CFP last date
20 May 2024
Reseach Article

Securing Robotic Communication using Multiple Security Techniques

by Sadeq Othman Al-Hamouz
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 178 - Number 1
Year of Publication: 2017
Authors: Sadeq Othman Al-Hamouz
10.5120/ijca2017915704

Sadeq Othman Al-Hamouz . Securing Robotic Communication using Multiple Security Techniques. International Journal of Computer Applications. 178, 1 ( Nov 2017), 1-4. DOI=10.5120/ijca2017915704

@article{ 10.5120/ijca2017915704,
author = { Sadeq Othman Al-Hamouz },
title = { Securing Robotic Communication using Multiple Security Techniques },
journal = { International Journal of Computer Applications },
issue_date = { Nov 2017 },
volume = { 178 },
number = { 1 },
month = { Nov },
year = { 2017 },
issn = { 0975-8887 },
pages = { 1-4 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume178/number1/28635-2017915704/ },
doi = { 10.5120/ijca2017915704 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:49:11.239934+05:30
%A Sadeq Othman Al-Hamouz
%T Securing Robotic Communication using Multiple Security Techniques
%J International Journal of Computer Applications
%@ 0975-8887
%V 178
%N 1
%P 1-4
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

It is undeniable that security is becoming a major concern in almost every aspect of digital applications, like remotely controlling a robot, where any interference with the sent command, or received data is not accepted and could have negative impact on the robot’s mission. In this research, robotic commands were secured using different techniques that vary between securing the transmission channels, and securing the data transmitted itself, while securing the encryption keys for the encrypted data. The transmission used Received Signal Strength Indicator (RSSI) modules signal for Radio Frequency (RF) modules (in the test case XBEE and NRF24L01+ modules were used) and ping time for internet modules (SIM808 and CC3000), choosing the strongest signal of each module and send data through them. While the data was encrypted using three encryption algorithms: RSA, AES and TwoFish. The test results from attempts to hack this system showed that it requires too much time (compared with using only one encryption technique) using a computer with high processing capacities and previous knowledge of the used security techniques.

References
  1. Bhanot, R., & Hans, R. (2015). A review and comparative analysis of various encryption algorithms. International Journal of Security and Its Applications, 9(4), 289-306.
  2. Daemen, J., & Rijmen, V. (2013). The design of Rijndael: AES-the advanced encryption standard. Springer Science & Business Media.
  3. Schneier, B., Kelsey, J., Whiting, D., Wagner, D., Hall, C., & Ferguson, N. (1998). Twofish: A 128-bit block cipher. NIST AES Proposal, 15.
  4. Chang, C. C., & Hwang, K. F., (2003). Some Forgery Attacks on a Remote User Authentication Scheme Using Smart Cards. Informatics, Lith. Acad. Sci., 14(3), pp. 289-294.
  5. Shen, J. J., Lin, C. W., & Hwang, M. S., (2003) Security enhancement for the timestamp-based password authentication scheme using smart cards. Computers & Security, 22(7), pp. 591-595.
  6. Giri, D., Maitra, T., Amin, R., & Srivastava, P. D (2015), An efficient and robust RSA-based remote user authentication for telecare medical information systems. Journal of medical systems, 39(1), pp.1-9.
  7. Chandrakar, P., & Om, H. (2015). RSA based two-factor remote user authentication scheme with user anonymity. Procedia Computer Science, 70, 318-324.
  8. Jasim, M. M. (2014). A Secure Home Appliances Remote Control Model (Doctoral dissertation, Middle East University).
  9. Yfantis, E. A., & Fayed, A. (2014). Authentication and secure robot communication. International Journal of Advanced Robotic Systems, 11(2), 10.
  10. Islam, M. N., Mia, M. M. H., Chowdhury, M. F., & Matin, M. A. (2008, August). Effect of security increment to symmetric data encryption through AES methodology. In Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, 2008. SNPD'08. Ninth ACIS International Conference on (pp. 291-294). IEEE.
  11. Singh, L., & Bharti, R. K. (2013). Comparative performance analysis of cryptographic algorithms. International Journal of Advanced Research in Computer Science and Software Engineering, 3(11), 43-52.
Index Terms

Computer Science
Information Sciences

Keywords

Robot Encryption RSA AES TwoFish RSSI RF.