{"id":2736,"date":"2020-01-26T16:54:02","date_gmt":"2020-01-26T15:54:02","guid":{"rendered":"https:\/\/mecatron.rma.ac.be\/?page_id=2736"},"modified":"2025-11-10T12:37:45","modified_gmt":"2025-11-10T11:37:45","slug":"counter-robotics","status":"publish","type":"page","link":"https:\/\/mecatron.rma.ac.be\/index.php\/research\/counter-robotics\/","title":{"rendered":"Counter &#8211; Robotics"},"content":{"rendered":"<p><section class=\"kc-elm kc-css-781202 kc_row\"><div class=\"kc-row-container  kc-container\"><div class=\"kc-wrap-columns\"><div class=\"kc-elm kc-css-255060 kc_col-sm-12 kc_column kc_col-sm-12\"><div class=\"kc-col-container\"><div class=\"kc-elm kc-css-879635\" style=\"height: 20px; clear: both; width:100%;\"><\/div>\n\t<div class=\"kc-elm kc-css-26942 kc-animate-speed-3s kc_shortcode kc_video_play kc_video_wrapper\" data-video=\"https:\/\/youtu.be\/JxegrhxkFFk\" data-width=\"600\" data-height=\"338.98305084746\" data-fullwidth=\"yes\" data-autoplay=\"yes\" data-loop=\"yes\" data-control=\"yes\" data-related=\"\" data-showinfo=\"yes\" data-kc-video-mute=\"yes\">\n\t\t\t<\/div>\n\n<div class=\"kc-elm kc-css-195574\" style=\"height: 20px; clear: both; width:100%;\"><\/div><div class=\"kc-elm kc-css-368642 kc_text_block\"><\/p>\n<p>Robots can be used against us as well or our own robots can be compromised. Therefore we perform research on e.g. drone detection and the prevention of cybersecurity risks for robotic systems:<\/p>\n<p>\n<\/div><div class=\"kc-elm kc-css-251678\" style=\"height: 20px; clear: both; width:100%;\"><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"kc-elm kc-css-317217 kc_row\"><div class=\"kc-row-container  kc-container\"><div class=\"kc-wrap-columns\"><div class=\"kc-elm kc-css-692927 kc_col-sm-4 kc_column kc_col-sm-4\"><div class=\"kc-col-container\"><div class=\"kc-elm kc-css-854540\" style=\"height: 55px; clear: both; width:100%;\"><\/div><div class=\"kc-elm kc-css-666555 kc_shortcode kc_single_image\">\n\n        <img decoding=\"async\" src=\"https:\/\/mecatron.rma.ac.be\/wp-content\/uploads\/2020\/01\/Counter-UAV-System.jpg\" class=\"\" alt=\"\" \/>    <\/div>\n<\/div><\/div><div class=\"kc-elm kc-css-226358 kc_col-sm-8 kc_column kc_col-sm-8\"><div class=\"kc-col-container\">\n<div class=\"kc-elm kc-css-555865 kc-title-wrap \">\n\n\t<h5 class=\"kc_title\">Standardised test methods for counter-UAS tools<\/h5>\n<\/div>\n<div class=\"kc-elm kc-css-809775 kc_text_block\"><\/p>\n<p>Multiple vendors are already providing solutions to detect, track, identify and sometimes also neutralise drones. However, benchmarking these solutions in realistic conditions is hard, as the performance depends a lot on environmental factors. This makes it difficult for end users (typically police, defence, security contractors, &#8230; ) to choose the right tool.\u00a0<\/p>\n<p>Therefore, RMA works on the development of standardised test methodologies that allow to compare counter-UAV systems under different environmental conditions. This helps in the process of building a better common understanding of the capabilities and performance of existing counter-UAV tools.<\/p>\n<p>\n<\/div><\/div><\/div><\/div><\/div><\/section><section class=\"kc-elm kc-css-659080 kc_row\"><div class=\"kc-row-container  kc-container\"><div class=\"kc-wrap-columns\"><div class=\"kc-elm kc-css-182389 kc_col-sm-12 kc_column kc_col-sm-12\"><div class=\"kc-col-container\"><div class=\"kc-elm kc-css-178303\" style=\"height: 20px; clear: both; width:100%;\"><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"kc-elm kc-css-631682 kc_row\"><div class=\"kc-row-container  kc-container\"><div class=\"kc-wrap-columns\"><div class=\"kc-elm kc-css-430802 kc_col-sm-4 kc_column kc_col-sm-4\"><div class=\"kc-col-container\"><div class=\"kc-elm kc-css-879662\" style=\"height: 55px; clear: both; width:100%;\"><\/div><div class=\"kc-elm kc-css-267188 kc_shortcode kc_single_image\">\n\n        <img decoding=\"async\" src=\"https:\/\/mecatron.rma.ac.be\/wp-content\/uploads\/2020\/01\/Counter-UAV-System.jpg\" class=\"\" alt=\"\" \/>    <\/div>\n<\/div><\/div><div class=\"kc-elm kc-css-375991 kc_col-sm-8 kc_column kc_col-sm-8\"><div class=\"kc-col-container\">\n<div class=\"kc-elm kc-css-230517 kc-title-wrap \">\n\n\t<h5 class=\"kc_title\">Drone detection using multi-modal sensor fusion<\/h5>\n<\/div>\n<div class=\"kc-elm kc-css-724004 kc_text_block\"><\/p>\n<p>Drones are fantastic tools, but they can also be used against us. Moreover, they are very hard to detect using traditional protective tools, as they are so small. Therefore, RMA performs <a href=\"https:\/\/mecatron.rma.ac.be\/index.php\/projects\/safeshore\/\">research on drone detection methods<\/a>. Traditional approaches related to drone detection often rely on RADAR, radio detection, acoustic detection, electro-optical detection or even LIDAR. The issue is that all these sensors have\u00a0 &#8211; next to some advantages &#8211; important disadvantages, so an effective system should rely on a combination of these sensing modalities. Therefore, RMA focuses research on data fusion between different sensors in order to increase the detection probability and reduce the false alarm rate.<\/p>\n<p>\n<\/div><\/div><\/div><\/div><\/div><\/section><section class=\"kc-elm kc-css-204135 kc_row\"><div class=\"kc-row-container  kc-container\"><div class=\"kc-wrap-columns\"><div class=\"kc-elm kc-css-494739 kc_col-sm-12 kc_column kc_col-sm-12\"><div class=\"kc-col-container\"><div class=\"kc-elm kc-css-162382\" style=\"height: 20px; clear: both; width:100%;\"><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"kc-elm kc-css-256388 kc_row\"><div class=\"kc-row-container  kc-container\"><div class=\"kc-wrap-columns\"><div class=\"kc-elm kc-css-198471 kc_col-sm-4 kc_column kc_col-sm-4\"><div class=\"kc-col-container\"><div class=\"kc-elm kc-css-736935\" style=\"height: 55px; clear: both; width:100%;\"><\/div><div class=\"kc-elm kc-css-28479 kc_shortcode kc_single_image\">\n\n        <img decoding=\"async\" src=\"https:\/\/mecatron.rma.ac.be\/wp-content\/uploads\/2020\/01\/Drone-Targeting.jpg\" class=\"\" alt=\"\" \/>    <\/div>\n<\/div><\/div><div class=\"kc-elm kc-css-650657 kc_col-sm-8 kc_column kc_col-sm-8\"><div class=\"kc-col-container\">\n<div class=\"kc-elm kc-css-113346 kc-title-wrap \">\n\n\t<h5 class=\"kc_title\">Drone targeting, including risk assessment, safety assessment, deconflicting & interception modality choice <\/h5>\n<\/div>\n<div class=\"kc-elm kc-css-593012 kc_text_block\"><\/p>\n<p>Drone detection (as discussed above) is only the first step in a drone-countermeasures action plan, which includes as well interception. The Robotics &#038; Autonomous Systems unit does not perform research on interception modalities, but does target research on the very important, but often overlooked, intermediate step between detection and interception: targeting. This includes performing a risk assessment, determine the resources at hand to address the threat, develop the options of response, identify the safety restrictions, deconflict with other airspace users, etc. The big difficulty is that all of this needs to happen within a few seconds, which is why RMA works on AI methods to assist human decision makers as well as possible, by providing quality data in short amounts of time.<\/p>\n<p>\n<\/div><\/div><\/div><\/div><\/div><\/section><section class=\"kc-elm kc-css-709811 kc_row\"><div class=\"kc-row-container  kc-container\"><div class=\"kc-wrap-columns\"><div class=\"kc-elm kc-css-929296 kc_col-sm-12 kc_column kc_col-sm-12\"><div class=\"kc-col-container\"><div class=\"kc-elm kc-css-246487\" style=\"height: 20px; clear: both; width:100%;\"><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"kc-elm kc-css-262872 kc_row\"><div class=\"kc-row-container  kc-container\"><div class=\"kc-wrap-columns\"><div class=\"kc-elm kc-css-831239 kc_col-sm-4 kc_column kc_col-sm-4\"><div class=\"kc-col-container\"><div class=\"kc-elm kc-css-385066\" style=\"height: 55px; clear: both; width:100%;\"><\/div><div class=\"kc-elm kc-css-881825 kc_shortcode kc_single_image\">\n\n        <img decoding=\"async\" src=\"https:\/\/mecatron.rma.ac.be\/wp-content\/uploads\/2020\/01\/cybersecurity.jpg\" class=\"\" alt=\"\" \/>    <\/div>\n<\/div><\/div><div class=\"kc-elm kc-css-649060 kc_col-sm-8 kc_column kc_col-sm-8\"><div class=\"kc-col-container\">\n<div class=\"kc-elm kc-css-649117 kc-title-wrap \">\n\n\t<h5 class=\"kc_title\">Cybersecurity threats for robotic systems<\/h5>\n<\/div>\n<div class=\"kc-elm kc-css-547959 kc_text_block\"><\/p>\n<p>Like all wireless communicating devices, robotic systems are vulnerable to attacks from outside. Moreover, more and more robotic systems are entering our everyday living world, just think about cars that are getting more and more intelligent and could be called robotic systems as well. As many of robotic systems are originally developed in a research context, security often hasn&#8217;t been taken in consideration in the design of e.g. the software architecture or the messaging system. Therefore, RMA is performing research which seek to provide solutions to tackle these cybersecurity threats.<\/p>\n<p>\n<\/div><\/div><\/div><\/div><\/div><\/section><section class=\"kc-elm kc-css-61661 kc_row\"><div class=\"kc-row-container  kc-container\"><div class=\"kc-wrap-columns\"><div class=\"kc-elm kc-css-655086 kc_col-sm-12 kc_column kc_col-sm-12\"><div class=\"kc-col-container\"><div class=\"kc-elm kc-css-750633\" style=\"height: 20px; clear: both; width:100%;\"><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"kc-elm kc-css-777973 kc_row\"><div class=\"kc-row-container  kc-container\"><div class=\"kc-wrap-columns\"><div class=\"kc-elm kc-css-636990 kc_col-sm-4 kc_column kc_col-sm-4\"><div class=\"kc-col-container\"><div class=\"kc-elm kc-css-804264\" style=\"height: 55px; clear: both; width:100%;\"><\/div><div class=\"kc-elm kc-css-477915 kc_shortcode kc_single_image\">\n\n        <img decoding=\"async\" src=\"https:\/\/mecatron.rma.ac.be\/wp-content\/uploads\/2022\/01\/Informatica_Per_Me.jpg\" class=\"\" alt=\"\" \/>    <\/div>\n<\/div><\/div><div class=\"kc-elm kc-css-838559 kc_col-sm-8 kc_column kc_col-sm-8\"><div class=\"kc-col-container\">\n<div class=\"kc-elm kc-css-771300 kc-title-wrap \">\n\n\t<h5 class=\"kc_title\">Counter - AI<\/h5>\n<\/div>\n<div class=\"kc-elm kc-css-176490 kc_text_block\"><\/p>\n<p>AI technologies are more and more used by repressive regimes to control citizens and also robotic assets used by adversaries are more and more using AI tools to detect, track and identify targets. This totally disrupts the present &#8211; day concept of camouflage.\u00a0 Indeed, what is difficult to detect for the human eye may be very easy to spot by the AI of a camera system of an enemy robot (and vice versa of course.\u00a0<\/p>\n<p>Therefore RMA-RAS conducts research on how AI detection, tracking and identification mechanisms can be fooled.<\/p>\n<p>\n<\/div><\/div><\/div><\/div><\/div><\/section><section class=\"kc-elm kc-css-805170 kc_row\"><div class=\"kc-row-container  kc-container\"><div class=\"kc-wrap-columns\"><div class=\"kc-elm kc-css-792401 kc_col-sm-12 kc_column kc_col-sm-12\"><div class=\"kc-col-container\"><div class=\"kc-elm kc-css-113107\" style=\"height: 20px; clear: both; width:100%;\"><\/div><\/div><\/div><\/div><\/div><\/section><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":2771,"parent":275,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-2736","page","type-page","status-publish","has-post-thumbnail","hentry"],"_links":{"self":[{"href":"https:\/\/mecatron.rma.ac.be\/index.php\/wp-json\/wp\/v2\/pages\/2736","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mecatron.rma.ac.be\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/mecatron.rma.ac.be\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/mecatron.rma.ac.be\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mecatron.rma.ac.be\/index.php\/wp-json\/wp\/v2\/comments?post=2736"}],"version-history":[{"count":28,"href":"https:\/\/mecatron.rma.ac.be\/index.php\/wp-json\/wp\/v2\/pages\/2736\/revisions"}],"predecessor-version":[{"id":5381,"href":"https:\/\/mecatron.rma.ac.be\/index.php\/wp-json\/wp\/v2\/pages\/2736\/revisions\/5381"}],"up":[{"embeddable":true,"href":"https:\/\/mecatron.rma.ac.be\/index.php\/wp-json\/wp\/v2\/pages\/275"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mecatron.rma.ac.be\/index.php\/wp-json\/wp\/v2\/media\/2771"}],"wp:attachment":[{"href":"https:\/\/mecatron.rma.ac.be\/index.php\/wp-json\/wp\/v2\/media?parent=2736"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}