Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Non-intrusive Anomaly Detection of Industrial Robot Operations by Exploiting Nonlinear Effect

Published: 11 January 2023 Publication History

Abstract

With the development of Internet of Robotic Things concept, low-cost radio technologies open up many opportunities to facilitate the monitoring system of industrial robots, while the openness of wireless medium exposes robots to replay and man-in-the-middle attackers, who send pre-recorded movement data to mislead the system. Recent advances advocate the use of high-resolution sensors to monitor robot operations, which however require invasive retrofit to the robots. To overcome this predicament, we present RobotScatter, a non-intrusive system that exploits the nonlinear effect of RF circuits to fuse the propagation of backscatter tags attached to the robot to defend against active attacks. Specifically, the backscatter propagation interacted by the tags significantly depends on various movement operations, which can be captured with the nonlinearity at the receiver to uniquely determine its identity and the spatial movement trajectory. RobotScatter then profiles the robot movements to verify whether the received movement information matches the backscatter signatures, and thus detects the threat. We implement RobotScatter on two common robotic platforms, Universal Robot and iRobot Create, with over 1,500 operation cycles. The experiment results show that RobotScatter detects up to 94% of anomalies against small movement deviations of 10mm/s in velocity, and 2.6cm in distance.

References

[1]
Hamid Abdi and Saeid Nahavandi. 2010. Joint velocity redistribution for fault tolerant manipulators. In 2010 IEEE Conference on Robotics, Automation and Mechatronics. IEEE, 492--497.
[2]
Shaima Al Habsi, Maha Shehada, Marwah Abdoon, Ahmed Mashood, and Hassan Noura. 2015. Integration of a Vicon camera system for indoor flight of a Parrot AR Drone. In 2015 10th International Symposium on Mechatronics and its Applications (ISMA). IEEE, 1--6.
[3]
Mohammed Aladsani, Ahmed Alkhateeb, and Georgios C Trichopoulos. 2019. Leveraging mmWave imaging and communications for simultaneous localization and mapping. In ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, 4539--4543.
[4]
Michele Albano, Luis Lino Ferreira, Giovanni Di Orio, Pedro Maló, Godfried Webers, Erkki Jantunen, Iosu Gabilondo, Mikel Viguera, and Gregor Papa. 2020. Advanced sensor-based maintenance in real-world exemplary cases. Automatika 61, 4 (2020), 537--553.
[5]
Zhenlin An, Qiongzheng Lin, and Lei Yang. 2018. Cross-frequency communication: Near-field identification of uhf rfids with wifi!. In Proceedings of the 24th Annual International Conference on Mobile Computing and Networking. 623--638.
[6]
Emekcan Aras, Gowri Sankar Ramachandran, Piers Lawrence, and Danny Hughes. 2017. Exploring the security vulnerabilities of LoRa. In 2017 3rd IEEE International Conference on Cybernetics (CYBCONF). IEEE, 1--6.
[7]
Tom Bartman and Kevin Carson. 2016. Securing communications for SCADA and critical industrial systems. In 2016 69th annual conference for protective relay engineers (CPRE). IEEE, 1--10.
[8]
Christian Bayens, Tuan Le, Luis Garcia, Raheem Beyah, Mehdi Javanmard, and Saman Zonouz. 2017. See no evil, hear no evil, feel no evil, print no evil? malicious fill patterns detection in additive manufacturing. In 26th {USENIX} Security Symposium ({USENIX} Security 17). 1181--1198.
[9]
Dinesh Bharadia, Kiran Raj Joshi, Manikanta Kotaru, and Sachin Katti. 2015. Backfi: High throughput wifi backscatter. ACM SIGCOMM Computer Communication Review 45, 4 (2015), 283--296.
[10]
Rita Chattopadhyay, Mruthunjaya Jay Chetty, Eric XiaozhongJi, Stephanie Cope, and Jeffrey E Davis. 2017. Real time remote monitoring and anomaly detection in industrial robots based on vibration signals, enabling large scale deployment of condition based maintenance. International Journal of Nanotechnology & Nanomedicine 2, 1 (2017), 1--4.
[11]
Zicheng Chi, Xin Liu, Wei Wang, Yao Yao, and Ting Zhu. 2020. Leveraging ambient lte traffic for ubiquitous passive communication. In Proceedings of the Annual conference of the ACM Special Interest Group on Data Communication on the applications, technologies, architectures, and protocols for computer communication. 172--185.
[12]
Byoung-Suk Choi and Ju-Jang Lee. 2009. Mobile robot localization in indoor environment using RFID and sonar fusion system. In 2009 IEEE/RSJ International Conference on Intelligent Robots and Systems. IEEE, 2039--2044.
[13]
Keywhan Chung, Xiao Li, Peicheng Tang, Zeran Zhu, Zbigniew T Kalbarczyk, Ravishankar K Iyer, and Thenkurussi Kesavadas. 2019. Smart malware that uses leaked control data of robotic applications: The case of Raven-II surgical robots. In 22nd International Symposium on Research in Attacks, Intrusions and Defenses ({RAID} 2019). 337--351.
[14]
Nicolas Falliere, Liam O Murchu, and Eric Chien. 2011. W32. stuxnet dossier. White paper, symantec corp., security response 5, 6 (2011), 29.
[15]
Hassan Ismail Fawaz, Germain Forestier, Jonathan Weber, Lhassane Idoumghar, and Pierre-Alain Muller. 2019. Deep learning for time series classification: a review. Data mining and knowledge discovery 33, 4 (2019), 917--963.
[16]
Chao Feng, Jie Xiong, Liqiong Chang, Fuwei Wang, Ju Wang, and Dingyi Fang. 2021. RF-Identity: Non-Intrusive Person Identification Based on Commodity RFID Devices. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 5, 1 (2021), 1--23.
[17]
Xiuzhen Guo, Longfei Shangguan, Yuan He, Jia Zhang, Haotian Jiang, Awais Ahmad Siddiqi, and Yunhao Liu. 2020. Aloba: Rethinking ON-OFF keying modulation for ambient lora backscatter. In Proceedings of the 18th Conference on Embedded Networked Sensor Systems. 192--204.
[18]
Nijat Hasanov and Ali Pourmohammad. 2020. Applications of LoRaWAN in SCADA Systems. In 2020 10th International Conference on Computer and Knowledge Engineering (ICCKE). IEEE, 1--6.
[19]
Elad Hoffer and Nir Ailon. 2015. Deep metric learning using triplet network. In International workshop on similarity-based pattern recognition. Springer, 84--92.
[20]
Rachel Hornung, Holger Urbanek, Julian Klodmann, Christian Osendorfer, and Patrick Van Der Smagt. 2014. Model-free robot anomaly detection. In 2014 IEEE/RSJ International Conference on Intelligent Robots and Systems. IEEE, 3676--3683.
[21]
Anna Huang, Dong Wang, Run Zhao, and Qian Zhang. 2019. Au-id: Automatic user identification and authentication through the motions captured from sequential human activities using rfid. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 3, 2 (2019), 1--26.
[22]
Qianyi Huang, Zhiqing Luo, Jin Zhang, Wei Wang, and Qian Zhang. 2020. LoRadar: Enabling Concurrent Radar Sensing and LoRa Communication. IEEE Transactions on Mobile Computing (2020).
[23]
Fábio Januário, Carolina Carvalho, Alberto Cardoso, and Paulo Gil. 2016. Security challenges in SCADA systems over Wireless Sensor and Actuator Networks. In 2016 8th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT). IEEE, 363--368.
[24]
Xingbin Jiang, Michele Lora, and Sudipta Chattopadhyay. 2020. An experimental analysis of security vulnerabilities in industrial IoT devices. ACM Transactions on Internet Technology (TOIT) 20, 2 (2020), 1--24.
[25]
Lawrence H Kim and Sean Follmer. 2017. Ubiswarm: Ubiquitous robotic interfaces and investigation of abstract motion as a display. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 1, 3 (2017), 1--20.
[26]
Manikanta Kotaru, Kiran Joshi, Dinesh Bharadia, and Sachin Katti. 2015. Spotfi: Decimeter level localization using wifi. In Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication. 269--282.
[27]
Vincent Liu, Aaron Parks, Vamsi Talla, Shyamnath Gollakota, David Wetherall, and Joshua R Smith. 2013. Ambient backscatter: Wireless communication out of thin air. ACM SIGCOMM Computer Communication Review 43, 4 (2013), 39--50.
[28]
Chris Xiaoxuan Lu, Muhamad Risqi U Saputra, Peijun Zhao, Yasin Almalioglu, Pedro PB de Gusmao, Changhao Chen, Ke Sun, Niki Trigoni, and Andrew Markham. 2020. milliEgo: single-chip mmWave radar aided egomotion estimation via deep sensor fusion. In Proceedings of the 18th Conference on Embedded Networked Sensor Systems. 109--122.
[29]
Zhihong Luo, Qiping Zhang, Yunfei Ma, Manish Singh, and Fadel Adib. 2019. 3D Backscatter Localization for {Fine-Grained} Robotics. In 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI 19). 765--782.
[30]
Melvin P Manuel and Kevin Daimi. 2021. Implementing cryptography in LoRa based communication devices for unmanned ground vehicle applications. SN Applied Sciences 3, 4 (2021), 1--14.
[31]
Michael L McIntyre, Warren E Dixon, Darren M Dawson, and Ian D Walker. 2004. Fault detection and identification for robot manipulators. In IEEE International Conference on Robotics and Automation, 2004. Proceedings. ICRA'04. 2004, Vol. 5. IEEE, 4981--4986.
[32]
Nader Mohamed, Jameela Al-Jaroodi, and Imad Jawhar. 2009. A review of middleware for networked robots. International Journal of Computer Science and Network Security 9, 5 (2009), 139--148.
[33]
Asim Munawar, Phongtharin Vinayavekhin, and Giovanni De Magistris. 2017. Spatio-temporal anomaly detection for industrial robots through prediction in unsupervised feature space. In 2017 IEEE Winter Conference on Applications of Computer Vision (WACV). IEEE, 1017--1025.
[34]
Yeong Sang Park, Young-Sik Shin, and Ayoung Kim. 2020. Pharao: Direct radar odometry using phase correlation. In 2020 IEEE International Conference on Robotics and Automation (ICRA). IEEE, 2617--2623.
[35]
Hongyi Pu, Liang He, Chengcheng Zhao, David KY Yau, Peng Cheng, and Jiming Chen. 2020. Detecting replay attacks against industrial robots via power fingerprinting. In Proceedings of the 18th Conference on Embedded Networked Sensor Systems. 285--297.
[36]
Transparency Market Research. 2021. Industrial Control Systems Security Solutions Market. https://www.transparencymarketresearch.com/industrial-control-systems-security-solutions-market.html. (2021).
[37]
Universal Robots. 2009. Universal Robots e-Series User Manual. http://help.universal-robots.com/SW_5_11/UR5e/Content/_resources/PDFs/UR5e_User_Manual_en_Global.pdf. (2009).
[38]
Jac Romme, Johan HC van den Heuvel, Guido Dolmans, G Selimis, Kathleen Philips, and Harmke de Groot. 2013. On remote RF-based orientation detection. In 2013 IEEE International Conference on Communications (ICC). IEEE, 4797--4801.
[39]
Longfei Shangguan and Kyle Jamieson. 2016. The design and implementation of a mobile RFID tag sorting robot. In Proceedings of the 14th annual international conference on mobile systems, applications, and services. 31--42.
[40]
Keith Stouffer, Joe Falco, Karen Scarfone, et al. 2011. Guide to industrial control systems (ICS) security. NIST special publication 800, 82 (2011), 16--16.
[41]
Vamsi Talla, Mehrdad Hessar, Bryce Kellogg, Ali Najafi, Joshua R Smith, and Shyamnath Gollakota. 2017. Lora backscatter: Enabling the vision of ubiquitous connectivity. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 1, 3 (2017), 1--24.
[42]
Dennis Tkach, He Huang, and Todd A Kuiken. 2010. Study of stability of time-domain features for electromyographic pattern recognition. Journal of neuroengineering and rehabilitation 7, 1 (2010), 1--13.
[43]
Deepak Vasisht, Swarun Kumar, and Dina Katabi. 2016. {Decimeter-Level} Localization with a Single {WiFi} Access Point. In 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16). 165--178.
[44]
Deepak Vasisht, Guo Zhang, Omid Abari, Hsiao-Ming Lu, Jacob Flanz, and Dina Katabi. 2018. In-body backscatter communication and localization. In Proceedings of the 2018 Conference of the ACM Special Interest Group on Data Communication. 132--146.
[45]
Davide Villa, Xinchao Song, Matthew Heim, and Liangshe Li. 2021. Internet of Robotic Things: Current Technologies, Applications, Challenges and Future Directions. arXiv preprint arXiv:2101.06256 (2021).
[46]
Luigi Villani and Joris De Schutter. 2016. Force control. In Springer handbook of robotics. Springer, 195--220.
[47]
Xuanzhi Wang, Kai Niu, Jie Xiong, Bochong Qian, Zhiyun Yao, Tairong Lou, and Daqing Zhang. 2022. Placement Matters: Understanding the Effects of Device Placement for WiFi Sensing. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 6, 1 (2022), 1--25.
[48]
Anna Wojciechowska, Jeremy Frey, Esther Mandelblum, Yair Amichai-Hamburger, and Jessica R Cauchard. 2019. Designing drones: Factors and characteristics influencing the perception of flying robots. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 3, 3 (2019), 1--19.
[49]
Chenshu Wu, Feng Zhang, Beibei Wang, and KJ Ray Liu. 2020. mSense: Towards mobile material sensing with a single millimeter-wave radio. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 4, 3 (2020), 1--20.
[50]
Ning Xiao, Panlong Yang, Xiang-Yang Li, Yanyong Zhang, Yubo Yan, and Hao Zhou. 2019. MilliBack: Real-time plug-n-play millimeter level tracking using wireless backscattering. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 3, 3 (2019), 1--23.
[51]
Xiangyu Xu, Jiadi Yu, Yingying Chen, Qin Hua, Yanmin Zhu, Yi-Chao Chen, and Minglu Li. 2020. TouchPass: towards behavior-irrelevant on-touch user authentication on smartphones leveraging vibrations. In Proceedings of the 26th Annual International Conference on Mobile Computing and Networking. 1--13.
[52]
Meng Xue, Yanjiao Chen, Xueluan Gong, Jian Zhang, and Chunkai Fan. 2022. Wet-Ra: Monitoring Diapers Wetness with Wireless Signals. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 6, 2 (2022), 1--26.
[53]
Shichao Yue, Hao He, Peng Cao, Kaiwen Zha, Masayuki Koizumi, and Dina Katabi. 2022. CornerRadar: RF-Based Indoor Localization Around Corners. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 6, 1 (2022), 1--24.
[54]
Shichao Yue, Hao He, Hao Wang, Hariharan Rahul, and Dina Katabi. 2018. Extracting multi-person respiration from entangled RF signals. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 2, 2 (2018), 1--22.
[55]
Pengyu Zhang, Dinesh Bharadia, Kiran Joshi, and Sachin Katti. 2016. Hitchhike: Practical backscatter using commodity wifi. In Proceedings of the 14th ACM Conference on Embedded Network Sensor Systems CD-ROM. 259--271.
[56]
Xianan Zhang, Lieke Chen, Mingjie Feng, and Tao Jiang. 2022. Toward Reliable Non-Line-of-Sight Localization Using Multipath Reflections. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 6, 1 (2022), 1--25.
[57]
Bingpeng Zhou, An Liu, and Vincent Lau. 2019. Successive localization and beamforming in 5G mmWave MIMO communication systems. IEEE Transactions on Signal Processing 67, 6 (2019), 1620--1635.

