Threats to the Swarm: Security Considerations for Swarm Robotics. / Higgins, Fiona; Tomlinson, Allan; Martin, Keith M.
In: International Journal on Advances in Security, Vol. 2, No. 2&3, 2009, p. 288 - 297.Research output: Contribution to journal › Article › peer-review
Threats to the Swarm: Security Considerations for Swarm Robotics. / Higgins, Fiona; Tomlinson, Allan; Martin, Keith M.
In: International Journal on Advances in Security, Vol. 2, No. 2&3, 2009, p. 288 - 297.Research output: Contribution to journal › Article › peer-review
}
TY - JOUR
T1 - Threats to the Swarm: Security Considerations for Swarm Robotics
AU - Higgins, Fiona
AU - Tomlinson, Allan
AU - Martin, Keith M.
PY - 2009
Y1 - 2009
N2 - Swarm robotics is a relatively new technology that is being explored for its potential use in a variety of different applications and environments. Previous emerging technologies have often overlooked security until later developmental stages, when security has had to be undesirably (and sometimes expensively) retrofitted. This paper compares swarm robotics with related technologies to identify their unique features where existing security mechanisms can not be applied. We then review some of the emerging applications where ineffective security could have significant impact. We conclude by discussing a number of security challenges for swarm robotics and argue that now is the right time to address these issues and seek solutions. We also identify several idiosyncrasies of swarm robotics that present some unique security challenges. In particular, swarms of robots potentially (i) employ different types of communication channels (ii) have special concepts of identity, and (iii) exhibit adaptive emergent behaviour which could be modified by an intruder. Addressing these issues now will prevent undesirable consequences for many applications of this type of technology.
AB - Swarm robotics is a relatively new technology that is being explored for its potential use in a variety of different applications and environments. Previous emerging technologies have often overlooked security until later developmental stages, when security has had to be undesirably (and sometimes expensively) retrofitted. This paper compares swarm robotics with related technologies to identify their unique features where existing security mechanisms can not be applied. We then review some of the emerging applications where ineffective security could have significant impact. We conclude by discussing a number of security challenges for swarm robotics and argue that now is the right time to address these issues and seek solutions. We also identify several idiosyncrasies of swarm robotics that present some unique security challenges. In particular, swarms of robots potentially (i) employ different types of communication channels (ii) have special concepts of identity, and (iii) exhibit adaptive emergent behaviour which could be modified by an intruder. Addressing these issues now will prevent undesirable consequences for many applications of this type of technology.
M3 - Article
VL - 2
SP - 288
EP - 297
JO - International Journal on Advances in Security
JF - International Journal on Advances in Security
SN - 1942-2636
IS - 2&3
ER -