Communications Authentication Protocols for Unmanned Aerial Systems Running the Military Robot Operating System [video]
MetadataShow full item record
Unmanned systems have been growing in prominence as platforms from which to conduct or support military operations. Operating systems built around the Robot Operating System (ROS) framework offer a number of measurable benefits which are at times stove piped within individual defense contracting companies and DOD entities. The adoption of one operating framework ROS-Military (ROS-M) would lead to cost savings in the form of reduction in program development cycles as well as an increase in reliability and operability. Cybersecurity for robotic systems, particularly UAV systems, is of great concern and preventing adversaries from gaining access to platforms must be ensured. The ability to securely control these ROS enabled platforms free from adversarial interference is of the upmost importance. The primary objective of this research is to enhance the ROS through implementation of security processes (authentication, authorization and encryption) as a means to meet military cyber security requirements for unmanned systems. In this presentation, we discuss ROS and ROS-2/ROS-M and our approach to testing the operating system against multiple threat vectors. We will highlight our simulation and experimental setup process along with preliminary analysis of ROS-2's behavior under various adversarial models.
CRUSER TechCon 2018 Research at NPS. Tuesday 2: Networking
Showing items related by title, author, creator and subject.
Sanders, Kyle (Monterey, California: Naval Postgraduate School, 2009-06);Debugging is a useful technique in all aspects of software development, including that of operating systems. Because they provide low level interfaces to the hardware, operating systems are particularly difficult to debug. ...
Frame, Charles E. (Monterey, California. Naval Postgraduate School, 1994-03);This thesis is a review and analysis of personal computer and workstation operating systems. The emphasis is placed on UNIX, MS DOS, MS windows and OS/2 operating systems. UNIX is cover under the U.S. Government POSIX ...
Smith, Kevin R. (Monterey, California. Naval Postgraduate School, 2002-03);Security engineering requires a combination of features and assurance to provide confidence that security policy is correctly enforced. Rigorous engineering principles are applicable across a broad range of systems. The ...