<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Analysis of Attacks on Robotic Operation System</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Elena Basan</string-name>
          <email>ebasan@sfedu.ru</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Nikita Sushkin</string-name>
          <email>sushkin@sfedu.ru</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oleg Khabarov</string-name>
          <email>habarov@sfedu.ru</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oleg Makarevich</string-name>
          <email>obmakarevich@sfedu.ru</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ivan Azarov</string-name>
          <email>azarov8282@mail.ru</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>North-Caucasus Federal University</institution>
          ,
          <addr-line>2, Kulakov prospect, Stavropol, 355029</addr-line>
          ,
          <country country="RU">Russia</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Southern Federal University</institution>
          ,
          <addr-line>2 Chekhov St., Taganrog, 347928</addr-line>
          ,
          <country country="RU">Russia</country>
        </aff>
      </contrib-group>
      <fpage>41</fpage>
      <lpage>48</lpage>
      <abstract>
        <p>The latest version of ROS was released on May 23 this year, and according to the developers, there will be no more new versions. The future belongs to ROS2.mA robots or robotic system is often a modular system where each module communicates with other modules. In ROS terminology, such modules are called nodes, and they can communicate in a subscriberpublisher or client-server fashion. There is also a special Master node, which is responsible for the initial linking of ordinary nodes. ROS was not designed with security considerations in mind, i.e. ensuring the «three pillars» - confidentiality, integrity or authenticity. Consequently, ROS becomes a tidbit for attackers. They can listen to traffic; Disable individual nodes; Replace nodes. The situation was further simplified when utilities for auditing the security of ROS systems appeared in the public domain: Roschaos, Rospento. In addition, the developers of ROS applications independently implemented protection measures to prevent these threats.</p>
      </abstract>
      <kwd-group>
        <kwd>1 secure-ROS</kwd>
        <kwd>ROS systems</kwd>
        <kwd>ROS security tool</kwd>
        <kwd>secure framework</kwd>
        <kwd>modular framework</kwd>
        <kwd>ROS tools</kwd>
        <kwd>security mechanisms</kwd>
        <kwd>robotic operating system</kwd>
        <kwd>security challenges</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        ROS (Robot Operating System) is the most popular platform in the field of research robotics, created
by Willow Garage and now supported by the Open-Source Robotics Foundation (OSRF). The main
goal of ROS is to provide a unified and open-source software framework for controlling robots in a
variety of real and simulated environments. ROS is not the first such attempt: a Wikipedia search for
"software for robots" finds 15 such projects. However, Willow Garage is no ordinary group of
programmers making free software [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. With solid funding, strong technical expertise, and a
wellplanned series of development milestones, Willow Garage has sparked a kind of programming fever
among robotics, creating hundreds of custom ROS packages already created in just a few short years
[
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. ROS now includes software for tasks ranging from navigation and localization (SLAM), 3D object
recognition, action planning, multi-arm motion control, machine learning, and even billiards [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ].
      </p>
      <p>ROS can run on various versions of Linux, MacOS X, and partly on Microsoft Windows. However,
the easiest way to get started is to use Ubuntu Linux, as this OS is officially supported by OSRF.</p>
      <p>However, ROS was not designed with security considerations in mind. With some basic knowledge
of how ROS works internally, it is easy to manipulate.</p>
      <p>
        ROS makes a clear distinction between app control (like finding a publisher for a topic I want to
subscribe to) and data transfer. The former is handled through the XML-RPC API, and the latter is
handled by TCP or UDP based communication. In both cases, security concerns regarding
confidentiality, integrity or authenticity were not considered. The ROS node does not need to identify
or authenticate itself before taking any action. The stateless API also ignores what is happening on the
network. While many of these design decisions seem very elegant from a software development
standpoint, this opens several attack surfaces in ROS. Apart from the ability to disable individual nodes
(as a form of DOS attack), eavesdropping in ROS is easy because there is no encrypted communication
[
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. This way, anyone can read the data that the application is sending.
      </p>
      <p>
        To carry out attacks on ROS applications, you can use two ready-made utilities: roschaos and
ROSPenTo. They exploit vulnerabilities in the ROS API [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ].
      </p>
    </sec>
    <sec id="sec-2">
      <title>2. Unauthenticated registration / deregistration using ROS Master API</title>
      <p>
        The ROS Master API does not require authentication for registration and deregistration of
publishers, subscribers, and services [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. This leads to a vulnerability that can be easily exploited using
off-the-shelf penetration testing tools by an attacker who has access to the internal robotic network [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
      </p>
      <p>Building a Docker image and running a Docker container:
$ docker build -t basic_cybersecurity11:latest .</p>
      <p>$ docker run -it --name basic_cybersecuirity11 basic_cybersecurity11:latest
Launching ROS nodes and topics participating in the network after starting the container:
root@xxx:/# rosrun scenario1 talker &amp;
root@xxx:/# rosrun scenario1 listener
Now let's open and initialize another command line in the same Docker container:
$ docker exec –it basic_cybersecurity11 /bin/bash
root@xxx:/# . /opt/ros/kinetic/setup.bash
In the newly opened terminal, display a list of nodes and topics:
root@xxx:/# rosnode list
/listener
/publisher
/rosout
root@d64845e9601e:/# rostopic list
/flag
/rosout
/rosout_agg</p>
      <p>We are interested in the previously launched nodes / publisher and / subscriber. Both of them
communicate via the / flag topic (you can check this either by looking at the source code of the nodes
or using the rosnode info command):
root @xxx: / # rostopic echo / flag
data: "br {N (* - E6NgwbyWc"
--data: "br {N (* - E6NgwbyWc"
--data: "br {N (* - E6NgwbyWc"
--</p>
      <p>Unregister the / publisher node from the / listener node using the roschaos utility for auditing the
security of ROS systems:
root@xxx:/# rosnode list
/listener
/publisher
/rosout
root@xxx:/# roschaos master unregister node --node_name /publisher</p>
      <p>Unregistering /publisher
You can see that the / listener node has stopped receiving messages. We can check the list of nodes:
root@xxx:/# rosnode list
/listener
/rosout</p>
      <p>We can observe that ROS Master no longer finds the / publisher node as it is no longer registered.
However, the talker process is still running:
root@xxx:/# ps -e</p>
      <p>PID TTY TIME CMD</p>
      <p>1 pts/0 00:00:00 launch_script.b
31 pts/0 00:00:00 roscore
42 ? 00:00:01 rosmaster
55 ? 00:00:01 rosout
72 pts/0 00:00:00 bash
78 pts/1
90 pts/0
108 pts/0
174 pts/1
00:00:00 bash
00:00:00 talker
00:00:01 listener
00:00:00 ps</p>
      <p>Unauthenticated theme publisher list updates</p>
    </sec>
    <sec id="sec-3">
      <title>3. Unauthenticated theme publisher list updates</title>
      <p>The publisherUpdate method, which is part of the ROS Slave API, does not require authentication,
as you can see from the parameters it takes:
publisherUpdate(caller_id, topic, publishers)</p>
      <p>Callback from master of current publisher list for specified topic.
Parameters
caller_id (str)</p>
      <p>ROS caller ID.
topic (str)</p>
      <p>Topic name.
publishers ([str])</p>
      <p>List of current publishers for topic in the form of XMLRPC</p>
      <p>URIs
Returns (int, str, int)</p>
      <p>(code, statusMessage, ignore)</p>
      <p>
        The main problem is that the nodes of the ROS network do not continuously poll the ROS Master.
Instead, they are registered once within the publisherUpdate callback, making them available to any
attacker who arbitrarily uses this method [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. By exploiting this vulnerability, an attacker could
potentially change the publisher list of a given topic, affecting selected nodes, while the rest of the ROS
network would not be affected and would not notice any changes.
      </p>
      <p>$ docker build -t basic_cybersecurity12:latest .</p>
      <p>$ docker run -it –name basic_cybersecurity12 basic_cybersecurity12:latest
Let's start two nodes that exchange data through the topic:
--Unregistering / publisher from / listener</p>
      <p>
        First, we need to unregister / publisher from / listener. We will do this using the ROS Master API
but notifying only / listener and no other node else. Messages from / publisher will no longer be
processed by / listener [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. All of this will happen without the involvement of the ROS Master (and
other non-target nodes such as / publisher). To do all this, we will use the ROSPenTo pentest utility,
which can communicate via the XMLRPC protocol with the ROS Master and ROS nodes [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ].
      </p>
      <p>
        Let us launch ROSPenTo and analyze the robotic network [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]:
root@d64845e9601e:/# rospento
RosPenTo - Penetration testing tool for the Robot Operating System(ROS)
Copyright(C) 2018 JOANNEUM RESEARCH Forschungsgesellschaft mbH
This program comes with ABSOLUTELY NO WARRANTY.
      </p>
      <p>This is free software, and you are welcome to redistribute it under certain
conditions.</p>
      <p>For more details see the GNU General Public License at &lt;http://www.gnu.org/licenses/&gt;.
What do you want to do?
0: Exit
1: Analyse system...
2: Print all analyzed systems
1
Please input URI of ROS Master: (e.g. http://localhost:11311/)
http://localhost:11311/
Parameter 0.2:</p>
      <p>Name: /rosversion
Parameter 0.3:</p>
      <p>Name: /run_id</p>
      <p>Now in the first terminal, we can observe that the / listener node has stopped receiving messages. If we turn
to the ROS Master API using the standard ROS utilities, we will see that no changes have occurred in the list of
nodes:
root@19246d9bf44b:/# rosnode list
/listener
/publisher
/rosout</p>
      <p>If we run the "Analyze system ..." command of the ROSPenTo utility again, we will not notice any
changes either.</p>
      <p>What really happened: ROSPenTo called the publisherUpdate XML-RPC function with an empty
list of publishers as a parameter. This caused the / listener node to assume that there were no publishers
available with the / flag theme, and therefore dropped the connection to the / publisher node.</p>
    </sec>
    <sec id="sec-4">
      <title>4. Security measures</title>
      <p>
        The ROS developers realized all the flaws in the architecture of their brainchild and released a new
version of it. Now communication between nodes takes place according to the DDS standard, which
currently has two implementations: Connext Secure 5.3.1 (proprietary); eProsima Fast-RTPS 1.6.0
(open-source)/mmAlso, there is no longer a Master Node in the scheme - all its duties fell on the
shoulders of DDS, which means that it is no longer possible to unnoticeably turn off nodes and perform
a substitution [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]. However, there is still no encryption out of the box, which means we can still
intercept and read messages.
      </p>
      <p>The formation of readiness indicator of information security specialists, interaction with employers
contributed to increasing the responsibility of all participants in the educational process for the total
results. The results of pedagogical monitoring were a clearer organization of practices, improved
educational programs of several disciplines, modified educational and methodological complexes,
modernized laboratory installations.</p>
      <p>Teachers noted the increased interest of students in the learning process. From these positions, the
motivational factor for learning was investigated throughout the training period according to the
modified methodology.</p>
      <p>Dynamics of structural elements of the readiness indicator on average (levels of theoretical
knowledge, practical skills) is positive. Individual psychological qualities were assessed by specialists
of the professional psychological selection group using a set of psychodiagnostical methods and tests
considering modern requirements for an information protection specialist.</p>
      <p>
        The experts of the commission, when assessing the psychological qualities of specialists in the field
of information security, made a conclusion on the professional suitability of graduates based on levels
of determination, mindfulness, stress resistance and others [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ].
      </p>
      <p>
        To solve the latter problem, the DDS-Security specification was developed, which consists of the
so-called. Plugins: authentication plugin, access control (authorization) plugin, cryptography plugin
(encryption, decryption, hashing, EDS, etc.), logging plugin and data tagging plugin. The last two are
not implemented in the free DDS implementation - eProsima Fast-RTPS [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ]. However, the
implementation does not always comply with the specification, and here it is the same, attacks are still
available, but their complexity is greatly increasing. For example, topology recovery during the
handshake stage is because at the very beginning the nodes exchange access control manifests, which
contain metainformation that can be used to reconstruct the topology of the robotic network [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ].
      </p>
      <p>
        A consortium of four well-known companies - Intel, NXP, Synopsys and UbiquiOS under the
auspices of the Linux Foundation - have created the Zephyr Project, a lightweight, scalable real-time
operating system designed to run on resource-constrained devices of various architectures and
distributed under the Apache 2.0 license. Unlike ROS, we see a real-time OS implementation here [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ].
      </p>
      <p>
        However, like any software, Zephyr is periodically found to have vulnerabilities, although
participation in the development of an IT giant like Intel contributes to an increase in software quality,
which means fewer bugs [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ]. However, in May of this year, NCC audited Zephyr and found two critical
networking stack vulnerabilities:
1) Stack overflow in net_ipv4_parse_hdr_options. An attacker can infiltrate or execute code inside
the kernel when a malicious ICMP packet reaches the device. The screenshot shows how the attacker
disabled the device.
