Cybersecurity in Robotics: Challenges, Quantitative Modeling, and Practice

Robotics is becoming more and more ubiquitous, but the pressure to bring systems to market occasionally goes at the cost of neglecting security mechanisms during the development, deployment or while in production. As a result, contemporary robotic systems are vulnerable to diverse attack patterns, and an a posteriori hardening is at least challenging, if not impossible at all. This book aims to stipulate the inclusion of security in robotics from the earliest design phases onward and with a special focus on the cost-benefit tradeoff that can otherwise be an inhibitor for the fast development of affordable systems. We advocate quantitative methods of security management and -design, covering vulnerability scoring systems tailored to robotic systems, and accounting for the highly distributed nature of robots as an interplay of potentially very many components. A powerful quantitative approach to model-based security is offered by game theory, providing a rich spectrum of techniques to optimize security against various kinds of attacks. Such a multiperspective view on security is necessary to address the heterogeneity and complexity of robotic systems. This book is intended as an accessible starter for the theoretician and practitioner working in the field.

[1]  Quanyan Zhu,et al.  Dynamic Resilient Network Games With Applications to Multiagent Consensus , 2020, IEEE Transactions on Control of Network Systems.

[2]  Stefan Rass,et al.  Can ROS be used securely in industry? Red teaming ROS-Industrial , 2020, ArXiv.

[3]  Tuhin Sahai,et al.  Post Quantum Secure Command and Control of Mobile Agents Inserting quantum-resistant encryption schemes in the Secure Robot Operating System , 2020, 2020 Fourth IEEE International Conference on Robotic Computing (IRC).

[4]  E. Gil-Uriarte,et al.  DevSecOps in Robotics , 2020, ArXiv.

[5]  Quanyan Zhu,et al.  Control of Multilayer Mobile Autonomous Systems in Adversarial Environments: A Games-in-Games Approach , 2019, IEEE Transactions on Control of Network Systems.

[6]  Quanyan Zhu,et al.  Dynamic games for secure and resilient control system design , 2019, National science review.

[7]  Quanyan Zhu,et al.  A Dynamic Game Approach to Strategic Design of Secure and Resilient Infrastructure Network , 2019, IEEE Transactions on Information Forensics and Security.

[8]  Tao Zhang,et al.  Game-Theoretic Analysis of Cyber Deception: Evidence-Based Strategies and Dynamic Risk Mitigation , 2019, ArXiv.

[9]  Quanyan Zhu,et al.  Optimal Secure Two-Layer IoT Network Design , 2017, IEEE Transactions on Control of Network Systems.

[10]  Quanyan Zhu,et al.  Cross-Layer Design for Secure and Resilient Cyber-Physical Systems: A Decision and Game Theoretic Approach , 2020, Advances in Information Security.

[11]  Stefan Rass,et al.  Security Games over Lexicographic Orders , 2020, GameSec.

[12]  Quanyan Zhu,et al.  MASAGE: Model-Agnostic Sequential and Adaptive Game Estimation , 2020, GameSec.

[13]  Guanze Peng A Data-Driven Distributionally Robust Game Using Wasserstein Distance , 2020, GameSec.

[14]  Quanyan Zhu,et al.  A Game- and Decision-Theoretic Approach to Resilient Interdependent Network Analysis and Design , 2020, SpringerBriefs in Electrical and Computer Engineering.

[15]  Dan Gazebo Sebagai,et al.  Robot Operating System (ROS) , 2020, Studies in Computational Intelligence.

[16]  Stefan Rass,et al.  Cut-The-Rope: A Game of Stealthy Intrusion , 2019, GameSec.

[17]  Stefan Rass,et al.  Honeypot Type Selection Games for Smart Grid Networks , 2019, GameSec.

[18]  Quanyan Zhu,et al.  Subgame Perfect Equilibrium Analysis for Jamming Attacks on Resilient Graphs , 2019, 2019 American Control Conference (ACC).

[19]  Quanyan Zhu,et al.  Adaptive Honeypot Engagement through Reinforcement Learning of Semi-Markov Decision Processes , 2019, GameSec.

[20]  Quanyan Zhu,et al.  Deceptive Reinforcement Learning Under Adversarial Manipulations on Cost Signals , 2019, GameSec.

[21]  Bernhard Dieber,et al.  Quantum Computation in Robotic Science and Applications , 2019, 2019 International Conference on Robotics and Automation (ICRA).

[22]  Stefan Rass,et al.  An Overview of Data Quality Frameworks , 2019, IEEE Access.

[23]  Quanyan Zhu,et al.  Community-Based Security for the Internet of Things , 2018, ArXiv.

[24]  Quanyan Zhu,et al.  Dynamic Bayesian Games for Adversarial and Defensive Cyber Deception , 2018, Autonomous Cyber Deception.

[25]  Quanyan Zhu,et al.  iSTRICT: An Interdependent Strategic Trust Mechanism for the Cloud-Enabled Internet of Controlled Things , 2018, IEEE Transactions on Information Forensics and Security.

[26]  Quanyan Zhu,et al.  Modeling and Analysis of Leaky Deception Using Signaling Games With Evidence , 2018, IEEE Transactions on Information Forensics and Security.

[27]  Quanyan Zhu,et al.  A Game-theoretic Taxonomy and Survey of Defensive Deception for Cybersecurity and Privacy , 2017, ACM Comput. Surv..

[28]  Stefan Rass,et al.  Refining Stochastic Models of Critical Infrastructures by Observation , 2019 .

[29]  Bernhard Dieber,et al.  Case study: Remote attack to disable MiR100 safety , 2019 .

[30]  Industrial Control Systems Security and Resiliency: Practice and Theory , 2019, Advances in Information Security.

[31]  Agostino Cortesi,et al.  Penetration Testing ROS , 2019, Studies in Computational Intelligence.

[32]  Branislav Bosanský,et al.  An Initial Study of Targeted Personality Models in the FlipIt Game , 2018, GameSec.

[33]  Stefan Rass,et al.  Disappointment-Aversion in Security Games , 2018, GameSec.

[34]  Nirupama Bulusu,et al.  Towards True Decentralization: A Blockchain Consensus Protocol Based on Game Theory and Randomness , 2018, GameSec.

[35]  Quanyan Zhu,et al.  Analysis and Computation of Adaptive Defense Strategies Against Advanced Persistent Threats for Cyber-Physical Systems , 2018, GameSec.

[36]  Stefan Rass,et al.  Perfectly Secure Communication, based on Graph-Topological Addressing in Unique-Neighborhood Networks , 2018, ArXiv.

[37]  Quanyan Zhu,et al.  DISTRIBUTED AND OPTIMAL RESILIENT PLANNING OF LARGE-SCALE INTERDEPENDENT CRITICAL INFRASTRUCTURES , 2018, 2018 Winter Simulation Conference (WSC).

[38]  George Loukas,et al.  A taxonomy of cyber-physical threats and impact in the smart home , 2018, Comput. Secur..

[39]  Quanyan Zhu,et al.  Cross-Layer Secure and Resilient Control of Delay-Sensitive Networked Robot Operating Systems , 2018, 2018 IEEE Conference on Control Technology and Applications (CCTA).

[40]  Gorka Olalde Mendia,et al.  Towards an open standard for assessing the severity of robot security vulnerabilities, the Robot Vulnerability Scoring System (RVSS) , 2018, ArXiv.

[41]  Sandra König,et al.  Assessing the Impact of Malware Attacks in Utility Networks , 2018 .

[42]  Erik Tews,et al.  Introducing the Robot Security Framework (RSF), a standardized methodology to perform security assessments in robotics , 2018, ArXiv.

[43]  Stefan Rass,et al.  Password Security as a Game of Entropies , 2018, Entropy.

[44]  Quanyan Zhu,et al.  On Multi-Phase and Multi-Stage Game-Theoretic Modeling of Advanced Persistent Threats , 2018, IEEE Access.

[45]  Quanyan Zhu,et al.  A Game-Theoretic Approach to Design Secure and Resilient Distributed Support Vector Machines , 2018, IEEE Transactions on Neural Networks and Learning Systems.

[46]  Stefan Rass,et al.  Security Strategies and Multi-Criteria Decision Making , 2018 .

[47]  Vicente Matellán Olivera,et al.  Cybersecurity of Robotics and Autonomous Systems: Privacy and Safety , 2017 .

[48]  Peter Schartner,et al.  Security for the Robot Operating System , 2017, Robotics Auton. Syst..

[49]  Quanyan Zhu,et al.  A game-theoretic defense against data poisoning attacks in distributed support vector machines , 2017, 2017 IEEE 56th Annual Conference on Decision and Control (CDC).

[50]  Stefan Rass,et al.  On the Cost of Game Playing: How to Control the Expenses in Mixed Strategies , 2017, GameSec.

[51]  Quanyan Zhu,et al.  A Large-Scale Markov Game Approach to Dynamic Protection of Interdependent Infrastructure Networks , 2017, GameSec.

[52]  Quanyan Zhu,et al.  Secure and practical output feedback control for cloud-enabled cyber-physical systems , 2017, 2017 IEEE Conference on Communications and Network Security (CNS).

[53]  Quanyan Zhu,et al.  Strategic Trust in Cloud-Enabled Cyber-Physical Systems With an Application to Glucose Control , 2017, IEEE Transactions on Information Forensics and Security.

[54]  Quanyan Zhu,et al.  Interdependent strategic cyber defense and robust switching control design for wind energy systems , 2017, 2017 IEEE Power & Energy Society General Meeting.

[55]  Quanyan Zhu,et al.  Heterogeneous Multi-Layer Adversarial Network Design for the IoT-Enabled Infrastructures , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.

[56]  Quanyan Zhu,et al.  A Game-Theoretic Approach to Secure Control of Communication-Based Train Control Systems Under Jamming Attacks , 2017, SCAV@CPSWeek.

[57]  Rui Zhang,et al.  A game-theoretic analysis of label flipping attacks on distributed support vector machines , 2017, 2017 51st Annual Conference on Information Sciences and Systems (CISS).

[58]  Quanyan Zhu,et al.  Phishing for Phools in the Internet of Things: Modeling One-to-Many Deception using Poisson Signaling Games , 2017, ArXiv.

[59]  Quanyan Zhu,et al.  A Bi-Level Game Approach to Attack-Aware Cyber Insurance of Computer Networks , 2017, IEEE Journal on Selected Areas in Communications.

[60]  Stefan Rass,et al.  Defending Against Advanced Persistent Threats Using Game-Theory , 2017, PloS one.

[61]  D. Bernstein,et al.  Post-quantum cryptography , 2008, Nature.

[62]  S. Rass,et al.  Visual Risk Specification and Aggregation , 2017 .

[63]  Quanyan Zhu,et al.  Dynamic Differential Privacy for ADMM-Based Distributed Classification Learning , 2017, IEEE Transactions on Information Forensics and Security.

[64]  Quanyan Zhu,et al.  On solving large-scale low-rank zero-sum security games of incomplete information , 2016, 2016 IEEE International Workshop on Information Forensics and Security (WIFS).

[65]  Quanyan Zhu,et al.  GADAPT: A Sequential Game-Theoretic Framework for Designing Defense-in-Depth Strategies Against Advanced Persistent Threats , 2016, GameSec.

[66]  Quanyan Zhu,et al.  Optimal Contract Design Under Asymmetric Information for Cloud-Enabled Internet of Controlled Things , 2016, GameSec.

[67]  William H. Sanders,et al.  A Game-Theoretic Approach to Respond to Attacker Lateral Movement , 2016, GameSec.

[68]  Jakob Jonsson,et al.  PKCS #1: RSA Cryptography Specifications Version 2.2 , 2016, RFC.

[69]  Rui Zhang,et al.  Attack-Aware Cyber Insurance of Interdependent Computer Networks , 2016 .

[70]  Quanyan Zhu,et al.  Compliance signaling games: toward modeling the deterrence of insider threats , 2016, Comput. Math. Organ. Theory.

[71]  Quanyan Zhu,et al.  Cross-layer secure cyber-physical control system design for networked 3D printers , 2016, 2016 American Control Conference (ACC).

[72]  Quanyan Zhu,et al.  Interdependent network formation games with an application to critical infrastructures , 2016, 2016 American Control Conference (ACC).

[73]  Quanyan Zhu,et al.  A Stackelberg game perspective on the conflict between machine learning and data obfuscation , 2016, 2016 IEEE International Workshop on Information Forensics and Security (WIFS).

[74]  Tony Q. S. Quek,et al.  A game theoretic model for enabling honeypots in IoT networks , 2016, 2016 IEEE International Conference on Communications (ICC).

[75]  Quanyan Zhu,et al.  Interdependent Network Formation Games , 2016, ArXiv.

[76]  Quanyan Zhu,et al.  Resilient and decentralized control of multi-level cooperative mobile networks to maintain connectivity under adversarial environment , 2015, 2016 IEEE 55th Conference on Decision and Control (CDC).

[77]  Kristian Weium Lange,et al.  Cybersecurity in the Internet of Things , 2016 .

[78]  Sushil Jajodia,et al.  Cyber Deception , 2016, Springer International Publishing.

[79]  Quanyan Zhu,et al.  To Trust or Not: A Security Signaling Game Between Service Provider and Client , 2015, GameSec.

[80]  Quanyan Zhu,et al.  Attack-Aware Cyber Insurance for Risk Sharing in Computer Networks , 2015, GameSec.

[81]  Quanyan Zhu,et al.  Secure and Resilient Control Design for Cloud Enabled Networked Control Systems , 2015, CPS-SPC '15.

[82]  Rui Zhang,et al.  Secure and resilient distributed machine learning under adversarial environments , 2015, 2015 18th International Conference on Information Fusion (Fusion).

[83]  Quanyan Zhu,et al.  Flip the Cloud: Cyber-Physical Signaling Games in the Presence of Advanced Persistent Threats , 2015, GameSec.

[84]  Karen A. Scarfone,et al.  Guide to Industrial Control Systems (ICS) Security , 2015 .

[85]  Quanyan Zhu,et al.  Deception by Design: Evidence-Based Signaling Games for Network Defense , 2015, WEIS.

[86]  Quanyan Zhu,et al.  A cyber-physical game framework for secure and resilient multi-agent autonomous systems , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).

[87]  Quanyan Zhu,et al.  Game-Theoretic Methods for Robustness, Security, and Resilience of Cyberphysical Control Systems: Games-in-Games Principle for Optimal Cross-Layer Resilient Control Systems , 2015, IEEE Control Systems.

[88]  Pieter Abbeel,et al.  Image Object Label 3 D CAD Model Candidate Grasps Google Object Recognition Engine Google Cloud Storage Select Feasible Grasp with Highest Success Probability Pose EstimationCamera Robots Cloud 3 D Sensor , 2014 .

[89]  Quanyan Zhu,et al.  Hierarchical architectures of resilient control systems: Concepts, metrics and design principles , 2015 .

[90]  Quanyan Zhu,et al.  A moving-horizon hybrid stochastic game for secure control of cyber-physical systems , 2014, 53rd IEEE Conference on Decision and Control.

[91]  Quanyan Zhu,et al.  A Dynamic Bayesian Security Game Framework for Strategic Defense Mechanism Design , 2014, GameSec.

[92]  Stefan Rass,et al.  Numerical Computation of Multi-goal Security Strategies , 2014, GameSec.

[93]  Stefan Rass,et al.  Secure Communication over Software-Defined Networks , 2015, Mob. Networks Appl..

[94]  Stefan Rass Complexity of Network Design for Private Communication and the P-vs-NP Question , 2014 .

[95]  Ehab Al-Shaer,et al.  A game-theoretic approach for deceiving Remote Operating System Fingerprinting , 2013, 2013 IEEE Conference on Communications and Network Security (CNS).

[96]  Quanyan Zhu,et al.  Game-Theoretic Approach to Feedback-Driven Multi-stage Moving Target Defense , 2013, GameSec.

[97]  Thomas Pornin Deterministic Usage of the Digital Signature Algorithm (DSA) and Elliptic Curve Digital Signature Algorithm (ECDSA) , 2013, RFC.

[98]  Quanyan Zhu,et al.  An impact-aware defense against Stuxnet , 2013, 2013 American Control Conference.

[99]  Quanyan Zhu,et al.  Game theory meets network security and privacy , 2013, CSUR.

[100]  David Mascareñas,et al.  A preliminary cyber-physical security assessment of the Robot Operating System (ROS) , 2013, Defense, Security, and Sensing.

[101]  Stefan Rass,et al.  A Network Modeling and Analysis Tool for Perfectly Secure Communication , 2013, 2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA).

[102]  Stefan Rass,et al.  On Bayesian Trust and Risk Forecasting for Compound Systems , 2013, 2013 Seventh International Conference on IT Security Incident Management and IT Forensics.

[103]  Quanyan Zhu,et al.  Hybrid Learning in Stochastic Games and Its Application in Network Security , 2013 .

[104]  Quanyan Zhu,et al.  Resilient Distributed Control of Multi-agent Cyber-Physical Systems , 2013, CPSW@CISS.

[105]  Frank L. Lewis,et al.  Reinforcement Learning and Approximate Dynamic Programming for Feedback Control , 2012 .

[106]  Thierry Chauveau,et al.  Subjective risk and disappointment , 2012 .

[107]  Quanyan Zhu,et al.  Deceptive Routing in Relay Networks , 2012, GameSec.

[108]  Ronald L. Rivest,et al.  FlipIt: The Game of “Stealthy Takeover” , 2012, Journal of Cryptology.

[109]  Quanyan Zhu,et al.  Agent-based cyber control strategy design for resilient control systems: Concepts, architecture and methodologies , 2012, 2012 5th International Symposium on Resilient Control Systems.

[110]  Quanyan Zhu,et al.  A dynamic game-theoretic approach to resilient control system design for cascading failures , 2012, HiCoNS '12.

[111]  P. Cochat,et al.  Et al , 2008, Archives de pediatrie : organe officiel de la Societe francaise de pediatrie.

[112]  Quanyan Zhu,et al.  Dynamic Secure Routing Game in Distributed Cognitive Radio Networks , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[113]  Quanyan Zhu,et al.  Robust and resilient control design for cyber-physical systems with an application to power systems , 2011, IEEE Conference on Decision and Control and European Control Conference.

[114]  Walid Saad,et al.  Eavesdropping and jamming in next-generation wireless networks: A game-theoretic approach , 2011, 2011 - MILCOM 2011 Military Communications Conference.

[115]  Quanyan Zhu,et al.  Indices of Power in Optimal IDS Default Configuration: Theory and Examples , 2011, GameSec.

[116]  Sushil Jajodia,et al.  Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats , 2011, Moving Target Defense.

[117]  Quanyan Zhu,et al.  A hierarchical security architecture for cyber-physical systems , 2011, 2011 4th International Symposium on Resilient Control Systems.

[118]  Blaine Nelson,et al.  Adversarial machine learning , 2019, AISec '11.

[119]  Quanyan Zhu,et al.  Distributed strategic learning with application to network security , 2011, Proceedings of the 2011 American Control Conference.

[120]  Anoop Singhal,et al.  Security Risk Analysis of Enterprise Networks Using Probabilistic Attack Graphs , 2011 .

[121]  Donald E. Eastlake,et al.  US Secure Hash Algorithms (SHA and SHA-based HMAC and HKDF) , 2011, RFC.

