2020
DOI: 10.1108/lht-09-2020-0217
|View full text |Cite
|
Sign up to set email alerts
|

A secure anonymous tracing fog-assisted method for the Internet of Robotic Things

Abstract: PurposeEmploying a fog computing (FC) network system in the robotic network system is an effective solution to support robotic application issues. The interconnection between robotic devices through an FC network can be referred as the Internet of Robotic Things (IoRT). Although the FC network system can provide number of services closer to IoRT devices, it still faces significant challenges including real-time tracing services and a secure tracing services. Therefore, this paper aims to provide a tracking mob… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(10 citation statements)
references
References 54 publications
0
9
0
1
Order By: Relevance
“…Basudan (2022) presented an efficient attribute-based data sharing scheme to enforce security and access control over health sensing data on the Internet of Medical Robotic Things (IoMRT). Alamer (2022) discussed tracking mobile robot devices for a secure framework of the Internet of Robotic Things (IoRT) network applications by a secure, anonymous tracing method. Readers may also be interested in reading Yang and Liao (2010) on using robot meta-tags to allow or refuse software robots on websites and express webmasters' online copyright authorization policies.…”
Section: Prefacementioning
confidence: 99%
“…Basudan (2022) presented an efficient attribute-based data sharing scheme to enforce security and access control over health sensing data on the Internet of Medical Robotic Things (IoMRT). Alamer (2022) discussed tracking mobile robot devices for a secure framework of the Internet of Robotic Things (IoRT) network applications by a secure, anonymous tracing method. Readers may also be interested in reading Yang and Liao (2010) on using robot meta-tags to allow or refuse software robots on websites and express webmasters' online copyright authorization policies.…”
Section: Prefacementioning
confidence: 99%
“…This solution aims to provide additional secret coding, data aggregation, data protection and communications for network addressing and the targeted control of robotic devices. Alamer presented a Secure Anonymous Tracing (SAT) fog-assisted method that supports the tracing of Internet of Robotic Things (IoRT) through a Fog Computing (FC) network system [327]. SAT is based on the Counting Bloom Filter (CBF) method and the Elliptic Curve Cryptog-raphy (ECC) technique.…”
Section: Artificial Intelligence-based Solutionsmentioning
confidence: 99%
“…BF encryption helps attaining puncturable encryption via employing a BF framework (Xue et al, 2019;Alamer, 2020;Einziger and Friedman, 2017). This structure defines a set S and introduces an element to it, thus locating whether this element is in the S. A vacant array with d bits long is constructed for a BF.…”
Section: Bloom Filter Encryptionmentioning
confidence: 99%
“…Robots are gradually moving into our homes and institutions. Future households, nursing homes and hospitals will be more densely populated with social robots interacting with family members and patients (Alamer, 2020; Asemi et al , 2020). Therefore, the adoption of robots as new household members at home as well as the delegation of specific nursing tasks to robots in nursing homes and in hospitals importantly shapes our attitudes towards our mechanical friends.…”
Section: Introductionmentioning
confidence: 99%