Research Article
BibTex RIS Cite

Otonom mobi̇l robotların güvenli̇ veri̇ i̇leti̇mi̇ içi̇n hi̇bri̇t şi̇freleme yaklaşımı

Year 2023, Volume: 15 Issue: 2, 64 - 72, 13.09.2023
https://doi.org/10.55974/utbd.1311229

Abstract

Günümüzde teknolojik gelişmelerin sürekli ilerlemesiyle birlikte otonom ve yarı otonom araçlar; kişisel ve ticari taşımacılık, tarım, inşaat ve madencilik, araştırma ve keşif gibi birçok alanda süreçleri kolaylaştırmaktadır. Bu araçlar arasında fabrikalarda sıklıkla tercih edilen otonom mobil robotlar (Autonomous Mobile Robots, AMR) bulunmaktadır. AMR'lerin tercih edilmesinin sebepleri arasında birincisi, kullanıldığı alanlarda insan gücünün yetersiz olduğu durumlardır. İkinci olarak, bu robotlar, çalışanların sağlığını tehdit edebilecek riskli durumları ortadan kaldırabilir. Ayrıca, AMR'ler insan gücünden tasarruf sağlama potansiyeli de taşımaktadır. Bu çalışmada, kablosuz haberleşme teknolojileri kullanan AMR'lerin veri güvenliğinin hibrit bir şifreleme yöntemi kullanılarak sağlanması amaçlanmıştır. Asimetrik şifreleme yönteminin güvenlik performansı ve simetrik şifreleme yönteminin hızlı iletişim üstünlükleri, AMR'ler için her iki şifreleme yönteminin birlikte kullanılmasını zorunlu kılmıştır. Hibrit şifreleme yaklaşımında temel olarak asimetrik şifreleme yöntemi Elliptic Curve Cryptography (ECC) ile simetrik şifreleme yöntemi Advanced Encryption Standard (AES) birlikte kullanılmıştır. ECC şifreleme yönteminin temelinde oluşturulan dijital imzalama yöntemi olan ECDSA (Elliptic Curve Digital Signature Algorithm) referans alınarak kullanılmıştır. AES şifreleme yönteminde ise şifrelemenin yanında doğrulama da yapıldığı için GCM (Galois/Counter Mode) tercih edilmiştir. Bu çalışmada birbirleriyle veya kontrolcü sistemle haberleşen ve veri aktarım görevini üstlenen AMR'ler, Python programlama dili aracılığıyla ECDSA-AES/GCM hibrit şifreleme yöntemi kullanılarak şifrelenmiş ve performansı değerlendirilmiştir. Bu sayede kablosuz iletişim sırasında olası bir veri sızıntısı durumunda iletilen verinin, gizliliğinin ve bütünlüğünün korunması incelenecektir. Sonuç olarak önerilen bu yöntem ile kablosuz haberleşme teknolojileri kullanan otonom mobil robotlar için veri güvenliği açısından önemli bir adım sağlaması hedeflenmektedir.

