Research Article
Cyberattacks on Self-Driving Cars and Surgical and Eldercare Robots
Table 1
Weaknesses and enhancements in ROS.
| Reference | ROS security issues | Enhancements |
| Application-level security for ROS-based applications [14] | Unauthorized nodes from recording data | Application-level security architecture | A preliminary cyber-physical security assessment of the robot operating system (ROS) [15] | Unauthorized publishing unauthorized use | Cyber-physical security “honeypot” | ROSploit: cybersecurity tool for ROS [16] | Cryptography issues in ROS | SROS | Cybersecurity in autonomous systems: hardening ROS using encrypted communications and semantic rules [17] | Cryptography issues in ROS | Encrypted communications | Secure and secret cooperation of robotic swarms by using Merkle trees [18] | Secure and secret robot | Merkle trees | Rosch: real-time scheduling framework for ROS [19] | ROS does not guarantee real-time performance | ROSCH | Detecting and mitigating robotic cybersecurity risks (IGI Global [20]) | Eavesdropping | Data distribution service (DDS) |
|
|