Please use this identifier to cite or link to this item:
https://dspace.ncfu.ru/handle/20.500.12258/19382| Title: | Analysis of attacks on robotic operation system |
| Authors: | Azarov, I. V. Азаров, И. В. |
| Keywords: | ROS security tool;Security mechanisms;Security challenges;;Secure framework;Secure-ROS;ROS tools;Modular framework;Robotic operating system;ROS systems;Robotics |
| Issue Date: | 2022 |
| Publisher: | CEUR-WS |
| Citation: | Basan, E., Sushkin, N., Khabarov, O., Makarevich, O., Azarov, I. Analysis of attacks on robotic operation system // CEUR Workshop Proceedings. - 2022. - Том 3094. - Стр.: 41 - 48 |
| Series/Report no.: | CEUR Workshop Proceedings |
| Abstract: | The latest version of ROS was released on May 23 this year, and according to the developers, there will be no more new versions. The future belongs to ROS2.mA robots or robotic system is often a modular system where each module communicates with other modules. In ROS terminology, such modules are called nodes, and they can communicate in a subscriber-publisher or client-server fashion. There is also a special Master node, which is responsible for the initial linking of ordinary nodes. ROS was not designed with security considerations in mind, i.e. ensuring the «three pillars» - confidentiality, integrity or authenticity. Consequently, ROS becomes a tidbit for attackers. They can listen to traffic; Disable individual nodes; Replace nodes. The situation was further simplified when utilities for auditing the security of ROS systems appeared in the public domain: Roschaos, Rospento. In addition, the developers of ROS applications independently implemented protection measures to prevent these threats. |
| URI: | http://hdl.handle.net/20.500.12258/19382 |
| Appears in Collections: | Статьи, проиндексированные в SCOPUS, WOS |
Files in This Item:
| File | Size | Format | |
|---|---|---|---|
| scopusresults 2121 .pdf Restricted Access | 63.61 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.