Skip to main content

A Perspective of Security for Mobile Service Robots

  • Conference paper
  • First Online:
ROBOT 2017: Third Iberian Robotics Conference (ROBOT 2017)

Abstract

Future homes will contain Mobile Service Robots (MSR) with diverse functionality. MSRs act in close proximity to humans and have the physical capabilities to cause serious harm to their environment. Furthermore, they have sensors that gather large amounts of data, which might contain sensitive information. A mobile service robot’s physical capabilities are controlled by networked computers susceptible to faults and intrusions. The proximity to humans and the possibility to physically interact with them makes it critical to think about the security issues of MSRs. In this work, we investigate possible attacks on mobile service robots. We survey adversary motivations to attack MSRs, analyse threat vectors and list different available defence mechanisms against attacks on MSRs.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    http://www.care-o-bot-4.de/.

  2. 2.

    http://strands.acin.tuwien.ac.at/publications.html.

References

  1. Reuters: Demand for service robots seen at breakthrough: industry body. https://goo.gl/pbTLLHL. Accessed 03 Jan 2017

  2. Fraunhofer Institute - Care-O-bot 4 - Technical data sheet (2015)

    Google Scholar 

  3. Robot kills worker at Volkswagen plant in Germany. https://goo.gl/wGOPwf. Accessed 3 Jan 2017

  4. Mitka, E., Gasteratos, A., Kyriakoulis, N., Mouroutsos, S.G.: Safety certification requirements for domestic robots. Saf. Sci. 50(9), 1888–1897 (2012)

    Article  Google Scholar 

  5. Akdemir, K.D., Karakoyunlu, D., Padir, T., Sunar, B.: An emerging threat: eve meets a robot. In: Chen, L., Yung, M. (eds.) Trusted Systems, INTRUST 2010. Lecture Notes in Computer Science, vol. 6802. Springer, Heidelberg (2011)

    Google Scholar 

  6. Denning, T., Matuszek, C., Koscher, K., Smith, J.R., Kohno, T.: A spotlight on security and privacy risks with future household robots: attacks and lessons. In: Proceedings of the 11th International Conference on Ubiquitous Computing, pp. 105–114. ACM (2009)

    Google Scholar 

  7. Knell, T.: Domestic robots: a case study on security in ubiquitous computing (2014)

    Google Scholar 

  8. Yong, S., Lindskog, D., Ruhl, R., Zavarsky, P.: Risk mitigation strategies for mobile Wi-Fi robot toys from online pedophiles. In: 2011 IEEE Third International Conference on Privacy, Security, Risk and Trust (PASSAT) and 2011 IEEE Third International Conference on Social Computing (SOCIALCOM), pp. 1220–1223 (2011)

    Google Scholar 

  9. Lee, M.K., Tang, K.P., Forlizzi, J., Kiesler, S.: Understanding users’ perception of privacy in human-robot interaction. In: Proceedings of 6th International Conference on Human-Robot Interaction, Lausanne, Switzerland, pp. 181–182. ACM (2011)

    Google Scholar 

  10. Uluagac, A., Subramanian, V., Beyah, R.: Sensory channel threats to cyber physical systems: a wake-up call. In: Conference on Communications and Network Security, pp. 301–309 (2014)

    Google Scholar 

  11. Fusion: Security robot accidentally attacks child. https://goo.gl/uGLJto. Accessed 15 July 2016

  12. Petit, J., Stottelaar, B., Feiri, M., Kargl, F.: Remote attacks on automated vehicles sensors: experiments on camera and LiDAR. Blackhat.com, pp. 1–13 (2015)

    Google Scholar 

  13. Son, Y., Shin, H., Kim, D., Park, Y., Noh, J., Choi, K., Choi, J., Kim, Y.: Rocking drones with intentional sound noise on gyroscopic sensors. In: Jung, J., Holz, T. (eds.) Proceedings of the 24th USENIX Security Symposium, USENIX Security 2015, Washington, D.C., USA, pp. 881–896. USENIX Association (2015)

