Is Secure Communication in the R2I (Robot-to-Infrastructure) Model Possible? Identification of Threats

The increase in the role of companion robots in everyday life is inevitable, and their safe communication with the infrastructure is one of the fundamental challenges faced by designers. There are many challenges in the robot’s communication with the environment, widely described in the literature on the subject. The threats that scientists believe have the most significant impact on the robot’s communication include denial-of-service (DoS) attacks, satellite signal spoofing, external eavesdropping, spamming, broadcast tampering, and man-in-the-middle attacks. In this article, the authors attempted to identify communication threats in the new robot-to-infrastructure (R2I) model based on available solutions used in transport, e.g., vehicle-to-infrastructure (V2I), taking into account the threats already known affecting the robot’s sensory systems. For this purpose, all threats that may occur in the robot’s communication with the environment were analyzed. Then the risk analysis was carried out, determining, in turn, the likelihood of potential threats occurrence, their consequence, and ability of detection. Finally, specific methods of responding to the occurring threats are proposed, taking into account cybersecurity aspects. A critical new approach is the proposal to use communication and protocols so far dedicated to transport (IEEE 802.11p WAVE, dedicated short-range communications (DSRC)). Then, the companion’s robot should be treated as a pedestrian and some of its sensors as an active smartphone.

[1]  Christian Tiberius,et al.  Quality Control in SBAS: Protection Levels and Reliability Levels , 2009, Journal of Navigation.

[2]  Amin Mohammed Abdalla,et al.  Mobile Robot Controlled through Mobile Communication , 2015 .

[3]  Adam Rosiński,et al.  Analysis of Accuracy and Reliability of Different Types of GPS Receivers , 2020, Sensors.

[4]  Christian Poellabauer,et al.  Robot and Drone Localization in GPS-Denied Areas , 2019, Mission-Oriented Sensor Networks and Systems.

[5]  Mirosław Siergiejczyk,et al.  Influence of selected external factors on satellite navigation signal quality , 2018 .

[6]  E. Dudek,et al.  RISK MANAGEMENT IN (AIR) TRANSPORT WITH EXEMPLARY RISK ANALYSIS BASED ON THE TOLERABILITY MATRIX , 2020 .

[7]  Elizabeth Sklar,et al.  MRComm: Multi-Robot Communication Testbed , 2019, TAROS.

[8]  Vicente Matellán Olivera,et al.  Cybersecurity of Robotics and Autonomous Systems: Privacy and Safety , 2017 .

[9]  Subrato Bharati,et al.  Threats and Countermeasures of Cyber Security in Direct and Remote Vehicle Communication Systems , 2020, ArXiv.

[10]  John B. Kenney,et al.  Dedicated Short-Range Communications (DSRC) Standards in the United States , 2011, Proceedings of the IEEE.

[11]  M. Siergiejczyk,et al.  Security of telecommunications systems in transport , 2017 .

[12]  Paolo Dario,et al.  Improving Domiciliary Robotic Services by Integrating the ASTRO Robot in an AmI Infrastructure , 2014, Technology Transfer Experiments from the ECHORD Project.

[13]  Junjie Yan,et al.  To Make a Robot Secure: An Experimental Analysis of Cyber Security Threats Against Teleoperated Surgical Robots , 2015, ArXiv.

[14]  Karolina Krzykowska,et al.  Reliability and Viewpoints of Selected ITS System , 2017, 2017 25th International Conference on Systems Engineering (ICSEng).

[15]  Mirosław Siergiejczyk,et al.  Analysis of information secure transmission methods in the intelligent transport systems , 2017 .

[16]  Łukasz Konieczny,et al.  Optimizing the Data Flow in a Network Communication Between Railway Nodes , 2019, Advances in Intelligent Systems and Computing.

[17]  Aris S. Lalos,et al.  The CARAMEL Project: a Secure Architecture for Connected and Autonomous Vehicles , 2020, 2020 European Conference on Networks and Communications (EuCNC).

[18]  Luminita Scripcariu,et al.  Security Issues in the Internet of Vehicles , 2018, 2018 International Conference on Communications (COMM).

[19]  Edoardo Datteri,et al.  The Logic of Interactive Biorobotics , 2020, Frontiers in Bioengineering and Biotechnology.

