Future - Group 4 - 2018/2019, Semester B, Quartile 3: Difference between revisions

From Control Systems Technology Group
Jump to navigation Jump to search
 
(13 intermediate revisions by 2 users not shown)
Line 1: Line 1:
<link rel="shortcut icon" href="https://www.tue.nl/favicon-64.ico" type="image/x-icon">
<div style="font-family: 'Georgia'; font-size: 15px; line-height: 1.5; max-width: 800px; word-wrap: break-word; color: #333; font-weight: 400; box-shadow: 0px 25px 35px -5px rgba(0,0,0,0.75); margin-left: auto; margin-right: auto; padding: 70px; background-color: white; padding-top: 30px;">
<link rel=http://cstwiki.wtb.tue.nl/index.php?title=PRE2018_3_Group4&action=edit"stylesheet" type="text/css" href="theme.css">
<div style="width:calc(100vw - 175px);background-color:#EFEFEF;padding-bottom:35px;position:absolute;top:0;left:0;">
<div style="font-family: 'q_serif', Georgia, Times, 'Times New Roman', serif; font-size: 14px; line-height: 1.5; max-width: 750px; word-wrap: break-word; color: #333; font-weight: 400; box-shadow: 0px 25px 35px -5px rgba(0,0,0,0.75); margin-left: auto; margin-right: auto; padding: 70px; background-color: white; padding-top: 25px;">


<div style="display: block; position: absolute; right: 0%;">
<div style="display: block; position: absolute; right: 6%;">
; Page navigation
; Page navigation
# [[PRE2018_3_Group4 | Root]]
# [[PRE2018_3_Group4 | Root]]
# [[Notes - Group 4 - 2018/2019, Semester B, Quartile 3|Notes]]
# [[Notes - Group 4 - 2018/2019, Semester B, Quartile 3|Notes from meeting]]
# [[Initial ideas - Group 4 - 2018/2019, Semester B, Quartile 3|Initial ideas]]
# [[Initial ideas - Group 4 - 2018/2019, Semester B, Quartile 3|Initial ideas]]
# [[Project setup - Group 4 - 2018/2019, Semester B, Quartile 3|Project setup]]
# [[Project setup - Group 4 - 2018/2019, Semester B, Quartile 3|Project setup]]
# [[General problem - Group 4 - 2018/2019, Semester B, Quartile 3|General problem]]  
# [[General problem - Group 4 - 2018/2019, Semester B, Quartile 3|General problem description]]  
# [[State of the Art - Group 4 - 2018/2019, Semester B, Quartile 3|State of the Art]]
# [[State of the Art - Group 4 - 2018/2019, Semester B, Quartile 3|State of the Art]]
# [[Specific problem - Group 4 - 2018/2019, Semester B, Quartile 3|Specific problem]]
# [[Specific problem - Group 4 - 2018/2019, Semester B, Quartile 3|Specific problem description]]
# [[Present situation - Group 4 - 2018/2019, Semester B, Quartile 3|Present situation]]
# [[Present situation - Group 4 - 2018/2019, Semester B, Quartile 3|Present situation]]
# [[Drones - Group 4 - 2018/2019, Semester B, Quartile 3|Drones]]
# [[Drones - Group 4 - 2018/2019, Semester B, Quartile 3|Drone analysis]]
# [[Solutions - Group 4 - 2018/2019, Semester B, Quartile 3|Solutions]]
# [[Solutions - Group 4 - 2018/2019, Semester B, Quartile 3|Solution analysis]]
# [[Airports under a microscope - Group 4 - 2018/2019, Semester B, Quartile 3|Airports under a microscope]]
# [[Airports under a microscope - Group 4 - 2018/2019, Semester B, Quartile 3|Airport analysis]]
# [[Recommendation report - Group 4 - 2018/2019, Semester B, Quartile 3|Recommendation report]]
# [[Types of Decision Models - Group 4 - 2018/2019, Semester B, Quartile 3 | Decision Model investigation]]
# [[Decision Model - Group 4 - 2018/2019, Semester B, Quartile 3 | Decision Model implementation]]
# [[Decision Model validation - Group 4 - 2018/2019, Semester B, Quartile 3|Decision Model validation]]
# [[Categorizing solutions - Group 4 - 2018/2019, Semester B, Quartile 3|Categorising solutions]]
# [[Web_Application_-_Group_4_-_2018/2019,_Semester_B,_Quartile_3 | Web Application]]
# [[Future - Group 4 - 2018/2019, Semester B, Quartile 3|Future]]
# [[Future - Group 4 - 2018/2019, Semester B, Quartile 3|Future]]
# [[Types of Decision Models - Group 4 - 2018/2019, Semester B, Quartile 3 | Decision Model Investigation]]
# [[Decision Model - Group 4 - 2018/2019, Semester B, Quartile 3 | Implemented Decision Model]]
# [[Conclusion - Group 4 - 2018/2019, Semester B, Quartile 3|Conclusion]]
# [[Conclusion - Group 4 - 2018/2019, Semester B, Quartile 3|Conclusion]]
# [[Discussion - Group 4 - 2018/2019, Semester B, Quartile 3|Discussion]]
# [[Discussion - Group 4 - 2018/2019, Semester B, Quartile 3|Discussion]]
Line 33: Line 32:
It is essential to consider the future when it comes to anti-drone measures around airports in this ever-changing world.  
It is essential to consider the future when it comes to anti-drone measures around airports in this ever-changing world.  
The investment in drone hardware is expected to rise even more as can be seen in Figure 1.  
The investment in drone hardware is expected to rise even more as can be seen in Figure 1.  
This does not only include the investment in military drones, but also commercial Drones.
This does include not only the investment in military drones but also commercial Drones.
Now that the technology is growing exponentially, it is hard to say what the future of drones will look like.
Now that the technology is growing exponentially, it is hard to say what the future of drones will look like.


