<listing id="l9bhj"><var id="l9bhj"></var></listing>
<var id="l9bhj"><strike id="l9bhj"></strike></var>
<menuitem id="l9bhj"></menuitem>
<cite id="l9bhj"><strike id="l9bhj"></strike></cite>
<cite id="l9bhj"><strike id="l9bhj"></strike></cite>
<var id="l9bhj"></var><cite id="l9bhj"><video id="l9bhj"></video></cite>
<menuitem id="l9bhj"></menuitem>
<cite id="l9bhj"><strike id="l9bhj"><listing id="l9bhj"></listing></strike></cite><cite id="l9bhj"><span id="l9bhj"><menuitem id="l9bhj"></menuitem></span></cite>
<var id="l9bhj"></var>
<var id="l9bhj"></var>
<var id="l9bhj"></var>
<var id="l9bhj"><strike id="l9bhj"></strike></var>
<ins id="l9bhj"><span id="l9bhj"></span></ins>
Volume 42 Issue 12
Dec.  2020
Turn off MathJax
Article Contents
WANG Shi-peng, XIE Lun, LI Lian-peng, MENG Sheng, WANG Zhi-liang. Covert attack technology of EtherCAT based 7 degrees of freedom manipulator[J]. Chinese Journal of Engineering, 2020, 42(12): 1653-1663. doi: 10.13374/j.issn2095-9389.2019.12.07.002
Citation: WANG Shi-peng, XIE Lun, LI Lian-peng, MENG Sheng, WANG Zhi-liang. Covert attack technology of EtherCAT based 7 degrees of freedom manipulator[J]. Chinese Journal of Engineering, 2020, 42(12): 1653-1663. doi: 10.13374/j.issn2095-9389.2019.12.07.002

Covert attack technology of EtherCAT based 7 degrees of freedom manipulator

doi: 10.13374/j.issn2095-9389.2019.12.07.002
More Information
  • Corresponding author: E-mail: xielun@ustb.edu.cn
  • Received Date: 2019-12-07
  • Publish Date: 2020-12-25
  • While the industrial robotic manipulator is a kind of multi-input and multi-output human-like operation and highly autonomous control system. It is widely used in medical care, home service, industrial manufacturing and other fields. With the integration of cyber-physical system networks and the Internet in recent years, the control commands of the industrial robotic arm control system can be totally exposed to the Internet. Under these circumstances, the chances of successful attacks by attackers to systems are increasing year by year. Compared to the security of traditional cyber physical system, the security of manipulator control system is a very challenging problem. In this paper, a covert attack method of 7 degrees of freedom (7-DOF) manipulator control system was proposed. Firstly, based on the inverse kinematics equation of the manipulator, the motion planning and modeling of 7-DOF manipulator, which communicated by EtherCAT, was carried out. Secondly, according to the research and analysis of particle swarm optimization method, a 7-DOF manipulator system PID parameter identification algorithm based on chaotic theory for multi- swarm particle swarm optimization was proposed. Parameter identification mainly identified the PID parameters of each joint. The principle and derivation process of the algorithm were described in detail. Finally, the experimental platform of manipulator control system was built and the identified parameters were used in combination with the covert attack principle to conduct the experiment. The proposed method was compared with other traditional attack methods, such as state machine attack and traditional sine attack. The results show that the covert attack model of the proposed 7-DOF manipulator can destroy the data integrity and accuracy of the manipulator system, and has a good concealment, which verifies the effectiveness and feasibility of the established attack model. The attack experiment platform constructed in this paper provides the physical basis for the attack and defense experiment of the manipulator, and it has certain reference significance for similar researchers.

     

  • loading
  • [1]
    Bencsath B, Pek G, Buttyan L, et al. The cousins of stuxnet: Duqu, flame, and gauss. Future Internet, 2012, 4(4): 971 doi: 10.3390/fi4040971
    [2]
    Langner R. Stuxnet: dissecting a cyberwarfare weapon. IEEE Secur Privacy, 2011, 9(3): 49 doi: 10.1109/MSP.2011.67
    [3]
    Wu X P, Xie L H. Performance evaluation of industrial Ethernet protocols for networked control application. Control Eng Pract, 2019, 84: 208 doi: 10.1016/j.conengprac.2018.11.022
    [4]
    Sestito G S, Turcato A C, Dias A L, et al. A method for anomalies detection in real-time Ethernet data traffic applied to PROFINET. IEEE Trans Ind Inform, 2018, 14(5): 2171 doi: 10.1109/TII.2017.2772082
    [5]
    Dias A L, Sestito G S, Brandao D. Performance analysis of Profibus DP and Profinet in a motion control application. J Control Autom Electr Syst, 2017, 28(1): 86 doi: 10.1007/s40313-016-0278-7
    [6]
    Chen C H, Lin M Y, Guo X C. High-performance fieldbus application-specific integrated circuit design for industrial smart sensor networks. J Supercomput, 2018, 74(9): 4451 doi: 10.1007/s11227-017-2010-1
    [7]
    姜斌, 劉彥呈, 孫凡金, 等. 基于Modbus/TCP的工業控制網絡設計. 低壓電器, 2007(13):30

