000 05139nam a22005535i 4500
001 978-981-99-9359-8
003 DE-He213
005 20240423130334.0
007 cr nn 008mamaa
008 240319s2024 si | s |||| 0|eng d
020 _a9789819993598
_9978-981-99-9359-8
024 7 _a10.1007/978-981-99-9359-8
_2doi
050 4 _aQA76.76.I58
072 7 _aUYQ
_2bicssc
072 7 _aCOM004000
_2bisacsh
072 7 _aUYQ
_2thema
082 0 4 _a006.30285436
_223
100 1 _aLi, Xiaolei.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
245 1 0 _aSecure Coordination Control of Networked Robotic Systems
_h[electronic resource] :
_bFrom a Control Theory Perspective /
_cby Xiaolei Li, Jiange Wang, Xiaoyuan Luo, Xinping Guan.
250 _a1st ed. 2024.
264 1 _aSingapore :
_bSpringer Nature Singapore :
_bImprint: Springer,
_c2024.
300 _aXVI, 237 p. 1 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
505 0 _aChapter 1. Introduction -- Chapter 2. Secure Cooperative Control for Networked Robotic Systems Under DoS Attacks -- Chapter 3. Secure Cooperative Control for Networked Robotic Systems with Disturbances and DoS Attacks -- Chapter 4. Secure Tracking for Networked Robotic Systems Under DoS Attacks -- Chapter 5. Jamming-Resilient Coordination of Networked Robotic Systems with Quantized Sampling Data -- Chapter 6. Event-Based Secure Coordination of Networked Robotic Systems Under DoS Attacks -- Chapter 7. Dynamic Event-Based Secure Coordination of Networked Robotic Systems Under DoS Attacks -- Chapter 8. Self-Triggered Secure Coordination of Networked Robotic Systems Under Asynchronous DoS Attacks -- Chapter 9. Secure Coordination of Networked Robotic Systems with Adversarial Nodes -- Chapter 10. Future Research Directions.
520 _aAs one of the core equipments and actuators, robotic technology has attracted much attention and has made great progress. However, a single robotic system is often unable to handle complex tasks due to limitations in sensors, microprocessors, actuators, and the ability to handle complex situations. With the development of distributed control and microprocessing technology, networked robotic systems have greatly expanded their perceptual, computational, and execution capabilities, with high efficiency, low cost, and strong functionality advantages. As a typical distributed cyber-physical system (DCPS), which is an intelligent system that integrates computing, communication, and control, networked robotic systems can perform higher-level tasks by sharing information and working together. It can provide intelligent control and monitoring of a physical process, such as environment observation, information collection, and search and rescue, etc. Thus, coordination control of networked robotic systems has become the focus of scholars worldwide. However, the sensing, communication, and control integration of networked robotic systems make them face unprecedented network security threats, in which cyber attacks have become a major hidden danger to the reliable operation of autonomous unmanned systems. Although existing control methods can achieve swarm collaborative control of networked robotic systems, the protection of which, especially the security of control systems, is rarely addressed. In this book, we conduct research on the secure coordination problem of networked robotic systems from a control theory perspective, given the limited communication bandwidth and the increasingly prominent network security threats. This book showcases several continuous-time and event-triggered secure control design and analysis methods for networked robotic systems under different types of cyberattacks. Additionally, several future research directions are provided for networked robotic systems. This book will be an important reference for scientists, engineers, and graduate students from the field of underwater robotic technologies, maritime science, and control engineering.
650 0 _aMultiagent systems.
650 0 _aComputer networks
_xSecurity measures.
650 0 _aCooperating objects (Computer systems).
650 1 4 _aMultiagent Systems.
650 2 4 _aMobile and Network Security.
650 2 4 _aCyber-Physical Systems.
700 1 _aWang, Jiange.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
700 1 _aLuo, Xiaoyuan.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
700 1 _aGuan, Xinping.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9789819993581
776 0 8 _iPrinted edition:
_z9789819993604
776 0 8 _iPrinted edition:
_z9789819993611
856 4 0 _uhttps://doi.org/10.1007/978-981-99-9359-8
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
942 _cSPRINGER
999 _c187517
_d187517