Citation: | WANG Shi-peng, XIE Lun, LI Lian-peng, MENG Sheng, WANG Zhi-liang. Covert attack technology of EtherCAT based 7 degrees of freedom manipulator[J]. Chinese Journal of Engineering, 2020, 42(12): 1653-1663. doi: 10.13374/j.issn2095-9389.2019.12.07.002 |
[1] |
Bencsath B, Pek G, Buttyan L, et al. The cousins of stuxnet: Duqu, flame, and gauss. Future Internet, 2012, 4(4): 971 doi: 10.3390/fi4040971
|
[2] |
Langner R. Stuxnet: dissecting a cyberwarfare weapon. IEEE Secur Privacy, 2011, 9(3): 49 doi: 10.1109/MSP.2011.67
|
[3] |
Wu X P, Xie L H. Performance evaluation of industrial Ethernet protocols for networked control application. Control Eng Pract, 2019, 84: 208 doi: 10.1016/j.conengprac.2018.11.022
|
[4] |
Sestito G S, Turcato A C, Dias A L, et al. A method for anomalies detection in real-time Ethernet data traffic applied to PROFINET. IEEE Trans Ind Inform, 2018, 14(5): 2171 doi: 10.1109/TII.2017.2772082
|
[5] |
Dias A L, Sestito G S, Brandao D. Performance analysis of Profibus DP and Profinet in a motion control application. J Control Autom Electr Syst, 2017, 28(1): 86 doi: 10.1007/s40313-016-0278-7
|
[6] |
Chen C H, Lin M Y, Guo X C. High-performance fieldbus application-specific integrated circuit design for industrial smart sensor networks. J Supercomput, 2018, 74(9): 4451 doi: 10.1007/s11227-017-2010-1
|
[7] |
姜斌, 劉彥呈, 孫凡金, 等. 基于Modbus/TCP的工業控制網絡設計. 低壓電器, 2007(13):30
Jiang B, Liu Y C, Sun F J, et al. Design of industrial control network based on Modbus/TCP. Low Volt Apparat, 2007(13): 30
|
[8] |
Eramo V, Lavacca F G, Listanti M, et al. Definition and performance evaluation of an Advanced Avionic TTEthernet Architecture for the support of Launcher Networks. IEEE Aerospace Electron Syst Mag, 2018, 33(9): 30 doi: 10.1109/MAES.2018.170161
|
[9] |
Langlois K, van der Hoeven T, Cianca D R, et al. EtherCAT tutorial: an introduction for real-time hardware communication on windows. IEEE Robot Autom Mag, 2018, 25(1): 22 doi: 10.1109/MRA.2017.2787224
|
[10] |
Granat A, Hofken H, Schuba M. Intrusion detection of the ICS protocol EtherCAT//International Conference on Computer, Network Security and Communication Engineering (CNSCE2017). Pennsylvania, 2017: 52
|
[11] |
Perry J C, Rosen J. Design of a 7 degree-of-freedom upper-limb powered exoskeleton//The First IEEE/RAS-EMBS International Conference on Biomedical Robotics and Biomechatronics, BioRob 2006. Pisa, 2006: 805
|
[12] |
Akpinar K O, Ozcelik I. Development of the ECAT preprocessor with the trust communication approach. Secur Commun Networks, 2018, 2018: 1
|
[13] |
Li W Z, Xie L, Wang Z L. Two-loop covert attacks against constant value control of industrial control systems. IEEE Trans Ind Inform, 2019, 15(2): 663 doi: 10.1109/TII.2018.2819677
|
[14] |
Xie L, Mo Y L, Sinopoli B. False data injection attacks in electricity markets//2010 First IEEE International Conference on Smart Grid Communications. Gaithersburg, 2010: 226
|
[15] |
de Sá A O, Carmo L F R d C, Machado R C S. Covert attacks in cyber-physical control systems. IEEE Transactions on Industrial Informatics, 2017, 13(4): 1641 doi: 10.1109/TII.2017.2676005
|
[16] |
Krotofil M, Larsen J. Rocking the pocket book: hacking chemical plants//DefCon Conference. DEFCON, 2015: 1
|
[17] |
Quarta D, Pogliani M, Polino M, et al. An experimental security analysis of an industrial robot controller//2017 IEEE Symposium on Security and Privacy (SP). San Jose, 2017: 268
|
[18] |
Lagraa S, Cailac M, Rivera S, et al. Real-time attack detection on robot cameras: a self-driving car application//2019 Third IEEE International Conference on Robotic Computing (IRC). Naples, 2019: 102
|
[19] |
Vilches V M, Gil-Uriarte E, Ugarte I Z, et al. Towards an open standard for assessing the severity of robot security vulnerabilities, the Robot Vulnerability Scoring System (RVSS). arXiv preprint (2018-05-16)[2019-12-07] arXiv: 1807.10357, 2018. http://arxiv.org/abs/1807.10357
|
[20] |
D’Souza A, Vijayakumar S, Schaal S. Learning inverse kinematics//Proceedings 2001 IEEE/RSJ International Conference on Intelligent Robots and Systems. Expanding the Societal Role of Robotics in the the Next Millennium (Cat. No. 01CH37180). IEEE, 2001: 298
|
[21] |
Denavit J, Hartenberg R S. A kinematic notation for lower pair mechanisms based on matrices. J Appl Mech, 1955, 22: 215
|
[22] |
眭東亮, 解侖, 李連鵬, 等. 一種冗余機械臂耦合規劃控制算法. 計算機集成制造系統, 2019, 25(12):3226
Sui D L, Xie L, Li L P, et al. Coupling planning control algorithm of redundant manipulator. Comput Integr Manuf Syst, 2019, 25(12): 3226
|
[23] |
CRAIG J J. Introduction to Robotics. Beijing: China Machine Press, 2005
|
[24] |
Yue Y G, Cao L, Hu J, et al. A novel hybrid location algorithm based on chaotic particle swarm optimization for mobile position estimation. IEEE Access, 2019, 7: 58541 doi: 10.1109/ACCESS.2019.2914924
|
[25] |
Tharwat A, Elhoseny M, Hassanien A E, et al. Intelligent Bézier curve-based path planning model using Chaotic Particle Swarm Optimization algorithm. Cluster Comput, 2019, 22(2): 4745
|
[26] |
Nagra A A, Han F, Ling Q H, et al. An improved hybrid method combining gravitational search algorithm with dynamic multi swarm particle swarm optimization. IEEE Access, 2019, 7: 50388 doi: 10.1109/ACCESS.2019.2903137
|