Use this URL to cite or link to this record in EThOS: https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.792909
Title: The detection of malicious activities within a robotic swarm
Author: Sargeant, Ian
ISNI:       0000 0004 8500 654X
Awarding Body: Royal Holloway, University of London
Current Institution: Royal Holloway, University of London
Date of Award: 2019
Availability of Full Text:
Access from EThOS:
Access from Institution:
Abstract:
Much research has been undertaken in the field of swarm robotics and its potential applications. However, the majority of the research work assumes a benign operational environment for the robotic swarm. This work considers the effect of malicious attackers attempting to either prevent a swarm from achieving its goal or influence the swarm in such a way, so as to make it less efficient. This work provides details the characteristics of a swarm and provides a taxonomy for swarms. While the threat types for a swarm are no different to the threats types for traditional information systems, we show that there are differences with the attack types and attack methods, due to the unique characteristics of a swarm when compared to a traditional information system. The work then provides a generic model for swarms, their entities and their operational environment. The generic model is used in conjunction with a taxonomy of threats, to enable the research to develop simulations for the swarms, to investigate whether swarms could be maliciously manipulated, with the results of the simulations demonstrating that the swarms could be manipulated. The research progressed to researching and implementing Intrusion Detection Systems (IDS), tailored for the swarm. This was based on research around current IDS methods and it was determined that signature based IDS could be utilised but anomaly based IDS were not suitable for use in swarms. Simulations were undertaken that utilised IDS functionality within scenarios that had previously been attacked and the IDS functionality was shown to be successful in the majority of instances. That is, the swarms were either more efficient at achieving their goal, when compared to being attacked without the IDS functionality, or the swarms were simply able to complete their tasks, when previously they had not.
Supervisor: Not available Sponsor: Not available
Qualification Name: Thesis (Ph.D.) Qualification Level: Doctoral
EThOS ID: uk.bl.ethos.792909  DOI: Not available
Keywords: robotic swarm ; robotic swarms ; security ; attacks ; taxonomy ; Modelling and Simulation ; intrusion detection system
Share: