Research Article

Cyberattacks on Self-Driving Cars and Surgical and Eldercare Robots

Table 1

Weaknesses and enhancements in ROS.

ReferenceROS security issuesEnhancements

Application-level security for ROS-based applications [14]Unauthorized nodes from recording dataApplication-level security architecture
A preliminary cyber-physical security assessment of the robot operating system (ROS) [15]Unauthorized publishing unauthorized useCyber-physical security “honeypot”
ROSploit: cybersecurity tool for ROS [16]Cryptography issues in ROSSROS
Cybersecurity in autonomous systems: hardening ROS using encrypted communications and semantic rules [17]Cryptography issues in ROSEncrypted communications
Secure and secret cooperation of robotic swarms by using Merkle trees [18]Secure and secret robotMerkle trees
Rosch: real-time scheduling framework for ROS [19]ROS does not guarantee real-time performanceROSCH
Detecting and mitigating robotic cybersecurity risks (IGI Global [20])EavesdroppingData distribution service (DDS)