Skip to main content
Log in

Security and privacy of network transmitted system in the Internet of Robotic Things

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

The interconnection between robotic devices network can be referred as the Internet of Robotic Things (IoRT). Each robot device is equipped with sensors and communication hardware for collecting and sharing data between each other to support many useful services. In order to provide an effective solution to tackle robotic application issues a fog computing network in the robotic network system is introduced. Thus, a number of services are provided to our live works by deploying IoRT network system. However, critical security and privacy challenges in the IoRT transmitting network system are still there. Therefore, we design a proxy re-signcryption (PRS) cryptography method based on proxy re-encryption technology. Based on the PRS method, we propose a security and privacy transmitting data (SPT) scheme to protect the IoRT transmitting network system. The SPT scheme prevents a malicious FN from forging a valid ciphertext, which simultaneously guarantees the confidentiality and integrity of the transmitted message. To show the high efficiency of the proposed PRS method in terms of security and privacy threats, security analysis is presented. In addition, the evaluation shows that the PRS method is compatible with high efficiency performance to ensuring the success of IoRT network applications.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Niku SB (2020) Introduction to robotics: analysis, control, applications. John Wiley & Sons, New York

    Google Scholar 

  2. Basudan S (2021) A puncturable attribute-based data sharing scheme for the internet of medical robotic things. Library Hi Tech

  3. Alamer A (2020) A secure anonymous tracing fog-assisted method for the internet of robotic things. Library Hi Tech

  4. Kamilaris A, Botteghi N (2020) The penetration of internet of things in robotics: Towards a web of robotic things. J Ambient Intell Smart Environ (Preprint), 1–22

  5. Masuda Y, Shepard DS, Nakamura O, Toma T (2020) Vision paper for enabling internet of medical robotics things in open healthcare platform 2030. In: Innovation in Medicine and Healthcare, pp. 3–14. Springer, Singapore

  6. Afanasyev I, Mazzara M, Chakraborty S, Zhuchkov N, Maksatbek A, Yesildirek A, Kassab M, Distefano S (2019) Towards the internet of robotic things: analysis, architecture, components and challenges. In: 2019 12th International Conference on Developments in eSystems Engineering (DeSE). IEEE, pp 3–8

  7. Nayyar A, Nguyen B-L, Nguyen NG (2020) The internet of drone things (IoDT): future envision of smart drones. In: First International Conference on Sustainable Technologies for Computational Intelligence. Springer, Singapore, pp 563–580

  8. Sardar R, Anees T (2021) Web of things: security challenges and mechanisms. IEEE Access 9:31695–31711

    Article  Google Scholar 

  9. Ozdemir D, Cibulka J, Stepankova O, Holmerova I (2021) Design and implementation framework of social assistive robotics for people with dementia—a scoping review. Health Technol 1–12

  10. Alamer A (2020) An efficient group signcryption scheme supporting batch verification for securing transmitted data in the internet of things. J Ambient Intell Hum Comput 1–18

  11. Alamer A, Basudan S, Hung PC (2020) A secure tracing method in fog computing network for the iot devices. In: Proceedings of the 12th International Conference on Management of Digital EcoSystems, pp 104–110

  12. Basudan S, Lin X, Sankaranarayanan K (2017) A privacy-preserving vehicular crowdsensing-based road surface condition monitoring system using fog computing. IEEE Internet of Things J 4(3):772–782

    Article  Google Scholar 

  13. Tyagi AK, Agarwal K, Goyal D, Sreenath N (2020) A review on security and privacy issues in internet of things. In: Advances in Computing and Intelligent Systems. Springer, Singapore, pp 489–502

  14. Hussain S, Ullah I, Khattak H, Adnan M, Kumari S, Ullah SS, Khan MA, Khattak SJ (2020) A lightweight and formally secure certificate based signcryption with proxy re-encryption (CBSRE) for internet of things enabled smart grid. IEEE Access 8:93230–93248

    Article  Google Scholar 

  15. Khashan OA (2020) Hybrid lightweight proxy re-encryption scheme for secure fog-to-things environment. IEEE Access 8:66878–66887

    Article  Google Scholar 

  16. Lin X, Lu R (2016) Proxy re-encryption with delegatable verifiability. In: Australasian Conference on Information Security and Privacy. Springer, Cham, pp 120–133

  17. Zhan Y, Wang B, Wang Z, Pei T, Chen Y, Qu Q, Zhang Z (2019) Improved proxy re-encryption with delegatable verifiability. IEEE Syst J

  18. Huang C, Lu R, Zhu H, Shao J, Alamer A, Lin X (2016) EPPD: efficient and privacy-preserving proximity testing with differential privacy techniques. In: 2016 IEEE International Conference on Communications (ICC). IEEE, pp 1–6

  19. Kong Q, Lu R, Zhu H, Alamer A, Lin X (2016) A secure and privacy-preserving incentive framework for vehicular cloud on the road. In: 2016 IEEE Global Communications Conference (GLOBECOM). IEEE, pp 1–6

