2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC) 2016
DOI: 10.1109/smc.2016.7844931
|View full text |Cite
|
Sign up to set email alerts
|

Increasing ROS 1.x communication security for medical surgery robot

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 17 publications
(6 citation statements)
references
References 3 publications
0
6
0
Order By: Relevance
“…Roland Dóczi et al [ 23 ] proposed a security enhancement solution for ROS-based medical surgical robots. The author used authorization and authentication (AA) to eliminate security problems arising from ROS.…”
Section: Related Workmentioning
confidence: 99%
“…Roland Dóczi et al [ 23 ] proposed a security enhancement solution for ROS-based medical surgical robots. The author used authorization and authentication (AA) to eliminate security problems arising from ROS.…”
Section: Related Workmentioning
confidence: 99%
“…We further assume the underlying OS and ROS core libraries are trusted: the operational flow and data transmission are well protected, and the isolation scheme is correctly implemented so the malicious nodes are not able to hijack the honest ones or the privileged systems. How to enhance the security of the ROS core libraries [32,[38][39][40] and mitigate vulnerabilities from networks [41][42][43][44], sensors [45][46][47][48][49][50][51][52][52][53][54][55][56], actuators [57,58] and controllers [59] are orthogonal to our work.…”
Section: Threat Model and Problem Scopementioning
confidence: 99%
“…Robotic Security. Existing research on robotic security has mainly focused on traditional security issues in robot systems, e.g., network communication [38][39][40], denial-of-service attacks [32] and software vulnerabilities [59,[86][87][88][89]. In addition, adversaries can also spoof the sensory data ( [45][46][47][48][49][50][51][52][53][54][55][56]), fake the actuator signals [58], or tamper with the micro-controller input [59].…”
Section: Related Workmentioning
confidence: 99%
“…Dóczi et al [10] proposed for a medical surgery robot based on ROS1 the introduction of authentication and authorization (AA) mechanisms that rely on an additional AA-node to verify the identity of a node in the graph. Their goal was to overcome the delay limitation of other ROS1 oriented security solutions in mission-critical devices.…”
Section: Related Workmentioning
confidence: 99%