Abstract
Domestic robots are vulnerable to hi-jacking and industrial robots are vulnerable to cyber-attacks. This paper proposes the integration of a security component into a robots’ system to minimise security risks. This objective is achieved through the inclusion of several monitors such as functional monitor, communication monitor and behavioural monitor, which assess the internal operations of the system at low levels of operation. Through this approach, the paper proposes a novel framework which will make it hard for robots to be hi-jacked or, at the very least, make it more difficult for attacks on their behaviour.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Alemzadeh, H., Chen, D., Lewis, A., Kalbarczyk, Z., Raman, J., Leveson, N., Iyer, R.: Systems-theoretic safety assessment of robotic telesurgical systems. In: Koornneef, F., van Gulijk, C. (eds.) SAFECOMP 2015. LNCS, vol. 9337, pp. 213–227. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-24255-2_16
Laughton, M.A.: Artificial intelligence techniques in power systems. In: IEE Colloquium on Artificial Intelligence Techniques in Power Systems (Digest No: 1997/354), 1/1-119, November 1997
Frank, J.: Artificial intelligence and intrusion detection: current and future directions. In. Proceedings of the 17th National Computer Security Conference (1994)
Guiochet, J., Machin, M., Waeselynck, H.: Safety-critical advanced robots: a survey. Rob. Auton. Syst. 94, 43–52 (2017)
Guiochet, J.: Hazard analysis of human-robot interactions with HAZOP-UML. Saf. Sci. 84, 225–237 (2016)
Lamddi, M.A.: Developing dependability requirements engineering for secure and safe information systems with knowledge acquisition for automated specification. J. Softw. Eng. Appl. 10(02), 211 (2017)
Hansen, P.B.: The nucleus of a multiprogramming system. Commun. ACM 13(4), 238–241 (1970)
Hoare, C.A.R.: Monitors: an operating system structuring concept. Commun. ACM 17(10), 549–557 (1974)
Howard, J.H.: Proving monitors. Commun. ACM 19(5), 273–279 (1976)
Lister, A.M., Sayer, P.J.: Hierarchical monitors. Softw. Pract. Experience 7(5), 613–623 (1977)
Lister, A.: The problem of nested monitor calls. ACM SIGOPS Oper. Syst. Rev. 11(3), 5–7 (1977)
Department of Defense, U.S.D.: Trusted computer system evaluation criteria (1985). Accessed 15 July 2015
Murdoch, S., Bond, M., Anderson, R.J.: How certification systems fail: lessons from the ware report. IEEE Secur. Priv. 10(6), 40–44 (2012)
Nibaldi, G.H.: Specification of a trusted computing base (TCB). Technical report ADA108831, MITRE Corporation, Bedford, Massachusetts, USA, November 1979. Accessed 15 July 2015
Pfitzmann, B., Riordan, J., StĂĽble, C., Waidner, M., Weber, A.: The PERSEUS system architecture (2001). Accessed 15 July 2015
DiRossi, M.: Towards a high assurance secure computing platform. In: Proceedings of the 10th IEEE High Assurance Systems Engineering Symposium, HASE 2007, pp. 381–382 (2007)
Tanenbaum, A., Herder, J., Bos, H.: Can we make operating systems reliable and secure? Computer 39(5), 44–51 (2006)
Liedtke, J.: On \(\mu \)-kernel construction. In: Proceedings of the 15th ACM Symposium on Operating System Principles, SOSP 1995, pp. 237–250. ACM, December 1995
Klein, G., Andronick, J., Elphinstone, K., Heiser, G., Cock, D., Derrin, P., Elkaduwe, D., Engelhardt, K., Kolanski, R., Norrish, M., Sewell, T., Tuch, H., Winwood, S.: seL4: formal verification of an operating-system kernel. Commun. ACM 53(6), 107–115 (2010)
Karger, P., Zurko, M., Bonin, D., Mason, A., Kahn, C.: A retrospective on the VAX VMM security kernel. IEEE Trans. Softw. Eng. 17(11), 1147–1165 (1991)
Nie, X.W., Feng, D.G., Che, J.J., Wang, X.P.: Design and implementation of security operating system based on trusted computing. In: 2006 International Conference on Machine Learning and Cybernetics, pp. 2776–2781 (2006)
Setapa, S., Isa, M., Abdullah, N., Manan, J.L.: Trusted computing based microkernel. In: Proceedings of the 2010 International Conference on Computer Applications and Industrial Electronics, ICCAIE 2010, pp. 1–4 (2010)
Hendricks, J., van Doorn, L.: Secure bootstrap is not enough: shoring up the trusted computing base. In: Proceedings of the 11th Workshop on ACM SIGOPS European Workshop, EW, p. 11. ACM (2004)
Gong, L.: A secure identity-based capability system. In: Proceedings of the 1989 IEEE Symposium on Security and Privacy, pp. 56–63 (1989)
Neumann, P.G., Watson, R.N.M.: Capabilities revisited: a holistic approach to bottom-to-top assurance of trustworthy systems. In: Proceedings of the 4th Annual Layered Assurance Workshop, LAW 2010 (2010). Accessed 15 July 2015
Watson, R.N.M., Anderson, J., Laurie, B., Kennaway, K.: A taste of capsicum: practical capabilities for UNIX. Commun. ACM 55(3), 97–104 (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Creado, O.M., Le, P.D. (2017). Enforcing Security in Artificially Intelligent Robots Using Monitors (Short Paper). In: Liu, J., Samarati, P. (eds) Information Security Practice and Experience. ISPEC 2017. Lecture Notes in Computer Science(), vol 10701. Springer, Cham. https://doi.org/10.1007/978-3-319-72359-4_40
Download citation
DOI: https://doi.org/10.1007/978-3-319-72359-4_40
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-72358-7
Online ISBN: 978-3-319-72359-4
eBook Packages: Computer ScienceComputer Science (R0)