2) Insecure parsing of MQTT header, which leads to memory corruption. A remote attacker could
send an MQTT packet with a malformed header to cause memory corruption in the Zephyr kernel,
which could lead to code execution.
      </p>
    </sec>
    <sec id="sec-5">
      <title>5. Conclusion</title>
      <p>
        The robot operating system is used to develop control applications for robots and unmanned aerial
vehicles [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ]. Such systems are usually a very important component, since all the logic for controlling
the robot is built on them [
        <xref ref-type="bibr" rid="ref20 ref21 ref22 ref23">20-23</xref>
        ]. ROS was not designed with security considerations in mind,
providing the basics - confidentiality, integrity, or authenticity. Consequently, ROS becomes a tasty
morsel for attackers. They can:Listen to traffic; Disable individual nodes; Substitute nodes. The
situation became even simpler when utilities for auditing the security of ROS systems appeared in the
public domain: roschaos; rospento. ROS application developers have implemented security measures
themselves to prevent these threats. If systems fail or fail, then the robot itself and the environment in
which it is located may be at risk. To solve the last problem, we developed the DDS-Security
specification, which consists of the so-called. plugins: authentication plugin, access control
(authorization) plugin, cryptography plugin (encryption, decryption, hashing, EDS, etc.), logging
plugin and data tagging plugin. The last two are not implemented in the free implementation of DDS
eProsima Fast-RTPS.
      </p>
      <p>However, the implementation does not always comply with the specification, and here it is the
same, attacks are still available, but their complexity increases greatly. For example, topology recovery
during the handshake stage is because, at the very beginning, nodes exchange access control manifests
that contain meta-information from which robotic network topologies can be restored.</p>
      <p>
        Our research has shown that ROS is quite vulnerable and requires significant improvement. Using
such a system to manage critical applications becomes unacceptable [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ]. The developers of ROS
realized the shortcomings in the architecture and released a new version of it. Now communication
between nodes takes place according to the DDS standard, which currently has two implementations:
Connext Secure 5.3.1 (proprietary), eProsima Fast-RTPS 1.6.0 (open-source).
      </p>
      <p>In addition, there is no longer a Master node in the scheme - all its responsibilities fell on the
shoulders of DDS, which means that it is no longer possible to silently disable nodes, as well as perform
substitution. However, there is still no encryption out of the box, which means that we can still intercept
and read messages.ROS2 is becoming more secure; however, a fair number of vulnerabilities are still
present. In general, despite the existing vulnerabilities of the operating system, it is a convenient
mechanism for developing robot control systems. It is most convenient to collect and receive data from
the sensor system and transmit control commands to ROS 2. This is due to the publisher architecture.
the subscriber processes appear to be isolated from each other and may not communicate directly with
each other, but act through the publisher. At the same time, it is possible to ensure that the publisher
will carry out the authorization of processes. One of the directions for ensuring security in this case may
be the integration of a mandatory access control model. Provided that it is required to provide an isolated
environment and the highest level of protection.</p>
    </sec>
    <sec id="sec-6">
      <title>6. Acknowledgements</title>
      <p>This research was funded by the Russian Science Foundation grant number 21-79-00194,
https://rscf.ru/project/21-79-00194/ in Southern Federal University.</p>
    </sec>
    <sec id="sec-7">
      <title>7. References</title>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>U. -G.</given-names>
            <surname>Lee</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K. -J.</given-names>
            <surname>Choi</surname>
          </string-name>
          and S. -Y. Park,
          <article-title>The Design and Implementation of Autonomous Driving Pallet Robot System using ROS, 2021</article-title>
          <source>Twelfth International Conference on Ubiquitous and Future Networks (ICUFN)</source>
          ,
          <year>2021</year>
          , pp.
          <fpage>372</fpage>
          -
          <lpage>374</lpage>
          , doi: 10.1109/ICUFN49451.
          <year>2021</year>
          .
          <volume>9528735</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>P.</given-names>
            <surname>Anggraeni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Mrabet</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Defoort</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.</given-names>
            <surname>Djemai</surname>
          </string-name>
          ,
          <article-title>Development of a wireless communication platform for multiple-mobile robots using ROS,</article-title>
          <year>2018</year>
          <source>6th International Conference on Control Engineering &amp; Information Technology (CEIT)</source>
          ,
          <year>2018</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          , doi: 10.1109/CEIT.
          <year>2018</year>
          .
          <volume>8751845</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>A. F.</given-names>
            <surname>Olalekan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. A.</given-names>
            <surname>Sagor</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. H.</given-names>
            <surname>Hasan</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A. S.</given-names>
            <surname>Oluwatobi</surname>
          </string-name>
          ,
          <article-title>Comparison of Two SLAM Algorithms Provided by ROS (Robot Operating System</article-title>
          ),
          <source>2021 2nd International Conference for Emerging Technology (INCET)</source>
          ,
          <year>2021</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          , doi: 10.1109/INCET51464.
          <year>2021</year>
          .
          <volume>9456164</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>X.</given-names>
            <surname>Zhao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Shu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Lan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Feng</surname>
          </string-name>
          and
          <string-name>
            <given-names>W.</given-names>
            <surname>Dong</surname>
          </string-name>
          ,
          <source>Security Controller Synthesis for ROS-based Robot,m2020 IEEE 20th International Conference on Software Quality</source>
          , Reliability and Security
          <string-name>
            <surname>Companion (QRS-C)</surname>
          </string-name>
          ,
          <year>2020</year>
          , pp.
          <fpage>472</fpage>
          -
          <lpage>477</lpage>
          , doi: 10.1109/QRS-C51114.
          <year>2020</year>
          .
          <volume>00085</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>M. J.</given-names>
            <surname>Fernandez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P. J.</given-names>
            <surname>Sanchez-Cuevas</surname>
          </string-name>
          ,
          <string-name>
            <surname>G.</surname>
          </string-name>
          <article-title>Heredia and A. Ollero, Securing UAV communications using ROS with custom ECIES-based method</article-title>
          ,
          <source>2019 Workshop on Research, Education and Development of Unmanned Aerial Systems (RED UAS)</source>
          ,
          <year>2019</year>
          , pp.
          <fpage>237</fpage>
          -
          <lpage>246</lpage>
          , doi: 10.1109/REDUAS47371.
          <year>2019</year>
          .
          <volume>8999685</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>B.</given-names>
            <surname>Dieber</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Kacianka</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Rass</surname>
          </string-name>
          and
          <string-name>
            <given-names>P.</given-names>
            <surname>Schartner</surname>
          </string-name>
          ,
          <article-title>Application-level security for ROS-based applications</article-title>
          ,
          <source>2016 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS)</source>
          ,
          <year>2016</year>
          , pp.
          <fpage>4477</fpage>
          -
          <lpage>4482</lpage>
          , doi: 10.1109/IROS.
          <year>2016</year>
          .
          <volume>7759659</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>I.</given-names>
            <surname>Abeykoon</surname>
          </string-name>
          and
          <string-name>
            <given-names>X.</given-names>
            <surname>Feng</surname>
          </string-name>
          , Challenges in ROS Forensics,
          <year>2019</year>
          IEEE SmartWorld,
          <source>Ubiquitous Intelligence &amp; Computing</source>
          ,
          <string-name>
            <given-names>Advanced &amp; Trusted</given-names>
            <surname>Computing</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Scalable</given-names>
            <surname>Computing</surname>
          </string-name>
          &amp;
          <article-title>Communications, Cloud &amp; Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM</article-title>
          /UIC/ATC/CBDCom/IOP/SCI),
          <year>2019</year>
          , pp.
          <fpage>1677</fpage>
          -
          <lpage>1682</lpage>
          , doi: 10.1109/
          <string-name>
            <surname>SmartWorld-UIC-ATC-SCALCOM-IOP-SCI</surname>
          </string-name>
          .
          <year>2019</year>
          .
          <volume>00299</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>X.</given-names>
            <surname>Zhao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Shu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Lan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Feng</surname>
          </string-name>
          and
          <string-name>
            <given-names>W.</given-names>
            <surname>Dong</surname>
          </string-name>
          ,
          <source>Security Controller Synthesis for ROS-based Robot</source>
          ,
          <source>2020 IEEE 20th International Conference on Software Quality</source>
          , Reliability and Security
          <string-name>
            <surname>Companion (QRS-C)</surname>
          </string-name>
          ,
          <year>2020</year>
          , pp.
          <fpage>472</fpage>
          -
          <lpage>477</lpage>
          , doi: 10.1109/QRS-C51114.
