Chapter

Cyber Security Risks in Robotics

Authors:
To read the full-text of this research, you can request a copy directly from the author.

Abstract

With technology flourishing at a rapid rate, humans have been able to achieve considerable heights of success. Accomplishment of tasks nowadays is either a click away or a command away in most of the technological arenas. One such realm of technology is that of Robotics which has been there for almost a century and continues advancing day by day. The evolution of robotics has ranged from the basic remote controlled systems to humanoid robots. With applications as well as accuracy increasing for every new system implemented, security risks too have been making their way into the new invention. Since different robots have been created for different purposes in different fields like the defense, household, medical or the space, protecting systems against their exploitation is of utmost importance as these fields incorporate sensitive as well as intricate tasks. This chapter focuses on the security aspects of Robotics. The necessity of Cyber security in Robotics has been explored by taking different kinds of robots used in different fields. The current state of Robotics is vulnerable to many risks and several case studies have been highlighted to support the need of securing Robotics by identifying several risks to which it is vulnerable. Apart from that mitigation strategies have been discussed to secure the domain of Robotics. An attack comparison has been made for three robots in analyzing them against the vulnerabilities faced by them.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the author.

... e use of humanoid robots is increasing exponentially; therefore, the risks associated with robotics have also increased. Cybersecurity breaches in robots will harm robotics [20]. ere is a possible risk involved in operating on patients by giving commands to robots. ...
... e system is vulnerable to a man-in-the-middle attack if no encryption or authentication method is in place. When an illegal party gains control of a surgical robot, the results could be disastrous [20] and are illustrated in Figure 1. Due to the reliance on network connectivity to provide surgical robots at a distance, the robots are vulnerable to cyberattacks and critical data spills. ...
Article
Full-text available
Robots have improved human life and increased the efficiency of performance in tasks that require precision and effort. For example, surgical robots are now used to perform precise surgical procedures and give accurate results. Moreover, robots are also used in elderly care to ease their lives. Perhaps there can even be self-driving cars that could deliver a person to their destination without the need of a driver. So it is very important to mention that these robots should be secure in terms of security for human life. Hence, this paper aims to explore the published studies on robots and their various security vulnerabilities. We review the most prominent weaknesses in the robotic operating system (ROS) and discuss some types of attacks against these robots. Also, this paper discusses the security enhancements to protect ROS that researchers have suggested protecting against some of the attacks and vulnerabilities that may occur on these robots. The primary findings of this work are to generate system copies for backup as well as encryption to protect against information disclosure. Also, a dynamic model is needed to detect and mitigate attacks that may occur in a physical manner, such as injecting malware into robots.
... Veruggio [80]. Cybersecurity Identification Dedeke [27]; NIST [58]; Priyadarshini [61]. Protection Detection Response Recovery contains the identified latent dimensions and references for each sub-dimension. ...
... Cybersecurity is the process of protecting information by preventing, detecting, and responding to attacks [58]. As technology grows, robots are increasingly connected to the network, constantly exchanging information [61]. This makes robots exposed to cyber attacks that can lead to data leakage, malfunction, or even damage to people or property. ...
Article
Full-text available
Human-Robot Collaboration (HRC) is a form of direct interaction between humans and robots. The objective of this type of interaction is to perform a task by combining the skills of both humans and robots. HRC is characterized by several aspects, related both to robots and humans. Many works have focused on the study of specific aspects related to HRC, e.g., safety, task organization. However, a major issue is to find a general framework to evaluate the collaboration between humans and robots considering all the aspects of the interaction. The goals of this paper are the following: (i) highlighting the different latent dimensions that characterize the HRC problem and (ii) constructing a conceptual framework to evaluate and compare different HRC configuration profiles. The description of the methodology is supported by some practical examples.
... Due to the increasing demand in complex manufacturing processes, industrial robots need to possess greater adaptability and intelligence. Presently, in addition to their use in manufacturing, robots are finding applications in healthcare [4], healthcare services [5], agriculture [6], shipbuilding [7], construction [8], national security [9], industrial manipulator [10], and households [11], driving the development of terrain robots and service robots [12]. ...
Article
Full-text available
In the domain of field robotic system, it must deal with several challenges during both design and development durations. This study aims to investigate the whole design of robotic system for the internal inspection of tube. Firstly, the robot configuration is launched to identify the physical dimensions. Owing to the size of tube and the curved trajectory, the estimated parameters and shape of robot could be known. Also, some thresholds are obtained in this design which allows the range of dimensions. Secondly, the kinematic robot is analyzed to compute the flexible motion. Through theoretical computations, its locomotion could be evaluated directly. To realize our design, thirdly the detailed selection of servo motor is introduced in order to provide the powerful drive. Hence, the result of driving computations is shown due to the practical specifications of motor. Correspondingly, the spring which plays a role as damper, is measured to suppress the required torques. This spring ensures the continuous contact between leg of robot and internal wall of tube. As a result of these evaluations, both computer-based model and real-world model have been experimented. To guarantee the effectiveness and feasibility of our approach, three levels of validations are presented. In the numerical simulation, the virtual environment is established to substantiate the robotic locomotion. For the laboratory validation, the hardware robot is confirmed the working abilities as well as some trial results. Lastly, this robot must be exemplified in the real scene such as factory or site construction. From these achievements, it could be obviously seen that our approach is proper and feasible for many applications.
... Süni intellekt məlumatların məxfiliyinin pozulması siyahısında ön sıradadır. [12]-də Sİ-in gizlilik riski araşdırılmışdır. Real zamanda görüntünün emalı insanın şəxsiyyətini müəyyənləşdirir və milyonlarla fərdi məlumatların məxfiliyinin pozulmasına səbəb olur [13,14]. ...
... Artificial Intelligence is at the top of this privacy leaking list. Several researchers have identified the privacy risk of AI [13], [14]. Real-time image processing revels human identity and leaks millions of personal information [15], [16]. ...
... Robots have been an essential part in many domains like the industry, military, research and health [1]. In the Internet of Things (IoT) era, robots are gaining increasing interest to perform critical and non-critical tasks. ...
Article
Full-text available
Robots are becoming increasingly integrated in our daily lives, providing services in civilian, industrial, and military applications. Many of those applications require robots to be remotely operated and controlled through communication channels. This makes the robotic system susceptible to a class of attacks targeting the connection between the controlling client and the robot, which can render the robot unavailable. The objective of our research is to identify, estimate and prioritize the risk associated with attacks targeting the availability of the robotic system. To achieve our objective, we perform an impact oriented semi-quantitative risk assessment of the loss of availability on the well-known PeopleBot™ mobile robot platform. We experimented with several well-known attacks that can target and affect the availability of the robot. To examine the cyber-physical impacts of the attacks on the robotic system, we setup ten-goal test area and constructed 2D map. The robot was programmed to tour the test area while being targeted by cyber-attacks. The physical impacts of the attack are demonstrated in this paper. The results indicate that attacks can potentially lead to loss of availability which may result in serious cyber-physical consequences.
Chapter
The rapid proliferation of drones, coupled with their increasing integration into various aspects of our lives, has brought to the forefront a myriad of ethical considerations in the realm of cybersecurity. This chapter delves deep into the intricate web of ethical challenges surrounding drone cybersecurity, aiming to provide a comprehensive understanding of this critical issue. The introduction sets the stage by highlighting the essential role of ethics in drone cybersecurity, emphasizing the need for responsible decision-making in an age where drones are omnipresent. It lays out the scope, objectives, and key concepts of the research, underscoring the contributions it makes to the field. The core of the chapter explores the ethical principles underpinning cybersecurity and elucidates how these principles can be applied to the domain of drone technology. The authors delve into the delicate balance between security and privacy, discussing the ethical implications of data collection, retention, and surveillance in the context of drones.
