scholarly journals Cybersecurity of Robotic Systems: Leading Challenges and Robotic System Design Methodology

Electronics ◽  
2021 ◽  
Vol 10 (22) ◽  
pp. 2850
Author(s):  
Vibekananda Dutta ◽  
Teresa Zielińska

Recent years have seen a rapid development of the Internet of Things (IoT) and the growth of autonomous robotic applications which are using network communications. Accordingly, an increasing advancement of intelligent devices with wireless sensors (that means autonomous robotic platforms) operating in challenging environments makes robots a tangible reality in the near future. Unfortunately, as a result of technical development, security problems emerge, especially when considering human–robot collaboration. Two abnormalities often compromise the basic security of collaborative robotic fleets: (a) Information faults and (b) system failures. This paper attempts to describe the methodology of a control framework design for secure robotic systems aided by the Internet of Things. The suggested concept represents a control system structure using blocks as the components. The structure is designed for the robots expected to interact with humans safely and act connected by communication channels. The properties of the components and relations between them are briefly described. The novelty of the proposed concept concerns the security mechanisms. The paper also categorizes two different modes of network attacks summarizing their causal effects on the human–robot collaboration systems. The issue of standardization is also raised. In particular, the works of the National Institute of Standards and Technology (NIST) and European Parliament (EP) on the security templates for communication channels are commented.


Author(s):  
Haiting Huang

In order to explore the application of IoT technology in robots and the promotion of IoT robot technology to the economy, by comparing traditional technology and IoT intelligent robot technology, this article combines it with economic development to analyze the promotion of IoT robot to economic development. Based on the ultra-wideband ranging method, this paper designs an ultra-wideband radio frequency positioning system and applies it to the robot’s positioning process. Moreover, this article combines the application of robots in the current social and economic development to construct the system structure, and conducts functional analysis with manufacturing robots and monitoring robots as the main body. After constructing an intelligent robot based on the Internet of Things technology, by comparing the traditional technology and the intelligent robot technology of the Internet of Things, this article combines it with economic development to analyze the promotion of IoT robot to economic development. From the analysis results of this article, it can be seen that the advancement of IoT robot technology can effectively promote economic development.



2012 ◽  
Vol 452-453 ◽  
pp. 932-936
Author(s):  
Xiang Dong Hu ◽  
Peng Qin Yu

With the rapid development of ubiquitous network and its applications, the key technologies of the Internet of things are actively researched all over the world. The Internet of things has tremendous attraction for adversaries, and it is easily attacked due to poor resource and non-perfect distribution of sensor nodes, then false data maybe be injected into network. Security is one of the most important demands for applications in the Internet of things, an algorithm of malicious nodes detection is proposed to protect the network from destruction based on weighted confidence filter, namely, the cluster heads take charge of collecting messages from nodes and computing their average of confidence in cluster-based network, then they aggregate data from nodes with higher confidence than average and ignore the others, they update confidence of each node by comparing the aggregation value and the received data, and regard it as the weight of exactness of message from node. A sensor node is judged to be a malicious one if its weight is lower than the set threshold. The simulation results show that the algorithm can detect malicious nodes with high detection ratio, low false alarm ratio and outstanding scalability.



2014 ◽  
Vol 2014 ◽  
pp. 1-10 ◽  
Author(s):  
Sun-Young Ihm ◽  
Aziz Nasridinov ◽  
Young-Ho Park

A rapid development in wireless communication and radio frequency technology has enabled the Internet of Things (IoT) to enter every aspect of our life. However, as more and more sensors get connected to the Internet, they generate huge amounts of data. Thus, widespread deployment of IoT requires development of solutions for analyzing the potentially huge amounts of data they generate. A top-kquery processing can be applied to facilitate this task. The top-kqueries retrievektuples with the lowest or the highest scores among all of the tuples in the database. There are many methods to answer top-kqueries, where skyline methods are efficient when considering all attribute values of tuples. The representative skyline methods are soft-filter-skyline (SFS) algorithm, angle-based space partitioning (ABSP), and plane-project-parallel-skyline (PPPS). Among them, PPPS improves ABSP by partitioning data space into a number of spaces using hyperplane projection. However, PPPS has a high index building time in high-dimensional databases. In this paper, we propose a new skyline method (called Grid-PPPS) for efficiently handling top-kqueries in IoT applications. The proposed method first performs grid-based partitioning on data space and then partitions it once again using hyperplane projection. Experimental results show that our method improves the index building time compared to the existing state-of-the-art methods.



