Security and Privacy-Preserving Techniques in Wireless Robotics

The wide gap between the existing security solutions and the actual practical deployment in smart manufacturing, smart home, and remote environments (with respect to wireless robotics) is one of the major reasons why we require novel strategies, mechanisms, architectures and frameworks. Even more, i...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Kumar Tyagi, Amit, Abraham, Ajith, Kaklauskas, A, Sreenath, N, Rekha, Gillala, Malik, Shaveta
Format: Buch
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume 1
creator Kumar Tyagi, Amit
Abraham, Ajith
Kaklauskas, A
Sreenath, N
Rekha, Gillala
Malik, Shaveta
description The wide gap between the existing security solutions and the actual practical deployment in smart manufacturing, smart home, and remote environments (with respect to wireless robotics) is one of the major reasons why we require novel strategies, mechanisms, architectures and frameworks. Even more, it is also important to access and understand the different level of vulnerabilities and attack vectors in Wireless Sensor Network (WSN) and Wireless Robotics. For these reasons, our proposed book provides a platform for the academicians, researchers and industry technocrats to present their security solutions and proof of concepts in wireless robotics. Our proposed book encourages students, researchers, etc., to contribute high quality (unpublished) content with respect to security and privacy aspects in wireless robotics. Few of the features of our book are listed as: This book includes explanation of a secure and dependable Wireless Robotics (WR) architecture, to ensure confidentiality, authentic and availability as a priority. This book includes topics like Blockchain Technology for securing data at end/ server side. This book includes topics on emerging technologies/ networking like Cloud, Edge, Fog, etc., for communicating and storing data (securely). Our proposed work presents various open issues, challenges faced in this era towards wireless robotics (including several future research directions for the future) Several real world's case studies also will be include in our proposed work This proposed books also include a separate chapter for Ethical concerns, i.e., laws for service providers This proposed book also includes a separate chapter for Privacy laws, i.e., laws for service providers. In last, our proposed book includes high quality content to address the security and privacy challenges in wireless sensor networks and wireless robotics. Audience: Academic Researchers, Undergraduate Students, Postgraduate Students and Industry Researchers
doi_str_mv 10.1201/9781003156406
format Book
fullrecord <record><control><sourceid>proquest_askew</sourceid><recordid>TN_cdi_askewsholts_vlebooks_9781000510188</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>EBC7023143</sourcerecordid><originalsourceid>FETCH-LOGICAL-a8905-277ca499d3832e56fae20cc96d0650fec6ef10d00f2461f8287832b3085669d63</originalsourceid><addsrcrecordid>eNqN0T1PwzAQBmAjBAJKR_ZsiCFwtuOPTAiq8iFVooIixsh1HGoaYrDTVP33pE0HunWyTnreO_kOoQsM15gAvkmFxAAUM54AP0D9rgaGAUt5uKmBciESLCgcozNMaYKBsQROUD-Er9YSRpjk9BTdvhm98LZeRarKo7G3jdKreOxNML6x1Wc0MXpW2d-FCZGtog_rTWlCiF7d1NVWh3N0VKgymP727aH3h-Fk8BSPXh6fB3ejWMkUWEyE0CpJ05xKSgzjhTIEtE55DpxBYTQ3BYYcoCAJx4UkUrRwSkEyztOc0x666vqqMDfLMHNlHbKmNFPn5iHb2cD-VuDWXnb2x7v1J-tsw7Spaq_KbHg_EEAoTmgrk07aqnD-Wy2dL_OsVqvS-cKrStvwf8D2PG1suF8MQ7a-7m48a4wP1lWE_gEhbpQu</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>book</recordtype><pqid>EBC7023143</pqid></control><display><type>book</type><title>Security and Privacy-Preserving Techniques in Wireless Robotics</title><source>Taylor &amp; Francis eBooks A-Z</source><creator>Kumar Tyagi, Amit ; Abraham, Ajith ; Kaklauskas, A ; Sreenath, N ; Rekha, Gillala ; Malik, Shaveta</creator><contributor>Abraham, Ajith ; Malik, Shaveta ; Tyagi, Amit Kumar ; Sreenath, N. ; Kaklauskas, A. ; Rekha, Gillala</contributor><creatorcontrib>Kumar Tyagi, Amit ; Abraham, Ajith ; Kaklauskas, A ; Sreenath, N ; Rekha, Gillala ; Malik, Shaveta ; Abraham, Ajith ; Malik, Shaveta ; Tyagi, Amit Kumar ; Sreenath, N. ; Kaklauskas, A. ; Rekha, Gillala</creatorcontrib><description>The wide gap between the existing security solutions and the actual practical deployment in smart manufacturing, smart