Next Article in Journal
The Cybersecurity Focus Area Maturity (CYSFAM) Model
Previous Article in Journal
Password Similarity Using Probabilistic Data Structures
Open AccessFeature PaperArticle

A Cryptography-Powered Infrastructure to Ensure the Integrity of Robot Workflows

1
JOANNEUM RESEARCH-Institute for Robotics and Mechatronics, 9020 Klagenfurt, Austria
2
Alpen-Adria-Universität Klagenfurt-Software Engineering Research Group, University of Klagenfurt, 9020 Klagenfurt, Austria
3
Alpen-Adria-Universität Klagenfurt-System Security Research Group, University of Klagenfurt, 9020 Klagenfurt, Austria
*
Author to whom correspondence should be addressed.
J. Cybersecur. Priv. 2021, 1(1), 93-118; https://doi.org/10.3390/jcp1010006
Received: 18 December 2020 / Revised: 8 January 2021 / Accepted: 12 January 2021 / Published: 14 January 2021
(This article belongs to the Section Security Engineering & Applications)
With the growing popularity of robots, the development of robot applications is subject to an ever increasing number of additional requirements from e.g., safety, legal and ethical sides. The certification of an application for compliance to such requirements is an essential step in the development of a robot program. However, at this point in time it must be ensured that the integrity of this program is preserved meaning that no intentional or unintentional modifications happen to the program until the robot executes it. Based on the abstraction of robot programs as workflows we present in this work a cryptography-powered distributed infrastructure for the preservation of robot workflows. A client composes a robot program and once it is accepted a separate entity provides a digital signature for the workflow and its parameters which can be verified by the robot before executing it. We demonstrate a real-world implementation of this infrastructure using a mobile manipulator and its software stack. We also provide an outlook on the integration of this work into our larger undertaking to provide a distributed ledger-based compliant robot application development environment. View Full-Text
Keywords: robotics; program integrity; robot programming; security; cryptographic infrastructure; compliance robotics; program integrity; robot programming; security; cryptographic infrastructure; compliance
Show Figures

Figure 1

MDPI and ACS Style

Breiling, B.; Dieber, B.; Pinzger, M.; Rass, S. A Cryptography-Powered Infrastructure to Ensure the Integrity of Robot Workflows. J. Cybersecur. Priv. 2021, 1, 93-118. https://doi.org/10.3390/jcp1010006

AMA Style

Breiling B, Dieber B, Pinzger M, Rass S. A Cryptography-Powered Infrastructure to Ensure the Integrity of Robot Workflows. Journal of Cybersecurity and Privacy. 2021; 1(1):93-118. https://doi.org/10.3390/jcp1010006

Chicago/Turabian Style

Breiling, Benjamin; Dieber, Bernhard; Pinzger, Martin; Rass, Stefan. 2021. "A Cryptography-Powered Infrastructure to Ensure the Integrity of Robot Workflows" J. Cybersecur. Priv. 1, no. 1: 93-118. https://doi.org/10.3390/jcp1010006

Find Other Styles

Article Access Map by Country/Region

1
Back to TopTop