Go to:
Logótipo
Comuta visibilidade da coluna esquerda
Você está em: Start > Publications > View > Secure integration of extremely resource-constrained nodes on distributed ROS2 applications
Publication

Publications

Secure integration of extremely resource-constrained nodes on distributed ROS2 applications

Title
Secure integration of extremely resource-constrained nodes on distributed ROS2 applications
Type
Article in International Scientific Journal
Year
2023
Authors
Spilere Nandi, G
(Author)
Other
The person does not belong to the institution. The person does not belong to the institution. The person does not belong to the institution. Without AUTHENTICUS Without ORCID
Pereira, D
(Author)
Other
The person does not belong to the institution. The person does not belong to the institution. The person does not belong to the institution. Without AUTHENTICUS Without ORCID
Proença, J
(Author)
FCUP
View Personal Page You do not have permissions to view the institutional email. Search for Participant Publications View Authenticus page View ORCID page
Tovar, E
(Author)
Other
The person does not belong to the institution. The person does not belong to the institution. The person does not belong to the institution. Without AUTHENTICUS Without ORCID
Rodriguez, A
(Author)
Other
The person does not belong to the institution. The person does not belong to the institution. The person does not belong to the institution. Without AUTHENTICUS Without ORCID
Garrido, P
(Author)
Other
The person does not belong to the institution. The person does not belong to the institution. The person does not belong to the institution. Without AUTHENTICUS Without ORCID
Journal
The Journal is awaiting validation by the Administrative Services.
Title: Open Research EuropeImported from Authenticus Search for Journal Publications
Vol. 310
Final page: 113
Other information
Authenticus ID: P-00Y-P12
Abstract (EN): <ns3:p><ns3:bold>Background</ns3:bold>: modern robots employ artificial intelligence algorithms in a broad ange of applications. These robots acquire information about their surroundings and use these highly-specialized algorithms to reason about their next actions. Despite their effectiveness, artificial intelligence algorithms are highly susceptible to adversarial attacks. This work focuses on mitigating attacks aimed at tampering with the communication channel between nodes running micro-ROS, which is an adaptation of the Robot Operating System (ROS) for extremely resource-constrained devices (usually assigned to collect information), and more robust nodes running ROS2, typically in charge of executing computationally costly tasks, like processing artificial intelligence algorithms.</ns3:p><ns3:p> <ns3:bold>Methods</ns3:bold>: we followed the instructions described in the Data Distribution Service for Extremely Resource Constrained Environments (DDS-XRCE) specification on how to secure the communication between micro-ROS and ROS2 nodes and developed a custom communication transport that combines the application programming interface (API) provided by eProsima and the implementation of the Transport Security Layer version 1.3 (TLS 1.3) protocol developed by wolfSSL.</ns3:p><ns3:p> <ns3:bold>Results</ns3:bold>: first, we present the first open-source transport layer based on TLS 1.3 to secure the communication between micro-ROS and ROS2 nodes, providing initial benchmarks that measure its temporal overhead. Second, we demystify how the DDS-XRCE and DDS Security specifications interact from a cybersecurity point of view.</ns3:p><ns3:p> <ns3:bold>Conclusions</ns3:bold>: by providing a custom encrypted transport for micro-ROS and ROS2 applications to communicate, extremely resource-constrained devices can now participate in DDS environments without compromising the security, privacy, and authenticity of their message exchanges with ROS2 nodes. Initial benchmarks show that encrypted single-value messages present around 20% time overhead compared to the default non-encrypted micro-ROS transport. Finally, we presented an analysis of how the DDS-XRCE and DDS Security specifications relate to each other, providing insights not present in the literature that are crucial for further investigating the security characteristics of combining these specifications.</ns3:p>
Language: English
Type (Professor's evaluation): Scientific
Documents
We could not find any documents associated to the publication.
Related Publications

Of the same journal

Hydrogen production via aqueous-phase reforming for high-temperature proton exchange membrane fuel cells - a review (2021)
Article in International Scientific Journal
Lakhtaria, P; Ribeirinha, P; Huhtinen, W; Viik, S; Sousa, J; Adélio Mendes
Hydrogen production via aqueous-phase reforming for high-temperature proton exchange membrane fuel cells - a review (2022)
Article in International Scientific Journal
Lakhtaria, P; Ribeirinha, P; Huhtinen, W; Viik, S; Sousa, J; Adélio Mendes
FAIR4Health: Findable, Accessible, Interoperable and Reusable data to foster Health Research (2022)
Article in International Scientific Journal
Alvarez-Romero C.; Martínez-García A.; Sinaci A.A.; Gencturk M.; Méndez E.; Hernández-Pérez T.; Liperoti R.; Angioletti C.; Löbe M.; Ganapathy N.; Deserno T.M.; Almada M.; Costa, E; Chronaki C.; Cangioli G.; Cornet R.; Poblador-Plou B.; Carmona-Pírez J.; Gimeno-Miguel A.; Poncel-Falcó A....(mais 17 authors)
Environmental impacts of drugs against parasitic vector-borne diseases and the need to integrate sustainability into their development and use (2024)
Article in International Scientific Journal
Lima, M; Uliassi, E; Thoré, SJ; Bertram, G; Cardoso, L; Anabela Cordeiro da Silva; Costi, MP; de Koning, P
Recommend this page Top
Copyright 1996-2025 © Faculdade de Direito da Universidade do Porto  I Terms and Conditions  I Acessibility  I Index A-Z
Page created on: 2025-08-28 at 12:45:28 | Privacy Policy | Personal Data Protection Policy | Whistleblowing