skip to main content
10.1145/3465481.3470025acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaresConference Proceedingsconference-collections
research-article

Continuous User Authentication for Human-Robot Collaboration

Published: 17 August 2021 Publication History

Abstract

Human-robot collaboration is on the increase and having a major impact on areas such as manufacturing, where the abilities of the human worker, augmented by those of the robot, bring increased flexibility and performance. However, close collaboration, including physical interaction, brings with it complex safety and security issues that were previously mitigated by human-robot segregation and isolated control networks. Exoskeletons pose a particularly interesting case whereby physical coupling of the user and robot is required throughout operation. We envisage the use of continuous authentication to exoskeletons, i.e. to ensure a user is who they claim to be, and that they have sufficient authority to operate the device for the duration of its use. In this paper we demonstrate such an approach to behavioural biometrics using data acquired through wearable sensors (hand manipulations recorded by a sensorised glove) while the user performs a selection of industrial tasks, including handling loads and inserting screws. The results show that the approach can discriminate between users with a low Equal Error Rate (EER; <3% in the worst case analysed). We believe that such an approach will also benefit other applications where wearables are used in robot control, such as in tele-operation.

References

[1]
Abbas Acar, Hidayet Aksu, A Selcuk Uluagac, and Kemal Akkaya. 2018. WACA: Wearable-Assisted Continuous Authentication. arXiv preprint arXiv:1802.10417(2018).
[2]
Shurook S Almohamade, John A Clark, and James Law. 2020. Behaviour-Based Biometrics for Continuous User Authentication to Industrial Collaborative Robots. In International Conference on Information Technology and Communications Security. Springer, 185–197.
[3]
Marília Barandas, Duarte Folgado, Letícia Fernandes, Sara Santos, Mariana Abreu, Patrícia Bota, Hui Liu, Tanja Schultz, and Hugo Gamboa. 2020. TSFEL: Time Series Feature Extraction Library. SoftwareX 11(2020), 100456.
[4]
Wilhelm Bauer, Manfred Bender, Martin Braun, PETER Rally, and Oliver Scholtz. 2016. Lightweight robots in manual assembly—best to start simply. Frauenhofer-Institut für Arbeitswirtschaft und Organisation IAO, Stuttgart (2016).
[5]
James Bergstra and Yoshua Bengio. 2012. Random search for hyper-parameter optimization.Journal of machine learning research 13, 2 (2012).
[6]
Tamara Bonaci, Jeffrey Herron, Tariq Yusuf, Junjie Yan, Tadayoshi Kohno, and Howard Jay Chizeck. 2015. To make a robot secure: An experimental analysis of cyber security threats against teleoperated surgical robots. arXiv preprint arXiv:1504.04339(2015).
[7]
Patrick Bours and Soumik Mondal. 2015. Performance evaluation of continuous authentication systems. IET Biometrics 4, 4 (2015), 220–226.
[8]
Vitor Cerqueira, Nuno Moniz, and Carlos Soares. 2020. VEST: Automatic Feature Engineering for Forecasting. arXiv preprint arXiv:2010.07137(2020).
[9]
Cesar Cerrudo and Lucas Apa. 2017. Hacking robots before skynet. IOActive Website (2017), 1–17.
[10]
Exoskeleton Market 2021. Exoskeleton Market with COVID-19 Impact by Type (Powered, Passive), Component (Hardware, Software), Mobility, Body Part (Lower Extremities, Upper Extremities, Full Body), Vertical (Healthcare, Defense, Industrial) and Region - Global Forecast to 2026. https://www.marketsandmarkets.com/Market-Reports/exoskeleton-market-40697797.html, accessed June 10, 2021.
[11]
Mario Gleirscher, Nikita Johnson, Panayiotis Karachristou, Radu Calinescu, James Law, and John Clark. 2020. Challenges in the Safety-Security Co-Assurance of Collaborative Industrial Robots. arXiv preprint arXiv:2007.11099(2020).
[12]
RARC Gopura, DSV Bandara, Kazuo Kiguchi, and George KI Mann. 2016. Developments in hardware systems of active upper-limb exoskeleton robots: A review. Robotics and Autonomous Systems 75 (2016), 203–220.
[13]
Sarah Haas, Thomas Ulz, and Christian Steger. 2017. Secured Offline Authentication on Industrial Mobile Robots Using Biometric Data. In Robot World Cup. Springer, 143–155.
[14]
JF Kaiser and WA Reed. 1977. Data smoothing using low-pass digital filters. Review of Scientific Instruments 48, 11 (1977), 1447–1457.
[15]
Azfar Khalid, Pierre Kirisci, Zeashan Hameed Khan, Zied Ghrairi, Klaus-Dieter Thoben, and Jürgen Pannek. 2018. Security framework for industrial collaborative robotic cyber-physical systems. Computers in Industry 97(2018), 132–145.
[16]
DoHyung Kim, Jaeyeon Lee, Ho-Sub Yoon, and Eui-Young Cha. 2007. A non-cooperative user authentication system in robot environments. IEEE Transactions on Consumer Electronics 53, 2 (2007), 804–811.
[17]
Federico Maggi, Davide Quarta, Marcello Pogliani, Mario Polino, Andrea M Zanchettin, and Stefano Zanero. 2017. Rogue robots: Testing the limits of an industrial robot’s security. Trend Micro, Politecnico di Milano, Tech. Rep (2017).
[18]
Anthony J Mansfield and James L Wayman. 2002. Best practices in testing and reporting performance of biometric devices. (2002).
[19]
Pauline Maurice, Adrien Malaisé, Clélie Amiot, Nicolas Paris, Guy-Junior Richard, Olivier Rochel, and Serena Ivaldi. 2019. Human movement and ergonomics: An industry-oriented dataset for collaborative robotics. The International Journal of Robotics Research 38, 14 (2019), 1529–1537.
[20]
Soumik Mondal and Patrick Bours. 2015. Continuous authentication in a real world settings. In 2015 eighth international conference on advances in pattern recognition (ICAPR). IEEE, 1–6.
[21]
International Federation of Robotics. 2018. Robots and the workplace of the future. (2018).
[22]
F. Pedregosa, G. Varoquaux, A. Gramfort, V. Michel, B. Thirion, O. Grisel, M. Blondel, P. Prettenhofer, R. Weiss, V. Dubourg, J. Vanderplas, A. Passos, D. Cournapeau, M. Brucher, M. Perrot, and E. Duchesnay. 2011. Scikit-learn: Machine Learning in Python. Journal of Machine Learning Research 12 (2011), 2825–2830.
[23]
Andreas Riel, Christian Kreiner, Georg Macher, and Richard Messnarz. 2017. Integrated design for tackling safety and security challenges of smart products and digital manufacturing. CIRP annals 66, 1 (2017), 177–180.
[24]
C. Rognon, S. Mintchev, F. Dell’Agnola, A. Cherpillod, D. Atienza, and D. Floreano. 2018. FlyJacket: An Upper Body Soft Exoskeleton for Immersive Drone Control. IEEE Robotics and Automation Letters 3, 3 (2018), 2362–2369. https://doi.org/10.1109/LRA.2018.2810955
[25]
Abdul Serwadda and Vir V Phoha. 2013. When kids’ toys breach mobile phone security. In Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security. 599–610.
[26]
Valeriu-Daniel Stanciu, Riccardo Spolaor, Mauro Conti, and Cristiano Giuffrida. 2016. On the effectiveness of sensor-enhanced keystroke dynamics against statistical attacks. In proceedings of the sixth ACM conference on data and application security and privacy. 105–112.
[27]
Johan van der Vorm, Rachel Nugent, and Leonard O’Sullivan. 2015. Safety and risk management in designing for the lifecycle of an exoskeleton: a novel process developed in the robo-mate project. Procedia Manufacturing 3(2015), 1410–1417.
[28]
Víctor Mayoral Vilches, Laura Alzola Kirschgens, Asier Bilbao Calvo, Alejandro Hernández Cordero, Rodrigo Izquierdo Pisón, David Mayoral Vilches, Aday Muñiz Rosas, Gorka Olalde Mendia, Lander Usategi San Juan, Irati Zamalloa Ugarte, 2018. Introducing the robot security framework (rsf), a standardized methodology to perform security assessments in robotics. arXiv preprint arXiv:1806.04042(2018).
[29]
Pauli Virtanen, Ralf Gommers, Travis E. Oliphant, Matt Haberland, Tyler Reddy, David Cournapeau, Evgeni Burovski, Pearu Peterson, Warren Weckesser, Jonathan Bright, Stéfan J. van der Walt, Matthew Brett, Joshua Wilson, K. Jarrod Millman, Nikolay Mayorov, Andrew R. J. Nelson, Eric Jones, Robert Kern, Eric Larson, C J Carey, İlhan Polat, Yu Feng, Eric W. Moore, Jake VanderPlas, Denis Laxalde, Josef Perktold, Robert Cimrman, Ian Henriksen, E. A. Quintero, Charles R. Harris, Anne M. Archibald, Antônio H. Ribeiro, Fabian Pedregosa, Paul van Mulbregt, and SciPy 1.0 Contributors. 2020. SciPy 1.0: Fundamental Algorithms for Scientific Computing in Python. Nature Methods 17(2020), 261–272. https://doi.org/10.1038/s41592-019-0686-2

Cited By

View all
  • (2025)A Theoretical Foundation for Erroneous Behavior in Human–Robot InteractionJournal of Intelligent & Robotic Systems10.1007/s10846-025-02221-8111:1Online publication date: 4-Feb-2025
  • (2024)Leveraging Machine Learning for Wi-Fi-Based Environmental Continuous Two-Factor AuthenticationIEEE Access10.1109/ACCESS.2024.335635112(13277-13289)Online publication date: 2024

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ARES '21: Proceedings of the 16th International Conference on Availability, Reliability and Security
August 2021
1447 pages
ISBN:9781450390514
DOI:10.1145/3465481
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 17 August 2021

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Behavioural biometrics
  2. Continuous authentication
  3. Human-Robot Collaboration
  4. User authentication

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

ARES 2021

Acceptance Rates

Overall Acceptance Rate 228 of 451 submissions, 51%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)27
  • Downloads (Last 6 weeks)2
Reflects downloads up to 20 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2025)A Theoretical Foundation for Erroneous Behavior in Human–Robot InteractionJournal of Intelligent & Robotic Systems10.1007/s10846-025-02221-8111:1Online publication date: 4-Feb-2025
  • (2024)Leveraging Machine Learning for Wi-Fi-Based Environmental Continuous Two-Factor AuthenticationIEEE Access10.1109/ACCESS.2024.335635112(13277-13289)Online publication date: 2024

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media