Derleme
BibTex RIS Kaynak Göster

ROBOT İLETİŞİM GÜVENLİĞİNDEKİ TEHDİTLER, ZAFİYETLER VE ÖNLEMLER: BİR İNCELEME

Yıl 2026, Cilt: 29 Sayı: 1, 515 - 532, 03.03.2026
https://izlik.org/JA36JR45EF

Öz

Ağların büyümesi ve teknolojinin hızlı ilerlemesi, robotik başta olmak üzere otomotiv, sağlık, askeri ve eğitim gibi birçok alanda robot kullanımının hızla artmasına yol açmış, bu durum ise çeşitli güvenlik endişelerini gündeme taşımıştır. Robot iletişimindeki güvenlik açıklarını tamamen ortadan kaldırmak neredeyse imkânsız olsa da, akademi ve sektör bu alandaki çalışmalarını aralıksız sürdürmektedir. Bu çalışmada, robotik alanında network, Internet of Things (IoT), Robot Operating System (ROS) ve diğer tabanlı yaklaşımları içeren güncel araştırmalar derlenmiş; robotik sistemlerde karşılaşılan güvenlik tehditleri, zafiyetler ve bunlara ilişkin kavramsal açıklamalar ayrıntılı olarak ele alınmıştır. Ayrıca, güvenli iletişim protokolleri, kriptografik yöntemler ve blockchain ile edge computing gibi güncel teknolojilerin güvenli robot iletişimine etkileri incelenmiştir. Elde edilen bulgular, gelişen teknolojilerin robot iletişiminde güvenliği artırma konusunda umut vadettiğini ortaya koymaktadır.

Kaynakça

  • Abed, M. S., Al-Doori, Q. F., Abdullah, A. T., & Abdallah, A. A. (2023). Security Vulnerabilities and Threats in Robotic Systems: A Comprehensive Review. International Journal of Safety and Security Engineering, 13(3), 555–563. https://doi.org/10.18280/ijsse.130318
  • Abeykoon, I., & Feng, X. (2017). A Forensic Investigation of the Robot Operating System. 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), 851–857. https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2017.131
  • Acun, M. F., Daldal, M., & Avci, K. (2023). STM32F407 ve Nodemcu ESP8266 Kartları Kullanarak Kablosuz Çok Yönlü Kontrollü Robotik Araç Sisteminin Geliştirilmesi. Kahramanmaraş Sütçü İmam Üniversitesi Mühendislik Bilimleri Dergisi, 26(4), 1030–1049. https://doi.org/10.17780/ksujes.1351636
  • Alquwayzani, A. A., & Albuali, A. A. (2024). A Systematic Literature Review of Zero Trust Architecture for Military UAV Security Systems. IEEE Access, 12, 176033–176056. https://doi.org/10.1109/ACCESS.2024.3503587
  • Alsharif, M., Mishra, S., & AlShehri, M. (2022). Impact of Human Vulnerabilities on Cybersecurity. Computer Systems Science and Engineering, 40(3), 1153–1166. https://doi.org/10.32604/csse.2022.019938
  • Bentayeb, Y., Chaoui, K., & Badir, H. (2025). Integrating Blockchain and Edge Computing: A Systematic Analysis of Security, Efficiency, and Scalability. International Journal of Advanced Computer Science and Applications, 16(1). https://doi.org/10.14569/IJACSA.2025.0160160
  • Botta, A., Rotbei, S., Zinno, S., & Ventre, G. (2023). Cyber security of robots: A comprehensive survey. Intelligent Systems with Applications, 18, 200237. https://doi.org/10.1016/j.iswa.2023.200237
  • Brady, M. (1985). Artificial intelligence and robotics. Artificial Intelligence, 26(1), 79–121. https://doi.org/10.1016/0004-3702(85)90013-X
  • Breiling, B., Dieber, B., & Schartner, P. (2017). Secure communication for the robot operating system. 2017 Annual IEEE International Systems Conference (SysCon), 1–6. https://doi.org/10.1109/SYSCON.2017.7934755
  • Canbay, Y., & Utku, A. (2024). A Comparative Study for Privacy-Aware Recommendation Systems. Gazi University Journal of Science Part A: Engineering and Innovation, 11(1), 68–79. https://doi.org/10.54287/gujsa.1393692
  • Degirmenci̇, E., Kirca, Y. S., Yolaçan, E. N., & Yazi̇ci̇, A. (2023). An Analysis of DoS Attack on Robot Operating System. Gazi University Journal of Science, 36(3), 1050–1069. https://doi.org/10.35378/gujs.976496
  • Degirmenci, E., Sabri Kırca, Y., Özçelik, İ., & Yazıcı, A. (2023). ROSIDS23: Network intrusion detection dataset for robot operating system. Data in Brief, 51, 109739. https://doi.org/10.1016/j.dib.2023.109739
  • Dere, N., & Ülkü, E. E. (2023). QUANTUM KEY DISTRIBUTION IN SMART HOME SYSTEMS. Kahramanmaraş Sütçü İmam Üniversitesi Mühendislik Bilimleri Dergisi, 26(4), 932–942. https://doi.org/10.17780/ksujes.1325805
  • Diro, A., Reda, H., Chilamkurti, N., Mahmood, A., Zaman, N., & Nam, Y. (2020). Lightweight Authenticated-Encryption Scheme for Internet of Things Based on Publish-Subscribe Communication. IEEE Access, 8, 60539–60551. https://doi.org/10.1109/ACCESS.2020.2983117
  • Doğan, N., & Özyurt, F. (2025). IOT DESTEKLİ HAVA DURUMU VERİLERİ İLE YAPAY ZEKÂ TABANLI HAVA TAHMİN SİSTEMİNİN GELİŞTİRİLMESİ. Kahramanmaraş Sütçü İmam Üniversitesi Mühendislik Bilimleri Dergisi, 28(1), 524–535. https://doi.org/10.17780/ksujes.1528386
  • Dourado, C. M. J. M., Da Silva, S. P. P., Da Nóbrega, R. V. M., Barros, A. C. S., Sangaiah, A. K., Rebouças Filho, P. P., & De Albuquerque, V. H. C. (2019). A new approach for mobile robot localization based on an online IoT system. Future Generation Computer Systems, 100, 859–881. https://doi.org/10.1016/j.future.2019.05.074
  • Fosch-Villaronga, E., & Mahler, T. (2021). Cybersecurity, safety and robots: Strengthening the link between cybersecurity and safety in the context of care robots. Computer Law & Security Review, 41, 105528. https://doi.org/10.1016/j.clsr.2021.105528
  • Gao, C., Wang, G., Shi, W., Wang, Z., & Chen, Y. (2022). Autonomous Driving Security: State of the Art and Challenges. IEEE Internet of Things Journal, 9(10), 7572–7595. https://doi.org/10.1109/JIOT.2021.3130054
  • Giansanti, D., & Gulino, R. A. (2021). The Cybersecurity and the Care Robots: A Viewpoint on the Open Problems and the Perspectives. Healthcare, 9(12), 1653. https://doi.org/10.3390/healthcare9121653
  • Goerke, N., Timmermann, D., & Baumgart, I. (2021). Who Controls Your Robot? An Evaluation of ROS Security Mechanisms. 2021 7th International Conference on Automation, Robotics and Applications (ICARA), 60–66. https://doi.org/10.1109/ICARA51699.2021.9376468
  • Greenberg, A. (2015, July 21). Hackers Remotely Kill a Jeep on the Highway—With Me in It [Security]. Hackers Remotely Kill a Jeep on the Highway—With Me in It. https://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/
  • Hamad, D., Yalda, K., Tapus, N., & Okumus, I. T. (2024). Enhancing IoT scalability and security through SDN. Revista Română de Informatică Și Automatică, 34(2), 113–126. https://doi.org/10.33436/v34i2y202409
  • IFR. (2024). Record of 4 Million Robots in Factories Worldwide (pp. 1–4) [Press Report]. IFR International Fedaration of Robotics. https://ifr.org/ifr-press-releases/news/record-of-4-million-robots-working-in-factories-worldwide
