<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://c4d.lias-lab.fr/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Rotechnology</id>
	<title>COMP4DRONES - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://c4d.lias-lab.fr/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Rotechnology"/>
	<link rel="alternate" type="text/html" href="https://c4d.lias-lab.fr/index.php/Special:Contributions/Rotechnology"/>
	<updated>2026-04-07T01:07:12Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.37.1</generator>
	<entry>
		<id>https://c4d.lias-lab.fr/index.php?title=WP5-08&amp;diff=798</id>
		<title>WP5-08</title>
		<link rel="alternate" type="text/html" href="https://c4d.lias-lab.fr/index.php?title=WP5-08&amp;diff=798"/>
		<updated>2022-11-25T16:22:21Z</updated>

		<summary type="html">&lt;p&gt;Rotechnology: /* General Description */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Lightweigth Cryptography=&lt;br /&gt;
{|class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|  ID|| WP5-08&lt;br /&gt;
|-&lt;br /&gt;
|   Contributor	|| ROT&lt;br /&gt;
|-&lt;br /&gt;
|   Levels	|| Functional&lt;br /&gt;
|-&lt;br /&gt;
|   Require	|| Communication service &lt;br /&gt;
|-&lt;br /&gt;
|   Provide	|| Communication security and intrusion detection.  &lt;br /&gt;
|-&lt;br /&gt;
|   Input	|| A plain text to encrypt or a cyper text to decrypt.	&lt;br /&gt;
|-&lt;br /&gt;
|   Output	|| An encrypted message (cyper text) or a decrypted message (plain text).&lt;br /&gt;
|-&lt;br /&gt;
|   C4D building block		|| The component is transversal with respect to the application fields. In the context of C4D, it has been adopted in the UC5 - Demo 1.&lt;br /&gt;
|-&lt;br /&gt;
|   TRL		|| 6&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==General Description==&lt;br /&gt;
The Lightweigth Cryptography is supposed to be used by other components which need to encrypt data in order to send it outside the system. The other components have to call the LC component encryption or decryption function according to which operation needs to be carried out.&lt;br /&gt;
In addition to the encryption/decryption functionalities, an authentication mechanism is carried out during the decryption function to recognize if the encrypted data has been sent by a trusted node.&lt;br /&gt;
The component is based on TAKS2 scheme, a network topology-based scheme which provides passive security at link layer along a topology-based authentication with minimal performance overhead.&lt;br /&gt;
&lt;br /&gt;
==Specification and contribution==&lt;br /&gt;
In the C4D project, it has been exploited in the UC5 - Demo 1, namely '''Precision Agricolture''', used to secure the communication between drone and rover towards the infrastructure. &lt;br /&gt;
It has been integrated through components that provide an integrated methodology to implement ready-to-use accelerators from an FPGA-based companion computer that can be used both in the drone and the rover.&lt;br /&gt;
&lt;br /&gt;
==Design and Implementation==&lt;br /&gt;
The scheme works in two different phases: encryption and decryption, the second of which implicitly also carries out Intrusion Detection functionality through the authentication operation.&lt;br /&gt;
The component is provided as a software library developed in C++ and is architecturally composed by three different modules:&lt;br /&gt;
*	LCM: takes care of the configuration of the nodes and provides encryption and decryption functionalities;&lt;br /&gt;
*	TAKS: this module performs the TAKS scheme, executing the message encryption, decryption and authentication functions; &lt;br /&gt;
*	AES: this library contains the AES-128 standard primitives.&lt;br /&gt;
&lt;br /&gt;
==Reference==&lt;br /&gt;
[1] Pugliese, M, Santucci, F. Pair-wise network topology authenticated hybrid cryptographic keys for Wireless Sensor Networks using vector algebra. In: 5th IEEE international workshop on wireless sensor networks security (WSNS2008), Atlanta, GA, 29 September–2 October 2008. New York: IEEE&lt;br /&gt;
&lt;br /&gt;
[2] Tiberti W, Caruso F, Pomante L, Pugliese M, Santic M, Santucci F. Development of an extended topology-based lightweight cryptographic scheme for IEEE 802.15.4 wireless sensor networks. International Journal of Distributed Sensor Networks. October 2020. &lt;br /&gt;
&lt;br /&gt;
[3]	L. Pomante, M. Pugliese, L. Bozzi, W. Tiberti, D. Grimani and F. Santucci, &amp;quot;SEAMLESS Project: Development of a Performing Secure Platform for IEEE 802.15.4 WSN Applications,&amp;quot; 2020 23rd Euromicro Conference on Digital System Design (DSD), 2020, pp. 588-595, doi: 10.1109/DSD51259.2020.00097.&lt;br /&gt;
&lt;br /&gt;
[4] https://github.com/RoTechnology/Lightweight-Cryptography&lt;/div&gt;</summary>
		<author><name>Rotechnology</name></author>
	</entry>
	<entry>
		<id>https://c4d.lias-lab.fr/index.php?title=WP5-08&amp;diff=797</id>
		<title>WP5-08</title>
		<link rel="alternate" type="text/html" href="https://c4d.lias-lab.fr/index.php?title=WP5-08&amp;diff=797"/>
		<updated>2022-11-25T16:19:15Z</updated>

		<summary type="html">&lt;p&gt;Rotechnology: /* Design and Implementation */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Lightweigth Cryptography=&lt;br /&gt;
{|class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|  ID|| WP5-08&lt;br /&gt;
|-&lt;br /&gt;
|   Contributor	|| ROT&lt;br /&gt;
|-&lt;br /&gt;
|   Levels	|| Functional&lt;br /&gt;
|-&lt;br /&gt;
|   Require	|| Communication service &lt;br /&gt;
|-&lt;br /&gt;
|   Provide	|| Communication security and intrusion detection.  &lt;br /&gt;
|-&lt;br /&gt;
|   Input	|| A plain text to encrypt or a cyper text to decrypt.	&lt;br /&gt;
|-&lt;br /&gt;
|   Output	|| An encrypted message (cyper text) or a decrypted message (plain text).&lt;br /&gt;
|-&lt;br /&gt;
|   C4D building block		|| The component is transversal with respect to the application fields. In the context of C4D, it has been adopted in the UC5 - Demo 1.&lt;br /&gt;
|-&lt;br /&gt;
|   TRL		|| 6&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==General Description==&lt;br /&gt;
The Lightweigth Cryprography is supposed to be used by other components which need to encrypt data in order to send it outside the system. The other components have to call the LC component encryption or decryption function according to which operation needs to be carried out.&lt;br /&gt;
In addition to the encryption/decryption functionalities, an authentication mechanism is carried out during the decryption function to recognize if the encrypted data has been sent by a trusted node.&lt;br /&gt;
The component is based on TAKS2 scheme, a network topology-based scheme which provides passive security at link layer along a topology-based authentication with minimal performance overhead.&lt;br /&gt;
&lt;br /&gt;
==Specification and contribution==&lt;br /&gt;
In the C4D project, it has been exploited in the UC5 - Demo 1, namely '''Precision Agricolture''', used to secure the communication between drone and rover towards the infrastructure. &lt;br /&gt;
It has been integrated through components that provide an integrated methodology to implement ready-to-use accelerators from an FPGA-based companion computer that can be used both in the drone and the rover.&lt;br /&gt;
&lt;br /&gt;
==Design and Implementation==&lt;br /&gt;
The scheme works in two different phases: encryption and decryption, the second of which implicitly also carries out Intrusion Detection functionality through the authentication operation.&lt;br /&gt;
The component is provided as a software library developed in C++ and is architecturally composed by three different modules:&lt;br /&gt;
*	LCM: takes care of the configuration of the nodes and provides encryption and decryption functionalities;&lt;br /&gt;
*	TAKS: this module performs the TAKS scheme, executing the message encryption, decryption and authentication functions; &lt;br /&gt;
*	AES: this library contains the AES-128 standard primitives.&lt;br /&gt;
&lt;br /&gt;
==Reference==&lt;br /&gt;
[1] Pugliese, M, Santucci, F. Pair-wise network topology authenticated hybrid cryptographic keys for Wireless Sensor Networks using vector algebra. In: 5th IEEE international workshop on wireless sensor networks security (WSNS2008), Atlanta, GA, 29 September–2 October 2008. New York: IEEE&lt;br /&gt;
&lt;br /&gt;
[2] Tiberti W, Caruso F, Pomante L, Pugliese M, Santic M, Santucci F. Development of an extended topology-based lightweight cryptographic scheme for IEEE 802.15.4 wireless sensor networks. International Journal of Distributed Sensor Networks. October 2020. &lt;br /&gt;
&lt;br /&gt;
[3]	L. Pomante, M. Pugliese, L. Bozzi, W. Tiberti, D. Grimani and F. Santucci, &amp;quot;SEAMLESS Project: Development of a Performing Secure Platform for IEEE 802.15.4 WSN Applications,&amp;quot; 2020 23rd Euromicro Conference on Digital System Design (DSD), 2020, pp. 588-595, doi: 10.1109/DSD51259.2020.00097.&lt;br /&gt;
&lt;br /&gt;
[4] https://github.com/RoTechnology/Lightweight-Cryptography&lt;/div&gt;</summary>
		<author><name>Rotechnology</name></author>
	</entry>
	<entry>
		<id>https://c4d.lias-lab.fr/index.php?title=WP5-08&amp;diff=796</id>
		<title>WP5-08</title>
		<link rel="alternate" type="text/html" href="https://c4d.lias-lab.fr/index.php?title=WP5-08&amp;diff=796"/>
		<updated>2022-11-25T16:16:33Z</updated>

		<summary type="html">&lt;p&gt;Rotechnology: /* Specification and contribution */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Lightweigth Cryptography=&lt;br /&gt;
{|class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|  ID|| WP5-08&lt;br /&gt;
|-&lt;br /&gt;
|   Contributor	|| ROT&lt;br /&gt;
|-&lt;br /&gt;
|   Levels	|| Functional&lt;br /&gt;
|-&lt;br /&gt;
|   Require	|| Communication service &lt;br /&gt;
|-&lt;br /&gt;
|   Provide	|| Communication security and intrusion detection.  &lt;br /&gt;
|-&lt;br /&gt;
|   Input	|| A plain text to encrypt or a cyper text to decrypt.	&lt;br /&gt;
|-&lt;br /&gt;
|   Output	|| An encrypted message (cyper text) or a decrypted message (plain text).&lt;br /&gt;
|-&lt;br /&gt;
|   C4D building block		|| The component is transversal with respect to the application fields. In the context of C4D, it has been adopted in the UC5 - Demo 1.&lt;br /&gt;
|-&lt;br /&gt;
|   TRL		|| 6&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==General Description==&lt;br /&gt;
The Lightweigth Cryprography is supposed to be used by other components which need to encrypt data in order to send it outside the system. The other components have to call the LC component encryption or decryption function according to which operation needs to be carried out.&lt;br /&gt;
In addition to the encryption/decryption functionalities, an authentication mechanism is carried out during the decryption function to recognize if the encrypted data has been sent by a trusted node.&lt;br /&gt;
The component is based on TAKS2 scheme, a network topology-based scheme which provides passive security at link layer along a topology-based authentication with minimal performance overhead.&lt;br /&gt;
&lt;br /&gt;
==Specification and contribution==&lt;br /&gt;
In the C4D project, it has been exploited in the UC5 - Demo 1, namely '''Precision Agricolture''', used to secure the communication between drone and rover towards the infrastructure. &lt;br /&gt;
It has been integrated through components that provide an integrated methodology to implement ready-to-use accelerators from an FPGA-based companion computer that can be used both in the drone and the rover.&lt;br /&gt;
&lt;br /&gt;
==Design and Implementation==&lt;br /&gt;
The scheme works in two different phases: encryption and decryption, the second of which implicitly carries out also Intrusion Detection functionality through the authentication operation.&lt;br /&gt;
The component is provided as a software library developed in C++ and is architecturally composed by three different modules:&lt;br /&gt;
*	LCM: it takes care of the configuration of the nodes and provides encryption and decryption functionalities;&lt;br /&gt;
*	TAKS: this module performs the TAKS scheme, executing the message encryption, decryption and authentication functions; &lt;br /&gt;
*	AES: this library contains the AES-128 standard primitives.&lt;br /&gt;
&lt;br /&gt;
==Reference==&lt;br /&gt;
[1] Pugliese, M, Santucci, F. Pair-wise network topology authenticated hybrid cryptographic keys for Wireless Sensor Networks using vector algebra. In: 5th IEEE international workshop on wireless sensor networks security (WSNS2008), Atlanta, GA, 29 September–2 October 2008. New York: IEEE&lt;br /&gt;
&lt;br /&gt;
[2] Tiberti W, Caruso F, Pomante L, Pugliese M, Santic M, Santucci F. Development of an extended topology-based lightweight cryptographic scheme for IEEE 802.15.4 wireless sensor networks. International Journal of Distributed Sensor Networks. October 2020. &lt;br /&gt;
&lt;br /&gt;
[3]	L. Pomante, M. Pugliese, L. Bozzi, W. Tiberti, D. Grimani and F. Santucci, &amp;quot;SEAMLESS Project: Development of a Performing Secure Platform for IEEE 802.15.4 WSN Applications,&amp;quot; 2020 23rd Euromicro Conference on Digital System Design (DSD), 2020, pp. 588-595, doi: 10.1109/DSD51259.2020.00097.&lt;br /&gt;
&lt;br /&gt;
[4] https://github.com/RoTechnology/Lightweight-Cryptography&lt;/div&gt;</summary>
		<author><name>Rotechnology</name></author>
	</entry>
	<entry>
		<id>https://c4d.lias-lab.fr/index.php?title=WP5-08&amp;diff=795</id>
		<title>WP5-08</title>
		<link rel="alternate" type="text/html" href="https://c4d.lias-lab.fr/index.php?title=WP5-08&amp;diff=795"/>
		<updated>2022-11-25T16:14:18Z</updated>

		<summary type="html">&lt;p&gt;Rotechnology: /* General Description */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Lightweigth Cryptography=&lt;br /&gt;
{|class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|  ID|| WP5-08&lt;br /&gt;
|-&lt;br /&gt;
|   Contributor	|| ROT&lt;br /&gt;
|-&lt;br /&gt;
|   Levels	|| Functional&lt;br /&gt;
|-&lt;br /&gt;
|   Require	|| Communication service &lt;br /&gt;
|-&lt;br /&gt;
|   Provide	|| Communication security and intrusion detection.  &lt;br /&gt;
|-&lt;br /&gt;
|   Input	|| A plain text to encrypt or a cyper text to decrypt.	&lt;br /&gt;
|-&lt;br /&gt;
|   Output	|| An encrypted message (cyper text) or a decrypted message (plain text).&lt;br /&gt;
|-&lt;br /&gt;
|   C4D building block		|| The component is transversal with respect to the application fields. In the context of C4D, it has been adopted in the UC5 - Demo 1.&lt;br /&gt;
|-&lt;br /&gt;
|   TRL		|| 6&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==General Description==&lt;br /&gt;
The Lightweigth Cryprography is supposed to be used by other components which need to encrypt data in order to send it outside the system. The other components have to call the LC component encryption or decryption function according to which operation needs to be carried out.&lt;br /&gt;
In addition to the encryption/decryption functionalities, an authentication mechanism is carried out during the decryption function to recognize if the encrypted data has been sent by a trusted node.&lt;br /&gt;
The component is based on TAKS2 scheme, a network topology-based scheme which provides passive security at link layer along a topology-based authentication with minimal performance overhead.&lt;br /&gt;
&lt;br /&gt;
==Specification and contribution==&lt;br /&gt;
In the C4D project, it has been exploited in the UC5 - Demo 1, namely '''Precision Agricolture''', used to secures the communication between drone and rover communication towards the infrastructure. &lt;br /&gt;
It has been integrated through components that provide an integrated methodology to implement ready-to-use accelerators from an FPGA-based companion computer, that can be used both in the drone and the rover.&lt;br /&gt;
&lt;br /&gt;
==Design and Implementation==&lt;br /&gt;
The scheme works in two different phases: encryption and decryption, the second of which implicitly carries out also Intrusion Detection functionality through the authentication operation.&lt;br /&gt;
The component is provided as a software library developed in C++ and is architecturally composed by three different modules:&lt;br /&gt;
*	LCM: it takes care of the configuration of the nodes and provides encryption and decryption functionalities;&lt;br /&gt;
*	TAKS: this module performs the TAKS scheme, executing the message encryption, decryption and authentication functions; &lt;br /&gt;
*	AES: this library contains the AES-128 standard primitives.&lt;br /&gt;
&lt;br /&gt;
==Reference==&lt;br /&gt;
[1] Pugliese, M, Santucci, F. Pair-wise network topology authenticated hybrid cryptographic keys for Wireless Sensor Networks using vector algebra. In: 5th IEEE international workshop on wireless sensor networks security (WSNS2008), Atlanta, GA, 29 September–2 October 2008. New York: IEEE&lt;br /&gt;
&lt;br /&gt;
[2] Tiberti W, Caruso F, Pomante L, Pugliese M, Santic M, Santucci F. Development of an extended topology-based lightweight cryptographic scheme for IEEE 802.15.4 wireless sensor networks. International Journal of Distributed Sensor Networks. October 2020. &lt;br /&gt;
&lt;br /&gt;
[3]	L. Pomante, M. Pugliese, L. Bozzi, W. Tiberti, D. Grimani and F. Santucci, &amp;quot;SEAMLESS Project: Development of a Performing Secure Platform for IEEE 802.15.4 WSN Applications,&amp;quot; 2020 23rd Euromicro Conference on Digital System Design (DSD), 2020, pp. 588-595, doi: 10.1109/DSD51259.2020.00097.&lt;br /&gt;
&lt;br /&gt;
[4] https://github.com/RoTechnology/Lightweight-Cryptography&lt;/div&gt;</summary>
		<author><name>Rotechnology</name></author>
	</entry>
	<entry>
		<id>https://c4d.lias-lab.fr/index.php?title=WP5-08&amp;diff=794</id>
		<title>WP5-08</title>
		<link rel="alternate" type="text/html" href="https://c4d.lias-lab.fr/index.php?title=WP5-08&amp;diff=794"/>
		<updated>2022-11-25T16:08:33Z</updated>

		<summary type="html">&lt;p&gt;Rotechnology: /* Lightweigth Cryprography */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Lightweigth Cryptography=&lt;br /&gt;
{|class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|  ID|| WP5-08&lt;br /&gt;
|-&lt;br /&gt;
|   Contributor	|| ROT&lt;br /&gt;
|-&lt;br /&gt;
|   Levels	|| Functional&lt;br /&gt;
|-&lt;br /&gt;
|   Require	|| Communication service &lt;br /&gt;
|-&lt;br /&gt;
|   Provide	|| Communication security and intrusion detection.  &lt;br /&gt;
|-&lt;br /&gt;
|   Input	|| A plain text to encrypt or a cyper text to decrypt.	&lt;br /&gt;
|-&lt;br /&gt;
|   Output	|| An encrypted message (cyper text) or a decrypted message (plain text).&lt;br /&gt;
|-&lt;br /&gt;
|   C4D building block		|| The component is transversal with respect to the application fields. In the context of C4D, it has been adopted in the UC5 - Demo 1.&lt;br /&gt;
|-&lt;br /&gt;
|   TRL		|| 6&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==General Description==&lt;br /&gt;
The Lightweigth Cryprography is supposed to be used by other components which need to encrypt data in order to send it outside the system. The other components have to call the LC component encryption or decryption function based on which operation need to be carried out.&lt;br /&gt;
In addition to the encryption/decryption functionalities, an authentication mechanism is carried out during the decryption function to recognize if the encrypted data has been sent by a trusted node .&lt;br /&gt;
The component is based on TAKS2 scheme, a network topology-based scheme which provides passive security at link layer along a topology-based authentication with minimal performance overhead.&lt;br /&gt;
&lt;br /&gt;
==Specification and contribution==&lt;br /&gt;
In the C4D project, it has been exploited in the UC5 - Demo 1, namely '''Precision Agricolture''', used to secures the communication between drone and rover communication towards the infrastructure. &lt;br /&gt;
It has been integrated through components that provide an integrated methodology to implement ready-to-use accelerators from an FPGA-based companion computer, that can be used both in the drone and the rover.&lt;br /&gt;
&lt;br /&gt;
==Design and Implementation==&lt;br /&gt;
The scheme works in two different phases: encryption and decryption, the second of which implicitly carries out also Intrusion Detection functionality through the authentication operation.&lt;br /&gt;
The component is provided as a software library developed in C++ and is architecturally composed by three different modules:&lt;br /&gt;
*	LCM: it takes care of the configuration of the nodes and provides encryption and decryption functionalities;&lt;br /&gt;
*	TAKS: this module performs the TAKS scheme, executing the message encryption, decryption and authentication functions; &lt;br /&gt;
*	AES: this library contains the AES-128 standard primitives.&lt;br /&gt;
&lt;br /&gt;
==Reference==&lt;br /&gt;
[1] Pugliese, M, Santucci, F. Pair-wise network topology authenticated hybrid cryptographic keys for Wireless Sensor Networks using vector algebra. In: 5th IEEE international workshop on wireless sensor networks security (WSNS2008), Atlanta, GA, 29 September–2 October 2008. New York: IEEE&lt;br /&gt;
&lt;br /&gt;
[2] Tiberti W, Caruso F, Pomante L, Pugliese M, Santic M, Santucci F. Development of an extended topology-based lightweight cryptographic scheme for IEEE 802.15.4 wireless sensor networks. International Journal of Distributed Sensor Networks. October 2020. &lt;br /&gt;
&lt;br /&gt;
[3]	L. Pomante, M. Pugliese, L. Bozzi, W. Tiberti, D. Grimani and F. Santucci, &amp;quot;SEAMLESS Project: Development of a Performing Secure Platform for IEEE 802.15.4 WSN Applications,&amp;quot; 2020 23rd Euromicro Conference on Digital System Design (DSD), 2020, pp. 588-595, doi: 10.1109/DSD51259.2020.00097.&lt;br /&gt;
&lt;br /&gt;
[4] https://github.com/RoTechnology/Lightweight-Cryptography&lt;/div&gt;</summary>
		<author><name>Rotechnology</name></author>
	</entry>
	<entry>
		<id>https://c4d.lias-lab.fr/index.php?title=WP4-07&amp;diff=793</id>
		<title>WP4-07</title>
		<link rel="alternate" type="text/html" href="https://c4d.lias-lab.fr/index.php?title=WP4-07&amp;diff=793"/>
		<updated>2022-11-25T16:06:55Z</updated>

		<summary type="html">&lt;p&gt;Rotechnology: /* General Description */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Run-Time Safety Checker=&lt;br /&gt;
{|class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|  ID|| WP4-07&lt;br /&gt;
|-&lt;br /&gt;
|   Contributor	|| ROT&lt;br /&gt;
|-&lt;br /&gt;
|   Levels	|| Functional&lt;br /&gt;
|-&lt;br /&gt;
|   Require	|| Safety rules based on risk assessment&lt;br /&gt;
|-&lt;br /&gt;
|   Provide	|| Increasing flight control to prevent harm to drones, objects or people.&lt;br /&gt;
|-&lt;br /&gt;
|   Input	|| Sensor parameters	&lt;br /&gt;
|-&lt;br /&gt;
|   Output	|| Operational status&lt;br /&gt;
|-&lt;br /&gt;
|   TRL		|| 3&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==General Description==&lt;br /&gt;
The RSC (Run-Time Safety Checker) is a software module proposed to be used for control and management of the parameters that could be critical for the flight of the drone. &lt;br /&gt;
The implementation is based on the predefined Safety Rules, which define the functioning of the component. The RSC will be activated whenever one of the safety rules fails and it will implement a resolution procedure. The module requires the management of several parameters and their combination, as the conditions that may occur are various.&lt;br /&gt;
&lt;br /&gt;
==Specification and contribution==&lt;br /&gt;
In the C4D project it was considered a scenario regarding bad atmospheric conditions. Specific temperature and humidity values can affect the navigation of the drone to the point of compromising the mission, so these parameters must be constantly monitored and kept under control.&lt;br /&gt;
Two different risky situations have been considered:&lt;br /&gt;
*	A critical battery temperature value, overcoming battery’s safe thresholds, can lead to an early battery discharge or compromise its operability;&lt;br /&gt;
*	A combination of low temperature and high humidity could cause the icing phenomenon on the drone’s control surfaces, compromising the flight attitude or, in the worst case, stalling it.&lt;br /&gt;
&lt;br /&gt;
The module monitors, at runtime, the parameter values acquired by the on-board sensors. Sensor parameter values are the input of the Runtime Monitoring, which controls the range in which these values are. &lt;br /&gt;
The ranges define three different states: safe, warning and critical, covering cases ranging from safe conditions for a normal flight, to the necessity for the drone to abort its mission and land immediately, since conditions for a safe flight are no longer guaranteed.&lt;br /&gt;
The module activates a safety procedure whenever one or more thresholds are exceeded, in other words, every time a safety rule is broken. When this occurs, the module changes its state to Warning or Critical state, depending on the values of the parameters. &lt;br /&gt;
When the measured values identify a Warning or Critical state, the RSC activates a risky situation implementing the operations defined for that specific status.&lt;br /&gt;
&lt;br /&gt;
==Design and Implementation==&lt;br /&gt;
The component is delivered as a software library developed in C++. &lt;br /&gt;
Its entry point is the RuntimeMonitor which takes as input a vector of float values containing the battery temperature, the external temperature and the humidity, as registered by the sensors. These are, subsequently, fed to the AssessmentManager which takes care of sorting calls to the RSCController and the DecisionHandler. &lt;br /&gt;
Making use of the methods provided by the SafetyChecker, the RSCController evaluates the situation according to the values it received as input; afterwards, the DecisionHandler takes as input the output of the RSCController and sends out the situation assessment.&lt;br /&gt;
&lt;br /&gt;
[[File: WP4-07_Information Flow.png|thumb|upright 2|center|WP4-07-ROT Runtime Safety Checker information flow]]&lt;br /&gt;
&lt;br /&gt;
==Reference==&lt;br /&gt;
&lt;br /&gt;
[1] Ranquist E., Steiner M., Argrow B., Exploring the range of weather impacts on UAS operations. 18th Conference on Aviation, Range and Aerospace Meteorology, Seattle, WA, 2017&lt;br /&gt;
&lt;br /&gt;
[2] Apparatus for controlling safety of drone, Cho Sung-sik, Hoonmo Kim, 2016&lt;br /&gt;
&lt;br /&gt;
[3] https://github.com/RoTechnology/Run-time-Safety-Checker&lt;/div&gt;</summary>
		<author><name>Rotechnology</name></author>
	</entry>
	<entry>
		<id>https://c4d.lias-lab.fr/index.php?title=WP4-07&amp;diff=792</id>
		<title>WP4-07</title>
		<link rel="alternate" type="text/html" href="https://c4d.lias-lab.fr/index.php?title=WP4-07&amp;diff=792"/>
		<updated>2022-11-25T16:05:55Z</updated>

		<summary type="html">&lt;p&gt;Rotechnology: /* Run-Time Safety Checker */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Run-Time Safety Checker=&lt;br /&gt;
{|class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|  ID|| WP4-07&lt;br /&gt;
|-&lt;br /&gt;
|   Contributor	|| ROT&lt;br /&gt;
|-&lt;br /&gt;
|   Levels	|| Functional&lt;br /&gt;
|-&lt;br /&gt;
|   Require	|| Safety rules based on risk assessment&lt;br /&gt;
|-&lt;br /&gt;
|   Provide	|| Increasing flight control to prevent harm to drones, objects or people.&lt;br /&gt;
|-&lt;br /&gt;
|   Input	|| Sensor parameters	&lt;br /&gt;
|-&lt;br /&gt;
|   Output	|| Operational status&lt;br /&gt;
|-&lt;br /&gt;
|   TRL		|| 3&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==General Description==&lt;br /&gt;
The RSC (Run-Time Safety Checker) is a software module proposed to be used for control and management of the parameters that could be critical for the flight of the drone. &lt;br /&gt;
The implementation is based on the predefined Safety Rules, which define the functioning of the component. The RSC will be activated whenever one of the safety rules fails and it will implement a resolution procedure. The module requires the management of several parameters and their combination as the conditions that may occur are various.&lt;br /&gt;
&lt;br /&gt;
==Specification and contribution==&lt;br /&gt;
In the C4D project it was considered a scenario regarding bad atmospheric conditions. Specific temperature and humidity values can affect the navigation of the drone to the point of compromising the mission, so these parameters must be constantly monitored and kept under control.&lt;br /&gt;
Two different risky situations have been considered:&lt;br /&gt;
*	A critical battery temperature value, overcoming battery’s safe thresholds, can lead to an early battery discharge or compromise its operability;&lt;br /&gt;
*	A combination of low temperature and high humidity could cause the icing phenomenon on the drone’s control surfaces, compromising the flight attitude or, in the worst case, stalling it.&lt;br /&gt;
&lt;br /&gt;
The module monitors, at runtime, the parameter values acquired by the on-board sensors. Sensor parameter values are the input of the Runtime Monitoring, which controls the range in which these values are. &lt;br /&gt;
The ranges define three different states: safe, warning and critical, covering cases ranging from safe conditions for a normal flight, to the necessity for the drone to abort its mission and land immediately, since conditions for a safe flight are no longer guaranteed.&lt;br /&gt;
The module activates a safety procedure whenever one or more thresholds are exceeded, in other words, every time a safety rule is broken. When this occurs, the module changes its state to Warning or Critical state, depending on the values of the parameters. &lt;br /&gt;
When the measured values identify a Warning or Critical state, the RSC activates a risky situation implementing the operations defined for that specific status.&lt;br /&gt;
&lt;br /&gt;
==Design and Implementation==&lt;br /&gt;
The component is delivered as a software library developed in C++. &lt;br /&gt;
Its entry point is the RuntimeMonitor which takes as input a vector of float values containing the battery temperature, the external temperature and the humidity, as registered by the sensors. These are, subsequently, fed to the AssessmentManager which takes care of sorting calls to the RSCController and the DecisionHandler. &lt;br /&gt;
Making use of the methods provided by the SafetyChecker, the RSCController evaluates the situation according to the values it received as input; afterwards, the DecisionHandler takes as input the output of the RSCController and sends out the situation assessment.&lt;br /&gt;
&lt;br /&gt;
[[File: WP4-07_Information Flow.png|thumb|upright 2|center|WP4-07-ROT Runtime Safety Checker information flow]]&lt;br /&gt;
&lt;br /&gt;
==Reference==&lt;br /&gt;
&lt;br /&gt;
[1] Ranquist E., Steiner M., Argrow B., Exploring the range of weather impacts on UAS operations. 18th Conference on Aviation, Range and Aerospace Meteorology, Seattle, WA, 2017&lt;br /&gt;
&lt;br /&gt;
[2] Apparatus for controlling safety of drone, Cho Sung-sik, Hoonmo Kim, 2016&lt;br /&gt;
&lt;br /&gt;
[3] https://github.com/RoTechnology/Run-time-Safety-Checker&lt;/div&gt;</summary>
		<author><name>Rotechnology</name></author>
	</entry>
	<entry>
		<id>https://c4d.lias-lab.fr/index.php?title=WP5-08&amp;diff=741</id>
		<title>WP5-08</title>
		<link rel="alternate" type="text/html" href="https://c4d.lias-lab.fr/index.php?title=WP5-08&amp;diff=741"/>
		<updated>2022-10-17T08:40:51Z</updated>

		<summary type="html">&lt;p&gt;Rotechnology: Created page with &amp;quot;=Lightweigth Cryprography= {|class=&amp;quot;wikitable&amp;quot; |  ID|| WP5-08 |- |   Contributor	|| ROT |- |   Levels	|| Functional |- |   Require	|| Communication service  |- |   Provide	|| Communication security and intrusion detection.   |- |   Input	|| A plain text to encrypt or a cyper text to decrypt.	 |- |   Output	|| An encrypted message (cyper text) or a decrypted message (plain text). |- |   C4D building block		|| The component is transversal with respect to the application fi...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Lightweigth Cryprography=&lt;br /&gt;
{|class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|  ID|| WP5-08&lt;br /&gt;
|-&lt;br /&gt;
|   Contributor	|| ROT&lt;br /&gt;
|-&lt;br /&gt;
|   Levels	|| Functional&lt;br /&gt;
|-&lt;br /&gt;
|   Require	|| Communication service &lt;br /&gt;
|-&lt;br /&gt;
|   Provide	|| Communication security and intrusion detection.  &lt;br /&gt;
|-&lt;br /&gt;
|   Input	|| A plain text to encrypt or a cyper text to decrypt.	&lt;br /&gt;
|-&lt;br /&gt;
|   Output	|| An encrypted message (cyper text) or a decrypted message (plain text).&lt;br /&gt;
|-&lt;br /&gt;
|   C4D building block		|| The component is transversal with respect to the application fields. In the context of C4D, it has been adopted in the UC5 - Demo 1.&lt;br /&gt;
|-&lt;br /&gt;
|   TRL		|| 6&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==General Description==&lt;br /&gt;
The Lightweigth Cryprography is supposed to be used by other components which need to encrypt data in order to send it outside the system. The other components have to call the LC component encryption or decryption function based on which operation need to be carried out.&lt;br /&gt;
In addition to the encryption/decryption functionalities, an authentication mechanism is carried out during the decryption function to recognize if the encrypted data has been sent by a trusted node .&lt;br /&gt;
The component is based on TAKS2 scheme, a network topology-based scheme which provides passive security at link layer along a topology-based authentication with minimal performance overhead.&lt;br /&gt;
&lt;br /&gt;
==Specification and contribution==&lt;br /&gt;
In the C4D project, it has been exploited in the UC5 - Demo 1, namely '''Precision Agricolture''', used to secures the communication between drone and rover communication towards the infrastructure. &lt;br /&gt;
It has been integrated through components that provide an integrated methodology to implement ready-to-use accelerators from an FPGA-based companion computer, that can be used both in the drone and the rover.&lt;br /&gt;
&lt;br /&gt;
==Design and Implementation==&lt;br /&gt;
The scheme works in two different phases: encryption and decryption, the second of which implicitly carries out also Intrusion Detection functionality through the authentication operation.&lt;br /&gt;
The component is provided as a software library developed in C++ and is architecturally composed by three different modules:&lt;br /&gt;
*	LCM: it takes care of the configuration of the nodes and provides encryption and decryption functionalities;&lt;br /&gt;
*	TAKS: this module performs the TAKS scheme, executing the message encryption, decryption and authentication functions; &lt;br /&gt;
*	AES: this library contains the AES-128 standard primitives.&lt;br /&gt;
&lt;br /&gt;
==Reference==&lt;br /&gt;
[1] Pugliese, M, Santucci, F. Pair-wise network topology authenticated hybrid cryptographic keys for Wireless Sensor Networks using vector algebra. In: 5th IEEE international workshop on wireless sensor networks security (WSNS2008), Atlanta, GA, 29 September–2 October 2008. New York: IEEE&lt;br /&gt;
&lt;br /&gt;
[2] Tiberti W, Caruso F, Pomante L, Pugliese M, Santic M, Santucci F. Development of an extended topology-based lightweight cryptographic scheme for IEEE 802.15.4 wireless sensor networks. International Journal of Distributed Sensor Networks. October 2020. &lt;br /&gt;
&lt;br /&gt;
[3]	L. Pomante, M. Pugliese, L. Bozzi, W. Tiberti, D. Grimani and F. Santucci, &amp;quot;SEAMLESS Project: Development of a Performing Secure Platform for IEEE 802.15.4 WSN Applications,&amp;quot; 2020 23rd Euromicro Conference on Digital System Design (DSD), 2020, pp. 588-595, doi: 10.1109/DSD51259.2020.00097.&lt;br /&gt;
&lt;br /&gt;
[4] https://github.com/RoTechnology/Lightweight-Cryptography&lt;/div&gt;</summary>
		<author><name>Rotechnology</name></author>
	</entry>
	<entry>
		<id>https://c4d.lias-lab.fr/index.php?title=Component_repository&amp;diff=739</id>
		<title>Component repository</title>
		<link rel="alternate" type="text/html" href="https://c4d.lias-lab.fr/index.php?title=Component_repository&amp;diff=739"/>
		<updated>2022-10-17T08:33:00Z</updated>

		<summary type="html">&lt;p&gt;Rotechnology: /* Components list */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This repository aims at providing common components usable in different application domains, in particular those covered by project use-cases.&lt;br /&gt;
&lt;br /&gt;
The requirements for using a components will be listed, as well as a documentation on how to use it. The component itself will be hosted by the partner who provides it.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Components list==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|ID &lt;br /&gt;
|Contributor &lt;br /&gt;
|Title&lt;br /&gt;
|-&lt;br /&gt;
|[[WP3-01]]&lt;br /&gt;
|IKERLAN&lt;br /&gt;
|Safety function - Pre-Certified SOM&lt;br /&gt;
|- &lt;br /&gt;
|[[WP3-02]] &lt;br /&gt;
|EDI &lt;br /&gt;
|Modular SoC-based embedded reference architecture&lt;br /&gt;
|- &lt;br /&gt;
|[[WP3-03]]&lt;br /&gt;
|BUT	&lt;br /&gt;
|Sensor information algorithms&lt;br /&gt;
|- &lt;br /&gt;
|[[WP3-04]]	&lt;br /&gt;
|HIB	&lt;br /&gt;
|Computer Vision Components for drones&lt;br /&gt;
|- &lt;br /&gt;
|[[WP3-10]]	&lt;br /&gt;
|IFAT	&lt;br /&gt;
|Component for trusted communication establishment&lt;br /&gt;
|- &lt;br /&gt;
|[[WP3-13]]	&lt;br /&gt;
|ENAC	&lt;br /&gt;
|Paparazzi UAV&lt;br /&gt;
|- &lt;br /&gt;
|[[WP3-14_1]]	&lt;br /&gt;
|ENSMA	&lt;br /&gt;
|Collision avoidance and geo-fencing&lt;br /&gt;
|- &lt;br /&gt;
|[[WP3-14_2]]	&lt;br /&gt;
|ENSMA	&lt;br /&gt;
|Distributed control of multi-drone system&lt;br /&gt;
|- &lt;br /&gt;
|[[WP3-15_1]]	&lt;br /&gt;
|ACORDE	&lt;br /&gt;
|UWB based indoor positioning&lt;br /&gt;
|- &lt;br /&gt;
|[[WP3-15_2]]&lt;br /&gt;
|ACORDE	&lt;br /&gt;
|Multi-antenna GNSS/INS based navigation&lt;br /&gt;
|- &lt;br /&gt;
|[[WP3-16]]	&lt;br /&gt;
|SCALIAN	&lt;br /&gt;
|EZ_Chains Fleet Architecture&lt;br /&gt;
|- &lt;br /&gt;
|[[WP3-19_1]]	&lt;br /&gt;
|IMEC	&lt;br /&gt;
|Hyperspectral payload&lt;br /&gt;
|- &lt;br /&gt;
|[[WP3-19_2]]	&lt;br /&gt;
|IMEC	&lt;br /&gt;
|Hyperspectral image processing&lt;br /&gt;
|- &lt;br /&gt;
|[[WP3-20]]	&lt;br /&gt;
|MODIS	&lt;br /&gt;
|Multi-sensor positioning&lt;br /&gt;
|- &lt;br /&gt;
|[[WP3-22]]	&lt;br /&gt;
|UNIMORE	&lt;br /&gt;
|Onboard Compute Platform Desing Methodology&lt;br /&gt;
|- &lt;br /&gt;
|[[WP3-24]]	&lt;br /&gt;
|UNIVAQ	&lt;br /&gt;
|Efficient digital implementation of controllers&lt;br /&gt;
|- &lt;br /&gt;
|[[WP3-26]]	&lt;br /&gt;
|UWB	&lt;br /&gt;
|Droneport: an autonomous drone battery management system&lt;br /&gt;
|- &lt;br /&gt;
|[[WP3-28]]	&lt;br /&gt;
|UNISS	&lt;br /&gt;
|Accelerator Design Methodology for OOCP&lt;br /&gt;
|- &lt;br /&gt;
|[[WP3-36_1]]	&lt;br /&gt;
|UDANET	&lt;br /&gt;
|Smart and predictive energy management system&lt;br /&gt;
|- &lt;br /&gt;
|[[WP3-36_2]]&lt;br /&gt;
|UDANET	&lt;br /&gt;
|AI drone system modules&lt;br /&gt;
|- &lt;br /&gt;
|[[WP3-37]]	&lt;br /&gt;
|Aitek	&lt;br /&gt;
|Video and data analytics&lt;br /&gt;
|- &lt;br /&gt;
|[[WP4-2]]	&lt;br /&gt;
|SCALIAN	&lt;br /&gt;
|EZ_Land Precision landing&lt;br /&gt;
|- &lt;br /&gt;
|[[WP4-5]]	&lt;br /&gt;
|SCALIAN	&lt;br /&gt;
|AI detection for clearance&lt;br /&gt;
|- &lt;br /&gt;
|[[WP4-07]]	&lt;br /&gt;
|ROT&lt;br /&gt;
|Run-Time Safety Checker&lt;br /&gt;
|- &lt;br /&gt;
|[[WP4-10]]	&lt;br /&gt;
|ALM&lt;br /&gt;
|Cooperative Planner&lt;br /&gt;
|- &lt;br /&gt;
|[[WP4-14]]	&lt;br /&gt;
|ALM&lt;br /&gt;
|Map Enhancement Service&lt;br /&gt;
|- &lt;br /&gt;
|[[WP4-15]]	&lt;br /&gt;
|ALM&lt;br /&gt;
|Visual Analytics&lt;br /&gt;
|- &lt;br /&gt;
|[[WP4-16]]	&lt;br /&gt;
|ACORDE&lt;br /&gt;
|Enhanced Navigation Software&lt;br /&gt;
|- &lt;br /&gt;
|[[WP4-17]]	&lt;br /&gt;
|ACORDE&lt;br /&gt;
|Anchor&amp;amp;Tag firmware of the Indoor  Positioning System &lt;br /&gt;
|- &lt;br /&gt;
|[[WP4-18_A]]	&lt;br /&gt;
|TEKNE	&lt;br /&gt;
|Drone-Rover Transponder&lt;br /&gt;
|- &lt;br /&gt;
|[[WP4-20]]	&lt;br /&gt;
|ALM&lt;br /&gt;
|Attractor-based Navigation&lt;br /&gt;
|- &lt;br /&gt;
|[[WP4-22]]	&lt;br /&gt;
|ALM&lt;br /&gt;
|Shared Reference Frame&lt;br /&gt;
|- &lt;br /&gt;
|[[WP4-32]]	&lt;br /&gt;
|SHERPA&lt;br /&gt;
|Dynamic control development for navigation and precision landing&lt;br /&gt;
|-&lt;br /&gt;
|[[WP4-33]]	&lt;br /&gt;
|UNIVAQ	&lt;br /&gt;
|Autonomy, cooperation, and awareness&lt;br /&gt;
|-&lt;br /&gt;
|[[WP4-36]]	&lt;br /&gt;
|IMCS&lt;br /&gt;
|Autonomous Decision Making in Critical Situations&lt;br /&gt;
|-&lt;br /&gt;
|[[WP4-37]]	&lt;br /&gt;
|IMCS&lt;br /&gt;
|Algorithms for Runtime Safety Monitoring&lt;br /&gt;
|-  &lt;br /&gt;
|[[WP4-39]]	&lt;br /&gt;
|HIB&lt;br /&gt;
|Simulated data aggregator supporting intelligent decision in computer vision components&lt;br /&gt;
|- &lt;br /&gt;
|[[WP4-42]]	&lt;br /&gt;
|SCALIAN	&lt;br /&gt;
|AI Stabilization&lt;br /&gt;
|- &lt;br /&gt;
|[[WP5-02]]	&lt;br /&gt;
|IKERLAN&lt;br /&gt;
|Security Management Toolchain&lt;br /&gt;
|- &lt;br /&gt;
|[[WP5-03]]	&lt;br /&gt;
|SCALIAN	&lt;br /&gt;
|EZ_Com Safe fleet communication&lt;br /&gt;
|- &lt;br /&gt;
|[[WP5-08]]	&lt;br /&gt;
|ROT&lt;br /&gt;
|Lightweight Cryptography&lt;br /&gt;
|- &lt;br /&gt;
|[[WP5-09]]	&lt;br /&gt;
|ABI	&lt;br /&gt;
|Communication scheme for unified system management&lt;br /&gt;
|- &lt;br /&gt;
|[[WP5-05_A]]	&lt;br /&gt;
|TEKNE	&lt;br /&gt;
|LP-WAN for UAV identification and monitoring&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|[[WP5-11_ACO]]	&lt;br /&gt;
|ACORDE&lt;br /&gt;
|Navigation system with anti-jamming and anti-spoofing features&lt;br /&gt;
|- &lt;br /&gt;
|[[WP5-16-AIT]]	&lt;br /&gt;
|AIT&lt;br /&gt;
|Cryptographic algorithms adapted for drones&lt;br /&gt;
|- &lt;br /&gt;
|[[WP5-19_ACO]]	&lt;br /&gt;
|ACORDE&lt;br /&gt;
|Robust communication for an improved Indoor Positioning System&lt;br /&gt;
|- &lt;br /&gt;
|[[WP6-P4R]]	&lt;br /&gt;
|CEA	&lt;br /&gt;
|Model driven engineering&lt;br /&gt;
|- &lt;br /&gt;
|[[WP6-20]]&lt;br /&gt;
|ACORDE&lt;br /&gt;
|ESL embedded SW Design Environment (ESDE)&lt;br /&gt;
|- &lt;br /&gt;
|[[WP6-21]]	&lt;br /&gt;
|ACORDE&lt;br /&gt;
|Indoor Positioning System Modelling&amp;amp;Analysis Framework (IPS-MAF)&lt;br /&gt;
|- &lt;br /&gt;
|[[WP6-17]]	&lt;br /&gt;
|UNIVAQ&lt;br /&gt;
|HW/SW CO-DEsign of HEterogeneous Parallel dedicated SYstems (HEPSYCODE)&lt;br /&gt;
|- &lt;br /&gt;
|[[WP6-34]]	&lt;br /&gt;
|UNIVAQ&lt;br /&gt;
|HEPSYCODE SystemC SIMulator Version 2.0 (HEPSIM2)&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Rotechnology</name></author>
	</entry>
	<entry>
		<id>https://c4d.lias-lab.fr/index.php?title=Component_repository&amp;diff=738</id>
		<title>Component repository</title>
		<link rel="alternate" type="text/html" href="https://c4d.lias-lab.fr/index.php?title=Component_repository&amp;diff=738"/>
		<updated>2022-10-17T08:32:03Z</updated>

		<summary type="html">&lt;p&gt;Rotechnology: /* Components list */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This repository aims at providing common components usable in different application domains, in particular those covered by project use-cases.&lt;br /&gt;
&lt;br /&gt;
The requirements for using a components will be listed, as well as a documentation on how to use it. The component itself will be hosted by the partner who provides it.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Components list==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|ID &lt;br /&gt;
|Contributor &lt;br /&gt;
|Title&lt;br /&gt;
|-&lt;br /&gt;
|[[WP3-01]]&lt;br /&gt;
|IKERLAN&lt;br /&gt;
|Safety function - Pre-Certified SOM&lt;br /&gt;
|- &lt;br /&gt;
|[[WP3-02]] &lt;br /&gt;
|EDI &lt;br /&gt;
|Modular SoC-based embedded reference architecture&lt;br /&gt;
|- &lt;br /&gt;
|[[WP3-03]]&lt;br /&gt;
|BUT	&lt;br /&gt;
|Sensor information algorithms&lt;br /&gt;
|- &lt;br /&gt;
|[[WP3-04]]	&lt;br /&gt;
|HIB	&lt;br /&gt;
|Computer Vision Components for drones&lt;br /&gt;
|- &lt;br /&gt;
|[[WP3-10]]	&lt;br /&gt;
|IFAT	&lt;br /&gt;
|Component for trusted communication establishment&lt;br /&gt;
|- &lt;br /&gt;
|[[WP3-13]]	&lt;br /&gt;
|ENAC	&lt;br /&gt;
|Paparazzi UAV&lt;br /&gt;
|- &lt;br /&gt;
|[[WP3-14_1]]	&lt;br /&gt;
|ENSMA	&lt;br /&gt;
|Collision avoidance and geo-fencing&lt;br /&gt;
|- &lt;br /&gt;
|[[WP3-14_2]]	&lt;br /&gt;
|ENSMA	&lt;br /&gt;
|Distributed control of multi-drone system&lt;br /&gt;
|- &lt;br /&gt;
|[[WP3-15_1]]	&lt;br /&gt;
|ACORDE	&lt;br /&gt;
|UWB based indoor positioning&lt;br /&gt;
|- &lt;br /&gt;
|[[WP3-15_2]]&lt;br /&gt;
|ACORDE	&lt;br /&gt;
|Multi-antenna GNSS/INS based navigation&lt;br /&gt;
|- &lt;br /&gt;
|[[WP3-16]]	&lt;br /&gt;
|SCALIAN	&lt;br /&gt;
|EZ_Chains Fleet Architecture&lt;br /&gt;
|- &lt;br /&gt;
|[[WP3-19_1]]	&lt;br /&gt;
|IMEC	&lt;br /&gt;
|Hyperspectral payload&lt;br /&gt;
|- &lt;br /&gt;
|[[WP3-19_2]]	&lt;br /&gt;
|IMEC	&lt;br /&gt;
|Hyperspectral image processing&lt;br /&gt;
|- &lt;br /&gt;
|[[WP3-20]]	&lt;br /&gt;
|MODIS	&lt;br /&gt;
|Multi-sensor positioning&lt;br /&gt;
|- &lt;br /&gt;
|[[WP3-22]]	&lt;br /&gt;
|UNIMORE	&lt;br /&gt;
|Onboard Compute Platform Desing Methodology&lt;br /&gt;
|- &lt;br /&gt;
|[[WP3-24]]	&lt;br /&gt;
|UNIVAQ	&lt;br /&gt;
|Efficient digital implementation of controllers&lt;br /&gt;
|- &lt;br /&gt;
|[[WP3-26]]	&lt;br /&gt;
|UWB	&lt;br /&gt;
|Droneport: an autonomous drone battery management system&lt;br /&gt;
|- &lt;br /&gt;
|[[WP3-28]]	&lt;br /&gt;
|UNISS	&lt;br /&gt;
|Accelerator Design Methodology for OOCP&lt;br /&gt;
|- &lt;br /&gt;
|[[WP3-36_1]]	&lt;br /&gt;
|UDANET	&lt;br /&gt;
|Smart and predictive energy management system&lt;br /&gt;
|- &lt;br /&gt;
|[[WP3-36_2]]&lt;br /&gt;
|UDANET	&lt;br /&gt;
|AI drone system modules&lt;br /&gt;
|- &lt;br /&gt;
|[[WP3-37]]	&lt;br /&gt;
|Aitek	&lt;br /&gt;
|Video and data analytics&lt;br /&gt;
|- &lt;br /&gt;
|[[WP4-2]]	&lt;br /&gt;
|SCALIAN	&lt;br /&gt;
|EZ_Land Precision landing&lt;br /&gt;
|- &lt;br /&gt;
|[[WP4-5]]	&lt;br /&gt;
|SCALIAN	&lt;br /&gt;
|AI detection for clearance&lt;br /&gt;
|- &lt;br /&gt;
|[[WP4-07]]	&lt;br /&gt;
|ROT&lt;br /&gt;
|Run-Time Safety Checker&lt;br /&gt;
|- &lt;br /&gt;
|[[WP4-10]]	&lt;br /&gt;
|ALM&lt;br /&gt;
|Cooperative Planner&lt;br /&gt;
|- &lt;br /&gt;
|[[WP4-14]]	&lt;br /&gt;
|ALM&lt;br /&gt;
|Map Enhancement Service&lt;br /&gt;
|- &lt;br /&gt;
|[[WP4-15]]	&lt;br /&gt;
|ALM&lt;br /&gt;
|Visual Analytics&lt;br /&gt;
|- &lt;br /&gt;
|[[WP4-16]]	&lt;br /&gt;
|ACORDE&lt;br /&gt;
|Enhanced Navigation Software&lt;br /&gt;
|- &lt;br /&gt;
|[[WP4-17]]	&lt;br /&gt;
|ACORDE&lt;br /&gt;
|Anchor&amp;amp;Tag firmware of the Indoor  Positioning System &lt;br /&gt;
|- &lt;br /&gt;
|[[WP4-18_A]]	&lt;br /&gt;
|TEKNE	&lt;br /&gt;
|Drone-Rover Transponder&lt;br /&gt;
|- &lt;br /&gt;
|[[WP4-20]]	&lt;br /&gt;
|ALM&lt;br /&gt;
|Attractor-based Navigation&lt;br /&gt;
|- &lt;br /&gt;
|[[WP4-22]]	&lt;br /&gt;
|ALM&lt;br /&gt;
|Shared Reference Frame&lt;br /&gt;
|- &lt;br /&gt;
|[[WP4-32]]	&lt;br /&gt;
|SHERPA&lt;br /&gt;
|Dynamic control development for navigation and precision landing&lt;br /&gt;
|-&lt;br /&gt;
|[[WP4-33]]	&lt;br /&gt;
|UNIVAQ	&lt;br /&gt;
|Autonomy, cooperation, and awareness&lt;br /&gt;
|-&lt;br /&gt;
|[[WP4-36]]	&lt;br /&gt;
|IMCS&lt;br /&gt;
|Autonomous Decision Making in Critical Situations&lt;br /&gt;
|-&lt;br /&gt;
|[[WP4-37]]	&lt;br /&gt;
|IMCS&lt;br /&gt;
|Algorithms for Runtime Safety Monitoring&lt;br /&gt;
|-  &lt;br /&gt;
|[[WP4-39]]	&lt;br /&gt;
|HIB&lt;br /&gt;
|Simulated data aggregator supporting intelligent decision in computer vision components&lt;br /&gt;
|- &lt;br /&gt;
|[[WP4-42]]	&lt;br /&gt;
|SCALIAN	&lt;br /&gt;
|AI Stabilization&lt;br /&gt;
|- &lt;br /&gt;
|[[WP5-02]]	&lt;br /&gt;
|IKERLAN&lt;br /&gt;
|Security Management Toolchain&lt;br /&gt;
|- &lt;br /&gt;
|[[WP5-03]]	&lt;br /&gt;
|SCALIAN	&lt;br /&gt;
|EZ_Com Safe fleet communication&lt;br /&gt;
|- &lt;br /&gt;
|[[WP5-09]]	&lt;br /&gt;
|ABI	&lt;br /&gt;
|Communication scheme for unified system management&lt;br /&gt;
|- &lt;br /&gt;
|[[WP5-05_A]]	&lt;br /&gt;
|TEKNE	&lt;br /&gt;
|LP-WAN for UAV identification and monitoring&lt;br /&gt;
|- &lt;br /&gt;
|[[WP5-08]]	&lt;br /&gt;
|ROT&lt;br /&gt;
|Lightweight Cryptography&lt;br /&gt;
|- &lt;br /&gt;
|[[WP5-11_ACO]]	&lt;br /&gt;
|ACORDE&lt;br /&gt;
|Navigation system with anti-jamming and anti-spoofing features&lt;br /&gt;
|- &lt;br /&gt;
|[[WP5-16-AIT]]	&lt;br /&gt;
|AIT&lt;br /&gt;
|Cryptographic algorithms adapted for drones&lt;br /&gt;
|- &lt;br /&gt;
|[[WP5-19_ACO]]	&lt;br /&gt;
|ACORDE&lt;br /&gt;
|Robust communication for an improved Indoor Positioning System&lt;br /&gt;
|- &lt;br /&gt;
|[[WP6-P4R]]	&lt;br /&gt;
|CEA	&lt;br /&gt;
|Model driven engineering&lt;br /&gt;
|- &lt;br /&gt;
|[[WP6-20]]&lt;br /&gt;
|ACORDE&lt;br /&gt;
|ESL embedded SW Design Environment (ESDE)&lt;br /&gt;
|- &lt;br /&gt;
|[[WP6-21]]	&lt;br /&gt;
|ACORDE&lt;br /&gt;
|Indoor Positioning System Modelling&amp;amp;Analysis Framework (IPS-MAF)&lt;br /&gt;
|- &lt;br /&gt;
|[[WP6-17]]	&lt;br /&gt;
|UNIVAQ&lt;br /&gt;
|HW/SW CO-DEsign of HEterogeneous Parallel dedicated SYstems (HEPSYCODE)&lt;br /&gt;
|- &lt;br /&gt;
|[[WP6-34]]	&lt;br /&gt;
|UNIVAQ&lt;br /&gt;
|HEPSYCODE SystemC SIMulator Version 2.0 (HEPSIM2)&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Rotechnology</name></author>
	</entry>
	<entry>
		<id>https://c4d.lias-lab.fr/index.php?title=WP4-07&amp;diff=737</id>
		<title>WP4-07</title>
		<link rel="alternate" type="text/html" href="https://c4d.lias-lab.fr/index.php?title=WP4-07&amp;diff=737"/>
		<updated>2022-10-17T08:29:10Z</updated>

		<summary type="html">&lt;p&gt;Rotechnology: Created page with &amp;quot;=Run-Time Safety Checker= {|class=&amp;quot;wikitable&amp;quot; |  ID|| WP4-07 |- |   Contributor	|| ROT |- |   Levels	|| Functional |- |   Require	|| Set of safety rules based on risk assessment |- |   Provide	|| Increasing flight control thus preventing harm to drones, object or people. |- |   Input	|| Sensor parameters	 |- |   Output	|| Operational status |- |   TRL		|| 3 |}  ==General Description== The RSC (Run-Time Safety Checker) is a software module proposed to be used for control...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Run-Time Safety Checker=&lt;br /&gt;
{|class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|  ID|| WP4-07&lt;br /&gt;
|-&lt;br /&gt;
|   Contributor	|| ROT&lt;br /&gt;
|-&lt;br /&gt;
|   Levels	|| Functional&lt;br /&gt;
|-&lt;br /&gt;
|   Require	|| Set of safety rules based on risk assessment&lt;br /&gt;
|-&lt;br /&gt;
|   Provide	|| Increasing flight control thus preventing harm to drones, object or people.&lt;br /&gt;
|-&lt;br /&gt;
|   Input	|| Sensor parameters	&lt;br /&gt;
|-&lt;br /&gt;
|   Output	|| Operational status&lt;br /&gt;
|-&lt;br /&gt;
|   TRL		|| 3&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==General Description==&lt;br /&gt;
The RSC (Run-Time Safety Checker) is a software module proposed to be used for control and management of the parameters that could be critical for the flight of the drone. &lt;br /&gt;
The implementation is based on the predefined Safety Rules, which define the functioning of the component, and it will be activated whenever one of the safety rules fails and thus it will implement a resolution procedure.  The module requires the management of several parameters and their combination as the conditions that may occur are various.&lt;br /&gt;
&lt;br /&gt;
==Specification and contribution==&lt;br /&gt;
In the C4D project it was considered a scenario regarding bad atmospheric conditions. Particular temperature and humidity values can affect the navigation of the drone to the point of compromising the mission, so these parameters must be constantly monitored and kept under control.&lt;br /&gt;
Two different risky situations have been considered:&lt;br /&gt;
*	A critical battery temperature value, overcoming battery’s safe thresholds, can lead to an early battery discharge or compromise its operativity;&lt;br /&gt;
*	A combination of low temperature and high humidity could cause the icing phenomenon on drone’s control surfaces, compromising the flight attitude or, in the worst case, stalling it.&lt;br /&gt;
&lt;br /&gt;
The module monitors, at runtime, the parameters value acquired by the on-board sensors. Sensor parameter values are the input of the Runtime Monitoring, which controls the range at which these values belong to. &lt;br /&gt;
The ranges define three different state: safe, warning and critical, where in the first one drone flight normally and in the last one drone should abort its mission and land immediately since there are no longer safety conditions to fly.&lt;br /&gt;
The module activates a safety procedure whenever one or more thresholds are exceeded, in other words, every time a safety rule is broken. When this occurs, the module changes its state to Warning or Critical state, depending on the values of the parameters. &lt;br /&gt;
When the measured values identify a Warning or Critical state, the RSC activates a risky situation implementing the operations defined for specific status.&lt;br /&gt;
&lt;br /&gt;
==Design and Implementation==&lt;br /&gt;
The component is delivered as a software library developed in C++. &lt;br /&gt;
Its entry point is the RuntimeMonitor which takes as input a vector of float values containing the battery temperature, the external temperature and the humidity, as registered by the sensors. These are, subsequently, fed to the AssessmentManager which takes care of sorting calls to the RSCController and the DecisionHandler. &lt;br /&gt;
Making use of the methods provided by the SafetyChecker, the RSCController evaluates the situation according to the values it received as input; afterwards, the DecisionHandler takes as input the output of the RSCController and sends out the situation assessment.&lt;br /&gt;
&lt;br /&gt;
[[File: WP4-07_Information Flow.png|thumb|upright 2|center|WP4-07-ROT Runtime Safety Checker information flow]]&lt;br /&gt;
&lt;br /&gt;
==Reference==&lt;br /&gt;
&lt;br /&gt;
[1] Ranquist E., Steiner M., Argrow B., Exploring the range of weather impacts on UAS operations. 18th Conference on Aviation, Range and Aerospace Meteorology, Seattle, WA, 2017&lt;br /&gt;
&lt;br /&gt;
[2] Apparatus for controlling safety of drone, Cho Sung-sik, Hoonmo Kim, 2016&lt;br /&gt;
&lt;br /&gt;
[3] https://github.com/RoTechnology/Run-time-Safety-Checker&lt;/div&gt;</summary>
		<author><name>Rotechnology</name></author>
	</entry>
	<entry>
		<id>https://c4d.lias-lab.fr/index.php?title=File:WP4-07_Information_Flow.png&amp;diff=736</id>
		<title>File:WP4-07 Information Flow.png</title>
		<link rel="alternate" type="text/html" href="https://c4d.lias-lab.fr/index.php?title=File:WP4-07_Information_Flow.png&amp;diff=736"/>
		<updated>2022-10-17T07:55:23Z</updated>

		<summary type="html">&lt;p&gt;Rotechnology: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Rotechnology</name></author>
	</entry>
</feed>