Abstract
The interconnection between robotic devices network can be referred as the Internet of Robotic Things (IoRT). Each robot device is equipped with sensors and communication hardware for collecting and sharing data between each other to support many useful services. In order to provide an effective solution to tackle robotic application issues a fog computing network in the robotic network system is introduced. Thus, a number of services are provided to our live works by deploying IoRT network system. However, critical security and privacy challenges in the IoRT transmitting network system are still there. Therefore, we design a proxy re-signcryption (PRS) cryptography method based on proxy re-encryption technology. Based on the PRS method, we propose a security and privacy transmitting data (SPT) scheme to protect the IoRT transmitting network system. The SPT scheme prevents a malicious FN from forging a valid ciphertext, which simultaneously guarantees the confidentiality and integrity of the transmitted message. To show the high efficiency of the proposed PRS method in terms of security and privacy threats, security analysis is presented. In addition, the evaluation shows that the PRS method is compatible with high efficiency performance to ensuring the success of IoRT network applications.




Similar content being viewed by others
References
Niku SB (2020) Introduction to robotics: analysis, control, applications. John Wiley & Sons, New York
Basudan S (2021) A puncturable attribute-based data sharing scheme for the internet of medical robotic things. Library Hi Tech
Alamer A (2020) A secure anonymous tracing fog-assisted method for the internet of robotic things. Library Hi Tech
Kamilaris A, Botteghi N (2020) The penetration of internet of things in robotics: Towards a web of robotic things. J Ambient Intell Smart Environ (Preprint), 1–22
Masuda Y, Shepard DS, Nakamura O, Toma T (2020) Vision paper for enabling internet of medical robotics things in open healthcare platform 2030. In: Innovation in Medicine and Healthcare, pp. 3–14. Springer, Singapore
Afanasyev I, Mazzara M, Chakraborty S, Zhuchkov N, Maksatbek A, Yesildirek A, Kassab M, Distefano S (2019) Towards the internet of robotic things: analysis, architecture, components and challenges. In: 2019 12th International Conference on Developments in eSystems Engineering (DeSE). IEEE, pp 3–8
Nayyar A, Nguyen B-L, Nguyen NG (2020) The internet of drone things (IoDT): future envision of smart drones. In: First International Conference on Sustainable Technologies for Computational Intelligence. Springer, Singapore, pp 563–580
Sardar R, Anees T (2021) Web of things: security challenges and mechanisms. IEEE Access 9:31695–31711
Ozdemir D, Cibulka J, Stepankova O, Holmerova I (2021) Design and implementation framework of social assistive robotics for people with dementia—a scoping review. Health Technol 1–12
Alamer A (2020) An efficient group signcryption scheme supporting batch verification for securing transmitted data in the internet of things. J Ambient Intell Hum Comput 1–18
Alamer A, Basudan S, Hung PC (2020) A secure tracing method in fog computing network for the iot devices. In: Proceedings of the 12th International Conference on Management of Digital EcoSystems, pp 104–110
Basudan S, Lin X, Sankaranarayanan K (2017) A privacy-preserving vehicular crowdsensing-based road surface condition monitoring system using fog computing. IEEE Internet of Things J 4(3):772–782
Tyagi AK, Agarwal K, Goyal D, Sreenath N (2020) A review on security and privacy issues in internet of things. In: Advances in Computing and Intelligent Systems. Springer, Singapore, pp 489–502
Hussain S, Ullah I, Khattak H, Adnan M, Kumari S, Ullah SS, Khan MA, Khattak SJ (2020) A lightweight and formally secure certificate based signcryption with proxy re-encryption (CBSRE) for internet of things enabled smart grid. IEEE Access 8:93230–93248
Khashan OA (2020) Hybrid lightweight proxy re-encryption scheme for secure fog-to-things environment. IEEE Access 8:66878–66887
Lin X, Lu R (2016) Proxy re-encryption with delegatable verifiability. In: Australasian Conference on Information Security and Privacy. Springer, Cham, pp 120–133
Zhan Y, Wang B, Wang Z, Pei T, Chen Y, Qu Q, Zhang Z (2019) Improved proxy re-encryption with delegatable verifiability. IEEE Syst J