  • Jain, S., & Doriya, R. (2022). Security framework to healthcare robots for secure sharing of healthcare data from cloud. International Journal of Information Technology, 14(5), 2429–2439. https://doi.org/10.1007/s41870-022-00997-8
  • Javaid, M., Haleem, A., Singh, R. P., & Suman, R. (2021). Substantial capabilities of robotics in enhancing industry 4.0 implementation. Cognitive Robotics, 1, 58–75. https://doi.org/10.1016/j.cogr.2021.06.001
  • Johnson, S. D., Blythe, J. M., Manning, M., & Wong, G. T. W. (2020). The impact of IoT security labelling on consumer product choice and willingness to pay. PLOS ONE, 15(1), e0227800. https://doi.org/10.1371/journal.pone.0227800
  • Karaferis, D. C., Balaska, D., & Pollalis, Y. (2024). Artificial Intelligence and Robotics: Catalysts or Threats in the Development of Healthcare. Biostatistics and Biometrics Open Access Journal, 11(5), 14. https://doi.org/10.19080/BBOAJ.2024.11.555825
  • Khalid, A., Kirisci, P., Khan, Z. H., Ghrairi, Z., Thoben, K.-D., & Pannek, J. (2018). Security framework for industrial collaborative robotic cyber-physical systems. Computers in Industry, 97, 132–145. https://doi.org/10.1016/j.compind.2018.02.009
  • Kim, J., Smereka, J. M., Cheung, C., Nepal, S., & Grobler, M. (2018). Security and Performance Considerations in ROS 2: A Balancing Act (No. arXiv:1809.09566). arXiv. https://doi.org/10.48550/arXiv.1809.09566
  • Lalem, F., Laouid, A., Kara, M., Al-Khalidi, M., & Eleyan, A. (2023). A Novel Digital Signature Scheme for Advanced Asymmetric Encryption Techniques. Applied Sciences, 13(8), Article 8. https://doi.org/10.3390/app13085172
  • Liang, W., Ning, Z., Xie, S., Hu, Y., Lu, S., & Zhang, D. (2021). Secure fusion approach for the Internet of Things in smart autonomous multi-robot systems. Information Sciences, 579, 468–482. https://doi.org/10.1016/j.ins.2021.08.035
  • Lin, Y., Chen, Y., Qin, Y., Sun, Y., Xu, R., Yang, Y., Zhang, Z., Chen, J., Tian, Y., Cao, Y., Chai, X., Chen, H., Qi, H., & Pang, X. (2025). AI in the 5G-A Era: Scenarios, Key Technologies, and Evolution Trends. Huawei. Retrieved August 6, 2025. https://www.huawei.com/en/huaweitech/future-technologies/5ga-scenarios-key-technologies-evolution-trends
  • Ma, M. (2021). Comparison between RSA and ECC. 2021 2nd International Seminar on Artificial Intelligence, Networking and Information Technology (AINIT), 642–645. https://doi.org/10.1109/AINIT54228.2021.00129
  • Mao, Y., You, C., Zhang, J., Letaief, K. B., & Huang, K. (2017). A Survey on Mobile Edge Computing: The Communication Perspective. ResearchGate. https://doi.org/10.1109/COMST.2017.2745201
  • Martín, F., Soriano-Salvador, E., Guerrero, J. M., Guardiola Múzquiz, G., Manzanares, J. C., & Rodríguez, F. J. (2025). Towards a robotic intrusion prevention system: Combining security and safety in cognitive social robots. Robotics and Autonomous Systems, 190, 104959. https://doi.org/10.1016/j.robot.2025.104959
  • Mayoral-Vilches, V. (2022). Robot Cybersecurity, a Review. International Journal of Cyber Forensics and Advanced Threat Investigations, 0, Article 0. https://doi.org/10.46386/ijcfati.crossmarkpolicy
  • Mazhar, T., Talpur, D. B., Shloul, T. A., Ghadi, Y. Y., Haq, I., Ullah, I., Ouahada, K., & Hamam, H. (2023). Analysis of IoT Security Challenges and Its Solutions Using Artificial Intelligence. Brain Sciences, 13(4), Article 4. https://doi.org/10.3390/brainsci13040683
  • Mukhandi, M., Portugal, D., Pereira, S., & Couceiro, M. S. (2019). A novel solution for securing robot communications based on the MQTT protocol and ROS. 2019 IEEE/SICE International Symposium on System Integration (SII), 608–613. https://doi.org/10.1109/SII.2019.8700390
  • Mwanje, M. D., Bhagwat, G. P., Kaiwartya, O., Maladkar, R., & Sadiq, A. S. (2025). Cyber Security Risks in Connected and Autonomous Vehicles-An Experimental Demonstration. CCGridW, 109–116. https://doi.org/10.1109/CCGridW65158.2025.00024
  • Perez, J. A., Deligianni, F., Ravi, D., & Yang, G.-Z. (2017). UK-RAS Network (UK-RAS White Paper Series on Robotics and Autonomous Systems (RAS), p. 56) [Whitepaper]. Artificial Intelligence and Robotics (White Paper). Engineering and Physical Sciences Research Council (EPSRC). http://doi.org/10.31256/WP2017.1
  • Qayyum, A., Usama, M., Qadir, J., & Al-Fuqaha, A. (2020). Securing Connected & Autonomous Vehicles: Challenges Posed by Adversarial Machine Learning and the Way Forward. IEEE Communications Surveys & Tutorials, 22(2), 998–1026. https://doi.org/10.1109/COMST.2020.2975048
  • Qiao, L., Li, Y., Chen, D., Serikawa, S., Guizani, M., & Lv, Z. (2021). A survey on 5G/6G, AI, and Robotics. Computers and Electrical Engineering, 95, 107372. https://doi.org/10.1016/j.compeleceng.2021.107372
  • Ramavath, S., Samal, U. C., Patra, P. K., Sunil, P., Appasani, B., Ramavath, S., Samal, U. C., Patra, P. K., Sunil, P., & Appasani, B. (2025). 5G and Beyond: Advancements in Wireless Communications for IoT and Smart Cities. In Advanced Wireless Communications and Mobile Networks—Current Status and Future Directions. IntechOpen. https://doi.org/10.5772/intechopen.1009925
  • Ramezanpour, K., Jagannath, J., & Jagannath, A. (2022). Security and Privacy vulnerabilities of 5G/6G and WiFi 6: Survey and Research Directions from a Coexistence Perspective (No. arXiv:2206.14997). arXiv. https://doi.org/10.48550/arXiv.2206.14997
  • Rescorla, E., & Modadugu, N. (2012). Datagram Transport Layer Security Version 1.2 (Request for Comments No. RFC 6347). Internet Engineering Task Force. https://doi.org/10.17487/RFC6347
  • Rishikesh, Bhattacharya, A., Thakur, A., Banda, G., Ray, R., & Halder, R. (2021). Secure Communication System Implementation for Robot-based Surveillance Applications. 2021 International Symposium of Asian Control Association on Intelligent Robotics and Industrial Automation (IRIA), 270–275. https://doi.org/10.1109/IRIA53009.2021.9588788
  • Rodríguez-Lera, F. J., Matellán-Olivera, V., Balsa-Comerón, J., Guerrero-Higueras, Á. M., & Fernández-Llamas, C. (2018). Message Encryption in Robot Operating System: Collateral Effects of Hardening Mobile Robots. Frontiers in ICT, 5, 2. https://doi.org/10.3389/fict.2018.00002
  • Saeed, M. M., Saeed, R. A., Hasan, M. K., Ali, E. S., Mazha, T., Shahzad, T., Khan, S., & Hamam, H. (2025). A comprehensive survey on 6G-security: Physical connection and service layers. Discover Internet of Things, 5(1), 28. https://doi.org/10.1007/s43926-025-00123-7
  • Seo, J., Kayondo, M., Kang, J., Lee, K., Kwon, D., & Paek, Y. (2025). ROSec: Intra-Process Isolation for ROS Composition With Memory Protection Keys. IEEE Transactions on Automation Science and Engineering, 22, 10546–10559. https://doi.org/10.1109/TASE.2024.3525050
  • Shepita, P., Durnyak, B., Petriv, Y., & Yasinskyi, M. (2025). Cybersecurity of robotic sorting systems of warehouse assets of a printing company. The 6th International Workshop on Intelligent Information Technologies & Systems of Information Security (IntelITSIS 2025), 3963, 299–313. https://ceur-ws.org/Vol-3963/paper24.pdf
  • Shi, W., Cao, J., Zhang, Q., Li, Y., & Xu, L. (2016). Edge Computing: Vision and Challenges. IEEE Internet of Things Journal, 3(5), 637–646. https://doi.org/10.1109/JIOT.2016.2579198
  • Singh, M., Rajan, M. A., Shivraj, V. L., & Balamuralidhar, P. (2015). Secure MQTT for Internet of Things (IoT). 2015 Fifth International Conference on Communication Systems and Network Technologies, 746–751. https://doi.org/10.1109/CSNT.2015.16
  • Soori, M., Arezoo, B., & Dastres, R. (2023). Artificial intelligence, machine learning and deep learning in advanced robotics, a review. Cognitive Robotics, 3, 54–70. https://doi.org/10.1016/j.cogr.2023.04.001
  • Srinivas Aditya, U. S. P., Singh, R., Singh, P. K., & Kalla, A. (2021). A Survey on Blockchain in Robotics: Issues, Opportunities, Challenges and Future Directions. Journal of Network and Computer Applications, 196, 103245. https://doi.org/10.1016/j.jnca.2021.103245
  • Stuxnet Definition & Explanation. (2017, September 13). [CyberSecurity Blogs]. Stuxnet Explained: What It Is, Who Created It and How It Works. https://www.kaspersky.com/resource-center/definitions/what-is-stuxnet
  • Tanadechopon, T., & Kasemsontitum, B. (2023). Proposed Technique for Data Security with the AES Algorithm in Robot Operating System (ROS). 2023 27th International Computer Science and Engineering Conference (ICSEC), 153–156. https://doi.org/10.1109/ICSEC59635.2023.10329645
  • Tanimu, J. A., & Abada, W. (2025). Addressing cybersecurity challenges in robotics: A comprehensive overview. Cyber Security and Applications, 3, 100074. https://doi.org/10.1016/j.csa.2024.100074
  • Vilches, V. M., Kirschgens, L. A., Calvo, A. B., Cordero, A. H., Pisón, R. I., Vilches, D. M., Rosas, A. M., Mendia, G. O., Juan, L. U. S., Ugarte, I. Z., Gil-Uriarte, E., Tews, E., & Peter, A. (2021). Introducing the Robot Security Framework (RSF), a standardized methodology to perform security assessments in robotics (No. arXiv:1806.04042). arXiv. https://doi.org/10.48550/arXiv.1806.04042
  • White, R., Caiazza, G., Christensen, H., & Cortesi, A. (2019). SROS1: Using and Developing Secure ROS1 Systems. In A. Koubaa (Ed.), Robot Operating System (ROS) (Vol. 778, pp. 373–405). Springer International Publishing. https://doi.org/10.1007/978-3-319-91590-6_11
  • Yaacoub, J.-P. A., Noura, H. N., Salman, O., & Chehab, A. (2022). Robotics cyber security: Vulnerabilities, attacks, countermeasures, and recommendations. International Journal of Information Security, 21(1), 115–158. https://doi.org/10.1007/s10207-021-00545-8
  • Yfantis, E. A., & Fayed, A. (2014). Authentication and Secure Robot Communication. International Journal of Advanced Robotic Systems, 11(2), 10. https://doi.org/10.5772/57433
  • Zhang, Q. (2021). An Overview and Analysis of Hybrid Encryption: The Combination of Symmetric Encryption and Asymmetric Encryption. 2021 2nd International Conference on Computing and Data Science (CDS), 616–622. https://doi.org/10.1109/CDS52072.2021.00111
  • Zhao, W., Khazanchi, V., Xing, H., He, X., Xu, Q., & Lane, N. D. (2024). Attacks on Third-Party APIs of Large Language Models (No. arXiv:2404.16891). arXiv. https://doi.org/10.48550/arXiv.2404.16891
  • Zhao, Y., Zhai, W., Zhao, J., Zhang, T., Sun, S., Niyato, D., & Lam, K.-Y. (2021). A Comprehensive Survey of 6G Wireless Communications (No. arXiv:2101.03889). arXiv. https://doi.org/10.48550/arXiv.2101.03889

THREATS, VULNERABILITIES AND MEASURES IN ROBOT COMMUNICATION SECURITY: A REVIEW

Yıl 2026, Cilt: 29 Sayı: 1, 515 - 532, 03.03.2026
https://izlik.org/JA36JR45EF

Öz

The expansion of networks and the rapid advancement of technology have led to a significant increase in the use of robots across various domains, including robotics, automotive, healthcare, military, and education, thereby bringing numerous security concerns to the forefront. Although it is nearly impossible to completely eliminate security vulnerabilities in robot communication, academia and industry continue to pursue extensive research in this field. This study compiles and organizes recent research in robotics involving network-based, Internet of Things (IoT), Robot Operating System (ROS), and other related approaches, providing a detailed examination of security threats, vulnerabilities, and their conceptual explanations. Furthermore, secure communication protocols, cryptographic methods, and the impact of emerging technologies such as blockchain and edge computing on secure robot communication are discussed. The findings indicate that these evolving technologies hold considerable promise for enhancing the security of robot communications

Kaynakça

  • Abed, M. S., Al-Doori, Q. F., Abdullah, A. T., & Abdallah, A. A. (2023). Security Vulnerabilities and Threats in Robotic Systems: A Comprehensive Review. International Journal of Safety and Security Engineering, 13(3), 555–563. https://doi.org/10.18280/ijsse.130318
  • Abeykoon, I., & Feng, X. (2017). A Forensic Investigation of the Robot Operating System. 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), 851–857. https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2017.131
  • Acun, M. F., Daldal, M., & Avci, K. (2023). STM32F407 ve Nodemcu ESP8266 Kartları Kullanarak Kablosuz Çok Yönlü Kontrollü Robotik Araç Sisteminin Geliştirilmesi. Kahramanmaraş Sütçü İmam Üniversitesi Mühendislik Bilimleri Dergisi, 26(4), 1030–1049. https://doi.org/10.17780/ksujes.1351636
  • Alquwayzani, A. A., & Albuali, A. A. (2024). A Systematic Literature Review of Zero Trust Architecture for Military UAV Security Systems. IEEE Access, 12, 176033–176056. https://doi.org/10.1109/ACCESS.2024.3503587
  • Alsharif, M., Mishra, S., & AlShehri, M. (2022). Impact of Human Vulnerabilities on Cybersecurity. Computer Systems Science and Engineering, 40(3), 1153–1166. https://doi.org/10.32604/csse.2022.019938
  • Bentayeb, Y., Chaoui, K., & Badir, H. (2025). Integrating Blockchain and Edge Computing: A Systematic Analysis of Security, Efficiency, and Scalability. International Journal of Advanced Computer Science and Applications, 16(1). https://doi.org/10.14569/IJACSA.2025.0160160
  • Botta, A., Rotbei, S., Zinno, S., & Ventre, G. (2023). Cyber security of robots: A comprehensive survey. Intelligent Systems with Applications, 18, 200237. https://doi.org/10.1016/j.iswa.2023.200237
  • Brady, M. (1985). Artificial intelligence and robotics. Artificial Intelligence, 26(1), 79–121. https://doi.org/10.1016/0004-3702(85)90013-X
  • Breiling, B., Dieber, B., & Schartner, P. (2017). Secure communication for the robot operating system. 2017 Annual IEEE International Systems Conference (SysCon), 1–6. https://doi.org/10.1109/SYSCON.2017.7934755
  • Canbay, Y., & Utku, A. (2024). A Comparative Study for Privacy-Aware Recommendation Systems. Gazi University Journal of Science Part A: Engineering and Innovation, 11(1), 68–79. https://doi.org/10.54287/gujsa.1393692
  • Degirmenci̇, E., Kirca, Y. S., Yolaçan, E. N., & Yazi̇ci̇, A. (2023). An Analysis of DoS Attack on Robot Operating System. Gazi University Journal of Science, 36(3), 1050–1069. https://doi.org/10.35378/gujs.976496
  • Degirmenci, E., Sabri Kırca, Y., Özçelik, İ., & Yazıcı, A. (2023). ROSIDS23: Network intrusion detection dataset for robot operating system. Data in Brief, 51, 109739. https://doi.org/10.1016/j.dib.2023.109739
  • Dere, N., & Ülkü, E. E. (2023). QUANTUM KEY DISTRIBUTION IN SMART HOME SYSTEMS. Kahramanmaraş Sütçü İmam Üniversitesi Mühendislik Bilimleri Dergisi, 26(4), 932–942. https://doi.org/10.17780/ksujes.1325805
  • Diro, A., Reda, H., Chilamkurti, N., Mahmood, A., Zaman, N., & Nam, Y. (2020). Lightweight Authenticated-Encryption Scheme for Internet of Things Based on Publish-Subscribe Communication. IEEE Access, 8, 60539–60551. https://doi.org/10.1109/ACCESS.2020.2983117
