000 | 05205nam a22005535i 4500 | ||
---|---|---|---|
001 | 978-981-99-9359-8 | ||
003 | DE-He213 | ||
005 | 20240730171629.0 | ||
007 | cr nn 008mamaa | ||
008 | 240319s2024 si | s |||| 0|eng d | ||
020 |
_a9789819993598 _9978-981-99-9359-8 |
||
024 | 7 |
_a10.1007/978-981-99-9359-8 _2doi |
|
050 | 4 | _aQA76.76.I58 | |
072 | 7 |
_aUYQ _2bicssc |
|
072 | 7 |
_aCOM004000 _2bisacsh |
|
072 | 7 |
_aUYQ _2thema |
|
082 | 0 | 4 |
_a006.30285436 _223 |
100 | 1 |
_aLi, Xiaolei. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _999595 |
|
245 | 1 | 0 |
_aSecure Coordination Control of Networked Robotic Systems _h[electronic resource] : _bFrom a Control Theory Perspective / _cby Xiaolei Li, Jiange Wang, Xiaoyuan Luo, Xinping Guan. |
250 | _a1st ed. 2024. | ||
264 | 1 |
_aSingapore : _bSpringer Nature Singapore : _bImprint: Springer, _c2024. |
|
300 |
_aXVI, 237 p. 1 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
505 | 0 | _aChapter 1. Introduction -- Chapter 2. Secure Cooperative Control for Networked Robotic Systems Under DoS Attacks -- Chapter 3. Secure Cooperative Control for Networked Robotic Systems with Disturbances and DoS Attacks -- Chapter 4. Secure Tracking for Networked Robotic Systems Under DoS Attacks -- Chapter 5. Jamming-Resilient Coordination of Networked Robotic Systems with Quantized Sampling Data -- Chapter 6. Event-Based Secure Coordination of Networked Robotic Systems Under DoS Attacks -- Chapter 7. Dynamic Event-Based Secure Coordination of Networked Robotic Systems Under DoS Attacks -- Chapter 8. Self-Triggered Secure Coordination of Networked Robotic Systems Under Asynchronous DoS Attacks -- Chapter 9. Secure Coordination of Networked Robotic Systems with Adversarial Nodes -- Chapter 10. Future Research Directions. | |
520 | _aAs one of the core equipments and actuators, robotic technology has attracted much attention and has made great progress. However, a single robotic system is often unable to handle complex tasks due to limitations in sensors, microprocessors, actuators, and the ability to handle complex situations. With the development of distributed control and microprocessing technology, networked robotic systems have greatly expanded their perceptual, computational, and execution capabilities, with high efficiency, low cost, and strong functionality advantages. As a typical distributed cyber-physical system (DCPS), which is an intelligent system that integrates computing, communication, and control, networked robotic systems can perform higher-level tasks by sharing information and working together. It can provide intelligent control and monitoring of a physical process, such as environment observation, information collection, and search and rescue, etc. Thus, coordination control of networked robotic systems has become the focus of scholars worldwide. However, the sensing, communication, and control integration of networked robotic systems make them face unprecedented network security threats, in which cyber attacks have become a major hidden danger to the reliable operation of autonomous unmanned systems. Although existing control methods can achieve swarm collaborative control of networked robotic systems, the protection of which, especially the security of control systems, is rarely addressed. In this book, we conduct research on the secure coordination problem of networked robotic systems from a control theory perspective, given the limited communication bandwidth and the increasingly prominent network security threats. This book showcases several continuous-time and event-triggered secure control design and analysis methods for networked robotic systems under different types of cyberattacks. Additionally, several future research directions are provided for networked robotic systems. This book will be an important reference for scientists, engineers, and graduate students from the field of underwater robotic technologies, maritime science, and control engineering. | ||
650 | 0 |
_aMultiagent systems. _94974 |
|
650 | 0 |
_aComputer networks _xSecurity measures. _93969 |
|
650 | 0 |
_aCooperating objects (Computer systems). _96195 |
|
650 | 1 | 4 |
_aMultiagent Systems. _94974 |
650 | 2 | 4 |
_aMobile and Network Security. _933624 |
650 | 2 | 4 |
_aCyber-Physical Systems. _932475 |
700 | 1 |
_aWang, Jiange. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _999598 |
|
700 | 1 |
_aLuo, Xiaoyuan. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _999599 |
|
700 | 1 |
_aGuan, Xinping. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _999601 |
|
710 | 2 |
_aSpringerLink (Online service) _999603 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9789819993581 |
776 | 0 | 8 |
_iPrinted edition: _z9789819993604 |
776 | 0 | 8 |
_iPrinted edition: _z9789819993611 |
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-981-99-9359-8 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
942 | _cEBK | ||
999 |
_c87707 _d87707 |