Review of Potential Attacks on Robotic Swarms

被引:5
作者
Sargeant, Ian [1 ]
Tomlinson, Allan [1 ]
机构
[1] Royal Holloway Univ London, Informat Secur Grp, Egham TW20 0EX, Surrey, England
来源
PROCEEDINGS OF SAI INTELLIGENT SYSTEMS CONFERENCE (INTELLISYS) 2016, VOL 2 | 2018年 / 16卷
关键词
Robotic swarm; Security; Attacks; DISTRIBUTED CONTROL; MANIPULATION; NETWORKS; SYSTEMS;
D O I
10.1007/978-3-319-56991-8_46
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Much research has been undertaken in the area of swarm robotics and applications the vast majority of which assumes a benign operational environment. We assume a hostile environment and review the threats to robotic swarms. We then define an adversary's capabilities and classify generic attack types and attack vectors that may be undertaken by this adversary. We conclude that while the threats to a swarm are no different to those for traditional systems, there are differences with the attack types and attack vectors. This is primarily due to the ability to manipulate the emergent behaviour of the swarm by attacking individual swarm elements. We identify characteristics of the swarm that allow such attacks to take place.
引用
收藏
页码:628 / 646
页数:19
相关论文
共 51 条
  • [1] Anand M., 2005, DMSN 05, P3, DOI DOI 10.1145/1080885.1080887
  • [2] [Anonymous], 133351 BS ISOIEC
  • [3] [Anonymous], 2009, Int. J. Adv. Secur
  • [4] [Anonymous], 2010, PROC 2 ANN WORKSHOP, DOI DOI 10.1145/1866914.1866917
  • [5] [Anonymous], 270052011 BS ISO IEC
  • [6] [Anonymous], CONTROL PROVISIONING
  • [7] Behavior-based formation control for multirobot teams
    Balch, T
    Arkin, RC
    [J]. IEEE TRANSACTIONS ON ROBOTICS AND AUTOMATION, 1998, 14 (06): : 926 - 939
  • [8] Becher A, 2006, LECT NOTES COMPUT SC, V3934, P104
  • [9] Bhukya WN, 2006, 20061417 IEEE TEN CO, P1
  • [10] CESG, 2009, 1 CESG HMG IA