[阅读笔记] 2019 ICRA - Coordinated multi-robot planning while preserving individual privacy

本文主要是介绍[阅读笔记] 2019 ICRA - Coordinated multi-robot planning while preserving individual privacy,希望对大家解决编程问题提供一定的参考价值,需要的开发者们随着小编来一起学习吧!

🛣[阅读笔记] 2019 ICRA - Coordinated multi-robot planning while preserving individual privacy

  • 本文介绍了一种隐私保护的协作多机器人路径规划方法,使用了安全计算几何、混淆电路、同态加密等密码学技术,实现了在不共享🙅🏻‍♀️机器人🤖规划路径的前提下的路径碰撞检测方法。

  • 算法具体细节介绍见我的下一篇笔记:本文解释一下安全多方计算技术是如何在不泄露两个机器人未来路径的基础上实现对碰撞预测的。

  • 🙋‍♂️张同学 📧zhangruiyuan@zju.edu.cn 有问题请联系我~

这里是目录呀~

  • 🛣[阅读笔记] 2019 ICRA - Coordinated multi-robot planning while preserving individual privacy
    • 一、⚽️ Introduction
    • 二、🏀 Related Work
    • 三、🏈 Preliminaries
      • A. 🍏 Model Definition
      • B. 🍎 Problem Formulation
    • 四、⚾️ Method
      • A. 🍏 Privacy-Preserving Path Intersection
      • B. 🍎 Privacy-Preserving Persistent Monitoring
      • C. 🍐 Rendezvous Using Secure 3D Intersection
    • 五、🎾 实验结果
      • A. 🍏 Software Implementation of Persistent Monitoring
      • B. 🍎 Implementation of 3D Intersection
      • C. 🍐 Hardware Experiment
    • 六、🏐 Conclusion And Future Work
    • 七、🏉 我获悉的感悟
    • 🎱 参考文献

一、⚽️ Introduction

⛳️ 在不纰漏机器人🤖的路径前提下,实现路径的规划是一个重要的课题:

  • 🚗 不同的公司的飞行器🛩之间存在碰撞💥可能性,如在不泄露隐私下仍能做好规划是最理想的解决办法。

    An obstacle to the widespread commercial use of small Unmanned Aerial Vehicles (UAVs) is the potential for collisions, not only against each other but also against larger manned aircraft [1]. As various airborne vehicles are owned and operated by different companies and stake- holders, it would be ideal if one could provide assurances of collision-free paths without mandating the disclosure of information that some parties would be uneasy revealing.

  • 🚕 假设某一台机器人🛫被绑架的场景下,隐私保护的路径🚞规划能够实现路径信息不会泄露。

    Consider a covert mission against some adversary where multiple robots must coordinate, for example, to ren- dezvous behind enemy lines. In the event of one of the robots being abducted or compromised, we would like guarantees that any information that might be extracted from the captured agent will not make the other robots vulnerable.

⛳️ 本文的贡献:

This is one of the first implementations of SMC in Robotics.

  • 🚗 一种路径碰撞判断的密码学原子⚛协议

    A secure path intersection protocol based on the polygon intersection ideas presented in [5] and simplifie to make its implementation feasible using open source software packages.

  • 🚕 一种用来确保两个机器人🤖不会相撞的原子⚛协议,以及其软件模拟实验、硬件实验

    A protocol that ensures that two robots will not collide while executing their task, its software implementation, and hardware proof of concept experiments.

  • 🚙 一种考虑时间因素⏰、3D空间条件下的碰撞💥协议

    A new, secure 3D path collision protocol that can be used in plans involving time or 3D workspaces.

二、🏀 Related Work

⛳️ 本文作者的动机来源介绍&本文所用的基本技术介绍:

  • 🚗 多方安全计算领域是本文的动机

    The motivation of our work comes from the area of Secure Multi-Party Computations [2], [3] where a group of players needs to compute a joint function without disclosing their inputs.

  • 🚕 为了解决隐私保护下的路径规划,本文从安全计算几何中获得了灵感,本文的工作(3D路径判断原语、SMC实践系统)建立在「在安全计算几何中使用的一些原语:Yao’s millionaires, Garbled Circuits, 1-out-N oblivious transfer, and Homomorphic Encryption」的基础上。

    In particular, due to the close connection of planning algorithms to Computational Geometry, our ideas take inspiration from Secure Computational Geometry [7], [5], [8], [9], [10] that proposes geometric constructions to computational problems involving intersections [5] (point in polygon, polygonpolygon intersection) or based on distance [7] (distance be- tween parametric equations and line segments). These secure geometric constructions use the primitives such as Yao’s millionaires, Garbled Circuits, 1-out-N oblivious transfer, and Homomorphic Encryption. In our work, we build our protocols on top of some of these primitives, specifically from [5] and simplify them to implement using open source software and inexpensive robot platforms.

