Research topics 2021 - Royal Academy of Engineering

Page created by Scott Ramirez
 
CONTINUE READING
Research
topics 2021

     18
An investigation of 5G technology and the threats it presents for the security
Topic 1    community and identification of countermeasure opportunities

           Intelligent, distributed, dynamic software defined RF spectrum sensor network
Topic 2    for detection and identification of devices in a dense RF environment

           Does utility monitoring improve or compromise security? Considering the
Topic 3    associated dilemma of carbon neutral agenda, balanced with the need to
           maintain security of assets and generated data

Topic 4    Machine learning inversion

Topic 5    Digital cities/countries for intelligence and investigative purposes

Topic 6    Cybersecurity model for visible light communications (VLC)

Topic 7    Cybersecurity of swarm robotics in smart cities

Topic 8    Satellite IoT communications

Topic 9    Mathematical approaches to complex imaging problems

Topic 10   Machine led discovery of novel materials for automated chemical synthesis

Topic 11   Predicting the unpredictable: Can you predict drone intent?

           What would Socrates think? The legal and ethical implications behind
Topic 12   autonomous drones and future aviation

           Low shot training and testing of machine learning algorithms for detection of
Topic 13   items of concern

           Eddy diffusion modelling for enhanced hazard assessments of exposures to
Topic 14   airborne toxic materials

Topic 15   Improving energy harvesting in IoT wireless sensor nodes

Topic 16   Automated intelligibility tests through the use of AI or novel algorithms

Topic 17   Detecting use of synthetic biology methods

           Cyber influence on behaviour change: prevalence, predictors, progress, and
Topic 18   prevention

           Autonomous control for small uninhabited air vehicles enabling monitoring of
Topic 19   infrastructure

Topic 20   Quantum engineering for quantum sensors

Topic 21   THz RF transmission for wideband atmospheric communications

                                               19
Topic 1
An investigation of 5G technology and the threats it presents for the security community
and identification of countermeasure opportunities

Key words: 5G; millimetre wave; radio physics; technical security; wireless sensing; pattern
recognition

Research topic description, including problem statement:
Modern and future wireless technologies, such as fifth generation (5G), are utilizing
increasingly higher frequencies extending into the millimetre wave and beyond with their
associated ability to support higher information bandwidths. The commercialization of this
technology is leading to the availability of low-cost RF sub systems and components at these
higher frequencies. This will mean, we will see an increase in technical threats operating
at these higher frequencies, which will be produced at a significantly lower cost with easy
deployment. This will mean the public, businesses and infrastructure are vulnerable to
cyber-attack. There is also a use case within airport security and screening techniques used
at border checkpoints. Therefore, we need to investigate what these threats are so that we
a) detect their presence and b) put effective counter measures in place to protect the public,
businesses, and national infrastructure.

The aim of the research is to:
• Explore how these frequencies and waveforms interact with electronic systems at a
   fundamental level
• Adapt 5G technology sub systems to demonstrate:
        - The technical surveillance vulnerabilities posed by these
        - Their application for countermeasures to detect threats
        - Provide advice and guidance to protect the public, businesses and national
           infrastructure and enhance security screening at airports/ border checkpoints.

Example approaches:
• There is a growing area of research that examines security and privacy concerns, identifying
   attack methods and identifying countermeasures to offer greater protection from such
   attacks. For example, there has been research to discover how audio from loudspeakers
   can be recovered from soundproof buildings due to the subtle disturbances they cause to
   RF transmitters such as widely available such as Wi-Fi. The research identifies the risk and
   then describes how to protect against this potential attack method. (Reference: “Acoustic
   Eavesdropping through Wireless Vibrometry” Teng Weiy, Shu Wangy, Anfu Zhou and Xinyu
   Zhangy University of Wisconsin - Madison, Institute of Computing Technology, Chinese
   Academy of Sciences)

• Research has also produced a series of portable screening prototypes mm Wave sensing.
   With potential applications for screening in prisons or at airports. (Reference: E-Eye: Hidden
   Electronics Recognition through mmWave Nonlinear Effects Zhengxiong Li1, Zhuolin Yang1,
   Chen Song1, Changzhi Li2, Zhengyu Peng3, Wenyao Xu1 1-CSE Department, SUNY University
   at Buffalo, Buffalo, NY, USA 2-ECE Department, Texas Tech University, Lubbock, TX, USA,
   3-Aptiv Corporation, Kokomo, IN, USA)

                                                20
Topic 2
Intelligent, distributed, dynamic software defined RF spectrum sensor network for
detection and identification of devices in a dense RF environment

Key words: RF (Radio Frequency); sensors; software; distributed networks; pattern recognition

Research topic description, including problem statement:
The rise of the Internet of Things has seen an increased use of wireless technologies to
provide connectivity between devices. These platforms are vulnerable to various types of
attack and authentication of devices, spoofing and detecting unauthorized transmissions
are a constant challenge. Some progress has been made to address this through device
fingerprinting, which identifies unique elements specific to a device. However, more work
is needed to provide greater security to our wireless network particularly in a dense RF
environment, where detection of malicious activity is challenging. This could make it even
more challenging to secure environments for legitimate devices.

This topic seeks to understand the dynamic RF landscape and build upon previous research
to detect and identify a specific radio among similar devices in a dense environment and
catalogue these accordingly. The ambition is to achieve an intelligent sensing capability
that can detect all devices operating in a dense RF environment and define its fingerprint
as legitimate or unauthorized adding it to a classifier. This will provide better security for the
public spaces from malicious activity. This will also benefit the security community better
protect their environments and could be of use to detect unauthorized devices in places such
as prisons.

The aim of the research is to:
• Build upon existing research in this field and develop a prototype for practical use to detect
   threats within the dynamic RF landscape
• Develop a means of identifying unauthorized devices through effective fingerprinting.
• Develop a classifier to identify unique signatures for devices that is robust enough to work
   in a dynamic environment.
• Develop counter measure approaches for unauthorized devices, such as denial of service or
   location to enable recovery/ proactive investigations.

Example approaches:
Some pioneering early investigative work examined the concept of radio fingerprinting,
detecting specific devices in a distance ranging between 2ft to 50ft using deep learning
convolutional neural networks. This has also built upon previous research examining device
fingerprinting in wireless networks.

                                                21
Topic 3
Does utility monitoring improve or compromise security? Considering the associated
dilemma of carbon neutral agenda, balanced with the need to maintain Security of assets
and generated data

Key words: cyber security; energy analytics; carbon friendly; psychology; patterns of life;
estate management; IoT security

Research topic description, including problem statement:
The UK Government has set out its agenda for carbon neutrality and the focus has steered
towards creating carbon efficient products for building construction/ upgrade and secondly
on greater use of utility monitoring and modifying behaviours of the associated occupants of
buildings to reduce energy consumption.

This topic seeks to understand the associated security risks (and opportunities) to be gained
from utility monitoring. Does this enable us to have greater security of buildings or not?
Furthermore, do we understand if there are any security risks associated with the new
recommended building materials.

Utility monitoring/ fabrication of materials is part of the on premise IoT landscape and any
development in this environment should ideally offer security assurance.

The aim of the research is to:
• Build upon existing research in this field to understand the security risks
• Develop counter measure approaches to protect our assets and data generated
• Provide a balanced risk approach with implementation of monitoring devices (data)
• Cognizance/ awareness of security risks associated with introduction of new carbon
   efficiency construction materials or devices into the property.

Example approaches:
• A commercial example is smart metering of utilities and making recommendations to
   achieve a reduction of energy usage or more efficient means of usage by users or occupants
   within the monitored environment.

• Potential for identifying ‘pattern of life’ via simple utility monitoring as a positive side benefit
   to assist elderly or vulnerable persons living alone. Pattern of activity, inactivity.

                                                  22
Topic 4
Machine learning inversion

Key words: machine learning; artificial intelligence; model inversion

Research topic description, including problem statement:
Can a machine learning model be inverted to reveal the data it was trained on?

Machine learning (ML) is ubiquitous in the current landscape. It is often operating in
uncharted territory in terms of ethics and governance.

In supervised ML the model learns from an existing data set where the answer is known. This
may potentially use sensitive data to train on.

To what extent can this data be exposed across the many ML techniques? What data is
currently at risk and what threats and opportunities does this pose? Attempts to recreate
data from existing models has been published under the title model inversion but is not an
established field.

If risk is established what are the mitigating steps and what costs would they have?

Example approaches:
Publicly available models and data sets could be used to test problem. This would enable
work to be carried out with few initial barriers.

