POLICE OFFICE MODEL IMPROVEMENT FOR SECURITY OF SWARM ROBOTIC SYSTEMS

I. A. Zikratov, A. V. Gurtov, T. V. Zikratova, E. V. Kozlova


Read the full article 
Article in Russian


Abstract

This paper focuses on aspects of information security for group of mobile robotic systems with swarm intellect. The ways for hidden attacks realization by the opposing party on swarm algorithm are discussed. We have fulfilled numerical modeling of potentially destructive information influence on the ant shortest path algorithm. We have demonstrated the consequences of attacks on the ant algorithm with different concentration in a swarm of subversive robots. Approaches are suggested for information security mechanisms in swarm robotic systems, based on the principles of centralized security management for mobile agents. We have developed the method of forming a self-organizing information security management system for robotic agents in swarm groups implementing POM (Police Office Model – a security model based on police offices), to provide information security in multi-agent systems. The  method is based on the usage of police station network in the graph nodes, which have functions of identification and authentication of agents, identifying subversive robots by both their formal characteristics and their behavior in the swarm.  We have suggested a list of software and hardware components for police stations, consisting of: communication channels between the robots in police office, nodes register, a database of robotic agents, a database of encryption and decryption module. We have suggested the variants of logic for the mechanism of information security in swarm systems with different temporary diagrams of data communication between police stations. We present comparative analysis of implementation of protected swarm systems depending on the functioning logic of police offices, integrated in swarm system. It is shown that the security model saves the ability to operate in noisy environments, when the duration of the interference is comparable to the time necessary for the agent to overcome the path between police stations.


Keywords:  IT security, robotic complex, swarm of robots, ant algorithm, group robotics, Police Office Model, protected swarm, vulnerability, attack

References
1.     Gubanov D.A. Obzor Onlainovykh Sistem Reputatsii/Doveriya [Overview of Online Reputation/Trust Systems]. 2009. Available at: http://mtas.ru/bitrix/components/bitrix/forum.interface/show_file.php?fid=1671 (accessed 24.03.2014).
2.     Zikratov I.A., Zikratova T.V., Lebedev I.S. Doveritel'naya model' informatsionnoi bezopasnosti mul'tiagentnykh robototekhnicheskikh sistem s detsentralizovannym upravleniem [Trust model for information security of multi-agent robotic systems with a decentralized management]. Scientific and Technical Journal of Information Technologies, Mechanics and Optics, 2014, no. 2(90), pp. 47–52.
3.     Neeran K.M., Tripathi A.R. Security in the Ajanta MobileAgent system. Technical Report. Department of Computer Science, University of Minnesota, 1999, 28 p.
4.     Xudong G., Yiling Ya., Yinyuan Y. POM-a mobile agent security model against malicious hosts. Proc. 4th International Conference on High Performance Computing in the Asia-Pacific Region, 2000, vol. 2, pp. 1165–1166.
5.     Page J., Zaslavsky A., Indrawan M. A buddy model of security for mobile agent communities operating in pervasive scenarios.Proc. 2nd Australasian Information Security Workshop (AISW2004). ACS Dunedin, New Zealand, 2004, vol. 32, pp. 17–25.
6.     Page J., Zaslavsky A., Indrawan M. Countering security vulnerabilities using a shared security buddy model schema in mobile agent communities.Proc. 1st International Workshop on Safety and Security in Multi-Agent Systems (SASEMAS 2004), 2004, pp. 85–101.
7.     Dorigo M., Maniezzo V., Colorni A. Ant system: optimization by a colony of cooperating agents. IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics, 1996, vol. 26, no. 1, pp. 29–41. doi: 10.1109/3477.484436
8.     Wooldridge M. Introduction to MultiAgent Systems. John Wiley & Sons Ltd, 2002, 368 p.
9.     Zikratov I.A., Kozlova E.V., Zikratova T.V. Analiz uyazvimostei robototekhnicheskikh kompleksov s roevym intellektom [Vulnerability analysis of robotic systems with swarm intelligence]. Scientific and Technical Journal of Information Technologies, Mechanics and Optics, 2013, no. 5(87), pp. 149–154.
10.Komarov I.I.,Drannik A.L., Yurieva R.A. Modelirovanie problem informatsionnoi bezopasnosti mul'tiagentnykh sistem [Multiagent information security problem’s simulation]. V Mire Nauchnykh Otkrytii, no. 4(52), pp. 61–70.
11.Drannik A.L. Ispol'zovanie programm-simulyatorov povedeniya roevykh robototekhnicheskikh sistem dlya issledovaniya voprosov bezopasnosti [Using program simulators of swarm robotic systems behavior for security studies]. Materialy VIII Sankt-Peterburgskoi Mezhregional'noi Konferentsii Informatsionnaya Bezopasnost' Regionov Rossii (IBRR-2013) [Proc. VIII St. Petersburg Interregional Conference "Information Security of Russian Regions"]. St. Petersburg, 2013, pp. 240–251.
12.Schillo M., Funk P., Rovatsos M. Using trust for detecting deceitful agents in artificial societies. Applied Artificial Intelligence, 2000, vol. 14, no. 8, pp. 825–848. doi: 10.1080/08839510050127579
13.Golbeck J., Parsia B., Hendler J. Trust networks on the semantic web. Lecture Notes in Artificial Intelligence, 2003, vol. 2782, pp. 238–249.
14.Garcia-Morchon O., Kuptsov D., Gurtov A., Wehrle K. Cooperative security in distributed networks. Computer Communications, 2013, vol. 36, no. 12, pp. 1284–1297. doi: 10.1016/j.comcom.2013.04.007
15.Beshta A.A., Kirpo M.A. Postroenie modeli doveriya k ob"ektam avtomatizirovannoi informatsionnoi sistemy dlya predotvrashcheniya destruktivnykh vozdeistvii na sistemu [Building a model of trust to objects of an automated information system in order to prevent the destructive effects on the system]. Bulletin of the Tomsk Polytechnic University, 2013, vol. 322, no. 5, pp. 104–108.
16.Ramchurn S.D., Huynh D., Jennings N.R. Trust in multi-agent systems. Knowledge Engineering Review, 2004, vol. 19, no. 1, pp. 1–25. doi:10.1017/S0269888904000116
17.Gorodetski V., Kotenko I., Karsaev O. Multi-agent technologies for computer network security: Attack simulation, intrusion detection and intrusion detection learning. Computer Systems Science and Engineering, 2003, no. 4, pp. 191–200.
18.Masloboev A.V., Putilov V.A. Razrabotka i realizatsiya mekhanizmov upravleniya informatsionnoi bezopasnost'yu mobil'nykh agentov v raspredelennykh mul'tiagentnykh informatsionnykh sistemakh [Development and implementation of mobile agent security control mechanisms in the distributed multi-agent information systems]. Proceedings of the MSTU, 2010, vol. 13, no. 4–2, pp. 1015–1032.
Copyright 2001-2017 ©
Scientific and Technical Journal
of Information Technologies, Mechanics and Optics.
All rights reserved.

Яндекс.Метрика