    Jiang B, Liu Y C, Sun F J, et al. Design of industrial control network based on Modbus/TCP. Low Volt Apparat, 2007(13): 30
    [8]
    Eramo V, Lavacca F G, Listanti M, et al. Definition and performance evaluation of an Advanced Avionic TTEthernet Architecture for the support of Launcher Networks. IEEE Aerospace Electron Syst Mag, 2018, 33(9): 30 doi: 10.1109/MAES.2018.170161
    [9]
    Langlois K, van der Hoeven T, Cianca D R, et al. EtherCAT tutorial: an introduction for real-time hardware communication on windows. IEEE Robot Autom Mag, 2018, 25(1): 22 doi: 10.1109/MRA.2017.2787224
    [10]
    Granat A, Hofken H, Schuba M. Intrusion detection of the ICS protocol EtherCAT//International Conference on Computer, Network Security and Communication Engineering (CNSCE2017). Pennsylvania, 2017: 52
    [11]
    Perry J C, Rosen J. Design of a 7 degree-of-freedom upper-limb powered exoskeleton//The First IEEE/RAS-EMBS International Conference on Biomedical Robotics and Biomechatronics, BioRob 2006. Pisa, 2006: 805
    [12]
    Akpinar K O, Ozcelik I. Development of the ECAT preprocessor with the trust communication approach. Secur Commun Networks, 2018, 2018: 1
    [13]
    Li W Z, Xie L, Wang Z L. Two-loop covert attacks against constant value control of industrial control systems. IEEE Trans Ind Inform, 2019, 15(2): 663 doi: 10.1109/TII.2018.2819677
    [14]
    Xie L, Mo Y L, Sinopoli B. False data injection attacks in electricity markets//2010 First IEEE International Conference on Smart Grid Communications. Gaithersburg, 2010: 226
    [15]
    de Sá A O, Carmo L F R d C, Machado R C S. Covert attacks in cyber-physical control systems. IEEE Transactions on Industrial Informatics, 2017, 13(4): 1641 doi: 10.1109/TII.2017.2676005
    [16]
    Krotofil M, Larsen J. Rocking the pocket book: hacking chemical plants//DefCon Conference. DEFCON, 2015: 1
    [17]
    Quarta D, Pogliani M, Polino M, et al. An experimental security analysis of an industrial robot controller//2017 IEEE Symposium on Security and Privacy (SP). San Jose, 2017: 268
    [18]
    Lagraa S, Cailac M, Rivera S, et al. Real-time attack detection on robot cameras: a self-driving car application//2019 Third IEEE International Conference on Robotic Computing (IRC). Naples, 2019: 102
    [19]
    Vilches V M, Gil-Uriarte E, Ugarte I Z, et al. Towards an open standard for assessing the severity of robot security vulnerabilities, the Robot Vulnerability Scoring System (RVSS). arXiv preprint (2018-05-16)[2019-12-07] arXiv: 1807.10357, 2018. http://arxiv.org/abs/1807.10357
    [20]
    D’Souza A, Vijayakumar S, Schaal S. Learning inverse kinematics//Proceedings 2001 IEEE/RSJ International Conference on Intelligent Robots and Systems. Expanding the Societal Role of Robotics in the the Next Millennium (Cat. No. 01CH37180). IEEE, 2001: 298
    [21]
    Denavit J, Hartenberg R S. A kinematic notation for lower pair mechanisms based on matrices. J Appl Mech, 1955, 22: 215
    [22]
    眭東亮, 解侖, 李連鵬, 等. 一種冗余機械臂耦合規劃控制算法. 計算機集成制造系統, 2019, 25(12):3226

    Sui D L, Xie L, Li L P, et al. Coupling planning control algorithm of redundant manipulator. Comput Integr Manuf Syst, 2019, 25(12): 3226
    [23]
    CRAIG J J. Introduction to Robotics. Beijing: China Machine Press, 2005
    [24]
    Yue Y G, Cao L, Hu J, et al. A novel hybrid location algorithm based on chaotic particle swarm optimization for mobile position estimation. IEEE Access, 2019, 7: 58541 doi: 10.1109/ACCESS.2019.2914924
    [25]
    Tharwat A, Elhoseny M, Hassanien A E, et al. Intelligent Bézier curve-based path planning model using Chaotic Particle Swarm Optimization algorithm. Cluster Comput, 2019, 22(2): 4745
    [26]
    Nagra A A, Han F, Ling Q H, et al. An improved hybrid method combining gravitational search algorithm with dynamic multi swarm particle swarm optimization. IEEE Access, 2019, 7: 50388 doi: 10.1109/ACCESS.2019.2903137
  • 加載中

Catalog

    通訊作者: 陳斌, bchen63@163.com
    • 1. 

      沈陽化工大學材料科學與工程學院 沈陽 110142

    1. 本站搜索
    2. 百度學術搜索
    3. 萬方數據庫搜索
    4. CNKI搜索

    Figures(12)  / Tables(3)

    Article views (1674) PDF downloads(39) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return
    久色视频