Trusted operations of a military ground robot in the face of man-in-the-middle cyber-attacks using deep learning convolutional neural networks: Real-time experimental outcomes

Fendy Santoso, Anthony Finn

Research output: Contribution to journalArticlepeer-review

2 Citations (Scopus)
55 Downloads (Pure)

Abstract

Safe and secure operations of robotic systems are of paramount importance. Aiming for achieving the trusted operation of a military robotic vehicle under contested environments, we introduce a new cyber-physical system based on the concepts of deep learning convolutional neural networks (CNNs). The proposed algorithm is specifically designed to reduce the cyber vulnerability of the Robot Operating System (ROS), a well-known middleware platform widely used in both civilian and military robots. To demonstrate the efficacy of the proposed algorithm, we conduct penetration testing (real-time man-in-the-middle cyber attack) on the GVR-BOT ground vehicle, a military ground robot, developed by the United States Army Combat Capabilities Development Command (CCDC), Ground Vehicle Systems Center. The cyber attack also exploits the vulnerability of the Robot Operating System (ROS) employed in its onboard computer. We collect experimental data and train our CNN based on two different operating conditions, namely, legitimate and malicious conditions. We normalize and convert the network traffic data in the form of RGB or grayscale images. We introduce two different types of windowing techniques, namely, the independent and overlapping sliding epochs to efficiently feed the network traffic data to our CNN system. Our research indicates the efficacy of the proposed algorithm as our proposed cyber intrusion detection system can achieve reasonably high accuracy of <inline-formula><tex-math notation="LaTeX">$\geq 99$</tex-math></inline-formula> &#x0025; and substantially small false-positive rates <inline-formula><tex-math notation="LaTeX">$\leq$</tex-math></inline-formula> 2 &#x0025; supported with minimum detection time. In addition, we also compare and demonstrate the relative merits of our proposed algorithm with respect to the performance of some well-known techniques, namely, &#x2018;bag-of-features&#x2019; and Support Vector Machine (SVM) algorithms.
Original languageEnglish
Pages (from-to)2273-2284
Number of pages12
JournalIEEE Transactions on Dependable and Secure Computing
Volume21
Issue number4
Early online date07 Aug 2023
DOIs
Publication statusPublished - 2024

Fingerprint

Dive into the research topics of 'Trusted operations of a military ground robot in the face of man-in-the-middle cyber-attacks using deep learning convolutional neural networks: Real-time experimental outcomes'. Together they form a unique fingerprint.

Cite this