Abstract
In recent years, we observed a growth of cybersecurity threats, especially due to the ubiquitous of connected and autonomous devices commonly defined as Internet of things (IoT). These devices, designed to handle basic operations, commonly lack security measurements. In this paper, we want to tackle how we could, by design, apply static and dynamic security solutions for those devices and define security measurements without degrading overall the performance.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Quigley, M., Gerkey, B., Conley, K., Faust, J., Foote, T., Leibs, J., Berger, E., Wheeler, R., Ng, A.: ROS: an open-source robot operating system. In: ICRA Workshop on Open Source Software (2009)
Quigley, M., White, R., Christensen, H.I.: SROS—Securing ROS over the wire, in the graph, and through the kernel. ROSCon (2016)
White, R., Caiazza, G., Christensen, H., Cortesi, A.: SROS1: using and developing secure ROS1 system. In: Robot Operating System (ROS): The Complete Reference, vol. 3. Springer (2018) (to appear)
Park, J.S., Sandhu, R.: Smart certificates extending X.509 for secure attribute services on the web. In: Proceedings of the of 22nd National Information Systems Security Conference (NISSC), pp. 337–348 (1999)
Park, J.S., Sandhu, R.: Binding identities and attributes using digitally signed certificates. In: Proceeding ACSAC 00 Proceedings of the 16th Annual Computer Security Applications Conference, p. 120 (2000)
Eugster, P.T., Felber, P.A., Guerraoui, R., Kermarrec, A.M.: The many faces of publish/subscribe. J. ACM Comput. Surv. (CSUR) 35(2), 114–213 (2003)
Farell, S., Housley, R., Turner, S.: An Internet Attribute Certificate Profile for Authorization. Internet Engineering Task Force (IETF) (2010)
Lenstra, A., Wang, X., de Weger, B.: Colliding X.509 Certificates, Report EPFL (2005)
The Transport Layer Security (TLS) Protocol Version 1.3. https://tools.ietf.org/html/draft-ietf-tls-tls13-18
Cheminod, M., Durante, L., Valenzano, A.: Review of security issues in industrial networks. IEEE Trans. Ind. Inform. 9, 1 (2013)
Byres, E., Dr, P.E., Hoffman, D.: The myths and facts behind cyber security risks for industrial control systems. In: Proceedings of VDE Kongress (2004)
Dzung, D., Naedele, M., von Hoff, T., Crevatin, M.: Security for industrial communication systems. Proc. IEEE 93(6), 1152–1177 (2005)
Akerberg, J., Gidlund, M., Lennvall, T., Neander, J., Bjorkman, M.: Efficient integration of secure and safety critical industrial wireless sensor networks. EURASIP J. Wirel. Commun. Netw. 1, 1–13 (2011)
Wang, C., Carzaniga, A., Evans, D., Wolf, A.: Security issues and requirements for internet-scale publish-subscribe systems. In: Proceedings of the 35th Annual Hawaii International Conference on System Sciences, 2002. HICSS 2002, pp. 3940–3947
Dieber, B., Kacianka, S., Rass, S., Schartner, P.: Application-level security for ROS-based applications. In: Proceedings of 2016 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS) (2016)
Lera, F.J.R., Balsa, J., Casado, F., Fernandez, C., Rico, F.M., Matellan, V.: Cybersecurity in autonomous systems: evaluating the performance of hardening ROS. In: XVII Workshop en Agentes Fsicos (2016)
Singh, G., Supriya, A.: A study of encryption algorithms (RSA, DES, 3DES and AES) for information security. Int. J. Comput. Appl. 67(19), 09758887 (2013)
Giry, D.: Bluecrypt cryptographic key length recommendation. http://www.keylength.com/. Accessed Oct 2016
Cortesi, A., Ferrara, P., Chaki, N.: Static analysis techniques for robotics software verification. ISR 2013: 1–6
Datta, S.K., da Costa, R.P.F., Bonnet, C., Harri, J.: oneM2M architecture based IoT framework for mobile crowd sensing in smart cities. In: Networks and Communications (EuCNC) (2016)
Acknowledgements
Work partially supported by CINI Cybersecurity National Laboratory within the project FilieraSicura and by the Executive Program 2017–2019 Italia-India within the project ‘Formal Specification for Secured Software Systems’.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Caiazza, G., White, R., Cortesi, A. (2019). Enhancing Security in ROS. In: Chaki, R., Cortesi, A., Saeed, K., Chaki, N. (eds) Advanced Computing and Systems for Security. Advances in Intelligent Systems and Computing, vol 883. Springer, Singapore. https://doi.org/10.1007/978-981-13-3702-4_1
Download citation
DOI: https://doi.org/10.1007/978-981-13-3702-4_1
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-3701-7
Online ISBN: 978-981-13-3702-4
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)