2023
DOI: 10.1016/j.iswa.2023.200237
|View full text |Cite
|
Sign up to set email alerts
|

Cyber security of robots: A comprehensive survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 10 publications
(2 citation statements)
references
References 93 publications
0
2
0
Order By: Relevance
“…However, as levels of autonomy and responsibility increase in robotics for nuclear, cybersecurity measures must also increase to ensure the safe deployment. Cyberattacks including issues, vulnerabilities, threats, risk and nature of cybersecurity threats are areas that cyber attackers can exploit when gaining access to systems [123][124][125]. Therefore, there is a requirement for watchdog agents to monitor security measures where either the robot or human operator may become compromised, hereby ensuring the run-time integrity of SMuRF assets.…”
Section: Future Workmentioning
confidence: 99%
“…However, as levels of autonomy and responsibility increase in robotics for nuclear, cybersecurity measures must also increase to ensure the safe deployment. Cyberattacks including issues, vulnerabilities, threats, risk and nature of cybersecurity threats are areas that cyber attackers can exploit when gaining access to systems [123][124][125]. Therefore, there is a requirement for watchdog agents to monitor security measures where either the robot or human operator may become compromised, hereby ensuring the run-time integrity of SMuRF assets.…”
Section: Future Workmentioning
confidence: 99%
“…In contrast to prior surveys that focus on specific security aspects in AI-Robotic systems, ranging from attacks on operating systems, networks, and the physical layer [29], information faults [30], to ensuring secure communication in IoTs [30], [31], and securing trust between operators and cobots in automation and construction domains [32], our paper sets itself apart by seamlessly integrating attack surfaces and mitigation strategies, ethical and legal concerns, and HRI security dimensions, providing a comprehensive review across these critical areas. On a taxonomic front, Jahan et al, [33] employs a classification approach akin to our paper, albeit with a focus solely on autonomous systems.…”
Section: Introductionmentioning
confidence: 99%