Adversarial Impacts on Autonomous Decentralized Lightweight Swarms

The decreased size and cost of Unmanned Aerial Vehicles (UAVs) and Unmanned Ground Vehicles (UGVs) has enabled the use of swarms of unmanned autonomous vehicles to accomplish a variety of tasks. By utilizing swarming behaviors, it is possible to efficiently accomplish coordinated tasks while minimiz...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Wolf, Shaya, Cooley, Rafer, Borowczak, Mike
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Wolf, Shaya
Cooley, Rafer
Borowczak, Mike
description The decreased size and cost of Unmanned Aerial Vehicles (UAVs) and Unmanned Ground Vehicles (UGVs) has enabled the use of swarms of unmanned autonomous vehicles to accomplish a variety of tasks. By utilizing swarming behaviors, it is possible to efficiently accomplish coordinated tasks while minimizing per-drone computational requirements. Some drones rely on decentralized protocols that exhibit emergent behavior across the swarm. While fully decentralized algorithms remove obvious attack vectors their susceptibility to external influence is less understood. This work investigates the influences that can compromise the functionality of an autonomous swarm leading to hazardous situations and cascading vulnerabilities. When a swarm is tasked with missions involving the safety or health of humans, external influences could have serious consequences. The adversarial swarm in this work utilizes an attack vector embedded within the decentralized movement algorithm of a previously defined autonomous swarm designed to create a perimeter sentry swarm. Various simulations confirm the adversarial swarm's ability to capture significant portions (6-23%) of the perimeter.
doi_str_mv 10.48550/arxiv.2002.09109
format Article
fullrecord <record><control><sourceid>arxiv_GOX</sourceid><recordid>TN_cdi_arxiv_primary_2002_09109</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2002_09109</sourcerecordid><originalsourceid>FETCH-LOGICAL-a679-9ac29fc2f24971c6cb28ca786e49e058fb866bd5cf480dadc29f1126d7b501b33</originalsourceid><addsrcrecordid>eNotz7tOwzAYBWAvHVDLAzDhF0iwndixx7RAqRSJge7R7xu1lEtlpy3w9FVKl3OWoyN9CD1RkpeSc_IC8Secc0YIy4miRD2gdW3PLiaIATq8649gpoTHAdenaRzGfjwl_OqMG6YIXfhzFjfh-zBd3Jz46wKxTyu08NAl93jvJdq_v-03H1nzud1t6iYDUalMgWHKG-ZZqSpqhNFMGqikcKVyhEuvpRDacuNLSSzYeU0pE7bSnFBdFEv0_H97Q7THGHqIv-2MaW-Y4go5b0V7</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Adversarial Impacts on Autonomous Decentralized Lightweight Swarms</title><source>arXiv.org</source><creator>Wolf, Shaya ; Cooley, Rafer ; Borowczak, Mike</creator><creatorcontrib>Wolf, Shaya ; Cooley, Rafer ; Borowczak, Mike</creatorcontrib><description>The decreased size and cost of Unmanned Aerial Vehicles (UAVs) and Unmanned Ground Vehicles (UGVs) has enabled the use of swarms of unmanned autonomous vehicles to accomplish a variety of tasks. By utilizing swarming behaviors, it is possible to efficiently accomplish coordinated tasks while minimizing per-drone computational requirements. Some drones rely on decentralized protocols that exhibit emergent behavior across the swarm. While fully decentralized algorithms remove obvious attack vectors their susceptibility to external influence is less understood. This work investigates the influences that can compromise the functionality of an autonomous swarm leading to hazardous situations and cascading vulnerabilities. When a swarm is tasked with missions involving the safety or health of humans, external influences could have serious consequences. The adversarial swarm in this work utilizes an attack vector embedded within the decentralized movement algorithm of a previously defined autonomous swarm designed to create a perimeter sentry swarm. Various simulations confirm the adversarial swarm's ability to capture significant portions (6-23%) of the perimeter.</description><identifier>DOI: 10.48550/arxiv.2002.09109</identifier><language>eng</language><subject>Computer Science - Multiagent Systems</subject><creationdate>2020-02</creationdate><rights>http://arxiv.org/licenses/nonexclusive-distrib/1.0</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>228,230,780,885</link.rule.ids><linktorsrc>$$Uhttps://arxiv.org/abs/2002.09109$$EView_record_in_Cornell_University$$FView_record_in_$$GCornell_University$$Hfree_for_read</linktorsrc><backlink>$$Uhttps://doi.org/10.48550/arXiv.2002.09109$$DView paper in arXiv$$Hfree_for_read</backlink></links><search><creatorcontrib>Wolf, Shaya</creatorcontrib><creatorcontrib>Cooley, Rafer</creatorcontrib><creatorcontrib>Borowczak, Mike</creatorcontrib><title>Adversarial Impacts on Autonomous Decentralized Lightweight Swarms</title><description>The