=Paper= {{Paper |id=Vol-3676/BISEC_Preface |storemode=property |title=None |pdfUrl=https://ceur-ws.org/Vol-3676/BISEC_Preface.pdf |volume=Vol-3676 |authors=Nemanja Zdravković,Miguel Ángel Conde,Sonsoles López-Pernas,Ponnusamy Vijayakumar }} ==None== https://ceur-ws.org/Vol-3676/BISEC_Preface.pdf
                                Security Issues in Robotic Platforms, Sensor Networks and
                                Smart Cities
                                Nemanja Zdravković1 , Miguel Ángel Conde2 , Sonsoles López-Pernas3 and
                                Ponnusamy Vijayakumar4
                                1
                                  Faculty of Information Technology, Belgrade Metropolitan University, Tadeuša Košćuška 63, Belgrade, 11000, Serbia
                                2
                                  University of León, Engineering School, Campus de Vegazana S/N, León, 24071, Spain
                                3
                                  University of Eastern Finland, Yliopistokatu-2, Joensuu, 80100, Finland
                                4
                                  SRM IST, ECE Department, Kattankulathur, Chennai, 603203, India



                                   The main focus of the BISEC-2023 were security issues                                               them. A need exist for enhanced security measures, espe-
                                and challenges and means to overcome them. Partici-                                                    cially in light of emerging technologies like autonomous
                                pants had the opportunity to hear the latest information                                               robotics and the evolving landscape of web-based threats.
                                in the field of security issues in robotics, wireless sen-                                             This underscores the critical role of adopting robust stan-
                                sor networks (WSNs), Unmanned Aerial Vehicles (UAVs),                                                  dards and technologies such as blockchain and advanced
                                as well as new lightweight blockchain-based solutions.                                                 machine learning techniques to fortify our information
                                The participants got to know each other and exchanged                                                  and communication systems against ever-evolving cyber
                                experiences about the latest advanced techniques for pro-                                              risks.
                                tecting robotic platforms, WNSs and web security. There                                                   The conference had two keynote talks. The first
                                was also talk about the security issues already identifies                                             keynote was delivered by Adrián Campazas-Vega from
                                for future smart cities, and means of their mitigation. The                                            the Robotics Group from the Universitsy of León, in
                                President of Belgrade Metropolitan University, Prof. Dr.                                               Spain who delivered the conference keynote on the topic
                                Dragan Domazet, opened the conference and pointed out                                                  "Cybersecurity Issues in Robotic Platforms" His talk dis-
                                that new methodologies, standards, and approaches in                                                   cussed ongoing security challenges in commercial robots
                                data protection, driven by disruptive technologies such                                                such as the popular Unitree A1. The goal of the talk was
                                as Web3, blockchain and smart devices are crucial to                                                   to identify vulnerabilities in such platforms in order to
                                develop a better and safer future. Lecturers from both                                                 take into encourage other researchers or companies in
                                public and private institutions presented their current                                                the field to strengthen security protocols and standards
                                solutions and works that are current or will find their                                                for commercially available robots
                                application in the future. The conference proceedings                                                     The second keynote entitled "Future of Smart Cities
                                present a compilation of selected nine accepted articles                                               Security Challenges – Proactive Modelling & Identifica-
                                and short papers at the conference out of 24 paper sub-                                                tion" was delivered by Professor Zlatogor Minchev from
                                missions received.                                                                                     the Institute of ICT at the Bulgarian Academy of Sciences
                                   The growing complexity of interconnected systems in                                                 in Sofia. His paper was an outline to a comprehensive an-
                                WSNs, robotics, and web security has highlighted new                                                   alytical intelligence framework (i-framework) for study-
                                vulnerabilities and potential exploits. Addressing these                                               ing the problem of future smart city security challenges,
                                challenges requires a holistic approach, recognizing that                                              adding a scenario-based proactive analysis, combined
                                cybersecurity cannot exist in isolation from broader se-                                               with system modelling and results hybrid multicriteria
                                curity concerns. It was emphasized that the need for                                                   validation. The intelligent part comes from different AI
                                collaboration between industry, government sectors, and                                                models that are implemented in the process, giving sup-
                                academia is a must in order to navigate the intricate land-                                            portive and generative added values.
                                scape of cyber threats with the ultimate goal to mitigate                                                 Professor Miloš Kostić from The Faculty of Informa-
                                                                                                                                       tion Technology at Belgrade Metropolitan University pre-
                                BISEC’23: 14th International Conference on Business Information                                        sented the paper "Gamification as a Tool for Elevating
                                Security, November 24, 2023, Niš, Serbia                                                               Password Strength Awareness", which explred the con-
                                $ nemanja.zdravkovic@metropolitan.ac.rs (N. Zdravković);                                               cept of a two-dimensional game in which players face
                                mcong@unileon.es (M. Á. Conde); sonsoles.lopez@uef.fi                                                  specific challenges aimed at replacing existing weak pass-
                                (S. López-Pernas); vijayakp@srmist.edu.in (P. Vijayakumar)
                                                                                                                                       words with new, stronger ones, while avoiding the loss
                                 0000-0002-2631-6308 (N. Zdravković); 0000-0001-5881-7775
                                (M. Á. Conde); 0000-0002-9621-1392 (S. López-Pernas);                                                  of access to various platforms.
                                0000-0002-3929-8495 (P. Vijayakumar)                                                                      The next paper, entitled "Secure Course Completion
                                          © 2024 Copyright for this paper by its authors. Use permitted under Creative Commons License
                                          Attribution 4.0 International (CC BY 4.0).                                                   Credentialing Using Hyperledger Fabric" explored a so-
                                    CEUR
                                    Workshop
                                    Proceedings
                                                  http://ceur-ws.org
                                                  ISSN 1613-0073
                                                                       CEUR Workshop Proceedings (CEUR-WS.org)




CEUR
                  ceur-ws.org
Workshop      ISSN 1613-0073
Proceedings
lution based on Hyperledger Fabric, for issuing and val-       cially when complex business scenarios arise. Ultimately,
idating documents from Higher Education Institutions           this exploration was intended to enhance comprehension
(HEIs), such as diplomas and diploma supplements. With         surrounding progressive security measures applicable to
a minimal needed number of functionalities, such as is-        the Spring environment thereby equipping developers
suance and verification, the presented lightweight system      with improved capacity for constructing more resilient
can be deployed on a trustful environment, e. g. faculties     application solutions.
from the same university, or a consortium of universities.
   Yaina Pandith’s paper explored deep blockchain ar-
chitectures, involving the introduction of higher-layer        Conclusion
blockchains, which summarize their blocks through an-
                                                               We extend our gratitude to all of the authors who con-
chor transactions integrated into the blocks of lower-
                                                               tributed with their research for these proceedings. We
layer blockchains. The advancements presented in this
                                                               would also like to thank all the participants, attendees,
paper form a solid foundation for the development of
                                                               and volunteers who made BISEC-2023 a successful and
scalable web applications. This research would enable
                                                               productive event. We hope that discussions, open dia-
further innovative solutions in various industries that
                                                               logues, and identified issues and potential research topics
can scale modern web applications successfully, ensur-
                                                               will contribute to the advancement of the field of busi-
ing unwavering data integrity, enhanced security, and
                                                               ness data security, novel attack prevention and protection
optimized efficiency.
                                                               schemes, and cybersecurity overall.
   Professor Alexander Alexandrov from the Institute of
Robotics, Bulgarian Academy of Sciences in Sofia pre-
sented two papers. The first paper, entitled "Energy-          Acknowledgment
Efficient Routing in UAVs Supported Perimeter Security
Networks" examined the integration of group of UAVs            The BISEC-2023 conference was cosponsored by the Min-
into perimeter security, evaluating their effectiveness, op-   istry of Science, Technological Development, and Innova-
erational frameworks, technological advancements, and          tions of the Republic of Serbia. The conference organizers
potential future developments. The paper analyzes and          would like to acknowledge this support and partnership,
implemented a PSO (Particle Swarm Optimization) algo-          which helped out in making the BISEC-2023 successful
rithm, related to group of UAVs trajectory optimization,       conference. During the preparation of the conference, a
review case studies, and identify key considerations for       total of 28 paper submissions were received, while 9 arti-
effective development. The second paper "Reducing the          cles and short papers were selected for this publication.
WSN’s Communication Overhead by the SD-SPDZ En-
cryption Protocol" introduced a protocol which enhances
the privacy-preserving attributes and efficiency of its pre-
decessors. The presented SD-SPDZ protocol integrates
advanced cryptographic techniques, offering a more ro-
bust and scalable solution for secure computations in
WSNs.
   The next paper, "The Interplay of Social and Robotics
Theories in AGI Alignment: Navigating the Digital City
Through Simulation-based Multi-Agent Systems" by Lju-
biša Bojić and Vladimir Ðapić delved into the task of
aligning Artificial General Intelligence (AGI) and Large
Language Models (LLMs) to societal and ethical norms
by using theoretical frameworks derived from social sci-
ence and robotics. This paper presented an innovative
simulation-based approach, engaging autonomous so-
called "digital citizens" within a multi-agent system sim-
ulation in a virtual city environment.
   Finally, the paper "Data Protection Standards in the
Business Environment" presented advanced security tech-
nologies and mechanisms which could be suitably em-
ployed within the Spring Framework for creating secure
and scalable web applications. The analysis outlined ad-
vantages and challenges of each of the presented mech-
anisms, coupled with integration considerations, espe-