Abstract
Robots and self-ruling frameworks by and large are set to endure comparative online protection issues generated at live environment of Internet world. The weak design and malfunction of firmware and software of robotic application can open the doors for cyber vulnerabilities like ransomware and DoS attack. The robotic framework has been distinguished and implemented into heterogeneous domains including military applications, home automation, IoT-enabled devices, autonomous cars and vehicles, surveillance systems. This is not just stressing for basic errands, for example, those performed by careful or military robots yet in addition for family robots, for example, vacuum cleaners or for video chat robots, bargain security and well-being of their proprietors. What will occur if these robots are hacked? This research aims to present a review on the online protection against cyber vulnerabilities and threats related to automatic bot and administration robots, and thus, a scientific categorization that groups the dangers looked by clients and normal users when utilizing autonomous robots, recognizing privacy and security and well-being strings, is introduced. We additionally present the robot programming advancement stage as one of the most significant ones for the security of robots. The proposed work is created with a fantasy to see the spots we wish to see deliberately in a military and generalized robot-enabled field. Robots are expecting a basic employment in the military application. By far, most of the work in the military is dangerous for individual. In a war field or shield task, a hero needs to take his own particular way to accomplish the objective. By far, most of the ways are unsafe for a fighter. Subsequently, robot replaces the trooper. To screen the development of the robot, there is a transmitter which is joined on the robot. The clarification for manual control of the robot is that it will not be lost owing to nonattendance of human incorporation. Despite long reach applications, it might be used as an administration employable robot inside short distances. Reconnaissance assumes a significant part in outskirt zones to watch out for foes. In such circumstances, it is hard to permit obligation of observation to a trooper, which may cause hazardous to the life on one. Or maybe we can utilize a robot to watch out for fringe regions. So in such cases this sort of robots is valuable, they are little in size and furnished with numerous capacities so they can play out the obligation of reconnaissance and spying consummately. In the event that they are found by the soldier, they have no personality to whom they have a place. Military on fringe zone is confronting numerous issues so this sort of innovation helps them to be mindful about the rival exercises, so they can take further choices. The proposed work depicts the portrayal of security structure and highlights for execution of cutting-edge cyber design for the assurance from security break-in automated environment.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Amareswar, E., Goud, G.S.S.K., Maheshwari, K.R., Akhil, E., Aashraya, S., Naveen, T.: Multi purpose military service robot. In: 2017 International conference of Electronics, Communication and Aerospace Technology (ICECA), vol. 2, pp. 684–686. IEEE (2017, April)
Dixit*, S.K., Dhayagonde, S.B.: Design and implementation of e-surveillance robot for video monitoring and living body detection. Int. J. Sci. Res. Publ. 4(4) (2014). ISSN 2250–3153
Dey, G.K., Hossen, R., Noor, M.S., Ahmmed, K.T: Distance controlled rescue and security mobile robot, IEEE (2013)
Hockstein, N., Gourin, C., Faust, R., Terris, D.J.: A history of robots:from science fiction to surgical robotics. J. Robot.Surgery 1(2), 113–118 (2007)
Christensen, H.I., Batzinger, T., Bekris, K., Bohringer, K., Bordogna, J., Bradski, G., Brock, O., Burnstein, J., Fuhlbrigge, T., Eastman, R. et al.: A roadmap for us robotics: from internet to robotics. Computing Community Consortium (2009)
Mirjalili, S.H., Lenstra, A.K.: Security observance throughout the life-cycle of embedded systems. In: Proceedings of the 2008 International Conference on Embedded Systems and Applications, ESA 2008, no. EPFL-CONF-149724, pp. 186–192. (2008)
Papp, D., Ma, Z., Buttyan, L.: Embedded systems security: threats, vulnerabilities, and attack taxonomy. In: Privacy, Security and Trust (PST), 2015 13th Annual Conference on IEEE, pp. 145–152. (2015)
