2017 Annual IEEE International Systems Conference (SysCon) 2017
DOI: 10.1109/syscon.2017.7934755
|View full text |Cite
|
Sign up to set email alerts
|

Secure communication for the robot operating system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
20
0
1

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 54 publications
(21 citation statements)
references
References 17 publications
0
20
0
1
Order By: Relevance
“…It reveals messages to unauthorized persons (breach of confidentiality), cannot detect unauthorized intentional or unintentional alteration of messages (violation of integrity), cannot prove that the involved parties (e.g. publishers, subscribers) are who they say they are [7], [12].…”
Section: Background Studymentioning
confidence: 99%
See 1 more Smart Citation
“…It reveals messages to unauthorized persons (breach of confidentiality), cannot detect unauthorized intentional or unintentional alteration of messages (violation of integrity), cannot prove that the involved parties (e.g. publishers, subscribers) are who they say they are [7], [12].…”
Section: Background Studymentioning
confidence: 99%
“…In [7] the authors described a concept similar to SROS but implemented by changing the roscpp client library. However, it fails to secure the master and the request / response sent / received via XML-RPC.…”
Section: Background Studymentioning
confidence: 99%
“…Recent efforts have been made in order to add security features to ROS such as TLS and DTLS [12] for secure communication between nodes, web tokens for achieving secure authentication for remote access [26], and cryptographic methods that ensure data confidentiality and integrity [14]. The ROS group has also begun work on SROS [28], a security suite for ROS systems, still highly experimental and not fully implemented into the core ROS framework.…”
Section: Introductionmentioning
confidence: 99%
“…The second approach is based on the use of traditional Kernel security tools. It is centered around the development of SROS (White et al, 2016) and uses TLS (Breiling et al, 2017) to secure communications. However, SROS is a highly experimental solution and still under heavy development, 3 and it has not been used in any robot in production until now.…”
Section: Introductionmentioning
confidence: 99%