Heterogeneity- and homophily-induced vulnerability of a P2P network formation model: the IOTA auto-peering protocol
- URL: http://arxiv.org/abs/2401.12633v1
- Date: Tue, 23 Jan 2024 10:30:14 GMT
- Title: Heterogeneity- and homophily-induced vulnerability of a P2P network formation model: the IOTA auto-peering protocol
- Authors: Yu Gao, Carlo Campajola, Nicolo Vallarano, Andreia Sofia Teixeira, Claudio J. Tessone,
- Abstract summary: IOTA is a distributed ledger technology that relies on a peer-to-peer (P2P) network for communications.
This paper's goal is to detect potential vulnerabilities and evaluate the resilience of the P2P network generated using IOTA auto-peering algorithm against eclipse attacks.
- Score: 0.9075435445935834
- License: http://creativecommons.org/licenses/by-sa/4.0/
- Abstract: IOTA is a distributed ledger technology that relies on a peer-to-peer (P2P) network for communications. Recently an auto-peering algorithm was proposed to build connections among IOTA peers according to their "Mana" endowment, which is an IOTA internal reputation system. This paper's goal is to detect potential vulnerabilities and evaluate the resilience of the P2P network generated using IOTA auto-peering algorithm against eclipse attacks. In order to do so, we interpret IOTA's auto-peering algorithm as a random network formation model and employ different network metrics to identify cost-efficient partitions of the network. As a result, we present a potential strategy that an attacker can use to eclipse a significant part of the network, providing estimates of costs and potential damage caused by the attack. On the side, we provide an analysis of the properties of IOTA auto-peering network ensemble, as an interesting class of homophile random networks in between 1D lattices and regular Poisson graphs.
Related papers
- Utilizing Transaction Prioritization to Enhance Confirmation Speed in the IOTA Network [1.5340244519478985]
We propose an optimization framework designed to integrate a priority level for critical or high-priority IoT transactions within the IOTA network.
The experimental results show that higher-priority transactions in the proposed algorithm reach final confirmation in less time compared to the original IOTA system.
arXiv Detail & Related papers (2025-01-28T07:37:43Z) - End-to-End Convolutional Activation Anomaly Analysis for Anomaly Detection [41.94295877935867]
End-to-end Convolutional Activation Anomaly Analysis (E2E-CA$3$)
We propose an End-to-end Convolutional Activation Anomaly Analysis (E2E-CA$3$)
It is a significant extension of A$3$ anomaly detection approach proposed by Sperl, Schulze and B"ottinger.
arXiv Detail & Related papers (2024-11-21T10:22:50Z) - FedMSE: Federated learning for IoT network intrusion detection [0.0]
The rise of IoT has expanded the cyber attack surface, making traditional centralized machine learning methods insufficient due to concerns about data availability, computational resources, transfer costs, and especially privacy preservation.
A semi-supervised federated learning model was developed to overcome these issues, combining the Shrink Autoencoder and Centroid one-class classifier (SAE-CEN)
This approach enhances the performance of intrusion detection by effectively representing normal network data and accurately identifying anomalies in the decentralized strategy.
arXiv Detail & Related papers (2024-10-18T02:23:57Z) - Over-The-Air Federated Learning: Status Quo, Open Challenges, and Future
Directions [78.5371215066019]
Over-the-air federated learning (OTA-FL) enables users at the network edge to share spectrum resources and achieves efficient and low-latency global model aggregation.
This paper provides a holistic review of progress in OTA-FL and points to potential future research directions.
arXiv Detail & Related papers (2023-07-03T12:44:52Z) - Poisoning Attacks in Federated Edge Learning for Digital Twin 6G-enabled
IoTs: An Anticipatory Study [37.97034388920841]
Federated edge learning can be essential in supporting privacy-preserving, artificial intelligence (AI)-enabled activities in digital twin 6G-enabled Internet of Things (IoT) environments.
We propose an anticipatory study for poisoning attacks in federated edge learning for digital twin 6G-enabled IoT environments.
arXiv Detail & Related papers (2023-03-21T11:12:17Z) - Unsupervised Ensemble Based Deep Learning Approach for Attack Detection
in IoT Network [0.0]
Internet of Things (IoT) has altered living by controlling devices/things over the Internet.
To bring down the IoT network, attackers can utilise these devices to conduct a variety of network attacks.
In this paper, we have developed an unsupervised ensemble learning model that is able to detect new or unknown attacks in an IoT network from an unlabelled dataset.
arXiv Detail & Related papers (2022-07-16T11:12:32Z) - AdIoTack: Quantifying and Refining Resilience of Decision Tree Ensemble
Inference Models against Adversarial Volumetric Attacks on IoT Networks [1.1172382217477126]
We present AdIoTack, a system that highlights vulnerabilities of decision trees against adversarial attacks.
To assess the model for the worst-case scenario, AdIoTack performs white-box adversarial learning to launch successful volumetric attacks.
We demonstrate how the model detects all non-adversarial volumetric attacks on IoT devices while missing many adversarial ones.
arXiv Detail & Related papers (2022-03-18T08:18:03Z) - Link Prediction with Contextualized Self-Supervision [63.25455976593081]
Link prediction aims to infer the existence of a link between two nodes in a network.
Traditional link prediction algorithms are hindered by three major challenges -- link sparsity, node attribute noise and network dynamics.
We propose a Contextualized Self-Supervised Learning framework that fully exploits structural context prediction for link prediction.
arXiv Detail & Related papers (2022-01-25T03:12:32Z) - Collaborative adversary nodes learning on the logs of IoT devices in an
IoT network [0.0]
We propose an improved approach for IoT security from data perspective.
The Adversary Learning (AdLIoTLog) model is proposed using Recurrent Neural Network (RNN)
Our results show that the predicting performance of the AdLIoTLog model trained by our method degrades by 3-4% in the presence of attack.
arXiv Detail & Related papers (2021-12-22T02:56:22Z) - The Feasibility and Inevitability of Stealth Attacks [63.14766152741211]
We study new adversarial perturbations that enable an attacker to gain control over decisions in generic Artificial Intelligence systems.
In contrast to adversarial data modification, the attack mechanism we consider here involves alterations to the AI system itself.
arXiv Detail & Related papers (2021-06-26T10:50:07Z) - Semi-supervised Variational Temporal Convolutional Network for IoT
Communication Multi-anomaly Detection [3.3659034873495632]
Internet of Things (IoT) devices are constructed to build a huge communications network.
These devices are insecure in reality, it means that the communications network are exposed by the attacker.
In this paper, we propose SS-VTCN, a semi-supervised network for IoT multiple anomaly detection.
arXiv Detail & Related papers (2021-04-05T08:51:24Z) - Towards Communication-efficient and Attack-Resistant Federated Edge
Learning for Industrial Internet of Things [40.20432511421245]
Federated Edge Learning (FEL) allows edge nodes to train a global deep learning model collaboratively for edge computing in the Industrial Internet of Things (IIoT)
FEL faces two critical challenges: communication overhead and data privacy.
We propose a communication-efficient and privacy-enhanced asynchronous FEL framework for edge computing in IIoT.
arXiv Detail & Related papers (2020-12-08T14:11:32Z) - Cascade Network with Guided Loss and Hybrid Attention for Two-view
Geometry [32.52184271700281]
We propose a Guided Loss to establish the direct negative correlation between the loss and Fn-measure.
We then propose a hybrid attention block to extract feature.
Experiments have shown that our network achieves the state-of-the-art performance on benchmark datasets.
arXiv Detail & Related papers (2020-07-11T07:44:04Z) - Lightweight Collaborative Anomaly Detection for the IoT using Blockchain [40.52854197326305]
Internet of things (IoT) devices tend to have many vulnerabilities which can be exploited by an attacker.
Unsupervised techniques, such as anomaly detection, can be used to secure these devices in a plug-and-protect manner.
We present a distributed IoT simulation platform, which consists of 48 Raspberry Pis.
arXiv Detail & Related papers (2020-06-18T14:50:08Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.