Building Secure Robot Applications
نویسندگان
چکیده
This position paper recognizes that general purpose robots will become increasingly common and argues that we need to prepare ourselves to deal with security for robot applications in an intelligent way. We discuss ways that robots are similar to traditional computing devices and ways that robots are different, and we describe the challenges that arise. We propose a framework for providing security for robot applications and we discuss three potential robot applications: a “fetch coffee” app, a “pretend to be a Labrador” app, and a “is my advisor in his office and available” app. We discuss some of the security needs of these applications and propose a few potential ways to address those security needs.
منابع مشابه
Secure Control Applications in Smart Homes and Buildings
With today’s ongoing integration of heterogeneous building automation systems, increased comfort, energy efficiency, improved building management, sustainability as well as advanced applications such as active & assisted living scenarios become possible. These smart homes and buildings are implemented as decentralized systems, where embedded devices are connected via networks to exchange their ...
متن کاملPlanning Arm with 5 Degrees of Freedom for Moving Objects Based on Geometric Coordinates and Color
Skilled mechanical arms of consanguine relationship formed by joints the relative motion of the adjacent interfaces enable, have been connected. Ability to perform a variety of pre-programmed robotic manipulator in various industries. Skilled mechanical arms in recent years as a significant progress has been completed. House repair and easier to work with them as well and fit and optimal relati...
متن کاملSoftware security requirements in building automation
With today’s ongoing integration of heterogeneous building automation systems, increased comfort, energy efficiency, improved building management, sustainability as well as advanced applications such as active & assisted living scenarios become possible. Obviously, the demands – especially regarding security – increase: Secure communication becomes equally important as secure software being exe...
متن کاملBuilding Security-Aware Applications on Celestial Network Security Management Infrastructure
Heterogeneous and distributed nature of the Internet makes it very diicult to customize security protocols and policies in order to satisfy the security needs of applications. Celestial network security management project addresses this issue through building an infrastructure that can dynamically set up inter-domain secure communication channels upon the requests of applications. Celestial Sys...
متن کاملDual Space Control of a Deployable Cable Driven Robot: Wave Based Approach
Known for their lower costs and numerous applications, cable robots are an attractive research field in robotic community. However, considering the fact that they require an accurate installation procedure and calibration routine, they have not yet found their true place in real-world applications. This paper aims to propose a new controller strategy that requires no meticulous calibration and ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2011