2022 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS) 2022
DOI: 10.1109/iros47612.2022.9982129
|View full text |Cite
|
Sign up to set email alerts
|

SROS2: Usable Cyber Security Tools for ROS 2

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 17 publications
(8 citation statements)
references
References 22 publications
0
8
0
Order By: Relevance
“…Compared to ROS, the ROS2 middleware framework is based on the DDS protocol, which provides better performance and security, and therefore the latest robot manufacturers prefer ROS2-based applications. Although ROS2 uses DDS Security and SROS2 [31] To enhance its security and usability, but it is not absolutely secure. On the one hand, the security problems existing in ROS may not be fully solved by ROS2, and on the other hand, ROS2 itself may also have new security problems.…”
Section: Of 21mentioning
confidence: 99%
“…Compared to ROS, the ROS2 middleware framework is based on the DDS protocol, which provides better performance and security, and therefore the latest robot manufacturers prefer ROS2-based applications. Although ROS2 uses DDS Security and SROS2 [31] To enhance its security and usability, but it is not absolutely secure. On the one hand, the security problems existing in ROS may not be fully solved by ROS2, and on the other hand, ROS2 itself may also have new security problems.…”
Section: Of 21mentioning
confidence: 99%
“…Compared to the ROS, the ROS2 middleware framework is based on the DDS (Data Distribution Service) protocol, which provides better performance and security, and therefore, the latest robot manufacturers prefer ROS2-based applications. Although ROS2 uses DDS Security and SROS2 [34] to enhance its security and usability, it is not absolutely secure. The official ROS community has posted vulnerabilities in the robotic system from hardware to software [35], and the vulnerabilities regarding the ROS2 level are highly relevant to the work of this article.…”
Section: Related Workmentioning
confidence: 99%
“…From a straightforward application of the Grönwall-Bellman inequality (see, e.g., [27, Lemma A.1, p. 651]) to (13), it can be seen that κ(t) < κ(0) exp(2αt) holds for all t > 0. Therefore, the definition in ( 12) yields the following constraint on the time-varying stiffness and damping profiles where B 0 = B T (0) and K 0 = K T (0) for all t > 0.…”
Section: Adversarial Time-varying Impedance Target Dynamicsmentioning
confidence: 99%
“…Contributions of the Paper. This paper contributes to the emerging field of cybersecurity in robotics and automation (see, e.g., [12], [13]) in several important ways. The first contribution of the paper is founded in using variable impedance control synthesis techniques (see, e.g., [14], [15]) for generation of cyber-physical closed-loop attacks against the HSC steering systems.…”
Section: Introductionmentioning
confidence: 99%