Filters








1,909 Hits in 4.1 sec

Secured Offline Authentication on Industrial Mobile Robots Using Biometric Data [chapter]

Sarah Haas, Thomas Ulz, Christian Steger
2018 Lecture Notes in Computer Science  
As both possibilities are not feasible for industrial mobile robots, we propose an oine authentication approach that uses biometric data to authenticate a user on a mobile robot.  ...  The approach uses expiring passwords and a smart card to authenticate authorized people on the mobile robot.  ...  Acknowledgment The work/A part of the work has been performed in the project Power Semiconductor and Electronics Manufacturing 4.0 (SemI40), under grant agreement No 692466.  ... 
doi:10.1007/978-3-030-00308-1_12 fatcat:wnka23blejgvtj4y4hrgli3egm

A New Hybrid Online and Offline Multi-Factor Cross-Domain Authentication Method for IoT Applications in the Automotive Industry

Haqi Khalid, Shaiful Jahari Hashim, Sharifah Mumtazah Syed Ahmad, Fazirulhisyam Hashim, Muhammad Akmal Chaudhary
2021 Energies  
Therefore, to overcome this issue, we propose a hybrid online and offline multi-factor authentication cross-domain authentication method for a connected car-sharing environment based on the user's smartphone  ...  Finally, the results showed that the proposed system provides seamless, secure, and efficient authentication operation for the automotive industry, specifically car-sharing systems, making the proposed  ...  Acknowledgments: We would like to thank the reviewers for their careful, constructive and insightful comments in relation to this work.  ... 
doi:10.3390/en14217437 fatcat:o2dczjlag5bk5bgrismeg6zdy4

A Novel NFC based Secure Protocol for Merchant Transactions

Shaik Shakeel Ahamad
2021 IEEE Access  
To address these issues, we propose a secure framework incorporating a defense-in-depth approach for Near Field Communication (NFC) based mobile payment frameworks.  ...  We have proposed a NFC based Secure Protocol for Mobile Transaction (NSPMT) protocol and successfully verified a mobile payment protocol with BAN (Burrows, Abadi, and Needham) logic and Scyther tool, and  ...  Conclusion This paper proposes a NFC based Secure Protocol for Mobile Transaction (NSPMT) protocol incorporating Defense in Depth approach; our Defense-in-depth approach has three levels, i.e., Defense  ... 
doi:10.1109/access.2021.3139065 fatcat:qzskxxbpgrb27btkxgjxcec4mi

Secured and Easy-to-Use NFC-Based Device Configuration for the Internet of Things

Thomas Ulz, Thomas Pieber, Andrea Holler, Sarah Haas, Christian Steger
2017 IEEE Journal of Radio Frequency Identification  
Since industrial usage of such a configuration approach entails different requirements than home usage, we present and compare three different configuration processes.  ...  The applicability of our approach is demonstrated by two prototypical implementations, as well as a detailed security analysis.  ...  ACKNOWLEDGMENT This project has received funding from the Electronic Component Systems for European Leadership Joint Undertaking under grant agreement No 692480.  ... 
doi:10.1109/jrfid.2017.2745510 fatcat:i5dl33owejdnlcwykmsu7m7ujm

Automated Labeling and Learning for Physical Layer Authentication against Clone Node and Sybil Attacks in Industrial Wireless Edge Networks

Songlin Chen, Zhibo Pang, Hong Wen, Kan Yu, Tengyue Zhang, Yueming Lu
2020 IEEE Transactions on Industrial Informatics  
Index Terms-Cyber physical security, physical layer authentication, supervised machine learning.  ...  Specifically, by combining with edge devices, we apply a threshold detection method based on channel differences to provide offline training sample sets with labels for the machine learning algorithm,  ...  The network consists of local industrial wireless sensors for industrial environment detection and wireless control nodes (e.g., mechanical arm, unmanned logistics vehicles, robots, etc.).  ... 
doi:10.1109/tii.2020.2963962 fatcat:zhpzzmka45ckjjkgzpas4oot34

Table of contents

2021 IEEE Internet of Things Journal  
Shen 14028 Terra: A Smart and Sensible Digital Twin Framework for Robust Robot Deployment in Challenging Environments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  ...  Ni 14232 A Novel Lightweight Authentication Protocol for Emergency Vehicle Avoidance in VANETs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  ... 
doi:10.1109/jiot.2021.3102779 fatcat:hxmkbro5bvhafandsqroibkewe

Table of contents

2018 2018 9th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)  
Manipulators Authentication Protocol for RFID Systems Software Defined Radio 1570493052 A Review: Ubiquitous Healthcare Monitoring with 988-996 Networked Robots 6-12 and Climate Change 1570493073 The  ...  1609.2 Security Challenges An IEEE1451.7 Based WSN Design For V2I Localization Services In Smart Cities: A Case Study Approach Vulnerabilities and Attacks Analysis for Military and Commercial IoT Drones  ... 
doi:10.1109/uemcon.2018.8796751 fatcat:rp2ptti5pzckfirdmwm6yao7wu

