Cyber Security Risks in Robotics

2018 ◽  
pp. 1235-1250 ◽  
Author(s):  
Ishaani Priyadarshini

With technology flourishing at a rapid rate, humans have been able to achieve considerable heights of success. Accomplishment of tasks nowadays is either a click away or a command away in most of the technological arenas. One such realm of technology is that of Robotics which has been there for almost a century and continues advancing day by day. The evolution of robotics has ranged from the basic remote controlled systems to humanoid robots. With applications as well as accuracy increasing for every new system implemented, security risks too have been making their way into the new invention. Since different robots have been created for different purposes in different fields like the defense, household, medical or the space, protecting systems against their exploitation is of utmost importance as these fields incorporate sensitive as well as intricate tasks. This chapter focuses on the security aspects of Robotics. The necessity of Cyber security in Robotics has been explored by taking different kinds of robots used in different fields. The current state of Robotics is vulnerable to many risks and several case studies have been highlighted to support the need of securing Robotics by identifying several risks to which it is vulnerable. Apart from that mitigation strategies have been discussed to secure the domain of Robotics. An attack comparison has been made for three robots in analyzing them against the vulnerabilities faced by them.

Author(s):  
Ishaani Priyadarshini

With technology flourishing at a rapid rate, humans have been able to achieve considerable heights of success. Accomplishment of tasks nowadays is either a click away or a command away in most of the technological arenas. One such realm of technology is that of Robotics which has been there for almost a century and continues advancing day by day. The evolution of robotics has ranged from the basic remote controlled systems to humanoid robots. With applications as well as accuracy increasing for every new system implemented, security risks too have been making their way into the new invention. Since different robots have been created for different purposes in different fields like the defense, household, medical or the space, protecting systems against their exploitation is of utmost importance as these fields incorporate sensitive as well as intricate tasks. This chapter focuses on the security aspects of Robotics. The necessity of Cyber security in Robotics has been explored by taking different kinds of robots used in different fields. The current state of Robotics is vulnerable to many risks and several case studies have been highlighted to support the need of securing Robotics by identifying several risks to which it is vulnerable. Apart from that mitigation strategies have been discussed to secure the domain of Robotics. An attack comparison has been made for three robots in analyzing them against the vulnerabilities faced by them.


2020 ◽  
Vol 13 (1) ◽  
pp. 103-128 ◽  
Author(s):  
Shipra Pandey ◽  
Rajesh Kumar Singh ◽  
Angappa Gunasekaran ◽  
Anjali Kaushik

Purpose The purpose of this study is to examine cyber security risks in globalized supply chains (SCs). It has been seen to have a greater impact on the performance of SCs. The information and communication technology of a firm, which enhances the efficiency and effectiveness in the SC, could simultaneously be the cause of vulnerabilities and exposure to security threats. Researchers have primarily focussed on the cyber-physical system (CPS) vulnerabilities impacting SC. This paper tries to categorize the cyber security risks occurring because of the SCs operating in CPS. Design/methodology/approach Based on the flow of information along the upstream and downstream SC, this paper tries to identify cyber security risks in the global SCs. It has further tried to categorize these cyber security risks from a strategic point of view. Findings This paper tries to identify the various cyber security risk and cyber-attacks in globalized SC for improving the performance. The 16 cyber security risks have been categorized into three categories, namely, supply risk, operational risk and demand risk. The paper proposes a framework consisting of different cyber-attacks across the information that flows in global SCs along-with suitable mitigation strategies. Research limitations/implications The paper presents the conceptual model of cyber security risks and cyber-attacks in globalized SCs based on literature review and industry experts. Further validation and scale development of these risks can be done through empirical study. Practical implications This paper provides significant managerial insights by developing a framework for understanding the cyber security risks in terms of the drivers of these risks and how to deal with them. From a managerial perspective, this framework can be used as a decision-making process while considering different cyber security risks across the stages of globalized SCs. Originality/value The major contribution of this study is the identification and categorization of cyber security risks across the global SCs in the digital age. Thus, this paper introduces a new phenomenon to the field of management that has the potential to investigate new areas of future research. Based on the categorization, the paper provides insights on how cyber security risks impact the continuity of SC operations.


2021 ◽  
Author(s):  
Daniel Alexandre Morelli ◽  
Paulo Sergio de Arruda Ignacio

Abstract Cloud computing technology has been studied in the context of industry 4.0 as a tool applied to manufacturing services and resources. Such concept is widely known as Cloud Manufacturing. This paper aims at mapping the current state of academic researches on this field, promoting the understanding of trends, references and practical applications in real-life conditions. A bibliometric analysis was conducted using two different databases – Scopus and Web of Sciences – and VOSviewer’s text mining tools and techniques. From a sample of 1,420 papers, this study identified the countries which had the largest volume of publications, the main journals related to the subject, the most influent articles, and four clusters by keywords occurrences: (i) “Optimization of manufacturing processes”, (ii) “Collaborative networks of manufacturing resources and services”, (iii) “Industry 4.0 and cloud computing systems”, and (iv) “Data reliability and cyber-security”. Finally, this work selected and analyzed the 159 articles with applied case studies, in order to stratify and to understand the most common approaches within the four pre-established categories. This article can contribute to researchers and developers searching for successful practical applications in digitalization of manufacturing chains, as well as to those who are looking for gaps in the still unexplored fields of Cloud Manufacturing. Both the assessment and the categorization of the case studies about Cloud Manufacturing is a differential in this article.


2021 ◽  
Author(s):  
Daniel Alexandre Morelli ◽  
Paulo Sergio de Arruda Ignacio

Abstract Cloud computing technology has been studied in the context of industry 4.0 as a tool applied to manufacturing services and resources. Such concept is widely known as Cloud Manufacturing. This paper aims at mapping the current state of academic researches on this field, promoting the understanding of trends, references and practical applications in real-life conditions. A bibliometric analysis was conducted using two different databases – Scopus and Web of Sciences – and VOSviewer’s text mining tools and techniques. From a sample of 1,420 papers, this study identified the countries which had the largest volume of publications, the main journals related to the subject, the most influent articles, and four clusters by keywords occurrences: (i) “Optimization of manufacturing processes”, (ii) “Collaborative networks of manufacturing resources and services”, (iii) “Industry 4.0 and cloud computing systems”, and (iv) “Data reliability and cyber-security”. Finally, this work selected and analyzed the 159 articles with applied case studies, in order to stratify and to understand the most common approaches within the four pre-established categories. This article can contribute to researchers and developers searching for successful practical applications in digitalization of manufacturing chains, as well as to those who are looking for gaps in the still unexplored fields of Cloud Manufacturing. Both the assessment and the categorization of the case studies about Cloud Manufacturing are the differentials in this article.


2021 ◽  
Vol 21 (1) ◽  
Author(s):  
Javad Sharifi-Rad ◽  
Cristina Quispe ◽  
Monica Butnariu ◽  
Lia Sanda Rotariu ◽  
Oksana Sytar ◽  
...  

AbstractThe study describes the current state of knowledge on nanotechnology and its utilization in medicine. The focus in this manuscript was on the properties, usage safety, and potentially valuable applications of chitosan-based nanomaterials. Chitosan nanoparticles have high importance in nanomedicine, biomedical engineering, discovery and development of new drugs. The manuscript reviewed the new studies regarding the use of chitosan-based nanoparticles for creating new release systems with improved bioavailability, increased specificity and sensitivity, and reduced pharmacological toxicity of drugs. Nowadays, effective cancer treatment is a global problem, and recent advances in nanomedicine are of great importance. Special attention was put on the application of chitosan nanoparticles in developing new system for anticancer drug delivery. Pre-clinical and clinical studies support the use of chitosan-based nanoparticles in nanomedicine. This manuscript overviews the last progresses regarding the utilization, stability, and bioavailability of drug nanoencapsulation with chitosan and their safety.


2017 ◽  
Author(s):  
Sayamindu Dasgupta ◽  
Benjamin Mako Hill

In this paper, we present Scratch Community Blocks, a new system that enables children to programmatically access, analyze, and visualize data about their participation in Scratch, an online community for learning computer programming. At its core, our approach involves a shift in who analyzes data: from adult data scientists to young learners themselves. We first introduce the goals and design of the system and then demonstrate it by describing example projects that illustrate its functionality. Next, we show through a series of case studies how the system engages children in not only representing data and answering questions with data but also in self-reflection about their own learning and participation.


2018 ◽  
Vol 3 (1) ◽  
pp. 36
Author(s):  
Weiling Liu

It has been a decade since Tim Berners-Lee coined Linked Data in 2006. More and more Linked Data datasets have been made available for information retrieval on the Web.  It is essential for librarians, especially academic librarians, to keep up with the state of Linked Data.  There is so much information about Linked Data that one may wonder where to begin when they want to join the Linked Data community. With this in mind, the author compiled this annotated bibliography as a starter kit.  Due to the many resources available, this list focuses on literature in English only and of specific projects, case studies, research studies, and tools that may be helpful to academic librarians, in addition to the overview of Linked Data concept and the current state of Linked Data evolution and adoption.


Author(s):  
Andy Shih ◽  
Arthur Choi ◽  
Adnan Darwiche

We propose an approach for explaining Bayesian network classifiers, which is based on compiling such classifiers into decision functions that have a tractable and symbolic form. We introduce two types of explanations for why a classifier may have classified an instance positively or negatively and suggest algorithms for computing these explanations. The first type of explanation identifies a minimal set of the currently active features that is responsible for the current classification, while the second type of explanation identifies a minimal set of features whose current state (active or not) is sufficient for the classification. We consider in particular the compilation of Naive and Latent-Tree Bayesian network classifiers into Ordered Decision Diagrams (ODDs), providing a context for evaluating our proposal using case studies and experiments based on classifiers from the literature.


Sign in / Sign up

Export Citation Format

Share Document