Research Article

Cyberattacks on Self-Driving Cars and Surgical and Eldercare Robots

Table 2

Robots attacks and their prevention methods.

ReferenceRobotsAttacksPrevention method

Analyzing cyber physical threats on robotic platforms [5]Surgical robotsDOS attack – integrity attacksProviding an end-to-end encryption

Targeted attacks on teleoperated surgical robots [22]Surgical robotsInjection of malicious control commands to the robotDynamic model-based detection and robot safety mechanisms

In the case of Raven-II surgical robots [23]Surgical robotsExploitation of ROS vulnerabilities and implement smart self-learning malwareSuggesting that the applications can be secured in the implementation phase

Cybersecurity issues in robotics [24]Eldercare robotsGaining control of the eldercare robot to monitor its user looking for dataStandardized operating system

Trajectory privacy attack on autonomous driving [30]Self-driving carsTrajectory privacy attack

Cybersecurity in autonomous cars [31]Self-driving carsOS upgrade attack

Risk and opportunity governance of autonomous cars [33]Self-driving carsServices attack

Contactless attacks against sensors of self-driving [34]Self-driving carsSensor attacksSoftware and hardware countermeasures that will improve sensor resilience against these attacks