Cybersecurity With Respect To Robotics
Cybersecurity With Respect To Robotics
Abstract
This paper addresses the interplay between robots, cybersecurity, and safety from a
legal perspective, a topic under-explored by current technical and legal literature.
The legal framework, together with technical standards, is a necessary parameter
for the production and deployment of robots. Unintended accidents will always take
place, but the ones caused by malicious attacks represent a very challenging issue.
This includes maliciously hijacking and controlling robots and causing serious
economic and financial losses. This paper reviews the main security vulnerabilities,
threats, risks, and their impacts, and the main security attacks within the robotics
domain. We conceptualize and discuss the challenges of regulating cyber-physical
systems’ security with the current dual framework, particularly the lack of
mandatory certifications. We conclude that policymakers need to consider
cybersecurity as an indissociable aspect of safety to ensure robots are truly safe to
use.
1.Introduction
Cybersecurity may be defined as the state of being protected against the criminal or
unauthorized use of electronic data or the measures to achieve this. It is a field
which strives to defend attacks against computer systems which may incorporate
control systems, critical infrastructures and technology transport systems. It
ensures five security services namely Confidentiality, Integrity, Availability,
Authenticity and Non repudiation of electronic, computer and network domains.
Most of the organizations, corporations, institutions and governments collect,
process and store magnanimous amount of confidential data and transmit it across
the networks to other systems. One of the most contributing causes of
cybersecurity is the constantly evolving nature of security risks. Even though the
traditional systems have been successful in protecting against significant threats,
many possible threats still remain unchartered. As the volume and sophistication of
cyber-attacks increase exponentially, it is necessary to safeguard information
which might be of personal interest as well related to national security. Thus a
body of technologies, processes and practices works towards securing the networks,
computers, programs and data from attack, damage or unauthorized access. The
National Institute of Science and Technology (NIST), defines cyber-attack as a
means of using the cyber space for disrupting, disabling, destroying or maliciously
controlling a computing environment or infrastructure. This will lead to destroying
the integrity of the data or stealing controlled information. The cyber infrastructure
generally comprises of Electronic Information and communication systems,
hardware and software, storage, processing and communication. Cybersecurity
being the biggest risk of technological operations finds its use in almost every
realm of technology. Ranging from real time data analytics to Drones and Robotics,
Cybersecurity becomes critically important as Internet of Things constantly grows.
2. Types of Robots
Robots can be classified according to the environment in which they operate.
The most common distinction is between fixed and mobile robots. These two types
of robots have very different working environments and therefore require very
different capabilities. Fixed robots are mostly industrial robotic manipulators that
work in well defined environments adapted for robots.
Robots may be classified into two types depending on how they are
controlled.
2.1 Autonomous Robots
These are the robots which do not need human or operator intervention and can
perform tasks by themselves . For instance, the Bump and Go robot which has
bumper sensors to detect obstacles. With respect to every bump that it faces as it
hits the obstacle, it is given the command to change its direction.
2.2 Insect Robots
A group of robots which function on the command of a single controller fall into
the category of Insect robots . It is similar to a colony of insects wherein the entire
fleet follows a single leader. Antbo is an insect robot.
3. Characterstics of Robot
A more vivid definition for a robot focusses on a few characteristics followed by
the device. The characteristics are as follows
3.1 Sensing
A robot must be able to sense its surroundings. For this purpose it is equipped with
light sensors, touch and pressure sensors, chemical sensors, sonar sensors and taste
sensors. A robot lacking sensors is unaware of its environment
3.2 Movement
One of the characteristics which makes robot so proficient is its ability to move. A
robot may be dependent on wheels or walking legs to move. The movement may
depict either an actual displacement in the position of the robot or simple parts of
the robot to move.
3.3 Energy
A robot must be equipped with the required amount of energy/power to perform its
functions. It may draw power from solar cells, batteries or electricity.
3.4 Intelligence
Specific programming may induce intelligence into the robot. These are called as
‘smarts’. The robot must receive the program to act in the required manner.
4. Cybersecurity Safety and Robots
The applicability of these safety rules to care robots depends on their classification
according to product categories. Are they intended for medical purposes and thus
potentially count as medical devices? Can they qualify as toys? Do they contain
wireless (radio wave) connectivity and are thus under the scope of the radio
equipment legislation? The answers to these questions are too context-dependent
for this paper, but the questions themselves serve to illustrate the siloed-thinking
behind the European fragmented regulatory approach.
Although cyber-physical systems have existed for some time now, coupling
material things with the Internet is quite recent. Robots combine computational and
physical components, and, thus, both software-related and hardware-focused rules
apply. First, the safety of the robot is regulated via different legislations covering
various classes of products, such as those devices for intended medical purposes.