2021 ◽  
Vol 12 (36) ◽  
pp. 11936-11954
Author(s):  
Kai-Li Wang ◽  
Yu-Hang Zhou ◽  
Yan-Hui Lou ◽  
Zhao-Kui Wang

With the rapid development of the Internet of Things (IoTs), photovoltaics (PVs) has a vast market supply gap of billion dollars.



2021 ◽  
Vol 2021 ◽  
pp. 1-12
Author(s):  
Jie Du

As the economy grows rapidly and IoT technology advances rapidly, the logistics industry as a service industry is growing rapidly around the world. The logistics industry, meanwhile, is the one that can best play the role of IoT. The rapid development of the logistics industry has brought great competition challenges to the logistics industry. To solve the competitive problems of the logistics industry cluster, this article introduces the research on the upgrade path and strategy of the logistics industry cluster based on the Internet of Things and uses the analytic hierarchy process, investigation method, and expert evaluation method to build the IoT technology information model and logistics cost. According to the established optimization model, the following are proposed: analyzing the problems existing in the logistics industry cluster, giving an upgrade path from the four aspects of manufacturing, technology, structure, and service, and giving specific strategic suggestions from the aspects of talents and enterprises. The accuracy rate of current analysis is as high as 90%, and the implementation rate of upgrade paths and strategy recommendations is as high as 95%.



2021 ◽  
Vol 6 (3) ◽  
pp. 33-39
Author(s):  
Oleg O. Viushchenko ◽  
◽  
Maria A. Maslova ◽  

The rapid development of the Internet of Things (IoT) and its capabilities in terms of services have made it one of the fastest-growing technologies that have a huge impact on both social life and the business environment of a person. The widespread adoption of connected devices in the IoT has created a huge demand for reliable security in response to the growing demand of billions of connected devices and services around the world. But at the same time, the number of threats continues to grow every day, and attacks are increasing both in number and complexity. The number of attackers is also growing, and the tools they use are constantly being improved and becoming more effective. Therefore, it is necessary to constantly protect against threats and vulnerabilities for IoT. In this article, we will analyze the development of IoT, consider existing threats, attacks on IoT, as well as methods of protecting devices from threats and vulnerabilities for IoT.



Electronics ◽  
2021 ◽  
Vol 10 (24) ◽  
pp. 3155
Author(s):  
Erfeng Li ◽  
Xue Jun Li ◽  
Boon-Chong Seet

With the rapid development of wireless communication technology and the Internet of Things (IoT), wireless body area networks (WBAN) have been thriving. This paper presents a triband patch antenna with multiple slots for conformal and wearable applications. The proposed antenna operates at 5.8, 6.2, and 8.4 GHz. The antenna was designed with a flexible polyethylene terephthalate (PET) substrate, and the corresponding conformal tests and on-body performance were conducted via simulation. The antenna demonstrated promising gain and acceptable fluctuations when applied on curvature surfaces. The specific absorption rate (SAR) for on-body simulation also suggests that this antenna is suitable for wearable applications.



2018 ◽  
Vol 7 (3.13) ◽  
pp. 99 ◽  
Author(s):  
Janusz Wielki

The rapid development of the Internet of Things and its growing influence on functioning of business organizations and utilized by them business models was the main motivation of undertaking the research presented in the paper. In this context the most important areas of opportunities created with the development of this concept were determined. The main internal and external challenges of a technical and non-technical nature were also identified. The major finding of the paper is suggested in its final part a strategic framework connected with the implementation of the concept of the Internet of Thing in business organizations.  



2020 ◽  
Vol 39 (6) ◽  
pp. 8623-8632
Author(s):  
Tang Lin

Although much less fatal than the Ebola and previous SARS virus epidemics, the current coronavirus outbreak (COVID-19) has spread to more people in more countries in a much shorter time frame. With the rapid development of the Internet of things, it has played an important role to track/monitor transmission movements throughout the population. The technology infrastructure between mobile devices, wearable devices and sensors, smart home device makes it possible to readily deploy solutions to monitor and collect data and perform analysis to ensure policy make intelligent, rapid decisions. This research combines AOL and Support Vector Machine to form the Internet of things cycle through smart home. The parameters of Support Vector Machine model are optimized by ALO algorithm, which shortens the learning time and improves the performance of classifier. Then, the algorithm of ALO is used to optimize the Support Vector Machine intrusion detection method and agent technology, and the intrusion detection model is established. Experimental results show that the combination of these two can effectively reduce the false alarm rate of network intrusion.



Sign in / Sign up

Export Citation Format

Share Document