The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2017
DOI: 10.1007/s10514-017-9621-5
|View full text |Cite
|
Sign up to set email alerts
|

Guaranteeing spoof-resilient multi-robot networks

Abstract: Abstract-Multi-robot networks use wireless communication to provide wide-ranging services such as aerial surveillance and unmanned delivery. However, effective coordination between multiple robots requires trust, making them particularly vulnerable to cyber-attacks. Specifically, such networks can be gravely disrupted by the Sybil attack, where even a single malicious robot can spoof a large number of fake clients. This paper proposes a new solution to defend against the Sybil attack, without requiring expensi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
19
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 58 publications
(20 citation statements)
references
References 44 publications
0
19
0
Order By: Relevance
“…The communications vulnerabilities of the robotics system that were raised in earlier papers can be mitigated using ROS 2 with DDS security; however, this is only a part of developing a secure robotic system. [39][40][41] We note that future work can be done to address the overall security of robotic systems. ROS 2 security is a start, but as shown from a holistic point of view many levels remain exposed.…”
Section: Discussionmentioning
confidence: 99%
“…The communications vulnerabilities of the robotics system that were raised in earlier papers can be mitigated using ROS 2 with DDS security; however, this is only a part of developing a secure robotic system. [39][40][41] We note that future work can be done to address the overall security of robotic systems. ROS 2 security is a start, but as shown from a holistic point of view many levels remain exposed.…”
Section: Discussionmentioning
confidence: 99%
“…The other systems that rely on wireless messages are susceptible to Sybil attacks: without a trusted third-party, it is always possible for a malicious agent to create an unlimited number of new identities in peer-to-peer networks (Douceur, 2002 ). Through this large number of identities, an attacker can gain a disproportionate amount of power (Gil et al, 2017 ), potentially causing much damage, e.g., in voting scenarios. The blockchain can prevent Sybil attacks from disrupting swarm behavior by introducing scarcity to decentralized systems: a robot wanting to exert influence must pay for this by spending a scarce resource (cryptotokens).…”
Section: Related Workmentioning
confidence: 99%
“…An alternative defense is to use measurements of communication latency or wireless signal strength to verify the uniqueness of IDs [26,38,53,91,140]. However, these techniques are sensitive to measurement accuracy.…”
Section: Distributed Hash Tablesmentioning
confidence: 99%