a block encryption such as AES-128 (Kousalya and
Kumar, 2019) using ephemeral symmetric keys such
as explained in section 4. Moreover, in order to
mitigate the reflection attack, we managed a couple
of keys to manage encryption and decryption for
ingoing and outgoing traffic. It is possible to see in as
the ROS system, without our extension allows robots
to see all info exchanged in the packets. It is possible
to see as in the considered system the cryptographic
approach is effective hiding all info and providing
confidentiality property and complicating the attacker
work. In the following it is shown as the ECC curve
selected in the proposed approach to digitally sign the
packet can affect the execution time.
Figure 8: Task execution time under different ECC curves.
7 CONCLUSIONS
The following paper proposed to consider the security
aspects in the modeling and performance evaluation
of multi-robots systems. The coordination strategy
can be degraded or compromised by some possible
threats and it is important to include security features
in the communication protocols and on-board to
robots in order to protect them by possible cyber-
attacks. Current simulation tools such as ROS and
GAZEBO do not include in the basic features
modules able to consider security aspects and how
security aspects affect some constrained resources
such as battery and communication channel. Some
modules have been integrated in ROS and GAZEBO
to extend the modeling aspects to security. Some
mechanisms to support authentication, integrity and
encryption have been implemented. Moreover, some
security attacks have been applied to show how
mission or task can be compromised. Security
features have been introduced to mitigate these
attacks and performance evaluation has been
evaluated in a legacy or under attack scenario.
REFERENCES
S. Park and G. Lee, "Mapping and localization of
cooperative robots by ROS and SLAM in unknown
working area," 2017 56th Annual Conf. of the Society
of Instrument and Control Engineers of Japan (SICE),
Kanazawa, 2017, pp. 858-861.
S. Rivera, S. Lagraa, C. Nita-Rotaru, S. Becker and R. State,
"ROS-Defender: SDN-Based Security Policy
Enforcement for Robotic Applications," 2019 IEEE
Security and Privacy Workshops (SPW), San
Francisco, CA, USA, 2019, pp. 114-119.
M. Mukhandi, et al., "A novel solution for securing robot
communications based on the MQTT protocol and
ROS," 2019 IEEE/SICE International Symposium on
System Integration (SII), Paris, France, 2019, pp. 608-
613.
F De Rango, N Palmieri, XS Yang, S Marano, “Swarm
robotics in wireless distributed protocol design for
coordinating robots involved in cooperative tasks,” in
Soft Computing, Vol. 22 (13), 2018, pp.4251-4266.
M. Tropea, N. Palmieri, and F. De Rango, F. “Modeling the
Coordination of a Multiple Robots Using Nature
Inspired Approaches”. In Italian Workshop on
Artificial Life and Evolutionary Computation (pp. 124-
133). 2019, Springer, Cham.
N Palmieri, XS Yang, F De Rango, S Marano, “Comparison
of bio-inspired algorithms applied to the coordination
of mobile robots considering the energy consumption,”
in Neural Computing and Applications, Vol. 31 (1),
2019, pp.263-286.
N Palmieri, XS Yang, F De Rango, AF Santamaria, “Self-
adaptive decision-making mechanisms to balance the
execution of multiple tasks for a multi-robots team,” in
Neurocomputing, Vol. 306, 2018, pp.17-36.
S. Gatesichapakorn, J. Takamatsu and M. Ruchanurucks,
"ROS based Autonomous Mobile Robot Navigation
using 2D LiDAR and RGB-D Camera," 2019 First
International Symposium on Instrumentation, Control,
Artificial Intelligence, and Robotics (ICA-SYMP),
Bangkok, Thailand, 2019, pp. 151-154.
Raje, Sumit. (2020). Evaluation of ROS and Gazebo
Simulation Environment using TurtleBot3 robot.
Y. Abdelrasoul, A. B. S. H. Saman and P. Sebastian, "A
quantitative study of tuning ROS gmapping parameters
and their effect on performing indoor 2D SLAM," 2016
2nd IEEE Int. Symposium on Robotics and
Manufacturing Automation, Malaysia, 2016, pp. 1-6.
A. L. Ibáñez, R. Qiu and D. Li, "An implementation of
SLAM using ROS and Arduino," 2017 IEEE Intern.
Conference on Manipulation, Manufacturing and
Measurement on the Nanoscale (3M-NANO),
Shanghai, China, 2017, pp. 1-6.
ROS, ”About Turtlebot 3”, ROS.org. [Online]. Available:
https://emanual.robotis.com/docs/en/platform/turtlebot
3/overview/
J. R. Shaikh, M. Nenova, G. Iliev and Z. Valkova-Jarvis,
"Analysis of standard elliptic curves for the
implementation of elliptic curve cryptography in
resource-constrained E-commerce applications," 2017