Skip to main content

Swarm Attack: A Self-organized Model to Recover from Malicious Communication Manipulation in a Swarm of Simple Simulated Agents

  • Conference paper
  • First Online:
Swarm Intelligence (ANTS 2018)

Abstract

Non-centralised behaviour such as those that characterise swarm robotics systems are vulnerable to intentional disruptions from internal or external adversarial sources. Threats in the context of swarm robotics can be executed through goal, behaviour, environment or communication manipulation. Experimental studies in this area are still sparse. We study an attack scenario performed by actively modifying the data between authorised participants. We formulate a robust probabilistic adaptive defence mechanism which does not aim at identifying malicious agents, but to provide the swarm with the means to minimise the consequences of the attack. The mechanism relies on a dynamic modification of the probability of agents to change their current information in view of new contradictory or corroborating incoming data. We investigate several experimental conditions in simulation. The results show that the presence of adversaries in the swarm hinders reaching consensus to the majority opinion when using a baseline method, but that there are several conditions in which our adaptive defence mechanism is highly efficient.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    The NetLogo code for this model and a C translation used to verify results are both available at https://github.com/gprimiero/swarmattack.

  2. 2.

    We chose to illustrate the dynamics of the non-adaptive defence mechanism for \(p=0.001\) instead of those generated by \(p=0.5\) and \(p=1.0\) because as shown in Fig. 4c and d, the values of p in the adaptive probabilistic defence mechanism tend to converge to 0.

References

  1. Akdemir, K.D., Karakoyunlu, D., Padir, T., Sunar, B.: An emerging threat: eve meets a robot. In: Chen, L., Yung, M. (eds.) INTRUST 2010. LNCS, vol. 6802, pp. 271–289. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-25283-9_18

    Chapter  Google Scholar 

  2. Aura, T.: Strategies against replay attacks. In: 10th Computer Security Foundations Workshop (CSFW 1997), Rockport, Massachusetts, USA, 10-12 June 1997, pp. 59–69 (1997). https://doi.org/10.1109/CSFW.1997.596787

  3. Brambilla, M., Ferrante, E., Birattari, M., Dorigo, M.: Swarm robotics: a review from the swarm engineering perspective. Swarm Intell. 7(1), 1–41 (2013)

    Article  Google Scholar 

  4. Chamoso, P., De la Prieta, F., De Paz, F., Corchado, J.M.: Swarm agent-based architecture suitable for internet of things and smartcities. In: Omatu, S., et al. (eds.) Distributed Computing and Artificial Intelligence, 12th International Conference. AISC, vol. 373, pp. 21–29. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-19638-1_3

    Chapter  Google Scholar 

  5. Ducatelle, F., et al.: Cooperative navigation in robotic swarms. Swarm Intell. 8(1), 1–33 (2014)

    Article  Google Scholar 

  6. Gong, L.: A variation on the themes of message freshness and replay or, the difficulty in devising formal methods to analyze cryptographic protocols. In: Proceedings of the 6th IEEE Computer Security Foundations Workshop - CSFW 1993, Franconia, New Hampshire, USA, 15-17 June 1993, pp. 131–136 (1993). https://doi.org/10.1109/CSFW.1993.246633

  7. Higgins, F., Tomlinson, A., Martin, K.: Survey on security challenges for swarm robotics. In: Fifth International Conference on Autonomic and Autonomous Systems (ICAS), pp. 307–312 (2009)

    Google Scholar 

  8. Laan, A., Madirolas, G., de Polavieja, G.: Rescuing collective wisdom when the average group opinion is wrong. Front. Robot. AI 4, 1–21 (2017)

    Article  Google Scholar 

  9. Montes de Oca, M., Ferrante, E., Scheidler, A., Pinciroli, C., Birattari, M., Dorigo, M.: Majority-rule opinion dynamics with differential latency: a mechanism for self-organized collective decision-making. Swarm Intell. 5, 305–327 (2011)

    Article  Google Scholar 

  10. Primiero, G., Martorana, A., Tagliabue, J.: Simulation of a trust and reputation based mitigation protocol for a black hole style attack on VANETs. In: 2018 IEEE European Symposium on Security and Privacy Workshops, EuroS&P Workshops 2018, London, United Kingdom, 23-27 April 2018, pp. 127–135 (2018). https://doi.org/10.1109/EuroSPW.2018.00025

