Skip to main content

2018 | OriginalPaper | Buchkapitel

Inter-device Sensor-Fusion for Action Authorization on Industrial Mobile Robots

verfasst von : Sarah Haas, Andrea Höller, Thomas Ulz, Christian Steger

Erschienen in: Computer Safety, Reliability, and Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Usage of mobile robots in industry increased significantly in recent years. However, mobile robots introduce additional safety issues for human workforce and pose a higher risk of failures in production due to possible abnormal robot behavior. Such abnormal behavior could, among other things, be caused by security weaknesses that entail attacks. These problems lead to a need for action authorization mechanisms to protect humans and mitigate possible costly failures. In this paper, we propose an authorization mechanism for critical actuator actions on industrial mobile robots. The mechanism relies on security principles that prevent adversaries from unauthorized action execution. To the best knowledge of the authors, no similar concept for secured action authorization for industrial mobile robots is currently known in research. Our evaluation shows more than 80% of additional safety hazard causes introduced by the lack of security can be mitigated with the proposed authorization mechanism.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat ISO/IEC 11889-1 Trusted platform module library - Part 1: Architecture, August 2015 ISO/IEC 11889-1 Trusted platform module library - Part 1: Architecture, August 2015
2.
Zurück zum Zitat Robotic Industries Association: ANSI/RIA R15.06-2012 AmericanNational Standard for Industrial Robots and Robot Systems - Safety Requirements. Technical report (2013) Robotic Industries Association: ANSI/RIA R15.06-2012 AmericanNational Standard for Industrial Robots and Robot Systems - Safety Requirements. Technical report (2013)
3.
Zurück zum Zitat Bartos, R.J.: System safety analysis of an autonomous mobile robot. Technical report, Fernald Environmental Restoration Management Corp., Cincinnati, OH (United States). Fernald Environmental Management Project (1994) Bartos, R.J.: System safety analysis of an autonomous mobile robot. Technical report, Fernald Environmental Restoration Management Corp., Cincinnati, OH (United States). Fernald Environmental Management Project (1994)
5.
Zurück zum Zitat Cirani, S., Picone, M., Gonizzi, P., Veltri, L., Ferrari, G.: IoT-OAS: an OAuth-based authorization service architecture for secure services in IoT scenarios. IEEE Sens. J. 15(2), 1224–1234 (2015)CrossRef Cirani, S., Picone, M., Gonizzi, P., Veltri, L., Ferrari, G.: IoT-OAS: an OAuth-based authorization service architecture for secure services in IoT scenarios. IEEE Sens. J. 15(2), 1224–1234 (2015)CrossRef
6.
Zurück zum Zitat Fraser, B.Y.: Site Security Handbook (1997). RFC2196 Fraser, B.Y.: Site Security Handbook (1997). RFC2196
7.
Zurück zum Zitat Gonçalves, J., Lima, J., Oliveira, H., Costa, P.: Sensor and actuator modeling of a realistic wheeled mobile robot simulator. In: IEEE International Conference on Emerging Technologies and Factory Automation, ETFA 2008, pp. 980–985. IEEE (2008) Gonçalves, J., Lima, J., Oliveira, H., Costa, P.: Sensor and actuator modeling of a realistic wheeled mobile robot simulator. In: IEEE International Conference on Emerging Technologies and Factory Automation, ETFA 2008, pp. 980–985. IEEE (2008)
8.
Zurück zum Zitat Grieco, L.A., et al.: IoT-aided robotics applications: technological implications, target domains and open issues. Comput. Commun. 54, 32–47 (2014)CrossRef Grieco, L.A., et al.: IoT-aided robotics applications: technological implications, target domains and open issues. Comput. Commun. 54, 32–47 (2014)CrossRef
9.
Zurück zum Zitat Hall, D.L., Llinas, J.: An introduction to multisensor data fusion. Proc. IEEE 85(1), 6–23 (1997)CrossRef Hall, D.L., Llinas, J.: An introduction to multisensor data fusion. Proc. IEEE 85(1), 6–23 (1997)CrossRef
10.