          <year>2020</year>
          .
          <volume>00085</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>B.</given-names>
            <surname>Dieber</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Kacianka</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Rass</surname>
          </string-name>
          and
          <string-name>
            <given-names>P.</given-names>
            <surname>Schartner</surname>
          </string-name>
          ,
          <article-title>Application-level security for ROS-based applications,"</article-title>
          <source>2016 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS)</source>
          ,
          <year>2016</year>
          , pp.
          <fpage>4477</fpage>
          -
          <lpage>4482</lpage>
          , doi: 10.1109/IROS.
          <year>2016</year>
          .
          <volume>7759659</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>M.</given-names>
            <surname>Mukhandi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Portugal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Pereira</surname>
          </string-name>
          and
          <string-name>
            <given-names>M. S.</given-names>
            <surname>Couceiro</surname>
          </string-name>
          ,
          <article-title>A novel solution for securing robot communications based on the MQTT protocol</article-title>
          and ROS,
          <source>2019 IEEE/SICE International Symposium on System Integration (SII)</source>
          ,
          <year>2019</year>
          , pp.
          <fpage>608</fpage>
          -
          <lpage>613</lpage>
          , doi: 10.1109/SII.
          <year>2019</year>
          .
          <volume>8700390</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>N. X.</given-names>
            <surname>Quyen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C. T.</given-names>
            <surname>Nguyen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Barlet-Ros</surname>
          </string-name>
          and
          <string-name>
            <given-names>R.</given-names>
            <surname>Dojen</surname>
          </string-name>
          ,
          <article-title>A novel approach to security enhancement of chaotic DSSS systems,"</article-title>
          <source>2016 IEEE Sixth International Conference on Communications and Electronics (ICCE)</source>
          ,
          <year>2016</year>
          , pp.
          <fpage>471</fpage>
          -
          <lpage>476</lpage>
          , doi: 10.1109/CCE.
          <year>2016</year>
          .
          <volume>7562681</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>S.</given-names>
            <surname>Osuka</surname>
          </string-name>
          et al.,
          <article-title>Fundamental study on non-invasive frequency injection attack against RO-</article-title>
          <string-name>
            <surname>based</surname>
            <given-names>TRNG</given-names>
          </string-name>
          ,
          <source>2018 IEEE International Symposium on Electromagnetic Compatibility and 2018 IEEE Asia-Pacific Symposium on Electromagnetic Compatibility (EMC/APEMC)</source>
          ,
          <year>2018</year>
          , pp.
          <fpage>8</fpage>
          -
          <lpage>8</lpage>
          , doi: 10.1109/ISEMC.
          <year>2018</year>
          .
          <volume>8394008</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <surname>M. M. Basheer</surname>
            and
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Varol</surname>
          </string-name>
          ,
          <source>An Overview of Robot Operating System Forensics</source>
          ,
          <year>2019</year>
          1st
          <string-name>
            <given-names>International</given-names>
            <surname>Informatics</surname>
          </string-name>
          and Software Engineering Conference (UBMYK),
          <year>2019</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>4</lpage>
          , doi: 10.1109/UBMYK48245.
          <year>2019</year>
          .
          <volume>8965649</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>B.</given-names>
            <surname>Breiling</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Dieber</surname>
          </string-name>
          and
          <string-name>
            <given-names>P.</given-names>
            <surname>Schartner</surname>
          </string-name>
          ,
          <article-title>Secure communication for the robot operating system</article-title>
          ,
          <source>2017 Annual IEEE International Systems Conference (SysCon)</source>
          ,
          <year>2017</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          , doi: 10.1109/SYSCON.
          <year>2017</year>
          .
          <volume>7934755</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>S.</given-names>
            <surname>Moini</surname>
          </string-name>
          et al.,
          <article-title>"Understanding and Comparing the Capabilities of On-Chip Voltage Sensors against Remote Power Attacks on FPGAs</article-title>
          ,
          <source>2020 IEEE 63rd International Midwest Symposium on Circuits and Systems (MWSCAS)</source>
          ,
          <year>2020</year>
          , pp.
          <fpage>941</fpage>
          -
          <lpage>944</lpage>
          , doi: 10.1109/MWSCAS48704.
          <year>2020</year>
          .
          <volume>9184683</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Xu</surname>
          </string-name>
          and
          <string-name>
            <given-names>Q.</given-names>
            <surname>Zhu</surname>
          </string-name>
          ,
          <source>Cross-Layer Secure and Resilient Control of Delay-Sensitive Networked Robot Operating Systems</source>
          ,
          <source>2018 IEEE Conference on Control Technology and Applications (CCTA)</source>
          ,
          <year>2018</year>
          , pp.
          <fpage>1712</fpage>
          -
          <lpage>1717</lpage>
          , doi: 10.1109/CCTA.
          <year>2018</year>
          .
          <volume>8511500</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17] Y.
          <article-title>-k.</article-title>
          <string-name>
            <surname>Lee</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          <article-title>kim</article-title>
          and J. -n. kim,
          <source>Implementation of TLS and DTLS on Zephyr OS for IoT Devices</source>
          ,
          <source>2018 International Conference on Information and Communication Technology Convergence (ICTC)</source>
          ,
          <year>2018</year>
          , pp.
          <fpage>1292</fpage>
          -
          <lpage>1294</lpage>
          , doi: 10.1109/ICTC.
          <year>2018</year>
          .
          <volume>8539493</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>H.</given-names>
            <surname>Aly</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.</given-names>
            <surname>Youssef</surname>
          </string-name>
          ,
          <article-title>Zephyr demo: Ubiquitous accurate multi-sensor fusion-based respiratory rate estimation using smartphones</article-title>
          ,
          <source>2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)</source>
          ,
          <year>2016</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>2</lpage>
          , doi: 10.1109/INFCOMW.
          <year>2016</year>
          .
          <volume>7562035</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>A.S.</given-names>
            <surname>Basan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.S.</given-names>
            <surname>Basan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.A.</given-names>
            <surname>Lapina</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.G.</given-names>
            <surname>Lapin</surname>
          </string-name>
          ,
          <article-title>Behavior-Based Assessment of Trust in a Cyber-Physical System, Futuristic Trends in Network and Communication Technologies (FTNCT</article-title>
          ),
          <year>2020</year>
          .
          <source>Communications in Computer and Information Science</source>
          , vol
          <volume>1395</volume>
          . Springer, Singapore. https://doi.org/10.1007/
          <fpage>978</fpage>
          -981-16-1480-4_
          <fpage>17</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <surname>Basan</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lapina</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mecella</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <article-title>Protected group control system for mobile robots</article-title>
          .
          <source>Paper presented at the YRID-2020 Proceedings of the International Workshop on Data Mining and Knowledge Engineering Stavropol, Russia, October 15-16</source>
          ,
          <year>2020</year>
          , CEUR Workshop Proceeding
          <year>2021</year>
          ,
          <volume>2842</volume>
          , pp.
          <fpage>4</fpage>
          -
          <lpage>12</lpage>
          , http://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>2842</volume>
          /Invited_paper_1.pdf
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <surname>Proshkin</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Basan</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lapina</surname>
          </string-name>
          , M. Radio Frequency Method for Emulating Multiple UAVs // 17th International Conference on Intelligent Environments,
          <source>IE 2021 - Proceedings</source>
          ,
          <year>2021</year>
          ,
          <volume>9486599</volume>
          , https://doi.org/10.1109/IE51775.
          <year>2021</year>
          .9486599
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <surname>Basan</surname>
            ,
            <given-names>A.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Basan</surname>
            ,
            <given-names>E.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lapina</surname>
            ,
            <given-names>M.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kormakova</surname>
            ,
            <given-names>V.N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lapin</surname>
            ,
            <given-names>V.G.</given-names>
          </string-name>
          <article-title>Security methods for a group of mobile robots according to the requirements of Russian and</article-title>
          foreign legislation // IOP Conference Series: Materials Science and Engineering,
          <year>2020</year>
          ,
          <volume>873</volume>
          (
          <issue>1</issue>
          ),012031, https://doi.org/10.1088/
          <fpage>1757</fpage>
          -899x/873/1/012031
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <surname>Basan</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lapina</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mudruk</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Abramov</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          <article-title>Intelligent Intrusion Detection System for a Group of UAVs</article-title>
          , Lecture Notes in Computer Science,
          <year>2021</year>
          ,
          <volume>12690</volume>
          LNCS, pp.
          <fpage>230</fpage>
          -
          <lpage>240</lpage>
          , https://doi.org/10.1007/978-3-
          <fpage>030</fpage>
          -78811-7_
          <fpage>22</fpage>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>