Threats to the Swarm: Security Considerations for Swarm Robotics. / Higgins, Fiona; Tomlinson, Allan; Martin, Keith M.

In: International Journal on Advances in Security, Vol. 2, No. 2&3, 2009, p. 288 - 297.

Research output: Contribution to journalArticlepeer-review

Published

Standard

Threats to the Swarm: Security Considerations for Swarm Robotics. / Higgins, Fiona; Tomlinson, Allan; Martin, Keith M.

In: International Journal on Advances in Security, Vol. 2, No. 2&3, 2009, p. 288 - 297.

Research output: Contribution to journalArticlepeer-review

Harvard

APA

Vancouver

Higgins F, Tomlinson A, Martin KM. Threats to the Swarm: Security Considerations for Swarm Robotics. International Journal on Advances in Security. 2009;2(2&3):288 - 297.

Author

Higgins, Fiona ; Tomlinson, Allan ; Martin, Keith M. / Threats to the Swarm: Security Considerations for Swarm Robotics. In: International Journal on Advances in Security. 2009 ; Vol. 2, No. 2&3. pp. 288 - 297.

BibTeX

@article{947b1fec501e4f4985010952d654eb12,
title = "Threats to the Swarm: Security Considerations for Swarm Robotics",
abstract = "Swarm robotics is a relatively new technology that is being explored for its potential use in a variety of different applications and environments. Previous emerging technologies have often overlooked security until later developmental stages, when security has had to be undesirably (and sometimes expensively) retrofitted. This paper compares swarm robotics with related technologies to identify their unique features where existing security mechanisms can not be applied. We then review some of the emerging applications where ineffective security could have significant impact. We conclude by discussing a number of security challenges for swarm robotics and argue that now is the right time to address these issues and seek solutions. We also identify several idiosyncrasies of swarm robotics that present some unique security challenges. In particular, swarms of robots potentially (i) employ different types of communication channels (ii) have special concepts of identity, and (iii) exhibit adaptive emergent behaviour which could be modified by an intruder. Addressing these issues now will prevent undesirable consequences for many applications of this type of technology.",
author = "Fiona Higgins and Allan Tomlinson and Martin, {Keith M.}",
year = "2009",
language = "Undefined/Unknown",
volume = "2",
pages = "288 -- 297",
journal = "International Journal on Advances in Security",
issn = "1942-2636",
number = "2&3",

}

RIS

TY - JOUR

T1 - Threats to the Swarm: Security Considerations for Swarm Robotics

AU - Higgins, Fiona

AU - Tomlinson, Allan

AU - Martin, Keith M.

PY - 2009

Y1 - 2009

N2 - Swarm robotics is a relatively new technology that is being explored for its potential use in a variety of different applications and environments. Previous emerging technologies have often overlooked security until later developmental stages, when security has had to be undesirably (and sometimes expensively) retrofitted. This paper compares swarm robotics with related technologies to identify their unique features where existing security mechanisms can not be applied. We then review some of the emerging applications where ineffective security could have significant impact. We conclude by discussing a number of security challenges for swarm robotics and argue that now is the right time to address these issues and seek solutions. We also identify several idiosyncrasies of swarm robotics that present some unique security challenges. In particular, swarms of robots potentially (i) employ different types of communication channels (ii) have special concepts of identity, and (iii) exhibit adaptive emergent behaviour which could be modified by an intruder. Addressing these issues now will prevent undesirable consequences for many applications of this type of technology.

AB - Swarm robotics is a relatively new technology that is being explored for its potential use in a variety of different applications and environments. Previous emerging technologies have often overlooked security until later developmental stages, when security has had to be undesirably (and sometimes expensively) retrofitted. This paper compares swarm robotics with related technologies to identify their unique features where existing security mechanisms can not be applied. We then review some of the emerging applications where ineffective security could have significant impact. We conclude by discussing a number of security challenges for swarm robotics and argue that now is the right time to address these issues and seek solutions. We also identify several idiosyncrasies of swarm robotics that present some unique security challenges. In particular, swarms of robots potentially (i) employ different types of communication channels (ii) have special concepts of identity, and (iii) exhibit adaptive emergent behaviour which could be modified by an intruder. Addressing these issues now will prevent undesirable consequences for many applications of this type of technology.

M3 - Article

VL - 2

SP - 288

EP - 297

JO - International Journal on Advances in Security

JF - International Journal on Advances in Security

SN - 1942-2636

IS - 2&3

ER -