Empirical Assessment of Corrupt Sensor Data Detection Methods in a Robot

G. Sabaliauskaite, G.S. Ng, J. Ruths, A. Mathur

Research output: Chapter in Book/Report/Conference proceedingConference proceedingpeer-review

Abstract

An experiment was conducted to investigate the response of a robot to cyber attacks and the effectiveness of methods to detect such attacks. The experiment was run in simulation as well as on an actual robot. To ensure validity of results, cyber attacks were implemented on three robots of the same make and model through their wireless control mechanisms. Attacks were launched to investigate their feasibility, impact, and the effectiveness of the detection methods. Analysis of experimental data indicates that, among the several methods examined, the one which compares sensor values to the average historical values, is the most effective. In some experiments, the effectiveness of various methods was found to be lower in actual robots as compared to that in simulation. Thus, when practically feasible, it is important to test security countermeasures in realistic environments. Furthermore, factors such as attack size and timing, were found to influence the attack detection effectiveness, and hence ought to be considered while designing security countermeasures.
Original languageEnglish
Title of host publication2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC)
PublisherIEEE
Pages482 - 489
Number of pages8
ISBN (Electronic)978-1-4673-8845-0
DOIs
Publication statusPublished - 25 Aug 2016
Externally publishedYes
Event2016 IEEE 40th Annual Computer Software and Applications Conference - Atlanta, United States
Duration: 10 Jun 201614 Jun 2016

Conference

Conference2016 IEEE 40th Annual Computer Software and Applications Conference
Abbreviated titleCOMPSAC
Country/TerritoryUnited States
CityAtlanta
Period10/06/1614/06/16

Keywords

  • cyber-attacks
  • cyber-physical systems
  • FACT graph
  • robots
  • safety
  • security
  • empirical studies

Fingerprint

Dive into the research topics of 'Empirical Assessment of Corrupt Sensor Data Detection Methods in a Robot'. Together they form a unique fingerprint.

Cite this