2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) 2016
DOI: 10.1109/dsn.2016.43
|View full text |Cite
|
Sign up to set email alerts
|

Targeted Attacks on Teleoperated Surgical Robots: Dynamic Model-Based Detection and Mitigation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
49
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 68 publications
(49 citation statements)
references
References 12 publications
0
49
0
Order By: Relevance
“…As teleoperation is still the dominant way to control surgical robots, there are many Raven citations in this topic [8,12,24,26,34,38,39,44,63,64,66,[68][69][70][71][72][73][74][75][76][77][78]. Whilemuch research focuses on the classical teleoperation problems, such as the system architecture, the master controller and the communication problems, etc., we do see some new research problems attracting attention.…”
Section: Teleoperated Robotic Surgeriesmentioning
confidence: 99%
See 1 more Smart Citation
“…As teleoperation is still the dominant way to control surgical robots, there are many Raven citations in this topic [8,12,24,26,34,38,39,44,63,64,66,[68][69][70][71][72][73][74][75][76][77][78]. Whilemuch research focuses on the classical teleoperation problems, such as the system architecture, the master controller and the communication problems, etc., we do see some new research problems attracting attention.…”
Section: Teleoperated Robotic Surgeriesmentioning
confidence: 99%
“…A very important issue in a surgical robotic system is security from online adversaries. [71,73,74] studied cybersecurity issues specific to telesurgery systems using the Raven system.…”
Section: Teleoperated Robotic Surgeriesmentioning
confidence: 99%
“…Furthermore, in order to improve the detection efficiency of the system, only the dynamic model of the first three joints of heavy-duty robots was modelled. This is reasonable for that the first three joints contribute most to the robot's positions, while the other four joints mainly affecting the orientation of the manipulator [23]. The 10 frames of data are sent per second between the simulated attacker and robot controller.…”
Section: Performance Of Detection and Mitigation Mechanismmentioning
confidence: 99%
“…Targeted attacks on heavy-duty robots mainly make use of the vulnerabilities of communication protocol and operating system [23]. Once an attack occurs, it will bring serious security challenges to life and property of the heavy-duty robot system.…”
Section: Targeted Attacksmentioning
confidence: 99%
“…The number of injury and death events per procedure has stayed relatively constant since 2007, with an average of 83.4 events per 100,000 procedures [ 7 ]. Although, these incidents are often caused by accidental malfunctions or technical problems with the robot and steep learning curves, it has also been shown that surgical robots can be subject to malicious cyber-attacks that impact patient safety and progress of surgery [ 8 , 9 ]. The ability of current robotic surgery technology to automatically mitigate the impact of safety incidents still lags other safety-critical industries, such as commercial aviation.…”
Section: Introductionmentioning
confidence: 99%