{"title":"Development of the Anomaly Detection Method for a Group of Mobile Robots","authors":"E. Basan, O. Makarevich, A. Basan","doi":"10.1145/3264437.3264475","DOIUrl":null,"url":null,"abstract":"This article studied the attacks that can be implemented in a network of mobile robots. The peculiarity of these attacks is that they, as a rule, use the vulnerabilities of wireless data transmission and the weakness of network protocols. The study was carried out using a simulation model of a group of mobile robots. It was modeled following attacks: denial of service, Black-Hole, Gray-Hole. In this case, it was analyzed the impact of the attacks on the energy consumption and the impact on network traffic. It was assessed the complexity of the implementation of various types of attacks. This analysis should make it clear with what intensity the attack should be conducted in order to damage the network. Also in this study, a method is proposed for calculating the trust of network nodes and the entire network as a whole based on the number of discarded packets.","PeriodicalId":130946,"journal":{"name":"Proceedings of the 11th International Conference on Security of Information and Networks","volume":"43 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 11th International Conference on Security of Information and Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3264437.3264475","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
This article studied the attacks that can be implemented in a network of mobile robots. The peculiarity of these attacks is that they, as a rule, use the vulnerabilities of wireless data transmission and the weakness of network protocols. The study was carried out using a simulation model of a group of mobile robots. It was modeled following attacks: denial of service, Black-Hole, Gray-Hole. In this case, it was analyzed the impact of the attacks on the energy consumption and the impact on network traffic. It was assessed the complexity of the implementation of various types of attacks. This analysis should make it clear with what intensity the attack should be conducted in order to damage the network. Also in this study, a method is proposed for calculating the trust of network nodes and the entire network as a whole based on the number of discarded packets.