skip to main content
10.1145/3593434.3593446acmotherconferencesArticle/Chapter ViewAbstractPublication PageseaseConference Proceedingsconference-collections
short-paper
Open Access

Towards a User-centred Security Framework for Social Robots in Public Spaces

Published:14 June 2023Publication History

ABSTRACT

The use of social robots in public spaces is becoming increasingly popular due to their ability to provide personalized services to users. However, the convergence of different technologies and software applications has raised concerns regarding security requirements, standards, and regulations. Specifically, there are significant concerns about the evolving threat landscape for software applications in public settings, where social robots interact without supervision and are in direct contact with threat actors. During the development of social robots software, developers and practitioners need practical tools to continuously assess their products’ security profiles. This paper presents a preventive approach to the dynamic evolving security landscape of Social Robots in Public Spaces (SRPS) using design science research (DSR) methodology to develop a security framework. The study investigates security threats, vulnerabilities, and risks associated with SRPS software development and analyzes existing related frameworks to design a security framework for SRPS software developers. The research aims to provide insights into the security aspects of SRPS software application development processes and contribute to developing effective security frameworks to mitigate evolving risks and ensure secure operation and acceptance in public spaces.

References

  1. Hala Assal and Sonia Chiasson. 2019. ’Think Secure from the Beginning’: A Survey with Software Developers. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems(CHI ’19). Association for Computing Machinery, New York, NY, USA, 1–13. https://doi.org/10.1145/3290605.3300519Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Kim Baraka, Patrícia Alves-Oliveira, and Tiago Ribeiro. 2020. An Extended Framework for Characterizing Social Robots. In Human-Robot Interaction: Evaluation Methods and Their Standardization, Céline Jost, Brigitte Le Pévédic, Tony Belpaeme, Cindy Bethel, Dimitrios Chrysostomou, Nigel Crook, Marine Grandgeorge, and Nicole Mirnig (Eds.). Springer International Publishing, Cham, 21–64. https://doi.org/10.1007/978-3-030-42307-0_2Google ScholarGoogle Scholar
  3. Elena Basan, Anton Gritsynin, and Tatyana Avdeenko. 2019. Framework for Analyzing the Security of Robot Control Systems. In 2019 International Conference on Information Systems and Computer Science (INCISCOS). IEEE, Quito, Ecuador, 354–360. https://doi.org/10.1109/INCISCOS49368.2019.00062Google ScholarGoogle Scholar
  4. Tony Belpaeme, James Kennedy, Aditi Ramachandran, Brian Scassellati, and Fumihide Tanaka. 2018. Social Robots for Education: A Review. Science Robotics 3, 21 (Aug. 2018), eaat5954. https://doi.org/10.1126/scirobotics.aat5954Google ScholarGoogle ScholarCross RefCross Ref
  5. Andreas Birk, Sören Schwertfeger, and Kaustubh Pathak. 2009. A Networking Framework for Teleoperation in Safety, Security, and Rescue Robotics. IEEE Wireless Communications 16, 1 (Feb. 2009), 6–13. https://doi.org/10.1109/MWC.2009.4804363Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. ENISA. 2011. Measurement Frameworks and Metrics for Resilient Networks and Services: Technical Report. Technical Report. ENISA. 119 pages. https://www.enisa.europa.eu/publications/metrics-tech-report/at_download/fullReportGoogle ScholarGoogle Scholar
  7. Eduard Fosch-Villaronga, Christoph Lutz, and Aurelia Tamò-Larrieux. 2020. Gathering Expert Opinions for Social Robots’ Ethical, Legal, and Societal Concerns: Findings from Four International Workshops. International Journal of Social Robotics 12, 2 (May 2020), 441–458. https://doi.org/10.1007/s12369-019-00605-zGoogle ScholarGoogle ScholarCross RefCross Ref
