Secure Robotic Vehicles: Vulnerabilities and Mitigation Strategies

A. Hristozov, Eric Dietz, E.T. Matson, J. Gallagher, M. Rogers
{"title":"Secure Robotic Vehicles: Vulnerabilities and Mitigation Strategies","authors":"A. Hristozov, Eric Dietz, E.T. Matson, J. Gallagher, M. Rogers","doi":"10.1109/HST56032.2022.10025449","DOIUrl":null,"url":null,"abstract":"Robotic vehicles are becoming more widespread and used in many industries, including agriculture, manufacturing, and defense. They are safety-critical systems because of the fact that they are mobile, autonomous, and can operate in hazardous environments. The focus on robotic systems in the last several decades has been to add new complex functionality, in many cases using artificial intelligence. Many of these new technologies are fairly sophisticated and expose robotic vehicles to new vulnerabilities, especially when vehicles need to operate autonomously. Security and safety are connected and preventing intentional attacks on mobile robots improves safety and allows robots to complete their missions in challenging and hostile environments. In addition, robots that move can and need to adapt and counteract adversarial attacks and adapt to sensor and actuator faults. Robotic vehicles are also real-time systems; their ability to function is determined by their ability to maintain these characteristics all the time. In this work, we present the major classes of attacks on robotic vehicles and analyze the existing and propose some new mitigation strategies to counteract the attacks. Our scope is on robotic vehicles in general, with a specialized focus on UAVs as a class of vehicles receiving more attention and presenting significant security challenges. We discuss strategies based on simplex architecture, enforcers, partitioning, redundancy, self-adaptation, and dynamic architectures during run-time.","PeriodicalId":162426,"journal":{"name":"2022 IEEE International Symposium on Technologies for Homeland Security (HST)","volume":"420 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE International Symposium on Technologies for Homeland Security (HST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/HST56032.2022.10025449","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Robotic vehicles are becoming more widespread and used in many industries, including agriculture, manufacturing, and defense. They are safety-critical systems because of the fact that they are mobile, autonomous, and can operate in hazardous environments. The focus on robotic systems in the last several decades has been to add new complex functionality, in many cases using artificial intelligence. Many of these new technologies are fairly sophisticated and expose robotic vehicles to new vulnerabilities, especially when vehicles need to operate autonomously. Security and safety are connected and preventing intentional attacks on mobile robots improves safety and allows robots to complete their missions in challenging and hostile environments. In addition, robots that move can and need to adapt and counteract adversarial attacks and adapt to sensor and actuator faults. Robotic vehicles are also real-time systems; their ability to function is determined by their ability to maintain these characteristics all the time. In this work, we present the major classes of attacks on robotic vehicles and analyze the existing and propose some new mitigation strategies to counteract the attacks. Our scope is on robotic vehicles in general, with a specialized focus on UAVs as a class of vehicles receiving more attention and presenting significant security challenges. We discuss strategies based on simplex architecture, enforcers, partitioning, redundancy, self-adaptation, and dynamic architectures during run-time.
安全机器人车辆:漏洞和缓解策略
机器人车辆正变得越来越广泛,并在许多行业中使用,包括农业、制造业和国防。它们是安全关键系统,因为它们是移动的、自主的,并且可以在危险环境中运行。在过去的几十年里,机器人系统的焦点一直是增加新的复杂功能,在许多情况下使用人工智能。许多新技术都相当复杂,使机器人车辆暴露在新的漏洞中,特别是当车辆需要自主操作时。安全和安全是相互联系的,防止对移动机器人的故意攻击提高了安全性,并使机器人能够在具有挑战性和敌意的环境中完成任务。此外,移动的机器人可以并且需要适应和抵消对抗性攻击,并适应传感器和执行器故障。机器人车辆也是实时系统;它们的功能是由它们一直保持这些特征的能力决定的。在这项工作中,我们介绍了针对机器人车辆的主要攻击类别,并分析了现有的攻击,并提出了一些新的缓解策略来抵消这些攻击。我们的范围是一般的机器人车辆,专门关注无人机作为一类车辆,受到更多的关注,并提出重大的安全挑战。我们将在运行时讨论基于简单体系结构、执行者、分区、冗余、自适应和动态体系结构的策略。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信