Skip to main content

Intrusion Detection in Robotic Swarms

  • Conference paper
  • First Online:
Intelligent Systems and Applications (IntelliSys 2019)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1038))

Included in the following conference series:

Abstract

Most research in robotic swarms assumes a benign operational environment for the swarm. This paper follows on from previous work on attacks on a robotic swarms and presents an analysis of how Intrusion Detection Systems (IDS) may be applied to protect robotic swarms. This paper shows that due to the characteristics of a swarm, anomaly-based intrusion detection techniques cannot be applied. Signature based techniques however can be used. The idea of an IDS Swarm is introduced and it is demonstrated that a signature based IDS can used to protect a swarm in a hostile environment.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Al-Nashif, Y., Kumar, A.A., Hariri, S., Luo, Y., Szidarovsky, F., Qu, G.: Multilevel intrusion detection system (ML-IDS). In: International Conference on Autonomic Computing 2008, ICAC 2008, pp. 131–140 (2008)

    Google Scholar 

  2. Ali, Q.I., Lazim, S.: Design and implementation of an embedded intrusion detection system for wireless applications. IET Inf. Secur. 6(3), 171–182 (2012)

    Article  Google Scholar 

  3. Anderson, J.P.: Computer security threat monitoring and surveillance. Technical report, James P. Anderson Co

    Google Scholar 

  4. Axelsson, S.: Intrusion detection systems: A survey and taxonomy. Technical report, Chalmers University of Technology

    Google Scholar 

  5. Bai, Y., Kobayashi, H.: Intrusion detection systems: technology and development. In: 17th International Conference on Advanced Information Networking and Applications 2003, AINA 2003, pp. 710–715 (2003)

    Google Scholar 

  6. Balch, T., Arkin, R.C.: Behavior-based formation control for multi-robot teams. IEEE Transact. Robot. Autom. 14, 926–939 (1997)

    Article  Google Scholar 

  7. Cho, E.J., Hong, C.S., Choi, D.: Distributed IDS for efficient resource management in wireless sensor network. In: 2011 13th Asia-Pacific Network Operations and Management Symposium (APNOMS), pp. 1–5 (2011)

    Google Scholar 

  8. Cianci, C.M., Raemy, X., Pugh, J., Martinoli, A.: Ecole Polytechnique Federaledelausanne. Communication in a swarm of miniature robots: the e-puck as an educational tool for swarm robotics. In: Simulation of Adaptive Behavior, SAB-2006, Swarm Robotics Workshop, pp. 103–115. Springer (2006)

    Google Scholar 

  9. Denning, D., Naumann, P.G.: Requirements and model for IDES – a real-time intrusion-detection expert system. Technical report, SRI International

    Google Scholar 

  10. Ducatelle, F., Di Caro, G.A., Pinciroli, C., Mondada, F., Gambardella, L.: Communication assisted navigation in robotic swarms: self-organization and co-operation. In: 2011 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), pp. 4981–4988 (2011)

    Google Scholar 

  11. Fredslund, J., Mataric, M.J.: A general algorithm for robot formations using local sensing and minimal communication. IEEE Transact. Robot. Autom. 18(5), 837–846 (2002)

    Article  Google Scholar 

  12. Gerkey, B.P., Mataric, M.J.: Sold!: auction methods for multirobot coordination. IEEE Transact. Robot. Autom. 18(5), 758–768 (2002)

    Article  Google Scholar 

  13. Gollmann, D.: Computer security. Wiley Interdisc. Rev. Comput. Stat. 2(5), 544–554 (2010)

    Article  Google Scholar 

  14. Haddadi, F., Sarram, M.A.: Wireless intrusion detection system using a light-weight agent. In: 2010 Second International Conference on Computer and Network Technology (ICCNT), pp. 84–87 (2010)

    Google Scholar 

  15. Hassanzadeh, A., Stoleru, R.: Towards optimal monitoring in cooperative ids for resource constrained wireless networks. In: 2011 Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN), pp. 1–8 (2011)

    Google Scholar 

  16. Heady, R., Luger, G., Maccabe, A., Servilla, M.: The architecture of a network level intrusion detection system. Technical report, Department of Computer Science, University of New Mexico, Albuquerque, NM (1990)

    Google Scholar 

  17. Kabiri, P., Ghorbani, A.A.: Research on intrusion detection and response: a survey. Int. J. Netw. Secur. 1, 84–102 (2005)

