Abstract
Robotic systems are increasingly integrated into various industries, including manufacturing, transportation, and healthcare. So, it is essential to identify the vulnerabilities of these systems and take precautions. These systems are vulnerable to cyber-attacks compromising their safety and operations. In this study, we developed an integrated runtime verification for the safety and security of an industrial robot inspection system. Runtime verification is a lightweight technique that involves evaluating the behaviour of a system at runtime. The developed runtime verification system is named MARVer. In the experiments, firstly, the runtime verification is independently for safety and security using MARVer-R. Then, integrated runtime verification is realized to monitor the effects of security attacks on safety. The experiments are evaluated in a TRL5 laboratory environment designed for quality inspection of automotive-body-in-white. Our study highlights the importance of verifying safety and security at runtime.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Farrell, M., Mavrakis, N., Ferrando, A., Dixon, C., Gao, Y.: Formal modelling and runtime verification of autonomous grasping for active debris removal. Front. Robot. AI. 8, 425 (2022)
Gjondrekaj, E., et al.: Towards a formal verification methodology for collective robotic systems. In: Aoki, T., Taguchi, K. (eds.) ICFEM 2012. LNCS, vol. 7635, pp. 54–70. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-34281-3_7
Falcone, Y., Jaber, M., Nguyen, T.H., Bozga, M., Bensalem, S.: Runtime verification of component-based systems. In: Barthe, G., Pardo, A., Schneider, G. (eds.) Software Engineering and Formal Methods. SEFM 2011. LNCS, vol. 7041, pp. 204–220. Springer, Berlin (2011). https://doi.org/10.1007/978-3-642-24690-6_15
Bartocci, E., Falcone, Y. (eds.): Lectures on Runtime Verification. LNCS, vol. 10457. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-75632-5
Huang, J., et al.: ROSRV: Runtime verification for robots. In: International Conference on Runtime Verification (2014)
Desai, A., Ghosh, S., Seshia, S.A., Shankar, N., Tiwari, A.: SOTER: a runtime assurance framework for programming safe robotics systems. In: 2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) (2019)
Alladi, T., Chamola, V., Zeadally, S.: Industrial control systems: Cyberattack trends and countermeasures. Comput. Commun. 155, 1–8 (2020)
Ferrando, A., Cardoso, R.C., Fisher, M., Ancona, D., Franceschini, L., Mascardi, V.: ROSMonitoring: a runtime verification framework for ROS. In: Mohammad, A., Dong, X., Russo, M. (eds.) Towards Autonomous Robotic Systems: 21st Annual Conference, TAROS 2020, Nottingham, UK, September 16, 2020, Proceedings, pp. 387–399. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-63486-5_40
Yang, Y., Holvoet, T.: Generating Safe Autonomous Decision-Making in ROS. arXiv preprint arXiv:2209.14042. (2022)
Shivakumar, S., Torfah, H., Desai, A., Seshia, S.A.: SOTER on ROS: a run-time assurance framework on the robot operating system. In: Deshmukh, J., Ničković, D. (eds.) Runtime Verification. RV 2020. LNCS, vol. 12399, pp. 184–194. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-60508-7_10
Torfah, H., Junges, S., Fremont, D.J., Seshia, S.A.: Formal analysis of AI-based autonomy: from modeling to runtime assurance. In: Feng, L., Fisman, D. (eds.) Runtime Verification. RV 2021. LNCS, vol. 12974, pp. 311–330. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-88494-9_19
Kirca, Y.S., et al.: Runtime verification for anomaly detection of robotic systems security. Machines. 11, 166 (2023)
Guclu, E., Örnek, Ö., Ozkan, M., Yazici, A., Demirci, Z.: An online distance tracker for verification of robotic systems’ safety. Sensors. 23, 2986 (2023)
Chatterjee, A., Ahmed, B.S.: IoT anomaly detection methods and applications: a survey. Internet Things. 19, 100568 (2022)
Ki̇rca, Y.S., Değirmenci, E., Yazi̇ci̇, A., Özkan, M.: ROS based attack tool for verification of robotic system security (2022)
Kanak, A., et al.: Verification and validation of an automated robot inspection cell for automotive body-in-white: a use case for the VALU3S ECSEL project. Open Res. Europe 1, 115 (2021)
Eskisehir Osmangazi university intelligent factory and robotics laboratory. https://ifarlab.ogu.edu.tr/
ESOGU corner case youtube video. https://youtu.be/hj8ekJUY50E (2023)
Acknowledgement
This work was supported by the VALU3S project that has received funding from the ECSEL Joint Undertaking (JU) under grant agreement No 876852. The JU receives support from the European Union’s Horizon 2020 research and innovation programme and Austria, Czech Republic, Germany, Ireland, Italy, Portugal, Spain, Sweden, Turkey (TUBITAK, under contract no:119N356).
This work is supported by the Scientific and Technical Research Council of Turkey (TUBITAK), Contract No 120N800, project title: “Verification and Validation of Automated Systems’ Safety and Security”.
The views expressed in this work are the authors’ and do not necessarily reflect the views or position of the European Commission. The authors, the VALU3S Consortium, and the ECSEL JU are not responsible for the use which might be made of the information contained in here.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Degirmenci, E. et al. (2023). Developing an Integrated Runtime Verification for Safety and Security of Industrial Robot Inspection System. In: Iida, F., Maiolino, P., Abdulali, A., Wang, M. (eds) Towards Autonomous Robotic Systems. TAROS 2023. Lecture Notes in Computer Science(), vol 14136. Springer, Cham. https://doi.org/10.1007/978-3-031-43360-3_11
Download citation
DOI: https://doi.org/10.1007/978-3-031-43360-3_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-43359-7
Online ISBN: 978-3-031-43360-3
eBook Packages: Computer ScienceComputer Science (R0)