Computer Science ›› 2022, Vol. 49 ›› Issue (7): 332-339.doi: 10.11896/jsjkx.210600107

• Information Security • Previous Articles     Next Articles

Secure Coordination Model for Multiple Unmanned Systems

LI Tang, QIN Xiao-lin, CHI He-yu, FEI Ke   

  1. College of Computer Science and Technology,Nanjing University of Aeronautics and Astronautics,Nanjing 211106,China
  • Received:2021-06-12 Revised:2021-12-03 Online:2022-07-15 Published:2022-07-12
  • About author:LI Tang,born in 1997,postgraduate.His main research interests include coordination of unmanned system and data-log rules processing,etc.
    QIN Xiao-lin,born in 1953,professor,Ph.D,is a senior member of China Computer Federation.His main research interests include spatial and spatio-temporal databases,data management and security in distributed environment,etc.
  • Supported by:
    National Natural Science Foundation of China(61728204).

Abstract: With the development of unmanned system technology,the coordination control of multiple unmanned systems has been widely concerned.Designing a reasonable coordination model is an important research content of multiple unmanned systems,but existing coordination models have security problems in the open network environment.Based on the analysis of the deficiencies of existing models,a coordination model RCC of multiple unmanned systems with security characteristics is proposed.RCC model introduces logic rules in the coordination process to provide the legality of terminals and the authority control of the communication parties,and ensures the security of multiple unmanned systems.Finally,based on ROS and RCC model,a coordination simulation platform for multiple unmanned vehicles is built,in which experiment scenes of navigation and obstacle avoi-dance are designed.Simulation results verify the practicability and security of RCC model.

Key words: Logic rules, Coordination model, Security, Simulation system, Unmanned systems

CLC Number: 

  • TP311
[1]ZHANG T,LI Q,ZHANG C S,et al.Current trends in the development of intelligent unmanned autonomous systems[J].Frontiers of Information Technology & Electronic Engineering,2017,18(1):11-22.
[2]SCHUYLER T J,IRVIN B,ABAD K,et al.Application of aSmall Unmanned Aerial System to Measure Ammonia Emissions from a Pilot Amine-CO2Capture System[J].Sensors,2020,20(23):6974.
[3]CUNNINGHAM M,SAMSON C,LALIBERTÉJ,et al.Inversion of Magnetic Data Acquired with a Rotary-Wing Unmanned Aircraft System for Gold Exploration[J].Pure and Applied.Geophys,2021,178:501-516.
[4]ZHANG M.Research on Optimization Algorithm of UAV and Logistics Vehicle Collaborative Distribution Based on Dynamic Collection[D].Harbin:Harbin Engineering University,2020.
[5]ZHOU Y M,ZHAOH R,CHEN J F,et al.A novel missionplanning method for UAVs' course of action[J].Computer Communications,2020,152(4):345-356.
[6]BHATT G D.Knowledge management in organizations:examining the interaction between technologies,techniques,and people[J].Journal of Knowledge Management,2001,5(1):68-75.
[7]MA Y,ZHAO Y J,QI X,et al.Cooperative communicationframework design for the unmanned aerial vehicles-unmanned surface vehicles formation[J].Advances in Mechanical Engineering,2018,10(5):1-9.
[8]ELMARZOUQI N,GARCIA E,LAPAYRE J.ACCM:a NewArchitecture Model for CSCW[C]//2007 11th International Conference on Computer Supported Cooperative Work in Design.Melbourne,VIC,Australia:IEEE,2007:84-91.
[9]KULKARNI D,AHMED T,TRIPATHI A.A Generative Programming Framework for Context-Aware CSCW Applications[J].ACM Transactions on Software Engineering and Methodo-logy,2012,21(2):1-35.
[10]MAHFOUDH H B,SERUGENDO D S G,NAJA N,et al.Learning-based coordination model for spontaneous self-composition of reliable services in a distributed system[J].International Journal on Software Tools for Technology Transfer,2020,22:417-436.
[11]GELERNTER D.Generative communication in Linda[J].ACM Transactions on Programming Languages and Systems,1985,7(1):80-112.
[12]OMICINI A.Formal ReSpecT in the A & A Perspective[J].Electronic Notes in Theoretical Computer Science,2007,175(2):97-117.
[13]CASELLI A,CIATTO G,SERUGENDO G D M,et al.Engi-neering Semantic Self-composition of Services Through Tuple-Based Coordination[J].ISoLA,2020,12477:205-223.
[14]CASADEI R,VIROLI M,RICCI A,et al.Tuple-Based Coordination in Large-Scale Situated Systems[J].Coordination Models and Languages,2021,12717:149-167.
[15]MAMEI M,ZAMBONELLI F.Programming pervasive and mobile computing applications[J].ACM Transactions on Software Engineering and Methodology,2009,18(4):1-56.
[16]FLORIANO E,ALCHIERI E,ARANHA D F,et al.Providing privacy on the tuple space model[J].Journal of Internet Services and Applications,2017 8(19):1-16.
[17]CRAB S,KUHN E.A coordination-based access control model for space-based computing [C]//Proceedings of the 27th Annual ACM Symposium on Applied Computing,Association for Computing Machinery.New York,NY,USA,2012:1560-1562.
[18]JIA Y N,LI Q,QIU S Q.Distributed Leader-Follower FlightControl for Large-Scale Clusters of Small Unmanned Aerial Vehicles[J].IEEE Access,2018,6:32790-32799.
[19]GUO H Y.Research on Coordinated Flight Strategy for Mutil-UAV Based on Bee Colony Algorithm[D].Harbin:Harbin Engineering University,2012.
[20]QIU H X,DUAN H B,FAN Y M.Multiple unmanned aerial ve-hicle autonomous formation based on the behavior mechanism in pigeon flocks[J].Control Theory & Applications,2015,32(10):1298-1304.
[21]CERI S,GOTTLOB G,TANCA L.Logic Programming and Databases [M].Berlin:Springer-Verlag,1990:9-11.
[22]BRAMER M.Logic Programming with Prolog [M].London:Springer-Verlag,2005:187-210.
[23]VITEK J,BRYCE C,ORIOL M.Coordinating processes withsecure spaces[J].Science of Computer Programming,2003,46(1):163-193.
[1] LIU Jie-ling, LING Xiao-bo, ZHANG Lei, WANG Bo, WANG Zhi-liang, LI Zi-mu, ZHANG Hui, YANG Jia-hai, WU Cheng-nan. Network Security Risk Assessment Framework Based on Tactical Correlation [J]. Computer Science, 2022, 49(9): 306-311.
[2] WANG Lei, LI Xiao-yu. LBS Mobile Privacy Protection Scheme Based on Random Onion Routing [J]. Computer Science, 2022, 49(9): 347-354.
[3] JIAN Qi-rui, CHEN Ze-mao, WU Xiao-kang. Authentication and Key Agreement Protocol for UAV Communication [J]. Computer Science, 2022, 49(8): 306-313.
[4] ZHOU Lian-bing, ZHOU Xiang-zhen, CUI Xue-rong. Compressed Image Encryption Scheme Based on Dual Two Dimensional Chaotic Map [J]. Computer Science, 2022, 49(8): 344-349.
[5] CHEN Ming-xin, ZHANG Jun-bo, LI Tian-rui. Survey on Attacks and Defenses in Federated Learning [J]. Computer Science, 2022, 49(7): 310-323.
[6] ZHAO Dong-mei, WU Ya-xing, ZHANG Hong-bin. Network Security Situation Prediction Based on IPSO-BiLSTM [J]. Computer Science, 2022, 49(7): 357-362.
[7] DU Hong-yi, YANG Hua, LIU Yan-hong, YANG Hong-peng. Nonlinear Dynamics Information Dissemination Model Based on Network Media [J]. Computer Science, 2022, 49(6A): 280-284.
[8] JIANG Cheng-man, HUA Bao-jian, FAN Qi-liang, ZHU Hong-jun, XU Bo, PAN Zhi-zhong. Empirical Security Study of Native Code in Python Virtual Machines [J]. Computer Science, 2022, 49(6A): 474-479.
[9] TAO Li-jing, QIU Han, ZHU Jun-hu, LI Hang-tian. Model for the Description of Trainee Behavior for Cyber Security Exercises Assessment [J]. Computer Science, 2022, 49(6A): 480-484.
[10] LYU Peng-peng, WANG Shao-ying, ZHOU Wen-fang, LIAN Yang-yang, GAO Li-fang. Quantitative Method of Power Information Network Security Situation Based on Evolutionary Neural Network [J]. Computer Science, 2022, 49(6A): 588-593.
[11] DENG Kai, YANG Pin, LI Yi-zhou, YANG Xing, ZENG Fan-rui, ZHANG Zhen-yu. Fast and Transmissible Domain Knowledge Graph Construction Method [J]. Computer Science, 2022, 49(6A): 100-108.
[12] QIN Xiao-yue, HUANG Ru-wei, YANG Bo. NTRU Type Fully Homomorphic Encryption Scheme over Prime Power Cyclotomic Rings [J]. Computer Science, 2022, 49(5): 341-346.
[13] JIAO Xiang, WEI Xiang-lin, XUE Yu, WANG Chao, DUAN Qiang. Automatic Modulation Recognition Based on Deep Learning [J]. Computer Science, 2022, 49(5): 266-278.
[14] SONG Tao, LI Xiu-hua, LI Hui, WEN Jun-hao, XIONG Qing-yu, CHEN Jie. Overview of Research on Security Encryption Authentication Technology of IoV in Big Data Era [J]. Computer Science, 2022, 49(4): 340-353.
[15] CHANG Geng, ZHAO Lan, CHEN Wen. MLSTM:A Password Guessing Method Based on Multiple Sequence Length LSTM [J]. Computer Science, 2022, 49(4): 354-361.
Full text



No Suggested Reading articles found!