Article
Full-text available
Technology has grown more important in our lives, and scientists are developing new products to make people’s life easier and more pleasant. One of these innovations is the humanoid robot. The use of humanoid robots in our daily lives is expanding at an unprecedented rate as robots are being used in different aspects of life. The market is becoming more automated and optimized, Robotics serves as one of the primary instruments used for these reasons. Yet, security continues to pose a concern for robotics. As humanoid robots begin to function "in the open," we must assess the threats they will confront. Through the literature review, researchers found that security assessments were not performed on the robots which cause the robots to be weak against cybersecurity attacks. In this research, we perform different security assessments to identify the vulnerabilities in humanoid robots. Furthermore, different metrics were used to check and perform security assessments on the robot as well as the results of security assessments has been shown. It was shown that humanoid robots are vulnerable as anyone will be able to hack the login credentials of robot’s website as well as there are some open ports in the robot’s network which can be used by the hackers to exploit robot’s working. Based on the results of assessment methods and our findings, we gave the firewall framework which will be helpful to protect the humanoid robot against those security vulnerabilities and attacks.This firewall framework will be able to protect the humanoid robots in aspects of both network and website/webpage exploitation.
Article
Full-text available
This paper presents the development of a full-sized humanoid platform, HART (Human Assistive RoboT), and its control interface for human operators. The main design objective of HART is to enable the robot to change its kinematic dimension adaptively and to drive various types of vehicles in human-centered environments. First, main technical design requirements, kinematic adjustment and ease of fabrication, which were focused during the design and building process of HART platform are introduced with the mechanical and electrical specifications of each joint and link. Second, kinematic analysis of HART’s both lower and upper bodies and how the designed motion trajectories are implemented via its multiple joints in a synchronous way are provided. Third, the control system and its user interface which enable the full-sized humanoid to execute various material handling tasks, such as vehicle driving in this study, are described. Then, test and evaluation processes of the built platform are shown through kinematic adaptability experiments using off-the-shelf vehicles with different sizes. Last, driving capability of HART is demonstrated by experimentations in real world settings which include both indoor and outdoor environments.
Article
Full-text available
Technology has grown more important in our lives, and scientists are developing new products to make people’ s life easier and more pleasant. One of these innovations is the humanoid robot. The use of humanoid robots in our daily lives is expanding at an unprecedented rate as robots are being used in different aspects of life. The market is becoming more automated and optimized, Robotics serves as one of the primary instruments used for these reasons. Yet, security continues to pose a concern for robotics. As humanoid robots begin to function "in the open," we must assess the threats they will confront. Through the literature review, researchers found that security assessments were not performed on the robots which cause the robots to be weak against cybersecurity attacks. In this research, we perform different security assessments to identify the vulnerabilities in humanoid robots. Furthermore, different metrics were used to check and perform security assessments on the robot as well as the results of security assessments has been shown. It was shown that humanoid robots are vulnerable as anyone will be able to hack the login credentials of robot’ s website as well as there are some open ports in the robot’ s network which can be used by the hackers to exploit robot’ s working. Based on the results of assessment methods and our findings, we gave the firewall framework which will be helpful to protect the humanoid robot against those security vulnerabilities and attacks.This firewall framework will be able to protect the humanoid robots in aspects of both network and website/webpage exploitation.
Article
The article is devoted to the development and application of digital technologies in the country. The author believes that the pace of national economic growth and energy security of the country directly depend on the formation of a digital ecosystem and modern legal regulation of relations arising in the digital economy. The presented materials can be useful in the framework of training in economic and legal areas.
Chapter
Full-text available
This chapter gives an all-inclusive view of cybersecurity risk. The main aim of this chapter is to explain what cybersecurity risk entails. This chapter starts by describing why cybersecurity risk is vital to organizations. The authors explain cybersecurity, vulnerabilities, and common cyber threats/attacks. This chapter also highlights some literature on cybersecurity risks in different sectors and gives an idea about the numerous cyber-attacks during the COVID-19 pandemic. The other sections of this chapter explain risk, risk assessment methods/approaches used in determining the level and type of risk, and risk management frameworks alongside examples from literature and how they were employed to manage risks. Finally, this chapter concludes with the role of organizations in handling and managing cybersecurity risks and the steps governments, organizations, stakeholders, and individuals should take when trying to mitigate or manage cybersecurity risks now and in the future.
