scholarly journals Is Secure Communication in the R2I (Robot-to-Infrastructure) Model Possible? Identification of Threats

Energies ◽  
2021 ◽  
Vol 14 (15) ◽  
pp. 4702
Author(s):  
Karolina Krzykowska-Piotrowska ◽  
Ewa Dudek ◽  
Mirosław Siergiejczyk ◽  
Adam Rosiński ◽  
Wojciech Wawrzyński

The increase in the role of companion robots in everyday life is inevitable, and their safe communication with the infrastructure is one of the fundamental challenges faced by designers. There are many challenges in the robot’s communication with the environment, widely described in the literature on the subject. The threats that scientists believe have the most significant impact on the robot’s communication include denial-of-service (DoS) attacks, satellite signal spoofing, external eavesdropping, spamming, broadcast tampering, and man-in-the-middle attacks. In this article, the authors attempted to identify communication threats in the new robot-to-infrastructure (R2I) model based on available solutions used in transport, e.g., vehicle-to-infrastructure (V2I), taking into account the threats already known affecting the robot’s sensory systems. For this purpose, all threats that may occur in the robot’s communication with the environment were analyzed. Then the risk analysis was carried out, determining, in turn, the likelihood of potential threats occurrence, their consequence, and ability of detection. Finally, specific methods of responding to the occurring threats are proposed, taking into account cybersecurity aspects. A critical new approach is the proposal to use communication and protocols so far dedicated to transport (IEEE 802.11p WAVE, dedicated short-range communications (DSRC)). Then, the companion’s robot should be treated as a pedestrian and some of its sensors as an active smartphone.

2021 ◽  
Author(s):  
Khushal Singh ◽  
Nanhay Singh

Abstract Internet of Things (IoT) is the domain of interest for the researchers at the present with the exponential growth in technology. Security in IoT is a prime factor, which highlights the need for authentication to tackle various attackers and hackers. Authentication is the process that uniquely identifies the incoming user and this paper develops an authentication protocol based on the chebyshev polynomial, hashing function, session password, and Encryption. The proposed authentication protocol is named as, proposed Elliptic, chebyshev, Session password, and Hash function (ECSH)-based multilevel authentication. For authenticating the incoming user, there are two phases, registration and authentication. In the registration phase, the user is registered with the server and Authentication center (AC), and the authentication follows, which is an eight-step criterion. The authentication is duly based on the scale factor of the user and server, session password, and verification messages. The authentication at the eight levels assures the security against various types of attacks and renders secure communication in IoT with minimal communication overhead and packet-loss. The performance of the method is analyzed using black-hole and Denial-of-service (DOS) attacks with 50 and 100 nodes in the simulation environment. The proposed ECSH-based multilevel authentication acquired the maximal detection rate, PDR, and QOS of 15.2%, 35.7895%, and 26.4623%, respectively in the presence of 50 nodes and DOS attacks, whereas the minimal delay of 135.922 ms is acquired in the presence of 100 nodes and DOS attacks.


2017 ◽  
Vol 11 (4) ◽  
pp. 1-15 ◽  
Author(s):  
Nagesh K. ◽  
Sumathy R. ◽  
Devakumar P. ◽  
Sathiyamurthy K.

Security is concerned with protecting assets. The aspects of security can be applied to any situation- defense, detection and deterrence. Network security plays important role of protecting information, hardware and software on a computer network. Denial of service (DOS) attacks causes great impacts on the internet world. These attacks attempt to disrupt legitimate user's access to services. By exploiting computer's vulnerabilities, attackers easily consume victim's resources. Many special techniques have been developed to protest against DOS attacks. Some organizations constitute several defense mechanism tools to tackle the security problems. This paper has proposed various types of attacks and solutions associated with each layers of OSI model. These attacks and solutions have different impacts on the different environment. Thus the rapid growth of new technologies may constitute still worse impacts of attacks in the future.


