Analysis of ways to secure group control for autonomous mobile robots

The aim of this paper is to analyze the ways of providing security for mobile robots groups control (MRGC) and to develop a security protocol for MRGC under limited computational and power resources away from the controlled area. The solution for this problem assumes features of group control systems and robot systems from the security point of view. The main problem connected with the development of a security system for mobile robots is the distinction of this type of the network from other networks. This demands the development of special methods and approaches that should take many specific factors such as limitations of computational resources and power into account. The proposed solution for MRGC is based on the use of trust concept for finding the validity of nodes and finding targets. In contrast to the existing approaches, this protocol uses several parameters to evaluate the trust that allows to expand the range of repelled attacks.

[1]  Elena Basan,et al.  Trust management system for mobile cluster-based wireless sensor network , 2015, SIN.

[2]  Jinyuan You,et al.  POM-a mobile agent security model against malicious hosts , 2000, Proceedings Fourth International Conference/Exhibition on High Performance Computing in the Asia-Pacific Region.

[3]  Allan Tomlinson,et al.  Threats to the Swarm: Security Considerations for Swarm Robotics , 2009 .

[4]  Andrei V. Gurtov,et al.  TRUST AND REPUTATION MODEL DESIGN FOR OBJECTS OF MULTI-AGENT ROBOTICS SYSTEMS WITH DECENTRALIZED CONTROL , 2017 .

[5]  Christian F. Tschudin,et al.  Protecting Mobile Agents Against Malicious Hosts , 1998, Mobile Agents and Security.

[6]  George Loukas,et al.  Decision tree-based detection of denial of service and command injection attacks on robotic vehicles , 2015, 2015 IEEE International Workshop on Information Forensics and Security (WIFS).

[7]  Xiang Zhou,et al.  A Trust Evaluation Algorithm for Wireless Sensor Networks Based on Node Behaviors and D-S Evidence Theory , 2011, Sensors.

[8]  Farouk Kamoun,et al.  CASAN: Clustering algorithm for security in ad hoc networks , 2008, Comput. Commun..

[9]  Elena Basan,et al.  Methodology of Countering Attacks for Wireless Sensor Networks Based on Trust , 2016, 2016 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC).

[10]  Anand R. Tripathi,et al.  Security in the Ajanta mobile agent system , 2001, Softw. Pract. Exp..

[11]  Radda A. Iureva,et al.  Assessment of stability of algorithms based on trust and reputation model , 2016, 2016 18th Conference of Open Innovations Association and Seminar on Information Security and Protection of Information Technology (FRUCT-ISPIT).