Security and Performance Considerations in ROS 2: A Balancing Act

09/24/2018
by   Jongkil Kim, et al.
0

Robot Operating System (ROS) 2 is a ground-up re-design of ROS 1 to support performance critical cyber-physical systems (CPSs) using the Data Distribution Service (DDS) middleware. Accordingly, the security of ROS 2 is highly reliant on the security of its DDS communication protocol. However, finding a balance between the performance and security is non-trivial task. Inappropriate security implementations may cause not only significant loss on performance of the system, but also security failures in the system. In this paper, we provide an analysis of the DDS security protocol as well as an overview on how to find the balance between performance and security. To accomplish this, we evaluate the latency and throughput of the communication protocols of ROS 2 in both wired and wireless networks, and measure the efficiency loss caused by the enabling of security protocols such as Virtual Private Network (VPN) and DDS security protocol in ROS 2 in both network setups. The result can be directly used by robotics developers to find the optimal and balanced settings of ROS 2 applications. Additionally, we analyzed the security specification of DDS using existing security standards and tested the implementation of the DDS protocol by performing static analysis. The results of this work can be used to enhance the security of ROS 2.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/20/2018

X-Lap: A Systems Approach for Cross-Layer Profiling and Latency Analysis for Cyber-Physical Networks

Networked control applications for cyber-physical networks demand predic...
research
06/01/2023

The TeamPlay Project: Analysing and Optimising Time, Energy, and Security for Cyber-Physical Systems

Non-functional properties, such as energy, time, and security (ETS) are ...
research
05/06/2021

Exploiting Partial Order of Keys to Verify Security of a Vehicular Group Protocol

Vehicular networks will enable a range of novel applications to enhance ...
research
05/27/2020

Security Improvements of Several Basic Quantum Private Query Protocols with O(log N) Communication Complexity

New quantum private database (with N elements) query protocols are prese...
research
06/30/2023

A Quic(k) Security Overview: A Literature Research on Implemented Security Recommendations

Built on top of UDP, the relatively new QUIC protocol serves as the base...
research
07/27/2022

Mistakes of A Popular Protocol Calculating Private Set Intersection and Union Cardinality and Its Corrections

In 2012, De Cristofaro et al. proposed a protocol to calculate the Priva...
research
03/19/2021

Wisecr: Secure Simultaneous Code Disseminationto Many Batteryless Computational RFID Devices

Emerging ultra-low-power tiny scale computing devices in Cyber-Physical ...

Please sign up or login with your details

Forgot password? Click here to reset