Jam Mitigation for Autonomous Convoys via Behavior-Based Robotics
Abstract
:1. Introduction
- This paper develops control-oriented countermeasures against jamming attacks on autonomous vehicle convoys that are independent of traditional radio anti-jamming techniques. This allows for layers of protection against jamming at both the network and convoy controller level, improving the robustness and performance of an overall convoy system when confronted with jamming.
- This paper creates an architecture for behavior-based robotics that is uniquely integrated with the Robot Operating System (ROS) framework. This architecture combined a Motor Schema behavior-based robotics with the ROS navigation stack to a depth that had not previously been seen, paving the path for the greater ROS community to leverage behavior-based robotic architectures.
- The jamming-proof motion planning in this paper improves upon the basic Motor Schema approach by integrating it with vector field histogram motion planning, allowing us to avoid the pitfalls of potential field motion planning.
2. Background
2.1. Autonomous Ground Vehicle Convoys
2.2. Jammers
2.3. Behavior-Based Robotics
3. Materials and Methods
3.1. Tools
3.2. Attacker Model
- lat, long—latitudinal and longitudinal coordinates for the center of the jammer;
- rJ—radius of the jamming area, centered at lat, long;
- type of jammer;
- tJ—jamming time for random jammer;
- tS—sleep time for random jammer.
3.3. Behavior Manager
3.3.1. Behavioral Costmaps
3.3.2. Behaviors
Move-to-Goal
Maintain-Formation
Algorithm 1 Maintain-Formation |
1: if no B received from leader |
2: Ci = center of mass of clusters 1, …, n from DBSCAN(costmap) |
3: temp_distance = high value placeholder |
4: for i = 1, …, n |
5: cluster_distance = distance between T and Ci |
6: if cluster_distance < temp_distance |
7: T = Ci |
8: temp_distance = cluster_distance |
9: end if |
10: next i |
11: end if |
Avoid-Obstacle-Proximity
Avoid-Leader-Zone
3.3.3. Assemblages
3.3.4. Path Planning
3.4. Experimental Setup
4. Results
5. Discussion
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Murphy, T.J. Convoy Operations in Afghanistan Handbook; U. S. Army Combined Arms Center: Fort Leavenworth, KS, USA, 2010. [Google Scholar]
- Cheung, C.; Mohammadi, A.; Rawashdeh, S.; Baek, S. Delivery of Healthcare Resources Using Autonomous Ground Vehicle Convoy Systems: An Overview. Front. Robot. AI 2021, 8, 250. [Google Scholar] [CrossRef]
- Nahavandi, S.; Mohamed, S.; Hossain, I.; Nahavandi, D.; Salaken, S.M.; Rokonuzzaman, M.; Ayoub, R.; Smith, R. Autonomous Convoying: A Survey on Current Research and Development. IEEE Access 2022, 10, 13663–13683. [Google Scholar] [CrossRef]
- McKay, S.; Boyer, M.E.; Beyene, N.M. Automating Army Convoys: Technical and Tactical Risks and Opportunities; RAND: Santa Monica, CA, USA, 2020. [Google Scholar]
- Llatser, I.; Festag, A.; Fettweis, G. Vehicular Communication Performance in Convoys of Automated Vehicles. In Proceedings of the 2016 IEEE International Conference on Communications (ICC), Kuala Lumpur, Malaysia, 22–27 May 2016. [Google Scholar]
- Lopes, H.J.; Lima, D.A. Cellular Automata in path planning navigation control applied in surveillance task using the e-Puck architecture. In Proceedings of the 2020 IEEE International Conference on Systems, Man, and Cybernetics (SMC), Toronto, ON, Canada, 11–14 October 2020. [Google Scholar]
- van der Heijden, R.; Lukaseder, T.; Kargl, F. Analyzing Attacks on Cooperative Adaptive Cruise Control (CACC). In Proceedings of the 2017 IEEE Vehicular Networking Conference (VNC), Turin, Italy, 27–29 November 2017. [Google Scholar]
- Malebary, S. Real-Time Jamming Detection in Vehicular Network. Int. J. Sci. Res. Innov. Technol. 2016, 3, 159–166. [Google Scholar]
- Sciancalepore, S.; Di Pietro, R. Bittransfer: Mitigating Reactive Jamming in Electronic Warfare Scenarios. IEEE Access 2019, 7, 156175–156190. [Google Scholar] [CrossRef]
