Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3548606.3563535acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
poster

Poster: May the Swarm Be With You: Sensor Spoofing Attacks Against Drone Swarms

Published: 07 November 2022 Publication History

Abstract

Swarm robotics, particularly drone swarms, are used in various safety-critical tasks. While a lot of attention has been paid to improving swarm control algorithms for improved intelligence, the security implications of various design choices in swarm control algorithms have not been studied. We highlight how an attacker can exploit the vulnerabilities in swarm control algorithms to disrupt drone swarms. Specifically, we show that the attacker can target one swarm member (target drone) through sensor spoofing attacks, and indirectly cause other swarm members (victim drones) to veer off from their course, and potentially resulting in a crash. Our attack cannot be prevented by traditional software security techniques, and it is stealthy in nature as it causes seemingly benign deviations in drone swarms. Our initial results show that spoofing the position of a target drone by 5m is sufficient to cause other drones to crash into a front obstacle. Overall, our attack achieves 76.67% and 93.33% success rate with 5m and 10m spoofing deviation respectively.

References

[1]
2008. Global Positioning System Standard Positioning Service Performance Stan- dard. https://www.gps.gov/technical/ps/2008-SPS-performance-standard.pdf.
[2]
2019. The Pentagon Wants AI-Driven Drone Swarms for Search and Rescue Ops. https://www.nextgov.com/emerging-tech/2019/12/pentagon-wants-ai-driven-drone-swarms-search-and-rescue-ops/162113/
[3]
Pritam Dash, Guanpeng Li, Zitao Chen, Mehdi Karimibiuki, and Karthik Pattabiraman. 2021. PID-Piper: Recovering Robotic Vehicles from Physical Attacks. In 51st International Conference on Dependable Systems and Networks (DSN) 2021.
[4]
Xinyu Huang, Yunzhe Tian, Yifei He, Endong Tong, Wenjia Niu, Chenyang Li, Jiqiang Liu, and Liang Chang. 2020. Exposing Spoofing Attack on Flocking-Based Unmanned Aerial Vehicle Cluster: A Threat to Swarm Intelligence. Secur. Commun. Networks, Vol. 2020 (2020), 8889122:1-8889122:15.
[5]
Chi-Gon Jung, Alipour Asl Ahad, Yuseok Jeon, and Yonghwi Kwon. 2022. SWARMFLAWFINDER: Discovering and Exploiting Logic Flaws of Swarm Algorithms. In IEEE Symposium on Security and Privacy.
[6]
Liangjun Liu, Hongyan Qian, and Feng Hu. 2019. Random Label Based Security Authentication Mechanism for Large-Scale UAV Swarm. 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom) (2019), 229--235.
[7]
Craig W. Reynolds. 1987. Flocks, herds and schools: A distributed behavioral model. Proceedings of the 14th annual conference on Computer graphics and interactive techniques (1987).
[8]
Enrica Soria, Fabrizio Schiano, and Dario Floreano. 2020. SwarmLab: a Matlab Drone Swarm Simulator. 2020 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS) (2020), 8005--8011.
[9]
Nils Ole Tippenhauer, Christina Pöpper, Kasper Bonne Rasmussen, and Srdjan Capkun. 2011. On the requirements for successful GPS spoofing attacks. In CCS.
[10]
Gábor Vásárhelyi, Csaba Virágh, Gergo Somorjai, Tamás Nepusz, Agoston E. Eiben, and Tamás Vicsek. 2018. Optimized flocking of autonomous drones in confined environments. Science Robotics, Vol. 3 (2018).

Cited By

View all
  • (2023)SwarmFuzz: Discovering GPS Spoofing Attacks in Drone Swarms2023 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)10.1109/DSN58367.2023.00043(366-375)Online publication date: Jun-2023
  • (2023)Integrated system architecture with mixed-reality user interface for virtual-physical hybrid swarm simulationsScientific Reports10.1038/s41598-023-40623-613:1Online publication date: 7-Sep-2023

Index Terms

  1. Poster: May the Swarm Be With You: Sensor Spoofing Attacks Against Drone Swarms

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security
      November 2022
      3598 pages
      ISBN:9781450394505
      DOI:10.1145/3548606
      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 07 November 2022

      Check for updates

      Author Tags

      1. attacks
      2. cyber physical systems
      3. swarm robotics security

      Qualifiers

      • Poster

      Funding Sources

      • NSERC

      Conference

      CCS '22
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

      Upcoming Conference

      CCS '25

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)70
      • Downloads (Last 6 weeks)10
      Reflects downloads up to 07 Nov 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2023)SwarmFuzz: Discovering GPS Spoofing Attacks in Drone Swarms2023 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)10.1109/DSN58367.2023.00043(366-375)Online publication date: Jun-2023
      • (2023)Integrated system architecture with mixed-reality user interface for virtual-physical hybrid swarm simulationsScientific Reports10.1038/s41598-023-40623-613:1Online publication date: 7-Sep-2023

      View Options

      Get Access

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media