⛳️ 其他学者们的工作:

  • 🚗 安全领域

    Security issues in multi-robot networks have been the focus of recent research [12], [13].

    • ⭐️ In [13], defense mech- anisms for Sybil attacks have been proposed and imple- mented in commodity Wi-Fi radios. Their approach has also been tested in mobile robotic platforms.
  • 🚕 隐私保护领域

    Privacy issues related to robots have also been investigated in several recent works [14], [15], [16].

    • ⭐️ Among the investigated robotic privacy techniques, a differential privacy model is proposed in [16] for swarms of heterogeneous robots,
    • ⭐️ also, combinatorial filters are designed in [14] satisfying privacy
    • ⭐️ and utility constraints which have been explored for the privacy- preserving target tracking [15].

三、🏈 Preliminaries

本章首先在A部分对模型进行抽象定义,然后将本文要解决的问题具体成下面B部分中表述的3条。

A. 🍏 Model Definition

The robots move in a 2 − D 2-D 2D​​​​​ workspace$ W = R2$​​​​​​. The free space of the environment is defined as E = W \ O E = W \backslash O E=W\O​​​​​, where O ⊂ R 2 O ⊂ R2 OR2​​​​​​. We initially have two robots Alice and Bob that operate in a shared environment. Both robots have a representation of the environment E E E​​​​​, can plan obstacle-free paths in the environment, and can communicate with each other. Let P A P_A PA​​​​​ be the path of Alice and P B P_B PB​​​​​ be the path of Bob.

我这里有一个疑问:为啥环境的空闲需要 E = W \ O E = W \backslash O E=W\O 这样表示,emmm,我很懵,希望有大佬能帮我回答一下。

B. 🍎 Problem Formulation

首先,需要一个不泄露隐私的方法来判断路径是否能碰撞在一起。

In our first primitive, we require a privacy-preserving mechanism to allow for Alice and Bob to determine whether their paths (PA and PB) collide without revealing the path information to the other party. We propose to do this in a decentralized fashion and without relying on the existence of any trusted third-party. These constraints motivate our first problem of interest.

🥇 Problem 0. Privacy-Preserving Path Intersection:

本文需要解决的第〇个问题:如何在不共享数据的情况下判断路径是否是存在交点

Given two robots, Alice and Bob with paths PA and PB, inform the robots whether the paths have at least one point of intersection without sharing the path information.

本文需要解决的第二个问题,我个人觉得下面的「保护隐私的持续监控 」这个问题表达的是「持续监控两个机器人🤖的网络通信吧,emmm」

We will use the above problem as a building block for solving more pragmatic tasks in a privacy-preserving fashion. We are interested in a continuous monitoring task where both robots are executing the task but need to guarantee collision avoidance. This motivates the following problem of interest.

🥈 Problem 1. Privacy-Preserving Persistent Monitoring:
Given two robots Alice and Bob that are executing a mission in E, ensure, without sharing any information about their paths or position, that they will not collide.

为了解决3D场景下、考虑时间参数的情况下的碰撞,提出了下面的问题

We are also interested in problems involving time- parametrized trajectories. For this purpose, we need to con- struct secure primitives to calculate if two 3D line segments intersect. This primitive will allow us to solve the following problem

🥉 Problem 2. Ascertaining Rendezvous Securely:

There are two robots, Alice and Bob, and each of them has a time-parametrized trajectory. They want to know if their paths intersect without sharing either respective paths or the intersection point and time.

四、⚾️ Method

本章将解决上第三章中定义的问题

本章需要请你阅读原文了,这里只给出了主要的点子~

A. 🍏 Privacy-Preserving Path Intersection

本节给出了判断路径是否存在交互点的原子协议

image-20211220191803613

🏓 为什么要使用同态加密算法呢?

为了避免路径信息泄露

So far, if Alice sends m , p A , q A m, p_A, q_A m,pA,qA to Bob, Bob can easily compute i , i ′ , j , j ′ i, i', j, j' i,i,j,j​ and do the intersection determination logic and finally send the result back to Alice, then each of them would know if there is a collision, but this reveals detailed information of Alice’s path, and Bob may send a spurious result to Alice. However, this problem can be addressed by taking advantage of the Paillier homomorphic encryption system (PES). PES is an additive homomorphic encryption system [17], meaning that the sum of two encrypted numbers is the encrypted sum of the plain numbers. Paillier also supports scalar multiplication, which means that a scalar multiplied by an encrypted number yields the encryption of the scalar multiplied by the plain number. We emphasize that, though not a fully homomorphic encryption system, it suffices for the protocol we outline. To prevent the path information from being revealed, Alice can send encrypted information using PES, and Bob may perform the com- putation using these encrypted numbers only.