- Xu, W.; Trappe, W.; Zhang, Y.; Wood, T. The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks. In Proceedings of the 6th ACM International Symposium on Mobile ad Hoc Networking and Computing-MobiHoc ‘05, Champaign, IL, USA, 25–27 May 2005. [Google Scholar]
- Alturkostani, H.; Chitrakar, A.; Rinker, R.; Krings, A. On the Design of Jamming-Aware Safety Applications in VANETs. In Proceedings of the 10th Annual Cyber and Information Security Research Conference, Oak Ridge, TN, USA, 7–9 April 2015. [Google Scholar]
- Serageldin, A.; Alturkostani, H.; Krings, A. On the Reliability of DSRC Safety Applications: A Case of Jamming. In Proceedings of the 2013 International Conference on Connected Vehicles and Expo (ICCVE), Las Vegas, NV, USA, 2–6 December 2013. [Google Scholar]
- Serageldin, A.; Krings, A. The Impact of Dissimilarity and Redundancy on the Reliability of DSRC Safety Applications. In Proceedings of the 2014 28th International Conference on Advanced Information Networking and Applications Workshops, Victoria, BC, Canada, 13–16 May 2014. [Google Scholar]
- Hu, Y.; Shan, H.; Dutta, R.G.; Jin, Y. Protecting Platoons from Stealthy Jamming Attack. In Proceedings of the 2020 Asian Hardware Oriented Security and Trust Symposium (AsianHOST), Kolkata, India, 15–17 December 2020. [Google Scholar]
- Gong, T.; Yu, Y.; Song, J. Path Planning for Multiple Unmanned Vehicles (Muvs) Formation Shape Generation Based on Dual RRT Optimization. Actuators 2022, 11, 190. [Google Scholar] [CrossRef]
- Yunhe, L.; Bo, L.; Xiaowei, N. Research on Self-Organizing Behavior-Based UAV Formation Based on Distributed Control. In Proceedings of the 3rd International Conference on Vision, Image and Signal Processing, Vancouver, BC, Canada, 26–28 August 2019. [Google Scholar]
- Jond, H.B.; Sadreddini, Z.; Platoš, J. Autonomous Vehicle Convoy Formation Control with Size/Shape Switching for Automated Highways. Int. J. Eng. 2020, 33, 2174–2180. [Google Scholar]
- Balch, T.; Arkin, R.C. Behavior-Based Formation Control for Multirobot Teams. IEEE Trans. Robot. Autom. 1998, 14, 926–939. [Google Scholar] [CrossRef]
- Lee, G.; Chwa, D. Decentralized Behavior-Based Formation Control of Multiple Robots Considering Obstacle Avoidance. Intell. Serv. Robot. 2017, 11, 127–138. [Google Scholar] [CrossRef]
- Pierpaoli, P.; Li, A.; Srinivasan, M.; Cai, X.; Coogan, S.; Egerstedt, M. A Sequential Composition Framework for Coordinating Multirobot Behaviors. IEEE Trans. Robot. 2021, 37, 864–876. [Google Scholar] [CrossRef]
- Zheng, Y.; Eben Li, S.; Wang, J.; Cao, D.; Li, K. Stability and Scalability of Homogeneous Vehicular Platoon: Study on the Influence of Information Flow Topologies. IEEE Trans. Intell. Transp. Syst. 2016, 17, 14–26. [Google Scholar] [CrossRef]
- Pelechrinis, K.; Iliofotou, M.; Krishnamurthy, S.V. Denial of Service Attacks in Wireless Networks: The Case of Jammers. IEEE Commun. Surv. Tutor. 2011, 13, 245–257. [Google Scholar] [CrossRef]
- Van Veen, B.D.; Buckley, K.M. Beamforming: A Versatile Approach to Spatial Filtering. IEEE ASSP Mag. 1988, 5, 4–24. [Google Scholar] [CrossRef]
- Luo, G.Y. On-Line Wavelet Filtering of Narrowband Noise in Signal Detection of Spread Spectrum System for Location Tracking. Int. J. Commun. Syst. 2011, 25, 598–615. [Google Scholar] [CrossRef]
- Popper, C.; Strasser, M.; Capkun, S. Anti-Jamming Broadcast Communication Using Uncoordinated Spread Spectrum Techniques. IEEE J. Sel. Areas Commun. 2010, 28, 703–715. [Google Scholar] [CrossRef]
- Poisel, R. Modern Communications Jamming Principles and Techniques; Artech House: Boston, MA, USA, 2011. [Google Scholar]
- Liu, Y.; Ning, P. Bittrickle: Defending against Broadband and High-Power Reactive Jamming Attacks. In Proceedings of the 2012 Proceedings IEEE INFOCOM, Orlando, FL, USA, 25–30 March 2012. [Google Scholar]
- Xuan, Y.; Shen, Y.; Nguyen, N.P.; Thai, M.T. A Trigger Identification Service for Defending Reactive Jammers in WSN. IEEE Trans. Mob. Comput. 2012, 11, 793–806. [Google Scholar] [CrossRef]
