簡易檢索 / 詳目顯示

研究生: 劉建均
Liu, Chien-Chun
論文名稱: 基於多偽隨機亂數產生器實現多智能體移動式機器人共識控制和資訊隱私保護
Consensus Control and Information Privacy Protection for Multi-Agent Mobile Robots Based on Multiple Pseudorandom Number Generators
指導教授: 廖德祿
Liao, Teh-Lu
學位類別: 博士
Doctor
系所名稱: 工學院 - 工程科學系
Department of Engineering Science
論文出版年: 2026
畢業學年度: 113
語文別: 英文
論文頁數: 116
中文關鍵詞: 偽亂數產生器多代理系統餘數系統同步控制器對稱式加密混沌系統
外文關鍵詞: Multiple Pseudorandom Number Generator, MAS, RNS, Synchronization Controller, Asymmetric Encryption, Chaotic Systems
相關次數: 點閱:3下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 本研究提出一種基於 Tinkerbell 混沌系統與餘數數系(Residue Number System, RNS)的多偽隨機數產生器(Multiple Pseudorandom Number Generator, MPNG)設計方法。該方法結合了混沌系統狀態的隨機特性與 RNS 的平行運算能力,能在每一次迭代中同時產生多達六組偽隨機數序列,大幅提升了產生效率。為驗證所生成序列的隨機性品質,本研究採用 NIST SP800-22 測試套件、Diehard 測試項目以及 Shannon 熵分析進行隨機性評估,評估結果顯示具有良好的統計特性。為進一步提升實際應用的安全性,本文設計一組 Tinkerbell 混沌系統的同步控制器,用以實現主僕系統之間的狀態同步,確保所產生的偽隨機亂數序列一致。此機制進一步擴展了 MPNG 的實際應用達成非對稱式加密方法架構。最後,本研究將 MPNG 整合至多代理系統(Multi-Agent System)中,並在資訊交換前進行混淆加密機制,有效保障分散式運算過程中的資料傳輸安全。所提出的方法經由三台輪式移動機器人進行硬體實作驗證,證實方法的可行性與實用性。

    This study proposes a design method for a Multiple Pseudorandom Number Generator (MPNG) based on the Tinkerbell chaotic system and the Residue Number System (RNS). By exploiting the inherent randomness of chaotic state evolution and the parallel computation capability of RNS, the proposed method can simultaneously generate six pseudorandom sequences per iteration, significantly improving generation efficiency. The randomness quality of the generated sequences is validated using the NIST SP800-22 test suite, Diehard test items, and Shannon entropy analysis, demonstrating strong statistical properties. To further enhance application security, a synchronization controller for the Tinkerbell chaotic system is developed, enabling state synchronization between the master and slave systems and ensuring the generation of identical random sequences. This mechanism extends the proposed MPNG to an asymmetric encryption framework. Finally, the MPNG is integrated into a Multi-Agent System (MAS), where confusion-based encryption is applied before information exchange, effectively safeguarding data transmission in distributed computing environments. The proposed method was successfully validated through hardware implementation using three wheeled mobile robots, demonstrating its feasibility and practical applicability.

    摘要 I ABSTRACT III ACKNOWLEDGEMENT IV CONTENTS VI LIST OF FIGURES VIII LIST OF TABLES X CHAPTER 1 INTRODUCTION 1 1.1 MOTIVATION 1 1.2 PURPOSE 6 1.3 BRIEF SKETCH OF THE CONTENTS 7 CHAPTER 2 MULTI-AGENT SYSTEM CONSENSUS 9 2.1 GRAPH THEORY 9 2.2 ANALYSIS OF CONSENSUS 10 2.3 MAS NUMERICAL SIMULATION 15 CHAPTER 3 MULTIPLE PSEUDORANDOM NUMBER GENERATOR 19 3.1 CHAOTIC SYSTEM 19 3.2 SYNCHRONOUS CONTROLLER 20 3.3 RESIDUE NUMBER SYSTEM 24 3.4 MULTIPLE PSEUDORANDOM NUMBER GENERATOR 25 3.4.1 SHANNON ENTROPY ANALYSIS 27 3.4.2 NIST SP800-22 ANALYSES 28 3.4.3 DIEHARD TEST ANALYSES 34 CHAPTER 4 PRIVACY-PRESERVING MAS ARCHITECTURE 42 4.1 MULTI-AGENT SYSTEM ENCRYPTION ARCHITECTURE 42 4.2 SIMULATION 44 CHAPTER 5 IMPLEMENTATION 50 5.1 DYNAMIC MODEL OF A FOUR-WHEELED MOBILE ROBOT 50 5.2 HARDWARE OVERVIEW 60 5.2.1 FUNCTIONAL MODULE DESCRIPTION 60 5.2.2 INFORMATION TRANSMISSION ARCHITECTURE 61 5.2.3 POSTURE SENSING AND VISUAL OBSERVATION OF MOBILE ROBOTS 63 5.3 IMPLEMENTATION RESULTS 66 5.3.1 SYSTEM IMPLEMENTATION ARCHITECTURE 66 5.3.2 RESULTS 69 CHAPTER 6 CONCLUSION AND FUTURE WORK 97 6.1 CONCLUSION 97 6.2 FUTURE WORK 98 REFERENCES 99

    [1] M. H. Degroo, “Reaching a consensus”, Journal of the American Statistical Association, vol. 69, no. 345, pp. 118-121, 1974.
