O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Detecting and Mitigating Robotic Cyber Security Risks

Book Description

Risk detection and cyber security play a vital role in the use and success of contemporary computing. By utilizing the latest technological advances, more effective prevention techniques can be developed to protect against cyber threats. Detecting and Mitigating Robotic Cyber Security Risks is an essential reference publication for the latest research on new methodologies and applications in the areas of robotic and digital security. Featuring extensive coverage on a broad range of topics, such as authentication techniques, cloud security, and mobile robotics, this book is ideally designed for students, researchers, scientists, and engineers seeking current research on methods, models, and implementations of optimized security in digital contexts.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Book Series
    1. Mission
    2. Coverage
  5. Dedication
  6. Editorial Advisory Board
  7. Preface
    1. ORGANIZATION OF THE BOOK
  8. Acknowledgment
  9. Section 1: Basic Concept of Security and Privacy
    1. Chapter 1: A Survey
      1. ABSTRACT
      2. INTRODUCTION
      3. MALWARE ANALYSIS
      4. PDF SHELLCODE TYPES
      5. VARIOUS TECHNIQUES FOR ANALYSING VULNERABILITIES OF PDF FILES
      6. THE PERCENTAGE OF USE OF VARIOUS OBFUSCATION TECHNIQUES FOR CODE WRITTEN IN JAVASCRIPT
      7. A SHORT ANALYSIS
      8. MALICIOUS PDF ANALYSIS EVASION/OFUSCATION TECHNIQUES
      9. CONCLUSION
      10. REFERENCES
    2. Chapter 2: A Practical Approach of Network Simulation
      1. ABSTRACT
      2. INTRODUCTION
      3. INITIALIZATION AND TERMINATION
      4. DEFINITION OF A NETWORK OF LINKS AND NODES
      5. AGENTS AND APPLICATIONS
      6. SCHEDULING EVENTS IN NS-2
      7. MOBILE NETWORKS AND WIRELESS LOCAL AREA NETWORKS
      8. SIMULATING MOBILE NETWORKS
      9. TRACE FORMAT
      10. AWK: A TEXT PROCESSING LANGUAGE
      11. PERFORMANCE METRICS
      12. CONCLUSION AND FUTURE DIRECTION
      13. REFERENCES
    3. Chapter 3: Hindi Optical Character Recognition and Its Applications
      1. ABSTRACT
      2. INTRODUCTION
      3. INDIAN SCRIPT
      4. OPTICAL CHARACTER RECOGNITION (OCR)
      5. APPLICATION OF CHARACTER RECOGNITION SYSTEM
      6. BILL PROCESSING SYSTEM
      7. PASSPORT READER
      8. OCR IN SECURITY MANAGEMENT
      9. ANALYSIS
      10. CONCLUSION
      11. REFERENCES
    4. Chapter 4: Android Permissions
      1. ABSTRACT
      2. INTRODUCTION
      3. SECURITY ISSUES WITH PERMISSION SYSTEM
      4. ANDROID APP STRUCTURE
      5. REVERSE ENGINEERING AND ITS RELATED TOOLS
      6. IMPLEMENTATION AND DISCUSSIONS
      7. RELATED WORK
      8. CONCLUSION AND FUTURE WORK
      9. REFERENCES
    5. Chapter 5: Distributed System Implementation Based on “Ants Feeding Birds” Algorithm
      1. ABSTRACT
      2. INTRODUCTION
      3. RELATED WORK
      4. CYBER SECURITY FOR ROBOTS: SCENARIOS FOR 2030
      5. WEARABLES AND EMBEDDABLES
      6. CONCLUSION
      7. FUTURE DIRECTIONS
      8. REFERENCES
      9. KEY TERMS AND DEFINITIONS
  10. Section 2: Cloud and Mobile Security
