While many military robots are the increasingly familiar small and tank-like unmanned ground vehicles (UGVs) moving on treads or wheels, other more specialized types are appearing. Some have wings and can be hand-launched from a backpack, or remotely from an otherwise inaccessible location.
Other military robots are autonomous vehicles that can drive themselves, or consist of integrated hardware kits that either convert existing vehicles to autonomous navigation or add remote control abilities. Most of these robotic systems include a wide range of audio, video, sensor, and communications abilities, and some are accompanied by sophisticated software suites.
Click on the image below to see 10 of these robotic systems that are making strides in the military.
The Nighthawk Micro Air Vehicle (MAV) is a rugged, fully automated unmanned aerial vehicle (UAV) made of carbon fiber composite. It uses GPS and autopilot technologies for navigating unfriendly territories to conduct intelligence, surveillance, and reconnaissance missions. Its range is over 10 km (6 miles) and flight time is more than 60 minutes. The Nighthawk weighs 1.6 lb (725 gm), has a wingspan of 26 inches (66 cm), and a cruise speed of 18 to 30-plus knots. The MAV is equipped with 8-channel command and control, 4-channel video, and operates on batteries. It has forward and side-looking electro-optical cameras and a side or forward-looking thermal imager. A PC-based user interface provides real-time visual feedback and point-and-click waypoint navigation. The system can also be operated in semi-manual and manual flight modes. MAVs are stored fully assembled and ready to launch in a tube measuring 6 inches (15.2 cm) in diameter and attached to an assault pack. The assault pack's outer pockets hold a rugged laptop computer, the ground control station, and an antenna assembly. The pack's total weight is about 15 lb (6 kg). (Source: Applied Research Associates)
Funny you should mention hacking, William--WiFi is eminently hackable and that fact often crosses my mind when writing about the wireless comms used in these mobile, semi- or fully-autonomous robots. I've read that it's a secure version of WiFi, but have not checked that out: my charter is robots, not comms. Does anyone know what the secure military protocols are?
You are right about Wi-Fi. It is only sort of hacker resistant. So a set of functions that would be fine for a robot washing windows would not be good enough for a robotic watchman. And just consider how secure a robotic "soldier" with two mini-cannons at even 2000 rounds per minute would need to be. Perhaps one of those secure military protocols might be secure enough if it were to use encrypted commands coupled with IFF logic judgement.
well, duh, isn't that whats always happened in the past ? a few issues past (of design news) there was this ad by a miniature motor manufacturer depicting 3 swat team members throwing a baton shaped robot around the side of a container to gather intelligence about a situation in a container yard. what situation in your house might be eligible for observation ? since much of whats depicted here is hobby technology, i wonder how other nations might be experimenting . microsoft's kinect, a cheap solution with SDK downloadable, less that $150, is a great set of eyes and ears for the military experimenter in (fill in the countries you hate or are fearful of)... well, enjoy today and tomorrow, thats the place we are and the place we're goin' to.
William, thanks for backing me up on this. I'm always surprised at some people's lack of understanding about WiFi's non-security. And I'd really like to know a lot more about the "secure" protocols the military uses for WiFi and other wireless comms.
Ann, They are secure, and much of the information is classified. That means that they would not tell me much more than I told you.
But they are able to pass both commands and data, and they have a method of error detection and correction.
What I hope is that it is not able to be "spoofed", like the one drone was a few months back. That was a case of where the enemy lislead the GPS system. Worse yet, that drone did not have a "destruct on capture" system installed. That was very unfortunate.
Thanks, William, I already know what you mentioned about those secure protocols. In fact, I learned a little bit about how they transmit both commands and data, and the ECC--but not as much as I'd like. And not nearly as much as I want to know about just how hackable they are. I hadn't thought of spoofing, though--that does sound scary.
Ann, spoofing is indeed a very big challenge, there was quite q write up about how the spoofing of the drone was accomplished, and what can be done to avoid a repeat of the attack. Fortunately the method of attack is fairly well understood, and there were a few statements about methods available to detect it in the future. Unfortunately the implementation of the detection process is not so very simple, and it seems that it may take quite a bit more than just adding a few lines of code. The articles were either in "Microwaves and RF" or in the "Microwave journal", I don't recall which. And it was several months ago. You may find those publications a bit dry, though. Or possibly not.
Thanks for the info, William. In the distant past I covered communications technology, including military comms and the intricacies of how data transmission protocols work, and even wrote articles for at least one of those journals. I do find them to be dry, but that's the nature of the beast.
One more interesting thing about this collection of robotic packages is that they would all find use in the non-military realm as well. Some would work in law enforcement and others in industry and firefighting. Plus, some of them would make really neat toys.
Last year at Hannover Fair, lots of people were talking about Industry 4.0. This is a concept that seems to have a different name in every region. Iíve been referring to it as the Industrial Internet of Things (IIoT), not to be confused with the plain old Internet of Things (IoT). Others refer to it as the Connected Industry, the smart factory concept, M2M, data extraction, and so on.
Focus on Fundamentals consists of 45-minute on-line classes that cover a host of technologies. You learn without leaving the comfort of your desk. All classes are taught by subject-matter experts and all are archived. So if you can't attend live, attend at your convenience.