Secure Encoded Instruction Graphs for End-to-End Data Validation in Autonomous Robots

نویسندگان

چکیده

As autonomous robots are becoming more widespread, attention is being paid to the security of robotic operations. Autonomous can be seen as cyber–physical systems: they operate in virtual, physical, and human realms. Therefore, securing operations requires not only their data (e.g., sensor inputs mission instructions) but interactions with environment. There currently a deficiency methods that would allow securely ensure sensors actuators operating correctly without external feedback. This article introduces an encoding method end-to-end validation framework for missions robots. In particular, we present proof concept map method, which allows navigate realistic environments validate operational instructions almost zero a priori knowledge. We demonstrate our using two different encoded maps experiments simulated real Our have same advantages typical landmark-based navigation, added benefit cryptographic hashes enable information validation. applicable any aspect operation there predefined set actions or given robot.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure End-To-End Data Transport in Quantum Networks

A secure end-to-end data transport protocol in quantum network is presented. A quantum network means we transport data by encoding a data into a certain quantum state on a qubit, and transmitting the qubit from sender to receiver. Because of the network scalability and physical technology limit in long distance teleportation, a fully connected quantum network model is impossible. Hence, in our ...

متن کامل

Fault Identification using end-to-end data by imperialist competitive algorithm

Faults in computer networks may result in millions of dollars in cost. Faults in a network need to be localized and repaired to keep the health of the network. Fault management systems are used to keep today’s complex networks running without significant cost, either by using active techniques or passive techniques. In this paper, we propose a novel approach based on imperialist competitive alg...

متن کامل

Secure End-to-End Transport over SCTP

The Stream Control Transmission Protocol is a new transport protocol initially developed to transport signaling messages over IP networks. The new features of SCTP make it also a suitable candidate for applications which nowadays use the standard transport protocols TCP and UDP. Many of these applications have strict requirements with respect to end-to-end security. Providing end-to-end securit...

متن کامل

Towards Secure End-to-End Network Measurements

End-to-end network measurement tools are gaining increasing importance in many Internet services. This is the case since the performance and Quality-of-Service (QoS) of many online applications and services largely depend on their network characteristics. These measurement tools were designed, however, without prior security consideration which, given the current adversarial Internet, renders t...

متن کامل

Fault Identification using end-to-end data by imperialist competitive algorithm

Faults in computer networks may result in millions of dollars in cost. Faults in a network need to be localized and repaired to keep the health of the network. Fault management systems are used to keep today’s complex networks running without significant cost, either by using active techniques or passive techniques. In this paper, we propose a novel approach based on imperialist competitive alg...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Internet of Things Journal

سال: 2022

ISSN: ['2372-2541', '2327-4662']

DOI: https://doi.org/10.1109/jiot.2022.3164545