Abstract
Most research in robotic swarms assumes a benign operational environment for the swarm. This paper follows on from previous work on attacks on a robotic swarms and presents an analysis of how Intrusion Detection Systems (IDS) may be applied to protect robotic swarms. This paper shows that due to the characteristics of a swarm, anomaly-based intrusion detection techniques cannot be applied. Signature based techniques however can be used. The idea of an IDS Swarm is introduced and it is demonstrated that a signature based IDS can used to protect a swarm in a hostile environment.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Al-Nashif, Y., Kumar, A.A., Hariri, S., Luo, Y., Szidarovsky, F., Qu, G.: Multilevel intrusion detection system (ML-IDS). In: International Conference on Autonomic Computing 2008, ICAC 2008, pp. 131–140 (2008)
Ali, Q.I., Lazim, S.: Design and implementation of an embedded intrusion detection system for wireless applications. IET Inf. Secur. 6(3), 171–182 (2012)
Anderson, J.P.: Computer security threat monitoring and surveillance. Technical report, James P. Anderson Co
Axelsson, S.: Intrusion detection systems: A survey and taxonomy. Technical report, Chalmers University of Technology
Bai, Y., Kobayashi, H.: Intrusion detection systems: technology and development. In: 17th International Conference on Advanced Information Networking and Applications 2003, AINA 2003, pp. 710–715 (2003)
Balch, T., Arkin, R.C.: Behavior-based formation control for multi-robot teams. IEEE Transact. Robot. Autom. 14, 926–939 (1997)
Cho, E.J., Hong, C.S., Choi, D.: Distributed IDS for efficient resource management in wireless sensor network. In: 2011 13th Asia-Pacific Network Operations and Management Symposium (APNOMS), pp. 1–5 (2011)
Cianci, C.M., Raemy, X., Pugh, J., Martinoli, A.: Ecole Polytechnique Federaledelausanne. Communication in a swarm of miniature robots: the e-puck as an educational tool for swarm robotics. In: Simulation of Adaptive Behavior, SAB-2006, Swarm Robotics Workshop, pp. 103–115. Springer (2006)
Denning, D., Naumann, P.G.: Requirements and model for IDES – a real-time intrusion-detection expert system. Technical report, SRI International
Ducatelle, F., Di Caro, G.A., Pinciroli, C., Mondada, F., Gambardella, L.: Communication assisted navigation in robotic swarms: self-organization and co-operation. In: 2011 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), pp. 4981–4988 (2011)
Fredslund, J., Mataric, M.J.: A general algorithm for robot formations using local sensing and minimal communication. IEEE Transact. Robot. Autom. 18(5), 837–846 (2002)
Gerkey, B.P., Mataric, M.J.: Sold!: auction methods for multirobot coordination. IEEE Transact. Robot. Autom. 18(5), 758–768 (2002)
Gollmann, D.: Computer security. Wiley Interdisc. Rev. Comput. Stat. 2(5), 544–554 (2010)
Haddadi, F., Sarram, M.A.: Wireless intrusion detection system using a light-weight agent. In: 2010 Second International Conference on Computer and Network Technology (ICCNT), pp. 84–87 (2010)
Hassanzadeh, A., Stoleru, R.: Towards optimal monitoring in cooperative ids for resource constrained wireless networks. In: 2011 Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN), pp. 1–8 (2011)
Heady, R., Luger, G., Maccabe, A., Servilla, M.: The architecture of a network level intrusion detection system. Technical report, Department of Computer Science, University of New Mexico, Albuquerque, NM (1990)
Kabiri, P., Ghorbani, A.A.: Research on intrusion detection and response: a survey. Int. J. Netw. Secur. 1, 84–102 (2005)
Kumar, V., Sahin, F.: Cognitive maps in swarm robots for the mine detection application. In: IEEE International Conference on Systems, Man and Cybernetics 2003, vol. 4, pp. 3364–3369 (2003)
Kumar, V., Sahin, F.: Foraging in ant colonies applied to the mine detection problem. In: Proceedings of the 2003 IEEE International Workshop on Soft Computing in Industrial Applications 2003, SMCia 2003, pp. 61–66 (2003)
Martinoli, A., Easton, K., Agassounon, W.: Modeling swarm robotic systems: a case study in collaborative distributed manipulation. Int. J. Robot. Res. 23, 415–436 (2004)
Mirkovic, J., Reiher, P.: A taxonomy of DDoS attack and DDoS defense mechanisms. SIGCOMM Comput. Commun. Rev. 34(2), 39–53 (2004)
Munirajan, V.K., Sahin, F., Cole, E.: Ant colony optimization based swarms: implementation for the mine detection application. In: 2004 IEEE International Conference on Systems, Man and Cybernetics, vol. 1, pp. 716–721 (2004)
Nasir, H.J.A., Ku-Mahamud, K.R.: Wireless sensor network: a bibliographical survey. Indian Journal of Science and Technology, 9(38), 2016
Poston, H.E.: A brief taxonomy of intrusion detection strategies. In: 2012 IEEE National Aerospace and Electronics Conference (NAECON), pp. 255–263 (2012)
Reynolds, C.W.: Flocks, herds, and schools: a distributed behavioural model. In: Computer Graphics, pp. 25–34
Sargeant, I., Tomlinson, A.: Maliciously manipulating a robotic swarm. In: International Conference Embedded Systems, Cyber-physical Systems & Applications, ESCS 2016, pp. 122–128 (2016)
Sargeant, I., Tomlinson, A.: Review of potential attacks on robotic swarms. In: IntelliSys 2016. IEEE (2016)
Scarfone, K., Mell, P.: Guide to intrusion detection and prevention systems (IDPS). Special Publication 800-94, National Institute of Standards and Technology
Scerri, P., Pynadath, D., Johnson, L., Rosenbloom, P., Si, M., Schurr, N., Tambe, M.: A prototype infrastructure for distributed robot-agent-person teams. In: Proceedings of the Second International Joint Conference on Autonomous Agents and Multiagent Systems, AAMAS 2003, pp. 433–440. ACM, New York (2003)
Subchan, S., White, B.A., Tsourdos, A., Shanmugavel, M., Zbikowski, R.: Pythagorean Hodograph (PH) path planning for tracking airborne contaminant using sensor swarm. In: Instrumentation and Measurement Technology Conference Proceedings 2008, IMTC 2008, pp. 501–506. IEEE (2008)
Woern, H., Szymanski, M., Seyfried, J.: The I-SWARM project. In: The 15th IEEE International Symposium on Robot and Human Interactive Communication 2006, ROMAN 2006, pp. 492–496 (2006)
Yang, Y., McLaughlin, K., Sezer, S., Yuan, Y.B., Huang, W.: Stateful intrusion detection for IEC 60870-5-104 SCADA security. In: 2014 IEEE PES General Meeting|Conference Exposition, pp. 1–5 (2014)
Zanjireh, M.M., Shahrabi, A., Larijani, H.: Anch: a new clustering algorithm for wireless sensor networks. In: 2013 27th International Conference on Advanced Information Networking and Applications Workshops (WAINA), pp. 450–455 (2013)
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Sargeant, I., Tomlinson, A. (2020). Intrusion Detection in Robotic Swarms. In: Bi, Y., Bhatia, R., Kapoor, S. (eds) Intelligent Systems and Applications. IntelliSys 2019. Advances in Intelligent Systems and Computing, vol 1038. Springer, Cham. https://doi.org/10.1007/978-3-030-29513-4_71
Download citation
DOI: https://doi.org/10.1007/978-3-030-29513-4_71
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-29512-7
Online ISBN: 978-3-030-29513-4
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)