                                               23
Topic 5
Digital cities/countries for public safety

Key words: smart cities; digital twins; intelligence; subthreshold; modelling

Research topic description, including problem statement:
A digital twin is a virtual recreation of any systems. With the future rollout of Smart Cities this
presents the opportunity for incredibly detailed mapping of an entire town/City function. This
includes electrical systems to traffic flows, to pedestrian footfall. Visual mapping will likely
become prevalent with the cameras and sensors on autonomous and connected vehicles. A
National Digital Twin has already been proposed by Cambridge University’s Centre for Digital
Britain.

Digital Twins of cities already exist, notably in China. Such detailed mapping will be powered
by IoT (Internet of Things) and 5G.

Opportunity:
It seems highly likely that creating digital twins of cities and even the entire country, would
allow for extremely accurate mapping and modelling of events in real time, drawing in data
from a range of open source and classified material to support decision making and planning
from a public safety perspective. The combination with AI would allow for the efficient
deployment of emergency services to likely hotspots, identify high risk areas and also the
testing of variables to understand and predict reactions within a city to events, whether
natural or otherwise.

Possible steps:
Creation of a digital twin as a case study for law enforcement and the emergency services,
incorporating the relevant information and data streams. This would also require mapping
of what data is available and timely. An Agile approach would likely work best, small sprints
producing results that layer on one another. For example, twin a street, then a university
campus, then a borough etc.
Incorporation of behavioural analysis and relevant AI. For example, predicative aftershock
analysis (earthquakes) has been trailed by police to predict future crime hot spots.

Such a volume of data could be exploited by malicious actors, so it is important to understand
the vulnerabilities to digital twins and the threats posed by their misuse. The security of such
information should also be considered.

Example approaches:
Such a project will require a collaborative approach as it incorporates very technical data
but would also need detailed behavioural analysis drawing from a range of open source and
government data.

                                                24
Topic 6
Cybersecurity model for visible light communications (VLC)

Key words: visible light communications; Li-Fi

Research topic description, including problem statement:
Visible Light Communications continues to develop, with several Li-Fi products being
considered for use. However, we are missing a propagation model for visible light
communications that can be used as the foundation for cybersecurity risk modelling at the
physical layer. Such models exist for conventional radio, but these do not reliably extrapolate
to VLC because the physics of light interaction is different to radio. There are plenty of
analyses for propagation on co-operative paths (i.e., luminaire to user), but none that we have
seen that deals with luminaire to interceptor. The lack of basic science around cybersecurity
risk modelling means that network design using VLC is currently ‘vernacular’ – that is, based
on hearsay, speculation, and opinion. We need a solid reliable foundation that allows VLC
networks to be designed to a known cybersecurity risk.

Example approaches:
Indoor propagation model, from the perspective of an adversary, that can be re-expressed as
an intercept risk model.

                                                 25
Topic 7
Cybersecurity of swarm robotics in smart cities

Key words: robotics; smart cities; swarms

Research topic description, including problem statement:
Robotic systems may be used in smart city infrastructure and resource supply (water, power,
logistics, etc), smart manufacturing, unmanned transportation systems, and as robotic
assistants and companions. This is IoT operating dynamically in uncontrolled environments
off-grid, or with low bandwidth backhaul, or within restricted, isolated and/or constrained
physical environments. Issues in addition to conventional fixed IoT include assurance in the
field of robot operation to avoid harm, accident, or malicious performance degradation;
tamper detection on moving/transforming machinery; corruption of machine perception;
perversion of machine personality & behaviours; reliable secure mobile communications
(mesh/multimedia) in hostile environments; implications for personal data creation &
handling (in medical/personal applications, etc)

This research should consider the implications of cyberattack on robotic individuals and
swarms that are programmed to exhibit personalities (e.g., innate decision preferences in
response to risk) and behaviours (e.g., situation-adaptable actions and problem solutions).
It should consider the ways in which personality and behaviour may be implemented, and
the ways in which this is vulnerable to corruption through cyberattack. A key question is the
roles of robotic wisdom (contextual judgement) and ethics (as countermeasures).

Example approaches:
Demonstration of the types of cyber vulnerability of currently researched robotic behaviour
and personality models, and mitigation strategies using robotic wisdom and ethical models.