home, and remote environments (with respect to wireless robotics) is one of the major reasons why we require novel strategies, mechanisms, architectures and frameworks. Even more, it is also important to access and understand the different level of vulnerabilities and attack vectors in Wireless Sensor Network (WSN) and Wireless Robotics. For these reasons, our proposed book provides a platform for the academicians, researchers and industry technocrats to present their security solutions and proof of concepts in wireless robotics. Our proposed book encourages students, researchers, etc., to contribute high quality (unpublished) content with respect to security and privacy aspects in wireless robotics. Few of the features of our book are listed as: This book includes explanation of a secure and dependable Wireless Robotics (WR) architecture, to ensure confidentiality, authentic and availability as a priority. This book includes topics like Blockchain Technology for securing data at end/ server side. This book includes topics on emerging technologies/ networking like Cloud, Edge, Fog, etc., for communicating and storing data (securely). Our proposed work presents various open issues, challenges faced in this era towards wireless robotics (including several future research directions for the future) Several real world's case studies also will be include in our proposed work This proposed books also include a separate chapter for Ethical concerns, i.e., laws for service providers This proposed book also includes a separate chapter for Privacy laws, i.e., laws for service providers. In last, our proposed book includes high quality content to address the security and privacy challenges in wireless sensor networks and wireless robotics. Audience: Academic Researchers, Undergraduate Students, Postgraduate Students and Industry Researchers</description><edition>1st</edition><identifier>ISBN: 9780367741730</identifier><identifier>ISBN: 0367741733</identifier><identifier>ISBN: 9780367741747</identifier><identifier>ISBN: 0367741741</identifier><identifier>EISBN: 9781000510188</identifier><identifier>EISBN: 1000510174</identifier><identifier>EISBN: 9781003156406</identifier><identifier>EISBN: 1000510182</identifier><identifier>EISBN: 9781000510171</identifier><identifier>EISBN: 1003156401</identifier><identifier>DOI: 10.1201/9781003156406</identifier><identifier>OCLC: 1334105540</identifier><language>eng</language><publisher>Milton: Routledge</publisher><subject>Autonomous robots ; Autonomous robots-Security measures ; COMPUTERSCIENCEnetBASE ; Electrical &amp; Electronic Engineering ; ElectricalEngineeringnetBASE ; ENGnetBASE ; INFORMATIONSCIENCEnetBASE ; Intelligent Systems ; Radio control ; Robotics ; Robotics &amp; Cybernetics ; SCI-TECHnetBASE ; STMnetBASE</subject><creationdate>2022</creationdate><tpages>352</tpages><tpages>338</tpages><tpages>14</tpages><format>352</format><rights>2022 selection and editorial matter, Amit Kumar Tyagi, Ajith Abraham, A. Kaklauskas, N. Sreenath, Gillala Rekha and Shaveta Malik; individual chapters, the contributors</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>306,780,784,786,4041,27924</link.rule.ids></links><search><contributor>Abraham, Ajith</contributor><contributor>Malik, Shaveta</contributor><contributor>Tyagi, Amit Kumar</contributor><contributor>Sreenath, N.</contributor><contributor>Kaklauskas, A.</contributor><contributor>Rekha, Gillala</contributor><creatorcontrib>Kumar Tyagi, Amit</creatorcontrib><creatorcontrib>Abraham, Ajith</creatorcontrib><creatorcontrib>Kaklauskas, A</creatorcontrib><creatorcontrib>Sreenath, N</creatorcontrib><creatorcontrib>Rekha, Gillala</creatorcontrib><creatorcontrib>Malik, Shaveta</creatorcontrib><title>Security and Privacy-Preserving Techniques in Wireless Robotics</title><description>The wide gap between the existing security solutions and the actual practical deployment in smart manufacturing, smart home, and remote environments (with respect to wireless robotics) is one of the major reasons why we require novel strategies, mechanisms, architectures and frameworks. Even more, it is also important to access and understand the different level of vulnerabilities and attack vectors in Wireless Sensor Network (WSN) and Wireless Robotics. For these reasons, our proposed book provides a platform for