Topic Editors

Department of Computer Science, University of Liverpool, Liverpool L69 3BX, UK
Dr. Wenjie Ruan
Department of Computer Science, University of Exeter, Exeter, UK
Dr. Xingyu Zhao
Department of Computer Science, University of Liverpool, Liverpool L69 3BX, UK

Safe and Secure Autonomous Systems

Abstract submission deadline
closed (30 April 2023)
Manuscript submission deadline
closed (30 June 2023)
Viewed by
14481

Topic Information

Dear Colleagues,

The rapid progression of deep learning in the past decade has led to the development of learning-enabled systems, such as robotics systems, medical diagnosis systems, and Industry 5.0. However, rigorous methods to enforce the safety and security of these systems are still needed. This article collection aims to bring together research on how to identify, rectify, and verify the safety and security risks of learning-enabled systems. We welcome various forms of contributions, such as original research, survey papers, case studies, and tool demonstrations. The scope of this Topic includes, but is not limited to, the following:

1. Attack and defense mechanisms in the machine learning model;
2. Formal verification;
3. Practical testing methods;
4. Privacy-preserving machine learning;
5. Safety assurance of autonomous systems;
6. Fairness and ethics of autonomous systems;
7. Explainable AI for autonomous systems;
8. Reliability assessment.

Prof. Dr. Xiaowei Huang
Dr. Wenjie Ruan
Dr. Xingyu Zhao
Topic Editors

Keywords

  •  safety
  •  security
  •  learning-enabled systems
  •  autonomous systems
  •  verification and validation
  •  attack and defense
  •  safety assurance
  •  reliability assessment
  •  explainable AI
  •  fair and ethical AI

Participating Journals

Journal Name Impact Factor CiteScore Launched Year First Decision (median) APC
Algorithms
algorithms
2.3 3.7 2008 15 Days CHF 1600
Data
data
2.6 4.6 2016 22 Days CHF 1600
Entropy
entropy
2.7 4.7 1999 20.8 Days CHF 2600
Machine Learning and Knowledge Extraction
make
3.9 8.5 2019 19.9 Days CHF 1800
Mathematics
mathematics
2.4 3.5 2013 16.9 Days CHF 2600
Robotics
robotics
3.7 5.9 2012 17.3 Days CHF 1800

Preprints.org is a multidiscipline platform providing preprint service that is dedicated to sharing your research from the start and empowering your research journey.

MDPI Topics is cooperating with Preprints.org and has built a direct connection between MDPI journals and Preprints.org. Authors are encouraged to enjoy the benefits by posting a preprint at Preprints.org prior to publication:

  1. Immediately share your ideas ahead of publication and establish your research priority;
  2. Protect your idea from being stolen with this time-stamped preprint article;
  3. Enhance the exposure and impact of your research;
  4. Receive feedback from your peers in advance;
  5. Have it indexed in Web of Science (Preprint Citation Index), Google Scholar, Crossref, SHARE, PrePubMed, Scilit and Europe PMC.

Published Papers (7 papers)

Order results
Result details
Journals
Select all
Export citation of selected articles as:
15 pages, 6890 KiB  
Article
Variable Damping Actuator Using an Electromagnetic Brake for Impedance Modulation in Physical Human–Robot Interaction
by Zahid Ullah, Ronnapee Chaichaowarat and Witaya Wannasuphoprasit
Robotics 2023, 12(3), 80; https://doi.org/10.3390/robotics12030080 - 04 Jun 2023
Cited by 9 | Viewed by 1938
Abstract
Compliance actuation systems are efficient and safe, drawing attention to their development. However, compliance has caused bandwidth loss, instability, and mechanical vibration in robotic systems. Variable physical damping was introduced to address these issues. This paper presents a technique for obtaining variable damping [...] Read more.
Compliance actuation systems are efficient and safe, drawing attention to their development. However, compliance has caused bandwidth loss, instability, and mechanical vibration in robotic systems. Variable physical damping was introduced to address these issues. This paper presents a technique for obtaining variable damping properties using an electromagnetic brake. The relationship mapping of the voltage and the braking torque is studied and applied to the variable damping concept. A new model is proposed to demonstrate the actuation system performance gained by introducing physical damping. The experimental setup comprises an electromagnetic brake and a motor with an integrated controller for speed control and torque feedback. The motor provides the motion, while the electromagnetic brake replicates the damping through a friction mechanism. The variable damping concept was evaluated experimentally using a 1-degree-of-freedom rotational system. Experimental results show that the proposed concept can generate the desired mechanical damping with a high degree of fidelity. Full article
(This article belongs to the Topic Safe and Secure Autonomous Systems)
Show Figures

Figure 1

15 pages, 693 KiB  
Article
A Robust Fixed-Time Sliding Mode Control for Quadrotor UAV
by Jairo Olguin-Roque, Sergio Salazar, Iván González-Hernandez and Rogelio Lozano
Algorithms 2023, 16(5), 229; https://doi.org/10.3390/a16050229 - 28 Apr 2023
Cited by 3 | Viewed by 1599
Abstract
This paper proposes a robust algorithm based on a fixed-time sliding mode controller (FTSMC) for a Quadrotor aircraft. This approach is based on Lyapunov theory, which guarantees system stability. Nonlinear error dynamics techniques are used to achieve accurate trajectory tracking in the presence [...] Read more.
This paper proposes a robust algorithm based on a fixed-time sliding mode controller (FTSMC) for a Quadrotor aircraft. This approach is based on Lyapunov theory, which guarantees system stability. Nonlinear error dynamics techniques are used to achieve accurate trajectory tracking in the presence of disturbances. The performance of the FTSMC is compared with the typical non-singular terminal sliding mode controller (NTSMC) to evaluate its effectiveness. The numerical results show that FTSMC is more efficient than the typical NTSMC in disturbance reduction. Full article
(This article belongs to the Topic Safe and Secure Autonomous Systems)
Show Figures

Figure 1

17 pages, 1393 KiB  
Article
Snail: An Eco-Friendly Autonomous Steam Mopping Robot for Cleaning and Disinfection of Floors
by Sathian Pookkuttath, Mohan Rajesh Elara, Madan Mohan Rayguru, Zaki Saptari Saldi, Vinu Sivanantham and Balakrishnan Ramalingam
Mathematics 2023, 11(5), 1086; https://doi.org/10.3390/math11051086 - 22 Feb 2023
Cited by 2 | Viewed by 2132
Abstract
Steam mopping is an eco-friendly solution for cleaning and disinfecting floors, avoiding harsh chemicals or harmful UV lights. Currently, commercial steam mopping systems are manually operated, which is laborious and unsafe. This work presents the design methodology of a novel, eco-friendly autonomous steam [...] Read more.
Steam mopping is an eco-friendly solution for cleaning and disinfecting floors, avoiding harsh chemicals or harmful UV lights. Currently, commercial steam mopping systems are manually operated, which is laborious and unsafe. This work presents the design methodology of a novel, eco-friendly autonomous steam mopping robot named ‘Snail’ for cleaning and disinfecting typical indoor floors, namely tile, carpet, concrete, vinyl, sealed wood, and rugs. Our work is mainly focused on (1) the mechanical system design, including the locomotion, steam dispenser, and mopping unit, (2) the hardware and software architecture, and (3) the motion control system’s design for smooth maneuverability and mitigating friction forces. A high-gain friction estimator is proposed, whose output is exploited by the motion controller to follow the desired path and compensate for the traction-based locomotion disturbances due to extensive mop contact with a rough-textured floor, such as carpet. The proposed autonomous steam mopping robot’s efficiency is validated with different floors with zig-zagging cleaning patterns, setting a minimum of 100 °C as the disinfecting steam criterion. Using the proposed motion control algorithm, we validate the smooth maneuverability, assuring the robot traverses with a given speed and follows the trajectory even on a rough carpeted floor. The cleaning efficiency is tested by removing hard stains, consuming less water, and faster wet floor drying. The robot used only one liter of water to clean a 5 m2 floor area, and the drying time was found to be four times faster than normal water mopping. The proposed steam mopping robot design is ideal for cleaning and disinfecting hospitals and eldercare centers, where hygiene is crucial, and promoting going green, avoiding harsh chemicals, and mitigating current cleaner labor concerns, including the risk of infection. Full article
(This article belongs to the Topic Safe and Secure Autonomous Systems)
Show Figures

Figure 1

16 pages, 1776 KiB  
Article
Cryptanalysis of Two Recent Ultra-Lightweight Authentication Protocols
by Mohammad Reza Servati, Masoumeh Safkhani, Saqib Ali, Mazhar Hussain Malik, Omed Hassan Ahmed, Mehdi Hosseinzadeh and Amir H. Mosavi
Mathematics 2022, 10(23), 4611; https://doi.org/10.3390/math10234611 - 05 Dec 2022
Cited by 1 | Viewed by 1564
Abstract
Radio Frequency Identification (RFID) technology is a critical part of many Internet of Things (IoT) systems, including Medical IoT (MIoT) for instance. On the other hand, the IoT devices’ numerous limitations (such as memory space, computing capability, and battery capacity) make it difficult [...] Read more.
Radio Frequency Identification (RFID) technology is a critical part of many Internet of Things (IoT) systems, including Medical IoT (MIoT) for instance. On the other hand, the IoT devices’ numerous limitations (such as memory space, computing capability, and battery capacity) make it difficult to implement cost- and energy-efficient security solutions. As a result, several researchers attempted to address this problem, and several RFID-based security mechanisms for the MIoT and other constrained environments were proposed. In this vein, Wang et al. and Shariq et al. recently proposed CRUSAP and ESRAS ultra-lightweight authentication schemes. They demonstrated, both formally and informally, that their schemes meet the required security properties for RFID systems. In their proposed protocols, they have used a very lightweight operation called Cro(·) and Rank(·), respectively. However, in this paper, we show that those functions are not secure enough to provide the desired security. We show that Cro(·) is linear and reversible, and it is easy to obtain the secret values used in its calculation. Then, by exploiting the vulnerability of the Cro(·) function, we demonstrated that CRUSAP is vulnerable to secret disclosure attacks. The proposed attack has a success probability of "1" and is as simple as a CRUSAP protocol run. Other security attacks are obviously possible by obtaining the secret values of the tag and reader. In addition, we present a de-synchronization attack on the CRUSAP protocol. Furthermore, we provide a thorough examination of ESRAS and its Rank(·) function. We first present a de-synchronization attack that works for any desired Rank(·) function, including Shariq et al.’s proposed Rank(·) function. We also show that Rank(·) does not provide the desired confusion and diffusion that is claimed by the designers. Finally, we conduct a secret disclosure attack against ESRAS. Full article
(This article belongs to the Topic Safe and Secure Autonomous Systems)
Show Figures

Figure 1

17 pages, 1469 KiB  
Article
Security of a PUF Mutual Authentication and Session Key Establishment Protocol for IoT Devices
by Da-Zhi Sun and Yangguang Tian
Mathematics 2022, 10(22), 4310; https://doi.org/10.3390/math10224310 - 17 Nov 2022
Cited by 5 | Viewed by 1570
Abstract
Recently, Zerrouki et al. proposed a Physically Unclonable Function (PUF) mutual authentication and session key establishment protocol for IoT (Internet of Things) devices. Zerrouki et al.’s PUF protocol is interesting because it does not require the storage of any sensitive information on the [...] Read more.
Recently, Zerrouki et al. proposed a Physically Unclonable Function (PUF) mutual authentication and session key establishment protocol for IoT (Internet of Things) devices. Zerrouki et al.’s PUF protocol is interesting because it does not require the storage of any sensitive information on the local memory of the IoT device, which avoids many potential attacks, especially side-channel attacks. Therefore, we carefully investigate the security of Zerrouki et al.’s PUF protocol under the leakage assumption of the session key. Our findings are in the following. First, Zerrouki et al.’s PUF protocol fails to provide known-key security. That is, the adversary can impersonate not only the server to cheat the IoT device but also the IoT device to cheat the server when the adversary corrupts a session key between the server and the IoT device. Second, Zerrouki et al.’s PUF protocol suffers from the key-compromise impersonation attack. It means that the adversary can impersonate the IoT device to cheat the server if the adversary discloses the server’s secret key. Third, Zerrouki et al.’s PUF protocol does not support backward secrecy for the session key. That is, the adversary is always able to derive the session key from the previous session key. We also suggest the root cause of these security flaws in Zerrouki et al.’s PUF protocol. As a case study, our cryptanalysis results would promote a security model for more robust and efficient PUF authentication and session key establishment protocol. Moreover, our idea of the key compromise can be used to evaluate other novel PUF protocol designs. Full article
(This article belongs to the Topic Safe and Secure Autonomous Systems)
Show Figures

Figure 1

18 pages, 1544 KiB  
Article
Advanced Architecture of On-Board Multiplex Information Exchange System to Increase Flight Safety
by Viktor Dashkiiev and Yuriy Povstenko
Entropy 2022, 24(11), 1582; https://doi.org/10.3390/e24111582 - 01 Nov 2022
Cited by 1 | Viewed by 1202
Abstract
Issues of aviation flight safety conducted with an on-board information exchange system are discussed. The system information analysis method is used. An analysis of in-flight hazard sources and the means of their elimination from the information exchange point of view are carried out [...] Read more.
Issues of aviation flight safety conducted with an on-board information exchange system are discussed. The system information analysis method is used. An analysis of in-flight hazard sources and the means of their elimination from the information exchange point of view are carried out including the influence of the information exchange system’s parameters, work algorithm and architecture. The value of information exchange speed on safety in dynamic flight conditions is discussed. A modification of architecture and the information exchange system algorithm are proposed to increase the exchange speed and the whole system’s effectiveness based on parallel processing as well as to enhance the probability of successful elimination of an emergency situation. Full article
(This article belongs to the Topic Safe and Secure Autonomous Systems)
Show Figures

Figure 1

15 pages, 11273 KiB  
Article
Sim-to-Real Deep Reinforcement Learning for Safe End-to-End Planning of Aerial Robots
by Halil Ibrahim Ugurlu, Xuan Huy Pham and Erdal Kayacan
Robotics 2022, 11(5), 109; https://doi.org/10.3390/robotics11050109 - 13 Oct 2022
Cited by 6 | Viewed by 2983
Abstract
In this study, a novel end-to-end path planning algorithm based on deep reinforcement learning is proposed for aerial robots deployed in dense environments. The learning agent finds an obstacle-free way around the provided rough, global path by only depending on the observations from [...] Read more.
In this study, a novel end-to-end path planning algorithm based on deep reinforcement learning is proposed for aerial robots deployed in dense environments. The learning agent finds an obstacle-free way around the provided rough, global path by only depending on the observations from a forward-facing depth camera. A novel deep reinforcement learning framework is proposed to train the end-to-end policy with the capability of safely avoiding obstacles. The Webots open-source robot simulator is utilized for training the policy, introducing highly randomized environmental configurations for better generalization. The training is performed without dynamics calculations through randomized position updates to minimize the amount of data processed. The trained policy is first comprehensively evaluated in simulations involving physical dynamics and software-in-the-loop flight control. The proposed method is proven to have a 38% and 50% higher success rate compared to both deep reinforcement learning-based and artificial potential field-based baselines, respectively. The generalization capability of the method is verified in simulation-to-real transfer without further training. Real-time experiments are conducted with several trials in two different scenarios, showing a 50% higher success rate of the proposed method compared to the deep reinforcement learning-based baseline. Full article
(This article belongs to the Topic Safe and Secure Autonomous Systems)
Show Figures

Figure 1

Back to TopTop