计算机科学 ›› 2022, Vol. 49 ›› Issue (7): 332-339.doi: 10.11896/jsjkx.210600107

• 信息安全 • 上一篇    下一篇

面向多无人系统的安全协同模型

李瑭, 秦小麟, 迟贺宇, 费珂   

  1. 南京航空航天大学计算机科学与技术学院 南京211106
  • 收稿日期:2021-06-12 修回日期:2021-12-03 出版日期:2022-07-15 发布日期:2022-07-12
  • 通讯作者: 秦小麟(qinxcs@nuaa.edu.cn)
  • 作者简介:(sucre@nuaa.edu.cn)
  • 基金资助:
    国家自然科学基金(61728204)

Secure Coordination Model for Multiple Unmanned Systems

LI Tang, QIN Xiao-lin, CHI He-yu, FEI Ke   

  1. College of Computer Science and Technology,Nanjing University of Aeronautics and Astronautics,Nanjing 211106,China
  • Received:2021-06-12 Revised:2021-12-03 Online:2022-07-15 Published:2022-07-12
  • About author:LI Tang,born in 1997,postgraduate.His main research interests include coordination of unmanned system and data-log rules processing,etc.
    QIN Xiao-lin,born in 1953,professor,Ph.D,is a senior member of China Computer Federation.His main research interests include spatial and spatio-temporal databases,data management and security in distributed environment,etc.
  • Supported by:
    National Natural Science Foundation of China(61728204).

摘要: 随着无人系统技术的不断发展,多无人系统的协同控制技术受到了广泛的关注。设计合理的协同模型是多无人系统中的重要研究内容,而已有协同模型在开放的网络环境中存在一定的安全性问题。在分析已有模型的不足的基础上,提出了一种具有安全特性的多无人系统协同模型RCC(Rules Combined Coordination)。RCC模型在协同过程中引入了逻辑规则,提供了终端的合法性认证及通信双方的权限控制,保障了多无人系统的安全性。最后,基于开源机器人系统ROS及RCC模型,搭建了多无人车的协同仿真平台,并在其中设计了导航、避障等实验场景,仿真实验的相关结果验证了RCC模型具有可用性和安全性。

关键词: 安全性, 仿真系统, 逻辑规则, 无人系统, 协同模型

Abstract: With the development of unmanned system technology,the coordination control of multiple unmanned systems has been widely concerned.Designing a reasonable coordination model is an important research content of multiple unmanned systems,but existing coordination models have security problems in the open network environment.Based on the analysis of the deficiencies of existing models,a coordination model RCC of multiple unmanned systems with security characteristics is proposed.RCC model introduces logic rules in the coordination process to provide the legality of terminals and the authority control of the communication parties,and ensures the security of multiple unmanned systems.Finally,based on ROS and RCC model,a coordination simulation platform for multiple unmanned vehicles is built,in which experiment scenes of navigation and obstacle avoi-dance are designed.Simulation results verify the practicability and security of RCC model.

Key words: Logic rules, Coordination model, Security, Simulation system, Unmanned systems

中图分类号: 