    Google Scholar 

  18. Kumar, V., Sahin, F.: Cognitive maps in swarm robots for the mine detection application. In: IEEE International Conference on Systems, Man and Cybernetics 2003, vol. 4, pp. 3364–3369 (2003)

    Google Scholar 

  19. Kumar, V., Sahin, F.: Foraging in ant colonies applied to the mine detection problem. In: Proceedings of the 2003 IEEE International Workshop on Soft Computing in Industrial Applications 2003, SMCia 2003, pp. 61–66 (2003)

    Google Scholar 

  20. Martinoli, A., Easton, K., Agassounon, W.: Modeling swarm robotic systems: a case study in collaborative distributed manipulation. Int. J. Robot. Res. 23, 415–436 (2004)

    Article  Google Scholar 

  21. Mirkovic, J., Reiher, P.: A taxonomy of DDoS attack and DDoS defense mechanisms. SIGCOMM Comput. Commun. Rev. 34(2), 39–53 (2004)

    Article  Google Scholar 

  22. Munirajan, V.K., Sahin, F., Cole, E.: Ant colony optimization based swarms: implementation for the mine detection application. In: 2004 IEEE International Conference on Systems, Man and Cybernetics, vol. 1, pp. 716–721 (2004)

    Google Scholar 

  23. Nasir, H.J.A., Ku-Mahamud, K.R.: Wireless sensor network: a bibliographical survey. Indian Journal of Science and Technology, 9(38), 2016

    Google Scholar 

  24. Poston, H.E.: A brief taxonomy of intrusion detection strategies. In: 2012 IEEE National Aerospace and Electronics Conference (NAECON), pp. 255–263 (2012)

    Google Scholar 

  25. Reynolds, C.W.: Flocks, herds, and schools: a distributed behavioural model. In: Computer Graphics, pp. 25–34

    Article  Google Scholar 

  26. Sargeant, I., Tomlinson, A.: Maliciously manipulating a robotic swarm. In: International Conference Embedded Systems, Cyber-physical Systems & Applications, ESCS 2016, pp. 122–128 (2016)

    Google Scholar 

  27. Sargeant, I., Tomlinson, A.: Review of potential attacks on robotic swarms. In: IntelliSys 2016. IEEE (2016)

    Google Scholar 

  28. Scarfone, K., Mell, P.: Guide to intrusion detection and prevention systems (IDPS). Special Publication 800-94, National Institute of Standards and Technology

    Google Scholar 

  29. Scerri, P., Pynadath, D., Johnson, L., Rosenbloom, P., Si, M., Schurr, N., Tambe, M.: A prototype infrastructure for distributed robot-agent-person teams. In: Proceedings of the Second International Joint Conference on Autonomous Agents and Multiagent Systems, AAMAS 2003, pp. 433–440. ACM, New York (2003)

    Google Scholar 

  30. Subchan, S., White, B.A., Tsourdos, A., Shanmugavel, M., Zbikowski, R.: Pythagorean Hodograph (PH) path planning for tracking airborne contaminant using sensor swarm. In: Instrumentation and Measurement Technology Conference Proceedings 2008, IMTC 2008, pp. 501–506. IEEE (2008)

    Google Scholar 

  31. Woern, H., Szymanski, M., Seyfried, J.: The I-SWARM project. In: The 15th IEEE International Symposium on Robot and Human Interactive Communication 2006, ROMAN 2006, pp. 492–496 (2006)

    Google Scholar 

  32. Yang, Y., McLaughlin, K., Sezer, S., Yuan, Y.B., Huang, W.: Stateful intrusion detection for IEC 60870-5-104 SCADA security. In: 2014 IEEE PES General Meeting|Conference Exposition, pp. 1–5 (2014)

    Google Scholar 

  33. Zanjireh, M.M., Shahrabi, A., Larijani, H.: Anch: a new clustering algorithm for wireless sensor networks. In: 2013 27th International Conference on Advanced Information Networking and Applications Workshops (WAINA), pp. 450–455 (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Ian Sargeant or Allan Tomlinson .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sargeant, I., Tomlinson, A. (2020). Intrusion Detection in Robotic Swarms. In: Bi, Y., Bhatia, R., Kapoor, S. (eds) Intelligent Systems and Applications. IntelliSys 2019. Advances in Intelligent Systems and Computing, vol 1038. Springer, Cham. https://doi.org/10.1007/978-3-030-29513-4_71

Download citation

Publish with us

Policies and ethics