  • Doğan, N., & Özyurt, F. (2025). IOT DESTEKLİ HAVA DURUMU VERİLERİ İLE YAPAY ZEKÂ TABANLI HAVA TAHMİN SİSTEMİNİN GELİŞTİRİLMESİ. Kahramanmaraş Sütçü İmam Üniversitesi Mühendislik Bilimleri Dergisi, 28(1), 524–535. https://doi.org/10.17780/ksujes.1528386
  • Dourado, C. M. J. M., Da Silva, S. P. P., Da Nóbrega, R. V. M., Barros, A. C. S., Sangaiah, A. K., Rebouças Filho, P. P., & De Albuquerque, V. H. C. (2019). A new approach for mobile robot localization based on an online IoT system. Future Generation Computer Systems, 100, 859–881. https://doi.org/10.1016/j.future.2019.05.074
  • Fosch-Villaronga, E., & Mahler, T. (2021). Cybersecurity, safety and robots: Strengthening the link between cybersecurity and safety in the context of care robots. Computer Law & Security Review, 41, 105528. https://doi.org/10.1016/j.clsr.2021.105528
  • Gao, C., Wang, G., Shi, W., Wang, Z., & Chen, Y. (2022). Autonomous Driving Security: State of the Art and Challenges. IEEE Internet of Things Journal, 9(10), 7572–7595. https://doi.org/10.1109/JIOT.2021.3130054
  • Giansanti, D., & Gulino, R. A. (2021). The Cybersecurity and the Care Robots: A Viewpoint on the Open Problems and the Perspectives. Healthcare, 9(12), 1653. https://doi.org/10.3390/healthcare9121653
  • Goerke, N., Timmermann, D., & Baumgart, I. (2021). Who Controls Your Robot? An Evaluation of ROS Security Mechanisms. 2021 7th International Conference on Automation, Robotics and Applications (ICARA), 60–66. https://doi.org/10.1109/ICARA51699.2021.9376468
  • Greenberg, A. (2015, July 21). Hackers Remotely Kill a Jeep on the Highway—With Me in It [Security]. Hackers Remotely Kill a Jeep on the Highway—With Me in It. https://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/
  • Hamad, D., Yalda, K., Tapus, N., & Okumus, I. T. (2024). Enhancing IoT scalability and security through SDN. Revista Română de Informatică Și Automatică, 34(2), 113–126. https://doi.org/10.33436/v34i2y202409
  • IFR. (2024). Record of 4 Million Robots in Factories Worldwide (pp. 1–4) [Press Report]. IFR International Fedaration of Robotics. https://ifr.org/ifr-press-releases/news/record-of-4-million-robots-working-in-factories-worldwide
  • Jain, S., & Doriya, R. (2022). Security framework to healthcare robots for secure sharing of healthcare data from cloud. International Journal of Information Technology, 14(5), 2429–2439. https://doi.org/10.1007/s41870-022-00997-8
  • Javaid, M., Haleem, A., Singh, R. P., & Suman, R. (2021). Substantial capabilities of robotics in enhancing industry 4.0 implementation. Cognitive Robotics, 1, 58–75. https://doi.org/10.1016/j.cogr.2021.06.001
  • Johnson, S. D., Blythe, J. M., Manning, M., & Wong, G. T. W. (2020). The impact of IoT security labelling on consumer product choice and willingness to pay. PLOS ONE, 15(1), e0227800. https://doi.org/10.1371/journal.pone.0227800
  • Karaferis, D. C., Balaska, D., & Pollalis, Y. (2024). Artificial Intelligence and Robotics: Catalysts or Threats in the Development of Healthcare. Biostatistics and Biometrics Open Access Journal, 11(5), 14. https://doi.org/10.19080/BBOAJ.2024.11.555825
  • Khalid, A., Kirisci, P., Khan, Z. H., Ghrairi, Z., Thoben, K.-D., & Pannek, J. (2018). Security framework for industrial collaborative robotic cyber-physical systems. Computers in Industry, 97, 132–145. https://doi.org/10.1016/j.compind.2018.02.009
  • Kim, J., Smereka, J. M., Cheung, C., Nepal, S., & Grobler, M. (2018). Security and Performance Considerations in ROS 2: A Balancing Act (No. arXiv:1809.09566). arXiv. https://doi.org/10.48550/arXiv.1809.09566
  • Lalem, F., Laouid, A., Kara, M., Al-Khalidi, M., & Eleyan, A. (2023). A Novel Digital Signature Scheme for Advanced Asymmetric Encryption Techniques. Applied Sciences, 13(8), Article 8. https://doi.org/10.3390/app13085172
  • Liang, W., Ning, Z., Xie, S., Hu, Y., Lu, S., & Zhang, D. (2021). Secure fusion approach for the Internet of Things in smart autonomous multi-robot systems. Information Sciences, 579, 468–482. https://doi.org/10.1016/j.ins.2021.08.035
  • Lin, Y., Chen, Y., Qin, Y., Sun, Y., Xu, R., Yang, Y., Zhang, Z., Chen, J., Tian, Y., Cao, Y., Chai, X., Chen, H., Qi, H., & Pang, X. (2025). AI in the 5G-A Era: Scenarios, Key Technologies, and Evolution Trends. Huawei. Retrieved August 6, 2025. https://www.huawei.com/en/huaweitech/future-technologies/5ga-scenarios-key-technologies-evolution-trends
  • Ma, M. (2021). Comparison between RSA and ECC. 2021 2nd International Seminar on Artificial Intelligence, Networking and Information Technology (AINIT), 642–645. https://doi.org/10.1109/AINIT54228.2021.00129
  • Mao, Y., You, C., Zhang, J., Letaief, K. B., & Huang, K. (2017). A Survey on Mobile Edge Computing: The Communication Perspective. ResearchGate. https://doi.org/10.1109/COMST.2017.2745201
  • Martín, F., Soriano-Salvador, E., Guerrero, J. M., Guardiola Múzquiz, G., Manzanares, J. C., & Rodríguez, F. J. (2025). Towards a robotic intrusion prevention system: Combining security and safety in cognitive social robots. Robotics and Autonomous Systems, 190, 104959. https://doi.org/10.1016/j.robot.2025.104959
  • Mayoral-Vilches, V. (2022). Robot Cybersecurity, a Review. International Journal of Cyber Forensics and Advanced Threat Investigations, 0, Article 0. https://doi.org/10.46386/ijcfati.crossmarkpolicy
  • Mazhar, T., Talpur, D. B., Shloul, T. A., Ghadi, Y. Y., Haq, I., Ullah, I., Ouahada, K., & Hamam, H. (2023). Analysis of IoT Security Challenges and Its Solutions Using Artificial Intelligence. Brain Sciences, 13(4), Article 4. https://doi.org/10.3390/brainsci13040683
  • Mukhandi, M., Portugal, D., Pereira, S., & Couceiro, M. S. (2019). A novel solution for securing robot communications based on the MQTT protocol and ROS. 2019 IEEE/SICE International Symposium on System Integration (SII), 608–613. https://doi.org/10.1109/SII.2019.8700390
  • Mwanje, M. D., Bhagwat, G. P., Kaiwartya, O., Maladkar, R., & Sadiq, A. S. (2025). Cyber Security Risks in Connected and Autonomous Vehicles-An Experimental Demonstration. CCGridW, 109–116. https://doi.org/10.1109/CCGridW65158.2025.00024
  • Perez, J. A., Deligianni, F., Ravi, D., & Yang, G.-Z. (2017). UK-RAS Network (UK-RAS White Paper Series on Robotics and Autonomous Systems (RAS), p. 56) [Whitepaper]. Artificial Intelligence and Robotics (White Paper). Engineering and Physical Sciences Research Council (EPSRC). http://doi.org/10.31256/WP2017.1
  • Qayyum, A., Usama, M., Qadir, J., & Al-Fuqaha, A. (2020). Securing Connected & Autonomous Vehicles: Challenges Posed by Adversarial Machine Learning and the Way Forward. IEEE Communications Surveys & Tutorials, 22(2), 998–1026. https://doi.org/10.1109/COMST.2020.2975048
  • Qiao, L., Li, Y., Chen, D., Serikawa, S., Guizani, M., & Lv, Z. (2021). A survey on 5G/6G, AI, and Robotics. Computers and Electrical Engineering, 95, 107372. https://doi.org/10.1016/j.compeleceng.2021.107372
  • Ramavath, S., Samal, U. C., Patra, P. K., Sunil, P., Appasani, B., Ramavath, S., Samal, U. C., Patra, P. K., Sunil, P., & Appasani, B. (2025). 5G and Beyond: Advancements in Wireless Communications for IoT and Smart Cities. In Advanced Wireless Communications and Mobile Networks—Current Status and Future Directions. IntechOpen. https://doi.org/10.5772/intechopen.1009925
  • Ramezanpour, K., Jagannath, J., & Jagannath, A. (2022). Security and Privacy vulnerabilities of 5G/6G and WiFi 6: Survey and Research Directions from a Coexistence Perspective (No. arXiv:2206.14997). arXiv. https://doi.org/10.48550/arXiv.2206.14997
  • Rescorla, E., & Modadugu, N. (2012). Datagram Transport Layer Security Version 1.2 (Request for Comments No. RFC 6347). Internet Engineering Task Force. https://doi.org/10.17487/RFC6347
  • Rishikesh, Bhattacharya, A., Thakur, A., Banda, G., Ray, R., & Halder, R. (2021). Secure Communication System Implementation for Robot-based Surveillance Applications. 2021 International Symposium of Asian Control Association on Intelligent Robotics and Industrial Automation (IRIA), 270–275. https://doi.org/10.1109/IRIA53009.2021.9588788
  • Rodríguez-Lera, F. J., Matellán-Olivera, V., Balsa-Comerón, J., Guerrero-Higueras, Á. M., & Fernández-Llamas, C. (2018). Message Encryption in Robot Operating System: Collateral Effects of Hardening Mobile Robots. Frontiers in ICT, 5, 2. https://doi.org/10.3389/fict.2018.00002
  • Saeed, M. M., Saeed, R. A., Hasan, M. K., Ali, E. S., Mazha, T., Shahzad, T., Khan, S., & Hamam, H. (2025). A comprehensive survey on 6G-security: Physical connection and service layers. Discover Internet of Things, 5(1), 28. https://doi.org/10.1007/s43926-025-00123-7
  • Seo, J., Kayondo, M., Kang, J., Lee, K., Kwon, D., & Paek, Y. (2025). ROSec: Intra-Process Isolation for ROS Composition With Memory Protection Keys. IEEE Transactions on Automation Science and Engineering, 22, 10546–10559. https://doi.org/10.1109/TASE.2024.3525050
