Challenges in ROS Forensics
Title | Challenges in ROS Forensics |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Abeykoon, I., Feng, X. |
Conference Name | 2019 IEEE SmartWorld, Ubiquitous Intelligence Computing, Advanced Trusted Computing, Scalable Computing Communications, Cloud Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI) |
Date Published | Aug. 2019 |
Publisher | IEEE |
ISBN Number | 978-1-7281-4034-6 |
Keywords | availability attacks, communication link, computer network security, confidential security purposes, cyber-physical security threats, denial-of-service, digital forensics, Forensics, Forensics acquisition and data recovery, Gazbo Turtlebot simulator, Human Behavior, human factors, integrity attacks, Internet, mobile computing, mobile robots, Network connections, network system, Operating systems, peer to peer application, Peer-to-peer computing, policy-based governance, pubcrawl, RAT, remote administration tool, resilience, Resiliency, robot behavior, Robot hack, robot hack acquistion, Robot Operating System, robot operating systems, Robot sensing systems, ROS forensics, security, security attacks, Service robots, software tools, Transport Layer Security |
Abstract | The usage of robot is rapidly growth in our society. The communication link and applications connect the robots to their clients or users. This communication link and applications are normally connected through some kind of network connections. This network system is amenable of being attached and vulnerable to the security threats. It is a critical part for ensuring security and privacy for robotic platforms. The paper, also discusses about several cyber-physical security threats that are only for robotic platforms. The peer to peer applications use in the robotic platforms for threats target integrity, availability and confidential security purposes. A Remote Administration Tool (RAT) was introduced for specific security attacks. An impact oriented process was performed for analyzing the assessment outcomes of the attacks. Tests and experiments of attacks were performed in simulation environment which was based on Gazbo Turtlebot simulator and physically on the robot. A software tool was used for simulating, debugging and experimenting on ROS platform. Integrity attacks performed for modifying commands and manipulated the robot behavior. Availability attacks were affected for Denial-of-Service (DoS) and the robot was not listened to Turtlebot commands. Integrity and availability attacks resulted sensitive information on the robot. |
URL | https://ieeexplore.ieee.org/document/9060170 |
DOI | 10.1109/SmartWorld-UIC-ATC-SCALCOM-IOP-SCI.2019.00299 |
Citation Key | abeykoon_challenges_2019 |
- robot hack acquistion
- Peer-to-peer computing
- policy-based governance
- pubcrawl
- RAT
- remote administration tool
- resilience
- Resiliency
- robot behavior
- Robot hack
- peer to peer application
- Robot Operating System
- robot operating systems
- Robot sensing systems
- ROS forensics
- security
- security attacks
- Service robots
- software tools
- Transport Layer Security
- Human behavior
- communication link
- computer network security
- confidential security purposes
- cyber-physical security threats
- Denial-of-Service
- Digital Forensics
- Forensics
- Forensics acquisition and data recovery
- Gazbo Turtlebot simulator
- availability attacks
- Human Factors
- integrity attacks
- internet
- mobile computing
- mobile robots
- Network connections
- network system
- operating systems