Paper
25 February 1987 Computer Security For Mobile Robots: Attacks And Counter Strategies
Sharon M. Hogge
Author Affiliations +
Proceedings Volume 0727, Mobile Robots I; (1987) https://doi.org/10.1117/12.937812
Event: Cambridge Symposium_Intelligent Robotics Systems, 1986, Cambridge, MA, United States
Abstract
The objective of this work is to investigate the security requirements and strategies for intelligent mobile robots, perform tests to determine strengths and weaknesses of test bed platforms, and develop counter strategies to improve security of the test bed platforms. This research will discuss the implications of these results on large scale ongoing efforts in mobile robotics. Potential security threats range from accidental intrusion of the device's hardware or software by untrained personnel to deliberate "spoofing" of sensor suites by unauthorized users or enemies.
© (1987) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Sharon M. Hogge "Computer Security For Mobile Robots: Attacks And Counter Strategies", Proc. SPIE 0727, Mobile Robots I, (25 February 1987); https://doi.org/10.1117/12.937812
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Sensors

Robotic systems

Computer security

Mobile robots

Weapons

Computing systems

Robotics

RELATED CONTENT

Banknotes and unattended cash transactions
Proceedings of SPIE (April 07 2000)
Mobile Robotic Systems Of The Near Future
Proceedings of SPIE (February 25 1987)
Army's Activities In Artificial Intelligence/Robotics
Proceedings of SPIE (May 23 1983)
Positioning polygonal parts without sensors
Proceedings of SPIE (November 29 1993)
Real-time distributed map building in large environments
Proceedings of SPIE (October 16 2000)
A concept for ubiquitous robotics in industrial environment
Proceedings of SPIE (September 10 2007)

Back to Top