Fiona Higgins and Allan Tomlinson (2008) Security Challenges for Swarm Robotics.
Full text access: Open
Swarm robotics is a relatively new technology that is being explored for its potential use in a variety of dierent applications and environments. Previous emerging technologies have often overlooked security until later developmen- tal stages, when it has had to be undesirably (and sometimes expensively) retrotted. We identify a number of security challenges for swarm robotics and argue that now is the right time to address these issues and seek solu- tions. We also identify several idiosyncrasies of swarm robotics that present some unique security challenges. In particular, swarms of robots potentially employ dierent types of communication channels; have special concepts of identity; and exhibit adaptive emergent behaviour which could be modied by an intruder. Addressing these issues now will prevent undesirable conse- quences for many applications of this type of technology.
This is a Published version This version's date is: 10/2008 This item is peer reviewed
https://repository.royalholloway.ac.uk/items/67da4ff5-78d3-3d1b-224a-4fae3a0a97ba/1/
Deposited by () on 28-Jun-2010 in Royal Holloway Research Online.Last modified on 14-Dec-2010
[1] L. Bayindir and E. ahin, \A review of studies in swarm robotics,"Turkish Journal of Electrical Engineering, vol. 15, pp. 115{147, 2007.[Online]. Available: http://journals.tubitak.gov.tr/elektrik/issues/elk-07-15-2/elk-15-2-2-0705-13.pdf
[2] E. ahin and W. Spears, Eds., Swarm Robotics Workshop: State-of-the-art Survey, ser. Lecture Notes in Computer Science. Berlin Heidelberg:Springer-Verlag, 2005, vol. 3342.
[3] E. ahin, W. Spears, and A. Win eld, Eds., Swarm Robotics. RevisedSelected Papers from the Second International Workshop, SAB 2006.Rome. Italy. Springer Berlin/Heidelberg, 2007, vol. 4433/2007.
[4] A. Win eld and J. Nembrini, \Safety in numbers: fault-tolerancein robot swarms," International Journal of Modelling, Identi ca-tion and Control, vol. 1, pp. 30{37, 2006. [Online]. Available:http://www.ias.uwe.ac.uk/ a-win e/WinNemIJMIC06.pdf
[5] E. Bonabeau, M. Dorigo, and G. Theraulaz., Swarm Intelligence: fromnatural to arti cial systems (Santa Fe Institute Studies in the Sciencesof Complexity). Oxford University Press, 1999.
[6] L. E. Parker, \ALLIANCE: An architecture for fault tolerant multi-robot cooperation," IEEE Transactions on Robotics and Automation,vol. 14, no. 2, pp. 220{240, April 1998. [Online]. Available:http://www.cs.utk.edu/ parker/publications/TRA.pdf
[7] T. Wark, C. Crossman, W. Hu, Y. Guo, P. Valencia, P. Sikka, P. Corke,C. Lee, J. Henshall, K. Prayaga, J. O'Grady, M. Reed, and A. Fisher,\The design and evaluation of a mobile sensor/actuator network for au-tonomous animal control," in Proceedings of the 6th international con-ference on Information processing in sensor networks. ACM, 2007, pp.206{215.
[8] K. Dantu, M. Rahimi, H. Shah, S. Babel, A. Dhariwal, andG. Sukhatme, \Robomote: Enabling mobility in sensor networks," inProceedings of Fourth International Symposium on Information Process-ing in Sensor Networks, 2005, pp. 404{409.
[9] J. Reich and E. Sklar, \Toward automatic recon guration ofrobot-sensor networks for urban search and rescue." in Pro-ceedings of the 1st International Workshop on Agent Tech-nology for Disaster Management, 2006. [Online]. Available:http://users.ecs.soton.ac.uk/sdr/atdm/ws34atdm.pdf
[10] E. Hansson, A. Bengtsson, and A. Vidstrm, \Security solutions formobile ad hoc networks." Swedish MOD, FOI Defence Research AgencyCommand and Control Systems P.O. Fox 1165 SE-581 11 Linkping Tel013-378086, Technical Report FOI-R{1694{SE ISSN 1650-1942, August2005. [Online]. Available: http://www2.foi.se/rapp/foir1694.pdf
[11] L. Buttyn and J.-P. Hubaux, Security and Cooperation in WirelessNetworks: thwarting malicious and sel sh behaviour in the age ofubiquitous computing. Cambridge University Press, 2007. [Online].Available: http://secowinet.ep.ch/fulltext/SeCoWiNetV1.5.1.pdf
[12] M. Wooldridge, An Introduction to MultiAgent Systems. Wiley, 2002.
[13] N. Borselius, \Multi-agent system security for mobile communication,"Ph.D. dissertation, Department of Mathematics, Royal Holloway, Uni-versity of London., 2003.
[14] D. Fritsch, K. Wegener, and R. Schraft., \Control of a robotic swarm forthe elimination of marine oil pollutions," in IEEE Swarm IntelligenceSymposium (SIS 2007), 2007, pp. 29{36.
[15] L. Parker, \Current state of the art in distributed au-tonomous mobile robotics," Distributed Autonomous RoboticSystems, vol. 4, pp. 3{12, 2000. [Online]. Available:http://www.cs.utk.edu/ parker/publications/DARS2000overview:pdf
[16] P.-P. Grass, \La reconstruction du nid et les coordinations inter-individuelleschez bellicositermes natalensis et cubitermes sp. la thorie de la stigmergie:Essai d'interprtation du comportement des termites constructeurs." Insec.Soc., vol. 6, pp. 41{80, 1959.
[17] T. White, \Expert assessment of stigmergy: A report for thedepartment of national defence," School of Computer Science, CarletonUniversity, Ottawa, Ontario, Canada, Tech. Rep., 2005. [Online]. Available:http://www.scs.carleton.ca/ arpwhite/stigmergy-report.pdf
[18] P. Flocchini, G. Prencipe, N. Santoro, and P. Widmayer, \Gatheringof asynchronous robots with limited visibility." Theoretical ComputerScience, vol. 337, no. 1-3, pp. 147{168, 2005. [Online]. Available:http://dx.doi.org/10.1016/j.tcs.2005.01.001
[19] R. A. Russell, \Visual recognition of conspeci cs by swarm robots," in2004 Australasian Conference on Robotics & Automation, 2004. [Online].Available: http://www.araa.asn.au/acra/acra2004/papers/russell.pdf
[20] J. Fredslund and M. Matari, \A general algorithm for robot formations usinglocal sensing and minimal communication," IEEE Transactions on Roboticsand Automation, vol. 18, pp. 837{846, 2002.
[21] S. Dolev, L. Lahiani, and M. Yung, \Secret swarm unit. reactive k-secretsharing," in Proc. of the 8th International Conference on Cryptology in India.Springer Verlag, 2007, pp. 123{137.