Skip to main content

Surveillance Robot in Cyber Intelligence for Vulnerability Detection

  • Chapter
  • First Online:
Machine Learning for Robotics Applications

Part of the book series: Studies in Computational Intelligence ((SCI,volume 960))

Abstract

Robots and self-ruling frameworks by and large are set to endure comparative online protection issues generated at live environment of Internet world. The weak design and malfunction of firmware and software of robotic application can open the doors for cyber vulnerabilities like ransomware and DoS attack. The robotic framework has been distinguished and implemented into heterogeneous domains including military applications, home automation, IoT-enabled devices, autonomous cars and vehicles, surveillance systems. This is not just stressing for basic errands, for example, those performed by careful or military robots yet in addition for family robots, for example, vacuum cleaners or for video chat robots, bargain security and well-being of their proprietors. What will occur if these robots are hacked? This research aims to present a review on the online protection against cyber vulnerabilities and threats related to automatic bot and administration robots, and thus, a scientific categorization that groups the dangers looked by clients and normal users when utilizing autonomous robots, recognizing privacy and security and well-being strings, is introduced. We additionally present the robot programming advancement stage as one of the most significant ones for the security of robots. The proposed work is created with a fantasy to see the spots we wish to see deliberately in a military and generalized robot-enabled field. Robots are expecting a basic employment in the military application. By far, most of the work in the military is dangerous for individual. In a war field or shield task, a hero needs to take his own particular way to accomplish the objective. By far, most of the ways are unsafe for a fighter. Subsequently, robot replaces the trooper. To screen the development of the robot, there is a transmitter which is joined on the robot. The clarification for manual control of the robot is that it will not be lost owing to nonattendance of human incorporation. Despite long reach applications, it might be used as an administration employable robot inside short distances. Reconnaissance assumes a significant part in outskirt zones to watch out for foes. In such circumstances, it is hard to permit obligation of observation to a trooper, which may cause hazardous to the life on one. Or maybe we can utilize a robot to watch out for fringe regions. So in such cases this sort of robots is valuable, they are little in size and furnished with numerous capacities so they can play out the obligation of reconnaissance and spying consummately. In the event that they are found by the soldier, they have no personality to whom they have a place. Military on fringe zone is confronting numerous issues so this sort of innovation helps them to be mindful about the rival exercises, so they can take further choices. The proposed work depicts the portrayal of security structure and highlights for execution of cutting-edge cyber design for the assurance from security break-in automated environment.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Amareswar, E., Goud, G.S.S.K., Maheshwari, K.R., Akhil, E., Aashraya, S., Naveen, T.: Multi purpose military service robot. In: 2017 International conference of Electronics, Communication and Aerospace Technology (ICECA), vol. 2, pp. 684–686. IEEE (2017, April)

    Google Scholar 

  2. Dixit*, S.K., Dhayagonde, S.B.: Design and implementation of e-surveillance robot for video monitoring and living body detection. Int. J. Sci. Res. Publ. 4(4) (2014). ISSN 2250–3153

    Google Scholar 

  3. Dey, G.K., Hossen, R., Noor, M.S., Ahmmed, K.T: Distance controlled rescue and security mobile robot, IEEE (2013)

    Google Scholar 

  4. Hockstein, N., Gourin, C., Faust, R., Terris, D.J.: A history of robots:from science fiction to surgical robotics. J. Robot.Surgery 1(2), 113–118 (2007)

    Article  Google Scholar 

  5. Christensen, H.I., Batzinger, T., Bekris, K., Bohringer, K., Bordogna, J., Bradski, G., Brock, O., Burnstein, J., Fuhlbrigge, T., Eastman, R. et al.: A roadmap for us robotics: from internet to robotics. Computing Community Consortium (2009)

    Google Scholar 

  6. Mirjalili, S.H., Lenstra, A.K.: Security observance throughout the life-cycle of embedded systems. In: Proceedings of the 2008 International Conference on Embedded Systems and Applications, ESA 2008, no. EPFL-CONF-149724, pp. 186–192. (2008)

    Google Scholar 

  7. Papp, D., Ma, Z., Buttyan, L.: Embedded systems security: threats, vulnerabilities, and attack taxonomy. In: Privacy, Security and Trust (PST), 2015 13th Annual Conference on IEEE, pp. 145–152. (2015)

    Google Scholar 

  8. Morante, S., Victores, J.G., Balaguer, C.: Cryptobotics: Why robots need cyber safety. Front. Robot. AI 2, 23 (2015)

    Article  Google Scholar 

  9. Wang, X., Mal-Sarkar, T., Krishna, A., Narasimhan, S., Bhunia, S.: Software exploitable hardware trojans in embedded processor. In: Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT), 2012 IEEE International Symposium on IEEE, pp. 55–58. (2012)

    Google Scholar 

  10. Patoliya, J., Mehta, H., Patel, H.: Arduino controlled war field spy robot using night vision wireless camera and android application. In: 2015 5th Nirma University International Conference on Engineering (NUiCONE) (2015)

    Google Scholar 

  11. Gudhka, K., Kadam, A., Kale, D., Rupani, M., Dhake, T.: War field spying robot using wireless camera. Int. J. Electri. Electron. Res. 4(1), 85–92 (2016) ISSN 2348–6988 (online)

    Google Scholar 

  12. Shaw, R.N., Walde, P., Ghosh, A.: IOT based MPPT for performance improvement of solar PV arrays operating under partial shade dispersion. In: 2020 IEEE 9th Power India International Conference (PIICON) held at Deenbandhu Chhotu Ram University of Science and Technology, SONEPAT. India on FEB 28-March 1. (2020)

    Google Scholar 

  13. Selvam, M.: Smart phone based robotic control for surveillance applications. IJRET: Int. J. Res. Eng. Technol. 03(03) (2014)

    Google Scholar 

  14. Parmar, R., Malik, A., Shahnawaz, A., Parth, B.: Military spying & bomb diffusing robot with night vision. (2017)

    Google Scholar 

  15. Shivalkar, S., Yadav, G., Patil, S., Dale, S.: Warfare robot. (2019)

    Google Scholar 

  16. Bandani, A.K., Chandra, M.V., Singh, A.K., Raghuveer, P., Thejasvi, N.: Design of multi-purpose mobile target system for military applications. Int. J. Pure Appl. Math. 120(6), 7883–7897 (2018)

    Google Scholar 

  17. Mandal, S., Balas, V.E., Shaw, V.E., Ghosh, A.: Prediction analysis of idiopathic pulmonary fibrosis progression from OSIC dataset. In: 2020 IEEE International Conference on Computing, Power and Communication Technologies (GUCON), 2–4 October 2020. pp. 861–865. (2020). https://doi.org/10.1109/GUCON48875.2020.9231239

  18. Ko, A., Lau, H.Y.: Robot assisted emergency search and rescue system with a wireless sensor network. Int. J. Adv. Sci. Technol. 3 (2009)

    Google Scholar 

  19. Khushwant, J., Su, V.: Smart robot car for border computer applications. 76(7) (2013)

    Google Scholar 

  20. Mohammad, T.: Using ultra measurement. World Acad. Technol. 51, 293–299 (2009)

    Google Scholar 

  21. Binoy, B.N., Kaush, A., Barani, R., Aswathy: Unmanned ground vehicle. In: I Communication Technologies Conference on. pp. 356–361. (2020)

    Google Scholar 

  22. Belkhier, Y., Achour, A., Shaw, R.N.: Fuzzy passivity-based voltage controller strategy of grid-connected PMSG-based wind renewable energy system. In: 2020 IEEE 5th International Conference on Computing Communication and Automation (ICCCA), Greater Noida, India, pp. 210–214. (2020) https://doi.org/10.1109/ICCCA49541.2020.9250838

  23. Kumar, M., Shenbagaraman, V.M., Ghosh, A.: Predictive data analysis for energy management of a smart factory leading to sustainability. In: Favors-kaya, M.N., Mekhilef, S., Pandey, R.K., Singh, N. (eds.) Innovations in Electrical and Electronic Engineering. pp. 765–773. Springer (2020) [ISBN 978–981–15–4691–4]

    Google Scholar 

  24. Mandal, S., Biswas, S., Balas, V.E., Shaw, R.N., Ghosh, A.: Motion prediction for autonomous vehicles from lyft dataset using deep learning. In: 2020 IEEE 5th International Conference on Computing Communication and Automation (ICCCA) 30–31 October 2020, pp. 768–773. (2020). https://doi.org/10.1109/ICCCA49541.2020.9250790

  25. Maurya, M., Shri R.N.S. (Motes): Performance metrics an advanced research in electronic. pp. 045. (2013)

    Google Scholar 

  26. https://analyticsindiamag.com/10-open-source-datasets-to-learn-robotics/#:~:text=The%20robot%20arm%20pushing%20dataset,train)%20and%20two%20test%20sets.&text=One%20key%20application%20of%20this,vision%2Dbased%20robotic%20control%20tasks.

  27. https://robotica.unileon.es/index.php/Datasets

  28. Dream Market: A Hotbed of Scammers. https://darkwebnews.com/darkwebmarkets/dream-market/dream-market-a-hotbed-of-scammers/

Download references

Future Scope

Our future point is to focus on utilization of artificial intelligence (AI) and AI so it can take minute choices of its own. Additionally, we are thinking about to utilize a laser firearm, for its insurance and some of the time to focus on the rival.

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Rawat, R., Rajawat, A.S., Mahor, V., Shaw, R.N., Ghosh, A. (2021). Surveillance Robot in Cyber Intelligence for Vulnerability Detection. In: Bianchini, M., Simic, M., Ghosh, A., Shaw, R.N. (eds) Machine Learning for Robotics Applications. Studies in Computational Intelligence, vol 960. Springer, Singapore. https://doi.org/10.1007/978-981-16-0598-7_9

Download citation

Publish with us

Policies and ethics