PDF Advanced Computing and Systems for Security Volume 14 Lecture Notes in Networks and Systems 242 1st Edition Rituparna Chaki (Editor) download
PDF Advanced Computing and Systems for Security Volume 14 Lecture Notes in Networks and Systems 242 1st Edition Rituparna Chaki (Editor) download
com
https://ebookmeta.com/product/advanced-computing-and-
systems-for-security-volume-14-lecture-notes-in-networks-
and-systems-242-1st-edition-rituparna-chaki-editor/
OR CLICK HERE
DOWLOAD NOW
https://ebookmeta.com/product/advanced-computing-and-systems-for-
security-volume-13-1st-edition-rituparna-chaki/
ebookmeta.com
https://ebookmeta.com/product/not-forgetting-contemporary-art-and-the-
interrogation-of-mastery-1st-edition-rosalyn-deutsche/
ebookmeta.com
Secrets of the Moon Understanding and Analysing the Lunar
Surface 1st Edition Fielder Gilbert
https://ebookmeta.com/product/secrets-of-the-moon-understanding-and-
analysing-the-lunar-surface-1st-edition-fielder-gilbert/
ebookmeta.com
https://ebookmeta.com/product/zefs-guide-to-deep-learning-1st-edition-
roy-keyes/
ebookmeta.com
https://ebookmeta.com/product/business-accounting-and-finance-5th-
edition-catherine-gowthorpe/
ebookmeta.com
https://ebookmeta.com/product/viscount-maua-and-the-empire-of-brazil-
a-biography-of-irineu-evangelista-de-sousa-1813-1889-anyda-marchant/
ebookmeta.com
Bear s Nature Shifters of Bearclaw Team 3 1st Edition
Catrina Maddox
https://ebookmeta.com/product/bear-s-nature-shifters-of-bearclaw-
team-3-1st-edition-catrina-maddox/
ebookmeta.com
Lecture Notes in Networks and Systems 242
Rituparna Chaki
Nabendu Chaki
Agostino Cortesi
Khalid Saeed Editors
Advanced
Computing
and Systems
for Security:
Volume 14
Lecture Notes in Networks and Systems
Volume 242
Series Editor
Janusz Kacprzyk, Systems Research Institute, Polish Academy of Sciences,
Warsaw, Poland
Advisory Editors
Fernando Gomide, Department of Computer Engineering and Automation—DCA,
School of Electrical and Computer Engineering—FEEC, University of Campinas—
UNICAMP, São Paulo, Brazil
Okyay Kaynak, Department of Electrical and Electronic Engineering,
Bogazici University, Istanbul, Turkey
Derong Liu, Department of Electrical and Computer Engineering, University
of Illinois at Chicago, Chicago, USA; Institute of Automation, Chinese Academy
of Sciences, Beijing, China
Witold Pedrycz, Department of Electrical and Computer Engineering, University of
Alberta, Alberta, Canada; Systems Research Institute, Polish Academy of
Sciences, Warsaw, Poland
Marios M. Polycarpou, Department of Electrical and Computer Engineering,
KIOS Research Center for Intelligent Systems and Networks, University of Cyprus,
Nicosia, Cyprus
Imre J. Rudas, Óbuda University, Budapest, Hungary
Jun Wang, Department of Computer Science, City University of Hong Kong,
Kowloon, Hong Kong
The series “Lecture Notes in Networks and Systems” publishes the latest
developments in Networks and Systems—quickly, informally and with high quality.
Original research reported in proceedings and post-proceedings represents the core
of LNNS.
Volumes published in LNNS embrace all aspects and subfields of, as well as new
challenges in, Networks and Systems.
The series contains proceedings and edited volumes in systems and networks,
spanning the areas of Cyber-Physical Systems, Autonomous Systems, Sensor
Networks, Control Systems, Energy Systems, Automotive Systems, Biological
Systems, Vehicular Networking and Connected Vehicles, Aerospace Systems,
Automation, Manufacturing, Smart Grids, Nonlinear Systems, Power Systems,
Robotics, Social Systems, Economic Systems and other. Of particular value to both
the contributors and the readership are the short publication timeframe and the
world-wide distribution and exposure which enable both a wide and rapid
dissemination of research output.
The series covers the theory, applications, and perspectives on the state of the art
and future developments relevant to systems and networks, decision making, control,
complex processes and related areas, as embedded in the fields of interdisciplinary
and applied sciences, engineering, computer science, physics, economics, social, and
life sciences, as well as the paradigms and methodologies behind them.
Indexed by SCOPUS, INSPEC, WTI Frankfurt eG, zbMATH, SCImago.
All books published in the series are submitted for consideration in Web of Science.
Advanced Computing
and Systems for Security:
Volume 14
Editors
Rituparna Chaki Nabendu Chaki
University of Calcutta Department of Computer Science
Kolkata, India and Engineering
University of Calcutta
Agostino Cortesi Kolkata, West Bengal, India
Ca Foscari University
Venice, Italy Khalid Saeed
Bialystok University of Technology
Bialystok, Poland
© The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature
Singapore Pte Ltd. 2021
This work is subject to copyright. All rights are solely and exclusively licensed by the Publisher, whether
the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse
of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and
transmission or information storage and retrieval, electronic adaptation, computer software, or by similar
or dissimilar methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication
does not imply, even in the absence of a specific statement, that such names are exempt from the relevant
protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this book
are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or
the editors give a warranty, expressed or implied, with respect to the material contained herein or for any
errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional
claims in published maps and institutional affiliations.
This Springer imprint is published by the registered company Springer Nature Singapore Pte Ltd.
The registered company address is: 152 Beach Road, #21-01/04 Gateway East, Singapore 189721,
Singapore
Preface
This book collects the deeply revised version of papers accepted for oral presentation
at the Eighth International Doctoral Symposium on Applied Computation and Secu-
rity Systems (ACSS 2021). ACSS 2021 took place in Kolkata, India, on April 9–
10, 2021. The Doctoral Symposium was organized by the University of Calcutta in
collaboration with Ca Foscari University of Venice, Italy, and Bialystok University
of Technology, Poland.
This unique symposium is aimed specially to facilitate budding researchers in
pursuing their doctoral degree. Each contributed paper was required to have at least
one enrolled Ph.D. student as one of the authors. This has given an opportunity
to each Ph.D. student to express their innovative ideas and to discuss them with a
qualified scientific community of peers.
Over the years, the overall quality of the papers submitted to ACSS has been
improving dramatically, and their subjects reflect and somehow anticipate the
emerging research trends in the area of applied computation and security. In the
call for papers, the following topics of interest related to Applied Computation have
been listed: Security Systems, Software Engineering, Internet of Things, Artificial
Intelligence, Data Science, Computer Vision, and Algorithms.
The editors are greatly indebted to the members of the international program
committee for sharing their expertise and completing their careful review of the
papers in due time. Their reviews have allowed the authors not only to improve their
articles but also to get new hints toward the completion of their Ph.D. thesis.
The dissemination initiatives from Springer have drawn a large number of high-
quality submissions from scholars primarily but not exclusively from India. ACSS
used a double-blind review process and each paper received at least three reviews
either from the PC members or by external reviewers. The reviewers mainly consid-
ered the technical quality and the originality of each paper. As ACSS is a doctoral
symposium, special emphasis was given to assess the clarity of presentation. The
entire process of paper submission, review, and acceptance process was done online.
After carefully considering the reviews, the Program Committee selected only 27
papers for publication out of 45 submissions.
v
vi Preface
Security
Parallel Simulation of Cyber-Physical-Systems . . . . . . . . . . . . . . . . . . . . . . . 3
Kamal Das, Amit Gurung, and Rajarshi Ray
Attack Detection Scheme Using Deep Learning Approach for IoT . . . . . . 17
Vikash Kumar, Sidra Kalam, Ayan Kumar Das, and Ditipriya Sinha
An Efficient Authentication Scheme for Mobile Online Social
Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Munmun Bhattacharya, Sandip Roy, and Samiran Chattopadhyay
GAN-Based Data Generation Approach for IDS: Evaluation
on Decision Tree . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
Sudhir Kumar Pandey, Vikash Kumar, Ditipriya Sinha, and Ayan Kumar Das
Software Engineering
Conceptualizing Re-configurable Business Process:
A Context-Driven Approach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
Priyanka Chakraborty and Anirban Sarkar
Dcube N N : Tool for Dynamic Design Discovery from Multi-threaded
Applications Using Neural Sequence Models . . . . . . . . . . . . . . . . . . . . . . . . . 75
Srijoni Majumdar, Nachiketa Chatterjee, Partha Pratim Das,
and Amlan Chakrabarti
Construction of Materialized Views in Non-Binary Data Space . . . . . . . . 93
Santanu Roy, Bibekananda Shit, Soumya Sen, and Agostino Cortesi
Dynamic Prioritization of Software Requirements for Incremental
Software Development . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
Mandira Roy, Novarun Deb, Agostino Cortesi, Rituparna Chaki,
and Nabendu Chaki
vii
viii Contents
Systems Biology
A Framework for Translation and Validation of Digital
Microfluidic Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135
Pushpita Roy, Ansuman Banerjee, and Bhargab B. Bhattacharya
Disease-Relevant Gene Selection Using Mean Shift Clustering . . . . . . . . . 151
Srirupa Dasgupta, Sharmistha Bhattacharya, Abhinandan Khan,
Anindya Halder, Goutam Saha, and Rajat Kumar Pal
Multiple Fault Identification and Diagnosis in Cross-Referencing
Digital Microfluidic Biochips . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165
Sagarika Chowdhury, Kazi Amrin Kabir, Debasis Dhal,
Rajat Kumar Pal, and Goutam Saha
Brain Tumor Detection: A Comparative Study Among Fast Object
Detection Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179
Sunita Roy, Sanchari Sen, Ranjan Mehera, Rajat Kumar Pal,
and Samir Kumar Bandyopadhyay
MicroRNA-Based Cancer Classification Using Feature Selection
Wrapper . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197
Shib Sankar Bhowmick and Debotosh Bhattacharjee
Editors and Contributors
ix
x Editors and Contributors
Contributors
Rajat Kumar Pal University of Calcutta, Acharya Prafulla Chandra Roy Shiksha
Prangan, Saltlake, Kolkata, India
Srijoni Majumdar Indian Institute of Technology, Kharagpur, West Bengal, India
Ranjan Mehera Business & Solution Consulting, Subex, Inc., Broomfield, CO,
USA
Rajat Kumar Pal Department of Computer Science and Engineering, University
of Calcutta, Kolkata, West Bengal, India
Sudhir Kumar Pandey Lok Nayak Jai Prakash Institute of Technology, Chapra,
Saran, Bihar, India
Partha Pratim Das Indian Institute of Technology, Kharagpur, West Bengal, India
Rajarshi Ray Indian Association for the Cultivation of Science, Kolkata, West
Bengal, India
Mandira Roy University of Calcutta, Kolkata, India
Pushpita Roy Indian Statistical Institute, Kolkata, India;
Calcutta University, Kolkata, India
Sandip Roy Department of Computer Science and Engineering, Asansol Engi-
neering College, Asansol, WB, India
Santanu Roy Future Institute of Engineering and Management, Kolkata, India
Sunita Roy Department of Computer Science and Engineering, University of
Calcutta, Kolkata, West Bengal, India
Goutam Saha Department of Information Technology, North-Eastern Hill Univer-
sity, Umshing Mawkynroh, Shillong, Meghalaya, India
Anirban Sarkar Department of Computer Science and Engineering, National
Institute of Technology, Durgapur, West Bengal, India
Sanchari Sen Department of Computer Science and Engineering, University of
Calcutta, Kolkata, West Bengal, India
Soumya Sen University of Calcutta, Kolkata, India
Bibekananda Shit Future Institute of Engineering and Management, Kolkata, India
Ditipriya Sinha National Institute of Technology Patna, Patna, Bihar, India
Security
Parallel Simulation of
Cyber-Physical-Systems
K. Das (B)
National Institute of Technology Meghalaya, Shillong, Meghalaya, India
e-mail: [email protected]
A. Gurung
Martin Luther Christian University, Shillong, Meghalaya, India
R. Ray
Indian Association for the Cultivation of Science, Kolkata, West Bengal, India
e-mail: [email protected]
© The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 3
R. Chaki et al. (eds.), Advanced Computing and Systems for Security: Volume 14,
Lecture Notes in Networks and Systems 242,
https://doi.org/10.1007/978-981-16-4294-4_1
4 K. Das et al.
1 Introduction
benefits over SpaceEx [14] and CORA [2], the modern model checkers and simu-
lators for linear and affine hybrid systems.
Related Works:
Tools like HyLAA [7] and Breach [11] implement numerical simulators for linear
hybrid systems whereas C2E2 [12] is a numerical simulator for linear and non-linear
CPS. These tools, however, focus on methods of approximating reachable states of
HA models using finitely many simulations. Breach can additionally monitor the
robustness satisfaction of metric interval temporal logic (MITL) formulas. SpaceEx
[14] and CORA [2] are verification tools that implement HA simulation engines
that can compute random simulations using numerical ODE solvers. None of these
tools exploits the inherent parallelism in the modern multicore processors to accel-
erate computing simulation trajectories in parallel. This is where we contribute by
implementing a parallel simulation engine as part of the model-checker XSpeed.
We organize the paper as follows. The requisite background is discussed in Sect. 2.
The parallel algorithm to compute simulation trajectories is presented in Sect. 3. We
show the algorithm’s performance and validity evaluation in Sect. 4, and we conclude
in Sect. 5.
2 Preliminaries
Definition 2.1 [18] A hybrid automaton is a 7-tuple (X , G (V, E), Init, Inv, Flow,
Jump, Assign) where
– X = {x1 , x2 , . . . , xn } is a finite set of continuous variables. The number of
variables in the set is called the dimension of the hybrid automaton. The set
Ẋ = {x˙1 , x˙2 , . . . , x˙n } is the set of variables representing the first derivative of
the respective variables in X . Similarly, the set X = {x1 , x2 , . . . , xn } is the set
of primed variables representing the reset values of the respective variables in X
after effectuating a discrete transition.
– G (V, E) is a directed multigraph of a finite automaton with the set of locations V
and the set of transition edges E.
– Init and Inv are labeling functions that assign to each location in V, a predicate
with free variables from X . The predicate assigned to a location by Inv and Init
is called the invariant and initial condition of the location respectively. Jump is a
labeling function that assigns to each transition edge e ∈ E, a predicate with free
variables from X .
– Flow is a labeling function that assigns to each location in V, a predicate with free
variables from X ∪ Ẋ .
– Assign is a labeling function that assigns to each transition edge e ∈ E, a predicate
with free variables from the set X ∪ X .
6 K. Das et al.
The state of an hybrid automaton is a 2-tuple , v, where ∈ V and v ∈ Rn such that
v satisfies the predicate Inv(), i.e., Inv()[X := v] = tr ue, n being the dimension
of the automaton. The state represents the location of the HA and an assignment
of values to the variables of the HA, denoted with vector v. The state of an HA may
change either by a timed transition or by a discrete transition. A timed transition
δ
due to δ passage of time can be represented as , v − → , w such that v, v̇ and
w, ẇ satisfies the flow predicate Flow(), i.e., Flow()[X := v, Ẋ := v̇] = tr ue
and Flow()[X := w, Ẋ := ẇ] = tr ue. Note that in a timed transition, the location
of the state ∈ V remains the same but represents the change in system variables
due to the continuous flow dynamics. A discrete transition can be represented as
e
→ 2 , v , given that ∃e ∈ E from 1 to 2 for some 1 , 2 ∈ V, such that
1 , v −
Jump(e)[X := v] = tr ue, and Assign(e)[X := v, X := v ] = tr ue. We now define
a trajectory of an hybrid automaton.
vi+2 depicts the trajectory in location 1 and 2 due to timed transition, satisfying
Flow(1 ) and Flow(2 ) respectively. The figure shows a discrete transition due to an
edge e from 1 to 2 . Since the end-point vi+1 of the trajectory in 1 satisfies the
Jump(e) predicate, the transition is enabled. The result of taking the transition is an
update of vi+1 to the new vector vi+1 due to the assignments defined in the Assign(e)
predicate. An important point here is that it is not obligatory to effectuate a discrete
jump when the Jump predicate is satisfied since HA has may transition semantics.
