Domestic robots: a case study on security in ubiquitous computing

نویسنده

  • Thomas Knell
چکیده

The purpose of this essay is to look at the existing publications about domestic robots. Specifically those which are about security and privacy concerns and find possible reasons for the lack of papers in this research area. INTRODUCTION The industry as well as the academic world seem so agree that robots will become an integral part of our daily lives in the near future. Much of the early work on robotics focused on building industrial robots where robots helped automate parts of the manufacturing process. A more recent trend is that robots start appearing in households performing tasks such as cleaning windows, mowing lawns or cleaning floors (Figure 1). Figure 1: iRobot Roomba 560 Vacuum Cleaner [14]. Robots like these have very specific tasks and can perform those tasks well, but generally don’t offer a great set of interfaces to control/access them. Due to that fact, these kinds of robots are not very likely to be targets of potential attacks. We can assume that more sophisticated robots like the PR2 robot (Figure 2), which for example can be told via webinterface to go grab a beer in the fridge and bring it to a certain location, will be used in household at some point in the future. An unauthorized entity being able to take over control of such a robot with its multiple sensors, actuators and mobility could cause serious harm. For this reason it is imperative to take security and privacy consideration into account when building such systems. Figure 2: Willow Garage PR2, Robot for Research and Innovation [15]. Two papers addressing security and privacy in the context of robots, i.e. [1, 2] both from 2009, mention in their respective introductions that, according to them, there is a surprising lack of research done in this area. Five years later and there are still very little research papers devoted to this specific area of research.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

RESCUE: Reputation based Service for Cloud User Environment

Exceptional characteristics of Cloud computing has replaced all traditional computing. With reduced resource management and without in-advance investment, it has been victorious in making the IT world to migrate towards it. Microsoft announced its office package as Cloud, which can prevent people moving from Windows to Linux. As this drift is escalating in an exponential rate, the cloud environ...

متن کامل

Comparative Advantage, Self-sufficiency and Food Security in Iran: Case Study of Wheat Commodity

Food security has a dynamic notion during the time and may be affected by various domestic and global factors.Nevertheless, Iranian policy makers consider food security as same as self-sufficiency in agricultural food products, particularly wheat production. However, self-sufficiency can contribute to food security only if it is in coincidences with comparative advantage and sustainable resourc...

متن کامل

A Study on RFID System with Secure Service Availability for Ubiquitous Computing

Spotlighted as an innovative information technology environment, ubiquitous computing has been actively researched on recently. Especially, domestic and global researches focus on the RFID system, which is being eyed to replace the existing bar-code system. As an essential technology for ubiquitous computing, the RFID system can be applied for various purposes. The security issues of the RFID s...

متن کامل

A Literature Review on Cloud Computing Security Issues

The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...

متن کامل

A Literature Review on Cloud Computing Security Issues

The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014