[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1007/978-3-030-00308-1_12guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Secured Offline Authentication on Industrial Mobile Robots Using Biometric Data

Published: 27 July 2017 Publication History

Abstract

The increased usage of mobile robots in the industrial context entails higher safety risks for employees on the production floor. To enable safety, the usage of security concepts on industrial mobile robots is essential. One step towards security is authentication that is necessary to prevent unauthorized people from manipulating an industrial mobile robot’s software or configuration. Traditional authentication schemes that utilize username and password are not feasible for industrial mobile robots as either (a) a remote connection would be necessary to check the credentials or (b) the credentials need to be checked locally on the robot. Remote connections are problematic due to connectivity problems similar to them at RoboCup Logistics League competitions. If the credentials need to be checked on the robot, the usernames and passwords of all authorized people need to be stored and maintained there. As both possibilities are not feasible for industrial mobile robots, we propose an offline authentication approach that uses biometric data to authenticate a user on a mobile robot. The approach uses expiring passwords and a smart card to authenticate authorized people on the mobile robot. The smart card is equipped with a fingerprint reader to check that only authorized people are allowed to authenticate at a mobile robot. To show that the approach is able to provide secured authentication, a threat analysis is performed.

References

[1]
Adi, W.: Mechatronic security and robot authentication. In: 2009 Symposium on Bio-inspired Learning and Intelligent Systems for Security, pp. 77–82. IEEE (2009)
[2]
Bauernhansl T, Ten Hompel M, and Vogel-Heuser B Industrie 4.0 in Produktion, Automatisierung und Logistik: Anwendung Technologien Migration 2014 Heidelberg Springer
[3]
Clancy, T.C., Kiyavash, N., Lin, D.J.: Secure smartcardbased fingerprint authentication. In: Proceedings of the 2003 ACM SIGMM Workshop on Biometrics Methods and Applications WBMA 2003, pp. 45–52. ACM (2003)
[4]
Gilbert H and Handschuh H Matsui M and Zuccherato RJ Security analysis of SHA-256 and sisters Selected Areas in Cryptography 2004 Heidelberg Springer 175-193
[5]
Grieco LA et al. IoT-aided robotics applications: technological implications, target domains and open issues Comput. Commun. 2014 54 32-47
[6]
Haller, N.: The S/KEY one-time password system. In: Proceedings of the Internet Society Symposium on Network and Distributed Systems (1994)
[7]
Jin ATB, Ling DNC, and Goh A Biohashing: two factor authentication featuring fingerprint data and tokenised random number Pattern Recogn. 2004 37 11 2245-2255
[8]
Kim D, Lee J, Yoon HS, and Cha EY A non-cooperative user authentication system in robot environments IEEE Trans. Consum. Electron. 2007 53 2 804-811
[9]
Kim J, Kim GS, and Eom YI Zhang J, He J-H, and Fu Y Lightweight mobile agent authentication scheme for home network environments Computational and Information Science 2004 Heidelberg Springer 853-859
[10]
Kinney SL Trusted Platform Module Basics: Using TPM in Embedded Systems 2006 Amsterdam Newnes
[11]
Li CT and Hwang MS An efficient biometrics-based remote user authentication scheme using smart cards J. Netw. Comput. Appl. 2010 33 1 1-5
[12]
Line, M.B., Nordland, O., Røstad, L., Tøndel, I.A.: Safety vs security? In: Proceedings of the 8th International Conference on Probabilistic Safety Assessment and Management (PSAM 2006), New Orleans, USA (2006)
[13]
M’Raihi, D., Bellare, M., Hoornaert, F., Naccache, D., Ranen, O.: HOTP: an HMAC-based one-time password algorithm. Technical report, RFC4226 (2005)
[14]
M’Raihi, D., Machani, S., Pei, M., Rydell, J.: TOTP: time-based one-time password algorithm. Technical report, RFC6238 (2011)
[15]
Myagmar, S., Lee, A.J., Yurcik, W.: Threat modeling as a basis for security requirements. In: Symposium on Requirements Engineering for Information Security (SREIS), vol. 2005, pp. 1–8. Citeseer (2005)
[16]
Niemueller T, Ewert D, Reuter S, Ferrein A, Jeschke S, and Lakemeyer G Jeschke S, Isenhardt I, Hees F, and Henning K RoboCup Logistics league sponsored by festo: a competitive factory automation testbed Automation, Communication and Cybernetics in Science and Engineering 2015/2016 2016 Cham Springer 605-618
[17]
Rajkumar, R.R., Lee, I., Sha, L., Stankovic, J.: Cyber-physical systems: the next computing revolution. In: Proceedings of the 47th Design Automation Conference, pp. 731–736. ACM (2010)
[18]
Schneider, S., et al.: Design and development of a benchmarking testbed for the factory of the future. In: 2015 IEEE 20th Conference on Emerging Technologies & Factory Automation (ETFA), pp. 1–7. IEEE (2015)
[19]
Schwab K The Fourth Industrial Revolution 2017 London Penguin
[20]
Sutcu, Y., Sencar, H.T., Memon, N.: A secure biometric authentication scheme based on robust hashing. In: Proceedings of the 7th Workshop on Multimedia and Security, MM#38; Sec 2005, pp. 111–116. ACM (2005)
[21]
Tuyls P, Akkermans AHM, Kevenaar TAM, Schrijen G-J, Bazen AM, and Veldhuis RNJ Kanade T, Jain A, and Ratha NK Practical biometric authentication with template protection Audio- and Video-Based Biometric Person Authentication 2005 Heidelberg Springer 436-446
[22]
Zuehlke D SmartFactory - towards a factory-of-things Ann. Rev. Control 2010 34 1 129-138

Index Terms

  1. Secured Offline Authentication on Industrial Mobile Robots Using Biometric Data
      Index terms have been assigned to the content through auto-classification.

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image Guide Proceedings
      RoboCup 2017: Robot World Cup XXI
      Jul 2017
      508 pages
      ISBN:978-3-030-00307-4
      DOI:10.1007/978-3-030-00308-1
      • Editors:
      • Hidehisa Akiyama,
      • Oliver Obst,
      • Claude Sammut,
      • Flavio Tonidandel

      Publisher

      Springer-Verlag

      Berlin, Heidelberg

      Publication History

      Published: 27 July 2017

      Qualifiers

      • Article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • 0
        Total Citations
      • 0
        Total Downloads
      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 30 Jan 2025

      Other Metrics

      Citations

      View Options

      View options

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media