Detecting and Mitigating Robotic Cyber Security Risks - Advances in Information Security, Privacy, and Ethics
Latest Publications


TOTAL DOCUMENTS

22
(FIVE YEARS 0)

H-INDEX

3
(FIVE YEARS 0)

Published By IGI Global

9781522521549, 9781522521556

Author(s):  
Isak Karabegović ◽  
Vlatko Doleček

Mobile robots are increasingly becoming the subject of research and a very important area of science, so that the 21st century will be named as the century of development of service robots. Mobile robots are an excellent “System Engineering” research example because it includes a lot of scientific research, namely in the area of mechanical engineering, electrical engineering, electronics, computer science, social science, and more. As mobile robots perform their tasks in the same environment as humans, mobile robots should have the abilities that people have. The mobile robots should be able to recognize faces, gestures, signs, objects, speech and atmosphere. Successful realization set of tasks results in bypassing obstacles without collision and destruction in the shortest possible time and distance. They should communicate with people on the basis of emotion. The range of mobile robots application is huge. Mobile robots have found application in many areas, but this chapter will cover the following distribution of mobile robots areas of application: medicine, agriculture, defense, logistics, construction, demolition, professional cleaning, space exploration, education and scientific research. The price of robots is declining steadily and they are coming into ever wider use. It is only a matter of time before robots become available to the population of today's high school students, just as it happened with computers and cell phones.


Author(s):  
Akash Chowdhury ◽  
Swastik Mukherjee ◽  
Sourav Banerjee

This chapter highlights the total structure and capabilities of robotic systems. This chapter then discusses the invocation of cloud technology in robotics technology empowering the whole system with higher processing power and bigger storage unit which was not possible earlier in the conventional robotic system being restricted in on-board manipulation. The flexibility of handling big data, ability to perform cloud computing, crowed sourcing and collaborative robot learning using the cloud robotics technology has been discussed briefly. This chapter describes concepts of Cloud Enabled Standalone Robotic System (CeSRS), Cloud Enabled Networked Robotic System (CeNRS), Cloud Robotic Networking System (CRNS), Standalone Robotic System (SRS), Common Networked Robotic (CNRS), Infrastructure As A Service (IAAS), Multi Robot System, R/R and R/C Network, ROS, Tele Operated Robotic System, Quality of Service (QoS), Virtual Machine (VM) and Cloud Datacenter. The existing applications of the cloud robotics technology are also described. However, the chapter focuses on the problems either inherited from the parent technology or appeared in the child technology. This chapter further recommends some solutions, new future directions and research aspects of the cloud robotics technology depending on the applications.


Author(s):  
Cosmena Mahapatra

Recent attacks on Indian Bank customers have exposed the vulnerability of banking networks in India and the ignorance that prevails in the system. Unlike their foreign counterparts Indian banking networks are not aware of solutions easily available in market to counter cyber theft and cyber terrorism. SIEM or Security Information and Event Management is one such solution which could have easily negated these attacks. This chapter focuses on studying various cyber security mechanisms including SIEM for implementation of cyber defense effectively.


Author(s):  
Sherin Zafar

In cloud computing network, due to high node mobility, routing is regarded as one of the most challenging task. Some of the traditional protocols developed for cloud networks, wireless network and cyber world use dynamic optimization for QOS accomplishment using some of the optimality criterions like shortest distance, minimal bandwidth usage and minimum delay and constraints like limited power and limited capability of wireless links. GA (Genetic Algorithm) based approach is utilized in this chapter for QOS design based secured routing protocol, where GA is used for finding the most optimal (fittest route) hence improving QOS leading to an optimized secured routing protocol. GA based approach which is discussed in this chapter, selecting the fittest route leads to optimization of QOS based performance parameters like average packet delivery ratio, average drop rate etc. Simulation results shown in the chapter also validate the approach.


Author(s):  
Deepshikha Bhargava

Over decades new technologies, algorithms and methods are evolved and proposed. We can witness a paradigm shift from typewriters to computers, mechanics to mechnotronics, physics to aerodynamics, chemistry to computational chemistry and so on. Such advancements are the result of continuing research; which is still a driving force of researchers. In the same way, the research in the field of artificial intelligence (Russell, Stuart & Norvig, 2003) is major thrust area of researchers. Research in AI have coined different concepts like natural language processing, expert systems, software agents, learning, knowledge management, robotics to name a few. The objective of this chapter is to highlight the research path from software agents to robotics. This chapter begins with the introduction of software agents. The chapter further progresses with the discussion on intelligent agent, autonomous agents, autonomous robots, intelligent robots in different sections. The chapter finally concluded with the fine line between intelligent agents and autonomous robots.


Author(s):  
K. Saravanan

Cloud robotics is an emerging field which enables the web enabled robots to access the cloud services on the fly. Cloud Robotics was born by merging robotics with the cloud technologies. The robot intelligence is no more in the robot itself but remotely executed on the cloud. Robot acts as thin-client. There are several frameworks already in development and still growing. With the help of high speed networks using 4G/5G technologies, offloading of computation and storage in cloud is the further step in robotic evolution. This chapter deals the exploration of cloud robotics with its architecture, applications and existing frameworks. Also, existing research carried out is summarized in this chapter. The future challenges are discussed to foresee the opportunities in cloud robotics. It aims for the complete study on how robots leverages the cloud computing.


Author(s):  
Manju Khari ◽  
Gulshan Shrivastava ◽  
Sana Gupta ◽  
Rashmi Gupta

Cyber Security is generally used as substitute with the terms Information Security and Computer Security. This work involves an introduction to the Cyber Security and history of Cyber Security is also discussed. This also includes Cyber Security that goes beyond the limits of the traditional information security to involve not only the security of information tools but also the other assets, involving the person's own confidential information. In computer security or information security, relation to the human is basically to relate their duty(s) in the security process. In Cyber security, the factor has an added dimension, referring humans as the targets for the cyber-attacks or even becoming the part of the cyber-attack unknowingly. This also involves the details about the cybercriminals and cyber risks going ahead with the classification of the Cybercrimes which is against individual, property, organisation and society. Impacts of security breaches are also discussed. Countermeasures for computer security are discussed along with the Cyber security standards, services, products, consultancy services, governance and strategies. Risk management with the security architecture has also been discussed. Other section involves the regulation and certification controls; recovery and continuity plans and Cyber security skills.


Author(s):  
Ratish Agarwal ◽  
Anjana Pandey ◽  
Mahesh Pawar

Cloud computing is being anticipated as the infrastructural basis of tomorrow's IT industry and continues to be a topic of interest of many new emerging IT firms. Cloud can deliver resources and services to computers and devices through internet. Since Cloud Computing involves outsourcing of sensitive data and critical information the security aspects of cloud need to be dealt carefully. Strong authentication, focusing mainly on user-authentication, acts as a pre-requisite for access control in the cloud environment. In this paper we discuss an efficient authentication mechanism to deal with the security threats that are faced by cloud. The method proposed in this paper prevents the confidential data and information of end users stored in a private cloud from unauthorized access by using a two-factor authentication involving shared image concept in addition with encrypted key authentication.MD5 hashing technique is used which takes binary pixel value of image as input and convert it into a 128-bit hash value. The overall process of authentication has been shown through experimental result and implementation which shows a series of snapshots taken from the chapter.


Author(s):  
Preeti Mulay ◽  
Krishnal Patel ◽  
Hecto Gomez Gauchia

Evolving technologies are intricately woven into the fabric of social and institutional systems. With the invent of “Internet of Everything (IoE)” concept it is realistic now to employ animals and or humans to transmit details electronically. IoE concepts with sensor technology can prove wonders in any domain for that matter starting from eFarming, eHealth, eCare and what not. Humans can transform electronics by using various eConnected gadgets also motivated due to or based on “Nature Inspired Algorithms”. The confluence of IT, psychology with non-IT systems will be part of new generation's life. Such collaborative concept can be implemented practically with the help of “Cloud-to-Dew-Computing” based technologies. To include so many concepts together, it is essential to concentrate also on Cyber Security and Risk associated with such conceptual implementation. Dew-Computing at root levels will take care of Cyber Security effectually. Dew-Computing being backend support of Distributed System, can process multiple entities resourcefully. “Animal Data Interchange Standards” are very well considered innovative business opportunity these days and for years to come. These standards have started their work focusing on the Dairy related animal standard. Every dairy animal should enjoy life to remain healthy and more productive. Incremental Learning about Animal Life Data and Animal Identification, behavior, seasonal-changes, health etc. can be easily achieved with IoE.


Author(s):  
Ratish Agarwal ◽  
Piyush Kumar Shukla ◽  
Sachin Goyal

Communication is a very important area of research in the present era. Expansion of globalization and reduction in the cost of electronic devices has made communication very effective. A large number of researchers from academics and industries are involved in the research on communication and networks. Any novel idea has to be verified on the simulator. A number of simulators are available for network simulations such as Network Simulator (NS2 and NS3), OPNET, NetSim, OMNeT++, REAL, J-Sim and QualNet. NS is an open-source simulation tool that runs on Linux. It is a discreet event simulator for networking research and provides substantial support for simulation of routing, multicast and IP protocols. This chapter provides an overview of NS in a much simpler way. At the completion of this chapter readers will be able to write tcl script to simulate a scenario of network. Every simulation on NS generates a huge trace file; the study of this can be done with the help of AWK script.


Sign in / Sign up

Export Citation Format

Share Document