Understanding and addressing cybersecurity challenges in robotics is crucial

Robots are now widely used in our society, but as their numbers grow, so does the incidence of cybersecurity attacks targeting them. Therefore, it is essential to examine the cybersecurity challenges associated with robotics to provide robots with the protection they require in today’s world.

Cybersecurity vulnerabilities can emerge during the development of robot platforms, applications, hardware, and sensors, among other components. However, robot users can also create issues through their own actions. Potential problems can also arise from the actions of cybercriminals. Numerous studies on robotics cybersecurity reveal that criminals are adept at compromising the integrity, availability, and confidentiality of robotic systems.

The articles reviewed for this paper indicate that criminals often target not only the theft of information but also interference with the wireless networks of robotic devices, manipulation of robot behavior, commands, or command chains, alteration of information contained within robots, physical damage, and espionage activities.

Although many researchers are addressing cybersecurity issues in robotics, the field still requires greater attention and study. For instance, it is crucial to answer the question: which components of robots are most vulnerable to cyberattacks and therefore require additional protection?

Agricultural robots, often performing tasks outdoors, are particularly susceptible to physical attacks. Rescue robots, in contrast, are highly vulnerable to wireless interference due to their reliance on wireless network control systems, while industrial robots may pose a threat to their operating environments if criminals gain access to their source code.

Ensuring the safety of robots is thus paramount. For example, implementing artificial intelligence in robotics should be thoroughly investigated, as it could significantly enhance the resilience of robots. Weak or absent authentication, encryption, and physical protection are frequently the root causes of poor cybersecurity in robotics; addressing these deficiencies would likely result in significant improvements. Additionally, examining forensic methods applicable to cybersecurity could yield fruitful insights into enhancing the cybersecurity landscape for robotics.

Do you want to know more? Read (in Finnish) about this topic in Centria Bulletin:
https://centriabulletin.fi/robotiikan-kyberturvallisuusongelmien-ymmartaminen-ja-suojan-luominen-on-tarkeaa/

Centria Bulletin (ISSN 2489-3714) is an online journal where the article was first published.

Tom Tuunainen
R&D Developer
Centria University of Applied Sciences
Tel. +358 40 681 7207

References

Alemzadeh, H., Chen, D., Li, X., Kesavadas, T., Kalbarczyk, Z. T. & Iyer, R. K. 2016. Targeted Attacks on Teleoperated Surgical Robots: Dynamic Model-Based Detection and Mitigation. 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Toulouse, France, 395-406. Available at: https://doi.org/10.1109/DSN.2016.43

Cornelius, G., Caire, P., Hochgeschwender, N., Olivares-Mendez, M. A., Esteves-Verissimo, P., Völp, M. & Voos, H. 2018. A Perspective of Security for Mobile Service Robots. In A. Ollero, A. Sanfeliu, L. Montano, N. Lau & C. Cardeira (eds) ROBOT 2017: Third Iberian Robotics Conference. Advances in Intelligent Systems and Computing, 693, 88–100. Available at: https://doi.org/10.1007/978-3-319-70833-1_8

Dóczi, R., Kis, F., Sütö, B., Póser, V., Kronreif, G., Jósvai, E. & Kozlovszky, M. 2016. Increasing ros 1.x communication security for medical surgery robot. 2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC), Budapest, Hungary, 004444-004449. Available at: https://doi.org/10.1109/SMC.2016.7844931

Fosch-Villaronga, E., & Mahler, T. 2021. Cybersecurity, safety and robots: Strengthening the link between cybersecurity and safety in the context of care robots. Computer Law & Security Review, 41, 105528. Available at: https://doi.org/10.1016/j.clsr.2021.105528

Jain, S. & Doriya, R. 2019. Security Issues and Solutions in Cloud Robotics: A Survey. In M. Prateek, D. Sharma, R. Tiwari, R. Sharma, K. Kumar & N. Kumar (eds) Next Generation Computing Technologies on Computational Intelligence (NGCT 2018). Communications in Computer and Information Science, 922, 64–76. Available at: https://doi.org/10.1007/978-981-15-1718-1_6

Khalid, A., Kirisci, P., Khan, Z. H., Ghrairi, Z., Thoben, K. D. & Pannek, J. 2018. Security framework for industrial collaborative robotic cyber-physical systems. Computers in Industry, 97, 132–145. Available at: https://doi.org/10.1016/j.compind.2018.02.009

Petit, J. & Shladover, S. E. 2015. Potential cyberattacks on automated vehicles. IEEE Transactions on Intelligent Transportation Systems, 16 (2), 546-556. Available at: https://doi.org/10.1109/TITS.2014.2342271

Pogliani, M., Quarta, D., Polino, M., Vittone, M., Maggi, F. & Zanero, S. 2019. Security of controlled manufacturing systems in the connected factory: The case of industrial robots. Journal of Computer Virology and Hacking Techniques, 15, 161–175. Available at: https://doi.org/10.1007/s11416-019-00329-8

Sabaliauskaite, G., Ng, G., Ruths, J. & Mathur, A. 2017. A comprehensive approach, and a case study, for conducting attack detection experiments in cyber–physical systems. Robotics and Autonomous Systems, 98, 174–191. Available at: https://doi.org/10.1016/j.robot.2017.09.018

Staffa, M., Mazzeo, G., & Sgaglione, L. 2018. Hardening ROS via Hardware-assisted Trusted Execution Environment. 27th IEEE International Symposium on Robot and Human Interactive Communication (RO-MAN), Nanjing, China, 491-494. Available at: https://doi.org/10.1109/ROMAN.2018.8525696

Wang, C., Tok, Y. C., Poolat, R., Chattopadhyay, S., & Elara, M. R. 2021. How to secure autonomous mobile robots? An approach with fuzzing, detection and mitigation. Journal of Systems Architecture, 112, 101838. Available at: https://doi.org/10.1016/j.sysarc.2020.101838

Yaacoub, J. P., Noura, H., Salman, O., & Chehab, A. 2020. Security analysis of drones systems: Attacks, limitations, and recommendations. Internet of Things, 11, 100218. Available at: https://doi.org/10.1016/j.iot.2020.100218

Yaacoub, J. P. A., Noura, H. N., Salman, O., & Chehab, A. 2021. Robotics cyber security: Vulnerabilities, attacks, countermeasures, and recommendations. International Journal of Information Security, 115–158. Available at: https://doi.org/10.1007/s10207-021-00545-8