Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Control method for processing teleoperation system under DOS attack

An operating system and control method technology, applied in the field of teleoperation, can solve the problems of uncertainty of model parameters, time-varying delay, and complex bilateral control problems of teleoperating systems, so as to meet the requirements of transient performance and reduce the risk of being attacked. effect of probability

Active Publication Date: 2021-06-29
NANJING UNIV OF POSTS & TELECOMM
View PDF16 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In the remote operating system that needs to use the communication network to transmit data, it is often subject to malicious attacks. Therefore, in order to maintain the stability of the remote operating system, it is necessary to consider the adverse effects of malicious attacks on stability.
At the same time, the remote operating system may also have uncertain model parameters, time-varying delays, etc.
These unfavorable factors will make the problem of bilateral control of the telesystem more complicated. Therefore, it is necessary to design a telesystem control method based on elastic event triggering, so that the telesystem can be quickly stabilized under the above conditions.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Control method for processing teleoperation system under DOS attack
  • Control method for processing teleoperation system under DOS attack
  • Control method for processing teleoperation system under DOS attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0066] This embodiment is a simulation research on the stable tracking of the remote operating system with uncertain model parameters and time-varying time delay under DOS attack. Such as figure 1 As shown, the specific steps are as follows:

[0067] Step 1. Establish a teleoperation system dynamics model

[0068] In this embodiment, two two-degree-of-freedom and two-link manipulators are used as the simulation objects of the teleoperation system, and the commonly used Euler-Lagrange equation is used to describe the dynamics of the manipulators:

[0069] master end:

[0070] From the end:

[0071] The expressions of each matrix in the robotic arm are as follows:

[0072]

[0073]

[0074]

[0075]

[0076]

[0077]

[0078]

[0079]

[0080]

[0081] C i22 =0

[0082] g i1 =-(m 1 +m 2 )gl 1 sin(q i1 )+m 2 gl 2 sin(q i1 +q i2 )

[0083] g i2 = m 2 gl 2 sin(q i1 +q i2 )

[0084] Among them, m 1 Indicates the mass of connectin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a control method for processing a teleoperation system under a DOS attack. The control method comprises the following steps of: constructing a parameter identification rule on a master mechanical arm and a slave mechanical arm by utilizing respective measurement information and received position information of the master mechanical arm and the slave mechanical arm respectively; designing event triggers on the master mechanical arm and the slave mechanical arm respectively; and considering communication time-varying delay, and designing moments of the master mechanical arm and the slave mechanical arm based on an event trigger communication mechanism to realize bilateral control of the teleoperation system. According to the control method, the stable tracking problem of the bilateral teleoperation system with uncertain parameters and time-varying delay in information transmission under the DOS is researched, and the parameter identification rule is constructed, so that an ideal parameter estimation value can be obtained when an excitation signal does not meet a continuous excitation condition, and the requirement on the transient performance of the teleoperation system can be met; and furthermore, the elastic event trigger is designed, so that data is sent as required, and the probability that the data is attacked on a communication network is reduced.

Description

technical field [0001] The invention relates to a controller structure and design method of a remote operating system under DOS attack, specifically a control method for processing a remote operating system under DOS attack based on an elastic event trigger mechanism, belonging to the technical field of teleoperation. Background technique [0002] With the increasing demand of human beings to explore unknown areas such as space and the ocean, in some places that humans cannot directly reach or are harmful to humans, the teleoperation system can replace us to complete the task, thereby avoiding the operator from being hurt. [0003] Generally speaking, a teleoperation system consists of a master manipulator, a communication channel, and a slave manipulator. Since the signal needs to be transmitted in the communication channel, there is often a delay in the information received by the master and slave ends of the remote control system, so the impact of the delay between the ma...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): B25J9/16
CPCB25J9/1612B25J9/1689B25J9/1628Y02P90/02
Inventor 樊春霞郑凯中
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products