2008 IEEE International Conference on Robotics and Automation 2008
DOI: 10.1109/robot.2008.4543196
|View full text |Cite
|
Sign up to set email alerts
|

Consensus-based Distributed Intrusion Detection for Multi-Robot Systems

Abstract: This paper addresses a security problem in robotic multi-agent systems, where agents are supposed to cooperate according to a shared protocol. A distributed Intrusion Detection System (IDS) is proposed here, that detects possible noncooperative agents. Previous work by the authors showed how single monitors embedded on-board the agents can detect noncooperative behavior, using only locally available information. In this paper, we allow such monitors to share the collected information in order to overcome their… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
26
0

Year Published

2009
2009
2021
2021

Publication Types

Select...
5
2
2

Relationship

2
7

Authors

Journals

citations
Cited by 39 publications
(26 citation statements)
references
References 18 publications
0
26
0
Order By: Relevance
“…Another closely related research problem is the issue of security of consensus in multi-robot systems [9]. A distributed intrusion detection system (IDS) has been developed using a hybrid model of robotic agents that monitors neighboring agents to detect noncooperative agents using only local information [9].…”
Section: Related Work and Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Another closely related research problem is the issue of security of consensus in multi-robot systems [9]. A distributed intrusion detection system (IDS) has been developed using a hybrid model of robotic agents that monitors neighboring agents to detect noncooperative agents using only local information [9].…”
Section: Related Work and Discussionmentioning
confidence: 99%
“…A distributed intrusion detection system (IDS) has been developed using a hybrid model of robotic agents that monitors neighboring agents to detect noncooperative agents using only local information [9]. The distributed IDS has been extended to deal with the case where some of the monitors provide false information [8], and improved by using past information [7].…”
Section: Related Work and Discussionmentioning
confidence: 99%
“…There, reputation-based approaches [9] and voting algorithms [10] can prove very useful. For instance, if one vehicle veers off the pre-defined route or reports very different sensor data, this can be considered as an indication that it may have been compromised.…”
Section: Related Workmentioning
confidence: 99%
“…For this reason, we cannot exclude that an adversary may be able to compromise an underwater node and alter its behaviour. Detecting compromised nodes much depends on detecting anomalies in expected communication and movement patterns [26], which are highly application-dependent. However, reactive measures to remove the compromised node from the system once detected should be considered by design.…”
Section: The Cryptographic Suitementioning
confidence: 99%