In other words, the may transition semantics in HA says that if a state , v is such
that v satisfies Inv() as well as the Jump(e) predicate for some e ∈ E, then there is
a choice to either take a timed transition or take a discrete transition due to e from
the state , v in the HA.
Definition 2.4 A polygonal constraint over the variables in X = {x1 , x2 , . . . , xn } is
of the form A.x ≤ b, where An×n is a real-valued matrix, xn×1 is a column vector
comprising of the variables x1 , x2 , . . . xn and b ∈ Rn is a real-valued column vec-
tor. The vectors v ∈ Rn satisfying a polygonal constraint defines an n-dimensional
polytope.
An HA, modeling a thermostat is shown in Fig. 2. It has two locations, ON and OFF,
to represent the thermostat’s switched-on and switched-off state, respectively. It is a
two-dimensional HA with variables T and time, representing the temperature and
the elapsed time. The invariant T ≥ 60 in OFF location signifies that during the
switched-off state of the thermostat, the temperature can be 60 or above. Similarly
the invariant T ≤ 70 in the ON location signifies that during the switched-on state
of the thermostat, the temperature can be 70 or below. The Flow in the OFF location
is Ṫ = −k2, time˙ = 1 and signifies that the temperature decreases in a constant rate
k2 while the time progresses during the switched-off state of the thermostat. Simi-
larly, during the switched-on state, the temperature increases following the dynamics
Ṫ = k1(70 − T ) while the time progresses (time˙ = 1) as represented with the Flow
predicate. The Jump predicate on the OFF to ON transition is T ≤ 62 indicating that
the transition may take effect only when the temperature of the thermostat is 62 or
8 K. Das et al.
3 Parallel HA Simulation
This section presents our proposed parallel trajectory simulation algorithm. We first
briefly describe the computation of timed and discrete transitions.
Evaluating Timed Transition: Trajectory-states due to time-transitions are com-
puted numerically using an ODE solver [29]. The present-day ODE solvers can simu-
late first-order linear as well as non-linear ODEs very efficiently. We can improve the
trajectory’s precision by choosing smaller time-steps but at the cost of performance
and memory.
Evaluating Discrete Transition: In the may transition semantics of HA, there
may be infinitely many next trajectory-states possible after taking a discrete transi-
tion. This is due to the non-determinism involved in either choosing or not choosing
to take a transition when an HA state satisfies both the Jump and I nv predicates.
In our algorithm, we follow as soon as possible semantics where a discrete tran-
sition is effectuated as soon as the trajectory satisfies a Jump predicate. There are
two numerical problems involved in the implementation: (1) detecting whether a
trajectory-state , x satisfies the Jump() predicate, and (2) computing the next
trajectory-state , x such that Assign(e)[X = x, X = x ] is satisfied. If a Jump
predicate is a hyperplane, then successive trajectory points computed at time-step
δ may cross the guard failing to detect an intersection. To deal with this crossover
detection problem, we convert the predicate from a hyperplane to a half-space [17] in
the region opposite to the region containing the trajectory’s initial point. This ensures
crossover detection. In the case of polygonal predicates other than hyperplanes, the
satisfaction is easily checked from the satisfiability of AX − b ≤ 0. As soon as a
trajectory-state is detected to satisfy Jump(e), for some e, we compute the successor
state following Assign(e). The computation of a simulation trajectory due to timed
transition is shown in Algorithm 1. The algorithm terminates as soon as a successor
state due to a discrete transition is found, or all states in the time-horizon have been
computed.
For a chosen point pt and a given time-horizon T , the algorithm computes a simu-
lation trajectory, T race, consisting of a sequence of trajectory-states. The trajectory-
states are computed using an ODE solver according to the location dynamics, dis-
cretized at a fixed time-step, δ. The data structure pt consists of a field τ that holds
the elapsed time in the simulation. For any T race, the successive pt.τ holds the time
Parallel Simulation of Cyber-Physical-Systems 9
Parallel Algorithm: The inputs to our algorithm are N —the number of random
simulation trajectories to compute, the HA model to simulate, and the time-horizon T
for simulation. Random vectors N pts ⊂ Rn are obtained such that for any v ∈ N pts,
Init()[X := v] = tr ue, for some ∈ V. Our algorithm is motivated by the parallel
BFS implemented in the model checkers XSpeed [15] and Spin [19]. The algorithm
maintains a shared data-structure W ait, a list of states of the HA, from which further
trajectory needs to be generated via timed and/or discrete transitions. We use W ait of
size (N × N ) to randomly distribute the trajectory-states among N available threads
for efficient load balancing. However, simultaneous read and write access must be
controlled with semaphores or locks to avoid a race condition with a shared W ait.
10 K. Das et al.
4 Evaluation
Benchmark Description:
We consider Bouncing-Ball [23], Navigation benchmark [13], Thermostat [3], Heli-
copter Controller [30], Five Dimensional dynamical system [1], Vehicle platoon
[24], Drivetrain [21], and Building [6] benchmarks for evaluation. The Bouncing-
Ball models the motion of a ball under gravity together with bouncing upon hitting
the ground. The navigation-benchmark depicts a moving object in a grid of n × n
partition in a plane. A Thermostat is a model of a temperature controller. The Heli-
Parallel Simulation of Cyber-Physical-Systems 11
5 Conclusion
We present a parallel simulation engine for hybrid automaton models of CPS which
can compute random simulations in parallel on multicore processors. Our simula-
tion engine implements a multi-threaded lock-free algorithm in order to efficiently
Parallel Simulation of Cyber-Physical-Systems 13
Fig. 5 SpaceEx trajectory splits for a single start state in Nav (3)
Acknowledgements Rajarshi Ray gratefully acknowledges financial support from the Science and
Engineering Research Board (SERB) project with file number IMP/2018/000523. Amit Gurung is
grateful to Martin Luther Christian University, Shillong, Meghalaya, for partially supporting the
work under project grant No. Seed-Grant/559/2017-5567.
14 K. Das et al.
References
1. Althoff M (2010) Reachability analysis and its application to the safety assessment of
autonomous cars. PhD thesis, Technische Universität München
2. Althoff M, Grebenyuk D (2016) Implementation of interval arithmetic in cora 2016. In:
ARCH@ CPSWeek, pp 91–105
3. Alur, R.: Principles of cyber-physical systems. MIT Press (2015)
4. Alur R, Courcoubetis C, Henzinger TA, Ho PH (1992) Hybrid automata: an algorithmic
approach to the specification and verification of hybrid systems. In: Hybrid systems. Springer,
pp 209–229
5. Alur R, Dill DL (1994) A theory of timed automata. Theoretical computer science 126(2):183–
235
6. Antoulas AC, Sorensen DC, Gugercin S (2001) A survey of model reduction methods for
large-scale systems. Contemporary Mathematics 280:193–219
7. Bak S, Duggirala PS (2017) Hylaa: a tool for computing simulation-equivalent reachability
for linear systems. In: Proceedings of the 20th international conference on hybrid systems:
computation and control. ACM, pp. 173–178
8. Brand D, Zafiropulo P (1983) On communicating finite-state machines. Journal of the ACM
(JACM) 30(2):323–342
9. Coddington EA, Levinson N (1955) Theory of ordinary differential equations. Tata McGraw-
Hill Education
10. Damm W, Harel D (2001) Lscs: Breathing life into message sequence charts. Formal methods
in system design 19(1):45–80
11. Donze A (2010) Breach: a toolbox for verification and parameter synthesis of hybrid systems.
In: In Computer-aided verification, pp 167–170
12. Duggirala PS, Mitra S, Viswanathan M, Potok M (2015) C2e2: a verification tool for stateflow
models. In: International conference on tools and algorithms for the construction and analysis
of systems. Springer, pp 68–82
13. Fehnker A, Ivancic F (2004) Benchmarks for hybrid systems verification. In: HSCC, vol 4.
Springer, pp 326–341
14. Frehse G, Le Guernic C, Donzé A, Cotton S, Ray R. Lebeltel O, Ripado R, Girard A, Dang
T, Maler O (2011) SpaceEx: scalable verification of hybrid systems. In: Proceedings of CAV.
