2020
DOI: 10.1109/access.2020.2966764
|View full text |Cite
|
Sign up to set email alerts
|

Data Logic Attack on Heavy-Duty Industrial Manipulators

Abstract: The anticipated widespread use of the heavy-duty industrial manipulator (HDIM) makes it an important role in the field of modern industrial automation. Research on the attack of cyber-physical systems based on industrial manipulator vulnerabilities is booming, while there are few studies on the data logic and attack impact for HDIMs. This paper proposes a new cyber-physical attack mechanism named data logic attack mechanism on HDIMs, including network protocol data logic attack, system data integrity logic att… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2022
2022
2025
2025

Publication Types

Select...
5

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 37 publications
0
2
0
Order By: Relevance
“…As attacks against robotic arm systems are intensively studied, the current attacks may involve protocol attacks, sensor data attacks and control system attacks. For example, in [7], Li. et al performed a data logic attack on the EtherCAT communication protocol of a heavy-duty industrial robotic arm, mainly targeting the data packets between the control system and the actuator or between the sensor and the control system, by reordering, dropping or delaying the protocol packets to break the data logic of the communication protocol.…”
Section: Introductionmentioning
confidence: 99%
“…As attacks against robotic arm systems are intensively studied, the current attacks may involve protocol attacks, sensor data attacks and control system attacks. For example, in [7], Li. et al performed a data logic attack on the EtherCAT communication protocol of a heavy-duty industrial robotic arm, mainly targeting the data packets between the control system and the actuator or between the sensor and the control system, by reordering, dropping or delaying the protocol packets to break the data logic of the communication protocol.…”
Section: Introductionmentioning
confidence: 99%
“…The industrial control system can be remotely interacted with and communicated with cloud services [ 1 ], cyber-physical systems [ 2 ], or edge devices in a highly networked environment [ 3 ]. Cyber-attacks are increasingly becoming a threat to ICS; thus, their security is critical [ 4 , 5 ]. Once an essential piece of equipment experiences a safety incident, it causes a shutdown of the system and even causes casualties [ 6 ].…”
Section: Introductionmentioning
confidence: 99%