Repository landing page

We are not able to resolve this OAI Identifier to the repository landing page. If you are the repository manager for this record, please head to the Dashboard and adjust the settings.

The Detection Of Malicious Activities Within A Robotic Swarm

Abstract

Much research has been undertaken in the field of swarm robotics and its potential applications. However, the majority of the research work assumes a benign operational environment for the robotic swarm. This work considers the effect of malicious attackers attempting to either prevent a swarm from achieving its goal or influence the swarm in such a way, so as to make it less efficient.This work provides details the characteristics of a swarm and provides a taxonomy for swarms. While the threat types for a swarm are no different to the threats types for traditional information systems, we show that there are differences with the attack types and attack methods, due to the unique characteristics of a swarm when compared to a traditional information system.The work then provides a generic model for swarms, their entities and their operational environment. The generic model is used in conjunction with a taxonomy of threats, to enable the research to develop simulations for the swarms, to investigate whether swarms could be maliciously manipulated, with the results of the simulations demonstrating that the swarms could be manipulated.The research progressed to researching and implementing Intrusion Detection Systems (IDS), tailored for the swarm. This was based on research around current IDS methods and it was determined that signature based IDS could be utilised but anomaly based IDS were not suitable for use in swarms.Simulations were undertaken that utilised IDS functionality within scenarios that had previously been attacked and the IDS functionality was shown to be successful in the majority of instances. That is, the swarms were either more efficient at achieving their goal, when compared to being attacked without the IDS functionality, or the swarms were simply able to complete their tasks, when previously they had not

Similar works

This paper was published in Royal Holloway - Pure.

Having an issue?

Is data on this page outdated, violates copyrights or anything else? Report the problem now and we will take corresponding actions after reviewing your request.