Security of Industrial Robots: Vulnerabilities, Attacks, and Mitigations

被引:16
|
作者
Pu, Hongyi [1 ]
He, Liang [2 ]
Cheng, Peng [1 ]
Sun, Mingyang [1 ]
Chen, Jiming [1 ]
机构
[1] Zhejiang Univ, State Key Lab Ind Control Technol, Hangzhou, Peoples R China
[2] Univ Colorado Denver, Denver, CO USA
来源
IEEE NETWORK | 2023年 / 37卷 / 01期
基金
美国国家科学基金会;
关键词
Industrial robots; Service robots; Robot sensing systems; Industrial engineering; Access control; Manufacturing; Cyber-physical systems;
D O I
10.1109/MNET.116.2200034
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Industrial robots are prototypical cyber-physical systems that are widely deployed in smart and automated manufacturing systems. Industrial robots perform physical operations (picking-and-placing) based on their interactions with other devices in manufacturing systems via the manufacturing network. However, the networking of industrial robots also magnifies their risks to cyber attacks that endanger the physical world, for example, damaging manufacturing devices, degrading production quality/efficiency, or even hurting human operators. To protect industrial robots, a variety of security solutions have been proposed based on the robot's physical model, operation data, side channel information, and so on. In this article, we first summarize the literature of industrial robot security from perspectives of vulnerabilities, attacks, and existing security solutions. We also analyze the main challenges and difficulties hindering the development of robot security, including the lack of security awareness, lack of testbeds, the usually proprietary robot firmware/protocols, and limited on-board computing resources. Moreover, in order to facilitate the security research of industrial robots, we provide a dataset containing both normal and abnormal operation data of robots.
引用
收藏
页码:111 / 117
页数:7
相关论文
共 50 条
  • [1] Security of CCTV and Video Surveillance Systems: Threats, Vulnerabilities, Attacks, and Mitigations
    Costin, Andrei
    TRUSTED'16: PROCEEDINGS OF THE INTERNATIONAL WORKSHOP ON TRUSTWORTHY EMBEDDED DEVICES, 2016, : 45 - 54
  • [2] SCADA communication protocols: vulnerabilities, attacks and possible mitigations
    Durga Samanth Pidikiti
    Rajesh Kalluri
    R. K. Senthil Kumar
    B. S. Bindhumadhava
    CSI Transactions on ICT, 2013, 1 (2) : 135 - 141
  • [3] A trustworthy security model for IIoT attacks on industrial robots
    Li, Lianpeng
    Zhao, Xu
    Fan, Junfang
    Liu, Fuchao
    Liu, Ning
    Zhao, Hui
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2024, 153 : 340 - 349
  • [4] Distributed Energy Resources Cybersecurity Outlook: Vulnerabilities, Attacks, Impacts, and Mitigations
    Zografopoulos, Ioannis
    Hatziargyriou, Nikos D.
    Konstantinou, Charalambos
    IEEE SYSTEMS JOURNAL, 2023, 17 (04): : 6695 - 6709
  • [5] A Study on Networked Industrial Robots in Smart Manufacturing: Vulnerabilities, Data Integrity Attacks and Countermeasures
    Shao, Xingmao
    Xie, Lun
    Li, Chiqin
    Wang, Zhiliang
    JOURNAL OF INTELLIGENT & ROBOTIC SYSTEMS, 2023, 109 (03)
  • [6] A Study on Networked Industrial Robots in Smart Manufacturing: Vulnerabilities, Data Integrity Attacks and Countermeasures
    Xingmao Shao
    Lun Xie
    Chiqin Li
    Zhiliang Wang
    Journal of Intelligent & Robotic Systems, 2023, 109
  • [7] Enterprise WLAN Security Flaws Current Attacks and relative Mitigations
    Abo-Soliman, Mohamed A.
    Azar, Marianne A.
    13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018), 2019,
  • [8] Security Analysis of DeFi: Vulnerabilities, Attacks and Advances
    Li, Wenkai
    Bu, Jiuyang
    Li, Xiaoqi
    Chen, Xianyi
    2022 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN (BLOCKCHAIN 2022), 2022, : 488 - 493
  • [9] Hardware Speculation Vulnerabilities and Mitigations
    Swearingen, Nathan
    Hosler, Ryan
    Zou, Xukai
    2021 IEEE 18TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SMART SYSTEMS (MASS 2021), 2021, : 609 - 614
  • [10] Security of the Internet of Things: Vulnerabilities, Attacks, and Countermeasures
    Butun, Ismail
    Osterberg, Patrik
    Song, Houbing
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (01): : 616 - 644