Line 45: Line 44:
== Laws ==
== Laws ==


When we consider the laws regarding drones usage in The Netherlands, we observe that we can start considering it from an EU perspective as new laws and regulations are being made.  
When we consider the [[Drones - Group 4 - 2018/2019, Semester_B, Quartile 3#Current regulation | laws]] regarding drones usage in The Netherlands, we observe that we can start considering it from an EU perspective as new laws and regulations are being made.  
We argue that it is a good thing that these laws are made on higher levels rather than on the level of individual countries as we think there should be some standard when it comes to drones.
We argue that it is a good thing that these laws are made on higher levels rather than on the level of individual countries as we think there should be some standard when it comes to drones.
We think this as the drones pose the same kind of risk when it comes to their usage around airports. The country this happens in does matter little when we consider it from a more general perspective.
We think this as the drones pose the same kind of risk when it comes to their usage around airports. The country this happens it does matter little when we consider it from a more general perspective.


== Decision Model ==
== Decision Model ==


When it comes to the decision model we used, we think that there are still many unexplored areas. Especially as the decision model used (VAA) is still relatively new. We think it is possible to also consider other types of decision models. We could argue that using different decision models becomes more complex as then, in general, one proposed solution is the final result. It is extremely tough to fully differentiate between all possible solutions based on their attributes. Thus, a ranking is easier and, in our opinion, also more useful.
When it comes to the decision model we used, we think that there are still many unexplored areas. Primarily as the decision model used (VAA) is still relatively new. We think it is possible also to consider other types of decision models. We could argue that using different decision models becomes more complex as then, in general, one proposed solution is the final result. It is extremely tough to differentiate between all possible solutions based on their attributes adequately. Thus, a ranking is more straightforward and, in our opinion, also more useful.


== Other groups from robots everywhere ==
== Autonomous UAVs ==


We thought it would be interesting to consider the work of previous groups and of current groups when it comes to drone interception.
Many of the current solutions against unwanted UAVs rely on jamming their radio signal. The radio signal is used by a human to control the UAV from a distance. This means that hijacking the radio signal results in taking over the control of the UAV. However, what if the UAV does not use radio signals? Then many of the solutions are rendered useless, and the UAV can fly without any interference from the perspective of the airport. In the near future, we expect that the ability for UAVs to fly without human control will rise. This can be for example by preprogramming a path of the UAV. Another example comes with the rise of Artificial Intelligence: drones flying autonomously. With the use of sensors, a drone could be able to fly all by itself. In this case, again, radio signals are unnecessary, and thus all solutions that exploit the UAV's use of radio signals will be useless. In fact, there are already multiple drones on the market that utilise autonomous flying<ref>[https://www.dronethusiast.com/top-drones-autonomous-flight/ "Drone Enthousiast: Top 5 Drones With Autonomous Flight"], Retrieved on 25 March 2019</ref>. This is a shift that we expect to happen in the near future and can be abused by people with malicious intentions.
 
== Other groups from the Robots Everywhere course ==
 
We thought it would be interesting to consider the work of previous groups and current groups when it comes to drone interception.
Unfortunately, we were only able to find a single group that tackled this issue.  
Unfortunately, we were only able to find a single group that tackled this issue.  
The group found is group 9 of the current semester and year (PRE2018 3).
The group found is [[PRE2018_3_Group9 | group 9]] of the current semester and year (PRE2018 3).
At the end of the project, it will be interesting to observe the results produced by this group and see if we can learn anything from these results.
Furthermore, it will also be possible for us to provide feedback on their work such that they can improve their drone interception mechanism.


The overall goal of the project proposed by group 9 is to deliver a prototype and model on how an interceptive drone can be implemented.
The overall goal of the project proposed by group 9 is to deliver a prototype and model on how an interceptive drone can be implemented.
Line 72: Line 73:
Furthermore, they provide a dashboard app, which displays the real-time system info and provides critical controls.  
Furthermore, they provide a dashboard app, which displays the real-time system info and provides critical controls.  


The very first thing we notice based on the project proposed by group 9 is that there are no precise requirements as to what their solution should offer.  
The first thing we notice based on the project proposed by group 9 is that there are no precise requirements as to what their solution should offer.  
It is mentioned that drones should be neutralised, but it is not mentioned if this should be done in a way such that no damage can be done to third parties or anything related.  
It is mentioned that drones should be neutralised, but it is not mentioned if this should be done in a way such that no damage can be done to third parties or anything related.  
Furthermore, the dashboard app (only offered in a mobile form as of writing this (5th of March, 2019)) makes it possible to send key commands to the drone fleet. This raises some alarms from our side when we look at it from a realistic point of view. They argue that their application will also communicate with the interceptor drone (or drones if multiple are deployed) in real time, thus making the whole operation of intercepting and catching an intruder drone much faster. While we like the idea of this, we think this is exceptionally insecure as no security measures have been proposed. We are afraid that the communication between the app and the fleet of drones can be easily taken down, or in the worst case, be hijacked and used against the group. This would result in horrendous consequences, that should be avoided at all cost.
Furthermore, the dashboard app (only offered in a mobile form as of writing this (5th of March, 2019)) makes it possible to send key commands to the drone fleet. This raises some alarms from our side when we consider this drone actually being used in real life as jamming or hijacking the communication between the drone and the app does not prove to be the most difficult task. They argue that their application will also communicate with the interceptor drone (or drones if multiple are deployed) in real time, thus making the whole operation of intercepting and catching an intruder drone much faster. While the idea of amazing, we think this is exceptionally insecure as no security measures have been proposed by the group. We are afraid that the communication between the app and the fleet of drones can be easily taken down, or in the worst case, be hijacked and used for malicious purposes.
 
----
 
Back to [[PRE2018_3_Group4 | root page]].
 
=References=
<references />

Latest revision as of 12:51, 31 March 2019

Future

Introduction

Missing image
Figure 1: The estimated investment in drone hardware when considering the government, the consumer, and enterprise (U.S.A).

It is essential to consider the future when it comes to anti-drone measures around airports in this ever-changing world. The investment in drone hardware is expected to rise even more as can be seen in Figure 1. This does include not only the investment in military drones but also commercial Drones. Now that the technology is growing exponentially, it is hard to say what the future of drones will look like.


