TY - JOUR
T1 - Ciberseguridad del internet de las cosas robóticas
T2 - Plataforma experimental
AU - Flores-Montaño, Luis Alberto
AU - Herrera-Lozada, Juan Carlos
AU - Sandoval-Gutiérrez, Jacobo
AU - Vázquez-López, Rodrigo
AU - Martínez-Vázquez, Daniel Librado
N1 - Publisher Copyright:
© 2021 Publicaciones Dyna Sl. All rights reserved.
PY - 2021
Y1 - 2021
N2 - The Internet of Robotic Things (IoRT) is a technology that seeks to monitor, operate and maintain the tasks of multiple robots through the cloud. However, these robots in cyberspace have different risks and inherent problems in cybersecurity. To analyze these implications, vulnerabilities and threats of the technology, the aim was to design, operate and submit an IoRT system, using a default configuration. The proposed methodology consisted of designing an IoRT architecture; implementing three robotic platforms linked to the cloud, carry out sniffing and ARP Spoofing Attacks. The experiment used three prototypes: two servo motors, a 6-degree-of-freedom arm and a workstation. Additionally, the tools for the experiment were a Raspberry Pi microcomputer, the Robotic Operative System middleware, Kali Linux SO and the Thingspeak cloud service. Into the tests, we applied two scenarios, one ideal, and the other with physical and software attacks. The contribution of the research proved that four connection types are sufficient to standardize, and ensure the integrity, confidentiality, and availability in the operation of different types of robots. Although these are not designed to work on the internet through a slave-robot node link. Another contribution was to obtain a real list of the consequences given the vulnerabilities and tested attacks, as well as suggestions.
AB - The Internet of Robotic Things (IoRT) is a technology that seeks to monitor, operate and maintain the tasks of multiple robots through the cloud. However, these robots in cyberspace have different risks and inherent problems in cybersecurity. To analyze these implications, vulnerabilities and threats of the technology, the aim was to design, operate and submit an IoRT system, using a default configuration. The proposed methodology consisted of designing an IoRT architecture; implementing three robotic platforms linked to the cloud, carry out sniffing and ARP Spoofing Attacks. The experiment used three prototypes: two servo motors, a 6-degree-of-freedom arm and a workstation. Additionally, the tools for the experiment were a Raspberry Pi microcomputer, the Robotic Operative System middleware, Kali Linux SO and the Thingspeak cloud service. Into the tests, we applied two scenarios, one ideal, and the other with physical and software attacks. The contribution of the research proved that four connection types are sufficient to standardize, and ensure the integrity, confidentiality, and availability in the operation of different types of robots. Although these are not designed to work on the internet through a slave-robot node link. Another contribution was to obtain a real list of the consequences given the vulnerabilities and tested attacks, as well as suggestions.
KW - Cloud
KW - Common Vulnerabilities and Exposures
KW - Cybersecurity
KW - Industry 4.0
KW - IoRT
KW - ROS
UR - http://www.scopus.com/inward/record.url?scp=85107707898&partnerID=8YFLogxK
U2 - 10.15420/USC.2021.02
DO - 10.15420/USC.2021.02
M3 - Artículo
AN - SCOPUS:85107707898
SN - 0012-7361
JO - Dyna (Spain)
JF - Dyna (Spain)
ER -