Article
The secure command & control (C&C) of mobile agents arises in various settings including unmanned aerial vehicles, single pilot operations in commercial settings, and mobile robots to name a few. As more and more of these applications get integrated into aerospace and defense use cases, the security of the communication channel between the ground station and the mobile agent is of increasing importance. The development of quantum computing devices poses a unique threat to secure communications due to the vulnerability of asymmetric ciphers to Shor’s algorithm. Given the active development of new quantum resistant encryption techniques, we report the first integration of post-quantum secure encryption schemes with robotic operating system (ROS) and C&C of mobile agents, in general. We integrate these schemes in the application and network layers and study the performance of these methods by comparing them to present-day security schemes such as the widely used RSA algorithm.
Article
Full-text available
In this new era of cloud computing, Intrusion Detection System (IDS) is very essential for the continual monitoring of computing resources for signs of compromise since the number of attack vectors and malware are in increase. Only few IDS datasets are publicly available and those available are outdated, lack cloud‐specific attacks. This article presents a novel dataset based on Virtual Machine Introspected data for the implementation of IDS in cloud. The dataset was generated from the behavioral characteristics of malware and benign sample execution traces on virtual machines using Virtual Machine Introspection (VMI) technique. A vector space model based on system call approach is applied to analyze the behavioral characteristics for the generation of proposed dataset. The purpose of this study is to compare the proposed dataset with existing datasets and evaluate the effectiveness of these datasets by applying Machine Learning (ML) algorithms with 10‐fold cross‐validation. The ML algorithms used in the experiments are C4.5, Random Forest, JRip, NaiveBayes, K‐Nearest Neighbors (KNN), and Support Vector Machine (SVM). The effectiveness of detecting intrusions using proposed dataset is promising compared with other datasets in‐terms of intrusion detection accuracy, recall value, precision, and F1‐score metrics. For example, the intrusion detection accuracy in proposed dataset is 0.11% improved than UNM dataset, 6.28% higher than ADFA dataset, and 1.88% higher than LID dataset with C4.5 algorithm. Therefore, the proposed dataset is best suitable for implementing IDS for cloud.
Chapter
As the Internet growth and cyber warfare continue to change, being aware of issues and threats are continually essential for cybersecurity. One of the threats that continue to grow and threaten cybersecurity is botnets. Botnets have acquired the researchers’ interest over the past years, a great deal to develop the systems that efficiently and effectively would detect the presence of botnets attacks. Botnets could launch massive commands against com-puter systems connected to the Internet to make financial fraud, intricate spam attacks, and manipulate people through social media. Furthermore, many newer botnets have demonstrated increased levels of sophistication and anonymity as it continues to evolve, making it difficult to withstand them effectively. In this paper, a brief overview of botnets is provided, the importance of cybersecurity, the relationship between cybersecurity and botnets. Additionally, a brief review of how botnets attacks work, botnets architectures, threats represented by botnets, and their impact on cybersecurity is provided. In conclusion, the paper suggests approaches prevent botnet at-tacks and ways and tools that could help organizations and individuals improve their cybersecurity to secure information and improve their security level.
Article
Full-text available
The recent digital revolution led robots to become integrated more than ever into different domains such as agricultural, medical, industrial, military, police (law enforcement), and logistics. Robots are devoted to serve, facilitate, and enhance the human life. However, many incidents have been occurring, leading to serious injuries and devastating impacts such as the unnecessary loss of human lives. Unintended accidents will always take place, but the ones caused by malicious attacks represent a very challenging issue. This includes maliciously hijacking and controlling robots and causing serious economic and financial losses. This paper reviews the main security vulnerabilities, threats, risks, and their impacts, and the main security attacks within the robotics domain. In this context, different approaches and recommendations are presented in order to enhance and improve the security level of robotic systems such as multi-factor device/user authentication schemes, in addition to multi-factor cryptographic algorithms. We also review the recently presented security solutions for robotic systems.
