2014 IEEE International Conference on Pervasive Computing and Communication Workshops (PERCOM WORKSHOPS) 2014
DOI: 10.1109/percomw.2014.6815228
|View full text |Cite
|
Sign up to set email alerts
|

Physical indicators of cyber attacks against a rescue robot

Abstract: Abstract-Responding to an emergency situation is a challenging and time critical procedure. The primary goal is to save lives and this is directly related to the speed and efficiency at which help is provided to the victims. Rescue robots are able to benefit an emergency response procedure by searching for survivors, providing access to inaccessible areas and establishing an on-site communication network. This paper investigates how a cyber attack on a rescue robot can adversely affect its operation and impair… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
23
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
3
3
2

Relationship

4
4

Authors

Journals

citations
Cited by 25 publications
(23 citation statements)
references
References 15 publications
0
23
0
Order By: Relevance
“…Rules can also be determined through a more automated learning phase without the involvement of a human expert: The vehicle is subjected to a series of different attacks, observing their impact and training a machine learning system to recognise these. Examples of such supervised learning approaches for the detection of attacks against robotic vehicles can be found in [6], [7], [8], where the rules are formed by a decision tree, which takes into account both cyber and physical features. Realtime capture of an attack's physical impact, such as vibration of the chassis due to repetitively entering and existing safe mode during a denial of service attack, has been shown to improve detection accuracy and latency.…”
Section: Related Workmentioning
confidence: 99%
“…Rules can also be determined through a more automated learning phase without the involvement of a human expert: The vehicle is subjected to a series of different attacks, observing their impact and training a machine learning system to recognise these. Examples of such supervised learning approaches for the detection of attacks against robotic vehicles can be found in [6], [7], [8], where the rules are formed by a decision tree, which takes into account both cyber and physical features. Realtime capture of an attack's physical impact, such as vibration of the chassis due to repetitively entering and existing safe mode during a denial of service attack, has been shown to improve detection accuracy and latency.…”
Section: Related Workmentioning
confidence: 99%
“…based on Petri Nets [14], or based on the knowledge of what impact a particular attack has on a particular robot, as in [7]. Our focus here is on a standalone robot, which does not have the opportunity to share information or collaborate with other robots to detect attacks.…”
Section: Related Workmentioning
confidence: 99%
“…It may head towards the wrong direction, be delayed, be forced to shut down, continue blindly, physically jitter [7] etc. Here, we take a more detailed look on the physical impact of different cyber attacks, including denial of service, command injection, and two types of malware infection.…”
Section: Introductionmentioning
confidence: 99%
“…In our previous work [7], we have identified the need for a robust classification method for behavioural characteristics of a robotic vehicle under attack using both physical and cyber input features. Towards this goal, we start our investigation with a knowledge-based approach, which depends on the existence of a known attack pattern.…”
Section: Intrusion Detection Using Decision Treesmentioning
confidence: 99%
“…This is more so for vehicles that are not autonomous but controlled by a user over a communication channel. In previous research, we have identified that, depending on implementation approach and attack type, a robot under a denial of service attack on its communication channel might be forced to shut down, to continue moving blindly, to jitter, or to delay changing direction [7], [8] etc. Here, we try to make use of these physical manifestations of two practically usable cyber attacks [9]: denial of service and command injection to investigate whether we can use them meaningfully as part of an on-board intrusion detection system.…”
Section: Introductionmentioning
confidence: 99%