To Make a Robot Secure: An Experimental Analysis of Cyber Security Threats Against Teleoperated Surgical Robots.
Tamara BonaciJeffrey HerronTariq YusufJunjie YanTadayoshi KohnoHoward Jay ChizeckPublished in: CoRR (2015)
Keyphrases
- security threats
- security issues
- mobile robot
- key management
- security mechanisms
- human robot interaction
- multi robot
- robotic systems
- minimally invasive surgery
- autonomous robots
- humanoid robot
- security measures
- sensitive data
- service robots
- robot assisted
- real robot
- robot control
- robotic arm
- force feedback
- path planning
- resource constrained
- security requirements
- collision free
- smart card
- motion planning
- information security
- wireless sensor networks
- minimally invasive
- ad hoc networks
- cloud computing
- access control
- operating system
- intraoperative
- real time
- vision system
- distributed systems
- robot arm
- data mining
- privacy preserving
- degrees of freedom
- secret key
- human operators
- visual servoing
- sensitive information