
Blockchain tech promises secure communications for robot teams
The use of multiple robots – rather than a single robot – working in a coordinated way has several advantages in a diverse range of applications, and interest in such multirobot systems is rising rapidly both in academia and in industry. However, say the researchers, few studies have focused on operations in which hacked robots can behave maliciously and alter the outcome of the collective mission.
In their work, the researchers presented a set of Byzantine Follow The Leader (BFTL) problems, in which a subset of robots in the system shows unintended or inconsistent behavior (i.e., Byzantine robots). In the BFTL problems, leaders discover routes from their starting positions to specific destinations and guide the followers, while Byzantine robots try to hinder the leaders and mislead the followers.
In their research, blockchain technology was used as a communication tool within multirobot systems, for leaders to broadcast directions to the whole group. A blockchain offers a tamper-proof record of all transactions – in this case, the messages issued by robot team leaders – so follower robots can eventually identify inconsistencies in the information trail.
Leaders use tokens to signal movements and add transactions to the chain, and forfeit their tokens when they are caught in a lie, so this transaction-based communications system limits the number of lies a hacked robot could spread, say the researchers.
“The world of blockchain beyond the discourse about cryptocurrency has many things under the hood that can create new ways of understanding security protocols,” says Eduardo Castelló, a Marie Curie Fellow in the MIT Media Lab and lead author of a paper on the research.
While a blockchain is typically used as a secure ledger for cryptocurrencies, in its essence it is a list of data structures – known as blocks – that are connected in a chain. Each block contains information it is meant to store, the “hash” of the information in the block, and the “hash” of the previous block in the chain. Hashing is the process of converting a string of text into a series of unique numbers and letters.
In the researchers’ simulation-based study, the information stored in each block is a set of directions from a leader robot to followers. If a malicious robot attempts to alter the content of a block, it will change the block hash, so the altered block will no longer be connected to the chain. The altered directions could be easily ignored by follower robots.
The blockchain also provides a permanent record of all transactions. Since all followers can eventually see all the directions issued by leader robots, they can see if they have been misled.
In the simulated system, each leader receives a fixed number of tokens that are used to add transactions to the chain – one token is needed to add a transaction. If followers determine the information in a block is false, by checking what the majority of leader robots signaled at that particular step, the leader loses the token. Once a robot is out of tokens it can no longer send messages.
“We envisioned a system in which lying costs money. When the malicious robots run out of tokens, they can no longer spread lies,” says Castelló. “So, you can limit or constrain the lies that the system can expose the robots to.”
The researchers tested their system by simulating several follow-the-leader situations where the number of malicious robots was known or unknown. Using a blockchain, leaders sent directions to follower robots that moved across a Cartesian plane, while malicious leaders broadcast incorrect directions or attempted to block the path of follower robots.
The researchers found that, even when follower robots were initially misled by malicious leaders, the transaction-based system enabled all followers to eventually reach their destination. And because each leader has an equal, finite number of tokens, the researchers developed algorithms to determine the maximum number of lies a malicious robot can tell.
“Since we know how lies can impact the system, and the maximum harm that a malicious robot can cause in the system, we can calculate the maximum bound of how misled the swarm could be,” says Castelló. “So, we could say, if you have robots with a certain amount of battery life, it doesn’t really matter who hacks the system, the robots will have enough battery to reach their goal.”
In addition to allowing a system designer to estimate the battery life needed by the robots to complete their task, the algorithms also enable the user to determine the amount of memory required to store the blockchain, the number of robots that will be needed, and the length of the path they can travel, even if a certain percentage of leader robots are hacked and become malicious.
“You can design your system with these tradeoffs in mind and make more informed decisions about what you want to do with the system you are going to deploy,” says Castelló.
Looking ahead, the researchers say they hope to build off this work to create new security systems for robots using transaction-based interactions, and see it as a way to build trust between humans and groups of robots. The research may also have applications in cities where multirobot systems of self-driving cars are delivering goods and moving people across town.
“When you turn these robot systems into public robot infrastructure,” says Castelló, “you expose them to malicious actors and failures. These techniques are useful to be able to validate, audit, and understand that the system is not going to go rogue. Even if certain members of the system are hacked, it is not going to make the infrastructure collapse.”
For more, see “Following Leaders in Byzantine Multirobot Systems by Using Blockchain Technology.”
Related articles:
Self-evolutional AI robot dog leverages networked intelligence
Blockchain challenge looks for smart mobility solutions
Drone fleet can search under dense forests without GPS
Swarm intelligence for autonomous intralogistics vehicles
Blockchain-based satellite network a step closer to reality
