Keywords: information security, group of robots, multi-agent robotic systems, attack, vulnerability, information security model (IT security model)
References
1. Brambilla M., Ferrante E., Birattari M., Dorigo M. Swarm robotics: a review from the swarm engineering perspective. Swarm Intelligence, 2013, vol. 7, no. 1, pp. 1–41. doi: 10.1007/s11721-012-0075-2
2. Masloboev A.V., Putilov V.A. Razrabotka i realizatsiya mekhanizmov upravleniya informatsionnoi bezopasnost'yu mobil’nykh agentov v raspredelennykh mul’tiagentnykh informatsionnykh sistemakh [Development and implementation of mobile agent security control mechanisms in the distributed multi-agent information systems]. Proceedings of the MSTU, 2010, vol. 13, no. 4-2, pp. 1015–1032.
3. Bell D.E., LaPadula L.J. Secure computer systems: Unified exposition and multics interpretation. Bedford, Mass.: MITRE Corp., 1976, 134 p.
4. Harrison M., Ruzzo W., Ullman J. Protection in operating systems. Communication of the ACM, 1976, vol. 19, no. 8, pp. 461–471. doi: 10.1145/360303.360333
5. Higgins F., Tomlinson A., Martin K.M. Threats to the Swarm: Security Considerations for Swarm Robotics. International Journal on Advances in Security, 2009, vol. 2, no. 2&3, pp. 288–297.
6. Koval E.N., Lebedev I.S. Obshchaya model' bezopasnosti robototekhnicheskikh sistem [General model of robotic systems information security]. Scientific and Technical Journal of Information Technologies, Mechanics and Optics, 2013, no. 4 (86), pp. 153–154.
7. Kalyaev I.A., Gaiduk A.R., Kapustyan S.G. Modeli i algoritmy kollektivnogo upravleniya v gruppakh robotov [Models and algorithms of the collective control of robots group]. Moscow, FIZMATLIT Publ., 2009, 280 p.
8. Kalyaev I.A., Lokhin V.M., Makarov I.M. et. al. Intellektual’nye roboty [Intelligent Robots] Ed. E.I. Yurevich. Moscow, Mashinostroenie Publ., 2007, 360 p.
9. Zikratov I.A., Kozlova E.V., Zikratova T.V. Analiz uyazvimostei robototekhnicheskikh kompleksov s roevym intellektom [Vulnerability analysis of robotic systems with swarm intelligence]. Scientific and Technical Journal of Information Technologies, Mechanics and Optics, 2013, no. 5 (87), pp. 149–154.
10. Neeran K.M., Tripathi A.R. Security in the Ajanta Mobile Agent System. Technical Report, Department of Computer Science, University of Minnesota, 1999, 28 p.
11. Sander T., Tschudin Ch.F. Protecting mobile agents against malicious hosts. Mobile Agents and Security, Ser. Lecture Notes in Computer Science, 1998, vol. 1419, pp. 44–60.
12. Xudong G., Yiling Ya., Yinyuan Y. POM-a mobile agent security model against malicious hosts. Proc. of the 4th International Conference on High Performance Computing in the Asia-Pacific Region, 2000, vol. 2 (14-17), pp. 1165–1166.
13. Page J., Zaslavsky A., Indrawan M. A buddy model of security for mobile agent communities operating in pervasive scenarios.Proceedings of 2nd Australasian Information Security Workshop (AISW2004). ACS Dunedin, New Zealand, 2004, vol. 32, pp. 17–25.
14. Page J., Zaslavsky A., Indrawan M. Countering security vulnerabilities using a shared security buddy model schema in mobile agent communities.Proc. of the 1st International Workshop on Safety and Security in Multi-Agent Systems (SASEMAS 2004), 2004, pp. 85–101.
15. Kremlev A.S., Kolyubin S.A., Vrazhevsky S.A. Avtonomnaya mul’tiagentnaya sistema dlya resheniya zadach monitoringa mestnosti [Autonomous multi-agent “robot-guide” system to solve area monitoring problems]. Izv. vuzov. Priborostroenie, 2013, vol. 56, no. 4, pp. 61–65.