2017
DOI: 10.1016/j.robot.2017.09.017
|View full text |Cite
|
Sign up to set email alerts
|

Security for the Robot Operating System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
57
0
3

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 123 publications
(69 citation statements)
references
References 20 publications
0
57
0
3
Order By: Relevance
“…As described in [37][38][39], ROS suffers from significant security issues. In our work, we address this issue by introducing an authentication system for the users that want to access the web pages hosted on the public server (as shown in Figure 3).…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…As described in [37][38][39], ROS suffers from significant security issues. In our work, we address this issue by introducing an authentication system for the users that want to access the web pages hosted on the public server (as shown in Figure 3).…”
Section: Discussionmentioning
confidence: 99%
“…It was computed as the count of receptions of the total messages sent. Furthermore, we evaluated the communication bandwith by using iperf [36] and we limited the server bandwidth through Wondershaper [37]. Test 2 was repeated 10 times, each time using five user-robot pairs.…”
Section: Test 2: High Rates Communicationmentioning
confidence: 99%
“…In addition to compliance, the Keymint policy compilation process can also ensure the transport artifacts result in a faithful interpretation of the original symbolic policy. For example, ComArmor's un-ordered rules sets and deny overrides must be considered accordingly when translating to Secure DDS default plugin permission structure given that its Policy 4 for rule in rules do 18: domain ← subject.domain in rule.domainSet 19: criteria ← rule.get(subject.action.type) 20: Action types: publish, subscribe, relay 21: match ← CHECKCRITERIA(criteria, subject) 22: if domain and match then Decision Point (PDP) evaluates upon the first found matching rule in an ordered list. Thus ComArmor deny rules must be arranged in the list as to always be considered first for a given object.…”
Section: B Keymintmentioning
confidence: 99%
“…In robotic networks, we can find a significant number of devices that need to operate in conjunction with each other. In such cases, as discussed by Dieber et al [4], the information security pillars of Confidentiality, Integrity and Availability (CIA) that are generally applied to secure information systems assume different priorities.…”
Section: Introductionmentioning
confidence: 99%
“…It reveals messages to unauthorized persons (breach of confidentiality), cannot detect unauthorized intentional or unintentional alteration of messages (violation of integrity), cannot prove that the involved parties (e.g. publishers, subscribers) are who they say they are [7], [12].…”
Section: Background Studymentioning
confidence: 99%