The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2019 IEEE Security and Privacy Workshops (SPW) 2019
DOI: 10.1109/spw.2019.00031
|View full text |Cite
|
Sign up to set email alerts
|

Resilience of Multi-robot Systems to Physical Masquerade Attacks

Abstract: The advent of autonomous mobile multi-robot systems has driven innovation in both the industrial and defense sectors. The integration of such systems in safety-and securitycritical applications has raised concern over their resilience to attack. In this work, we investigate the security problem of a stealthy adversary masquerading as a properly functioning agent. We show that conventional multi-agent pathfinding solutions are vulnerable to these physical masquerade attacks. Furthermore, we provide a constraint… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
8
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(8 citation statements)
references
References 31 publications
0
8
0
Order By: Relevance
“…We employ the APMAPF solver ( [2]) to generate a MAPF plan with a co-observation schedule in a grid-world application (Fig. 3a).…”
Section: Secured Planning Results and Limitationmentioning
confidence: 99%
See 3 more Smart Citations
“…We employ the APMAPF solver ( [2]) to generate a MAPF plan with a co-observation schedule in a grid-world application (Fig. 3a).…”
Section: Secured Planning Results and Limitationmentioning
confidence: 99%
“…We compute the differential of H implicitly using its definition (2). We use the notation [v] × : R 3 → R 3×3 to denote the matrix representation of the cross product with the vector v, i.e.,…”
Section: Secured Multi-robot Trajectory Planningmentioning
confidence: 99%
See 2 more Smart Citations
“…Masquerade. The attacker uses a fake identity and IP spoofing to pretend to be a legitimate network user in order to steal information from the system or network [21,22]. Then, by launching a brute force attack, stolen passwords can be used to gain unauthorized access to important information [23].…”
mentioning
confidence: 99%