Fingerprinting Movements of Industrial Robots for Replay Attack Detection

被引:13
|
作者
Pu, Hongyi [1 ]
He, Liang [2 ]
Zhao, Chengcheng [1 ]
Yau, David K. Y. [3 ]
Cheng, Peng [1 ]
Chen, Jiming [1 ]
机构
[1] Zhejiang Univ, Dept Control, Hangzhou 310027, Peoples R China
[2] Univ Colorado, Comp Sci & Engn, Denver, CO 80204 USA
[3] Singapore Univ Technol & Design, Informat Syst Technol & Design, Singapore 487372, Singapore
基金
美国国家科学基金会;
关键词
Robots; Service robots; Trajectory; Power demand; Robot sensing systems; Collision avoidance; Monitoring; Industrial robots; power fingerprinting; replay attacks; intrusion detection systems; SECURITY;
D O I
10.1109/TMC.2021.3059796
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Industrial robots are prototypical cyber-physical systems widely deployed in (smart) manufacturing, which operate according to the operation code uploaded by the human operator and are monitored in real-time based on their movement data. However, industrial robots suffer from replay attacks, via which attackers can manipulate the robot operation without being observed by the monitoring system. To mitigate this vulnerability, we design a novel intrusion detection system for industrial robots using their power fingerprint, called PIDS (Power-based Intrusion Detection System), and deliver PIDS as a bump-in-the-wire module installed at the powerline of commodity robots. The foundation of PIDS is the physically-induced dependency between the robot movement and the concomitant power consumption, which PIDS captures via joint physical analysis and (cyber) data-driven modeling. PIDS then fingerprints the robot movements observed by the monitoring system using their expected power consumption, and cross-validates the fingerprints with empirically collected power information - a mismatch thereof flags anomalies of the observed movements (i.e., evidence of replay attack). We have evaluated PIDS using three models of robots from different vendors - i.e., ABB IRB120, KUKA KR6 R700, and Universal Robots UR5 robots - with over 2,000 operation cycles. Experimental results show that PIDS detects replay attacks at an average rate of 96.5 percent (up to 99.9 percent) and a 0.1s latency.
引用
收藏
页码:3629 / 3643
页数:15
相关论文
共 50 条
  • [1] A Comparison of Features for Replay Attack Detection
    Xie, Zhifeng
    Zhang, Weibin
    Chen, Zhuxin
    Xu, Xiangmin
    2019 3RD INTERNATIONAL CONFERENCE ON MACHINE VISION AND INFORMATION TECHNOLOGY (CMVIT 2019), 2019, 1229
  • [2] Stochastic Game Approach for Replay Attack Detection
    Miao, Fei
    Pajic, Miroslav
    Pappas, George J.
    2013 IEEE 52ND ANNUAL CONFERENCE ON DECISION AND CONTROL (CDC), 2013, : 1854 - 1859
  • [3] VOICE QUALITY FEATURES FOR REPLAY ATTACK DETECTION
    Woubie, Abraham
    Backstrom, Tom
    2022 30TH EUROPEAN SIGNAL PROCESSING CONFERENCE (EUSIPCO 2022), 2022, : 384 - 388
  • [4] Audio-Replay Attack Detection Countermeasures
    Lavrentyeva, Galina
    Novoselov, Sergey
    Malykh, Egor
    Kozlov, Alexander
    Kudashev, Oleg
    Shchemelinin, Vadim
    SPEECH AND COMPUTER, SPECOM 2017, 2017, 10458 : 171 - 181
  • [5] Features and Classifiers for Replay Spoofing Attack Detection
    Hanilci, Cemal
    2017 10TH INTERNATIONAL CONFERENCE ON ELECTRICAL AND ELECTRONICS ENGINEERING (ELECO), 2017, : 1187 - 1191
  • [6] A Robust Method for Speech Replay Attack Detection
    Lin, Lang
    Wang, Rangding
    Yan, Diqun
    Dong, Li
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2020, 14 (01): : 168 - 182
  • [7] Short Interval Replay Attack Detection for Industrial Cyber-Physical Systems Based on Wavelet Coherence
    Tang, Wan
    Zhang, Zhengdao
    Xie, Linbo
    2023 35TH CHINESE CONTROL AND DECISION CONFERENCE, CCDC, 2023, : 3082 - 3087
  • [8] Exploration of Compressed ILPR Features for Replay Attack Detection
    Jelil, Sarfaraz
    Kalita, Sishir
    Prasanna, S. R. Mahadeva
    Sinha, Rohit
    19TH ANNUAL CONFERENCE OF THE INTERNATIONAL SPEECH COMMUNICATION ASSOCIATION (INTERSPEECH 2018), VOLS 1-6: SPEECH RESEARCH FOR EMERGING MARKETS IN MULTILINGUAL SOCIETIES, 2018, : 631 - 635
  • [9] Replay Attack Detection in Control Systems with Quantized Signals
    Kashima, Kenji
    Inoue, Daisuke
    2015 EUROPEAN CONTROL CONFERENCE (ECC), 2015, : 782 - 787
  • [10] ATTENTIVE FILTERING NETWORKS FOR AUDIO REPLAY ATTACK DETECTION
    Lai, Cheng-I
    Abad, Alberto
    Richmond, Korin
    Yamagishi, Junichi
    Dehak, Najim
    King, Simon
    2019 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2019, : 6316 - 6320