stealthy attacks on pheromone swarming methods

8
Stealthy Attacks on Pheromone Swarming Methods Janiece Kelly, Texas State University Seth Richter, LeTourneau University Dr. Mina Guirguis, Texas State University

Upload: cyndi

Post on 23-Feb-2016

52 views

Category:

Documents


0 download

DESCRIPTION

Stealthy Attacks on Pheromone Swarming Methods. Janiece Kelly , Texas State University  Seth Richter , LeTourneau University Dr. Mina Guirguis , Texas State University. Pheromone Swarming Control. Advantages Robust Adaptive Less manpower Applications Border Control Area Coverage - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Stealthy Attacks on Pheromone Swarming Methods

Stealthy Attacks on Pheromone Swarming Methods

Janiece Kelly, Texas State University Seth Richter, LeTourneau University Dr. Mina Guirguis, Texas State University

Page 2: Stealthy Attacks on Pheromone Swarming Methods

Pheromone Swarming Control Advantages

Robust Adaptive Less manpower

Applications Border Control Area Coverage Search and Rescue

Research Question: How secure are pheromone swarming methods?

Page 3: Stealthy Attacks on Pheromone Swarming Methods

Swarming Implementation Movement

Probability, pi

Server Scheme

p1

p3

p2

p4

iRobot Create Robots

SERVER

Page 4: Stealthy Attacks on Pheromone Swarming Methods

Stealthy Attacks Complete (C)

Probability Threshold (PT)

Full Proximity (FP)

Server (T)Δ(B,T) Δ(C,T)

B C

A

Server (T)Δ(B,T) Δ(C,T)

B C

AΔ(B,T) + Δ(C,T) < PT Δ(B,T) + Δ(C,T) ≥ PT

Page 5: Stealthy Attacks on Pheromone Swarming Methods

Assessment Metrics Damage

Collisions Map differences Steps failed to complete due to a collision

Cost Number of signals blocked

Potency = Damage / Cost

Page 6: Stealthy Attacks on Pheromone Swarming Methods

Configurations

10R0T

10R1T

10R5T

10R10

T

10R20

T0

0.010.020.030.040.050.06

Collision Potency for Various 10 Robot Configurations

CFP1FP3FP5PT.9PT.6PT.1

Configuration

Pote

ncy

(Col

lisio

ns C

ause

d pe

r Si

gnal

Jam

med

)

Page 7: Stealthy Attacks on Pheromone Swarming Methods

AOI Coverage

N C FP1 FP3 FP5FP10

PT.9

PT.6

PT.1

0

5000

10000

15000

20000

25000

30000

35000

Standard Devia-tion in AOI Cov-erage: 10R5T

Attack PolicySt

anda

rd D

evia

tion

(Co

vera

ge)

(1,3)

(3,3)

(6,12)

(7,11) (8,

9)(9,

11)(10

,4)(12

,3)(13

,9)(14

,4)0

20000

40000

60000

80000

100000

120000

140000

160000

Coverage Comparison: All AOIs

NCFP1FP5PT.1PT.6PT.9

Grid Cell

Num

ber

of V

isit

s

Page 8: Stealthy Attacks on Pheromone Swarming Methods

AcknowledgmentThis research is funded by NSF REU award #1156712 that is co-funded by the DoD and by NSF award #1149397.

System is vulnerable to stealthy attacks

Stealthy attack potency can be 14 times that of DoS

Parameters that affect attack potency: Radius of attack Probability threshold Number of agents/targets

present

Conclusions