Detecting Colluding Sybil Attackers in Robotic Networks using Backscatters

12/28/2020
by   Yong Huang, et al.
0

Due to the openness of wireless medium, robotic networks that consist of many miniaturized robots are susceptible to Sybil attackers, who can fabricate myriads of fictitious robots. Such detrimental attacks can overturn the fundamental trust assumption in robotic collaboration and thus impede widespread deployments of robotic networks in many collaborative tasks. Existing solutions rely on bulky multi-antenna systems to passively obtain fine-grained physical layer signatures, making them unaffordable to miniaturized robots. To overcome this limitation, we present ScatterID, a lightweight system that attaches featherlight and batteryless backscatter tags to single-antenna robots for Sybil attack mitigation. Instead of passively "observing" signatures, ScatterID actively "manipulates" multipath propagation by exploiting backscatter tags to intentionally create rich multipath signatures obtainable to single-antenna robots. Particularly, these signatures are used to carefully construct similarity vectors to thwart advanced Sybil attackers, who further trigger power-scaling and colluding attacks to generate dissimilar signatures. Then, a customized random forest model is developed to accurately infer the identity legitimacy of each robot. We implement ScatterID on the iRobot Create platform and evaluate it under various Sybil attacks in real-world environments. The experimental results show that ScatterID achieves a high AUROC of 0.987 and obtains an overall accuracy of 95.4 advanced Sybil attacks. Specifically, it can successfully detect 96.1 robots while mistakenly rejecting just 5.7

READ FULL TEXT

page 1

page 7

page 8

page 10

page 11

research
12/10/2019

Lightweight Sybil-Resilient Multi-Robot Networks by Multipath Manipulation

Wireless networking opens up many opportunities to facilitate miniaturiz...
research
05/31/2021

Securing IoT Devices by Exploiting Backscatter Propagation Signatures

The low-power radio technologies open up many opportunities to facilitat...
research
10/16/2018

ShieldScatter: Improving IoT Security with Backscatter Assistance

The lightweight protocols and low-power radio technologies open up many ...
research
04/14/2022

Robotic and Generative Adversarial Attacks in Offline Writer-independent Signature Verification

This study explores how robots and generative approaches can be used to ...
research
11/01/2018

Spectral Signatures in Backdoor Attacks

A recent line of work has uncovered a new form of data poisoning: so-cal...
research
08/20/2018

Authenticating On-Body Backscatter by Exploiting Propagation Signatures

The vision of battery-free communication has made backscatter a compelli...
research
03/28/2022

Attacker Attribution of Audio Deepfakes

Deepfakes are synthetically generated media often devised with malicious...

Please sign up or login with your details

Forgot password? Click here to reset