Skip to main content
Samson ORUMA
  • Department of Electrical and Information Engineering, Covenant University, Ota, Ogun State, Nigeria
  • +234 8064228048
  • noneedit
  • Engr. Samson O. Oruma received his bachelor’s degree in electrical electronics engineering from the University of Ben... moreedit
  • Prof. Francis Idachabaedit
Background: As social robots increasingly integrate into public spaces, comprehending their security implications becomes paramount. This study is conducted amidst the growing use of social robots in public spaces (SRPS), emphasising the... more
Background: As social robots increasingly integrate into public spaces, comprehending their security implications becomes paramount. This study is conducted amidst the growing use of social robots in public spaces (SRPS), emphasising the necessity for tailored security standards for these unique robotic systems. Methods: In this systematic mapping study (SMS), we meticulously review and analyse existing literature from the Web of Science database, following guidelines by Petersen et al. We employ a structured approach to categorise and synthesise literature on SRPS security aspects, including physical safety, data privacy, cybersecurity, and legal/ethical considerations. Results: Our analysis reveals a significant gap in existing safety standards, originally designed for industrial robots, that need to be revised for SRPS. We propose a thematic framework consolidating essential security guidelines for SRPS, substantiated by evidence from a considerable percentage of the primary stud...
Background: As social robots increasingly integrate into public spaces, comprehending their security implications becomes paramount. This study is conducted amidst the growing use of social robots in public spaces (SRPS), emphasising the... more
Background: As social robots increasingly integrate into public spaces, comprehending their security implications becomes paramount. This study is conducted amidst the growing use of social robots in public spaces (SRPS), emphasising the necessity for tailored security standards for these unique robotic systems. Methods: In this systematic mapping study (SMS), we meticulously review and analyse existing literature from theWeb of Science database, following guidelines by Petersen et al.
We employ a structured approach to categorise and synthesise literature on SRPS security aspects, including physical safety, data privacy, cybersecurity, and legal/ethical considerations. Results: Our analysis reveals a significant gap in existing safety standards, originally designed for industrial robots, that need to be revised for SRPS.We propose a thematic framework consolidating essential security guidelines for SRPS, substantiated by evidence from a considerable percentage of the primary
studies analysed. Conclusions: The study underscores the urgent need for comprehensive, bespoke security standards and frameworks for SRPS. These standards ensure that SRPS operate securely and ethically, respecting individual rights and public safety, while fostering seamless integration into diverse human-centric environments. This work is poised to enhance public trust and acceptance of these robots, offering significant value to developers, policymakers, and the general public.
This paper surveys security threats to 5G-enabled wireless access networks for social robots in public spaces (SRPS). The use of social robots (SR) in public areas requires specific Quality of Service (QoS) planning to meet its unique... more
This paper surveys security threats to 5G-enabled wireless access networks for social robots in public spaces (SRPS). The use of social robots (SR) in public areas requires specific Quality of Service (QoS) planning to meet its unique requirements. Its 5G threat landscape entails more than cybersecurity threats that most previous studies focus on. This study examines the 5G wireless RAN for SRPS from three perspectives: SR and wireless access points, the ad hoc network link between SR and user devices, and threats to SR and users' communication equipment. The paper analyses the security threats to confidentiality, integrity, availability, authentication, authorisation, and privacy from the SRPS security objectives perspective. We begin with an overview of SRPS use cases and access network requirements, followed by 5G security standards, requirements, and the need for a more representative threat landscape for SRPS. The findings confirm that the RAN of SRPS is most vulnerable to physical, side-channel, intrusion, injection, manipulation, and natural and malicious threats. The paper presents existing mitigation to the identified attacks and recommends including physical level security (PLS) and post-quantum cryptography in the early design of SRPS. The insights from this survey will provide valuable risk assessment and management input to researchers, industrial practitioners, policymakers, and other stakeholders of SRPS.
A fascinating and essential control problem for researchers is the inverted pendulum. It remains a generally accepted standard used in control and robotics for validation of emerging control technologies. A mathematical model of the... more
A fascinating and essential control problem for researchers is the inverted pendulum. It remains a generally accepted standard used in control and robotics for validation of emerging control technologies. A mathematical model of the inverted pendulum on a moving base system was derived, an expression of the linearised state space representation of the system was also presented, a controller to achieve specific criterion of the steady state error, rise and settling time, and was obtained, an implementation of this control on MATLAB was carried out together with the simulated animation of the system using Simulink and Simscape.
