计算机科学 ›› 2025, Vol. 52 ›› Issue (11A): 241200203-9.doi: 10.11896/jsjkx.241200203

• 交叉&应用 • 上一篇    下一篇

基于前馈PID的应急救援四旋翼无人机安全控制研究

孟冬月1,2, 黄玉钏1,2,3, 韩国祥1,2, 李红臣1, 王棚飞1   

  1. 1 应急管理部大数据中心 北京 100013
    2 网络和数据安全应急管理部重点实验室 北京 100013
    3 系统控制与信息处理教育部重点实验室 上海 200240
  • 出版日期:2025-11-15 发布日期:2025-11-10
  • 通讯作者: 黄玉钏(huangyu@mail.ustc.edu.cn )
  • 作者简介:mengdy1104@163.com
  • 基金资助:
    城市外洪内涝链生灾害风险智能预警与定向发布(2022YFC3090603);系统控制与信息处理教育部重点实验室开放基金

Research on Emergency Rescue Quadcopter UAV Safety Control Based on Feedforward PID

MENG Dongyue1,2, HUANG Yuchuan1,2,3, HAN Guoxiang1,2, LI Hongchen1, WANG Pengfei1   

  1. 1 Ministry of Emergency Management Big Data Center,Beijing 100013,China
    2 Key Laboratory of Cyberspace and Data Security,Ministry of Emergency Management,Beijing 100013,China
    3 Key Laboratory of System Control and Information Processing,Ministry of Education of China,Shanghai 200240,China
  • Online:2025-11-15 Published:2025-11-10
  • Supported by:
    Intelligent Early Warning and Targeted Release of Urban Flood and Waterlogging Chain Disaster Risks(2022YFC3090603) and Foundation of Key Laboratory of System Control and Information Processing,Ministry of Education,China.

摘要: 为保障四旋翼无人机在应急救援现场安全可靠作业,针对应急救援现场四旋翼无人机信息体系统交互不规范的问题,提出了应急救援四旋翼无人机系统救援现场空间信息体,并基于密码学对应急救援指挥部控制模块和控制信号进行完整性和保密性验证。同时,为了保证四旋翼无人机按照应急救援指挥部控制信号稳定飞行,建立了应急救援四旋翼无人机动力学模型,设计了基于前馈PID的应急救援四旋翼无人机位姿控制器,最后利用Python的Cryptography和Matlab的Simulink开展联合实验。实验结果表明,使用的密码模块可以高效完成真实性与保密性验证,前馈PID位姿控制器可以很好地完成事故救援现场巡飞作业。此研究将为应急救援四旋翼无人机在实际应用中的安全性和可靠性提供有效的理论支持。

关键词: 密码技术, 四旋翼无人机, 网络安全, 前馈PID, 位姿控制

Abstract: To ensure the safe and reliable operation of quadcopter unmanned aerial vehicles at emergency rescue sites,and to address the non-standard interaction of quadcopter unmanned aerial vehicle information systems at emergency rescue sites,this paper proposes an emergency rescue quadcopter unmanned aerial vehicle system rescue site spatial information body,and verifies the integrity and confidentiality of the emergency rescue command center control module and control signals based on cryptographic methods.At the same time,in order to ensure stable flight of quadcopter drones according to command signals,a quadcopter drone dynamic model is established,and a Feedforward PID based quadcopter drone pose controller is adopted.Finally,a joint experiment is conducted using Python’s Cryptography and Matlab’s Simulink.The results indicate that the password module used in the study can complete authenticity and confidentiality verification,and the pose controller can also effectively achieve patrol operations at accident rescue sites.This study provides effective theoretical support and technical assurance for the safety and reliability of quadcopter unmanned aerial vehicles in practical emergency rescue applications.

