Empirical analysis of cyber-attacks to an indoor real time localization system for autonomous robots

Abstract Real Time Location Systems (RTLSs) are critical components of many mobile robots that rely on them to safely operate in different environments, and their cyber-security is a growing concern. The goal of this paper is to demonstrate that there are statistically meaningful differences in the data provided by beacon-based RTLSs between the case when there is an attacker or none, which can be used to detect attacks. A procedure to choose the more discriminant distribution of beacons is presented, as well as its empirical validation, based on data provided by a commercial RTLS used by a mobile robot for indoor navigation. In the evaluation, three basic alternatives to define the distribution of beacons were considered to see which one was more discriminant, that is, the one with more differences. Statistical differences in the data gathered by the mobile robot, when the localization system is under attack, and when it is not, have been found. It has been also verified that these differences are larger or smaller depending on the location of the beacons.

[1]  Taeshik Shon,et al.  A hybrid machine learning approach to network anomaly detection , 2007, Inf. Sci..

[2]  George Loukas,et al.  Performance Evaluation of Cyber-Physical Intrusion Detection on a Robotic Vehicle , 2015, 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing.

[3]  Wade Trappe,et al.  Robust statistical methods for securing wireless localization in sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..

[4]  Junjie Yan,et al.  To Make a Robot Secure: An Experimental Analysis of Cyber Security Threats Against Teleoperated Surgical Robots , 2015, ArXiv.

[5]  Henrik Sandberg,et al.  Limiting the Impact of Stealthy Attacks on Industrial Control Systems , 2016, CCS.

[6]  Jing Liu,et al.  Survey of Wireless Indoor Positioning Techniques and Systems , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[7]  Philip Wolfe,et al.  An algorithm for quadratic programming , 1956 .

[8]  Young-Koo Lee,et al.  An Anomaly Detection Algorithm for Detecting Attacks in Wireless Sensor Networks , 2006, ISI.

[9]  Saad B. Qaisar,et al.  One-class support vector machines: analysis of outlier detection for wireless sensor networks in harsh environments , 2013, Artificial Intelligence Review.

[10]  Hugh F. Durrant-Whyte,et al.  A solution to the simultaneous localization and map building (SLAM) problem , 2001, IEEE Trans. Robotics Autom..

[11]  Isabelle Guyon,et al.  An Introduction to Variable and Feature Selection , 2003, J. Mach. Learn. Res..

[12]  Tong Zhang,et al.  Trading Accuracy for Sparsity in Optimization Problems with Sparsity Constraints , 2010, SIAM J. Optim..

[13]  Carlos Balaguer,et al.  Cryptobotics: Why Robots Need Cyber Safety , 2015, Front. Robot. AI.

[14]  Geok See Ng,et al.  Empirical Assessment of Methods to Detect Cyber Attacks on a Robot , 2016, 2016 IEEE 17th International Symposium on High Assurance Systems Engineering (HASE).

[15]  W. Timothy Strayer,et al.  Using Machine Learning Techniques to Identify Botnet Traffic , 2006 .

[16]  Eric Jones,et al.  SciPy: Open Source Scientific Tools for Python , 2001 .

[17]  Jiankun Hu,et al.  Scalable Hypergrid k-NN-Based Online Anomaly Detection in Wireless Sensor Networks , 2013, IEEE Transactions on Parallel and Distributed Systems.

[18]  Song Guo,et al.  Segment-Based Anomaly Detection with Approximated Sample Covariance Matrix in Wireless Sensor Networks , 2015, IEEE Transactions on Parallel and Distributed Systems.

[19]  Morgan Quigley,et al.  ROS: an open-source Robot Operating System , 2009, ICRA 2009.

[20]  Cipriano Galindo,et al.  Mobile robot localization based on Ultra-Wide-Band ranging: A particle filter approach , 2009, Robotics Auton. Syst..

[21]  Srdjan Capkun,et al.  Secure positioning of wireless devices with application to sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..