Is Secure Communication in the R2I (Robot-to-Infrastructure) Model Possible? Identification of Threats
暂无分享,去创建一个
Mirosław Siergiejczyk | Wojciech Wawrzyński | Adam Rosiński | Ewa Dudek | Karolina Krzykowska-Piotrowska | E. Dudek | Karolina Krzykowska-Piotrowska | M. Siergiejczyk | W. Wawrzyński | A. Rosiński
[1] Christian Tiberius,et al. Quality Control in SBAS: Protection Levels and Reliability Levels , 2009, Journal of Navigation.
[2] Amin Mohammed Abdalla,et al. Mobile Robot Controlled through Mobile Communication , 2015 .
[3] Adam Rosiński,et al. Analysis of Accuracy and Reliability of Different Types of GPS Receivers , 2020, Sensors.
[4] Christian Poellabauer,et al. Robot and Drone Localization in GPS-Denied Areas , 2019, Mission-Oriented Sensor Networks and Systems.
[5] Mirosław Siergiejczyk,et al. Influence of selected external factors on satellite navigation signal quality , 2018 .
[6] E. Dudek,et al. RISK MANAGEMENT IN (AIR) TRANSPORT WITH EXEMPLARY RISK ANALYSIS BASED ON THE TOLERABILITY MATRIX , 2020 .
[7] Elizabeth Sklar,et al. MRComm: Multi-Robot Communication Testbed , 2019, TAROS.
[8] Vicente Matellán Olivera,et al. Cybersecurity of Robotics and Autonomous Systems: Privacy and Safety , 2017 .
[9] Subrato Bharati,et al. Threats and Countermeasures of Cyber Security in Direct and Remote Vehicle Communication Systems , 2020, ArXiv.
[10] John B. Kenney,et al. Dedicated Short-Range Communications (DSRC) Standards in the United States , 2011, Proceedings of the IEEE.
[11] M. Siergiejczyk,et al. Security of telecommunications systems in transport , 2017 .
[12] Paolo Dario,et al. Improving Domiciliary Robotic Services by Integrating the ASTRO Robot in an AmI Infrastructure , 2014, Technology Transfer Experiments from the ECHORD Project.
[13] Junjie Yan,et al. To Make a Robot Secure: An Experimental Analysis of Cyber Security Threats Against Teleoperated Surgical Robots , 2015, ArXiv.
[14] Karolina Krzykowska,et al. Reliability and Viewpoints of Selected ITS System , 2017, 2017 25th International Conference on Systems Engineering (ICSEng).
[15] Mirosław Siergiejczyk,et al. Analysis of information secure transmission methods in the intelligent transport systems , 2017 .
[16] Łukasz Konieczny,et al. Optimizing the Data Flow in a Network Communication Between Railway Nodes , 2019, Advances in Intelligent Systems and Computing.
[17] Aris S. Lalos,et al. The CARAMEL Project: a Secure Architecture for Connected and Autonomous Vehicles , 2020, 2020 European Conference on Networks and Communications (EuCNC).
[18] Luminita Scripcariu,et al. Security Issues in the Internet of Vehicles , 2018, 2018 International Conference on Communications (COMM).
[19] Edoardo Datteri,et al. The Logic of Interactive Biorobotics , 2020, Frontiers in Bioengineering and Biotechnology.
[20] D. Duhaut,et al. Ethorobotics applied to human behaviour: can animated objects influence children's behaviour in cognitive tasks? , 2014, Animal Behaviour.
[21] Vicente Julián,et al. PHAROS—PHysical Assistant RObot System , 2018, Sensors.
[22] Ammar Alazab,et al. A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges , 2021, Cybersecurity.
[23] Michel Barbeau,et al. Threats to Security in DSRC/WAVE , 2006, ADHOC-NOW.
[24] Kun-Chan Lan,et al. A Comparison of 802.11a and 802.11p for V-to-I Communication: A Measurement Study , 2010, QSHINE.
[25] Henry C. B. Chan,et al. Decentralized adaptive indoor positioning protocol using Bluetooth Low Energy , 2020, Comput. Commun..
[26] Robert W. Heath,et al. Security in Automotive Radar and Vehicular Networks , 2017 .
[27] Rüdiger Dillmann,et al. Robot Companions for Citizens , 2011, FET.
[28] C. Stefanini,et al. Unveiling social distancing mechanisms via a fish-robot hybrid interaction , 2021, Biological Cybernetics.
[29] Alessandro Severino,et al. A Review on IEEE 802.11p for Intelligent Transportation Systems , 2020, J. Sens. Actuator Networks.
[30] Kazi Mahtab Kadir,et al. Technical investigation on V2G, S2V, and V2I for next generation smart city planning , 2019, Journal of Electronic Science and Technology.
[31] Karolina Krzykowska,et al. Reliability Assessment of Supporting Satellite System EGNOS , 2013, DepCoS-RELCOMEX.
[32] Junyi Xu,et al. GNSS receiver autonomous integrity monitoring (RAIM) algorithm based on robust estimation , 2016 .
[33] Abdulrahman H. Altalhi,et al. An Efficient Route Maintenance Protocol for Dynamic Bluetooth Networks , 2017, J. King Saud Univ. Comput. Inf. Sci..
[34] Sibin Mohan,et al. Securing Vehicle-to-Everything (V2X) Communication Platforms , 2020, IEEE Transactions on Intelligent Vehicles.
[35] Rabah Lakel,et al. Synchronized Communication in a Set of Autonomous Mobile Robots Using Bluetooth Technology , 2015 .
[36] Karolina Krzykowska,et al. Application of V2X Technology in Communication Between Vehicles and Infrastructure in Chosen Area , 2019, Advances in Intelligent Systems and Computing.
[37] Dhananjay S. Phatak,et al. Cybersecurity: Exploring core concepts through six scenarios , 2018, Cryptologia.
[38] Peter I. Anakhu,et al. An Android Based Mobile Robot for Monitoring and Surveillance , 2019, Procedia Manufacturing.
[39] Takayuki Kanda. Enabling Harmonized Human-Robot Interaction in a Public Space , 2017, Human-Harmonized Information Technology.
[40] Huansheng Ning,et al. Artificial intelligence in cyber security: research advances, challenges, and opportunities , 2021, Artificial Intelligence Review.
[41] Luigi Fortuna,et al. Force Feedback Assistance in Remote Ultrasound Scan Procedures , 2020 .
[42] Maarten Weyn,et al. Comparing Localization Performance of IEEE 802.11p and LTE-V V2I Communications , 2021, Sensors.
[43] Eleonora Bilotta,et al. Shopping with a robotic companion , 2017, Comput. Hum. Behav..
[44] Iveta Zolotova,et al. Control and Teleoperation of Robot Khepera via Android Mobile Device through Bluetooth and WiFi , 2016 .
[45] Mirosław Siergiejczyk,et al. Comparative Analysis of V2V and A2A Technologies , 2018 .
[46] Ishtiaq Ahmad,et al. Cooperative resource management for C-V2I communications in a dense urban environment , 2020, Veh. Commun..
[47] Lorenzo Galleani,et al. Satellite Autonomous Integrity Monitoring (SAIM) for GNSS Systems , 2009 .
[48] Vincenzo Di Massa,et al. Improving ITS-G5 Cybersecurity Features Starting from Hacking IEEE 802.11p V2X Communications Through Low-Cost SDR Devices , 2019 .