Access the full text.
Sign up today, get DeepDyve free for 14 days.
J. Cortés, S. Martínez, Timur Karatas, F. Bullo (2002)
Coverage control for mobile sensing networksIEEE Transactions on Robotics and Automation, 20
Zi Feng, Jianxia Ning, Ioannis Broustis, K. Pelechrinis, S. Krishnamurthy, M. Faloutsos (2011)
Coping with packet replay attacks in wireless networks2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks
J. Cortés, S. Martínez, Timur Karatas, F. Bullo (2002)
Coverage control for mobile sensing networksProceedings 2002 IEEE International Conference on Robotics and Automation (Cat. No.02CH37292), 2
C. King (2013)
Fundamentals of wireless communications2014 67th Annual Conference for Protective Relay Engineers
Ting Wang, Yaling Yang (2013)
Analysis on perfect location spoofing attacks using beamforming2013 Proceedings IEEE INFOCOM
M. Schwager, Brian Julian, D. Rus (2009)
Optimal coverage for multiple hovering robots with downward facing cameras2009 IEEE International Conference on Robotics and Automation
M. Schwager, D. Rus, J. Slotine (2009)
Decentralized, Adaptive Coverage Control for Networked RobotsThe International Journal of Robotics Research, 28
Xin Liu, Ang Li, Xiaowei Yang, D. Wetherall (2008)
Passport: Secure and Adoptable Source Authentication
J. Newsome, E. Shi, D. Song, A. Perrig (2004)
The Sybil attack in sensor networks: analysis & defensesThird International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004
(2011)
2011).Copingwith packet replay attacks inwireless networks. In Sensor, mesh and ad hoc communications and networks
Yue Liu, David Bild, R. Dick, Z. Mao, D. Wallach (2014)
The Mason Test: A Defense Against Sybil Attacks in Wireless Networks Without Trusted AuthoritiesIEEE Transactions on Mobile Computing, 14
R. Olfati-Saber, R. Murray (2004)
Consensus problems in networks of agents with switching topology and time-delaysIEEE Transactions on Automatic Control, 49
A. Goldsmith (2005)
Wireless Communications
G. Laporte, Y. Nobert, S. Taillefer (1988)
Solving a Family of Multi-Depot Vehicle Routing and Location-Routing ProblemsTransp. Sci., 22
M. Hayes (1996)
Statistical Digital Signal Processing and Modeling
I. Sargeant, A. Tomlinson (2013)
Modelling malicious entities in a robotic swarm2013 IEEE/AIAA 32nd Digital Avionics Systems Conference (DASC)
Liang Xiao, L. Greenstein, N. Mandayam, W. Trappe (2009)
Channel-Based Detection of Sybil Attacks in Wireless NetworksIEEE Transactions on Information Forensics and Security, 4
D. Halperin, Wenjun Hu, Anmol Sheth, D. Wetherall (2011)
Tool release: gathering 802.11n traces with channel state informationComput. Commun. Rev., 41
H. Gazzah, S. Marcos (2003)
Directive antenna arrays for 3D source localization2003 4th IEEE Workshop on Signal Processing Advances in Wireless Communications - SPAWC 2003 (IEEE Cat. No.03EX689)
P. Stoica, A. Nehorai (1989)
MUSIC, maximum likelihood, and Cramer-Rao boundIEEE Transactions on Acoustics, Speech, and Signal Processing, 37
T. Kim, Cristina Basescu, Limin Jia, Soo Lee, Yih-Chun Hu, A. Perrig (2014)
Lightweight source authentication and path validationACM SIGCOMM Computer Communication Review, 44
Supplementary material in full version of this paper . URL http://groups
B. Levine, C. Shields, N. Margolin (2006)
A Survey of Solutions to the Sybil Attack
W. Brown (1967)
Synthetic Aperture RadarIEEE Transactions on Aerospace and Electronic Systems, AES-3
D Halperin, W Hu, A Sheth, D Wetherall (2011)
Tool release: Gathering 802.11n traces with channel state information. ACM SIGCOMMComputer Communication Review, 41
H. Gazzah, S. Marcos (2006)
Cramer-Rao bounds for antenna array designIEEE Transactions on Signal Processing, 54
Fei Miao, M. Pajic, George Pappas (2013)
Stochastic game approach for replay attack detection52nd IEEE Conference on Decision and Control
R. Rodrigues, P. Druschel (2010)
Peer-to-peer systemsCommunications of the ACM, 53
Fiona Higgins, A. Tomlinson, K. Martin (2009)
Threats to the Swarm: Security Considerations for Swarm Robotics, 2
Tom Fawcett (2007)
ROC Graphs: Notes and Practical Considerations for Researchers
(2017)
Guaranteeing spoof-resilient multi-robot networks
R. Beard, T. McLain, Derek Nelson, Derek Kingston, David Johanson (2006)
Decentralized Cooperative Aerial Surveillance Using Fixed-Wing Miniature UAVsProceedings of the IEEE, 94
Airlie Chapman, Marzieh Nabi-Abdolyousefi, M. Mesbahi (2009)
Identification and Infiltration in Consensus-type Networks* *This work has been supported by AFOSR FA9550-09-1-0091.IFAC Proceedings Volumes, 42
K. Daniel, Bjoern Dusza, A. Lewandowski, C. Wietfeld (2009)
AirShield: A system-of-systems MUAV remote sensing architecture for disaster response2009 3rd Annual IEEE Systems Conference
(2014)
R.,Mao, Z.M.,&Wallach,D
Hongbo Liu, Yan Wang, Jian Liu, J. Yang, Yingying Chen (2014)
Practical user authentication leveraging channel state information (CSI)Proceedings of the 9th ACM symposium on Information, computer and communications security
Jie Xiong, K. Jamieson (2013)
SecureArray: improving wifi security with fine-grained physical-layer informationProceedings of the 19th annual international conference on Mobile computing & networking
Fadel Adib, Swarun Kumar, Omid Aryan, Shyamnath Gollakota, D. Katabi (2013)
Interference alignment by motionProceedings of the 19th annual international conference on Mobile computing & networking
1] Amazon prime air. URL http://www.amazon.com/b? node=8037720011
Zhimin Yang, E. Ekici, D. Xuan (2007)
A Localization-Based Anti-Sensor Network SystemIEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications
D. Bertsekas, J. Tsitsiklis (2002)
Introduction to Probability
Mehrzad Malmirchegini, Y. Mostofi (2012)
On the Spatial Predictability of Communication ChannelsIEEE Transactions on Wireless Communications, 11
D. Shen, V. Li (2006)
Fundamentals of Wireless Communications
Y. Wang, G. Attebury, B. Ramamurthy (2006)
A survey of security issues in wireless sensor networksIEEE Communications Surveys & Tutorials, 8
M. Pavone, Emilio Frazzoli, F. Bullo (2009)
Adaptive and Distributed Algorithms for Vehicle Routing in a Stochastic and Dynamic EnvironmentIEEE Transactions on Automatic Control, 56
John Douceur (2002)
The Sybil Attack
Yong Sheng, Keren Tan, Guanling Chen, D. Kotz, A. Campbell (2008)
Detecting 802.11 MAC Layer Spoofing Using Received Signal StrengthIEEE INFOCOM 2008 - The 27th Conference on Computer Communications
C. Mathews, M. Zoltowski (1994)
Signal Subspace Techniques for Source Localization with Circular Sensor Arrays
Lanny Lin, M. Goodrich (2009)
UAV intelligent path planning for Wilderness Search and Rescue2009 IEEE/RSJ International Conference on Intelligent Robots and Systems
Aleksandr Kushleyev, B. MacAllister, M. Likhachev (2011)
Planning for landing site selection in the aerial supply delivery2011 IEEE/RSJ International Conference on Intelligent Robots and Systems
Waldir Júnior, Thiago Figueiredo, H. Wong, A. Loureiro (2004)
Malicious node detection in wireless sensor networks18th International Parallel and Distributed Processing Symposium, 2004. Proceedings.
(2007)
Cooperative uav formation flying with obstacle/collision avoidance
Swarun Kumar, Stephanie Gil, D. Katabi, D. Rus (2014)
Accurate indoor localization with zero start-up costProceedings of the 20th annual international conference on Mobile computing and networking
Jue Wang, D. Katabi (2013)
Dude, where's my card?: RFID positioning that works with multipath and non-line of sightProceedings of the ACM SIGCOMM 2013 conference on SIGCOMM
L. Parker (2002)
Distributed Algorithms for Multi-Robot Observation of Multiple Moving TargetsAutonomous Robots, 12
Dongxun Jin, Joo-Seok Song (2014)
A Traffic Flow Theory Aided Physical Measurement-Based Sybil Nodes Detection Mechanism in Vehicular Ad-hoc Networks2014 IEEE/ACIS 13th International Conference on Computer and Information Science (ICIS)
Jie Yang, Yin Chen, W. Trappe, Jerry Cheng (2013)
Detection and Localization of Multiple Spoofing Attackers in Wireless NetworksIEEE Transactions on Parallel and Distributed Systems, 24
M. Pavone, Emilio Frazzoli, F. Bullo (2009)
Distributed and Adaptive Algorithms for Vehicle Routing in a Stochastic and Dynamic EnvironmentArXiv, abs/0903.3624
Swarun Kumar, Ezzeldin Hamed, D. Katabi, Erran Li (2014)
LTE radio analytics made easy and accessibleComputer Communication Review
H. Klausing (1989)
Feasibility of a Synthetic Aperture Radar with Rotating Antennas (ROSAR)1989 19th European Microwave Conference
Stephanie Gil, Swarun Kumar, D. Katabi, D. Rus (2015)
Adaptive communication in multi-robot systems using directionality of signal strengthThe International Journal of Robotics Research, 34
Multi-robot networks use wireless communication to provide wide-ranging services such as aerial surveillance and unmanned delivery. However, effective coordination between multiple robots requires trust, making them particularly vulnerable to cyber-attacks. Specifically, such networks can be gravely disrupted by the Sybil attack, where even a single malicious robot can spoof a large number of fake clients. This paper proposes a new solution to defend against the Sybil attack, without requiring expensive cryptographic key-distribution. Our core contribution is a novel algorithm implemented on commercial Wi-Fi radios that can “sense” spoofers using the physics of wireless signals. We derive theoretical guarantees on how this algorithm bounds the impact of the Sybil Attack on a broad class of multi-robot problems, including locational coverage and unmanned delivery. We experimentally validate our claims using a team of AscTec quadrotor servers and iRobot Create ground clients, and demonstrate spoofer detection rates over 96%.
Autonomous Robots – Springer Journals
Published: Feb 28, 2017
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.