Comprehensive Guide to Home Robot Security: From System Analysis to Solution Recommendation
Data publikacji: 28 lut 2025
Zakres stron: 1 - 17
DOI: https://doi.org/10.2478/ias-2025-0001
Słowa kluczowe
© 2025 Seyyed Mohsen Hashemi et al., published by Sciendo
This work is licensed under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
This section commences by delineating the scope of home robots, examining their foundational concepts, and emphasizing the significance of security as a pivotal aspect of the topic, along with the distinguishing characteristics of home robots. The section further addresses the challenges and proposed solutions discussed in the article. Finally, it outlines the article’s contributions and presents an overview of the structure of the subsequent content.
A robot is a reprogrammable, multifunctional electromechanical device designed to execute tasks typically performed by humans [1]. A home robot, also referred to as a domestic robot, is an autonomous system primarily employed for household chores. Additionally, it may serve applications in education, entertainment, or therapy. (1)
According to ISO 8373 [2], robots can be classified into several categories: industrial, home, service, and military. This study does not address industrial and military robots, as they are beyond its scope. While service and social robots share certain functions with home robots, they are not confined to the home environment.
The primary objective of this work is to enhance the security of home robots, ensuring their reliable operation while identifying and addressing key security challenges within this domain.
The preliminary review revealed that, in addition to the diverse applications and quality attributes inherent in home robots, a notable conflict exists between their security features, privacy concerns, and safety requirements. Moreover, the implementation of security mechanisms in home robots is constrained by limited computational and energy resources. These challenges collectively characterize home robots as distinct systems that necessitate customized approaches to security.
This system exhibits differences when compared to analogous systems. Unlike industrial robots, home robots operate in environments characterized by higher levels of uncertainty, which significantly increases their safety risks. In contrast to Cyber-Physical Systems (CPS), home robots involve distinct privacy considerations. Furthermore, when compared to smart home systems, home robots incorporate more advanced actuators, thereby intensifying safety-related threats.
Given these challenges and the growing adoption of home robots, ensuring their security is of paramount importance. Consequently, the development of comprehensive solutions to safeguard the security of home robots is essential. The principal challenges and proposed solutions discussed are outlined as follows:
Given the paramount importance of ensuring security in home robots, our initial step was to assess the state of security in existing literature. However, we encountered considerable variability in the functionalities of home robots, which introduced complexity into this analysis. The functions of the application determine the system’s architecture [3], and architectural decisions are crucial for achieving a high level of security within the system [4]. Therefore, to evaluate the security of a home robot, it is essential to assess both its applications and architecture. After analyzing the applications and architectures, we directed our focus to reviewing the relevant research on their security aspects. However, it was observed that research on the security of home robots is both limited and fragmented. Due to the limited research on the security of home robots, we have expanded the scope of our investigation. To this end, we have incorporated security topics from robotics, cyber-physical systems (CPS), and smart home technologies to develop more comprehensive security solutions for home robots. Home robots, as a subset of robots, possess physical characteristics that are closely associated with CPS [5]. An approach to evaluating the security of home robots involves analyzing the potential threats and vulnerabilities inherent in CPSs, as well as the security mechanisms that have been implemented. Since smart homes and home robots operate within similar environments and face comparable security threats, we have employed a smart home security analysis to assess the security of home robots.
A thorough review of the existing literature revealed that studies focusing on the security of home robots are limited. More specifically, no dedicated survey or literature review articles addressing the security of home robots currently exist. While related works in analogous fields such as Cyber-Physical Systems (CPS), smart homes, and general robotics provide valuable insights, they do not specifically address the unique security challenges and requirements of home robots. Consequently, this manuscript stands out by not only reviewing the limited works directly related to home robots but also by drawing insights and methodologies from survey papers in these related domains. Specifically, the adoption of classifications and the development of frameworks for addressing security issues were inspired by these related studies. This integrated approach, combining a focused review on home robots with insights from related domains, establishes the novelty and significance of this work.
This article seeks to offer a comprehensive examination of the security aspects associated with home robots. The primary contributions of this research are outlined as follows:
Analyzing the security, architecture, and applications of home robots. Integrating insights from CPS, robotics, and smart home security to enhance the security of home robots. Providing a comprehensive set of guidelines derived from studies on home robot security.
Following this article, the “Method” section will present an in-depth security analysis of home robots and related systems. In contrast, the “General Direction” part will provide an overview of the primary orientations. The “Conclusion” section will subsequently summarize the findings and draw final conclusions.
This section evaluates the security of home robots by first addressing concerns related to their applications and architecture. Furthermore, security challenges encountered in comparable systems will be examined, with an emphasis on adapting solutions to enhance the protection of home robots.
In this subsection, we analyze the security challenges associated with home robots, which are influenced by their applications and architectures. To achieve this, a systematic review was conducted to address three key research questions: the applications of home robots, their architectural considerations, and associated security concerns. Keywords were derived from these questions, but due to the limited availability of relevant literature, the search string was refined to “home robot” or “domestic robot.” To address the scarcity of sources, the temporal scope of the review was expanded to include studies from 2014 to 2024. The review focused on computer science research and utilized databases such as Web of Science, Scopus, Springer, IEEE, ACM, and Google Scholar. Filters were applied based on the study field, time range, and search string. Relevant studies were selected for their alignment with the research questions, prioritizing discussions on applications, architecture, and security mechanisms while excluding works centered on specific algorithms or unrelated topics. This process is visually summarized in Figure 1.

Systematic Review Methodology for Analyzing Home Robot Applications, Architectures, and Security Challenges
The functions and applications defined for home robots determine their assets and, consequently, the associated threats and vulnerabilities that must be addressed. Therefore, we will explore these aspects as an introduction to the security of home robots. Table 1 presents the categories of home robot applications, with corresponding references cited in each row.
Applications of Home Robots
Social Robot | [6, 7, 8, 9] | ||
Companion Robot | [10] | ||
Care | Elderly Care Robot | General | [6, 10, 11, 12, 13, 14, 15] |
Fall Detection | [11, 16] | ||
Single Care | [17] | ||
Child Care Robot | General | [13] | |
Telepresence | [18] | ||
Personal Care | [19] | ||
Cooking | [6, 20] | ||
Entertainment | General | [16] | |
Music Player | [6] | ||
Social Media Access | [13] | ||
Health Care | Drug Reminder | [16] | |
Drug and Food Estimation | [21] | ||
Medication Reminders | [6, 22] | ||
Monitor Health | [22] | ||
Cleaning and Organization | General | [6, 23] | |
Clean Floors | [22] | ||
Vacuuming | [20] | ||
Self-making Bed | [20] | ||
Automatic Bookshelf or Cupboard | [20] | ||
Find and Bring Objects | General | [16, 22, 23] | |
Bring Coffee | [20] | ||
Cloth | Folds Laundry | [20] | |
Garment Folding | [20] | ||
Dressing | [22] | ||
Lawn Mower | [20] | ||
Movable Trash Bins | [20] | ||
Home Security | Monitoring of Houses | [13, 24, 25] | |
Smart Home Assistant | [26, 27] | ||
Rollator Walker | [28] | ||
Transfer | [22] |
Given the diverse functions and applications of home robots, employing reference models for the initial analysis and design of security measures for home robots is a recommended approach.
Another important aspect to consider when discussing the security of home robots is their architectural design. These architectural considerations directly influence the levels of security, safety, and privacy. It is essential to ensure the security of home robots while also addressing other critical quality dimensions, such as energy efficiency and performance, and to engage with the technical debates surrounding these aspects.
A variety of topics have been explored concerning the architectural considerations for home robots. Table 2 categorizes these topics and lists the relevant articles. Given the multiple aspects of home robot architecture, it is advisable to address their security early on through the use of a reference architecture. Considering the limitations in energy and computing resources, cloud computing infrastructure emerges as a viable solution.
