Security of Industrial Robots: Vulnerabilities, Attacks, and Mitigations

被引:16
|
作者
Pu, Hongyi [1 ]
He, Liang [2 ]
Cheng, Peng [1 ]
Sun, Mingyang [1 ]
Chen, Jiming [1 ]
机构
[1] Zhejiang Univ, State Key Lab Ind Control Technol, Hangzhou, Peoples R China
[2] Univ Colorado Denver, Denver, CO USA
来源
IEEE NETWORK | 2023年 / 37卷 / 01期
基金
美国国家科学基金会;
关键词
Industrial robots; Service robots; Robot sensing systems; Industrial engineering; Access control; Manufacturing; Cyber-physical systems;
D O I
10.1109/MNET.116.2200034
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Industrial robots are prototypical cyber-physical systems that are widely deployed in smart and automated manufacturing systems. Industrial robots perform physical operations (picking-and-placing) based on their interactions with other devices in manufacturing systems via the manufacturing network. However, the networking of industrial robots also magnifies their risks to cyber attacks that endanger the physical world, for example, damaging manufacturing devices, degrading production quality/efficiency, or even hurting human operators. To protect industrial robots, a variety of security solutions have been proposed based on the robot's physical model, operation data, side channel information, and so on. In this article, we first summarize the literature of industrial robot security from perspectives of vulnerabilities, attacks, and existing security solutions. We also analyze the main challenges and difficulties hindering the development of robot security, including the lack of security awareness, lack of testbeds, the usually proprietary robot firmware/protocols, and limited on-board computing resources. Moreover, in order to facilitate the security research of industrial robots, we provide a dataset containing both normal and abnormal operation data of robots.
引用
收藏
页码:111 / 117
页数:7
相关论文
共 50 条
  • [21] A Survey on Ethereum Systems Security: Vulnerabilities, Attacks, and Defenses
    Chen, Huashan
    Pendleton, Marcus
    Njilla, Laurent
    Xu, Shouhuai
    ACM COMPUTING SURVEYS, 2020, 53 (03)
  • [22] Java']Java Deserialization Vulnerabilities and Mitigations
    Seacord, Robert C.
    2017 IEEE CYBERSECURITY DEVELOPMENT (SECDEV), 2017, : 6 - 7
  • [23] Security of Web browser scripting languages: Vulnerabilities, attacks, and remedies
    Anupam, V
    Mayer, A
    PROCEEDINGS OF THE SEVENTH USENIX SECURITY SYMPOSIUM, 1998, : 187 - 199
  • [24] LoRaWAN Security: An Evolvable Survey on Vulnerabilities, Attacks and their Systematic Mitigation
    Hessel, Frank
    Almon, Lars
    Hollick, Matthias
    ACM TRANSACTIONS ON SENSOR NETWORKS, 2022, 18 (04)
  • [25] A Comprehensive Review of Cyber Security Vulnerabilities, Threats, Attacks, and Solutions
    Aslan, Omer
    Aktug, Semih Serkant
    Ozkan-Okay, Merve
    Yilmaz, Abdullah Asim
    Akin, Erdal
    ELECTRONICS, 2023, 12 (06)
  • [26] Exploring Security Vulnerabilities of Deep Learning Models by Adversarial Attacks
    Fu, Xiaopeng
    Gu, Zhaoquan
    Han, Weihong
    Qian, Yaguan
    Wang, Bin
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [27] BLOCKCHAIN APPROACH TO CYBER SECURITY VULNERABILITIES ATTACKS AND POTENTIAL COUNTERMEASURES
    Sambana, Bosubabu
    Ramesh, Yegireddi
    Rao, Molli Srinivasa
    Rao, T. Chalapathi
    Patnaik, N. P. M.
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2020, 14 (01): : 1 - 14
  • [28] Exploring Security Vulnerabilities of Deep Learning Models by Adversarial Attacks
    Fu, Xiaopeng
    Gu, Zhaoquan
    Han, Weihong
    Qian, Yaguan
    Wang, Bin
    Wireless Communications and Mobile Computing, 2021, 2021
  • [29] A Survey on Security Issues, Vulnerabilities and Attacks in Android based Smartphone
    Hur, Jalal B.
    Shamsi, Jawwad A.
    2017 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES (ICICT), 2017, : 40 - 46
  • [30] Big Data: Hadoop framework vulnerabilities, security issues and attacks
    Bhathal, Gurjit Singh
    Singh, Amardeep
    ARRAY, 2019, 1-2