Cybersecurity Risks in Robotics
Cybersecurity Risks in Robotics
net/publication/319354229
CITATIONS READS
11 7,185
1 author:
Ishaani Priyadarshini
University of Delaware
34 PUBLICATIONS 125 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Ishaani Priyadarshini on 18 December 2017.
Abstract: With technology flourishing at a rapid rate, humans have been able to achieve considerable
heights of success. Accomplishment of tasks nowadays is either a click away or a command away in most
of the technological arenas. One such realm of technology is that of Robotics which has been there for
almost a century and continues advancing day by day. The evolution of robotics has ranged from the
basic remote controlled systems to humanoid robots. With applications as well as accuracy increasing
for every new system implemented, security risks too have been making their way into the new
invention. Since different robots have been created for different purposes in different fields like the
defense, household, medical or the space, protecting systems against their exploitation is of utmost
importance as these fields incorporate sensitive as well as intricate tasks. This chapter focusses on the
security aspects of Robotics. The necessity of Cybersecurity in Robotics has been explored by taking
different kinds of robots used in different fields. The current state of Robotics is vulnerable to many risks
and several case studies have been highlighted to support the need of securing Robotics by identifying
several risks to which it is vulnerable. Apart from that mitigation strategies have been discussed to
secure the domain of Robotics. An attack comparison has been made for three robots in analyzing them
against the vulnerabilities faced by them.
Keywords: Robotics, Humanoid Robots, Cybersecurity
Introduction to Cybersecurity and Robotics
Cybersecurity may be defined as the state of being protected against the criminal or unauthorized use of
electronic data or the measures to achieve this. It is a field which strives to defend attacks against
computer systems which may incorporate control systems, critical infrastructures and technology
transport systems. It ensures five security services namely Confidentiality, Integrity, Availability,
Authenticity and Non repudiation of electronic, computer and network domains. Most of the
organizations, corporations, institutions and governments collect, process and store magnanimous
amount of confidential data and transmit it across the networks to other systems. One of the most
contributing causes of cybersecurity is the constantly evolving nature of security risks. Even though the
traditional systems have been successful in protecting against significant threats, many possible threats
still remain unchartered. As the volume and sophistication of cyber-attacks increase exponentially, it is
necessary to safeguard information which might be of personal interest as well related to national
security. Thus a body of technologies, processes and practices works towards securing the networks,
computers, programs and data from attack, damage or unauthorized access. The National Institute of
Science and Technology (NIST), defines cyber-attack as a means of using the cyber space for disrupting,
disabling, destroying or maliciously controlling a computing environment or infrastructure [1]. This will
lead to destroying the integrity of the data or stealing controlled information. The cyber infrastructure
generally comprises of Electronic Information and communication systems, hardware and software,
storage, processing and communication. Cybersecurity being the biggest risk of technological operations
finds its use in almost every realm of technology. Ranging from real time data analytics to Drones and
Robotics, Cybersecurity becomes critically important as Internet of Things constantly grows. One
element of the cyber infrastructure is the field of robotics which we will be considering in this article.
The history of robots can be traced back to the 20th century when a mere humanoid machine was
introduced. Gradually it developed into what we call the robot nowadays. The first generation of robots
saw stationary, non-programmable, electromechanical devices which lacked sensors. They were
replaced by second generation robots which came with sensors and controllers. The third generation
robot was an even more refined version of the second generation robot and was full of features. It could
be stationary or mobile and could provide complex programming along with speech recognition and
synthesis. The fourth generation of robots is currently undergoing research and is under the developing
phase. Over the time, the definition for robots has kept on changing. A robot may be defined as a unit
devised to carry out tasks in a repeated manner, keeping a track of speed and precision. The term robot
comes from the Czech word ͚robota͛ depicting ͚forced labor͛. A robot may be controlled by a human
operator as well as a computer [2]. Robots may be classified into two types depending on how they are
controlled.
i) Autonomous Robots: These are the robots which do not need human or operator
intervention and can perform tasks by themselves [3]. For instance, the Bump and Go robot
which has bumper sensors to detect obstacles. With respect to every bump that it faces as
it hits the obstacle, it is given the command to change its direction.
ii) Insect Robots: A group of robots which function on the command of a single controller fall
into the category of Insect robots [4]. It is similar to a colony of insects wherein the entire
fleet follows a single leader. Antbo is an insect robot [5].
A more vivid definition for a robot focusses on a few characteristics followed by the device. The
characteristics are as follows [6],
i) Sensing: A robot must be able to sense its surroundings. For this purpose it is equipped with
light sensors, touch and pressure sensors, chemical sensors, sonar sensors and taste
sensors. A robot lacking sensors is unaware of its environment.
ii) Movement: One of the characteristics which makes robot so proficient is its ability to move.
A robot may be dependent on wheels or walking legs to move. The movement may depict
either an actual displacement in the position of the robot or simple parts of the robot to
move.
iii) Energy: A robot must be equipped with the required amount of energy/power to perform its
functions. It may draw power from solar cells, batteries or electricity.
iv) Intelligence: Specific programming may induce intelligence into the robot. These are called
as ͚smarts͛. The robot must receive the program to act in the required manner.
Thus, a robot can be termed as a system incorporating sensors, control systems, manipulators,
power supplies and softwares functioning simultaneously to accomplish a task. It requires
knowledge from domains like mechanical engineering, physics, electrical and structural engineering.
The concept of mathematics and computing also contribute to the same. Due to their parallelism
with human beings, specific advanced robots are given the name Android [7]. With the constant
evolution of robots, every domain explored by human beings benefits. Modern robots find their use
in space, land, oceans, biology and other technology oriented domains.
According to the National Aeronautics and Space Administration (NASA), Robotics is the study of
robots which are machines meant to perform specific tasks [8]. Some robots can do work by
themselves. Other robots must always have a person telling them what to do. Of all the ways NASA
uses robotics for, moving large objects in space is probably the most significant use of robotics.
Consequently, robotics is the branch of engineering that deals with conception, design,
manufacturing and operation of robots. The branch also highlights the importance of artificial
intelligence, nanotechnology and bioengineering. Isaac Asimov proposed a few postulates termed as
͚Asimov͛s three laws of Robotics͛ stating that [3],
Structure of Chapter
1. Importance of Cybersecurity in Robotics
We live in a world which is undergoing rapid changes. Innovation and technology have resulted
in constant evolution of robotics over the last few decades. Initially the field of Robotics was
restricted to the manufacturing world but now robots are capable of performing complex work
alongside humans expanding the productivity in lesser time. Cyber threat has been increasing
exponentially as data, systems and people are being connected digitally. It has been estimated
that the Robotics and automation industry will grow from $62 billion to $1.2 trillion in the next
ten years. The consumer robotics industry by 2019 is believed to be over $1.5 billion. Moreover
Robotics may also be associated with the Cloud Computing Environment. As the demand for
Robotics will grow, so will the risk associated with robotics. Cyber security breaches in robots
will have an adverse effect on robotics, thus damaging the financial aspects and reputation. A
hacked service robot could be otherwise used to harm people or carry out malfunctions
deliberately. Through open source platforms, people may get equipped with hacking skills, such
that automation will replace human labor. In the coming years it is likely that hackers could
override industry safeguards, disrupt services, harm products and steal important information.
Many real time constraints often play a pivotal role in robotics applications. Other than software
bugs and vulnerabilities, robotics is also prone to communication. We highlight a few
applications which require security and privacy to be introduced in the field of robotics
i) Defense and Space: The military field makes use of robotics in order to introduce automatic
aerial vehicles, also known as drones which typically are used in surveillance and combat
missions. Even though such communications should be encrypted, most of the times they
are not. There may be a situation such that an intruder snoops into the drone by taking its
control thus benefits from the non-encrypted communication. He may also crash the drone
into a highly populated area. There may also be a situation wherein an unauthorized entity
takes control over a robot making his way to sensitive data centers and sabotaging the
records.
ii) Medical Surgeries: There is potential danger involved in the process of operating patients
by instructing commands to robots. If there is no encryption or authentication mechanism
driving the same, the system is prone to man in the middle attacks. The consequences may
be dire as an unauthorized entity takes control of a surgical robot.
iii) Household Robots: It is expected that by 2020, every house will have a robot [9]. These
robots can be used as assistants or domestic helps and may assist in daily chores of the
household. They may adorn microphones, cameras and sensors which can collect vast
repositories of information. This information must be guarded. Many robots will be
endowed with the capacity to collect health status of people. Such sensitive information
must be taken care of, negligence of which may cause an unauthorized entity to take control
of the household robot and gain access to the sensitive data.
iv) Disaster Robots: Many robots have been introduced for coming to an aid during disasters.
They may be given the responsibility of accessing, breaking, repairing and disrupting harmful
systems. Since the robots are capable of excessive danger, it is necessary that they should
not be accessed by an external entity. An unauthorized entity may take control of a disaster
robot which has been deployed to disconnect a nuclear platform. This can cause a hindrance
for the disconnecting process.
The following are few vulnerabilities faced by robots that we have taken into consideration
for analyzing the robots
i) Remote Identification and Discovery: Remote identification and discovery is an important
vulnerability as it is relied upon to identify the presence of a robot. An adversary makes use
of the communication network to intercept or inject commands. WowWee Rovio and
Erector Spykee are relatively easy to detect as they make use of ad hoc networks or robot͛s
home network. Infrared provides a secure way to transmit and synchronize data making
WowWeeRoboSapien2 relatively difficult to identify.
ii) Passive and active Eavesdropping: The aim of Passive eavesdropping is to gather sensitive
information. An adversary may simply listen to weakly encoded or unencrypted packets to
seek confidential information. On the other hand, an Active eavesdropping follows two
phases, wherein in the former phase, the adversary sniffs messages from a liable user and
sends spoofed messages to the access point where the messages will be decoded and
further sent to another adversary. Both adversaries compare the encrypted messages with
the plaintext and can derive the mathematical key corresponding to the encryption process.
In this situation, a passive adversary may learn the password for enabling Rovio by method
of interception and further intercept the sensitive information being transmitted. The
Spykee lacks efficiency of protecting secret credentials, however intercepting sensitive data
in case of Spykee is difficult as it uses Diffie Hellman key exchange algorithm which is a
digital encryption technique. However Diffie Hellman Key exchange is vulnerable to Man in
the Middle attacks. Robosapien V2 is easily hackable. A group of hackers were successful in
replacing the robot͛s head with a pocket PC [14].
iii) Operational notifications: Some robots are capable of providing audible and other alerts
when a user is logged into the system. This enables people nearly to know that the system is
being accessed. Other robots periodically generate noise or signals when they are immobile.
This suggests that the robot is collecting data. The Rovio only provides a minimal visual cue
and no auditory cue when it is accessed. It can only indicate when it is powered on and
mobile. The Spykee provides chimes when it is accessed, however with the speaker being
turned off, it is practically impossible to indicate if someone has logged into the system.
Minimal visual cues give an idea that the robot is activated, however noticeable noise is
generated when it moves. The Robosapien 2 is known to generate significant noise as well
as making verbal exclamations.
iv) Controlling the Robots: An important aspect of maintaining security and privacy is the ability
to control the robot whenever and wherever required. An efficient robot must pay heed to
the instructions of its commander. Rovio and Spykee are controlled by using legitimate login
credentials. Even though they are physically limited, they can be effective in pushing small
objects on the floor. In case of RoboSapien V2, it is difficult to gain fine control of the robot,
however multiple trials can effectively lead to performing tasks like lifting up objects. It is
incapable of performing accurate physical tasks but may carry out tasks like picking a set of
keys.
v) Network security: As most of the robots are influenced by the network it is essential that
network security must be ensured. Both Rovio and Spykee use Wired Equivalence Privacy
(WEP) with 64 bit or 128 bit encryption, but Spykee has an advantageous edge of connecting
to Wi-Fi Protected Access (WPA). Networks using WEP encryption can be compromised by
cracking.
The security application of robots are many. We discuss four security applications of robots as
follows
Robotics
Machines have been around since classical times. Nowadays robots serve purposes in military,
commercial as well as domestic fields. They are helpful in diffusing weapons, finding survivors as well as
space operations. Robotics is a branch which makes use of mechanical engineering, computer
engineering and electronics engineering to design and construct robots by taking into account control,
feedback and information processing. These automated machines are believed to be able to mimic
humans in the coming future and may also resemble humans in appearance, behavior and cognition.
Humanoid Robotics
Humanoid robots are robots which resemble human beings with respect to their body shapes. They are
an excellent tool for researchers who need to comprehend human body structure and behavior
collaboratively known as biomechanics. They can perform human tasks like personal assistance and
providing entertainment. They may be used in future for performing dangerous space missions. An
Android is a humanoid robot. The extensive study of humanoid robots is termed as humanoid robotics.
It deals with designing and construction of humanoid robots.
Cybersecurity
The concept of cyber security dates back to the 1990s. The collaboration of tools, policies, security
concepts and risk management approaches which can lead to protection of a cyber-environment is
termed as cyber security. It leads to protection of computers, networks and data from unauthorized
access and risks initiated by cyber criminals. Thus it is the aggregation of efforts invested for eradicating
cyber risks.
Authors Bio:
[2] Bob Struuk, ͚Influence of the new trends in the economics on the military and industrial
robot system design philosophy͛, National University of Public Service, PhD Institute in Military
Technology, pp. 15, 2014.
[3] George A. Bekey, ͚Autonomous Robots- From Biological inspiration to Implementation and
Control, MIT Press, Cambridge Massachussets, London, England, Chapter-1, pp. 01-02, 2005.
[5] Ashley Carman, ͚Antbo is an insect robot you can build͛, www.theverge.com, 2016.
[6] Prathyusha.K et al,͛Design and development of a RFID based mobile robot͛, International
Journal of Engineering and Advanced Technology, Volume-1, Issue-1, pp.30-35, 2011.
[7] Takashi Minato et al, ͚ Development of an Android Robot for Studying Human Robot
Interaction͛, Innovations in Applied Artificial Intelligence Volume 3029 of the series Lecture
Notes in Computer Science, Springer, pp. 424-434, 2004.
[8] Sandra May, ͚What is Robotics͛, National Aeronautics and Space Administration,
www.nasa.gov , NASA Educational Technology Services, 2009.
[9] Michael Hoffman, ͚A Robot In Every South Korean Home by 2020͛, DailyTech, April 2004.
[10] Cortney L. Bolden, ͚Cybersecurity Challenges for Manned and Unmanned Systems͛,
American Military University, Homeland Security, 2015.
[11] Tamara Bonaci et al, ͚To Make a Robot Secure: An Experimental Analysis of Cyber Security
Threats Against Teleoperated Surgical Robots͛, ACM Transaction on Cyber-Physical Systems,
pp.02, 2015.
[12] Jennifer Langston. ͚ Researchers hack a teleoperated surgical robot to reveal security flaws͛,
www.washington.edu, University of Washington, pp. 01-03, 2015.
[13] Tamara Denning et al, ͚A Spotlight on Security and Privacy Risks with Future Household
Robots: Attacks and Lessons͛, 11th International Conference on Ubiquitous Computing
(Ubicomp), pp. 105-114, October 2009.
[14] Sven Behnke et al, ͚Playing Soccer with RoboSapien͛, Lecture Notes in Artificial Intelligence,
LNAI 4020, Springer, 2006.
[15] Major John G. Lehane, ͚Military Androids: A vision for human replacement in 2035͛, United
States Marine Corps, School of Advanced War fighting, Marine Corps University, pp. 01-23,
2010.
[16] Murph Finnicum and Samuel T. King, ͚Building Secure Robot Applications͛, Proceedings of
the 6th USENIX conference on Hot topics in security͛ USENIX Association Berkeley,pp. 01-06,
2011.
[17] Laurel D. Riek and Don Howard, ͚A Code of Ethics for the Human-Robot Interaction
Profession͛, In We Robot 2014.