2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) 2018
DOI: 10.1109/dsn.2018.00065
|View full text |Cite
|
Sign up to set email alerts
|

RoboADS: Anomaly Detection Against Sensor and Actuator Misbehaviors in Mobile Robots

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
20
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 40 publications
(23 citation statements)
references
References 21 publications
0
20
0
Order By: Relevance
“…Daniel et al [ 62 ], as another example, uses a radar, a lidar, and a stereo camera under foggy conditions. Other publications like Choi et al [ 46 ] and Guo et al [ 43 ] describe how to suppress security attacks by comparing between sensors of different types.…”
Section: Literature Survey On Fdiir Methods For Automotive Lidarmentioning
confidence: 99%
“…Daniel et al [ 62 ], as another example, uses a radar, a lidar, and a stereo camera under foggy conditions. Other publications like Choi et al [ 46 ] and Guo et al [ 43 ] describe how to suppress security attacks by comparing between sensors of different types.…”
Section: Literature Survey On Fdiir Methods For Automotive Lidarmentioning
confidence: 99%
“…To address the severe cyber-physical security issues, active work is on monitoring the robot behavior to detect attacks at the robot level. Guo et al investigate the robot misbehaviors originated from a variety of sources [7]. They propose to use a robot anomaly detection system to counteract various mobile robot attacks/failures, which exhibit either sensor or actuator misbehaviors.…”
Section: Related Workmentioning
confidence: 99%
“…We focus on the adversaries, whose goal is to hijack the robotic arm or impersonate the target user to control it for gaining higher control privileges, causing physical damages and achieving the repudiation of performing malicious tasks. These attacks could evade the existing anomaly detection methods [7], because an adversary could control the robotic arm to do valid tasks (e.g., grasping), which may not show any anomalies at the robotic arm. As most robot systems require login authentication, we assume the adversary has obtained the user's login credentials and gained access to the robotic arm to perform various control tasks.…”
Section: Threat Modelmentioning
confidence: 99%
“…For linear systems in (1) with Gaussian additive noises w k , v G k , and v I k , state estimations of the standard Kalman filter (KF) are Gaussian as well. Through this observation, the χ 2 statistical test is widely used in attack detection, Teixeira et al (2010); Mo et al (2014); Guo et al (2018), to distinguish whether the error is induced by statistical noises or attacks. In particular, the χ 2 test has two hypothesis:…”
Section: χ 2 Attack Detectormentioning
confidence: 99%