journal article
Aug 16, 2021
Cybersecurity in Robotics: Challenges, Quantitative Modeling, and Practice
Abstract
Robotics is becoming more and more ubiquitous, but the pressure to bring systems to market occasionally goes at the cost of neglecting security mechanisms during the development, deployment or while in production. As a result, contemporary robotic systems are vulnerable to diverse attack patterns, and an a posteriori hardening is at least challenging, if not impossible at all. This book aims to stipulate the inclusion of security in robotics from the earliest design phases onward and with a special focus on the cost-benefit tradeoff that can otherwise be an inhibitor for the fast development of affordable systems. We advocate quantitative methods of security management and design, covering vulnerability scoring systems tailored to robotic systems, and accounting for the highly distributed nature of robots as an interplay of potentially very many components. A powerful quantitative approach to model-based security is offered by game theory, providing a rich spectrum of techniques to optimize security against various kinds of attacks. Such a multi-perspective view on security is necessary to address the heterogeneity and complexity of robotic systems. This book is intended as an accessible starter for the theoretician and practitioner working in the field.
Topics
No keywords indexed for this article. Browse by subject →
References
187
[1]
Aghassi Mathematical Programming (2006) 10.1007/s10107-005-0686-0
[2]
Alias Robotics "Red Teaming ROS-Industrial, extended version" (2020)
[3]
Alpcan "“A game theoretic analysis of intrusion detection in access control systems”." Decision and Control, 2004. CDC. 43rd IEEE Conference on (2004)
[4]
Alzahrani "“Towards True Decentralization: A Blockchain Consensus Protocol Based on Game Theory and Randomness”." Decision and Game Theory for Security (2018) 10.1007/978-3-030-01554-1_27
[5]
Basak "“An initial study of targeted personality models in the flipit game”." International conference on decision and game theory for security (2018) 10.1007/978-3-030-01554-1_36
[6]
Basar "“The Gaussian test channel with an intelligent jammer”" IEEE Transactions on Information Theory (1983) 10.1109/tit.1983.1056602
[7]
Başar (1999)
[8]
Bianchin "“Secure Navigation of Robots in Adversarial Environments”." IEEE Control Systems Letters (2020) 10.1109/lcsys.2019.2921753
[9]
Bolot "“Cyber Insurance as an Incentivefor Internet Security”" Managing information risk and the economics of security (2009) 10.1007/978-0-387-09762-6_13
[10]
Boumkheld "“Honeypot Type Selection Games for Smart Grid Networks”" Decision and Game Theory for Security (2019)
[11]
Canzani "“Risk Management in (Cyber-) Terrorism: Modeling Insights and Perspectives”" Countering Terrorist Activities in Cyberspace (2018)
[12]
Carroll "“A game theoretic investigation of deception in network security”" Security and Communication Networks (2011) 10.1002/sec.242
[13]
Casey "“Compliance signaling games: toward modeling the deterrence of insider threats”" Computational and Mathematical Organization Theory (2016) 10.1007/s10588-016-9221-5
[14]
Chauveau "“Subjective risk and disappointment”." Documents de travail du Centre d’Economie de la Sorbonne (2012)
[15]
Chen "“Heterogeneous multi-layer adversarial network design for the IoT-enabled infrastructures”" GLOBECOM 2017-2017 IEEE Global Communications Conference (2017)
[16]
Chen "“A dynamic game approach to strategic design of secure and resilient infrastructure network”." IEEE Transactions on Information Forensics and Security (2019) 10.1109/tifs.2019.2924130
[17]
Chen "“Optimal Secure Two-Layer IoT Network Design”" IEEE Transactions on Control of Network Systems (2019)
[18]
Chen "“Interdependent Network Formation Games”." arXiv preprint arXiv:1602.07745 (2016)
[19]
Chen "“Interdependent network formation games with an application to critical infrastructures”." American Control Conference (ACC), 2016 (2016) 10.1109/acc.2016.7525354
[20]
Chen "“Optimal Contract Design Under Asymmetric Information for Cloud-Enabled Internet of Controlled Things”" International Conference on Decision and Game Theory for Security (2016)
[21]
Chen "“Optimal contract design under asymmetric information for cloud-enabled internet of controlled things”" International Conference on Decision and Game Theory for Security (2016)
[22]
