Switching Topology for Resilient Consensus Using Wi-Fi Signals

Switching Topology for Resilient Consensus Using Wi-Fi Signals

Switching Topology for Resilient Consensus using Wi-Fi Signals Thomas Wheeler1 and Ezhil Bharathi1 and Stephanie Gil2 Abstract— Securing multi-robot teams against malicious ac- tivity is crucial as these systems accelerate towards widespread societal integration. This emerging class of “physical networks” requires new security methods that exploit their physical nature. This paper derives a theoretical framework for securing multi-agent consensus against the Sybil attack by using the physical properties of wireless transmissions. Our framework uses information extracted from the wireless channels to de- sign a switching signal that stochastically excludes potentially untrustworthy transmissions from the consensus. Intuitively, this amounts to selectively ignoring incoming communications from untrustworthy agents, allowing for consensus to the true average to be recovered with high probability after a certain observation time T0. This paper allows for arbitrary malicious node values and is insensitive to the initial topology of the network so long as a connected topology over legitimate nodes in the network is feasible. We show that our algorithm will recover Fig. 1. Convergence of consensus using our protocol and switching consensus, and the true graph over the system of legitimate function for static (left col) and time varying (right) spoofed node input. agents, with an error rate that vanishes exponentially with time. communicated wireless signals that can be used to detect ma- I. INTRODUCTION licious actors in the network. As a wireless signal propagates Multi-robot systems are at the horizon of wide-spread inte- between communicating agents it is reflected, absorbed, and gration into our societies; as fleets of autonomous vehicles, scattered by objects in the environment in a phenomenon delivery drones, and smart and mobile Internet of Things called multipath [9]. This multipath signature can act as a (IoT) devices. This promise has spurred a great amount of “fingerprint” of the transmission [6], with clear implications research both in academia and industry, accelerating the pace for security. This suggests a new approach for the security at which this vision can come to fruition. However, as these of physical networks and multi-robot coordination that does multi-robot systems become pervasive, security becomes not rely on additional data beyond communication signals paramount. At the heart of many multi-robot coordination present in the system, or additional overhead such as key tasks are algorithms such as coverage or consensus which passing for authentication. However, to fully exploit the use are inherently vulnerable to adversarial action such as the of wireless signals for thwarting attacks on multi-robot sys- Sybil attack. In the Sybil attack, a single adversarial node tems we need new theory that exploits this latent information can “spoof” or generate a large number of spurious entities in the network to improve achievable consensus results. in the graph as a way of gaining a disproportionate influence Towards this end, the focus of the current paper is to in the network [1], [2]. In this way the Sybil attack can develop a theoretical framework for using observations of be detrimental to several critical multi-robot algorithms [3]. inter-agent wireless channels to secure consensus in the face Additionally, the dynamic and distributed nature of multi- of a Sybil attack and to characterize expected performance robot systems makes it particularly difficult to implement guarantees for this case. It is well known that in the presence traditional methods of security such as authentication and of uncooperative or adversarial nodes, the ability to achieve key passing [4], [5], making it even more challenging to consensus is severely impaired or lost [1]. Given a network secure these systems against a Sybil attack. Interestingly, the of agents that includes an unknown subset of spoofed nodes, physicality of these systems presents new opportunities for we wish to achieve convergence to a common consensus security. Recent developments in Wi-Fi characterization [6], value over the legitimate nodes that is irrespective of spoofed [7], [8] demonstrate the ability to extract information from node input to the system (see Figure1). The key insight of our approach is to design a switching signal that selectively 1 T. Wheeler and E.Bharathi (tswheel1, ignores or includes agents in a stochastic manner, according epoongod)@asu.edu, are with the REACT Lab, Arizona State University, Tempe, Arizona 85281 USA to an honesty metric [6], derived from multiple observations 2 S.Gil is the director of the REACT Lab and Assistant Professor of of their wireless channels (for each transmission in the net- Computer Science, Arizona State University, Tempe, Arizona 85281 USA work). Intuitively, this switching signal learns the legitimate sgil4 at asu.edu The authors gratefully acknowledge partial support from the Fulton network topology (one that excludes spoofed nodes) with an Undergraduate Research Initiative (FURI). error rate that decreases exponentially fast in the number of observations of the wireless channel. By deriving both the [26], [27], [28], [29], [30], [31] to derive a mathematical switching signal and a modified consensus algorithm, we framework for recovering average consensus in the case show that legitimate agents can achieve agreement and that of a Sybil attack. This work is different from data-based this agreement value can be forced arbitrarily close to the methods [10], [11] because it makes observations over the true average with high probability that is also characterized wireless network, allowing our algorithm to be largely in- in this paper. dependent of transmitted values. This is generalizable to This work improves upon existing work in adversarial a larger set of attacker behaviors including dynamically consensus [10], [11], [7] in several ways: i) Resilience is changing input values as shown in our simulation studies achieved irrespective of the values transmitted by the spoofed in the Simulation Section. nodes, ii) it does not assume knowledge of the number of III. PROBLEM spoofed nodes in the network, and iii) it is robust to different We consider the problem of distributed consensus for initial topology configurations. multi-agent systems where a subset of nodes in the graph Paper Contributions: The current paper provides the fol- are adversarial and attempt to disturb the consensus abil- lowing contributions: 1) derivation of a consensus algorithm ity of the network by inputting false values. Specifically, and switching signal for resilient consensus using wireless the multi-robot system can be described by a weighted, channel observations, 2) analysis demonstrating the con- undirected, state-dependent graph (t) = ( ; E(t)), where vergence properties of this algorithm, and 3) an extensive G V = f1;:::;Ng denotes the set of node indices for N robots simulation study demonstrating aggregate performance of V and : × × ! denotes the set of edge weights our algorithm for different initial topologies and static vs. W V V R+ R+ at time t such that w (t) = (i; j; t) for i; j 2 . The set time varying spoofed node inputs. ij W V E(t) = f(i; j)jwij(t) > 0g is called the set of undirected II. RELATED WORK edges of G. The set of neighbors of node i is denoted by Consensus is a critical algorithm for cooperative multi- Ni(t) = fj 2 V :(i; j) 2 E(t)g where agent i 2 V has value agent decision making and control. Traditional assumptions denoted by xi(t) 2 R. Note that we assume undirected edges of cooperation and trust within the network leave consensus and symmetric neighborhoods such that if j 2 Ni(t) then algorithms inherently vulnerable to adversarial attacks. The i 2 Nj(t). Furthermore, the algebraic connectivity of a graph Sybil attack is one such classic example. Cryptographic and G is the second smallest eigenvalue of the Laplacian matrix key passing schemes are one common approach to securing of the graph and is denoted λ2(G). It is well known that a multi-agent consensus [4], [5], [12]. These schemes provide positive algebraic connectivity, λ2(G) > 0, is possible if and excellent security for typical networks but require compu- only if the graph G is connected [32]. We consider the case tational and communication overhead and trust in a central where a subset of nodes with indices denoted by S, S ⊂ V, authority. Alternatively, data-based methods for resilient con- are spoofed, such that nS = jSj is assumed to be unknown. sensus can be characterized by analyzing transmitted values Nodes in the set L ≡ VnS are not spoofed, which we denote to deduce the malicious nature of the agents, leaving them as legitimate. As a result, N = nL+nS , where nL = jLj. We vulnerable to sophisticated attackers that may intentionally denote by GS = (VS ; ES ) the subgraph induced by S, where manipulate their values to avoid detection. Research in VS = S and ES = f(i; j)ji 2 S or j 2 Sg. Similarly, we Mean Sub-sequence Reduced (MSR) [13], [14], [15] focus denote by GL = (VL; EL) the subgraph induced by L, where on transmitted values in order to remove adversarial agent VL = L and EL = f(i; j)ji; j 2 Lg. Thus G = GS [ GL. influence from the consensus. A. Threat Model Methods relying on the physics of the communication Our threat model considers one or more adversarial agents signals themselves offer an interesting alternative to data- with one omnidirectional Wi-Fi antenna each. Adversarial based methods. Mobile robot systems often communicate agents perform the “Sybil Attack” to inject packets emulating over wireless radio signals and it has been shown that nS non-existent clients according to the following definition: useful information can be extracted from these signals [16], [17]. Traditionally, these types of approaches would require Definition III.1 (Sybil Attack). An adversary in the network expensive hardware, like multi-antenna arrays, that cannot be can control the values of one or more “spoofed” nodes in the mounted on small robotic platforms.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    7 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us