Abstract
Future homes will contain Mobile Service Robots (MSR) with diverse functionality. MSRs act in close proximity to humans and have the physical capabilities to cause serious harm to their environment. Furthermore, they have sensors that gather large amounts of data, which might contain sensitive information. A mobile service robot’s physical capabilities are controlled by networked computers susceptible to faults and intrusions. The proximity to humans and the possibility to physically interact with them makes it critical to think about the security issues of MSRs. In this work, we investigate possible attacks on mobile service robots. We survey adversary motivations to attack MSRs, analyse threat vectors and list different available defence mechanisms against attacks on MSRs.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Reuters: Demand for service robots seen at breakthrough: industry body. https://goo.gl/pbTLLHL. Accessed 03 Jan 2017
Fraunhofer Institute - Care-O-bot 4 - Technical data sheet (2015)
Robot kills worker at Volkswagen plant in Germany. https://goo.gl/wGOPwf. Accessed 3 Jan 2017
Mitka, E., Gasteratos, A., Kyriakoulis, N., Mouroutsos, S.G.: Safety certification requirements for domestic robots. Saf. Sci. 50(9), 1888–1897 (2012)
Akdemir, K.D., Karakoyunlu, D., Padir, T., Sunar, B.: An emerging threat: eve meets a robot. In: Chen, L., Yung, M. (eds.) Trusted Systems, INTRUST 2010. Lecture Notes in Computer Science, vol. 6802. Springer, Heidelberg (2011)
Denning, T., Matuszek, C., Koscher, K., Smith, J.R., Kohno, T.: A spotlight on security and privacy risks with future household robots: attacks and lessons. In: Proceedings of the 11th International Conference on Ubiquitous Computing, pp. 105–114. ACM (2009)
Knell, T.: Domestic robots: a case study on security in ubiquitous computing (2014)
Yong, S., Lindskog, D., Ruhl, R., Zavarsky, P.: Risk mitigation strategies for mobile Wi-Fi robot toys from online pedophiles. In: 2011 IEEE Third International Conference on Privacy, Security, Risk and Trust (PASSAT) and 2011 IEEE Third International Conference on Social Computing (SOCIALCOM), pp. 1220–1223 (2011)
Lee, M.K., Tang, K.P., Forlizzi, J., Kiesler, S.: Understanding users’ perception of privacy in human-robot interaction. In: Proceedings of 6th International Conference on Human-Robot Interaction, Lausanne, Switzerland, pp. 181–182. ACM (2011)
Uluagac, A., Subramanian, V., Beyah, R.: Sensory channel threats to cyber physical systems: a wake-up call. In: Conference on Communications and Network Security, pp. 301–309 (2014)
Fusion: Security robot accidentally attacks child. https://goo.gl/uGLJto. Accessed 15 July 2016
Petit, J., Stottelaar, B., Feiri, M., Kargl, F.: Remote attacks on automated vehicles sensors: experiments on camera and LiDAR. Blackhat.com, pp. 1–13 (2015)
Son, Y., Shin, H., Kim, D., Park, Y., Noh, J., Choi, K., Choi, J., Kim, Y.: Rocking drones with intentional sound noise on gyroscopic sensors. In: Jung, J., Holz, T. (eds.) Proceedings of the 24th USENIX Security Symposium, USENIX Security 2015, Washington, D.C., USA, pp. 881–896. USENIX Association (2015)
Bezzo, N., Weimer, J., Pajic, M., Sokolsky, O., Pappas, G., Lee, I.: Attack resilient state estimation for autonomous robotic systems. In: IEEE/RSJ International Conference on Intelligent Robots and Systems, IROS 2014, pp. 3692–3698 (2014)
Fan, J., Guo, X., De Mulder, E., Schaumont, P., Preneel, B., Verbauwhede, I.: State-of-the-art of secure ECC implementations: a survey on known side-channel attacks and countermeasures. In: HOST, pp. 76–87. IEEE Computer Society, Los Alamitos (2010)
Tehranipoor, M., Koushanfar, F.: A survey of hardware Trojan taxonomy and detection. IEEE Des. Test Comput. 27, 10–25 (2010)
Smyers, S.: Hardware authentication mechanism for transmission of data between devices on an IEEE 1394-1995 serial bus network, Patent US5948136 A (1999)
Wired: An Unprecedented Look at Stuxnet, the Worlds First Digital Weapon. https://goo.gl/3tTDll. Accessed 4 Jan 2017
Symantec: The 11 most common computer security threats. https://goo.gl/Vo6fCE. Accessed 15 June 2016
LizardStresser botnet targets IoT devices to launch 400 Gbps attacks. http://goo.gl/SBa9zW. Accessed 30 June 2016
Vuong, T., Filippoupolitis, A., Loukas, G., Gan, D.: Physical indicators of cyber attacks against a rescue robot. In: IEEE International Conference on Pervasive Computing and Communications, pp. 338–343. IEEE (2014)
Kerns, A.J., Shepard, D.P., Bhatti, J.A., Humphreys, T.E.: Unmanned aircraft capture and control via GPS spoofing. J. Field Robot. 31(4), 617–636 (2014)
Standaert, F.X.: Introduction to Side-Channel Attacks (2006)
Computerworld: Playing NSA, hardware hackers build USB cable that can attack. http://goo.gl/kgBqrg. Accessed 1 Aug 2016
Computerworld: Security researchers create undetectable hardware Trojans. https://goo.gl/PyuCXo. Accessed 23 July 2016
Lera, F.J.R., Balsa, J., Casado, F., Ferńandez, C., Rio, F.M., Mateían, V.: Cybersecurity in autonomous systems: evaluating the performance of hardening ROS, Alaga, Spain, June 2016, p. 47 (2016)
Klein, G., Elphinstone, K., Heiser, G., Andronick, J., Cock, D., Derrin, P., Elkaduwe, D., Engelhardt, K., Kolanski, R., Norrish, M., Sewell, T., Tuch, H., Winwood, S.: seL4: Formal Verification of an OS Kernel (2009)
Buttler, D.J., et al.: Using Video Manipulation to Protect Privacy in Remote Presence Systems (2015)
Guerrero-Higueras, A.M., DeCastro-Garcia, N., Rodriguez-Lera, F.J., Matellan, V.: Empirical analysis of cyber-attacks to an indoor real time localization system for autonomous robots. Comput. Secur. (2017)
Psiaki, M.L., Humphreys, T.E.: Protecting GPS from spoofers is critical to the future of navigation. IEEE Spectr. 53, 10 (2016)
Acknowledgment
Supported by the Fonds National de la Recherche, Luxembourg (Project ID: 11609420).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Cornelius, G. et al. (2018). A Perspective of Security for Mobile Service Robots. In: Ollero, A., Sanfeliu, A., Montano, L., Lau, N., Cardeira, C. (eds) ROBOT 2017: Third Iberian Robotics Conference. ROBOT 2017. Advances in Intelligent Systems and Computing, vol 693. Springer, Cham. https://doi.org/10.1007/978-3-319-70833-1_8
Download citation
DOI: https://doi.org/10.1007/978-3-319-70833-1_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-70832-4
Online ISBN: 978-3-319-70833-1
eBook Packages: EngineeringEngineering (R0)