References

  • Işık A.H., Çetin Ö. Multifunctional and Low Cost Autonomous Mobile Robot. Gazi Journal of Engineering Sciences, 6(2), 105-110, 2020.
  • Siegwart R, Nourbakhsh I.R., Introduction to Autonomous mobile robots. The MIT Press, USA, 2004.
  • Jaulin L. Mobile robotics. ISTE Press Elsevier, USA, 2007.
  • To AWK, Paul G, Liu D. A comprehensive approach to real-time fault diagnosis during automatic grit-blasting operation by autonomous industrial robots. Robotics and Computer-Integrated Manufacturing, 49(1), 13-23, 2018.
  • Intel. Otonom Mobil Robot (AMR) Genel Bakış. http://www.intel.com.tr (Erişim Tarihi: 22.05.2023).
  • Milvus Robotics. Otonom Mobil Robotlar- AGV- AMR. http://www.milvusrobotics.com/tr/blog (Erişim Tarihi: 22.05.2023).
  • Optimak Optimum STU. Otonom Mobil Robot Nedir? http://www.optimak.com.tr/otonom-mobil-robot-nedir/ (Erişim Tarihi: 22.05.2023).
  • Advanced Motion Controls. Otonom Mobil Robotlar için Motor Kontrolörleri. http://www.a-m-c.com (Erişim Tarihi: 22.05.2023).
  • TechCrunch. Erişim Tarihi: 2.06.2023. http://techcrunch.com/2022/04/12/aethon-robots-hospitals-hijacks/ [10] The Verge. Erişim Tarihi: 2.06.2023. https://www.theverge.com/2022/6/21/23177756/amazon-warehouse-robots-proteus-autonomous-cart-delivery
  • Menezes AJ, van Oorschot PC, Vanstone SA. Handbook of applied cryptography. CRC press, 1996.
  • Rivest RL, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2), 120-126, 1978.
  • Diffie W, Hellman ME. New directions in cryptography. IEEE transactions on Information Theory, 22(6), 644-654, 1976.
  • Wikipedia. Elliptic-curve cryptography. http://en.wikipedia.org/wiki/Elliptic-curve_cryptography (Erişim Tarihi: 24.05.2023).
  • Barker E, Barker W, Burr W, Polk W, Smid M. Recommendation for Key Management – Part 1: General (Revision 4). National Institute of Standards and Technology, 2016.
  • Johnson D, Menezes A, Vanstone S. The Elliptic Curve Digital Signature Algorithm (ECDSA). International Journal of Information Security, 1(1), 36-63, 2001.
  • Ferguson N, Schneier B, Kohno T. Cryptography Engineering: Design Principles and Practical Applications. Wiley Publishing, 2010.
  • Daemen J, Rijmen V. The Design of Rijndael: AES - The Advanced Encryption Standard. Springer, 2002.
  • McGrew D, Viega J. The Galois/Counter Mode of Operation (GCM). National Institute of Standards and Technology, 2004. http://csrc.nist.gov/publications/detail/sp/800-38d/final
  • ElGamal T. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE transactions on information theory, 31(4), 469-472, 1985.
  • Barkan E, Biham E, Keller N. Instant ciphertext-only cryptanalysis of GSM encrypted communication. Journal of cryptology, 21(3), 392-429, 2005.
  • Bernstein DJ. Introduction to post-quantum cryptography. Springer, Berlin, Heidelberg, 2009.
  • Hu H, Ahn GJ, Jorgensen J. Detecting and resolving privacy conflicts for collaborative data sharing in online social networks. Proceedings of the 27th annual computer security applications conference, 103-112, 2011.
  • Li Q, Li Y, Li X. Wireless Communication Security: A Survey. Security and Communication Networks, 2018, 1091493.
  • Rivest RL, Shamir A, Adleman L. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM, 21(2), 120–126, 1978.
  • Daemen J, Rijmen V. The Design of Rijndael: AES - The Advanced Encryption Standard. Springer, 2002.
  • Kamaludin NS, Razak MZA, Abdullah AH. Review of Hybrid Cryptography Algorithms for Secure Multimedia Communication. Journal of Telecommunication, Electronic and Computer Engineering, 6(1), 15–19, 2014.
  • Legrand S, Lackorzynski A. PyCryptodome Documentation. http://www.pycryptodome.org (Erişim Tarihi: 2023).
  • Langley A, Hamburg M. Elliptic Curve Digital Signature Algorithm (ECDSA). http://www.ecdsa.org (Erişim Tarihi: 2023).
  • National Institute of Standards and Technology. Recommended Elliptic Curves for Federal Government Use, 2023.
  • Yıldırım, K., & Demiray, H. E. (2008). Simetrik ve asimetrik şifreleme yöntemlerine metotlar: çirpilmiş ve birleşik akm-vkm. Gazi Üniversitesi Mühendislik Mimarlık Fakültesi Dergisi, 23(3).
  • Zhang, Q. (2021, January). An overview and analysis of hybrid encryption: the combination of symmetric encryption and asymmetric encryption. In 2021 2nd international conference on computing and data science (CDS) (pp. 616-622). IEEE.
  • Alkady, Y., Habib, M. I., & Rizk, R. Y. (2013, December). A new security protocol using hybrid cryptography algorithms. In 2013 9th International Computer Engineering Conference (ICENCO) (pp. 109-115). IEEE.

