NASA reports successful detect-and-avoid flight testing

  • The Ikhana, a civilian research version of the General Atomics Predator B, soars over the Mojave Desert during a flight test from NASA Armstrong Flight Research Center.
    PHOTO: NASA / CARLA THOMAS

A third set of tests at NASA’s Armstrong Flight Research Center to develop detect-and-avoid (DAA) technology for unmanned aerial systems (UAS) has delivered promising results, the agency reported Wednesday.

Working with industry partners General Atomics Aeronautical Systems Inc. and Honeywell International Inc., NASA flew the Ikhana UAS—a civilian research version of the General Atomics Predator B—with a prototype system of DAA sensors in concert with airborne and ground-based computers.

General Atomics developed one of the three primary DAA sensors flown on Ikhana which included a prototype radar system. It also contributed the Ikhana system and self-separation and collision avoidance alerting logic software.

The other two sensors included an Automatic Dependent Surveillance – Broadcast (ADS-B) from BAE Systems, and a second-generation Traffic alert and Collision Avoidance System (TCAS) from Honeywell.

Honeywell also provided software that enabled the three sensors to work together, as well as a specially instrumented aircraft to play the role of an intruder encroaching on the Ikhana’s airspace.

During the third in a series of flight test campaigns for NASA’s Unmanned Aircraft Systems Integration in the National Airspace System (UAS-NAS) project, the Ikhana made 11 flights involving more than 200 scripted encounters with approaching aircraft.

“We recorded some valuable data that will take some time to analyze fully, and we expect we’ll need to make some minor refinements to our algorithms,” said Dennis Hines, director for programs at the at the flight research center near Edwards, California. “But from what we saw during the tests, the results look promising.”

Depending on the specific scenario, the Ikhana either detected one or more approaching aircraft and sent an alert to its remote pilot to take action or the Ikhana itself took action on its own by flying a programmed maneuver to avoid a collision—an aviation first, according to NASA.

“The successful completion of this flight test campaign represents the maturity of our detect-and-avoid system,” said Frank Pace, General Atomics president of aircraft systems.

“This phase of flight tests, and our ability to meet the challenge of integrating UAS into the NAS, wouldn’t be possible without the strong partnership that exists between NASA and its aeronautical industry partners,” Hines said.

Information from the data recorded during this phase of UAS-NAS flight tests will help researchers plan the next tests expected to take place in spring 2016 and help organizations developing UAS-related operating standards.

http://www.uasmagazine.com/articles/1256/nasa-reports-successful-detect-and-avoid-flight-testing

Chinese Researchers Uncover Drone GPS Hack Threat

IMG_1287-Version-2-640x320It’s a black eye for the drone world every time the media reports some new pilot mishap – be it nosedives on the White House lawn (twice), a crash into the Japanese Prime Minister’s office, or drone interference of firefighting units. In addition to facing such PR nightmares, UAV users have something new to fear: What if your drone gets “possessed” by a diabolical, hacker demon?

As Forbes writer Thomas Brewster points out: drone operators should be afraid – very afraid – of a recently discovered vulnerability in GPS tech that would “allow a nearby hacker to spoof signals, change coordinates and commandeer an Unmanned Aerial Vehicle (UAV) and take it wherever they wanted, whether that’s the White House or Dulles airport.”

Drone hacking is of course not an unknown entity. Last month, leaked e-mails revealed that Boeing may be developing drones armed with malware designed to infect nearby computers through Wi-Fi.

Brewster reported that Chinese researchers have already shown how a hacker can use open source GNU Radio software to usurp the GPS coordinates on a DJI Phantom 3.

“Thanks to free or cheap software defined radio tools, and the old, broken GPS standard, it’s now inexpensive and relatively straightforward to carry out attacks on GPS,” Brewster stated, adding that the hack would unravel DJI’s move to issue a no-fly zone over the Washington, D.C. area since the company used “GPS to implement invisible demarcations stopping users flying their machines into no-fly zones like airports, forcing them to land when they hit certain coordinates.”

At the end of the day, drone makers will continue to face a mountainous PR problem as hackers combine with the more foolish pilots to grab sensationalistic headlines of drone debacles. In fact, unless developers can counter fears of drone crashes or hacks, the entire industry could face the chilling specter of succumbing to a public Frankenstein complex, if not outright media hysteria.

http://dronelife.com/2015/09/18/chinese-researchers-uncover-drone-gps-hack-threat/