LNCS, vol 6806. Springer, pp 379–395
15. Gurung A, Deka A, Bartocci E, Bogomolov S, Grosu R, Ray R (2016) Parallel reachability
analysis for hybrid systems. In: 2016 ACM/IEEE international conference on formal methods
and models for system design (MEMOCODE). IEEE, pp 12–22
16. Gurung A, Ray R, Bartocci E, Bogomolov S, Grosu R (2018) Parallel reachability analysis of
hybrid systems in XSpeed. Int J Softw Tools Technol Transf 1–23
17. Hainry E (2008) Reachability in linear dynamical systems. In: Conference on computability
in Europe. Springer, pp 241–250
18. Henzinger TA (2000) The theory of hybrid automata. In: Verification of digital and hybrid
systems. Springer, pp 265–292
19. Holzmann GJ (2012) Parallelizing the SPIN model checker. In: Proceedings of SPIN 2012.
LNCS, vol 7385. Springer, pp 155–171
20. Jensen JC, Chang DH, Lee EA (2011) A model-based design methodology for cyber-physical
systems. In: 2011 7th international wireless communications and mobile computing conference.
IEEE, pp 1666–1671
21. Jin X, Deshmukh JV, Kapinski J, Ueda K, Butts K (2014) Powertrain control verification bench-
mark. In: Proceedings of the 17th international conference on Hybrid systems: computation
and control. ACM, pp. 253–262
22. Lee EA, Seshia SA (2016) Introduction to embedded systems: a cyber-physical systems
approach. MIT Press
23. Lygeros J, Tomlin C, Sastry S (1999) Hybrid systems: modeling, analysis and control. preprint
Parallel Simulation of Cyber-Physical-Systems 15
24. Makhlouf IB, Kowalewski S (2014) Networked cooperative platoon of vehicles for testing
methods and verification tools. In: ARCH@ CPSWeek, pp 37–42
25. Mathworks: Model-Based Design (2020). https://www.mathworks.com/solutions/model-
based-design.html
26. Paterno F (1999) Model-based design and evaluation of interactive applications. Springer Sci-
ence & Business Media
27. Ray R, Gurung A, Das B, Bartocci E, Bogomolov S, Grosu R (2015) Xspeed: accelerating
reachability analysis on multi-core processors. In: Piterman N (ed) Hardware and software:
verification and testing—11th international haifa verification conference, HVC 2015, Haifa,
Israel, November 17-19, 2015, Proceedings. Lecture Notes in Computer Science, vol. 9434.
Springer, pp 3–18. https://doi.org/10.1007/978-3-319-26287-1_1
28. Reisig W (2012) Petri nets: an introduction, vol 4. Springer Science & Business Media
29. Serban R, Hindmarsh AC (2005) Cvodes: the sensitivity-enabled ode solver in sundials. In:
ASME 2005 international design engineering technical conferences and computers and infor-
mation in engineering conference. American Society of Mechanical Engineers, pp 257–269
30. Skogestad S, Postlethwaite I (2005) Multivariable Feedback Control: Analysis and Design.
John Wiley & Sons
Attack Detection Scheme Using Deep
Learning Approach for IoT
Vikash Kumar, Sidra Kalam, Ayan Kumar Das, and Ditipriya Sinha
1 Introduction
V. Kumar · D. Sinha
National Institute of Technology Patna, Patna 800005, India
e-mail: [email protected]
D. Sinha
e-mail: [email protected]
S. Kalam · A. K. Das (B)
Birla Institute of Technology, Mesra, Patna campus, Patna 800015, India
e-mail: [email protected]
© The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 17
R. Chaki et al. (eds.), Advanced Computing and Systems for Security: Volume 14,
Lecture Notes in Networks and Systems 242,
https://doi.org/10.1007/978-981-16-4294-4_2
18 V. Kumar et al.
caused the loss of $350M [1]. Traditional security measures cannot be applied to
IoT as they are low power and resource constrained. These issues can be resolved by
implementing fog layer, which is the extension of the cloud computing that enables
computing service to reside at the edge of the network. In fog layer, the deployed IoT
devices are of high capacity in terms of computational power and energy resource.
Thus, the task of Intrusion Detection System can be easily done in this layer, whereas
the low capacity devices of data sensing layer are deployed to sense different events.
This reduces the burden of the IoT as the storage, pre-processing and computation are
shifted to the nearby fog nodes. The security issue of the IoT generates the need for a
reliable Intrusion Detection System (IDS). An IDS is an application that detects the
malicious activity and classifies the data as malicious and benign at host level and at
network level. Network Intrusion Detection System (NIDS) uses network behavior to
detect attack and Host-based Intrusion Detection System (HIDS) uses system activ-
ities for the detection of attack. The proposed scheme will focus on the former one.
Network traffic is analyzed using anomaly detection and misuse detection. Misuse
detection matches the incoming traffic with already stored signatures for detecting
the attack. Database needs to be updated regularly for new types of attack. It cannot
detect an unknown attack on its own. Anomaly detection detects unknown attack
using behavioral analysis. In the proposed scheme, NIDS uses deep learning for the
training and classification of the attack and benign. The working of deep learning
is inspired by the way human brain thinks and takes the decision. It is an advanced
version of machine learning that is comprised of multiple layers. These layers are
used for feature extraction from the raw data. Each layer is trained to transform the
raw data into more intellectual and composite representation. The main motives of
this research are:
• Develop an anomaly-based intrusion detection model using deep learning
approach.
• Evaluation of the model for checking its efficiency.
The remainder of the paper is divided as—Sect. 2 deals with the study of related
field, Sect. 3 explains the overview of deep learning, Sect. 4 describes the proposed
work, Sect. 5 evaluates the performance of the proposed scheme, and the paper is
concluded in Sect. 6 followed by references.
2 Literature Survey
As IoT is nowadays a buzzword for the entire world, there come many barriers
along with it. Security is a major concern as it makes the system vulnerable to
many cyber-attacks. In order to resolve this issue, deep learning is used. Deep
learning has emerged as an advanced technique of machine learning. The tradi-
tional machine learning algorithms are less capable of attack detection as compar-
ative to the deep learning algorithm [2]. Multiple layer deep learning comprises of
multiple hidden layers, which encourages the model to detect the attacks in the IoT
Attack Detection Scheme … 19
network. There are many research works that discuss about the intrusion detection
using deep neural network. Nathan Shone and Tran Nguyen Ngoc use the non-
symmetric deep auto encoder (NDAE) for the intrusion detection [3]. They stacked
NDAEs in order to form deep learning hierarchy to deal with the complicated rela-
tionships between the features. NDAEs are comprised of multiple hidden layers,
which are non-symmetrical to learn the features from unlabeled data. Classification
of network traffic as normal or benign can be easily done by the neural network
concept. One more approach regarding this is Recurrent Neural Network (RNN)
that can also be used for malware detection [4]. Now a day, many new attacks are
attempting to exploit the system. In an attempt to protect the system against the
attack, first, we need to detect the attacks then only it can be prevented. Many deep
learning-based intrusion detection systems are developed [5] for this implementa-
tion. The attacker keeps on changing their methods every time, IoT network needs
an IDS, which should be flexible to deal with these issues. An intelligent intrusion
detection system is developed to detect and classify these unpredictable attacks [6]
in which network-based intrusion detection system (NIDS) and Host-based intrusion
detection system (HIDS) are combined to detect the cyber-attacks more efficiently.
