Yushan Li;Jianping He;Cailian Chen;Xinping Guan;Lin Cai
{"title":"Securing Mobile Robotic Networks Against Replacement Attack","authors":"Yushan Li;Jianping He;Cailian Chen;Xinping Guan;Lin Cai","doi":"10.1109/TAC.2025.3526002","DOIUrl":null,"url":null,"abstract":"The security of mobile robotic networks (MRNs) has been an active research topic in recent years. This article aims to secure the ubiquitous formation control of MRNs against the replacement attack, where an external robot can replace a formation robot by compromising the communication and physically interfering with the victim simultaneously. To counter this advanced attack, the novel idea of this work is to leverage the physical proximity of the formation shape and the interaction topology among robots for defense design. First, from the physical proximity perspective, we propose the convex neighbor polygon (CNP) to capture the geometric characteristic of the formation robots, and design a CNP-based security mechanism for the robots during the replacement attack. Then, from the interaction perspective, we introduce the indirect controllability to characterize the possibility that the attacker leverages the interaction between robots to deactivate the CNP mechanism, and establish the conditions regarding the topology structure and the attack input to counter the replacement. Finally, based on the obtained conditions, we demonstrate how to design the initiatory topology among the formation robots to enhance the defense performance. Comparative simulations verify the effectiveness of the proposed method.","PeriodicalId":13201,"journal":{"name":"IEEE Transactions on Automatic Control","volume":"70 7","pages":"4424-4438"},"PeriodicalIF":7.0000,"publicationDate":"2025-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Automatic Control","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10824933/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
The security of mobile robotic networks (MRNs) has been an active research topic in recent years. This article aims to secure the ubiquitous formation control of MRNs against the replacement attack, where an external robot can replace a formation robot by compromising the communication and physically interfering with the victim simultaneously. To counter this advanced attack, the novel idea of this work is to leverage the physical proximity of the formation shape and the interaction topology among robots for defense design. First, from the physical proximity perspective, we propose the convex neighbor polygon (CNP) to capture the geometric characteristic of the formation robots, and design a CNP-based security mechanism for the robots during the replacement attack. Then, from the interaction perspective, we introduce the indirect controllability to characterize the possibility that the attacker leverages the interaction between robots to deactivate the CNP mechanism, and establish the conditions regarding the topology structure and the attack input to counter the replacement. Finally, based on the obtained conditions, we demonstrate how to design the initiatory topology among the formation robots to enhance the defense performance. Comparative simulations verify the effectiveness of the proposed method.
期刊介绍:
In the IEEE Transactions on Automatic Control, the IEEE Control Systems Society publishes high-quality papers on the theory, design, and applications of control engineering. Two types of contributions are regularly considered:
1) Papers: Presentation of significant research, development, or application of control concepts.
2) Technical Notes and Correspondence: Brief technical notes, comments on published areas or established control topics, corrections to papers and notes published in the Transactions.
In addition, special papers (tutorials, surveys, and perspectives on the theory and applications of control systems topics) are solicited.