Comprehensive Guide to Home Robot Security: From System Analysis to Solution Recommendation
and
Feb 28, 2025
About this article
Published Online: Feb 28, 2025
Page range: 1 - 17
DOI: https://doi.org/10.2478/ias-2025-0001
Keywords
© 2025 Seyyed Mohsen Hashemi et al., published by Sciendo
This work is licensed under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Figure 1.

Figure 2.

Figure 3.

Applications of Home Robots
Social Robot | [ |
||
Companion Robot | [ |
||
Care | Elderly Care Robot | General | [ |
Fall Detection | [ |
||
Single Care | [ |
||
Child Care Robot | General | [ |
|
Telepresence | [ |
||
Personal Care | [ |
||
Cooking | [ |
||
Entertainment | General | [ |
|
Music Player | [ |
||
Social Media Access | [ |
||
Health Care | Drug Reminder | [ |
|
Drug and Food Estimation | [ |
||
Medication Reminders | [ |
||
Monitor Health | [ |
||
Cleaning and Organization | General | [ |
|
Clean Floors | [ |
||
Vacuuming | [ |
||
Self-making Bed | [ |
||
Automatic Bookshelf or Cupboard | [ |
||
Find and Bring Objects | General | [ |
|
Bring Coffee | [ |
||
Cloth | Folds Laundry | [ |
|
Garment Folding | [ |
||
Dressing | [ |
||
Lawn Mower | [ |
||
Movable Trash Bins | [ |
||
Home Security | Monitoring of Houses | [ |
|
Smart Home Assistant | [ |
||
Rollator Walker | [ |
||
Transfer | [ |
Overview of Security Issues and Classifications for CPS
Differences with ICT security, CPS security challenges, and requirements | [ |
||
Classification Based on the cyber and physical components | [ |
||
Classification based on architecture layers | [ |
||
Classification Based on the Abstract Threats as attack vectors | [ |
||
Classification Based on cyber and physical components | [ |
||
Classification Based on architectural layers | [ |
||
Classification Based on the type and function of the attack | [ |
||
Classification Based on cyber and physical components | [ |
||
Classification Based on the type of attack | [ |
||
Classification Based on cyber and physical components | [ |
||
Classification Based on architectural layers | [ |
||
Some mechanisms without classification | [ |
Architecture considerations of home robots
Cloud | [ |
|
Infrastructure | Mobile phone | [ |
Home Personal Computer (PC) | [ |
|
System | Smart home | [ |
Robot group | [ |
|
Autonomous | [ |
|
Operation modes | Remote controller (monitor, command execution) | [ |
Interactive | [ |
|
Device behavior | Proactive, reactive | [ |
Device appearance | Creature, object | [ |
Device function | Assistive, companion, service | [ |
Device mobility | Mobile, stationary | [ |
Separable device | [ |
|
Infrastructural services | Object recognition (detection) | [ |
Remote control | [ |
|
Obstacle avoidance | [ |
|
Tracking (follow user, come to the user) | [ |
|
Power metering | [ |
|
Assistance decision maker | [ |
|
Positioning and navigation, map construct | [ |
|
Grasping | [ |
|
User interface | [ |
|
Robots collaboration management | [ |
|
Face and gesture recognition | [ |
|
Simultaneous Localization and Mapping (SLAM) | [ |
|
Planning | [ |
|
Text to speech | [ |
|
Speech recognition (robot call) | [ |
|
Robot setup | [ |
|
Self-charge | [ |
|
Image and video transfer and automatic video recording | [ |
|
Distance estimation | [ |
|
Software service design | Representational State Transfer (REST) as a platform independent protocol | [ |
Sensor | Laser, noise, light | [ |
Robot and human interaction | Verbal, non-verbal | [ |
Design goals | Engaging, unobtrusive, device-like, respectful, reassuring | [ |
Security Issues of Home Robots
Denial of Service (DoS) | [ |
||
Analyzing packet capture | [ |
||
Privacy violation (especially for social interactions with robots) for some goals (location, object, information) | [ |
||
Active and passive eavesdropping | [ |
||
Network security breach | [ |
||
Robot vandalism | [ |
||
Spying | [ |
||
Interface application | [ |
||
Remote execution of code | [ |
||
Status Check | [ |
||
Allocation of a static Internet Protocol (IP) Address | [ |
||
Availability of open ports | [ |
||
Unsupervised data exchange | [ |
||
Internet connection | [ |
||
Webcam | [ |
||
Authentication | [ |
||
Two-factor authentication | [ |
||
Biometrics as a second factor in authentication | [ |
||
The privacy-utility tradeoff for remotely teleoperated robots that decrease image quality when sending it | [ |
||
Situational awareness | [ |
||
Privacy | [ |
||
Ethical implications: Assisting elderly or disabled people, monitoring of houses, accessing social media, childcare | [ |
||
Trust | [ |
||
Safety: The home robot faces more uncertainty in the environment than the industrial robot, posing more safety concerns. | [ |
||
Security issues are primarily discussed in the network layer. | [ |
Overview of Security Issues and Classifications for Smart Home
The Internet of Things(IoT) challenges | [ |
||
Software flaws | [ |
||
Classification based on security principles violated by the attack | [ |
||
Classification based on architectural layers | [ |
||
Classification based on security principles violated by the attack | [ |
||
Classification based on the activity of the attack over time | [ |
||
Security in collaboration systems (cloud) | [ |
||
Classification based on the connected object | [ |
||
Classification based on attack target asset | [ |
||
Classification based on the activity of the attack over time and the type of attack in the cloud architecture | [ |
||
Classification based on architectural layers | [ |
||
Classification based on the gateway architecture and its layers | [ |
||
Without classification | [ |
Overview of Security Issues and Classifications for Robots
Privacy issues | [ |
||
Safety issues | [ |
||
Architecture layers | [ |
||
AI usage | [ |
||
ROS Middleware | [ |
||
Comparison of two home robots (Rovio and Spykee)-50 | [ |
||
Classification based on Degree of risk | [ |
||
Classification based on Assets that are the target of an attack | [ |
||
Classification based on the motives of the attackers | [ |
||
Without classification | [ |
||
Classification based on the type of attack and the time that we apply the mechanism | [ |
||
Risk analysis | [ |
||
Classification based on the type of assets | [ |
||
Without classification | [ |