Skip to main content

Cybersecurity Threats in Military Robotic and Autonomous Systems

  • Conference paper
  • First Online:
Robot 2023: Sixth Iberian Robotics Conference (ROBOT 2023)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 978))

Included in the following conference series:

  • 293 Accesses

Abstract

The Russia-Ukraine war emphasised how digital technology and the information domain increasingly integrate into modern battlefields. The military strategy began using Robotic and Autonomous Systems (RASs) to enhance tactical and strategic advantages over conventional weaponry and kinetic military action. Evolution in these circumstances increased dependence on cyberspace, algorithms, automation, and robots, creating new opportunities and challenges. Using military RASs in physical warfare can provide relevant operational advantages and open new vulnerabilities, increasing a system attack surface. This research examines military RAS cybersecurity threats, potential vulnerabilities affecting the attack surface, and the importance of responsible and precise technical innovation. It is concluded that technological innovation in these systems must comply with cyber and broad security by design principles, military needs, and the rules of war. Military and political leaders must make educated decisions to maximise gains and minimise risks from complex combat technologies, with the military leadership promoting the revision of doctrine to accommodate new technologies on the battlefield.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Albakjaji, M., Almarzoqi, R.: The impact of digital technology on international relations: the case of the war between Russia and Ukraine. Access Justice East. Europe  6, 1–17 (2023)

    Google Scholar 

  2. NATO Standardization Agency: AJP-3.20 Allied Joint Doctrine for Cyberspace Operations. NATO Standard AJP-320 (2020)

    Google Scholar 

  3. Borges, J.V.: Robots and the military: a strategic view. In: Aldinhas Ferreira, M., Silva Sequeira, J., Tokhi, M., E. Kadar, E., Virk, G. (eds.) A World with Robots. Intelligent Systems, Control and Automation: Science and Engineering, vol 84. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-46667-5_15

  4. Shankar, S.P., Varadam, D., Bharadwaj, A., Saxena, T., Mohta, R., Shankar, A.: Artificial intelligence for defence: a comprehensive study on applying ai for the airforce, navy, and army. Emerg. Trends Tech. Appl. Geospatial Data Sci., 244–262 (2023). https://doi.org/10.4018/978-1-6684-7319-1.ch012

  5. Luo, R.C., Chang, C.-C.: Multisensor fusion and integration: a review on approaches and its applications in mechatronics. IEEE Trans Industr Inform 8, 49–60 (2012)

    Article  Google Scholar 

  6. Rademaker, M., Arkhipov-Goyal, A., Atalla, S., Bekkers, F., Bolder, P., Chavannes, E., et al.: Robotic and autonomous systems in a military context. Hague Centre for Strategic Studies (2021)

    Google Scholar 

  7. Garcia, D.: Future arms, technologies, and international law: Preventive security governance. Eur. J. Int. Secur. 1, 94–111 (2016)

    Article  Google Scholar 

  8. Gilli, A., Gilli, M.: The diffusion of drone warfare? Industrial, organisational, and infrastructural constraints. Secur. Stud. 25, 50–84 (2016)

    Article  Google Scholar 

  9. Martian, A., Chiper, F.-L., Craciunescu, R., Vladeanu, C., Fratu, O., Marghescu, I.: RF Based UAV detection and defense systems: survey and a novel solution. In: 2021 IEEE International Black Sea Conference on Communications and Networking, BlackSeaCom 2021 (2021)

    Google Scholar 

  10. Tang, Q., Liang, J., Zhu, F.: A comparative review on multi-modal sensors fusion based on deep learning. Signal Process. 213, 109165 (2023)

    Google Scholar 

  11. Eaton, C., Chong, E., Maciejewski, A.: Multiple-scenario unmanned aerial system control: a systems engineering approach and review of existing control methods. Aerospace 3, 1 (2016)

    Article  Google Scholar 

  12. Scharre, P.: How swarming will change warfare. Bull. Atomic Scientists 74(6), 385–389 (2018)

    Article  Google Scholar 

  13. Ross, R.: Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy, Special Publication (NIST SP), National Institute of Standards and Technology, Gaithersburg, MD (2018). https://doi.org/10.6028/NIST.SP.800-37r2. Accessed 4 Apr 2024

  14. NATO. Warsaw Summit Communiqué. Press Release 100 2016 (2016). https://www.nato.int/cps/en/natohq/official_texts_133169.htm (accessed June 20, 2023)

Download references

Acknowledgments

This work was partially supported by the European Defence Fund (EDF) through project ACTING – Advanced European platform and network of Cybersecurity training and exercises centres (101103208 – ACTING – EDF – 2021 – CYBER).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to José Borges .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Borges, J., Rosado, D.P. (2024). Cybersecurity Threats in Military Robotic and Autonomous Systems. In: Marques, L., Santos, C., Lima, J.L., Tardioli, D., Ferre, M. (eds) Robot 2023: Sixth Iberian Robotics Conference. ROBOT 2023. Lecture Notes in Networks and Systems, vol 978. Springer, Cham. https://doi.org/10.1007/978-3-031-59167-9_20

Download citation

Publish with us

Policies and ethics