Architecture considerations of home robots
Cloud | [28] | |
Infrastructure | Mobile phone | [27] |
Home Personal Computer (PC) | [28, 7] | |
System | Smart home | [27, 29, 30] |
Robot group | [23] | |
Autonomous | [18] | |
Operation modes | Remote controller (monitor, command execution) | [7] |
Interactive | [18] | |
Device behavior | Proactive, reactive | [10] |
Device appearance | Creature, object | [10] |
Device function | Assistive, companion, service | [10] |
Device mobility | Mobile, stationary | [10] |
Separable device | [31] | |
Infrastructural services | Object recognition (detection) | [21, 12], |
Remote control | [31] | |
Obstacle avoidance | [31] | |
Tracking (follow user, come to the user) | [31] | |
Power metering | [31] | |
Assistance decision maker | [12] | |
Positioning and navigation, map construct | [12] [19, 16], | |
Grasping | [12] | |
User interface | [12, 20] | |
Robots collaboration management | [20] | |
Face and gesture recognition | [20, 19, 16] | |
Simultaneous Localization and Mapping (SLAM) | [19] | |
Planning | [19] | |
Text to speech | [16] | |
Speech recognition (robot call) | [16] | |
Robot setup | [16] | |
Self-charge | [16] | |
Image and video transfer and automatic video recording | [28] | |
Distance estimation | [28] | |
Software service design | Representational State Transfer (REST) as a platform independent protocol | [32] |
Sensor | Laser, noise, light | [12] |
Robot and human interaction | Verbal, non-verbal | [20] |
Design goals | Engaging, unobtrusive, device-like, respectful, reassuring | [26] |
Finally, studies addressing security, safety, and privacy in home robots were reviewed. These studies concentrated on aspects such as threats, vulnerabilities, attacks, and security mechanisms, alongside general topics related to security principles. Table 3 presents the security considerations. It appears that the security issues identified in home robot studies are primarily non-technical, with privacy being the foremost concern. The significance of safety in home robots is amplified by environmental uncertainties, and security concerns are frequently addressed at the network layer.
Security Issues of Home Robots
Denial of Service (DoS) | [13] | ||
Analyzing packet capture | [13] | ||
Privacy violation (especially for social interactions with robots) for some goals (location, object, information) | [13, 33] | ||
Active and passive eavesdropping | [13] | ||
Network security breach | [13] | ||
Robot vandalism | [13] | ||
Spying | [13] | ||
Interface application | [7] | ||
Remote execution of code | [8] | ||
Status Check | [8] | ||
Allocation of a static Internet Protocol (IP) Address | [13] | ||
Availability of open ports | [13] | ||
Unsupervised data exchange | [13] | ||
Internet connection | [13] | ||
Webcam | [13] | ||
Authentication | [8] | ||
Two-factor authentication | [13] | ||
Biometrics as a second factor in authentication | [13] | ||
The privacy-utility tradeoff for remotely teleoperated robots that decrease image quality when sending it | [33] | ||
Situational awareness | [19] | ||
Privacy | [14, 20, 34, 35, 36] | ||
Ethical implications: Assisting elderly or disabled people, monitoring of houses, accessing social media, childcare | [13, 34] | ||
Trust | [34] | ||
Safety: The home robot faces more uncertainty in the environment than the industrial robot, posing more safety concerns. | [15, 37] | ||
Security issues are primarily discussed in the network layer. | [7] |
An analysis of home robot applications, architecture, and security reveals that security concerns have not been adequately addressed. Given the limitations in current home robot security research, it is crucial to place greater emphasis on identifying and addressing security concerns, vulnerabilities, and threats.
In this section, we aim to address the security concerns associated with home robots by conducting a complementary security analysis of systems similar to home robots. Given that home robots are a specific type of robot and can be classified as cyber-physical systems (CPS) due to their physical attributes, and considering that smart homes operate in a comparable environment, we analyze the security of these systems to integrate their findings into the security framework for home robots.
The review presented in this section was conducted through a series of systematic steps to ensure a comprehensive analysis of security issues relevant to home robots. Initially, research questions were formulated to explore security challenges in robots, cyber-physical systems (CPS), and smart homes, focusing on their applicability to home robot security. Key terms such as “robot,” “CPS,” “smart home,” along with “security,” “privacy,” and “safety,” were identified, emphasizing the semantic overlap between these concepts. Given the extensive body of research in these domains, the study prioritized review papers, incorporating terms like “survey” and “systematic literature review” into the search string. The review was conducted across major electronic databases, including Web of Science, Scopus, Springer, IEEE, ACM, and Google Scholar, applying filters to select computer science studies published between 2014 and 2024. Papers were rigorously screened based on their titles and abstracts, duplicates were eliminated, and the remaining studies were categorized according to the research questions. Finally, a backward snowballing technique was employed, screening references of the selected studies to identify additional relevant works, thereby ensuring a robust and thorough review process.
