Acknowledgement
본 연구는 2024년 정부(방위산업체)의 재원으로 국방과학연구소의 지원을 받아 수행된 연구임 (UI2200575D)
References
- E. Garcia, M. A. Jimenez, P. G. DeSantos, and M. Armada, "The evolution of robotics research," IEEE Robotics & Automation Magazine, vol.14, no. 1, pp. 90-103, Mar. 2007.
- MQTT, "MQTT", https://mqtt.org/, 2024.06.07.
- M. Quigley, B. Gerkey, K. Conley, J. Faust T. Foote, J. Leibs, E. Berger, and R. Wheeler, "ROS: an open-source Robot Operating System," ICRA workshop on open source software, vol. 3, no. 3.2, p. 5, Jan. 2009.
- ZeroMQ, "ZeroMQ", https://zeromq.org/, 2024.06.07.
- S. Profanter, A. Tekat, K. Dorofeev, M. Rickert, and A. Knoll, "OPC UA versus ROS, DDS, and MQTT: Performance evaluation of industry 4.0 protocols," IEEE International Conference on Industrial Technology, pp. 955-962, Feb. 2019.
- E. Tsardoulias and P. Mitkas, "Robotic frameworks, architectures and middleware comparison," arXiv preprint arXiv:1711.06842, Nov. 2017.
- P. Estefo, J. Simmonds, R. Robbes, and J. Fabry, "The robot operating system: Package reuse and community dynamics," Journal of Systems and Software, vol. 151, pp. 226-242, Feb. 2019.
- J. McClean, C. Stull, C. Farrar, and D. Mascarenas, "A preliminary cyber-physical security assessment of the robot operating system (ros)," Proceedings of the SPIE - The International Society for Optical Engineering, vol. 8741, pp. 341-348, May. 2013.
- B. Dieber, B. Breiling, S. Taurer, S. Kacianka, S. Rass, and P. Schartner, "Security for the robot operating system," Robotics and Autonomous Systems, vol. 98, pp. 192-203, Oct. 2017.
- B. Dieber, R. White, S. Taurer, B. Breiling, G. Caiazza, H. Christensen, and A. Cortesi, "Penetration testing ROS," Robot Operating System(ROS)The Complete Reference (Volume4),pp. 183-225, Jun. 2020.
- R. White, D. H. I. Christensen, andD. M. Quigley, "SROS: Securing ROS over the wire, in the graph, and through the kernel," arXiv preprintarXiv:1611.07060, Nov. 2016.
- N. Goerke, D. Timmermann, and I. Baumgart, "Who controls your robot? an evaluation of ros security mechanisms," In 2021 7th International conference on auto-mation, robotics and applications (ICARA), pp. 60-66, Feb. 2021.
- S. Lagraa, M. Cailac, S. Rivera, F. Beck, and R. State, "Real-time attack detection on robot cameras: A self-driving car application," In 2019 Third IEEE International Conference on Robotic Computing (IRC), pp.102-109, Feb. 2019.
- R. A. Antunes, B. L. Dalmazo, and P. L. J. Drews, "Detecting data injection attacks in ROS systems using machine learning," In 2022 Latin American Robotics Symposium (LARS), 2022 Brazilian Symposium on Robotics (SBR), and 2022 Workshop on Robotics in Education (WRE), pp.1-6, Oct. 2022.
- E. Degirmenci, Y. S. Kirca, I. Ozcelik, and A. Yazici, "ROSIDS23: Network intrusion detection dataset for robot operating system," Data in Brief, vol. 51, p. 109739, Nov. 2023.
- I. F. Kilincer, F. Ertam, and A. Sengur, "Machine learning methods for cyber security intrusion detection: Datasets and comparative study," Computer Networks, vol. 188, Feb. 2021.
- S. Rajapaksha, G. Madzudzo, H. Kalutarage, A. Petrovski, and M. O. Al-Kadri, "CAN-MIRGU: A comprehensive CAN bus attack dataset from moving vehicles for intrusion detection system evaluation," In Network and Distributed Systems Security (NDSS) Symposium, Feb. 2024.
- GitHub, "ROS2", https://github.com/ros2, 2024.06.07.
- ROS Metrics, "ROS Metrics", https://metrics.ros.org/rosdistro_rosdistro.html, 2024.06.07.
- V. Mayoral-Vilches, M. Pinzger, S. Rass, B. Dieber, and E. Gil-Uriarte, "Can ros be used securely in industry? red teaming ros-industrial," arXiv preprint arXiv:2009.08211, Sep. 2020.
- GitHub, "CICFlowMeter", https://github.com/ahlashkari/CICFlowMeter, 2024.06.07
- ROS Wiki, "ROS Shutdown", https://wiki.ros.org/rospy/Overview/Initialization%20and%20Shutdown, 2024.06.07.
- Ouster, "VLP-16 User Manual", https://velodynelidar.com/wp-content/uploads/2019/12/63-9243-Rev-E-VLP-16-User-Manual.pdf, 2024.06.07.
- D. Moore, C. Shannon, D. J. Brown, G. M. Voelker, and S. Savage, "Inferring internet denial-of-service activity," vol. 24, no. 2, pp. 115-139, ACM Transactions on Computer Systems (TOCS), May. 2006.