Cited By

View all
  • (2024)CASPER: Context-Aware IoT Anomaly Detection System for Industrial Robotic ArmsACM Transactions on Internet of Things10.1145/36704145:3(1-36)Online publication date: 1-Jun-2024

Index Terms

  1. Non-intrusive Anomaly Detection of Industrial Robot Operations by Exploiting Nonlinear Effect

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies
        Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies  Volume 6, Issue 4
        December 2022
        1534 pages
        EISSN:2474-9567
        DOI:10.1145/3580286
        Issue’s Table of Contents
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 11 January 2023
        Published in IMWUT Volume 6, Issue 4

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. backscatter
        2. industrial robot
        3. nonlinear effect
        4. physical layer security

        Qualifiers

        • Research-article
        • Research
        • Refereed

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)115
        • Downloads (Last 6 weeks)11
        Reflects downloads up to 26 Jan 2025

        Other Metrics

        Citations

        Cited By

        View all
        • (2024)CASPER: Context-Aware IoT Anomaly Detection System for Industrial Robotic ArmsACM Transactions on Internet of Things10.1145/36704145:3(1-36)Online publication date: 1-Jun-2024

        View Options

        Login options

        Full Access

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Figures

        Tables

        Media

        Share

        Share

        Share this Publication link

        Share on social media