Detection of Cyber-attacks to indoor real time localization systems for autonomous robots

2018 ◽  
Vol 99 ◽  
pp. 75-83 ◽  
Author(s):  
Ángel Manuel Guerrero-Higueras ◽  
Noemí DeCastro-García ◽  
Vicente Matellán
2017 ◽  
Vol 70 ◽  
pp. 422-435 ◽  
Author(s):  
Ángel Manuel Guerrero-Higueras ◽  
Noemí DeCastro-García ◽  
Francisco Javier Rodríguez-Lera ◽  
Vicente Matellán

Author(s):  
Petar Radanliev ◽  
David De Roure ◽  
Kevin Page ◽  
Max Van Kleek ◽  
Omar Santos ◽  
...  

AbstractMultiple governmental agencies and private organisations have made commitments for the colonisation of Mars. Such colonisation requires complex systems and infrastructure that could be very costly to repair or replace in cases of cyber-attacks. This paper surveys deep learning algorithms, IoT cyber security and risk models, and established mathematical formulas to identify the best approach for developing a dynamic and self-adapting system for predictive cyber risk analytics supported with Artificial Intelligence and Machine Learning and real-time intelligence in edge computing. The paper presents a new mathematical approach for integrating concepts for cognition engine design, edge computing and Artificial Intelligence and Machine Learning to automate anomaly detection. This engine instigates a step change by applying Artificial Intelligence and Machine Learning embedded at the edge of IoT networks, to deliver safe and functional real-time intelligence for predictive cyber risk analytics. This will enhance capacities for risk analytics and assists in the creation of a comprehensive and systematic understanding of the opportunities and threats that arise when edge computing nodes are deployed, and when Artificial Intelligence and Machine Learning technologies are migrated to the periphery of the internet and into local IoT networks.


Author(s):  
M. G. Harinarayanan Nampoothiri ◽  
P. S. Godwin Anand ◽  
Rahul Antony

Agriculture ◽  
2021 ◽  
Vol 11 (10) ◽  
pp. 954
Author(s):  
Abhijeet Ravankar ◽  
Ankit A. Ravankar ◽  
Arpit Rawankar ◽  
Yohei Hoshino

In recent years, autonomous robots have extensively been used to automate several vineyard tasks. Autonomous navigation is an indispensable component of such field robots. Autonomous and safe navigation has been well studied in indoor environments and many algorithms have been proposed. However, unlike structured indoor environments, vineyards pose special challenges for robot navigation. Particularly, safe robot navigation is crucial to avoid damaging the grapes. In this regard, we propose an algorithm that enables autonomous and safe robot navigation in vineyards. The proposed algorithm relies on data from a Lidar sensor and does not require a GPS. In addition, the proposed algorithm can avoid dynamic obstacles in the vineyard while smoothing the robot’s trajectories. The curvature of the trajectories can be controlled, keeping a safe distance from both the crop and the dynamic obstacles. We have tested the algorithm in both a simulation and with robots in an actual vineyard. The results show that the robot can safely navigate the lanes of the vineyard and smoothly avoid dynamic obstacles such as moving people without abruptly stopping or executing sharp turns. The algorithm performs in real-time and can easily be integrated into robots deployed in vineyards.


2014 ◽  
Vol 5 (3) ◽  
pp. 1-24
Author(s):  
Benjamin Sanda ◽  
Ikhlas Abdel-Qader ◽  
Abiola Akanmu

The use of Radio Frequency Identification (RFID) has become widespread in industry as a means to quickly and wirelessly identify and track packages and equipment. Now there is a commercial interest in using RFID to provide real-time localization. Efforts to use RFID technology in this way experience localization errors due to noise and multipath effects inherent to these environments. This paper presents the use of both linear Kalman filters and non-linear Unscented Kalman filters to reduce the error rate inherent to real-time RFID localization systems and provide more accurate localization results in indoor environments. A commercial RFID localization system designed for use by the construction industry is used in this work, and a filtering model based on 3rd order motion is developed. The filtering model is tested with real-world data and shown to provide an increase in localization accuracy when applied to both raw time of arrival measurements as well as final localization results.


2020 ◽  
Vol 10 (21) ◽  
pp. 7833
Author(s):  
Elvin Eziama ◽  
Faroq Awin ◽  
Sabbir Ahmed ◽  
Luz Marina Santos-Jaimes ◽  
Akinyemi Pelumi ◽  
...  

Connected and automated vehicles (CAVs) as a part of Intelligent Transportation Systems (ITS) are projected to revolutionise the transportation industry, primarily by allowing real-time and seamless information exchange of vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I). However, these connectivity and automation are expected to offer vast numbers of benefits, new challenges in terms of safety, security and privacy also emerge. CAVs continue to rely heavily on their sensor readings, the input obtained from other vehicles and the road side units to inspect roadways. Consequently, anomalous reading of sensors triggered by malicious cyber attacks may lead to fatal consequences. Hence, like all other safety-critical applications, in CAVs also, reliable and secure information dissemination is of utmost importance. As a result, real time detection of anomaly along with identifying the source is a pre-requisite for mass deployment of CAVs. Motivated by this safety concerns in CAVs, we develop an efficient anomaly detection method through the combination of Bayesian deep learning (BDL) with discrete wavelet transform (DWT) to improve the safety and security in CAVs. In particular, DWT is used to smooth sensor reading of a CAV and then feed the data to a BDL module for analysis of the detection and identification of anomalous sensor behavior/data points caused by either malicious cyber attacks or faulty vehicle sensors. Our numerical experiments show that the proposed method demonstrates significant improvement in detection anomalies in terms of accuracy, sensitivity, precision, and F1-score evaluation metrics. For these metrics, the proposed method shows an average performance gain of 7.95%, 9%, 8.77% and 7.33%, respectively when compared with Convolutional Neural Network (CNN-1D), and when compared with BDL, the corresponding numbers are 5%, 7.9%, 7.54% and 4.1% respectively.


Author(s):  
Francsico Reyes ◽  
Walter Fuertes ◽  
Freddy Tapia ◽  
Theofilos Toulkeridis ◽  
Hernán Aules ◽  
...  
Keyword(s):  

2018 ◽  
Vol 3 (1) ◽  
pp. 1 ◽  
Author(s):  
Mounir Hafsa ◽  
Farah Jemili

Cybersecurity ventures expect that cyber-attack damage costs will rise to $11.5 billion in 2019 and that a business will fall victim to a cyber-attack every 14 seconds. Notice here that the time frame for such an event is seconds. With petabytes of data generated each day, this is a challenging task for traditional intrusion detection systems (IDSs). Protecting sensitive information is a major concern for both businesses and governments. Therefore, the need for a real-time, large-scale and effective IDS is a must. In this work, we present a cloud-based, fault tolerant, scalable and distributed IDS that uses Apache Spark Structured Streaming and its Machine Learning library (MLlib) to detect intrusions in real-time. To demonstrate the efficacy and effectivity of this system, we implement the proposed system within Microsoft Azure Cloud, as it provides both processing power and storage capabilities. A decision tree algorithm is used to predict the nature of incoming data. For this task, the use of the MAWILab dataset as a data source will give better insights about the system capabilities against cyber-attacks. The experimental results showed a 99.95% accuracy and more than 55,175 events per second were processed by the proposed system on a small cluster.


Sign in / Sign up

Export Citation Format

Share Document