A Cryptography-Powered Infrastructure to Ensure the Integrity of Robot Workflows

Benjamin Breiling, Bernhard Dieber, Martin Pinzger, Stefan Rass
2021 Journal of Cybersecurity and Privacy  
A client composes a robot program and once it is accepted a separate entity provides a digital signature for the workflow and its parameters which can be verified by the robot before executing it.  ...  We demonstrate a real-world implementation of this infrastructure using a mobile manipulator and its software stack.  ...  CHIMERA is a mobile manipulator consisting of the mobile industrial platform MiR100 and the industrial robot arm UR10.  ... 
doi:10.3390/jcp1010006 fatcat:nas3sjl5hfbhlfuxrhn5pdkhfi

IoT Vertical Applications and Associated Security Requirements [chapter]

Sunil Cheruvu, Anil Kumar, Ned Smith, David M. Wheeler
2019 Demystifying Internet of Things Security  
manufacturing flow.Attacker gains control of the active robot to spoof the status, setting the machine to "offline" and allowing safety doors to open, even though the robot is still in operation.Station  ...  HW security building blocks for defense in depth Figure 6 - 14 . 614 Notional Industrial IoT architecture 2 Figure 6 - 15 . 2615 gains control of the robotic arm and alters the original programmed  ... 
doi:10.1007/978-1-4842-2896-8_6 fatcat:eznovqjwwbbn5a4czv3q5cj3cm

An Experimental Security Analysis of an Industrial Robot Controller

Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, Andrea Maria Zanchettin, Stefano Zanero
2017 2017 IEEE Symposium on Security and Privacy (SP)  
We examine the standard architecture of an industrial robot and analyze a concrete deployment from a systems security standpoint.  ...  We conclude by discussing safety standards and security challenges in industrial robotics.  ...  CONCLUSIONS This paper represents the first step in a broader exploration of security issues in the industrial robotics ecosystem.  ... 
doi:10.1109/sp.2017.20 dblp:conf/sp/QuartaPPMZZ17 fatcat:grkminso4feejeifi2uh57tae4

ICCUBEA 2019 Table of Contents

2019 2019 5th International Conference On Computing, Communication, Control And Automation (ICCUBEA)  
Paper Title 124 Implementation of Security in a Healthcare Cloud using Decoy Technique and Fog Computing Facility 125 Biometric Authentication as a Service (BaaS): a NOSQL Database and CUDA based Implementation  ...  Exchange Of Medical Records Using Blockchain 77 A Comparative Analysis of Blockchain Platforms -Bitcoin and Ethereum 78 Approach for Intrusion detection system using Machine Learning 79 Secure Retrieval  ... 
doi:10.1109/iccubea47591.2019.9128707 fatcat:3s3o5v2x3nepxeftk4jd64hjnq

Decision tree-based detection of denial of service and command injection attacks on robotic vehicles

Tuan Phan Vuong, George Loukas, Diane Gan, Anatolij Bezemskij
2015 2015 IEEE International Workshop on Information Forensics and Security (WIFS)  
Here, we focus on the security of a small remote-controlled robotic vehicle.  ...  Mobile cyber-physical systems, such as automobiles, drones and robotic vehicles, are gradually becoming attractive targets for cyber attacks.  ...  TABLE I INTRUSION I DETECTION APPROACHES FOR ROBOTIC AND MOBILE CYBERPHYSICAL SYSTEMS Ref.  ... 
doi:10.1109/wifs.2015.7368559 dblp:conf/wifs/VuongLGB15 fatcat:2aa7uh3ao5fzno3ngtic2ddypu

Smart Factory Security: A Case Study on a Modular Smart Manufacturing System

Federico Maggi, Marco Balduzzi, Rainer Vosseler, Martin Rösler, Walter Quadrini, Giacomo Tavola, Marcello Pogliani, Davide Quarta, Stefano Zanero
2021 Procedia Computer Science  
and human-computer interfaces, as well as an industrial robotic arm that performs pick-and-place tasks.  ...  and human-computer interfaces, as well as an industrial robotic arm that performs pick-and-place tasks.  ...  ABB has an application store 1 (similar in spirit to mobile app stores) from where users can automatically install extensions for (RobotStudio) ABB's OLP software or for their industrial robot controller  ... 
doi:10.1016/j.procs.2021.01.289 fatcat:yzd6rtha5vdc3naojuyyttw4tm

A secure migration process for mobile agents

Najmus Saqib Malik, David Ko, Harry H. Cheng
2010 Software, Practice & Experience  
A distributed automation system as shown in Figure 1 is used for example for the control of industrial plants.  ...  It is a heuristic software approach to generate empirically strong random numbers.  ... 
doi:10.1002/spe.1003 fatcat:onji7rcq35cldmixxf6aiwts7y

Data Management in Industry 4.0: State of the Art and Open Challenges [article]

Theofanis P. Raptis, Andrea Passarella, Marco Conti
2019 arXiv   pre-print
Our approach is multidisciplinary, as the selected publications were drawn from two fields; the communications, networking and computation field as well as the industrial, manufacturing and automation  ...  Then, we conduct a holistic survey of the recent literature from which we derive a taxonomy of the latest advances on industrial data enabling technologies and data centric services, spanning all the way  ...  In [355] , the authors present a lightweight secure authentication mechanism for broadcast mode communication in NCS.  ... 
arXiv:1902.06141v2 fatcat:4uvwquinx5h65dy4udx24bhrmm
« Previous Showing results 1 — 15 out of 1,909 results