There is a growing interest in using social robots in public spaces for indoor and outdoor applications. The threat landscape is an important research area being investigated and debated by various stakeholders. Objectives: This study... more
There is a growing interest in using social robots in public spaces for indoor and outdoor applications. The threat landscape is an important research area being investigated and debated by various stakeholders. Objectives: This study aims to identify and synthesize empirical research on the complete threat landscape of social robots in public spaces. Specifically, this paper identifies the potential threat actors, their motives for attacks, vulnerabilities, attack vectors, potential impacts of attacks, possible attack scenarios, and mitigations to these threats. Methods: This systematic literature review follows the guidelines by Kitchenham and Charters. The search was conducted in five digital databases, and 1469 studies were retrieved. This study analyzed 21 studies that satisfied the selection criteria. Results: Main findings reveal four threat categories: cybersecurity, social, physical, and public space. Conclusion: This study completely grasped the complexity of the transdisc...
There is a growing interest in using social robots in public spaces for indoor and outdoor applications. The threat landscape is an important research area being investigated and debated by various stakeholders. Objectives: This study... more
There is a growing interest in using social robots in public spaces for indoor and outdoor applications. The threat landscape is an important research area being investigated and debated by various stakeholders. Objectives: This study aims to identify and synthesize empirical research on the complete threat landscape of social robots in public spaces. Specifically, this paper identifies the potential threat actors, their motives for attacks, vulnerabilities, attack vectors, potential impacts of attacks, possible attack scenarios, and mitigations to these threats. Methods: This systematic literature review follows the guidelines by Kitchenham and Charters. The search was conducted in five digital databases, and 1469 studies were retrieved. This study analyzed 21 studies that satisfied the selection criteria. Results: Main findings reveal four threat categories: cybersecurity, social, physical, and public space. Conclusion: This study completely grasped the complexity of the transdisciplinary problem of social robot security and privacy while accommodating the diversity of stakeholders' perspectives. Findings give researchers and other stakeholders a comprehensive view by highlighting current developments and new research directions in this field. This study also proposed a taxonomy for threat actors and the threat landscape of social robots in public spaces.
The challenge of Nigeria's food insecurity in the era of the Covid-19 pandemic, insecurity, climate change, population growth, food wastage, etc., is a demanding task. This study addresses Nigeria's food insecurity challenges by adopting... more
The challenge of Nigeria's food insecurity in the era of the Covid-19 pandemic, insecurity, climate change, population growth, food wastage, etc., is a demanding task. This study addresses Nigeria's food insecurity challenges by adopting agriculture 4.0 and commercial farming. Using data from six digital libraries, the Nigerian Bureau of Statistics, and other internet sources, we conducted a Systematic Literature Review (SLR using PRISMA) on Nigeria's agriculture, food security, and agriculture 4.0. Our results show Nigeria's current agricultural state, threats to food security, and modern digital agriculture technologies. We adapted our SLR findings to develop an implementation framework for agriculture 4.0 in solving Nigeria's food insecurity challenge in the post-Covid-19 era. Our proposed framework integrates precision agriculture in Nigeria's food production and the necessary enabling digital technologies in the agri-food supply chain. We analyzed the critical implementation considerations during each agri-food supply chain stage of farming inputs, farming scale, farming approach, farming operation, food processing, food preservation/storage, distribution/logistics, and the final consumers. This study will help researchers, investors, and the government address food security in Nigeria. The implementation of agriculture 4.0 will substantially contribute to SDG 2 (zero hunger), SDG 3 (good health and well-being), and SDG 8 (decent work and economic growth) of #Envision 2030 of the United Nations, for the benefit of Nigeria, Africa, and the entire world.
A fascinating and essential control problem for researchers is the inverted pendulum. It remains a generally accepted standard used in control and robotics for validation of emerging control technologies. A mathematical model of the... more
A fascinating and essential control problem for researchers is the inverted pendulum.
It remains a generally accepted standard used in control and robotics for validation of emerging
control technologies. A mathematical model of the inverted pendulum on a moving base
system was derived, an expression of the linearised state space representation of the system
was also presented, a controller to achieve specific criterion of the steady state error, rise and
settling time, and was obtained, an implementation of this control on MATLAB was carried
out together with the simulated animation of the system using Simulink and Simscape.
The use of social robots in public spaces is becoming increasingly popular due to their ability to provide personalized services to users. However, the convergence of different technologies and software applications has raised concerns... more
The use of social robots in public spaces is becoming increasingly popular due to their ability to provide personalized services to users. However, the convergence of different technologies and software applications has raised concerns regarding security requirements, standards, and regulations. Specifically, there are significant concerns about the evolving threat landscape for software applications in public settings, where social robots interact without supervision and are in direct contact with threat actors. During the development of social robots software, developers and practitioners need practical tools to continuously assess their products' security profiles. This paper presents a preventive approach to the dynamic evolving security landscape of Social Robots in Public Spaces (SRPS) using design science research (DSR) methodology to develop a security framework. The study investigates security threats, vulnerabilities, and risks associated with SRPS software development and analyzes existing related frameworks to design a security framework for SRPS software developers. The research aims to provide insights into the security aspects of SRPS software application development processes and contribute to developing effective security frameworks to mitigate evolving risks and ensure secure operation and acceptance in public spaces. CCS CONCEPTS • Security and privacy → Software security engineering.