• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to secondary sidebar
  • About
    • Contact
    • Privacy
    • Terms of use
  • Advertise
    • Advertising
    • Case studies
    • Design
    • Email marketing
    • Features list
    • Lead generation
    • Magazine
    • Press releases
    • Publishing
    • Sponsor an article
    • Webcasting
    • Webinars
    • White papers
    • Writing
  • Subscribe to Newsletter

Robotics & Automation News

Where Innovation Meets Imagination

  • Home
  • News
  • Features
  • Editorial Sections A-Z
    • Agriculture
    • Aircraft
    • Artificial Intelligence
    • Automation
    • Autonomous Vehicles
    • Business
    • Computing
    • Construction
    • Culture
    • Design
    • Drones
    • Economy
    • Energy
    • Engineering
    • Environment
    • Health
    • Humanoids
    • Industrial robots
    • Industry
    • Infrastructure
    • Investments
    • Logistics
    • Manufacturing
    • Marine
    • Material handling
    • Materials
    • Mining
    • Promoted
    • Research
    • Robotics
    • Science
    • Sensors
    • Service robots
    • Software
    • Space
    • Technology
    • Transportation
    • Warehouse robots
    • Wearables
  • Press releases
  • Events
tuv rheinland image

TUV Rheinland outlines cyber security threats to industrial robotics and automation systems

July 16, 2017 by David Edwards

TUV Rheinland was invited to attend Shanghai International Industrial Automation & Robot Exhibition 2017 earlier this month, and held thematic lectures on the “New Engine of Smart Society – Robots and Inspection & Certification Services for Robot Systems” during the exhibition.

Shu Xu, unit general manager of commercial products of TUV Rheinland Greater China, officially released in the lecture a white paper on industrial robotics and cyber security, drawing considerable interest of many exhibitors, media and professionals in the world of robotics.

The white paper provides a detailed picture of various cyber security risks faced by industrial robots, as well as latest developments on technological trends, standards and product testing in the cyber security industry. 

It also proposes realistic responding strategies and recommendations respectively for robot manufacturers, integrators and operators according to their characteristics, aiming to help enterprises in the robotic industry chain remain abreast of new developments on cyber security so that they can capture market opportunities and make right operational decisions.

Shu Xu said: “Like any complex electromechanical system, robots are subject to cyber security threats that can impact their safe and secure functioning.

“By presenting a comprehensive view of the robotic cyber security, we hope that we can create a safe and reliable operational environment for upstream and downstream enterprises to address potential security risks in all processes, from robot design, manufacturing and integration to use.”

Cyber threats and risks to robots

With the development of industrial internet, an increasing number of industrial devices are connected to the internet, especially industrial robots.

Connecting a corporate internal network to the public internet contribute to increased production efficiency on the one hand, and pose cyber security threats to robots on the other. Specifically, these risks mainly come from the following aspects:

Firmware and software: Some firmware and software with open access for ease of maintenance in low security level are vulnerable targets of malware, such as an open USB port, a wireless network with default password, and a maintenance laptop lack of secure configuration.

Software development: As robot operating systems (ROS) provide open source software and do not have any security features by default, and the programming languages of a robot are mostly common languages, the security flaws in software are easy to be exposed.

Communication system: Robots are usually configured with various communication systems, but manufacturers often do not consider the confidentiality of data in their design, thus leading to weakly encrypted products. Such insecurity of communication channels could result in an attacked system.

Identity and access management: Poor implementation of IAM could result in, for example, inexperienced operators sharing user name and password that could introduce major quality and safety issues.

Data privacy: Robots for medical care and surgery will inevitably contain many personal and sensitive data. In most cases, both personal and healthcare data are protected by law due to their sensitive nature. Special attention will need to be paid by manufacturers and users of these equipments to ensure they do not breach legal requirements of patient confidentiality.

Disposal and recycling: As for industrial robots that contain sensitive data, any resident memory should be destroyed or forensically overwritten during robot decommissioning, because criminals can trivially recover simply deleted data for their own use.

Cyber threat analysis – an important risk management approach

Cyber security threats are developing and evolving continuously. In this context a threat is anything – either originating from a technical software bug or human criminal gang.

At present, cyber threat analysis is an important approach for industrial robot suppliers or operators to manage risk. Tying together disparate snippets of data to produce threat intelligence and taking efficient solutions can help protect an industrial robot.

Mutually reinforcing functional safety and cyber security

Functional safety is the defense against random and systematic technical failure to protect life of the person concerned. Cyber security is the defense against negligent and willful actions to protect devices and data. The worlds of functional safety, robots and cyber security are inextricably linked as an industrial robot can no longer be deemed safe if it is not secure.

TUV Rheinland suggests that both safety and security testing are addressed

The generic standard for functional safety, IEC 61508:2010 states that, if a malevolent or unauthorized action is identified, then a security threats analysis should be carried out; if security threats have been identified, then a vulnerability analysis should be undertaken in order to specify security requirements; the standard further goes on to recommend using the guidance given in the IEC 62443 series (a set of information system security standards for industrial communication networks).

Testing an industrial robot against the seven foundational requirements of IEC 62443 will reduce many cyber security risks across an industrial robot system, and security level (SL) can then be applied to the system.

SL4 is the highest security level to protect a robot against intentional violation using sophisticated means with extended resources.

However, most enterprises have not fully recognized the importance of SL4.

As such, TUV Rheinland suggests that the best approach is to design in safety and security at the initial development of an industrial robot.

For product testing, a combination of traditional vulnerability and penetration testing with those tests for IEC 62443-3-3 will likely provide the most comprehensive test to determine whether there are security risks, such as due to outdated software components, use of poor authentication or default credentials, poor transport encryption using outdated cryptographic techniques, insecure web interfaces and poor software protection.

Print Friendly, PDF & Email

Share this:

  • Click to print (Opens in new window) Print
  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to share on X (Opens in new window) X
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on WhatsApp (Opens in new window) WhatsApp
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on Pocket (Opens in new window) Pocket

Related stories you might also like…

Filed Under: Industrial robots, Industry, News Tagged With: cyber, data, industrial, robot, robots, safety, security, software, threats

Primary Sidebar

Search this website

Latest articles

  • Canadarm2 grapples Cygnus XL in key robotic arm manoeuvre at the ISS
  • Autonomous underwater waste collection soon to be a reality
  • Italian Institute of Technology develops robot for vineyard applications
  • Flexiv to make largest appearance yet at China International Industry Fair
  • Why Well Fitted Construction Uniforms Are Becoming a Safety Imperative?
  • Inspection and maintenance robots: Reaching the unreachable and dangerous
  • Fugro and NOAA partner to advance remote deep-ocean mapping
  • Meiko Group partners with Fizyr and Yaskawa Europe on automated dishwashing
  • The Precision Engineering Foundations of Next-Generation Robotics
  • ABB to invest an extra $110 million in US manufacturing

Secondary Sidebar

Copyright © 2025 · News Pro on Genesis Framework · WordPress · Log in

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Do not sell my personal information.
Cookie SettingsAccept
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT