Multi-Robot Path Finding Testbed in Wireless Networks against Malicious Attacks

被引:0
|
作者
Park, Sangcheon [1 ]
Kim, Seunghwan [1 ]
Cho, Dong-il Dan [2 ]
Jane, Seohyeong [2 ]
Sung, Jinwoo [2 ]
Kim, Seong-Lyun [1 ]
机构
[1] Yonsei Univ, Sch Elect Elect Engn, Seoul 03722, South Korea
[2] Seoul Natl Univ, Dept Mech Engn, Seoul 08826, South Korea
关键词
Robotic Networks; Malicious Attack; Multi-Robot;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Within a decade, a malicious attack aware network design is of critical importance in an internet of things (IoT) network where the attack frequency coincidentally increases with communication throughput. The main motivation of this article is to apply wireless communication to cooperative path-finding scenario with multiple robots. For this propose, we propose a controllable communication-frequency algorithm (CCF) tier deriving the optimal communicating frequency that maximizes the mission accomplished speed. This algorithm determines the optimal communication frequency according to the communication environment with malicious attacks. We report its performance by real implementation on BLE-based Arduino shield buts. We show the effects of cooperative multi-robots with malicious attacks and our proposed algorithm performance is evaluated where it achieves up to mission accomplished speed increase compared to the case without CCF.
引用
收藏
页码:120 / 123
页数:4
相关论文
共 50 条
  • [21] Robust Multi-Robot Active Target Tracking Against Sensing and Communication Attacks
    Zhou, Lifeng
    Kumar, Vijay
    2022 AMERICAN CONTROL CONFERENCE, ACC, 2022, : 4443 - 4450
  • [22] Robust Multi-Robot Active Target Tracking Against Sensing and Communication Attacks
    Zhou, Lifeng
    Kumar, Vijay
    IEEE TRANSACTIONS ON ROBOTICS, 2023, 39 (03) : 1768 - 1780
  • [23] Robust Motion Planning for Multi-Robot Systems Against Position Deception Attacks
    Tang, Wenbing
    Zhou, Yuan
    Liu, Yang
    Ding, Zuohua
    Liu, Jing
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 2157 - 2170
  • [24] Security to wireless sensor networks against malicious attacks using Hamming residue method
    Majid Alotaibi
    EURASIP Journal on Wireless Communications and Networking, 2019
  • [25] Fragility-Aware Stealthy Attack Strategy for Multi-Robot Systems against Multi-Hop Wireless Networks
    Gao, Yun
    Luo, Kai
    Fang, Chongrong
    He, Jianping
    Proceedings of the IEEE Conference on Decision and Control, 2022, 2022-December : 4827 - 4832
  • [26] Multilevel Authentication to Wireless Sensor Networks Against Malicious Attacks Using Butterfly Method
    Unissa, Ishrath
    Raja, Ch
    Ahmad, Syed Jalal
    ADVANCES IN SIGNAL PROCESSING AND COMMUNICATION ENGINEERING, ICASPACE 2021, 2022, 929 : 317 - 326
  • [27] Deep learning algorithms providing security for wireless sensor networks against malicious attacks
    Kongkham, Dinokumar
    INTERNATIONAL JOURNAL OF INTERNET PROTOCOL TECHNOLOGY, 2024, 17 (01) : 1 - 8
  • [28] Security to wireless sensor networks against malicious attacks using Hamming residue method
    Alotaibi, Majid
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2019, 2019 (1)
  • [29] Fragility-Aware Stealthy Attack Strategy for Multi-Robot Systems against Multi-Hop Wireless Networks
    Gao, Yun
    Luo, Kai
    Fang, Chongrong
    He, Jianping
    2022 IEEE 61ST CONFERENCE ON DECISION AND CONTROL (CDC), 2022, : 4827 - 4832
  • [30] Delay-sensitive Wireless Relaying in Multi-Robot Indoor Networks
    Panigrahi, Bighnaraj
    Behera, Sipra
    Shailendra, Samar
    Rath, Hemant Kumar
    Pal, Arpan
    2019 11TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS & NETWORKS (COMSNETS), 2019, : 612 - 617