                                              26
Topic 8
Satellite IoT communications

Key words: satellite; internet of things (IoT); LoRaWan

Research topic description, including problem statement:
The Internet of Things (IoT) has now reached space, and start-up companies such as Lacuna
are hoping to roll out a service using modified LoRaWan that will allow users to transmit data
to a satellite from low power remote devices in locations that lack terrestrial infrastructure.
Applications amongst others include asset tracking (including vehicles, aircraft, and vessels),
wildlife conservation, climate change monitoring, situation awareness for disaster relief,
policing and border control.

The concept of worldwide universal IoT connectivity from remote locations normally not
serviced by terrestrial networks is potentially a game changer for so many applications
however this scheme will only offer one-way communication from the ground to the
spacecraft and the initiative is predicated on a modified stack/silicon so the IoT devices
must be specific to space transmission. This research topic aims to explore the theory,
practicality, and limits of operating native IoT communications waveforms for bi-directional
IoT communications to and from a low Earth orbit satellite. This focus on ground-based
technologies for satellite IoT will investigate radio waveforms and protocol designs,
maximising exploitation of entropy sources for secure cryptographic communications, and
constraints from necessary power saving/harvesting and ‘wake-up’ designs. Optimisation
is for power efficiency and endurance, and effective exploitation of channels with very low
link budgets. Low gain antennas with limited efficiency can be assumed to be a real-world
constraint of any practical system.

Example approaches:
As an example of possible inclusion in the research, ultra-narrowband as typified by SIGFOX
devices use a very low power transmitted waveform which coupled with digital processing
gain techniques are achieving communications over many tens of kilometres in terrestrial
applications. The questions the research would be addressing is could such a waveform
be used in a space application? What are the limits to its use given the constraints of link
budgets through the atmosphere and the effects of Doppler?

                                               27
Topic 9
Mathematical approaches to complex imaging problems

Key words: inverse problems; sensing; explosives detection; landmine detection; SAR
imaging; LiDAR; non-destructive testing; imaging; acoustic sensing; radar; electro-optics

Research topic description, including problem statement:
We are looking to apply new mathematical approaches to our sensing problems. We would
like to investigate the application of inverse problem solutions to data from a variety of
traditional sensors such as radar, electro-optic (EO), infrared (IR) and X-ray with the aim of
improving our ability to sense through complex media or multiple paths (e.g., through foliage,
walls, fog, and round corners). We are also interested in the fusion of data from different
modalities to improve solutions and information from inverse imaging problems.

The Defence, Security and Intelligence communities require capability development of novel
game-changing sensing modalities. Science & Technology (S&T) is growing faster than ever
before and has become a new domain of international competition. In order to counteract
this, a variety of sensing modalities are being used to give us insight for Intelligence,
Surveillance, Target Acquisition and Reconnaissance (ISTAR) purposes.

The physical phenomena occurring due to the interaction of Electromagnetic (EM) waves
and the scene adds to the complexity of the sensing problem. For example, in Synthetic
Aperture Radar (SAR), multi-path reflections cause difficulty in imaging through obscurants,
commonly urban and foliage areas. In EO/IR systems similar issues arise, particularly at low
photon flux, and further out in the EM spectrum, X-ray and Gamma-ray technologies are used
in non-destructive testing for security purposes.

Classically, the image formation techniques for various sensing modality datasets have
been limited to the data processing tools which were highly dependent on computational
power and storage. Due to the rise in efficient Size, Weight and Power (SWAP) sensors and
computing technology, it has allowed the development of processing and image formation
tools which were once deemed impossible. All such sensing modalities would benefit from
a Fellowship in the area of developing and implementing tools for processing data that
incorporates non-canonical imaging techniques to give Security and Defence the added
advantage it requires. Furthermore, data fusion from multiple sensors can be exploited so
that a single platform can do the work of multiple platforms and complement other sensing
data, e.g. SAR data can be fused with EO/IR data. A non-exhaustive list of government
departments interested in sensing modalities is mentioned hereunder:
• Multistatic SAR Imaging and Ground-Penetrating Radar (Ministry of Defence [MoD]);
• EO/IR Imaging (Home Office [HO] / MoD / Department of Transport [DfT]);
• Quantum (LiDAR) Imaging (HO/ DfT/ MoD);
• Acoustic Imaging (UK Hydrographic Office [UKHO] / MoD) – Ocean Acoustic Tomography;
• Magnetic Imaging (Atomic Weapons Establishment [AWE] / National Nuclear Lab. [NNL] /
   MoD / HO / DfT);
• X-ray Tomography (MoD / HO / DfT)

