Blockchain Can Secure Autonomous Systems

A future  robotic system integrated into a public infrastructure system, connected self-driving cars, for example, could cause lethal problems for the entire system if even one component were to be hacked. This would lead to a ripple  effect throughout the system, providing an opportunity for ransomware attacks.

Now researchers have developed a method that uses blockchain technology to improve the capacity for secure communication for robots. 

The use of blockchain technology as a communication tool for a team of robots could provide security and safeguard against deception, according to a study by researchers at MIT and Polytechnic University of Madrid. 
The research may also have applications in cities where multi-robot systems of self-driving cars are delivering goods and moving people across town.

Blockchain technology, with transaction-based communications could be applied to guarantee that teams of robots accomplish their objectives even in a situation where some of the robots are hacked.

A blockchain provides a tamper-proof record of all transactions, in this case, the messages issued by robot team leaders, so follower robots can ultimately detect discrepancies in the information trail. For example, a team of autonomous drones equipped with advanced sensing equipment is on a mission searching for smoke. Once they spot a wildfire, the leader robots relay directions to a swarm of firefighting drones that speed to the site of the blaze. But if one or more leader robots were hacked by a malicious agent and began sending incorrect directions then blockchain offers a tamper-proof record of all transactions, in this case, the messages issued by robot team leaders, so follower robots can eventually identify inconsistencies in the information trail.

While a blockchain is typically used as a secure ledger for crypto-currencies, in its essence it is a list of data structures, known as blocks, that are connected in a chain. 

In this simulation-based study, the information stored in each block is a set of directions from a leader robot to followers. If a malicious robot attempts to alter the content of a block, it will change the block hash, so the altered block will no longer be connected to the chain. The altered directions could be easily ignored by follower robots.

As the blockchain also provides a permanent record of all transactions. Since all followers can eventually see all the directions issued by leader robots, they can see if they have been misled.

MIT:     IMDEA:     I-HLS:     Business Telegraph:     Innovation News Network:      CarBuzz:    DroneDJ:

You Might Also Read: 

Smart Cities Will Soon Be Under Attack:

 

« Google Creates Its Cyber Security Action Team
Israeli Hospital Attacked With Ransomware »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

IP Performance

IP Performance

IP Performance Limited is a leading supplier of customised network infrastructure and security solutions.

ThaiCERT

ThaiCERT

ThaiCERT is the national Computer Security Incident Response Team (CSIRT) for Thailand.

BPC Banking Technologies

BPC Banking Technologies

BPC’s advanced fraud prevention solution helps card issuers and acquirers combat the growing threat by monitoring 100% of transactions, online, in real-time across all channels.

ClearDATA

ClearDATA

The ClearDATA Managed Cloud protects sensitive healthcare data using purpose-built DevOps automation, compliance and security safeguards, and healthcare expertise.

MonsterCloud

MonsterCloud

MonsterCloud is a leader in managed cyber security services. Our cyber security team constantly monitors and protects businesses from cyber threats.

Cybersixgill

Cybersixgill

Cybersixgill was founded with a single mission: to protect organizations against malicious cyber attacks that come from the deep and dark web, before they materialize.

CSL Group

CSL Group

CSL solutions provide complete end-to-end connectivity services for Security, Fire, Telecare and other mission critical M2M/IoT applications.

DefCamp

DefCamp

DefCamp is the most important annual conference on Hacking & Information Security in Central Eastern Europe.

Austrian Trust Circle

Austrian Trust Circle

Austrian Trust Circle is an initiative of CERT.at and the Austrian Federal Chancellery and consists of Security Information Exchanges in the areas of the strategic information infrastructure.

Tempest

Tempest

TEMPEST is a leading provider of IT products and services including solutions for network and application security.

Cask Government Services

Cask Government Services

Cask Government Services focuses on program management, cybersecurity, logistics, business analysis and engineering services for Federal, State and Local Government.

Leadcomm

Leadcomm

Leadcomm is a Brazilian company focused on the distribution and integration of IT systems and security solutions for large companies.

Expel

Expel

Expel provide transparent managed security services, 24x7 detection, response and resilience.

Raiven Capital

Raiven Capital

Raiven Capital is a global early-stage technology venture capital fund. We focus on founder-led, driven companies on the leading edge of disruption.

risk3sixty

risk3sixty

Risk3sixty are information and cyber risk management craftsmen helping build business-first security and compliance programs.

Eficens Systems

Eficens Systems

Eficens Systems is a global IT services and consulting company. We specialize in empowering businesses to harness the potential of Information Technology as a strategic asset.