Derleme

THREATS, VULNERABILITIES AND MEASURES IN ROBOT COMMUNICATION SECURITY: A REVIEW

Cilt: 29 Sayı: 1 3 Mart 2026
PDF İndir
TR EN

THREATS, VULNERABILITIES AND MEASURES IN ROBOT COMMUNICATION SECURITY: A REVIEW

Abstract

The expansion of networks and the rapid advancement of technology have led to a significant increase in the use of robots across various domains, including robotics, automotive, healthcare, military, and education, thereby bringing numerous security concerns to the forefront. Although it is nearly impossible to completely eliminate security vulnerabilities in robot communication, academia and industry continue to pursue extensive research in this field. This study compiles and organizes recent research in robotics involving network-based, Internet of Things (IoT), Robot Operating System (ROS), and other related approaches, providing a detailed examination of security threats, vulnerabilities, and their conceptual explanations. Furthermore, secure communication protocols, cryptographic methods, and the impact of emerging technologies such as blockchain and edge computing on secure robot communication are discussed. The findings indicate that these evolving technologies hold considerable promise for enhancing the security of robot communications

Keywords

Kaynakça

  1. Abed, M. S., Al-Doori, Q. F., Abdullah, A. T., & Abdallah, A. A. (2023). Security Vulnerabilities and Threats in Robotic Systems: A Comprehensive Review. International Journal of Safety and Security Engineering, 13(3), 555–563. https://doi.org/10.18280/ijsse.130318
  2. Abeykoon, I., & Feng, X. (2017). A Forensic Investigation of the Robot Operating System. 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), 851–857. https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2017.131
  3. Acun, M. F., Daldal, M., & Avci, K. (2023). STM32F407 ve Nodemcu ESP8266 Kartları Kullanarak Kablosuz Çok Yönlü Kontrollü Robotik Araç Sisteminin Geliştirilmesi. Kahramanmaraş Sütçü İmam Üniversitesi Mühendislik Bilimleri Dergisi, 26(4), 1030–1049. https://doi.org/10.17780/ksujes.1351636
  4. Alquwayzani, A. A., & Albuali, A. A. (2024). A Systematic Literature Review of Zero Trust Architecture for Military UAV Security Systems. IEEE Access, 12, 176033–176056. https://doi.org/10.1109/ACCESS.2024.3503587
  5. Alsharif, M., Mishra, S., & AlShehri, M. (2022). Impact of Human Vulnerabilities on Cybersecurity. Computer Systems Science and Engineering, 40(3), 1153–1166. https://doi.org/10.32604/csse.2022.019938
  6. Bentayeb, Y., Chaoui, K., & Badir, H. (2025). Integrating Blockchain and Edge Computing: A Systematic Analysis of Security, Efficiency, and Scalability. International Journal of Advanced Computer Science and Applications, 16(1). https://doi.org/10.14569/IJACSA.2025.0160160
  7. Botta, A., Rotbei, S., Zinno, S., & Ventre, G. (2023). Cyber security of robots: A comprehensive survey. Intelligent Systems with Applications, 18, 200237. https://doi.org/10.1016/j.iswa.2023.200237
  8. Brady, M. (1985). Artificial intelligence and robotics. Artificial Intelligence, 26(1), 79–121. https://doi.org/10.1016/0004-3702(85)90013-X

Ayrıntılar

Birincil Dil

İngilizce

Konular

Bilgi Güvenliği Yönetimi , Bilgi Güvenliği ve Kriptoloji , Veri Güvenliği ve Korunması

Bölüm

Derleme

Yayımlanma Tarihi

3 Mart 2026

Gönderilme Tarihi

7 Ekim 2025

Kabul Tarihi

20 Kasım 2025

Yayımlandığı Sayı

Yıl 2026 Cilt: 29 Sayı: 1

Kaynak Göster

APA
Altun, V. C., Ata, B., & Canbay, Y. (2026). THREATS, VULNERABILITIES AND MEASURES IN ROBOT COMMUNICATION SECURITY: A REVIEW. Kahramanmaraş Sütçü İmam Üniversitesi Mühendislik Bilimleri Dergisi, 29(1), 515-532. https://doi.org/10.17780/ksujes.1798745