🏓 只是如上使用同态加密算法,会造成Bob的信息泄露,那该怎么办呢?

添加随机数

However, in doing so, Bob might expose his information as stated in [5]. To prevent this, Bob adds some random numbers to the intermediate results (h1 to h4), then sends the outcomes to Alice. Then, Alice decrypts them and uses them as the inputs to the garbled circuit. Thus, Protocol 1 securely decides if two paths collide, avoiding leaking any path information.

B. 🍎 Privacy-Preserving Persistent Monitoring

本节我看的不是很懂,我理解的本节是用来持续监控另一个小车的通信,本节是一个通信协议的介绍

⛳️ 两个小车的算法如下:

Algorithms 1 and 2 show the implementation of the privacy-preserving persistent monitoring task for two parties Alice and Bob.

image-20211220192958378 image-20211220193028745

如果两个小车的路径不能发生碰撞,这两个小车将同时运动;否则,将轮流运动。

If no collision is detected, Alice and Bob may safely move simultaneously. Otherwise, they will have to take turns.

C. 🍐 Rendezvous Using Secure 3D Intersection

本节的内容是对协议二、三的描述,这两个协议考虑了时间参数、3D空间。协议二是对两组路径是否在同一个平面的安全原子检测,协议三对协议二的扩展,用来检测空间上、时间上某两段路径之间是否能发生碰撞💥。

⛳️ 如何简单地解释一下协议二、三的流程:

The intersection of segments in the 3D case can be resolved using the following step:

  1. Determine whether two segments are coplanar.

  2. If they are coplanar, solve the problem in a subspace.

image-20211220193857944

五、🎾 实验结果

线上的实验视频可以点击这个链接:http://users.cis.fiu.edu/%7Ejabobadi/securemp

A. 🍏 Software Implementation of Persistent Monitoring

image-20211220194838227

⛳️ 软件模型两个小车之间的运动:

  • 🚗 绿色的圈表示不会相撞

  • 🚕 红色的圈表示会发生相撞

⛳️ 两个小车的运动轨迹:a => b => c => d:

image-20211220195046740

从上图中可以看出,在a阶段结束后两个小车检测出来接下来会发生碰撞💥,所以Alice率先进行运动(阶段b),然后Bob才进行运动(阶段c)。

B. 🍎 Implementation of 3D Intersection

3维交叉口实验

image-20211220195629699

🏓 3D的和2D的有什么不同?

需要使用全同态加密,具体哪里使用了,我觉得需要去看一下代码。

  • 🚗 Since the secure intersection decision in 3D environments involves multiplication between encrypted numbers, a partial homomorphic cryptosystem like Paillier cannot implement Protocol 3. Hence, a fully homomorphic cryptosystem is needed instead. The Simple Encrypted Arithmetic Library (SEAL) [23], [24] meets the necessary requirements. This li- brary was developed by the Cryptography Research Group at Microsoft Research and has a Python wrapper PySEAL [25], [26] making it possible to use within Python.

需要生成两个秘钥对

  • 🚕 Unlike the 2D case, where only Alice generates a public/private key pair, in the 3D case, both Alice and Bob generate key pairs. Thereafter, they exchange their encrypted points. We let Bob handle the vector computations related to the co-planar determination and have Alice handle the vector computations related to intersection calculation. This split is not essential for solving the problem: either Alice or Bob could perform all the calculations but doing so allows us to distribute the computational load.

⛳️ 图4同样证明了考虑时间维度后,算法依旧能检测出来碰撞点。

⛳️ 图4讲解了另一个比较优秀的例子,用来论证为啥必须用隐私保护的路径规划算法:

Fig. 4 presents the simulation results for the algorithm that computes time-parameterized path collisions for objects moving in 3D space. This exemplifies our motivating exam- ple of shared areas where manned aircraft and small UAVs need to navigate without revealing their path information.

image-20211220195733977

⛳️ 图5讲解了为啥要使用时间变量:

  • 🚗 若不考虑时间,可能会有假碰撞点
  • 🚕 考虑时间之后,就能找到真碰撞💥点

Fig. 5 shows a secure rendezvous experiment for Alice and Bob using 3D intersection. If only two dimensions (Fig. 5 right) are considered, then two rendezvous points might be found. However, when the time is considered, by the moment Bob arrives at the meeting point, Alice may have been there in the past, or she may only arrive in the future and so no real rendezvous will occur. A rendezvous (Fig. 5 left) only occurs when there is an intersection in R 2 × T R2 × T R2×T.

C. 🍐 Hardware Experiment

⛳️ 实验环境:

A physical implementation was also conducted to test the persistent monitoring algorithms with two iRobot Create 2 platforms (see Fig. 1). The mobile robot platforms are connected to laptops running Ubuntu 12.0 SO, Intel Atom at 2.0 GHz, and 2 GB RAM. Two robots communicate with each other using the pycreate2 Python library [27]

image-20211220200058157

图一证明了,当在a阶段发现可能的碰撞💥后,由Alice先行动的过程。

Fig. 1(a) shows the initial configurations and the intended path. In this experiment, all the segments are compared to each other. Since one collision is detected, Alice (blue line) moves first (Fig. 1(b) and 1©). Fig. 1(d) shows their final position. The interface to send commands to the robots takes care of the orientation of the robot, and the distance traveled at each segment. Finally, the robots face “EAST”.

六、🏐 Conclusion And Future Work

  • 🚗 作者希望沿着这个密码学原语的路线继续探索

    We will explore this route in the future to extend the range of privacy-preserving robotic tasks that we can solve.

  • 🚕 半诚实机器人假设研究(假设机器人是好奇的)

    We are currently exploring semi-honest models [29] where robots will follow the protocol but one robot is curious to learn the other robot’s information.

  • 🚙 多个机器人的场景(机器人组中机器人的动态接入接出)

    A scheme to allow more than two parties is also a worthy aim, enabling multiple robots to decide how to move to prevent any collision. It presents several system challenges as to how many active connections they would manage and how to dynamically handle robots entering and leaving groups of interacting robots.

  • 🚌 继续在其他移动平台的实践(比如微型飞行器)

    Finally, other mobile platforms, such as micro aerial vehicles, could be used for validation in future implementations.

七、🏉 我获悉的感悟

  • 🚗 本文的贡献

    • ✨ 本文介绍了一种隐私保护的协作多机器人路径规划方法,使用了安全计算几何、混淆电路、同态加密等密码学技术,实现了在不共享🙅🏻‍♀️机器人🤖规划路径的前提下的路径碰撞检测方法。

    • ✨ 本文是第一篇在机器人领域应用多方安全计算的实践,证明了隐私计算的可行性。

    • ✨ 本文的motivation选题优秀,直击痛点。

  • 🚕 本文中可以改进的问题

    • ✨ 多机器人平台下的接入(如作者所言),可以使用区块链?来解决动态接入接出问题?
    • ✨ 半诚实性机器人假设研究(如作者所言)
    • ✨ 密码原子操作(如作者所言),可以沿着本文的思路,将隐私计算应用到其他领域?比如铰链操作。
  • 🚙 未来我可以在机器人领域做哪些隐私计算的工作?

    • ✨ 路径规划这个场景下,能不能应用联邦学习呢?

      按照本文的逻辑,这是一个多方安全计算的任务。但路径规划场景下,应该不只是有碰撞检测任务,应该也有障碍物识别任务,可以将这种任务中使用联邦学习来进行。

    • ✨ 使用安全多方计算,能不能应用到其他机器人🤖的场景下呢?

      要探究这个问题,需要找一个能够相互通信的场景,他们之间传递的数据流可能存在隐私泄露,回想一下昨天看的综述,有没有这样的设备。

    • ✨ 我应该找一下其他技术在机器人领域的应用,看一下还有没有坑可以填一下(就比如说本文这样,第一个坑)

🎱 参考文献

  • 🚗 原文献:Li L, Bayuelo A, Bobadilla L, et al. Coordinated multi-robot planning while preserving individual privacy[C]//2019 International Conference on Robotics and Automation (ICRA). IEEE, 2019: 2188-2194.

