Preprint Article Version 1 Preserved in Portico This version is not peer-reviewed

ROS2 Communication Security Vulnerability Detection Based on Formal Method

Version 1 : Received: 1 April 2024 / Approved: 1 April 2024 / Online: 2 April 2024 (16:12:24 CEST)

How to cite: Yang, S.; Guo, J.; Rui, X. ROS2 Communication Security Vulnerability Detection Based on Formal Method. Preprints 2024, 2024040143. https://doi.org/10.20944/preprints202404.0143.v1 Yang, S.; Guo, J.; Rui, X. ROS2 Communication Security Vulnerability Detection Based on Formal Method. Preprints 2024, 2024040143. https://doi.org/10.20944/preprints202404.0143.v1

Abstract

Robotic systems have been widely used in various industries, so the security of communication between robots and their components has become an issue that needs to be focused on. As a framework for developing robotic systems, the security of ROS2 can directly affect the security of the upper-level robotic systems. Therefore, it is a worthwhile research topic to detect and analyze the security of ROS2. In this paper, we adopt a formal approach to analyze the security of the communication mechanism of ROS2. First, we use a state transition system to model the potential vulnerabilities of ROS2 based on the ROS2 communication mechanism and the basic process of penetration testing. Secondly, we introduce the CIA model on the basis of the established vulnerability model and use LTL to define its security properties. Then, we design and implement a vulnerability detection tool for ROS2 applications based on the vulnerability model and security properties. Finally, we experimentally test some ROS2-based applications, and the results show that ROS2 has vulnerabilities without additional protection safeguards.

Keywords

Robotic System; ROS2; Communication mechanisms; Security and Safety Analysis; formal method

Subject

Computer Science and Mathematics, Computer Networks and Communications

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.