Abstract
Non-centralised behaviour such as those that characterise swarm robotics systems are vulnerable to intentional disruptions from internal or external adversarial sources. Threats in the context of swarm robotics can be executed through goal, behaviour, environment or communication manipulation. Experimental studies in this area are still sparse. We study an attack scenario performed by actively modifying the data between authorised participants. We formulate a robust probabilistic adaptive defence mechanism which does not aim at identifying malicious agents, but to provide the swarm with the means to minimise the consequences of the attack. The mechanism relies on a dynamic modification of the probability of agents to change their current information in view of new contradictory or corroborating incoming data. We investigate several experimental conditions in simulation. The results show that the presence of adversaries in the swarm hinders reaching consensus to the majority opinion when using a baseline method, but that there are several conditions in which our adaptive defence mechanism is highly efficient.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
The NetLogo code for this model and a C translation used to verify results are both available at https://github.com/gprimiero/swarmattack.
- 2.
We chose to illustrate the dynamics of the non-adaptive defence mechanism for \(p=0.001\) instead of those generated by \(p=0.5\) and \(p=1.0\) because as shown in Fig. 4c and d, the values of p in the adaptive probabilistic defence mechanism tend to converge to 0.
References
Akdemir, K.D., Karakoyunlu, D., Padir, T., Sunar, B.: An emerging threat: eve meets a robot. In: Chen, L., Yung, M. (eds.) INTRUST 2010. LNCS, vol. 6802, pp. 271–289. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-25283-9_18
Aura, T.: Strategies against replay attacks. In: 10th Computer Security Foundations Workshop (CSFW 1997), Rockport, Massachusetts, USA, 10-12 June 1997, pp. 59–69 (1997). https://doi.org/10.1109/CSFW.1997.596787
Brambilla, M., Ferrante, E., Birattari, M., Dorigo, M.: Swarm robotics: a review from the swarm engineering perspective. Swarm Intell. 7(1), 1–41 (2013)
Chamoso, P., De la Prieta, F., De Paz, F., Corchado, J.M.: Swarm agent-based architecture suitable for internet of things and smartcities. In: Omatu, S., et al. (eds.) Distributed Computing and Artificial Intelligence, 12th International Conference. AISC, vol. 373, pp. 21–29. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-19638-1_3
Ducatelle, F., et al.: Cooperative navigation in robotic swarms. Swarm Intell. 8(1), 1–33 (2014)
Gong, L.: A variation on the themes of message freshness and replay or, the difficulty in devising formal methods to analyze cryptographic protocols. In: Proceedings of the 6th IEEE Computer Security Foundations Workshop - CSFW 1993, Franconia, New Hampshire, USA, 15-17 June 1993, pp. 131–136 (1993). https://doi.org/10.1109/CSFW.1993.246633
Higgins, F., Tomlinson, A., Martin, K.: Survey on security challenges for swarm robotics. In: Fifth International Conference on Autonomic and Autonomous Systems (ICAS), pp. 307–312 (2009)
Laan, A., Madirolas, G., de Polavieja, G.: Rescuing collective wisdom when the average group opinion is wrong. Front. Robot. AI 4, 1–21 (2017)
Montes de Oca, M., Ferrante, E., Scheidler, A., Pinciroli, C., Birattari, M., Dorigo, M.: Majority-rule opinion dynamics with differential latency: a mechanism for self-organized collective decision-making. Swarm Intell. 5, 305–327 (2011)
Primiero, G., Martorana, A., Tagliabue, J.: Simulation of a trust and reputation based mitigation protocol for a black hole style attack on VANETs. In: 2018 IEEE European Symposium on Security and Privacy Workshops, EuroS&P Workshops 2018, London, United Kingdom, 23-27 April 2018, pp. 127–135 (2018). https://doi.org/10.1109/EuroSPW.2018.00025
Reina, A., Marshall, J.A.R., Trianni, V., Bose, T.: Model of the best-of-N nest-site selection process in honeybees. Phys. Rev. E 95(5), 052411 (2017). https://doi.org/10.1103/PhysRevE.95.052411
Reina, A., Valentini, G., Fernández-Oto, C., Dorigo, M., Trianni, V.: A design pattern for decentralised decision making. PLoS ONE 10(10), e0140950 (2015). https://doi.org/10.1371/journal.pone.0140950
Roosta, T., Shieh, S., Sastry, S.: Taxonomy of security attacks in sensor networks and countermeasures. In: IEEE International Conference on System Integration and Reliability Improvements, pp. 13–15 (2006)
Saljooghinejad, H., Bhukya, W.N.: Layered security architecture for masquerade attack detection. In: Cuppens-Boulahia, N., Cuppens, F., Garcia-Alfaro, J. (eds.) DBSec 2012. LNCS, vol. 7371, pp. 255–262. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-31540-4_19
Sargeant, I., Tomlinson, A.: Review of potential attacks on robotic swarms. In: Bi, Y., Kapoor, S., Bhatia, R. (eds.) IntelliSys 2016. LNNS, vol. 16, pp. 628–646. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-56991-8_46
Sargeant, I., Tomlinson, A.: Maliciously manipulating a robotic swarm. In: Proceedings of the International Conference Embedded Systems, Cyber-Physical Systems and Applications (ESCS), pp. 122–128 (2016)
Scharre, P.: Robotics on the battlefield part II: the coming swarm. Technical report, Centre for a New American Security (2014)
Strobel, V., Castello, F., Dorigo, M.: Managing byzantine robots via blockchain technology in a swarm robotics collective decision making scenario. Technical report TR/IRIDIA/2017-013, IRIDIA, Université Libre de Bruxelles, Brussels, Belgium (2017)
Syverson, P.F.: A taxonomy of replay attacks. In: Proceedings of the Seventh IEEE Computer Security Foundations Workshop - CSFW 1994, Franconia, New Hampshire, USA, 14-16 June 1994, pp. 187–191 (1994). https://doi.org/10.1109/CSFW.1994.315935
Valentini, G., Ferrante, E., Dorigo, M.: The best-of-n problem in robot swarms: formalization, state of the art, and novel perspectives. Front. Robot. AI 4, 9 (2017). https://doi.org/10.3389/frobt.2017.00009. https://www.frontiersin.org/article/10.3389/frobt.2017.00009
Valentini, G., Ferrante, E., Hamann, H., Dorigo, M.: Collective decision with 100 Kilobots: speed versus accuracy in binary discrimination problems. Auton. Agents Multi-Agent Syst. 30(3), 553–580 (2016)
van Tilborg, H., Jajodia, S. (eds.): Encyclopedia of Cryptography and Security. Springer, Heidelberg (2011)
Acknowledgments
The authors wish to thank Prof. Franco Raimondi for support in setting up the computing cluster required by the experiments in this paper.
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Primiero, G., Tuci, E., Tagliabue, J., Ferrante, E. (2018). Swarm Attack: A Self-organized Model to Recover from Malicious Communication Manipulation in a Swarm of Simple Simulated Agents. In: Dorigo, M., Birattari, M., Blum, C., Christensen, A., Reina, A., Trianni, V. (eds) Swarm Intelligence. ANTS 2018. Lecture Notes in Computer Science(), vol 11172. Springer, Cham. https://doi.org/10.1007/978-3-030-00533-7_17
Download citation
DOI: https://doi.org/10.1007/978-3-030-00533-7_17
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-00532-0
Online ISBN: 978-3-030-00533-7
eBook Packages: Computer ScienceComputer Science (R0)