Securing Mobile Robots Multi-Party Authentication Technique Using Modified Elliptic Curve Cryptography
Mobile robots continue to play a pivotal role in various industries, safeguarding their operations against unauthorized access and cyber-attacks becomes increasingly critical. The burgeoning adoption of ubiquitous services across a variety of sectors has led to an exponential rise in mobile robot us...
Saved in:
Published in: | 2023 International Conference on Advanced Computing & Communication Technologies (ICACCTech) pp. 104 - 109 |
---|---|
Main Authors: | , |
Format: | Conference Proceeding |
Language: | English |
Published: |
IEEE
23-12-2023
|
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Mobile robots continue to play a pivotal role in various industries, safeguarding their operations against unauthorized access and cyber-attacks becomes increasingly critical. The burgeoning adoption of ubiquitous services across a variety of sectors has led to an exponential rise in mobile robot users. In this scenario, the authentication of mobile robots becomes a crucial requirement for ensuring data security and confidentiality. To protect the authenticity of confidential information it is necessary to provide strong authentication systems as these robots become key participants for providing a range of services. This work proposed an innovative approach to enhance the security of mobile robots by implementing Multi-Part Authentication (MP A) techniques using a modified Elliptic Curve Cryptography (ECC) algorithm. Traditional authentication methods often prove insufficient when it comes to the unique challenges faced by mobile robots, including remote control vulnerabilities, data integrity concerns, and the potential for physical tampering. The present work is a novel, efficient, and robust cryptography technique for generating keys using modified ECC and arithmetic greatest common divisor for multi-party communications. Additionally, the proposed work also presented a novel methodology of encryption and decryption techniques for the distribution of the authentication keys using a modified ECC algorithm. The results of the work show that the proposed technique ensures that only authorized users are able to control mobile robots as well as provide protection against attacks. |
---|---|
DOI: | 10.1109/ICACCTech61146.2023.00025 |