Research Article
Cyberattacks on Self-Driving Cars and Surgical and Eldercare Robots
Table 2
Robots attacks and their prevention methods.
| Reference | Robots | Attacks | Prevention method |
| Analyzing cyber physical threats on robotic platforms [5] | Surgical robots | DOS attack – integrity attacks | Providing an end-to-end encryption |
| Targeted attacks on teleoperated surgical robots [22] | Surgical robots | Injection of malicious control commands to the robot | Dynamic model-based detection and robot safety mechanisms |
| In the case of Raven-II surgical robots [23] | Surgical robots | Exploitation of ROS vulnerabilities and implement smart self-learning malware | Suggesting that the applications can be secured in the implementation phase |
| Cybersecurity issues in robotics [24] | Eldercare robots | Gaining control of the eldercare robot to monitor its user looking for data | Standardized operating system |
| Trajectory privacy attack on autonomous driving [30] | Self-driving cars | Trajectory privacy attack | — |
| Cybersecurity in autonomous cars [31] | Self-driving cars | OS upgrade attack | — |
| Risk and opportunity governance of autonomous cars [33] | Self-driving cars | Services attack | — |
| Contactless attacks against sensors of self-driving [34] | Self-driving cars | Sensor attacks | Software and hardware countermeasures that will improve sensor resilience against these attacks |
|
|