i Security and Privacy- Preserving Techniques in Wireless Robotics ii iii Security and Privacy- Preserving Techniques in Wireless Robotics Edited by Amit Kumar Tyagi, Ajith Abraham, A. Kaklauskas, N. Sreenath, Gillala Rekha and Shaveta Malik iv First edition published 2022 by CRC Press 6000 Broken Sound Parkway NW, Suite 300, Boca Raton, FL 33487- 2742 and by CRC Press 2 Park Square, Milton Park, Abingdon, Oxon, OX14 4RN © 2022 selection and editorial matter, Amit Kumar Tyagi, Ajith Abraham, A. Kaklauskas, N. Sreenath, Gillala Rekha and Shaveta Malik; individual chapters, the contributors First edition published by CRC Press 2022 CRC Press is an imprint of Taylor & Francis Group, LLC Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot assume responsibility for the validity of all materials or the consequences of their use. The authors and publishers have attempted to trace the copyright holders of all material reproduced in this publication and apologize to copyright holders if permission to publish in this form has not been obtained. If any copyright material has not been acknowledged please write and let us know so we may rectify in any future reprint. Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, microfilming, and recording, or in any information storage or retrieval system, without written permission from the publishers. For permission to photocopy or use material electronically from this work, access www.copyri ght.com or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923, 978- 750- 8400. For works that are not available on CCC please contact [email protected] Trademark notice: Product or corporate names may be trademarks or registered trademarks and are used only for identification and explanation without intent to infringe. Library of Congress Cataloging-in-Publication Data Names: Kumar, Tyagi Amit, editor. Title: Security and privacy-preserving techniques in wireless robotics / edited by Amit Kumar Tyagi, Ajith Abraham, A. Kaklauskas, N. Sreenath, Gillala Rekha, Shaveta Malik. Description: First edition. | Boca Raton : CRC Press, 2022. | Includes bibliographical references and index. | Summary: “The wide gap between the existing security solutions and the actual practical deployment in smart manufacturing, smart home, and remote environments (with respect to wireless robotics) is one of the major reasons why we require novel strategies, mechanisms, architectures and frameworks. Even more, it is also important to access and understand the different level of vulnerabilities and attack vectors in Wireless Sensor Network (WSN) and Wireless Robotics. For these reasons, our proposed book provides a platform for the academicians, researchers and industry technocrats to present their security solutions and proof of concepts in wireless robotics”– Provided by publisher. Identifiers: LCCN 2021031747 (print) | LCCN 2021031748 (ebook) | ISBN 9780367741730 (hbk) | ISBN 9780367741747 (pbk) | ISBN 9781003156406 (ebook) Subjects: LCSH: Autonomous robots–Security measures. | Radio control–Security measures. Classification: LCC TJ211.495 .S43 2022 (print) | LCC TJ211.495 (ebook) | DDC 629.8/92–dc23 LC record available at https://lccn.loc.gov/2021031747 LC ebook record available at https://lccn.loc.gov/2021031748 ISBN: 978- 0- 367- 74173- 0 (hbk) ISBN: 978- 0- 367- 74174- 7 (pbk) ISBN: 978- 1- 003- 15640- 6 (ebk) DOI: 10.1201/ 9781003156406 Typeset in Times by Newgen Publishing UK v Contents Preface .......................................................................................................................ix Editors .......................................................................................................................xi List of Contributors .................................................................................................xiii PART 1 Introduction and Background Chapter 1 Software Robotics Driven Goods and Services Tax Reconciliation and Matching................................................................3 Akshay Raghavan, Kathiravan Srinivasan, Ganapathy Pattukandan Ganapathy, and Aswani Kumar Cherukuri Chapter 2 Enhanced Intrusion Detection Response and Mitigating Attacks Using Umpiring Security Models for Wireless Sensor Networks ............................................................41 A. Kathirvel, D. Sudha, S. Navaneethan, and M. Subramaniam PART 2 Internal Structure of Wireless Robotics Chapter 3 Cache Memory Design for Single Bit Architecture for Core ITM Processors ...........................................................................................57 Reeya Agrawal, Neetu Faujdar, and Mohommad Zubair Khan Chapter 4 A Simulation: Hardware- Based Study of Electric Vehicle Charging Station Using Solar- PhotoVoltaic Energy in Gujarat ...............................................................................81 Jeet Dhoriyani, Renison Macwan, and Dr. Chetan Upadhyay Chapter 5 Comparison of Spiral and Metamaterial Inspired Patch Antenna for 4G LTE Applications ......................................................91 Tushar P. Dave, Nita T. Dave, and Jagdish M. Rathod v vi vi Contents Chapter 6 Comparative Analysis for Moving Object Detection in Vibrant Background Using SVM, LS SVM and Random Forest Classifier ................................................................................103 Hiren Patel and Mehul C. Parikh PART 3 Threat Analysis in Wireless Robotics with Recommended Solutions Chapter 7 A Survey on Distributed Denial of Service Attack Detection ..........117 Rajathi C. and Rukmani P. Chapter 8 Emerging Trends in Power Plants with Digital Solutions ................133 Rajarsi Ray and Rupal Desai PART 4 Challenges and Opportunities towards Security and Privacy Concerns in Wireless Robotics Chapter 9 Recent Trends in Internet of Things, Challenges and Opportunities ....................................................................................149 S. Kannadhasan and Dr. R. Nagarajan Chapter 10 Privacy Breaches through Cyber Vulnerabilities: Critical Issues, Open Challenges, and Possible Countermeasures for the Future .......................................................163 Dr. Aswathy S.U. and Amit Kumar Tyagi Chapter 11 Machine Learning Algorithms for Bitcoin Price Prediction ............211 Prasannavenkatesan Theerthagiri Chapter 12 Blockchain Enabled Product Tracking for Supply Chain Management...........................................................................225 Kaushal Shah Chapter 13 Role of Robots in Health Care Monitoring System .........................235 Dr. G. Revathy and N. S. Kavitha vii Contents vii PART 5 Future Possible Uses Chapter 14 Remote User Authentication Using Camellia Encryption for Network- Based Applications ......................................................255 Nithishma A., Aayush Vijayan, Diya Nanda, Ch. Aswani Kumar, Sumaiya Thaseen, and Amir Ahmad Chapter 15 An Efficient Node Localization in Wireless Sensor Networks Using a Hybrid Metaheuristics Optimization Model .......281 Panimalar Kathiroli and Kanmani, S. Chapter 16 Machine Learning Based IoT Models and Analysis ........................325 L. Jani Anbarasi, Modigari Narendra, and S. Sathiya Narayanan Index ......................................................................................................................335 viii ix Preface Wireless Robotics (WRs) have found widespread applications in modern critical infra- structure, such as smart grids, smart gas and smart water supply distribution systems, intelligent transportation systems and so on. Nevertheless, analysis and synthesis of DNSs are generally difficult and traditional information processing technologies may fail or be impractical to tackle several security and privacy related issues of DNSs due to their large scale, increased interconnectivity, real- time and sensitive infor- mation exchange, intimate interaction of cyber and physical components, open and unprotected network connection and communication. For example, because of the tight interplay between cyber and physical spaces, the negative impacts of malicious attacks on DNSs can be imposed on not only the cyber space but also the physical systems. A sophisticated adversary can learn sensitive local information or local oper- ation status of spatially deployed nodes/a gents in the physical space by eavesdropping transmitted and exchanged data packets over certain wireless transmission links. As a result, there is an urgent need for innovative secure and privacy-p reserving techniques to adequately explore the independence and interaction of physical and communi- cation infrastructure of DNSs such that performance analysis and control design of DNSs can be achieved with unprecedented performance and resource utilization efficiency, high reliability and resilience, desired security and privacy requirements, overcoming the limitations of traditional information processing tools. This book aims to advance security, privacy technologies and methodologies at a large- scale Wireless Robotics and further promote research activities (i.e., in distributed intelligent sensing, estimation, detection, optimization and control for pre- serving desired security and privacy requirements). This proposed book seeks ori- ginal theory- and application- driven studies to address some emerging issues and challenges from the perspective of distributed secure and privacy-p reserving infor- mation processing and their applications to areas, such as wireless robotics, wireless sensor networks, smart grids, manufacturing, intelligent transportation systems, healthcare, and so on. In last, researchers will be able to select their research problems (to do their research) from future research directions section from our included section in this book. In conclusion, we want to thank our God, family members, teachers, friends and last but not least, all the contributing authors from the bottom of our hearts for helping us complete this book before the deadline. Really, kudos to all. Amit Kumar Tyagi Ajit Abraham A. Kaklauskas N. Sreenath Gillala Rekha Shaveta Malik ix