[122]  Quanyan Zhu,et al.  Heterogeneous learning in zero-sum stochastic games with incomplete information , 2011, 49th IEEE Conference on Decision and Control (CDC).

[123]  Quanyan Zhu,et al.  Network Security Configurations: A Nonzero-Sum Stochastic Game Approach , 2010, Proceedings of the 2010 American Control Conference.

[124]  Peter Schartner,et al.  Multipath Authentication without shared Secrets and with Applications in Quantum Networks , 2010, Security and Management.

[125]  Oguzhan Alagöz,et al.  Modeling secrecy and deception in a multiple-period attacker-defender signaling game , 2010, Eur. J. Oper. Res..

[126]  Quanyan Zhu,et al.  No-Regret Learning in Collaborative Spectrum Sensing with Malicious Nodes , 2010, 2010 IEEE International Conference on Communications.

[127]  Quanyan Zhu,et al.  A Stochastic Game Model for Jamming in Multi-Channel Cognitive Radio Systems , 2010, 2010 IEEE International Conference on Communications.

[128]  Quanyan Zhu,et al.  Distributed correlated Q-learning for dynamic transmission control of sensor networks , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.

[129]  Quanyan Zhu,et al.  Dynamic policy-based IDS configuration , 2009, Proceedings of the 48h IEEE Conference on Decision and Control (CDC) held jointly with 2009 28th Chinese Control Conference.

[130]  Daniel Grosu,et al.  A Game Theoretic Investigation of Deception in Network Security , 2009, 2009 Proceedings of 18th International Conference on Computer Communications and Networks.

[131]  Siv Hilde Houmb,et al.  Estimating ToE Risk Level Using CVSS , 2009, 2009 International Conference on Availability, Reliability and Security.

[132]  Marc Lelarge,et al.  Cyber Insurance as an Incentivefor Internet Security , 2009, Managing Information Risk and the Economics of Security.

[133]  Morgan Quigley,et al.  ROS: an open-source Robot Operating System , 2009, ICRA 2009.

[134]  Qishi Wu,et al.  AVOIDIT: A Cyber Attack Taxonomy , 2009 .

[135]  Abhijit Choudhury,et al.  AES Galois Counter Mode (GCM) Cipher Suites for TLS , 2008, RFC.

[136]  Nicholas Bambos,et al.  Security Decision-Making among Interdependent Organizations , 2008, 2008 21st IEEE Computer Security Foundations Symposium.

[137]  Iyatiti Mokube,et al.  Honeypots: concepts, approaches, and challenges , 2007, ACM-SE 45.

[138]  Donald E. Eastlake,et al.  US Secure Hash Algorithms (SHA and HMAC-SHA) , 2006, RFC.

[139]  Roy T. Fielding,et al.  Uniform Resource Identifier (URI): Generic Syntax , 2005, RFC.

[140]  T. Basar,et al.  A game theoretic analysis of intrusion detection in access control systems , 2004, 2004 43rd IEEE Conference on Decision and Control (CDC) (IEEE Cat. No.04CH37601).

[141]  Uri Blumenthal,et al.  The Advanced Encryption Standard (AES) Cipher Algorithm in the SNMP User-based Security Model , 2004, RFC.

[142]  I. V. Konnov On Lexicographic Vector Equilibrium Problems , 2003 .

[143]  Audun Jøsang,et al.  AIS Electronic Library (AISeL) , 2017 .

[144]  Peter W. Shor,et al.  Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..

[145]  John T. Kohl,et al.  The Kerberos Network Authentication Service (V5 , 2004 .

[146]  R. Gibbons Game theory for applied economists , 1992 .

[147]  Faruk Gul A Theory of Disappointment Aversion , 1991 .

[148]  Tamer Basar,et al.  With the Capacity 0.461(bits) and the Optimal Opd Being 'q = , 1998 .

[149]  T. Başar,et al.  Dynamic Noncooperative Game Theory , 1982 .

[150]  J. Nash Equilibrium Points in N-Person Games. , 1950, Proceedings of the National Academy of Sciences of the United States of America.