    Google Scholar 

  14. Bezzo, N., Weimer, J., Pajic, M., Sokolsky, O., Pappas, G., Lee, I.: Attack resilient state estimation for autonomous robotic systems. In: IEEE/RSJ International Conference on Intelligent Robots and Systems, IROS 2014, pp. 3692–3698 (2014)

    Google Scholar 

  15. Fan, J., Guo, X., De Mulder, E., Schaumont, P., Preneel, B., Verbauwhede, I.: State-of-the-art of secure ECC implementations: a survey on known side-channel attacks and countermeasures. In: HOST, pp. 76–87. IEEE Computer Society, Los Alamitos (2010)

    Google Scholar 

  16. Tehranipoor, M., Koushanfar, F.: A survey of hardware Trojan taxonomy and detection. IEEE Des. Test Comput. 27, 10–25 (2010)

    Article  Google Scholar 

  17. Smyers, S.: Hardware authentication mechanism for transmission of data between devices on an IEEE 1394-1995 serial bus network, Patent US5948136 A (1999)

    Google Scholar 

  18. Wired: An Unprecedented Look at Stuxnet, the Worlds First Digital Weapon. https://goo.gl/3tTDll. Accessed 4 Jan 2017

  19. Symantec: The 11 most common computer security threats. https://goo.gl/Vo6fCE. Accessed 15 June 2016

  20. LizardStresser botnet targets IoT devices to launch 400 Gbps attacks. http://goo.gl/SBa9zW. Accessed 30 June 2016

  21. Vuong, T., Filippoupolitis, A., Loukas, G., Gan, D.: Physical indicators of cyber attacks against a rescue robot. In: IEEE International Conference on Pervasive Computing and Communications, pp. 338–343. IEEE (2014)

    Google Scholar 

  22. Kerns, A.J., Shepard, D.P., Bhatti, J.A., Humphreys, T.E.: Unmanned aircraft capture and control via GPS spoofing. J. Field Robot. 31(4), 617–636 (2014)

    Article  Google Scholar 

  23. Standaert, F.X.: Introduction to Side-Channel Attacks (2006)

    Google Scholar 

  24. Computerworld: Playing NSA, hardware hackers build USB cable that can attack. http://goo.gl/kgBqrg. Accessed 1 Aug 2016

  25. Computerworld: Security researchers create undetectable hardware Trojans. https://goo.gl/PyuCXo. Accessed 23 July 2016

  26. Lera, F.J.R., Balsa, J., Casado, F., Ferńandez, C., Rio, F.M., Mateían, V.: Cybersecurity in autonomous systems: evaluating the performance of hardening ROS, Alaga, Spain, June 2016, p. 47 (2016)

    Google Scholar 

  27. Klein, G., Elphinstone, K., Heiser, G., Andronick, J., Cock, D., Derrin, P., Elkaduwe, D., Engelhardt, K., Kolanski, R., Norrish, M., Sewell, T., Tuch, H., Winwood, S.: seL4: Formal Verification of an OS Kernel (2009)

    Google Scholar 

  28. Buttler, D.J., et al.: Using Video Manipulation to Protect Privacy in Remote Presence Systems (2015)

    Google Scholar 

  29. Guerrero-Higueras, A.M., DeCastro-Garcia, N., Rodriguez-Lera, F.J., Matellan, V.: Empirical analysis of cyber-attacks to an indoor real time localization system for autonomous robots. Comput. Secur. (2017)

    Google Scholar 

  30. Psiaki, M.L., Humphreys, T.E.: Protecting GPS from spoofers is critical to the future of navigation. IEEE Spectr. 53, 10 (2016)

    Article  Google Scholar 

Download references

Acknowledgment

Supported by the Fonds National de la Recherche, Luxembourg (Project ID: 11609420).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gary Cornelius .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Cornelius, G. et al. (2018). A Perspective of Security for Mobile Service Robots. In: Ollero, A., Sanfeliu, A., Montano, L., Lau, N., Cardeira, C. (eds) ROBOT 2017: Third Iberian Robotics Conference. ROBOT 2017. Advances in Intelligent Systems and Computing, vol 693. Springer, Cham. https://doi.org/10.1007/978-3-319-70833-1_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-70833-1_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-70832-4

  • Online ISBN: 978-3-319-70833-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics