دانش و فناوری هوافضا

دانش و فناوری هوافضا

کنترل عملکردی پیش‌بین رمزگذاری شده برای سیستم‌ کوادکوپتر با استفاده از تسهیم راز اعداد حقیقی

نوع مقاله : مقاله پژوهشی

نویسنده
دانشیار، دانشکده مهندسی و پرواز، دانشگاه افسری امام علی (ع)، تهران
چکیده
در این مقاله، بر طراحی و پیاده‌سازی یک کنترل‌کننده پیش‌بین مدل رمزگذاری شده تمرکز کرده‌ایم. طرح رمزگذاری پیشنهادی می‌تواند محاسبات کنترلی را بر اساس ریاضیات رمزنگاری بدون نیاز به رمزگشایی میانی انجام دهد. در واقع، از یک طرح تسهیم راز به عنوان ابزار حفظ حریم خصوصی برای ایجاد یک محیط امن جهت محاسبه یک دسته از کنترل‌کننده‌های پیش‌بین به نام کنترل عملکردی پیش‌بین با توزیع داده‌ها در فضای ابری استفاده می‌شود.این کنترل‌کننده با حفظ سادگی و ویژگی‌های اساسی کنترل پیش‌بین، از رمزنگاری مبتنی بر تسهیم راز برای انجام عملیات مستقیم روی داده‌های رمزگذاری شده استفاده می‌کند و امنیت سایبری سیستم را به‌طور چشمگیری افزایش می‌دهد. کنترل‌کننده عملکردی پیش‌بین رمزگذاری شده پیشنهادی بر روی یک سیستم کوادکوپتر اعمال شده و کارایی آن توسط مجموعه‌ای از شبیه‌سازی‌های جامع ارزیابی می‌شود. نتایج شبیه‌سازی نشان می‌دهد که کنترل‌کننده رمزگذاری شده پیشنهادی ضمن حفظ کامل محرمانگی داده‌های حساس، عملکردی کاملاً مشابه با کنترل‌کننده غیررمزگذاری شده دارد و قادر است پایداری و عملکرد مطلوب سیستم کوادکوپتر را در شرایط عملیاتی مختلف تضمین نماید.
کلیدواژه‌ها

موضوعات


عنوان مقاله English

Encrypted predictive functional control for quadcopter systems using real-number secret sharing

نویسنده English

M. Abolfazl Mokhtari
Associate Professor Faculty of Engineering and Flight, Imam Ali University, Tehran
چکیده English

This paper focuses on the design and implementation of an encrypted model-based predictive controller. The proposed encryption scheme enables control computations to be performed directly on encrypted data using cryptographic mathematics, eliminating the need for intermediate decryption. Specifically, a secret sharing scheme is employed as a privacy-preserving tool to create a secure environment for computing a class of predictive controllers known as predictive functional control (PFC) with cloud-based data distribution. While retaining the simplicity and fundamental features of predictive control, the controller utilizes secret-sharing-based encryption to perform operations directly on encrypted data, significantly enhancing the cybersecurity of the system. The proposed encrypted predictive functional controller is applied to a quadcopter system, and its performance is evaluated through a series of comprehensive simulations. Simulation results show that the encrypted controller maintains performance nearly identical to that of the unencrypted controller while fully preserving the confidentiality of sensitive data. Moreover, it ensures stability and desired performance of the quadcopter system under various operational conditions.

