Abstract
The article focuses on the enhancing methods of information security of the cooperative productive systems with dynamic communication clusters. There is a disappearance of physical barriers between people and robots in the process of their production interaction in the age of development of production systems. The problem is the lack of proper trust in the actions of the robot in cooperation. One of the steps towards achieving a proper level of trust and cooperation is to ensure the credibility of the information in the common communication system. In this research we assumed the messages exchanged by the components of the situational cluster are information blocks composed of an authentication and information component. Method that combine the principles of password authentication and identification with hashing methods have been proposed to analyze information. The method of frequent error detection and a method provides a guaranteed detection of a specified number of counterfeit fragments in the message by entering control blocks of information and performing cross hashing is offered.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Xu T, Zhang T, Kühnlenz K, Buss M (2008) Towards high-speed vision for attention and navigation of autonomous city explorer (ACE). In: Xiong Z (ed) Computer vision. In-teh, Rijeka, Croatia, pp 189–214
Virágh C, Vásárhelyi G, Tarcai N, Szörényi T, Somorjai G, Nepusz T, Vicsek T (2014) Flocking algorithm for autonomous flying robots. Bioinspiration Biomim 9(2)
Kolbeinsson A, Lagerstedt E, Lindblom J (2019) Foundation for a classification of collaboration levels for human-robot cooperation in manufacturing. Prod Manuf Res 7(1):448–471
SUCRé. Reliability and resilience for the cooperative control and management of sociotechnical systems: Human(s)-Robot(s) cooperation in hostile environment. LAMIH. https://www.uphf.fr/LAMIH/en/reliability-and-resilience-cooperative-control-and-management-sociotechnical-systems-humans-robots. Accessed 2 Feb 2021
Treffler R. Innovation Award 2018: and the winner is… https://www.blog.kuka.com/2018/05/10/kuka-innovation-award-2018-and-the-winner-is/?lang=en. Accessed 2 Feb 2021
Goetz U. As soon as they have to start thinking about safety fencing, most of them opt out. https://www.blog.kuka.com/2018/09/07/collaboration-and-coexistence/?lang=en. Accessed 2 Feb 2021
Velásquez I, Caro A, Rodríguez A (2018) Authentication schemes and methods: a systematic literature review. Inf Softw Technol 94:30–37
Song R (2010) Advanced smart card based password authentication protocol. Comput Stand Interfaces 32(5–6):321–325
Fazlida MR, Said J (2015) Information security: risk, governance and implementation setback. Procedia Econ Finance 28:243–248
Siponen M, Oinas-Kukkonen H (2007) A review of information security issues and respective research contributions. DATA BASE Adv Inf Syst 38(1):60–80
Cao Z, Yin Z, Hu H, Gao X, Wang L (2016) High capacity data hiding scheme based on (7, 4) Hamming code. Springerplus 5:175
Ma Z, Li F, Zhang X (2013) Data hiding in halftone images based on hamming code and slave pixels. J Shanghai Univ (Nat Sci) 19(2):111–115
Wang K, Shao Q (2011) Analysis of cloud computing and information security. In: Proceedings of the 2nd international conference on frontiers of manufacturing and design science (ICFMD’11), Taichung, Taiwan, pp 3810–3813
Rozlomii IA, Rudnitsky VN, Alekseeva ES (2017) Using of hash function to identify counterfit fragments of electronic document. Wschodnioeuropejskie Czasopismo Naukowe (East Eur Sci J) 3(19):68–72
Sahu A, Ghosh SM (2017) Review paper on secure Hash algorithm with its variants. Int J Techn Innov Mod Eng Sci (IJTIMES) 3(05)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Yarmilko, A., Rozlomii, I., Kosenyuk, H. (2022). Hash Method for Information Stream’s Safety in Dynamic Cooperative Production System. In: Shkarlet, S., et al. Mathematical Modeling and Simulation of Systems. MODS 2021. Lecture Notes in Networks and Systems, vol 344. Springer, Cham. https://doi.org/10.1007/978-3-030-89902-8_14
Download citation
DOI: https://doi.org/10.1007/978-3-030-89902-8_14
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-89901-1
Online ISBN: 978-3-030-89902-8
eBook Packages: EngineeringEngineering (R0)