Zurück zum Zitat Haller, N.: The S/KEY One-Time Password System (1995). RFC 1760 Haller, N.: The S/KEY One-Time Password System (1995). RFC 1760
11.
Zurück zum Zitat He, H., et al.: The security challenges in the IoT enabled cyber-physical systems and opportunities for evolutionary computing other computational intelligence. In: 2016 IEEE Congress on Evolutionary Computation (CEC), pp. 1015–1021, July 2016 He, H., et al.: The security challenges in the IoT enabled cyber-physical systems and opportunities for evolutionary computing other computational intelligence. In: 2016 IEEE Congress on Evolutionary Computation (CEC), pp. 1015–1021, July 2016
12.
Zurück zum Zitat Kam, M., Zhu, X., Kalata, P.: Sensor fusion for mobile robot navigation. Proc. IEEE 85(1), 108–119 (1997)CrossRef Kam, M., Zhu, X., Kalata, P.: Sensor fusion for mobile robot navigation. Proc. IEEE 85(1), 108–119 (1997)CrossRef
13.
Zurück zum Zitat Kim, J.H., Keller, B., Lattimer, B.Y.: Sensor fusion based seek-and-find fire algorithm for intelligent firefighting robot. In: 2013 IEEE/ASME International Conference on Advanced Intelligent Mechatronics, pp. 1482–1486, July 2013 Kim, J.H., Keller, B., Lattimer, B.Y.: Sensor fusion based seek-and-find fire algorithm for intelligent firefighting robot. In: 2013 IEEE/ASME International Conference on Advanced Intelligent Mechatronics, pp. 1482–1486, July 2013
14.
Zurück zum Zitat Lamport, L.: Password authentication with insecure communication. Commun. ACM 24(11), 770–772 (1981)CrossRef Lamport, L.: Password authentication with insecure communication. Commun. ACM 24(11), 770–772 (1981)CrossRef
15.
Zurück zum Zitat Line, M.B., Nordland, O., Røstad, L., Tøndel, I.A.: Safety vs security? In: Proceedings of 8th International Conference on Probabilistic Safety Assessment and Management (PSAM 2006), New Orleans, USA (2006) Line, M.B., Nordland, O., Røstad, L., Tøndel, I.A.: Safety vs security? In: Proceedings of 8th International Conference on Probabilistic Safety Assessment and Management (PSAM 2006), New Orleans, USA (2006)
16.
Zurück zum Zitat Lynen, S., Achtelik, M.W., Weiss, S., Chli, M., Siegwart, R.: A robust and modular multi-sensor fusion approach applied to MAV navigation. In: 2013 IEEE/RSJ International Conference on Intelligent Robots and Systems, pp. 3923–3929, November 2013 Lynen, S., Achtelik, M.W., Weiss, S., Chli, M., Siegwart, R.: A robust and modular multi-sensor fusion approach applied to MAV navigation. In: 2013 IEEE/RSJ International Conference on Intelligent Robots and Systems, pp. 3923–3929, November 2013
18.
Zurück zum Zitat Mirzamohammadi, S., Chen, J.A., Sani, A.A., Mehrotra, S., Tsudik, G.: Ditio: trustworthy auditing of sensor activities in mobile & IoT devices. In: Proceedings of the 15th ACM Conference on Embedded Network Sensor Systems, p. 14. ACM (2017) Mirzamohammadi, S., Chen, J.A., Sani, A.A., Mehrotra, S., Tsudik, G.: Ditio: trustworthy auditing of sensor activities in mobile & IoT devices. In: Proceedings of the 15th ACM Conference on Embedded Network Sensor Systems, p. 14. ACM (2017)
19.
Zurück zum Zitat M’Raihi, D., Bellare, M., Hoornaert, F., Naccache, D., Ranen, O.: HOTP: an HMAC-based one-time password algorithm. Technical report (2005) M’Raihi, D., Bellare, M., Hoornaert, F., Naccache, D., Ranen, O.: HOTP: an HMAC-based one-time password algorithm. Technical report (2005)
20.
Zurück zum Zitat Myagmar, S., Lee, A.J., Yurcik, W.: Threat modeling as a basis for security requirements. In: Symposium on Requirements Engineering for Information Security (SREIS), vol. 2005, pp. 1–8. Citeseer (2005) Myagmar, S., Lee, A.J., Yurcik, W.: Threat modeling as a basis for security requirements. In: Symposium on Requirements Engineering for Information Security (SREIS), vol. 2005, pp. 1–8. Citeseer (2005)
21.
Zurück zum Zitat Niemueller, T., Ewert, D., Reuter, S., Ferrein, A., Jeschke, S., Lakemeyer, G.: RoboCup logistics league sponsored by festo: a competitive factory automation testbed. In: Jeschke, S., Isenhardt, I., Hees, F., Henning, K. (eds.) Automation, Communication and Cybernetics in Science and Engineering 2015/2016, pp. 605–618. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-42620-4_45CrossRef Niemueller, T., Ewert, D., Reuter, S., Ferrein, A., Jeschke, S., Lakemeyer, G.: RoboCup logistics league sponsored by festo: a competitive factory automation testbed. In: Jeschke, S., Isenhardt, I., Hees, F., Henning, K. (eds.) Automation, Communication and Cybernetics in Science and Engineering 2015/2016, pp. 605–618. Springer, Cham (2016). https://​doi.​org/​10.​1007/​978-3-319-42620-4_​45CrossRef
22.
Zurück zum Zitat Pfitzner, C., et al.: 3D Multi-sensor data fusion for object localization in industrial applications. In: 41st International Symposium on Robotics, ISR/Robotik 2014, pp. 1–6, June 2014 Pfitzner, C., et al.: 3D Multi-sensor data fusion for object localization in industrial applications. In: 41st International Symposium on Robotics, ISR/Robotik 2014, pp. 1–6, June 2014
24.
Zurück zum Zitat Rezvani, M., Ignjatovic, A., Bertino, E., Jha, S.: Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks. IEEE Trans. Dependable Secure Comput. 12(1), 98–110 (2015)CrossRef Rezvani, M., Ignjatovic, A., Bertino, E., Jha, S.: Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks. IEEE Trans. Dependable Secure Comput. 12(1), 98–110 (2015)CrossRef
25.
Zurück zum Zitat Sun, W., Yu, S., Lou, W., Hou, Y.T., Li, H.: Protecting your right: attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. In: 2014 Proceedings IEEE, INFOCOM, pp. 226–234. IEEE (2014) Sun, W., Yu, S., Lou, W., Hou, Y.T., Li, H.: Protecting your right: attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. In: 2014 Proceedings IEEE, INFOCOM, pp. 226–234. IEEE (2014)
26.
Zurück zum Zitat Yi, X., Bouguettaya, A., Georgakopoulos, D., Song, A., Willemson, J.: Privacy protection for wireless medical sensor data. IEEE Trans. Dependable Secure Comput. 13(3), 369–380 (2016)CrossRef Yi, X., Bouguettaya, A., Georgakopoulos, D., Song, A., Willemson, J.: Privacy protection for wireless medical sensor data. IEEE Trans. Dependable Secure Comput. 13(3), 369–380 (2016)CrossRef
27.
Zurück zum Zitat Zuehlke, D.: SmartFactory-towards a factory-of-things. Ann. Rev. Control 34(1), 129–138 (2010)CrossRef Zuehlke, D.: SmartFactory-towards a factory-of-things. Ann. Rev. Control 34(1), 129–138 (2010)CrossRef
Metadaten
Titel
Inter-device Sensor-Fusion for Action Authorization on Industrial Mobile Robots
verfasst von
Sarah Haas
Andrea Höller
Thomas Ulz
Christian Steger
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-99130-6_19