Cybersecurity Education with RoboScape

RoboScape is a collaborative, networked robotics environment that makes key ideas in computer science accessible to groups of learners in informal learning spaces and K-12 classrooms. RoboScape is built on top of NetsBlox, an open-source, networked, visual programming environment based on Snap! that is specifically designed to introduce students to distributed computation and computer networking.

RoboScape provides a twist on the state of the art of robotics learning platforms. First, a user's program controlling the robot runs in the browser and not on the robot. There is no need to download the program to the robot and hence, development and debugging become much easier. Second, the wireless communication between a student's program and the robot can be overheard by the programs of the other students. This makes cybersecurity an immediate need that students realize and can work to address.

We have designed a cybersecurity summer camp for high school students. Below you can find an overview of the curriculum.

Overview of the Curriculum

The curriculum does not assume any prior programming knowledge and targets high schoolers. It starts off by teaching basic programming in the NetsBlox and teaches new cybersecurity concepts, common and fundamental attacks, and ways to defend against them.At the end of each day the students put what they have learned so far to participate in robotics challenges while defending against cybersecurity attacks from their classmates.


  1. NetsBlox Programming: Getting familiar with visual block-based programming. Learn about RPCs and message passing.
  2. General Robotics with RoboScape: Robot programming with Roboscape.
  3. Attacks & Attack Detection: Examples of attacks in real world and in Roboscape and how to detect them.
  4. Denial of Service: Dealing with an unresponsive robot under attack with a lot of illegitimate or legitimate requests.
  5. Encryption (Plain Text Issue): The problem with having no authentication and plain text communication.
  6. Key Cracking (Brute Force Attack): Weak versus strong encryption and potential problems.
  7. Insecure Key Exchange: Challenges of transmitting a shared key for encryption
  8. Replay Attack

Required Tools

The minimum requirements for running this camp:


All the lesson plans and other material associated with the camp can be downloaded here. Please email us to get access to camp materials.