Key words: Cryptography, Quadcopter unmanned aerial vehicle, Network security, Feedforward PID, Pose control

中图分类号: 

  • TP399
[1]HE D J,DU X,QIAO Y R.A Survey on Cyber Security of Unmanned Aerial Vehicles[J].Chinese Journal of Computer,2029,42(5):1076-1074.
[2]GUO L,YU X,ZHANG X,et al.Safety control system techno-logies for UAVs:review and prospect[J].Scientia Sinica Informationis,2020,50(2):184-194.
[3]JAHAN F,SUN W,NIYAZ Q,et al.Security modeling of auto-nomous systems:a survey[J].ACM Computing Surveys,2019,52(5):1-34.
[4]WANG Z H,ZHOU C H,PAN Y W,.et al.Overview of Unmanned Aerial Vehicle Systems Security[J].Computer Science,2024,51(S1):876-881.
[5]BAO S G,YAO Q C,WANG Y W.Research on the application of fire fighting UAV in high-rise buildings [J].Fire Industry(Electronic Version),2024,10(15):31-33.
[6]LIU Y,NING P,REITER M K.False data injection attacks against state estimation in electric power grids[J].ACM Transactions on Information and System Security,2011,14(1):1-33.
[7]LIANG G Q,ZHAO J H,LUO F J.A review of false data injection attacks against modern power systems[J].IEEE Transactions on Smart Grid,2017,8(4):1630-1638.
[8]QIN J H,LI M L,SHI L.Optimal denial-of-service attackscheduling with energy constraint over packet-dropping networks[J].IEEE Transactions on Automatic Control,2018,63(6):1648-1663.
[9]RAHMAN M A,MOHSENIAN-RAD H.False data injectionattacks with incompleteinformation against smart power grids[C]//IEEE Global Communications Conference(GLOBECOM).2012.
[10]LIU X,BAO Z,LU D.Modeling of localfalse data injection attacks with reduced network information[J].IEEE Transactions on Smart Grid,2017,6(4):1686-1696.
[11]LIU X,LI Z Y.False data attacks against AC state estimation with incomplete network information[J].IEEE Transactions on Smart Grid,2017,8(5):2239-2248.
[12]ESMALIFALAK M,NGUYEN H,ZHENG R,et al.Stealthfalse data injection usingindependent component analysis in smart grid[C]//IEEE International Conference on Smart Grid Communications.2011.
[13]LIU W,FENG B W,WENG J.Survey on research of mini-drones security[J].Chinese Journal of Network and Information Security,2016,2(3):39-45.
[14]HE D J,D X,Q Y R,et al.A Survey on cyber security of unmanned aerial vehicles[J].Chinese Journal of Computers,2019,42(5):1076-1094.
[15]BHATTI J,HUMPHREYS T E.Hostile control of ships viafalse GPS signal:demonstration and detection[J].Journal of the Institute of Navigation,2017,64:51-66.
[16]KERNS A J,SHEPARE D P,BHATTI J A,et al.Unmanned aircraft capture and control via GPS spoofing[J].Journal of Field Robotics,2014,31(4):617-636.
[17]PSIAKI M L,HUMPHREYS T E.GNSS spoofing and detection[J].Proceedings of the IEEE,2016,104(6):1258-1270.
[18]LIU X Y,JIA J.Safety analysis method of small shipboard fixed wing UAV[J].Command Control and Simulation,2019,41(1):109-111.
[19]CHEN P Z,WU H Y,CHEN Y.Path planning for microquadrotor UAVs based on dynamic movement primitives[J].Chinese High Technology Letters,2016(2):186-194.
[20]XU J,CAI CX,LI YQ,et al.Dual-loop path tracking and control for quad-rotor miniature unmanned aerial vehicles[J].Control Theory & Applications,2015,32(10):1335-1342.
[21]LIU J Y,JIA W F,LAI J Z,et al.Multi-information Nonlinear Fusion Technology of Micro Quadrotor Aircraft[J].Journal of Nanjing University of Aeronautics & Astronautics,2013,45(5):575-582.
[22]WU C F,LIU X Q,YUAN X.Modeling and PID control for a quadrotor[J].Electronic Design Engineering,2012(16):68-70.
[23]CHEN Z Q,CHEN Y,SUN M W,et al.Surveys on Theory and Engineering Applications for Linear Active Disturbance Rejection Control[J].Information and Control,2017(3):257-266.