[20]  D. Duhaut,et al.  Ethorobotics applied to human behaviour: can animated objects influence children's behaviour in cognitive tasks? , 2014, Animal Behaviour.

[21]  Vicente Julián,et al.  PHAROS—PHysical Assistant RObot System , 2018, Sensors.

[22]  Ammar Alazab,et al.  A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges , 2021, Cybersecurity.

[23]  Michel Barbeau,et al.  Threats to Security in DSRC/WAVE , 2006, ADHOC-NOW.

[24]  Kun-Chan Lan,et al.  A Comparison of 802.11a and 802.11p for V-to-I Communication: A Measurement Study , 2010, QSHINE.

[25]  Henry C. B. Chan,et al.  Decentralized adaptive indoor positioning protocol using Bluetooth Low Energy , 2020, Comput. Commun..

[26]  Robert W. Heath,et al.  Security in Automotive Radar and Vehicular Networks , 2017 .

[27]  Rüdiger Dillmann,et al.  Robot Companions for Citizens , 2011, FET.

[28]  C. Stefanini,et al.  Unveiling social distancing mechanisms via a fish-robot hybrid interaction , 2021, Biological Cybernetics.

[29]  Alessandro Severino,et al.  A Review on IEEE 802.11p for Intelligent Transportation Systems , 2020, J. Sens. Actuator Networks.

[30]  Kazi Mahtab Kadir,et al.  Technical investigation on V2G, S2V, and V2I for next generation smart city planning , 2019, Journal of Electronic Science and Technology.

[31]  Karolina Krzykowska,et al.  Reliability Assessment of Supporting Satellite System EGNOS , 2013, DepCoS-RELCOMEX.

[32]  Junyi Xu,et al.  GNSS receiver autonomous integrity monitoring (RAIM) algorithm based on robust estimation , 2016 .

[33]  Abdulrahman H. Altalhi,et al.  An Efficient Route Maintenance Protocol for Dynamic Bluetooth Networks , 2017, J. King Saud Univ. Comput. Inf. Sci..

[34]  Sibin Mohan,et al.  Securing Vehicle-to-Everything (V2X) Communication Platforms , 2020, IEEE Transactions on Intelligent Vehicles.

[35]  Rabah Lakel,et al.  Synchronized Communication in a Set of Autonomous Mobile Robots Using Bluetooth Technology , 2015 .

[36]  Karolina Krzykowska,et al.  Application of V2X Technology in Communication Between Vehicles and Infrastructure in Chosen Area , 2019, Advances in Intelligent Systems and Computing.

[37]  Dhananjay S. Phatak,et al.  Cybersecurity: Exploring core concepts through six scenarios , 2018, Cryptologia.

[38]  Peter I. Anakhu,et al.  An Android Based Mobile Robot for Monitoring and Surveillance , 2019, Procedia Manufacturing.

[39]  Takayuki Kanda Enabling Harmonized Human-Robot Interaction in a Public Space , 2017, Human-Harmonized Information Technology.

[40]  Huansheng Ning,et al.  Artificial intelligence in cyber security: research advances, challenges, and opportunities , 2021, Artificial Intelligence Review.

[41]  Luigi Fortuna,et al.  Force Feedback Assistance in Remote Ultrasound Scan Procedures , 2020 .

[42]  Maarten Weyn,et al.  Comparing Localization Performance of IEEE 802.11p and LTE-V V2I Communications , 2021, Sensors.

[43]  Eleonora Bilotta,et al.  Shopping with a robotic companion , 2017, Comput. Hum. Behav..

[44]  Iveta Zolotova,et al.  Control and Teleoperation of Robot Khepera via Android Mobile Device through Bluetooth and WiFi , 2016 .

[45]  Mirosław Siergiejczyk,et al.  Comparative Analysis of V2V and A2A Technologies , 2018 .

[46]  Ishtiaq Ahmad,et al.  Cooperative resource management for C-V2I communications in a dense urban environment , 2020, Veh. Commun..

[47]  Lorenzo Galleani,et al.  Satellite Autonomous Integrity Monitoring (SAIM) for GNSS Systems , 2009 .

[48]  Vincenzo Di Massa,et al.  Improving ITS-G5 Cybersecurity Features Starting from Hacking IEEE 802.11p V2X Communications Through Low-Cost SDR Devices , 2019 .