Machine Learning Techniques for Cyber Security in Internet of Robotic Things
DOI:
https://doi.org/10.21015/vtse.v12i3.1870Abstract
Robots are becoming common in domestic, medical, industrial, entertainment, and educational routine activities. The use of robots automates the work processes thus minimizes human labor. The Robots perform complex and repetitive tasks with efficiency and agility, therefore, the conventional industrial manufacturing process are being replaced by smart manufacturing. Robotics encompasses the design and development of robot-based automated systems. It integrates various emerging technologies i.e. operational technology (OT), cloud computing, and artificial intelligence (AI). The Internet of Robotic Things (IoRT) seamlessly combines robots and Internet of Things (IoT) devices, enabling connectivity through the Internet. IoRT enables simple robots to coordinate with each other to achieve well-defined goals by creating a multi-robot system. Cyber security is an inherent challenge for IoRTs because of the interconnected infrastructure and reliance on critical industrial operations on the internet. Any cyber-attack can affect the ongoing operations and compromise the safety of robots. The growing interest among governments, researchers, and industries in robotics and automation demands a dependable cyber-security solution. This paper explores machine learning (ML) based cyber security solutions to mitigate cyber vulnerabilities and threats to IoRT and its dependent systems.
References
A.L. López, D.B. Jaramillo, P.D. Salgado, J.P. Montes and P.G. Rueda, “Architectures and Methodologies of Internet of Robotic Things Systems: A Systematic Review,” Nanotechnology Perceptions, pp.262-272., 2024 Doi: 10.62441/nano-ntp.v20iS4.22
K. Homayun, M. Tham, and Y. C. Chang, "Internet of robotic things for mobile robots: concepts, technologies, challenges, applications, and future directions." Digital Communications and Networks 9, no. 6, 2023. doi: 10.1016/j.dcan.2023.05.006
H. Khujamatov, E. Reypnazarov, D. Khasanov, and N. Akhmedov, “IoT, IIoT, and Cyber-Physical Systems Integration,” in Advances in Science, Technology and Innovation, 2021. doi: 10.1007/978-3-030-66222-6_3.
M. Bistron and Z. Piotrowski, “Artificial intelligence applications in military systems and their influence on sense of security of citizens,” Electronics (Switzerland), vol. 10, no. 7, 2021, doi: 10.3390/electronics10070871.
Z. Guan, L. Bian, T. Shang, and J. Liu, “When Machine Learning meets Security Issues: A survey,” in 2018 International Conference on Intelligence and Safety for Robotics, ISR 2018, 2018. doi: 10.1109/IISR.2018.8535799.
J. P. A. Yaacoub, H. N. Noura, O. Salman, and A. Chehab, “Robotics cyber security: vulnerabilities, attacks, countermeasures, and recommendations,” Int J Inf Secur, vol. 21, no. 1, 2022, doi: 10.1007/s10207-021-00545-8.
Terra, H. Riaz, K. Raizer, A. Hata, and R. Inam, “Safety vs. Efficiency: AI-Based Risk Mitigation in Collaborative Robotics,” in 2020 6th International Conference on Control, Automation and Robotics, ICCAR 2020, 2020. doi: 10.1109/ICCAR49639.2020.9108037.
S. H. Chang, C. H. Hsia, and W. Z. Hong. "A secured internet of robotic things (IoRT) for long-term care services in a smart building," The Journal of Supercomputing 79, no. 5, 2023. doi:10.1007/s11227-022-04845-1
S. J. DeCanio, “Robots and humans – complements or substitutes?,” J Macroecon, vol. 49, 2016, doi: 10.1016/j.jmacro.2016.08.003.
J. Arents and M. Greitans, “Smart Industrial Robot Control Trends, Challenges and Opportunities Within Manufacturing,” 2022. doi: 10.3390/app12020937.
M. Kyrarini et al., “A Survey of Robots in Healthcare,” 2021. doi: 10.3390/technologies9010008.
D. Floreano and R. J. Wood, “Science, technology and the future of small autonomous drones,” 2015. doi: 10.1038/nature14542.
H. Durmus, E. O. Gunes, M. Kirci, and B. B. Ustundag, “The design of general purpose autonomous agricultural mobile-robot:
‘AGROBOT,’” in 2015 4th International Conference on Agro-Geoinformatics, Agro-Geoinformatics 2015, 2015. doi: 10.1109/Agro-Geoinformatics.2015.7248088.
R. Bogue, “The role of robots in entertainment,” Industrial Robot, vol. 49, no. 4, 2022, doi: 10.1108/IR-02-2022-0054.
L. Romeo, A. Petitti, R. Marani, and A. Milella, “Internet of robotic things in smart domains: Applications and challenges,” 2020. doi: 10.3390/s20123355.
I. Afanasyev et al., “Towards the internet of robotic things: Analysis, architecture, components and challenges,” in Proceedings - International Conference on Developments in eSystems Engineering, DeSE, 2019. doi: 10.1109/DeSE.2019.00011
.
X. Yang, L. Shu, Y. Liu, G. P. Hancke, M. A. Ferrag, and K. Huang, “Physical Security and Safety of IoT Equipment: A Survey of Recent Advances and Opportunities,” IEEE Trans Industr Inform, vol. 18, no. 7, 2022, doi: 10.1109/TII.2022.3141408.
T. Kurihara and N. Togawa, “Hardware-Trojan Detection Based on the Structural Features of Trojan Circuits Using Random Forests,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. E105A, no. 7, 2022, doi: 10.1587/transfun.2021EAP1091.
R. Yasaei, L. Chen, S.-Y. Yu, and M. A. Al Faruque, “Hardware Trojan Detection using Graph Neural Networks,” IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2022, doi: 10.1109/tcad.2022.3178355.
R. Sharma, V. S. Rathor, G. K. Sharma, and M. Pattanaik, “A new hardware Trojan detection technique using deep convolutional neural network,” Integration, vol. 79, 2021, doi: 10.1016/j.vlsi.2021.03.001.
T. P. Vuong, G. Loukas, D. Gan, and A. Bezemskij, “Decision tree-based detection of denial of service and command injection attacks on robotic vehicles,” in 2015 IEEE International Workshop on Information Forensics and Security, WIFS 2015 - Proceedings, 2015. doi: 10.1109/WIFS.2015.7368559.
H. Pu, L. He, C. Zhao, D. K. Y. Yau, P. Cheng, and J. Chen, “Fingerprinting Movements of Industrial Robots for Replay Attack Detection,” IEEE Trans Mob Comput, 2021, doi: 10.1109/TMC.2021.3059796.
Y. Cui, Y. Sun, J. Luo, Y. Huang, Y. Zhou, and X. Li, “MMPD: A Novel Malicious PDF File Detector for Mobile Robots,” IEEE Sens J, vol. 22, no. 18, 2022, doi: 10.1109/JSEN.2020.3029083.
M. Shabbir, M. Kamal, Z. Ullah, and M. M. Khan, “Securing Autonomous Vehicles Against GPS Spoofing Attacks: A Deep Learning Approach,” IEEE Access, vol. 11, 2023, doi: 10.1109/ACCESS.2023.3319514.
M. Mudassir, D. Unal, M. Hammoudeh, and F. Azzedin, “Detection of Botnet Attacks against Industrial IoT Systems by Multilayer Deep Learning Approaches,” Wirel Commun Mob Comput, vol. 2022, 2022, doi: 10.1155/2022/2845446.
O. Jullian, B. Otero, M. Stojilović, J. J. Costa, J. Verdú, and M. A. Pajuelo, “Deep Learning Detection of GPS Spoofing,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2022. doi: 10.1007/978-3-030-95467-3_38.
M. Mukhandi, D. Portugal, S. Pereira, and M. S. Couceiro, “A novel solution for securing robot communications based on the MQTT protocol and ROS,” in Proceedings of the 2019 IEEE/SICE International Symposium on System Integration, SII 2019, 2019. doi: 10.1109/SII.2019.8700390.
H. Pu, L. He, C. Zhao, D. K. Y. Yau, P. Cheng, and J. Chen, “Fingerprinting Movements of Industrial Robots for Replay Attack Detection,” IEEE Trans Mob Comput, 2021, doi: 10.1109/TMC.2021.3059796.
Y. Cui, Y. Sun, J. Luo, Y. Huang, Y. Zhou, and X. Li, “MMPD: A Novel Malicious PDF File Detector for Mobile Robots,” IEEE Sens J, vol. 22, no. 18, 2022, doi: 10.1109/JSEN.2020.3029083.
M. Shabbir, M. Kamal, Z. Ullah, and M. M. Khan, “Securing Autonomous Vehicles Against GPS Spoofing Attacks: A Deep Learning Approach,” IEEE Access, vol. 11, 2023, doi: 10.1109/ACCESS.2023.3319514.
M. Mudassir, D. Unal, M. Hammoudeh, and F. Azzedin, “Detection of Botnet Attacks against Industrial IoT Systems by Multilayer Deep Learning Approaches,” Wirel Commun Mob Comput, vol. 2022, 2022, doi: 10.1155/2022/2845446.
O. Jullian, B. Otero, M. Stojilović, J. J. Costa, J. Verdú, and M. A. Pajuelo, “Deep Learning Detection of GPS Spoofing,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2022. doi: 10.1007/978-3-030-95467-3_38.
M. Mukhandi, D. Portugal, S. Pereira, and M. S. Couceiro, “A novel solution for securing robot communications based on the MQTT protocol and ROS,” in Proceedings of the 2019 IEEE/SICE International Symposium on System Integration, SII 2019, 2019. doi: 10.1109/SII.2019.8700390
Downloads
Published
How to Cite
Issue
Section
License
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License (CC-By) that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
This work is licensed under a Creative Commons Attribution License CC BY