Skip to main content
Top
Published in: Autonomous Robots 6/2017

28-02-2017

Guaranteeing spoof-resilient multi-robot networks

Authors: Stephanie Gil, Swarun Kumar, Mark Mazumder, Dina Katabi, Daniela Rus

Published in: Autonomous Robots | Issue 6/2017

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Multi-robot networks use wireless communication to provide wide-ranging services such as aerial surveillance and unmanned delivery. However, effective coordination between multiple robots requires trust, making them particularly vulnerable to cyber-attacks. Specifically, such networks can be gravely disrupted by the Sybil attack, where even a single malicious robot can spoof a large number of fake clients. This paper proposes a new solution to defend against the Sybil attack, without requiring expensive cryptographic key-distribution. Our core contribution is a novel algorithm implemented on commercial Wi-Fi radios that can “sense” spoofers using the physics of wireless signals. We derive theoretical guarantees on how this algorithm bounds the impact of the Sybil Attack on a broad class of multi-robot problems, including locational coverage and unmanned delivery. We experimentally validate our claims using a team of AscTec quadrotor servers and iRobot Create ground clients, and demonstrate spoofer detection rates over 96%.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Footnotes
1
The case of adversarial server robots is left for future work although many of the concepts in the current paper are extensible to this case as well.
 
2
Detecting if a client i is spoofed becomes easier given more servers communicating with i (i.e., a larger neighborhood \(\mathcal {N}_i\)). But even with a single server, this determination can be made. A theoretical treatment of this point is given in Sect. 5 and experimental results (Sect. 9.1) use as little as one server.
 
3
For clarity, we drop dependence on i, l for SNR, \(\sigma _\theta \) and \(\sigma _\phi \).
 
4
This is a mild requirement since 25–30 packets can be transmitted in tens of milliseconds, even at the lowest data rate of 6Mb/s of 802.11n Wi-Fi.
 
Literature
go back to reference Adib, F., Kumar, S., Aryan, O., Gollakota, S., & Katabi, D. (2013). Interference Alignment by Motion. In MOBICOM. Adib, F., Kumar, S., Aryan, O., Gollakota, S., & Katabi, D. (2013). Interference Alignment by Motion. In MOBICOM.
go back to reference Beard, R., McLain, T., Nelson, D., Kingston, D., & Johanson, D. (2006). Decentralized cooperative aerial surveillance using fixed-wing miniature UAVs. Proceedings of the IEEE, 94(7), 1306–1324. doi:10.1109/JPROC.2006.876930.CrossRef Beard, R., McLain, T., Nelson, D., Kingston, D., & Johanson, D. (2006). Decentralized cooperative aerial surveillance using fixed-wing miniature UAVs. Proceedings of the IEEE, 94(7), 1306–1324. doi:10.​1109/​JPROC.​2006.​876930.CrossRef
go back to reference Chapman, A., Nabi-Abdolyousefi, M., & Mesbahi, M. (2009). Identification and infiltration in consensus-type networks. In 1st IFAC Workshop on Estimation and Control of Networked Systems. Chapman, A., Nabi-Abdolyousefi, M., & Mesbahi, M. (2009). Identification and infiltration in consensus-type networks. In 1st IFAC Workshop on Estimation and Control of Networked Systems.
go back to reference Daniel, K., Dusza, B., Lewandowski, A., & Wietfeld, C. (2009). AirShield: A system-of-systems MUAV remote sensing architecture for disaster response. In Systems conference, 2009 3rd Annual IEEE (pp. 196–200) doi:10.1109/SYSTEMS.2009.4815797. Daniel, K., Dusza, B., Lewandowski, A., & Wietfeld, C. (2009). AirShield: A system-of-systems MUAV remote sensing architecture for disaster response. In Systems conference, 2009 3rd Annual IEEE (pp. 196–200) doi:10.​1109/​SYSTEMS.​2009.​4815797.
go back to reference Douceur, J. (2002). The sybil attack. In P. Druschel, F. Kaashoek, & A. Rowstron (Eds.), Peer-to-Peer systems, Lecture Notes in Computer Science (vol. 2429, pp. 251–260). Berlin: Springer. doi:10.1007/3-540-45748-8_24. Douceur, J. (2002). The sybil attack. In P. Druschel, F. Kaashoek, & A. Rowstron (Eds.), Peer-to-Peer systems, Lecture Notes in Computer Science (vol. 2429, pp. 251–260). Berlin: Springer. doi:10.​1007/​3-540-45748-8_​24.
go back to reference Fawcett, T. (2004). ROC graphs: Notes and practical considerations for researchers. Technical Report. Fawcett, T. (2004). ROC graphs: Notes and practical considerations for researchers. Technical Report.
go back to reference Feng, Z., Ning, J., Broustis, I., Pelechrinis, K., Krishnamurthy, S.V., & Faloutsos, M. (2011). Coping with packet replay attacks in wireless networks. In Sensor, mesh and ad hoc communications and networks (SECON), 2011 8th Annual IEEE Communications Society Conference on (pp. 368–376). IEEE. Feng, Z., Ning, J., Broustis, I., Pelechrinis, K., Krishnamurthy, S.V., & Faloutsos, M. (2011). Coping with packet replay attacks in wireless networks. In Sensor, mesh and ad hoc communications and networks (SECON), 2011 8th Annual IEEE Communications Society Conference on (pp. 368–376). IEEE.
go back to reference Gazzah, H., & Marcos, S. (2003). Directive antenna arrays for 3D source localization. In Signal processing advances in wireless communications, 2003. SPAWC 2003. 4th IEEE Workshop on (pp. 619–623). doi:10.1109/SPAWC.2003.1319035. Gazzah, H., & Marcos, S. (2003). Directive antenna arrays for 3D source localization. In Signal processing advances in wireless communications, 2003. SPAWC 2003. 4th IEEE Workshop on (pp. 619–623). doi:10.​1109/​SPAWC.​2003.​1319035.
go back to reference Gil, S., Kumar, S., Katabi, D., & Rus, D. (2013). Adaptive communication in multi-robot systems using directionality of signal strength. ISRR. Gil, S., Kumar, S., Katabi, D., & Rus, D. (2013). Adaptive communication in multi-robot systems using directionality of signal strength. ISRR.
