Computer Science ›› 2025, Vol. 52 ›› Issue (11A): 241200203-9.doi: 10.11896/jsjkx.241200203

• Interdiscipline & Application • Previous Articles     Next Articles

Research on Emergency Rescue Quadcopter UAV Safety Control Based on Feedforward PID

MENG Dongyue1,2, HUANG Yuchuan1,2,3, HAN Guoxiang1,2, LI Hongchen1, WANG Pengfei1   

  1. 1 Ministry of Emergency Management Big Data Center,Beijing 100013,China
    2 Key Laboratory of Cyberspace and Data Security,Ministry of Emergency Management,Beijing 100013,China
    3 Key Laboratory of System Control and Information Processing,Ministry of Education of China,Shanghai 200240,China
  • Online:2025-11-15 Published:2025-11-10
  • Supported by:
    Intelligent Early Warning and Targeted Release of Urban Flood and Waterlogging Chain Disaster Risks(2022YFC3090603) and Foundation of Key Laboratory of System Control and Information Processing,Ministry of Education,China.

Abstract: To ensure the safe and reliable operation of quadcopter unmanned aerial vehicles at emergency rescue sites,and to address the non-standard interaction of quadcopter unmanned aerial vehicle information systems at emergency rescue sites,this paper proposes an emergency rescue quadcopter unmanned aerial vehicle system rescue site spatial information body,and verifies the integrity and confidentiality of the emergency rescue command center control module and control signals based on cryptographic methods.At the same time,in order to ensure stable flight of quadcopter drones according to command signals,a quadcopter drone dynamic model is established,and a Feedforward PID based quadcopter drone pose controller is adopted.Finally,a joint experiment is conducted using Python’s Cryptography and Matlab’s Simulink.The results indicate that the password module used in the study can complete authenticity and confidentiality verification,and the pose controller can also effectively achieve patrol operations at accident rescue sites.This study provides effective theoretical support and technical assurance for the safety and reliability of quadcopter unmanned aerial vehicles in practical emergency rescue applications.

Key words: Cryptography, Quadcopter unmanned aerial vehicle, Network security, Feedforward PID, Pose control

CLC Number: 

  • TP399
[1]HE D J,DU X,QIAO Y R.A Survey on Cyber Security of Unmanned Aerial Vehicles[J].Chinese Journal of Computer,2029,42(5):1076-1074.
[2]GUO L,YU X,ZHANG X,et al.Safety control system techno-logies for UAVs:review and prospect[J].Scientia Sinica Informationis,2020,50(2):184-194.
[3]JAHAN F,SUN W,NIYAZ Q,et al.Security modeling of auto-nomous systems:a survey[J].ACM Computing Surveys,2019,52(5):1-34.
[4]WANG Z H,ZHOU C H,PAN Y W,.et al.Overview of Unmanned Aerial Vehicle Systems Security[J].Computer Science,2024,51(S1):876-881.
[5]BAO S G,YAO Q C,WANG Y W.Research on the application of fire fighting UAV in high-rise buildings [J].Fire Industry(Electronic Version),2024,10(15):31-33.
[6]LIU Y,NING P,REITER M K.False data injection attacks against state estimation in electric power grids[J].ACM Transactions on Information and System Security,2011,14(1):1-33.
[7]LIANG G Q,ZHAO J H,LUO F J.A review of false data injection attacks against modern power systems[J].IEEE Transactions on Smart Grid,2017,8(4):1630-1638.
[8]QIN J H,LI M L,SHI L.Optimal denial-of-service attackscheduling with energy constraint over packet-dropping networks[J].IEEE Transactions on Automatic Control,2018,63(6):1648-1663.
[9]RAHMAN M A,MOHSENIAN-RAD H.False data injectionattacks with incompleteinformation against smart power grids[C]//IEEE Global Communications Conference(GLOBECOM).2012.
[10]LIU X,BAO Z,LU D.Modeling of localfalse data injection attacks with reduced network information[J].IEEE Transactions on Smart Grid,2017,6(4):1686-1696.
[11]LIU X,LI Z Y.False data attacks against AC state estimation with incomplete network information[J].IEEE Transactions on Smart Grid,2017,8(5):2239-2248.
[12]ESMALIFALAK M,NGUYEN H,ZHENG R,et al.Stealthfalse data injection usingindependent component analysis in smart grid[C]//IEEE International Conference on Smart Grid Communications.2011.
[13]LIU W,FENG B W,WENG J.Survey on research of mini-drones security[J].Chinese Journal of Network and Information Security,2016,2(3):39-45.
[14]HE D J,D X,Q Y R,et al.A Survey on cyber security of unmanned aerial vehicles[J].Chinese Journal of Computers,2019,42(5):1076-1094.
[15]BHATTI J,HUMPHREYS T E.Hostile control of ships viafalse GPS signal:demonstration and detection[J].Journal of the Institute of Navigation,2017,64:51-66.
[16]KERNS A J,SHEPARE D P,BHATTI J A,et al.Unmanned aircraft capture and control via GPS spoofing[J].Journal of Field Robotics,2014,31(4):617-636.
[17]PSIAKI M L,HUMPHREYS T E.GNSS spoofing and detection[J].Proceedings of the IEEE,2016,104(6):1258-1270.
[18]LIU X Y,JIA J.Safety analysis method of small shipboard fixed wing UAV[J].Command Control and Simulation,2019,41(1):109-111.
[19]CHEN P Z,WU H Y,CHEN Y.Path planning for microquadrotor UAVs based on dynamic movement primitives[J].Chinese High Technology Letters,2016(2):186-194.
[20]XU J,CAI CX,LI YQ,et al.Dual-loop path tracking and control for quad-rotor miniature unmanned aerial vehicles[J].Control Theory & Applications,2015,32(10):1335-1342.
[21]LIU J Y,JIA W F,LAI J Z,et al.Multi-information Nonlinear Fusion Technology of Micro Quadrotor Aircraft[J].Journal of Nanjing University of Aeronautics & Astronautics,2013,45(5):575-582.
[22]WU C F,LIU X Q,YUAN X.Modeling and PID control for a quadrotor[J].Electronic Design Engineering,2012(16):68-70.
[23]CHEN Z Q,CHEN Y,SUN M W,et al.Surveys on Theory and Engineering Applications for Linear Active Disturbance Rejection Control[J].Information and Control,2017(3):257-266.
[24]GAO J,WANG P,HOU Z X.UAV velocity control based onimproved PID algorithm[J].Journal of Huazhong University of Science and Technology(Natural Science Edition),2015(S1):1-5.
[25]HAN Z Q.Auto-disturbances-rejection Controller and Its Applications[J].Control and Decision,1998(1):19-23.
[26]SONG W G.Theory,methods and algorithms of robot mechanical systems[M].Beijing:China Machine Press,2007.
[27]CAI Z X.Robotics[M].Beijing:Tsinghua University Press,2000.
[28]LIU R.Robotics,Machine Vision and Control—Fundamentals of MATLAB Algorithms[M].Beijing:Publishing House of Electronics Industry,2020.
[29]GUO H,GUO X H.Local path planning algorithm for UAV based on improved velocity obstacle method[J].Acta Aeronauticaet Astronautica Sinica,2023,44(11):327586-327586.
[30]ZHAI L,ZHANG X Y,ZHANG X,et al.Local Dynamic Obstacle Avoidance Path Planning Algorithm for Unmanned Vehicles Based on Potential Field Method[J].Transactions of Beijing Institute of Technology,2022,42(7):696-705.
[31]ZHANG Q,SONG B Y,ZHAO H D.Discretization of Fractional Order Differentiator and Integrator with Different Fractional Orders[J].Intelligent Control and Automation,2017(8):75-85.[32]崔凤午,梁怀学.棣莫弗公式在推导倍角公式中的应用[J].松辽学刊(自然科学版),1997(4):64-65.
[33]胡寿松.自动控制原理 [M].科学出版社,2007.
[34]OSSAREH H R,WISOTZKI S,BUCKLAND S,et al.An Internal Model Control-Based Approach for Characterization and Controller Tuning of Turbocharged Gasoline Engines[J].IEEE transactions on control systems technology:A publication of the IEEE Control Systems Society,2021,29(2):866-875.
[35]GUO L.Feedback and uncertainty:Some basic problems and results[J].Annual Review in Control.2020:4927-4936.
[36]WU L F,HONG Z,PAN F.Network protocol reverse analysis and application[M].Beijing:National Defense Industry Press,2016.
[37]YE Y,ZHANG Z,WANG F,et al.Netplier:probabilistic net-work protocol reverse engineering from message Traces[C]//Network and Distributed System Security Symposium.2021.
[38]GENTRY C,WATERS B.Adaptive security in broadcast en-cryption systems(with short ciphertexts)[C]//Annual International Conference on the Theory and Applications of Cryptographic Techniques.2009:171-188.
[39]ZHAO X,ZHANG F.Fully CCA2 secure identity-based broadcast encryption with black-box accountable authority[J].Journal of Systems and Software,2012,85(3):708-716.
[40]SHI X L,ZHU Y F,LIU L,et al.Method of encrypted protocol reverse engineering [J].Application Research of Computers,2015,32(1):214-217.
[41]GAO J F,ZHANG Y F,LUO S,et al.Research on Taint Back-tracking Reverse Analysis Method of Network Encoding Protocol[J].Netinfo Security,2017(1):68-76.
[42]MA R K,ZHENG H,WANG J Y,et al.Automatic protocol reverse engineering for industrial control systems with dynamic taint analysis[J].Frontiers of Information Technology & Electronic Engineering,2022,23(3):351-360.
[43]ZHU Y,HAN J,YUAN L,et al.SPFPA:A format parsing approach for unknown security protocols[J].Journal of Computer Research and Development,2015,52(10):2200.
[44]HE X D.Security Analysis of Security Protocol Implementations Based on Network Trace [D].Wuhan:South-Central Minzu University,2019.
[45]TANG S Y,CHENG G,JIANG B M,et al.Detection and recognition of VPN encrypted traffic based on segmented entropy distribution[J].Cyberspace Security.2020,11(8):23-27,33.
[46]XIAO D Q,ZHOU Q,ZHANG H G,et al.Analyzing encryption protocols based on temporal logic[J].Chinese Journal of Computers,2002,25(10):1083-1089.
[47]DING S F,ZHU H,XU X Z,et al.Entropy-based fuzzy information measures[J].Chinese Journal of Computers,2012,35(4):796-801.
[48]ZHU Y N,HAN J H,YUAN L,et al.Protocol ciphertext field identification by entropy estimating[J].Journal of Electronics & Information Technology,2016,38(8):1865-1871.
[1] TANG Jiayi, HUANG Xiaofang, WANG Licheng, ODOOM J. Identity-based Linkable Ring Signcryption on NTRU Lattice [J]. Computer Science, 2025, 52(9): 396-404.
[2] XIA Zhuoqun, ZHOU Zihao, DENG Bin, KANG Chen. Security Situation Assessment Method for Intelligent Water Resources Network Based on ImprovedD-S Evidence [J]. Computer Science, 2025, 52(6A): 240600051-6.
[3] WU Kun, HU Xiangang. Overview of Research on Post-quantum Cryptography Technology [J]. Computer Science, 2025, 52(2): 8-19.
[4] XIE Zhenjie, LUO Youqiang, ZHAO Fangfang, REN Shuai. Signcryption Scheme Based on SM9 Domestic Cryptographic Algorithm [J]. Computer Science, 2025, 52(11A): 241200049-8.
[5] WANG Dong, LI Xiaoruo, ZHU Bingnan. Transaction Granularity Modifiable Consortium Blockchain Scheme Based on Dual Merkel Trees Block Structure [J]. Computer Science, 2024, 51(9): 408-415.
[6] GUO Chuntong, WU Wenyuan. Verifiable Decryption Scheme Based on MLWE and MSIS [J]. Computer Science, 2024, 51(5): 331-345.
[7] SHANG Yuling, LI Peng, ZHU Feng, WANG Ruchuan. Overview of IoT Traffic Attack Detection Technology Based on Fuzzy Logic [J]. Computer Science, 2024, 51(3): 3-13.
[8] LIU Yingjun, LUO Yang, YANG Yujun, LIU Yuanni. Anonymous Authentication Protocol for Medical Internet of Things [J]. Computer Science, 2023, 50(8): 359-364.
[9] WANG Shaohui, ZHAO Zhengyu, WANG Huaqun, XIAO Fu. Analysis and Improvement on Identity-based Remote Data Integrity Verification Scheme [J]. Computer Science, 2023, 50(7): 302-307.
[10] ZHAO Chenxia, SHU Hui, SHA Zihan. Cross-architecture Cryptographic Algorithm Recognition Based on IR2Vec [J]. Computer Science, 2023, 50(6A): 220100255-7.
[11] REN Gaoke, MO Xiuliang. Network Security Situation Assessment for GA-LightGBM Based on PRF-RFECV Feature Optimization [J]. Computer Science, 2023, 50(6A): 220400151-6.
[12] CHANG Liwei, LIU Xiujuan, QIAN Yuhua, GENG Haijun, LAI Yuping. Multi-source Fusion Network Security Situation Awareness Model Based on Convolutional Neural Network [J]. Computer Science, 2023, 50(5): 382-389.
[13] YANG Xin, LI Hui, QUE Jianming, MA Zhentai, LI Gengxin, YAO Yao, WANG Bin, JIANG Fuli. Efficiently Secure Architecture for Future Network [J]. Computer Science, 2023, 50(3): 360-370.
[14] QIN Futong, YUAN Xuejun, ZHOU Chao, FAN Yongwen. Grey Evaluation Method of Network Security Grade Based on Comprehensive Weighting [J]. Computer Science, 2023, 50(11A): 230300144-6.
[15] LIU Jie-ling, LING Xiao-bo, ZHANG Lei, WANG Bo, WANG Zhi-liang, LI Zi-mu, ZHANG Hui, YANG Jia-hai, WU Cheng-nan. Network Security Risk Assessment Framework Based on Tactical Correlation [J]. Computer Science, 2022, 49(9): 306-311.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!