HOME  |  NEWS  |  BLOGS  |  MESSAGES  |  FEATURES  |  VIDEOS  |  WEBINARS  |  INDUSTRIES  |  FOCUS ON FUNDAMENTALS
  |  REGISTER  |  LOGIN  |  HELP
Blogs
Blog

Slideshow: Military Robots Extend Humans' Reach

NO RATINGS
1 saves
View Comments: Oldest First|Newest First|Threaded View
<<  <  Page 2/3  >  >>
Ann R. Thryft
User Rank
Blogger
Re: Military Robots Extend REach
Ann R. Thryft   1/14/2013 4:44:28 PM
NO RATINGS
Funny you should mention hacking, William--WiFi is eminently hackable and that fact often crosses my mind when writing about the wireless comms used in these mobile, semi- or fully-autonomous robots. I've read that it's a secure version of WiFi, but have not checked that out: my charter is robots, not comms. Does anyone know what the secure military protocols are?

William K.
User Rank
Platinum
Re: Military Robots Extend REach
William K.   1/14/2013 9:15:09 PM
NO RATINGS
You are right about Wi-Fi. It is only sort of hacker resistant. So a set of functions that would be fine for a robot washing windows would not be good enough for a robotic watchman. And just consider how secure a robotic "soldier" with two mini-cannons at even 2000 rounds per minute would need to be. Perhaps one of those secure military protocols might be secure enough if it were to use encrypted commands coupled with IFF logic judgement.

herbissimus
User Rank
Silver
Re: Military Robots Extend REach
herbissimus   1/15/2013 11:56:33 AM
NO RATINGS
"if they're not turned against us"

well, duh, isn't that whats always happened in the past ? a few issues past (of design news) there was this ad by a miniature motor manufacturer depicting 3 swat team members throwing a baton shaped robot around the side of a container to gather intelligence about a situation in a container yard. what situation in your house might be eligible for observation ? since much of whats depicted here is hobby technology, i wonder how other nations might be experimenting . microsoft's kinect, a cheap solution with SDK downloadable, less that $150, is a great set of eyes and ears for the military experimenter in (fill in the countries you hate or are fearful of)... well, enjoy today and tomorrow, thats the place we are and the place we're goin' to.

Ann R. Thryft
User Rank
Blogger
Re: ROBOTICS
Ann R. Thryft   1/15/2013 12:21:19 PM
NO RATINGS
Hey bobjengr, I think you meant me, not my colleague Elizabeth. In any case, glad you liked the slideshow. Robotics technologies are moving ahead very quickly right now.

Ann R. Thryft
User Rank
Blogger
Re: Military Robots Extend REach
Ann R. Thryft   1/15/2013 3:45:29 PM
NO RATINGS
William, thanks for backing me up on this. I'm always surprised at some people's lack of understanding about WiFi's non-security. And I'd really like to know a lot more about the "secure" protocols the military uses for WiFi and other wireless comms.

William K.
User Rank
Platinum
Re: Military Robots Extend REach
William K.   1/15/2013 9:50:49 PM
NO RATINGS
Ann, They are secure, and much of the information is classified. That means that they would not tell me much more than I told you. 

But they are able to pass both commands and data, and they have a method of error detection and correction.

What I hope is that it is not able to be "spoofed", like the one drone was a few months back. That was a case of where the enemy lislead the GPS system. Worse yet, that drone did not have a "destruct on capture" system installed. That was very unfortunate.

Ann R. Thryft
User Rank
Blogger
Re: Military Robots Extend REach
Ann R. Thryft   1/17/2013 12:56:56 PM
NO RATINGS
Thanks, William, I already know what you mentioned about those secure protocols. In fact, I learned a little bit about how they transmit both commands and data, and the ECC--but not as much as I'd like. And not nearly as much as I want to know about just how hackable they are. I hadn't thought of spoofing, though--that does sound scary.

William K.
User Rank
Platinum
Re: Military Robots Extend Reach, and avoid spoofing
William K.   1/17/2013 7:29:02 PM
NO RATINGS
Ann, spoofing is indeed a very big challenge, there was quite q write up about how the spoofing of the drone was accomplished, and what can be done to avoid a repeat of the attack. Fortunately the method of attack is fairly well understood, and there were a few statements about methods available to detect it in the future. Unfortunately the implementation of the detection process is not so very simple, and it seems that it may take quite a bit more than just adding a few lines of code. The articles were either in "Microwaves and RF" or in the "Microwave journal", I don't recall which. And it was several months ago. You may find those publications a bit dry, though. Or possibly not.

Ann R. Thryft
User Rank
Blogger
Re: Military Robots Extend REach
Ann R. Thryft   1/18/2013 11:41:09 AM
NO RATINGS
Thanks for the info, William. In the distant past I covered communications technology, including military comms and the intricacies of how data transmission protocols work, and even wrote articles for at least one of those journals. I do find them to be dry, but that's the nature of the beast.

William K.
User Rank
Platinum
Military robots.
William K.   2/27/2013 10:06:32 PM
NO RATINGS
One more interesting thing about this collection of robotic packages is that they would all find use in the non-military realm as well. Some would work in law enforcement and others in industry and firefighting. Plus, some of them would make really neat toys.

<<  <  Page 2/3  >  >>
Partner Zone
More Blogs
Here's a variety of views into the complex production processes at Santa's factory. Happy Holidays!
The Beam Store from Suitable Technologies is managed by remote workers from places as diverse as New York and Sydney, Australia. Employees attend to store visitors through Beam Smart Presence Systems (SPSs) from the company. The systems combine mobility and video conferencing and allow people to communicate directly from a remote location via a screen as well as move around as if they are actually in the room.
Thanks to 3D printing, some custom-made prosthetic limbs, and a Lego set, one lucky dog and a tortoise has learned new tricks.
With Radio Shack on the ropes, let's take a memory trip through the highlights of Radio Shack products.
Computer security firm Norton has partnered with clothing company Betaband on a pair of jeans that will keep your RFID-tagged credit cards and documents safe from wireless theft.
Design News Webinar Series
12/11/2014 8:00 a.m. California / 11:00 a.m. New York
12/10/2014 8:00 a.m. California / 11:00 a.m. New York
11/19/2014 11:00 a.m. California / 2:00 p.m. New York
11/6/2014 11:00 a.m. California / 2:00 p.m. New York
Quick Poll
The Continuing Education Center offers engineers an entirely new way to get the education they need to formulate next-generation solutions.
SEMESTERS: 1  |  2  |  3  |  4  |  5  |  67


Focus on Fundamentals consists of 45-minute on-line classes that cover a host of technologies. You learn without leaving the comfort of your desk. All classes are taught by subject-matter experts and all are archived. So if you can't attend live, attend at your convenience.
Learn More   |   Login   |   Archived Classes
Twitter Feed
Design News Twitter Feed
Like Us on Facebook

Sponsored Content

Technology Marketplace

Copyright © 2014 UBM Canon, A UBM company, All rights reserved. Privacy Policy | Terms of Service