Abstract

This paper presents a study about hardware attacking and clock signal vulnerability. It considers a particular type of attack on the clock signal in the I2C protocol, and proposes the design of a new sensor for detecting and defending against this type of perturbation. The analysis of the attack and the defense is validated by means of a configurable experimental platform that emulates a differential drive robot. A set of experimental results confirm the interest of the studied vulnerabilities and the efficiency of the proposed sensor in defending against this type of situation.

Highlights

  • Over the last recent years, the study of vulnerability in electronic devices has attracted the attention of the scientific community [1,2,3,4]

  • This paper aims to discuss the possibility of attacking a robotic system by interfering with the clock signal of the I2C protocol and proposes a defense strategy for this attack

  • This paper pays attention to illustrate an example of attacks on the clock signal in the I2C

Read more

Summary

Introduction

Over the last recent years, the study of vulnerability in electronic devices has attracted the attention of the scientific community [1,2,3,4]. Robotic platforms are one of the most widely used today. Robots are responsible for executing many critical tasks such as rescue, surveillance, industrial processes, and different operations in general day life [5,6,7,8]. Security analysis involves the study of the effects of voluntary actions with the aim of violating or modifying the system behaviour. These types of actions are usually known as attacks, and the weakness exploited by the attacker is known as a vulnerability

Objectives
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call