  20. Xue L, Huang Q, Zhang S, Huang H, Wang W (2021) A lightweight three-factor authentication and key agreement scheme for multigateway WSNs in IoT. Secur Commu Netw 2021

  21. Golle P, Jakobsson M, Juels A, Syverson P (2004) Universal re-encryption for mixnets. In: Cryptographers’ Track at the RSA Conference. Springer, Berlin, pp 163–178

  22. Wang Z, Zhu J, Guo X, Ma Y, Li Z (2020) Distributed task allocation method based on self-awareness of autonomous robots. J Supercomput 76(2):831–843

    Article  Google Scholar 

  23. Bi Z, Miao Z, Zhang B, Zhang CW (2020) The state of the art of testing standards for integrated robotic systems. Robotics Comput Integr Manuf 63:101893

    Article  Google Scholar 

  24. Leng X, Piao S, Chang L, He Z, Zhu Z (2020) Dynamic running hexapod robot based on high-performance computing. J Supercomput 76(2):844–857

    Article  Google Scholar 

  25. Vojić S (2020) Internet of robotic things (IoRT) applications. Industry 4.0 5(4):156–159

  26. Tuli S, Basumatary N, Gill SS, Kahani M, Arya RC, Wander GS, Buyya R (2020) Healthfog: an ensemble deep learning based smart healthcare system for automatic diagnosis of heart diseases in integrated IoT and fog computing environments. Futur Gener Comput Syst 104:187–200

    Article  Google Scholar 

  27. Liu Y, Zhang W, Pan S, Li Y, Chen Y (2020) Analyzing the robotic behavior in a smart city with deep enforcement and imitation learning using IoRT. Comput Commun 150:346–356

    Article  Google Scholar 

  28. Mohamed N, Al-Jaroodi J, Jawhar I (2018) Fog-enabled multi-robot systems. In: 2018 IEEE 2nd International Conference on Fog and Edge Computing (ICFEC). IEEE, pp 1–10

  29. Vermesan O, Bahr R, Ottella M, Serrano M, Karlsen T, Wahlstrøm T, Sand H-E, Ashwathnarayan M, Gamba MT (2020) Internet of robotic things intelligent connectivity and platforms. Front Robotics AI 7:104

    Article  Google Scholar 

  30. Romeo L, Petitti A, Marani R, Milella A (2020) Internet of robotic things in smart domains: applications and challenges. Sensors 20(12):3355

    Article  Google Scholar 

  31. Romeo L, Petitti, A, Marani R, Milella A (2020) Internet of robotic things in industry 4.0: Applications, issues and challenges. In: 2020 7th International Conference on Control, Decision and Information Technologies (CoDIT), vol 1. IEEE, pp 177–182

  32. Alamer A, Deng Y, Lin X (2017) A privacy-preserving and truthful tendering framework for vehicle cloud computing. In: 2017 IEEE International Conference on Communications (ICC). IEEE, pp 1–7

  33. Stoyanova M, Nikoloudakis Y, Panagiotakis S, Pallis E, Markakis EK (2020) A survey on the internet of things (IoT) forensics: challenges, approaches, and open issues. IEEE Commun Surv Tutor 22(2):1191–1221

    Article  Google Scholar 

  34. Fragapane G, Ivanov D, Peron M, Sgarbossa F, Strandhagen JO (2020) Increasing flexibility and productivity in industry 4.0 production networks with autonomous mobile robots and smart intralogistics. Ann Oper Res 1–19

  35. Basudan S (2020) Lega: a lightweight and efficient group authentication protocol for massive machine type communication in 5g networks. J Commun Inf Netw 5(4):457–466

    Article  Google Scholar 

  36. Basudan S, Lin X, Sankaranarayanan K (2017) An efficient compromised node revocation scheme in fog-assisted vehicular crowdsensing. IEEE, pp 1–6

  37. Alamer A, Basudan S, Lin X (2018) A privacy-preserving incentive framework for the vehicular cloud. In: 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE, pp 435–441

  38. Pereira GC, Alves RC, Silva FLd, Azevedo RM, Albertini BC, Margi CB (2017) Performance evaluation of cryptographic algorithms over IoT platforms and operating systems. Secur Commun Netw 2017

  39. Miret JM, Sadornil D, Tena JG (2018) Pairing-based cryptography on elliptic curves. Math Comput Sci 12(3):309–318

    Article  MathSciNet  MATH  Google Scholar 

  40. Fouotsa E, Pecha A, El Mrabet N (2019) Beta Weil pairing revisited. Afr Mat 30(3):371–388

    Article  MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sultan Basudan.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Alamer, A., Basudan, S. Security and privacy of network transmitted system in the Internet of Robotic Things. J Supercomput 78, 18361–18378 (2022). https://doi.org/10.1007/s11227-022-04612-2

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-022-04612-2

Keywords

Navigation