  • TP311
[1]ZHANG T,LI Q,ZHANG C S,et al.Current trends in the development of intelligent unmanned autonomous systems[J].Frontiers of Information Technology & Electronic Engineering,2017,18(1):11-22.
[2]SCHUYLER T J,IRVIN B,ABAD K,et al.Application of aSmall Unmanned Aerial System to Measure Ammonia Emissions from a Pilot Amine-CO2Capture System[J].Sensors,2020,20(23):6974.
[3]CUNNINGHAM M,SAMSON C,LALIBERTÉJ,et al.Inversion of Magnetic Data Acquired with a Rotary-Wing Unmanned Aircraft System for Gold Exploration[J].Pure and Applied.Geophys,2021,178:501-516.
[4]ZHANG M.Research on Optimization Algorithm of UAV and Logistics Vehicle Collaborative Distribution Based on Dynamic Collection[D].Harbin:Harbin Engineering University,2020.
[5]ZHOU Y M,ZHAOH R,CHEN J F,et al.A novel missionplanning method for UAVs' course of action[J].Computer Communications,2020,152(4):345-356.
[6]BHATT G D.Knowledge management in organizations:examining the interaction between technologies,techniques,and people[J].Journal of Knowledge Management,2001,5(1):68-75.
[7]MA Y,ZHAO Y J,QI X,et al.Cooperative communicationframework design for the unmanned aerial vehicles-unmanned surface vehicles formation[J].Advances in Mechanical Engineering,2018,10(5):1-9.
[8]ELMARZOUQI N,GARCIA E,LAPAYRE J.ACCM:a NewArchitecture Model for CSCW[C]//2007 11th International Conference on Computer Supported Cooperative Work in Design.Melbourne,VIC,Australia:IEEE,2007:84-91.
[9]KULKARNI D,AHMED T,TRIPATHI A.A Generative Programming Framework for Context-Aware CSCW Applications[J].ACM Transactions on Software Engineering and Methodo-logy,2012,21(2):1-35.
[10]MAHFOUDH H B,SERUGENDO D S G,NAJA N,et al.Learning-based coordination model for spontaneous self-composition of reliable services in a distributed system[J].International Journal on Software Tools for Technology Transfer,2020,22:417-436.
[11]GELERNTER D.Generative communication in Linda[J].ACM Transactions on Programming Languages and Systems,1985,7(1):80-112.
[12]OMICINI A.Formal ReSpecT in the A & A Perspective[J].Electronic Notes in Theoretical Computer Science,2007,175(2):97-117.
[13]CASELLI A,CIATTO G,SERUGENDO G D M,et al.Engi-neering Semantic Self-composition of Services Through Tuple-Based Coordination[J].ISoLA,2020,12477:205-223.
[14]CASADEI R,VIROLI M,RICCI A,et al.Tuple-Based Coordination in Large-Scale Situated Systems[J].Coordination Models and Languages,2021,12717:149-167.
[15]MAMEI M,ZAMBONELLI F.Programming pervasive and mobile computing applications[J].ACM Transactions on Software Engineering and Methodology,2009,18(4):1-56.
[16]FLORIANO E,ALCHIERI E,ARANHA D F,et al.Providing privacy on the tuple space model[J].Journal of Internet Services and Applications,2017 8(19):1-16.
[17]CRAB S,KUHN E.A coordination-based access control model for space-based computing [C]//Proceedings of the 27th Annual ACM Symposium on Applied Computing,Association for Computing Machinery.New York,NY,USA,2012:1560-1562.
[18]JIA Y N,LI Q,QIU S Q.Distributed Leader-Follower FlightControl for Large-Scale Clusters of Small Unmanned Aerial Vehicles[J].IEEE Access,2018,6:32790-32799.
