Skip to main content

Enforcing Security in Artificially Intelligent Robots Using Monitors (Short Paper)

  • Conference paper
  • First Online:
Information Security Practice and Experience (ISPEC 2017)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10701))

  • 2830 Accesses

Abstract

Domestic robots are vulnerable to hi-jacking and industrial robots are vulnerable to cyber-attacks. This paper proposes the integration of a security component into a robots’ system to minimise security risks. This objective is achieved through the inclusion of several monitors such as functional monitor, communication monitor and behavioural monitor, which assess the internal operations of the system at low levels of operation. Through this approach, the paper proposes a novel framework which will make it hard for robots to be hi-jacked or, at the very least, make it more difficult for attacks on their behaviour.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Alemzadeh, H., Chen, D., Lewis, A., Kalbarczyk, Z., Raman, J., Leveson, N., Iyer, R.: Systems-theoretic safety assessment of robotic telesurgical systems. In: Koornneef, F., van Gulijk, C. (eds.) SAFECOMP 2015. LNCS, vol. 9337, pp. 213–227. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-24255-2_16

    Chapter  Google Scholar 

  2. Laughton, M.A.: Artificial intelligence techniques in power systems. In: IEE Colloquium on Artificial Intelligence Techniques in Power Systems (Digest No: 1997/354), 1/1-119, November 1997

    Google Scholar 

  3. Frank, J.: Artificial intelligence and intrusion detection: current and future directions. In. Proceedings of the 17th National Computer Security Conference (1994)

    Google Scholar 

  4. Guiochet, J., Machin, M., Waeselynck, H.: Safety-critical advanced robots: a survey. Rob. Auton. Syst. 94, 43–52 (2017)

    Article  Google Scholar 

  5. Guiochet, J.: Hazard analysis of human-robot interactions with HAZOP-UML. Saf. Sci. 84, 225–237 (2016)

    Article  Google Scholar 

  6. Lamddi, M.A.: Developing dependability requirements engineering for secure and safe information systems with knowledge acquisition for automated specification. J. Softw. Eng. Appl. 10(02), 211 (2017)

    Article  Google Scholar 

  7. Hansen, P.B.: The nucleus of a multiprogramming system. Commun. ACM 13(4), 238–241 (1970)

    Article  MATH  Google Scholar 

  8. Hoare, C.A.R.: Monitors: an operating system structuring concept. Commun. ACM 17(10), 549–557 (1974)

    Article  MATH  Google Scholar 

  9. Howard, J.H.: Proving monitors. Commun. ACM 19(5), 273–279 (1976)

    Article  MATH  Google Scholar 

  10. Lister, A.M., Sayer, P.J.: Hierarchical monitors. Softw. Pract. Experience 7(5), 613–623 (1977)

    Article  Google Scholar 

  11. Lister, A.: The problem of nested monitor calls. ACM SIGOPS Oper. Syst. Rev. 11(3), 5–7 (1977)

    Article  Google Scholar 

  12. Department of Defense, U.S.D.: Trusted computer system evaluation criteria (1985). Accessed 15 July 2015

    Google Scholar 

  13. Murdoch, S., Bond, M., Anderson, R.J.: How certification systems fail: lessons from the ware report. IEEE Secur. Priv. 10(6), 40–44 (2012)

    Google Scholar 

  14. Nibaldi, G.H.: Specification of a trusted computing base (TCB). Technical report ADA108831, MITRE Corporation, Bedford, Massachusetts, USA, November 1979. Accessed 15 July 2015

    Google Scholar 

  15. Pfitzmann, B., Riordan, J., StĂĽble, C., Waidner, M., Weber, A.: The PERSEUS system architecture (2001). Accessed 15 July 2015

    Google Scholar 

  16. DiRossi, M.: Towards a high assurance secure computing platform. In: Proceedings of the 10th IEEE High Assurance Systems Engineering Symposium, HASE 2007, pp. 381–382 (2007)

    Google Scholar 

  17. Tanenbaum, A., Herder, J., Bos, H.: Can we make operating systems reliable and secure? Computer 39(5), 44–51 (2006)

    Article  Google Scholar 

  18. Liedtke, J.: On \(\mu \)-kernel construction. In: Proceedings of the 15th ACM Symposium on Operating System Principles, SOSP 1995, pp. 237–250. ACM, December 1995

    Google Scholar 

  19. Klein, G., Andronick, J., Elphinstone, K., Heiser, G., Cock, D., Derrin, P., Elkaduwe, D., Engelhardt, K., Kolanski, R., Norrish, M., Sewell, T., Tuch, H., Winwood, S.: seL4: formal verification of an operating-system kernel. Commun. ACM 53(6), 107–115 (2010)

    Article  Google Scholar 

  20. Karger, P., Zurko, M., Bonin, D., Mason, A., Kahn, C.: A retrospective on the VAX VMM security kernel. IEEE Trans. Softw. Eng. 17(11), 1147–1165 (1991)

    Article  Google Scholar 

  21. Nie, X.W., Feng, D.G., Che, J.J., Wang, X.P.: Design and implementation of security operating system based on trusted computing. In: 2006 International Conference on Machine Learning and Cybernetics, pp. 2776–2781 (2006)

    Google Scholar 

  22. Setapa, S., Isa, M., Abdullah, N., Manan, J.L.: Trusted computing based microkernel. In: Proceedings of the 2010 International Conference on Computer Applications and Industrial Electronics, ICCAIE 2010, pp. 1–4 (2010)

    Google Scholar 

  23. Hendricks, J., van Doorn, L.: Secure bootstrap is not enough: shoring up the trusted computing base. In: Proceedings of the 11th Workshop on ACM SIGOPS European Workshop, EW, p. 11. ACM (2004)

    Google Scholar 

  24. Gong, L.: A secure identity-based capability system. In: Proceedings of the 1989 IEEE Symposium on Security and Privacy, pp. 56–63 (1989)

    Google Scholar 

  25. Neumann, P.G., Watson, R.N.M.: Capabilities revisited: a holistic approach to bottom-to-top assurance of trustworthy systems. In: Proceedings of the 4th Annual Layered Assurance Workshop, LAW 2010 (2010). Accessed 15 July 2015

    Google Scholar 

  26. Watson, R.N.M., Anderson, J., Laurie, B., Kennaway, K.: A taste of capsicum: practical capabilities for UNIX. Commun. ACM 55(3), 97–104 (2012)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Orhio Mark Creado .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Creado, O.M., Le, P.D. (2017). Enforcing Security in Artificially Intelligent Robots Using Monitors (Short Paper). In: Liu, J., Samarati, P. (eds) Information Security Practice and Experience. ISPEC 2017. Lecture Notes in Computer Science(), vol 10701. Springer, Cham. https://doi.org/10.1007/978-3-319-72359-4_40

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-72359-4_40

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-72358-7

  • Online ISBN: 978-3-319-72359-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics