Runtime Verification for Anomaly Detection of Robotic Systems Security

被引:7
|
作者
Kirca, Yunus Sabri [1 ]
Degirmenci, Elif [1 ]
Demirci, Zekeriyya [2 ]
Yazici, Ahmet [1 ]
Ozkan, Metin [1 ]
Ergun, Salih [3 ]
Kanak, Alper [3 ]
机构
[1] Eskisehir Osmangazi Univ, Dept Comp Engn, TR-26048 Eskisehir, Turkiye
[2] Eskisehir Osmangazi Univ, Dept Software Engn, TR-26048 Eskisehir, Turkiye
[3] ERARGE Ergunler Co Ltd, R&D Ctr, TR-34768 Istanbul, Turkiye
关键词
runtime verification; ROS; anomaly detection; security;
D O I
10.3390/machines11020166
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Robotic systems are widely used in industry, agriculture, the inspection of infrastructure, and even in our daily lives. The safety and security of robotic systems have become a primary concern as their interaction with humans increases. In this context, attacks on robotic systems have increased for diversified field applications. It is necessary to accurately detect these abnormal events in these systems as soon as possible. However, these systems also need a runtime verification approach on whether they conform to the established specifications. In this study, runtime verification for anomaly detection methods is proposed for the security of the robot operating system (ROS). Firstly, an anomaly detection method is proposed to detect unexpected situations, such as the number of the received packages being decreased under DoS attacks. Then, a holistic runtime verification architecture is proposed for the anomaly detection method. This architecture consists of three major entities: a verification device, an attacker device, and a robotic platform without losing generality. In the verification device, ROSMonitoring and Oracle are used to implement runtime verification. The proposed architecture is verified through an experimental setup. It is shown that the architecture can be used for runtime verification of different anomaly detection algorithms. A discussion on the security of robotic systems is also presented.
引用
收藏
页数:14
相关论文
共 50 条
  • [31] Towards runtime verification of collaborative embedded systems
    Akili, Samira
    Lorenz, Felix
    SICS SOFTWARE-INTENSIVE CYBER-PHYSICAL SYSTEMS, 2019, 34 (04): : 225 - 236
  • [32] A Novel Runtime Verification Solution for IoT Systems
    Incki, Koray
    Ari, Ismail
    IEEE ACCESS, 2018, 6 : 13501 - 13512
  • [33] Runtime Verification of Autonomous Driving Systems in CARLA
    Zapridou, Eleni
    Bartocci, Ezio
    Katsaros, Panagiotis
    RUNTIME VERIFICATION (RV 2020), 2020, 12399 : 172 - 183
  • [34] Runtime security verification for itinerary-driven mobile agents
    Yang, Zijiang
    Lu, Shiyong
    Yang, Ping
    DASC 2006: 2ND IEEE INTERNATIONAL SYMPOSIUM ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2006, : 177 - +
  • [35] LTL-based runtime verification framework for cyber-attack anomaly prediction in cyber–physical systems
    Akande, Ayodeji James
    Hou, Zhe
    Foo, Ernest
    Li, Qinyi
    Computers and Security, 2025, 155
  • [36] Robotic security systems
    Everett, HR
    IEEE INSTRUMENTATION & MEASUREMENT MAGAZINE, 2003, 6 (04) : 30 - 34
  • [37] Runtime security monitoring by an interplay between rule matching and deep learning-based anomaly detection on logs
    Antic, Jan
    Costa, Joao Pita
    Cernivec, Ales
    Cankar, Matija
    Martincic, Tomaz
    Potocnik, Aljaz
    Ratkajec, Hrvoje
    Elguezabal, Gorka Benguria
    Laligou, Nelly
    Lakka, Alexandra
    Boigues, Ismael Torres
    Morte, Eliseo Villanueva
    2023 19TH INTERNATIONAL CONFERENCE ON THE DESIGN OF RELIABLE COMMUNICATION NETWORKS, DRCN, 2023,
  • [38] Interaction-based Runtime Verification for Systems of Systems Integration
    Krueger, Ingolf H.
    Meisinger, Michael
    Menarini, Massimiliano
    JOURNAL OF LOGIC AND COMPUTATION, 2010, 20 (03) : 725 - 742
  • [39] Anomaly Detection for Soft Security in Cloud based Auditing of Accounting Systems
    Neovius, Mats
    Duncan, Bob
    CLOSER: PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND SERVICES SCIENCE, 2017, : 471 - 478
  • [40] Runtime Verification of Operating Systems Based on Abstract Models
    Efremov, D. V.
    Kopach, V. V.
    Kornykhin, E. V.
    Kuliamin, V. V.
    Petrenko, A. K.
    Khoroshilov, A. V.
    Shchepetkov, I. V.
    PROGRAMMING AND COMPUTER SOFTWARE, 2023, 49 (07) : 559 - 565