IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Cyber Security Risks in Robotics

Cyber Security Risks in Robotics
View Sample PDF
Author(s): Ishaani Priyadarshini (KIIT University, India)
Copyright: 2017
Pages: 16
Source title: Detecting and Mitigating Robotic Cyber Security Risks
Source Author(s)/Editor(s): Raghavendra Kumar (LNCT Group of College, India), Prasant Kumar Pattnaik (KIIT University (Deemed), India)and Priyanka Pandey (LNCT Group of College, India)
DOI: 10.4018/978-1-5225-2154-9.ch022

Purchase

View Cyber Security Risks in Robotics on the publisher's website for pricing and purchasing information.

Abstract

With technology flourishing at a rapid rate, humans have been able to achieve considerable heights of success. Accomplishment of tasks nowadays is either a click away or a command away in most of the technological arenas. One such realm of technology is that of Robotics which has been there for almost a century and continues advancing day by day. The evolution of robotics has ranged from the basic remote controlled systems to humanoid robots. With applications as well as accuracy increasing for every new system implemented, security risks too have been making their way into the new invention. Since different robots have been created for different purposes in different fields like the defense, household, medical or the space, protecting systems against their exploitation is of utmost importance as these fields incorporate sensitive as well as intricate tasks. This chapter focuses on the security aspects of Robotics. The necessity of Cyber security in Robotics has been explored by taking different kinds of robots used in different fields. The current state of Robotics is vulnerable to many risks and several case studies have been highlighted to support the need of securing Robotics by identifying several risks to which it is vulnerable. Apart from that mitigation strategies have been discussed to secure the domain of Robotics. An attack comparison has been made for three robots in analyzing them against the vulnerabilities faced by them.

Related Content

Rashmi Rani Samantaray, Zahira Tabassum, Abdul Azeez. © 2024. 32 pages.
Sanjana Prasad, Deepashree Rajendra Prasad. © 2024. 25 pages.
Deepak Varadam, Sahana P. Shankar, Aryan Bharadwaj, Tanvi Saxena, Sarthak Agrawal, Shraddha Dayananda. © 2024. 24 pages.
Tarun Kumar Vashishth, Vikas Sharma, Kewal Krishan Sharma, Bhupendra Kumar, Sachin Chaudhary, Rajneesh Panwar. © 2024. 29 pages.
Mrutyunjaya S. Hiremath, Rajashekhar C. Biradar. © 2024. 30 pages.
C. L. Chayalakshmi, Mahabaleshwar S. Kakkasageri, Rajani S. Pujar, Nayana Hegde. © 2024. 30 pages.
Amit Kumar Tyagi. © 2024. 29 pages.
Body Bottom