When attacks are not detected for a longer period of time, it will affect the availability
of the system for the end user. It is very important to deal with these attacks in real
time to minimize the loss. An anomaly based intrusion detection system is devel-
oped, which implemented deep learning [7] to deal with these issues. This approach
worked successfully against wormhole attack, black hole attack, sinkhole attack,
DDoS and opportunistic service attack. DDoS attack is mostly common as it can be
easily spread on a larger scale. Restricted Boltzmann machines (RBM) specifically
handle the DDoS attack [8]. RBMs have the ability to learn the complex features in
an unsupervised learning system. In case of supervised learning, deep convolutional
neural network (DCNN) is also used. Hyun Min Song and Jiyoung Woo have also
developed a model, which uses DCNN in the IDS to provide security in Controller
Area Network (CAN) [9]. CAN is basically used to broadcast the information of the
current status of the vehicle. There are many more ways in which malicious activities
can govern the IoT system. It becomes very important to secure it from the various
types of cyber-attacks as it may lead to risk of life. Multiple IDS frameworks based
on deep learning are already in trend as it is successfully detecting the attacks and
simultaneously preventing the system with higher accuracy rate. Table 1 describes
the attacks detected in the existing schemes.
Deep learning is the breakthrough of the machine learning with increased accuracy
as compared with traditional learning algorithms. It is used for feature extraction and
training of the system. It is comprised of multiple consecutive layers that are used to
perform various operations. Each layer is interconnected to one another and output of
the previous layer is fed as an input to the next consecutive layer. Various application
Discovering Diverse Content Through
Random Scribd Documents
difficult to tell, for, obscure as the financial system of the Norman
period may be, it is clear that just as the rotulus exactorius recorded
the amounts to which the king was entitled from the firmarii of the
various counties, so these firmarii, in their turn, were entitled to
sums of ostensibly fixed amount from the various constituents of
their counties' "corpora." Domesday, however, while recording these
sums, shows us, in many remarkable cases, a larger "redditus" being
paid than that which was strictly due. The fact is that we are, and
must be, to a great extent, in the dark as to the fixity of these
ostensibly stereotyped payments. That the remarkable rise in the
annual firmæ exacted from the towns which, Domesday shows us,
had taken place since, and consequent on, the Conquest would
seem to imply that these firmæ, under the loose régime of the old
system, had been allowed to remain so long unaltered that they had
become antiquated and unduly low. In any case the Conqueror
raised them sharply, probably according to his estimate of the
financial capacity of the town. And this step would, of course,
involve a rise in the total of the firma exacted from the corpus
comitatus. The precedent which his father had thus set was probably
followed by Henry I., who appears to have exacted, systematically,
the uttermost farthing. It was probably, however, to the oppressive
use of the "placita" included in the "firma comitatus" that the sheriffs
mainly trusted to increase their receipts.
But whatever may have been the means of extortion possessed by
the sheriffs in the towns within their rule,[1044] and exercised by them
to recoup themselves for the increased demands of the Crown, we
know that such means there must have been, or it would not have
been worth the while of the towns to offer considerable sums for the
privilege of paying their firmæ to the Crown directly, instead of
through the sheriffs.[1045]
I would now institute a comparison between the cases of Lincoln
and of London. In both cases the city formed part of the corpus
comitatus; in both, therefore, its firma was included in the total ferm
of the shire. Lincoln was at this time one of the largest and
wealthiest towns in the country. Its citizens evidently had reason to
complain of the exactions of the sheriff of the shire. London, we
infer, was in the same plight. Both cities were, accordingly, anxious
to exclude the financial intervention of the sheriff between
themselves and the Crown. How was this end to be attained? It was
attained in two different ways varying with the circumstances of the
two cases. London was considerably larger than Lincoln, and
Middlesex infinitely smaller than Lincolnshire. Thus while the firma of
Lincoln represented less than a fifth of the ferm of the shire,[1046]
that of London would, of course, constitute the bulk of the ferm of
Middlesex. Lincoln, therefore, would only seek to sever itself
financially from the shire; London, on the contrary, would endeavour
to exclude, still more effectually, the sheriff, by itself boldly stepping
into the sheriff's shoes. The action of the citizens of Lincoln is
revealed to us by the Roll of 1130:—
"Burgenses Lincolie reddunt compotum de cc marcis argenti et iiij marcis auri ut
teneant ciuitatem de Rege in capite" (p. 114).
The same Roll is witness to that of the citizens of London:—
"Homines Londonie reddunt compotum de c marcis argenti ut habeant
Vic[ecomitem?] ad electionem suam" (p. 148).
I contend that these two passages ought to be read together. No
one appears to have observed the fact that the sequel to the above
Lincoln entry is to be found in the Pipe-Roll of 1157 (3 Hen. II.). We
there find £140 deducted from the ferm of the shire in consideration
of the severance of the city from the corpus comitatus ("Et in
Civitate Lincol[nie] CXL libræ blancæ"). But we further find the
citizens of Lincoln, in accounting for their firma to the Crown direct,
accounting not for £140, but for £180. It must, consequently, have
been worth their while to offer the Crown a sum equivalent to about
a year's rental for the privilege of paying it £180 direct rather than
£140 through the sheriff.[1047] Such figures are eloquent as to the
extortions from which they had suffered. The citizens of London, as I
have said, set to work a different way. They simply sought to lease
the shrievalty of the shire themselves. I can, on careful
consideration, offer no other suggestion than that the hundred
marcs for which they account in the Roll of 1130, represent the
payment by which they secured a lease of the shrievalty for the year
1129-1130, the shrievalty being held in that year by the "quatuor
vicecomites" of the Roll. I gather from the Roll that Fulcred fitz
Walter had been sheriff for 1128-29, and his payment "de gersoma"
is, I take it, represented in the case of the following year (1129-30)
by these hundred marks, the "quatuor vicecomites" themselves
having paid nothing "de gersoma." On this view, the citizens must
have leased the shrievalty themselves and then put in four of their
fellows, as representing them, to hold it. But, obviously, such a post
was not one to be coveted. To exact sufficient from their fellow-
citizens wherewith to meet the claims of the Crown would be a task
neither popular nor pleasant. Indeed, the fact of the citizens
installing four "vicecomites" may imply that they could not find any
one man who would consent to fill a post as thankless as that of the
hapless decurio in the provinces of the Roman Empire, or of the
chamberlain, in a later age, in the country towns of England. Hence
it may be that we find it thus placed in commission. Hence, also, the
eagerness of these vicecomites to be quit of office, as shown by
their payment, for that privilege, of two marcs of gold apiece.[1048] It
may, however, be frankly confessed that the nature of this payment
is not so clear as could be wished. Judging from the very ancient
practice with regard to municipal offices, one would have thought
that such payments would probably have been made to their fellow-
citizens who had thrust on them the office rather than to the Crown.
Moreover, if their year of office was over, and the city's lease at an
end, one would have thought they would be freed from office in the
ordinary course of things. The only explanation, perhaps, that
suggests itself is that they purchased from the Crown an exemption
from serving again even though their fellow-citizens should again
elect them to office.[1049] But I leave the point in doubt.
The hypothesis, it will be seen, that I have here advanced is that
the citizens leased the shrievalty (so far as we know, for the first
time) for the year 1129-30. We have the names of those who held
the shrievalty at various periods in the course of the reign, before
this year, but there is no evidence that, throughout this period, it
was ever leased to the citizens. The important question which now
arises is this: How does this view affect the charter granted to the
citizens by Henry I.?
