Quantitative analysis of security in distributed robotic frameworks

Robotics and Autonomous Systems - Tập 100 - Trang 95-107 - 2018
Francisco Martín1, Enrique Soriano1, José M. Cañas1
1Universidad Rey Juan Carlos, Spain

Tài liệu tham khảo

Iran-US RQ-170 incident, 2011. https://en.wikipedia.org/wiki/Iran%E2%80%93U.S._RQ-170_incident. A. Greenberg, Hackers remotely kill a jeep on the highway with me in it, 2015. https://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway. Morante, 2015, Cryptobotics: Why robots need cyber safety, Front. Robot. AI, 2, 23, 10.3389/frobt.2015.00023 Finnicum, 2011, Building Secure Robot Applications, 1 C. Cerrudo, L. Apa, Hacking Robots Before Skynet, Tech. rep., 2017. https://ioactive.com/pdfs/Hacking-Robots-Before-Skynet.pdf. T. Bonaci, H.J. Chizeck, On potential security threats against rescue robotic systems, in: Proceedings of the 10th IEEE International Symposium on Safety, Security, and Rescue Robotics, 2012. Bonaci, 2015, Experimental analysis of denial-of-service attacks on teleoperated robotic systems, 11 H. Chizeck, T. Bonaci, T. Lendvay, Enhanced Security and Safety in Telerobotic Systems, uS Patent App. 13/935,436, (Mar. 6 2014). URL https://www.google.com/patents/US20140068770. F. Cianfrocca, B. Barnes, A case study for building cybersecurity policies for industrial robots, 2015. https://www.rsaconference.com/writable/presentations/file_upload/eco-f03-a-case-study-for-building-cybersecurity-policies-for-industrial-robots.pdf . Elkady, 2012, Robotics middleware: A comprehensive literature survey and attribute-based bibliography, J. Robot., 10.1155/2012/959013 Magyar, 2015, Comparison study of robotic middleware for robotic applications, 121 What is ICE? https://zeroc.com/products/ice. Documents Associated With Data Distribution Service, V1.4, http://www.omg.org/spec/DDS/1.4. M. Quigley, K. Conley, B. Gerkey, J. Faust, T. Foote, J. Leibs, R. Wheeler, Andrew Y. Ng, ROS: an open-source robot operating system, in: Proceedings of ICRA Workshop on Open Source Software 2009, 2009. Quigley, 2015 Brooks, 2007, Orca: a component model and repository, 231, 10.1007/978-3-540-68951-5_13 Manso Argelles, 2010, RoboComp: A tool-based robotics framework, vol. 6472, 251 J.M.C. nas, M. González, A. Hernández, F. Rivas, Recent advances in the JdeRobot framework for robot programming, in: Proceedings of RoboCity2030 12th Workshop, Robotica Cognitiva, UNED, Madrid, July, 2013, pp. 1–21. Fitzpatrick, 2014, A middle way for robotics middleware, J. Softw. Eng. Robot., 5, 42 H. Bruyninckx, Open robot control software: the OROCOS project, in: Proceedings 2001 ICRA. IEEE International Conference on Robotics and Automation (Cat. No.01CH37164), Vol. 3, pp. 2523–2528, vol.3, 2001. http://dx.doi.org/10.1109/ROBOT.2001.933002. J.C. Baillie, Urbi: towards a universal robotic low-level programming language, in: 2005 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2005, pp. 820–825. http://dx.doi.org/10.1109/IROS.2005.1545467. Softbank Robotics: Naoqi, https://www.ald.softbankrobotics.com/en/robots/tools. Shostack, 2014 The Stride threat model, https://msdn.microsoft.com/en-us/library/ee823878(v=cs.20).aspx . Publish/Subscribe Threat Modeling,https://blog.securitycompass.com/publish-subscribe-threat-modeling-11add54f1d07 . T. Dierks, E. Rescorla, The Transport Layer Security (TLS) Protocol Version 1.2 RFC 5246 (Proposed Standard), Updated by RFCs 5746, 5878, 6176 (Aug. 2008). URL http://www.ietf.org/rfc/rfc5246.txt. Diffie, 1992, Authentication and authenticated key exchanges, Des. Codes Cryptogr., 2, 107, 10.1007/BF00124891 M. Koschuch, M. Hudler, M. Krger, Performance evaluation of the TLS handshake in the context of embedded devices, in: 2010 International Conference on Data Communication Networking, DCNET, 2010, pp. 1–10. Q. Ge, F. Chen, Strategies for implementing SSL on embedded system, in: 2008 International Seminar on Future BioMedical Information Engineering, 2008, pp. 457–460. http://dx.doi.org/10.1109/FBIE.2008.81. Cyclonessl, https://www.oryx-embedded.com/cyclone_ssl.html. Woldssl, https://www.wolfssl.com/wolfSSL/Home.html. The ice manual: Icessl, https://doc.zeroc.com/display/Ice35/IceSSL. The OpenSSL Project, OpenSSL: The Open Source toolkit for SSL/TLS, (April 2003). www.openssl.org. J. McClean, C. Stull, C. Farrar, D. Mascareas, A preliminary cyber-physical security assessment of the Robot Operating System (ros), in: Proceedings of SPIE, Vol. 8741, 2013, pp. 874110-1–874110–8, URL http://dx.doi.org/10.1117/12.2016189. B. Breiling, B. Dieber, P. Schartner, Secure communication for the Robot Operating System, in: Proceedings of 2017 IEEE Syscon, 2017. R. Toris, C. Shue, S. Chernova, Message authentication codes for secure remote non-native client connections to ROS enabled robots, in: 2014 IEEE International Conference on Technologies for Practical Robot Applications, TePRA, 2014, pp. 1–6, http://dx.doi.org/10.1109/TePRA.2014.6869141. B. Dieber, S. Kacianka, S. Rass, P. Schartner, Application-level security for ros-based applications, in: Proceedings of the 2016 IEEE/RSJ International Conference on Intelligent Robots and Systems, IROS 2016, 2016. R. White, M. Quigley, H. Christensen, SROS: Securing ROS over the wire, in the graph, and through the kernel, in: Humanoids Workshop: Towards Humanoid Robots OS, Cancun, Mexico, 2016. SROS, http://wiki.ros.org/SROS. Why ROS 2.0? http://design.ros2.org/articles/why_ros2.html. Maruyama, 2016, Exploring the performance of ROS2, 5:1 Dds Security, http://www.omg.org/cgi-bin/doc?formal/16-08-01. eProsima fast rtps documentation, https://eprosima-fast-rtps.readthedocs.io/en/latest/index.html. Pitfalls of TSC usage, http://oliveryang.net/2015/09/pitfalls-of-TSC-usage/. G. Paoloni, White paper: How to Benchmark Code Execution Times on Intel IA-32 and IA-64 Instruction Set Architectures, Intel 2010. URL http://www.intel.es/content/www/es/es/embedded/training/ia-32-ia-64-benchmark-code-execution-paper.html . S. Hemminger, Network Emulation with NetEm, in: Linux Conf Au, 2005. URL http://developer.osdl.org/shemminger/netem/LCA2005_paper.pdf. GGPlot2: Box and whiskers plot. http://docs.ggplot2.org/0.9.3.1/geom_boxplot.html.