Cybersecurity of Robotic Systems: Leading Challenges and Robotic System Design Methodology

Author:

Dutta VibekanandaORCID,Zielińska TeresaORCID

Abstract

Recent years have seen a rapid development of the Internet of Things (IoT) and the growth of autonomous robotic applications which are using network communications. Accordingly, an increasing advancement of intelligent devices with wireless sensors (that means autonomous robotic platforms) operating in challenging environments makes robots a tangible reality in the near future. Unfortunately, as a result of technical development, security problems emerge, especially when considering human–robot collaboration. Two abnormalities often compromise the basic security of collaborative robotic fleets: (a) Information faults and (b) system failures. This paper attempts to describe the methodology of a control framework design for secure robotic systems aided by the Internet of Things. The suggested concept represents a control system structure using blocks as the components. The structure is designed for the robots expected to interact with humans safely and act connected by communication channels. The properties of the components and relations between them are briefly described. The novelty of the proposed concept concerns the security mechanisms. The paper also categorizes two different modes of network attacks summarizing their causal effects on the human–robot collaboration systems. The issue of standardization is also raised. In particular, the works of the National Institute of Standards and Technology (NIST) and European Parliament (EP) on the security templates for communication channels are commented.

Publisher

MDPI AG

Subject

Electrical and Electronic Engineering,Computer Networks and Communications,Hardware and Architecture,Signal Processing,Control and Systems Engineering

Reference134 articles.

1. Security framework for industrial collaborative robotic cyber-physical systems

2. Networking technologies for robotic applications;Dutta;arXiv,2015

3. Foresight in governments–practices and trends around the world;Dreyer,2013

4. Twenty legal considerations for clouds of things;Hon,2016

Cited by 8 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Adaptive Finite/Fixed Time Control Design for a Class of Nonholonomic Systems with Disturbances;Mathematics;2023-05-14

2. Cyber security of robots: A comprehensive survey;Intelligent Systems with Applications;2023-05

3. Humanoid Robots: Cybersecurity Concerns And Firewall Implementation;VFAST Transactions on Software Engineering;2023-03-31

4. Cyber Security Tool for Combat Remote Work Vulnerability;2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT);2023-02-22

5. An Observer-Based Key Agreement Scheme for Remotely Controlled Mobile Robots;IFAC-PapersOnLine;2023

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3