机器人操作系统中的信息加密:强化移动机器人的附带效应

Q1 Computer Science Frontiers in ICT Pub Date : 2018-03-02 DOI:10.3389/fict.2018.00002
F. J. Lera, Vicente Matellán Olivera, Jesús Balsa-Comerón, Ángel Manuel Guerrero Higueras, C. F. Llamas
{"title":"机器人操作系统中的信息加密:强化移动机器人的附带效应","authors":"F. J. Lera, Vicente Matellán Olivera, Jesús Balsa-Comerón, Ángel Manuel Guerrero Higueras, C. F. Llamas","doi":"10.3389/fict.2018.00002","DOIUrl":null,"url":null,"abstract":"In human-robot interaction situations, robot sensors collect huge amounts of data from the environment in order to characterize the situation. Some of the gathered data ought to be treated as private, such as medical data (i.e., medication guidelines), personal and safety information (i.e., images of children, home habits, alarm codes, etc.). However, most robotic software development frameworks are not designed for securely managing this information. This paper analyzes the scenario of hardening one of the most widely used robotic middlewares, Robot Operating System (ROS). The study investigates a robot’s performance when ciphering the messages interchanged between ROS nodes under the publish/subscribe paradigm. In particular, this research focuses on the nodes which manage cameras and LIDAR sensors, which are two of the most extended sensing solutions in mobile robotics, and analyzes the collateral effects on the robot's achievement under different computing capabilities and encryption algorithms (3DES, AES and Blowfish) to robot performance. The findings present empirical evidence that simple encryption algorithms are lightweight enough to provide cyber-security even in low-powered robots when carefully designed and implemented. Nevertheless, these techniques come with a number of serious drawbacks regarding robot autonomy and performance if they are applied randomly. To avoid these issues, we define a taxonomy that links the type of ROS message, computational units, and the encryption methods. As a result, we present a model to select the optimal options for hardening a mobile robot using ROS.","PeriodicalId":37157,"journal":{"name":"Frontiers in ICT","volume":"78 1","pages":"2"},"PeriodicalIF":0.0000,"publicationDate":"2018-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"26","resultStr":"{\"title\":\"Message Encryption in Robot Operating System: Collateral Effects of Hardening Mobile Robots\",\"authors\":\"F. J. Lera, Vicente Matellán Olivera, Jesús Balsa-Comerón, Ángel Manuel Guerrero Higueras, C. F. Llamas\",\"doi\":\"10.3389/fict.2018.00002\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In human-robot interaction situations, robot sensors collect huge amounts of data from the environment in order to characterize the situation. Some of the gathered data ought to be treated as private, such as medical data (i.e., medication guidelines), personal and safety information (i.e., images of children, home habits, alarm codes, etc.). However, most robotic software development frameworks are not designed for securely managing this information. This paper analyzes the scenario of hardening one of the most widely used robotic middlewares, Robot Operating System (ROS). The study investigates a robot’s performance when ciphering the messages interchanged between ROS nodes under the publish/subscribe paradigm. In particular, this research focuses on the nodes which manage cameras and LIDAR sensors, which are two of the most extended sensing solutions in mobile robotics, and analyzes the collateral effects on the robot's achievement under different computing capabilities and encryption algorithms (3DES, AES and Blowfish) to robot performance. The findings present empirical evidence that simple encryption algorithms are lightweight enough to provide cyber-security even in low-powered robots when carefully designed and implemented. Nevertheless, these techniques come with a number of serious drawbacks regarding robot autonomy and performance if they are applied randomly. To avoid these issues, we define a taxonomy that links the type of ROS message, computational units, and the encryption methods. As a result, we present a model to select the optimal options for hardening a mobile robot using ROS.\",\"PeriodicalId\":37157,\"journal\":{\"name\":\"Frontiers in ICT\",\"volume\":\"78 1\",\"pages\":\"2\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-03-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"26\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Frontiers in ICT\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.3389/fict.2018.00002\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"Computer Science\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Frontiers in ICT","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.3389/fict.2018.00002","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"Computer Science","Score":null,"Total":0}
引用次数: 26

摘要

在人机交互的情况下,机器人传感器从环境中收集大量的数据,以表征该情况。有些收集到的数据应该被视为私人数据,例如医疗数据(即用药指南)、个人和安全信息(即儿童图像、家庭习惯、报警代码等)。然而,大多数机器人软件开发框架并不是为安全管理这些信息而设计的。本文分析了应用最广泛的机器人中间件之一——机器人操作系统(ROS)的加固方案。研究了机器人在发布/订阅模式下对ROS节点之间交换的消息进行加密时的性能。特别地,本研究聚焦于管理相机和LIDAR传感器的节点,这是移动机器人中最广泛的两种传感解决方案,并分析了不同计算能力和加密算法(3DES, AES和Blowfish)下机器人成就对机器人性能的附带影响。研究结果提供了经验证据,证明简单的加密算法足够轻巧,即使在精心设计和实施的低功率机器人中也能提供网络安全。然而,如果这些技术是随机应用的,那么它们在机器人的自主性和性能方面会有一些严重的缺点。为了避免这些问题,我们定义了一个将ROS消息类型、计算单元和加密方法联系起来的分类法。因此,我们提出了一个模型来选择使用ROS加固移动机器人的最佳选项。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Message Encryption in Robot Operating System: Collateral Effects of Hardening Mobile Robots
In human-robot interaction situations, robot sensors collect huge amounts of data from the environment in order to characterize the situation. Some of the gathered data ought to be treated as private, such as medical data (i.e., medication guidelines), personal and safety information (i.e., images of children, home habits, alarm codes, etc.). However, most robotic software development frameworks are not designed for securely managing this information. This paper analyzes the scenario of hardening one of the most widely used robotic middlewares, Robot Operating System (ROS). The study investigates a robot’s performance when ciphering the messages interchanged between ROS nodes under the publish/subscribe paradigm. In particular, this research focuses on the nodes which manage cameras and LIDAR sensors, which are two of the most extended sensing solutions in mobile robotics, and analyzes the collateral effects on the robot's achievement under different computing capabilities and encryption algorithms (3DES, AES and Blowfish) to robot performance. The findings present empirical evidence that simple encryption algorithms are lightweight enough to provide cyber-security even in low-powered robots when carefully designed and implemented. Nevertheless, these techniques come with a number of serious drawbacks regarding robot autonomy and performance if they are applied randomly. To avoid these issues, we define a taxonomy that links the type of ROS message, computational units, and the encryption methods. As a result, we present a model to select the optimal options for hardening a mobile robot using ROS.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Frontiers in ICT
Frontiers in ICT Computer Science-Computer Networks and Communications
自引率
0.00%
发文量
0
期刊最新文献
Project Westdrive: Unity City With Self-Driving Cars and Pedestrians for Virtual Reality Studies The Syncopated Energy Algorithm for Rendering Real-Time Tactile Interactions Dyadic Interference Leads to Area of Uncertainty During Face-to-Face Cooperative Interception Task Eyelid and Pupil Landmark Detection and Blink Estimation Based on Deformable Shape Models for Near-Field Infrared Video Toward Industry 4.0 With IoT: Optimizing Business Processes in an Evolving Manufacturing Factory
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1