- Noubir, G. On Connectivity in Ad Hoc Networks under Jamming Using Directional Antennas and Mobility. In Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2004; pp. 186–200. [Google Scholar]
- Brooks, R. A Robust Layered Control System for a Mobile Robot. IEEE J. Robot. Autom. 1986, 2, 14–23. [Google Scholar] [CrossRef]
- Siciliano, B.; Khatib, O. (Eds.) Springer Handbook of Robotics; Springer International Publishing: Cham, Switzerland, 2016. [Google Scholar]
- Arkin, R.C. Behavior-Based Robotics; MIT Press: Cambridge, MA, USA, 2000. [Google Scholar]
- Arkin, R.C. Motor Schema—Based Mobile Robot Navigation. Int. J. Robot. Res. 1989, 8, 92–112. [Google Scholar] [CrossRef]
- Kaelbling, L.P. An Architecture for Intelligent Reactive Systems. Reason. About Actions Plans 1987, 395–410. [Google Scholar] [CrossRef]
- Quigley, M.; Conley, K.; Gerkey, B.; Faust, J.; Foote, T.; Leibs, J.; Wheeler, R.; Ng, A. ROS: An open-source Robot Operating System. In Proceedings of the IEEE International Conference on Robotics and Automation (ICRA) Workshop on Open Source Robotics, Kobe, Japan, 12–17 May 2009. [Google Scholar]
- Koenig, N.; Howard, A. Design and Use Paradigms for Gazebo, an Open-Source Multi-Robot Simulator. In Proceedings of the 2004 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS) (IEEE Cat. No.04CH37566), Sendai, Japan, 28 September–2 October 2004. [Google Scholar]
- Clearpath Robotics. Robots/Husky-ROS. Available online: http://wiki.ros.org/Robots/Husky (accessed on 10 June 2022).
- Clearpath Robotics. Husky/husky: Common Packages for the Clearpath Husky. Available online: https://github.com/husky/husky (accessed on 10 June 2022).
- Soni, A.; Hu, H. Formation Control for a Fleet of Autonomous Ground Vehicles: A Survey. Robotics 2018, 7, 67. [Google Scholar] [CrossRef]
- Lu, D.V.; Hershberger, D.; Smart, W.D. Layered Costmaps for Context-Sensitive Navigation. In Proceedings of the 2014 IEEE/RSJ International Conference on Intelligent Robots and Systems, Chicago, IL, USA, 14–18 September 2014. [Google Scholar]
- Ester, M.; Kriegel, H.-P.; Sander, J.; Xu, X. A density-based algorithm for discovering clusters in large spatial databases with noise. In Proceedings of the Second International Conference on Knowledge Discovery and Data Mining, Portland, OR, USA, 2–4 August 1996; pp. 226–231. [Google Scholar]
- Macenski, S. costmap_2d/hydro/inflation. Available online: http://wiki.ros.org/costmap_2d/hydro/inflation (accessed on 12 July 2022).
- Koren, Y.; Borenstein, J. Potential Field Methods and Their Inherent Limitations for Mobile Robot Navigation. In Proceedings of the 1991 IEEE International Conference on Robotics and Automation, Sacramento, CA, USA, 9–11 April 1991. [Google Scholar]
- Borenstein, J.; Koren, Y. The Vector Field Histogram-Fast Obstacle Avoidance for Mobile Robots. IEEE Trans. Robot. Autom. 1991, 7, 278–288. [Google Scholar] [CrossRef]
- Vasseur, L.; Lecointe, O.; Dento, J.; Cherfaoui, N.; Marion, V.; Morillon, J.G. Leader-Follower Function for Autonomous Military Convoys. SPIE Proc. 2004, 5422, 326–337. [Google Scholar]
- Zhao, X.; Yao, W.; Li, N.; Wang, Y. Design of Leader’s Path Following System for Multi-Vehicle Autonomous Convoy. In Proceedings of the 2017 IEEE International Conference on Unmanned Systems (ICUS), Beijing, China, 27–29 October 2017. [Google Scholar]
- Li, X.R.; Zhao, Z. Measures of Performance for Evaluation of Estimators and Filters. SPIE Proc. 2001, 4473, 530–541. [Google Scholar]
- Pietro, R.D.; Oligeri, G. Silence Is Golden: Exploiting Jamming and Radio Silence to Communicate. ACM Trans. Inf. Syst. Secur. 2015, 17, 1–24. [Google Scholar] [CrossRef]
- Chowdhury, A.; Karmakar, G.; Kamruzzaman, J.; Jolfaei, A.; Das, R. Attacks on Self-Driving Cars and Their Countermeasures: A Survey. IEEE Access 2020, 8, 207308–207342. [Google Scholar] [CrossRef]
- Martinson, E.; Stoytchev, A.; Arkin, R. Robot Behavioral Selection Using Q-Learning. In Proceedings of the IEEE/RSJ International Conference on Intelligent Robots and System, Lausanne, Switzerland, 30 September–4 October 2002. [Google Scholar]
