| 研究生: |
利彥儒 Lee, Yan-Ru |
|---|---|
| 論文名稱: |
Paillier 同態加密應用於四輪驅動自駕車的車道偵測和編隊控制 Paillier Homomorphic Encryption Applied to Lane Detection and Formation Control of Four-Wheel Drive Autonomous Vehicles |
| 指導教授: |
廖德祿
Liao, Teh-Lu |
| 學位類別: |
碩士 Master |
| 系所名稱: |
工學院 - 工程科學系 Department of Engineering Science |
| 論文出版年: | 2024 |
| 畢業學年度: | 112 |
| 語文別: | 中文 |
| 論文頁數: | 54 |
| 中文關鍵詞: | 同態加密 、編隊控制 、比例-積分-微分控制器 |
| 外文關鍵詞: | Homomorphic encryption, Formation control, PID controller |
| 相關次數: | 點閱:41 下載:0 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
本研究內容旨在利用四輪驅動自駕車作為多代理人系統(MAS),基於共識控制理論並採用分佈式計算方式進行整體系統控制。為確保系統資訊安全,本研究應用Paillier同態加密演算法對自駕車之位置與速度資料進行加密,透過無線通訊實現系統狀態共識,達成保密編隊控制的目標。至於控制器採用PID(比例、積分、微分)控制器以增加其穩定性,同時利用Paillier加法同態性質來保護系統狀態資訊,使多台四輪驅動自駕車在指定範圍內進行分佈式狀態協調與控制量調整。由圖形理論建立拓撲圖並推導出控制器參數以達成共識,並在編隊控制中重視資訊安全,使用Paillier密碼系統進行資料加解密。本研究採用Leader-Follower Approach,並且利用邊緣運算架構,Leader只負責加密之資訊傳輸及車體輪子之控制量運算,車道的辨識由邊緣裝置處理。
The aim of this study is to utilize the additive homomorphic properties of Paillier encryption are used to protect system state information. This allows multiple four-wheel drive autonomous vehicles to coordinate their states and adjust control inputs in a distributed manner within a specified range. Graph theory is used to establish the topology and derive controller parameters to achieve consensus, with an emphasis on information security during platoon control by using the Paillier cryptosystem for data encryption and decryption. The study adopts the Leader-Follower Approach and utilizes an edge computing architecture. The Leader is responsible for encrypted information transmission and control input computation for the vehicle wheels, while lane detection is handled by edge devices.
[1] M. Ruan, H. Gao and Y. Wang, “Secure and Privacy-Preserving Consensus,” IEEE Transactions on Automatic Control, vol. 64, no. 10, pp. 4035-4049, 2019.
[2] He, Y., Jiang, M., Ye, X., Du, L., Zou, Z., Zhang, W., Tan, X., & Ding, E. (2022). Repainting and Imitating Learning for Lane Detection. Proceedings of the 30th ACM International Conference on Multimedia, pp. 5508-5516.
[3] A. Shimada, S. Yajima, P. Viboonchaicheep and K. Samura, “Mecanum-wheel vehicle systems based on position corrective control,” 31st Annual Conference of IEEE Industrial Electronics Society, 2005.
[4] F. Ding, M. Cai, and S. Chen, “Application of STEAM Theory in Robot Teaching,”3rd International Conference on Economics and Management, Education,Humanities and Social Sciences (EMEHSS 2019), 2019, pp. 109-113.
[5] T. J. Haur, “Optimization-based Path Planning Trajectory Tracking and Obstacle Avoidance of 1:10 scale RC car”, National Cheng Kung University of Aeronautics and Astronautics, thesis, 2018.
[6] Y. P. Kuo and T. S. S. Li, “GA-based fuzzy PI/PD controller for automotive active suspension system”, IEEE Transactions on Industrial Electronics, vol. 46, no. 6, pp. 1051-1056, 1999.
[7] Y. R. Tong and Z. B. Li, “Design of Intelligent Socket Based on WiFi”, 2017 4th International Conference on Information Science and Control Engineering (ICISCE), 2017.
