IDEAS home Printed from https://ideas.repec.org/a/gam/jftint/v14y2022i9p265-d914450.html
   My bibliography  Save this article

Approaches and Challenges in Internet of Robotic Things

Author

Listed:
  • Aqsa Sayeed

    (Department of Computer Science & IT, Central University of Jammu, Jammu 181143, India)

  • Chaman Verma

    (Department of Media and Educational Informatics, Faculty of Informatics, Eötvös Loránd University, 1053 Budapest, Hungary)

  • Neerendra Kumar

    (Department of Computer Science & IT, Central University of Jammu, Jammu 181143, India)

  • Neha Koul

    (Department of Computer Science & IT, Central University of Jammu, Jammu 181143, India)

  • Zoltán Illés

    (Department of Media and Educational Informatics, Faculty of Informatics, Eötvös Loránd University, 1053 Budapest, Hungary)

Abstract

The Internet of robotic things (IoRT) is the combination of different technologies including cloud computing, robots, Internet of things (IoT), artificial intelligence (AI), and machine learning (ML). IoRT plays a major role in manufacturing, healthcare, security, and transport. IoRT can speed up human development by a very significant percentage. IoRT allows robots to transmit and receive data to and from other devices and users. In this paper, IoRT is reviewed in terms of the related techniques, architectures, and abilities. Consequently, the related research challenges are presented. IoRT architectures are vital in the design of robotic systems and robotic things. The existing 3–7-tier IoRT architectures are studied. Subsequently, a detailed IoRT architecture is proposed. Robotic technologies provide the means to increase the performance and capabilities of the user, product, or process. However, robotic technologies are vulnerable to attacks on data security. Trust-based and encryption-based mechanisms can be used for secure communication among robotic things. A security method is recommended to provide a secure and trustworthy data-sharing mechanism in IoRT. Significant security challenges are also discussed. Several known attacks on ad hoc networks are illustrated. Threat models ensure integrity confidentiality and availability of the data. In a network, trust models are used to boost a system’s security. Trust models and IoRT networks play a key role in obtaining a steady and nonvulnerable configuration in the network. In IoRT, remote server access results in remote software updates of robotic things. To study navigation strategies, navigation using fuzzy logic, probabilistic roadmap algorithms, laser scan matching algorithms, heuristic functions, bumper events, and vision-based navigation techniques are considered. Using the given research challenges, future researchers can get contemporary ideas of IoRT implementation in the real world.

Suggested Citation

  • Aqsa Sayeed & Chaman Verma & Neerendra Kumar & Neha Koul & Zoltán Illés, 2022. "Approaches and Challenges in Internet of Robotic Things," Future Internet, MDPI, vol. 14(9), pages 1-30, September.
  • Handle: RePEc:gam:jftint:v:14:y:2022:i:9:p:265-:d:914450
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/1999-5903/14/9/265/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/1999-5903/14/9/265/
    Download Restriction: no
    ---><---

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Soukaina Bouarourou & Abderrahim Zannou & El Habib Nfaoui & Abdelhak Boulaalam, 2023. "An Efficient Model-Based Clustering via Joint Multiple Sink Placement for WSNs," Future Internet, MDPI, vol. 15(2), pages 1-27, February.
    2. Christoph Stach & Clémentine Gritti, 2023. "Special Issue on Security and Privacy in Blockchains and the IoT Volume II," Future Internet, MDPI, vol. 15(8), pages 1-7, August.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jftint:v:14:y:2022:i:9:p:265-:d:914450. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.