remote teleoperation
play

Remote Teleoperation Tejas Sathe The Matrix The Papers Usability - PowerPoint PPT Presentation

Remote Teleoperation Tejas Sathe The Matrix The Papers Usability Guidelines for the Design of Robot Teleoperation: A Taxonomy An Experimental Analysis of Cyber Security Threats Against Teleoperated Surgical Robotics Usability


  1. Remote Teleoperation Tejas Sathe

  2. The Matrix

  3. The Papers � Usability Guidelines for the Design of Robot Teleoperation: A Taxonomy � An Experimental Analysis of Cyber Security Threats Against Teleoperated Surgical Robotics

  4. Usability Guidelines for the Design of Robot Teleoperation: A Taxonomy

  5. Abstract � A taxonomy of design guidelines for robot remote teleoperation 
 � A list of UI design guidelines, classified by open card sorting 
 � Taxonomy further validated by closed card sorting

  6. Classification of guidelines � Platform architecture and scalability � Error prevention and recovery � Visual design � Information presentation � Robot state awareness � Interaction effectiveness and efficiency � Robot surroundings awareness � Cognitive factors

  7. Introduction � Robots can guide themselves with limited human expertise encoding 
 � For high criticality situations, partial encoding my not be enough 
 � For example, agricultural robot cannot adjust spraying according to specific needs of the plant 
 � Suitable human-robot interface needed

  8. Open card sorting � Participants given cards with no groupings and asked to classify 
 � Participants: 6 female and 16 male experts 
 � Apparatus: Sorting done using WebSort online service 
 � Procedure: Drag and drop cards in appropriate groups

  9. Closed card sorting � Used to test and refine proposed taxonomy obtained from earlier method 
 � Give cards with primary groups and classify into preestablished groups (from earlier)

  10. Closed card sorting � Participants: 20 female and 18 male experts (23 HCI + 15 HRI) 
 � Apparatus: OptimalSort online service 
 � Procedure: guidelines and categories presented in random order; drag and drop

  11. Analysis of Open Sorting � Used for generating taxonomy 
 � WebSort delivers categorizations generated both individually and cumulatively 
 � Three of the authors created their own categorizations for the data

  12. Analysis of Open Sorting � One author used nominalizations to merge several groupings 
 � e.g. ‘Look’, ‘Orientation’, ‘Video Stream’ etc. were collectively grouped as ‘Viewing and Navigation’ 
 � This resulted in 6 metacategories 
 � The 70 guidelines were then placed in these

  13. Analysis of Open Sorting � e.g. Metacategory A contains 1, 2 and 3 
 � For each guideline, a sum indicates how many times it was placed in one of these 
 � If the sum was maximum among all subcategories, the guideline was assigned to A

  14. Analysis of Open Sorting � The second author used the dendogram created by WebSort to group labels 
 � e.g. “Error Prevention” and “Provide Feedback” were placed under the standardized label “Design for error prevention and recovery”

  15. Analysis of Open Sorting � The third author merged linguistically and conceptually similar groups into one single standardized group 
 � e.g. “Interface efficiency”, “Design efficiency”, “Interaction efficiency” etc. were placed under “User experience efficiency”

  16. Analysis of Open Sorting � An analysis of a matrix with guidelines as rows, categories as columns and cells as percentage of participants who placed that guideline in that category was conducted 
 � Column-wise exploration of the same in conjunction with WebSort’s dendogram identified the group consistently formed by the participants consisting of the same guidelines

  17. Analysis of Open Sorting � e.g. Guidelines like “Extensibility of system” and “Support evolution of platforms” were placed under “Platform architecture and scalability” 
 � Row-wise exploration was used to place the guidelines in the newly formed group

  18. Analysis of Closed Sorting � An overall agreement of 86% was observed between the results of the open and closed sortings 
 � For each guideline, a comparison of percentage of participants was done who placed it in different group in the open and closed sortings 
 � A statistically significant difference was found for only 10 out of 70 categories; this was found using two-sided two-proportion z-test, p<0.05 as the standard value

  19. Final taxonomy � The final taxonomy had to be refined 
 � This was done by moving those ten guidelines into categories that the maximum number of participants chose for each of them

  20. Application study � The proposed taxonomy was applied to an agricultural sprayer robot, AgriRobot 
 � The evaluated prototype implemented functionality for robot navigation and targeted spraying 
 � It was implemented using the Summit XL mobile platform, with three cameras for human-robot awareness

  21. Application study � Four HRI experts conducted heuristic evaluation of the AgriRobot using the proposed taxonomy and severity rating proposed by Nielsen 
 � First, they studied the proposed taxonomy and carried out a free exploration on their own to identify usability problems 
 � Each expert then compiled a list containing problem description, the heuristic violated and a corresponding severity rating

  22. Application study � They then shared notes, removed duplicates and refined problem descriptions and reordered the list by decreasing order of severity

  23. Conclusion � This is the first endeavor to produce a taxonomy that takes inputs from HRI as well as HCI experts 
 � This taxonomy focuses specifically on the UI design aspect of robotics 
 � Several problems that were missed by UI experts in the AgriRobot were identified using this taxonomy

  24. Audience response � What did we like about this paper? 
 � What didn’t we like? 
 � Are the conclusions appropriate? 
 � How would we improve on this paper?

  25. An Experimental Analysis of Cyber Security Threats Against Teleoperated Surgical Robotics

  26. Abstract � Surgical robots are being tested and used; what if they were hacked and turned into weapons? 
 � This paper analyzes possible cyber security attacks against Raven II, an advanced teleoperated surgical robotics system 
 � They identify various threats and evaluate scopes and impacts 
 � The also investigate methods of mitigating the damage

  27. Introduction � There has been a 20% increase yearly in the number of surgical robots sold 
 � These are expected to use of existing public networks and temporarily available ad-hoc wireless and satellite networks to transmit audio and video 
 � These can provide immediate relief in under-developed and remote rural areas; also in the battlefield

  28. Security concerns � Security hasn’t been a major concern for medical robotics so far 
 � But worms like Stuxnet can affect any devices that use a PLC 
 � So, security does become an important aspect of remote surgery (but so is the case with literally everything)

  29. Stuxnet � A worm that exploited four zero-day vulnerabilities in the Windows OS; introduced into the device using a flash drive 
 � It propagates across the network, looking for Siemens Step7 software that controls a PLC 
 � If it doesn’t find it, it lays dormant, with the possibility of transmitting every time a flash drive is inserted into that device

  30. Stuxnet � If a Siemens Step7 is found, Stuxnet introduces an infected rootkit on the PLC and Step7 
 � This modifies the code and gives unexpected commands and disrupts the functioning 
 � It also simultaneously transmits acceptable readings to the monitoring system 
 � Camera feed example

  31. The Problem � Currently, surgical roboticists face two dimensions of lack of understanding 
 � The first is how such a system can be attacked 
 � The second, what the motivation behind doing this might be

  32. The Analysis � Attack identification and characterization 
 � Vulnerability analysis 
 � Risk assessment and defense directions 
 � Challenges specific to teleoperated procedures

  33. Related Work � The Raven II is a teleoperated robotics system to support research in advanced robotic surgery 
 � It can support both software development, experimental testing, and surgical training

  34. Raven II

  35. Raven II � The Raven II consists of two 7-degrees-of-freedom surgical manipulators 
 � The motion axes are: shoulder joint, elbow joint, tool insertion/ retraction, tool roll, tool grasping, tool wrist actuations 1 and 2

  36. Raven II � The surgeon control inputs are collected through a surgical control console 
 � Control inputs and robot feedback are transmitted using a communication standard designed specifically for surgical teleoperation 
 � It’s called the “Interoperable Telesurgery Protocol”, or ITP

  37. Raven II � The Raven II has been tested in extreme environments, like the Mojave desert 
 � It was controlled through the Internet, with the final link being a UAV- enable wireless network 
 � The following network states were identified as critical for performance: comm latency, jitters, packet delays/out-of-order arrival/losses, device failures

  38. Vulnerability Analysis: Attacker Model

  39. Vulnerability Analysis: Attacker Model � Two attack vectors are identified: endpoint compromise and network/communication based attack 
 � In the former, a surgeon’s control console or the robot can be compromised 
 � In the latter, the attacker may intercept network traffic and inject malicious packets

Recommend


More recommend