Chapter
Security is particularly important in robotics. The inclusion of robot security education in curricula offering courses on robotics is therefore considered a valuable extension. However, robot security is covered very briefly in most curricula and there is a clear lack of education publications that discuss related teaching materials and hands-on lab activities. This paper contributes to fill this gap by providing a method for enhancing the teaching of robot security, using a hands-on lab based educational approach. The details of comprehensive hands-on lab activities that can be used in didactic environments to evaluate and enhance robot security are presented. Practically, throughout the hands-on lab activities, the resilience and robustness of a popular robot, called NAO, are evaluated against common Denial of Service (DoS) attacks. The hands-on activities demonstrate clearly that NAO robot is very vulnerable to DoS attacks and does not deploy built-in efficient security features to prevent and limit the success of the attacks. Moreover, the discussed hands-on lab activities can be considered as the basis to develop similar activities using other types of robots and attacks and are designed to accompany and compliment any existing trade or academic press text.
Article
Full-text available
Internet of Things (IoT) is one of the most powerful platforms that incorporates several other technological components within itself. The IoT ecosystem comprises devices, communications, protocols, analytics, cloud, automation, etc. Its magnitude keeps on increasing with the addition of tools and services. While IoT has many advantages like connectivity, efficiency, and convenience, it is a known fact that privacy and security issues are prevalent in the IoT network. To minimize the security and privacy issues, we propose a blockchain-based solution. In this paper, we design policies based on smart contacts, which is a self-enforcing agreement embedded in computer code managed by a blockchain. We propose three different policies: Hardware and Device Security Policies, Access and Authentication policies, and Application security for the IoT network. Since blockchain-based solutions ensure trust and stability, this may be one of the most robust techniques to alleviate the IoT network’s security and privacy issues. Also, we calculate the throughput and latency of the IoT enabled blockchain network and compare the power consumption of the IoT device at the time of data request with other proposed systems.
Chapter
Industrial robots are playing a key role in the Fourth Industrial Revolution (Industry 4.0). This latest generation of robots incorporates smart technologies and networking to support machine-to-machine and machine-to-human communications, and Internet of Things integration for advanced automation. The enhanced connectivity increases the attack surface of industrial robots, providing hackers with more attack options. Cyber attacks on industrial robots not only bring about economic losses to manufacturers, such as damage to production lines, but they can also cause injuries to workers, even deaths.
Conference Paper
Industry 4.0 articulates that modern intelligent machines are better than humans that are enough capable to capture and analyze data in real-time, as well as in communicating information that may be helpful to take business-related decisions faster. The Industrial Internet of Things (IIoT) relies on intelligent assets that communicate and store data, data communication infrastructures, analytics, and people for functioning. With so many constituents of the IIoT network, there is also an increased potential for security risks. Privacy and trust issues need to be addressed. Recently Blockchain Technology has shown tremendous growth due to its reliable nature. In this paper we introduce a blockchain technology-based architecture for IIoT with the aim to address a lot of significant security issues
Article
Full-text available
Adopting the technologies among organizations comes with the continuous worries of protection and hacking. The idea of cyber-security has become over the years the main interest of many organizations, which depend on technologies in its operations, which requires them to pay extra attention to their technological infrastructure. The current study aims at examining the influence of cyber-security forces on organizational internal operations and the role of technological infrastructure in defining and controlling the level of protection that cyber-security has on organizational internal processes. Quantitative approach was adopted, and a questionnaire was utilized to collect the data from a convenient sample of 360 software engineers, network engineers, software testers, web developers, and technical support using a structured survey questionnaire, and analyzed using SPSS version 21. The results confirmed that cyber-security motivators (data growth, technology expansion, access to required resources, operational control, and technical control) indirectly affect solid internal processes that are attributed to the consistency of technological infrastructure in an organization. The variable of ‘data growth’ appeared to be the most influential motivator on cyber-security strategies, as it scored a mean of 4.2661, which is the highest among all adopted variables and followed by the variable of ‘technical control’, which scored a mean of 4.1296. Accordingly, the study recommends that organizations should consider IT infrastructure as a main item within their risk management strategies to avoid unpredicted risks and attacks.
Conference Paper
cite as I. S. Igboanusi, C. I. Nwakanma, J. M. Lee and D. -S. Kim, "VLC-UWB Hybrid (VUH) Network for Indoor Industrial Robots at Military Warehouses / Distribution Centers," 2019 International Conference on Information and Communication Technology Convergence (ICTC), Jeju Island, Korea (South), 2019, pp. 762-766, doi: 10.1109/ICTC46691.2019.8939766.
Article
Full-text available
Teleoperated robots are playing an increasingly important role in military actions and medical services. In the future, remotely operated surgical robots will likely be used in more scenarios such as battlefields and emergency response. But rapidly growing applications of teleoperated surgery raise the question; what if the computer systems for these robots are attacked, taken over and even turned into weapons? Our work seeks to answer this question by systematically analyzing possible cyber security attacks against Raven II, an advanced teleoperated robotic surgery system. We identify a slew of possible cyber security threats, and experimentally evaluate their scopes and impacts. We demonstrate the ability to maliciously control a wide range of robots functions, and even to completely ignore or override command inputs from the surgeon. We further find that it is possible to abuse the robot's existing emergency stop (E-stop) mechanism to execute efficient (single packet) attacks. We then consider steps to mitigate these identified attacks, and experimentally evaluate the feasibility of applying the existing security solutions against these threats. The broader goal of our paper, however, is to raise awareness and increase understanding of these emerging threats. We anticipate that the majority of attacks against telerobotic surgery will also be relevant to other teleoperated robotic and co-robotic systems.
Conference Paper
Full-text available
Future homes will be populated with large numbers of robots with diverse functionalities, ranging from chore robots to el- der care robots to entertainment robots. While household robots will offer numerous benefits, they also have the po- tential to introduce new security and privacy vulnerabilit ies into the home. Our research consists of three parts. First, t o serve as a foundation for our study, we experimentally ana- lyze three of today's household robots for security and pri- vacy vulnerabilities: the WowWee Rovio, the Erector Spy- kee, and the WowWee RoboSapien V2. Second, we synthe- size the results of our experimental analyses and identify key lessons and challenges for securing future household robots. Finally, we use our experiments and lessons learned to con- struct a set of design questions aimed at facilitating the fu - ture development of household robots that are secure and preserve their users' privacy.
Conference Paper
Full-text available
Behavior or Appearance? This is fundamental problem in robot de- velopment. Namely, not only the behavior but also the appearance of a robot influences human-robot interaction. There is, however, no research approach to tackling this problem. In order to state the problem, we have developed an an- droid robot that has similar appearance as humans and several actuators gener- ating micro behaviors. This paper proposes a new research direction based on the android robot.
Research
Proposing a code of ethics for social robotics research.
