Humanoid Robots: Cybersecurity Concerns And Firewall Implementation

Author:

Munir Safa,Khan Kashaf,Aslam Dr Naeem,Abid Kamran,Rehman Mustajib-ur-

Abstract

Technology has grown more important in our lives, and scientists are developing new products to make people’s life easier and more pleasant. One of these innovations is the humanoid robot. The use of humanoid robots in our daily lives is expanding at an unprecedented rate as robots are being used in different aspects of life. The market is becoming more automated and optimized, Robotics serves as one of the primary instruments used for these reasons. Yet, security continues to pose a concern for robotics. As humanoid robots begin to function "in the open," we must assess the threats they will confront. Through the literature review, researchers found that security assessments were not performed on the robots which cause the robots to be weak against cybersecurity attacks. In this research, we perform different security assessments to identify the vulnerabilities in humanoid robots. Furthermore, different metrics were used to check and perform security assessments on the robot as well as the results of security assessments has been shown. It was shown that humanoid robots are vulnerable as anyone will be able to hack the login credentials of robot’s website as well as there are some open ports in the robot’s network which can be used by the hackers to exploit robot’s working. Based on the results of assessment methods and our findings, we gave the firewall framework which will be helpful to protect the humanoid robot against those security vulnerabilities and attacks.This firewall framework will be able to protect the humanoid robots in aspects of both network and website/webpage exploitation.

Publisher

VFAST Research Platform

Subject

General Medicine

Reference69 articles.

1. Kaspersky, “What is Cyber Security? | Definition, Types, and User Protection,” AO Kaspersky Lab. 2022. [Online]. Available: https://www.kaspersky.com/resource-center/definitions/what-is-cyber-security

2. A. Lane, “What is technology? - OpenLearn - Open University,” OpenLearn. 2019. [Online]. Available: https://www.open.edu/openlearn/science-maths-technology/engineering-and-technology/technology/what-technology

3. Aiden Ford, “Technology Types & Uses | What is Technology? - Video & Lesson Transcript | Study.com,” Study.com. 2021. [Online]. Available: https://study.com/academy/lesson/what-is-technology-definition-types.html

4. P. Forbrig, “Challenges in multi-user interaction with a social humanoid robot pepper,” CEUR Workshop Proc, vol. 2503, pp. 10–17, 2019.

5. M. Chui, J. Manyika, and M. Miremadi, “Where machines could replace humans-and where they can’t (yet),” McKinsey Quarterly, vol. 2016, no. 3, pp. 58–69, 2016.

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3