Electronics ◽  
2021 ◽  
Vol 10 (11) ◽  
pp. 1282
Author(s):  
Abdulrahman Aminu Ghali ◽  
Rohiza Ahmad ◽  
Hitham Alhussian

The Internet of Things (IoT) has gained remarkable acceptance from millions of individuals. This is evident in the extensive use of intelligent devices such as smartphones, smart television, speakers, air conditioning, lighting, and high-speed networks. The general application area of IoT includes industries, hospitals, schools, homes, sports, oil and gas, automobile, and entertainment, to mention a few. However, because of the unbounded connection of IoT devices and the lack of a specific method for overseeing communication, security concerns such as distributed denial of service (DDoS), denial of service (DoS), replay, botnet, social engineering, man-in-the-middle, and brute force attacks have posed enormous challenges in the IoT environment. Regarding these enormous challenges, this study focuses on DDoS and DoS attacks. These two attacks have the most severe consequences in the IoT environment. The solution proposed in this study can also help future researchers tackle the expansion of IoT security threats. Moreover, the study conducts rigorous experiments to assess the efficiency of the proposed approach. In summary, the experimental results show that the proposed hybrid approach mitigates data exfiltration caused by DDoS and DoS attacks by 95.4%, with average network lifetime, energy consumption, and throughput improvements of 15%, 25%, and 60%, respectively.


Author(s):  
Mohammad Zubair ◽  
Devrim Unal ◽  
Abdulla Al-Ali ◽  
Thomas Reimann ◽  
Guillaume Alinier

Background: IoMT (Internet of Medical Things) devices (often referred to IoMT domain) have the potential to quickly diagnose and monitor patients outside the hospital by transmitting information through the cloud domain using wireless communication to remotely located medical professionals (user domain). shows the proposed IoMT framework designed to improve the privacy and security of the healthcare infrastructure. Methods: The framework consists of four modules: 1. Intrusion Detection System (IDS) using deep learning (DL) to identify bluetooth-based Denial-of-Service (DoS)-attacks on IoMT devices and is deployed on edge-computing to secure communication between IoMT and edge. 2. IDS is backed up with identity-based cryptography to encrypt the data and communication path. 3. Besides the identity-management system (to authenticate users), it is modeled with aliveness detection using face authentication techniques at the edge to guarantee the confidentiality, integrity, and availability (CIA) of the framework. 4. At the cloud level, another IDS using MUSE (Merged-Hierarchical-Deep-Learning-System-with-Layer-Reuse) is proposed to protect the system against Man-In-The-Middle attacks, while the data is transferred between IoMT-EDGE-CLOUD. Results: These four modules are developed independently by precisely analyzing dependencies. The performance of IDS in terms of precision is 99% and for the identity-management system, the time required to encrypt and decrypt 256-bit key is 66 milliseconds and 220 milliseconds respectively. The true positive rate is 90.1%, which suggests real-time detection and authentication rate. IDS (2) using MUSE (12-layer) the accuracy is >95%, and it consumes 15.7% to 27.63% less time to train than the smaller four-layer model. Conclusion: Our designed models suit edge devices and cloud-based cybersecurity systems and support the fast diagnosis and care required by critically ill patients in the community.


Sensors ◽  
2021 ◽  
Vol 21 (15) ◽  
pp. 5095
Author(s):  
Tibor Petrov ◽  
Lukas Sevcik ◽  
Peter Pocta ◽  
Milan Dado

For more than a decade, communication systems based on the IEEE 802.11p technology—often referred to as Dedicated Short-Range Communications (DSRC)—have been considered a de facto industry standard for Vehicle-to-Infrastructure (V2I) communication. The technology, however, is often criticized for its poor scalability, its suboptimal channel access method, and the need to install additional roadside infrastructure. In 3GPP Release 14, the functionality of existing cellular networks has been extended to support V2X use cases in an attempt to address the well-known drawbacks of the DSRC. In this paper, we present a complex simulation study in order to benchmark both technologies in a V2I communication context and an urban scenario. In particular, we compare the DSRC, LTE in the infrastructural mode (LTE-I), and LTE Device-to-Device (LTE-D2D) mode 3 in terms of the average end-to-end delay and Packet Delivery Ratio (PDR) under varying communication conditions achieved through the variation of the communication perimeter, message generation frequency, and road traffic intensity. The obtained results are put into the context of the networking and connectivity requirements of the most popular V2I C-ITS services. The simulation results indicate that only the DSRC technology is able to support the investigated V2I communication scenarios without any major limitations, achieving an average end-to-end delay of less than 100 milliseconds and a PDR above 96% in all of the investigated simulation scenarios. The LTE-I is applicable for the most of the low-frequency V2I services in a limited communication perimeter (<600 m) and for lower traffic intensities (<1000 vehicles per hour), achieving a delay pf less than 500 milliseconds and a PDR of up to 92%. The LTE-D2D in mode 3 achieves too great of an end-to-end delay (above 1000 milliseconds) and a PDR below 72%; thus, it is not suitable for the V2I services under consideration in a perimeter larger than 200 m. Moreover, the LTE-D2D mode 3 is very sensitive to the distance between the transmitter and its serving eNodeB, which heavily impacts the PDR achieved.


