2019 Third IEEE International Conference on Robotic Computing (IRC) 2019
DOI: 10.1109/irc.2019.00019
|View full text |Cite
|
Sign up to set email alerts
|

Security Considerations in Modular Mobile Manipulation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(8 citation statements)
references
References 16 publications
0
8
0
Order By: Relevance
“…Database Reference A secure design-for-test infrastructure for lifetime security of SoCs IEEE [14] Safety and security aware framework for the development of feedback control systems IEEE [15] Designing safe and secure autopilots for the urban environment IEEE [16] Cyber-Physical Systems Security-A Survey IEEE [8] Open Platform Systems Under Scrutiny: A Cybersecurity Analysis of the Device Tree IEEE [17] Cyber Security Concerns Regarding Federated, Partly IMA and Full IMA Implementations IEEE [18] The Need for a Secure Modular Open Systems Approach (MOSA): Building the Case Using Systems Thinking Methodologies IEEE [9] Attacks on Distributed Sequential Control in Manufacturing Automation IEEE [19] A Multicycle Pipelined GCM-Based AUTOSAR Communication ASIP IEEE [20] Cyber-Attacks in Modular Multilevel Converters IEEE [21] Securing Robots: An Integrated Approach for IEEE [22] Security Challenges and Monitoring for the Robotic Operating System (ROS) Security Threat Analysis and Treatment Strategy for ORAN IEEE [23] Security Risk Assessment and Risk Treatment for Integrated Modular Communication Scopus [24] Big Missions, Small Solutions Advances and Innovation in Architecture and Technology for Small Satellites Scopus [10] Considerations and examples of a modular open systems approach in defense systems Scopus [7] Security Mechanisms Used in Microservices-Based Systems: A Systematic Mapping Scopus [25] Security Considerations in Modular Mobile Manipulation Scopus [26] Openness and Security Thinking Characteristics for IoT Ecosystems Scopus [27] Railway Defender Kill Chain to Predict and Detect Cyber-Attacks Scopus [28] Mission Systems Open Architecture Science and Technology (MOAST) program SPIE [29] Joint Communications Architecture for Unmanned Systems (JCAUS) SPIE [30] Designing the next generation of sensor systems using the SOSA standard SPIE [31] A systems approach to achieving the benefits of open and modular systems SPIE [32] Chaos engineering experiments in middleware systems using targeted network degradation and automatic fault injection SPIE [33] Protecting publish/subscribe interactions via TLS and a system-wide certificate validation engine SPIE [34] Secure Internet of Things Architecture (SIoTA) on the battlefield SPIE…”
Section: Titlementioning
confidence: 99%
“…Database Reference A secure design-for-test infrastructure for lifetime security of SoCs IEEE [14] Safety and security aware framework for the development of feedback control systems IEEE [15] Designing safe and secure autopilots for the urban environment IEEE [16] Cyber-Physical Systems Security-A Survey IEEE [8] Open Platform Systems Under Scrutiny: A Cybersecurity Analysis of the Device Tree IEEE [17] Cyber Security Concerns Regarding Federated, Partly IMA and Full IMA Implementations IEEE [18] The Need for a Secure Modular Open Systems Approach (MOSA): Building the Case Using Systems Thinking Methodologies IEEE [9] Attacks on Distributed Sequential Control in Manufacturing Automation IEEE [19] A Multicycle Pipelined GCM-Based AUTOSAR Communication ASIP IEEE [20] Cyber-Attacks in Modular Multilevel Converters IEEE [21] Securing Robots: An Integrated Approach for IEEE [22] Security Challenges and Monitoring for the Robotic Operating System (ROS) Security Threat Analysis and Treatment Strategy for ORAN IEEE [23] Security Risk Assessment and Risk Treatment for Integrated Modular Communication Scopus [24] Big Missions, Small Solutions Advances and Innovation in Architecture and Technology for Small Satellites Scopus [10] Considerations and examples of a modular open systems approach in defense systems Scopus [7] Security Mechanisms Used in Microservices-Based Systems: A Systematic Mapping Scopus [25] Security Considerations in Modular Mobile Manipulation Scopus [26] Openness and Security Thinking Characteristics for IoT Ecosystems Scopus [27] Railway Defender Kill Chain to Predict and Detect Cyber-Attacks Scopus [28] Mission Systems Open Architecture Science and Technology (MOAST) program SPIE [29] Joint Communications Architecture for Unmanned Systems (JCAUS) SPIE [30] Designing the next generation of sensor systems using the SOSA standard SPIE [31] A systems approach to achieving the benefits of open and modular systems SPIE [32] Chaos engineering experiments in middleware systems using targeted network degradation and automatic fault injection SPIE [33] Protecting publish/subscribe interactions via TLS and a system-wide certificate validation engine SPIE [34] Secure Internet of Things Architecture (SIoTA) on the battlefield SPIE…”
Section: Titlementioning
confidence: 99%
“…The security requirements of MMs can be categorized into physical-based and networkbased attacks [107]. Network interfaces and unsecured USB ports need to be avoided since they can be used to install malware or steal data.…”
Section: Cyber Securitymentioning
confidence: 99%
“…An architecture for MM security was developed and integrated into the CHIMERA in [107]. With only designated channels connecting the subsystems, their security architecture for the CHIMERA robot was built on subsystem isolation.…”
Section: Cyber Securitymentioning
confidence: 99%
“…Other distributed architectures are developed in order to overcome this problem, where the robots are considered as two distinct entities. 16 In this case, the communication with the supervision system can be made separately or together through a specific controller dedicated to the synchronisation of the two robots. This architecture reduces the complexity and the amount of communication data of the supervision system.…”
Section: Related Workmentioning
confidence: 99%