Browse > Article
http://dx.doi.org/10.3745/KTSDE.2021.10.12.595

Secure Scheme Between Nodes in Cloud Robotics Platform  

Kim, Hyungjoo (KT 융합기술원)
Publication Information
KIPS Transactions on Software and Data Engineering / v.10, no.12, 2021 , pp. 595-602 More about this Journal
Abstract
The robot is developing into a software-oriented shape that recognizes the surrounding situation and is given a task. Cloud Robotics Platform is a method to support Service Oriented Architecture shape for robots, and it is a cloud-based method to provide necessary tasks and motion controllers depending on the situation. As it evolves into a humanoid robot, the robot will be used to help humans in generalized daily life according to the three robot principles. Therefore, in addition to robots for specific individuals, robots as public goods that can help all humans depending on the situation will be universal. Therefore, the importance of information security in the Cloud Robotics Computing environment is analyzed to be composed of people, robots, service applications on the cloud that give intelligence to robots, and a cloud bridge that connects robots and clouds. It will become an indispensable element for In this paper, we propose a Security Scheme that can provide security for communication between people, robots, cloud bridges, and cloud systems in the Cloud Robotics Computing environment for intelligent robots, enabling robot services that are safe from hacking and protect personal information.
Keywords
Security; Robot; Robot-Human Interaction; Key Management; Cloud Robotics Platform;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Cloud [Internet], http://en.wikipedia.org/wiki/Cloud_coomputing.
2 T. Aho, et al., "Designing IDE as a service," Communications of Cloud Software, Vol.1, No.1, Dec. 2011.
3 T. Mikkonen and A. Nieminen, "Elements for a cloud-based development environment: Online collaboration, revision control, and continuous integration," Nordic Symposium on Cloud Computing and Internet Technologies, pp.14-20, Aug. 2012.
4 L. M. Gadhikar, L. Mohanv, M. Chaudhari, P. Sawant, and Y. Bhusara, "Browser based IDE to code in the cloud," Advances in Intelligent Systems and Computing, Vol.203, pp.59-69, 2013.   DOI
5 C. K. Wong, W. Mohamed, G. Simon, and S. S. Lam, "Secure group communications using key graphs," IEEE/ACM Transactions on Networking, Vol.8, No.1, pp.16-30, 2000.   DOI
6 T. D. Nguyen and E. N. Huh, "An efficient Key management for secure multicast in Sensor-Cloud," 2011 First ACIS/JNU International Conference on Computers, Networks, Systems and Industrial Engineering, pp.3-9, 2011.
7 M. M. Hassan, B. Song, and E.-N. Huh, "A framework of sensor-cloud integration opportunities and challenges," 3rd International Conference on Ubiquitous Information Management and Communication, 2009.
8 KOUBAA, Anis (ed.). "Robot Operating System (ROS): The Complete Reference (Vol.5)," Springer Nature, 2020.
9 A. Penrig, D. Song, and J. Tygar, "ELK, a new protocol for efficient large-group key distribution," In Proceedings 2001 IEEE Symposium on Security and Privacy, S&P 2001, IEEE, pp.247-262, 2001.
10 ROS Nodes [Internet], https://www.ros.org.