decreased size and cost of Unmanned Aerial Vehicles (UAVs) and Unmanned Ground Vehicles (UGVs) has enabled the use of swarms of unmanned autonomous vehicles to accomplish a variety of tasks. By utilizing swarming behaviors, it is possible to efficiently accomplish coordinated tasks while minimizing per-drone computational requirements. Some drones rely on decentralized protocols that exhibit emergent behavior across the swarm. While fully decentralized algorithms remove obvious attack vectors their susceptibility to external influence is less understood. This work investigates the influences that can compromise the functionality of an autonomous swarm leading to hazardous situations and cascading vulnerabilities. When a swarm is tasked with missions involving the safety or health of humans, external influences could have serious consequences. The adversarial swarm in this work utilizes an attack vector embedded within the decentralized movement algorithm of a previously defined autonomous swarm designed to create a perimeter sentry swarm. Various simulations confirm the adversarial swarm's ability to capture significant portions (6-23%) of the perimeter.</description><subject>Computer Science - Multiagent Systems</subject><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><sourceid>GOX</sourceid><recordid>eNotz7tOwzAYBWAvHVDLAzDhF0iwndixx7RAqRSJge7R7xu1lEtlpy3w9FVKl3OWoyN9CD1RkpeSc_IC8Secc0YIy4miRD2gdW3PLiaIATq8649gpoTHAdenaRzGfjwl_OqMG6YIXfhzFjfh-zBd3Jz46wKxTyu08NAl93jvJdq_v-03H1nzud1t6iYDUalMgWHKG-ZZqSpqhNFMGqikcKVyhEuvpRDacuNLSSzYeU0pE7bSnFBdFEv0_H97Q7THGHqIv-2MaW-Y4go5b0V7</recordid><startdate>20200220</startdate><enddate>20200220</enddate><creator>Wolf, Shaya</creator><creator>Cooley, Rafer</creator><creator>Borowczak, Mike</creator><scope>AKY</scope><scope>GOX</scope></search><sort><creationdate>20200220</creationdate><title>Adversarial Impacts on Autonomous Decentralized Lightweight Swarms</title><author>Wolf, Shaya ; Cooley, Rafer ; Borowczak, Mike</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a679-9ac29fc2f24971c6cb28ca786e49e058fb866bd5cf480dadc29f1126d7b501b33</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Computer Science - Multiagent Systems</topic><toplevel>online_resources</toplevel><creatorcontrib>Wolf, Shaya</creatorcontrib><creatorcontrib>Cooley, Rafer</creatorcontrib><creatorcontrib>Borowczak, Mike</creatorcontrib><collection>arXiv Computer Science</collection><collection>arXiv.org</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Wolf, Shaya</au><au>Cooley, Rafer</au><au>Borowczak, Mike</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Adversarial Impacts on Autonomous Decentralized Lightweight Swarms</atitle><date>2020-02-20</date><risdate>2020</risdate><abstract>The decreased size and cost of Unmanned Aerial Vehicles (UAVs) and Unmanned Ground Vehicles (UGVs) has enabled the use of swarms of unmanned autonomous vehicles to accomplish a variety of tasks. By utilizing swarming behaviors, it is possible to efficiently accomplish coordinated tasks while minimizing per-drone computational requirements. Some drones rely on decentralized protocols that exhibit emergent behavior across the swarm. While fully decentralized algorithms remove obvious attack vectors their susceptibility to external influence is less understood. This work investigates the influences that can compromise the functionality of an autonomous swarm leading to hazardous situations and cascading vulnerabilities. When a swarm is tasked with missions involving the safety or health of humans, external influences could have serious consequences. The adversarial swarm in this work utilizes an attack vector embedded within the decentralized movement algorithm of a previously defined autonomous swarm designed to create a perimeter sentry swarm. Various simulations confirm the adversarial swarm's ability to capture significant portions (6-23%) of the perimeter.</abstract><doi>10.48550/arxiv.2002.09109</doi><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier DOI: 10.48550/arxiv.2002.09109
ispartof
issn
language eng
recordid cdi_arxiv_primary_2002_09109
source arXiv.org
subjects Computer Science - Multiagent Systems
title Adversarial Impacts on Autonomous Decentralized Lightweight Swarms
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-13T13%3A22%3A45IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-arxiv_GOX&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Adversarial%20Impacts%20on%20Autonomous%20Decentralized%20Lightweight%20Swarms&rft.au=Wolf,%20Shaya&rft.date=2020-02-20&rft_id=info:doi/10.48550/arxiv.2002.09109&rft_dat=%3Carxiv_GOX%3E2002_09109%3C/arxiv_GOX%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true