Altair Aerial creates easy-to-fly drones in the hopes of getting more people into the market with low-cost beginner-friendly UAV technology. Another company, EHANG, wants to turn drones into a taxi service. They have built a quadcopter capable of carrying passengers. It is clear that the technology when it comes to drones will keep increasing exponentially until we hit a certain point, where it is still unknown when this certain point will be hit. The only thing that is, however, clear, is that the non-existing to little countermeasures that exist around airports against drones is not sufficient for the current situation nor will it be for the future if we do not take a critical look at the underlying issue and tackle it.

Laws

When we consider the laws regarding drones usage in The Netherlands, we observe that we can start considering it from an EU perspective as new laws and regulations are being made. We argue that it is a good thing that these laws are made on higher levels rather than on the level of individual countries as we think there should be some standard when it comes to drones. We think this as the drones pose the same kind of risk when it comes to their usage around airports. The country this happens it does matter little when we consider it from a more general perspective.

Decision Model

When it comes to the decision model we used, we think that there are still many unexplored areas. Primarily as the decision model used (VAA) is still relatively new. We think it is possible also to consider other types of decision models. We could argue that using different decision models becomes more complex as then, in general, one proposed solution is the final result. It is extremely tough to differentiate between all possible solutions based on their attributes adequately. Thus, a ranking is more straightforward and, in our opinion, also more useful.

Autonomous UAVs

Many of the current solutions against unwanted UAVs rely on jamming their radio signal. The radio signal is used by a human to control the UAV from a distance. This means that hijacking the radio signal results in taking over the control of the UAV. However, what if the UAV does not use radio signals? Then many of the solutions are rendered useless, and the UAV can fly without any interference from the perspective of the airport. In the near future, we expect that the ability for UAVs to fly without human control will rise. This can be for example by preprogramming a path of the UAV. Another example comes with the rise of Artificial Intelligence: drones flying autonomously. With the use of sensors, a drone could be able to fly all by itself. In this case, again, radio signals are unnecessary, and thus all solutions that exploit the UAV's use of radio signals will be useless. In fact, there are already multiple drones on the market that utilise autonomous flying[1]. This is a shift that we expect to happen in the near future and can be abused by people with malicious intentions.

Other groups from the Robots Everywhere course

We thought it would be interesting to consider the work of previous groups and current groups when it comes to drone interception. Unfortunately, we were only able to find a single group that tackled this issue. The group found is group 9 of the current semester and year (PRE2018 3).

The overall goal of the project proposed by group 9 is to deliver a prototype and model on how an interceptive drone can be implemented. They started by researching their chosen project. This was followed by them analysing the USE aspects and determining the requirements of their system. Then, they considered multiple design strategy and chose the hardware and created a UML diagram. This was followed by working on a prototype (3D model and mobile application). Then, they evaluated the prototype.

Group 9 decided to design a drone that could take down other drones. They look at how to detect the intruder, how to target it, and how to assure that it has been captured. Furthermore, they provide a dashboard app, which displays the real-time system info and provides critical controls.

The first thing we notice based on the project proposed by group 9 is that there are no precise requirements as to what their solution should offer. It is mentioned that drones should be neutralised, but it is not mentioned if this should be done in a way such that no damage can be done to third parties or anything related. Furthermore, the dashboard app (only offered in a mobile form as of writing this (5th of March, 2019)) makes it possible to send key commands to the drone fleet. This raises some alarms from our side when we consider this drone actually being used in real life as jamming or hijacking the communication between the drone and the app does not prove to be the most difficult task. They argue that their application will also communicate with the interceptor drone (or drones if multiple are deployed) in real time, thus making the whole operation of intercepting and catching an intruder drone much faster. While the idea of amazing, we think this is exceptionally insecure as no security measures have been proposed by the group. We are afraid that the communication between the app and the fleet of drones can be easily taken down, or in the worst case, be hijacked and used for malicious purposes.


Back to root page.

References