Abstract [eng] |
With the strong expansion of the market for autonomous robots, these, mostly, self-acting devices can be seen everywhere: in the home, military, medical, industrial and defence sectors. Autonomous functions performed by robots range from operations in the medical sector, to environmental monitoring at home and finishing with military actions in the defence sector. Autonomous environmental monitoring robots typically operate in environments which are rich in private and confidential data, regarding this, there is a need to be concerned about the secure transmission of such data and the cyber security of robots itself. When sending data to the end device, the data communication channel must be secure, and the data must be protected from possible misappropriation, modification or falsification of their origin. Taking into account the rapid growth of the autonomous robot market and forecasts that show that in the future the bulk of Internet data will be mostly multimedia data, the main object of this final work is the implementation of an autonomous environmental monitoring robot secure communication method. After reviewing the existing communication methods, comparing their advantages and disadvantages, the aim of this is work is to propose an efficient, effective secure communication method that can be adapted to an autonomous environmental monitoring robot with limited computing power and constrained energy resources. The method must meet the requirements of the video transmission operation: to ensure good video quality, high operational speed, low video delay and energy saving. Depending upon the function performed by the autonomous environmental monitoring robot, operating environment, the required, non-redundant level of security is defined. In the prototype developing phase, it was proposed to implement a secure communication method to transmit video data using modified SRTP protocol with pre-shared key technique. In the experimental part, the performance parameters of the proposed secure communication method are compared against other communication methods which are implemented using an insecure RTP and SRTP-DTLS protocol stacks. The results of the research obtained in the experimental part are compared, discussed and the final conclusions of the work are presented. |