About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Security and Privacy in Communication Networks. 19th EAI International Conference, SecureComm 2023, Hong Kong, China, October 19-21, 2023, Proceedings, Part II

Research Article

The Security Analysis of ROS2 Communication

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-031-64954-7_7,
        author={Shuo Yang and Hongru Li and Jian Guo},
        title={The Security Analysis of ROS2 Communication},
        proceedings={Security and Privacy in Communication Networks. 19th EAI International Conference, SecureComm 2023, Hong Kong, China, October 19-21, 2023, Proceedings, Part II},
        proceedings_a={SECURECOMM PART 2},
        year={2024},
        month={10},
        keywords={ROS2 communication security CIA formal model},
        doi={10.1007/978-3-031-64954-7_7}
    }
    
  • Shuo Yang
    Hongru Li
    Jian Guo
    Year: 2024
    The Security Analysis of ROS2 Communication
    SECURECOMM PART 2
    Springer
    DOI: 10.1007/978-3-031-64954-7_7
Shuo Yang1, Hongru Li2, Jian Guo3,*
  • 1: MoE Engineering Research Center for Software/Hardware Co-design Technology and Application
  • 2: Shanghai Trusted Industry Internet Software Collaborative Innovation Center
  • 3: Xinjiang Teacher’s College and National Trusted Embedded Software Engineering Technology Research Center
*Contact email: jguo@sei.ecnu.edu.cn

Abstract

With the increasing use of robots in various fields, the importance of communication security between robots and their components has become a pressing concern. As the primary development framework for robot applications, ROS2 is replacing ROS1 at a rapid pace, and its security issues have direct implications for the security of robot systems. This paper presents an exploration and study of the communication security issues of ROS2 by combining CIA triad with the ROS2 communication mechanism. We propose the fundamental security requirements of the ROS2 system under different communication mechanisms and provide formal modeling and definition. Moreover, we classify and analyze network attacks at the ROS2 level and implement a tool, ROS2Tester, to conduct modeling the ROS2 formal security modules, penetration testing and evaluating the security of ROS2 systems.

Keywords
ROS2 communication security CIA formal model
Published
2024-10-15
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-031-64954-7_7
Copyright © 2023–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL