272 research outputs found

    Security, privacy and safety evaluation of dynamic and static fleets of drones

    Get PDF
    Inter-connected objects, either via public or private networks are the near future of modern societies. Such inter-connected objects are referred to as Internet-of-Things (IoT) and/or Cyber-Physical Systems (CPS). One example of such a system is based on Unmanned Aerial Vehicles (UAVs). The fleet of such vehicles are prophesied to take on multiple roles involving mundane to high-sensitive, such as, prompt pizza or shopping deliveries to your homes to battlefield deployment for reconnaissance and combat missions. Drones, as we refer to UAVs in this paper, either can operate individually (solo missions) or part of a fleet (group missions), with and without constant connection with the base station. The base station acts as the command centre to manage the activities of the drones. However, an independent, localised and effective fleet control is required, potentially based on swarm intelligence, for the reasons: 1) increase in the number of drone fleets, 2) number of drones in a fleet might be multiple of tens, 3) time-criticality in making decisions by such fleets in the wild, 4) potential communication congestions/lag, and 5) in some cases working in challenging terrains that hinders or mandates-limited communication with control centre (i.e., operations spanning long period of times or military usage of such fleets in enemy territory). This self-ware, mission-focused and independent fleet of drones that potential utilises swarm intelligence for a) air-traffic and/or flight control management, b) obstacle avoidance, c) self-preservation while maintaining the mission criteria, d) collaboration with other fleets in the wild (autonomously) and e) assuring the security, privacy and safety of physical (drones itself) and virtual (data, software) assets. In this paper, we investigate the challenges faced by fleet of drones and propose a potential course of action on how to overcome them.Comment: 12 Pages, 7 Figures, Conference, The 36th IEEE/AIAA Digital Avionics Systems Conference (DASC'17

    Coordinated Control of Autonomous Underwater Vehicles

    Get PDF

    Novel Roaming and Stationary Tethered Aerial Robots for Continuous Mobile Missions in Nuclear Power Plants

    Get PDF
    AbstractIn this paper, new tethered aerial robots including roaming tethered aerial robots (RTARs) for radioactive material sampling and stationary tethered aerial robots (STARs) for environment monitoring are proposed to meet extremely-long-endurance missions of nuclear power plants. The flight of the proposed tethered aerial robots may last for a few days or even a few months as long as the tethered cable provides continuous power. A high voltage AC or DC power system was newly adopted to reduce the mass of the tethered cable. The RTAR uses a tethered cable spooled from the aerial robot and an aerial tension control system. The aerial tension control system provides the appropriate tension to the tethered cable, which is accordingly laid down on the ground as the RTAR roams. The STAR includes a tethered cable spooled from the ground and a ground tension control system, which enables the STAR to reach high altitudes. Prototypes of the RTAR and STAR were designed and successfully demonstrated in outdoor environments, where the load power, power type, operating frequency, and flight attitude of the RTAR and STAR were: 180 W, AC 100 kHz, and 20 m; and 300 W, AC or DC 100 kHz, and 80 m, respectively

    Detection solution analysis for simplistic spoofing attacks in commercial mini and micro UAVs

