CYBER SECURITY IN ROBOTICS

CYBER SECURITY IN ROBOTICS

Inside this issue

Cyber attack statistics you need to know.
Robotic security outreach: Use Cases
News Snippets: Cybersecurity in Robotics
News Snippets: Cybersecurity in Robotics
Did You Know?

Did You Know?

  • Three-fourths of cyberattacks are financially motivated.
  • 8 out of 10 organizations will be affected by cybercrime in 2020. Amongst these, the top ranking are Healthcare & IT and Telecom.
  • A malicious hacking attack occurs every 39 seconds.
  • Routers and connected cameras account for 9/10 of attacked devices. With the proliferation of smart devices, cyberattacks can increase a hundred fold.
  • More than half of the data breach victims are small and medium sized businesses. This is primarily due to restricted budgets and lack of trained cyber security professionals at their helm.
  • The average cost per lost record is $148.
  • Personal information constitutes around 2/5 of leaked data.
From the editorial desk

From the editorial desk

The robotics revolution is accelerating, on the back of fast-paced technological advancements in engineering, automation, artificial intelligence and machine learning. Rising demand for low-cost industrial robots working in tandem with humans will pave way for lucrative opportunities.

Various companies are using robotics to improve productivity and performance. Naturally, protection of sensitive information from malware and cyberattacks has gained traction. Investments in robotic security solutions such as authentication, encryption, denial of service protection and secure communication have broadened its scope.

Increased cyberattacks, coupled with a seismic shift toward automation of businesses and manufacturing processes, has brought to the fore multiple security risks. These must be identified and addressed to secure sensitive and critical robotic data and instill trust from end users in robotic platforms.

Cyber security best practices must be stringently followed before, during and after the deployment of a robotic platform. These practices include:

  • Traceability
  • Integrity
  • Confidentiality
  • Control
The only true statement about cyber security is that it is not a matter of whether you will get hacked, but when…. Are you willing to take that risk?

Outreach:

Domain Application
Defense & Space Military installations utilize robot technology in automatic aerial vehicles, christened as drones, during surveillance and combat missions. Drones are highly susceptible to sabotage through hacking or snooping. This can make it lose control and an easy target for manipulation by alien entities.
Medical Surgeries Unauthorized control by malicious entities is a concern for surgical robots. Encryption and authentication mechanisms are critical for these bots to ensure effective and safe treatment of patients.
Household Robots Robots in households are typically used for domestic help, assisting in completing household chores. However, they may also be used to collect sensitive information such as health data, which must be protected at all costs.
Disaster Management Robots are tasked with accessing, breaking, repairing or disrupting harmful systems. At times, it is possible for an unauthorized entity to take over a disaster robot’s functions, thus jeopardizing operations. For instance, unauthorized entities can disrupt robotic activities involved in fixing nuclear leaks. This poses a danger to the environment and people in general.

News Snippets: Cybersecurity in Robotics

ANALYST PERSPECTIVE


The market for global Cybersecurity in Robotics is projected to reach nearly US$ 7.28 Billion by 2029, owing to the increase in frequency of sophisticated cyber-attacks such as DDoS attacks, APTs, zero-day malwares and other critical vulnerabilities.

Robots are prone to cyber-attacks at hardware, firmware/OS, and application level, hence there is an immediate need to implement cyber security solutions such as encryption, authentication, secure communication platforms and denial of service protection solutions, along with AI/ML capabilities to enable proactive and preventative defense.

Enterprises are investing heavily to safeguard industrial robots, military robots and medical robots, by adopting a multi-dimensional and multi-layered security frameworks, which includes a series of security standards and authentication protocols, to ensure system integrity and data security for robots.

It is the shared responsibility of the robot manufacturers, system integrators, and operators, to design and implement cybersecurity frameworks to patch the unwanted vulnerabilities in firmware, operating systems, motion control sensors and other key applications, which can be exploited to gain control over the robotic systems.

Innovations & Product Launches:

Radware Security Solutions unveiled its Alteon Cloud Control Solution as part of its Multi-Cloud Solution earlier this month. This new solution includes an embedded best-of-breed Web Application Firewall (WAF), advanced analytics, and one centralized management and control capability. With more flexible licensing and continuous SLA assurance, Radware’s Alteon Multi-Cloud Solution is making application delivery and security a true self-service solution for DevOps, SecOps and application development teams.

Akamai Technologies, Inc. is set to demonstrate its Edge Cloud solution’s actual potential in the upcoming RSA Conference 2020. The Security Conference is scheduled to take place from February 24-28 in San Francisco, USA wherein visitors will observe how the Intelligent Edge platform provides policy-based, software-defined tools enabling enterprises to maximize their performance levels, reliability and security based on identity and context through various architectures, sites and apps.

Partnerships & Collaborations:

Tech Mahindra Ltd announced a collaboration with Virsec to provide first-of-its-kind cybersecurity solutions to protect applications from the inside at the memory level in real-time. Virsec and Tech Mahindra will be showcasing these joint solutions at the RSA Security Conference 2020, February 24-27, in San Francisco. According to Rajiv Singh, Global Head of Cybersecurity, Tech Mahindra, “Cybersecurity is a top concern for our customers and the entire industry today. Tech Mahindra’s collaboration with Virsec is a step towards defending against zero-day attacks launched by adversaries using file less and memory-based techniques.”

