Elsevier

Computers & Security

Volume 70, September 2017, Pages 422-435
Computers & Security

Empirical analysis of cyber-attacks to an indoor real time localization system for autonomous robots

https://doi.org/10.1016/j.cose.2017.06.013Get rights and content

Abstract

Real Time Location Systems (RTLSs) are critical components of many mobile robots that rely on them to safely operate in different environments, and their cyber-security is a growing concern. The goal of this paper is to demonstrate that there are statistically meaningful differences in the data provided by beacon-based RTLSs between the case when there is an attacker or none, which can be used to detect attacks. A procedure to choose the more discriminant distribution of beacons is presented, as well as its empirical validation, based on data provided by a commercial RTLS used by a mobile robot for indoor navigation. In the evaluation, three basic alternatives to define the distribution of beacons were considered to see which one was more discriminant, that is, the one with more differences. Statistical differences in the data gathered by the mobile robot, when the localization system is under attack, and when it is not, have been found. It has been also verified that these differences are larger or smaller depending on the location of the beacons.

Introduction

Cyber-security of robotic systems is an emerging and necessary field of research (see Morante et al., 2015). Specifically, cyber-security on autonomous systems is becoming increasingly necessary. New security and safety problems have appeared with the introduction of autonomous systems, such as robots, drones, and automobiles, into our daily lives, especially in critical fields involving humans, as for instance in medical robotics (Bonaci et al., 2015).

Conventional Intrusion Detection Systems (IDSs) are not usually suitable for autonomous systems. They often do not take into account physical aspects, such as mobility or energy consumption. Some work to adapt conventional IDSs have been done. For instance Vuong et al. (2015) propose a method to detect cyber-attacks by using the data gathered by on-board systems and processes to improve IDS performance.

Real Time Location Systems (RTLSs) systems are critical components of many robotic systems. For example, mobile robots use them to navigate autonomously, which has been one of the classical problems in robotics. Robots use them to obtain their relative location in a given map which allow calculating routes, planning next actions, etc. There are other alternatives for self-locating mobile robots. Simultaneous Localization and Mapping (SLAM) (Dissanayake et al., 2001) has been one of the hot topics in robotics for many years (visual SLAM, laser SLAM, etc.). Although efficient algorithms have been developed to solve the SLAM problem, these algorithms demand a lot of computing power that is not usually available in mobile robots. So, many industrial applications of mobile robots rely on external RTLSs, instead of using self-localization techniques, thereby converting RTLSs into a vector of cyber-attacks in robotic systems.

Different approaches are used to implement RTLS for robotic systems. They can be classified (see Liu et al., 2007) as ones based on range estimation, and those that are not. Most popular ones are range-based. Localization algorithms for range-based RTLSs involve measuring physical properties that can be used to calculate the distance between a mobile transceiver and several beacons whose locations are known. The distance between the mobile transceiver and the beacon can be calculated as Time of Arrival (TOA), as used in Global Positioning System (GPS); Time Difference of Arrival (TdOA) is also widely used, as well as the Angle of Arrival (AOA), and other properties of arriving signals. Beacons must be located close enough for the mobile transceiver to receive the distance from sufficient beacons to estimate the location. Usually, at least three beacons are needed to get a 2D-location estimate, and four for a 3D-location estimate. The location estimate obtained has an associated error, depending on the precision of the system.

In particular, UWB-based localization systems are used in robotics because they offer an affordable and low-cost computational solution for indoor localization (González et al., 2009). These systems estimate the location using the range between the mobile transceiver on-board the robot and several beacons distributed in the area where the robot is moving. The distribution of beacons must be carefully chosen when deploying a UWB-based RTLS, because it may have an impact on the ability to obtain accurate location estimates.

There are three basic alternatives to define the distribution of beacons according to coverage. Each one has its own advantages and disadvantages. The first one tries to maximize the coverage area. The second alternative tries to maximize precision by reducing the coverage area and increasing the density of beacons. The third one is a compromise solution between coverage and precision.

RTLSs have reportedly been cyber-attacked. The resilience of RTLSs to Denial of Service (DoS) and distance spoofing attacks have been analyzed in the literature, and different methods for secure positioning have been proposed. For instance Capkun and Hubaux (2005) propose a statistical method for position verification, called Verifiable Multilateration (VM), that determines the location of a mobile transceiver from a set of reference points whose locations were known using the distances between the reference points and the device. This method requires that the location of the reference points be given by a ground-truth system in real time, which could also be a vector of attack. Our method does not require a ground-truth system, only data gathered by a RTLS, even if it is suffering an attack.

