Threats to the Swarm: Security Considerations for Swarm Robotics

Swarm robotics is a relatively new technology that is being explored for its potential use in a variety of different applications and environments. Previous emerging technologies have often overlooked security until later developmental stages, when security has had to be undesirably (and sometimes expensively) retrofitted. This paper compares swarm robotics with related technologies to identify their unique features where existing security mechanisms can not be applied. We then review some of the emerging applications where ineffective security could have significant impact. We conclude by discussing a number of security challenges for swarm robotics and argue that now is the right time to address these issues and seek solutions. We also identify several idiosyncrasies of swarm robotics that present some unique security challenges. In particular, swarms of robots potentially (i) employ different types of communication channels (ii) have special concepts of identity, and (iii) exhibit adaptive emergent behaviour which could be modified by an intruder. Addressing these issues now will prevent undesirable consequences for many applications of this type of technology.

[1]  Alan F. T. Winfield,et al.  Towards dependable swarms and a new discipline of swarm engineering , 2004 .

[2]  Karen A. Scarfone,et al.  Guide to Intrusion Detection and Prevention Systems (IDPS) , 2007 .

[3]  Lynne E. Parker,et al.  ALLIANCE: an architecture for fault tolerant multirobot cooperation , 1998, IEEE Trans. Robotics Autom..

[4]  Gaurav S. Sukhatme,et al.  Robomote: enabling mobility in sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..

[5]  S Erol Swarm Robotics: From Sources of Inspiration to Domains of Application , 2005 .

[6]  Nikolaus Correll,et al.  A Challenging Application in Swarm Robotics: The Autonomous Inspection of Complex Engineered Structures , 2007 .

[7]  Dorothy E. Denning,et al.  An Intrusion-Detection Model , 1986, 1986 IEEE Symposium on Security and Privacy.

[8]  Andrey Bogdanov,et al.  PRESENT: An Ultra-Lightweight Block Cipher , 2007, CHES.

[9]  Maja J. Mataric,et al.  A general algorithm for robot formations using local sensing and minimal communication , 2002, IEEE Trans. Robotics Autom..

[10]  Christof Paar,et al.  Reconfigurable Instruction Set Extension for Enabling ECC on an 8-Bit Processor , 2004, FPL.

[11]  D.P. Stormont Autonomous rescue robot swarms for first responders , 2005, CIHSPS 2005. Proceedings of the 2005 IEEE International Conference on Computational Intelligence for Homeland Security and Personal Safety, 2005..

[12]  Levente Buttyán,et al.  Security and Cooperation in Wireless Networks: Thwarting Malicious and Selfish Behavior in the Age of Ubiquitous Computing , 2007 .

[13]  Tony White,et al.  Expert Assessment of Stigmergy: A Report for the Department of National Defence , 2005 .

[14]  Alan F. T. Winfield,et al.  Safety in numbers: fault-tolerance in robot swarms , 2006, Int. J. Model. Identif. Control..

[15]  Tim Kerins,et al.  Public-Key Cryptography for RFID-Tags , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07).

[16]  Allan Tomlinson,et al.  Survey on Security Challenges for Swarm Robotics , 2009, 2009 Fifth International Conference on Autonomic and Autonomous Systems.

[17]  Owen Holland,et al.  UltraSwarm: A Further Step Towards a Flock of Miniature Helicopters , 2006, Swarm Robotics.

[18]  Erol Şahin,et al.  A review of studies in swarm robotics , 2007 .

[19]  Rodney A. Brooks,et al.  Fast, Cheap and Out of Control: a Robot Invasion of the Solar System , 1989 .

[20]  Peter I. Corke,et al.  The Design and Evaluation of a Mobile Sensor/Actuator Network for Autonomous Animal Control , 2007, 2007 6th International Symposium on Information Processing in Sensor Networks.

[21]  Elisabeth Hansson,et al.  Security solutions for mobile ad hoc networks , 2005 .

[22]  Niklas Borselius,et al.  Multi-agent system security for mobile communication , 2003 .

[23]  Nicola Santoro,et al.  Gathering of asynchronous robots with limited visibility , 2005, Theor. Comput. Sci..

[24]  Jing Wang,et al.  Swarm Intelligence in Cellular Robotic Systems , 1993 .

[25]  Marco Dorigo,et al.  Swarm intelligence: from natural to artificial systems , 1999 .

[26]  P.-P. Grasse La reconstruction du nid et les coordinations interindividuelles chezBellicositermes natalensis etCubitermes sp. la théorie de la stigmergie: Essai d'interprétation du comportement des termites constructeurs , 1959, Insectes Sociaux.

[27]  Elizabeth Sklar,et al.  Robot-Sensor Networks for Search and Rescue , 2006 .

[28]  Robin R. Murphy,et al.  Introduction to AI Robotics , 2000 .

[29]  R. Andrew Russell Visual recognition of conspecifics by swarm robots , 2004 .