Huang C, Lu R, Zhu H, Shao J, Alamer A, Lin X (2016) EPPD: efficient and privacy-preserving proximity testing with differential privacy techniques. In: 2016 IEEE International Conference on Communications (ICC). IEEE, pp 1–6
Kong Q, Lu R, Zhu H, Alamer A, Lin X (2016) A secure and privacy-preserving incentive framework for vehicular cloud on the road. In: 2016 IEEE Global Communications Conference (GLOBECOM). IEEE, pp 1–6
Xue L, Huang Q, Zhang S, Huang H, Wang W (2021) A lightweight three-factor authentication and key agreement scheme for multigateway WSNs in IoT. Secur Commu Netw 2021
Golle P, Jakobsson M, Juels A, Syverson P (2004) Universal re-encryption for mixnets. In: Cryptographers’ Track at the RSA Conference. Springer, Berlin, pp 163–178
Wang Z, Zhu J, Guo X, Ma Y, Li Z (2020) Distributed task allocation method based on self-awareness of autonomous robots. J Supercomput 76(2):831–843
Bi Z, Miao Z, Zhang B, Zhang CW (2020) The state of the art of testing standards for integrated robotic systems. Robotics Comput Integr Manuf 63:101893
Leng X, Piao S, Chang L, He Z, Zhu Z (2020) Dynamic running hexapod robot based on high-performance computing. J Supercomput 76(2):844–857
Vojić S (2020) Internet of robotic things (IoRT) applications. Industry 4.0 5(4):156–159
Tuli S, Basumatary N, Gill SS, Kahani M, Arya RC, Wander GS, Buyya R (2020) Healthfog: an ensemble deep learning based smart healthcare system for automatic diagnosis of heart diseases in integrated IoT and fog computing environments. Futur Gener Comput Syst 104:187–200
Liu Y, Zhang W, Pan S, Li Y, Chen Y (2020) Analyzing the robotic behavior in a smart city with deep enforcement and imitation learning using IoRT. Comput Commun 150:346–356
Mohamed N, Al-Jaroodi J, Jawhar I (2018) Fog-enabled multi-robot systems. In: 2018 IEEE 2nd International Conference on Fog and Edge Computing (ICFEC). IEEE, pp 1–10
Vermesan O, Bahr R, Ottella M, Serrano M, Karlsen T, Wahlstrøm T, Sand H-E, Ashwathnarayan M, Gamba MT (2020) Internet of robotic things intelligent connectivity and platforms. Front Robotics AI 7:104
Romeo L, Petitti A, Marani R, Milella A (2020) Internet of robotic things in smart domains: applications and challenges. Sensors 20(12):3355
Romeo L, Petitti, A, Marani R, Milella A (2020) Internet of robotic things in industry 4.0: Applications, issues and challenges. In: 2020 7th International Conference on Control, Decision and Information Technologies (CoDIT), vol 1. IEEE, pp 177–182
Alamer A, Deng Y, Lin X (2017) A privacy-preserving and truthful tendering framework for vehicle cloud computing. In: 2017 IEEE International Conference on Communications (ICC). IEEE, pp 1–7
Stoyanova M, Nikoloudakis Y, Panagiotakis S, Pallis E, Markakis EK (2020) A survey on the internet of things (IoT) forensics: challenges, approaches, and open issues. IEEE Commun Surv Tutor 22(2):1191–1221
Fragapane G, Ivanov D, Peron M, Sgarbossa F, Strandhagen JO (2020) Increasing flexibility and productivity in industry 4.0 production networks with autonomous mobile robots and smart intralogistics. Ann Oper Res 1–19
Basudan S (2020) Lega: a lightweight and efficient group authentication protocol for massive machine type communication in 5g networks. J Commun Inf Netw 5(4):457–466
Basudan S, Lin X, Sankaranarayanan K (2017) An efficient compromised node revocation scheme in fog-assisted vehicular crowdsensing. IEEE, pp 1–6
Alamer A, Basudan S, Lin X (2018) A privacy-preserving incentive framework for the vehicular cloud. In: 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE, pp 435–441
Pereira GC, Alves RC, Silva FLd, Azevedo RM, Albertini BC, Margi CB (2017) Performance evaluation of cryptographic algorithms over IoT platforms and operating systems. Secur Commun Netw 2017
Miret JM, Sadornil D, Tena JG (2018) Pairing-based cryptography on elliptic curves. Math Comput Sci 12(3):309–318
Fouotsa E, Pecha A, El Mrabet N (2019) Beta Weil pairing revisited. Afr Mat 30(3):371–388
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Alamer, A., Basudan, S. Security and privacy of network transmitted system in the Internet of Robotic Things. J Supercomput 78, 18361–18378 (2022). https://doi.org/10.1007/s11227-022-04612-2
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-022-04612-2