TY - GEN
T1 - Adversarial impacts on autonomous decentralized lightweight swarms
AU - Wolf, Shaya
AU - Cooley, Rafer
AU - Borowczak, Mike
N1 - Publisher Copyright:
© 2019 IEEE.
PY - 2019/10
Y1 - 2019/10
N2 - The decreased size and cost of Unmanned Aerial Vehicles (UAVs) and Unmanned Ground Vehicles (UGVs) has enabled the use of swarms of unmanned autonomous vehicles to accomplish a variety of tasks. By utilizing swarming behaviors, it is possible to efficiently accomplish coordinated tasks while minimizing per-drone computational requirements. Some drones rely on decentralized protocols that exhibit emergent behavior across the swarm. While fully decentralized algorithms remove obvious attack vectors their susceptibility to external influence is less understood. This work investigates the influences that can compromise the functionality of an autonomous swarm leading to hazardous situations and cascading vulnerabilities. When a swarm is tasked with missions involving the safety or health of humans, external influences could have serious consequences. The adversarial swarm in this work utilizes an attack vector embedded within the decentralized movement algorithm of a previously defined autonomous swarm designed to create a perimeter sentry swarm. Various simulations confirm the adversarial swarm's ability to capture significant portions (6-23%) of the perimeter.
AB - The decreased size and cost of Unmanned Aerial Vehicles (UAVs) and Unmanned Ground Vehicles (UGVs) has enabled the use of swarms of unmanned autonomous vehicles to accomplish a variety of tasks. By utilizing swarming behaviors, it is possible to efficiently accomplish coordinated tasks while minimizing per-drone computational requirements. Some drones rely on decentralized protocols that exhibit emergent behavior across the swarm. While fully decentralized algorithms remove obvious attack vectors their susceptibility to external influence is less understood. This work investigates the influences that can compromise the functionality of an autonomous swarm leading to hazardous situations and cascading vulnerabilities. When a swarm is tasked with missions involving the safety or health of humans, external influences could have serious consequences. The adversarial swarm in this work utilizes an attack vector embedded within the decentralized movement algorithm of a previously defined autonomous swarm designed to create a perimeter sentry swarm. Various simulations confirm the adversarial swarm's ability to capture significant portions (6-23%) of the perimeter.
KW - Autonomous robots
KW - Decentralized control
KW - Intelligent transportation systems
KW - Unmanned autonomous vehicles
UR - http://www.scopus.com/inward/record.url?scp=85084655974&partnerID=8YFLogxK
U2 - 10.1109/ISC246665.2019.9071763
DO - 10.1109/ISC246665.2019.9071763
M3 - Conference contribution
AN - SCOPUS:85084655974
T3 - 5th IEEE International Smart Cities Conference, ISC2 2019
SP - 160
EP - 166
BT - 5th IEEE International Smart Cities Conference, ISC2 2019
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 5th IEEE International Smart Cities Conference, ISC2 2019
Y2 - 14 October 2019 through 17 October 2019
ER -