Security for the Robot Operating System

[1]  Peter Schartner,et al.  Secure communication for the robot operating system , 2017, 2017 Annual IEEE International Systems Conference (SysCon).

[2]  Henrik I. Christensen,et al.  SROS: Securing ROS over the wire, in the graph, and through the kernel , 2016, ArXiv.

[3]  Peter Schartner,et al.  Application-level security for ROS-based applications , 2016, 2016 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS).

[4]  Miklós Kozlovszky,et al.  Increasing ROS 1.x communication security for medical surgery robot , 2016, 2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC).

[5]  Anton V. Uzunov A survey of security solutions for distributed publish/subscribe systems , 2016, Comput. Secur..

[6]  Vicente Matellán Olivera,et al.  Cybersecurity in Autonomous Systems: Evaluating the performance of hardening ROS , 2016 .

[7]  Peter Fairley,et al.  Cybersecurity at U.S. utilities due for an upgrade: Tech to detect intrusions into industrial control systems will be mandatory [News] , 2016 .

[8]  Eduardo B. Fernández,et al.  Security solution frames and security patterns for authorization in distributed, collaborative systems , 2015, Comput. Secur..

[9]  David Hutchison,et al.  A survey of cyber security management in industrial control systems , 2015, Int. J. Crit. Infrastructure Prot..

[10]  Christian Esposito,et al.  On Security in Publish/Subscribe Services: A Survey , 2015, IEEE Communications Surveys & Tutorials.

[11]  Leandros A. Maglaras,et al.  Intrusion detection in SCADA systems using machine learning techniques , 2014, 2014 Science and Information Conference.

[12]  Yi Zhang,et al.  ROSRV: Runtime Verification for Robots , 2014, RV.

[13]  Sonia Chernova,et al.  Message authentication codes for secure remote non-native client connections to ROS enabled robots , 2014, 2014 IEEE International Conference on Technologies for Practical Robot Applications (TePRA).

[14]  F. Bullo,et al.  Attack Detection and Identification in Cyber-Physical Systems , 2013, IEEE Transactions on Automatic Control.

[15]  David Mascareñas,et al.  A preliminary cyber-physical security assessment of the Robot Operating System (ROS) , 2013, Defense, Security, and Sensing.

[16]  Adriano Valenzano,et al.  Review of Security Issues in Industrial Networks , 2013, IEEE Transactions on Industrial Informatics.

[17]  Dale C. Rowe,et al.  A survey SCADA of and critical infrastructure incidents , 2012, RIIT '12.

[18]  Sasu Tarkoma,et al.  Publish / Subscribe Systems: Design and Principles , 2012 .

[19]  Stamatis Karnouskos,et al.  Stuxnet worm impact on industrial cyber-physical system security , 2011, IECON 2011 - 37th Annual Conference of the IEEE Industrial Electronics Society.

[20]  Jugal K. Kalita,et al.  Surveying Port Scans and Their Detection Methodologies , 2011, Comput. J..

[21]  Taekyoung Kwon,et al.  An Experimental Study of Hierarchical Intrusion Detection for Wireless Industrial Sensor Networks , 2010, IEEE Transactions on Industrial Informatics.

[22]  Wael Adi,et al.  Mechatronic Security and Robot Authentication , 2009, 2009 Symposium on Bio-inspired Learning and Intelligent Systems for Security.

[23]  Thomas P. von Hoff,et al.  Security for Industrial Communication Systems , 2005, Proceedings of the IEEE.

[24]  Alexander L. Wolf,et al.  Security issues and requirements for Internet-scale publish-subscribe systems , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.

[25]  Joe Weiss,et al.  Industrial Control System (ICS) Cyber Security for Water and Wastewater Systems , 2014 .

[26]  Eric Rescorla,et al.  Datagram Transport Layer Security Version 1.2 , 2012, RFC.

[27]  Sasu Tarkoma,et al.  Security Design for an Inter-Domain Publish/Subscribe Architecture , 2011, Future Internet Assembly.

[28]  Bruno Sinopoli,et al.  Challenges for Securing Cyber Physical Systems , 2009 .

[29]  Gary McGraw,et al.  Software Penetration Testing , 2005, IEEE Secur. Priv..

[30]  E. Byres,et al.  The Myths and Facts behind Cyber Security Risks for Industrial Control Systems , 2004 .