An Analysis of DoS Attack on Robot Operating System
Abstract
Keywords
Supporting Institution
Project Number
References
- [1] Internet: IFR Executive Summary World Robotics 2020 Industrial Robots, Online.https://ifr.org/img/worldrobotics/Executive_Summary_WR_2020_Industrial_Robots_1.pdf, (2020).
- [2] Quigley, M., Conley, K., Gerkey, B., Faust, J., Foote, T., Leibs, J., Berger, E., Wheeler, R., and Ng, A., "ROS: an open-source Robot Operating System", ICRA Workshop on Open Source Software, Kobe, 5, (2009).
- [3] Rivera, S., Lagraa, S., and State, R., "ROSploit: Cybersecurity tool for ROS", 2019 Third IEEE International Conference on Robotic Computing (IRC), Naples, 415-416, (2019).
- [4] Alemzadeh, H., Chen, D., Lewis, A., Kalbarczyk, Z., Raman, J., Leveson, N., and Iyer, R., "Systems-theoretic safety assessment of robotic telesurgical systems", International Conference on Computer Safety, Reliability, and Security, Springer, Cham, 213-227, (2014).
- [5] Dieber, B., Breiling, B., Taurer, S., Kacianka, S., Rass, S., and Schartner, P., "Security for the Robot Operating System", Robotics and Autonomous Systems, 98: 192-203, (2017).
- [6] White, R., Christensen, D., Henrik, I., and Quigley, D., "SROS: Securing ROS over the wire, in the graph, and through the kernel", ArXiv, abs1611.07060, (2016).
- [7] Narayanan, V., and Bobba, R. B., "Learning Based Anomaly Detection for Industrial Arm Applications", Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and Privacy, Toronto, 13-23, (2018).
- [8] Dieber, B., White, R., Taurer, S., Breiling, B., Caiazza, G., Christensen, H., and Cortesi, A., "Penetration testing ROS", Robot Operating System (ROS), Springer, Cham, (2020).
Details
Primary Language
English
Subjects
Engineering
Journal Section
Research Article
Authors
Elif Değirmenci
*
0000-0001-8772-4543
Türkiye
Yunus Sabri Kırca
0000-0001-5938-2822
Türkiye
Esra N. Yolaçan
0000-0002-0008-1037
Türkiye
Ahmet Yazici
0000-0001-5589-2032
Türkiye
Publication Date
September 1, 2023
Submission Date
July 30, 2021
Acceptance Date
July 18, 2022
Published in Issue
Year 2023 Volume: 36 Number: 3
Cited By
Formal Analysis and Detection for ROS2 Communication Security Vulnerability
Electronics
https://doi.org/10.3390/electronics13091762DCWM-LSTM: A Novel Attack Detection Framework for Robotic Arms
IEEE Access
https://doi.org/10.1109/ACCESS.2025.3535225A systematic review on cybersecurity of robotic systems: vulnerabilities trends, threats, attacks, challenges, and proposed framework
International Journal of Information Security
https://doi.org/10.1007/s10207-025-01041-zTemporal Windowed and Internal Feature (TWIF) Transformer for Attack Detection in Robotics
IEEE Access
https://doi.org/10.1109/ACCESS.2026.3674720THREATS, VULNERABILITIES AND MEASURES IN ROBOT COMMUNICATION SECURITY: A REVIEW
Kahramanmaraş Sütçü İmam Üniversitesi Mühendislik Bilimleri Dergisi
https://doi.org/10.17780/ksujes.1798745