Corporate Finance, DeFi, Blockchain, Web3 News
Corporate Finance, DeFi, Blockchain News

Blockchain technology and Self-stabilising systems

By Ben van Lier - Centric.

Ben van Lier
Ben van Lier
In 1954, one of the pioneers behind cybernetics, W. Ross Ashby, defined homeostasis as behaviour of interconnected machines that “is adaptive if it maintains the essential variables within physiological limits”. [1] Ashby based his definition on experiments he conducted with four interconnected machines that formed a new whole that he called the Homeostat. Operational stability of this new whole is achieved as one of the whole’s properties. In fact, Ashby considered this particular property a form of autonomous coordination of activities by and between the various machines.

In today’s age, devices and machines are increasingly interconnected in networks such as the (Industrial) Internet of Things, offering not only new possibilities but also creating rapidly growing threats that we are still insufficiently aware of and to which we certainly still lack an adequate response. Research into the essence of seemingly new technology such as blockchain technology or cybersecurity may produce new combinations for the development of new knowledge and applications.

Blockchain technology and self-stabilising systems

Ashby considered it a given that two or multiple systems can be interconnected. By creating interconnections, different systems acquire an ability to communicate and interact, thus forming a new whole. For Ashby, creating stability in this new whole is a form of ‘adaptive behaviour’. He claimed that “change of stability can only be due to change of value of a parameter, and change of value of a parameter causes a change in stability.”

In the early 1970s, Edsger W. Dijkstra raised the question whether self-stability as a feature of a whole made up of interconnected systems could be interesting on a scale “from a world-wide network to a common bus control.” Dijkstra defines self-stability in systems in this context as follows: “We call the system self-stabilising if and only if, regardless of the initial state and regardless of the privilege selected each time for the next move, at least one privilege will always be present and the system is guaranteed to find itself in a legitimate state after a finite number of moves.” [2]

That same year, Lamport added the following to Dijkstra’s definition: “Self-stabilizing systems represent ones which are self-correcting:even if they reach an incorrect state through some transient malfunction, they will eventually resume correct operation.”[3] The nuance that Lamport added to the definition opens up the possibility of having networked machines communicate as neighbours as soon as a specific connection has been established between the neighbours. Lamport thus laid the basis for thinking about distributed operating systems that are interconnected in networks, stating that “a distributed system consists of a collection of distinct processes which are spatially separated, and which communicate with one another by exchanging messages. A network of interconnected computers, such as the ARPA net, is a distributed system.”

Reliable exchange of messages makes sure that the functioning of the whole of interconnected systems cannot be disrupted by changes to one or several of the connected systems. Lamport ultimately included the principles of self-stabilisation in the PAXOS algorithm, paving the way for the development of a self-stabilising whole of interconnected systems that, based on collective decision-making and information-sharing, are able to keep functioning, even in the face of changes from outside the system in one or multiple connected systems.

In 2018 [4], the US National Institute of Standards and Technology (NIST) established that blockchain technology basically originated in the 1980s and 1990s, evolving largely out of the development of the PAXOS algorithm as a consensus protocol that allows interconnected machines to agree on a specific result. These concepts are, according to NIST, the basis for digital currency such as the Bitcoin cryptocurrency.


Singer [5] argued that, in this day and age, the concept of changes that come from outside the system is more relevant than ever, as we increasingly face cybersecurity issues when an outsider “seeks to gain something from the activity, whether to obtain private information, undermine the system, or prevent its legitimate use”. Willingly penetrating one or multiple networks of interconnected systems or components of such networks, with a view to disrupting the functioning of the whole, is a growing and very current threat to the workings of our society. The extent of this new threat continues to grow, as pointed out by Schneier when he said that “everything is becoming one hyper-connected system in which, even if things don’t interoperate, they’re on the same network and affect each other”. [6]

Such systems are also referred to as cyber-physical systems. NIST defines such systems as “smart systems that include engineered interacting networks of physical and computational components.” [7] These smart networked systems are incorporating more and more devices that we use in our everyday life (smartphones, TVs, refrigerators, cars), in our day-to-day work (industrial robots, power grids) and in healthcare (MRI scanners, electronic infusion pumps, implanted glucometers, et cetera). They are all systems that operate in a distributed manner and are connected in networks such as the Internet, communicating and interacting in these networks by exchanging messages.


Systems are furthermore often hard to secure or entirely unprotected. It is becoming increasingly clear that illegally gaining access to one or multiple systems can cause severe disruption of the greater network. Recent incidents such as Operation Cloud Hopper, ransomware attacks on Maersk in Rotterdam and Hydros in Norway, Hatman malware in the petrochemical industry, or crash override attacks on power grids have shown that the vast number of wholes of interconnected systems that we use today cannot simply be assumed to be secure. In light of this, Kello argued that “understanding the cyber question requires a new paradigm of security commensurate with it, one that privileges not just physical but also nonphysical threats and that elevates nonstate actors to a higher level of theoretical existence than the traditionalist viewpoint allows.” [8]

Understanding the new cyber-threat is impossible without first understanding the essence of the new networks and the devices and machines that operate within them in a distributed fashion, making up cyber-physical systems that communicate and interact in changing combinations. There seems to be, however, real potential in combining the possibilities for self-stabilisation of interconnected systems to enable them to assimilate or correct changes to the behaviour of one or several participating systems, thus protecting their joint security. Still, to further flesh out the new combination, we need greater knowledge of the possibilities for self-stabilisation by collaborating cyber-physical systems and the relation to their joint security.


