Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3264437.3264475acmotherconferencesArticle/Chapter ViewAbstractPublication PagessinConference Proceedingsconference-collections
short-paper

Development of the Anomaly Detection Method for a Group of Mobile Robots

Published: 10 September 2018 Publication History

Abstract

This article studied the attacks that can be implemented in a network of mobile robots. The peculiarity of these attacks is that they, as a rule, use the vulnerabilities of wireless data transmission and the weakness of network protocols. The study was carried out using a simulation model of a group of mobile robots. It was modeled following attacks: denial of service, Black-Hole, Gray-Hole. In this case, it was analyzed the impact of the attacks on the energy consumption and the impact on network traffic. It was assessed the complexity of the implementation of various types of attacks. This analysis should make it clear with what intensity the attack should be conducted in order to damage the network. Also in this study, a method is proposed for calculating the trust of network nodes and the entire network as a whole based on the number of discarded packets.

References

[1]
A.S. Basan, E.S. Basan. The threat model for the systems of group management of mobile robots. Proceedings of the VIII Scientific Conference System Synthesis and Applied Synergetics. South Federal University. September 2017. pp. 205--212.
[2]
E. Schoch, M. Feiri, F. Kargl, M. Weber. Simulation of Ad Hoc Networks: ns-2 compared to JiST/SWANS SIMUTools. First International Conference on Simulation Tools and Techniques for Communications, Networks and Systems. 2008. pp. 34--41
[3]
A. Basan, E. Basan, O. Makarevich. A Trust Evaluation Method for Active Attack Counteraction in Wireless Sensor Networks. Proceedings of 2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery. 2017. pp. 369--372.
[4]
G. Lenzini, M.S. Barghand, B. Hulsebosch, Trust-enhanced security in location-based adaptive authentication, Electronic Notes in Theoretical Computer Science, no. 197, pp. 105--119, 2008.
[5]
Renjian Feng, Xiaona Han, Qiang Liu, and Ning Yu. A Credible Bayesian-Based Trust Management Scheme for Wireless Sensor Networks // Hindawi Publishing Corporation International Journal of Distributed Sensor Networks. C. 1--9
[6]
Ganeriwal, L. K. Balzano, and M. B. Srivastava. Reputationbased framework for high integrity sensor networks // ACM Trans. Sen. Netw., vol.4, no. 3, 2008. C. 1--37.
[7]
G. Theodorakopoulos and J.S. Baras, Trust evaluation in ad-hoc networks, in The 3rd ACM workshop on Wireless security, WiSe'04, pp.1--10, 2004.
[8]
K. Chadha, S. Jain. Impact of black hole and gray hole attack in AODV protocol. Recent Advances and Innovations in Engineering (ICRAIE), 2014 pp. 1--7.
[9]
A. Basan, E. Basan, O. Makarevich. Analysis of Ways to Secure Group Control for Autonomous Mobile Robots. Proceedings of 10th International Conference On Security Of Information And Networks (SIN 2017). 2017. in press.

Cited By

View all
  • (2019)Method for Detecting Abnormal Activity in a Group of Mobile RobotsSensors10.3390/s1918400719:18(4007)Online publication date: 17-Sep-2019

Index Terms

  1. Development of the Anomaly Detection Method for a Group of Mobile Robots

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    SIN '18: Proceedings of the 11th International Conference on Security of Information and Networks
    September 2018
    148 pages
    ISBN:9781450366083
    DOI:10.1145/3264437
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    In-Cooperation

    • Cardiff University: Cardiff University

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 10 September 2018

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Intrusion
    2. attacker
    3. malicious
    4. network
    5. robots
    6. trust
    7. values
    8. vulnerabilities

    Qualifiers

    • Short-paper
    • Research
    • Refereed limited

    Funding Sources

    • the Ministry of Education and Science of Russian Federation

    Conference

    SIN '18

    Acceptance Rates

    SIN '18 Paper Acceptance Rate 24 of 42 submissions, 57%;
    Overall Acceptance Rate 102 of 289 submissions, 35%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)1
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 02 Sep 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2019)Method for Detecting Abnormal Activity in a Group of Mobile RobotsSensors10.3390/s1918400719:18(4007)Online publication date: 17-Sep-2019

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media