Chen "“Resilient and decentralized control of multi-level cooperative mobile networks to maintain connectivity under adversarial environment”" IEEE Conference on Decision and Control (CDC) (2016)
[23]
Chen "“Interdependent strategic cyber defense and robust switching control design for wind energy systems”" 2017 IEEE Power & Energy Society General Meeting (2017)
[24]
Chen A Game-and Decision-Theoretic Approach to Resilient Interdependent Network Analysis and Design (2019)
[25]
Chen "“Control of multi-layer mobile autonomous systems in adversarial environments: A games-in-games approach”" IEEE Transactions on Control of Network Systems, submitted (2019)
[26]
Choudhury AES Galois Counter Mode (GCM) Cipher Suites for TLS (2008)
[27]
Cichy "“An Overview of Data Quality Frameworks”." IEEE Access (2019) 10.1109/access.2019.2899751
[28]
Clark "“Deceptive routing in relay networks”." Decision and Game Theory for Security (2012) 10.1007/978-3-642-34266-0_10
[29]
Clark "“An impact-aware defense against Stuxnet”." 2013 American Control Conference (2013) 10.1109/acc.2013.6580475
[30]
Commission "“Industrial Communication Networks Network and System Security Part 1-1: Terminology, Concepts and Models, IEC”." et al. (2009)
[31]
CyVision Technologies Cauldron (2020)
[32]
Dieber "“Application-level security for ROS-based applications”." 2016 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS) (2016)
[33]
Dieber "“Security for the Robot Operating System”." Robotics and Autonomous Systems (2017) 10.1016/j.robot.2017.09.017
[34]
Dieber "“Penetration Testing ROS”." Robot Operating System (ROS) (2020) 10.1007/978-3-030-20190-6_8
[35]
Directive "“42/EC of the European Parliament and the Council of 17 May 2006 on machinery, and amending Directive 95/16/EC (recast)”" Official Journal of the European Union L (2006)
[36]
Farhang "“A dynamic bayesian security game framework for strategic defense mechanism design”." International conference on decision and game theory for security (2014)
[37]
Fung "“SMURFEN: A system framework for rule sharing collaborative intrusion detection”." 2011 7th International Conference on Network and Service Management (2011)
[38]
Fung "“FACID: A trust-based collaborative decision framework for intrusion detection networks”." Ad Hoc Networks (2016) 10.1016/j.adhoc.2016.08.014
[39]
Fung "“Bayesian decision aggregation in collaborative intrusion detection networks”." 2010 IEEE Network Operations and Management Symposium-NOMS 2010 (2010) 10.1109/noms.2010.5488489
[40]
Gibbons Game theory for applied economists (1992)
[41]
Greenbone Networks GmbH OpenVAS - OpenVAS - Open Vulnerability Assessment Scanner (2020)
[42]
Gul "“A Theory of Disappointment Aversion”." Econometrica (1991) 10.2307/2938223
[43]
Hansen US Secure Hash Algorithms (SHA and HMAC-SHA) (2006)
[44]
Hansen US Secure Hash Algorithms (SHA and SHA-based HMAC and HKDF) (2011)
[45]
Hayel "“Attack-Aware Cyber Insurance for Risk Sharing in Computer Networks”" Decision and Game Theory for Security (2015) 10.1007/978-3-319-25594-1_2
[46]
Heartfield "“A taxonomy of cyberphysical threats and impact in the smart home”." Computers & Security (2018) 10.1016/j.cose.2018.07.011
[47]
Houmb "“Estimating ToE Risk Level using CVSS”" (2009)
[48]
Huang "“Distributed correlated Q-learning for dynamic transmission control of sensor networks”." Acoustics Speech and Signal Processing (ICASSP), 2010 IEEE International Conference on (2010) 10.1109/icassp.2010.5495265
[49]
Huang "“A large-scale markov game approach to dynamic protection of interdependent infrastructure networks”." International Conference on Decision and Game Theory for Security (2017) 10.1007/978-3-319-68711-7_19
[50]
Huang "“Distributed and optimal resilient planning of large-scale interdependent critical infrastructures”." 2018 Winter Simulation Conference (WSC) (2018) 10.1109/wsc.2018.8632399
Showing 50 of 187 references
Metrics
18
Citations
187
References
Details
- Published
- Aug 16, 2021
- Vol/Issue
- 9(1)
- Pages
- 1-129
Authors
Cite This Article
Quanyan Zhu, Stefan Rass, Bernhard Dieber, et al. (2021). Cybersecurity in Robotics: Challenges, Quantitative Modeling, and Practice. Foundations and Trends® in Robotics, 9(1), 1-129. https://doi.org/10.1561/2300000061
Related
You May Also Like
A Review of Point Cloud Registration Algorithms for Mobile Robotics
Francois Pomerleau, Francis Colas · 2015
553 citations
The State of Industrial Robotics: Emerging Technologies, Challenges, and Key Research Directions
Lindsay Sanneman, Christopher Fourie · 2021
44 citations