A Hybrid encryption approach for secure data transmission of autonomous mobile robots

Year 2023, Volume: 15 Issue: 2, 64 - 72, 13.09.2023
https://doi.org/10.55974/utbd.1311229

Abstract

Today, with the continuous advancement of technological developments, autonomous and semi-autonomous vehicles facilitate our operations in many areas such as personal and commercial transportation, agriculture, construction and mining, research and exploration. Among these vehicles are autonomous mobile robots (AMRs), which are frequently preferred in factories. One of the reasons why AMRs are preferred is that there is insufficient manpower in the areas where they are used. Secondly, these robots can eliminate risky situations that can threaten the health of workers. In addition, AMRs have the potential to save manpower. In this study, we aim to provide data security for AMRs using wireless communication technologies by using a hybrid encryption method. The security performance of asymmetric encryption and the fast communication advantages of symmetric encryption make it necessary to use both encryption methods together for AMRs. In the hybrid encryption approach, the asymmetric encryption method ECC (Elliptic Curve Cryptography) and the symmetric encryption method AES (Advanced Encryption Standard) are used together. ECDSA (Elliptic Curve Digital Signature Algorithm), the digital signature method based on the ECC encryption method, was used as a reference. In the AES encryption method, GCM (Galois/Counter Mode) is preferred since verification is performed in addition to encryption. In this study, AMRs, which communicate with each other or with the controller system and act as data senders, were encrypted using ECDSA-AES/GCM hybrid encryption method using Python programming language and their performance was evaluated. In this way, the protection of the confidentiality and integrity of the transmitted data in case of a possible data leakage during wireless communication will be examined. As a result, this proposed method aims to provide an important step in terms of data security for autonomous mobile robots using wireless communication.