                                              28
Example approaches:
Due to storage of data and faster computational processing power, the general trend in data
processing technique developments is to exploit the rich nature of the datasets. Consider that
next generation SAR is attempting to process multi-dimensional datasets (i.e., multi-static,
multi-channel, multi-look and multi-polar) to form better quality images so that information
is retrieved which wasn’t apparent before. [3D SAR Imaging for Multistatic GPR, M. Pereira et
al, SPIE Digital Library, 2019, DOI - https://doi.org/10.1117/12.2519430]. The paper [A. Horne et al.,
"Exploration of Multidimensional Radio Frequency Imaging to Derive Remote Intelligence of
Building Interiors," 2018 International Conference on Radar (RADAR), Brisbane, QLD, 2018, pp.
1-6, doi: 10.1109/RADAR.2018.8557263] also provides an example of a situation where inverse
techniques may provide benefit.

Elsewhere in the EM spectrum, inverse problems in LiDAR imaging is found in [W. Marais, R.
Holz, Y. H. Hu and R. Willett, "Atmospheric lidar imaging and poisson inverse problems," 2016
IEEE International Conference on Image Processing (ICIP), Phoenix, AZ, 2016, pp. 983-987, doi:
10.1109/ICIP.2016.7532504.]. This describes an approach to an atmospheric lidar photon-limited
imaging problem in which observations are contaminated with Poisson noise. [Gariepy,
G., Tonolini, F., Henderson, R. et al. Detection and tracking of moving objects hidden from
view. Nature Photon 10, 23–26 (2016). https://doi.org/10.1038/nphoton.2015.234] uses LiDAR
imaging to track moving objects around corners.

Baggage inspection based on X-ray imaging has been established to protect environments
in which access control is of vital significance. In several public entrances, like airports,
government buildings, stadiums and large event venues, security checks are carried out
on all baggage to detect suspicious objects (e.g., handguns and explosives). This is an ever-
increasing field of research. See the IEEE Spectrum article, “Future Baggage Scanners Will
Tell Us What Things Are Made Of”.

A Through-Wall Radar Imaging (TWIR) PhD is to be completed next year, which has
demonstrated some fascinating image processing schemes by exploiting synthetic data
using radio frequency propagation models and DNNs (Machine Learning) at University of
Manchester. Two EPSRC iCASE PhD studies (part funded by DSTL) are to start in October 2021
at Universities of Cambridge (Towards Scalable EM Solvers on High Performance Computer
[HPC] Platforms) to support Full-Waveform Inversion (FWI) and Manchester (Tensor
Tomographic Imaging of Foliage Penetration [FOPEN]) to support the Detection, Tracking,
Recognition and Identification (DTRI) of difficult targets through foliage (dense vegetation).
The PhDs further highlight the interdisciplinary nature of the topic and the relevance of a
Fellowship to provide focus and drive.

                                                  29
Topic 10
Machine led discovery of novel materials for automated chemical synthesis.

Key words: machine learning; artificial intelligence; neural networks; automated discovery;
novel materials; automated chemical synthesis

Research topic description, including problem statement:
The interest in utilizing theoretical science to predict new materials and synthesis
pathways has been long standing. Computing power has accelerated in the 21st century
and corresponding advancements in Artificial Intelligence (AI) and Machine Learning (ML)
have increased. Recent research is applying AI, ML and autonomous systems to the field
of chemical synthesis. At present, human-led discovery of new materials through manual
practices can take decades of research, significant continuous funding and can result in
a high degree of risk. This fellowship would focus on applying machine learning for the
discovery of novel materials to increase efficiency and hence reduce cost and risk.

Recent research across academia has led to the creation of software to translate bulk text into
low level instructions using natural language processing1. Development in this space allows
for the optimization of experiments based on prior experiences and the progress of data-
driven materials discovery2. This problem statement is specifically looking at the next stage
of the pipeline to identify, implement and validate a method for machine led discovery of
materials. This may include the discovery of novel materials or the discovery of novel reaction
pathways for conventional or traditional materials. Research in this area would also enable the
assurance of material supply and identification of potential new material threats.

Example approaches:
Proposals should include the assessment and development of available algorithms for
discovery of new materials using machine learning. These should be assessed against the
following criteria:
• Applicability of algorithms to different material types, such as: synthetic biology, energetics
   and other hazardous materials, advanced materials (e.g., smart materials/nanomaterials)
• Computational requirements
• Requirement for transparent methods and explainable results
• Mitigation of risk associated with false alarms
• Potential for validation and optimization of the trained model

The most relevant and applicable method(s) should be implemented and validated against
applicable data.