    1. Chapter 6: A Survey
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. SECURITY ISSUES IN CLOUD
      5. SECURITY SOLUTIONS
      6. FUTURE DIRECTIONS
      7. CONCLUSION
      8. REFERENCES
    2. Chapter 7: Digital Signature Schemes Based on Two Hard Problems
      1. ABSTRACT
      2. INTRODUCTION
      3. CONCLUSION
      4. REFERENCES
    3. Chapter 8: Cloud Auditor Loyalty Checking Process Using Dual Signature
      1. ABSTRACT
      2. INTRODUCTION
      3. SECURITY ISSUES
      4. SYSTEM MODEL
      5. DUAL SIGNATURE
      6. CONCLUSION AND FUTURE DIRECTION
      7. REFERENCES
    4. Chapter 9: Cloud Security Using 2-Factor Image Authentication Technique
      1. ABSTRACT
      2. INTRODUCTION
      3. PROPOSED METHODOLOGY
      4. EXPERIMENTAL RESULT
      5. CONCLUSION
      6. REFERENCES
    5. Chapter 10: Utilizing Soft Computing Application for QOS and Security Optimization by Meta-Heuristic-Based Genetic Approach
      1. ABSTRACT
      2. INTRODUCTION
      3. QOS AND SECURITY OPTIMIZATION BY META HEURISTIC BASED GENETIC APPROACH
      4. SIMULATION RESULTS OF META HEURISTIC BASED GENETIC APPROACH TO OPTIMIZE QOS
      5. CONCLUSION
      6. REFERENCES
  11. Section 3: Cyber Security Concepts
    1. Chapter 11: Cyber Crime and Cyber Security
      1. ABSTRACT
      2. WHAT IS CYBERCRIME?
      3. ORIGIN OF CYBER CRIME
      4. TYPES OF CYBER CRIME
      5. CYBER CRIMINALS
      6. COMPUTER’S VULNERABILITY
      7. THE WORLD’S MOST FAMOUS HACKERS
      8. ELECTRONIC CRIME DETECTION
      9. PREVENTIVE MEASURES TO OPPOSE CYBER CRIME:
      10. CYBER SECURITY
      11. DIFFERENT LEGAL ACTS AGAINST CYBER CRIME
      12. CONCLUSION
      13. REFERENCES
    2. Chapter 12: Pragmatic Solutions to Cyber Security Threat in Indian Context
      1. ABSTRACT
      2. INTRODUCTION
      3. FRAMING OF EFFECTIVE CYBER THREAT MANAGEMENT POLICIES
      4. VARIOUS MEASURES OF CYBER DEFENCES
      5. SIEM: SECURITY INFORMATION AND EVENT MANAGEMENT TOOL
      6. CASE STUDY: SOLARWIND SIEM – LEM
      7. CONCLUSION AND FUTURE SCOPE
      8. REFERENCES
    3. Chapter 13: Role of Cyber Security in Today's Scenario
      1. ABSTRACT
      2. INTRODUCTION
      3. HISTORY OF CYBER SECURITY
      4. INTRODUCTION TO CYBER RISKS AND CYBER CRIMINALS
      5. CLASSIFICATION OF CYBER CRIMES
      6. IMPACT OF SECURITY BREACHES
      7. COMPUTER PRESERVATION
      8. DIMENSIONS IN SECURITY
      9. MANAGEMENT OF VULNERABILITY
      10. MECHANISM FOR HARDWARE PROTECTION
      11. INTRUSION DETECTION AND PREVENTION SYSTEM (IDPS)
      12. CYBER-SECURITY STANDARDS
      13. TEN STEPS TO CYBER SECURITY
      14. PAS 555
      15. ISO/IEC 27031
      16. CYBER SECURITY PRODUCTS AND SERVICES
      17. CYBER SECURITY CONSULTANCY SERVICES
      18. CYBER INCIDENT RESPONSE MANAGEMENT
      19. CONCLUSION
      20. REFERENCES
    4. Chapter 14: Exploring Cyber Security Vulnerabilities in the Age of IoT
      1. ABSTRACT
      2. INTRODUCTION
      3. NEED OF CYBER SECURITY IN IoT ENABLED SYSTEMS
      4. DEVICE LEVEL ONTOLOGY
      5. CONCLUSION AND FURTHER RESEARCH
      6. REFERENCES
  12. Section 4: Robotics Cyber Security Risk
