Abstract
The integration of artificial intelligence, especially large language models in robotics, has led to rapid advancements in the field. We are now observing an unprecedented surge in the use of robots in our daily lives. The development and continual improvements of robots are moving at an astonishing pace. Although these remarkable improvements facilitate and enhance our lives, several security and privacy concerns have not been resolved yet. Therefore, it has become crucial to address the privacy and security threats of robotic systems while improving our experiences. In this paper, we aim to present existing applications and threats of robotics, anticipated future evolution, and the security and privacy issues they may imply. We present a series of open questions for researchers and practitioners to explore further.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Adi, W.: Clone-resistant DNA-like secured dynamic identity. In: 2008 Bio-inspired, Learning and Intelligent Systems for Security, pp. 148–153 (2008). https://doi.org/10.1109/BLISS.2008.33
Agrawal, S., Williams, M.A.: Robot authority and human obedience: a study of human behaviour using a robot security guard. In: Proceedings of the Companion of the 2017 ACM/IEEE International Conference on Human-Robot Interaction, pp. 57–58 (2017)
Almohamade, S.S., Clark, J.A., Law, J.: Behaviour-based biometrics for continuous user authentication to industrial collaborative robots. In: Maimut, D., Oprina, A.-G., Sauveron, D. (eds.) SecITC 2020. LNCS, vol. 12596, pp. 185–197. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-69255-1_12
Amoozadeh, M., et al.: Security vulnerabilities of connected vehicle streams and their impact on cooperative driving. IEEE Commun. Mag. 53(6), 126–132 (2015)
Bernadotte, A.: Cyber security for surgical remote intelligent robotic systems. In: 2023 9th International Conference on Automation, Robotics and Applications (ICARA), pp. 65–69 (2023). https://doi.org/10.1109/ICARA56516.2023.10126050
Bisconti Lucidi, P., Nardi, D.: Companion robots: the hallucinatory danger of human-robot interactions. In: Proceedings of the 2018 AAAI/ACM Conference on AI, Ethics, and Society, pp. 17–22 (2018)
Bonaci, T., Herron, J., Yusuf, T., Yan, J., Kohno, T., Chizeck, H.J.: To make a robot secure: An experimental analysis of cyber security threats against teleoperated surgical robots (2015). arXiv preprint arXiv:1504.04339
Booth, S., Tompkin, J., Pfister, H., Waldo, J., Gajos, K., Nagpal, R.: Piggybacking robots: Human-robot overtrust in university dormitory security. In: Proceedings of the 2017 ACM/IEEE International Conference on Human-Robot Interaction, pp. 426–434 (2017)
Bristeau, P.J., Dorveaux, E., Vissière, D., Petit, N.: Hardware and software architecture for state estimation on an experimental low-cost small-scaled helicopter. Control. Eng. Pract. 18(7), 733–746 (2010)
Choi, H., et al.: Detecting attacks against robotic vehicles: a control invariant approach. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 801–816 (2018)
Clark, G.W., Doran, M.V., Andel, T.R.: Cybersecurity issues in robotics. In: 2017 IEEE Conference on Cognitive and Computational Aspects of Situation Management (CogSIMA), pp. 1–5. IEEE (2017)
Connell, J.H., Mahadevan, S.: Robot learning. In: Sammut, C., Webb, G.I. (eds.) Encyclopedia of Machine Learning. Springer, Boston, MA (2011). https://doi.org/10.1007/978-0-387-30164-8_732
Dash, P., Karimibiuki, M., Pattabiraman, K.: Out of control: stealthy attacks against robotic vehicles protected by control-based techniques. In: Proceedings of the 35th Annual Computer Security Applications Conference, pp. 660–672 (2019)
Edwards, B.: Google’s RT-2 AI model brings us one step closer to WALL-E (2023). https://arstechnica.com/information-technology/2023/07/googles-rt-2-ai-model-brings-us-one-step-closer-to-wall-e/
Eykholt, K., et al.: Robust physical-world attacks on deep learning visual classification. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 1625–1634 (2018)
