Blockchain Can Secure Autonomous Systems

A future  robotic system integrated into a public infrastructure system, connected self-driving cars, for example, could cause lethal problems for the entire system if even one component were to be hacked. This would lead to a ripple  effect throughout the system, providing an opportunity for ransomware attacks.

Now researchers have developed a method that uses blockchain technology to improve the capacity for secure communication for robots. 

The use of blockchain technology as a communication tool for a team of robots could provide security and safeguard against deception, according to a study by researchers at MIT and Polytechnic University of Madrid. 
The research may also have applications in cities where multi-robot systems of self-driving cars are delivering goods and moving people across town.

Blockchain technology, with transaction-based communications could be applied to guarantee that teams of robots accomplish their objectives even in a situation where some of the robots are hacked.

A blockchain provides a tamper-proof record of all transactions, in this case, the messages issued by robot team leaders, so follower robots can ultimately detect discrepancies in the information trail. For example, a team of autonomous drones equipped with advanced sensing equipment is on a mission searching for smoke. Once they spot a wildfire, the leader robots relay directions to a swarm of firefighting drones that speed to the site of the blaze. But if one or more leader robots were hacked by a malicious agent and began sending incorrect directions then blockchain offers a tamper-proof record of all transactions, in this case, the messages issued by robot team leaders, so follower robots can eventually identify inconsistencies in the information trail.

While a blockchain is typically used as a secure ledger for crypto-currencies, in its essence it is a list of data structures, known as blocks, that are connected in a chain. 

In this simulation-based study, the information stored in each block is a set of directions from a leader robot to followers. If a malicious robot attempts to alter the content of a block, it will change the block hash, so the altered block will no longer be connected to the chain. The altered directions could be easily ignored by follower robots.

As the blockchain also provides a permanent record of all transactions. Since all followers can eventually see all the directions issued by leader robots, they can see if they have been misled.

MIT:     IMDEA:     I-HLS:     Business Telegraph:     Innovation News Network:      CarBuzz:    DroneDJ:

You Might Also Read: 

Smart Cities Will Soon Be Under Attack:

 

« Google Creates Its Cyber Security Action Team
Israeli Hospital Attacked With Ransomware »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

UK Cyber Week Expo & Conference

UK Cyber Week Expo & Conference

Award-winning event organiser ROAR B2B announces the launch of UK Cyber Week and its inaugural event on 4 and 5 April 2023 at the Business Design Centre, London.

Yokogawa Electric

Yokogawa Electric

Yokogawa is an electrical engineering company providing measurement, control, and information technologies including industrial cyber security.

SIGA

SIGA

SIGA provides cyber security solutions for Industrial Control Systems SCADA systems used in critical infrastructures and industrial processes.

Matias Consulting Group (MCG)

Matias Consulting Group (MCG)

Your Business needs competitive and resilient ICT solutions. MCG defines, deploy & support them enabling you to focus on your core business.

Sopher Networks

Sopher Networks

Sopher is a secure communication and collaboration platform for business and personal use.

Open Connectivity Foundation (OCF)

Open Connectivity Foundation (OCF)

OCF is dedicated to ensuring secure interoperability ensuring secure interoperability of IoT for consumers, businesses and industries.

Visium Technologies

Visium Technologies

Visium Analytics provides innovative data visualization, cybersecurity technologies and solutions to businesses to protect and secure their data assets.

HacWare

HacWare

HacWare is a data driven cybersecurity awareness product that leverages machine learning and behavior analytics help IT professionals combat phishing.

Cyber Security Advisor

Cyber Security Advisor

Notice how sophisticated the cybersecurity market is. Think how would you pick the security provider, assess your company, and be sure of your security decisions? Cyber Security Advisor is the answer!

AirITSystems

AirITSystems

AirITSystems offer companies comprehensive IT security solutions that take all security considerations into account and are tailored to your business.

Avisa Partners

Avisa Partners

Avisa Partners is an economic intelligence, global advocacy and cybersecurity firm.

Suridata

Suridata

Suridata is committed to helping enterprises secure their valuable data, with automation, accuracy and simplicity.

Zeva

Zeva

Zeva solves complex identity and encryption challenges for the federal government and corporations around the globe.

Regtank Technology

Regtank Technology

Regtank is a one-stop compliance solution for fintechs, navigating compliance, security and risk management.

J.S. Held

J.S. Held

J.S. Held is a global consulting firm providing technical, scientific, and financial expertise across all assets and value at risk.

European Union Agency for Network and Information Security (ENISA)

European Union Agency for Network and Information Security (ENISA)

The European Union Agency for Cybersecurity, ENISA, is the Union’s agency dedicated to achieving a high common level of cybersecurity across Europe.

CentriVault

CentriVault

CentriVault is a leading independent provider of Cyber Security and Data protection services to small and medium enterprises (SMEs).