Nothing Special   »   [go: up one dir, main page]

Skip to main content

Decentralized Vision-Based Byzantine Agent Detection in Multi-robot Systems with IOTA Smart Contracts

  • Conference paper
  • First Online:
Foundations and Practice of Security (FPS 2022)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 13877))

Included in the following conference series:

Abstract

Multiple opportunities lie at the intersection of multi-robot systems and distributed ledger technologies (DLTs). In this work, we investigate the potential of new DLT solutions such as IOTA, for detecting anomalies and byzantine agents in multi-robot systems in a decentralized manner. Traditional blockchain approaches are not applicable to real-world networked and decentralized robotic systems where connectivity conditions are not ideal. To address this, we leverage recent advances in partition-tolerant and byzantine-tolerant collaborative decision-making processes with IOTA smart contracts. We show how our work in vision-based anomaly and change detection can be applied to detecting byzantine agents within multiple robots operating in the same environment. We show that IOTA smart contracts add a low computational overhead while allowing to build trust within the multi-robot system. The proposed approach effectively enables byzantine robot detection based on the comparison of images submitted by the different robots and detection of anomalies and changes between them.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 69.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 89.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Santos de Campos, M.G., Chanel, C.P., Chauffaut, C., Lacan, J.: Towards a blockchain-based multi-uav surveillance system. Front. Robot. AI, 90 (2021)

    Google Scholar 

  2. Castaldo, L., Cinque, V.: Blockchain-based logging for the cross-border exchange of ehealth data in europe. In: Gelenbe, E., et al. (eds.) Euro-CYBERSEC 2018. CCIS, vol. 821, pp. 46–56. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-95189-8_5

    Chapter  Google Scholar 

  3. Chen, T., Liu, X., Xia, B., Wang, W., Lai, Y.: Unsupervised anomaly detection of industrial robots using sliding-window convolutional variational autoencoder. IEEE Access 8, 47072–47081 (2020)

    Article  Google Scholar 

  4. DeTone, D., Malisiewicz, T., Rabinovich, A.: Superpoint: self-supervised interest point detection and description. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, pp. 224–236 (2018)

    Google Scholar 

  5. Di Biase, G., Blum, H., Siegwart, R., Cadena, C.: Pixel-wise anomaly detection in complex driving scenes. In: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp. 16918–16927 (2021)

    Google Scholar 

  6. Ferrer, E.C., Jiménez, E., Lopez-Presa, J.L., Martín-Rueda, J.: Following leaders in byzantine multirobot systems by using blockchain technology. IEEE Trans. Rob. 38(2), 1101–1117 (2021)

    Article  Google Scholar 

  7. Golomb, T., Mirsky, Y., Elovici, Y.: Ciota: Collaborative IoT anomaly detection via blockchain. arXiv preprint arXiv:1803.03807 (2018)

  8. Jadidi, Z., Dorri, A., Jurdak, R., Fidge, C.: Securing manufacturing using blockchain. In: 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 1920–1925. IEEE (2020)

    Google Scholar 

  9. Kapitonov, A., Lonshakov, S., Krupenkin, A., Berman, I.: Blockchain-based protocol of autonomous business activity for multi-agent systems consisting of UAVs. In: 2017 Workshop on Research, Education and Development of Unmanned Aerial Systems (RED-UAS), pp. 84–89. IEEE (2017)

    Google Scholar 

  10. Keramat, F., Peña Queralta, J., Westerlund, T.: Partition-tolerant and byzantine-tolerant decision-making for distributed robotic systems with iota and ROS 2. arXiv:2208.13467 (2022)

  11. Li, M., Zhang, K., Liu, J., Gong, H., Zhang, Z.: Blockchain-based anomaly detection of electricity consumption in smart grids. Pattern Recogn. Lett. 138, 476–482 (2020)

    Article  Google Scholar 

  12. Lopes, V., Alexandre, L.A.: Detecting robotic anomalies using robotchain. In: 2019 IEEE International Conference on Autonomous Robot Systems and Competitions (ICARSC), pp. 1–6. IEEE (2019)

    Google Scholar 

  13. Lopes, V., Alexandre, L.A., Pereira, N.: Controlling robots using artificial intelligence and a consortium blockchain. arXiv preprint arXiv:1903.00660 (2019)

  14. Lopes, V., Pereira, N., Alexandre, L.A.: Robot workspace monitoring using a blockchain-based 3d vision approach. In: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (2019)

    Google Scholar 

  15. Miller, O.G., Gandhi, V.: A survey of modern exogenous fault detection and diagnosis methods for swarm robotics. J. King Saud Univ. Eng. Sci. 33(1), 43–53 (2021)

    Google Scholar 

  16. Mohanta, B.K., Jena, D., Satapathy, U., Patnaik, S.: Survey on IoT security: Challenges and solution using machine learning, artificial intelligence and blockchain technology. Internet Things 11, 100227 (2020)

    Article  Google Scholar 

  17. Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. Decentralized Bus. Rev. 21260 (2008)

    Google Scholar 

  18. Peña Queralta, J., Qingqing, L., Ferrer, E.C., Westerlund, T.: Secure encoded instruction graphs for end-to-end data validation in autonomous robots. IEEE Internet Things J. 9(18), 18028–18040 (2022)

    Article  Google Scholar 

  19. Peña Queralta, J., Qingqing, L., Zou, Z., Westerlund, T.: Enhancing autonomy with blockchain and multi-access edge computing in distributed robotic systems. In: The 5th International Conference on Fog and Mobile Edge Computing (2020). IEEE (2020)

    Google Scholar 

  20. Popov, S.: The tangle. White Pap. 1(3), 30 (2018)

    Google Scholar 

  21. Rahouti, M., Lyons, D., Santana, L.: Vrchain: A blockchain-enabled framework for visual homing and navigation robots. arXiv preprint arXiv:2206.11223 (2022)

  22. Roth, K., Pemula, L., Zepeda, J., Schölkopf, B., Brox, T., Gehler, P.: Towards total recall in industrial anomaly detection. In: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp. 14318–14328 (2022)

    Google Scholar 

  23. Salimi, S., Morón, P.T., Peña Queralta, J., Westerlund, T.: Secure heterogeneous multi-robot collaboration and docking with hyperledger fabric blockchain. arXiv preprint (2022)

    Google Scholar 

  24. Salimi, S., Queralta, J.P., Westerlund, T.: Towards managing industrial robot fleets with hyperledger fabric blockchain and ros 2. arXiv e-prints, pp. arXiv-2203 (2022)

    Google Scholar 

  25. Salimpour, S., Queralta, J.P., Westerlund, T.: Self-calibrating anomaly and change detection for autonomous inspection robots. arXiv preprint arXiv:2209.02379 (2022)

  26. Santhosh, K.K., Dogra, D.P., Roy, P.P.: Anomaly detection in road traffic using visual surveillance: a survey. ACM Comput. Surv. (CSUR) 53(6), 1–26 (2020)

    Article  Google Scholar 

  27. Sarlin, P.E., DeTone, D., Malisiewicz, T., Rabinovich, A.: Superglue: learning feature matching with graph neural networks. In: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp. 4938–4947 (2020)

    Google Scholar 

  28. Strobel, V., Castelló Ferrer, E., Dorigo, M.: Managing byzantine robots via blockchain technology in a swarm robotics collective decision making scenario (2018)

    Google Scholar 

  29. Strobel, V., Castelló Ferrer, E., Dorigo, M.: Blockchain technology secures robot swarms: a comparison of consensus protocols and their resilience to byzantine robots. Front. Robot. AI 7, 54 (2020)

    Article  Google Scholar 

  30. Wang, T., Xu, X., Shen, F., Yang, Y.: A cognitive memory-augmented network for visual anomaly detection. IEEE/CAA J. Automatica Sinica 8(7), 1296–1307 (2021)

    Article  Google Scholar 

  31. Wang, T., Zhang, Z., Tsui, K.L.: A deep generative approach for rail foreign object detections via semi-supervised learning. IEEE Trans. Ind. Inf. 19(1), 459–468 (2022)

    Article  Google Scholar 

  32. Xiao, W., Li, M., Alzahrani, B., Alotaibi, R., Barnawi, A., Ai, Q.: A blockchain-based secure crowd monitoring system using UAV swarm. IEEE Netw. 35(1), 108–115 (2021)

    Article  Google Scholar 

  33. Yuan, X., Song, M., Zhou, F., Chen, Z., Li, Y.: A novel mittag-leffler kernel based hybrid fault diagnosis method for wheeled robot driving system. Comput. Intell. Neurosci. 2015, 65 (2015)

    Article  Google Scholar 

Download references

Acknowledgment

This research work is supported by the R3Swarms project funded by the Secure Systems Research Center (SSRC), Technology Innovation Institute (TII).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sahar Salimpour .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Salimpour, S., Keramat, F., Queralta, J.P., Westerlund, T. (2023). Decentralized Vision-Based Byzantine Agent Detection in Multi-robot Systems with IOTA Smart Contracts. In: Jourdan, GV., Mounier, L., Adams, C., Sèdes, F., Garcia-Alfaro, J. (eds) Foundations and Practice of Security. FPS 2022. Lecture Notes in Computer Science, vol 13877. Springer, Cham. https://doi.org/10.1007/978-3-031-30122-3_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-30122-3_20

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-30121-6

  • Online ISBN: 978-3-031-30122-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics