Skip to main content
Have a personal or library account? Click to login
Comprehensive Guide to Home Robot Security: From System Analysis to Solution Recommendation Cover

Comprehensive Guide to Home Robot Security: From System Analysis to Solution Recommendation

Open Access
|Feb 2025

Figures & Tables

Figure 1.

Systematic Review Methodology for Analyzing Home Robot Applications, Architectures, and Security Challenges

Figure 2.

Systematic Review Framework Leveraging Security Insights from Related Systems for Home Robots

Figure 3.

Dimensions of Security Classification for Robots, Cyber-Physical Systems (CPS), and Smart Homes

Applications of Home Robots

Applications and Sub-applicationsReferences
Social Robot[6, 7, 8, 9]
Companion Robot[10]
CareElderly Care RobotGeneral[6, 10, 11, 12, 13, 14, 15]
Fall Detection[11, 16]
Single Care[17]
Child Care RobotGeneral[13]
Telepresence[18]
Personal Care[19]
Cooking [6, 20]
EntertainmentGeneral[16]
Music Player[6]
Social Media Access[13]
Health CareDrug Reminder[16]
Drug and Food Estimation[21]
Medication Reminders[6, 22]
Monitor Health[22]
Cleaning and OrganizationGeneral[6, 23]
Clean Floors[22]
Vacuuming[20]
Self-making Bed[20]
Automatic Bookshelf or Cupboard[20]
Find and Bring ObjectsGeneral[16, 22, 23]
Bring Coffee[20]
ClothFolds Laundry[20]
Garment Folding[20]
Dressing[22]
Lawn Mower[20]
Movable Trash Bins[20]
Home SecurityMonitoring of Houses[13, 24, 25]
Smart Home Assistant[26, 27]
Rollator Walker[28]
Transfer[22]

Overview of Security Issues and Classifications for CPS

IssuesClassification and General DescriptionsReferences
General IssuesDifferences with ICT security, CPS security challenges, and requirements[56, 57, 58, 59, 63]
Main IssuesVulnerabilitiesClassification Based on the cyber and physical components[55]
ThreatsClassification based on architecture layers[57]
Classification Based on the Abstract Threats as attack vectors[56]
Classification Based on cyber and physical components[55]
AttacksClassification Based on architectural layers[58, 59]
Classification Based on the type and function of the attack[56]
Classification Based on cyber and physical components[55]
MechanismsClassification Based on the type of attack[56]
Classification Based on cyber and physical components[57]
Classification Based on architectural layers[59, 62]
Some mechanisms without classification[55, 56, 58]

Architecture considerations of home robots

Architecture ConsiderationReferences
Cloud[28]
InfrastructureMobile phone[27]
Home Personal Computer (PC)[28, 7]
SystemSmart home[27, 29, 30]
Robot group[23]
Autonomous[18]
Operation modesRemote controller (monitor, command execution)[7]
Interactive[18]
Device behaviorProactive, reactive[10]
Device appearanceCreature, object[10]
Device functionAssistive, companion, service[10]
Device mobilityMobile, stationary[10]
Separable device [31]
Infrastructural servicesObject recognition (detection)[21, 12],
Remote control[31]
Obstacle avoidance[31]
Tracking (follow user, come to the user)[31]
Power metering[31]
Assistance decision maker[12]
Positioning and navigation, map construct[12] [19, 16],
Grasping[12]
User interface[12, 20]
Robots collaboration management[20]
Face and gesture recognition[20, 19, 16]
Simultaneous Localization and Mapping (SLAM)[19]
Planning[19]
Text to speech[16]
Speech recognition (robot call)[16]
Robot setup[16]
Self-charge[16]
Image and video transfer and automatic video recording[28]
Distance estimation[28]
Software service designRepresentational State Transfer (REST) as a platform independent protocol[32]
SensorLaser, noise, light[12]
Robot and human interactionVerbal, non-verbal[20]
Design goalsEngaging, unobtrusive, device-like, respectful, reassuring[26]

Security Issues of Home Robots

Security ConsiderationsReferences
Main IssuesAttacksDenial of Service (DoS)[13]
Analyzing packet capture[13]
ThreatsPrivacy violation (especially for social interactions with robots) for some goals (location, object, information)[13, 33]
Active and passive eavesdropping[13]
Network security breach[13]
Robot vandalism[13]
Spying[13]
VulnerabilitiesInterface application[7]
Remote execution of code[8]
Status Check[8]
Allocation of a static Internet Protocol (IP) Address[13]
Availability of open ports[13]
Unsupervised data exchange[13]
Internet connection[13]
Webcam[13]
MechanismsAuthentication[8]
Two-factor authentication[13]
Biometrics as a second factor in authentication[13]
The privacy-utility tradeoff for remotely teleoperated robots that decrease image quality when sending it[33]
Situational awareness[19]
General IssuesPrinciplesPrivacy[14, 20, 34, 35, 36]
Ethical implications: Assisting elderly or disabled people, monitoring of houses, accessing social media, childcare[13, 34]
Trust[34]
Safety: The home robot faces more uncertainty in the environment than the industrial robot, posing more safety concerns.[15, 37]
Architecture IssuesSecurity issues are primarily discussed in the network layer.[7]

Overview of Security Issues and Classifications for Smart Home

IssuesClassificationReferences
General IssuesThe Internet of Things(IoT) challenges[65]
Main IssuesVulnerabilitySoftware flaws[68]
AttacksClassification based on security principles violated by the attack[65]
Classification based on architectural layers[64, 66]
Classification based on security principles violated by the attack[66]
Classification based on the activity of the attack over time[66]
Security in collaboration systems (cloud)[66]
Classification based on the connected object[66]
Classification based on attack target asset[64, 66]
MechanismsClassification based on the activity of the attack over time and the type of attack in the cloud architecture[64, 70]
Classification based on architectural layers[66]
Classification based on the gateway architecture and its layers[67]
Without classification[68, 69]

Overview of Security Issues and Classifications for Robots

IssueClassification or General DescriptionReferences
General issuesPrivacy issues[38, 39]
Safety issues[40, 41, 50]
Architecture layers[49]
AI usage[51]
ROS Middleware[49, 50]
Main issuesVulnerabilitiesComparison of two home robots (Rovio and Spykee)-50[48, 50]
ThreatsClassification based on Degree of risk[45]
AttacksClassification based on Assets that are the target of an attack[43]
Classification based on the motives of the attackers[43]
Without classification[46, 47, 48]
MechanismsClassification based on the type of attack and the time that we apply the mechanism[44]
Risk analysis[46]
Classification based on the type of assets[43, 47]
Without classification[48]
DOI: https://doi.org/10.2478/ias-2025-0001 | Journal eISSN: 1554-1029 | Journal ISSN: 1554-1010
Language: English
Page range: 1 - 17
Published on: Feb 28, 2025
In partnership with: Paradigm Publishing Services
Publication frequency: 6 issues per year

© 2025 Seyyed Mohsen Hashemi, Patrick C. K. Hung, published by Cerebration Science Publishing Co., Limited
This work is licensed under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 License.