skip to main content
10.1145/3548606.3563535acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
poster

Poster: May the Swarm Be With You: Sensor Spoofing Attacks Against Drone Swarms

Published:07 November 2022Publication History

ABSTRACT

Swarm robotics, particularly drone swarms, are used in various safety-critical tasks. While a lot of attention has been paid to improving swarm control algorithms for improved intelligence, the security implications of various design choices in swarm control algorithms have not been studied. We highlight how an attacker can exploit the vulnerabilities in swarm control algorithms to disrupt drone swarms. Specifically, we show that the attacker can target one swarm member (target drone) through sensor spoofing attacks, and indirectly cause other swarm members (victim drones) to veer off from their course, and potentially resulting in a crash. Our attack cannot be prevented by traditional software security techniques, and it is stealthy in nature as it causes seemingly benign deviations in drone swarms. Our initial results show that spoofing the position of a target drone by 5m is sufficient to cause other drones to crash into a front obstacle. Overall, our attack achieves 76.67% and 93.33% success rate with 5m and 10m spoofing deviation respectively.

References

  1. 2008. Global Positioning System Standard Positioning Service Performance Stan- dard. https://www.gps.gov/technical/ps/2008-SPS-performance-standard.pdf.Google ScholarGoogle Scholar
  2. 2019. The Pentagon Wants AI-Driven Drone Swarms for Search and Rescue Ops. https://www.nextgov.com/emerging-tech/2019/12/pentagon-wants-ai-driven-drone-swarms-search-and-rescue-ops/162113/Google ScholarGoogle Scholar
  3. Pritam Dash, Guanpeng Li, Zitao Chen, Mehdi Karimibiuki, and Karthik Pattabiraman. 2021. PID-Piper: Recovering Robotic Vehicles from Physical Attacks. In 51st International Conference on Dependable Systems and Networks (DSN) 2021.Google ScholarGoogle ScholarCross RefCross Ref
  4. Xinyu Huang, Yunzhe Tian, Yifei He, Endong Tong, Wenjia Niu, Chenyang Li, Jiqiang Liu, and Liang Chang. 2020. Exposing Spoofing Attack on Flocking-Based Unmanned Aerial Vehicle Cluster: A Threat to Swarm Intelligence. Secur. Commun. Networks, Vol. 2020 (2020), 8889122:1-8889122:15.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Chi-Gon Jung, Alipour Asl Ahad, Yuseok Jeon, and Yonghwi Kwon. 2022. SWARMFLAWFINDER: Discovering and Exploiting Logic Flaws of Swarm Algorithms. In IEEE Symposium on Security and Privacy.Google ScholarGoogle Scholar
  6. Liangjun Liu, Hongyan Qian, and Feng Hu. 2019. Random Label Based Security Authentication Mechanism for Large-Scale UAV Swarm. 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom) (2019), 229--235.Google ScholarGoogle Scholar
  7. Craig W. Reynolds. 1987. Flocks, herds and schools: A distributed behavioral model. Proceedings of the 14th annual conference on Computer graphics and interactive techniques (1987).Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Enrica Soria, Fabrizio Schiano, and Dario Floreano. 2020. SwarmLab: a Matlab Drone Swarm Simulator. 2020 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS) (2020), 8005--8011.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Nils Ole Tippenhauer, Christina Pöpper, Kasper Bonne Rasmussen, and Srdjan Capkun. 2011. On the requirements for successful GPS spoofing attacks. In CCS.Google ScholarGoogle Scholar
  10. Gábor Vásárhelyi, Csaba Virágh, Gergo Somorjai, Tamás Nepusz, Agoston E. Eiben, and Tamás Vicsek. 2018. Optimized flocking of autonomous drones in confined environments. Science Robotics, Vol. 3 (2018).Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Poster: May the Swarm Be With You: Sensor Spoofing Attacks Against Drone Swarms

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security
        November 2022
        3598 pages
        ISBN:9781450394505
        DOI:10.1145/3548606

        Copyright © 2022 Owner/Author

        Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 7 November 2022

        Check for updates

        Qualifiers

        • poster

        Acceptance Rates

        Overall Acceptance Rate1,261of6,999submissions,18%

        Upcoming Conference

        CCS '24
        ACM SIGSAC Conference on Computer and Communications Security
        October 14 - 18, 2024
        Salt Lake City , UT , USA

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader