Blockchain Can Secure Autonomous Systems

A future  robotic system integrated into a public infrastructure system, connected self-driving cars, for example, could cause lethal problems for the entire system if even one component were to be hacked. This would lead to a ripple  effect throughout the system, providing an opportunity for ransomware attacks.

Now researchers have developed a method that uses blockchain technology to improve the capacity for secure communication for robots. 

The use of blockchain technology as a communication tool for a team of robots could provide security and safeguard against deception, according to a study by researchers at MIT and Polytechnic University of Madrid. 
The research may also have applications in cities where multi-robot systems of self-driving cars are delivering goods and moving people across town.

Blockchain technology, with transaction-based communications could be applied to guarantee that teams of robots accomplish their objectives even in a situation where some of the robots are hacked.

A blockchain provides a tamper-proof record of all transactions, in this case, the messages issued by robot team leaders, so follower robots can ultimately detect discrepancies in the information trail. For example, a team of autonomous drones equipped with advanced sensing equipment is on a mission searching for smoke. Once they spot a wildfire, the leader robots relay directions to a swarm of firefighting drones that speed to the site of the blaze. But if one or more leader robots were hacked by a malicious agent and began sending incorrect directions then blockchain offers a tamper-proof record of all transactions, in this case, the messages issued by robot team leaders, so follower robots can eventually identify inconsistencies in the information trail.

While a blockchain is typically used as a secure ledger for crypto-currencies, in its essence it is a list of data structures, known as blocks, that are connected in a chain. 

In this simulation-based study, the information stored in each block is a set of directions from a leader robot to followers. If a malicious robot attempts to alter the content of a block, it will change the block hash, so the altered block will no longer be connected to the chain. The altered directions could be easily ignored by follower robots.

As the blockchain also provides a permanent record of all transactions. Since all followers can eventually see all the directions issued by leader robots, they can see if they have been misled.

MIT:     IMDEA:     I-HLS:     Business Telegraph:     Innovation News Network:      CarBuzz:    DroneDJ:

You Might Also Read: 

Smart Cities Will Soon Be Under Attack:

 

« Google Creates Its Cyber Security Action Team
Israeli Hospital Attacked With Ransomware »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Cyber Defense Media Group (CDMG)

Cyber Defense Media Group (CDMG)

CDMG is the leading global media group for all things cyber defense.

PeCERT

PeCERT

PeCERT is the national Computer Emergency Response Team for Peru.

PrivateCore

PrivateCore

We protect data-in-use from hackers trying to steal data such as encryption keys, certificates, intellectual property.

Gita Technologies

Gita Technologies

Gita Technologies works to create integrated solutions to the thorniest problems in the field of intelligence and cyber today.

ST Engineering

ST Engineering

ST Engineering is a leading provider of trusted and innovative cybersecurity solutions.

Ascend Technologies

Ascend Technologies

Ascend Technologies offers a full suite of managed IT services including: Cloud & Infrastructure Management, Cybersecurity Management, Service Desk Management, Application Management , Data Management

Datacentrix

Datacentrix

Datacentrix provides end-to-end cybersecurity services for the operational technology (OT) and IT environments to monitor, assess and defend our customers' information assets.

Traced

Traced

At Traced, our aim is to redefine mobile cyber security to provide the best possible protection to everyone against breaches of privacy and security.

usecure

usecure

usecure is a global provider of computer-based cyber security awareness training, offering the market’s most time-efficient, cost-effective and admin-lite solution for reducing insider threats.

NightDragon

NightDragon

NightDragon is a venture capital firm investing in innovative growth and late stage companies within the cybersecurity, safety, security, and privacy industry.

Wavex Technology

Wavex Technology

Wavex Technology is an award winning IT Services firm offering clients a secure and fully managed IT service.

IN4 Group

IN4 Group

IN4 Group is a skills, innovation and start-up services provider that specialises in supporting businesses with the training, communities, networks and advice they need to scale.

Artifice Security

Artifice Security

Artifice Security will demonstrate real-world attacks on your network, web applications, infrastructure, and personnel to expose your hidden security risks.

PROW Information Technology

PROW Information Technology

PROW is at the forefront of the technology and digital revolution with a focus and mastery in the cybersecurity, information security and data management realms.

Secora Consulting

Secora Consulting

Secora Consulting is a professional services company specialising in tailored cybersecurity assessments and cyber advisory services.

Arelion

Arelion

Arelion is a leading light in global connectivity and we've been keeping the world connected for nearly three decades.

Blue Bastion

Blue Bastion

Don’t give cybercriminals the chance to find weaknesses in your company’s cyber security system. Defend your institution from all attacks from all directions with Blue Bastion.