Disrupting ROS and ROS-Industrial communications by attacking underlying network protocols
This article aims to illustrate the consequences that some simple attacks targeting these underlying network protocols could have in ROS and ROS-Industrial deployments.