  • Shepita, P., Durnyak, B., Petriv, Y., & Yasinskyi, M. (2025). Cybersecurity of robotic sorting systems of warehouse assets of a printing company. The 6th International Workshop on Intelligent Information Technologies & Systems of Information Security (IntelITSIS 2025), 3963, 299–313. https://ceur-ws.org/Vol-3963/paper24.pdf
  • Shi, W., Cao, J., Zhang, Q., Li, Y., & Xu, L. (2016). Edge Computing: Vision and Challenges. IEEE Internet of Things Journal, 3(5), 637–646. https://doi.org/10.1109/JIOT.2016.2579198
  • Singh, M., Rajan, M. A., Shivraj, V. L., & Balamuralidhar, P. (2015). Secure MQTT for Internet of Things (IoT). 2015 Fifth International Conference on Communication Systems and Network Technologies, 746–751. https://doi.org/10.1109/CSNT.2015.16
  • Soori, M., Arezoo, B., & Dastres, R. (2023). Artificial intelligence, machine learning and deep learning in advanced robotics, a review. Cognitive Robotics, 3, 54–70. https://doi.org/10.1016/j.cogr.2023.04.001
  • Srinivas Aditya, U. S. P., Singh, R., Singh, P. K., & Kalla, A. (2021). A Survey on Blockchain in Robotics: Issues, Opportunities, Challenges and Future Directions. Journal of Network and Computer Applications, 196, 103245. https://doi.org/10.1016/j.jnca.2021.103245
  • Stuxnet Definition & Explanation. (2017, September 13). [CyberSecurity Blogs]. Stuxnet Explained: What It Is, Who Created It and How It Works. https://www.kaspersky.com/resource-center/definitions/what-is-stuxnet
  • Tanadechopon, T., & Kasemsontitum, B. (2023). Proposed Technique for Data Security with the AES Algorithm in Robot Operating System (ROS). 2023 27th International Computer Science and Engineering Conference (ICSEC), 153–156. https://doi.org/10.1109/ICSEC59635.2023.10329645
  • Tanimu, J. A., & Abada, W. (2025). Addressing cybersecurity challenges in robotics: A comprehensive overview. Cyber Security and Applications, 3, 100074. https://doi.org/10.1016/j.csa.2024.100074
  • Vilches, V. M., Kirschgens, L. A., Calvo, A. B., Cordero, A. H., Pisón, R. I., Vilches, D. M., Rosas, A. M., Mendia, G. O., Juan, L. U. S., Ugarte, I. Z., Gil-Uriarte, E., Tews, E., & Peter, A. (2021). Introducing the Robot Security Framework (RSF), a standardized methodology to perform security assessments in robotics (No. arXiv:1806.04042). arXiv. https://doi.org/10.48550/arXiv.1806.04042
  • White, R., Caiazza, G., Christensen, H., & Cortesi, A. (2019). SROS1: Using and Developing Secure ROS1 Systems. In A. Koubaa (Ed.), Robot Operating System (ROS) (Vol. 778, pp. 373–405). Springer International Publishing. https://doi.org/10.1007/978-3-319-91590-6_11
  • Yaacoub, J.-P. A., Noura, H. N., Salman, O., & Chehab, A. (2022). Robotics cyber security: Vulnerabilities, attacks, countermeasures, and recommendations. International Journal of Information Security, 21(1), 115–158. https://doi.org/10.1007/s10207-021-00545-8
  • Yfantis, E. A., & Fayed, A. (2014). Authentication and Secure Robot Communication. International Journal of Advanced Robotic Systems, 11(2), 10. https://doi.org/10.5772/57433
  • Zhang, Q. (2021). An Overview and Analysis of Hybrid Encryption: The Combination of Symmetric Encryption and Asymmetric Encryption. 2021 2nd International Conference on Computing and Data Science (CDS), 616–622. https://doi.org/10.1109/CDS52072.2021.00111
  • Zhao, W., Khazanchi, V., Xing, H., He, X., Xu, Q., & Lane, N. D. (2024). Attacks on Third-Party APIs of Large Language Models (No. arXiv:2404.16891). arXiv. https://doi.org/10.48550/arXiv.2404.16891
  • Zhao, Y., Zhai, W., Zhao, J., Zhang, T., Sun, S., Niyato, D., & Lam, K.-Y. (2021). A Comprehensive Survey of 6G Wireless Communications (No. arXiv:2101.03889). arXiv. https://doi.org/10.48550/arXiv.2101.03889
Toplam 64 adet kaynakça vardır.

Ayrıntılar

Birincil Dil İngilizce
Konular Bilgi Güvenliği Yönetimi, Bilgi Güvenliği ve Kriptoloji, Veri Güvenliği ve Korunması
Bölüm Derleme
Yazarlar

Vahdet Cemil Altun 0000-0001-7792-0380

Barış Ata 0000-0003-4773-0564

Yavuz Canbay 0000-0003-2316-7893

Gönderilme Tarihi 7 Ekim 2025
Kabul Tarihi 20 Kasım 2025
Yayımlanma Tarihi 3 Mart 2026
IZ https://izlik.org/JA36JR45EF
Yayımlandığı Sayı Yıl 2026 Cilt: 29 Sayı: 1

Kaynak Göster

APA Altun, V. C., Ata, B., & Canbay, Y. (2026). THREATS, VULNERABILITIES AND MEASURES IN ROBOT COMMUNICATION SECURITY: A REVIEW. Kahramanmaraş Sütçü İmam Üniversitesi Mühendislik Bilimleri Dergisi, 29(1), 515-532. https://izlik.org/JA36JR45EF