Abstract

Robots can be very different, from humanoids to intelligent self-driving cars or just IoT systems that collect and process local sensors’ information. This paper presents a way to increase dependability for information exchange and processing in systems with Cloud-Fog-Edge architectures. In an ideal interconnected world, the recognized and registered robots must be able to communicate with each other if they are close enough, or through the Fog access points without overloading the Cloud. In essence, the presented work addresses the Edge area and how the devices can communicate in a safe and secure environment using cryptographic methods for structured systems. The presented work emphasizes the importance of security in a system’s dependability and offers a communication mechanism for several robots without overburdening the Cloud. This solution is ideal to be used where various monitoring and control aspects demand extra degrees of safety. The extra private keys employed by this procedure further enhance algorithm complexity, limiting the probability that the method may be broken by brute force or systemic attacks.

Highlights

  • The concept of Cloud-Computing has matured a lot in recent years 1

  • With the emergence of Internet of Things (IoT), Cloud-Computing, humanoid robots, and intelligent robot services, more and more studies have been conducted on robot control and on how robotics have intersected with IoT [12,13]

  • As can be seen above, their focus and approach are different from what we propose in this paper and from our aim

Read more

Summary

Introduction

The concept of Cloud-Computing has matured a lot in recent years 1. We can say that omnipresent access, mixed resources, and on demand resource or service delivery in a safe and secure environment are at the base of Cloud-Computing features. The concept of Internet of Things (IoT) has emerged, evolved, and reached reality and maturity. IoT is a concept that defines a world in which all objects (cars, lighting systems, home appliances, and others) are connected to each other via the Internet and through heterogeneous access networks that will generate large amounts of emerging and versatile data as well as many services [1,2,3]. The IoT will have profound implications for all levels of business operations, regardless of the industry type [4,5]

Objectives
Methods
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.