Published September 1, 2021 | Version v1
Journal article Open

Control of teleoperation systems in the presence of cyber attacks: A survey

  • 1. King Fahd University of Petroleum & Mineral

Description

The teleoperation system is often composed of a human operator, a local master manipulator, and a remote slave manipulator that are connected by a communication network. This paper proposes a survey on feedback control design for the bilateral teleoperation systems (BTSs) in nominal situations and in the presence of cyber-attacks. The main idea of the presented methods is to achieve the stability of a delayed bilateral teleoperation system in the presence of several kinds of cyber attacks. In this paper, a comprehensive survey on control systems for BTSs under cyber-attacks is discussed. Finally, we discuss the current and future problems in this field. The teleoperation system is often composed of a human operator, a local master manipulator, and a remote slave manipulator that are connected by a communication network. This paper proposes a survey on feedback control design for the bilateral teleoperation systems (BTSs) in nominal situations and in the presence of cyber-attacks. The main idea of the presented methods is to achieve the stability of a delayed bilateral teleoperation system in the presence of several kinds of cyber attacks. In this paper, a comprehensive survey on control systems for BTSs under cyber-attacks is discussed. Finally, we discuss the current and future problems in this field.

Files

07.pdf

Files (2.0 MB)

Name Size Download all
md5:8a75af7e4a4b568d920830b22336132c
2.0 MB Preview Download