a team of robots collaborating to search for and then retrieve lost objects.
This image shows a team of robots collaborating to search for and then retrieve lost objects. The use of blockchain technology could enable secure, tamper-proof communication among the robots as they complete their task, according to new research from MIT.
Source: Massachusetts Institute of Technology

Blockchain could provide secure communications for robots

The use of blockchain technology as a communication tool for a team of robots could provide security and safeguard against deception.

Imagine a team of autonomous drones equipped with advanced sensing equipment, searching for smoke as they fly high above the Sierra Nevada mountains. Once they spot a wildfire, these leader robots relay directions to a swarm of firefighting drones that speed to the site of the blaze.

But what would happen if one or more leader robots was hacked by a malicious agent and began sending incorrect directions? As follower robots are led farther from the fire, how would they know they had been duped?

The use of blockchain technology as a communication tool for a team of robots could provide security and safeguard against deception, according to a study by researchers at MIT and Polytechnic University of Madrid. The research may also have applications in cities where multirobot systems of self-driving cars are delivering goods and moving people across town.

A blockchain offers a tamper-proof record of all transactions—in this case, the messages issued by robot team leaders—so follower robots can eventually identify inconsistencies in the information trail.

Leaders use tokens to signal movements and add transactions to the chain, and forfeit their tokens when they are caught in a lie, so this transaction-based communications system limits the number of lies a hacked robot could spread, according to Eduardo Castelló, a Marie Curie Fellow in the MIT Media Lab and lead author of the paper.

"The world of blockchain beyond the discourse about cryptocurrency has many things under the hood that can create new ways of understanding security protocols," Castelló says.

Not just for Bitcoin

While a blockchain is typically used as a secure ledger for cryptocurrencies, in its essence it is a list of data structures, known as blocks, that are connected in a chain. Each block contains information it is meant to store, the "hash" of the information in the block, and the "hash" of the previous block in the chain. Hashing is the process of converting a string of text into a series of unique numbers and letters.

In this simulation-based study, the information stored in each block is a set of directions from a leader robot to followers. If a malicious robot attempts to alter the content of a block, it will change the block hash, so the altered block will no longer be connected to the chain. The altered directions could be easily ignored by follower robots.

The blockchain also provides a permanent record of all transactions. Since all followers can eventually see all the directions issued by leader robots, they can see if they have been misled.

For instance, if five leaders send messages telling followers to move north, and one leader sends a message telling followers to move west, the followers could ignore that inconsistent direction. Even if a follower robot did move west by mistake, the misled robot would eventually realize the error when it compares its moves to the transactions stored in the blockchain.

Transaction-based communication

In the system the researchers designed, each leader receives a fixed number of tokens that are used to add transactions to the chain—one token is needed to add a transaction. If followers determine the information in a block is false, by checking what the majority of leader robots signaled at that particular step, the leader loses the token. Once a robot is out of tokens it can no longer send messages.

"We envisioned a system in which lying costs money. When the malicious robots run out of tokens, they can no longer spread lies. So, you can limit or constrain the lies that the system can expose the robots to," Castelló says.

The researchers tested their system by simulating several follow-the-leader situations where the number of malicious robots was known or unknown. Using a blockchain, leaders sent directions to follower robots that moved across a Cartesian plane, while malicious leaders broadcast incorrect directions or attempted to block the path of follower robots.

The researchers found that, even when follower robots were initially misled by malicious leaders, the transaction-based system enabled all followers to eventually reach their destination. And because each leader has an equal, finite number of tokens, the researchers developed algorithms to determine the maximum number of lies a malicious robot can tell.

"Since we know how lies can impact the system, and the maximum harm that a malicious robot can cause in the system, we can calculate the maximum bound of how misled the swarm could be. So, we could say, if you have robots with a certain amount of battery life, it doesn't really matter who hacks the system, the robots will have enough battery to reach their goal," Castelló says.

In addition to allowing a system designer to estimate the battery life the robots need to complete their task, the algorithms also enable the user to determine the amount of memory required to store the blockchain, the number of robots that will be needed, and the length of the path they can travel, even if a certain percentage of leader robots are hacked and become malicious.

"You can design your system with these tradeoffs in mind and make more informed decisions about what you want to do with the system you are going to deploy," he says.

In the future, Castelló hopes to build off this work to create new security systems for robots using transaction-based interactions. He sees it as a way to build trust between humans and groups of robots.

"When you turn these robot systems into public robot infrastructure, you expose them to malicious actors and failures. These techniques are useful to be able to validate, audit, and understand that the system is not going to go rogue. Even if certain members of the system are hacked, it is not going to make the infrastructure collapse," he says.

The research was published in IEEE Transactions on Robotics.

Subscribe to our newsletter

Related articles

A cryptography game changer for biomedical research

A cryptography game changer for biomedical research

Data privacy and security concerns hamper large-scale studies. Researchers have developed a potential solution.

Expanding human-robot collaboration in manufacturing

Expanding human-robot collaboration in manufacturing

To enhance human-robot collaboration, researchers at Loughborough University have trained an AI to detect human intention.

A lifesaving drone for beach rescue teams

A lifesaving drone for beach rescue teams

A student from the Loughborough University has designed "SERVITA'- a small, compact drone for individuals who are in aquatic distress.

Simulator helps robots sharpen their cutting skills

Simulator helps robots sharpen their cutting skills

A simulation engine predicts the forces acting on a knife as it cuts through soft materials, a capability that could have applications for safer surgical robotics.

A contact aware robot design

A contact aware robot design

Researchers have developed a new method to computationally optimize the shape and control of a robotic manipulator for a specific task.

Using drones to elicit emotional responses

Using drones to elicit emotional responses

Researchers have conducted the first studies examining how people respond to various emotional facial expressions depicted on a drone.

How blockchain can help the homeless

How blockchain can help the homeless

Researchers say new technology solutions such as blockchain can be used to keep important health care information of homeless people secure and portable.

A Lego system for building robots

A Lego system for building robots

Scientists have developed a system with which they can fabricate miniature robots building block by building block, which function exactly as required.

Xenobots 2.0: The next generation of living robots

Xenobots 2.0: The next generation of living robots

Researchers have created life forms that self-assemble a body from single cells and do not require muscle cells to move. They're faster, live longer, and can now record information.

Popular articles

Photo

The “RoboWig” untangle your hair

Nurses typically spend 18 to 40 percent of their time performing direct patient care tasks, oftentimes for many patients and with little time to spare. Personal care robots that brush your hair could provide substantial help and relief.

Subscribe to Newsletter