Gavrilova, M.L., Yampolskiy, R.V.: Applying biometric principles to avatar recognition. In: 2010 International Conference on Cyberworlds, pp. 179–186 (2010). https://doi.org/10.1109/CW.2010.36
van Genderen, R.H.: Privacy and data protection in the age of pervasive technologies in AI and robotics. Eur. Data Prot. Law Rev. 3, 338–352 (2017). https://doi.org/10.21552/edpl/2017/3/8
Gibbs, S.: Hackers can hijack Wi-Fi Hello Barbie to spy on your children) (2015). https://www.theguardian.com/technology/2015/nov/26/hackers-can-hijack-wi-fi-hello-barbie-to-spy-on-your-children
He, H.M.: RobotGPT: From chatGPT to robot intelligence (2023). https://openreview.net/forum?id=wWe_OqpCcU8
IEEE: The IEEE Global Initiative on Ethics of Autonomous and Intelligent Systems (2017). https://standards.ieee.org/wp-content/uploads/import/documents/other/ec_about_us.pdf
Injected, Demos, D.: DoS attacks on a self-balancing robot (accelerometer) (2018). https://youtu.be/yDz8y_ht3Xg
Injected, Demos, D.: Side-Swing attacks on a self-balancing robot (2018). https://youtu.be/oy3B1X41u5s
International Federation of Robotics (IFR): Service Robots as Defined by ISO 8373. https://ifr.org/service-robots
Kamm, F.M.: The Trolley Problem Mysteries. Oxford University Press (2015)
Kirschgens, L.A., Ugarte, I.Z., Uriarte, E.G., Rosas, A.M., Vilches, V.M.: Robot hazards: from safety to security (2018). arXiv preprint arXiv:1806.06681
Kiwibot: Kiwibot. https://www.kiwibot.com/
Kroemer, O., Niekum, S., Konidaris, G.: A review of robot learning for manipulation: challenges, representations, and algorithms. J. Mach. Learn. Res. 22(1), 1395–1476 (2021)
Lacava, G., et al.: Cybser security issues in robotics. J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl. 12(3), 1–28 (2021)
Larson, S.: Ransomware experiment shows the dangers of hacking robots (2018). https://money.cnn.com/2018/03/09/technology/robots-ransomware/index.html
Lin, P., Bekey, G.A., Abney, K.: Robots in war: issues of risk and ethics (2009)
Liu, Y., Ma, X., Bailey, J., Lu, F.: Reflection backdoor: a natural backdoor attack on deep neural networks. In: Vedaldi, A., Bischof, H., Brox, T., Frahm, J.-M. (eds.) ECCV 2020. LNCS, vol. 12355, pp. 182–199. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-58607-2_11
Luo, M., Myers, A.C., Suh, G.E.: Stealthy tracking of autonomous vehicles with cache side channels. In: 29th USENIX Security Symposium (USENIX Security 20), pp. 859–876 (2020)
Lutz, C., Schöttler, M., Hoffmann, C.P.: The privacy implications of social robots: scoping review and expert interviews. Mob. Media Commun. 7(3), 412–434 (2019)
Mayoral-Vilches, V., Carbajo, U.A., Gil-Uriarte, E.: Industrial robot ransomware: Akerbeltz. In: 2020 Fourth IEEE International Conference on Robotic Computing (IRC), pp. 432–435 (2020). https://doi.org/10.1109/IRC.2020.00080
McDaniel, P., Koushanfar, F.: Secure and trustworthy computing 2.0 vision statement (2023). arXiv preprint arXiv:2308.00623
Mulliner, C., Borgaonkar, R., Stewin, P., Seifert, J.-P.: SMS-based one-time passwords: attacks and defense. In: Rieck, K., Stewin, P., Seifert, J.-P. (eds.) DIMVA 2013. LNCS, vol. 7967, pp. 150–159. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-39235-1_9
Nevejans, N.: EUROPEAN CIVIL LAW RULES IN ROBOTICS (2016). http://www.europarl.europa.eu/committees/fr/supporting-analyses-search.html
Niemeyer, G., Preusche, C., Stramigioli, S., Lee, D.: Telerobotics. In: Siciliano, B., Khatib, O. (eds.) Springer Handbook of Robotics, pp. 1085–1108. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-32552-1_43
Othman, F., Bahrin, M., Azli, N., et al.: Industry 4.0: a review on industrial automation and robotic. J. Teknol. 78(6–13), 137–143 (2016)
Petit, J., Shladover, S.E.: Potential cyberattacks on automated vehicles. IEEE Trans. Intell. Transp. Syst. 16(2), 546–556 (2015). https://doi.org/10.1109/TITS.2014.2342271
