Information Security Lab. COMPETITIVE FUNDS KAGAKU FOUNDATION A 2016-2018

KAGAKU FOUNDATION A 2016-2018

Realization of secure and reliable communication in a remote control type / autonomous mobile system in the IoT era

Research Director

Yoshiyuki Nogami (Graduate School of Natural Sciences, Okayama University)

Research Participant

  • Satoshi Uehara (Graduate School of International Environmental Engineering, Kitakyushu City University)
  • Toru Nakanishi (Graduate School of Engineering, Hiroshima University)
  • Takuya Kishida (Okayama University Graduate School of Natural Science graduate School)
  • Hiroto Kagotani (Okayama University graduate School of Science and Technology)
  • Iokibe Kengo (Okayama University graduate School of Science and Technology)
  • Kamegawa Satoshi (Okayama University graduate School of Science and Technology)
  • Shoichi Maeyama (Okayama University graduate School of Science and Technology)
  • Shunsuke Araki (Kyushu Institute of Technology Graduate School of Information Technology Laboratory)

Research purpose

Extremely advanced “remote control type / autonomous mobile system” is realized by coordinating location information by GPS, image information by a small camera, and various sensor information such as automated driving of cars and remote operation by the medical robot is there. On the other hand, the reliability and safety of data communication for controlling them are secondary, since the real-time behavior of operation is given top priority. However, new security threats such as rush into the IoT era and side-channel attacks do not allow this and require high reliability and high security against such control/data communication. On the other hand, in this research, we introduce various security, high reliability, and attack methods using concrete robots and others, demonstrate experiments to what extent they affect real-time performance, determine the trade-off Consider optimal realization.

Academic background of this research

Entry into the IoT (Internet of Things) era is similar to the Internet creation period, leaving behind the “premise that must never be forgotten” enclosed by the word security, the convenience that seems to be infinite now It is exactly big and it is trying to develop rapidly. Controlling the site is a compact and poor terminal device with limited computing resources, and they exchange data autonomously with each other without human intervention. Important data typified by “money” has been protected while evolving its form, such as zoning in ethernet technology or recent control systems, from a form like a bank dedicated line in the past. However, the development of ICT society, which does not know where to stay, requires the exchange of important data to such poor equipment regardless of wired, wireless, dedicated line, online or offline. Under such circumstances, not only the modern ICT security measures that become complicated to see and clear the gap, the threat of the physical decryption attack represented by the recent “side channel attack” is the information protector in the ICT society “Itachi Koko” between attacking plans that try to decipher illegally, “Overwhelmingly aggressive hands dominate the situation” is being created.

On the other hand, the trend of the times is the realization of “extremely advanced remote control type/autonomous mobile system” typified by robotic remote operation and automobile driving <a I = 8> in the field of view. For example, at Okayama University, we are developing a surgical system while observing CT images in real time, and operate the robot by remotely manipulating the robot to prevent exposure of doctors (practitioners). Alternatively, in automatic operation, not only the function of automatically stopping by sensing the danger of collision as in the past, but also the operation of the car autonomously using GPS, image processing and so on. Control of these signals is carried out by connecting a number of compact devices called ECU (Electronic Control Unit) like an in-vehicle network CAN (Controller Area Network), and in an environment where these devices autonomously operate, Instantaneous human operation does not reach, sometimes leaving to the ECU the operation related to human life and death. In response to such a situation, the “situation where the overwhelming aggressor dominates” as described above is not permitted. A movie that auto-driving is illegally controlled from the outside and jumps out to the shoulder is a hot topic. Alternatively, if sensors, control data and the like flowing in such a network can be acquired without being “as is”, it is possible for not only the know-how accumulated by the manufacturers to spend a lot of time and expense flowing out but also It will give ” extremely dangerous hint” to a malicious attacker who plots cracks.

The present study, such remote-operated, autonomous mobile system contrast, the sensor secure and reliable communication processing of the control data and, autonomous driving also with a view to balancing control processing that does not impair the real-time < A.

Figure: R&D target image