{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,19]],"date-time":"2025-11-19T11:31:29Z","timestamp":1763551889206},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319708324"},{"type":"electronic","value":"9783319708331"}],"license":[{"start":{"date-parts":[[2017,11,12]],"date-time":"2017-11-12T00:00:00Z","timestamp":1510444800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-70833-1_8","type":"book-chapter","created":{"date-parts":[[2017,11,11]],"date-time":"2017-11-11T12:02:54Z","timestamp":1510401774000},"page":"88-100","source":"Crossref","is-referenced-by-count":6,"title":["A Perspective of Security for Mobile Service\u00a0Robots"],"prefix":"10.1007","author":[{"given":"Gary","family":"Cornelius","sequence":"first","affiliation":[]},{"given":"Patrice","family":"Caire","sequence":"additional","affiliation":[]},{"given":"Nico","family":"Hochgeschwender","sequence":"additional","affiliation":[]},{"given":"Miguel A.","family":"Olivares-Mendez","sequence":"additional","affiliation":[]},{"given":"Paulo","family":"Esteves-Verissimo","sequence":"additional","affiliation":[]},{"given":"Marcus","family":"V\u00f6lp","sequence":"additional","affiliation":[]},{"given":"Holger","family":"Voos","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,12]]},"reference":[{"key":"8_CR1","unstructured":"Reuters: Demand for service robots seen at breakthrough: industry body. https:\/\/goo.gl\/pbTLLHL . Accessed 03 Jan 2017"},{"key":"8_CR2","unstructured":"Fraunhofer Institute - Care-O-bot 4 - Technical data sheet (2015)"},{"key":"8_CR3","unstructured":"Robot kills worker at Volkswagen plant in Germany. https:\/\/goo.gl\/wGOPwf . Accessed 3 Jan 2017"},{"issue":"9","key":"8_CR4","doi-asserted-by":"crossref","first-page":"1888","DOI":"10.1016\/j.ssci.2012.05.009","volume":"50","author":"E Mitka","year":"2012","unstructured":"Mitka, E., Gasteratos, A., Kyriakoulis, N., Mouroutsos, S.G.: Safety certification requirements for domestic robots. Saf. Sci. 50(9), 1888\u20131897 (2012)","journal-title":"Saf. Sci."},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Akdemir, K.D., Karakoyunlu, D., Padir, T., Sunar, B.: An emerging threat: eve meets a robot. In: Chen, L., Yung, M. (eds.) Trusted Systems, INTRUST 2010. Lecture Notes in Computer Science, vol. 6802. Springer, Heidelberg (2011)","DOI":"10.1007\/978-3-642-25283-9_18"},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"Denning, T., Matuszek, C., Koscher, K., Smith, J.R., Kohno, T.: A spotlight on security and privacy risks with future household robots: attacks and lessons. In: Proceedings of the 11th International Conference on Ubiquitous Computing, pp. 105\u2013114. ACM (2009)","DOI":"10.1145\/1620545.1620564"},{"key":"8_CR7","unstructured":"Knell, T.: Domestic robots: a case study on security in ubiquitous computing (2014)"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Yong, S., Lindskog, D., Ruhl, R., Zavarsky, P.: Risk mitigation strategies for mobile Wi-Fi robot toys from online pedophiles. In: 2011 IEEE Third International Conference on Privacy, Security, Risk and Trust (PASSAT) and 2011 IEEE Third International Conference on Social Computing (SOCIALCOM), pp. 1220\u20131223 (2011)","DOI":"10.1109\/PASSAT\/SocialCom.2011.194"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Lee, M.K., Tang, K.P., Forlizzi, J., Kiesler, S.: Understanding users\u2019 perception of privacy in human-robot interaction. In: Proceedings of 6th International Conference on Human-Robot Interaction, Lausanne, Switzerland, pp. 181\u2013182. ACM (2011)","DOI":"10.1145\/1957656.1957721"},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Uluagac, A., Subramanian, V., Beyah, R.: Sensory channel threats to cyber physical systems: a wake-up call. In: Conference on Communications and Network Security, pp. 301\u2013309 (2014)","DOI":"10.1109\/CNS.2014.6997498"},{"key":"8_CR11","unstructured":"Fusion: Security robot accidentally attacks child. https:\/\/goo.gl\/uGLJto . Accessed 15 July 2016"},{"key":"8_CR12","unstructured":"Petit, J., Stottelaar, B., Feiri, M., Kargl, F.: Remote attacks on automated vehicles sensors: experiments on camera and LiDAR. Blackhat.com, pp. 1\u201313 (2015)"},{"key":"8_CR13","unstructured":"Son, Y., Shin, H., Kim, D., Park, Y., Noh, J., Choi, K., Choi, J., Kim, Y.: Rocking drones with intentional sound noise on gyroscopic sensors. In: Jung, J., Holz, T. (eds.) Proceedings of the 24th USENIX Security Symposium, USENIX Security 2015, Washington, D.C., USA, pp. 881\u2013896. USENIX Association (2015)"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Bezzo, N., Weimer, J., Pajic, M., Sokolsky, O., Pappas, G., Lee, I.: Attack resilient state estimation for autonomous robotic systems. In: IEEE\/RSJ International Conference on Intelligent Robots and Systems, IROS 2014, pp. 3692\u20133698 (2014)","DOI":"10.1109\/IROS.2014.6943080"},{"key":"8_CR15","doi-asserted-by":"crossref","unstructured":"Fan, J., Guo, X., De Mulder, E., Schaumont, P., Preneel, B., Verbauwhede, I.: State-of-the-art of secure ECC implementations: a survey on known side-channel attacks and countermeasures. In: HOST, pp. 76\u201387. IEEE Computer Society, Los Alamitos (2010)","DOI":"10.1109\/HST.2010.5513110"},{"key":"8_CR16","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1109\/MDT.2010.7","volume":"27","author":"M Tehranipoor","year":"2010","unstructured":"Tehranipoor, M., Koushanfar, F.: A survey of hardware Trojan taxonomy and detection. IEEE Des. Test Comput. 27, 10\u201325 (2010)","journal-title":"IEEE Des. Test Comput."},{"key":"8_CR17","unstructured":"Smyers, S.: Hardware authentication mechanism for transmission of data between devices on an IEEE 1394-1995 serial bus network, Patent US5948136 A (1999)"},{"key":"8_CR18","unstructured":"Wired: An Unprecedented Look at Stuxnet, the Worlds First Digital Weapon. https:\/\/goo.gl\/3tTDll . Accessed 4 Jan 2017"},{"key":"8_CR19","unstructured":"Symantec: The 11 most common computer security threats. https:\/\/goo.gl\/Vo6fCE . Accessed 15 June 2016"},{"key":"8_CR20","unstructured":"LizardStresser botnet targets IoT devices to launch 400\u00a0Gbps attacks. http:\/\/goo.gl\/SBa9zW . Accessed 30 June 2016"},{"key":"8_CR21","doi-asserted-by":"crossref","unstructured":"Vuong, T., Filippoupolitis, A., Loukas, G., Gan, D.: Physical indicators of cyber attacks against a rescue robot. In: IEEE International Conference on Pervasive Computing and Communications, pp. 338\u2013343. IEEE (2014)","DOI":"10.1109\/PerComW.2014.6815228"},{"issue":"4","key":"8_CR22","doi-asserted-by":"crossref","first-page":"617","DOI":"10.1002\/rob.21513","volume":"31","author":"AJ Kerns","year":"2014","unstructured":"Kerns, A.J., Shepard, D.P., Bhatti, J.A., Humphreys, T.E.: Unmanned aircraft capture and control via GPS spoofing. J. Field Robot. 31(4), 617\u2013636 (2014)","journal-title":"J. Field Robot."},{"key":"8_CR23","unstructured":"Standaert, F.X.: Introduction to Side-Channel Attacks (2006)"},{"key":"8_CR24","unstructured":"Computerworld: Playing NSA, hardware hackers build USB cable that can attack. http:\/\/goo.gl\/kgBqrg . Accessed 1 Aug 2016"},{"key":"8_CR25","unstructured":"Computerworld: Security researchers create undetectable hardware Trojans. https:\/\/goo.gl\/PyuCXo . Accessed 23 July 2016"},{"key":"8_CR26","unstructured":"Lera, F.J.R., Balsa, J., Casado, F., Fer\u0144andez, C., Rio, F.M., Mate\u00edan, V.: Cybersecurity in autonomous systems: evaluating the performance of hardening ROS, Alaga, Spain, June 2016, p. 47 (2016)"},{"key":"8_CR27","doi-asserted-by":"crossref","unstructured":"Klein, G., Elphinstone, K., Heiser, G., Andronick, J., Cock, D., Derrin, P., Elkaduwe, D., Engelhardt, K., Kolanski, R., Norrish, M., Sewell, T., Tuch, H., Winwood, S.: seL4: Formal Verification of an OS Kernel (2009)","DOI":"10.1145\/1629575.1629596"},{"key":"8_CR28","unstructured":"Buttler, D.J., et al.: Using Video Manipulation to Protect Privacy in Remote Presence Systems (2015)"},{"key":"8_CR29","doi-asserted-by":"crossref","unstructured":"Guerrero-Higueras, A.M., DeCastro-Garcia, N., Rodriguez-Lera, F.J., Matellan, V.: Empirical analysis of cyber-attacks to an indoor real time localization system for autonomous robots. Comput. Secur. (2017)","DOI":"10.1016\/j.cose.2017.06.013"},{"key":"8_CR30","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1109\/MSPEC.2016.7524168","volume":"53","author":"ML Psiaki","year":"2016","unstructured":"Psiaki, M.L., Humphreys, T.E.: Protecting GPS from spoofers is critical to the future of navigation. IEEE Spectr. 53, 10 (2016)","journal-title":"IEEE Spectr."}],"container-title":["Advances in Intelligent Systems and Computing","ROBOT 2017: Third Iberian Robotics Conference"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-70833-1_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,6]],"date-time":"2019-10-06T01:24:19Z","timestamp":1570325059000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-70833-1_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11,12]]},"ISBN":["9783319708324","9783319708331"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-70833-1_8","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017,11,12]]}}}