Secure trajectory planning against undetectable spoofing attacks.
Yin-Chen LiuGianluca BianchinFabio PasqualettiPublished in: Autom. (2020)
Keyphrases
- trajectory planning
- secure routing
- security mechanisms
- motion planning
- cryptographic protocols
- security protocols
- stream cipher
- chosen plaintext
- security issues
- obstacle avoidance
- robot manipulators
- path planning
- dynamic environments
- security measures
- damage assessment
- mobile robot
- countermeasures
- ddos attacks
- information security
- security requirements
- secret key
- degrees of freedom
- situational awareness
- humanoid robot
- advanced encryption standard
- user authentication
- mathematical model
- biometric systems