汪世鹏, 解仑, 李连鹏, 孟盛, 王志良. 基于EtherCAT总线的七自由度机械臂的隐蔽攻击技术[J]. 工程科学学报, 2020, 42(12): 1653-1663. DOI: 10.13374/j.issn2095-9389.2019.12.07.002
引用本文: 汪世鹏, 解仑, 李连鹏, 孟盛, 王志良. 基于EtherCAT总线的七自由度机械臂的隐蔽攻击技术[J]. 工程科学学报, 2020, 42(12): 1653-1663. DOI: 10.13374/j.issn2095-9389.2019.12.07.002
WANG Shi-peng, XIE Lun, LI Lian-peng, MENG Sheng, WANG Zhi-liang. Covert attack technology of EtherCAT based 7 degrees of freedom manipulator[J]. Chinese Journal of Engineering, 2020, 42(12): 1653-1663. DOI: 10.13374/j.issn2095-9389.2019.12.07.002
Citation: WANG Shi-peng, XIE Lun, LI Lian-peng, MENG Sheng, WANG Zhi-liang. Covert attack technology of EtherCAT based 7 degrees of freedom manipulator[J]. Chinese Journal of Engineering, 2020, 42(12): 1653-1663. DOI: 10.13374/j.issn2095-9389.2019.12.07.002

基于EtherCAT总线的七自由度机械臂的隐蔽攻击技术

Covert attack technology of EtherCAT based 7 degrees of freedom manipulator

  • 摘要: 针对七自由度机械臂控制系统提出了一种七自由度机械臂隐蔽攻击模型。首先基于推导的机械臂逆运动学方程,对基于EtherCAT总线的七自由度机械臂进行运动规划与建模;其次,根据粒子群算法的研究与分析,提出了基于混沌理论的多种群粒子群优化的七自由度机械臂系统PID参数辨识算法;最后搭建了七自由度机械臂的攻击实验平台并使用辨识的参数结合隐蔽攻击原理开展了机械臂系统的攻击实验,并且将所提出的隐蔽攻击技术与其他传统攻击技术进行了比较。结果表明,所提出的七自由度机械臂隐蔽攻击方法可以破坏机械臂系统的数据完整性和准确性,并且具有很好的隐蔽性,验证了所建立的攻击模型的有效性和可行性。

     

    Abstract: While the industrial robotic manipulator is a kind of multi-input and multi-output human-like operation and highly autonomous control system. It is widely used in medical care, home service, industrial manufacturing and other fields. With the integration of cyber-physical system networks and the Internet in recent years, the control commands of the industrial robotic arm control system can be totally exposed to the Internet. Under these circumstances, the chances of successful attacks by attackers to systems are increasing year by year. Compared to the security of traditional cyber physical system, the security of manipulator control system is a very challenging problem. In this paper, a covert attack method of 7 degrees of freedom (7-DOF) manipulator control system was proposed. Firstly, based on the inverse kinematics equation of the manipulator, the motion planning and modeling of 7-DOF manipulator, which communicated by EtherCAT, was carried out. Secondly, according to the research and analysis of particle swarm optimization method, a 7-DOF manipulator system PID parameter identification algorithm based on chaotic theory for multi- swarm particle swarm optimization was proposed. Parameter identification mainly identified the PID parameters of each joint. The principle and derivation process of the algorithm were described in detail. Finally, the experimental platform of manipulator control system was built and the identified parameters were used in combination with the covert attack principle to conduct the experiment. The proposed method was compared with other traditional attack methods, such as state machine attack and traditional sine attack. The results show that the covert attack model of the proposed 7-DOF manipulator can destroy the data integrity and accuracy of the manipulator system, and has a good concealment, which verifies the effectiveness and feasibility of the established attack model. The attack experiment platform constructed in this paper provides the physical basis for the attack and defense experiment of the manipulator, and it has certain reference significance for similar researchers.

     

/

返回文章
返回