2018
DOI: 10.1007/978-3-319-91590-6_11
|View full text |Cite
|
Sign up to set email alerts
|

SROS1: Using and Developing Secure ROS1 Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
2
2

Relationship

2
7

Authors

Journals

citations
Cited by 14 publications
(11 citation statements)
references
References 15 publications
0
10
0
Order By: Relevance
“…To address these concerns, the community has developed the Secure ROS extension (SROS) [70,71]. SROS requires each node in the communication graph to be associated with an identity backed by a X.509 certificate, signed by a trusted third-party.…”
Section: Existing Security Mechanisms In Rosmentioning
confidence: 99%
“…To address these concerns, the community has developed the Secure ROS extension (SROS) [70,71]. SROS requires each node in the communication graph to be associated with an identity backed by a X.509 certificate, signed by a trusted third-party.…”
Section: Existing Security Mechanisms In Rosmentioning
confidence: 99%
“…Dieber et al [10] develop an authentication mechanism that allows publishers and subscribers verify each others' identities and establish the integrity of messages exchanged between them. These and similar enhancements are under consideration as part of the Secure ROS [32,33] framework, which is under active development.…”
Section: Related Workmentioning
confidence: 99%
“…Therefore, by means of TLS/SSL and the usage of x.509 certificate we can easily enforce confidentiality and authenticity. In the particular case of ROS, this improvements has been implemented with SROS [2] [19] a set of security enhancements that aims to secure ROS. By leveraging on SROS, our goal is to extend the new security features and improve them with some fine statical mechanisms: (1) define an exhaustive standard for security logging the API operations; (2) define a new profile syntax standard for the definition of policy file; (3) provide new method for the automatic generation of the aforementioned certificate.…”
Section: Security Enhancementsmentioning
confidence: 99%