计算机科学 ›› 2025, Vol. 52 ›› Issue (11A): 241200203-9.doi: 10.11896/jsjkx.241200203
孟冬月1,2, 黄玉钏1,2,3, 韩国祥1,2, 李红臣1, 王棚飞1
MENG Dongyue1,2, HUANG Yuchuan1,2,3, HAN Guoxiang1,2, LI Hongchen1, WANG Pengfei1
摘要: 为保障四旋翼无人机在应急救援现场安全可靠作业,针对应急救援现场四旋翼无人机信息体系统交互不规范的问题,提出了应急救援四旋翼无人机系统救援现场空间信息体,并基于密码学对应急救援指挥部控制模块和控制信号进行完整性和保密性验证。同时,为了保证四旋翼无人机按照应急救援指挥部控制信号稳定飞行,建立了应急救援四旋翼无人机动力学模型,设计了基于前馈PID的应急救援四旋翼无人机位姿控制器,最后利用Python的Cryptography和Matlab的Simulink开展联合实验。实验结果表明,使用的密码模块可以高效完成真实性与保密性验证,前馈PID位姿控制器可以很好地完成事故救援现场巡飞作业。此研究将为应急救援四旋翼无人机在实际应用中的安全性和可靠性提供有效的理论支持。
中图分类号:
| [1]HE D J,DU X,QIAO Y R.A Survey on Cyber Security of Unmanned Aerial Vehicles[J].Chinese Journal of Computer,2029,42(5):1076-1074. [2]GUO L,YU X,ZHANG X,et al.Safety control system techno-logies for UAVs:review and prospect[J].Scientia Sinica Informationis,2020,50(2):184-194. [3]JAHAN F,SUN W,NIYAZ Q,et al.Security modeling of auto-nomous systems:a survey[J].ACM Computing Surveys,2019,52(5):1-34. [4]WANG Z H,ZHOU C H,PAN Y W,.et al.Overview of Unmanned Aerial Vehicle Systems Security[J].Computer Science,2024,51(S1):876-881. [5]BAO S G,YAO Q C,WANG Y W.Research on the application of fire fighting UAV in high-rise buildings [J].Fire Industry(Electronic Version),2024,10(15):31-33. [6]LIU Y,NING P,REITER M K.False data injection attacks against state estimation in electric power grids[J].ACM Transactions on Information and System Security,2011,14(1):1-33. [7]LIANG G Q,ZHAO J H,LUO F J.A review of false data injection attacks against modern power systems[J].IEEE Transactions on Smart Grid,2017,8(4):1630-1638. [8]QIN J H,LI M L,SHI L.Optimal denial-of-service attackscheduling with energy constraint over packet-dropping networks[J].IEEE Transactions on Automatic Control,2018,63(6):1648-1663. [9]RAHMAN M A,MOHSENIAN-RAD H.False data injectionattacks with incompleteinformation against smart power grids[C]//IEEE Global Communications Conference(GLOBECOM).2012. [10]LIU X,BAO Z,LU D.Modeling of localfalse data injection attacks with reduced network information[J].IEEE Transactions on Smart Grid,2017,6(4):1686-1696. [11]LIU X,LI Z Y.False data attacks against AC state estimation with incomplete network information[J].IEEE Transactions on Smart Grid,2017,8(5):2239-2248. [12]ESMALIFALAK M,NGUYEN H,ZHENG R,et al.Stealthfalse data injection usingindependent component analysis in smart grid[C]//IEEE International Conference on Smart Grid Communications.2011. [13]LIU W,FENG B W,WENG J.Survey on research of mini-drones security[J].Chinese Journal of Network and Information Security,2016,2(3):39-45. [14]HE D J,D X,Q Y R,et al.A Survey on cyber security of unmanned aerial vehicles[J].Chinese Journal of Computers,2019,42(5):1076-1094. [15]BHATTI J,HUMPHREYS T E.Hostile control of ships viafalse GPS signal:demonstration and detection[J].Journal of the Institute of Navigation,2017,64:51-66. [16]KERNS A J,SHEPARE D P,BHATTI J A,et al.Unmanned aircraft capture and control via GPS spoofing[J].Journal of Field Robotics,2014,31(4):617-636. [17]PSIAKI M L,HUMPHREYS T E.GNSS spoofing and detection[J].Proceedings of the IEEE,2016,104(6):1258-1270. [18]LIU X Y,JIA J.Safety analysis method of small shipboard fixed wing UAV[J].Command Control and Simulation,2019,41(1):109-111. [19]CHEN P Z,WU H Y,CHEN Y.Path planning for microquadrotor UAVs based on dynamic movement primitives[J].Chinese High Technology Letters,2016(2):186-194. [20]XU J,CAI CX,LI YQ,et al.Dual-loop path tracking and control for quad-rotor miniature unmanned aerial vehicles[J].Control Theory & Applications,2015,32(10):1335-1342. [21]LIU J Y,JIA W F,LAI J Z,et al.Multi-information Nonlinear Fusion Technology of Micro Quadrotor Aircraft[J].Journal of Nanjing University of Aeronautics & Astronautics,2013,45(5):575-582. [22]WU C F,LIU X Q,YUAN X.Modeling and PID control for a quadrotor[J].Electronic Design Engineering,2012(16):68-70. [23]CHEN Z Q,CHEN Y,SUN M W,et al.Surveys on Theory and Engineering Applications for Linear Active Disturbance Rejection Control[J].Information and Control,2017(3):257-266. [24]GAO J,WANG P,HOU Z X.UAV velocity control based onimproved PID algorithm[J].Journal of Huazhong University of Science and Technology(Natural Science Edition),2015(S1):1-5. [25]HAN Z Q.Auto-disturbances-rejection Controller and Its Applications[J].Control and Decision,1998(1):19-23. [26]SONG W G.Theory,methods and algorithms of robot mechanical systems[M].Beijing:China Machine Press,2007. [27]CAI Z X.Robotics[M].Beijing:Tsinghua University Press,2000. [28]LIU R.Robotics,Machine Vision and Control—Fundamentals of MATLAB Algorithms[M].Beijing:Publishing House of Electronics Industry,2020. [29]GUO H,GUO X H.Local path planning algorithm for UAV based on improved velocity obstacle method[J].Acta Aeronauticaet Astronautica Sinica,2023,44(11):327586-327586. [30]ZHAI L,ZHANG X Y,ZHANG X,et al.Local Dynamic Obstacle Avoidance Path Planning Algorithm for Unmanned Vehicles Based on Potential Field Method[J].Transactions of Beijing Institute of Technology,2022,42(7):696-705. [31]ZHANG Q,SONG B Y,ZHAO H D.Discretization of Fractional Order Differentiator and Integrator with Different Fractional Orders[J].Intelligent Control and Automation,2017(8):75-85.[32]崔凤午,梁怀学.棣莫弗公式在推导倍角公式中的应用[J].松辽学刊(自然科学版),1997(4):64-65. [33]胡寿松.自动控制原理 [M].科学出版社,2007. [34]OSSAREH H R,WISOTZKI S,BUCKLAND S,et al.An Internal Model Control-Based Approach for Characterization and Controller Tuning of Turbocharged Gasoline Engines[J].IEEE transactions on control systems technology:A publication of the IEEE Control Systems Society,2021,29(2):866-875. [35]GUO L.Feedback and uncertainty:Some basic problems and results[J].Annual Review in Control.2020:4927-4936. [36]WU L F,HONG Z,PAN F.Network protocol reverse analysis and application[M].Beijing:National Defense Industry Press,2016. [37]YE Y,ZHANG Z,WANG F,et al.Netplier:probabilistic net-work protocol reverse engineering from message Traces[C]//Network and Distributed System Security Symposium.2021. [38]GENTRY C,WATERS B.Adaptive security in broadcast en-cryption systems(with short ciphertexts)[C]//Annual International Conference on the Theory and Applications of Cryptographic Techniques.2009:171-188. [39]ZHAO X,ZHANG F.Fully CCA2 secure identity-based broadcast encryption with black-box accountable authority[J].Journal of Systems and Software,2012,85(3):708-716. [40]SHI X L,ZHU Y F,LIU L,et al.Method of encrypted protocol reverse engineering [J].Application Research of Computers,2015,32(1):214-217. [41]GAO J F,ZHANG Y F,LUO S,et al.Research on Taint Back-tracking Reverse Analysis Method of Network Encoding Protocol[J].Netinfo Security,2017(1):68-76. [42]MA R K,ZHENG H,WANG J Y,et al.Automatic protocol reverse engineering for industrial control systems with dynamic taint analysis[J].Frontiers of Information Technology & Electronic Engineering,2022,23(3):351-360. [43]ZHU Y,HAN J,YUAN L,et al.SPFPA:A format parsing approach for unknown security protocols[J].Journal of Computer Research and Development,2015,52(10):2200. [44]HE X D.Security Analysis of Security Protocol Implementations Based on Network Trace [D].Wuhan:South-Central Minzu University,2019. [45]TANG S Y,CHENG G,JIANG B M,et al.Detection and recognition of VPN encrypted traffic based on segmented entropy distribution[J].Cyberspace Security.2020,11(8):23-27,33. [46]XIAO D Q,ZHOU Q,ZHANG H G,et al.Analyzing encryption protocols based on temporal logic[J].Chinese Journal of Computers,2002,25(10):1083-1089. [47]DING S F,ZHU H,XU X Z,et al.Entropy-based fuzzy information measures[J].Chinese Journal of Computers,2012,35(4):796-801. [48]ZHU Y N,HAN J H,YUAN L,et al.Protocol ciphertext field identification by entropy estimating[J].Journal of Electronics & Information Technology,2016,38(8):1865-1871. |
|
||