The technological developments that are shaping our present-day world, such as the Internet, (Industrial) Internet of Things and cyber-physical systems, are the product of rapid development of knowledge over the past seventy years. As knowledge grew, new technologies and applications, as well as new threats, have emerged that together constitute the growing technological enframing of our day-to-day lives and working practices. Heidegger believed that the essence of new technology will only truly manifest itself in a world of ignorance and oblivion. In its current manifestation of interconnected systems that jointly make up a new whole, technology is forcing us to find the essence of this new technology fast, so as to be able to deal with the threats that ensue from this essence and to figure out how it affects us as humans. Like Heidegger said, “the essence of technology lies in what from the beginning and before all else gives food for thought.” [9]

Research into the essence of new and interconnected technology as it has developed so far should focus not only on new possibilities offered by the technology, but also on the potential threats arising from the autonomous operations of this new whole. Developing new knowledge and insights based on analyses of the history and background to the possibilities and threats that come with interconnectedness can help us overcome our ignorance and oblivion, while also contributing to finding new stability between systems mutually and between systems and humans.

[1] Ashby, R.W. (1954) Design for a Brain. New York, John Wiley & Sons Inc.
[2] Dijkstra, E. W. (1974) Self-Stabilizing Systems in Spite of Distributed Control. Commun. ACM 17 (1974), 11: 643-644
[3] Lamport, L. (1974) On Self-Stabilizing Systems. Massachusetts Computer Associates Inc. 5 December 1974 CA 7412-0511
[4] Yaga, D., Mell, P., Roby, N., Scarfone, K. (2018) National Institute of Standards and Technology. Blockchain Technology Overview 2. Draft NISTIR 8202. January 2018
[5] Singer, P. W. and Friedman, A. (2014) Cybersecurity and Cyberwar. What Everyone Needs to Know. New York, Oxford University Press. ISBN 9780199918119
[6] Schneier, B. (2018) Click Here to Kill Everybody. Security and Survival in a Hyper-Connected World. New York, W.W. Norton & Company. ISBN 9780393608885
[7] National Institute of Standards and Technology (2017), Framework for Cyber-Physical Systems. Volume 11, NIST Special Publication 1500-201 Version 1.0 Cyber-Physical Systems Public Working Group.
[8] Kello, L. (2017) The Virtual Weapon and International Order. New Haven, Yale University Press. ISBN 9780300220230
[9] Heidegger, M. (1964) What is Called Thinking? Translated by Gray, J. G. New York, Harper Perennial. ISBN 006090528X

Ben van Lier works at Centric as Director Strategy & Innovation and, in that function, is involved in research and analysis of developments in the areas of overlap between organisation and technology within the various market segments.


Lisez gratuitement le quotidien Finyear & sa newsletter quotidienne.
Recevez chaque matin par mail la newsletter Finyear, une sélection quotidienne des meilleures infos et expertises en finance digitale, corporate finance & crypto finance.

Read for free The daily newspaper Finyear & its daily newsletter.
Receive the Finyear's newsletter every morning by email, a daily snapshot of the best news and expertise in digital finance, corporate finance & crypto finance.


Chaineum :
Fondée en 2015, Chaineum est un cabinet de conseil en opérations de haut de bilan offrant une expertise de premier plan en matière d’ICO et STO, avec une vision stratégique orientée tant vers le métier de ses clients que sur la technologie blockchain. A ce titre, Chaineum a participé à la mise en œuvre de bonnes pratiques dans le secteur (ICO Charter, Security Token Network).
La division services blockchain de Chaineum, développe la technologie Chaineum Segment, une blockchain privée orientée objets.

About Chaineum:
Founded in 2015, Chaineum is a leading corporate finance advisory firm with a strong expertise in ICO and STO, and a strategic focus on both its clients' business and blockchain technology. As such, Chaineum paved the way in the implementation of certain best practices in this sector (ICO Charter, Security Token Network).
Chaineum's blockchain services division, is developing Chaineum Segment technology, an object-oriented private blockchain.


No Offer, Solicitation, Investment Advice, or Recommendations

This website is for informational purposes only and does not constitute an offer to sell, a solicitation to buy, or a recommendation for any security, nor does it constitute an offer to provide investment advisory or other services by FINYEAR.
No reference to any specific security constitutes a recommendation to buy, sell or hold that security or any other security.
Nothing on this website shall be considered a solicitation or offer to buy or sell any security, future, option or other financial instrument or to offer or provide any investment advice or service to any person in any jurisdiction.
Nothing contained on the website constitutes investment advice or offers any opinion with respect to the suitability of any security, and the views expressed on this website should not be taken as advice to buy, sell or hold any security. In preparing the information contained in this website, we have not taken into account the investment needs, objectives and financial circumstances of any particular investor.
This information has no regard to the specific investment objectives, financial situation and particular needs of any specific recipient of this information and investments discussed may not be suitable for all investors.
Any views expressed on this website by us were prepared based upon the information available to us at the time such views were written. Changed or additional information could cause such views to change.
All information is subject to possible correction. Information may quickly become unreliable for various reasons, including changes in market conditions or economic circumstances.

Vendredi 26 Avril 2019