We have first to consider the date to which the charter should be
assigned. Mr. Loftie characteristically observes that Rymer, "from the
names appended to it or some other evidence, dates it in 1101."[1050]
As a matter of fact, Rymer assigns no year to it; nor, indeed, did
Rymer himself even include it in his work. In the modern enlarged
edition of that work the charter is printed, but without a date, nor
was it till 1885 that in the Record Office Syllabus, begun by Sir T. D.
Hardy, the date 1101 was assigned to it.[1051] That date is possibly to
be traced to Northouck's History of London (1773), in which the
commencement of Henry's reign is suggested as a probable period
(p. 27). This view is set forth also in a modern work upon the
subject.[1052] It is not often that we meet with a charter so difficult to
date. The formula of address, as it includes justices, points,
according to my own theory, to a late period in the reign, as also
does the differentiation between the justice and the sheriff. And the
witnesses do the same. But there is, unfortunately, no witness of
sufficient prominence to enable us to fix the date with precision. All
that we can say is that such a name as that of Hugh Bigod points to
the period 1123-1135, and that, of the nine witnesses named, seven
or eight figure in the Pipe-Roll of 1130 (31 Hen. I.). This would
suggest that these two documents must be of about the same date.
Now, though we cannot trace the tenure of the shrievalty before
Michaelmas, 1128, from the Roll, there is, as I have said, no sign
that this charter had come into play. Nor is it easy to understand
how or why it could be withdrawn within a very few years of its
grant. In short, for this view there is not a scrap of evidence; against
it, is all probability. If, on the contrary, we adopt the hypothesis
which I am now going to advance, namely, that the charter was later
than the Pipe-Roll, the difficulties all vanish. By this view, the lease
for a year, to which the Pipe-Roll bears witness, would be succeeded
by a permanent arrangement, that lease of the ferm in perpetuity,
which we find recorded in the charter.
It is, indeed, evident that the contrary view rests solely on the
guess at "1101," or on the assumption of Dr. Stubbs that the charter
was earlier than the Pipe-Roll. Mr. Freeman and others have merely
followed him. Dr. Stubbs writes thus:—
"Between the date of Henry's charter and that of the great Pipe-Roll, some
changes in the organization of the City must have taken place. In 1130 there were
four sheriffs or vicecomites, who jointly account for the ferm of London, instead of
the one mentioned in the charter; and part of the account is rendered by a
chamberlain of the City. The right to appoint the sheriffs has been somehow
withdrawn, for the citizens pay a hundred marks of silver that they may have a
sheriff of their own choice," etc., etc.[1053]
But our great historian nowhere tells us what he considers "the date
of Henry's charter" to have been. If that date was subsequent to the
Pipe-Roll, the whole of his argument falls to the ground.
The substitution of four sheriffs for one, to which Dr. Stubbs
alludes, is a matter of slight consequence, for the number of the
"vicecomites" varies throughout. As a matter of fact, the abbreviated
forms leave us, as in the Pipe-Roll of 1130, doubtful whether we
ought to read "vicecomitem" or "vicecomites," and even if the
former is the one intended, we know, both in this and other cases,
that there was nothing unusual in putting the office in commission
between two or more. As to the chamberlain, he does not figure in
connection with the firma, with which alone we are here concerned.
But, oddly enough, Dr. Stubbs has overlooked the really important
point, namely, that the firma is not £300, as fixed by the charter, but
over £500.[1054] This increases the discrepancy on which Dr. Stubbs
lays stress. The most natural inference from this fact is that, as on
several later occasions, the Crown had greatly raised the firma
(which had been under the Conqueror £300), and that the citizens
now, by a heavy payment, secured its reduction to the original
figure. Thus, on my hypothesis that the charter was granted
between 1130 and 1135, the Crown must have been tempted, by
the offer of an enormous sum down, to grant (1) a lease in
perpetuity, (2) a reduction of the fee-farm rent ("firma") to £300 a
year. As the sum to which the firma had been raised by the king,
together with the annual gersoma, amounted to some £600 a year,
such a reduction can only have been purchased by a large payment
in ready money.
It was, of course, by such means as these that Henry accumulated
the vast "hoard" that the treasury held at his death. He may not
improbably in collecting this wealth have kept in view what appears
to have been the supreme aim of his closing years, namely, the
securing of the succession to his heirs. This was to prove the means
by which their claims should be supported. It would, perhaps, be
refining too much to suggest that he hoped by this charter to attach
the citizens to the interests of his line, on whom alone it could be
binding. In any case his efforts were notoriously vain, for London
headed throughout the opposition to the claims of his heirs. I cannot
but think that his financial system had much to do with this result,
and that, as with the Hebrews at the death of Solomon, the citizens
of London bethought them only of his "grievous service" and his
"heavy yoke," as when they met the demand of his daughter for an
enormous sum of money[1055] by bluntly requesting a return to the
system of Edward the Confessor.[1056]
In any case the concessions in Henry's charter were wholly
ignored both by Stephen and by the Empress, when they granted in
turn to the Earl of Essex the shrievalty of London and Middlesex
(1141-42).
A fresh and important point must, however, now be raised. What
was the attitude of Henry II. towards his grandfather's charter? Of
our two latest writers on the subject, Mr. Loftie tells us that
"Henry II. was too astute a ruler not to put himself at once on a good footing with
the citizens. One of his first acts was to confirm the Great Charter of his
grandfather."[1057]
Miss Norgate similarly asserts that "the charter granted by
Henry II. to the citizens, some time before the end of 1158, is simply
a confirmation of his grandfather's."[1058] Such, indeed, would seem
to be the accepted belief. Yet, when we compare the two
documents, we find that the special concessions with which I am
here dealing, and which form the opening clauses of the charter of
Henry I., are actually omitted altogether in that of Henry II.![1059]
This leads us to examine the rest of the latter document. To facilitate
this process I have here arranged the two charters side by side, and
divided their contents into numbered clauses, italicizing the points of
difference.
(2) Sint quieti de schot et de loth de (2) Concessi etiam eis quietanciam
Danegildo et de murdro, et nullus murdri, [et[1061]] infra urbem et
eorum faciat bellum. Portsokna,[1062] et quod nullus[1063]
faciat bellum.[1064]
(4) Et infra muros civitatis nullus (4) Infra muros nemo capiat
hospitetur, neque de mea familia, hospitium per vim vel per
neque de alia, nisi alicui hospitium liberationem Marescalli.
liberetur.
(8) Et amplius non sit miskenninga (8) In civitate in nullo placito sit
in hustenge, neque in folkesmote, miskenninga; et quod Hustengus
neque in aliis placitis infra civitatem; semel tantum in hebdomada
Et husteng sedeat semel in teneatur.
hebdomada, videlicet die Lunæ.
inexplicable without it, that the firma is again, under Henry II., found
to be not £300, but over £500 a year.
In 1164 (10 Hen. II.) the firma of London, if I reckon it right, was,
as in 1130 (31 Hen. I.), about £520.[1080] In 1160 (6 Hen. II.) it was
a few pounds less,[1081] and in 1161 (7 Hen. II.) it was little, it would
seem, over £500.[1082] But in these calculations it is virtually
impossible to attain perfect accuracy, not only from the system of
keeping accounts partly in libræ partly in marcæ, and partly in
money "blanched" partly in money "numero," but also from the fact
that the figures on the Pipe-Rolls are by no means so infallible as
might be supposed.[1083]
Nor does the charter of Richard I. (April 23, 1194) make any
change. It merely confirms that of his father. But John, in addition to
confirming this (June 17, 1199), granted a supplementary charter
(July 5, 1199)—
"Sciatis nos concessisse et præsenti Charta nostra confirmasse civibus
Londoniarum Vicecomitatum Londoniarum et de Middelsexia, cum omnibus rebus
et consuetudinibus quæ pertinent ad prædictum Vicecomitatum ... reddendo inde
annuatim nobis et heredibus nostris ccc libras sterlingorum blancorum.... Et
præterea concessimus civibus Londoniarum, quod ipsi de se ipsis faciant
Vicecomites quoscunque voluerint, et amoveant quando voluerint; ... Hanc vero
concessionem et confirmationem fecimus civibus Londoniarum propter
emendationem ejusdem civitatis et quia antiquitus consuevit esse ad firmam pro
ccc libris."[1084]
Here at length we return to the concessions of Henry I., with
which this charter of John ought to be carefully compared. With the
exception of the former's provision about the "justiciar" (an
exception which must not be overlooked), the concessions are the
same. The subsequent raising of the firma to £400 (in 1270), and its
eventual reduction to £300 (in 1327), have been already dealt with
(pp. 358, 359).
