2019
DOI: 10.14569/ijacsa.2019.0100786
|View full text |Cite
|
Sign up to set email alerts
|

Evaluation of Peer Robot Communications using CryptoROS

Abstract: The demand of cloud robotics makes data encryption essential for peer robot communications. Certain types of data such as odometry, action controller and perception data need to be secured to prevent attacks. However, the introduction of data encryption caused increment of overhead for data stream communication. This paper presents an evaluation of CryptoROS architecture on Robot Operating System (ROS) which focused on peer-to-peer conversations between nodes with confidentiality and integrity violation. OpenS… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 22 publications
0
3
0
Order By: Relevance
“…Robotics is another rapidly growing area of technology that is increasingly being used in education [ 4 , 5 ]. Robotics can be used to teach students important skills in STEM fields [ 6 ] and critical thinking and problem-solving skills [ 7 , 8 ]. Robotics also allows students to engage in hands-on learning experiences and build and programme robots to perform specific tasks [ 9 , 10 ].…”
Section: Introductionmentioning
confidence: 99%
“…Robotics is another rapidly growing area of technology that is increasingly being used in education [ 4 , 5 ]. Robotics can be used to teach students important skills in STEM fields [ 6 ] and critical thinking and problem-solving skills [ 7 , 8 ]. Robotics also allows students to engage in hands-on learning experiences and build and programme robots to perform specific tasks [ 9 , 10 ].…”
Section: Introductionmentioning
confidence: 99%
“…Similarly, in [15], Tiku et al introduced a methodology for overcoming security vulnerabilities in a deep learning localization method by making use of adversarial training samples. In distributed and multi-robot systems, most efforts focus on the analysis and mitigation of security issues from a networking perspective [16]. All of these approaches take the point of view of data security in information systems and do not explicitly involve the cyber-physical nature of autonomous robots and their interaction with their environment, which is the objective of this paper.…”
Section: Introductionmentioning
confidence: 99%
“…of view of data security in information systems and do not explicitly involve the cyber-physical nature of autonomous robots and their interaction with the environment, which is the objective of this paper. In terms of distributed and multirobot systems, most efforts have been directed towards the analysis and mitigation of security issues from a networking perspective [17].…”
Section: Introductionmentioning
confidence: 99%