Learning-based Intelligent Attack against Mobile Robots with Obstacle-avoidance

The security issue of mobile robots have attracted considerable attention in recent years. Most existing works focus on detection and countermeasures for some classic attacks from cyberspace. Nevertheless, those work are generally based on some prior assumptions for the attacker (e.g., the system dynamics is known, or internal access is compromised). A few work are delicated to physical attacks, however, there still lacks certain intelligence and advanced control design. In this paper, we propose a physical-based and intelligent attack framework against the obstacle-avoidance of mobile robots. The novelty of our work lies in the following: i) Without any prior information of the system dynamics, the attacker can learn the detection area and goal position of a mobile robot by trial and observation, and the obstacle-avoidance mechanism is learned by support vector regression (SVR) method; ii) Considering different attack requirements, different attack strategies are proposed to implement the attack efficiently; iii) The framework is suitable for holonomic and non-holonomic mobile robots, and the algorithm performance analysis about time complexity and optimality is provided. Furthermore, the condition is obtained to guarantee the success of the attack. Simulations illustrate the effectiveness of the proposed framework.

[1]  Yuanchang Liu,et al.  A survey of formation control and motion planning of multiple unmanned vehicles , 2018, Robotica.

[2]  Wolfram Burgard,et al.  The dynamic window approach to collision avoidance , 1997, IEEE Robotics Autom. Mag..

[3]  Wen-Chuan Lee,et al.  Detecting Attacks Against Robotic Vehicles: A Control Invariant Approach , 2018, CCS.

[4]  Mac Schwager,et al.  Planning periodic persistent monitoring trajectories for sensing robots in Gaussian Random Fields , 2013, 2013 IEEE International Conference on Robotics and Automation.

[5]  Sergei P. Skorobogatov Local heating attacks on Flash memory devices , 2009, 2009 IEEE International Workshop on Hardware-Oriented Security and Trust.

[6]  Simon X. Yang,et al.  A knowledge based genetic algorithm for path planning of a mobile robot , 2004, IEEE International Conference on Robotics and Automation, 2004. Proceedings. ICRA '04. 2004.

[7]  Daniel E. Quevedo,et al.  Maximum Hands-Off Control: A Paradigm of Control Effort Minimization , 2014, IEEE Transactions on Automatic Control.

[8]  Minghui Zhu,et al.  Stackelberg-game analysis of correlated attacks in cyber-physical systems , 2011, Proceedings of the 2011 American Control Conference.

[9]  Zhaodan Kong,et al.  A Survey of Motion Planning Algorithms from the Perspective of Autonomous UAV Guidance , 2010, J. Intell. Robotic Syst..

[10]  Jie Yang,et al.  A bounded controller for multirobot navigation while maintaining network connectivity in the presence of obstacles , 2013, Autom..

[11]  Dayal R. Parhi,et al.  Path optimisation of a mobile robot using an artificial neural network controller , 2011, Int. J. Syst. Sci..

[12]  Carlos Silvestre,et al.  Stochastic and deterministic fault detection for randomized gossip algorithms , 2017, Autom..

[13]  Yushan Li,et al.  Learning-based Intelligent Attack against Formation Control with Obstacle-avoidance , 2019, 2019 American Control Conference (ACC).

[14]  Antonio Bicchi,et al.  Consensus Computation in Unreliable Networks: A System Theoretic Approach , 2010, IEEE Transactions on Automatic Control.

[15]  Quanyan Zhu,et al.  Game-Theoretic Methods for Robustness, Security, and Resilience of Cyberphysical Control Systems: Games-in-Games Principle for Optimal Cross-Layer Resilient Control Systems , 2015, IEEE Control Systems.

[16]  Dayal R. Parhi,et al.  Mobile Robot Navigation and Obstacle Avoidance Techniques: A Review , 2017, ICRA 2017.

[17]  Lotfi A. Zadeh,et al.  The concept of a linguistic variable and its application to approximate reasoning-III , 1975, Inf. Sci..

[18]  Westley Weimer,et al.  An Uncrewed Aerial Vehicle Attack Scenario and Trustworthy Repair Architecture , 2016, 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W).

[19]  Claire J. Tomlin,et al.  Secure estimation based Kalman Filter for cyber-physical systems against sensor attacks , 2018, Autom..

[20]  Srdjan Capkun,et al.  On the requirements for successful GPS spoofing attacks , 2011, CCS '11.

[21]  Paulo Tabuada,et al.  Minimum attention control for linear systems , 2014, Discret. Event Dyn. Syst..

[22]  Silvia Ferrari,et al.  Distributed optimal control for multi-agent trajectory optimization , 2014, Autom..

[23]  Nello Cristianini,et al.  An Introduction to Support Vector Machines and Other Kernel-based Learning Methods , 2000 .

[24]  Weidong Wang,et al.  A new fuzzy intelligent obstacle avoidance control strategy for wheeled mobile robot , 2012, 2012 IEEE International Conference on Mechatronics and Automation.

[25]  Oussama Khatib,et al.  Real-Time Obstacle Avoidance for Manipulators and Mobile Robots , 1985, Autonomous Robot Vehicles.

[26]  Yang Xiang,et al.  A survey on security control and attack detection for industrial cyber-physical systems , 2018, Neurocomputing.

[27]  L. A. ZADEH,et al.  The concept of a linguistic variable and its application to approximate reasoning - I , 1975, Inf. Sci..

[28]  Simon X. Yang,et al.  Neural-Network-Based Path Planning for a Multirobot System With Moving Obstacles , 2009, IEEE Trans. Syst. Man Cybern. Part C.

[29]  C. Tam,et al.  Review of Collision Avoidance and Path Planning Methods for Ships in Close Range Encounters , 2009, Journal of Navigation.

[30]  Alan S. Morris,et al.  Fuzzy-GA-based trajectory planner for robot manipulators sharing a common workspace , 2006, IEEE Transactions on Robotics.

[31]  Byung-Jae Choi,et al.  Design of Obstacle Avoidance System for Mobile Robot using Fuzzy Logic Systems , 2013 .

[32]  Ivan Petrovic,et al.  Dynamic window based approach to mobile robot motion control in the presence of moving obstacles , 2007, Proceedings 2007 IEEE International Conference on Robotics and Automation.

[33]  Ali Nodehi,et al.  Using Genetic Algorithm for a Mobile Robot Path Planning , 2009, 2009 International Conference on Future Computer and Communication.

[34]  Sven Koenig,et al.  Improved fast replanning for robot navigation in unknown terrain , 2002, Proceedings 2002 IEEE International Conference on Robotics and Automation (Cat. No.02CH37292).

[35]  Fabio Pasqualetti,et al.  Secure Navigation of Robots in Adversarial Environments , 2020, IEEE Control Systems Letters.

[36]  Rong Su,et al.  Supervisor Synthesis to Thwart Cyber Attack with Bounded Sensor Reading Alterations , 2016, Autom..

[37]  Yongdae Kim,et al.  Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors , 2015, USENIX Security Symposium.

[38]  Florian Dörfler,et al.  Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.

[39]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[40]  Kim D. Listmann,et al.  Consensus for formation control of nonholonomic mobile robots , 2009, 2009 IEEE International Conference on Robotics and Automation.

[41]  Randal W. Beard,et al.  A decentralized approach to formation maneuvers , 2003, IEEE Trans. Robotics Autom..