TOTAL VIEWS: 1552
Unmanned surface vehicles (USVs) are more and more widely used in marine resources exploration and marine military activities. This paper studies the security encryption of information transmission between the USV and the mothership under the malicious attack of hackers. The USV transmits useful information such as posture status and position to the mother ship. A trajectory tracking controller implemented in the mother ship will generate the optimal control signal to the USV so that the USV will follow the preset path. To ensure the security of information transmission between the mother ship and the USV, the Paillier encryption algorithm is introduced into the MPC-based trajectory tracking controller to prevent malicious attackers from eroding the security of information transmission. To make the encryption algorithm compatible with the trajectory tracking controller, two compatibility designs are added: realize the conversion from floating point numbers to integer sequences and achieve subtraction operations. Through the simulation of trajectory tracking, the effectiveness of the proposed safety control framework is proved.
[1] Yuh J, Marani G, Blidberg D R. Applications of marine robotic vehicles. Intelligent service robotics, 2011, 4: 221-231.
[2] Jadhav, A. & Mutreja, S. Autonomous ships market. Allied Market Research‐Freight & Logistics. Portland, Oregon, USA. 2020.
[3] Woo J, Park J, Yu C, et al. Dynamic model identification of unmanned surface vehicles using deep learning network. Applied Ocean Research, 2018, 78: 123-133.
[4] Faris Elasha, Matthew Greaves, David Mba, Abdulmajid Addali. Application of Acoustic Emission in Diagnostic of Bearing Faults within a Helicopter Gearbox, Procedia CIR, 2015, ISSN 2212-8271.
[5] O. Levander. Autonomous ships on the high seas. IEEE Spectrum. 54 (2), (2017), 26-31.
[6] Majohr J, Buch T. Modelling, simulation and control of an autonomous surface marine vehicle for surveying applications Measur-ing Dolphin MESSIN. IEE Control Engineering Series, 2006, 69: 329.
[7] Naeem W, Xu T, Sutton R, et al. The design of a navigation, guidance, and control system for an unmanned surface vehicle for environmental monitoring. Proceedings of the Institution of Mechanical Engineers, 2008, 222(2): 67-79.
[8] Dong, Z., Wan, L., Li, Y., Liu, T., Zhang, G. Trajectory tracking control of underactuated USV based on modifed backstepping approach. Int. J. Naval Architecture Ocean Eng., 7(5), 817-832 (2015).
[9] Wen, G., et al. Adaptive tracking control of surface vessel using optimized backstepping technique. IEEE Trans. Cybern., 49(9), 3420-3431 (2019).
[10] Zhang, J., Yu, S., Wu, D., Yan, Y. Nonsingular fixed-time terminal sliding mode trajectory tracking control for marine surface vessels with anti-disturbances. Ocean Eng., 217, 108158 (2020).
[11] Qiu, B., Wang, G., Fan, Y., Mu D., Sun, X.: Adaptive sliding mode trajectory tracking control for unmanned surface vehicle with modeling uncertainties and input saturation. Appl. Sci. 9(6), 1240 (2019)
[12] Zhao B, Zhang X, Liang C, et al. An improved model predictive control for path-following of USV based on global course con-straint and event-triggered mechanism. IEEE Access, 2021, 9: 79725-79734.
[13] Yao, X., Wang, X., Zhang, L., Jiang, X. Model predictive and adaptive neural sliding mode control for three-dimensional path fol-lowing of autonomous underwater vehicle with input saturation. Neural Computer. Appl., 32(22), 16875-16889 (2020).
[14] Zhang, J., Yang, G. Fault-tolerant fixed-time trajectory tracking control of autonomous surface vessels with specified accuracy. IEEE Trans. Industr. Electron., 67(6), 4889 (2020).
[15] Wang, N., Pan, X., Su, S.-F. Finite-time fault-tolerant trajectory tracking control of an autonomous surface vehicle. J. Franklin Inst., 357(16), 11114-11135 (2020).
[16] Deng, Y., Zhang, X., Im, N., Zhang, G., Zhang, Q. Adaptive fuzzy tracking control for underactuated surface vessels with unmod-eled dynamics and input saturation. ISA Trans., 103, 52-62 (2020).
[17] Dong, C., Ye, Q., Dai, S.-L. Neural-network-based adaptive output-feedback formation tracking control of USVs under collision avoidance and connectivity maintenance constraints. Neurocomputing, 401, 101-112 (2020).
[18] Zheng, Z., Ruan, L., Zhu, M., Guo, X. Reinforcement learning control for underactuated surface vessel with output error constraints and uncertainties. Neurocomputing, 399, 479-490 (2020).
[19] Zhang, X., Han, Q., Ge, X., Ding, D., Ding, L., Yue, D., & Peng, C. Networked control systems: A survey of trends and techniques. IEEE/CAA Journal of Automatica Sinica, 7(1), (2020), 1-17.
[20] Teixeira, A., Pérez, D., Sandberg, H., & Johansson, K.H. Attack models and scenarios for networked control systems. In: Proceedings of the 1st international conference on high confidence networked systems HiCoNS'12, Beijing, China. New York, NY: Association for Computing Machinery, (2012), pp. 55-64.
[21] Vinnem, J.E. & Utne, I.B. Risk from cyberattacks on autonomous ships. In: Haugen, S., Barros, A., van Gulijk, C., Kongsvik, T. & Vinnem, J.E. (Eds.) Safety and reliability—safe societies in a changing world: Proceedings of the ESREL 2018 June 17-21, 2018, Trondheim, Norway, 1st edition. London: CRC Press, pp. 1485-1492.
[22] Amin S, Schwartz G A, Sastry S S. Security of interdependent and identical networked control systems. Automatica, 2013, 49(1): 186-192.
[23] André Teixeira, Iman Shames, Henrik Sandberg, Karl Henrik Johansson. A secure control framework for resource-limited adversaries. Automatica, Volume 51, 2015.
[24] Huanhuan Yuan, Yuanqing Xia. Resilient strategy design for cyber-physical system under DoS attack over a multi-channel framework, Information Sciences, Volumes 454-455, 2018.
[25] Pang Z H, Liu G P. Design and implementation of secure networked predictive control systems under deception attacks. IEEE Transactions on Control Systems Technology, 2011, 20(5): 1334-1342.
[26] Farhad Farokhi, Iman Shames, Nathan Batterham. Secure and private control using semi-homomorphic encryption, Control Engineering Practice, Volume 67, 2017.
[27] Sun Q, Shi Y. Model Predictive Control as a Secure Service for Cyber-Physical Systems: A Cloud-Edge Framework. IEEE Internet of Things Journal, 2021, 9(22): 22194-22203.
[28] S. Amin, G. A. Schwartz, and S. S. Sastry. Security of interdependent and identical networked control systems. Automatica, vol. 49, no. 1, pp. 186-192, 2013.
[29] A. Teixeira, I. Shames, H. Sandberg, and K. H. Johansson. A secure control framework for resource-limited adversaries. Automatica, vol. 51, pp. 135-148, 2015.
[30] J. Wang, B. Ding, and J. Hu. Security control for LPV system with deception attacks via model predictive control: A dynamic out-put feedback approach. IEEE Transactions on Automatic Control, vol. 66, no. 2, pp. 760-767, 2021.
[31] Z.-H. Pang and G.-P. Liu. Design and implementation of secure networked predictive control systems under deception attacks. IEEE Transactions on Control Systems Technology, vol. 20, no. 5, pp. 1334-1342, 2012.
[32] F. Farokhi, I. Shames, and N. Batterham. Secure and private control using semi-homomorphic encryption. Control Engineering Practice, vol. 67, pp. 13-20, 2017.
[33] Q. Sun and Y. Shi. Model predictive control as a secure service for cyber-physical systems: A cloud-edge framework. IEEE Inter-net of Things Journal, 2021.
[34] Paillier, Pascal. Public-key cryptosystems based on composite degree residuosity classes. Advances in Cryptology—EUROCRYPT’99: International Conference on the Theory and Application of Cryptographic Techniques Prague, Czech Republic, May 2-6, 1999 Proceedings 18. Springer Berlin Heidelberg, 1999.
[35] Fossen, Thor I. Handbook of marine craft hydrodynamics and motion control. John Wiley & Sons, 2011.
Secure Encryption System for USV Trajectory Tracking Based on MPC
How to cite this paper: Di Liu. (2024) Secure Encryption System for USV Trajectory Tracking Based on MPC. Advances in Computer and Communication, 5(1), 83-96.
DOI: http://dx.doi.org/10.26855/acc.2024.02.014