Affiliation:
1. The Bonch-Bruevich Saint Petersburg State University of Telecommunications
2. Naval polytechnic institute of Navy Development of the Military Research and Educational Center of the Navy “Naval Academy named after Admiral of the Fleet of the Soviet Union N.G. Kuznetsov”
Abstract
Problem statement: designing the defense mechanism against coordinated behavior strategy attacks for mobile multiagent robotic systems. Possible attacks of that kind may be carried out by use message interception, creating and transmitting disinformation, and other actions, that does not have identifiable characteristics of saboteur intrusion, and lead to making incorrect or non-optimal decision by group of robots. The purpose of the work: the increase of probability of detection coordinated behavior strategy attacks on mobile multiagent robotic systems. Methods used: proposed algorithm is further development of self organization mechanism, using trust and reputation metrics for detection and counteraction against malicious robots. Accuracy of proposed method is confirmed using imitation model of collective exploration task. The novelty: algorithm is based on quantification of consensus achievement process into consecutive time periods, which is followed by inter- and intraperiod processing of information, produces by robots of the swarm and by malicious robots during communication. The result: experiment shows that the swarm is capable to counteract against coordinated attack of malicious robots, when concentration of malicious units is more than 51 %. The probability of such counteraction is close to 1. Known detection and counteraction methods for destructive informational influence in homogeneous swarms of robots prove to be effective in cases, when concentration of malicious units is less than 45 %. Practical significance: developed algorithm may be used for multiagent robotic systems security system design to protect against attack, executed during interactions between agents of the swarm. Algorithm allows to successfully counteract coordinated attacks similar to «51 percent attack».
Publisher
Bonch-Bruevich State University of Telecommunications
Reference24 articles.
1. Sailor M.J., Link J.R. Smart dust: nanostructured devices in a grain of sand. Chemical Communications. 2005;11:1375.
2. Higgins F., Tomlinson A., Martin K.M. Threats to the Swarm: Security Considerations for Swarm Robotics. International Journal on Advances in Security. 2009;2(2&3):288–297.
3. Page J., Zaslavsky A., Indrawan M. A Buddy model of security for mobile agent communities operating in pervasive scenarios. Proceeding of the Australasian Information Security Workshop (AISW 2004), the Australasian Workshop on Data Min-ing and Web Intelligence (DMWI 2004), the Australasian Workshop on Software Internationalisation (AWSI 2004), January 2004, Dunedin, New Zealand, vol.54. Sydney: Australian Computer Society; 2004. p.17–25.
4. Schillo M., Funk P., Rovatsos M. Using trust for detecting deceitful agents in artificial societies. Applied Artificial Intelli-gence. 2000;14(8):825–848. DOI:10.1080/08839510050127579
5. Golbeck J., Parsia B., Hendler J. Trust Networks on the Semantic Web. Proceeding of the 7th International Workshop on Cooperative Information Agents, CIA 2003, 27‒29 August 2003, Helsinki, Finland. Lecture Notes in Computer Science, vol.2782. Berlin Heidelberg: Springer-Verlag; 2003. p.238–249.