go back to reference Gil, S., Kumar, S., Mazumder, M., Katabi, D., & Rus, D. (2015a). Guaranteeing spoof-resilient multi-robot networks. In Full paper version with supplementary material available as a TECH REPORT at MIT CSAIL Publications and Digital Archive. http://publications.csail.mit.edu. Gil, S., Kumar, S., Mazumder, M., Katabi, D., & Rus, D. (2015a). Guaranteeing spoof-resilient multi-robot networks. In Full paper version with supplementary material available as a TECH REPORT at MIT CSAIL Publications and Digital Archive. http://​publications.​csail.​mit.​edu.
go back to reference Gil, S., Kumar, S., Mazumder, M., Katabi, D., & Rus, D. (2015b). Guaranteeing spoof-resilient multi-robot networks. In Proceedings of robotics: Science and systems. Rome, Italy. Gil, S., Kumar, S., Mazumder, M., Katabi, D., & Rus, D. (2015b). Guaranteeing spoof-resilient multi-robot networks. In Proceedings of robotics: Science and systems. Rome, Italy.
go back to reference Goldsmith, A. (2005). Wireless communications. Cambridge: Cambridge University Press.CrossRef Goldsmith, A. (2005). Wireless communications. Cambridge: Cambridge University Press.CrossRef
go back to reference Halperin, D., Hu, W., Sheth, A., & Wetherall, D. (2011). Tool release: Gathering 802.11n traces with channel state information. ACM SIGCOMM. Computer Communication Review, 41(1), 53.CrossRef Halperin, D., Hu, W., Sheth, A., & Wetherall, D. (2011). Tool release: Gathering 802.11n traces with channel state information. ACM SIGCOMM. Computer Communication Review, 41(1), 53.CrossRef
go back to reference Hayes, M. H. (1996). Statistical digital signal processing and modeling (1st ed.). New York, NY, USA: Wiley. Hayes, M. H. (1996). Statistical digital signal processing and modeling (1st ed.). New York, NY, USA: Wiley.
go back to reference Higgins, F., Tomlinson, A., & Martin, K.M. (2009). Threats to the swarm: Security considerations for swarm robotics. International Journal on Advances in Security, 2. Higgins, F., Tomlinson, A., & Martin, K.M. (2009). Threats to the swarm: Security considerations for swarm robotics. International Journal on Advances in Security, 2.
go back to reference Klausing, H. (1989). Feasibility of a SAR with rotating antennas (ROSAR). In Microwave Conference, 1989. Klausing, H. (1989). Feasibility of a SAR with rotating antennas (ROSAR). In Microwave Conference, 1989.
go back to reference Kumar, S., Gil, S., Katabi, D., & Rus, D. (2014). Accurate indoor localization with zero start-up cost. In Proceedings of the 20th annual international conference on mobile computing and networking, MobiCom ’14 (pp. 483–494). New York, NY, USA: ACM. doi:10.1145/2639108.2639142. Kumar, S., Gil, S., Katabi, D., & Rus, D. (2014). Accurate indoor localization with zero start-up cost. In Proceedings of the 20th annual international conference on mobile computing and networking, MobiCom ’14 (pp. 483–494). New York, NY, USA: ACM. doi:10.​1145/​2639108.​2639142.
go back to reference Kumar, S., Hamed, E., Katabi, D., & Erran Li, L. (2014). LTE radio analytics made easy and accessible. In Proceedings of the 2014 ACM conference on SIGCOMM, SIGCOMM ’14 (pp. 211–222). New York, NY, USA: ACM. doi:10.1145/2619239.2626320. Kumar, S., Hamed, E., Katabi, D., & Erran Li, L. (2014). LTE radio analytics made easy and accessible. In Proceedings of the 2014 ACM conference on SIGCOMM, SIGCOMM ’14 (pp. 211–222). New York, NY, USA: ACM. doi:10.​1145/​2619239.​2626320.
go back to reference Laporte, G., Nobert, Y., & Taillefer, S. (1988). Solving a family of multi-depot vehicle routing and location-routing problems. Transportation Science, 22(3), 161–172.MathSciNetCrossRefMATH Laporte, G., Nobert, Y., & Taillefer, S. (1988). Solving a family of multi-depot vehicle routing and location-routing problems. Transportation Science, 22(3), 161–172.MathSciNetCrossRefMATH
