Skip to main content

Securing the Future: Exploring Privacy Risks and Security Questions in Robotic Systems

  • Conference paper
  • First Online:
Security and Privacy in Cyber-Physical Systems and Smart Vehicles (SmartSP 2023)

Abstract

The integration of artificial intelligence, especially large language models in robotics, has led to rapid advancements in the field. We are now observing an unprecedented surge in the use of robots in our daily lives. The development and continual improvements of robots are moving at an astonishing pace. Although these remarkable improvements facilitate and enhance our lives, several security and privacy concerns have not been resolved yet. Therefore, it has become crucial to address the privacy and security threats of robotic systems while improving our experiences. In this paper, we aim to present existing applications and threats of robotics, anticipated future evolution, and the security and privacy issues they may imply. We present a series of open questions for researchers and practitioners to explore further.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 49.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 64.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Adi, W.: Clone-resistant DNA-like secured dynamic identity. In: 2008 Bio-inspired, Learning and Intelligent Systems for Security, pp. 148–153 (2008). https://doi.org/10.1109/BLISS.2008.33

  2. Agrawal, S., Williams, M.A.: Robot authority and human obedience: a study of human behaviour using a robot security guard. In: Proceedings of the Companion of the 2017 ACM/IEEE International Conference on Human-Robot Interaction, pp. 57–58 (2017)

    Google Scholar 

  3. Almohamade, S.S., Clark, J.A., Law, J.: Behaviour-based biometrics for continuous user authentication to industrial collaborative robots. In: Maimut, D., Oprina, A.-G., Sauveron, D. (eds.) SecITC 2020. LNCS, vol. 12596, pp. 185–197. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-69255-1_12

    Chapter  Google Scholar 

  4. Amoozadeh, M., et al.: Security vulnerabilities of connected vehicle streams and their impact on cooperative driving. IEEE Commun. Mag. 53(6), 126–132 (2015)

    Article  Google Scholar 

  5. Bernadotte, A.: Cyber security for surgical remote intelligent robotic systems. In: 2023 9th International Conference on Automation, Robotics and Applications (ICARA), pp. 65–69 (2023). https://doi.org/10.1109/ICARA56516.2023.10126050

  6. Bisconti Lucidi, P., Nardi, D.: Companion robots: the hallucinatory danger of human-robot interactions. In: Proceedings of the 2018 AAAI/ACM Conference on AI, Ethics, and Society, pp. 17–22 (2018)

    Google Scholar 

  7. Bonaci, T., Herron, J., Yusuf, T., Yan, J., Kohno, T., Chizeck, H.J.: To make a robot secure: An experimental analysis of cyber security threats against teleoperated surgical robots (2015). arXiv preprint arXiv:1504.04339

  8. Booth, S., Tompkin, J., Pfister, H., Waldo, J., Gajos, K., Nagpal, R.: Piggybacking robots: Human-robot overtrust in university dormitory security. In: Proceedings of the 2017 ACM/IEEE International Conference on Human-Robot Interaction, pp. 426–434 (2017)

    Google Scholar 

  9. Bristeau, P.J., Dorveaux, E., Vissière, D., Petit, N.: Hardware and software architecture for state estimation on an experimental low-cost small-scaled helicopter. Control. Eng. Pract. 18(7), 733–746 (2010)

    Article  Google Scholar 

  10. Choi, H., et al.: Detecting attacks against robotic vehicles: a control invariant approach. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 801–816 (2018)

    Google Scholar 

  11. Clark, G.W., Doran, M.V., Andel, T.R.: Cybersecurity issues in robotics. In: 2017 IEEE Conference on Cognitive and Computational Aspects of Situation Management (CogSIMA), pp. 1–5. IEEE (2017)

    Google Scholar 

  12. Connell, J.H., Mahadevan, S.: Robot learning. In: Sammut, C., Webb, G.I. (eds.) Encyclopedia of Machine Learning. Springer, Boston, MA (2011). https://doi.org/10.1007/978-0-387-30164-8_732

  13. Dash, P., Karimibiuki, M., Pattabiraman, K.: Out of control: stealthy attacks against robotic vehicles protected by control-based techniques. In: Proceedings of the 35th Annual Computer Security Applications Conference, pp. 660–672 (2019)

    Google Scholar 

  14. Edwards, B.: Google’s RT-2 AI model brings us one step closer to WALL-E (2023). https://arstechnica.com/information-technology/2023/07/googles-rt-2-ai-model-brings-us-one-step-closer-to-wall-e/

  15. Eykholt, K., et al.: Robust physical-world attacks on deep learning visual classification. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 1625–1634 (2018)

    Google Scholar 

  16. Gavrilova, M.L., Yampolskiy, R.V.: Applying biometric principles to avatar recognition. In: 2010 International Conference on Cyberworlds, pp. 179–186 (2010). https://doi.org/10.1109/CW.2010.36