6. Ethics in Robotics
Robotics, which finds its backbone in artificial intelligence has
revolutionized our lives. With the latest developments, robotics has been
instrumental in driving cars, accessing medical records and other day to day
activities. However, the same introduces fear of compromised privacy and security
as most of the operations make use of the Internet. Thus there is an issue of
liability. Smart robots and driverless cars are effective but they bring ethical issues
too. Cybertechnology includes hand held devices, personal computers, mainframe
computers and so on through which robotics can be easily propagated. Cyber ethics
underpin ethical issues in computing machines performed by computer
professionals. Cybersecurity ethics in Robotics comprises of both cyberethics and
technological ethics. Cyberethics deal with ethics pertaining to computers and take
an account of the behavior and effects of computer systems whereas technological
ethics are involved with the development of new technology. As Robotics underpin
both technology as well as cyberspace, the ethics in robotics must be in accordance
with both the domains. Ethics in robotics is concerned with the behavior of humans,
how humans construct, design and treat robots. Some ethical challenges for
Robotics from the perspective of technology and cyberspace are as follows
6.1 Copyrights
Certain ethics concern the artists, producers, end users and the country of
which a robot is a part. The ethical considerations pertaining to these may affect
industries, national government as well as international relations. The use of
copyrighted material to create new innovation is restricted.
6.2 Cybercriminality
Technology affects social, cultural and economic realms. As globalization
prevails, transactions are in accordance. Often the facilities are exploited such that
multiple criminal activities surface. As cybercrie grows rapidly, criminals may use
digital means to threated people’s freedom
6.3 Privacy and Security (A case of Full Body Scanners at the airports)
As full body X ray scanners have been introduced, many people have
questioned privacy of people. People are encouraged to stand in rectangular
machine so that alternate wavelength image of a person’s naked body for detecting
metals may be performed. It is done to increase security. However ethical concerns
point out at violation of modesty and personal privacy and potential misuse of
technology. The Centre for Society, Science and Citizenship has been instrumental
in introducing recommendations for this technology in order to preserve privacy of
individuals.
6.4 Privacy and Global Positioning System (GPS) technologies
GPS devices have played a pivotal role in evolution of Robotics. The location of
people carrying cellphones can be tracked in no time with GPS technology which
challenges privacy. It not only affects the interaction of citizens with their states
but also that of employees at their workplaces. Many vehicles and equipments
support GPS thereby contradicting civil liberties. Appropriate privacy levels are
questioned due to such technological impacts.
6.5 Genetically Modified organisms
Genetically modified foods offer more yield, greater nutritional value, resistance to
pests but several questions arise as far as ethics is concerned for their use.
Genetically modified crops depend on unintended cross pollination and other
unforeseen health concerns for humans. Many organisms are modified to appear
fluorescent and the operations are carried by robots which question ethics in
robotics
6.6 Autonomous robots on choosing their own targets
With autonomous systems becoming popular, human domains are invaded, thus
there is a need to control them. These cars may zip ahead to take parking spots
people have been waiting for. There may be systems that buy an unlimited supply
of goods from a store while people wait on. One cannot allow their mechanical
valets to vote on behalf of them. An autonomous robot should not be allowed to
choose its own targets. The need is to create civilized robots which can be only
done by following certain ethics.
7. Conclusions
Nowadays, robotic systems are being deployed and used in different domains that
are based on critical infrastructures. However, robotic systems suffer from several
security vulnerabilities that can be exploited to launch dangerous attacks, which
may have drastic consequences on these infrastructures escalating from economical
losses all the way to the loss of human lives. Such attacks are possible due to the
lack of security by design of robotic systems and the reliance on open wireless
communication channels. As such, it is highly recommended to protect robots from
any possible attack and by all means necessary. This includes detecting and
preventing attackers from breaching into these systems to inject malicious malware
or/and data to cause either chaos and havoc in the robots’ operation, or to leak
sensitive information (industrial espionage). Therefore, the authentication process
should be designed to reach the highest possible security level by employing
mutual multi-factor authentication scheme. This helps in reducing the illegal access
to robots/users. On the other hand, lightweight cryptographic algorithms and
protocols at the network and/or at the physical layer are mandatory to ensure
secure wireless communication with minimal overhead in terms of delay and
required resources. Moreover, privacy-preserving techniques should be used to
ensure the privacy of legal entities. Moreover, non-cryptographic solutions such as
lightweight intrusion detection or prevention systems should be designed to better
protect the robotics applications. At the end of this paper, we have discussed the
security requirements and have presented several recommendations for such
requirements within robotic systems. As part of future work, we plan to shed more
light over the main topics that are yet to be covered, including the design of anti-
forensic solutions to maintain the integrity of availability of evidences.
We conclude this paper with the three postulates proposed by the Issac Assimov,
i) Robots must never harm humans
ii) Robots must follow instructions from humans without violating rule 1
iii) Robots must protect themselves without violating any rules.