On content modification attacks in bilateral teleoperation systems

In this paper, content modification attacks on bilateral teleoperation system are investigated. The vulnerability of bilateral teleoperation systems to content modification attacks is initially studied, wherein the attacker can modify the states being exchanged between the master and the slave robot. Subsequently, a static malignant content modification attack (MCoMA) is introduced that ensures that the robot joint velocities are rendered unstable. A safety mechanism is then introduced to safeguard against static MCoMA. Finally, a dynamic subterfuge MCoMA that bypasses the safety mechanism is proposed. The efficacy of proposed attacks is studied using numerical simulations.

[1]  Romeo Ortega,et al.  Position Tracking for Non-linear Teleoperators with Variable Time Delay , 2009, Int. J. Robotics Res..

[2]  Prasant Mohapatra,et al.  Stealthy attacks meets insider threats: A three-player game model , 2015, MILCOM 2015 - 2015 IEEE Military Communications Conference.

[3]  Ehab Al-Shaer,et al.  On secure and resilient telesurgery communications over unreliable networks , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[4]  Rogelio Lozano,et al.  Synchronization of bilateral teleoperators with time delay , 2008, Autom..

[5]  R. P. Paul,et al.  A Symbolic Teleoperator Interface For Time-delayed Underwater Robot Manipulation , 1991, OCEANS 91 Proceedings.

[6]  Wang Wei,et al.  Teleoperated manipulator for leak detection of sealed radioactive sources , 2004, IEEE International Conference on Robotics and Automation, 2004. Proceedings. ICRA '04. 2004.

[7]  Quanyan Zhu,et al.  Game-Theoretic Methods for Robustness, Security, and Resilience of Cyberphysical Control Systems: Games-in-Games Principle for Optimal Cross-Layer Resilient Control Systems , 2015, IEEE Control Systems.

[8]  Xavier Litrico,et al.  Cyber Security of Water SCADA Systems—Part I: Analysis and Experimentation of Stealthy Deception Attacks , 2013, IEEE Transactions on Control Systems Technology.

[9]  Tamara Bonaci,et al.  Surgical Telerobotics Meets Information Security , 2012 .

[10]  Sonia Martínez,et al.  On event-triggered control of linear systems under periodic denial-of-service jamming attacks , 2012, 2012 IEEE 51st IEEE Conference on Decision and Control (CDC).

[11]  M. Spong,et al.  Robot Modeling and Control , 2005 .

[12]  Karl Henrik Johansson,et al.  Secure Control Systems: A Quantitative Risk Management Approach , 2015, IEEE Control Systems.

[13]  Masaru Uchiyama,et al.  Model-based space robot teleoperation of ETS-VII manipulator , 2004, IEEE Transactions on Robotics and Automation.

[14]  S. Shankar Sastry,et al.  Game-Theoretic Models of Electricity Theft Detection in Smart Utility Networks: Providing New Capabilities with Advanced Metering Infrastructure , 2015, IEEE Control Systems.

[15]  Mark W. Spong,et al.  Bilateral teleoperation: An historical survey , 2006, Autom..

[16]  Masayuki Fujita,et al.  Passivity-Based Control and Estimation in Networked Robotics , 2015 .

[17]  Bhavani M. Thuraisingham,et al.  Cyberphysical systems security applied to telesurgical robotics , 2012, Comput. Stand. Interfaces.