  17. van Genderen, R.H.: Privacy and data protection in the age of pervasive technologies in AI and robotics. Eur. Data Prot. Law Rev. 3, 338–352 (2017). https://doi.org/10.21552/edpl/2017/3/8

  18. Gibbs, S.: Hackers can hijack Wi-Fi Hello Barbie to spy on your children) (2015). https://www.theguardian.com/technology/2015/nov/26/hackers-can-hijack-wi-fi-hello-barbie-to-spy-on-your-children

  19. He, H.M.: RobotGPT: From chatGPT to robot intelligence (2023). https://openreview.net/forum?id=wWe_OqpCcU8

  20. IEEE: The IEEE Global Initiative on Ethics of Autonomous and Intelligent Systems (2017). https://standards.ieee.org/wp-content/uploads/import/documents/other/ec_about_us.pdf

  21. Injected, Demos, D.: DoS attacks on a self-balancing robot (accelerometer) (2018). https://youtu.be/yDz8y_ht3Xg

  22. Injected, Demos, D.: Side-Swing attacks on a self-balancing robot (2018). https://youtu.be/oy3B1X41u5s

  23. International Federation of Robotics (IFR): Service Robots as Defined by ISO 8373. https://ifr.org/service-robots

  24. Kamm, F.M.: The Trolley Problem Mysteries. Oxford University Press (2015)

    Google Scholar 

  25. Kirschgens, L.A., Ugarte, I.Z., Uriarte, E.G., Rosas, A.M., Vilches, V.M.: Robot hazards: from safety to security (2018). arXiv preprint arXiv:1806.06681

  26. Kiwibot: Kiwibot. https://www.kiwibot.com/

  27. Kroemer, O., Niekum, S., Konidaris, G.: A review of robot learning for manipulation: challenges, representations, and algorithms. J. Mach. Learn. Res. 22(1), 1395–1476 (2021)

    MathSciNet  Google Scholar 

  28. Lacava, G., et al.: Cybser security issues in robotics. J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl. 12(3), 1–28 (2021)

    Google Scholar 

  29. Larson, S.: Ransomware experiment shows the dangers of hacking robots (2018). https://money.cnn.com/2018/03/09/technology/robots-ransomware/index.html

  30. Lin, P., Bekey, G.A., Abney, K.: Robots in war: issues of risk and ethics (2009)

    Google Scholar 

  31. Liu, Y., Ma, X., Bailey, J., Lu, F.: Reflection backdoor: a natural backdoor attack on deep neural networks. In: Vedaldi, A., Bischof, H., Brox, T., Frahm, J.-M. (eds.) ECCV 2020. LNCS, vol. 12355, pp. 182–199. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-58607-2_11

    Chapter  Google Scholar 

  32. Luo, M., Myers, A.C., Suh, G.E.: Stealthy tracking of autonomous vehicles with cache side channels. In: 29th USENIX Security Symposium (USENIX Security 20), pp. 859–876 (2020)

    Google Scholar 

  33. Lutz, C., Schöttler, M., Hoffmann, C.P.: The privacy implications of social robots: scoping review and expert interviews. Mob. Media Commun. 7(3), 412–434 (2019)

    Article  Google Scholar 

  34. Mayoral-Vilches, V., Carbajo, U.A., Gil-Uriarte, E.: Industrial robot ransomware: Akerbeltz. In: 2020 Fourth IEEE International Conference on Robotic Computing (IRC), pp. 432–435 (2020). https://doi.org/10.1109/IRC.2020.00080

  35. McDaniel, P., Koushanfar, F.: Secure and trustworthy computing 2.0 vision statement (2023). arXiv preprint arXiv:2308.00623

  36. Mulliner, C., Borgaonkar, R., Stewin, P., Seifert, J.-P.: SMS-based one-time passwords: attacks and defense. In: Rieck, K., Stewin, P., Seifert, J.-P. (eds.) DIMVA 2013. LNCS, vol. 7967, pp. 150–159. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-39235-1_9

    Chapter  Google Scholar 

  37. Nevejans, N.: EUROPEAN CIVIL LAW RULES IN ROBOTICS (2016). http://www.europarl.europa.eu/committees/fr/supporting-analyses-search.html

  38. Niemeyer, G., Preusche, C., Stramigioli, S., Lee, D.: Telerobotics. In: Siciliano, B., Khatib, O. (eds.) Springer Handbook of Robotics, pp. 1085–1108. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-32552-1_43

    Chapter  Google Scholar 

  39. Othman, F., Bahrin, M., Azli, N., et al.: Industry 4.0: a review on industrial automation and robotic. J. Teknol. 78(6–13), 137–143 (2016)

    Google Scholar 

  40. Petit, J., Shladover, S.E.: Potential cyberattacks on automated vehicles. IEEE Trans. Intell. Transp. Syst. 16(2), 546–556 (2015). https://doi.org/10.1109/TITS.2014.2342271

    Article  Google Scholar 

  41. Ranaweera, M., Mahmoud, Q.H.: Virtual to real-world transfer learning: a systematic review. Electronics 10(12), 1491 (2021)

    Article  Google Scholar 

  42. REUTER, E.: Hospitals sue surgical robot maker, saying it forced them into restrictive contracts. https://medcitynews.com/2021/07/hospitals-sue-surgical-robot-maker-saying-it-forced-them-into-restrictive-contracts/ (2021)

  43. Serve: Serve Robotics Becomes First Autonomous Vehicle Company to Commercially Launch Level 4 Self-Driving Robots. https://www.serverobotics.com/level-4-autonomy

  44. Shah, R., Ahmed, M., Nagaraja, S.: Fingerprinting robot movements via acoustic side channel (2022). arXiv preprint arXiv:2209.10240

  45. Shah, R., Ahmed, M., Nagaraja, S.: Reconstructing robot operations via radio-frequency side-channel (2022). arXiv preprint arXiv:2209.10179

  46. Sugawara, T., Cyr, B., Rampazzi, S., Genkin, D., Fu, K.: Light commands: Laser-Based audio injection attacks on Voice-Controllable systems. In: 29th USENIX Security Symposium (USENIX Security 20), pp. 2631–2648. USENIX Association (2020). https://www.usenix.org/conference/usenixsecurity20/presentation/sugawara

  47. Szpak, A.: Legality of use and challenges of new technologies in warfare - the use of autonomous weapons in contemporary or future wars. Eur. Rev. 28(1), 118–131 (2020). https://doi.org/10.1017/S1062798719000310

    Article  Google Scholar 

  48. Team, Y.S.D.: The story behind the creation of Yandex’s delivery robot (2021). https://medium.com/yandex-self-driving-car/the-story-behind-the-creation-of-yandexs-delivery-robot-e07017940589

  49. Tesla: Tesla Bot Update (2023). https://www.youtube.com/watch?v=XiQkeWOFwmk

  50. Tu, Y., Lin, Z., Lee, I., Hei, X.: Injected and delivered: fabricating implicit control over actuation systems by spoofing inertial sensors. In: 27th USENIX Security Symposium (USENIX Security 18), pp. 1545–1562 (2018)

    Google Scholar 

  51. Vemprala, S., Bonatti, R., Bucker, A., Kapoor, A.: ChatGPT for robotics: design principles and model abilities. Microsoft Auton. Syst. Robot. Res 2, 20 (2023)

    Google Scholar 

  52. Wang, T.M., Tao, Y., Liu, H.: Current researches and future development trend of intelligent robot: a review. Int. J. Autom. Comput. 15(5), 525–546 (2018)

    Article  Google Scholar 

  53. Winfield, A.F.T., Winkle, K., Webb, H., Lyngs, U., Jirotka, M., Macrae, C.: Robot accident investigation: a case study in responsible robotics. In: Software Engineering for Robotics, pp. 165–187. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-66494-7_6

    Chapter  Google Scholar 

  54. Yaacoub, J.P.A., Noura, H.N., Salman, O., Chehab, A.: Robotics cyber security: vulnerabilities, attacks, countermeasures, and recommendations. Int. J. Inf. Secur. 1–44 (2022)

    Google Scholar 

  55. Yang, C.H.H., et al.: Enhanced adversarial strategically-timed attacks against deep reinforcement learning. In: ICASSP 2020–2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 3407–3411. IEEE (2020)

    Google Scholar 

  56. Yevgen Chebotar, T.Y.: RT-2: New model translates vision and language into action. https://www.deepmind.com/blog/rt-2-new-model-translates-vision-and-language-into-action (2023)

  57. Yogeeswaran, K., Złotowski, J., Livingstone, M., Bartneck, C., Sumioka, H., Ishiguro, H.: The interactive effects of robot anthropomorphism and robot ability on perceived threat and support for robotics research. J. Hum.-Robot Interact. 5(2), 29–47 (2016)

    Article  Google Scholar 

  58. Zhu, Q., Rass, S., Dieber, B., Vilches, V.M., et al.: Cybersecurity in robotics: challenges, quantitative modeling, and practice. Found. Trends® Robot. 9(1), 1–129 (2021)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiali Hei .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Afroze, D., Tu, Y., Hei, X. (2024). Securing the Future: Exploring Privacy Risks and Security Questions in Robotic Systems. In: Chen, Y., Lin, CW., Chen, B., Zhu, Q. (eds) Security and Privacy in Cyber-Physical Systems and Smart Vehicles. SmartSP 2023. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 552. Springer, Cham. https://doi.org/10.1007/978-3-031-51630-6_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-51630-6_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-51629-0

  • Online ISBN: 978-3-031-51630-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics