Data Logic Attack on Heavy-Duty Industrial Manipulators

The anticipated widespread use of the heavy-duty industrial manipulator (HDIM) makes it an important role in the field of modern industrial automation. Research on the attack of cyber-physical systems based on industrial manipulator vulnerabilities is booming, while there are few studies on the data logic and attack impact for HDIMs. This paper proposes a new cyber-physical attack mechanism named data logic attack mechanism on HDIMs, including network protocol data logic attack, system data integrity logic attack, and process logic attack. Meanwhile, data logic attack models for HDIMs and an attack impact analysis model are established. Besides, for the proposed data logic attack mechanism, a hardware-in-the-loop cosimulation based on Simulink and Adams is carried out to demonstrate the impact of data logic attacks on the system integrity, availability, accuracy, and integrity. A test platform has also been established to test the attack mechanism’s effectiveness. The results of cosimulation and test show the attack impact ranking and effectiveness of the attack mechanism.

[1]  Enrique Soriano,et al.  Quantitative analysis of security in distributed robotic frameworks , 2018, Robotics Auton. Syst..

[2]  Sibin Mohan,et al.  Protecting Actuators in Safety-Critical IoT Systems from Control Spoofing Attacks , 2019, IoT S&P@CCS.

[3]  Xinyan Deng,et al.  RVFuzzer: Finding Input Validation Bugs in Robotic Vehicles through Control-Guided Testing , 2019, USENIX Security Symposium.

[4]  J. Monteuuis Attacker model for Connected and Automated Vehicles , 2018 .

[5]  Peter I. Corke,et al.  A Simple and Systematic Approach to Assigning Denavit–Hartenberg Parameters , 2007, IEEE Transactions on Robotics.

[6]  George Loukas,et al.  Physical indicators of cyber attacks against a rescue robot , 2014, 2014 IEEE International Conference on Pervasive Computing and Communication Workshops (PERCOM WORKSHOPS).

[7]  Christian Rossow,et al.  MALPITY: Automatic Identification and Exploitation of Tarpit Vulnerabilities in Malware , 2019, 2019 IEEE European Symposium on Security and Privacy (EuroS&P).

[8]  Sang-Hwa Kim,et al.  Review of Dimension Inhomogeneity in Robotics* , 2019, 2019 16th International Conference on Ubiquitous Robots (UR).

[9]  Pierluigi Nuzzo,et al.  DoS-Resilient Multi-Robot Temporal Logic Motion Planning , 2019, 2019 International Conference on Robotics and Automation (ICRA).

[10]  Waldemar Korzeniowski,et al.  Flexibility and Load-Bearing Capacity of Roof Bolting as Functions of Mounting Depth and Hole Diameter , 2019, Energies.

[11]  Howard Jay Chizeck,et al.  On potential security threats against rescue robotic systems , 2012, 2012 IEEE International Symposium on Safety, Security, and Rescue Robotics (SSRR).

[12]  Yan Zhang,et al.  Command Disaggregation Attack and Mitigation in Industrial Internet of Things , 2017, Sensors.

[13]  Davide Quarta,et al.  Security of controlled manufacturing systems in the connected factory: the case of industrial robots , 2019, Journal of Computer Virology and Hacking Techniques.

[14]  Ryan K. Williams,et al.  Approximate Probabilistic Security for Networked Multi-Robot Systems , 2019, 2019 International Conference on Robotics and Automation (ICRA).

[15]  Marco Balduzzi,et al.  A Security Evaluation of Industrial Radio Remote Controllers , 2019, DIMVA.

[16]  Michael P. Wellman,et al.  Towards the Science of Security and Privacy in Machine Learning , 2016, ArXiv.

[17]  Khalil M. Ahmad Yousef,et al.  Analyzing Cyber-Physical Threats on Robotic Platforms † , 2018, Sensors.

[18]  V. Elamaran,et al.  Network Vulnerability Analysis on Brain Signal/Image Databases Using Nmap and Wireshark Tools , 2018, IEEE Access.

[19]  Zhiliang Wang,et al.  False sequential logic attack on SCADA system and its physical impact analysis , 2016, Comput. Secur..

[20]  Fabio Roli,et al.  Security Evaluation of Support Vector Machines in Adversarial Environments , 2014, ArXiv.

[21]  Max Schreiber,et al.  Data Security and Raw Data Access of Contemporary Mobile Sensor Devices , 2019 .

[22]  Maolin Jin,et al.  Adaptive Integral Sliding Mode Control With Time-Delay Estimation for Robot Manipulators , 2017, IEEE Transactions on Industrial Electronics.

[23]  Zhiliang Wang,et al.  Improved Deep Belief Networks (IDBN) Dynamic Model-Based Detection and Mitigation for Targeted Attacks on Heavy-Duty Robots , 2018 .

[24]  Geok See Ng,et al.  Comparison of Corrupted Sensor Data Detection Methods in Detecting Stealthy Attacks on Cyber-Physical Systems , 2017, 2017 IEEE 22nd Pacific Rim International Symposium on Dependable Computing (PRDC).

[25]  Xianbin Wang,et al.  Three-Stage Stackelberg Game for Defending Against Full-Duplex Active Eavesdropping Attacks in Cooperative Communication , 2018, IEEE Transactions on Vehicular Technology.

[26]  Elena Basan,et al.  Analysis of the Impact of Denial of Service Attacks on the Group of Robots , 2018, 2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC).

[27]  Marco Conti,et al.  Data Management in Industry 4.0: State of the Art and Open Challenges , 2019, IEEE Access.

[28]  Andrea Maria Zanchettin,et al.  An Experimental Security Analysis of an Industrial Robot Controller , 2017, 2017 IEEE Symposium on Security and Privacy (SP).

[29]  Ahmed Meddahi,et al.  NFV Security Survey: From Use Case Driven Threat Analysis to State-of-the-Art Countermeasures , 2018, IEEE Communications Surveys & Tutorials.

[30]  Nikhil Chopra,et al.  On content modification attacks in bilateral teleoperation systems , 2016, 2016 American Control Conference (ACC).

[31]  Thenkurussi Kesavadas,et al.  Targeted Attacks on Teleoperated Surgical Robots: Dynamic Model-Based Detection and Mitigation , 2016, 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).

[32]  Xiong Luo,et al.  Compliance Control Using Hydraulic Heavy-Duty Manipulator , 2019, IEEE Transactions on Industrial Informatics.

[33]  Xiangpeng Xie,et al.  Resilient Event-Triggered Controller Synthesis of Networked Control Systems Under Periodic DoS Jamming Attacks , 2019, IEEE Transactions on Cybernetics.

[34]  J. R. Llata,et al.  Working Together: A Review on Safe Human-Robot Collaboration in Industrial Environments , 2017, IEEE Access.

[35]  Marcelo V. Garcia,et al.  An Approach of Cyber-Physical Production Systems Architecture for Robot Control , 2018, IECON 2018 - 44th Annual Conference of the IEEE Industrial Electronics Society.

[36]  Xinyu Yang,et al.  Data Integrity Attacks Against Dynamic Route Guidance in Transportation-Based Cyber-Physical Systems: Modeling, Analysis, and Defense , 2018, IEEE Transactions on Vehicular Technology.

[37]  Felix Lorenz,et al.  Online-Monitoring Autonomous Transport Robots with an R-valued Temporal Logic , 2018, 2018 IEEE 14th International Conference on Automation Science and Engineering (CASE).

[38]  Dong Zhao,et al.  Kinematic calibration of a 6-DOF hybrid robot by considering multicollinearity in the identification Jacobian , 2019, Mechanism and Machine Theory.