[8] H. Li, K. Ota, and M. Dong, “Learning IoT in edge: Deep learning for the internet of things with edge computing,” IEEE Network, vol. 32, no. 1, pp. 96-101, Jan. 2018.
[9] A. M. d. S. Neto and R. A. F. Romero, “A Decentralized Approach to Drone Formation Based on Leader-Follower Technique,” Latin American Robotics Symposium (LARS), Brazilian Symposium on Robotics (SBR) and Workshop on Robotics in Education (WRE), pp. 23-25, 2019.
[10] W. Zheng, H. Wang, H. Ji and J. Wu, “UAV Formation Flight and Collision Warning with Centralized Control of Ground Control Station,” IEEE International Conference on Unmanned Systems (ICUS), pp. 17-19, 2020.
[11] H. Huang, L. Nie, G. Pan and M. Xia, “Application of Active Disturbance Rejection Control technology in distributed Control System of coal-fired power generation,” Proceedings of the 29th Chinese Control Conference, pp. 29-31, 2010.
[12] Z. Zhen, Z. Yong, Z. Zhigao, M. Shaoping and W. Jing, “Semi-active control using mr dampers based on fully decentralized control strategy,” International Conference on Electric Information and Control Engineering, pp. 15-17, 2011.
[13] W. Fang, M. Zamani and Z. Chen, “Secure and privacy preserving consensus for second-order systems based on Paillier encryption”, Systems & Control Letters, vol. 148, pp. 2-10, 2021.
[14] Y. Y. Chen,“Formation Control of Four-Wheel Vehicle Based on Homomorphic Paillier,” National Cheng Kung University · Dept. of Engineering Science, thesis, 2021.
[15] J. Qin and C. Yu, “Cluster consensus control of generic linear multi-agent systems under directed topology with acyclic partition,” Automatica, vol. 49, no. 9, pp. 2898-2905, 2013.
[16] H. Chockler and G. Weissenbache, “Computer Aided Verification,” Springer, 1999.
[17] A. Suresh, C. P. Sridhar, D. Gaba, D. Laha, and S. Bhambri, “Design and Development of Intelligent Self-driving Car Using ROS and Machine Vision Algorithm,” International Conference on Roboot Intelligence Technology and Applications, 2017, pp. 83-98
[18] P. Kim, D. Han and K. C. Jeong, “Time–space complexity of quantum search algorithms in symmetric cryptanalysis: applying to AES and SHA-2,” Springer, 2018.
[19] A. K. Jain, “Working model of Self-driving car using Convolutional Neural Network, Raspberry Pi and Arduino,” 2018 2nd International Conference on Electronics, Communication and Aerospace Technology (ICECA), Coimbatore, 2018, pp. 1630-1635.
[20] Q. H. Song, “Face recognition and tracking control based on convolutional neural network and parallel-cascade PID controller,” National Cheng Kung University · Dept. of Engineering Science, thesis, 2020.
[21] Y. Jadeja and K. Modi, “Cloud computing - concepts, architecture and challenges,”2012 International Conference on Computing, Electronics and ElectricalTechnologies (ICCEET), Kumaracoil, 2012, pp. 877-880.
[22] A. Nawikavatan, C. Thammarat and D. Puangdownreong, “Optimal Design of I-PD Controller for DC Motor Speed Control System by Cuckoo Search,” Procedia Computer Science, vol. 86, pp. 83-86, 2016.
[23] D. Xie and S. Wang, “Consensus of second-order discrete-time multi-agent systems with fixed topology,” Journal of Mathematical Analysis and Applications, vol. 387, no. 1, pp. 8-16, 2012.
[24] R. W. Cottle, “Manifestations of the Schur complement,” Linear Algebra and its Applications, vol. 8, no. 3, pp. 189-211, 1974.
[25] W. Ren and R. W. Beard, “Distributed Consensus in Multi-vehicle Cooperative Control Theory and Applications,” Springer-Verlag Londo, 2008.
校內:2029-08-22公開