[19]GUO H Y.Research on Coordinated Flight Strategy for Mutil-UAV Based on Bee Colony Algorithm[D].Harbin:Harbin Engineering University,2012.
[20]QIU H X,DUAN H B,FAN Y M.Multiple unmanned aerial ve-hicle autonomous formation based on the behavior mechanism in pigeon flocks[J].Control Theory & Applications,2015,32(10):1298-1304.
[21]CERI S,GOTTLOB G,TANCA L.Logic Programming and Databases [M].Berlin:Springer-Verlag,1990:9-11.
[22]BRAMER M.Logic Programming with Prolog [M].London:Springer-Verlag,2005:187-210.
[23]VITEK J,BRYCE C,ORIOL M.Coordinating processes withsecure spaces[J].Science of Computer Programming,2003,46(1):163-193.
[1] 周连兵, 周湘贞, 崔学荣.
基于双重二维混沌映射的压缩图像加密方案
Compressed Image Encryption Scheme Based on Dual Two Dimensional Chaotic Map
计算机科学, 2022, 49(8): 344-349. https://doi.org/10.11896/jsjkx.210700235
[2] 张振超, 刘亚丽, 殷新春.
适用于物联网环境的无证书广义签密方案
New Certificateless Generalized Signcryption Scheme for Internet of Things Environment
计算机科学, 2022, 49(3): 329-337. https://doi.org/10.11896/jsjkx.201200256
[3] 陈海彪, 黄声勇, 蔡洁锐.
一个基于智能电网的跨层路由的信任评估协议
Trust Evaluation Protocol for Cross-layer Routing Based on Smart Grid
计算机科学, 2021, 48(6A): 491-497. https://doi.org/10.11896/jsjkx.201000169
[4] 姜昊堃, 董学东, 张成.
改进的具有前向安全性的无证书代理盲签名方案
Improved Certificateless Proxy Blind Signature Scheme with Forward Security
计算机科学, 2021, 48(6A): 529-532. https://doi.org/10.11896/jsjkx.200700049
[5] 石铁柱, 钱俊彦, 潘海玉.
模糊安全性和活性
Fuzzy Safety and Liveness Properties
计算机科学, 2021, 48(4): 31-36. https://doi.org/10.11896/jsjkx.200500036
[6] 叶胜男, 陈建华.
一个强安全的无证书签名方案的分析和改进
Security Analysis and Improvement of Strongly Secure Certificateless Digital Signature Scheme
计算机科学, 2021, 48(10): 272-277. https://doi.org/10.11896/jsjkx.201200117
[7] 蒲泓全, 崔喆, 刘霆, 饶金涛.
安全性电子投票方案研究综述
Comprehensive Review of Secure Electronic Voting Schemes
计算机科学, 2020, 47(9): 275-282. https://doi.org/10.11896/jsjkx.190900125
[8] 董奇颖, 单轩, 贾春福.
口令Zipf分布对相关安全协议的影响分析
Impact of Zipf's Law on Password-related Security Protocols
计算机科学, 2020, 47(11): 42-47. https://doi.org/10.11896/jsjkx.200500144
[9] 蔡泳, 钱俊彦, 潘海玉.
基于度量线性时态逻辑的近似安全性
Approximate Safety Properties in Metric Linear Temporal Logic
计算机科学, 2020, 47(10): 309-314. https://doi.org/10.11896/jsjkx.191000175
[10] 孙宝华, 胡楠, 李东洋.
基于神经网络和NLP的软件需求安全分析研究
Analysis Research of Software Requirement Safety Based on Neural Network and NLP
计算机科学, 2019, 46(6A): 348-352.
[11] 徐丙凤, 何高峰, 张黎宁.
基于状态事件故障树的信息物理融合系统风险建模
Risk Modeling for Cyber-physical Systems Based on State/Event Fault Trees
计算机科学, 2019, 46(5): 105-110. https://doi.org/10.11896/j.issn.1002-137X.2019.05.016
[12] 吴伟坚,陈世国,李丹.
二重keeloq算法在智能门禁系统中的应用研究
Application of Dual Keeloq Algorithm in Intelligent Access Control System
计算机科学, 2018, 45(6A): 573-575.
[13] 韦性佳,张京花,刘增芳,芦殿军.
具有前向安全性质的基于身份的聚合签名方案
Identity Based Aggregate Signature Scheme with Forward Security
计算机科学, 2018, 45(6A): 387-391.
[14] 丁庆洋,王秀利,朱建明,宋彪.
基于区块链的信息物理融合系统的信息安全保护框架
Information Security Framework Based on Blockchain for Cyber-physics System
计算机科学, 2018, 45(2): 32-39. https://doi.org/10.11896/j.issn.1002-137X.2018.02.006
[15] 刘忠义, 沈祥辰, 倪绿林, 许春根.
信息隐藏中伪随机序列碰撞问题的算法改进
Algorithm Improvement of Pseudo-random Sequence Collision in Information Hiding
计算机科学, 2018, 45(11A): 330-334.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!