An Observer-Based Key Agreement Scheme for Remotely Controlled Mobile Robots

Amir Mohammad Naseri,Walter Lucia,Amr Youssef
2023-10-24
Abstract:Remotely controlled mobile robots are important examples of Cyber-Physical Systems (CPSs). Recently, these robots are being deployed in many safety critical applications. Therefore, ensuring their cyber-security is of paramount importance. Different control schemes that have been proposed to secure such systems against sophisticated cyber-attacks require the exchange of secret messages between their smart actuators and the remote controller. Thus, these schemes require pre-shared secret keys, or an established Public Key Infrastructure (PKI) that allows for key agreement. Such cryptographic approaches might not always be suitable for the deployment environments of such remotely mobile robots. To address this problem, in this paper, we consider a control theoretic approach for establishing a secret key between the remotely controlled robot and the networked controller without resorting to traditional cryptographic techniques. Our key agreement scheme leverages a nonlinear unknown input observer and an error correction code mechanism to allow the robot to securely agree on a secret key with its remote controller. To validate the proposed scheme, we implement it using a Khepera-IV differential drive robot and evaluate its efficiency and the additional control cost acquired by it. Our experimental results confirm the effectiveness of the proposed key establishment scheme.
Systems and Control,Cryptography and Security,Robotics
What problem does this paper attempt to address?
The paper aims to address the key agreement problem for remotely controlled mobile robots without relying on traditional encryption techniques. Specifically, the paper proposes a method based on a nonlinear Unknown Input Observer (UIO) and error-correcting code mechanism, enabling the remotely controlled robot and its network controller to securely establish a shared key over an insecure communication channel. This method leverages the difference in the level of understanding of the robot model between the controller and the attacker, thereby ensuring the secure exchange of keys. Additionally, the experimental section validates the effectiveness and additional control costs of the proposed scheme. Through implementation and evaluation on the Khepera-IV differential drive robot, the effectiveness of the proposed key establishment scheme is demonstrated.