|
[1]“沛博科技Perobot - 服務自動化專家.” available from: http://www.perobot.com.tw/pepper/index [2]Corporation R.-M. O., “端菜服務 送餐機器人 Bella | 台灣專業端菜服務 送餐機器人 Bella設備製造商,” 鴻匠科技股份有限公司. available from: https://www.hong-chiang.com.tw/zh-TW/category/K01.html [3]M. Quigley et al., “ROS: an open-source Robot Operating System,” presented at the ICRA Workshop on Open Source Software, Jan. 2009. [4]“ROS 2 Documentation — ROS 2 Documentation: Humble documentation.” available from: https://docs.ros.org/en/humble/index.html [5]K. Moriarty, B. Kaliski, J. Jonsson, and A. Rusch, “PKCS #1: RSA Cryptography Specifications Version 2.2,” Internet Engineering Task Force, Request for Comments RFC 8017, Jan. 2016. doi: 10.17487/RFC8017. [6]“Domain names - concepts and facilities,” Internet Engineering Task Force, Request for Comments RFC 1034, Jan. 1987. doi: 10.17487/RFC1034. [7]D. McGrew and D. Bailey, “AES-CCM Cipher Suites for Transport Layer Security (TLS),” Internet Engineering Task Force, Request for Comments RFC 6655, Jul. 2012. doi: 10.17487/RFC6655. [8]T. Tanadechopon and B. Kasemsontitum, “Proposed Technique for Data Security with the AES Algorithm in Robot Operating System (ROS),” in 2023 27th International Computer Science and Engineering Conference (ICSEC), Sep. 2023, pp. 153–156. doi: 10.1109/ICSEC59635.2023.10329645. [9]Y. Patel, P. H. Rughani, and D. Desai, “Analyzing Security Vulnerability and Forensic Investigation of ROS2: A Case Study,” in Proceedings of the 8th International Conference on Robotics and Artificial Intelligence, in ICRAI ’22. New York, NY, USA: Association for Computing Machinery, Jan. 2023, pp. 6–12. doi: 10.1145/3573910.3573912. [10]ros2/sros2. (Aug. 16, 2024). Python. ROS 2. available from: https://github.com/ros2/sros2 [11]M. Aartsen et al., “Analyzing Interoperability and Security Overhead of ROS2 DDS Middleware,” in 2022 30th Mediterranean Conference on Control and Automation (MED), Jun. 2022, pp. 976–981. doi: 10.1109/MED54222.2022.9837282. [12]“Data Distribution Service (DDS) | Object Management Group.” available from: https://www.omg.org/omg-dds-portal/ [13]M. S. Ragheb, W. Elmedany, and M. S. Sharif, “The Effectiveness of DKIM and SPF in Strengthening Email Security,” in 2023 10th International Conference on Future Internet of Things and Cloud (FiCloud), Aug. 2023, pp. 422–426. doi: 10.1109/FiCloud58648.2023.00068. [14]徐瑋婕、游允帥,“在ROS 2 中使用AES 演算法實現安全通訊”, 第二十二屆離島資訊技術與應用研討會(ITAOI 2024), 2024年5月。 [15]“Understanding topics — ROS 2 Documentation: Humble documentation.” available from: https://docs.ros.org/en/humble/Tutorials/Beginner-CLI-Tools/Understanding-ROS2-Topics/Understanding-ROS2-Topics.html [16]“Understanding services — ROS 2 Documentation: Humble documentation.” available from: https://docs.ros.org/en/humble/Tutorials/Beginner-CLI-Tools/Understanding-ROS2-Services/Understanding-ROS2-Services.html [17]“Understanding actions — ROS 2 Documentation: Humble documentation.” available from: https://docs.ros.org/en/humble/Tutorials/Beginner-CLI-Tools/Understanding-ROS2-Actions/Understanding-ROS2-Actions.html [18]Y. Maruyama, S. Kato, and T. Azumi, “Exploring the performance of ROS2,” Oct. 2016, pp. 1–10. doi: 10.1145/2968478.2968502. [19]M. Just, “Challenge-Response Identification,” in Encyclopedia of Cryptography and Security, H. C. A. van Tilborg and S. Jajodia, Eds., Boston, MA: Springer US, 2011, pp. 198–199. doi: 10.1007/978-1-4419-5906-5_73. [20]M. Mumtaz, J. Akram, and L. Ping, “An RSA Based Authentication System for Smart IoT Environment,” in 2019 IEEE 21st International Conference on High Performance Computing and Communications; IEEE 17th International Conference on Smart City; IEEE 5th International Conference on Data Science and Systems (HPCC/SmartCity/DSS), Aug. 2019, pp. 758–765. doi: 10.1109/HPCC/SmartCity/DSS.2019.00112. [21]A. Shaikh, R. Tewari, and M. Agrawal, “On the effectiveness of DNS-based server selection,” in Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213), Apr. 2001, pp. 1801–1810 vol.3. doi: 10.1109/INFCOM.2001.916678. [22]J. R. Levine, M. Delany, E. P. Allman, and J. Fenton, “DomainKeys Identified Mail (DKIM) Author Domain Signing Practices (ADSP),” Internet Engineering Task Force, Request for Comments RFC 5617, Aug. 2009. doi: 10.17487/RFC5617. [23]S. Heron, “Advanced Encryption Standard (AES),” Network Security, vol. 2009, no. 12, pp. 8–12, Dec. 2009, doi: 10.1016/S1353-4858(10)70006-4. [24]M. Dworkin, “Recommendation for Block Cipher Modes of Operation: Methods and Techniques,” National Institute of Standards and Technology, NIST Special Publication (SP) 800-38A, Dec. 2001. doi: 10.6028/NIST.SP.800-38A. [25]D. Whiting, R. Housley, and N. Ferguson, “Counter with CBC-MAC (CCM),” Internet Engineering Task Force, Request for Comments RFC 3610, Sep. 2003. doi: 10.17487/RFC3610. [26]P. R. Karn and W. A. Simpson, “Photuris: Session-Key Management Protocol,” Internet Engineering Task Force, Request for Comments RFC 2522, Mar. 1999. doi: 10.17487/RFC2522.
|