APPROACH TO SECURITY ASSURANCE FOR CONTROL CHANNELS OF ROBOTIC SYSTEMS

APPROACH TO SECURITY ASSURANCE FOR CONTROL CHANNELS OF ROBOTIC SYSTEMS

M.A. Kotcynyak
Doctor of Technical Science, Military Academy of the Signal Corps named after S. M. Budjonny, Professor, Professor of the Department, 3, К-64, Tikhoretsky pr., Saint-Petersburg, 194064, Russia, tel.: +7(921)971-60-58, This email address is being protected from spambots. You need JavaScript enabled to view it.

A.M. Kribel'
Military Academy of the Signal Corps named after S. M. Budjonny, Adjunct, 3, К-64, Tikhoretsky pr., Saint-Petersburg, 194064, Russia, tel.: +7(982)323-66-40, This email address is being protected from spambots. You need JavaScript enabled to view it.

V.V. Kuznetcova
FSBEI «URGPU (NPI) of M.I. Platov», 132, ul. Prosvescheniya, Novocherkassk, Rostovskaya obl., 346428, Russia, tel.: +7(8635)25-51-87, This email address is being protected from spambots. You need JavaScript enabled to view it.

O.S. Lauta
PhD in Technical Sciences, Military Academy of the Signal Corps named after S. M. Budjonny, Lecturer, 3, К-64, Tikhoretsky pr., Saint-Petersburg, 194064, Russia, tel.: +7(911)842-02-28, This email address is being protected from spambots. You need JavaScript enabled to view it.

V.M. Moskovchenko
Doctor of Economics, PhD in Military Sciences, FSBEI «URGPU (NPI) of M.I. Platov», Professor, Director of the Military Institute, 132, ul. Prosvescheniya, Novocherkassk, Rostovskaya obl., 346428, Russia, tel.: +7(8635)25-51-87, This email address is being protected from spambots. You need JavaScript enabled to view it.


Received 17 October 2017.

Abstract
To date, researches in the field of robotic are very relevant. Robotic complexes can improve productivity several-fold, without making mistakes due to human factor. Such complexes are referred to as cyber-physical systems. An integral part of cyber-physical systems is the conrol system. This system, as well as any information channel, must be protected from computer attacks in order to avoid interception of cyber-physical systems by intruders. In the article the developed robotic complex and the system that allows managing this complex using a reliable cryptographically stable connection, are described. The main element of this system is a cryptographic chip stm32f415. It allows reducing of the load on the central processor to perform control algorithms, freeing it from cryptographic operations, thereby guaranteeing the time gain.

Key words
Control channel, cyber-physical systems, robotic systems, cryptographic algorithms.

Bibliographic description 
Kotcynyak, M. and et al. (2017). Approach to security assurance for control channels of robotic systems. Robotics and Technical Cybernetics, 4(17), pp.15-21.

UDC identifier
004.056.53

References

  1. RM0090 Reference manual. STM32F405/415, STM32F407/417, STM32F427/437 and STM32F429/439 advanced ARM®–based 32–bit MCUs. (2017). STMicroelectronics, p.1745.
  2. kaf403.rloc. (n.d.). Skhema obmena klyuchami Diffi — Khellmana [Diffie-Hellman key exchange scheme]. [online] Available at: http://kaf403.rloc.ru/POVS/Crypto/DiffieHellman.html [Accessed 2 Nov. 2017].
  3. BeagleBone Black (2014). Enable All UART Ports at Boot. [online] Billwaa's Blog. Available at: https://billwaa.wordpress.com/2014/10/13/beaglebone-black-enable-all-uart-ports-at-boot/ [Accessed 2 Nov. 2017].
  4. tuuzdu (2014). Hexapod-robot pod upravleniem ROS [Hexapod-robot under ROS control]. [online] PVSM. Available at: http://www.pvsm.ru/diy–ili–sdelaj–sam/62026 [Accessed 2 Nov. 2017].
  5. Psyhocode. (n.d.). Pentesting i testirovanie na proniknovenie [Pentesting and Penetration test]. [online] Available at: http://www.psyhocode.com/pentesting/ [Accessed 1 Nov. 2017].
  6. Microtechnics. (2013). Programmirovanie STM32F4. USART. Primer programmy [STM32F4 Coding. USART. Example of program]. [online] Available at: http://microtechnics.ru/programmirovanie-stm32f4-usart-primer-programmy/ [Accessed 6 Nov. 2017].
  7. Kotsynyak, M., Lauta, O. and Osadchiy, S. (2013). Veroyatnostno-vremennye kharakteristiki komp'yuternoy ataki tipa «Analiz setevogo trafika» [Probabilistic-temporal characteristics of computer attacks of the type "network traffic Analysis"]. Information and Space, 3-4, pp.25-27.
  8. Vasyukov, D. and et al. (2017). Ustroystvo obnaruzheniya udalennykh komp'yuternykh atak [Device discovery of remote computer attacks]. RUS 2540838.
  9. Eliseev, A. and et al. (2013). Obespechenie zhivuchesti informatsionnykh sistem. Ch. 3. Metody obespecheniya i povysheniya zhivuchesti [Ensuring the survivability of information systems. Part 3. Methods of ensuring and enhancing survivability]. Vestnik of Voronezh Institute of the Russian Federal Penitentiary Service, 1, pp.91-94.
  10. Kotsynyak, M. and et al. (2016). Metodika otsenki ustoychivosti informatsionno-telekommunikatsionnoy seti v usloviyakh informatsionnogo vozdeystviya [Methods of assessment of sustainability of telecommunication networks in terms of information influence]. Trudy uchebnykh zavedeniy svyazi [Proceedings of Educational Institutions in Sphere of Communication], 2(4), pp.82-87.
  11. Baranov, V. and et al. (2017). Primenenie metoda topologicheskogo preobrazovaniya stokhasticheskikh setey dlya otsenki effektivnosti sredstv zashchity [application of the method of topological transformations of stochastic networks to evaluate the effectiveness of the remedies]. In: Trudy mezhvuzovskoy nauchno-prakticheskoy konferentsii «Aktual'nye problemy obespecheniya informatsionnoy bezopasnosti» [The proceedings of the Interuniversity Scientific and Practical Conference on Actual Problems of Information Security]. pp.47-52.
  12. Kotsynyak, M. and et al. (2017). Metodika otsenki zashchishchennosti informatsionno-telekommunikatsionnoy seti v usloviyakh informatsionnogo protivodeystviya [Methods of assessing the protection of information and telecommunication network in the conditions of information opposition]. In: Trudy XXIII Mezhdunarodnoy nauchno- tekhnicheskoy konferentsii «Radiolokatsiya, navigatsiya, svyaz'» [Proceedings of the XXIII International Scientific and Technical Conference on Radar, Navigation, Communication. ]. pp.83-87.
  13. Kotsynyak, M. and et al. (2017). Model' targetirovannoy kiberneticheskoy ataki [Model of targeted cyber attacks]. In: Trudy XXIII Mezhdunarodnoy nauchno- tekhnicheskoy konferentsii «Radiolokatsiya, navigatsiya, svyaz'» [Proceedings of the XXIII International Scientific and Technical Conference on Radar, Navigation, Communication. ]. pp.90-98.
  14. Baranov, V. and et al. (2017). Zashchita kanala upravleniya robotizirovannykh sistem [Robotic systems' control channel security]. In: Trudy mezhvuzovskoy nauchno-prakticheskoy konferentsii «Aktual'nye problemy obespecheniya informatsionnoy bezopasnosti» [The proceedings of the Interuniversity Scientific and Practical Conference on Actual Problems of Information Security]. pp.32-37.
Editorial office address: 21, Tikhoretsky pr., Saint-Petersburg, Russia, 194064, tel.: +7(812) 552-13-25 e-mail: zheleznyakov@rtc.ru