2,829 research outputs found

    Security framework for industrial collaborative robotic cyber-physical systems

    Get PDF
    The paper introduces a security framework for the application of human-robot collaboration in a futuristic industrial cyber-physical system (CPS) context of industry 4.0. The basic elements and functional requirements of a secure collaborative robotic cyber-physical system are explained and then the cyber-attack modes are discussed in the context of collaborative CPS whereas a defense mechanism strategy is proposed for such a complex system. The cyber-attacks are categorized according to the extent on controllability and the possible effects on the performance and efficiency of such CPS. The paper also describes the severity and categorization of such cyber-attacks and the causal effect on the human worker safety during human-robot collaboration. Attacks in three dimensions of availability, authentication and confidentiality are proposed as the basis of a consolidated mitigation plan. We propose a security framework based on a two-pronged strategy where the impact of this methodology is demonstrated on a teleoperation benchmark (NeCS-Car). The mitigation strategy includes enhanced data security at important interconnected adaptor nodes and development of an intelligent module that employs a concept similar to system health monitoring and reconfiguration

    Cyber-Risk Assessment for Autonomous Ships

    Get PDF

    Strengthening Personal Data Protection, Cyber Security, and Improving Public Awareness in Indonesia: Progressive Legal Perspective

    Get PDF
    The development of technology, communication, and the internet has positive and negative influences on all sectors of life in society. One of the negative impacts and problems is the alleged criminal act of buying and selling data and the absence of a special law (lex specialist) regarding the regulation of Indonesian personal data. The purpose of this research is to analyze in-depth the efforts to strengthen the protection of personal data, cyber security, and increase public awareness of the perspective of Progressive Law in Indonesia. This study uses a normative juridical method using secondary data, a statutory approach, a conceptual approach, and a case approach. This scientific paper concludes that the Synergy of Ministries and related institutions (Legislative, Executive, and Judiciary) is the key to protecting personal data and cyber resilience. Then, strengthening efforts should be made, namely immediately passing the Draft Law on Personal Data Protection (RUU PDP), forming an independent institution. However, if at this time a dispute occurs, it can be resolved by Article 30 of the ITE Law and the PMH Lawsuit (Tort), supported by a progressive legal approach and futuristic interpretation by the judge examining the quo case. The synergy of government agencies, the private sector, and other stakeholders is needed to increase public awareness by increasing education/dissemination of efforts to prevent misuse of personal data

    Cyber-Physical Tracking of IoT devices: A maritime use case

    Get PDF
    See paper

    A Comprehensive Survey on Exiting Solution Approaches towards Security and Privacy Requirements of IoT

    Get PDF
    ‘Internet of Things (IoT)’emerged as an intelligent collaborative computation and communication between a set of objects capable of providing on-demand services to other objects anytime anywhere. A large-scale deployment of data-driven cloud applications as well as automated physical things such as embed electronics, software, sensors and network connectivity enables a joint ubiquitous and pervasive internet-based computing systems well capable of interacting with each other in an IoT. IoT, a well-known term and a growing trend in IT arena certainly bring a highly connected global network structure providing a lot of beneficial aspects to a user regarding business productivity, lifestyle improvement, government efficiency, etc. It also generates enormous heterogeneous and homogeneous data needed to be analyzed properly to get insight into valuable information. However, adoption of this new reality (i.e., IoT) by integrating it with the internet invites a certain challenges from security and privacy perspective. At present, a much effort has been put towards strengthening the security system in IoT still not yet found optimal solutions towards current security flaws. Therefore, the prime aim of this study is to investigate the qualitative aspects of the conventional security solution approaches in IoT. It also extracts some open research problems that could affect the future research track of IoT arena

    AI Techniques for Combating Electronic Crimes and Enhancing Cybersecurity: Kuwaits Security Services as a Model

    Get PDF
    The research aimed to examine the security agencies use of artificial intelligence (AI) techniques in combating cybercrime and its reflection on enhancing cyber security. The study used the survey method in its descriptive and analytical levels. The interview tool was used to collect information from the research sample, the size of which was 12 items. The research found a set of results where the respondents declared the presence of an anti- cybercrime team comprised of specialists in police sciences, engineering, information systems, and network engineering. They added that using AI enables specialists in security agencies to benefit from its enormous potential in analyzing data, tracking cybercrime perpetrators through social networking sites, managing, and using information, following up on complaints, publications, and other messages, preparing security reports, and submitting them to the competent authorities, completing many general daily tasks and monitoring all the information that may affect the public opinion. The study recommended setting up industries related to AI technology to produce smart knowledge and unifying Arab capabilities in the information technology and communication field to protect Arab national security by combating foreign technical intrusions and virtual hegemony, representing the most advanced form of futuristic weapons
    • …
    corecore