1,011 research outputs found

    Physical indicators of cyber attacks against a rescue robot

    Get PDF
    Responding to an emergency situation is a challenging and time critical procedure. The primary goal is to save lives and this is directly related to the speed and efficiency at which help is provided to the victims. Rescue robots are able to benefit an emergency response procedure by searching for survivors, providing access to inaccessible areas and establishing an on-site communication network. This paper investigates how a cyber attack on a rescue robot can adversely affect its operation and impair an emergency response operation. The focus is on identifying physical indicators of an ongoing cyber attack, which can help to design more efficient detection and defense mechanisms. A number of experiments have been conducted on an Arduino based robot, under different cyber attack scenarios. The results show that the cyber attack’s effects have physical features that can be used in order to improve the robot’s robustness against this type of threat

    The future of Cybersecurity in Italy: Strategic focus area

    Get PDF
    This volume has been created as a continuation of the previous one, with the aim of outlining a set of focus areas and actions that the Italian Nation research community considers essential. The book touches many aspects of cyber security, ranging from the definition of the infrastructure and controls needed to organize cyberdefence to the actions and technologies to be developed to be better protected, from the identification of the main technologies to be defended to the proposal of a set of horizontal actions for training, awareness raising, and risk management

    Security and privacy analysis based on Internet of Things in the fourth industrial generation (Industry 4.0)

    Get PDF
    The connection of smart devices using the Internet has dramatically changed the way people live, and this concept has also been extended to the industrial sector. This practice not only provides more stable, faster, and safer communications but also makes it possible to realize the concept of the smart factory in the fourth industrial revolution. The Internet of Things uses a unique Internet Protocol to identify, control, and transmit data to individuals as well as databases. Data is collected through the Internet of Things, stored in cloud storage, and managed and calculated through analytical tools. Internet of Things security is a field of technology that focuses on protecting connected devices and networks in the Internet of Things (IoT). Ensuring the safety of networks with connected IoT devices is critical. Security in the Internet of Things includes a wide range of techniques, strategies, protocols, and measures aimed at mitigating the ever-increasing vulnerabilities of the Internet of Things in modern businesses. The simultaneous connection of objects also brings privacy concerns. For this reason, in this research, an effort has been made to examine and analyze the most important privacy requirements in the Internet of Things in digital businesses in Industry 4.0. In this regard, by using experts' opinions and literature review, privacy requirements were extracted and evaluated using fuzzy non-linear decision-making methodology. The results showed that acquired and intrinsic information has the highest importance

    IIMA 2018 Proceedings

    Get PDF

    Internet of robotic things : converging sensing/actuating, hypoconnectivity, artificial intelligence and IoT Platforms

    Get PDF
    The Internet of Things (IoT) concept is evolving rapidly and influencing newdevelopments in various application domains, such as the Internet of MobileThings (IoMT), Autonomous Internet of Things (A-IoT), Autonomous Systemof Things (ASoT), Internet of Autonomous Things (IoAT), Internetof Things Clouds (IoT-C) and the Internet of Robotic Things (IoRT) etc.that are progressing/advancing by using IoT technology. The IoT influencerepresents new development and deployment challenges in different areassuch as seamless platform integration, context based cognitive network integration,new mobile sensor/actuator network paradigms, things identification(addressing, naming in IoT) and dynamic things discoverability and manyothers. The IoRT represents new convergence challenges and their need to be addressed, in one side the programmability and the communication ofmultiple heterogeneous mobile/autonomous/robotic things for cooperating,their coordination, configuration, exchange of information, security, safetyand protection. Developments in IoT heterogeneous parallel processing/communication and dynamic systems based on parallelism and concurrencyrequire new ideas for integrating the intelligent “devices”, collaborativerobots (COBOTS), into IoT applications. Dynamic maintainability, selfhealing,self-repair of resources, changing resource state, (re-) configurationand context based IoT systems for service implementation and integrationwith IoT network service composition are of paramount importance whennew “cognitive devices” are becoming active participants in IoT applications.This chapter aims to be an overview of the IoRT concept, technologies,architectures and applications and to provide a comprehensive coverage offuture challenges, developments and applications

    Design of a man-wearable control station for a robotic rescue system

    Get PDF
    This report details the design, development, and testing of a man-wearable operator control station for the use of a low-cost robotic system in Urban Search and Rescue (USAR). The complete system, dubbed the "Scarab", is the 1st generation developed and built in the Robotics and Agents Research Laboratory (RARL) at the University of Cape Town (UCT), and was a joint effort between three MSc students. Robots have found a place in USAR as replaceable units which can be deployed into dangerous and confined voids in the place of humans. As such, they have been utilized in a large variety of disaster environments including ground, aerial, and underwater scenarios, and have been gathering research momentum since their first documented deployment in the rescue operations surrounding the 9/11 terrorist attacks. However one issue is their cost as they are not economical solutions, making them less viable for inclusion into a rescue mission as well as negatively affecting the operator‟s decisions in order to prioritise the safety of the unit. Another concern is their difficulty of transport, which becomes dependent on the size and portability of the robot. As such, the Scarab system was conceived to provide a deployable robotic platform which was lowcost, with a budget goal of US $ 500. To address the transportability concerns, it aimed to be portable and light-weight; being able to be thrown through a window by a single hand and withstanding a drop height of 3 m. It includes an internal sensor payload which incorporates an array of sensors and electronics, including temperature monitors and two cameras to provide both a normal and IR video feed. Two LED spotlights are used for navigation, and a microphone and buzzer is included for interaction with any discovered survivors. The operator station acts as the user interface between the operator and the robotic platform. It aimed to be as intuitive as possible, providing quick deployment and minimalizing the training time required for its operation. To further enhance the Scarab system‟s portability, it was designed to be a manwearable system, allowing the operator to carry the robotic platform on their back. It also acts as a charging station, supplying power to the robotic platform‟s on-board charging circuitry. The control station‟s mechanical chassis serves as the man-wearable component of the system, with the functionality being achieved by integration onto a tactical vest. This allows the operator to take the complete system on and off as a single unit without assistance, and uses two mounting brackets to dock the robotic platform. Key areas focussed upon during design were the weight and accessibility of the system, as well as providing a rugged housing for the internal electronics. All parts were manufactured in the UCT Mechanical Engineering workshop
    • …
    corecore