Security of Industrial Robots: Vulnerabilities, Attacks, and Mitigations

被引:16
|
作者
Pu, Hongyi [1 ]
He, Liang [2 ]
Cheng, Peng [1 ]
Sun, Mingyang [1 ]
Chen, Jiming [1 ]
机构
[1] Zhejiang Univ, State Key Lab Ind Control Technol, Hangzhou, Peoples R China
[2] Univ Colorado Denver, Denver, CO USA
来源
IEEE NETWORK | 2023年 / 37卷 / 01期
基金
美国国家科学基金会;
关键词
Industrial robots; Service robots; Robot sensing systems; Industrial engineering; Access control; Manufacturing; Cyber-physical systems;
D O I
10.1109/MNET.116.2200034
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Industrial robots are prototypical cyber-physical systems that are widely deployed in smart and automated manufacturing systems. Industrial robots perform physical operations (picking-and-placing) based on their interactions with other devices in manufacturing systems via the manufacturing network. However, the networking of industrial robots also magnifies their risks to cyber attacks that endanger the physical world, for example, damaging manufacturing devices, degrading production quality/efficiency, or even hurting human operators. To protect industrial robots, a variety of security solutions have been proposed based on the robot's physical model, operation data, side channel information, and so on. In this article, we first summarize the literature of industrial robot security from perspectives of vulnerabilities, attacks, and existing security solutions. We also analyze the main challenges and difficulties hindering the development of robot security, including the lack of security awareness, lack of testbeds, the usually proprietary robot firmware/protocols, and limited on-board computing resources. Moreover, in order to facilitate the security research of industrial robots, we provide a dataset containing both normal and abnormal operation data of robots.
引用
收藏
页码:111 / 117
页数:7
相关论文
共 50 条
  • [41] Security Risk Analysis based on probability of system failure, attacks and Vulnerabilities
    Kbar, Ghassan
    2009 IEEE/ACS INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1 AND 2, 2009, : 874 - 879
  • [42] Memcached DDoS Exploits: Operations, Vulnerabilities, Preventions and Mitigations
    Singh, Kulvinder
    Singh, Ajit
    PROCEEDINGS ON 2018 IEEE 3RD INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND SECURITY (ICCCS), 2018, : 171 - 179
  • [43] FPGA Based Robots for Industrial Security and Application
    Bachate, Pawan Nandkumar
    Mahamuni, Shubhangi M.
    2016 IEEE INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ELECTRONICS, INFORMATION & COMMUNICATION TECHNOLOGY (RTEICT), 2016, : 1757 - 1760
  • [44] An Implementation of Convergence Security Solution for Overcoming of Security Vulnerabilities in Industrial Control Communication Network
    Lee, June-Kyoung
    Lee, Seong-Woo
    Lee, Kyoung-Hak
    WIRELESS PERSONAL COMMUNICATIONS, 2019, 105 (02) : 545 - 565
  • [45] An Implementation of Convergence Security Solution for Overcoming of Security Vulnerabilities in Industrial Control Communication Network
    June-Kyoung Lee
    Seong-Woo Lee
    Kyoung-Hak Lee
    Wireless Personal Communications, 2019, 105 : 545 - 565
  • [46] BadSAM: Exploring Security Vulnerabilities of SAM via Backdoor Attacks (Student Abstract)
    Guan, Zihan
    Hu, Mengxuan
    Zhou, Zhongliang
    Zhang, Jielu
    Li, Sheng
    Liu, Ninghao
    THIRTY-EIGTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, VOL 38 NO 21, 2024, : 23506 - 23507
  • [47] Security Threats from Bitcoin Wallet Smartphone Applications: Vulnerabilities, Attacks, and Countermeasures
    Hu, Yiwen
    Wang, Sihan
    Tu, Guan-Hua
    Xiao, Li
    Xie, Tian
    Lei, Xinyu
    Li, Chi-Yu
    PROCEEDINGS OF THE ELEVENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY '21), 2021, : 89 - 100
  • [48] Security Vulnerabilities, Attacks, Countermeasures, and Regulations of Networked Medical Devices-A Review
    Yaqoob, Tehreem
    Abbas, Haider
    Atiquzzaman, Mohammed
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (04): : 3723 - 3768
  • [49] A Review on C3I Systems' Security: Vulnerabilities, Attacks, and Countermeasures
    Ahmad, Hussain
    Dharmadasa, Isuru
    Ullah, Faheem
    Babar, Muhammad Ali
    ACM COMPUTING SURVEYS, 2023, 55 (09)
  • [50] Security Vulnerabilities and Countermeasures against Jamming Attacks in Wireless Sensor Networks: A Survey
    Jaitly, Sunakshi
    Malhotra, Harshit
    Bhushan, Bharat
    2017 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATIONS AND ELECTRONICS (COMPTELIX), 2017, : 559 - 564