information from the monitor and thereby possibly leak sensitive information. Formal methods to analyze the design of a monitor with respect to these issues can help to create more secure designs and/or identify critical parts. In this paper we specify a model for analyzing robustness and security risks for collaborative monitors constructed from a network of local monitors.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    Firstly, let reachable be inductively defined as: \(m'\) is reachable from m if \(m'\) is among \(\mathsf {qry} (m)=(m_1,\dots ,m_k)\). Furthermore by transitivity if \(m''\) is reachable by \(m'\) and \(m'\) is reachable from m, then \(m''\) is reachable by m. Acyclicity means that there is no \(m\in M \) such that m is reachable from m.

  2. 2.

    We note that the choice of \(\top \) for “no observation” only makes sense because of \(m_4\)’s aggregation formula \(o\wedge x\wedge y\) as defined below.

References

  1. Agotnes, T., Van Der Hoek, W., Rodriguez-Aguilar, J., Sierra, C., Wooldridge, M.: On the logic of normative systems. In: Proceedings of the Twentieth International Joint Conference on Artificial Intelligence (IJCAI 2007), pp. 1181–1186 (2007)

    Google Scholar 

  2. Alechina, N., Dastani, M., Logan, B.: Reasoning about normative update. In: Proceedings of the Twenty-Third International Joint Conference on Artificial Intelligence, IJCAI 2013, pp. 20–26. AAAI Press (2013)

    Google Scholar 

  3. Bauer, A., Falcone, Y.: Decentralised LTL monitoring. In: Giannakopoulou, D., Méry, D. (eds.) FM 2012. LNCS, vol. 7436, pp. 85–100. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  4. Bauer, A., Leucker, M., Schallhart, C.: Runtime verification for LTL and TLTL. ACM Trans. Softw. Eng. Methodol. 20(4), 14:1–14:64 (2011)

    Article  Google Scholar 

  5. Boella, G., Torre, L.V.D.: Introduction to normative multiagent systems. Comput. Math. Organ. Theory 12, 71–79 (2006)

    Article  Google Scholar 

  6. Havelund, K., Rosu, G.: Monitoring programs using rewriting. In: Proceedings of the 16th Annual International Conference on Automated Software Engineering (ASE 2001), pp. 135–143. IEEE (2001)

    Google Scholar 

  7. Hoh, B., Gruteser, M., Xiong, H., Alrabady, A.: Enhancing security and privacy in traffic-monitoring systems. IEEE Pervasive Comput. 5(4), 38–46 (2006)

    Article  Google Scholar 

  8. Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. Elsevier’s AdHoc Netw. J. Spec. Issue Sens. Netw. Appl. Protoc. 1(2–3), 293–315 (2003)

    Google Scholar 

  9. Kleene, S.C.: Introduction to Metamathematics. North-Holland Publisher Company, The Netherlands (1952)

    MATH  Google Scholar 

  10. Ozdemir, S., Xiao, Y.: Secure data aggregation in wireless sensor networks: a comprehensive overview. Comput. Netw. 53(12), 2022–2037 (2009)

    Article  MATH  Google Scholar 

  11. Pathan, A., Lee, H.-W., Hong, C.S.: Security in wireless sensor networks: issues and challenges. In: The 8th International Conference on Advanced Communication Technology, ICACT 2006, vol. 2, pages 6 pp. -1048, February 2006

    Google Scholar 

  12. Perrig, A., Stankovic, J., Wagner, D.: Security in wireless sensor networks. Commun. ACM 47(6), 53–57 (2004)

    Article  Google Scholar 

  13. Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E.: SPINS: security protocols for sensor networks. Wirel. Netw. 8(5), 521–534 (2002)

    Article  MATH  Google Scholar 

  14. Pnueli, A.: The temporal logic of programs. In: 18th Annual Symposium onFoundations of Computer Science, pp. 46–57, October 1977

    Google Scholar 

  15. Pnueli, A., Zaks, A.: PSL model checking and run-time verification via testers. In: Misra, J., Nipkow, T., Sekerinski, E. (eds.) FM 2006. LNCS, vol. 4085, pp. 573–586. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  16. Testerink, B., Bulling, N., Dastani, M.: A model for collaborative runtime verification. In: Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, pp. 1781–1782 (2015)

    Google Scholar 

  17. Testerink, B., Dastani, M., Meyer, J.-J.: Norm monitoring through observation sharing. In: Herzig, A., Lorini, E. (eds.) Proceedings of the European Conference on Social Intelligence, pp. 291–304 (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bas Testerink .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Testerink, B., Bulling, N., Dastani, M. (2016). Security and Robustness for Collaborative Monitors. In: Dignum, V., Noriega, P., Sensoy, M., Sichman, J. (eds) Coordination, Organizations, Institutions, and Norms in Agent Systems XI. COIN 2015. Lecture Notes in Computer Science(), vol 9628. Springer, Cham. https://doi.org/10.1007/978-3-319-42691-4_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-42691-4_21

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-42690-7

  • Online ISBN: 978-3-319-42691-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics