Wireless Networked Unmanned Aerial Vehicles (UAV) in Smart Factories
Abstract (300 words maximum)
Smart manufacturing based on artificial intelligence and secure wireless communication technology will contribute to the digital economy of the upcoming decades. In this abstract, we envision a scenario where the Unmanned Aerial Vehicle can be used as a supplementary factory operation, inspection, and control tool. Also, the connectivity technology we will use is the 6G/OTFS. 6G networks will be able to use higher frequencies than 5G networks and provide substantially higher capacity and much lower latency. These days, the ability to detect cyberattacks on Industrial control systems (ICS) has become a critical task. Intelligent attackers can learn defense strategies and use clandestine attacks to avoid detection. We will use digital representation (Digital twins) to design and test our system to address all these issues. The digital twin is connected via modern communication networks. We will optimize the network connectivity for efficient operation of the digital twins as well as study the effectiveness of the network-connected real-digital system in combating cyber attacks.
Academic department under which the project should be listed
Department of Robotics and Mechatronics Engineering
Primary Investigator (PI) Name
Dr. David A. Guerra-Zubiaga
Wireless Networked Unmanned Aerial Vehicles (UAV) in Smart Factories
Smart manufacturing based on artificial intelligence and secure wireless communication technology will contribute to the digital economy of the upcoming decades. In this abstract, we envision a scenario where the Unmanned Aerial Vehicle can be used as a supplementary factory operation, inspection, and control tool. Also, the connectivity technology we will use is the 6G/OTFS. 6G networks will be able to use higher frequencies than 5G networks and provide substantially higher capacity and much lower latency. These days, the ability to detect cyberattacks on Industrial control systems (ICS) has become a critical task. Intelligent attackers can learn defense strategies and use clandestine attacks to avoid detection. We will use digital representation (Digital twins) to design and test our system to address all these issues. The digital twin is connected via modern communication networks. We will optimize the network connectivity for efficient operation of the digital twins as well as study the effectiveness of the network-connected real-digital system in combating cyber attacks.