Protocol for the delegated authentication of new agents when the number of agents is scaling in swarming robot systems

Authors

DOI:

https://doi.org/10.17308/sait/1995-5499/2022/4/23-38

Keywords:

swarm robotic systems, information security, introduction of malicious agents, authentication, zero-knowledge proof

Abstract

The intensive development of group robotics, including swarm robotic systems (SRS), actualizes the issues of information security. Known approaches to agent authentication of swarm robotic systems do not take into account the scalability properties of the system, which contributes to the «avalanche effect» with a significant number of agents used. The purpose of this work is to increase the efficiency of performing such tasks by SRS agents, which require an increase in the concentration of agents, by taking into account the time required to authenticate new agents. In accordance with the task set, the task of extending the protocol for delegated authentication of new agents while scaling the coverage of SRS agents based on Feige — Fiat — Shamir identification scheme with zero knowledge has been developed. An element of scientific innovation is an impressive set of production rules presented in image selections that allow the use of agent information exchange algorithms using a distributed registry of delegated authentication protocols for agents that have previously successfully passed this test. The specific features of the presented approach include solutions to use any basic authentication protocol determined by the hardware distribution of the computing platform of robotic devices that are part of the SRS. Also agents have ability to «switch» between the highest priority tasks and, in interaction with other agents of painless authentication, in the search area for identified at least one neighbor agent. The presented protocol is implemented in the form of software in the Python programmingcontrol systems.

Author Biographies

  • Andrey S. Pavlov, Institute of Digital Development, North-Caucasus Federal University

    Senior Lecturer, Department of Computer Security, Institute of Digital Development, North-Caucasus Federal University

  • Nikolay Yu. Svistunov, Institute of Digital Development of the North-Caucasus Federal University

    Assistant of the Department of Computer Security of the Institute of Digital Development of the North-Caucasus Federal University

  • Vyacheslav I. Petrenko, Institute of Digital Development of the North-Caucasus Federal University

    Candidate of Technical Sciences, Associate Professor, Head of the Department of Organization and Technology of Information Protection, Institute of Digital Development of the North-Caucasus Federal University

  • Fariza B. Tebueva, Institute for Digital Development, North-Caucasus Federal University

    Doctor of Physical and Mathematical Sciences, Associate Professor, Head of the Department of Computer Security, Institute for Digital Development, North-Caucasus Federal University

  • Vladimir V. Kopytov, Institute for Digital Development of the North-Caucasus Federal University

    Doctor of Technical Sciences, Professor, Professor of the Basic Department «Infocom-S» of the Institute for Digital Development of the North-Caucasus Federal University

  • Evgeniy N. Tishchenko, Rostov State University of Economics (RINH)

    д-р экон. наук, профессор, декан факультета компьютерных технологий и информационной безопасности Ростовского государственного экономического университета (РИНХ)

References

Downloads

Published

2022-12-26

Issue

Section

Information Security

How to Cite

Protocol for the delegated authentication of new agents when the number of agents is scaling in swarming robot systems. (2022). Proceedings of Voronezh State University. Series: Systems Analysis and Information Technologies, 4, 23-38. https://doi.org/10.17308/sait/1995-5499/2022/4/23-38

Most read articles by the same author(s)