Patents Filed or Acquired:

QinetiQ Ltd. signed an agreement to sell its entire Quantum Key Distribution (QKD) patent portfolio to Qubitekk Inc. The portfolio includes 57 patent filings, covering technological approaches in quantum science. One of the portfolio allows QKD to be used across long distances. QKD has a potential to significantly advance data security, cybersecurity, and end-to-end encryption.

NexiTech, Inc. was assigned two key patents for systems and methods for Moving Target Defenses for Data Storage Devices earlier this year. These will provide unprecedented levels of cyber security and active defense against cyber threats. "These patents will impact how companies guard their most critical data storage devices and networks," stated CEO Don Matthews.

Application Areas:

IBM Threat Management and Cyber SMEs will conduct a Cyber Threat Management training session in Washington D.C. the following month. They will provide stakeholders with an approach to handle Cyber Threat Management such as Data Visualization, Security Information and Event Management (SIEM), and Incident Response, using i2 Enterprise Insight Analysis (EIA), Resilient and QRadar. The workshop is also expected to provide hands-on laboratory exercises with a robust analysis and visualization platform titled i2/EIA and demonstrate how the Threat Management Portfolio leverages Machine Learning, Automation, Artificial Intelligence, and the MITRE ATT&CK Framework, to increase workflow efficiency, accountability, and accuracy throughout the process.

Investments & Future Developments:

American company Teradyne has initiated the construction of the world’s largest cobot production hub in Denmark. The project will cost US$ 36Mn and be supervised through its subsidiaries, Mobile Industrial Robots (MiR) and Universal Robots (UR). The deal is expected to widen the company’s footprint in the cobot domain.

San Francisco based RoboTire claims that tires will be replaced in as little as ten minutes. The 2018 start-up, in partnership with Mitsubishi Robotics, has conceived the idea of a robot that can change tires more quickly. Costing US$ 250,000, the company intends to license the robot to automotive dealers and service centers. For early adopters, the charges would be $5-7 per tire, increasing to $10-15.

DENSO Robotics will demonstrate its COBOTTA at the Industrie Paris trade fair show. It will be held from 31st March to 3rd April 2020. The robot shall interact with a high speed SCARA-HSR-Series in an EYEFEEDER parts feeder system.

ABB Technology Ventures announced a partnership with MTEK to leverage the collaborative robots industry in the wake of digitization and automation. The cobot market is expected to yield US$9.13 Bn in revenue by 2024, with projected CAGR of 58.8%.

Research & Development:

The U.S. Defense Advanced Research Projects Agency (DARPA) has been working on a defense project, using videogame players’ brainwaves to aid robots in completing military missions. The study is an on-going project initiated by researchers at the University of Buffalo, for which a grant of US$ 316,000 was acquired from the federal government. Souma Chowdhury, assistant professor of mechanical and aerospace engineering at the university confirms that this technology relies on strategies devised by videogame players engaged in StarCraft, Stellaris, etc. which compel players to pool their resources to defeat opponents. This is expected to streamline U.S. military combat operations by recording players’ movements in real-time while monitoring their brain activities through electroencephalograms. Based on this data, experts would generate algorithms and programs to control the bots and direct them accordingly.

Market Overview: Future Roadmap: How will Cyber Security pan out for Robotics?

Ecosystem management for increased resilience to detect and react to risks.

arrow

Threat Modelling & Vulnerability Identification to safeguard the robot.

arrow

Identify data and adhere to protocols for data encryption, usage and policy.

arrow

How to Ensure Data Security in Robotics?

Threat Exposure Management (TEM) & Threat Detection Response (TDR)

arrow

Identify data and adhere to protocols for data encryption, usage and policy.

arrow
  • More attention paid to physical security of the robot for ensuring cyber security.
  • Augmentation in demand for cyber security services due to high usage of technology and automation in organizations.
  • Key industries like manufacturing & packaging require high degree of automation. This necessitates enhanced security protocols for robots.
  • Global Packaging Robots industry is projected to reach US$ 4.65 Bn by 2023. This is due to increased usage of robots to enhance packaging efficiency, cost deduction and enhanced automation.
  • Therefore, investments in programs to ensure safe operation of these robots is important.

Future Roadmap for Robotics:

  • As the industrial collaborative robots (Cobots) works side-by-side along with humans, their security is the no.1 concern. The increased connectivity of these robotics systems with industrial infrastructure is drastically increasing the cyber-physical attack surface and exposing the Cobots to potential threats and vulnerabilities.
  • Embedded security solutions and Al-enabled IoT security solutions are of great demand to safeguard the robots in the industrial ecosystem to combat security issues.
  • Cloud Robotics- the fusion of robotics with cloud computing is yet another emerging technology trend, enabling high cognitive collaboration, faster OTA upgrades and management for connected robots.
Future Roadmap for Robotics

You may also want to explore extensive market coverage of Future Market Insights in the cyber security domain.

Several studies are in the pipeline:

Subscribe Our Newsletter

We'll never share your email with anyone else.