go back to reference Levine, B. N., Shields, C., & Margolin, N. B. (2006). A survey of solutions to the sybil attack. Techincal Report, Document Number 2006-052. Amherst: University of Massachusetts Amherst Levine, B. N., Shields, C., & Margolin, N. B. (2006). A survey of solutions to the sybil attack. Techincal Report, Document Number 2006-052. Amherst: University of Massachusetts Amherst
go back to reference Lin, L., & Goodrich, M. A. (2009). UAV intelligent path planning for wilderness search and rescue. In Intelligent robots and systems, 2009. IROS 2009. IEEE/RSJ International Conference on (pp. 709–714). IEEE. Lin, L., & Goodrich, M. A. (2009). UAV intelligent path planning for wilderness search and rescue. In Intelligent robots and systems, 2009. IROS 2009. IEEE/RSJ International Conference on (pp. 709–714). IEEE.
go back to reference Liu, H., Wang, Y., Liu, J., Yang, J., & Chen, Y. (2014). Practical user authentication leveraging channel state information (CSI). In Proceedings of the 9th ACM symposium on information, computer and communications security, ASIA CCS ’14 (pp. 389–400). New York, NY, USA: ACM. doi:10.1145/2590296.2590321. Liu, H., Wang, Y., Liu, J., Yang, J., & Chen, Y. (2014). Practical user authentication leveraging channel state information (CSI). In Proceedings of the 9th ACM symposium on information, computer and communications security, ASIA CCS ’14 (pp. 389–400). New York, NY, USA: ACM. doi:10.​1145/​2590296.​2590321.
go back to reference Malmirchegini, M., & Mostofi, Y. (2012). On the spatial predictability of communication channels. IEEE Transactions on Wireless Communications, 11(3), 964–978.CrossRef Malmirchegini, M., & Mostofi, Y. (2012). On the spatial predictability of communication channels. IEEE Transactions on Wireless Communications, 11(3), 964–978.CrossRef
go back to reference Miao, F., Pajic, M., & Pappas, G.J. (2013). Stochastic game approach for replay attack detection. In Decision and control (CDC), 2013 IEEE 52nd annual conference on (pp. 1854–1859). IEEE. Miao, F., Pajic, M., & Pappas, G.J. (2013). Stochastic game approach for replay attack detection. In Decision and control (CDC), 2013 IEEE 52nd annual conference on (pp. 1854–1859). IEEE.
go back to reference Newsome, J., Shi, E., Song, D., & Perrig, A. (2004). The sybil attack in sensor networks: Analysis defenses. In Information processing in sensor networks, 2004. IPSN 2004. Third international symposium on (pp. 259–268). doi:10.1109/IPSN.2004.1307346. Newsome, J., Shi, E., Song, D., & Perrig, A. (2004). The sybil attack in sensor networks: Analysis defenses. In Information processing in sensor networks, 2004. IPSN 2004. Third international symposium on (pp. 259–268). doi:10.​1109/​IPSN.​2004.​1307346.
go back to reference Parker, L. E. (2002). Distributed algorithms for multi-robot observation of multiple moving targets. Autonomous Robots, 12, 231–255.CrossRefMATH Parker, L. E. (2002). Distributed algorithms for multi-robot observation of multiple moving targets. Autonomous Robots, 12, 231–255.CrossRefMATH
go back to reference Pavone, M., Frazzoli, E., & Bullo, F. (2011). Adaptive and distributed algorithms for vehicle routing in a stochastic and dynamic environment. IEEE Transactions on Automatic Control, 56(6), 1259–1274.MathSciNetCrossRef Pavone, M., Frazzoli, E., & Bullo, F. (2011). Adaptive and distributed algorithms for vehicle routing in a stochastic and dynamic environment. IEEE Transactions on Automatic Control, 56(6), 1259–1274.MathSciNetCrossRef
go back to reference Pires W. R., de Paula Figueiredo, T., Wong, H., & Loureiro, A. (2004). Malicious node detection in wireless sensor networks. In Parallel and distributed processing symposium, 2004. Proceedings. 18th international (p. 24). doi:10.1109/IPDPS.2004.1302934. Pires W. R., de Paula Figueiredo, T., Wong, H., & Loureiro, A. (2004). Malicious node detection in wireless sensor networks. In Parallel and distributed processing symposium, 2004. Proceedings. 18th international (p. 24). doi:10.​1109/​IPDPS.​2004.​1302934.
go back to reference Sargeant, I., & Tomlinson, A. (2013). Modelling malicious entities in a robotic swarm. In Digital avionics systems conference (DASC), 2013 IEEE/AIAA 32nd. Sargeant, I., & Tomlinson, A. (2013). Modelling malicious entities in a robotic swarm. In Digital avionics systems conference (DASC), 2013 IEEE/AIAA 32nd.
go back to reference Schwager, M., Julian, B. J., & Rus, D. (2009). Optimal coverage for multiple hovering robots with downward facing cameras. In Robotics and automation, 2009. ICRA ’09. IEEE international conference on (pp. 3515–3522). doi:10.1109/ROBOT.2009.5152815. Schwager, M., Julian, B. J., & Rus, D. (2009). Optimal coverage for multiple hovering robots with downward facing cameras. In Robotics and automation, 2009. ICRA ’09. IEEE international conference on (pp. 3515–3522). doi:10.​1109/​ROBOT.​2009.​5152815.
go back to reference Tse, D., & Vishwanath, P. (2005). Fundamentals of wireless communications. Cambridge: Cambridge University Press.CrossRef Tse, D., & Vishwanath, P. (2005). Fundamentals of wireless communications. Cambridge: Cambridge University Press.CrossRef
go back to reference Wang, J., & Katabi, D. (2013). Dude, Where’s my card?: RFID positioning that works with multipath and non-line of sight. In SIGCOMM. Wang, J., & Katabi, D. (2013). Dude, Where’s my card?: RFID positioning that works with multipath and non-line of sight. In SIGCOMM.
go back to reference Wang, X., Yadav, V., & Balakrishnan, S. (2007). Cooperative UAV formation flying with obstacle/collision avoidance. IEEE Transactions on Control Systems Technology, 15(4), 672–679.CrossRef Wang, X., Yadav, V., & Balakrishnan, S. (2007). Cooperative UAV formation flying with obstacle/collision avoidance. IEEE Transactions on Control Systems Technology, 15(4), 672–679.CrossRef
go back to reference Xiao, L., Greenstein, L., Mandayam, N. B., & Trappe, W. (2009). Channel-based detection of sybil attacks in wireless networks. IEEE Transactions on Information Forensics and Security, 4(3), 492–503. doi:10.1109/TIFS.2009.2026454.CrossRef Xiao, L., Greenstein, L., Mandayam, N. B., & Trappe, W. (2009). Channel-based detection of sybil attacks in wireless networks. IEEE Transactions on Information Forensics and Security, 4(3), 492–503. doi:10.​1109/​TIFS.​2009.​2026454.CrossRef
go back to reference Xiong, J., & Jamieson, K. (2013). SecureArray: Improving Wifi security with fine-grained physical-layer information. In Proceedings of the 19th annual international conference on mobile computing & networking, MobiCom ’13 (pp. 441–452). New York, NY, USA: ACM. doi:10.1145/2500423.2500444. Xiong, J., & Jamieson, K. (2013). SecureArray: Improving Wifi security with fine-grained physical-layer information. In Proceedings of the 19th annual international conference on mobile computing & networking, MobiCom ’13 (pp. 441–452). New York, NY, USA: ACM. doi:10.​1145/​2500423.​2500444.
go back to reference Yang, J., Chen, Y., Trappe, W., & Cheng, J. (2013). Detection and localization of multiple spoofing attackers in wireless networks. IEEE Transactions on Parallel and Distributed Systems, 24(1), 44–58. doi:10.1109/TPDS.2012.104.CrossRef Yang, J., Chen, Y., Trappe, W., & Cheng, J. (2013). Detection and localization of multiple spoofing attackers in wireless networks. IEEE Transactions on Parallel and Distributed Systems, 24(1), 44–58. doi:10.​1109/​TPDS.​2012.​104.CrossRef
Metadata
Title
Guaranteeing spoof-resilient multi-robot networks
Authors
Stephanie Gil
Swarun Kumar
Mark Mazumder
Dina Katabi
Daniela Rus
Publication date
28-02-2017
Publisher
Springer US
Published in
Autonomous Robots / Issue 6/2017
Print ISSN: 0929-5593
Electronic ISSN: 1573-7527
DOI
https://doi.org/10.1007/s10514-017-9621-5

Other articles of this Issue 6/2017

Autonomous Robots 6/2017 Go to the issue