2015 IEEE International Symposium on Technology and Society (ISTAS) 2015
DOI: 10.1109/istas.2015.7439425
|View full text |Cite
|
Sign up to set email alerts
|

Vision for secure home robots: Implementation of two-factor authentication

Abstract: The robotics industry is developing at a fast pace and it seems inevitable that home robots will become affordable, easily accessible and popular. They will be able to perform a will be able to perform a wide range of tasks ranging from household chores, entertainment, home security and surveillance and will become an important part of our lives. The robots like any other a computer system connected to a computer network is vulnerable to hackers.In the paper the authors aim to expose the vulnerabilities and et… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 4 publications
0
3
0
Order By: Relevance
“…This included the performance of the robots, and more fundamentally, trust in any robotic system coming into the home. Much as Miglani and Hensman (2016) highlights the ethical and technical considerations for software used in robots in the home, participants of this survey raised concerns regarding data security. The number of such concerns increased for second-hand systems and included issues around software obsolescence, the introduction of viruses and access to prior owners’ data.…”
Section: Discussionmentioning
confidence: 99%
“…This included the performance of the robots, and more fundamentally, trust in any robotic system coming into the home. Much as Miglani and Hensman (2016) highlights the ethical and technical considerations for software used in robots in the home, participants of this survey raised concerns regarding data security. The number of such concerns increased for second-hand systems and included issues around software obsolescence, the introduction of viruses and access to prior owners’ data.…”
Section: Discussionmentioning
confidence: 99%
“…The fact that many devices are connected to a single network reveals the importance of network security [7]. In order to provide this security, the use of two-factor authentication in robot technology is inevitable [8]. Thanks to NFC technology, data can be exchanged at a short distance with low bandwidth.…”
Section: Hardware-based Two-factor Authenticationmentioning
confidence: 99%
“…Rover has vast and wide applications in the real world. It has been implemented in space exploration, safety and weapon system endeavor, intelligent home application as well as military application [1,2]. In addition, a small and agile rover prototype such as The Light Weight Rover Unit (LRU) had existed for planetary exploration [3,4].…”
Section: Introductionmentioning
confidence: 99%