1 / 8

Stealthy Attacks on Pheromone Swarming Methods

Stealthy Attacks on Pheromone Swarming Methods. Janiece Kelly , Texas State University  Seth Richter , LeTourneau University Dr. Mina Guirguis , Texas State University. Pheromone Swarming Control. Advantages Robust Adaptive Less manpower Applications Border Control Area Coverage

cyndi
Download Presentation

Stealthy Attacks on Pheromone Swarming Methods

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Stealthy Attacks on Pheromone Swarming Methods Janiece Kelly, Texas State University Seth Richter, LeTourneau University Dr. Mina Guirguis, Texas State University

  2. Pheromone Swarming Control • Advantages • Robust • Adaptive • Less manpower • Applications • Border Control • Area Coverage • Search and Rescue • Research Question:How secure are pheromone swarming methods?

  3. Swarming Implementation • iRobot Create Robots • Movement Probability, pi • Server Scheme p1 p2 p4 p3 SERVER

  4. Stealthy Attacks • Complete (C) • Probability Threshold (PT) • Full Proximity (FP) A A Δ(B,T) + Δ(C,T) < PT Δ(B,T) + Δ(C,T) ≥ PT Δ(B,T) Δ(C,T) Δ(B,T) Δ(C,T) B C C B Server (T) Server (T)

  5. Assessment Metrics • Damage • Collisions • Map differences • Steps failed to complete due to a collision • Cost • Number of signals blocked • Potency = Damage / Cost

  6. Configurations

  7. AOI Coverage

  8. Conclusions • System is vulnerable to stealthy attacks • Stealthy attack potency can be 14 times that of DoS • Parameters that affect attack potency: • Radius of attack • Probability threshold • Number of agents/targets present Acknowledgment This research is funded by NSF REU award #1156712 that is co-funded by the DoD and by NSF award #1149397.

More Related