3 research outputs found

    INFORMATION SECURITY ASSESSMENT FOR MULTI-AGENT ROBOTIC SYSTEM UNDER THE INFORMATION IMPACT

    Get PDF
    The paper deals with the features of information security guaranteeing of the multi-agent robotic system with self-organizing behavior. The main attention is paid to the possibility of implementing information security threats on the level of interaction between the individual elements. The definitions “information impact” and “disorganization” are introduced for multi-agent robotic system. As a criterion for the system safety state assessment, probability is selected of number of items available at time t for required task execution of multi-agent robotic system, not suffering from the effects of the information impact. A method for estimating the probability of the multi-agent robotic system being in a safe state is proposed. The method is based on mathematical apparatus of Markov chains. Its distinction is the usage of functional dependencies for intensity information impact. The method gives the possibility to identify required characteristics of the individual elements in the early stages of development. Graphs of probability for secure system state of group of elements at different intensities of information impact by intruder and intensities are given, characterizing software and hardware capabilities of element output from the unsafe condition. The system behavior is modeled in the dynamics for different functional dependencies of the information impact intensity. An example of group consisting of four identical elements staying in a safe condition and attacking by three disorganizing elements is shown. Technique of obtaining numerical values for the intensities of information impact at successive instants is revealed

    POLICE OFFICE MODEL IMPROVEMENT FOR SECURITY OF SWARM ROBOTIC SYSTEMS

    Get PDF
    This paper focuses on aspects of information security for group of mobile robotic systems with swarm intellect. The ways for hidden attacks realization by the opposing party on swarm algorithm are discussed. We have fulfilled numerical modeling of potentially destructive information influence on the ant shortest path algorithm. We have demonstrated the consequences of attacks on the ant algorithm with different concentration in a swarm of subversive robots. Approaches are suggested for information security mechanisms in swarm robotic systems, based on the principles of centralized security management for mobile agents. We have developed the method of forming a self-organizing information security management system for robotic agents in swarm groups implementing POM (Police Office Model – a security model based on police offices), to provide information security in multi-agent systems. The method is based on the usage of police station network in the graph nodes, which have functions of identification and authentication of agents, identifying subversive robots by both their formal characteristics and their behavior in the swarm. We have suggested a list of software and hardware components for police stations, consisting of: communication channels between the robots in police office, nodes register, a database of robotic agents, a database of encryption and decryption module. We have suggested the variants of logic for the mechanism of information security in swarm systems with different temporary diagrams of data communication between police stations. We present comparative analysis of implementation of protected swarm systems depending on the functioning logic of police offices, integrated in swarm system. It is shown that the security model saves the ability to operate in noisy environments, when the duration of the interference is comparable to the time necessary for the agent to overcome the path between police stations

    TRUST AND REPUTATION MODEL DESIGN FOR OBJECTS OF MULTI-AGENT ROBOTICS SYSTEMS WITH DECENTRALIZED CONTROL

    No full text
    The problem of mechanisms design for protection of multi-agent robotics systems from attacks of robots-saboteurs is considered. Functioning analysis of these systems with decentralized control is carried out. The type of the so-called soft attacks using interception of messages, misinformation formation and transmission to group of robots which are also realizing other actions without identified signs of invasion of robots-saboteurs. Analysis of existing information security models of the system based on the trust level computation, calculated in the process of agents’ interaction is carried out. Information security model is offered in which robots-agents produce the trust levels to each other on the basis of situation analysis emerging on a certain step of iterative algorithm with usage of onboard sensor devices. On the basis of calculated trust levels, recognition of “saboteur” objects in the group of legitimate robots-agents is done. For measure of likeness (adjacency) increase for objects from the same category (“saboteur” or “legitimate agent”), calculation algorithm for agents reputation is offered as a measure of public opinion about qualities of this or that agent-subject. Implementation alternatives of the algorithms for detection of saboteurs on the example of the basic algorithm for distribution of purposes in the group of robots are considered
    corecore