Ranaweera, M., Mahmoud, Q.H.: Virtual to real-world transfer learning: a systematic review. Electronics 10(12), 1491 (2021)
REUTER, E.: Hospitals sue surgical robot maker, saying it forced them into restrictive contracts. https://medcitynews.com/2021/07/hospitals-sue-surgical-robot-maker-saying-it-forced-them-into-restrictive-contracts/ (2021)
Serve: Serve Robotics Becomes First Autonomous Vehicle Company to Commercially Launch Level 4 Self-Driving Robots. https://www.serverobotics.com/level-4-autonomy
Shah, R., Ahmed, M., Nagaraja, S.: Fingerprinting robot movements via acoustic side channel (2022). arXiv preprint arXiv:2209.10240
Shah, R., Ahmed, M., Nagaraja, S.: Reconstructing robot operations via radio-frequency side-channel (2022). arXiv preprint arXiv:2209.10179
Sugawara, T., Cyr, B., Rampazzi, S., Genkin, D., Fu, K.: Light commands: Laser-Based audio injection attacks on Voice-Controllable systems. In: 29th USENIX Security Symposium (USENIX Security 20), pp. 2631–2648. USENIX Association (2020). https://www.usenix.org/conference/usenixsecurity20/presentation/sugawara
Szpak, A.: Legality of use and challenges of new technologies in warfare - the use of autonomous weapons in contemporary or future wars. Eur. Rev. 28(1), 118–131 (2020). https://doi.org/10.1017/S1062798719000310
Team, Y.S.D.: The story behind the creation of Yandex’s delivery robot (2021). https://medium.com/yandex-self-driving-car/the-story-behind-the-creation-of-yandexs-delivery-robot-e07017940589
Tesla: Tesla Bot Update (2023). https://www.youtube.com/watch?v=XiQkeWOFwmk
Tu, Y., Lin, Z., Lee, I., Hei, X.: Injected and delivered: fabricating implicit control over actuation systems by spoofing inertial sensors. In: 27th USENIX Security Symposium (USENIX Security 18), pp. 1545–1562 (2018)
Vemprala, S., Bonatti, R., Bucker, A., Kapoor, A.: ChatGPT for robotics: design principles and model abilities. Microsoft Auton. Syst. Robot. Res 2, 20 (2023)
Wang, T.M., Tao, Y., Liu, H.: Current researches and future development trend of intelligent robot: a review. Int. J. Autom. Comput. 15(5), 525–546 (2018)
Winfield, A.F.T., Winkle, K., Webb, H., Lyngs, U., Jirotka, M., Macrae, C.: Robot accident investigation: a case study in responsible robotics. In: Software Engineering for Robotics, pp. 165–187. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-66494-7_6
Yaacoub, J.P.A., Noura, H.N., Salman, O., Chehab, A.: Robotics cyber security: vulnerabilities, attacks, countermeasures, and recommendations. Int. J. Inf. Secur. 1–44 (2022)
Yang, C.H.H., et al.: Enhanced adversarial strategically-timed attacks against deep reinforcement learning. In: ICASSP 2020–2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 3407–3411. IEEE (2020)
Yevgen Chebotar, T.Y.: RT-2: New model translates vision and language into action. https://www.deepmind.com/blog/rt-2-new-model-translates-vision-and-language-into-action (2023)
Yogeeswaran, K., Złotowski, J., Livingstone, M., Bartneck, C., Sumioka, H., Ishiguro, H.: The interactive effects of robot anthropomorphism and robot ability on perceived threat and support for robotics research. J. Hum.-Robot Interact. 5(2), 29–47 (2016)
Zhu, Q., Rass, S., Dieber, B., Vilches, V.M., et al.: Cybersecurity in robotics: challenges, quantitative modeling, and practice. Found. Trends® Robot. 9(1), 1–129 (2021)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Afroze, D., Tu, Y., Hei, X. (2024). Securing the Future: Exploring Privacy Risks and Security Questions in Robotic Systems. In: Chen, Y., Lin, CW., Chen, B., Zhu, Q. (eds) Security and Privacy in Cyber-Physical Systems and Smart Vehicles. SmartSP 2023. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 552. Springer, Cham. https://doi.org/10.1007/978-3-031-51630-6_10
Download citation
DOI: https://doi.org/10.1007/978-3-031-51630-6_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-51629-0
Online ISBN: 978-3-031-51630-6
eBook Packages: Computer ScienceComputer Science (R0)