This systematic review process is depicted in Figure 2, offering a detailed overview of the methodological steps undertaken.

Systematic Review Framework Leveraging Security Insights from Related Systems for Home Robots
It is important to emphasize that this analysis aims to identify the security landscape and issues relevant to home robots, rather than conducting an in-depth evaluation of the security of analogous systems such as robots, CPS, or smart homes. To achieve this, we employ classification techniques to analyze the existing literature. While this approach offers less detail than a comprehensive security analysis, it allows us to systematically categorize the studies and extract insights that will serve as the foundation for developing a research framework to enhance home robot security.
Papers on robots, CPS, and smart homes will be analyzed separately. Through a general classification and analysis of the security of each system, we will outline potential directions for improving home robot security. The dimensions of article classification, as shown in Figure 3, are as follows:
The general description of the dimensions proposed for classifying security topics is outlined as follows:
General security issues
Security principle or quality attributes: safety, privacy, security, trust, confidentiality, integrity, and availability Legal and ethical concerns: These are particularly important in the sense of privacy. Standards: Include safety and security standards. Challenges: Include system architecture challenges that affect system security. Main Security issues
Vulnerabilities: Assets and identifying their vulnerabilities are among the most important aspects of security analysis. Threats: This dimension includes threat paths. Attacks: This dimension includes attack paths. Mechanisms: Mechanisms are built around threats, attacks, and vulnerabilities. They can also be classified by the timing of the actions. The solution, control, mitigation strategy, and method are considered equivalent to the mechanism. Architecture (Architecture considerations are discussed when and where it was necessary)
Assets
Cyber, physical, and cyber-physical are types of cyber-physical components. Hardware, applications, middleware, and communications are types of cyber components. Layers
Perception, communication, and application are common layers. Infrastructure Types: Infrastructure enhances energy efficiency and computing capabilities and includes cloud, fog, edge, gateway, PC, and mobile.
Subsequently, each of the analogous systems will be analyzed according to these dimensions.

Dimensions of Security Classification for Robots, Cyber-Physical Systems (CPS), and Smart Homes
Review articles on robot security were reviewed to identify relevant concepts for home robots.
A survey was conducted to assess users’ primary privacy concerns [38]. The results indicated that protecting identity and financial information are the foremost priorities. Additionally, users’ understanding of the importance of privacy is influenced by their level of technological knowledge.
The article presented in [39] examines the privacy challenges associated with the use of Artificial Intelligence (AI) in robots and reviews various global legal frameworks. It explores one such framework for the coordinated deployment of AI in robots and analyzes the privacy concerns that arise from its implementation. The challenges and issues related to robot reliability and safety, along with an in-depth analysis of robot safety, are discussed in [40]. Key advancements in robotics include the ability to move simultaneously with humans, cooperate and engage in physical contact with the robot, perform automation tasks, multitask, and operate in uncertain environments. These developments have introduced new safety challenges when compared to earlier industrial robots. The article presents a series of activities aimed at improving safety in response to the evolving capabilities of robots.
A specific topic discussed regarding robot safety is the field of Human-Robot Interaction (HRI). In this regard, the article presented in [41] provides a systematic review of the safety levels required in HRI. The paper focuses on the primary functions of Human-Robot Interaction, including Robot Perceptions, Cognitive Control, Action Planning, Hardware Safety Features, and Societal and Psychological Factors. These areas are considered as the key domains related to safety in human-robot relationships.
According to ISO standard 8373: 2012 [42], service robots and home robots share similar functions. In light of their close relationship, we examine an article on the security of service robots [43]. This article offers an overview of the initial risk analysis for service robots and explores various examples of potential threat vectors and attacks.
