How to secure autonomous mobile robots? An approach with fuzzing, detection and mitigation
2021-01
发表期刊JOURNAL OF SYSTEMS ARCHITECTURE (IF:3.7[JCR-2023],3.6[5-Year])
ISSN1383-7621
EISSN1873-6165
卷号112页码:#VALUE!
发表状态已发表
DOI10.1016/j.sysarc.2020.101838
摘要

Autonomous mobile robots share social spaces with humans, usually working together for domestic or professional tasks. Cyber security breaches in such robots undermine the trust between humans and robots. In this paper, we investigate how to apprehend and inflict security threats at the design and implementation stage of an autonomous mobile robot. To this end, we leverage the idea of directed fuzzing and design RoboFuzzthat systematically tests an autonomous mobile robot in line with the robot's states and the surrounding environment. The methodology of RoboFuzzis to study critical environmental parameters affecting the robot's state transitions and subject the robot control program with rational but harmful sensor values so as to compromise the robot. Furthermore, we develop detection and mitigation algorithms to counteract the impact of RoboFuzz. The difficulties mainly lie in the trade-offamong limited computation resources, timely detection and the retention of work efficiency in mitigation. In particular, we propose detection and mitigation methods that take advantage of historical records of obstacles to detect inconsistent obstacle appearances regarding untrustworthy sensor values and navigate the movable robot to continue moving so as to carry on a planned task. By doing so, we manage to maintain a low cost for detection and mitigation but also retain the robot's work efficacy. We have prototyped the bundle of RoboFuzz, detection and mitigation algorithms in a real-world movable robot. Experimental results confirm that RoboFuzzmakes a success rate of up to 93.3% in imposing concrete threats to the robot while the overall loss of work efficacy is merely 4.1% at the mitigation mode.

关键词Fuzzing Autonomous mobile robot Attack detection and mitigation Embedded systems
收录类别SCI ; EI ; SCIE
WOS研究方向Computer Science
WOS类目Computer Science, Hardware & Architecture ; Computer Science, Software Engineering
WOS记录号WOS:000612214600004
出版者ELSEVIER
WOS关键词SYSTEMS
原始文献类型Article
引用统计
正在获取...
文献类型期刊论文
条目标识符https://kms.shanghaitech.edu.cn/handle/2MSLDSTB/125914
专题信息科学与技术学院_PI研究组_王春东组
通讯作者Chattopadhyay, Sudipta
作者单位
1.ShanghaiTech Univ, Sch Informat Sci & Technol, Shanghai, Peoples R China;
2.Singapore Univ Technol & Design, Singapore, Singapore;
3.Natl Univ Singapore, Singapore, Singapore
第一作者单位信息科学与技术学院
第一作者的第一单位信息科学与技术学院
推荐引用方式
GB/T 7714
Wang, Chundong,Tok, Yee Ching,Poolat, Rohini,et al. How to secure autonomous mobile robots? An approach with fuzzing, detection and mitigation[J]. JOURNAL OF SYSTEMS ARCHITECTURE,2021,112:#VALUE!.
APA Wang, Chundong,Tok, Yee Ching,Poolat, Rohini,Chattopadhyay, Sudipta,&Elara, Mohan Rajesh.(2021).How to secure autonomous mobile robots? An approach with fuzzing, detection and mitigation.JOURNAL OF SYSTEMS ARCHITECTURE,112,#VALUE!.
MLA Wang, Chundong,et al."How to secure autonomous mobile robots? An approach with fuzzing, detection and mitigation".JOURNAL OF SYSTEMS ARCHITECTURE 112(2021):#VALUE!.
条目包含的文件
文件名称/大小 文献类型 版本类型 开放类型 使用许可
个性服务
查看访问统计
谷歌学术
谷歌学术中相似的文章
[Wang, Chundong]的文章
[Tok, Yee Ching]的文章
[Poolat, Rohini]的文章
百度学术
百度学术中相似的文章
[Wang, Chundong]的文章
[Tok, Yee Ching]的文章
[Poolat, Rohini]的文章
必应学术
必应学术中相似的文章
[Wang, Chundong]的文章
[Tok, Yee Ching]的文章
[Poolat, Rohini]的文章
相关权益政策
暂无数据
收藏/分享
所有评论 (0)
暂无评论
 

除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。