Cyber-attacks to outdoor localization services, such as GPS, have been reported and analyzed (see Psiaki and Humphreys, 2016). In this work, we focus on RTLSs for indoor environments, also known as Indoor Positioning Systems (IPSs). A survey of wireless indoor positioning techniques and systems is shown in Liu et al. (2007). Those attacks on IPS studied in the scientific literature have to do with sensor networks. For instance Van Phuong et al. (2006), propose an algorithm for detecting a series of attacks in Wireless Sensor Networks (WSNs) by looking for anomalies using the Cumulative Sum (CUSUM) algorithm. Our proposal is somewhat similar, as we look for differences between the expected locations and the location estimates gathered by a mobile transceiver. In our case, we are not analyzing the sequence of packets, but their content.

Several proposals have been made to detect stealthy attacks. Urbina et al. (2016) present a survey on attack detection schemes in Industrial Control Systems (ICSs). They propose a new metric to measure the impact of stealthy attacks and show that the impact of such attacks can be mitigated in several cases by the proper combination and configuration of detection schemes. Sabaliauskaite et al. (2016) propose a method using a CUSUM algorithm to detect stealthy attacks on a robotic system. Attacks consist of changing the readings obtained from one of the robot sonar sensors when transmitted to the wireless control system. This is similar to spoofing attacks we analyze in this work, in which the signals of beacons are modified. However, in our proposal, different statistical methods have to be used because data gathered by RTLSs do not follow a normal distribution as happens in the sonar sensor readings used in Sabaliauskaite et al. (2016).

With respect to security problems on UWB-based localization systems, attacks on beacons are the most common because they are physically exposed. Jamming or spoofing the signal of one or more beacons affects the mobile transceiver location estimate, which may have dangerous consequences for robot behavior. DoS attacks on one or more of the beacons or spoofing attacks on the signal of the beacons are easy to carry out, so methods for detecting attacks are required. Table 1 enumerates different properties that are used by localization algorithms, along with different threats that may be employed against them (Li et al., 2005). The vulnerabilities can be used to carry out a DoS attack by temporarily or definitively interrupting the signal of one or more radio beacons. A spoofing attack can also be performed by changing the signal of the radio beacons.

We focus on these kinds of attacks. First, we want to demonstrate that there are statistically meaningful differences in the data provided by beacon-based RTLSs between the case when there is an attacker or not, which can be formulated as:

Question 1

Given a distribution of beacons, are there statistically meaningful differences between the location estimates gathered by an RTLS when the system operates normally and when it is under attack?

If the answer is positive, it should be possible to get a classification model to detect DoS and spoofing attacks simply by analyzing the data gathered by the mobile transceiver.

There are some precedents to detecting attacks through sensor data by using statistical and Machine Learning techniques. Livadas et al. (2006) present a method using machine learning-based classification techniques to identify botnet traffic, Shon and Moon (2007) use a Support Vector Machine (SVM) to classify abnormal behaviors in the traffic of a network. Regarding WSNs Xie et al. (2013) use the K-Nearest Neighbors (KNN) algorithm to detect anomalies, while Shahid et al. (2015) use an SVM, and Xie et al. (2015) use a segment-based method. All the above methods depend on specific features in their input data and may not work properly in different environments. We call feature one of the properties of the input data used to estimate the location, for instance, the distance of different beacons in RTLSs. The selection of the proper features is not always an easy task, as shown in Abu-Mostafa et al. (2012), although there are Machine Learning algorithms that allow feature selection (see Frank, Wolfe, 1956, Guyon, Elisseeff, 2003, Shalev-Shwartz et al, 2010). Our work will help to decide if something similar to those proposals could be achieved by using the data provided by RTLSs, before facing feature selection. In addition, this could be applied to any RTLS, regardless of its implementation, because only location estimates are used, not specific features.

In the case where the above answer is positive, the question arises whether the distribution of beacons affects these differences. This issue can be formulated as:

Question 2

If it is possible to find different distributions with statistically meaningful differences, which one is the most discriminant?

Analyzing the differences among different distribution of beacons helps to select the one that shows more differences. This is the one that best differentiates an attack from a device precision error. In order to study these differences we evaluate the three beacon location alternatives previously mentioned.

The procedure that we are proposing can work with different significance levels (α) in order to fit the confidence restrictions of our tests.

The rest of this paper is organized as follows: Section 2 describes the systems and the environment where the experiments were carried out. It also specifies the procedure and tools employed in the analysis. Section 3 goes into the statistical analysis carried out in depth and presents our procedure. Section 4 summarizes the data gathered and the information that can be used. Section 5 discusses the results that can be extracted from the data analysis. Finally, the last section summarizes conclusions and future work envisioned.

All datasets and scripts used in this research are available in a public git repository.1

Section snippets

Materials and methods

A set of experiments was carried out to answer the two questions formulated in the previous section. They consisted of performing cyber-attacks on the beacons of a commercial RTLS used by a mobile robot in order to estimate its location.

Experiments were conducted in an indoor mock-up apartment located at the mobile robotics lab of the University of León (Spain).

We generated a sufficiently large database that includes locations calculated by the RTLS under normal conditions (not under attack),

Calculation

The aim of the analysis is to decide if there are statistically meaningful differences among the location estimates that robot Karen receives in the 8 different situations presented previously for the three beacon distributions described above. In addition, with these results we can not only decide for which distribution the differences among situations are best identified, but we can also determine which checkpoints are more discriminating.

The analysis is focused on X and Y coordinates because

Results

We want to draw attention to the fact that the significance level is a parameter in our proposal. This allows us to study and fit the confidence of our tests. We have carried out our experiments with two confidence levels: α1 = 0,05 and α2 = 0,01.

We will illustrate how the results are obtained for checkpoint 3 with Distribution #1 with significance level α1. The analysis for the rest of the checkpoints has been performed in an analogous way. Later, in the Complete Results section, the

Discussion

As mentioned in Section 4.1, two different significance levels have been considered. The following discussion is based on α2 = 0.01 because it provides a better level of confidence on the tests.

Focusing on the results at checkpoint 3 using Distribution #1, Table 3 shows that for the X coordinate only A1a and A2d are normal (marked in bold). For the Y coordinate, A1b, A1c, A2a, and A2d (bold) are normal.

0 in the p-value for the Friedman test for k-paired samples (Table 4) means that the samples

Conclusions and further work

A major contribution of the work described in this paper is a system that looks for statistically meaningful differences in data gathered by an RTLS, without considering any specific feature, just bearing in mind location estimates. This system performs an offline analysis and decides if the statistical differences, if present, are enough to detect a DoS or a Spoofing attack. We also want to note that the system works with data that do not follow normal distribution.

The paper also poses two

Ángel Manuel Guerrero-Higueras worked as IT engineer at several companies in the private sector (2000–2010), worked as researcher at the Atmospheric Physics Group at Universidad de León (2011–2013) and got his Ph.D. at the University of León in 2017. He currently works as lecturer at Universidad de León and researcher at Research Institute of Applied Science to Cyber-Security.

References (23)

  • J. González et al.

    Mobile robot localization based on Ultra-Wide-Band ranging: a particle filter approach

    Rob Auton Syst

    (2009)
  • T. Shon et al.

    A hybrid machine learning approach to network anomaly detection

    Inf Sci (Ny)

    (2007)
  • Y.S. Abu-Mostafa et al.
    (2012)
  • T. Bonaci et al.

    To make a robot secure: an experimental analysis of cyber security threats against teleoperated surgical robotics

    (2015)
  • S. Capkun et al.

    Secure positioning of wireless devices with application to sensor networks

    INFOCOM

    (2005)
  • M.G. Dissanayake et al.

    A solution to the simultaneous localization and map building (SLAM) problem

    IEEE Trans Robot Autom

    (2001)
  • M. Frank et al.

    An algorithm for quadratic programming

    Naval Res Logistics Quart

    (1956)
  • I. Guyon et al.

    An introduction to variable and feature selection

    J Mach Learn Res

    (2003)
  • E. Jones et al.

    SciPy: open source scientific tools for Python

    (2001)
  • LiZ. et al.

    Robust statistical methods for securing wireless localization in sensor networks

  • LiuH. et al.

    Survey of wireless indoor positioning techniques and systems

    IEEE Trans Syst Man Cybernet C

    (2007)
  • Cited by (0)

    Ángel Manuel Guerrero-Higueras worked as IT engineer at several companies in the private sector (2000–2010), worked as researcher at the Atmospheric Physics Group at Universidad de León (2011–2013) and got his Ph.D. at the University of León in 2017. He currently works as lecturer at Universidad de León and researcher at Research Institute of Applied Science to Cyber-Security.

    Noemí DeCastro-García received her M.Sc. degree in Mathematics at University of Salamanca (Spain) in 2009 and her PhD degree in Computational Engineering from University of León, in 2016. She currently works as assistant professor in the Department of Mathematics at School of Industrial and Computing Engineering at León University. Also, she is researcher in the Research Institute of Applied Sciences in Cybersecurity. Her research focuses on different areas of cybersecurity. More specifically, she is working with convolutional codes and systems from an algebraically approach, and with data analysis in computational methods such as machine learning and statistical data modeling.

    Francisco Javier Rodríguez-Lera got his Ph.D. at the University of León in 2015. In 2016 he joint University of Luxembourg as Research Associate. His main research interests include human robot interaction, dialogue systems, context awareness and robotic software architectures.

    Vicente Matellán got his Ph.D. at the Technical University of Madrid (1998), worked as Assistant Professor at Carlos III University (1993–1999), and Associate Professor at Rey Juan Carlos University (1999–2008). He currently holds the Telefónica Professorship at the Universidad de León, leading the Robotics Group (León, Spain) and he is also affiliated to the Research Institute of Applied Science to Cyber-Security. His main research interest include robotic software architectures, cyber-security, and artificial vision applied to robotics. He has published over 150 papers in journals, books, and conferences in these areas.

    View full text