Another article [44] focuses on the cyber-physical security of mobile service robots. The article first presents statistics on known threat vectors in CPS, followed by a classification of assets, attack vectors, and the effects of these attacks on the robot. It then examines a set of mechanisms and ultimately connects these mechanisms to relevant security functions.
The article presented in [45] discusses cyber-physical threats within the context of robotics. Although not a review, this article is analyzed due to its examination of various threats to robots, evaluation of risks based on these threats, and proposed solutions to mitigate those risks. Utilizing the Confidentiality, Integrity, and Availability (CIA) triad of security, the article investigates various attack vectors and their effects, with a particular focus on harmful threats.
In [46], a threat model is presented to facilitate a better understanding of the potential risks associated with home robots. The article also provides a comprehensive set of possible attack effects to support more effective risk analysis. The proposed risk model is based on attack effects and considers the various types of robot users. Privacy risks related to social robots are assessed with a focus on sensor data, while safety risks are evaluated through a series of scenarios. Finally, the article identifies several attacks that could lead to privacy and security issues.
Robot security threats are further explored in [47], which provides an overview of various robot attacks. The article examines the security aspects of three types of business robots, identifying their vulnerabilities and proposing methods to mitigate risks. Although the article includes several privacy tips, they are non-technical in nature and were not discussed in detail.
In [48], a range of attacks and corresponding mitigation processes are examined, although these are not classified in detail. This article is noteworthy for its comparison of the vulnerabilities of two home robots, Rovio and Spykee, specifically focusing on eavesdropping, noise interference, and vulnerabilities related to audio and video streaming.
The study presented in [49] investigates attacks across multiple layers, including data, networks, operating systems, and physical components. It also explores various tools for securing the widely used middleware, Robot Operating System (ROS). Furthermore, the research examines the security aspects of different types of robots, taking into account their diverse functionalities.
Significant advancements in robotics and their security, including the history of their initial deployment in industrial settings, early safety incidents, the integration of safety and security models, the development of security models based on the Robot Operating System (ROS), the creation of a robot vulnerability database, and the formulation of a security assessment framework for robots, are thoroughly discussed in [50].
Artificial Intelligence (AI) introduces unique security challenges for robotics, particularly when integrated into decision-making processes. For instance, Large Language Models (LLMs) significantly enhance robotic capabilities but also introduce substantial security risks, especially when handling sensitive data or executing automated operations. Key concerns include expanding attack surfaces, implementing effective defensive strategies, addressing ethical considerations, and managing HRI. These challenges must be carefully addressed to mitigate risks and ensure the safe and effective integration of AI into robotics. [51].
Table 4 presents a detailed overview of key topics associated with robot security, offering valuable insights into the various dimensions of the challenges and potential solutions for ensuring the security and safety of robotic systems.
Overview of Security Issues and Classifications for Robots
Privacy issues | [38, 39] | ||
Safety issues | [40, 41, 50] | ||
Architecture layers | [49] | ||
AI usage | [51] | ||
ROS Middleware | [49, 50] | ||
Comparison of two home robots (Rovio and Spykee)-50 | [48, 50] | ||
Classification based on Degree of risk | [45] | ||
Classification based on Assets that are the target of an attack | [43] | ||
Classification based on the motives of the attackers | [43] | ||
Without classification | [46, 47, 48] | ||
Classification based on the type of attack and the time that we apply the mechanism | [44] | ||
Risk analysis | [46] | ||
Classification based on the type of assets | [43, 47] | ||
Without classification | [48] |
The following is a list of directions for enhancing home robot security derived from the review of robot security literature:
Given the similarities between home robots and other types of robots, many security concerns can be adapted and customized for home robots. The design of home robots should take into account their applications, functions, quality attributes, as well as the unique challenges and standards specific to robots. The importance of privacy must be explicitly acknowledged, and the value of data, along with its associated risks, should be carefully considered when implementing security mechanisms. Additionally, privacy concerns related to artificial intelligence in home robots must be addressed. Ensuring safety poses significant challenges both at the robot level and within the home environment. Home robots must adhere to established safety standards, with particular attention given to factors such as uncertainty, human interaction, and the physical effects that these robots may experience. Securing a home robot should be approached through risk management. Assets, vulnerabilities, security principles, threats, attacks, and mechanisms must be thoroughly considered within the risk management framework. Mapping these entities in the risk analysis process is crucial, as it directly influences understanding and enhances the overall security of the home robot. The timing of security mechanisms, the associated risks, and the security level of each mechanism must be carefully determined to ensure an optimal balance between protection and system performance. The security of ROS middleware must be a key focus in enhancing the safety and security of robots. Integrating AI into robots enhances functionality but introduces security challenges, such as increased attack surfaces and ethical concerns. Addressing these issues is crucial for safe AI integration in home robotics.
In this section, we aim to strengthen the security of home robotics by utilizing established security solutions from CPS. This is achieved through a comprehensive review of existing security measures employed in CPS to identify strategies applicable to home robotics.
Several studies offer foundational insights into CPS security by addressing general concepts, architectures, and security principles. For example, [52] categorizes security challenges through the lenses of control theory and cybersecurity, with an emphasis on specific CPS types and their associated assets, such as communication protocols and PLC software.
Another study, [53], introduces a comprehensive CPS model structured around a three-layer architecture comprising the application, data transfer, and perception execution layers. The study further classifies relevant attacks within each layer. Similarly, [54] proposes a versatile framework that achieves a balance between generalization and specialization, rendering it applicable to a wide range of CPS types, albeit with certain limitations. This framework emphasizes a three-layer CPS architecture—perception, communication, and application—while providing valuable insights into the physical, cyber-physical, and cyber components across various CPS implementations.
Further contributions to general CPS topics are provided in [55], which presents a layered CPS architecture while exploring control and sensor components, as well as the integration of CPS with IoT systems. Similarly, [56] offers a comprehensive examination of CPS security and privacy, providing an overview of key CPS concepts and addressing challenges such as heterogeneity, seamless integrity, and mobility. Additionally, this study discusses CPS virtualization for resource sharing and introduces a framework encompassing cyber, physical, and hybrid security measures.
On the more specialized side, several studies provide in-depth analyses of security mechanisms, attack types, vulnerabilities, and risk management strategies in CPS. For instance, [57] examines vulnerabilities, threats, security attacks, and privacy concerns within CPS, offering a comprehensive set of solutions while categorizing threats according to CPS layers. This study is notable for its detailed exploration of current research in CPS security. Similarly, [58] investigates the integration of smart CPS with IoT, classifying attacks and security methods based on CPS layers and addressing challenges such as data volume and energy efficiency considerations.
[59] categorizes CPS security into information security and control security, highlighting the distinctions between CPS security and traditional cybersecurity. This study offers a detailed assessment of security risks, attacks, and challenges across different CPS layers. Similarly, [60] focuses specifically on sensor security, analyzing attacks targeting sensors and exploring corresponding defense mechanisms.
Risk management is a critical topic explored in [55], which discusses threats, vulnerabilities, and attacks from both cyber and physical perspectives, as well as solutions such as cryptography, intrusion detection systems, and forensics. The work by [61] also contributes to this area by examining CPS security through the lens of both cyber (information) and physical (control) perspectives, analyzing vulnerabilities and solutions. Finally, a comprehensive survey by [62] categorizes CPS security into architectural layers, applications, and mechanisms, providing an in-depth analysis of attacks, defense strategies, and technologies relevant to CPS security within specific scenarios. Similarly, [63] examines CPS security with a focus on cyber and user interactions, addressing critical factors such as availability, safety, and reliability. This study also highlights key distinctions between CPS and traditional IT security, while discussing risk design and estimation, as well as security controls within the physical domain.
The following key directions for enhancing home robot security have been derived from the comprehensive review of CPS security:
While CPS operates at a higher level of abstraction compared to robots, numerous studies provide a comprehensive perspective on security. In the context of home robot security, it is essential to account for challenges presented by specific CPS. Furthermore, CPS mechanisms and solutions can be effectively leveraged, given the complexity and architectural similarities between the two domains. Developing reference models and architectures for home robots, similar to those in CPS, enhances our understanding of security challenges and provides clarity on the implementation of security mechanisms in home robots. As with CPS, real-time decision-making, environmental uncertainty, mobility, heterogeneity, distribution, layer integrity, and the integration of cyber and physical components present challenges for home robots. Moreover, high data volumes and unwanted events, particularly when combined with IoT, are additional challenges. A layered architecture that separates cyber and physical (or control) components should be considered in home robot security assessments. Furthermore, the interrelationships between these layers must also be evaluated in security assessments. Although CPS security issues are relatively well-established, their application to home robots necessitates a thorough risk analysis. While availability is a critical concern in CPS, it may not be as paramount for home robots. In contrast, safety and privacy issues, particularly for home robots, should be prioritized over availability.
Overview of Security Issues and Classifications for CPS
Differences with ICT security, CPS security challenges, and requirements | [56, 57, 58, 59, 63] | ||
Classification Based on the cyber and physical components | [55] | ||
Classification based on architecture layers | [57] | ||
Classification Based on the Abstract Threats as attack vectors | [56] | ||
Classification Based on cyber and physical components | [55] | ||
Classification Based on architectural layers | [58, 59] | ||
Classification Based on the type and function of the attack | [56] | ||
Classification Based on cyber and physical components | [55] | ||
Classification Based on the type of attack | [56] | ||
Classification Based on cyber and physical components | [57] | ||
Classification Based on architectural layers | [59, 62] | ||
Some mechanisms without classification | [55, 56, 58] |
This section examines security measures in the field of smart homes that could be applicable to home robots. Smart home security encompasses multiple dimensions, each addressed in various studies.
Comprehensive frameworks and technological solutions are addressed in [64], which examines the growth of the Internet of Things (IoT), its characteristics, and the security of its layers. The study proposes a four-layer architecture (perception, cyber, physical, user).
In terms of security issues and risk reduction strategies, [65] highlights the difficulties posed by the heterogeneity, diversity, and complexity of smart homes. The article emphasizes that while privacy and security concerns are ubiquitous, they become particularly critical in the smart home context.
When examining vulnerabilities and attacks, [66] provides a brief overview of IoT and smart home applications, focusing on architecture and cloud integration, identifying vulnerabilities in connected objects, cloud services, and applications, and discussing various types of attacks and contemporary defense mechanisms. Additionally, [67] investigates voice-based attacks and their countermeasures.
Another article, [68], reviews well-known smart home communication protocols, highlighting their security and privacy issues and analyzing the security features of several popular smart home platforms. For security mechanisms and strategies, [69] examines privacy, security, authentication, and risk analysis mechanisms, though it does not classify security issues.
Finally, [70] provides a thorough exploration of smart homes, including security requirements, architecture, attacks, and mechanisms. It compares smart homes with cyber networks, identifying unique concerns such as energy and physical security, social engineering, and privacy. The article proposes centralized, distributed, and hybrid architectures and discusses the importance of technologies like blockchain for dynamic, transparent, and distributed access models. It also highlights how cloud technology can overcome energy and computational limitations in smart homes. It addresses the role of soft security, emphasizing the impact of managing human factors such as trust and user awareness on enhancing security.
The general classification of topics related to smart home security is provided in Table 6. The following is a list of directions for home robot security obtained from the smart home security review.
Specific challenges, like device incompatibility and Internet connection in the smart home, are more important than home robots. On the other hand, because both systems’ working environment is home, privacy is their common concern. Home robots’ safety is important because of the physical actuators, so research into home robots’ safety goes beyond a smart home. Privacy in a home robot is as important as in a smart home. Due to the large volume of studies on the privacy of smart homes, it is necessary to incorporate them into the home robot. Challenges such as user trust, user awareness of the sensor-collected information, and the confidentiality of context data such as time and location are some of the smart home privacy challenges that are also being addressed for the home robot. Communication protocols and the variety of devices in the smart home are less considered by the home robot. However, there are also challenges, such as a mobile home robot, that are not so important in the smart home. The smart home is more at risk due to the pervasive internet connection, although mobility can also increase the robot’s privacy risk. That is why smart home articles focus on communication security, and home robot articles focus on the camera and robot sensors. There are limitations to computing capabilities and energy consumption in a home robot similar to smart home devices, and infrastructure technologies like the cloud must be used. Cloud-based architecture and gateway-based architecture that are provided for smart homes can also be used for a home robot. It should be noted that due to IoT development, we must consider home robots as a part of the smart home architecture. The use of blockchain technology, with its dynamic, transparent, and distributed access models, also holds the potential for enhancing security in home robots.