  8. Alan Hevner and Samir Chatterjee. 2010. Design Science Research in Information Systems. In Design Research in Information Systems: Theory and Practice, Alan Hevner and Samir Chatterjee (Eds.). Springer US, Boston, MA, 9–22. https://doi.org/10.1007/978-1-4419-5653-8_2Google ScholarGoogle Scholar
  9. Alan R Hevner, Salvatore T March, Jinsoo Park, and Sudha Ram. 2004. Design Science in Information Systems Research. MIS Quarterly 28, 1 (2004), 77–105. https://www.in.th-nuernberg.de/professors/Holl/Personal/Hevner_DesignScience_ISRes.pdfGoogle ScholarGoogle ScholarCross RefCross Ref
  10. Rafiq Ahmad Khan, Siffat Ullah Khan, Habib Ullah Khan, and Muhammad Ilyas. 2022. Systematic Literature Review on Security Risks and Its Practices in Secure Software Development. IEEE Access 10 (2022), 5456–5481. https://doi.org/10.1109/ACCESS.2022.3140181Google ScholarGoogle ScholarCross RefCross Ref
  11. Barbara Kitchenham. 2004. Procedures for Performing Systematic Reviews. Keele University Technical Report TR/SE-0401 33 (2004), 1–26.Google ScholarGoogle Scholar
  12. Barbara Kitchenham, Lech Madeyski, and David Budgen. 2023. SEGRESS: Software Engineering Guidelines for REporting Secondary Studies. IEEE Transactions on Software Engineering 49, 3 (March 2023), 1273–1298. https://doi.org/10.1109/TSE.2022.3174092Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Maria Kyrarini, Fotios Lygerakis, Akilesh Rajavenkatanarayanan, Christos Sevastopoulos, Harish Ram Nambiappan, Kodur Krishna Chaitanya, Ashwin Ramesh Babu, Joanne Mathew, and Fillia Makedon. 2021. A Survey of Robots in Healthcare. Technologies 9, 1 (March 2021), 8. https://doi.org/10.3390/technologies9010008Google ScholarGoogle ScholarCross RefCross Ref
  14. Giovanni Mazzeo and Mariacarla Staffa. 2020. TROS: Protecting Humanoids ROS from Privileged Attackers. International Journal of Social Robotics 12, 3 (July 2020), 827–841. https://doi.org/10.1007/s12369-019-00581-4Google ScholarGoogle ScholarCross RefCross Ref
  15. Daniel Méndez Fernández, Wolfgang Böhm, Andreas Vogelsang, Jakob Mund, Manfred Broy, Marco Kuhrmann, and Thorsten Weyer. 2019. Artefacts in Software Engineering: A Fundamental Positioning. Software & Systems Modeling 18, 5 (Oct. 2019), 2777–2786. https://doi.org/10.1007/s10270-019-00714-3Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. MITRE. 2018. Cyber Resiliency Metrics, Measures of Effectiveness, and Scoring: Enabling Systems Engineers and Program Managers to Select the Most Useful Assessment Methods. Technical Report AD1108019. MITRE, United States. 119 pages.Google ScholarGoogle Scholar
  17. Nikola Naumov. 2019. The Impact of Robots, Artificial Intelligence, and Service Automation on Service Quality and Service Experience in Hospitality. In Robots, Artificial Intelligence, and Service Automation in Travel, Tourism and Hospitality, Stanislav Ivanov and Craig Webster (Eds.). Emerald Publishing Limited, Emerald Publishing Limited, Bingley, 123–133. https://doi.org/10.1108/978-1-78756-687-320191007Google ScholarGoogle Scholar
  18. Samson O. Oruma, Mary Sánchez-Gordón, Ricardo Colomo-Palacios, Vasileios Gkioulos, and Joakim K. Hansen. 2022. A Systematic Review on Social Robots in Public Spaces: Threat Landscape and Attack Surface. Computers 11, 12 (Dec. 2022), 181. https://doi.org/10.3390/computers11120181Google ScholarGoogle ScholarCross RefCross Ref
  19. Batuhan Özdol, Elif Köseler, Ezgi Alçi̇çek, Süha Eren Cesur, Perif Jan Aydemi̇r, and Şerif Bahti̇yar. 2021. A Survey on Security Attacks with Remote Ground Robots. El-Cezeri 8, 3 (Sept. 2021), 1286–1308. https://doi.org/10.31202/ecjse.916532Google ScholarGoogle Scholar
  20. Ken Peffers, Tuure Tuunanen, Charles E Gengler, Matti Rossi, and Wendy Hui. 2006. THE DESIGN SCIENCE RESEARCH PROCESS: A MODEL FOR PRODUCING AND PRESENTING INFORMATION SYSTEMS RESEARCH. Proc. of First International Conference on Design Science Research in Information Systems and Technology (2006), 83–106. https://doi.org/10.48550/arXiv.2006.02763Google ScholarGoogle Scholar
  21. Eleni Philippou, Sylvain Frey, and Awais Rashid. 2020. Contextualising and Aligning Security Metrics and Business Objectives: A GQM-based Methodology. Computers & Security 88 (Jan. 2020), 101634. https://doi.org/10.1016/j.cose.2019.101634Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Samantha Reig, Michal Luria, Elsa Forberger, Isabel Won, Aaron Steinfeld, Jodi Forlizzi, and John Zimmerman. 2021. Social Robots in Service Contexts: Exploring the Rewards and Risks of Personalization and Re-embodiment. In Designing Interactive Systems Conference 2021(DIS ’21). Association for Computing Machinery, New York, NY, USA, 1390–1402. https://doi.org/10.1145/3461778.3462036Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Research and Markets. 2022. Global Social Robots Market - Growth, Trends, COVID-19 Impact, and Forecasts (2022 - 2027). https://www.researchandmarkets.com/reports/5120156/global-social-robots-market-growth-trends.Google ScholarGoogle Scholar
  24. Sean Rivera and Radu State. 2021. Securing Robots: An Integrated Approach for Security Challenges and Monitoring for the Robotic Operating System (ROS). In 2021 IFIP/IEEE International Symposium on Integrated Network Management (IM). IEEE, Bordeaux, France, 754–759.Google ScholarGoogle Scholar
  25. Per Runeson and Martin Höst. 2009. Guidelines for Conducting and Reporting Case Study Research in Software Engineering. Empirical Software Engineering 14, 2 (April 2009), 131–164. https://doi.org/10.1007/s10664-008-9102-8Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Per Runeson, Martin Höst, Austen Rainer, and Björn Regnell. 2012. Case Study Research in Software Engineering: Guidelines and Examples (first ed.). Wiley, Hoboken, New Jersey. https://doi.org/10.1002/9781118181034Google ScholarGoogle Scholar
  27. Pericle Salvini, Diego Paez-Granados, and Aude Billard. 2021. On the Safety of Mobile Robots Serving in Public Spaces: Identifying Gaps in EN ISO 13482:2014 and Calling for a New Standard. ACM Transactions on Human-Robot Interaction 10, 3 (July 2021), 19:1–19:27. https://doi.org/10.1145/3442678Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Oleksandr Shyvakov. 2017. Developing a Security Framework for Robots. Master’s thesis. University of Twente.Google ScholarGoogle Scholar
  29. M Swanson, N Bartol, J Sabato, J Hash, and L Graffo. 2003. Security Metrics Guide for Information Technology Systems (zeroth ed.). Technical Report NIST SP 800-55. National Institute of Standards and Technology, Gaithersburg, MD. NIST SP 800–55 pages. https://doi.org/10.6028/NIST.SP.800-55Google ScholarGoogle Scholar
  30. Mohammad Tahaei and Kami Vaniea. 2019. A Survey on Developer-Centred Security. In 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE, Stockholm, Sweden, 129–138. https://doi.org/10.1109/EuroSPW.2019.00021Google ScholarGoogle ScholarCross RefCross Ref
  31. The Research Council of Norway. 2021. User-Centred Security Framework for Social Robots in Public Space (SecuRoPS) - Prosjektbanken. https://prosjektbanken.forskningsradet.no/project/FORISS/321324.Google ScholarGoogle Scholar
  32. Margaret V. Tonkin. 2020. Socially Responsible Design for Social Robots in Public Spaces. Ph. D. Dissertation. University of Technology Sydney.Google ScholarGoogle Scholar

Index Terms

  1. Towards a User-centred Security Framework for Social Robots in Public Spaces

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      EASE '23: Proceedings of the 27th International Conference on Evaluation and Assessment in Software Engineering
      June 2023
      544 pages
      ISBN:9798400700446
      DOI:10.1145/3593434

      Copyright © 2023 Owner/Author

      This work is licensed under a Creative Commons Attribution International 4.0 License.

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 14 June 2023

      Check for updates

      Qualifiers

      • short-paper
      • Research
      • Refereed limited

      Acceptance Rates

      Overall Acceptance Rate71of232submissions,31%
    • Article Metrics

      • Downloads (Last 12 months)196
      • Downloads (Last 6 weeks)28

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format