{"componentChunkName":"component---src-templates-blog-template-blog-template-js","path":"/security-architecture-and-platforms-for-distributed-autonomous-systems","result":{"data":{"markdownRemark":{"fields":{"dateSlug":"2020-07-01","id":"security-architecture-and-platforms-for-distributed-autonomous-systems-2020-07-01"},"frontmatter":{"title":"Security, Architecture and Platforms for Distributed Autonomous Systems","categories":["research topic","cyber security"],"date":"July 1, 2020","tags":["Cyber Security","IT Services"],"type":"area","author1":null,"author1_image":null},"html":"<h1>Security, Architecture and Platforms for Distributed Autonomous Systems</h1>\n<p>In this area of research, we devise and implement (i) security protocols for distributed architectures and platforms for autonous systems, (ii) data and information fusion for autonomous systems, (iii) task distribution/allocation algorithms and frameworks for distributed autonomous systems, and (iv) ontogloies and data structurs for storing and semantically relating information from multiple sources.</p>\n<p>Below are links to some of our security work demonstrations on autonomous robots.</p>\n<p>Following video link shows navigation of the bots. The demonstration shows first bot moving through a navigation path and share the details with a second robot. The second robot then reaches starting point of the first robot and then navigates though the same path.\n<a href=\"https://drive.google.com/open?id=18FzmGZp7_2qFkUIhZWGvcnzDEzTeua3e\">https://drive.google.com/open?id=18FzmGZp7_2qFkUIhZWGvcnzDEzTeua3e</a></p>\n<p>Following video link shows operating environment map in ROS master with navigation details.\n<a href=\"https://drive.google.com/open?id=1jZcLdvaa_lBLMAYCSV220iGSNzgN2RRq\">https://drive.google.com/open?id=1jZcLdvaa_lBLMAYCSV220iGSNzgN2RRq</a></p>\n<p>Following video link shows the command screens and details of the messages being exchanged between the robots.\n<a href=\"https://drive.google.com/open?id=1Vgt46ObVjo14qM2Vg-xsffDkVGnR0N7B\">https://drive.google.com/open?id=1Vgt46ObVjo14qM2Vg-xsffDkVGnR0N7B</a></p>"}},"pageContext":{"slug":"security-architecture-and-platforms-for-distributed-autonomous-systems","next":{"frontmatter":{"title":"Security Orchestration and Automation","featured_image":{"childImageSharp":{"fluid":{"src":"/static/bbdecc8f12f99be010105337e5fc7456/7a94d/blog-03-1170x600.jpg","presentationWidth":720,"presentationHeight":120}}}},"fields":{"slug":"security-orchestration-and-automation"}},"previous":{"frontmatter":{"title":"Secure Mobile Health Application Engineering","featured_image":{"childImageSharp":{"fluid":{"src":"/static/bbdecc8f12f99be010105337e5fc7456/7a94d/blog-03-1170x600.jpg","presentationWidth":720,"presentationHeight":120}}}},"fields":{"slug":"secure-mobile-health-application-engineering"}},"breadcrumb":{"location":"/security-architecture-and-platforms-for-distributed-autonomous-systems","crumbs":[{"pathname":"/","crumbLabel":"Home"},{"pathname":"/security-architecture-and-platforms-for-distributed-autonomous-systems","crumbLabel":"security-architecture-and-platforms-for-distributed-autonomous-systems"}]}}}}