基于LADA-C-RNN和S-Fuzzy的机器人云自动化攻击检测和安全机器人命令验证

IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS
Basava Ramanjaneyulu Gudivaka, Rajya Lakshmi Gudivaka, Raj Kumar Gudivaka, Dinesh Kumar Reddy Basani, Sri Harsha Grandhi, Faheem Khan
{"title":"基于LADA-C-RNN和S-Fuzzy的机器人云自动化攻击检测和安全机器人命令验证","authors":"Basava Ramanjaneyulu Gudivaka,&nbsp;Rajya Lakshmi Gudivaka,&nbsp;Raj Kumar Gudivaka,&nbsp;Dinesh Kumar Reddy Basani,&nbsp;Sri Harsha Grandhi,&nbsp;Faheem Khan","doi":"10.1002/ett.70115","DOIUrl":null,"url":null,"abstract":"<div>\n \n <p>The rise of digital technology and Artificial Intelligence (AI) has led to the increased use of smart robots in various sectors. However, security and trust are significant concerns about deploying robots in critical infrastructures. Therefore, a secure and reliable robotic command control system is essential for successful robot integration. None of the prevailing systems focused on attack prediction during cloud-based robot control and data processing. Hence, this paper proposes a secure model called RCA-assisted attack detection and robotic command verification using LADA-C-RNN and S-Fuzzy. The robot controller is initially registered using the user ID and password in the cloud application. During login, the SCTDA is used to verify the robot controller's authority. Then, the robot controller's task is subjected to the attack detection phase. In the attack detection phase, the dataset is initially gathered and preprocessed. Thereafter, the temporal pattern analysis is done, followed by feature extraction. Subsequently, the optimal features are selected via GMJFOA. Then, the selected features are inputted to the LADA-C-RNN, which performs attack detection. Next, the normal data is fed into the traffic prioritization. Then, the prioritized tasks are inputted to the robot command data verification, thus increasing the security level. Finally, the proposed approach had minimum latency with 98.42% accuracy.</p>\n </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 4","pages":""},"PeriodicalIF":2.5000,"publicationDate":"2025-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Robotic Cloud Automation-Enabled Attack Detection and Secure Robotic Command Verification Using LADA-C-RNN and S-Fuzzy\",\"authors\":\"Basava Ramanjaneyulu Gudivaka,&nbsp;Rajya Lakshmi Gudivaka,&nbsp;Raj Kumar Gudivaka,&nbsp;Dinesh Kumar Reddy Basani,&nbsp;Sri Harsha Grandhi,&nbsp;Faheem Khan\",\"doi\":\"10.1002/ett.70115\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div>\\n \\n <p>The rise of digital technology and Artificial Intelligence (AI) has led to the increased use of smart robots in various sectors. However, security and trust are significant concerns about deploying robots in critical infrastructures. Therefore, a secure and reliable robotic command control system is essential for successful robot integration. None of the prevailing systems focused on attack prediction during cloud-based robot control and data processing. Hence, this paper proposes a secure model called RCA-assisted attack detection and robotic command verification using LADA-C-RNN and S-Fuzzy. The robot controller is initially registered using the user ID and password in the cloud application. During login, the SCTDA is used to verify the robot controller's authority. Then, the robot controller's task is subjected to the attack detection phase. In the attack detection phase, the dataset is initially gathered and preprocessed. Thereafter, the temporal pattern analysis is done, followed by feature extraction. Subsequently, the optimal features are selected via GMJFOA. Then, the selected features are inputted to the LADA-C-RNN, which performs attack detection. Next, the normal data is fed into the traffic prioritization. Then, the prioritized tasks are inputted to the robot command data verification, thus increasing the security level. Finally, the proposed approach had minimum latency with 98.42% accuracy.</p>\\n </div>\",\"PeriodicalId\":23282,\"journal\":{\"name\":\"Transactions on Emerging Telecommunications Technologies\",\"volume\":\"36 4\",\"pages\":\"\"},\"PeriodicalIF\":2.5000,\"publicationDate\":\"2025-04-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Transactions on Emerging Telecommunications Technologies\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://onlinelibrary.wiley.com/doi/10.1002/ett.70115\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"TELECOMMUNICATIONS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Transactions on Emerging Telecommunications Technologies","FirstCategoryId":"94","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/ett.70115","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"TELECOMMUNICATIONS","Score":null,"Total":0}
引用次数: 0

摘要

数字技术和人工智能(AI)的兴起导致智能机器人在各个领域的使用增加。然而,安全和信任是在关键基础设施中部署机器人的重要问题。因此,一个安全可靠的机器人指挥控制系统是机器人集成成功的关键。在基于云的机器人控制和数据处理过程中,主流系统都没有关注攻击预测。因此,本文提出了一种基于LADA-C-RNN和S-Fuzzy的rca辅助攻击检测和机器人命令验证的安全模型。机器人控制器最初使用云应用程序中的用户ID和密码进行注册。在登录过程中,SCTDA用于验证机器人控制器的权限。然后,机器人控制器的任务进入攻击检测阶段。在攻击检测阶段,首先收集数据集并进行预处理。然后,进行时间模式分析,然后进行特征提取。然后,通过GMJFOA算法选择最优特征。然后,将选择的特征输入到LADA-C-RNN, LADA-C-RNN进行攻击检测。接下来,将正常数据输入到流量优先级中。然后将优先任务输入到机器人命令数据验证中,从而提高了安全级别。最后,该方法具有最小的延迟,准确率为98.42%。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Robotic Cloud Automation-Enabled Attack Detection and Secure Robotic Command Verification Using LADA-C-RNN and S-Fuzzy

The rise of digital technology and Artificial Intelligence (AI) has led to the increased use of smart robots in various sectors. However, security and trust are significant concerns about deploying robots in critical infrastructures. Therefore, a secure and reliable robotic command control system is essential for successful robot integration. None of the prevailing systems focused on attack prediction during cloud-based robot control and data processing. Hence, this paper proposes a secure model called RCA-assisted attack detection and robotic command verification using LADA-C-RNN and S-Fuzzy. The robot controller is initially registered using the user ID and password in the cloud application. During login, the SCTDA is used to verify the robot controller's authority. Then, the robot controller's task is subjected to the attack detection phase. In the attack detection phase, the dataset is initially gathered and preprocessed. Thereafter, the temporal pattern analysis is done, followed by feature extraction. Subsequently, the optimal features are selected via GMJFOA. Then, the selected features are inputted to the LADA-C-RNN, which performs attack detection. Next, the normal data is fed into the traffic prioritization. Then, the prioritized tasks are inputted to the robot command data verification, thus increasing the security level. Finally, the proposed approach had minimum latency with 98.42% accuracy.

求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
CiteScore
8.90
自引率
13.90%
发文量
249
期刊介绍: ransactions on Emerging Telecommunications Technologies (ETT), formerly known as European Transactions on Telecommunications (ETT), has the following aims: - to attract cutting-edge publications from leading researchers and research groups around the world - to become a highly cited source of timely research findings in emerging fields of telecommunications - to limit revision and publication cycles to a few months and thus significantly increase attractiveness to publish - to become the leading journal for publishing the latest developments in telecommunications
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信