24th International Symposium on Research in Attacks, Intrusions and Defenses 2021
DOI: 10.1145/3471621.3471867
|View full text |Cite
|
Sign up to set email alerts
|

An Investigation of Byzantine Threats in Multi-Robot Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 17 publications
(11 citation statements)
references
References 59 publications
0
11
0
Order By: Relevance
“…In a future in which robots, such as autonomous cars, collaborate on a large scale, security and data integrity will be one of the major concerns of consumers. In addition to the usual risks of infection and hijacking, byzantine data manipulation could lead to map merging poisoning and intentionally erroneous C-SLAM estimates (Deng et al, 2021). Thus further investigation and more efforts have to be deployed on system security.…”
Section: Resilient Inter-robot Communicationmentioning
confidence: 99%
“…In a future in which robots, such as autonomous cars, collaborate on a large scale, security and data integrity will be one of the major concerns of consumers. In addition to the usual risks of infection and hijacking, byzantine data manipulation could lead to map merging poisoning and intentionally erroneous C-SLAM estimates (Deng et al, 2021). Thus further investigation and more efforts have to be deployed on system security.…”
Section: Resilient Inter-robot Communicationmentioning
confidence: 99%
“…We do not consider sensor jamming attacks [92], [93] since they aim to crudely block the perceived data instead of covertly misleading RVs. Cyber attacks against RVs (e.g., software and ROS vulnerabilities [94], [95], in-vehicle networks [96]- [98], DNN backdoor [99], communication protocols [100], [101], side-channel leakage [102]) are excluded as well. Comparisons with existing surveys.…”
Section: Systematization Scopementioning
confidence: 99%
“…Figure 2 shows our action flow model, which consists of 12 interacted robot functions. This is established by surveying the function compositions and interactions of various RVs from both industrial ecosystems [131], [132] and academic papers [94], [100], [133]. Among them, sensors directly interact with five functions: Objection Detection (A1), Segmentation (A2), Localization/SLAM (A3), Speech Recognition (A4) and Distance Detection (A5).…”
Section: A Action Flow Modelmentioning
confidence: 99%
“…SkyJack [ 13 ] is a drone hijacking software that can change the SSID of a drone and establish a malicious connection. This results in Byzantine faults in the MRS, which are difficult to identify [ 14 , 15 ]. Blockchain technology [ 16 ] has been highly successful in achieving Byzantine Fault Tolerance due to its consensus algorithm [ 17 ].…”
Section: Introductionmentioning
confidence: 99%