Table Of Contenti
Security and Privacy- Preserving
Techniques in Wireless Robotics
ii
iii
Security and Privacy- Preserving
Techniques in Wireless Robotics
Edited by
Amit Kumar Tyagi, Ajith Abraham, A. Kaklauskas,
N. Sreenath, Gillala Rekha and Shaveta Malik
iv
First edition published 2022
by CRC Press
6000 Broken Sound Parkway NW, Suite 300, Boca Raton, FL 33487- 2742
and by CRC Press
2 Park Square, Milton Park, Abingdon, Oxon, OX14 4RN
© 2022 selection and editorial matter, Amit Kumar Tyagi, Ajith Abraham, A. Kaklauskas, N. Sreenath,
Gillala Rekha and Shaveta Malik; individual chapters, the contributors
First edition published by CRC Press 2022
CRC Press is an imprint of Taylor & Francis Group, LLC
Reasonable efforts have been made to publish reliable data and information, but the author and publisher
cannot assume responsibility for the validity of all materials or the consequences of their use. The authors
and publishers have attempted to trace the copyright holders of all material reproduced in this publication and
apologize to copyright holders if permission to publish in this form has not been obtained. If any copyright
material has not been acknowledged please write and let us know so we may rectify in any future reprint.
Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced,
transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter
invented, including photocopying, microfilming, and recording, or in any information storage or retrieval
system, without written permission from the publishers.
For permission to photocopy or use material electronically from this work, access www.copyri ght.com or
contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923, 978- 750-
8400. For works that are not available on CCC please contact mpkbookspermissions@tandf.co.uk
Trademark notice: Product or corporate names may be trademarks or registered trademarks and are used
only for identification and explanation without intent to infringe.
Library of Congress Cataloging-in-Publication Data
Names: Kumar, Tyagi Amit, editor.
Title: Security and privacy-preserving techniques in wireless robotics / edited by Amit Kumar Tyagi,
Ajith Abraham, A. Kaklauskas, N. Sreenath, Gillala Rekha, Shaveta Malik.
Description: First edition. | Boca Raton : CRC Press, 2022. |
Includes bibliographical references and index. |
Summary: “The wide gap between the existing security solutions and the actual practical deployment in
smart manufacturing, smart home, and remote environments (with respect to wireless robotics) is one of
the major reasons why we require novel strategies, mechanisms, architectures and frameworks. Even more,
it is also important to access and understand the different level of vulnerabilities and attack vectors in
Wireless Sensor Network (WSN) and Wireless Robotics. For these reasons, our proposed book provides a
platform for the academicians, researchers and industry technocrats to present their security solutions and
proof of concepts in wireless robotics”– Provided by publisher.
Identifiers: LCCN 2021031747 (print) | LCCN 2021031748 (ebook) |
ISBN 9780367741730 (hbk) | ISBN 9780367741747 (pbk) | ISBN 9781003156406 (ebook)
Subjects: LCSH: Autonomous robots–Security measures. | Radio control–Security measures.
Classification: LCC TJ211.495 .S43 2022 (print) | LCC TJ211.495 (ebook) | DDC 629.8/92–dc23
LC record available at https://lccn.loc.gov/2021031747
LC ebook record available at https://lccn.loc.gov/2021031748
ISBN: 978- 0- 367- 74173- 0 (hbk)
ISBN: 978- 0- 367- 74174- 7 (pbk)
ISBN: 978- 1- 003- 15640- 6 (ebk)
DOI: 10.1201/ 9781003156406
Typeset in Times
by Newgen Publishing UK
v
Contents
Preface .......................................................................................................................ix
Editors .......................................................................................................................xi
List of Contributors .................................................................................................xiii
PART 1 Introduction and Background
Chapter 1 Software Robotics Driven Goods and Services Tax
Reconciliation and Matching................................................................3
Akshay Raghavan, Kathiravan Srinivasan,
Ganapathy Pattukandan Ganapathy, and
Aswani Kumar Cherukuri
Chapter 2 Enhanced Intrusion Detection Response and Mitigating
Attacks Using Umpiring Security Models
for Wireless Sensor Networks ............................................................41
A. Kathirvel, D. Sudha, S. Navaneethan, and M. Subramaniam
PART 2 Internal Structure of Wireless Robotics
Chapter 3 Cache Memory Design for Single Bit Architecture for Core ITM
Processors ...........................................................................................57
Reeya Agrawal, Neetu Faujdar, and Mohommad Zubair Khan
Chapter 4 A Simulation: Hardware- Based Study of Electric
Vehicle Charging Station Using Solar- PhotoVoltaic
Energy in Gujarat ...............................................................................81
Jeet Dhoriyani, Renison Macwan, and Dr. Chetan Upadhyay
Chapter 5 Comparison of Spiral and Metamaterial Inspired Patch
Antenna for 4G LTE Applications ......................................................91
Tushar P. Dave, Nita T. Dave, and Jagdish M. Rathod
v
vi
vi Contents
Chapter 6 Comparative Analysis for Moving Object Detection in
Vibrant Background Using SVM, LS SVM and Random
Forest Classifier ................................................................................103
Hiren Patel and Mehul C. Parikh
PART 3 Threat Analysis in Wireless Robotics with
Recommended Solutions
Chapter 7 A Survey on Distributed Denial of Service Attack Detection ..........117
Rajathi C. and Rukmani P.
Chapter 8 Emerging Trends in Power Plants with Digital Solutions ................133
Rajarsi Ray and Rupal Desai
PART 4 Challenges and Opportunities towards
Security and Privacy Concerns in
Wireless Robotics
Chapter 9 Recent Trends in Internet of Things, Challenges and
Opportunities ....................................................................................149
S. Kannadhasan and Dr. R. Nagarajan
Chapter 10 Privacy Breaches through Cyber Vulnerabilities:
Critical Issues, Open Challenges, and Possible
Countermeasures for the Future .......................................................163
Dr. Aswathy S.U. and Amit Kumar Tyagi
Chapter 11 Machine Learning Algorithms for Bitcoin Price Prediction ............211
Prasannavenkatesan Theerthagiri
Chapter 12 Blockchain Enabled Product Tracking for Supply
Chain Management...........................................................................225
Kaushal Shah
Chapter 13 Role of Robots in Health Care Monitoring System .........................235
Dr. G. Revathy and N. S. Kavitha
vii
Contents vii
PART 5 Future Possible Uses
Chapter 14 Remote User Authentication Using Camellia Encryption
for Network- Based Applications ......................................................255
Nithishma A., Aayush Vijayan, Diya Nanda, Ch. Aswani Kumar,
Sumaiya Thaseen, and Amir Ahmad
Chapter 15 An Efficient Node Localization in Wireless Sensor
Networks Using a Hybrid Metaheuristics Optimization Model .......281
Panimalar Kathiroli and Kanmani, S.
Chapter 16 Machine Learning Based IoT Models and Analysis ........................325
L. Jani Anbarasi, Modigari Narendra, and
S. Sathiya Narayanan
Index ......................................................................................................................335
viii
ix
Preface
Wireless Robotics (WRs) have found widespread applications in modern critical infra-
structure, such as smart grids, smart gas and smart water supply distribution systems,
intelligent transportation systems and so on. Nevertheless, analysis and synthesis of
DNSs are generally difficult and traditional information processing technologies may
fail or be impractical to tackle several security and privacy related issues of DNSs
due to their large scale, increased interconnectivity, real- time and sensitive infor-
mation exchange, intimate interaction of cyber and physical components, open and
unprotected network connection and communication. For example, because of the
tight interplay between cyber and physical spaces, the negative impacts of malicious
attacks on DNSs can be imposed on not only the cyber space but also the physical
systems. A sophisticated adversary can learn sensitive local information or local oper-
ation status of spatially deployed nodes/a gents in the physical space by eavesdropping
transmitted and exchanged data packets over certain wireless transmission links. As a
result, there is an urgent need for innovative secure and privacy-p reserving techniques
to adequately explore the independence and interaction of physical and communi-
cation infrastructure of DNSs such that performance analysis and control design
of DNSs can be achieved with unprecedented performance and resource utilization
efficiency, high reliability and resilience, desired security and privacy requirements,
overcoming the limitations of traditional information processing tools.
This book aims to advance security, privacy technologies and methodologies
at a large- scale Wireless Robotics and further promote research activities (i.e., in
distributed intelligent sensing, estimation, detection, optimization and control for pre-
serving desired security and privacy requirements). This proposed book seeks ori-
ginal theory- and application- driven studies to address some emerging issues and
challenges from the perspective of distributed secure and privacy-p reserving infor-
mation processing and their applications to areas, such as wireless robotics, wireless
sensor networks, smart grids, manufacturing, intelligent transportation systems,
healthcare, and so on.
In last, researchers will be able to select their research problems (to do their
research) from future research directions section from our included section in this
book. In conclusion, we want to thank our God, family members, teachers, friends
and last but not least, all the contributing authors from the bottom of our hearts for
helping us complete this book before the deadline.
Really, kudos to all.
Amit Kumar Tyagi
Ajit Abraham
A. Kaklauskas
N. Sreenath
Gillala Rekha
Shaveta Malik
ix