A spotlight on security and privacy risks with future household robots: attacks and lessons

Future homes will be populated with large numbers of robots with diverse functionalities, ranging from chore robots to elder care robots to entertainment robots. While household robots will offer numerous benefits, they also have the potential to introduce new security and privacy vulnerabilities into the home. Our research consists of three parts. First, to serve as a foundation for our study, we experimentally analyze three of today's household robots for security and privacy vulnerabilities: the WowWee Rovio, the Erector Spykee, and the WowWee RoboSapien V2. Second, we synthesize the results of our experimental analyses and identify key lessons and challenges for securing future household robots. Finally, we use our experiments and lessons learned to construct a set of design questions aimed at facilitating the future development of household robots that are secure and preserve their users' privacy.

[1]  James A. Landay,et al.  Privacy risk models for designing privacy-sensitive ubiquitous computing systems , 2004, DIS '04.

[2]  Kai Wang,et al.  Reconsidering physical key secrecy: teleduplication via optical decoding , 2008, CCS.

[3]  Henrik I. Christensen,et al.  "My Roomba Is Rambo": Intimate Home Appliances , 2007, UbiComp.

[4]  Sebastian Thrun,et al.  A Personal Account of the Development of Stanley, the Robot That Won the DARPA Grand Challenge , 2006, AI Mag..

[5]  Ronald C. Arkin Governing Lethal Behavior: Embedding Ethics in a Hybrid Deliberative/Reactive Robot Architecture - Part 2: Formalization for Ethical Control , 2008, AGI.

[6]  Jodi Forlizzi,et al.  How robotic products become social products: An ethnographic study of cleaning in the home , 2007, 2007 2nd ACM/IEEE International Conference on Human-Robot Interaction (HRI).

[7]  C.D. Kidd,et al.  Designing a sociable robot system forweight maintenance , 2006, CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006..

[8]  Ronald C. Arkin,et al.  Governing lethal behavior: Embedding ethics in a hybrid deliberative/reactive robot architecture part I: Motivation and philosophy , 2008, 2008 3rd ACM/IEEE International Conference on Human-Robot Interaction (HRI).

[9]  Markus G. Kuhn,et al.  Tamper resistance: a cautionary note , 1996 .

[10]  Zhiwei Luo,et al.  Development of the Tactile Sensor System of a Human-Interactive Robot “RI-MAN” , 2008, IEEE Transactions on Robotics.

[11]  Adi Shamir,et al.  Weaknesses in the Key Scheduling Algorithm of RC4 , 2001, Selected Areas in Cryptography.

[12]  J. Doug Tygar,et al.  Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0 , 1999, USENIX Security Symposium.

[13]  W. Keith Edwards,et al.  At Home with Ubiquitous Computing: Seven Challenges , 2001, UbiComp.

[14]  Michael Fleming,et al.  Team Cornell's Skynet: Robust perception and planning in an urban environment , 2008 .

[15]  Dan S. Wallach,et al.  Analysis of an electronic voting system , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[16]  Kevin Fu,et al.  Vulnerabilities in First-Generation RFID-Enabled Credit Cards , 2007, Financial Cryptography.

[17]  Susan Leigh Anderson,et al.  Asimov’s “three laws of robotics” and machine metaethics , 2008, AI & SOCIETY.

[18]  Peter King,et al.  Odin: Team VictorTango's entry in the DARPA Urban Challenge , 2008, J. Field Robotics.

[19]  Brian Scassellati,et al.  The Grand Challenges in Socially Assistive Robotics , 2007 .

[20]  D. Voth A new generation of military robots , 2004, IEEE Intelligent Systems.

[21]  Y. F. Yong,et al.  Robot Safety , 1985 .

[22]  Jean Scholtz,et al.  Common metrics for human-robot interaction , 2006, HRI '06.

[23]  John Ioannidis,et al.  Using the Fluhrer, Mantin, and Shamir Attack to Break WEP , 2002, NDSS.

[24]  Changchun Liu,et al.  Affect Recognition in Robot Assisted Rehabilitation of Children with Autism Spectrum Disorder , 2007, Proceedings 2007 IEEE International Conference on Robotics and Automation.

[25]  Sebastian Thrun,et al.  Stanley: The robot that won the DARPA Grand Challenge , 2006, J. Field Robotics.

[26]  Nicolas Schweighofer,et al.  ADAPT - adaptive automated robotic task practice system for stroke rehabilitation , 2008, 2008 IEEE International Conference on Robotics and Automation.

[27]  Roger Clarke,et al.  Asimov's Laws of Robotics: Implications for Information Technology - Part 2 , 1993, Computer.

[28]  Charles E. Frank,et al.  Evaluation of Google hacking , 2008, InfoSecCD2008 2008.

[29]  D. Voth Biotracking gives back to nature , 2004, IEEE Intelligent Systems.

[30]  Kevin Fu,et al.  Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).

[31]  Ehud Sharlin,et al.  Toward Acceptable Domestic Robots: Applying Insights from Social Psychology , 2009, Int. J. Soc. Robotics.