    1. Chapter 15: An Approach towards Survey and Analysis of Cloud Robotics
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. BACKGROUND
      4. 3. MAIN FOCUS OF THE CHAPTER
      5. 4. SOLUTIONS AND RECOMMENDATIONS
      6. 5. FUTURE RESEARCH DIRECTIONS
      7. 6. CONCLUSION
      8. REFERENCES
      9. ADDITIONAL READING
      10. KEY TERMS AND DEFINITIONS
    2. Chapter 16: Mobile Robotics
      1. ABSTRACT
      2. INTRODUCTION
      3. THE DISTRIBUTION OF MOBILE ROBOTS
      4. MOBILE ROBOTS APPLICATION IN MEDICINE
      5. MOBILE ROBOTS APPLICATION IN DEFENCE
      6. MOBILE ROBOTS APPLICATION IN AGRICULTURE
      7. MOBILE ROBOTS APPLICATION IN LOGISTICS
      8. MOBILE ROBOTS APPLICATION IN CONSTRUCTION, DEMOLITION
      9. MOBILE ROBOTS APPLICATION FOR PROFESSIONAL CLEANING
      10. MOBILE ROBOT APPLICATION FOR SPACE EXPOLORATION
      11. CONCLUSION
      12. REFERENCES
    3. Chapter 17: Cloud Robotics
      1. ABSTRACT
      2. INTRODUCTION
      3. CLOUD ROBOTICS: OVERVIEW
      4. BACKGROUND
      5. APPLICATIONS OF CLOUD ROBOTICS
      6. CLOUD ROBOTICS PROJECTS
      7. RESEARCH CHALLENGES
      8. CONCLUSION
      9. REFERENCES
    4. Chapter 18: Intelligent Agents and Autonomous Robots
      1. ABSTRACT
      2. INTRODUCTION
      3. INTELLIGENT AGENT
      4. ARCHITECTURE OF INTELLIGENT AGENT
      5. AUTONOMOUS ROBOTS
      6. CONCLUSION
      7. REFERENCES
    5. Chapter 19: Survey of Recent Cyber Security Attacks on Robotic Systems and Their Mitigation Approaches
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. OVERVIEW CYBER ATTACKS ON ROBOTICS SYSTEMS
      4. 3. RISK ASSESSMENT AND IMPACT OF CYBER ATTACKS
      5. 4. MITIGATION PROCESS
      6. 5. CONCLUSION
      7. ACKNOWLEDGMENT
      8. REFERENCES
    6. Chapter 20: Mobile Agent Communication, Security Concerns, and Approaches
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. SECURITY THREATS IN A MOBILE AGENT SYSTEM
      5. SOLUTIONS AND RECOMMENDATIONS
      6. DISTRIBUTED LIGHTWEIGHT KERBEROS PROTOCOL (DLKP)
      7. FUTURE RESEARCH DIRECTIONS
      8. CONCLUSION
      9. REFERENCES
      10. ADDITIONAL READING:
      11. KEY TERMS AND DEFINITIONS
    7. Chapter 21: Cloud and Cyber Security through Crypt-Iris-Based Authentication Approach
      1. ABSTRACT
      2. INTRODUCTION
      3. CONCEPTS OF BIOMETRIC
      4. PROCESSES IN A BIOMETRIC SYSTEM
      5. IRIS RECOGNITION
      6. ISOLATION OR SEGMENTATION
      7. THE PROPOSED CRYPT-IRIS BASED AUTHENTICATION APPROACH
      8. CONCLUSION
      9. REFERENCES
    8. Chapter 22: Cyber Security Risks in Robotics
      1. ABSTRACT
      2. INTRODUCTION TO CYBER SECURITY
      3. BACKGROUND
      4. MAIN FOCUS OF THE CHAPTER
      5. SOLUTIONS AND RECOMMENDATIONS
      6. ROBOTS AS SECURE APPLICATIONS
      7. ETHICS IN ROBOTICS
      8. SOME RULES OF ETHICS TO BE FOLLOWED FOR CYBERSECURITY IN ROBOTICS
      9. LAWS IN ROBOTICS FOR ENSURING CYBERSECURITY
      10. THE FUTURE RESEARCH DIRECTIONS OF ROBOTICS
      11. CONCLUSION
      12. REFERENCES
      13. KEY TERMS AND DEFINITIONS
  13. Compilation of References
  14. About the Contributors