Middleware Security for a Robotic Operating System

Abstract

The Robotic Operating System (ROS), which was first released in 2004, has grown to be a popular platform for creating and deploying robotic applications. However, as the complexity and diversity of robotic systems keep expanding, security of ROS has come to be a much-needed concern. Two goals fall under the heading of "improving the security of robotic systems" in my research portion. The first goal attempts to strengthen ROS' security by putting into place specific security measures to solve the software's present security problems and enhance its overall security. The second goal aims to increase the relevant robot's physical security. Unauthorized access is prevented, and the robot is shielded from harm physically. By strengthening the security and dependability of robotic systems and averting potential dangers and harm to both the robot and the environment, these goals will benefit the field of robotics and society at large.

Country : Sri Lanka

1 R.C.B. Keppetipola2 O.D. Abeywickrama3 O. K. Siriwardena4 S.R. Serasingha Yapa5 S.M.B. Harshanath6 Prof. Pradeep Abeygunawardhana

  1. Undergraduate Student, Faculty of Computing, Sri Lanka Institute of Information Technology, Sri Lanka
  2. Undergraduate Student, Faculty of Computing, Sri Lanka Institute of Information Technology, Sri Lanka
  3. Undergraduate Student, Faculty of Computing, Sri Lanka Institute of Information Technology, Sri Lanka
  4. Undergraduate Student, Faculty of Computing, Sri Lanka Institute of Information Technology, Sri Lanka
  5. Lecturer, Faculty of Computing, Sri Lanka Institute of Information Technology, Sri Lanka
  6. Dean - International, Faculty of Computing, Sri Lanka Institute of Information Technology, Sri Lanka

IRJIET, Volume 7, Issue 11, November 2023 pp. 478-485

doi.org/10.47001/IRJIET/2023.711064

References

  1. W. R. M. a. B. S. Vincenzo DiLuoffo, "Robot Operating System 2: The need wwe we for a holistic security approach to robotic architectures," International Journal of Advanced Robotic Systems., 2018.
  2. J. McClean, C. J. Stull, C. R. Farrar and D.Mascareñas, "A preliminary cyber-physical security assessment of the Robot Operating System (ROS)," Proceedings of SPIE, vol. 8741, no. , p. 874110, 2013.
  3. M. A. Rabbah, N. . Rabbah, H. . Belhadaoui and M.. Rifi, "Designing Middleware over Real Time Operating System for Mobile Robot,", 2017.[Online].Available:https://link.springer.com/chapter/10.1007/9 7 8-3-319-91337-7_37. [Accessed 5 5 2023].
  4. I.P.M.P.L.J.D.-J. Rafael R. Teixeira, "Security on ROS: analyzing and exploiting vulnerabilities of ROS-based systems," IEEE Xplore, 2023.
  5. R. S. Sean Rivera, "Securing Robots: An Integrated Approach for Security Challenges and Monitoring for the Robotic Operating System (ROS)," University of Luxembourg, Luxembourg, 2016.
  6. Q. Chen, C. Zhu, and X. Li, "Design of ROS-based middleware security architecture," Journal of Electronics & Information Technology, vol. 40, no. 1, pp. 74-81, 2018.
  7. L. D'Orazio, L. Pomante, and A. Oddi, "An Efficient and Secure Message Encryption for ROS based Robot Networks," IEEE Transactions on Industrial Informatics, vol. 16, no. 8, pp. 5405-5414, 2020.
  8. Z. Xu, Y. Liu, B. Wei, and L. Zhu, "An Attribute-Based Access Control Mechanism for ROS Based IoT Systems," IEEE Access, vol.8, pp. 175679-175690, 2020.
  9. Y. Zhao, S. Zhu, Z. Zhou, and J. Fan, "A Lightweight Intrusion Detection System for ROS Based Robot Networks," IEEE Access, vol. 8, pp. 205980-205992, 2020.
  10. F. Pasqualetti, F. Dorfler, and F. Bullo, “Attack detection and identification in cyber-physical systems,” IEEE Trans. Automat. Contr., vol. 58, no. 11, pp. 2715–2729, 2013, doi: 10.1109/TAC.2013.2266831.
  11. “Stuxnet worm impact on industrial cyber-physical system security | IEEE Conference Publication | IEEE Xplore.” https://ieeexplore.ieee.org/document/6120048 (accessed Mar. 21, 2023).
  12. “The Impact of Dragonfly Malware on Industrial Control Systems | SANS Institute.” https://www.sans.org/white-papers/36672/ (accessed Mar. 21, 2023).
  13. “Manage endpoint security in Microsoft Intune | Microsoft Learn.” https://learn.microsoft.com/enus/mem/intune/protect/endpoint- security (accessed Mar. 21, 2023).
  14. M. S. Vardam et al., “Technical support using assistive robotics for physically challenged people,” Proc. - 1st Int. Conf. Comput. Commun. Control Autom. ICCUBEA 2015, pp. 882–886, Jul. 2015, doi: 10.1109/ICCUBEA.2015.175.
  15. G. Bansod, N. Raval, and N. Pisharoty, “Implementation of a new lightweight encryption design for embedded security,” IEEE Trans. Inf. Forensics Secur., vol. 10, no. 1, pp. 142–151, Jan. 2015, doi: 10.1109/TIFS.2014.2365734.
  16. “Analyzing Interoperability and Security Overhead of ROS2 DDS Middleware | IEEE Conference Publication | IEEE Xplore.” https://vpn.sliit.lk/proxy/0d790d1b/https/ieeexplore.ieee.org/docume nt/9837282 (accessed Mar. 22, 2023).
  17. D. Kienzle, N. Evans, and M. Elder, “NICE: Network introspection by collaborating endpoints,” 2013 IEEE Conf. Commun. Netw. Secur. CNS 2013, pp. 411–412, 2013, doi: 10.1109/CNS.2013.6682753.
  18. S. Lagraa, M. Cailac, S. Rivera, F. Beck, and R. State, “Real-Time Attack Detection on Robot Cameras: A Self-Driving Car Application,”Proc. - 3rd IEEE Int. Conf. Robot. Comput. IRC 2019, pp. 102–109, Mar. 2019, doi: 10.1109/IRC.2019.00023.
  19. S. Rivera, S. Lagraa, A. K. Iannillo, and R. State, “Auto-encoding robot state against sensor spoofing attacks,” Proc. - 2019 IEEE 30th Int. Symp. Softw. Reliab. Eng. Work. ISSREW 2019, pp. 252–257, Oct. 2019, doi: 10.1109/ISSREW.2019.00080.
  20. C. Nachreiner, “Anatomy of an arp poisoning attack,” Retrieved July, vol. 4, p. 2005, 2003.
  21. G. F. Lyon, Nmap network scanning: The official Nmap project guide to network discovery and security scanning. Insecure, 2009.