这篇关于[阅读笔记] 2019 ICRA - Coordinated multi-robot planning while preserving individual privacy的文章就介绍到这儿,希望我们推荐的文章对编程师们有所帮助!



http://www.chinasem.cn/article/370616

相关文章

JAVA智听未来一站式有声阅读平台听书系统小程序源码

智听未来,一站式有声阅读平台听书系统 🌟 开篇:遇见未来,从“智听”开始 在这个快节奏的时代,你是否渴望在忙碌的间隙,找到一片属于自己的宁静角落?是否梦想着能随时随地,沉浸在知识的海洋,或是故事的奇幻世界里?今天,就让我带你一起探索“智听未来”——这一站式有声阅读平台听书系统,它正悄悄改变着我们的阅读方式,让未来触手可及! 📚 第一站:海量资源,应有尽有 走进“智听

【学习笔记】 陈强-机器学习-Python-Ch15 人工神经网络(1)sklearn

系列文章目录 监督学习:参数方法 【学习笔记】 陈强-机器学习-Python-Ch4 线性回归 【学习笔记】 陈强-机器学习-Python-Ch5 逻辑回归 【课后题练习】 陈强-机器学习-Python-Ch5 逻辑回归(SAheart.csv) 【学习笔记】 陈强-机器学习-Python-Ch6 多项逻辑回归 【学习笔记 及 课后题练习】 陈强-机器学习-Python-Ch7 判别分析 【学

系统架构师考试学习笔记第三篇——架构设计高级知识(20)通信系统架构设计理论与实践

本章知识考点:         第20课时主要学习通信系统架构设计的理论和工作中的实践。根据新版考试大纲,本课时知识点会涉及案例分析题(25分),而在历年考试中,案例题对该部分内容的考查并不多,虽在综合知识选择题目中经常考查,但分值也不高。本课时内容侧重于对知识点的记忆和理解,按照以往的出题规律,通信系统架构设计基础知识点多来源于教材内的基础网络设备、网络架构和教材外最新时事热点技术。本课时知识

BUUCTF靶场[web][极客大挑战 2019]Http、[HCTF 2018]admin

目录   [web][极客大挑战 2019]Http 考点:Referer协议、UA协议、X-Forwarded-For协议 [web][HCTF 2018]admin 考点:弱密码字典爆破 四种方法:   [web][极客大挑战 2019]Http 考点:Referer协议、UA协议、X-Forwarded-For协议 访问环境 老规矩,我们先查看源代码

2014 Multi-University Training Contest 8小记

1002 计算几何 最大的速度才可能拥有无限的面积。 最大的速度的点 求凸包, 凸包上的点( 注意不是端点 ) 才拥有无限的面积 注意 :  凸包上如果有重点则不满足。 另外最大的速度为0也不行的。 int cmp(double x){if(fabs(x) < 1e-8) return 0 ;if(x > 0) return 1 ;return -1 ;}struct poin

2014 Multi-University Training Contest 7小记

1003   数学 , 先暴力再解方程。 在b进制下是个2 , 3 位数的 大概是10000进制以上 。这部分解方程 2-10000 直接暴力 typedef long long LL ;LL n ;int ok(int b){LL m = n ;int c ;while(m){c = m % b ;if(c == 3 || c == 4 || c == 5 ||

2014 Multi-University Training Contest 6小记

1003  贪心 对于111...10....000 这样的序列,  a 为1的个数,b为0的个数,易得当 x= a / (a + b) 时 f最小。 讲串分成若干段  1..10..0   ,  1..10..0 ,  要满足x非递减 。  对于 xi > xi+1  这样的合并 即可。 const int maxn = 100008 ;struct Node{int

论文阅读笔记: Segment Anything

文章目录 Segment Anything摘要引言任务模型数据引擎数据集负责任的人工智能 Segment Anything Model图像编码器提示编码器mask解码器解决歧义损失和训练 Segment Anything 论文地址: https://arxiv.org/abs/2304.02643 代码地址:https://github.com/facebookresear

数学建模笔记—— 非线性规划

数学建模笔记—— 非线性规划 非线性规划1. 模型原理1.1 非线性规划的标准型1.2 非线性规划求解的Matlab函数 2. 典型例题3. matlab代码求解3.1 例1 一个简单示例3.2 例2 选址问题1. 第一问 线性规划2. 第二问 非线性规划 非线性规划 非线性规划是一种求解目标函数或约束条件中有一个或几个非线性函数的最优化问题的方法。运筹学的一个重要分支。2

【C++学习笔记 20】C++中的智能指针

智能指针的功能 在上一篇笔记提到了在栈和堆上创建变量的区别,使用new关键字创建变量时,需要搭配delete关键字销毁变量。而智能指针的作用就是调用new分配内存时,不必自己去调用delete,甚至不用调用new。 智能指针实际上就是对原始指针的包装。 unique_ptr 最简单的智能指针,是一种作用域指针,意思是当指针超出该作用域时,会自动调用delete。它名为unique的原因是这个