The robotics revolution is accelerating, on the back of fast-paced technological advancements in engineering, automation, artificial intelligence and machine learning. Rising demand for low-cost industrial robots working in tandem with humans will pave way for lucrative opportunities.
Various companies are using robotics to improve productivity and performance. Naturally, protection of sensitive information from malware and cyberattacks has gained traction. Investments in robotic security solutions such as authentication, encryption, denial of service protection and secure communication have broadened its scope.
Increased cyberattacks, coupled with a seismic shift toward automation of businesses and manufacturing processes, has brought to the fore multiple security risks. These must be identified and addressed to secure sensitive and critical robotic data and instill trust from end users in robotic platforms.
Cyber security best practices must be stringently followed before, during and after the deployment of a robotic platform. These practices include:
The only true statement about cyber security is that it is not a matter of whether you will get hacked, but when…. Are you willing to take that risk?
|Defense & Space||Military installations utilize robot technology in automatic aerial vehicles, christened as drones, during surveillance and combat missions. Drones are highly susceptible to sabotage through hacking or snooping. This can make it lose control and an easy target for manipulation by alien entities.|
|Medical Surgeries||Unauthorized control by malicious entities is a concern for surgical robots. Encryption and authentication mechanisms are critical for these bots to ensure effective and safe treatment of patients.|
|Household Robots||Robots in households are typically used for domestic help, assisting in completing household chores. However, they may also be used to collect sensitive information such as health data, which must be protected at all costs.|
|Disaster Management||Robots are tasked with accessing, breaking, repairing or disrupting harmful systems. At times, it is possible for an unauthorized entity to take over a disaster robot’s functions, thus jeopardizing operations. For instance, unauthorized entities can disrupt robotic activities involved in fixing nuclear leaks. This poses a danger to the environment and people in general.|
The market for global Cybersecurity in Robotics is projected to reach nearly US$ 7.28 Billion by 2029, owing to the increase in frequency of sophisticated cyber-attacks such as DDoS attacks, APTs, zero-day malwares and other critical vulnerabilities.
Robots are prone to cyber-attacks at hardware, firmware/OS, and application level, hence there is an immediate need to implement cyber security solutions such as encryption, authentication, secure communication platforms and denial of service protection solutions, along with AI/ML capabilities to enable proactive and preventative defense.
Enterprises are investing heavily to safeguard industrial robots, military robots and medical robots, by adopting a multi-dimensional and multi-layered security frameworks, which includes a series of security standards and authentication protocols, to ensure system integrity and data security for robots.
It is the shared responsibility of the robot manufacturers, system integrators, and operators, to design and implement cybersecurity frameworks to patch the unwanted vulnerabilities in firmware, operating systems, motion control sensors and other key applications, which can be exploited to gain control over the robotic systems.
Radware Security Solutions unveiled its Alteon Cloud Control Solution as part of its Multi-Cloud Solution earlier this month. This new solution includes an embedded best-of-breed Web Application Firewall (WAF), advanced analytics, and one centralized management and control capability. With more flexible licensing and continuous SLA assurance, Radware’s Alteon Multi-Cloud Solution is making application delivery and security a true self-service solution for DevOps, SecOps and application development teams.
Akamai Technologies, Inc. is set to demonstrate its Edge Cloud solution’s actual potential in the upcoming RSA Conference 2020. The Security Conference is scheduled to take place from February 24-28 in San Francisco, USA wherein visitors will observe how the Intelligent Edge platform provides policy-based, software-defined tools enabling enterprises to maximize their performance levels, reliability and security based on identity and context through various architectures, sites and apps.
Tech Mahindra Ltd announced a collaboration with Virsec to provide first-of-its-kind cybersecurity solutions to protect applications from the inside at the memory level in real-time. Virsec and Tech Mahindra will be showcasing these joint solutions at the RSA Security Conference 2020, February 24-27, in San Francisco. According to Rajiv Singh, Global Head of Cybersecurity, Tech Mahindra, “Cybersecurity is a top concern for our customers and the entire industry today. Tech Mahindra’s collaboration with Virsec is a step towards defending against zero-day attacks launched by adversaries using file less and memory-based techniques.”
QinetiQ Ltd. signed an agreement to sell its entire Quantum Key Distribution (QKD) patent portfolio to Qubitekk Inc. The portfolio includes 57 patent filings, covering technological approaches in quantum science. One of the portfolio allows QKD to be used across long distances. QKD has a potential to significantly advance data security, cybersecurity, and end-to-end encryption.
NexiTech, Inc. was assigned two key patents for systems and methods for Moving Target Defenses for Data Storage Devices earlier this year. These will provide unprecedented levels of cyber security and active defense against cyber threats. "These patents will impact how companies guard their most critical data storage devices and networks," stated CEO Don Matthews.
IBM Threat Management and Cyber SMEs will conduct a Cyber Threat Management training session in Washington D.C. the following month. They will provide stakeholders with an approach to handle Cyber Threat Management such as Data Visualization, Security Information and Event Management (SIEM), and Incident Response, using i2 Enterprise Insight Analysis (EIA), Resilient and QRadar. The workshop is also expected to provide hands-on laboratory exercises with a robust analysis and visualization platform titled i2/EIA and demonstrate how the Threat Management Portfolio leverages Machine Learning, Automation, Artificial Intelligence, and the MITRE ATT&CK Framework, to increase workflow efficiency, accountability, and accuracy throughout the process.
American company Teradyne has initiated the construction of the world’s largest cobot production hub in Denmark. The project will cost US$ 36Mn and be supervised through its subsidiaries, Mobile Industrial Robots (MiR) and Universal Robots (UR). The deal is expected to widen the company’s footprint in the cobot domain.
San Francisco based RoboTire claims that tires will be replaced in as little as ten minutes. The 2018 start-up, in partnership with Mitsubishi Robotics, has conceived the idea of a robot that can change tires more quickly. Costing US$ 250,000, the company intends to license the robot to automotive dealers and service centers. For early adopters, the charges would be $5-7 per tire, increasing to $10-15.
DENSO Robotics will demonstrate its COBOTTA at the Industrie Paris trade fair show. It will be held from 31st March to 3rd April 2020. The robot shall interact with a high speed SCARA-HSR-Series in an EYEFEEDER parts feeder system.
ABB Technology Ventures announced a partnership with MTEK to leverage the collaborative robots industry in the wake of digitization and automation. The cobot market is expected to yield US$9.13 Bn in revenue by 2024, with projected CAGR of 58.8%.
The U.S. Defense Advanced Research Projects Agency (DARPA) has been working on a defense project, using videogame players’ brainwaves to aid robots in completing military missions. The study is an on-going project initiated by researchers at the University of Buffalo, for which a grant of US$ 316,000 was acquired from the federal government. Souma Chowdhury, assistant professor of mechanical and aerospace engineering at the university confirms that this technology relies on strategies devised by videogame players engaged in StarCraft, Stellaris, etc. which compel players to pool their resources to defeat opponents. This is expected to streamline U.S. military combat operations by recording players’ movements in real-time while monitoring their brain activities through electroencephalograms. Based on this data, experts would generate algorithms and programs to control the bots and direct them accordingly.
Ecosystem management for increased resilience to detect and react to risks.
Threat Modelling & Vulnerability Identification to safeguard the robot.
Identify data and adhere to protocols for data encryption, usage and policy.
How to Ensure Data Security in Robotics?
Threat Exposure Management (TEM) & Threat Detection Response (TDR)
Identify data and adhere to protocols for data encryption, usage and policy.
You may also want to explore extensive market coverage of Future Market Insights in the cyber security domain.
Several studies are in the pipeline: