The emergence of robotic technologies has made a significant contribution in industry. Robot Operating System (ROS) is becoming a standard framework for industrial systems uses as a middleware system with many versions. However, the initial design of ROS does not include cyber-security concepts. The intense interest in robot systems, the security concerns and vulnerabilities of these systems have started to attract the attention of attackers. One of these attacks is DoS attack that targeting system availability by slowing down or crashing a service rather than obtaining the information or system. In this study, the impact of DoS attack has been analyzed in various scenarios for both in application and transport layer of the ROS middleware. In the experiments four different volume of DoS attacks are performed in five different experiment scenarios on ROS. To understand the impact of DoS attack, network traffics are monitored using Wireshark. The resulting effects measured with some Quality of Service parameters that are delay and packet loss.
With the novel developments in Wireless Sensor Network (WSN) technologies, environmental data collection and processing services are applied in diverse industrial and scientific areas. However, energy limitations and vulnerabilities of WSN nodes are still the main drawbacks of technological developments in the area. Understanding the energy utilization patterns of nodes helps to detect abnormal node behaviors and prevent malicious nodes. In this study, we observe the energy utilization behaviors of nodes and found that nodes have distinctive activity patterns based on their types. We also found that source, sink, and relay nodes on the data propagation path have higher energy consumption patterns compared to other nodes
Robotic systems are widely used in industry, agriculture, the inspection of infrastructure, and even in our daily lives. The safety and security of robotic systems have become a primary concern as their interaction with humans increases. In this context, attacks on robotic systems have increased for diversified field applications. It is necessary to accurately detect these abnormal events in these systems as soon as possible. However, these systems also need a runtime verification approach on whether they conform to the established specifications. In this study, runtime verification for anomaly detection methods is proposed for the security of the robot operating system (ROS). Firstly, an anomaly detection method is proposed to detect unexpected situations, such as the number of the received packages being decreased under DoS attacks. Then, a holistic runtime verification architecture is proposed for the anomaly detection method. This architecture consists of three major entities: a verification device, an attacker device, and a robotic platform without losing generality. In the verification device, ROSMonitoring and Oracle are used to implement runtime verification. The proposed architecture is verified through an experimental setup. It is shown that the architecture can be used for runtime verification of different anomaly detection algorithms. A discussion on the security of robotic systems is also presented.
Due to the failure-prone and vulnerable structure of WSN nodes, understanding the typical activity patterns of nodes helps identify the faulty and malicious node activities and differentiate normal node behaviors from abnormal node behaviors. In this study, for understanding the typical node activities, we observe the effects of the network load on energy consumption, packet throughput, and latency parameters. We run simulations of networks with a variable number of sinks up to 5 in a network of various sizes. We observed a growth in the network load as the source and sink node request activities increased. We found that increasing the number of sinks affects the overall network load and causes communication delays between the source and sink node.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.