Challenges in ROS forensics
dc.contributor.author | Abeykoon, Iroshan | |
dc.contributor.author | Feng, Xiaohua | |
dc.date.accessioned | 2020-07-13T10:08:03Z | |
dc.date.available | 2020-07-13T10:08:03Z | |
dc.date.issued | 2020-04-09 | |
dc.identifier.citation | Abeykoon I, Feng X (2019) 'Challenges in ROS forensics', IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation - Leicester, Institute of Electrical and Electronics Engineers Inc.. | en_US |
dc.identifier.isbn | 9781728140346 | |
dc.identifier.doi | 10.1109/SmartWorld-UIC-ATC-SCALCOM-IOP-SCI.2019.00299 | |
dc.identifier.uri | http://hdl.handle.net/10547/624208 | |
dc.description.abstract | The usage of robot is rapidly growth in our society. The communication link and applications connect the robots to their clients or users. This communication link and applications are normally connected through some kind of network connections. This network system is amenable of being attached and vulnerable to the security threats. It is a critical part for ensuring security and privacy for robotic platforms. The paper, also discusses about several cyber-physical security threats that are only for robotic platforms. The peer to peer applications use in the robotic platforms for threats target integrity, availability and confidential security purposes. A Remote Administration Tool (RAT) was introduced for specific security attacks. An impact oriented process was performed for analyzing the assessment outcomes of the attacks. Tests and experiments of attacks were performed in simulation environment which was based on Gazbo Turtlebot simulator and physically on the robot. A software tool was used for simulating, debugging and experimenting on ROS platform. Integrity attacks performed for modifying commands and manipulated the robot behavior. Availability attacks were affected for Denial-of-Service (DoS) and the robot was not listened to Turtlebot commands. Integrity and availability attacks resulted sensitive information on the robot. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | en_US |
dc.relation.url | https://ieeexplore.ieee.org/document/9060170 | en_US |
dc.subject | transport layer security | en_US |
dc.subject | robot hack acquisition | en_US |
dc.subject | forensics acquisition and data recovery | en_US |
dc.subject | robot operating system | en_US |
dc.subject | robot hack | en_US |
dc.title | Challenges in ROS forensics | en_US |
dc.title.alternative | 2019 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI) | en_US |
dc.type | Conference papers, meetings and proceedings | en_US |
dc.contributor.department | University of Bedfordshire | en_US |
dc.date.updated | 2020-07-13T10:04:01Z | |
dc.description.note |