2019
DOI: 10.1007/978-981-13-3702-4_1
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing Security in ROS

Abstract: In recent years, we observed a growth of cybersecurity threats, especially due to the ubiquitous of connected and autonomous devices commonly defined as Internet of Things (IoT). These devices, designed to handle basic operations, commonly lacks security measurements. In this paper we want to tackle how we could, by design, apply static and dynamic security solutions for those devices and define security measurements without degrading overall the performance.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
1
1
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 10 publications
(10 reference statements)
0
2
0
Order By: Relevance
“…While this is not the norm as far as ROS system design is concerned, there is a strict limit to what users can do to secure their ROS systems without a cryptographic system. Previous research has fully mapped out this limit [27] [13] [7]. We make no assumptions about the security of any ROS packages or a user's ability to patch the system's underlying software.…”
Section: Threat Modelmentioning
confidence: 99%
“…While this is not the norm as far as ROS system design is concerned, there is a strict limit to what users can do to secure their ROS systems without a cryptographic system. Previous research has fully mapped out this limit [27] [13] [7]. We make no assumptions about the security of any ROS packages or a user's ability to patch the system's underlying software.…”
Section: Threat Modelmentioning
confidence: 99%
“…As discussed by Caiazza el al. [14], the remote agent could then pick and choose the minimal required set of sub-tokens to be shared to gain access. This potentially adds to the complexity of the CA provisioning and expiration of permissions, as well as the coordination of exchange tokens during runtime.…”
Section: Future Workmentioning
confidence: 99%