[24]GAO J,WANG P,HOU Z X.UAV velocity control based onimproved PID algorithm[J].Journal of Huazhong University of Science and Technology(Natural Science Edition),2015(S1):1-5.
[25]HAN Z Q.Auto-disturbances-rejection Controller and Its Applications[J].Control and Decision,1998(1):19-23.
[26]SONG W G.Theory,methods and algorithms of robot mechanical systems[M].Beijing:China Machine Press,2007.
[27]CAI Z X.Robotics[M].Beijing:Tsinghua University Press,2000.
[28]LIU R.Robotics,Machine Vision and Control—Fundamentals of MATLAB Algorithms[M].Beijing:Publishing House of Electronics Industry,2020.
[29]GUO H,GUO X H.Local path planning algorithm for UAV based on improved velocity obstacle method[J].Acta Aeronauticaet Astronautica Sinica,2023,44(11):327586-327586.
[30]ZHAI L,ZHANG X Y,ZHANG X,et al.Local Dynamic Obstacle Avoidance Path Planning Algorithm for Unmanned Vehicles Based on Potential Field Method[J].Transactions of Beijing Institute of Technology,2022,42(7):696-705.
[31]ZHANG Q,SONG B Y,ZHAO H D.Discretization of Fractional Order Differentiator and Integrator with Different Fractional Orders[J].Intelligent Control and Automation,2017(8):75-85.[32]崔凤午,梁怀学.棣莫弗公式在推导倍角公式中的应用[J].松辽学刊(自然科学版),1997(4):64-65.
[33]胡寿松.自动控制原理 [M].科学出版社,2007.
[34]OSSAREH H R,WISOTZKI S,BUCKLAND S,et al.An Internal Model Control-Based Approach for Characterization and Controller Tuning of Turbocharged Gasoline Engines[J].IEEE transactions on control systems technology:A publication of the IEEE Control Systems Society,2021,29(2):866-875.
[35]GUO L.Feedback and uncertainty:Some basic problems and results[J].Annual Review in Control.2020:4927-4936.
[36]WU L F,HONG Z,PAN F.Network protocol reverse analysis and application[M].Beijing:National Defense Industry Press,2016.
[37]YE Y,ZHANG Z,WANG F,et al.Netplier:probabilistic net-work protocol reverse engineering from message Traces[C]//Network and Distributed System Security Symposium.2021.
[38]GENTRY C,WATERS B.Adaptive security in broadcast en-cryption systems(with short ciphertexts)[C]//Annual International Conference on the Theory and Applications of Cryptographic Techniques.2009:171-188.
[39]ZHAO X,ZHANG F.Fully CCA2 secure identity-based broadcast encryption with black-box accountable authority[J].Journal of Systems and Software,2012,85(3):708-716.
[40]SHI X L,ZHU Y F,LIU L,et al.Method of encrypted protocol reverse engineering [J].Application Research of Computers,2015,32(1):214-217.
[41]GAO J F,ZHANG Y F,LUO S,et al.Research on Taint Back-tracking Reverse Analysis Method of Network Encoding Protocol[J].Netinfo Security,2017(1):68-76.
[42]MA R K,ZHENG H,WANG J Y,et al.Automatic protocol reverse engineering for industrial control systems with dynamic taint analysis[J].Frontiers of Information Technology & Electronic Engineering,2022,23(3):351-360.
[43]ZHU Y,HAN J,YUAN L,et al.SPFPA:A format parsing approach for unknown security protocols[J].Journal of Computer Research and Development,2015,52(10):2200.
[44]HE X D.Security Analysis of Security Protocol Implementations Based on Network Trace [D].Wuhan:South-Central Minzu University,2019.
[45]TANG S Y,CHENG G,JIANG B M,et al.Detection and recognition of VPN encrypted traffic based on segmented entropy distribution[J].Cyberspace Security.2020,11(8):23-27,33.
[46]XIAO D Q,ZHOU Q,ZHANG H G,et al.Analyzing encryption protocols based on temporal logic[J].Chinese Journal of Computers,2002,25(10):1083-1089.
[47]DING S F,ZHU H,XU X Z,et al.Entropy-based fuzzy information measures[J].Chinese Journal of Computers,2012,35(4):796-801.
[48]ZHU Y N,HAN J H,YUAN L,et al.Protocol ciphertext field identification by entropy estimating[J].Journal of Electronics & Information Technology,2016,38(8):1865-1871.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!