This is a first step of a hybrid IDS method based on the analysis of spectral traffic and a robust controller / observer for the estimation of anomalies in UAV networks. This module is currently designed to observe the traffic between the drones and the Paparazzi GCS. It provides a statistic signature of the traffic which can later be used to determine the nature of the traffic. The module is tested in face of a DoS attack and the results are very promising!
Since the beginning of the year, ENAC (French Civil Aviation University) is equipped with a new facility dedicated to UAVs research and education.
The building includes a flying arena with a size around 10x10x10 meters, several workshops for mechanics, electronic, composite, 3D printing and storage. It also includes a teaching room for automatic control and the student’s robotics club.
The official opening was the 17th of May in the presence of the French minister of transport. Several demonstrations have been performed, all of them showing the formidable capabilities of Paparazzi: distributed formation flight, hybrid vehicles, on-board image processing, efficient adaptive control and autonomous navigation.
The Paparazzi team is proud to announce a release of an encrypted version of pprzlink. The new secure Pprzlink uses a strong and fast cipher ChaCha20 with Poly1305 authenticator. For better security and user convenience, a variation of station-to-station key-exchange protocol is implemented, to allow seamless key-exchange between the UAV and the GCS.
Secure Pprzlink is backed by a formally verified cryptographic library HACL* (yes, the same library that is a part of new Mozilla Firefox).
Why should you care? Without encryption, anyone can listen to your drone communication, and can potentially send modified or outright “fake” commands to it, steering it of course, or causing it to crash. Using encrypted radio link is similar to using encrypted connection on internet, and should be a common practice.
Why is using a formally verified crypto library important? In short, cryptography is hard to do right, and formal methods help make sure that the encryption algorithms behave as intended. The short video below gives you a better idea:
Secure Pprzlink uses a formally verified cryptography library, but is not verified itself. However, it could be verified in the future, to provide additional guarantees.
How to use it? We prepared a wiki page with instructions and examples. In short, choose a secure link as your mode of communication when building the autopilot code, and the rest is handled automatically. Also, the GCS part of secure pprzlink is written in Rust, which is a memory-safe language, which guarantees that the code written in Rust is itself memory-safe and thus eliminates a large amount of possible software bugs.
Secure Pprzlink was created with the help of Galois, Senman and is currently used by AggieAir at Utah State University.
Give it a try and give us any feedback and ask questions on paparazzi gitter channel, or via paparazzi mailing list.
So far all my results with rotorcraft were in simulation… until now! In this experiment, performed at TU-Delft (thanks Ewoud Smeur!), a team of four rotorcraft behaves as a single unit. The proved stability properties of the whole system allows for applications such as collaborative transportation of objects.
If you want to know the mathematical aspects and why this setup works, then check my thesis.
A wiki entry explaining how you can have the same setup running employing Paparazzi will be available soon!
The ENAC UAV lab is proud to release its latest autopilot board. Named Chimera, it is based on the latest STM32F7 micro-controller and offers a large connectivity.
The design have been made with the ease of use and integration for end-users, especially researchers. With the usual features like IMU and barometer, the Chimera also carries a differential pressure sensor, a SD card slot, a XBee modem slot and a 5V power supply dedicated to external companion processor.
Please check the general pinout diagram below or the Wiki page for more details.
The Chimera have been successfully used on the hybrid airframe currently developed by Enac with the help of TUDelft for the control.
The Cyfoam is a hybrid vehicle developed at ENAC Drone Lab. The aircraft is a foam, with a 3D printed fuselage, version of the composite-made Cyclone.
The vehicle is powered by the new autopilot board Chimera! which executes the control algorithms developed by Ewoud from Delft MAV Lab. We are currently aiming at a total autonomous mode, e.g., auto take off and auto landing.
We have recently developed and tested a formation control algorithm for fixed-wing aircraft in Paparazzi at ENAC. The position of an arbitrary number of vehicles can be controlled in a circular path. In fact, we are not restricting ourselves to circles but to any closed orbit, such as ellipses, thanks to the guidance vector field that guides the planes.
The algorithm is under more tests, but it should be soon available for the general public. It is quite easy to employ, the user has to declare only the IDs of the planes, the communication topology (neighbors’ relationships) and the desired inter-angles. A detailed explanation will be posted soon in the wiki.
In the following video the planes exchange positions every second. Delays, out-of-date positions (GPS delays), packet losses, etc are expected to be (and actually they are) present. It is quite interesting to remark how robust the algorithm is. According to our calculations the impact of such nasty things are not very important (ofc up to a certain point) for the convergence of the algorithm.
In total 3 planes are used for the scientific measurements and an extra one for aerial footage of the other planes. They are all using Apogee boards with an extra sensor board developed in-house at Enac: the MeteoStick.
Research and development of open-source UAV systems since 2003