Study of Security Primitives for the Robot Operating System (ROS) of UAV Swarms [video]
MetadataShow full item record
The global presence of the Navy’s unmanned systems makes it increasingly vulnerable to outside threats. Cybersecurity must be addressed. A continuation of work stated in FY16, the research established baseline encryption and authentication algorithms to deal with communication link vulnerabilities and was a stepping stone to developing a comprehensive security architecture for the UAV system. This research proposes to take those baseline algorithms and apply them to the other major vulnerability of the UAV network - the Robot Operating System (ROS). While ROS has been heavily used in the NPS swarm, its security has not been characterized. For ROS to be considered a tool for government applications, its security and vulnerabilities must be investigated. Of particular interest is the plain text nature of ROS messages. This makes it easy for third parties to spoof and decipher messages. This has serious implications in the context of a UAV swarm. Thus far, security is not part of the ROS design. There has been limited work in the literature to study elements of ROS security including authentication and encryption. However, there is not a cohesive security framework that has been developed nor has ROS been studied from the context of a military UAV swarm and all the implications and constraints that come with that. The scope of this work is focused on security threats to ROS including: 1) the lack of authentication: malicious actors can fiddle with the system and inject messages (similar to man in the middle attacks); 2) the lack of encryption: unauthorized listeners can gather information; and 3) lack of authorization: remote clients can access the entire ROS system without proof of permission (this is usually coupled with authentication). In this talk, we present preliminary solutions to each of these threats and provide theoretical avenues for implementation.
TechCon2017 (CRUSER)Presented by Dr. Preetha Thulasiraman: NPS Electrical & Computer Eng.Includes slides
RightsThis publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.
Showing items related by title, author, creator and subject.
The impact on quality of service when using security-enabling filters to provide for the security of run-time extensible virtual environments Salles, Ernesto J. (Monterey, California. Naval Postgraduate School, 2002-09);The Naval Postgraduate School is developing NPSNET-V, a Run-Time Extensible Virtual Environment (RTEVE) framework. RTEVEs differ from traditional VEs in that applications within the environment can both discover and use ...
Nguyen, Thuy D.; Irvine, Cynthia E. (International Common Criteria Conference 2010, 2010-09-01);The need for highly robust enterprise-level architectures that implement multi-domain information protection mechanisms is widespread and growing, especially in the context of cloud computing which promotes dynamicity, ...
Thiry, Douglas B.; Rowlette, Robert A. (Monterey, California. Naval Postgraduate School, 2004-03);The purpose of this study is to provide the United States Marine Corps (USMC) with an analysis of Windows NT 5.0 Network Operating System (NOS). This analysis will assist the Network Operations Center (NOC) in preparation ...