Physical indicators of cyber attacks against a rescue robot

Responding to an emergency situation is a challenging and time critical procedure. The primary goal is to save lives and this is directly related to the speed and efficiency at which help is provided to the victims. Rescue robots are able to benefit an emergency response procedure by searching for survivors, providing access to inaccessible areas and establishing an on-site communication network. This paper investigates how a cyber attack on a rescue robot can adversely affect its operation and impair an emergency response operation. The focus is on identifying physical indicators of an ongoing cyber attack, which can help to design more efficient detection and defense mechanisms. A number of experiments have been conducted on an Arduino based robot, under different cyber attack scenarios. The results show that the cyber attack's effects have physical features that can be used in order to improve the robot's robustness against this type of threat.

[1]  David Mascareñas,et al.  A preliminary cyber-physical security assessment of the Robot Operating System (ROS) , 2013, Defense, Security, and Sensing.

[2]  Martin Roesch,et al.  Snort - Lightweight Intrusion Detection for Networks , 1999 .

[3]  Erol Gelenbe,et al.  Distributed Building Evacuation Simulator for Smart Emergency Management , 2010, Comput. J..

[4]  Bradley Reaves,et al.  Discovery, infiltration, and denial of service in a process control system wireless network , 2009, 2009 eCrime Researchers Summit.

[5]  Matti Valovirta,et al.  Experimental Security Analysis of a Modern Automobile , 2011 .

[6]  Erol Gelenbe,et al.  Emergency Cyber-Physical-Human Systems , 2012, 2012 21st International Conference on Computer Communications and Networks (ICCCN).

[7]  George Loukas,et al.  A Review of Cyber Threats and Defence Approaches in Emergency Management , 2013, Future Internet.

[8]  Erol Gelenbe,et al.  Emergency response systems for disaster management in buildings , 2009 .

[9]  Deborah A. Frincke,et al.  Configurable middleware-level intrusion detection for embedded systems , 2005, 25th IEEE International Conference on Distributed Computing Systems Workshops.

[10]  Inseok Hwang,et al.  Cyber Attack Vulnerabilities Analysis for Unmanned Aerial Vehicles , 2012, Infotech@Aerospace.

[11]  Stelios Timotheou,et al.  Autonomous networked robots for the establishment of wireless communication in uncertain emergency response scenarios , 2009, SAC '09.

[12]  S. Shankar Sastry,et al.  Safe and Secure Networked Control Systems under Denial-of-Service Attacks , 2009, HSCC.

[13]  Wei Gao,et al.  On SCADA control system command and response injection and intrusion detection , 2010, 2010 eCrime Researchers Summit.

[14]  Erol Gelenbe,et al.  A distributed decision support system for Building Evacuation , 2009, 2009 2nd Conference on Human System Interactions.

[15]  Erol Gelenbe,et al.  A self-aware approach to denial of service defence , 2007, Comput. Networks.

[16]  Bruno Sinopoli,et al.  Secure control against replay attacks , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[17]  George Loukas,et al.  A taxonomy of cyber attack and defence mechanisms for emergency management networks , 2013, 2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops).

[18]  Bhavani M. Thuraisingham,et al.  Cyberphysical systems security applied to telesurgical robotics , 2012, Comput. Stand. Interfaces.

[19]  Erol Gelenbe,et al.  Future Research on Cyber-Physical Emergency Management Systems , 2013, Future Internet.

[20]  Daniel P. Shepard,et al.  Evaluation of Smart Grid and Civilian UAV Vulnerability to GPS Spoofing Attacks , 2012 .