Article
It has been said that the only thing that is constant is change. This adage is well borne out in both the understanding of space and the pursuit of that understanding. In the last twelve months, the scientific studies of our universe, made possible by spectacularly successful flight programs such as the Hubble Space Telescope, Galileo, and Magellan, almost daffy have expanded our understanding of the universe and the planets in our solar system. Here on Earth, the space business has also undergone a similar revolutionary process. In the ever complex requirement to balance the pursuit of meaningfixl science programs with the shrinking availability of funding, NASA has entered the era of having to do more with less. Our focus has shifted to designing faster, cheaper, and better missions without compromising safety or scientific value. Therefore, our technology strategies must correspondingly change to accommodate this new approach. Technology application and systems acquisition must emphasize standardized, multi-use services and operations concepts, leveraged with those of our indusuial partners, international counterparts, and academia, as appropriate. Movement toward privatization of space business will be required to better share rewards, exchange technical knowledge, and increase operational efficiencles. These changes are no longer options, but are essential to sustaining our economy and assuring the continued technological leadership of our Nation. One common thread to the success of our flight programs has been the reliable communication of each bit of information from the spacecraft to the ultimate user. The responsibility for this critical task primarily has rested within NASA's Office of Space Communications (OSC). OSC provides standardized, multi-use communications, data processing, navigation, and mission operation services to both NASA and non-NASA flight programs. NASA's Office of Advanced Concepts and Technology is chartered to develop and advance
Article
This position paper recognizes that general purpose robots will become increasingly common and argues that we need to prepare ourselves to deal with security for robot applications in an intelligent way. We discuss ways that robots are similar to traditional computing de-vices and ways that robots are different, and we describe the challenges that arise. We propose a framework for providing security for robot applications and we discuss three potential robot applications: a "fetch coffee" app, a "pretend to be a Labrador" app, and a "is my advisor in his office and available" app. We discuss some of the security needs of these applications and propose a few potential ways to address those security needs.
Article
The evolution of unmanned military systems over the last few decades, beginning with Unmanned Aerial Vehicles (UAV) and more recently Unmanned Ground Vehicles (UGV), is the nascent steps in the replacement of human beings from direct involvement in the conduct of warfare. This evolution is driven by a desire to reduce the risk for loss of life. As this evolution continues, and improvements are made in field of robotics, there will come a point around the year 2035 where some soldiers or Marines will be replaced by androids. For the purposes of this paper, an android is defined as an artificial system that is indistinguishable from human beings in both its external appearance and behavior, and is capable of interaction with actual human beings.
What is Robotics', National Aeronautics and Space Administration, www.nasa.gov , NASA Educational Technology Services
  • Sandra May
Sandra May, 'What is Robotics', National Aeronautics and Space Administration, www.nasa.gov, NASA Educational Technology Services, 2009.
A Robot In Every South Korean Home by 2020
  • Michael Hoffman
Michael Hoffman, 'A Robot In Every South Korean Home by 2020', DailyTech, April 2004.
Cybersecurity Challenges for Manned and Unmanned Systems
  • Bolden
Cortney L. Bolden, 'Cybersecurity Challenges for Manned and Unmanned Systems', American Military University, Homeland Security, 2015.
Glossary of Key Information Security Terms. Computer Security Division, Information Technology laboratory
  • K Richard
Richard Kissel et al, 'Glossary of Key Information Security Terms', Computer Security Division, Information Technology laboratory, National Institute of Standards Technology, pp. 57-59, May 2013.
Influence of the new trends in the economics on the military and industrial robot system design philosophy
  • Struuk
Bob Struuk, 'Influence of the new trends in the economics on the military and industrial robot system design philosophy', National University of Public Service, PhD Institute in Military Technology, pp. 15, 2014.
Antbo is an insect robot you can build
  • Ashley Carman
Ashley Carman, 'Antbo is an insect robot you can build', www.theverge.com, 2016.
Design and development of a RFID based mobile robot
  • Prathyusha
Prathyusha.K et al,'Design and development of a RFID based mobile robot', International Journal of Engineering and Advanced Technology, Volume-1, Issue-1, pp.30-35, 2011.
Researchers hack a teleoperated surgical robot to reveal security flaws
  • L Jennifer
Jennifer Langston. ' Researchers hack a teleoperated surgical robot to reveal security flaws', www.washington.edu, University of Washington, pp. 01-03, 2015.
Playing Soccer with RoboSapien
  • Sven Behnke
Sven Behnke et al, 'Playing Soccer with RoboSapien', Lecture Notes in Artificial Intelligence, LNAI 4020, Springer, 2006.
Military Androids: A vision for human replacement in 2035. United States Marine Corps, School of Advanced War Fighting
  • L John