Cybersecurity issues in robotics

Cybersecurity is not highly prioritized during the design and manufacture of robots. As with other embedded systems a higher priority is placed on development costs and delivering functionality to consumers. In the future greater attention to cybersecurity will need to be given as the use of robots continues to grow in the manufacturing, military, medical, eldercare and the automated vehicle markets. This work identifies current and potential cyber threats to robotics at the hardware, firmware/OS, and application levels. Attack scenarios at each level are presented and discussed. Additionally, the economic and human safety impact of a cyber attack on robots is examined. Finally, possible countermeasures are suggested.

[1]  Nancy M. Amato,et al.  A Roadmap for US Robotics - From Internet to Robotics 2020 Edition , 2021, Found. Trends Robotics.

[2]  N. G. Hockstein,et al.  A history of robots: from science fiction to surgical robotics , 2007, Journal of robotic surgery.

[3]  Carlos Balaguer,et al.  Cryptobotics: Why Robots Need Cyber Safety , 2015, Front. Robot. AI.

[4]  Ahmad-Reza Sadeghi,et al.  C-FLAT: Control-Flow Attestation for Embedded Systems Software , 2016, CCS.

[5]  Patrick C. Hickey,et al.  TrackOS: A Security-Aware Real-Time Operating System , 2016, RV.

[6]  Levente Buttyán,et al.  Embedded systems security: Threats, vulnerabilities, and attack taxonomy , 2015, 2015 13th Annual Conference on Privacy, Security and Trust (PST).

[7]  Haytham Elmiligi,et al.  Multi-dimensional analysis of embedded systems security , 2016, Microprocess. Microsystems.

[8]  Antonio Bicchi,et al.  An atlas of physical human-robot interaction , 2008 .

[9]  Birgit Graf,et al.  Robotic home assistant Care-O-bot: past-present-future , 2002, Proceedings. 11th IEEE International Workshop on Robot and Human Interactive Communication.

[10]  Nicholas S. Kelley,et al.  How resilient is the United States’ food system to pandemics? , 2015, Journal of Environmental Studies and Sciences.

[11]  Gang Wang,et al.  Moats and Drawbridges: An Isolation Primitive for Reconfigurable Hardware Based Systems , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[12]  Hovav Shacham,et al.  Comprehensive Experimental Analyses of Automotive Attack Surfaces , 2011, USENIX Security Symposium.

[13]  Martin Ford,et al.  Rise of the robots : technology and the threat of a jobless future , 2015 .

[14]  Simha Sethumadhavan,et al.  Tamper Evident Microprocessors , 2010, 2010 IEEE Symposium on Security and Privacy.

[15]  Arjen K. Lenstra,et al.  Security Observance throughout the Life-Cycle of Embedded Systems , 2008, ESA.

[16]  Peter Frase Class Struggle in Robot Utopia , 2016 .

[17]  Thomas Frey Hi, I'm a robot and I'm here to take your job. , 2013, Journal of environmental health.

[18]  Swarup Bhunia,et al.  Software exploitable hardware Trojans in embedded processor , 2012, 2012 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT).

[19]  Berk Sunar,et al.  Trojan Detection using IC Fingerprinting , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[20]  Bill Canis,et al.  The Motor Vehicle Supply Chain: Effects of the Japanese Earthquake and Tsunami , 2011 .