2017
DOI: 10.1016/j.cose.2017.06.013
|View full text |Cite
|
Sign up to set email alerts
|

Empirical analysis of cyber-attacks to an indoor real time localization system for autonomous robots

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
6
3

Relationship

1
8

Authors

Journals

citations
Cited by 23 publications
(11 citation statements)
references
References 9 publications
0
11
0
Order By: Relevance
“…In case of the safety and security related combined integrity level framework in light of the classical automotive sector related architecture, the factor of controllability becomes more complex, since the controllability of a security incident is strongly affected by its detectability and treatability. [22]. Actually, in case of the combined field of safety and security, with the detection and the treatment of a given attack the whole control process can be performed.…”
Section: Discussionmentioning
confidence: 99%
“…In case of the safety and security related combined integrity level framework in light of the classical automotive sector related architecture, the factor of controllability becomes more complex, since the controllability of a security incident is strongly affected by its detectability and treatability. [22]. Actually, in case of the combined field of safety and security, with the detection and the treatment of a given attack the whole control process can be performed.…”
Section: Discussionmentioning
confidence: 99%
“…The red markers in the Figure 1a show the location in the apartment of the Anchors during the experiments. The distribution of the Anchors has been chosen following the method shown in [16]. Figure 1b shows the Tag of the KIO device on the Orbi-One robot, described below, and an Anchor anchored on the roof of the apartment.…”
Section: Kio Rtlsmentioning
confidence: 99%
“…The algorithm relies on machine learning and rule tracking methods. Papers [30], [31] present algorithms which are also based on machine learning. This work, however, uses them to secure the Real-Time Locating System (RTLS).…”
Section: Mobile Robot Cyber-security Surveymentioning
confidence: 99%