Please use this identifier to cite or link to this item: https://dspace.ncfu.ru/handle/20.500.12258/19382
Title: Analysis of attacks on robotic operation system
Authors: Azarov, I. V.
Азаров, И. В.
Keywords: ROS security tool;Security mechanisms;Security challenges;;Secure framework;Secure-ROS;ROS tools;Modular framework;Robotic operating system;ROS systems;Robotics
Issue Date: 2022
Publisher: CEUR-WS
Citation: Basan, E., Sushkin, N., Khabarov, O., Makarevich, O., Azarov, I. Analysis of attacks on robotic operation system // CEUR Workshop Proceedings. - 2022. - Том 3094. - Стр.: 41 - 48
Series/Report no.: CEUR Workshop Proceedings
Abstract: The latest version of ROS was released on May 23 this year, and according to the developers, there will be no more new versions. The future belongs to ROS2.mA robots or robotic system is often a modular system where each module communicates with other modules. In ROS terminology, such modules are called nodes, and they can communicate in a subscriber-publisher or client-server fashion. There is also a special Master node, which is responsible for the initial linking of ordinary nodes. ROS was not designed with security considerations in mind, i.e. ensuring the «three pillars» - confidentiality, integrity or authenticity. Consequently, ROS becomes a tidbit for attackers. They can listen to traffic; Disable individual nodes; Replace nodes. The situation was further simplified when utilities for auditing the security of ROS systems appeared in the public domain: Roschaos, Rospento. In addition, the developers of ROS applications independently implemented protection measures to prevent these threats.
URI: http://hdl.handle.net/20.500.12258/19382
Appears in Collections:Статьи, проиндексированные в SCOPUS, WOS

Files in This Item:
File SizeFormat 
scopusresults 2121 .pdf
  Restricted Access
63.61 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.