    [2] M. J. Fischer, N. A. Lynch, and M. S. Paterson, “Impossibility of distributed consensus with one faulty process,” Journal of the ACM, vol. 32, no. 2, pp. 374-382, 1985.
    [3] D. W. Zhang and G. P. Liu, “Robust cooperative control for heterogeneous uncertain nonlinear high-order fully actuated multiagent systems,” IEEE Transactions on Cybernetics, vol. 54, no. 10, pp. 5721-5732, 2024.
    [4] T. L. Nguyen, X. S. Mai, and P. N. Dao, “A robust distributed model predictive control strategy for Leader–Follower formation control of multiple perturbed wheeled mobile robotics,” European Journal of Control, vol. 81, pp. 101160, 2025.
    [5] X. Zhou, J. Xiong, H. Zhao, C. Yan, H. Wang, and J. Wei, “Population-invariant madrl for aoi-aware uav trajectory design and communication scheduling in wireless sensor networks,” IEEE Internet of Things Journal, vol. 12, no. 3, pp. 2545-2561, 2025.
    [6] S. Zhai, X. Wang, and W. X. Zheng, “Leaderless cluster consensus of second-order general nonlinear multiagent systems under directed topology,” IEEE Transactions on Circuits and Systems I: Regular Papers, vol. 70, no. 10, pp. 4080-4091, 2023.
    [7] Jadbabaie, J. Lin, and A. S. Morse, “Coordination of groups of mobile autonomous agents using nearest neighbor rules,” IEEE Transactions on automatic control, vol. 48, no. 6, pp.988-1001, 2003.
    [8] W. Yu, W. X. Zheng, G. Chen, W. Ren, and J. Cao, “Second-order consensus in multi-agent dynamical systems with sampled position data,” Automatica, vol. 47, no. 7, pp. 1496-1503, 2011.
    [9] A. Olshevsky and J. N. Tsitsiklis, “Convergence speed in distributed consensus and averaging,” SIAM journal on control and optimization, vol. 48, no. 1, pp. 33-55, 2009.
    [10] S. H. Kwon, Y. B. Bae, J. Liu, and H. S. Ahn, “From matrix-weighted consensus to multipartite average consensus,” IEEE Transactions on Control of Network Systems, vol. 7, no. 4, pp. 1609-1620, 2020
    [11] T. Yin, Y. Lv, and W. Yu, “Accurate privacy preserving average consensus,” IEEE Transactions on Circuits and Systems II: Express Briefs, vol. 67, no. 4, pp. 690-694, 2019.
    [12] N. K. Venkategowda and S. Werner, “Privacy-preserving distributed maximum consensus,” IEEE Signal Processing Letters, vol. 27, pp. 1839-1843, 2020.
    [13] X. H. Wang and H. B. Ji, “Leader-follower consensus for a class of nonlinear multi-agent systems. International Journal of Control,” Automation and Systems, vol. 10, no, 1, pp. 27-35, 2012.
    [14] X. Zhang, L. Liu, and G. Feng, “Leader–follower consensus of time-varying nonlinear multi-agent systems,” Automatica, vol. 52, pp. 8-14, 2015.
    [15] Y. Wang, Y. Song, D. J. Hill, and M. Krstic, “Prescribed-time consensus and containment control of networked multiagent systems,” IEEE transactions on cybernetics, vol. 49, no. 4, pp. 1138-1147, 2018.
    [16] F. Zhou, Z. J. Wang, and N. J. Fan, “Containment consensus with measurement noises and time-varying communication delays,” Chinese Physics B, vol. 24, no. 2, pp. 020203, 2015.
    [17] J. Sun, C. Guo, and L. Liu, “Consensus of piecewise time-varying multi-agent systems with switching topologies,” Transactions of the Institute of Measurement and Control, vol. 44, no. 13, pp. 2522-2531, 2022.
    [18] G. Chen and Y. Yang, “Further results on fixed‐time stability of time‐varying hybrid systems,” International Journal of Robust and Nonlinear Control, vol. 34, no. 14, pp. 9607-9623, 2024.
    [19] C. Gao, D. Zhao, J. Li, and H. Lin, “Private bipartite consensus control for multi-agent systems: A hierarchical differential privacy scheme,” Information Fusion, vol. 105, pp. 102259, 2024.
    [20] F. Fang, H. Yang, and F. Liu, “Asymmetric bipartite consensus for multi‐agent systems with strong‐privacy‐preserving,” IET Control Theory and Applications, vol. 18, pp. 1569-1585, 2024.
    [21] M. Ruan, H. Gao, and Y. Wang, “Secure and privacy-preserving consensus,” IEEE Transactions on Automatic Control, vol. 64, no. 10, pp. 4035-4049, 2019.
    [22] Y. Zou, J. Zhu, X. Wang, and L. Hanzo, “A survey on wireless security: Technical challenges, recent advances, and future trends,” Proceedings of the IEEE, vol. 104, no. 9, pp. 1727-1765, 2016.
    [23] E. Yağdereli, C. Gemci, and A. Z. Aktaş, “A study on cyber-security of autonomous and unmanned vehicles,” The Journal of Defense Modeling and Simulation, vol. 12, no. 4, pp. 369-381, 2015.
    [24] V. Katewa, F. Pasqualetti, and V. Gupta, “On privacy vs. cooperation in multi-agent systems,” International Journal of Control, vol. 91, no. 7, pp. 1693-1707, 2018.
    [25] C. Zhao, J. Chen, J. He, and P. Cheng, “Privacy-preserving consensus-based energy management in smart grids,” IEEE Transactions on Signal Processing, vol. 66, no. 23, pp. 6162-6176, 2018.
    [26] T. Yin, Y. Lv, and W. Yu, “Accurate privacy preserving average consensus,” IEEE Transactions on Circuits and Systems II: Express Briefs, vol. 67, no. 4, pp. 690-694, 2019.
    [27] J. Zhang, J. Lu, X. Chen, and J. Zhong, “Privacy-Preserving Bipartite Consensus on Signed Networks,” IEEE Transactions on Control of Network Systems, vol. 11, no. 2, pp. 696 – 704, 2023.
    [28] Y. Li and C. Tan, “A survey of the consensus for multi-agent systems,” Systems Science & Control Engineering, vol. 7, no. 1, pp. 468-482, 2019.
    [29] X. Zhou and X. Tang, “Research and implementation of RSA algorithm for encryption and decryption,” In Proceedings of 2011 6th international forum on strategic technology, vol. 2, pp. 1118-1121, IEEE, 2011.
    [30] Y. Tsiounis and M. Yung, “On the security of ElGamal based encryption.” In International Workshop on Public Key Cryptography, Berlin, Heidelberg: Springer Berlin Heidelberg, pp. 117-134, 1998.
    [31] P. Paillier, “Public-key cryptosystems based on composite degree residuosity classes,” in International conference on the theory and applications of cryptographic techniques, Springer, Berlin, Heidelberg, 1999.
    [32] D. Selent, “Advanced encryption standard,” Rivier Academic Journal, vol. 6, no. 2, pp. 1-14, 2010.
    [33] F. Varghese and P. Sasikala, “A detailed review based on secure data transmission using cryptography and steganography,” Wireless Personal Communications, vol. 129, no. 4, pp. 2291-2318, 2023.
    [34] G. Leurent, and C. Pernot, “New Representations of the AES Key Schedule,” Journal of Cryptology, vol. 38, no. 1, pp. 1-52, 2025.
    [35] B. Sunar, “True random number generators for cryptography,” in Cryptographic Engineering, Ç. K. Koç, Ed., MA: Springer, 2009, pp. 55–73.
    [36] H. Hu, L. Liu, and N. Ding, “Pseudorandom sequence generator based on the Chen chaotic system,” Computer Physics Communications, vol. 184, no. 3, pp. 765-768, 2013.
    [37] A. Lassoued and O. Boubaker, “On new chaotic and hyperchaotic systems: a literature survey,” Nonlinear Analysis: Modelling and Control, vol. 21, no. 6, pp. 770-789, 2016.
    [38]T. Etem and T. Kaya, “Modified bernoulli map-based scramble and s-box supported colour image encryption,” Signal, Image and Video Processing, vol. 19, no. 1, pp. 1-10, 2025.
    [39]S. Araki, J. H. Wu, and J. J. Yan, “A novel design of random number generators using chaos-based extremum coding,” IEEE Access, vol. 12, pp. 24039-24047, 2024.
    [40] T. L. Liao, P. Y. Wan, and J. J. Yan, “Design and synchronization of chaos-based true random number generators and its FPGA implementation,” IEEE Access, vol. 10, pp. 8279-8286, 2022.
    [41] N. M. Kriege, F. D. Johansson, and C. Morris, “A survey on graph kernels,” Applied Network Science, vol. 5, pp. 1-42, 2020.
    [42] D. Xie, and S. Wang, “Consensus of second-order discrete-time multi-agent systems with fixed topology,” Journal of Mathematical Analysis and Applications, vol. 387, no. 1, pp. 8-16, 2012.
    [43] E. N. Lorenz, “The mechanics of vacillation,” Journal of Atmospheric Sciences, vol. 20, no. 5, pp. 448-465, 1963.
    [44] A. Goldsztejn, W. Hayes, and P. Collins, “Tinkerbell is chaotic,” SIAM Journal on Applied Dynamical Systems, vol. 10, no. 4, pp. 1480-1501, 2011.
    [45] C. C. Liu, C. C. Chen, J. J. Yan, and T. L. Liao, “Design of a Multiple Pseudorandom Number Generator combined Chaotic System with RNS and its Application to Secure Image Processing,” IEEE Access, vol. 12, pp. 155246-155258, 2024.
    [46] D. Schoinianakis, “Residue arithmetic systems in cryptography: a survey on modern security applications,” Journal of Cryptographic Engineering, vol. 10, no. 3, pp. 249-267, 2020.
    [47] J. H. Yang, C. C. Chang, and C. H. Lin, “Residue number system oriented image encoding schemes,” The Imaging Science Journal, vol. 58, no. 1, pp. 3-11, 2020.
    [48] M. V. Valueva, N. N. Nagornov, P. A. Lyakhov, G. V. Valuev, and N. I. Chervyakov, “Application of the residue number system to reduce hardware costs of the convolutional neural network implementation,” Mathematics and computers in simulation, vol. 177, pp. 232-243, 2020.
    [49] H. L. Garner, ‘‘The residue number system,’’ presented at the Western Comput. Conf., Mar. 1959.
    [50]K. Bhattacharjee and S. Das, “A search for good pseudo-random number generators: Survey and empirical studies,” Computer Science Review, vol. 45, 2022.
    [51]L. Crocetti, P. Nannipieri, S. Di Matteo, L. Fanucci, and S. Saponara, “Review of methodologies and metrics for assessing the quality of random number generators,” Electronics, vol. 12, no. 3, 2023.
    [52]A. Lesne, “Shannon entropy: a rigorous notion at the crossroads between probability, information theory, dynamical systems and statistical physics,” Mathematical Structures in Computer Science, vol. 24, no. 3, 2014.
    [53] N. Akashi, K. Nakajima, M. Shibayama, and Y. Kuniyoshi, ‘‘A mechanical true random number generator,’’ New Journal of Physics, vol. 24, no. 1, 2022.
    [54] X. Dong, A. Amirsoleimani, M. R. Azghadi, and R. Genov, ‘‘WALLAX: A memristor-based Gaussian random number generator,’’ Neurocomputing, vol. 566, no. 126933, 2024.
    [55] X. Kong, F. Yu, W. Yao, S. Cai, J. Zhang, and H. Lin, ‘‘Memristorinduced hyperchaos, multiscroll and extreme multistability in fractionalorder HNN: Image encryption and FPGA implementation,’’ Neural Netw, vol. 171, pp. 85–103, 2024.
    [56] G. Marsaglia, “Random number generators,” Journal of Modern Applied Statistical Methods, vol. 2, no, 1, pp. 2-13, 2003.
    [57] S. Araki, J.-H. Wu, and J.-J. Yan, ‘‘A novel design of random number generators using chaos-based extremum coding,’’ IEEE Access, vol. 12, pp. 24039–24047, 2024.
    [58] L. Merah, P. Lorenz, and A.-P. Adda, ‘‘A new and efficient scheme for improving the digitized chaotic systems from dynamical degradation,’’ IEEE Access, vol. 9, pp. 88997–89008, 2021.
    [59] Y.-Y. Chen, “Formation Control of Four-Wheel Vehicle based on homomorphic Paillier cryptosystem,” Ph.D. dissertation, Dept. of Engineering Science, National Cheng Kung University, Tainan, Taiwan, 2021.

    QR CODE