کلیدواژه‌ها English

Encrypted control
Predictive functional control
Secret sharing
Secure control
Distributed computation
Quadcopter systems
Cybersecurity.
[1] K. Tjell and R. Wisniewski, “Privacy in distributed computations based on real number secret sharing,” Journal of the Franklin Institute, vol. 359, no. 16, pp. 8752–8771, November 2022.
[2] C. Shamir, A. Shamir, A. Surendar, B. Binyamin, D. O. Bokov, D. Toghraie, and M. Omidi, “How to share a secret,” Journal of Thermal Science, vol. 22, no. 11, pp. 612–613, September 1979.
[3] M. J. Atallah and W. Du, "Secure multi-party computational geometry," Workshop on Algorithms and Data Structures, pp. 165–179, 2001.
[4] R. Cramer, I. Damgård, and J. B. Nielsen, Secure Multiparty Computation and Secret Sharing. Cambridge University Press, 2015.
[5] Z. Brakerski, “Fully homomorphic encryption without modulus switching from classical GapSVP,” in Proc. Annu. Cryptol. Conf., 2012, pp. 868–886.
[6] A. C. C. Yao, “How to generate and exchange secrets,” Journal of Thermal Science, vol. 31, no. 5, pp. 1663-1681, September 2022.
[7] M. S. Darup and T. Jager, “Encrypted cloud-based control using secret sharing with one-time pads,” in Proceedings of the 58th IEEE Conference on Decision and Control, 2019, pp. 7215–7221.
[8] C. Mohtadi, D. W. Clarke, and P. S. Tuffs, “Generalized predictive control—Part I. The basic algorithm,” Automatica, vol. 23, no. 2, pp. 137–148, 1987.
[9] D. Bogdanov, S. Laur, and J. Willemson, “Sharemind: A framework for fast privacy-preserving computations,” European Symposium on Research in Computer Security, Berlin, Heidelberg, pp. 192–206, 2008.
[10] T. Nishide and K. Ohta, “Multiparty computation for interval, equality, and comparison without bit-decomposition protocol,” International Workshop on Public Key Cryptography, Berlin, Heidelberg, pp. 343–360, 2007.
[11] C. E. F. Camacho and C. Bordons, “Model Predictive Control,” London, U.K.: Springer, 2007.
[12] K. Kogiso and T. Fujita, "Cyber-security enhancement of networked control systems using homomorphic encryption," Journal of Decision and Control, vol. 54, no. 1, pp. 6836–6843, December 2015.
[13] J. A. Rossiter and M. S. Aftab, “Recent developments in tuning methods for predictive functional control,” Processes, vol. 10, no. 7, p. 1398, 2022.
[14] Z. Zhang, L. Xie, S. Lu, J. A. Rossiter, and H. Su, “A low-cost pole-placement MPC algorithm for controlling complex dynamic systems,” Journal of Process Control, vol. 111, pp. 106–116, March 2022.
[15] M. S. Darup, A. B. Alexandru, D. E. Quevedo, and G. J. Pappas, “Encrypted control for networked systems: An illustrative introduction and current challenges,” IEEE Control Systems Magazine, vol. 41, no. 3, pp. 58–78, June 2021.
[16] S. J. Qin and T. A. Badgwell, “A survey of industrial model predictive control technology,” Control Engineering Practice, vol. 11, no. 7, pp. 733–764, Jul. 2003.
[17] D. W. Clarke, C. Mohtadi, and P. S. Tuffs, “Generalized predictive control—Part I. The basic algorithm,” Automatica, vol. 23, no. 2, pp. 137–148, March 1987.
[18] J. A. Rossiter, Model-Based Predictive Control: A Practical Approach. Boca Raton, FL, USA: CRC Press, 2003.
[19] R. A. Gupta and M. Y. Chow, “Networked control system: Overview and research trends,” IEEE Transactions on Industrial Electronics, vol. 57, no. 7, pp. 2527–2535, July 2010.
[20] A. Cardenas, S. Amin, B. Sinopoli, A. Giani, A. Perrig, and S. Sastry, “Attacks against process control systems: Risk assessment, detection, and response,” in Proceedings of the ACM Symposium on Information, Computer and Communications Security (ASIACCS), Hong Kong, 2011, pp. 355–366.
[21] A. Teixeira, I. Shames, H. Sandberg, and K. H. Johansson, “Secure control systems: A quantitative risk management approach,” IEEE Control Systems Magazine, vol. 35, no. 1, pp. 24–45, February 2015.
[22] C. Murguia and J. Ruths, “On model-based detectors for linear time-invariant stochastic systems under sensor attacks,” IET Control Theory & Applications, vol. 13, no. 8, pp. 1051–1061, May 2019.
[23] C. M. S. Darup, A. B. Alexandru, D. E. Quevedo, and G. J. Pappas, “Encrypted control for networked systems: An illustrative introduction and current challenges,” IEEE Control Systems Magazine, vol. 41, no. 3, pp. 58–78, 2021.
[24] K. Tjell and R. Wisniewski, “Privacy in distributed computations based on real number secret sharing,” arXiv preprin arXiv:2107.00911, 2021.
[25] Y. A. Kadakia, F. Abdullah, A. Alnajdi, and P. D. Christofides, “Encrypted distributed model predictive control of nonlinear processes,” Control Eng. Pract., vol. 145, p. 105874, 2024.
[26] J. Blevins and J. Ueda, “Encrypted model reference adaptive control with false data injection attack resilience via somewhat homomorphic encryption-based overflow trap,” IEEE Transactions on Industrial Cyber-Physical Systems, vol. 1, pp. 1–14, 2025.
[27] A. Khodaverdian, G. Wu, Z. Wu, and P. D. Christofides, “Encrypted machine learning-based model predictive control architectures for nonlinear systems,” Computers & Chemical Engineering, vol. 196, p. 109166, December 2025.
[28] C. Sui, J. Wang, W. Liu, J. Pan, L. Wang, Y. Zhao, and L. Kong, “Optimizing encrypted control algorithms for real-time secure control,” Journal of the Franklin Institute, vol. 361, no. 5, p. 106677, March 2024.
[29] C. Gentry, “Fully homomorphic encryption using ideal lattices,” Proc. ACM STOC, Bethesda, MD, USA, pp. 169–178, 2009.
[30] M. Naehrig, K. Lauter, and V. Vaikuntanathan, “Can homomorphic encryption be practical?,” Proceedings of the 3rd ACM Cloud Computing Security Workshop, Chicago, IL, USA, pp. 113–124, October 2011.
[31] P. Tabuada, “Event-triggered real-time scheduling of stabilizing control tasks,” IEEE Transactions on Automatic Control, vol. 52, no. 9, pp. 1680–1685, September 2007
[32] M. Ito, A. Saito, and T. Nishizeki, “Secret sharing scheme realizing general access structure,” Journal of Thermal Science, vol. 31, no. 5, pp. 1663–1681, September 2022.
[33] M. Schulze Darup, A. B. Alexandru, D. E. Quevedo, and G. J. Pappas, “Encrypted cooperative control based on structured feedback,” IEEE Transactions on Automatic Control, vol. 66, no. 1, pp. 1–13, January 2021.
[34] Y. Mo and B. Sinopoli, “Secure control against replay attacks,” Proc. IEEE Conf. Decision Control, Shanghai, China, pp. 597–602, 2009