Robotic technology has been rapidly transforming world economies in terms of business productivity and profitability. The market is shifting towards optimisation and automation – not just for the warehousing and manufacturing sectors, but even non-industrial areas such as defence, farming, hospitals, offices and even schools. The availability of open source platforms, falling hardware and electronics prices, prompt prototyping and convergence of technologies are some of the major reasons for this new revolution. However, cyber security and physical threats are high-priority areas when critical applications and missions are involved. Robotic technology has been rapidly transforming world economies in terms of business productivity and profitability. However, security threats are not always top of mind. Open source platforms, falling hardware and electronics prices and fast prototyping are some of the reasons for this new revolution. Cyber security and physical threats are high-priority areas when critical applications and missions are involved. Dr Akashdeep Bhardwaj, Dr Vinay Avasthi and Dr Sam Goundar analyse the threats to robotic systems and map the CIA model to boost security resilience.
[1]
A. A. Sentsov,et al.
Electronic Methods to Protect Unmanned Aerial Vehicles from Seizing Control
,
2018,
2018 Wave Electronics and its Application in Information and Telecommunication Systems (WECONF).
[2]
Heikki Laaki,et al.
Prototyping a Digital Twin for Real Time Remote Control Over Mobile Networks: Application of Remote Surgery
,
2019,
IEEE Access.
[3]
Stefano Zanero.
When Cyber Got Real: Challenges in Securing Cyber-Physical Systems
,
2018,
2018 IEEE SENSORS.
[4]
Stjepan Bogdan,et al.
Centroid Vectoring for Attitude Control of Floating Base Robots: From Maritime to Aerial Applications
,
2019,
IEEE Access.
[5]
Tarik Taleb,et al.
A Survey on Emerging SDN and NFV Security Mechanisms for IoT Systems
,
2019,
IEEE Communications Surveys & Tutorials.
[6]
M. Shamim Hossain,et al.
Emotion-Aware Multimedia Systems Security
,
2019,
IEEE Transactions on Multimedia.
[7]
Yu Cheng,et al.
Security Analysis of Mobile Device-to-Device Network Applications
,
2019,
IEEE Internet of Things Journal.