We see then that, in absolute contradiction of the received belief
on the subject, the shrievalty was not in the hands of the citizens
during the twelfth century (i.e. from "1101"), but was held by them
for a few years only, about the close of the reign of Henry I. The fact
that the sheriffs of London and Middlesex were, under Henry II. and
Richard I., appointed throughout by the Crown, must compel our
historians to reconsider the independent position they have assigned
to the City at that early period. The Crown, moreover, must have
had an object in retaining this appointment in its hands. We may
find it, I think, in that jealousy of exceptional privilege or exemption
which characterized the régime of Henry II. For, as I have shown,
the charters to Geoffrey remind us that the ambition of the urban
communities was analogous to that of the great feudatories in so far
as they both strove for exemption from official rule. It was precisely
to this ambition that Henry II. was opposed; and thus, when he
granted his charter to London, he wholly omitted, as we have seen,
two of his grandfather's concessions, and narrowed down those that
remained, that they might not be operative outside the actual walls
of the city. When the shrievalty was restored by John to the citizens
(1199), the concession had lost its chief importance through the
triumph of the "communal" principle. When that civic revolution had
taken place which introduced the "communa" with its mayor—a
revolution to which Henry II. would never, writes the chronicler, have
submitted—when a Londoner was able to boast that he would have
no king but his mayor, then had the sheriff's position become but of
secondary importance, subordinate, as it has remained ever since, to
that of the mayor himself.
The transient existence of the local justitiarius is a phenomenon of
great importance, which has been wholly misunderstood. The
Mandeville charters afford the clue to the nature of this office. It
represents a middle term, a transitional stage, between the
essentially local shire-reeve and the central "justice" of the king's
court. I have already (p. 106) shown that the office sprang from "the
differentiation of the sheriff and the justice," and represented, as it
were, the localization of the central judicial element. That is to say,
the justitiarius for Essex, or Herts., or London and Middlesex, was a
purely local officer, and yet exercised, within the limits of his
bailiwick, all the authority of the king's justice. So transient was this
state of things that scarcely a trace of it remains. Yet Richard de Luci
may have held the post, as we saw (p. 109), for the county of Essex,
and there is evidence that Norfolk had a justice of its own in the
person of Ralf Passelewe.[1085] Now, in the case of London, the office
was created by the charter of Henry I., granted (as I contend)
towards the end of his reign, and it expired with the accession of
Henry II. It is, therefore, in Stephen's reign that we should expect to
find it in existence; and it is precisely in that reign that we find the
office eo nomine twice granted to the Earl of Essex and twice
mentioned as held by Gervase, otherwise Gervase of Cornhill.[1086]
The office of the "Justiciar of London" should now be no longer
obscure; its possible identity with those of portreeve, sheriff, or
mayor cannot, surely, henceforth be maintained.
"It has been supposed that the "The next substantial benefit
justiciar here mentioned they derived from the charter
means a mayor or chief was the leave to elect their
magistrate, and that the grant own justiciar. They may place
includes that of the election of whom they will to hold pleas of
the supreme executive officer the Crown. The portreeve is
of the City. It may be so, but here evidently intended, for it
all probability is against this is manifestly absurd to
view. For by this time the suppose, as some have done,
citizens already appear to have that Henry allowed the citizens
selected their own portreeve, to elect a reeve for Middlesex,
by whatever name he was if they could not elect one for
called; and it is absurd to themselves; and if proof were
suppose that the king gave wanting, we have it in the
them power to appoint a references to the trials before
sheriff of Middlesex, if they the portreeve which are found
were not already allowed to in very early documents. In
appoint their own. The one of these, which cannot be
omission of any reference to dated later than 1115, Gilbert
the portreeve in the charter Proudfoot, or Prutfot,
cannot, in fact, be otherwise described as vicecomes, is
accounted for" (History of mentioned as having some
London, i. 90). time before given judgment
against the dean and chapter
as to a piece of land on the
present site of the Bank of
England" (London, p. 29).
[1018] Ninth Report Hist. MSS., i. 66 b.
[1019] Reference to p. 110, supra, will show at once how vain
is the effort to wrench "justitiarius" from its natural and well-
known meaning.
[1020] See Appendix O.
[1021] Here and elsewhere I use "shire" on the strength of
Middlesex having a "sheriff" (i.e. a shire-reeve).
[1022] London, p. 126.
[1023] This springs, of course, from what I have termed "the
fundamental error."
[1024] See p. 37, ante, and Norm. Conq., iii. (1869) 424, 544,
729.
[1025] I would suggest that, as in the case of Ulf, the Reeve
of "London and Middlesex" might be addressed as portreeve in
writs affecting the City and as shire-reeve in those more
particularly affecting the rest of Middlesex.
[1026] Dr. Stubbs, in a footnote, hazards "the conjecture" that
"the disappearance of the portreeve" may be connected with "a
civic revolution, the history of which is now lost, but which
might account for the earnest support given by the citizens to
Stephen," etc. In another place (Select Charters, p. 300) he
writes: "How long the Portreeve of London continued to exist is
not known; perhaps until he was merged in the mayor." I have
already dealt with Mr. Loftie's explanation of "the omission of
any reference to the portreeve" in the charter.
[1027] See p. 37, ante, and Addenda.
[1028] See Athenæum, February 5, 1887, p. 191; also my
papers on "The First Mayor of London" in Academy, November
12, 1887, and Antiquary, March, 1887.
[1029] Const. Hist., i. 404.
[1030] "The ... shire organization which seems to have
displaced early in the century" [i.e. by Henry's charter] "the
complicated system of guild and franchise" (ibid., i. 630).
[1031] Ibid., i. 405.
[1032] This was written before the days of the London County
Council.
[1033] Ibid., i. 630.
[1034] Liber de Antiquis Legibus, p. 124: "Circa idem tempus,
scilicet Pentecosten (1270), ad instantiam domini Edwardi
concessit Dominus Rex civibus ad habendum de se ipsis duos
Vicecomites, qui tenerent Vicecomitatum Civitatis et Midelsexiæ
ad firmam sicut ante solebant: Ita, tamen, cum temporibus
transactis solvissent inde tantummodo per annum ccc libras
sterlingorum blancorum, quod de cetero solvent annuatim cccc
libras sterlingorum computatorum.... Et tunc tradite sunt
civibus omnes antique carte eorum de libertatibus suis que
fuerunt in manu Domini Regis, et concessum est eis per
Dominum Regem et per Dominum Edwardum ut eis plenarie
utantur, excepto quod pro firma Civitatis et Comitatus solvent
per annum cccc libras, sicut præscriptum est.
"Tunc temporis dederunt Cives Domino Regi centum marcas
sterlingorum.... Dederunt etiam Domino Edwardo Vᶜ. marcas ad
expensas suas in itinere versus Terram Sanctam." This passage
is quoted in full because, important though the transaction is,
not a trace of it is to be found in The Historical Charters and
Constitutional Documents of the City of London (1884), the
latest work on the subject. So, in 1284, when Edward I., who
had "taken into his hands" the town of Nottingham for some
years, restored the burgesses their liberties, it was at the price
of their firma being raised from £52 to £60 a year.
[1035] History of London, ii. 208, 209.
[1036] A curious illustration of the fact that this firma arose
out of the city and county alike is afforded by Henry III.'s
charter (1253): "quod vii libre sterlingorum per annum
allocarentur Vicecomitibus in firma eorum pro libertate ecclesiæ
sancti Pauli."
[1037] This is illustrated by the subsequent prohibition of the
sheriffs themselves underletting the county at "farm" (Liber
Custumarum, p. 91; Liber Albus, p. 46).
[1038] Rot. Pip., 31 Hen. I., p. 2.
[1039] Ibid., p. 122.
[1040] Ibid., p. 100.
[1041] Ibid., p. 52.
[1042] "William de Einesford, vicecomes de Londoniâ," heads
the list of witnesses to a London agreement assigned to 1114-
1130 (Ramsey Cartulary, i. 139).
[1043] Rot. Pip., 31 Hen. I., p. 144.
[1044] Probably the mysterious "scotale" was among them
(cf. Stubbs, Const. Hist., i. 628).
[1045] Cf. Stubbs, Const. Hist., i. 410.
[1046] The ferm of Lincolnshire in 1130 was rather over £750
(£40 "numero" plus £716 16s. 3d. "blanch").
[1047] We have a precisely similar illustration, ninety years
later, in the case of Carlisle. In 5 Hen. III. (1220-21) the
citizens of Carlisle obtained permission to hold their city ad
firmam for £60 a year payable to the Crown direct, in the place
of £52 a year payable through the sheriff ("per vicecomitem")
and his ferm of the shire (Ninth Report Hist. MSS., App. i. pp.
197, 202).
[1048] Rot. Pip., 31 Hen. I., p. 149.
[1049] Compare Henry III.'s charter to John Gifard of
Chillington, conceding that during his lifetime he should not be
made a sheriff, coroner, or any other bailiff against his will
(Staffordshire Collections, v. [1] 158).
[1050] History of London, ii. 88. Compare Mr. Loftie's London
("Historic Towns"), p. 28: "The exact date of the charter is
given by Rymer as 1101."
[1051] Vol. iii. p. 4.
[1052] The Charters of the City of London (1884), p. xiiii.: "To
engage the citizens to support his Government he conferred
upon them the advantageous privileges that are conferred in
this charter."
[1053] Const. Hist., i. 406.
[1054] £327 3s. 11d. "blanch," plus £209 6s. 5½d. "numero."
[1055] "Infinitæ copiæ pecuniam ... cum ore imperioso ab eis
exegit" (Gesta Stephani).
[1056] "Interpellata est et a civibus ut leges eis regis Edwardi
observare liceret, quia optimæ erant, non patris sui Henrici quia
graves erant" (Cont. Flor. Wig.).
[1057] London ("Historic Towns"), p. 38. The Master of
University similarly writes: "He [Henry II.] renewed the charter
of the city of London" (i. 90).
[1058] England under the Angevin Kings, ii. 471. The writer,
being only acquainted with the printed copy of the charter
(Liber Custumarum, ed. Riley, pp. 31, 32), had only the names
of the two witnesses there given (the Archbishop of Canterbury
and the Bishop of London) to guide her, but, fortunately, the
Liber Rubeus version records all the witnesses (thirteen in
number) together with the place of testing, thus limiting the
date to 1154-56, and virtually to 1155.
[1059] The omitted clauses are these: "Sciatis me concessisse
civibus meis Londoniarum, tenendum Middlesex ad firmam pro
ccc libris ad compotum, ipsis et heredibus suis, de me et
heredibus meis, ita quod ipsi cives ponent vicecomitem qualem
voluerint de se ipsis, et justitiarium qualem voluerint de se
ipsis, ad custodiendum placita coronæ meæ et eadem
placitanda; et nullus alius erit justitiarius super ipsos homines
Londoniarum."
[1060] "Lond'" (Liber Rubeus).
[1061] "Et" omitted in L. R.
[1062] "Portsoca" (L. R.).
[1063] "Nullus eorum" (L. R.).
[1064] "Duellum" (L. R.).
[1065] "Pertinentibus" (L. R.).
[1066] "London'" (L. R.).
[1067] "Port'" (L. R.).
[1068] "Regis H." (L. R.).
[1069] "Consuetudinem" (L. R.).
[1070] "Lond'" (L. R.).
[1071] "Apud Lond' teneantur" (L. R.).
[1072] Clauses 11 and 12 in the charter of Henry I. are
transposed in that of Henry II. But it is more convenient to
show the transposition as I have done in the text.
[1073] "Eas habuerunt" (L. R.).
[1074] "Omnes sint" (L. R.).
[1075] "Yeresgieve" (L. R.).
[1076] "London'" (L. R.).
[1077] The first two witnesses to that of Henry I. are given as
"episcopo Winton., Roberto filio Richer. (sic)." The bishop's
initial ought to be given, and the second witness is probably
identical with Robert fitz Richard. "Huberto (sic) regis
camerario" has also a suspicious sound. In the second charter
the witnesses are given in the Liber Custumarum as
"Archiepiscopo Cantuariæ, Ricardo Episcopo Londoniarum."
Here, again, the primate's initial should be given; as, indeed, it
is in the (more accurate) Liber Rubeus version, where (vide
supra, p. 367) all the witnesses are entered.
[1078] This explanation is confirmed by examining other
municipal charters based on that of London. In them this
clause always confirms (1) "terras et tenuras," (2) "vadia," (3)
"debita."
[1079] In confirmation of this view, it may be pointed out that
where this same clause occurs in charters to other towns, the
words are "vicecomes noster" in cases, as at Winchester, where
the king retains in his hand the appointment of reeve, but
simply (as at Lincoln) "præpositus" or (as at Northampton)
"præpositus Northamtonie," where the right to elect the reeve
was also conceded.
[1080] £66 17s. 1d. "blanch" plus £474 17s. 10½d. "numero."
[1081] £445 19s. "blanch" plus £78 3s. 6d. "numero."
[1082] £181 14s. 5d. "blanch" plus £335 0s. 7d. "numero."
[1083] As an example of the possibility of error, in the printed
Roll of 1159 (5 Hen. II.) a town is entered on the Roll as paying
"quater xx. lv. libras et ii marcas et dim'." The explanation of
this unintelligible entry is, I may observe, as follows. The
original entry evidently ran, "quater xx et ii marcas et dim'"
(82½ marcs). Over this a scribe will have written the equivalent
amount in pounds ("lv libræ") by interlineation. Then came the
modern transcriber, who with the stupidity of a mechanical
copyist brought down this interlineation into the middle of the
entry, thus converting it into sheer nonsense. We have also to
reckon with such clerical errors as the addition or omission of
an "x" or an "i," of a "bl." or a "no." Where the total to be
accounted for is stated separately, we have a means of
checking the accounts. But where, as at London, this is not so,
we cannot be too careful in accepting the details as given. See
also Addenda.
[1084] Liber Custumarum (Rolls Series), pp. 249-251.
[1085] "Contra Radulfum de Belphago qui tunc vicecomes
erat in provincia illa et contra Radulfum Passelewe ejusdem
provinciæ justiciarium" (Ramsey Cart., i. 149).
[1086] See Appendix K, on "Gervase of Cornhill."
APPENDIX Q
OSBERTUS OCTODENARII.
(See p. 170.)
The reference to this personage in the charter to the Earl of Essex is
of quite exceptional interest. He was the Osbert (or Osbern) "Huit-
deniers" (alias "Octodenarii" alias "Octonummi") who was a wealthy
kinsman of Becket and employed him, in his house, as a clerk about
this very time (circ. 1139-1142). We meet him as "Osbertus VIII.
denarii" at London in 1130 (Rot. Pip., 31 Hen. I.), and I have also
found him attesting a charter of Henry I., late in the reign, as
"Osberto Octodenar[ii]." Garnier[1087] tells us that the future saint—
"A soen parent vint, un riche hume Lundreis,
Ke mult ert koneiiz et de Frauns et d'Engleis,
O Osbern witdeniers, ki l'retint demaneis.
Puis fu ses escriveins, ne sais dous ans, u treis."