Unlock instant, AI-driven research and patent intelligence for your innovation.

An attack method against the ros message of the robot operating system

An operating system and robot technology, applied in transmission systems, digital transmission systems, secure communication devices, etc., can solve the problems of malicious control command injection, data loss, economic loss, etc., and achieve the effect of tampering attacks

Active Publication Date: 2022-05-03
ZHEJIANG UNIV OF TECH
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Highly networked is the development trend of robot systems, which communicate with industrial control systems, cloud services or other remote systems. However, there are major security issues in the robot operating system. The master node ROS MASTER will respond to anyone who can connect to it under the same network. For the request sent by the device, any device can publish or subscribe to the topic, and the message data is only transmitted through serialization, without reliable encryption measures and identity verification. If there are illegal users, it may cause sensor data in the robot system. Leakage and injection of malicious control instructions, which can cause data loss, financial loss or even physical damage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An attack method against the ros message of the robot operating system
  • An attack method against the ros message of the robot operating system
  • An attack method against the ros message of the robot operating system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] In order to make the purpose, design ideas, and technical solutions of the embodiments of the present invention clearer, the present invention will be further described below in conjunction with the accompanying drawings.

[0030] refer to Figure 1 to Figure 10 , a kind of attack method for robot operating system ROS message, described method comprises the steps:

[0031] Step 1: Build a simulation experiment environment based on the robot operating system ROS: the simulation platform includes two NvidiaJetson TX2 development boards, install the 16.04 version of the operating system Ubuntu, the Kinetic version of the robot operating system ROS and the Gazebo software platform on the TX2 development board;

[0032] Step 2: Two TX2 development boards installed with the robot operating system form a master-slave distributed network structure: figure 2 As shown, two Nvidia Jetson TX2 development boards are placed under the same wireless network for networking, and one TX...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An attack method for ROS messages in the robot operating system, build a simulation experiment environment based on the robot operating system ROS; build a master-slave distributed network structure; conduct simulation experiments; the attacker analyzes the IP addresses of all devices in the LAN to find the ROS The MASTER device and the slave device communicating with the ROS MASTER; intercept the data packets transmitted between the ROS MASTER and the slave through TCPROS, save them locally in the attacker system, and perform field analysis; use the LUA language in the attacker system to write filters The device sets the interception and tampering rules of the control signal data packet; the attacker implements the attack; the secondary verification is carried out on the ROS car in the physical environment; , realize the tampering of the control signal from the control center, and change the motion state of the robot.

Description

technical field [0001] The invention specifically relates to an attack method for a robot operating system ROS message, and belongs to the technical field of network security. Background technique [0002] ROS is a distributed open source robot operating system that has been widely used in scientific research, industrial applications, and commercial manufacturing. It is one of the most popular frameworks today. ROS is not an operating system for process management and scheduling in the traditional sense, but provides a structured communication layer. Nodes in the robot operating system are used as execution units, which increases the modularity of the system and improves code reuse. Rate. The robot operating system mainly includes topic communication and service communication. Topic communication is the most widely used publish / subscribe asynchronous communication mechanism in robot operating systems. It is a key bus for transmitting message data between nodes and is genera...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40
CPCH04L63/1416H04L63/1433
Inventor 陈博俞钡钡杨望卓岳凯
Owner ZHEJIANG UNIV OF TECH