Pipelining of modular multiplication operations for efficient trust computation in decentralized cyber-physical environments

Vyacheslav Petrenko, Matvey Sutormin

Abstract


Modern decentralized cyber-physical environments (DCPEs) are dynamic environments where ensuring trust between autonomous agents is a critical task, requiring efficient methods for trust computation between agents under resource constraints. This study aims to reduce the computational costs in trust evaluation, caused by the quadratic complexity of traditional methods, limiting their applicability in resource-constrained devices. To address this issue, the paper proposes pipelining modular multiplication operations to accelerate computations. This approach enables parallel data processing, reduces energy consumption, and ensures deterministic operation execution times, which are crucial for dynamic environments. The integration of pipelined modular multiplication operations, implemented at the hardware level, into a trusted interaction model, as well as their application in combination with blockchain technologies for decentralized updating of the trust matrix, is considered. Experimental results demonstrate a six-fold acceleration of modular multiplication operations compared to classical methods, as well as enhanced system resilience against attacks. The implementation of the proposed method opens up new possibilities for creating scalable and energy-efficient DCPEs capable of operating in highly dynamic and uncertain conditions.

Full Text:

PDF

References


Petrenko V. I. et al. Method of trusted agent interaction in a decentralized cyber-physical environment based on distributed ledger technology // Caspian Journal: Management and High Technologies. — 2023. — No. 3 (63). — P. 115.

Roig P. J. [et al.]. Modeling an Edge Computing Arithmetic Framework for IoT Environments // Sensors 2022, Vol. 22, Page 1084. 2022. No. 3 (22). C. 1084.

Samofalov K.G., Lutskiy G.M. Fundamentals of the theory of multilevel pipelined computing systems. — M.: Radio i svyaz, 1989. — 272p.

Orton G., Peppard L., Tavares S. A design of a fast pipelined modular multiplier based on a diminished-radix algorithm // Journal of Cryptology. 1993. No. 4 (6). P. 183–208.

Ma C. [et al.]. Trusted AI in Multiagent Systems: An Overview of Privacy and Security for Distributed Learning // Proceedings of the IEEE. 2023. No. 9 (111). P. 1097–1132.

Page J., Zaslavsky A., Indrawan M. A buddy model of security for mobile agent communities operating in pervasive scenarios // Proceedings of the Second Workshop on Australasian Information Security, Data Mining and Web Intelligence, and Software Internationalisation. 2004. (32). P. 17–25.

Zikratov I. A., Zikratova T. V., Lebedev I. S. Trust model of information security of multi-agent robotic systems with decentralized control // Scientific and technical bulletin of information technologies, mechanics and optics. - 2014. - No. 2 (90). - P. 47-52.

Zikratov I. A. [et al.]. Construction of a model of trust and reputation for objects of multi-agent robotic systems with decentralized control // Scientific and Technical Bulletin of Information Technologies, Mechanics and Optics. - 2014. - No. 3 (91). - P. 30-38

Zikratov I. A. [et al.]. Security model of mobile multi-agent robotic systems with collective control // Scientific and technical bulletin of information technologies, mechanics and optics. - 2017. - Vol. 17, No. 3. - P. 439–449. - DOI: 10.17586/2226-1494-2017-17-3-439-449.

Amini M. R., Baidas M. W. Availability-Reliability-Stability Trade-Offs in Ultra-Reliable Energy-Harvesting Cognitive Radio IoT Networks // IEEE Access. 2020. (8). C. 82890–82916.

Ullah S. [et al.]. Elliptic Curve Cryptography; Applications, challenges, recent advances, and future trends: A comprehensive survey // Computer Science Review. 2023. (47). C. 100530.

Singh S., Maakar S. K., Kumar S. A Performance Analysis of DES and RSA Cryptography 2013.

Lysyanskaya A. Security analysis of RSA-BSSA 2023.P. 251–280.

Naser S. M. Cryptography: From the ancient history to now, it’s applications and a new complete numerical model // International journal of mathematics and statistics studies. 2021. No. 3 (9). P. 11–30.

Fryer D. [et al.]. Checking the integrity of transactional mechanisms // ACM Transactions on Storage. 2014. No. 4 (10).

Bohm H., Distler T., Wagemann P. TinyBFT: Byzantine Fault-Tolerant Replication for Highly Resource-Constrained Embedded Systems // 2024 IEEE 30th Real-Time and Embedded Technology and Applications Symposium (RTAS). 2024. P. 225–238.

Wang Y., Zhong M., Cheng T. Research on PBFT consensus algorithm for grouping based on feature trust // Scientific Reports 2022 12:1. 2022. No. 1 (12). P. 1–12.

Ali A. [et al.]. Securing Secrets in Cyber-Physical Systems: A Cutting-Edge Privacy Approach with Consortium Blockchain // Sensors 2023, Vol. 23, Page 7162. 2023. No. 16 (23). P. 7162.

Chinnam R. K. [et al.]. Enhancing IoT Security and Efficiency with DPOS Enabled Blockchain and IPFS Integration // 2024 2nd International Conference Computational and Characterization Techniques in Engineering and Sciences, IC3TES 2024. 2024.

Amoussou-Guenou Y. [et al.]. Dissecting Tendermint // Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2019. (11704 LNCS). P. 166–182.

Gennaro R., Krawczyk H., Rabin T. RSA-based undeniable signatures // Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1997. (1294). P. 132–149.

Gupta N., Jain A. K. RSA Based Consensus Algorithm for Lightweight Private Blockchain Network // ITM Web of Conferences. 2023. (54). P. 03003.

Milanov E. [et al.]. The RSA algorithm // RSA laboratories. 2009.No. 2 (42). P. 1–11.

Pavan Kumar C. H., Sivani K. Implementation of efficient parallel prefix adders for residue number system // International Journal of Computing and Digital Systems. 2015. No. 4 (4). P. 295–300.

Ma C. [et al.]. Trusted AI in Multiagent Systems: An Overview of Privacy and Security for Distributed Learning // Proceedings of the IEEE. 2023. No. 9 (111). P. 1097–1132.

Petrenko V. I. Pipelined modulo multiplier // Patent for invention 2797164 C1, Published 07/19/2021 Bulletin No. 20.

Petrenko V. I., Sutormin M. P., Puiko D. D. Pipelined modulo multiplier // Patent for invention 2797164 C1, Published 07/19/2021 Bulletin No. 20.

Petrenko V. I. Modulo multiplier // Patent for invention 2751802 C1, Published 07/19/2021 Bulletin No. 20.

Alzubi J. A. Blockchain-based Lamport Merkle digital signature: authentication tool in IoT healthcare // Computer Communications. 2021. (170).P. 200–208.


Refbacks

  • There are currently no refbacks.


Abava  Кибербезопасность ИБП для ЦОД СНЭ

ISSN: 2307-8162