    Get PDF
    Enamus droone kasutab lennundusest pärit GPS navigatsiooniseadmeid, millel puuduvad turvaprotokollid ning nende riskioht pahatahtlike rünnakute sihtmärgina on kasvanud hüppeliselt lähimineviku arengute ja progressi tõttu SDR ja GNSS simulatsioonitarkvara valdkonnas. See on loonud ligipääsu tehnikale amatöörkasutajatele, millel on saatja aadressi võltsimise jõudlus. Need potensiaalsed rünnakud kuuluvad lihtsakoeliste kategooriasse, kuid selle uurimustöö tulemusena selgus, et nendes rünnakute edukuses on olulised erinevused teatud GPS vastuvõtjate ja konfiguratsioonide vahel. \n\rSee uurimustöö analüüsis erinevaid saatja aadressi võltsimise avastamise meetodeid, mis olid avatud kasutajatele ning valis välja need, mis on sobilikud mini- ja mikrodroonide tehnonõuetele ja operatsioonistsenaariumitele, eesmärgiga pakkuda välja GPS aadresside rünnakute avastamiseks rakenduste tasandil avatud allikakoodiga Ground Control Station tarkvara SDK. Avastuslahenduse eesmärk on jälgida ja kinnitada äkilisi, abnormaalseid või ebaloogilisi tulemväärtusi erinevates drooni sensiorites lisaallkatest pärit lisainfoga. \n\rLäbiviidud testid kinnitavad, et olenevalt olukorrast ja tingimustest saavad saatja aadressi võltsimise rünnakud õnnestuda. Rünnakud piiravad GPS mehanismide ligipääsu, mida saab kasutada rünnakute avastuseks. Neid rünnakuid puudutav info asetseb infovoos või GPSi signaalprotsessi tasandis, kuid seda infot ei saa haarata tasandile kus SDK tarkvara haldab kõigi teiste sensorite infot.Most of UAVs are GPS navigation based aircrafts that rely on a system with lack of security, their latent risk against malicious attacks has been raised with the recent progress and development in SDRs and GNSS simulation software, facilitating to amateurs the accessibility of equipment with spoofing capabilities. The attacks which can be done with this setup belong to the category simplistic, however, during this thesis work there are validated different cases of successful results under certain GPS receivers’ state or configuration.\n\rThis work analysis several spoofing detection methods found in the open literature, and selects the ones which can be suitable for mini and micro UAV technical specifications and operational scenario, for proposing a GPS spoofing detection solution developed in the application layer of an open source code Ground Control Station software SDK. The detection solution is intended to monitor and correlate abrupt, abnormal or unreasonable values of different sensors of the UAV with data obtained from available additional sources.\n\rThe conducted tests validate the cases and circumstances where the spoofing attacks were successful. Limitations include the lack of mechanisms to access GPS values which can be useful for detection spoofing attacks, but reside in the data bit or signal processing layer of the GPS and can not be retrieve to the layer where the SDK in computing all data of other sensors

    Design of autonomous sustainable unmanned aerial vehicle - A novel approach to its dynamic wireless power transfer

    Get PDF
    A thesis submitted in partial fulfilment of the requirements of the University of Wolverhampton for the degree of Doctor of Philosophy.Electric UAVs are presently being used widely in civilian duties such as security, surveillance, and disaster relief. The use of Unmanned Aerial Vehicle (UAV) has increased dramatically over the past years in different areas/fields such as marines, mountains, wild environments. Nowadays, there are many electric UAVs development with fast computational speed and autonomous flying has been a reality by fusing many sensors such as camera tracking sensor, obstacle avoiding sensor, radar sensor, etc. But there is one main problem still not able to overcome which is power requirement for continuous autonomous operation. When the operation needs more power, but batteries can only give for 20 to 30 mins of flight time. These types of system are not reliable for long term civilian operation because we need to recharge or replace batteries by landing the craft every time when we want to continue the operation. The large batteries also take more loads on the UAV which is also not a reliable system. To eliminate these obstacles, there should a recharging wireless power station in ground which can transmit power to these small UAVs wirelessly for long term operation. There will be camera attached in the drone to detect and hover above the Wireless Power Transfer device which got receiving and transmitting station can be use with deep learning and sensor fusion techniques for more reliable flight operations. This thesis explores the use of dynamic wireless power to transfer energy using novel rotating WPT charging technique to the UAV with improved range, endurance, and average speed by giving extra hours in the air. The hypothesis that was created has a broad application beyond UAVs. The drone autonomous charging was mostly done by detecting a rotating WPT receiver connected to main power outlet that served as a recharging platform using deep neural vision capabilities. It was the purpose of the thesis to provide an alternative to traditional self-charging systems that relies purely on static WPT method and requires little distance between the vehicle and receiver. When the UAV camera detect the WPT receiving station, it will try to align and hover using onboard sensors for best power transfer efficiency. Since this strategy relied on traditional automatic drone landing technique, but the target is rotating all the time which needs smart approaches like deep learning and sensor fusion. The simulation environment was created and tested using robot operating system on a Linux operating system using a model of the custom-made drone. Experiments on the charging of the drone confirmed that the intelligent dynamic wireless power transfer (DWPT) method worked successfully while flying on air
    • …
    corecore