Morante, S., Victores, J.G., Balaguer, C.: Cryptobotics: Why robots need cyber safety. Front. Robot. AI 2, 23 (2015)
Wang, X., Mal-Sarkar, T., Krishna, A., Narasimhan, S., Bhunia, S.: Software exploitable hardware trojans in embedded processor. In: Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT), 2012 IEEE International Symposium on IEEE, pp. 55–58. (2012)
Patoliya, J., Mehta, H., Patel, H.: Arduino controlled war field spy robot using night vision wireless camera and android application. In: 2015 5th Nirma University International Conference on Engineering (NUiCONE) (2015)
Gudhka, K., Kadam, A., Kale, D., Rupani, M., Dhake, T.: War field spying robot using wireless camera. Int. J. Electri. Electron. Res. 4(1), 85–92 (2016) ISSN 2348–6988 (online)
Shaw, R.N., Walde, P., Ghosh, A.: IOT based MPPT for performance improvement of solar PV arrays operating under partial shade dispersion. In: 2020 IEEE 9th Power India International Conference (PIICON) held at Deenbandhu Chhotu Ram University of Science and Technology, SONEPAT. India on FEB 28-March 1. (2020)
Selvam, M.: Smart phone based robotic control for surveillance applications. IJRET: Int. J. Res. Eng. Technol. 03(03) (2014)
Parmar, R., Malik, A., Shahnawaz, A., Parth, B.: Military spying & bomb diffusing robot with night vision. (2017)
Shivalkar, S., Yadav, G., Patil, S., Dale, S.: Warfare robot. (2019)
Bandani, A.K., Chandra, M.V., Singh, A.K., Raghuveer, P., Thejasvi, N.: Design of multi-purpose mobile target system for military applications. Int. J. Pure Appl. Math. 120(6), 7883–7897 (2018)
Mandal, S., Balas, V.E., Shaw, V.E., Ghosh, A.: Prediction analysis of idiopathic pulmonary fibrosis progression from OSIC dataset. In: 2020 IEEE International Conference on Computing, Power and Communication Technologies (GUCON), 2–4 October 2020. pp. 861–865. (2020). https://doi.org/10.1109/GUCON48875.2020.9231239
Ko, A., Lau, H.Y.: Robot assisted emergency search and rescue system with a wireless sensor network. Int. J. Adv. Sci. Technol. 3 (2009)
Khushwant, J., Su, V.: Smart robot car for border computer applications. 76(7) (2013)
Mohammad, T.: Using ultra measurement. World Acad. Technol. 51, 293–299 (2009)
Binoy, B.N., Kaush, A., Barani, R., Aswathy: Unmanned ground vehicle. In: I Communication Technologies Conference on. pp. 356–361. (2020)
Belkhier, Y., Achour, A., Shaw, R.N.: Fuzzy passivity-based voltage controller strategy of grid-connected PMSG-based wind renewable energy system. In: 2020 IEEE 5th International Conference on Computing Communication and Automation (ICCCA), Greater Noida, India, pp. 210–214. (2020) https://doi.org/10.1109/ICCCA49541.2020.9250838
Kumar, M., Shenbagaraman, V.M., Ghosh, A.: Predictive data analysis for energy management of a smart factory leading to sustainability. In: Favors-kaya, M.N., Mekhilef, S., Pandey, R.K., Singh, N. (eds.) Innovations in Electrical and Electronic Engineering. pp. 765–773. Springer (2020) [ISBN 978–981–15–4691–4]
Mandal, S., Biswas, S., Balas, V.E., Shaw, R.N., Ghosh, A.: Motion prediction for autonomous vehicles from lyft dataset using deep learning. In: 2020 IEEE 5th International Conference on Computing Communication and Automation (ICCCA) 30–31 October 2020, pp. 768–773. (2020). https://doi.org/10.1109/ICCCA49541.2020.9250790
Maurya, M., Shri R.N.S. (Motes): Performance metrics an advanced research in electronic. pp. 045. (2013)
Dream Market: A Hotbed of Scammers. https://darkwebnews.com/darkwebmarkets/dream-market/dream-market-a-hotbed-of-scammers/
Future Scope
Our future point is to focus on utilization of artificial intelligence (AI) and AI so it can take minute choices of its own. Additionally, we are thinking about to utilize a laser firearm, for its insurance and some of the time to focus on the rival.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Rawat, R., Rajawat, A.S., Mahor, V., Shaw, R.N., Ghosh, A. (2021). Surveillance Robot in Cyber Intelligence for Vulnerability Detection. In: Bianchini, M., Simic, M., Ghosh, A., Shaw, R.N. (eds) Machine Learning for Robotics Applications. Studies in Computational Intelligence, vol 960. Springer, Singapore. https://doi.org/10.1007/978-981-16-0598-7_9
Download citation
DOI: https://doi.org/10.1007/978-981-16-0598-7_9
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-0597-0
Online ISBN: 978-981-16-0598-7
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)