Full Content is available to subscribers

Subscribe/Learn More  >
Proceedings Article

UGV: security analysis of subsystem control network

[+] Author Affiliations
Sam Abbott-McCune, Philip Kobezak, Joseph Tront, Randy Marchany, Al Wicks

Virginia Polytechnic Institute and State Univ. (United States)

Proc. SPIE 8741, Unmanned Systems Technology XV, 87410Z (May 17, 2013); doi:10.1117/12.2016314
Text Size: A A A
From Conference Volume 8741

  • Unmanned Systems Technology XV
  • Robert E. Karlsen; Douglas W. Gage; Charles M. Shoemaker; Grant R. Gerhart
  • Baltimore, Maryland, USA | April 29, 2013

abstract

Unmanned Ground vehicles (UGVs) are becoming prolific in the heterogeneous superset of robotic platforms. The sensors which provide odometry, localization, perception, and vehicle diagnostics are fused to give the robotic platform a sense of the environment it is traversing. The automotive industry CAN bus has dominated the industry due to the fault tolerance and the message structure allowing high priority messages to reach the desired node in a real time environment. UGVs are being researched and produced at an accelerated rate to preform arduous, repetitive, and dangerous missions that are associated with a military action in a protracted conflict. The technology and applications of the research will inevitably be turned into dual-use platforms to aid civil agencies in the performance of their various operations. Our motivation is security of the holistic system; however as subsystems are outsourced in the design, the overall security of the system may be diminished. We will focus on the CAN bus topology and the vulnerabilities introduced in UGVs and recognizable security vulnerabilities that are inherent in the communications architecture. We will show how data can be extracted from an add-on CAN bus that can be customized to monitor subsystems. The information can be altered or spoofed to force the vehicle to exhibit unwanted actions or render the UGV unusable for the designed mission. The military relies heavily on technology to maintain information dominance, and the security of the information introduced onto the network by UGVs must be safeguarded from vulnerabilities that can be exploited. © (2013) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Citation

Sam Abbott-McCune ; Philip Kobezak ; Joseph Tront ; Randy Marchany and Al Wicks
" UGV: security analysis of subsystem control network ", Proc. SPIE 8741, Unmanned Systems Technology XV, 87410Z (May 17, 2013); doi:10.1117/12.2016314; http://dx.doi.org/10.1117/12.2016314


Access This Proceeding
Sign in or Create a personal account to Buy this proceeding ($15 for members, $18 for non-members).

Figures

Tables

NOTE:
Citing articles are presented as examples only. In non-demo SCM6 implementation, integration with CrossRef’s "Cited By" API will populate this tab (http://www.crossref.org/citedby.html).

Some tools below are only available to our subscribers or users with an online account.

Related Content

Customize your page view by dragging & repositioning the boxes below.

Related Book Chapters

Topic Collections

Advertisement
  • Don't have an account?
  • Subscribe to the SPIE Digital Library
  • Create a FREE account to sign up for Digital Library content alerts and gain access to institutional subscriptions remotely.
Access This Proceeding
Sign in or Create a personal account to Buy this proceeding ($15 for members, $18 for non-members).
Access This Proceeding
Sign in or Create a personal account to Buy this article ($15 for members, $18 for non-members).
Access This Chapter

Access to SPIE eBooks is limited to subscribing institutions and is not available as part of a personal subscription. Print or electronic versions of individual SPIE books may be purchased via SPIE.org.