Title | ||
---|---|---|
How to secure autonomous mobile robots? An approach with fuzzing, detection and mitigation |
Abstract | ||
---|---|---|
Autonomous mobile robots share social spaces with humans, usually working together for domestic or professional tasks. Cyber security breaches in such robots undermine the trust between humans and robots. In this paper, we investigate how to apprehend and inflict security threats at the design and implementation stage of an autonomous mobile robot. To this end, we leverage the idea of directed fuzzing and design RoboFuzzthat systematically tests an autonomous mobile robot in line with the robot’s states and the surrounding environment. The methodology of RoboFuzzis to study critical environmental parameters affecting the robot’s state transitions and subject the robot control program with rational but harmful sensor values so as to compromise the robot. Furthermore, we develop detection and mitigation algorithms to counteract the impact of RoboFuzz. The difficulties mainly lie in the trade-off among limited computation resources, timely detection and the retention of work efficiency in mitigation. In particular, we propose detection and mitigation methods that take advantage of historical records of obstacles to detect inconsistent obstacle appearances regarding untrustworthy sensor values and navigate the movable robot to continue moving so as to carry on a planned task. By doing so, we manage to maintain a low cost for detection and mitigation but also retain the robot’s work efficacy. We have prototyped the bundle of RoboFuzz, detection and mitigation algorithms in a real-world movable robot. Experimental results confirm that RoboFuzzmakes a success rate of up to 93.3% in imposing concrete threats to the robot while the overall loss of work efficacy is merely 4.1% at the mitigation mode. |
Year | DOI | Venue |
---|---|---|
2021 | 10.1016/j.sysarc.2020.101838 | Journal of Systems Architecture |
Keywords | DocType | Volume |
Fuzzing,Autonomous mobile robot,Attack detection and mitigation,Embedded systems | Journal | 112 |
ISSN | Citations | PageRank |
1383-7621 | 0 | 0.34 |
References | Authors | |
0 | 5 |
Name | Order | Citations | PageRank |
---|---|---|---|
Chundong Wang | 1 | 56 | 4.35 |
Yee Ching Tok | 2 | 0 | 0.34 |
Rohini Poolat | 3 | 0 | 0.34 |
Sudipta Chattopadhyay | 4 | 277 | 21.09 |
Rajesh Elara Mohan | 5 | 89 | 42.67 |