Title | Authors | Summary |
---|---|---|
Path Planning for Multiple Unmanned Vehicles (MUVs) Formation Shape Generation Based on Dual RRT Optimization [15] | Gong, Tianhao; Yang, Yu; Song, Jianhui | Perform shape formation generation with multiple unmanned vehicles using rapidly-exploring random trees to plan vehicle paths during formation. |
Research on Self-Organizing Behavior-Based UAV Formation Based on Distributed Control [16] | Yunhe, Li; Bo, Li; Xiaowei, Niu | Optimize unmanned aerial vehicle formation through use of detected information with self-organizing behaviors with a quasi-static communication topological structure. |
Autonomous Vehicle Convoy Formation Control with Size/Shape Switching for Automated Highways [17] | Jond, Hossein Barghi; Platoš, J; Sadreddini, Zhaleh | Development of a convoy formation control architecture consisting of four closed-form control law algorithms to handle formation size and shape switching. |
Behavior-Based Formation Control for Multirobot Teams [18] | Balch, Tucker; Arkin, Ronald | Integrated navigational and formation behaviors to create human-led robotic teams to be used in different types of task environments. |
Decentralized behavior-based formation control of multiple robots considering obstacle avoidance [19] | Lee, Giroung; Chwa, Dongkyoung | Proposed a decentralized formation control method utilizing a formation matrix and behavior network architecture. |
A Sequential Composition Framework for Coordinating Multirobot Behaviors [20] | Pierpaoli, Pietro; Li, Anqi; Srinivasan, Mohit; Cai, Xiaoyi; Coogan, Samuel; Egerstedt, Magnus | Created a framework for behavior sequencing that allowed teams of robots to adjust their configuration to meet communication requirements for the different tasks. |
Jammer Type | Description |
---|---|
Constant [8,10,11,12,22] | Continuously emits random noise over a wireless medium to interfere with legitimate communications. |
Deceptive [10,12,22] | Periodically inject valid packets in their transmissions to deceive receivers into believing that legitimate messages are being sent. |
Random [8,10,11,12,22] | Operates on jam and sleep periods. They will jam for a time duration of tJ, and sleep for a duration tS before jamming again. Both tJ and tS can be either fixed or values random. |
Reactive [8,10,12,22] | Continuously monitor a communications channel and only jams when it senses activity. |
Intelligent [11,22] | Uses knowledge of the communications protocols they are seeking to jam and analyze the transmissions to target specific messages or message types. |
Convoy Configuration | Square (m) | Roundabout (m) |
---|---|---|
Follower 1 Using Basic Convoy Controller | 1.2665 | 3.1334 |
Follower 2 Using Basic Convoy Controller | 1.9226 | 3.5205 |
Follower 1 Using FLJM assemblage | 0.4942 | 0.4197 |
Follower 2 Using FLJM assemblage | 0.7321 | 0.8452 |
Convoy Configuration | Square (m) | Roundabout (m) |
---|---|---|
Follower 1 Using Basic Convoy Controller | 0.6844 | 1.2637 |
Follower 2 Using Basic Convoy Controller | 1.0028 | 1.0697 |
Follower 1 Using FLJM assemblage | 0.4680 | 0.4821 |
Follower 2 Using FLJM assemblage | 0.7654 | 0.9271 |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Cheung, C.; Rawashdeh, S.; Mohammadi, A. Jam Mitigation for Autonomous Convoys via Behavior-Based Robotics. Appl. Sci. 2022, 12, 9863. https://doi.org/10.3390/app12199863
Cheung C, Rawashdeh S, Mohammadi A. Jam Mitigation for Autonomous Convoys via Behavior-Based Robotics. Applied Sciences. 2022; 12(19):9863. https://doi.org/10.3390/app12199863
Chicago/Turabian StyleCheung, Calvin, Samir Rawashdeh, and Alireza Mohammadi. 2022. "Jam Mitigation for Autonomous Convoys via Behavior-Based Robotics" Applied Sciences 12, no. 19: 9863. https://doi.org/10.3390/app12199863
APA StyleCheung, C., Rawashdeh, S., & Mohammadi, A. (2022). Jam Mitigation for Autonomous Convoys via Behavior-Based Robotics. Applied Sciences, 12(19), 9863. https://doi.org/10.3390/app12199863