the academicians, researchers and industry technocrats to present their security solutions and proof of concepts in wireless robotics. Our proposed book encourages students, researchers, etc., to contribute high quality (unpublished) content with respect to security and privacy aspects in wireless robotics. Few of the features of our book are listed as: This book includes explanation of a secure and dependable Wireless Robotics (WR) architecture, to ensure confidentiality, authentic and availability as a priority. This book includes topics like Blockchain Technology for securing data at end/ server side. This book includes topics on emerging technologies/ networking like Cloud, Edge, Fog, etc., for communicating and storing data (securely). Our proposed work presents various open issues, challenges faced in this era towards wireless robotics (including several future research directions for the future) Several real world's case studies also will be include in our proposed work This proposed books also include a separate chapter for Ethical concerns, i.e., laws for service providers This proposed book also includes a separate chapter for Privacy laws, i.e., laws for service providers. In last, our proposed book includes high quality content to address the security and privacy challenges in wireless sensor networks and wireless robotics. Audience: Academic Researchers, Undergraduate Students, Postgraduate Students and Industry Researchers</description><subject>Autonomous robots</subject><subject>Autonomous robots-Security measures</subject><subject>COMPUTERSCIENCEnetBASE</subject><subject>Electrical &amp; Electronic Engineering</subject><subject>ElectricalEngineeringnetBASE</subject><subject>ENGnetBASE</subject><subject>INFORMATIONSCIENCEnetBASE</subject><subject>Intelligent Systems</subject><subject>Radio control</subject><subject>Robotics</subject><subject>Robotics &amp; Cybernetics</subject><subject>SCI-TECHnetBASE</subject><subject>STMnetBASE</subject><isbn>9780367741730</isbn><isbn>0367741733</isbn><isbn>9780367741747</isbn><isbn>0367741741</isbn><isbn>9781000510188</isbn><isbn>1000510174</isbn><isbn>9781003156406</isbn><isbn>1000510182</isbn><isbn>9781000510171</isbn><isbn>1003156401</isbn><fulltext>true</fulltext><rsrctype>book</rsrctype><creationdate>2022</creationdate><recordtype>book</recordtype><sourceid/><recordid>eNqN0T1PwzAQBmAjBAJKR_ZsiCFwtuOPTAiq8iFVooIixsh1HGoaYrDTVP33pE0HunWyTnreO_kOoQsM15gAvkmFxAAUM54AP0D9rgaGAUt5uKmBciESLCgcozNMaYKBsQROUD-Er9YSRpjk9BTdvhm98LZeRarKo7G3jdKreOxNML6x1Wc0MXpW2d-FCZGtog_rTWlCiF7d1NVWh3N0VKgymP727aH3h-Fk8BSPXh6fB3ejWMkUWEyE0CpJ05xKSgzjhTIEtE55DpxBYTQ3BYYcoCAJx4UkUrRwSkEyztOc0x666vqqMDfLMHNlHbKmNFPn5iHb2cD-VuDWXnb2x7v1J-tsw7Spaq_KbHg_EEAoTmgrk07aqnD-Wy2dL_OsVqvS-cKrStvwf8D2PG1suF8MQ7a-7m48a4wP1lWE_gEhbpQu</recordid><startdate>2022</startdate><enddate>2022</enddate><creator>Kumar Tyagi, Amit</creator><creator>Abraham, Ajith</creator><creator>Kaklauskas, A</creator><creator>Sreenath, N</creator><creator>Rekha, Gillala</creator><creator>Malik, Shaveta</creator><general>Routledge</general><general>CRC Press</general><general>Taylor &amp; Francis Group</general><scope/></search><sort><creationdate>2022</creationdate><title>Security and Privacy-Preserving Techniques in Wireless Robotics</title><author>Kumar Tyagi, Amit ; Abraham, Ajith ; Kaklauskas, A ; Sreenath, N ; Rekha, Gillala ; Malik, Shaveta</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a8905-277ca499d3832e56fae20cc96d0650fec6ef10d00f2461f8287832b3085669d63</frbrgroupid><rsrctype>books</rsrctype><prefilter>books</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Autonomous robots</topic><topic>Autonomous robots-Security measures</topic><topic>COMPUTERSCIENCEnetBASE</topic><topic>Electrical &amp; Electronic Engineering</topic><topic>ElectricalEngineeringnetBASE</topic><topic>ENGnetBASE</topic><topic>INFORMATIONSCIENCEnetBASE</topic><topic>Intelligent Systems</topic><topic>Radio control</topic><topic>Robotics</topic><topic>Robotics &amp; Cybernetics</topic><topic>SCI-TECHnetBASE</topic><topic>STMnetBASE</topic><toplevel>online_resources</toplevel><creatorcontrib>Kumar Tyagi, Amit</creatorcontrib><creatorcontrib>Abraham, Ajith</creatorcontrib><creatorcontrib>Kaklauskas, A</creatorcontrib><creatorcontrib>Sreenath, N</creatorcontrib><creatorcontrib>Rekha, Gillala</creatorcontrib><creatorcontrib>Malik, Shaveta</creatorcontrib></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Kumar Tyagi, Amit</au><au>Abraham, Ajith</au><au>Kaklauskas, A</au><au>Sreenath, N</au><au>Rekha, Gillala</au><au>Malik, Shaveta</au><au>Abraham, Ajith</au><au>Malik, Shaveta</au><au>Tyagi, Amit Kumar</au><au>Sreenath, N.</au><au>Kaklauskas, A.</au><au>Rekha, Gillala</au><format>book</format><genre>book</genre><ristype>BOOK</ristype><btitle>Security and Privacy-Preserving Techniques in Wireless Robotics</btitle><date>2022</date><risdate>2022</risdate><volume>1</volume><isbn>9780367741730</isbn><isbn>0367741733</isbn><isbn>9780367741747</isbn><isbn>0367741741</isbn><eisbn>9781000510188</eisbn><eisbn>1000510174</eisbn><eisbn>9781003156406</eisbn><eisbn>1000510182</eisbn><eisbn>9781000510171</eisbn><eisbn>1003156401</eisbn><abstract>The wide gap between the existing security solutions and the actual practical deployment in smart manufacturing, smart home, and remote environments (with respect to wireless robotics) is one of the major reasons why we require novel strategies, mechanisms, architectures and frameworks. Even more, it is also important to access and understand the different level of vulnerabilities and attack vectors in Wireless Sensor Network (WSN) and Wireless Robotics. For these reasons, our proposed book provides a platform for the academicians, researchers and industry technocrats to present their security solutions and proof of concepts in wireless robotics. Our proposed book encourages students, researchers, etc., to contribute high quality (unpublished) content with respect to security and privacy aspects in wireless robotics. Few of the features of our book are listed as: This book includes explanation of a secure and dependable Wireless Robotics (WR) architecture, to ensure confidentiality, authentic and availability as a priority. This book includes topics like Blockchain Technology for securing data at end/ server side. This book includes topics on emerging technologies/ networking like Cloud, Edge, Fog, etc., for communicating and storing data (securely). Our proposed work presents various open issues, challenges faced in this era towards wireless robotics (including several future research directions for the future) Several real world's case studies also will be include in our proposed work This proposed books also include a separate chapter for Ethical concerns, i.e., laws for service providers This proposed book also includes a separate chapter for Privacy laws, i.e., laws for service providers. In last, our proposed book includes high quality content to address the security and privacy challenges in wireless sensor networks and wireless robotics. Audience: Academic Researchers, Undergraduate Students, Postgraduate Students and Industry Researchers</abstract><cop>Milton</cop><pub>Routledge</pub><doi>10.1201/9781003156406</doi><oclcid>1334105540</oclcid><tpages>352</tpages><tpages>338</tpages><tpages>14</tpages><edition>1st</edition></addata></record>
fulltext fulltext
identifier ISBN: 9780367741730
ispartof
issn
language eng
recordid cdi_askewsholts_vlebooks_9781000510188
source Taylor & Francis eBooks A-Z
subjects Autonomous robots
Autonomous robots-Security measures
COMPUTERSCIENCEnetBASE
Electrical & Electronic Engineering
ElectricalEngineeringnetBASE
ENGnetBASE
INFORMATIONSCIENCEnetBASE
Intelligent Systems
Radio control
Robotics
Robotics & Cybernetics
SCI-TECHnetBASE
STMnetBASE
title Security and Privacy-Preserving Techniques in Wireless Robotics
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-13T00%3A09%3A35IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_askew&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=book&rft.btitle=Security%20and%20Privacy-Preserving%20Techniques%20in%20Wireless%20Robotics&rft.au=Kumar%20Tyagi,%20Amit&rft.date=2022&rft.volume=1&rft.isbn=9780367741730&rft.isbn_list=0367741733&rft.isbn_list=9780367741747&rft.isbn_list=0367741741&rft_id=info:doi/10.1201/9781003156406&rft_dat=%3Cproquest_askew%3EEBC7023143%3C/proquest_askew%3E%3Curl%3E%3C/url%3E&rft.eisbn=9781000510188&rft.eisbn_list=1000510174&rft.eisbn_list=9781003156406&rft.eisbn_list=1000510182&rft.eisbn_list=9781000510171&rft.eisbn_list=1003156401&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=EBC7023143&rft_id=info:pmid/&rfr_iscdi=true