References

  • Işık A.H., Çetin Ö. Multifunctional and Low Cost Autonomous Mobile Robot. Gazi Journal of Engineering Sciences, 6(2), 105-110, 2020.
  • Siegwart R, Nourbakhsh I.R., Introduction to Autonomous mobile robots. The MIT Press, USA, 2004.
  • Jaulin L. Mobile robotics. ISTE Press Elsevier, USA, 2007.
  • To AWK, Paul G, Liu D. A comprehensive approach to real-time fault diagnosis during automatic grit-blasting operation by autonomous industrial robots. Robotics and Computer-Integrated Manufacturing, 49(1), 13-23, 2018.
  • Intel. Otonom Mobil Robot (AMR) Genel Bakış. http://www.intel.com.tr (Erişim Tarihi: 22.05.2023).
  • Milvus Robotics. Otonom Mobil Robotlar- AGV- AMR. http://www.milvusrobotics.com/tr/blog (Erişim Tarihi: 22.05.2023).
  • Optimak Optimum STU. Otonom Mobil Robot Nedir? http://www.optimak.com.tr/otonom-mobil-robot-nedir/ (Erişim Tarihi: 22.05.2023).
  • Advanced Motion Controls. Otonom Mobil Robotlar için Motor Kontrolörleri. http://www.a-m-c.com (Erişim Tarihi: 22.05.2023).
  • TechCrunch. Erişim Tarihi: 2.06.2023. http://techcrunch.com/2022/04/12/aethon-robots-hospitals-hijacks/ [10] The Verge. Erişim Tarihi: 2.06.2023. https://www.theverge.com/2022/6/21/23177756/amazon-warehouse-robots-proteus-autonomous-cart-delivery
  • Menezes AJ, van Oorschot PC, Vanstone SA. Handbook of applied cryptography. CRC press, 1996.
  • Rivest RL, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2), 120-126, 1978.
  • Diffie W, Hellman ME. New directions in cryptography. IEEE transactions on Information Theory, 22(6), 644-654, 1976.
  • Wikipedia. Elliptic-curve cryptography. http://en.wikipedia.org/wiki/Elliptic-curve_cryptography (Erişim Tarihi: 24.05.2023).
  • Barker E, Barker W, Burr W, Polk W, Smid M. Recommendation for Key Management – Part 1: General (Revision 4). National Institute of Standards and Technology, 2016.
  • Johnson D, Menezes A, Vanstone S. The Elliptic Curve Digital Signature Algorithm (ECDSA). International Journal of Information Security, 1(1), 36-63, 2001.
  • Ferguson N, Schneier B, Kohno T. Cryptography Engineering: Design Principles and Practical Applications. Wiley Publishing, 2010.
  • Daemen J, Rijmen V. The Design of Rijndael: AES - The Advanced Encryption Standard. Springer, 2002.
  • McGrew D, Viega J. The Galois/Counter Mode of Operation (GCM). National Institute of Standards and Technology, 2004. http://csrc.nist.gov/publications/detail/sp/800-38d/final
  • ElGamal T. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE transactions on information theory, 31(4), 469-472, 1985.
  • Barkan E, Biham E, Keller N. Instant ciphertext-only cryptanalysis of GSM encrypted communication. Journal of cryptology, 21(3), 392-429, 2005.
  • Bernstein DJ. Introduction to post-quantum cryptography. Springer, Berlin, Heidelberg, 2009.
  • Hu H, Ahn GJ, Jorgensen J. Detecting and resolving privacy conflicts for collaborative data sharing in online social networks. Proceedings of the 27th annual computer security applications conference, 103-112, 2011.
  • Li Q, Li Y, Li X. Wireless Communication Security: A Survey. Security and Communication Networks, 2018, 1091493.
  • Rivest RL, Shamir A, Adleman L. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM, 21(2), 120–126, 1978.
  • Daemen J, Rijmen V. The Design of Rijndael: AES - The Advanced Encryption Standard. Springer, 2002.
  • Kamaludin NS, Razak MZA, Abdullah AH. Review of Hybrid Cryptography Algorithms for Secure Multimedia Communication. Journal of Telecommunication, Electronic and Computer Engineering, 6(1), 15–19, 2014.
  • Legrand S, Lackorzynski A. PyCryptodome Documentation. http://www.pycryptodome.org (Erişim Tarihi: 2023).
  • Langley A, Hamburg M. Elliptic Curve Digital Signature Algorithm (ECDSA). http://www.ecdsa.org (Erişim Tarihi: 2023).
  • National Institute of Standards and Technology. Recommended Elliptic Curves for Federal Government Use, 2023.
  • Yıldırım, K., & Demiray, H. E. (2008). Simetrik ve asimetrik şifreleme yöntemlerine metotlar: çirpilmiş ve birleşik akm-vkm. Gazi Üniversitesi Mühendislik Mimarlık Fakültesi Dergisi, 23(3).
  • Zhang, Q. (2021, January). An overview and analysis of hybrid encryption: the combination of symmetric encryption and asymmetric encryption. In 2021 2nd international conference on computing and data science (CDS) (pp. 616-622). IEEE.
  • Alkady, Y., Habib, M. I., & Rizk, R. Y. (2013, December). A new security protocol using hybrid cryptography algorithms. In 2013 9th International Computer Engineering Conference (ICENCO) (pp. 109-115). IEEE.
There are 32 citations in total.

Details

Primary Language Turkish
Subjects Mechatronics Engineering
Journal Section Articles
Authors

Mustafa Emre Erbil 0009-0003-9394-8588

Ahmet Ali Süzen 0000-0002-5871-1652

Hilmi Cenk Bayrakçı 0000-0001-5064-7310

Publication Date September 13, 2023
Published in Issue Year 2023 Volume: 15 Issue: 2

Cite

IEEE M. E. Erbil, A. A. Süzen, and H. C. Bayrakçı, “Otonom mobi̇l robotların güvenli̇ veri̇ i̇leti̇mi̇ içi̇n hi̇bri̇t şi̇freleme yaklaşımı”, IJTS, vol. 15, no. 2, pp. 64–72, 2023, doi: 10.55974/utbd.1311229.

Dergi isminin Türkçe kısaltması "UTBD" ingilizce kısaltması "IJTS" şeklindedir.

Dergimizde yayınlanan makalelerin tüm bilimsel sorumluluğu yazar(lar)a aittir. Editör, yardımcı editör ve yayıncı dergide yayınlanan yazılar için herhangi bir sorumluluk kabul etmez.