  11. Reina, A., Marshall, J.A.R., Trianni, V., Bose, T.: Model of the best-of-N nest-site selection process in honeybees. Phys. Rev. E 95(5), 052411 (2017). https://doi.org/10.1103/PhysRevE.95.052411

    Article  Google Scholar 

  12. Reina, A., Valentini, G., Fernández-Oto, C., Dorigo, M., Trianni, V.: A design pattern for decentralised decision making. PLoS ONE 10(10), e0140950 (2015). https://doi.org/10.1371/journal.pone.0140950

    Article  Google Scholar 

  13. Roosta, T., Shieh, S., Sastry, S.: Taxonomy of security attacks in sensor networks and countermeasures. In: IEEE International Conference on System Integration and Reliability Improvements, pp. 13–15 (2006)

    Google Scholar 

  14. Saljooghinejad, H., Bhukya, W.N.: Layered security architecture for masquerade attack detection. In: Cuppens-Boulahia, N., Cuppens, F., Garcia-Alfaro, J. (eds.) DBSec 2012. LNCS, vol. 7371, pp. 255–262. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-31540-4_19

    Chapter  Google Scholar 

  15. Sargeant, I., Tomlinson, A.: Review of potential attacks on robotic swarms. In: Bi, Y., Kapoor, S., Bhatia, R. (eds.) IntelliSys 2016. LNNS, vol. 16, pp. 628–646. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-56991-8_46

    Chapter  Google Scholar 

  16. Sargeant, I., Tomlinson, A.: Maliciously manipulating a robotic swarm. In: Proceedings of the International Conference Embedded Systems, Cyber-Physical Systems and Applications (ESCS), pp. 122–128 (2016)

    Google Scholar 

  17. Scharre, P.: Robotics on the battlefield part II: the coming swarm. Technical report, Centre for a New American Security (2014)

    Google Scholar 

  18. Strobel, V., Castello, F., Dorigo, M.: Managing byzantine robots via blockchain technology in a swarm robotics collective decision making scenario. Technical report TR/IRIDIA/2017-013, IRIDIA, Université Libre de Bruxelles, Brussels, Belgium (2017)

    Google Scholar 

  19. Syverson, P.F.: A taxonomy of replay attacks. In: Proceedings of the Seventh IEEE Computer Security Foundations Workshop - CSFW 1994, Franconia, New Hampshire, USA, 14-16 June 1994, pp. 187–191 (1994). https://doi.org/10.1109/CSFW.1994.315935

  20. Valentini, G., Ferrante, E., Dorigo, M.: The best-of-n problem in robot swarms: formalization, state of the art, and novel perspectives. Front. Robot. AI 4, 9 (2017). https://doi.org/10.3389/frobt.2017.00009. https://www.frontiersin.org/article/10.3389/frobt.2017.00009

    Article  Google Scholar 

  21. Valentini, G., Ferrante, E., Hamann, H., Dorigo, M.: Collective decision with 100 Kilobots: speed versus accuracy in binary discrimination problems. Auton. Agents Multi-Agent Syst. 30(3), 553–580 (2016)

    Article  Google Scholar 

  22. van Tilborg, H., Jajodia, S. (eds.): Encyclopedia of Cryptography and Security. Springer, Heidelberg (2011)

    Google Scholar 

Download references

Acknowledgments

The authors wish to thank Prof. Franco Raimondi for support in setting up the computing cluster required by the experiments in this paper.

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Giuseppe Primiero or Eliseo Ferrante .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Primiero, G., Tuci, E., Tagliabue, J., Ferrante, E. (2018). Swarm Attack: A Self-organized Model to Recover from Malicious Communication Manipulation in a Swarm of Simple Simulated Agents. In: Dorigo, M., Birattari, M., Blum, C., Christensen, A., Reina, A., Trianni, V. (eds) Swarm Intelligence. ANTS 2018. Lecture Notes in Computer Science(), vol 11172. Springer, Cham. https://doi.org/10.1007/978-3-030-00533-7_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-00533-7_17

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-00532-0

  • Online ISBN: 978-3-030-00533-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics