Deep Learning-based Attack Detector for Bilateral Teleoperation Systems

(1) Yousif Ahmed Al-Wajih Mail (King Fahd University of Petroleum and Minerals, Saudi Arabia)
(2) Mutaz M. Hamdan Mail (National University College of Technology, Jordan)
(3) Turki Bin Mohaya Mail (King Fahd University of Petroleum and Minerals, Saudi Arabia)
(4) * Magdi S. Mahmoud Mail (King Fahd University of Petroleum and Minerals, Saudi Arabia)
(5) Nezar M. Al-Yazidi Mail (King Fahd University of Petroleum and Minerals, Saudi Arabia)
*corresponding author

Abstract


A teleoperation system is referred to as a plant that is controlled remotely, and it is often composed of a human operator, a local master manipulator, and a remote slave manipulator, all connected by a communication network. Bilateral teleoperation systems (BTOS) include transmissions in both the forward and backward directions between the master and slave. This paper discusses a class of (BTOS) focusing on the security of the system after modeling the master and slave robots mathematically. The false data injection attack is examined, where the attacker may inject false data into the states that are being exchanged between the master and slave robots. The vulnerability of BTOS, where the attack destabilizes the system, is presented. A deep learning-based detection technique is proposed to detect the presence of false data injection attacks. The deep learning model with convolution neural network structure is trained and tested with considering complex attacks where the attacker has full knowledge of the system and proficiency to emanate and control the target system. The proposed model achieves 96\% validation accuracy, and the efficacy of the proposed deep learning detector is demonstrated and tested into the BTOS.

   

DOI

https://doi.org/10.31763/ijrcs.v3i1.822
      

Article metrics

10.31763/ijrcs.v3i1.822 Abstract views : 1225 | PDF views : 392

   

Cite

   

Full Text

Download

References


[1] W. Wei and Y. Kui, “Teleoperated manipulator for leak detection of sealed radioactive sources,” in IEEE International Conference on Robotics and Automation, pp. 1682–1687, 2004, https://doi.org/10.1109/ROBOT.2004.1308066.

[2] W.-K. Yoon, T. Goshozono, H. Kawabe, M. Kinami, Y. Tsumaki, M. Uchiyama, M. Oda, and T. Doi, “Model-based space robot teleoperation of ets-vii manipulator,” IEEE Transactions on Robotics and Automation, vol. 20, no. 3, pp. 602–612, 2004, https://doi.org/10.1109/TRA.2004.824700.

[3] J. Funda and R. P. Paul, “A symbolic teleoperator interface for time-delayed underwater robot manipulation,” in OCEANS 91 Proceedings, pp. 1526–1533, 1991, https://doi.org/10.1109/OCEANS.1991.606520.

[4] S. Kumar and J. Marescaux, Telesurgery. Springer Science & Business Media, 2008, https://books.google.co.id/books?id=F_R_u_0vUSUC&hl=en.

[5] S. Kimura, T. Nozaki, and T. Murakami, “Admittance control-based bilateral control system considering position error,” in 2021 IEEE International Conference on Mechatronics (ICM), pp. 1–6, 2021, https://doi.org/10.1109/ICM46511.2021.9385683.

[6] P. F. Hokayem and M. W. Spong, “Bilateral teleoperation: An historical survey,” Automatica, vol. 42, no. 12, pp. 2035–2057, 2006, https://doi.org/10.1016/j.automatica.2006.06.027.

[7] D. Lee and M. W. Spong, “Passive bilateral teleoperation with constant time delay,” IEEE transactions on robotics, vol. 22, no. 2, pp. 269–281, 2006, https://doi.org/10.1109/TRO.2005.862037.

[8] N. Chopra, M. W. Spong, and R. Lozano, “Synchronization of bilateral teleoperators with time delay,” Automatica, vol. 44, no. 8, pp. 2142–2148, 2008, https://doi.org/10.1016/j.automatica.2007.12.002.

[9] E. Nuno, L. Basanez, R. Ortega, and M. W. Spong, “Position tracking for non-linear teleoperators with variable time delay,” The International Journal of Robotics Research, vol. 28, no. 7, pp. 895–910, 2009, https://doi.org/10.1177/0278364908099461.

[10] J.-H. Ryu, J. Artigas, and C. Preusche, “A passive bilateral control scheme for a teleoperator with timevarying communication delay,” Mechatronics, vol. 20, no. 7, pp. 812–823, 2010, https://doi.org/10.1016/j.mechatronics.2010.07.006.

[11] H.-C. Hu and Y.-C. Liu, “Passivity-based control framework for task-space bilateral teleoperation with parametric uncertainty over unreliable networks,” ISA transactions, vol. 70, pp. 187–199, 2017, https://doi.org/10.1016/j.isatra.2017.07.024.

[12] N. Falliere, L. O. Murchu, and E. Chien, “W32. stuxnet dossier,” White paper, Symantec Corp., Security Response, vol. 5, no. 6, p. 29, 2011, https://www.wired.com/images_blogs/threatlevel/2010/11/w32_stuxnet_dossier.pdf.

[13] S. Amin, X. Litrico, S. Sastry, and A. M. Bayen, “Cyber security of water scada systems—part i: Analysis and experimentation of stealthy deception attacks,” IEEE Transactions on Control Systems Technology, vol. 21, no. 5, pp. 1963–1970, 2012, https://doi.org/10.1109/TCST.2012.2211873.

[14] S. Gorman, “Electricity grid in us penetrated by spies,” The wall street journal, vol. 8, 2009, https://www.wsj.com/articles/SB123914805204099085.

[15] K. McKay, L. Bassham, M. Sonmez Turan, and N. Mouha, “Report on lightweight cryptography,” tech. rep., National Institute of Standards and Technology, 2016, https://csrc.nist.gov/CSRC/media/Publications/nistir/8114/draft/documents/nistir_8114_draft.pdf.

[16] H. Sandberg, S. Amin, and K. H. Johansson, “Cyberphysical security in networked control systems: An introduction to the issue,” IEEE Control Systems Magazine, vol. 35, no. 1, pp. 20–23, 2015, https://doi.org/10.1109/MCS.2014.2364708.

[17] F. Pasqualetti, F. Dorfler, and F. Bullo, “Control-theoretic methods for cyberphysical security: Geometric principles for optimal cross-layer resilient control systems,” IEEE Control Systems Magazine, vol. 35, no. 1, pp. 110–127, 2015, https://doi.org/10.1109/MCS.2014.2364725.

[18] E. Eyisi and X. Koutsoukos, “Energy-based attack detection in networked control systems,” in Proceedings of the 3rd international conference on High confidence networked systems, pp. 115–124, 2014, https://doi.org/10.1145/2566468.2566472.

[19] M. M. Hamdan and M. S. Mahmoud, “Control of teleoperation systems in the presence of cyber attacks: A survey,” IAES International Journal of Robotics and Automation, vol. 10, no. 3, p. 235, 2021, http://doi.org/10.11591/ijra.v10i3.pp235-260.

[20] C. Cai, Y. Zhang, and Q. Chen, “Adaptive control of bilateral teleoperation systems with false data injection attacks and attacks detection,” in 2022 41st Chinese Control Conference (CCC), pp. 4407–4412, 2022, https://doi.org/10.23919/CCC55666.2022.9902043.

[21] E. A. Lee, “Cyber physical systems: Design challenges,” in 2008 11th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC), pp. 363–369, 2008, https://doi.org/10.1109/ISORC.2008.25.

[22] M. M. Hamdan and M. M. Mahmoud, “Analysis and challenges in wireless networked control system: A survey,” International Journal of Robotics and Control Systems, vol. 2, no. 3, pp. 492–522, 2022, https://doi.org/10.31763/ijrcs.v2i3.731.

[23] K.-D. Kim and P. Kumar, “An overview and some challenges in cyber-physical systems,” Journal of the Indian Institute of Science, vol. 93, no. 3, pp. 341–352, 2013, http://journal.library.iisc.ernet.in/index.php/iisc/article/view/1693.

[24] M. S. Mahmoud, M. M. Hamdan, and U. A. Baroudi, “Modeling and control of cyber-physical systems subject to cyber attacks: a survey of recent advances and challenges,” Neurocomputing, vol. 338, pp. 101–115, 2019, https://doi.org/10.1016/j.neucom.2019.01.099.

[25] M. S. Mahmoud and M. Maaruf, “Prescribed performance output feedback synchronisation control of bilateral teleoperation system with actuator nonlinearities,” International Journal of Systems Science, pp. 1–13, 2021, https://doi.org/10.1080/00207721.2021.1921308.

[26] J. F. Yonan, “An examination of the secure chaos of 5g wireless communication based on the intelligent internet of things,” International Journal of Robotics and Control Systems, vol. 2, no. 4, pp. 618–627, 2022, https://doi.org/10.31763/ijrcs.v2i4.769.

[27] M. Marvi, A. Arfeen, and R. Uddin, “A generalized machine learning-based model for the detection of ddos attacks,” International Journal of Network Management, vol. 31, no. 6, p. e2152, 2021, https://doi.org/10.1002/nem.2152.

