计算机科学 ›› 2022, Vol. 49 ›› Issue (7): 332-339.doi: 10.11896/jsjkx.210600107
李瑭, 秦小麟, 迟贺宇, 费珂
LI Tang, QIN Xiao-lin, CHI He-yu, FEI Ke
摘要: 随着无人系统技术的不断发展,多无人系统的协同控制技术受到了广泛的关注。设计合理的协同模型是多无人系统中的重要研究内容,而已有协同模型在开放的网络环境中存在一定的安全性问题。在分析已有模型的不足的基础上,提出了一种具有安全特性的多无人系统协同模型RCC(Rules Combined Coordination)。RCC模型在协同过程中引入了逻辑规则,提供了终端的合法性认证及通信双方的权限控制,保障了多无人系统的安全性。最后,基于开源机器人系统ROS及RCC模型,搭建了多无人车的协同仿真平台,并在其中设计了导航、避障等实验场景,仿真实验的相关结果验证了RCC模型具有可用性和安全性。
中图分类号:
[1]ZHANG T,LI Q,ZHANG C S,et al.Current trends in the development of intelligent unmanned autonomous systems[J].Frontiers of Information Technology & Electronic Engineering,2017,18(1):11-22. [2]SCHUYLER T J,IRVIN B,ABAD K,et al.Application of aSmall Unmanned Aerial System to Measure Ammonia Emissions from a Pilot Amine-CO2Capture System[J].Sensors,2020,20(23):6974. [3]CUNNINGHAM M,SAMSON C,LALIBERTÉJ,et al.Inversion of Magnetic Data Acquired with a Rotary-Wing Unmanned Aircraft System for Gold Exploration[J].Pure and Applied.Geophys,2021,178:501-516. [4]ZHANG M.Research on Optimization Algorithm of UAV and Logistics Vehicle Collaborative Distribution Based on Dynamic Collection[D].Harbin:Harbin Engineering University,2020. [5]ZHOU Y M,ZHAOH R,CHEN J F,et al.A novel missionplanning method for UAVs' course of action[J].Computer Communications,2020,152(4):345-356. [6]BHATT G D.Knowledge management in organizations:examining the interaction between technologies,techniques,and people[J].Journal of Knowledge Management,2001,5(1):68-75. [7]MA Y,ZHAO Y J,QI X,et al.Cooperative communicationframework design for the unmanned aerial vehicles-unmanned surface vehicles formation[J].Advances in Mechanical Engineering,2018,10(5):1-9. [8]ELMARZOUQI N,GARCIA E,LAPAYRE J.ACCM:a NewArchitecture Model for CSCW[C]//2007 11th International Conference on Computer Supported Cooperative Work in Design.Melbourne,VIC,Australia:IEEE,2007:84-91. [9]KULKARNI D,AHMED T,TRIPATHI A.A Generative Programming Framework for Context-Aware CSCW Applications[J].ACM Transactions on Software Engineering and Methodo-logy,2012,21(2):1-35. [10]MAHFOUDH H B,SERUGENDO D S G,NAJA N,et al.Learning-based coordination model for spontaneous self-composition of reliable services in a distributed system[J].International Journal on Software Tools for Technology Transfer,2020,22:417-436. [11]GELERNTER D.Generative communication in Linda[J].ACM Transactions on Programming Languages and Systems,1985,7(1):80-112. [12]OMICINI A.Formal ReSpecT in the A & A Perspective[J].Electronic Notes in Theoretical Computer Science,2007,175(2):97-117. [13]CASELLI A,CIATTO G,SERUGENDO G D M,et al.Engi-neering Semantic Self-composition of Services Through Tuple-Based Coordination[J].ISoLA,2020,12477:205-223. [14]CASADEI R,VIROLI M,RICCI A,et al.Tuple-Based Coordination in Large-Scale Situated Systems[J].Coordination Models and Languages,2021,12717:149-167. [15]MAMEI M,ZAMBONELLI F.Programming pervasive and mobile computing applications[J].ACM Transactions on Software Engineering and Methodology,2009,18(4):1-56. [16]FLORIANO E,ALCHIERI E,ARANHA D F,et al.Providing privacy on the tuple space model[J].Journal of Internet Services and Applications,2017 8(19):1-16. [17]CRAB S,KUHN E.A coordination-based access control model for space-based computing [C]//Proceedings of the 27th Annual ACM Symposium on Applied Computing,Association for Computing Machinery.New York,NY,USA,2012:1560-1562. [18]JIA Y N,LI Q,QIU S Q.Distributed Leader-Follower FlightControl for Large-Scale Clusters of Small Unmanned Aerial Vehicles[J].IEEE Access,2018,6:32790-32799. [19]GUO H Y.Research on Coordinated Flight Strategy for Mutil-UAV Based on Bee Colony Algorithm[D].Harbin:Harbin Engineering University,2012. [20]QIU H X,DUAN H B,FAN Y M.Multiple unmanned aerial ve-hicle autonomous formation based on the behavior mechanism in pigeon flocks[J].Control Theory & Applications,2015,32(10):1298-1304. [21]CERI S,GOTTLOB G,TANCA L.Logic Programming and Databases [M].Berlin:Springer-Verlag,1990:9-11. [22]BRAMER M.Logic Programming with Prolog [M].London:Springer-Verlag,2005:187-210. [23]VITEK J,BRYCE C,ORIOL M.Coordinating processes withsecure spaces[J].Science of Computer Programming,2003,46(1):163-193. |
[1] | 周连兵, 周湘贞, 崔学荣. 基于双重二维混沌映射的压缩图像加密方案 Compressed Image Encryption Scheme Based on Dual Two Dimensional Chaotic Map 计算机科学, 2022, 49(8): 344-349. https://doi.org/10.11896/jsjkx.210700235 |
[2] | 张振超, 刘亚丽, 殷新春. 适用于物联网环境的无证书广义签密方案 New Certificateless Generalized Signcryption Scheme for Internet of Things Environment 计算机科学, 2022, 49(3): 329-337. https://doi.org/10.11896/jsjkx.201200256 |
[3] | 陈海彪, 黄声勇, 蔡洁锐. 一个基于智能电网的跨层路由的信任评估协议 Trust Evaluation Protocol for Cross-layer Routing Based on Smart Grid 计算机科学, 2021, 48(6A): 491-497. https://doi.org/10.11896/jsjkx.201000169 |
[4] | 姜昊堃, 董学东, 张成. 改进的具有前向安全性的无证书代理盲签名方案 Improved Certificateless Proxy Blind Signature Scheme with Forward Security 计算机科学, 2021, 48(6A): 529-532. https://doi.org/10.11896/jsjkx.200700049 |
[5] | 石铁柱, 钱俊彦, 潘海玉. 模糊安全性和活性 Fuzzy Safety and Liveness Properties 计算机科学, 2021, 48(4): 31-36. https://doi.org/10.11896/jsjkx.200500036 |
[6] | 叶胜男, 陈建华. 一个强安全的无证书签名方案的分析和改进 Security Analysis and Improvement of Strongly Secure Certificateless Digital Signature Scheme 计算机科学, 2021, 48(10): 272-277. https://doi.org/10.11896/jsjkx.201200117 |
[7] | 蒲泓全, 崔喆, 刘霆, 饶金涛. 安全性电子投票方案研究综述 Comprehensive Review of Secure Electronic Voting Schemes 计算机科学, 2020, 47(9): 275-282. https://doi.org/10.11896/jsjkx.190900125 |
[8] | 董奇颖, 单轩, 贾春福. 口令Zipf分布对相关安全协议的影响分析 Impact of Zipf's Law on Password-related Security Protocols 计算机科学, 2020, 47(11): 42-47. https://doi.org/10.11896/jsjkx.200500144 |
[9] | 蔡泳, 钱俊彦, 潘海玉. 基于度量线性时态逻辑的近似安全性 Approximate Safety Properties in Metric Linear Temporal Logic 计算机科学, 2020, 47(10): 309-314. https://doi.org/10.11896/jsjkx.191000175 |
[10] | 孙宝华, 胡楠, 李东洋. 基于神经网络和NLP的软件需求安全分析研究 Analysis Research of Software Requirement Safety Based on Neural Network and NLP 计算机科学, 2019, 46(6A): 348-352. |
[11] | 徐丙凤, 何高峰, 张黎宁. 基于状态事件故障树的信息物理融合系统风险建模 Risk Modeling for Cyber-physical Systems Based on State/Event Fault Trees 计算机科学, 2019, 46(5): 105-110. https://doi.org/10.11896/j.issn.1002-137X.2019.05.016 |
[12] | 吴伟坚,陈世国,李丹. 二重keeloq算法在智能门禁系统中的应用研究 Application of Dual Keeloq Algorithm in Intelligent Access Control System 计算机科学, 2018, 45(6A): 573-575. |
[13] | 韦性佳,张京花,刘增芳,芦殿军. 具有前向安全性质的基于身份的聚合签名方案 Identity Based Aggregate Signature Scheme with Forward Security 计算机科学, 2018, 45(6A): 387-391. |
[14] | 丁庆洋,王秀利,朱建明,宋彪. 基于区块链的信息物理融合系统的信息安全保护框架 Information Security Framework Based on Blockchain for Cyber-physics System 计算机科学, 2018, 45(2): 32-39. https://doi.org/10.11896/j.issn.1002-137X.2018.02.006 |
[15] | 刘忠义, 沈祥辰, 倪绿林, 许春根. 信息隐藏中伪随机序列碰撞问题的算法改进 Algorithm Improvement of Pseudo-random Sequence Collision in Information Hiding 计算机科学, 2018, 45(11A): 330-334. |
|