Academia.eduAcademia.edu

Security Challenges for Swarm Robotics

SECURITY CHALLENGES

Swarm robotics is a relatively new technology that is being explored for its potential use in a variety of different applications and environments. Previous emerging technologies have often overlooked security until later developmental stages, when it has had to be undesirably ...

Security Challenges for Swarm Robotics Fiona Higgins, Allan Tomlinson and Keith M.Martin Technical Report RHUL-MA-2008-19 October 2008 Department of Mathematics Royal Holloway, University of London Egham, Surrey TW20 0EX, England http://www.rhul.ac.uk/mathematics/techreports Abstract Swarm robotics is a relatively new technology that is being explored for its potential use in a variety of different applications and environments. Previous emerging technologies have often overlooked security until later developmental stages, when it has had to be undesirably (and sometimes expensively) retrofitted. We identify a number of security challenges for swarm robotics and argue that now is the right time to address these issues and seek solutions. We also identify several idiosyncrasies of swarm robotics that present some unique security challenges. In particular, swarms of robots potentially employ different types of communication channels; have special concepts of identity; and exhibit adaptive emergent behaviour which could be modified by an intruder. Addressing these issues now will prevent undesirable consequences for many applications of this type of technology. 1 Introduction Swarm robotics is a relatively young area of research, which is growing rapidly and comprehensive reviews of the state-of-the-art may be found in [1, 2, 3]. As with many technologies, there is no formal definition for swarm robotics that engenders universal agreement, however there are some characteristics that have been generally accepted. These include robot autonomy; decentralised control; large numbers of member robots; collective emergent behaviour and local sensing and communication capabilities. From our security perspective it is reasonable to consider swarm robotics as a special type of computer network with the aforementioned characteristics. It has often been the case that the security of a new technology is an afterthought rather than an upfront design objective, leading to many security issues. This was the case with, for example, mobile phone technology. The first generation of mobile phones were analogue, and easy to clone since they broadcast their identity clearly over the airwaves. It was also easy to eavesdrop on them by simply tuning a radio receiver to pick up conversations. Subsequently the underlying technology had to be expensively modified in order to address these threats. In the case of swarm robotics research, the particular security requirements of swarm robotic networks do not appear to have been investigated in any detail so far. Thus we believe that this is an opportune time to consider these issues, before any wide-scale deployment. Deferring security research until later in the technology’s evolution could, depending on the application, be a risky strategy and lead to undesirable consequences. 1 As far as we are aware, this is the first attempt to categorise security challenges to swarm robotics. Very little prior work appears to have been done. A notable exception to this is the work of Winfield and Nembrini [4] who identify several threats to a swarm of robots, which they classify as hazards. We hope that our identification of the main security challenges will result in the development of robot swarm technology that is reliable and safe to deploy even in potentially hostile environments. In Section 2 we briefly review technologies that are similar to swarm robotics, highlighting the key differences. In Section 3 we discuss security, commencing with a short high level overview of security, providing examples of swarm robotic deployment where security is required, and then cataloguing aspects of the swarm robotic environment which present challenges to security. Finally in Section 4 we draw some conclusions. 2 Related Technologies Before considering the security of swarm robotic networks it will be useful to review how similar technologies, some of which have been subjected to a degree of security analysis, relate to robotic swarms. This will allow us to identify the unique features of robotic swarms that may benefit from closer scrutiny in terms of security. 2.1 Multi-Robot Systems Swarm robotics differs from more traditional multi-robot systems in that their command and control structures are not hierarchical or centralised, but are fully distributed, self-organised and inspired by the collective behaviour of social insect colonies and other animal societies [5]. Self-organisation means that sometimes the collective behaviour, even if unpredictable, may well result in solutions to problems that are superior to ones that could have been devised in advance. The parallel drawn with social societies in the animal world extends to communication interactions between the robots can be indirect as well as direct. Fault-tolerance, which is related to security, has already been extensively researched within the context of multi-robot systems with hierarchical command and control, notably in the work of Parkers ALLIANCE control architecture [6]. 2 2.2 Mobile Sensor Networks Sensor networks consist of collections of devices (or nodes) with sensors that typically communicate over a wireless network. A mobile sensor network is a sensor network where the nodes are either placed on objects which move [7] or where the nodes may move themselves [8]. In the latter case they are sometimes known as robotic sensor networks.1 Hybrid systems also exist [9], where mobile robots work in conjunction with static sensors. Although mobile sensor networks exhibit many similarities to swarm robotic networks, there are distinct differences. For example, robotic swarms may utilise a wider range of communications technologies, which extend to indirect communication such as stigmergy. Additionally, individual identity may be more important in a sensor network if it is important to determine exactly where some sensed data originated. Furthermore, and importantly, a sensor network is not designed to have the collective emergent behaviour of a robotic swarm. 2.3 MANETs Mobile Ad-hoc Networks ( MANETs) consist of wireless mobile nodes that relay each others traffic, with the nodes spontaneously forming the wireless network themselves. The special properties of MANETs, such as the lack of infrastructure, absence of trusted third parties, as well as possible resource constraints, make implementing security a very challenging task. MANETs can consists of many types of mobile devices and there is considerable existing work on their security [10, 11]. Although MANETs do not exhibit the emergent behaviour of swarms, some MANET security techniques could have relevance to swarm robotics depending on the communication method used by the swarm. 2.4 Software Agents There is no universally agreed definition of a software agent, but we take one proposed by Wooldridge [12]: An agent is a computer system that is situated in some environment, and that is capable of autonomous action in this environment in order to meet its design objectives. A multi-agent system (MAS) [13, 12] is a system composed of multiple autonomous agents, where each agent cannot solve a problem unaided; there is no global system control; data is decentralised; and computation is asynchronous. A mobile agent is a particular class of agent with the ability during execution to migrate from 1 http://rsn.cs.rpi.edu 3 one host to another where it can resume its execution [13]. Thus mobile multi-agent systems may share many features with swarm robotic systems, but in a virtual world. Corresponding to the active interest in mobile software agents and their rapid adoption, there has been much interest in their security [13]. However this does not always translate easily to robotic swarms because of the particular characteristics of robotic swarms which differentiate them, such as their physical nature, diverse communication mechanisms and control structure. 3 3.1 Security of Swarm Robotics Basic Security Terminology Security in any environment, including swarm robotics, is fundamentally about the provision of core security services, some of the most important of which are as follows. The service confidentiality is about keeping data secret. An integrity service prevents prevents data from being altered in an unauthorised or unintended way. Entity authentication (sometimes called identification) is the process whereby one entity is assured of the identity of another entity. Data origin authentication is the assurance that data came from its reputed source. Finally, availability is the property of being accessible and useable upon demand by an authorised entity. The term denial of service is often used in reference to loss of availability. A threat is a potential violation of the provision of a desired security service. Threats that are not mitigated leave vulnerabilities in the system that may be exploited. Such exploitative actions are often called attacks and those that initiate their execution are attackers. An example of a threat could be that an unauthorized person might see top secret information; a vulnerability could be that trust is misplaced in a courier; an attack could be that someone steals the data and publishes it in the media. Information may also be accidentally lost. The impact of a document theft or loss will depend on the content of the document. The process of risk assessment takes this into consideration along with the probability of the threat being realised. In any system, the provision of security is a holistic process. This requires careful management processes that oversee the use of specific security technologies that can be applied to devices and networks. These include firewalls, access control mechanisms and network security protocols. At the heart of most security technologies is the deployment of specific cryptographic primitives, which are mathematical tools that can be applied to data to provide the core security services. These normally rely on the careful protection and 4 maintenance of cryptographic keys, which are critical data items that must be stored securely. 3.2 Scenarios Demonstrating the Need for Security in Swarm Robotic Applications Military: Swarm robotic networks may be used in military applications2 where the need for security is perhaps self evident. However, circumstances may arise in non-military applications where the system may be vulnerable to particular threats. Environment: Robot swarms may be used to maintain the environment by detecting environmental pollutants such as oil spillages and cleaning them up [14]. Although exchanged data may not be sensitive in such applications, data integrity and availability are of high importance. Furthermore, the swarm may accidentally encounter a ’rogue’ device perhaps from a swarm with a different goal. Unless the ’intruder’ is detected the emergent behaviour of the swarm may be affected. In the military scenario, of course, the rogue may indeed be malicious. Disaster Relief: Robot swarms could be deployed during disaster relief operations in environments where traditional communication networks have broken down.3 Availability then becomes a primary security requirement, as well as authentication/identification in the case where multiple swarms are in joint operation. Healthcare: The European I-Ward project uses swarms of robots to provide assistance to healthcare workers.4 Entity authentication is likely to be the most important security requirement in such scenarios. Moreover, authentication and confidentiality may be important when robots are deployed in multiple applications, to prevent data from previous application sessions being disclosed. Commercial Applications: As the technology develops robotic swarms may find commercial use. In any commercial application the motivation to steal data and services will lead to threats to the service. If commercial applications are to be successfully deployed then some consideration should be given beforehand to the potential security risks. 2 http://www.challenge.mod.uk/ http://www.shu.ac.uk/mmvl/research/guardians/ 4 http://www.iward.eu/cms/index.php 3 5 3.3 Challenges to Security It is appropriate therefore to consider the challenges to providing security in swarm robotic networks. It is clear that some security issues are similar to other related technologies and that some solutions from these technologies may apply to swarm robotics. However, not all of these shared problems have been fully solved. Furthermore, the swarm robotic environment introduces particular security challenges that do not exist in other technologies. Resource Constraints: The smaller a device is, the greater the challenge to providing security due to resource constraints (storage, communication bandwidth, computational restrictions and most importantly energy). Attacks on the provision of resources can lead to the device becoming inoperable, permanently so if the resource is not renewable. This leads to a loss of availability. Resource constraints also restrict the types of existing security technologies that can be deployed. Physical Capture and Tampering: Physical capture of a robot leads to loss of availability. Worse, capture of security credentials could harm other members of the swarm. If a robot is tampered with and reintroduced into the swarm, an attacker might influence the swarm behaviour. This attack would be unique to swarm robotic technology. Control: Systems employing swarm intelligence do not have a hierarchical structure with points of control. The individuals within these systems take decisions autonomously, based on local sensing and communications. With such systems it is evident that there could be many risks if they went out-of-control, including many security violations such as loss of confidentiality or availability. Control presents an interesting challenge to security within swarm robotics. Communication: Swarm robots can interact either explicitly, or implicitly [15]. Explicit communication can be achieved via broadcast or directed messages. Radio-frequency (RF) and infra-red (IR) technologies have been widely for explicit communications within swarms. Other technologies include coloured LED display, body-language or sign-language, colour patterns on a robots body, coil induction, haptics, audible sounding, combination of LED display and audio signalling and acoustic signalling in an underwater environment. Implicit communication includes interaction via sensing other robots and their behaviours, and interaction via the environment, which acts as a sort of shared memory and is known as stigmergy [16, 5, 17]. From a security perspective, any open implicit or explicit communication method can be jammed, intercepted or otherwise disturbed relatively easily by an attacker. The security of RF and IR has been well researched but the security of the remaining more exotic interaction methods needs to be 6 thoroughly investigated and presents a fascinating security challenge. Swarm Mobility: Security is difficult to provide in any mobile environment, however the mobility of robot swarms is quite unusual and has some interesting characteristics that might make some security services easier to implement than for related technologies. One example is entity authentication, discussed below, which could be provided through visual sensing and physical data exchange. However any constraint on the movement of swarm members, for example to remain in the bounds of the swarm could present additional security issues. Identity and Authentication: As discussed in section 3.2, it may be very important for a swarm robot to determine if it is interacting with a legitimate entity or not. Data origin and entity authentication require some notion of identity, which is a particular problem where individual identity within a swarm is undesirable [18]. Other work has used group identity [19]; or individual identity which is broadcast regularly [20]. If identity can be assumed or changed then attacks can be launched on entity authentication, confidentiality, integrity and availability. The notion of identity within a robotic swarm thus presents an interesting challenge from a security standpoint. Key Management: Security services deployed in a robot swarm inevitably require the need to manage cryptographic keys [21]. These keys define which pairs (or groups) of robots can apply security services. As robots join and leave a swarm, it may be necessary to alter this keying material. Thus the dynamic and interactive nature of a swarm presents sophisticated key management challenges. Intrusion Detection: When a foreign entity joins a network it is sometimes called intrusion. One means of detecting intrusion is based on network Intrusion Detection Systems. The autonomous nature of robots and collective emergent nature of the behaviour of the swarm will make any anomalous behaviour difficult to detect. If undetected, one or more foreign robots could infiltrate the swarm, either maliciously or accidentally, and ultimately affect the desired emergent behaviour. Once an intruder is detected, an appropriate response will need to be formulated according to an Intrusion Protection System. Depending on the application the response could be to simply ignore the rogue device, or to monitor its behaviour, or to find a way to either disable it or remove it from the system. Intrusion detection and protection looks to be particularly challenging in a swarm of robots, and will need a specifically tailored approach. Managing Learning: Robots can learn and react to environmental changes by means of adaption. A malicious entity might present changes in the environment which will cause a robot to adapt in an undesired way. 7 For example, if anomaly detection is used to detect intrusion based on learning typical behaviour, then a malicious entity could change the pattern of typical behaviour in order to gain entry to the network. 4 Conclusions The development of swarm robotic technology has reached a point where many new applications are emerging. Therefore, we believe that this is an opportune moment to take a closer look at the security of swarm robotic systems - before widespread deployment. Although the security of related technology has been investigated, robotic swarms are different due to factors such as their autonomy, distributed control, and emergent behaviour. Bearing this in mind, we have identified a number of significant challenges to robotic swarm security, some of which are unique to this technology. For example, the challenges presented by more esoteric communication methods than straightforward RF or IR, the question of identity, and the potential for modification of emergent behaviour if a malicious entity manages to infiltrate the swarm. It is likely that some of these challenges will require new security techniques to be developed, and we will aim to investigate these in our future work. References [1] L. Bayindir and E. ahin, “A review of studies in swarm robotics,” Turkish Journal of Electrical Engineering, vol. 15, pp. 115–147, 2007. [Online]. Available: http://journals.tubitak.gov.tr/elektrik/issues/elk07-15-2/elk-15-2-2-0705-13.pdf [2] E. ahin and W. Spears, Eds., Swarm Robotics Workshop: State-of-theart Survey, ser. Lecture Notes in Computer Science. Berlin Heidelberg: Springer-Verlag, 2005, vol. 3342. [3] E. ahin, W. Spears, and A. Winfield, Eds., Swarm Robotics. Revised Selected Papers from the Second International Workshop, SAB 2006. Rome. Italy. Springer Berlin/Heidelberg, 2007, vol. 4433/2007. [4] A. Winfield and J. Nembrini, “Safety in numbers: fault-tolerance in robot swarms,” International Journal of Modelling, Identification and Control, vol. 1, pp. 30–37, 2006. [Online]. Available: http://www.ias.uwe.ac.uk/ a-winfie/WinNemIJMIC06.pdf 8 [5] E. Bonabeau, M. Dorigo, and G. Theraulaz., Swarm Intelligence: from natural to artificial systems (Santa Fe Institute Studies in the Sciences of Complexity). Oxford University Press, 1999. [6] L. E. Parker, “ALLIANCE: An architecture for fault tolerant multirobot cooperation,” IEEE Transactions on Robotics and Automation, vol. 14, no. 2, pp. 220–240, April 1998. [Online]. Available: http://www.cs.utk.edu/ parker/publications/TRA.pdf [7] T. Wark, C. Crossman, W. Hu, Y. Guo, P. Valencia, P. Sikka, P. Corke, C. Lee, J. Henshall, K. Prayaga, J. O’Grady, M. Reed, and A. Fisher, “The design and evaluation of a mobile sensor/actuator network for autonomous animal control,” in Proceedings of the 6th international conference on Information processing in sensor networks. ACM, 2007, pp. 206–215. [8] K. Dantu, M. Rahimi, H. Shah, S. Babel, A. Dhariwal, and G. Sukhatme, “Robomote: Enabling mobility in sensor networks,” in Proceedings of Fourth International Symposium on Information Processing in Sensor Networks, 2005, pp. 404–409. [9] J. Reich and E. Sklar, “Toward automatic reconfiguration of robot-sensor networks for urban search and rescue.” in Proceedings of the 1st International Workshop on Agent Technology for Disaster Management, 2006. [Online]. Available: http://users.ecs.soton.ac.uk/sdr/atdm/ws34atdm.pdf [10] E. Hansson, A. Bengtsson, and A. Vidstrm, “Security solutions for mobile ad hoc networks.” Swedish MOD, FOI Defence Research Agency Command and Control Systems P.O. Fox 1165 SE-581 11 Linkping Tel 013-378086, Technical Report FOI-R–1694–SE ISSN 1650-1942, August 2005. [Online]. Available: http://www2.foi.se/rapp/foir1694.pdf [11] L. Buttyn and J.-P. Hubaux, Security and Cooperation in Wireless Networks: thwarting malicious and selfish behaviour in the age of ubiquitous computing. Cambridge University Press, 2007. [Online]. Available: http://secowinet.epfl.ch/fulltext/SeCoWiNetV1.5.1.pdf [12] M. Wooldridge, An Introduction to MultiAgent Systems. Wiley, 2002. [13] N. Borselius, “Multi-agent system security for mobile communication,” Ph.D. dissertation, Department of Mathematics, Royal Holloway, University of London., 2003. 9 [14] D. Fritsch, K. Wegener, and R. Schraft., “Control of a robotic swarm for the elimination of marine oil pollutions,” in IEEE Swarm Intelligence Symposium (SIS 2007), 2007, pp. 29–36. [15] L. Parker, “Current state of the art in distributed autonomous mobile robotics,” Distributed Autonomous Robotic Systems, vol. 4, pp. 3–12, 2000. [Online]. Available: http://www.cs.utk.edu/ parker/publications/DARS2 000o verview.pdf [16] P.-P. Grass, “La reconstruction du nid et les coordinations inter-individuelles chez bellicositermes natalensis et cubitermes sp. la thorie de la stigmergie: Essai d’interprtation du comportement des termites constructeurs.” Insec. Soc., vol. 6, pp. 41–80, 1959. [17] T. White, “Expert assessment of stigmergy: A report for the department of national defence,” School of Computer Science, Carleton University, Ottawa, Ontario, Canada, Tech. Rep., 2005. [Online]. Available: http://www.scs.carleton.ca/ arpwhite/stigmergy-report.pdf [18] P. Flocchini, G. Prencipe, N. Santoro, and P. Widmayer, “Gathering of asynchronous robots with limited visibility.” Theoretical Computer Science, vol. 337, no. 1-3, pp. 147–168, 2005. [Online]. Available: http://dx.doi.org/10.1016/j.tcs.2005.01.001 [19] R. A. Russell, “Visual recognition of conspecifics by swarm robots,” in 2004 Australasian Conference on Robotics & Automation, 2004. [Online]. Available: http://www.araa.asn.au/acra/acra2004/papers/russell.pdf [20] J. Fredslund and M. Matari, “A general algorithm for robot formations using local sensing and minimal communication,” IEEE Transactions on Robotics and Automation, vol. 18, pp. 837–846, 2002. [21] S. Dolev, L. Lahiani, and M. Yung, “Secret swarm unit. reactive k-secret sharing,” in Proc. of the 8th International Conference on Cryptology in India. Springer Verlag, 2007, pp. 123–137. 10