[28] L. Hu, K. Wang, D. Hu, and Y. Wang, “Mode-dependent switching control of bilateral teleoperation against random denial-of-service attacks,” IET Cyber-Physical Systems: Theory & Applications, vol. 7, no. 1, pp. 16–29, 2022, https://doi.org/10.1049/cps2.12015.

[29] J. Yan, K. Huang, K. Lindgren, T. Bonaci, and H. J. Chizeck, “Continuous operator authentication for teleoperated systems using hidden markov models,” ACM Transactions on Cyber-Physical Systems (TCPS), vol. 6, no. 1, pp. 1–25, 2022, https://doi.org/10.1145/3488901.

[30] J. Slay and M. Miller, “Lessons learned from the maroochy water breach,” in International conference on critical infrastructure protection, pp. 73–82, 2007, https://doi.org/10.1007/978-0-387-75462-8_6.

[31] R. Esposito, “Hackers penetrate water system computers,” ABC News, Nov, vol. 1, 2006.

[32] A. Greenberg, “Hackers cut cities’ power,” Forbes, January, 2008, https://www.forbes.com/2008/01/18/cyber-attack-utilities-tech-intel-cx_ag_0118attack.html.

[33] J. Leyden, “Polish teen derails tram after hacking train network,” The Register, vol. 11, 2008, https://www.theregister.com/2008/01/11/tram_hack/.

[34] S. E. Schechter, J. Jung, and A. W. Berger, “Fast detection of scanning worm infections,” in International Workshop on Recent Advances in Intrusion Detection, pp. 59–81, 2004, https://doi.org/10.1007/978-3-540-30143-1_4.

[35] M. W. Spong, S. Hutchinson, and M. Vidyasagar, Robot modeling and control. John Wiley & Sons, 2020, https://books.google.co.id/books?id=DdjNDwAAQBAJ&hl=en.

[36] N. Srivastava, G. Hinton, A. Krizhevsky, I. Sutskever, and R. Salakhutdinov, “Dropout: a simple way to prevent neural networks from overfitting,” The journal of machine learning research, vol. 15, no. 1, pp. 1929–1958, 2014, https://jmlr.org/papers/volume15/srivastava14a/srivastava14a.pdf.

[37] T. Hatanaka, N. Chopra, M. Fujita, and M. W. Spong, Passivity-based control and estimation in networked robotics. Springer Cham, 2015, https://doi.org/10.1007/978-3-319-15171-7.

[38] Y. Dong, N. Gupta, and N. Chopra, “False data injection attacks in bilateral teleoperation systems,” IEEE Transactions on Control Systems Technology, vol. 28, no. 3, pp. 1168–1176, 2019, https://doi.org/10.1109/TCST.2019.2903446.

[39] S. Ioffe and C. Szegedy, “Batch normalization: Accelerating deep network training by reducing internal covariate shift,” arXiv preprint arXiv:1502.03167, 2015, https://doi.org/10.48550/arXiv.1502.03167.

[40] B. Xu, N. Wang, T. Chen, and M. Li, “Empirical evaluation of rectified activations in convolutional network,” arXiv preprint arXiv:1505.00853, 2015, https://doi.org/10.48550/arXiv.1505.00853.

[41] D. P. Kingma and J. Ba, “Adam: A method for stochastic optimization,” arXiv preprint arXiv:1412.6980, 2014, https://doi.org/10.48550/arXiv.1412.6980.

[42] A.-N. Sharkawy, “Principle of neural network and its main types,” Journal of Advances in Applied & Computational Mathematics, vol. 7, pp. 8–19, 2020, https://doi.org/10.15377/2409-5761.2020.07.2.

[43] Y. Dong, N. Gupta, and N. Chopra, “On content modification attacks in bilateral teleoperation systems,” in 2016 American Control Conference (ACC), pp. 316–321, 2016, https://doi.org/10.1109/ACC.2016.7524934.


Refbacks

  • There are currently no refbacks.


Copyright (c) 2022 Yousif Ahmed Al-Wajih, Mutaz M. Hamdan, Turki Bin Mohaya, MagdiSadek Mostafa Mahmoud, Nezar M. Al-Yazidi

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

 


About the JournalJournal PoliciesAuthor Information

International Journal of Robotics and Control Systems
e-ISSN: 2775-2658
Website: https://pubs2.ascee.org/index.php/IJRCS
Email: ijrcs@ascee.org
Organized by: Association for Scientific Computing Electronics and Engineering (ASCEE)Peneliti Teknologi Teknik IndonesiaDepartment of Electrical Engineering, Universitas Ahmad Dahlan and Kuliah Teknik Elektro
Published by: Association for Scientific Computing Electronics and Engineering (ASCEE)
Office: Jalan Janti, Karangjambe 130B, Banguntapan, Bantul, Daerah Istimewa Yogyakarta, Indonesia