In many cases robots are connected wirelessly with a file server and often with one another, either directly, or via the file server. The network connections form a subnet where the router has the static IP address visible to the outside world and the server along with the robots form a subnet with local IP addresses. Often however, each robot has its own static IP address. In addition, each robot has a NIC card and a unique NIC address, as well as other hardware identifiers depending on the functionality and complexity of the robot. The non-electronic part of the robot hardware usually represents mature technology that has been understood for a long time. The electronic hardware has evolved to the point that the embedded software can provide the needed intelligence for the robot to perform sophisticated tasks previously performed by one or more human beings. However, in previous research emphasis has been placed on the tasks performed by the robots, neglecting any security issues or liabilities that may arise due to lack of security. In this paper, we provide an algorithm for secure key management, and secure communication in an insecure wireless and noisy environment in which the robots operate.
[1]
László Bokor,et al.
Design and Evaluation of a Novel HIP-Based Network Mobility Protocol
,
2008,
J. Networks.
[2]
Stephen T. Kent,et al.
Secure Border Gateway Protocol (S-BGP)
,
2000,
IEEE Journal on Selected Areas in Communications.
[3]
William Stallings,et al.
Cryptography and Network Security: Principles and Practice
,
1998
.
[4]
Douglas R. Stinson.
Cryptography: Theory and Practice, Third Edition
,
2005
.
[5]
Martina Zitterbart,et al.
A Survey of Protocols to Support IP Mobility in Aeronautical Communications
,
2011,
IEEE Communications Surveys & Tutorials.
[6]
Georg Carle,et al.
Behavior and classification of NAT devices and implications for NAT traversal
,
2008,
IEEE Network.
[7]
Francis Dupont,et al.
Mobile IPv6 Operation with IKEv2 and the Revised IPsec Architecture
,
2007,
RFC.