Runtime Verification for Anomaly Detection of Robotic Systems Security

被引:7
|
作者
Kirca, Yunus Sabri [1 ]
Degirmenci, Elif [1 ]
Demirci, Zekeriyya [2 ]
Yazici, Ahmet [1 ]
Ozkan, Metin [1 ]
Ergun, Salih [3 ]
Kanak, Alper [3 ]
机构
[1] Eskisehir Osmangazi Univ, Dept Comp Engn, TR-26048 Eskisehir, Turkiye
[2] Eskisehir Osmangazi Univ, Dept Software Engn, TR-26048 Eskisehir, Turkiye
[3] ERARGE Ergunler Co Ltd, R&D Ctr, TR-34768 Istanbul, Turkiye
关键词
runtime verification; ROS; anomaly detection; security;
D O I
10.3390/machines11020166
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Robotic systems are widely used in industry, agriculture, the inspection of infrastructure, and even in our daily lives. The safety and security of robotic systems have become a primary concern as their interaction with humans increases. In this context, attacks on robotic systems have increased for diversified field applications. It is necessary to accurately detect these abnormal events in these systems as soon as possible. However, these systems also need a runtime verification approach on whether they conform to the established specifications. In this study, runtime verification for anomaly detection methods is proposed for the security of the robot operating system (ROS). Firstly, an anomaly detection method is proposed to detect unexpected situations, such as the number of the received packages being decreased under DoS attacks. Then, a holistic runtime verification architecture is proposed for the anomaly detection method. This architecture consists of three major entities: a verification device, an attacker device, and a robotic platform without losing generality. In the verification device, ROSMonitoring and Oracle are used to implement runtime verification. The proposed architecture is verified through an experimental setup. It is shown that the architecture can be used for runtime verification of different anomaly detection algorithms. A discussion on the security of robotic systems is also presented.
引用
收藏
页数:14
相关论文
共 50 条
  • [21] Runtime monitors as sensors of security systems
    Department of Computer Science, University of Memphis, Memphis, TN-38152, United States
    Proc. IASTED INt. Conf. Parall. Distrib. Comput. Syst., (49-58):
  • [22] Protocol anomaly detection and verification
    Yoo, IS
    PROCEEDINGS FROM THE FIFTH IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP, 2004, : 74 - 81
  • [23] RV4JaCa-Towards Runtime Verification of Multi-Agent Systems and Robotic Applications
    Engelmann, Debora C. C.
    Ferrando, Angelo
    Panisson, Alison R. R.
    Ancona, Davide
    Bordini, Rafael H. H.
    Mascardi, Viviana
    ROBOTICS, 2023, 12 (02)
  • [24] A Bayesian model for anomaly detection in SQL databases for security systems
    Drugan, Madalina M.
    PROCEEDINGS OF 2016 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (SSCI), 2016,
  • [25] Rule Systems for Runtime Verification: A Short Tutorial
    Barringer, Howard
    Havelund, Klaus
    Rydeheard, David
    Groce, Alex
    RUNTIME VERIFICATION, 2009, 5779 : 1 - +
  • [26] Runtime Verification of Component-Based Systems
    Falcone, Ylies
    Jaber, Mohamad
    Thanh-Hung Nguyen
    Bozga, Marius
    Bensalem, Saddek
    SOFTWARE ENGINEERING AND FORMAL METHODS, 2011, 7041 : 204 - +
  • [27] Verification and Runtime Assurance for Dynamical Systems with Uncertainty
    Abate, Matthew
    Mote, Mark
    Feron, Eric
    Coogan, Samuel
    HSCC2021: PROCEEDINGS OF THE 24TH INTERNATIONAL CONFERENCE ON HYBRID SYSTEMS: COMPUTATION AND CONTROL (PART OF CPS-IOT WEEK), 2021,
  • [28] Runtime monitoring and verification of systems with hidden information
    Drusinsky, Doron
    INNOVATIONS IN SYSTEMS AND SOFTWARE ENGINEERING, 2014, 10 (02) : 123 - 136
  • [29] Runtime verification and validation of functional reactive systems
    Perez, Ivan
    Nilsson, Henrik
    JOURNAL OF FUNCTIONAL PROGRAMMING, 2020, 30
  • [30] Distributed Runtime Verification of JADE Multiagent Systems
    Briola, Daniela
    Mascardi, Viviana
    Ancona, Davide
    INTELLIGENT DISTRIBUTED COMPUTING VIII, 2015, 570 : 81 - 91