Overview of Security Issues and Classifications for Smart Home
The Internet of Things(IoT) challenges | [65] | ||
Software flaws | [68] | ||
Classification based on security principles violated by the attack | [65] | ||
Classification based on architectural layers | [64, 66] | ||
Classification based on security principles violated by the attack | [66] | ||
Classification based on the activity of the attack over time | [66] | ||
Security in collaboration systems (cloud) | [66] | ||
Classification based on the connected object | [66] | ||
Classification based on attack target asset | [64, 66] | ||
Classification based on the activity of the attack over time and the type of attack in the cloud architecture | [64, 70] | ||
Classification based on architectural layers | [66] | ||
Classification based on the gateway architecture and its layers | [67] | ||
Without classification | [68, 69] |
After conducting a study on home robot security and the security of similar systems such as CPS and smart homes, general guidelines for home robot security are presented below.
Home robots encounter several challenges, including heterogeneity, diversity, mobility, real-time requirements, environmental uncertainty, and the integration of cyber-physical components. These challenges impact the architecture, security, and operational mechanisms of home robots, all of which must be carefully considered. Given the diversity of home robots, it is essential to utilize reference models and reference architectures to establish security frameworks. Additionally, customizations can be applied to address the specific requirements of each type of home robot. Due to the rapid expansion and decreasing costs of smart home devices, home robots can be regarded as integral components of the smart home ecosystem. Home robots and smart home devices face constraints in computing capability and energy consumption, which makes it essential to use infrastructures with higher computing capacity and energy efficiency for implementing robust security mechanisms. Cloud and Fog computing, for example, can provide the required resources to execute security algorithms and processes that might otherwise be infeasible on resource-constrained devices. A multi-layered architecture should be implemented for home robots, with cyber and physical components clearly defined in each layer. Additionally, assessing security across layers presents another significant challenge. Privacy and safety in home robots must be addressed simultaneously. Given the uncertainty of the operational environment, ensuring the safety of home robots is of paramount importance. Additionally, privacy is crucial for home robots, just as it is in smart homes. Mapping threats, vulnerabilities, and mechanisms in relation to one another, while incorporating principles of security, safety, and privacy, can lead to an optimal risk management system. Threats, attack vectors, and various dimensions of the mechanism (such as operating time) are also critical factors to consider when securing a home robot. Integrating AI into home robotics enhances functionality but introduces security challenges, such as increased attack surfaces and ethical concerns. Addressing these issues is crucial for safe AI integration in domestic robotics.
A preliminary review of the application, architecture, and security of home robots was conducted to gain a comprehensive understanding of their vulnerabilities, threats, attacks, and security mechanisms. Given the limited content available on home robot security, it was necessary to explore security topics from similar systems. The security of general types of home robots, including robots and CPS, was investigated. Additionally, since the operating environment of home robots closely resembles that of smart home systems, smart home security was also reviewed. A compilation of security recommendations for home robots was provided in the sections on robot, CPS, and smart home security. In conclusion, home robots face challenges such as heterogeneity, mobility, real-time requirements, and environmental uncertainties, all impacting their architecture and security mechanisms. Utilizing reference models and architectures, with customizations for each robot type, is essential. As integral components of smart homes, these robots often have limited computing capabilities and energy resources, necessitating the use of cloud and fog computing for robust security measures. Implementing a multi-layered architecture with clearly defined cyber and physical components is crucial. Addressing privacy and safety concurrently, especially given the unpredictability of home environments, is imperative. Mapping threats, vulnerabilities, and mechanisms, while integrating security, safety, and privacy principles, leads to optimal risk management for home robots. Ultimately, the integration of Artificial Intelligence into home robots, while enhancing their functionality, introduces critical security challenges that must be carefully addressed to ensure their safe and effective deployment.
We thank all the researchers who helped us to conduct this research.
Encyclopædia Britannica, “Robot | Definition, History, Uses, Types, & Facts,”