Author(s):  
B. Prabadevi ◽  
N. Jeyanthi

<p>Security in the era of digital computing plays a vital role. Of various attacks in the field of computing, Distributed Denial of service (DDoS) attacks, Man-in-the-Middle Attack (MITM) and data theft have their major impact on the emerging applications. The sniffing attacks, one of the most prominent reasons for DDoS attacks, are the major security threats in the client-server computing. The content or packet sniffer snorts the most sensitive information from the network and alters or disturbs the legitimate functionality of the victim system. Therefore it is extremely important to have a greater knowledge on these vulnerabilities, their issues, and various mitigation techniques. This study analyses the existing sniffing attacks, variations of sniffing attacks and prevention or detection mechanisms. The reasons for most vital Ransomware are also discussed.</p>


Author(s):  
Nagesh K. ◽  
Sumathy R. ◽  
Devakumar P. ◽  
Sathiyamurthy K.

Security is concerned with protecting assets. The aspects of security can be applied to any situation- defense, detection and deterrence. Network security plays important role of protecting information, hardware and software on a computer network. Denial of service (DOS) attacks causes great impacts on the internet world. These attacks attempt to disrupt legitimate user's access to services. By exploiting computer's vulnerabilities, attackers easily consume victim's resources. Many special techniques have been developed to protest against DOS attacks. Some organizations constitute several defense mechanism tools to tackle the security problems. This paper has proposed various types of attacks and solutions associated with each layers of OSI model. These attacks and solutions have different impacts on the different environment. Thus the rapid growth of new technologies may constitute still worse impacts of attacks in the future.


Author(s):  
Yu.V. IRKHIN

The article analyzes the problems, achievements and contradictions in the genesis of the contemporary postmodern discourse. The author has carried out complex research, systematized and showed the main features and differences of postmodernism and metamodernism, as well as the role of neoliberal values in their development. The author has considered a new approach to the study of society and politics: neomodernist discourse with the dominant conservative values, opposing postmodern theory, methodology and practice he has identified the features of neomodernism: historicism, patriotism and healthy nationalism, populism, transactionalismn and realism in the world politics.


1998 ◽  
Vol 38 (12) ◽  
pp. 51-56 ◽  
Author(s):  
K. Henshilwood ◽  
J. Green ◽  
D. N. Lees

This study investigates human enteric virus contamination of a shellfish harvesting area. Samples were analysed over a 14-month period for Small Round Structured Viruses (SRSVs) using a previously developed nested RT-PCR. A clear seasonal difference was observed with the largest numbers of positive samples obtained during the winter period (October to March). This data concurs with the known winter association of gastroenteric illness due to oyster consumption in the UK and also with the majority of the outbreaks associated with shellfish harvested from this area during the study period. RT-PCR positive amplicons were further characterised by cloning and sequencing. Sequence analysis of the positive samples identified eleven SRSV strains, of both Genogroup I and Genogroup II, occurring throughout the study period. Many shellfish samples contained a mixture of strains with a few samples containing up to three different strains with both Genogroups represented. The observed common occurrence of strain mixtures may have implications for the role of shellfish as a vector for dissemination of SRSV strains. These results show that nested RT-PCR can identify SRSV contamination in shellfish harvesting areas. Virus monitoring of shellfish harvesting areas by specialist laboratories using RT-PCR is a possible approach to combating the transmission of SRSVs by molluscan shellfish and could potentially offer significantly enhanced levels of public health protection.


2020 ◽  
Vol 10 (5) ◽  
pp. 602-609
Author(s):  
Adil H. Awad

Introduction: A new approach for expressing the lattice thermal conductivity of diatomic nanoscale materials is developed. Methods: The lattice thermal conductivity of two samples of GaAs nanobeam at 4-100K is calculated on the basis of monatomic dispersion relation. Phonons are scattered by nanobeam boundaries, point defects and other phonons via normal and Umklapp processes. Methods: A comparative study of the results of the present analysis and those obtained using Callaway formula is performed. We clearly demonstrate the importance of the utilised scattering mechanisms in lattice thermal conductivity by addressing the separate role of the phonon scattering relaxation rate. The formulas derived from the correction term are also presented, and their difference from Callaway model is evident. Furthermore their percentage contribution is sufficiently small to be neglected in calculating lattice thermal conductivity. Conclusion: Our model is successfully used to correlate the predicted lattice thermal conductivity with that of the experimental observation.


Sign in / Sign up

Export Citation Format

Share Document