N etworking technologies for robotic applications Vibekananda Dutta Faculty of Power and Aeronautical Engineering Warsaw University of Technology 00-665 Warszawa, Poland E-mail: vibek@meil.pw.edu.pl Teresa Zielinska Institute of Aeronautics and Applied Mechanics Warsaw University of Technology 00-665 Warszawa, Poland E-mail: teresaz@meil.pw.edu.pl Abstract — The ongoing progress in networking security, together with the growing range of robot applications in many fields of everyday life, makes robotics tangible reality in our near future. Accordingly, new advanced services, depends on the interplay between the robotics and cyber security, are being an important role in robotics world. This paper addresses technological implications of security enhancement to the Internet of Thing (IoT) – aided robotics domain, where networked robots are expected to work in complex environments. The security enhancement suggested by the NIST (National Institute of Standards and Technology) creates a security template for secure communications over the network are also discussed. Keywords — Robots; Security policies; Robotic applications; Internet of Thing (IoT). I. I NTRODUCTION In the field of safety, security and IoT-aided robotic applications the number of devices involved in Machine-to- Machine (M2M) communication is expected to steadily grow in next few years. Research and applications trends are leading to the appearance of the IoT-aided robotic applications [1]. Tele-operation of mobile robots requires wireless communication, what increasingly involves multi-robot network and complex transmission of heterogeneous data. This position paper, highlights the technological implications including communication security caused by Internet cloud techniques used in robotic systems. During our recent visit, 2014 IEEE-RAS summer school and workshop on response robotics (Fig. 2 - a), we observed that IoT-aided robotics applications are growing in the cyber- real world crossing, where humans, robots and security enhancement interact in co-operative basis. The National Security Agency (NSA) has published security specification for IoT-aided robotic applications to be preciously implemented in this complex cyberphysical world. It addresses three important security features: (1) communication, (2) authentication, and (3) cyber security policy development and enforcement [2]. The main challenges in the wireless robotics, is the integration of the different intelligent capabilities in to an overall system that support all two teleoperation stages (Fig. 1) [3]. Starting from these premises, and with related to IoT-aided robotic applications, this position paper: a) envisions possible scenarios: (1) building smart, (2) pervasive, and (3) secure environments. b) highlights the need for improvising the key concepts of security, privacy, and trust. c) provides a state of the art, with particular refernce to the following features: (1) communication networks, (2) network security, and (3) robotic applications in distributive and persive environments [4]. The following sections of this paper are organized as follows: in section 2, the authors give an overview of IoT- aided robotic applications. In section 3, the authors discussed network interfacing for robotic applications. In section 4, feasibility of proposed architectures in current IoT-aided robotic applications is introduced. In section 5, wraps up the discussion. Finally, section 6, gives the conclusion. II. E NVISAGED IOT- AIDED ROBOTIC APPLICATIONS In modern world, IoT-aided robotic applications have been successfully applied in several domains, specifically in rescue robots, assisting robots, health care robots, in industrial plans and in the so called smart areas. Nevertheless, few works are carried out on the interaction between these two fields, likely, robotic applications and IoT-aided domain. However it needs more in depth investigation. Most of the modern robots platforms are equipped with rich sensory sets, complex hardware with advanced computing and communications capabilities. This, make them able to execute complex and coordinated operations. Technology that makes robots human-friendly and adaptable to different scenario is emerging in several robotic applications [5, 6, 7]. The networked and user interfaced robots, such as rescue robots, human assisting robots, health care robots and robots for military applications, have been identified by the U.S.A. National Institute of Standards and Technology (NIST) (in collaboration with Department of Homeland Security - DHS) as a class of devices in which the hardware, software, including security functions must be developed concurrently [8]. Demonstration, test, and evaluation are crucial in this area because of application of many emerging technologies, Fig. 2- b, c present’s examples of robots for technologically demanding tasks. *Corrosponding author: Nishtha Kesswani, visiting scholar Information and Decisions Sciences, Cyber Security Center California State Univer sity, San Bernardino, CA, USA E - mail: nishtha@curaj.ac.in User Specification of high - level goals triggering medium to long time autonomy; e.g., navigation and multi - robot control Telecommunications for shot - time autonomous functions; e.g., driving through doorways or passing through communication blackout areas. Stage 2: Behaviour level Stage 1: Communication level Fig. 1 . Mobile robots - two levels of information procession. Communication concern s the high level within the whole group. Behaviour (behavioural level) – mean local decision making network. Fig. 2 . IEEE - RAS workshop in Perth, Australia [9] – a. Typical examples of IoT - aided robots: our laboratory bomb disposal and rescue robot Seekur Jr [10] – b, australian bomb disposal robot, Australia [11] – c. Both robots can operate fully autonomously and perform a coordinated explo ration of the area . (a) (b) (c) III. N ETWORK INTERFACING FOR ROBOTIC APPLICATION A fundamental issues that researchers focus in the networks and interfaces domain in robotic applications, is the system integration when the components use different Machine-to-Machine (M2M) communication standards. To this direction are going several EU FP7 research projects [12], such as BETAAS and OPENIOT [13, 14] are focusing: on cloud computing techniques, on security issues, on context aware approaches, and on semantic-oriented design (another examples are RELYONIT [15], ICORE [16], IOT.EST [17], EBBITS [18], and VITRO [19]). On the other hand, with reference to IoT-aided robotic applications several important, not yet answered questions should be dealt with [20]: a) to what extent IPv6 (Internet Protocol version 6- recent), and Transport Layer Security (TLS) standard can be used to deal with complex robotic systems. b) can the semantic of data excahnge over the network be directly embedded at the Media Access Control (MAC) layer, with aims of enforcing security, privacy, and integrity. c) robotic communication systems are extremly heterogeneous, thus deserving further research on congestion avoidance, reliable routing mechanisms [21], and on efficient real- time handling of the big data amount. The secure networking, allows robots to access a huge amount of data, Transport Layer Security (TLS) is the cryptographic protocol suggested by the NIST for secure communication. TLS is put on the top of traditional protocols like e.g., TCP [22, 23]. About 2010, the term cloud robotics has been introduced [24], it is novel paradigm in robotic applications, where robots can take the advantages of the Internet network as resource for massive parallel computation and for almost real time knowledge sharing [25, 26]. In the structure of the mobile robot-Internet interface shown in Fig. 3, the robot subscribes the information from the cloud, and its sensors - including vision; deliver the information to the cloud (they are publishers). In the figure the symbols mean the following: N – Network controller / monitor, - cloud data buffers / data packages, - network controller interfaces for publishers, - network controller interfaces for subscriber, - lower layer network interfaces, - lower layer input buffers of the publishers (sensors, vision), - lower layer output buffer of the subscriber (of the robot, - higher layer output buffers of the publishers with Quality of Service (QoS) mechanisms, – higher layer input buffer of the subscriber with Quality of Service (QoS) mechanisms. The publisher / subscriber module sends the acknowledgement of status information, Quality of Service (QoS) requirement, and QoS feedback to the network monitor establishing communication between Machine-to-Machine (M2M) and Machine-to-Cloud (M2C) respectively. IV. F EASIBILTY OF PROPOSED ARCHITECTURES IN CURRENT I O T- AIDED ROBOTIC APPLICATIONS This position paper cannot conclude without addressing the important question if current technologies are mature enough to let sufficient network interfaces in robotic applications. Internet User program, *Robot Application Programming Interface (API) **Effector /command Application of client Application of server Dedicated c ommunication protocol Robot Other sensors Vision sensor Data buffer Control system Other control modules Fig. 3 . Shows the stru cture of mobile robot - Internet interface propose d using the concept proposed in [42, 28] and adapted in [31]. N Network Controller / Monitor Subscriber Module Mobile robot Publisher Module Sensory system Publisher Module Vision system (a) The internet is the data storage. In this case, the robots are clients requesting the data, and the internets are server providing it data. The data can be different types: (1) motion data, (2) maps, (3) image buffer and so on (Fig. 4-b). On other side, when the internet is the client and robot is the server is used when controlling multi robots, because all the decision and motion strategies are provided in internet cloud (Fig. 4-a). Taking into account of above, the authors presented the features of most current diffused robots (see Table. 1), trying to address this question with reference to the different scenarios. Nowadays there are several robots available in the markets designed for a wide spectrum of IoT-aided robotic applications [27, 6]. According to [29], specialized robots are classified to two categories: service robots and field robots, executing supportive task for humans (e.g., domestic, personal mobility assistance, and rescue). The International Federation of Robotics (IFR) [43] expects that nearest future will bring, a rapid development of field robots, what - due to high level of such robots complexity and autonomy will stimulate the development of new communication techniques. Table-1 proposes an outlook on the current commercialized robots belonging to both service robots and field robots categories, taking into account type, principal features, network interfacing [44], and application areas. Such information can be explicitly revealed from the references (freely downloaded from the corresponding websites). T ABLE I. R OBOTS ENABLING THE ENVISAGED I O T – AIDED ROBOTIC APPLICATIONS Type of robots Model Description Network interface Computation al Mobility Applications WiFi Ethernet Humanoid NAO [32 ] Support for human - robot interaction activities, in wide range of indoor environments. Support ing both features Medium Health care, Home REEM [33 ] Support ing b oth features + 3G (UMTS) High Health care, Home, Industrial PR2 [34 ] Support ing both features Medium Home and Research Domestic / Service Care - o - bot 3 [35 ] Assisting humans in their daily life activities and also in industrials environments . Support ing both features High Health care, Home, Industrial People B ot [36 ] Support ing both features High Home , Industrial StockBot [37 ] Only supporting WiFi features Medium Industrial Field / Ground Husky [38 ] General purpose robots for both indoor and outdoor environments. Also used for R &D section. Support ing both features High R &D, Military, Rescue Guardian [39 ] Support ing both features High R &D, Military, Rescue Pioneer 3 - AT [40 ] Support ing both features Medium R &D, Military Seekur [41 ] Support ing both features High Military, Rescue, bomb disposal Marine Kingfisher [42 ] Control marine areas. Support ing both features High Military, Rescue Internet *Motion commands *Maps *Image buffer Provi di ng data Application of server Application of client Dedicated c ommunication protocol Robot _1 requesting data Robot_2 requesting data States/r esult of movem ents (b) Fig. 4. General concept of internet architecture: communication medium between client (Internet) and se rver (Robot) – a, communication medium between server (Internet) and client (Robot) – b [46]. V. D ISCUSSION This position paper identified the challenges concerning IoT-aided robotic applications, with particular reference (Table-1) to their technological and scientific implications. Basis on the state of art the following observations, important for developing the robotic oriented Internet tools were made: a) robots are expected to act in complex scenarios (e.g., outdoor environments), the short-range communication methods, sematic-based services, information centric networking, and security problems are here significant [20]. b) the largest challenge for wireless communications over the network are the links quality, when controling by cloud many moving robots [30]. c) there is the need for protocol able to deliver messages in a secure manner within the secure network in outdoor sceanrios with user-robot interfacing, while assuring a high communication effeciency with high transmission and processing speed. Due to hazards in the networks traffic conditions, such requirements is difficult to achieve [45]. d) it is needed to investigate a secure communication in order to achieve goals in complex scenarios. Information Technology (IT) is required also the introduction of specific netwrok interfaces that cloud indentify untrusted devices with inhibit their actions within the whole system. VI. C ONCLUSION In this paper, the authors addressed challenging topics in IoT-aided robotic applications: (1) communication networks, (2) network interfacing and (3) security policies. Those problems with reference to the traditional communication networks with information centric architecture are very worth to investigate. In-addition, the redefinition of security – primitive’s represents cornerstone of the network interfacing techniques for IoT-aided robotics-world. Nevertheless, to fully exploit the potential of advanced technology in the next years, a solid effort in both protocols and applications design is required in order to make the envisioned IoT-aided robotics world a reality in the near future. \ A CKNOWLEDGMENT This work was supported by the HERITAGE project (Erasmus Mundus Action 2 Strand 1 Lot 11, EAECA/42/11) funded by the European Commission. R EFERENCES [1] M. R. Palattela, N. Accettura, X. Vilajosana, T. Watteyna, L. Grieco, G. Boggia and M. Dohler, "Standardized protocol stack for the internet of (imptotant) things," Communications Surveys & Tutorials, IEEE, vol. 15, pp. 1389 - 1406, 2013. [2] H. King and B. Hannaford, "Breaking the Interoperabitlity Barrier through Emmerging Standrads in Teleoperation, Technical Report," University of Washington, 2009. [3] J. Abouaf, "Trail by Fire; Teleoperated Robot Targes Chernobyl," IEEE Comp. Graphics Applications, vol. 18, no. 4, pp. 10 - 14, 1998. [4] V. Jacobson, D. Smetters, J. Thornton, M. Plass, N. Brihhs and R. Braynard, "Networking named content," in Proceedings of the 5th International Conference on Emerging Networking Experiments and Technologies , 2009. [5] M. Rooker and A. Brik, "Multi - Robot Exploration under the Constraints of Wireless Netwroking," Control Engineering Practice, vol. 15, no. 4, pp. 435 - 445, 2007. [6] S. O. and B. Khatib, in Springer handbook of Robotics , Springer, 2008. [7] C. Chi en, K. Kim, B. Liu and M. Gen, "Advance decision and intelligence technologies for manufacturing and logistics," J.Intell. Manufact, vol. 6, no. 23, pp. 2133 - 2135, 2012. [8] A. N., "Workshop on Future Directions in Cyberphysical Systems Security," Depar tment of Homeland Security. [9 ] http://wiki.ssrrsummerschool.org/doku.php?id=2014:h ome [10 ] http://tmr.meil.pw.edu.pl/index.php?/pol/Laboratoriu m - Robotyki/Elementy - laboratorium - badawczego - robotyki/Duzy - robot - mobilny [11 ] http://www.abc.net.au/news/2010 - 02 - 03/the - nt - police - bomb - disposal - robot - rolls - out - in/322020 [12 ] http://ec.europa.eu/research/fp7/index_en.cfm [13 ] http://www.betaas.eu/ [14 ] http://openIoT.eu/ [15 ] http://www.relyonit.eu/ [16 ] http://www.IoT - icore.eu/ [17 ] http://www.ebbits - project.eu/ [18 ] http://ict - IoTest.eu/ [19 ] http://www.future - internet.eu/activities/fp7 - projects.html [20 ] G. L.A, R. A., C. S., S. S., P. G. and P. D. Di, "IoT - aided robotics applications: Technolog ical implications, target domains and open issues," Computer Communications, vol. 54, pp. 32 - 47, 2014. [21 ] Z. L., E. D., J. V. and Z. B., "Named data netwroking (ndn) projects," NDN - 0001, 2010. [22 ] H. C.M, "Assessing the Scalability of a Multiple Robot Interface," in ACM/IEE Int'l. conf. Human - Robot Interaction (HRI'07) , New York, 2007. [23 ] C. C., E. C., F. M. and R. R., "Guidelines for the selection and use of Transport Layer Security (TLS) Impl ementations," NIST Special Publication 80 0 - 52, 2005. [24 ] K. J., "Cloud - enable robots," in IEEE - RAS International Conference on Humanoid Robotics , 2010. [25 ] G. E, "Cloud robotics: connected to the cloud, robots get smarter," IEEE spectrum. [26 ] R. Arumugam, V. Enti, L. Bingbing, W. Xiaojun, K. Baskaran, F. Kong, A. Kumar, K. Meng and G. Kit , "Davinci: a cloud computing framework for service robots," in IEEE International Conference on Robotics and Automation , 2010. [27 ] Z. L., W. K. and V. d. L. H., "Special issue on assitive robotics [from the guest editors]," IEEE Atomation Magazine, pp. 16 - 19, 2013. [28 ] C. Zielinski, T. Kornuta and T. Winiarski, "A Systematic Method of Designing Control Systemsfor Service and Field Robots," in 19 - th International Conference on Methods and Models in Automation and Robotics (MMAR) , Poland, 2014. [29 ] B. Andreas, S. Soren and K. Pathak, "A netwroking framework for teleoperation in safety, security and rescue robotics," IEEE Wireless Communications, 200 9. [30 ] V. Dutta and N. K esswani, "Designing vision based autonoumous Docile - x mobile robot for real time applicatiosn in soccer behaviors," Journal of Automation, Mobile Robotics and Intelligent Systems, vol. 8, no. 4, pp. 40 - 51, 2014. [31 ] https://community.aldebaran - robotics.com/doc/ [32 ] http://pal - robotics.com/en/products/reem/ [33 ] https://www.willowgarage.com/pages/pr2/overview [34 ] https://www.care - o - bot.de/en/care - o - bot - 3/hardware/technical - data.html [35 ] http://www.mobilerobots.com/ResearchRobots/People Bot.aspx [ 36 ] http://pal - robotics.com/en/products/stockbot/ [37 ] http://www.clearpathrobotics.com/husky/tech - specs/ [38 ] http://www.robotnik.es/web/wp - content/uploads/2014/06/Robotnik_Guardian - e1.pdf [39 ] http://www.mobilerobots.com/ResearchRobots/P3AT. aspx [40 ] http://www.mobilerobots.com/ResearchRobots/Seekur .aspx [41 ] http://www.clearpathrobotics.com/kingfisher/tech - specs/ [42 ] Kornuta T. and C. Zielinski, "Robot control system design exemplified by multi - camera visual servoing," Journal of Intelligent and Robotic Systems, vol. 77, no. 3, pp.499 - 524 . [43] http://www.ifr.org/ [44] T. Y and M. Winslett , " A unified scheme for resource protection in automated trust negotiation ," in: IEEE Symposium on Security and Privacy , 2003 , pp.110 - 122 . [45] M. Blaze., J. Feigenbaum , J. Lacy, "Decentralization trust management ," in :IEEE Symposium on Security and Privacy , 1996, pp.164 - 173 . [46] K. J. Kim., H. Suh, S. H. Kim and S. R. Oh , " A novel real - time control architecture for internet - based Thin - client robot; Simulacrum - based approach ," in :IEEE International conference on Robotics and Automation , May 19 - 23, 2008, CA, USA, pp. 4083 - 4 085 .