Open Access. Powered by Scholars. Published by Universities.®

Robotics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer and Systems Architecture

Murray State University

Publication Year

Articles 1 - 2 of 2

Full-Text Articles in Robotics

Securing Edge Computing: A Hierarchical Iot Service Framework, Sajan Poudel, Nishar Miya, Rasib Khan Jan 2024

Securing Edge Computing: A Hierarchical Iot Service Framework, Sajan Poudel, Nishar Miya, Rasib Khan

Posters-at-the-Capitol

Title: Securing Edge Computing: A Hierarchical IoT Service Framework

Authors: Nishar Miya, Sajan Poudel, Faculty Advisor: Rasib Khan, Ph.D.

Department: School of Computing and Analytics, College of Informatics, Northern Kentucky University

Abstract:

Edge computing, a paradigm shift in data processing, faces a critical challenge: ensuring security in a landscape marked by decentralization, distributed nodes, and a myriad of devices. These factors make traditional security measures inadequate, as they cannot effectively address the unique vulnerabilities of edge environments. Our research introduces a hierarchical framework that excels in securing IoT-based edge services against these inherent risks.

Our secure by design approach prioritizes …


Assessing The Alignment Of Social Robots With Trustworthy Ai Design Guidelines: A Preliminary Research Study, Abdikadar Ali, Danielle Thaxton, Ankur Chattopadhyay Dec 2021

Assessing The Alignment Of Social Robots With Trustworthy Ai Design Guidelines: A Preliminary Research Study, Abdikadar Ali, Danielle Thaxton, Ankur Chattopadhyay

Posters-at-the-Capitol

The last couple of years have seen a strong movement supporting the need of having intelligent consumer products align with specific design guidelines for trustworthy artificial intelligence (AI). This global movement has led to multiple institutional recommendations for ethically aligned trustworthy design of the AI driven technologies, like consumer robots and autonomous vehicles. There has been prior research towards finding security and privacy related vulnerabilities within various types of social robots. However, none of these previous works has studied the implications of these vulnerabilities in terms of the robot design aligning with trustworthy AI. In an attempt to address this …