Skip to main content

Organization of Secure Telecommunication Networks in Groups of Mobile Robots Based on Chaos and Blockchain Technologies

  • Conference paper
  • First Online:
Intelligent Systems Applications in Software Engineering (CoMeSySo 2019 2019)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1046))

Included in the following conference series:

  • 523 Accesses

Abstract

Currently, the topic of information exchange in groups of small-sized robots is very popular, the reason for this is the popularization of the use of mobile robots, and therefore the question of the crypto-security of the communication channels of the team becomes. The article discusses the existing approaches to the implementation of information exchange and provides a brief analysis of the features of information exchange, depending on the type of management strategy. The proposed method of organizing the exchange of protected information in a decentralized group of small-sized robots. The proposed method is based on the use of data encryption on the basis of chaotic models for the transmitted information to members of the coalition and the use of the blockchain technology, for entering the obtained information into a distributed database.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Dorigo, M.: SWARM-BOT: an experiment in swarm robotics. In: Proceedings 2005 IEEE Swarm Intelligence Symposium, 2005. SIS 2005, pp. 192–200 (2005)

    Google Scholar 

  2. Intel Lights Up the Night with 500 ‘Shooting Star’ Drones, Intel (2016)

    Google Scholar 

  3. Milanovic, V., Zaghloul, M.E.: Improved masking algorithm for chaotic communications systems. Electron. Lett. 32(1), 11–12 (1996)

    Article  Google Scholar 

  4. Nakamoto, S., et al,: Bitcoin: A Peer-to-peer Electronic Cash System (2008)

    Google Scholar 

  5. Narayanan, A., Bonneau, J., Felten, E., Miller, A., Goldfeder, S.: Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction. Princeton University Press, Princeton (2016)

    MATH  Google Scholar 

  6. Azaria, A., Ekblaw, A., Vieira, T., Lippman, A.: Medrec: using blockchain for medical data access and permission management. In: 2016 2nd International Conference on Open and Big Data (OBD), pp. 25–30 (2016)

    Google Scholar 

  7. Sikorski, J.J., Haughton, J., Kraft, M.: Blockchain technology in the chemical industry: Machine-to-machine electricity market. Appl. Energy 195, 234–246 (2017)

    Article  Google Scholar 

  8. Samaniego, M., Deters, R.: Virtual resources & blockchain for configuration management in IoT. J. Ubiquit. Syst. Pervasive Netw. 9(2), 1–13 (2017)

    Google Scholar 

  9. Ferrer, E.C., Hardjono, T., et al.: RoboChain: A secure data-sharing framework for human-robot interaction. arXiv Prepr. arXiv:1802.04480 (2018)

  10. Strobel, V., Dorigo, M.: Blockchain technology for robot swarms: a shared knowledge and reputation management system for collective estimation (2018)

    Google Scholar 

  11. Ferrer, E.C.: The blockchain: a new framework for robotic swarm systems. In: Proceedings of the Future Technologies Conference, pp. 1037–1058 (2018)

    Google Scholar 

  12. Rogaway, P., Shrimpton, T.: Cryptographic hash-function basics: definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance. In: International Workshop on Fast Software Encryption, pp. 371–388 (2004)

    Chapter  Google Scholar 

  13. Luntovskyy, A., Guetter, D.: Cryptographic technology blockchain and its applications. In: The International Conference on Information and Telecommunication Technologies and Radio Electronics, pp. 14–33 (2018)

    Google Scholar 

  14. Noether, S.: Ring signature confidential transactions for monero. IACR Cryptol. ePrint Arch. 2015, 1098 (2015)

    Google Scholar 

  15. Dannen, C.: Introducing Ethereum and Solidity. Springer, Heidelberg (2017)

    Book  Google Scholar 

  16. Wood, G., et al.: Ethereum: a secure decentralised generalised transaction ledger. Ethereum Proj. Yellow Pap. 151, 1–32 (2014)

    Google Scholar 

  17. Buterin, V., et al.: A next-generation smart contract and decentralized application platform. White Pap. 3, 37 (2014)

    Google Scholar 

  18. Atzei, N., Bartoletti, M., Cimoli, T.: A survey of attacks on Ethereum smart contracts. IACR Cryptol. ePrint Arch. 2016, 1007 (2016)

    Google Scholar 

  19. Bastiaan, M.: Preventing the 51%-attack: a stochastic analysis of two phase proof of work in bitcoin (2015). http://referaat.cs.utwente.nl/conference/22/paper/7473/preventingthe-51-attack-astochastic-analysis-of-two-phase-proof-of-work-in-bitcoin.pdf

Download references

Acknowledgment

The reported study was funded by RFBR according to the research project â„–17-29-07054 and â„–18-58-00051.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vladimir Shabanov .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Shabanov, V. (2019). Organization of Secure Telecommunication Networks in Groups of Mobile Robots Based on Chaos and Blockchain Technologies. In: Silhavy, R., Silhavy, P., Prokopova, Z. (eds) Intelligent Systems Applications in Software Engineering. CoMeSySo 2019 2019. Advances in Intelligent Systems and Computing, vol 1046. Springer, Cham. https://doi.org/10.1007/978-3-030-30329-7_39

Download citation

Publish with us

Policies and ethics