1,011 research outputs found
Physical indicators of cyber attacks against a rescue robot
Responding to an emergency situation is a challenging and time critical procedure. The primary goal is to save lives and this is directly related to the speed and efficiency at which help is provided to the victims. Rescue robots are able to benefit an emergency response procedure by searching for survivors, providing access to inaccessible areas and establishing an on-site communication network. This paper investigates how a cyber attack on a rescue robot can adversely affect its operation and impair an emergency response operation. The focus is on identifying physical indicators of an ongoing cyber attack, which can help to design more efficient detection and defense mechanisms. A number of experiments have been conducted on an Arduino based robot, under different cyber attack scenarios. The results show that the cyber attack’s effects have physical features that can be used in order to improve the robot’s robustness against this type of threat
Recommended from our members
Behaviour-based anomaly detection of cyber-physical attacks on a robotic vehicle
Security is one of the key challenges in cyber-physical systems, because by their nature, any cyber attack against them can have physical repercussions. This is a critical issue for autonomous vehicles; if compromised in terms of their communications or computation they can cause considerable physical damage due to their mobility. Our aim here is to facilitate the automatic detection of cyber attacks on a robotic vehicle. For this purpose, we have developed a detection mechanism, which monitors real-time data from a large number of sources onboard the vehicle, including its sensors, networks and processing. Following a learning phase, where the vehicle is trained in a non-attack state on what values are considered normal, it is then subjected to a series of different cyber-physical and physical-cyber attacks. We approach the problem as a binary classification problem of whether the robot is able to self-detect when and whether it is under attack. Our experimental results show that the approach is promising for most attacks that the vehicle is subjected to. We further improve its performance by using weights that accentuate the anomalies that are less common thus improving overall performance of the detection mechanism for unknown attacks
Recommended from our members
Threat evaluation based on automatic sensor signal characterisation and anomaly detection
Autonomous cyber physical systems are increasingly common in a wide variety of application domains, with a correspondingly wide range of functionalities and types of sensing and actuation. At the same time, the variety and frequency of cyber attacks is increasing in correspondence with the increasing popularity and functionality of these systems, from in-vehicle driver assistance to smart city infrastructure and robotics. These technologies rely on a variety of sensors, actuating nodes and control communications. Each sensor adds context by which the autonomous system can better understand its environment, but each sensor also provides opportunities for attack, as has been observed in a variety of attacks on different systems. In this paper, we introduce a model to observe signal characteristics, including noise level patterns, on sensor data streams and incorporate this information to differentiate between normal or abnormal behaviour of a robotic vehicle. This model forms the basis of an automated threat detection scheme, which we test using a purpose-built testbed. Experiments are conducted in a controlled environment using stochastic elements to introduce certain levels of randomness during the experiment. The results indicate that the system is able to distinguish the behaviour of a robotic vehicle under different levels of environmental volatility and is able to identify a sensory channel attack against it
The future of Cybersecurity in Italy: Strategic focus area
This volume has been created as a continuation of the previous one, with the aim of outlining a set of focus areas and actions that the Italian Nation research community considers essential. The book touches many aspects of cyber security, ranging from the definition of the infrastructure and controls needed to organize cyberdefence to the actions and technologies to be developed to be better protected, from the identification of the main technologies to be defended to the proposal of a set of horizontal actions for training, awareness raising, and risk management
Security and privacy analysis based on Internet of Things in the fourth industrial generation (Industry 4.0)
The connection of smart devices using the Internet has dramatically changed the way people live, and this concept has also been extended to the industrial sector. This practice not only provides more stable, faster, and safer communications but also makes it possible to realize the concept of the smart factory in the fourth industrial revolution. The Internet of Things uses a unique Internet Protocol to identify, control, and transmit data to individuals as well as databases. Data is collected through the Internet of Things, stored in cloud storage, and managed and calculated through analytical tools. Internet of Things security is a field of technology that focuses on protecting connected devices and networks in the Internet of Things (IoT). Ensuring the safety of networks with connected IoT devices is critical. Security in the Internet of Things includes a wide range of techniques, strategies, protocols, and measures aimed at mitigating the ever-increasing vulnerabilities of the Internet of Things in modern businesses. The simultaneous connection of objects also brings privacy concerns. For this reason, in this research, an effort has been made to examine and analyze the most important privacy requirements in the Internet of Things in digital businesses in Industry 4.0. In this regard, by using experts' opinions and literature review, privacy requirements were extracted and evaluated using fuzzy non-linear decision-making methodology. The results showed that acquired and intrinsic information has the highest importance
Internet of robotic things : converging sensing/actuating, hypoconnectivity, artificial intelligence and IoT Platforms
The Internet of Things (IoT) concept is evolving rapidly and influencing newdevelopments in various application domains, such as the Internet of MobileThings (IoMT), Autonomous Internet of Things (A-IoT), Autonomous Systemof Things (ASoT), Internet of Autonomous Things (IoAT), Internetof Things Clouds (IoT-C) and the Internet of Robotic Things (IoRT) etc.that are progressing/advancing by using IoT technology. The IoT influencerepresents new development and deployment challenges in different areassuch as seamless platform integration, context based cognitive network integration,new mobile sensor/actuator network paradigms, things identification(addressing, naming in IoT) and dynamic things discoverability and manyothers. The IoRT represents new convergence challenges and their need to be addressed, in one side the programmability and the communication ofmultiple heterogeneous mobile/autonomous/robotic things for cooperating,their coordination, configuration, exchange of information, security, safetyand protection. Developments in IoT heterogeneous parallel processing/communication and dynamic systems based on parallelism and concurrencyrequire new ideas for integrating the intelligent “devices”, collaborativerobots (COBOTS), into IoT applications. Dynamic maintainability, selfhealing,self-repair of resources, changing resource state, (re-) configurationand context based IoT systems for service implementation and integrationwith IoT network service composition are of paramount importance whennew “cognitive devices” are becoming active participants in IoT applications.This chapter aims to be an overview of the IoRT concept, technologies,architectures and applications and to provide a comprehensive coverage offuture challenges, developments and applications
Design of a man-wearable control station for a robotic rescue system
This report details the design, development, and testing of a man-wearable operator control station for the use of a low-cost robotic system in Urban Search and Rescue (USAR). The complete system, dubbed the "Scarab", is the 1st generation developed and built in the Robotics and Agents Research Laboratory (RARL) at the University of Cape Town (UCT), and was a joint effort between three MSc students. Robots have found a place in USAR as replaceable units which can be deployed into dangerous and confined voids in the place of humans. As such, they have been utilized in a large variety of disaster environments including ground, aerial, and underwater scenarios, and have been gathering research momentum since their first documented deployment in the rescue operations surrounding the 9/11 terrorist attacks. However one issue is their cost as they are not economical solutions, making them less viable for inclusion into a rescue mission as well as negatively affecting the operator‟s decisions in order to prioritise the safety of the unit. Another concern is their difficulty of transport, which becomes dependent on the size and portability of the robot. As such, the Scarab system was conceived to provide a deployable robotic platform which was lowcost, with a budget goal of US $ 500. To address the transportability concerns, it aimed to be portable and light-weight; being able to be thrown through a window by a single hand and withstanding a drop height of 3 m. It includes an internal sensor payload which incorporates an array of sensors and electronics, including temperature monitors and two cameras to provide both a normal and IR video feed. Two LED spotlights are used for navigation, and a microphone and buzzer is included for interaction with any discovered survivors. The operator station acts as the user interface between the operator and the robotic platform. It aimed to be as intuitive as possible, providing quick deployment and minimalizing the training time required for its operation. To further enhance the Scarab system‟s portability, it was designed to be a manwearable system, allowing the operator to carry the robotic platform on their back. It also acts as a charging station, supplying power to the robotic platform‟s on-board charging circuitry. The control station‟s mechanical chassis serves as the man-wearable component of the system, with the functionality being achieved by integration onto a tactical vest. This allows the operator to take the complete system on and off as a single unit without assistance, and uses two mounting brackets to dock the robotic platform. Key areas focussed upon during design were the weight and accessibility of the system, as well as providing a rugged housing for the internal electronics. All parts were manufactured in the UCT Mechanical Engineering workshop
- …