Application-level Security for ROS-based Applications

被引:0
作者
Dieber, Bernhard [1 ]
Kacianka, Severin [2 ]
Rass, Stefan [3 ]
Schartner, Peter [3 ]
机构
[1] Joanneum Res, ROBOT Inst, Graz, Austria
[2] Tech Univ Munich, Software Engn Grp, D-80290 Munich, Germany
[3] Alpen Adria Univ Klagenfurt, Inst Appl Informat, Syst Secur Grp, Klagenfurt, Austria
来源
2016 IEEE/RSJ INTERNATIONAL CONFERENCE ON INTELLIGENT ROBOTS AND SYSTEMS (IROS 2016) | 2016年
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
While the topic of security in industrial applications has gained some momentum in recent years, there are still severe security vulnerabilities which are actively exploited for attacks. The robot operating system (ROS) is expected to further grow in usage and to be used in many industrial applications. Analysis, however, shows that it lacks several security enhancements in order to make it suitable for industrial use. In its current state, false data and commands can be injected posing a possible safety risk for the resulting product and humans in the production. In addition, data may be eavesdropped and used by outsiders to gain insight into the production process. In this paper we propose a security architecture intended for use on top of ROS on the application level. We use a dedicated authorization server to ensure that only valid nodes are part of the application. Cryptographic methods ensure data confidentiality and integrity. We show in a demonstration with a collaborative robot how our architecture can be used to secure a ROS-based application.
引用
收藏
页码:4477 / 4482
页数:6
相关论文
共 24 条
  • [1] Mechatronic Security and Robot Authentication
    Adi, Wael
    [J]. 2009 SYMPOSIUM ON BIO-INSPIRED LEARNING AND INTELLIGENT SYSTEMS FOR SECURITY (BLISS 2009), 2009, : 77 - 82
  • [2] Efficient integration of secure and safety critical industrial wireless sensor networks
    Akerberg, Johan
    Gidlund, Mikael
    Lennvall, Tomas
    Neander, Jonas
    Bjorkman, Mats
    [J]. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2011,
  • [3] [Anonymous], UND WHIT BOX CRYPT
  • [4] [Anonymous], 2016, TECH REP
  • [5] [Anonymous], 1997, Handbook of Applied Cryptography
  • [6] [Anonymous], 2014, 2014 IEEE INT C TECH
  • [7] [Anonymous], 2013, 2013104 CRYPT EPRINT
  • [8] [Anonymous], CRYPTO LIB 5 6
  • [9] [Anonymous], BLUECRYPT CRYPTOGRAP
  • [10] [Anonymous], TECH REP