2016 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS) 2016
DOI: 10.1109/iros.2016.7759659
|View full text |Cite
|
Sign up to set email alerts
|

Application-level security for ROS-based applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
34
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
2
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 64 publications
(34 citation statements)
references
References 14 publications
0
34
0
Order By: Relevance
“…Bernhard Dieber et al [ 22 ] treated ROS as a black box and used an authentication server (AS) to ensure communication between authorized nodes. In this approach, the publisher receives a key from the AS, encrypts, signs it with the message, and then forwards it to the subscriber.…”
Section: Related Workmentioning
confidence: 99%
“…Bernhard Dieber et al [ 22 ] treated ROS as a black box and used an authentication server (AS) to ensure communication between authorized nodes. In this approach, the publisher receives a key from the AS, encrypts, signs it with the message, and then forwards it to the subscriber.…”
Section: Related Workmentioning
confidence: 99%
“…Prior work has also proposed integration of the ROSC++ package with TLS to provide end-to-end encrypted communication channels [9]. Dieber et al [10] develop an authentication mechanism that allows publishers and subscribers verify each others' identities and establish the integrity of messages exchanged between them. These and similar enhancements are under consideration as part of the Secure ROS [32,33] framework, which is under active development.…”
Section: Related Workmentioning
confidence: 99%
“…Similarly to the proposed solution, Dieber et al [15] proposed a security architecture intended for use on top of ROS on the application level. By means of an authorization server and the usage of x.509 certificates for authentication, they ensure that only valid registered nodes are authorized to execute some operations.…”
Section: Related Workmentioning
confidence: 99%