1
 ChemDataExtractor: A Toolkit for Automated Extraction of Chemical Information from Scientific Literature, M. Swaine, J. Cole, https://pubs.acs.org/
doi/abs/10.1021/acs.jcim.6b00207
2
  A Design-to-Device Pipeline for Data-Driven Materials Discovery, J. Cole, https://pubs.acs.org/doi/10.1021/acs.accounts.9b00470

                                                                         30
Open-source datasets for model training are available, these include but are not limited to:
• PubChem NCBI: https://pubchem.ncbi.nlm.nih.gov/
• ChemSpider (RSC): http://www.chemspider.com/
• NIST Webbook: https://webbook.nist.gov/
• Crystallography Open Database: http://www.crystallography.net/cod/result.php
The Cambridge Structural Database (https://www.ccdc.cam.ac.uk/structures/) may also be
used; however, this is licensed. It is expected that datasets from different sources may be
required to best train a model for a variety of scenarios.

Proposals are also invited to consider future developments in the pipeline such as in-line
characterization (e.g. in chemical synthesis) and analysis of predictions.

Dstl will offer technical partnering from the machine learning and chemical synthesis aspect.
Dstl can offer testing of models and validation of results against classified data and offer
feedback for further development.

                                               31
Topic 11
Predicting the unpredictable: Can you predict drone intent?

Key words: autonomy; drones; counter-drones; artificial intelligence; predictive behaviours;
patterns; drone swarms; future aviation; unmanned traffic Management

Research topic description, including problem statement:
We seek research proposals that will increase our understanding of predictive drone
behaviours. The unmanned aircraft (colloquially “drones”) industry is rapidly developing and
has the potential to dramatically impact the UK in a positive way. Drones already positively
impact UK life; delivering medical supplies to remote islands during Covid-19, supporting our
emergency services and as a new leisure activity.

As drone systems become larger and more capable, their potential broadens too. Drones will
be critical to shaping the future of urban mobility, revolutionizing commercial operations and
how we perceive and utilize airspace. Drones have already proven themselves to be incredibly
versatile additions to commercial enterprises. PwC forecast that the drone industry will
contribute an extra £42bn to the UK by 2030, making up 1.9% of UK GDP and supporting over
600,000 jobs in the drones’ economy.

Artificial Intelligence will be likely be used in the management of a future Unmanned Traffic
Management (UTM) system, and the identification of malicious or illegal drones. The largest
advantage to drones of Artificial Intelligence (AI) will be AI’s decision-making ability to achieve
autonomous flight. The next generation of drones will be able to complete many complex
functions that now require a pilot and crew. AI will allow for multiple drones to cooperate
and coordinate in a swarm as a single, semi-autonomous system. Many applications could
benefit from the use of swarms. For example, a search and rescue swarm might permit more
efficient searching in a complex environment, not only by covering a larger area quicker, but
by combining sensor data. However, with autonomous drones comes greater challenge and
the need for more advanced counter-drone technologies to detect, track, identify and disrupt
drones.

This research topic addresses the challenge of using data sets to distinguish between ‘normal’
and ‘anomalous’ drone behaviour, drones working in silo or as part of an autonomous swarm,
and drones being controlled by a real person or by AI. As our skies become busier and
drone-use increases it is critical that we learn to distinguish between normal, negligent, and
malicious drone-use in order to safeguard the widespread benefits drones can bring, and to
effectively mitigate the threat.

This research topic explores the concept of predicting drone intent by analysis of data sets
and previous drone behaviour. Can we identify and create a signature library of predictive
behaviours in order to accurately predict future drone behaviour and hostile intent? This
understanding and predictive ability would inform effective operational response and threat
prioritization in the future.

                                                32
Example approaches:
Part of this research topic will require a data science understanding of drone patterns of life; a
possible approach may include:
• Collation and analysis of existing research and known drone data sets, including alignment
   with international partners.
• Distinguishing between what is normal drone behaviour and what is an anomaly?
• Distinguishing between normal, negligent, and malicious drone behaviours.
• Distinguishing how or who is controlling a drone:
         - Is it a real person?
         - Is it autonomous?
         - There will be various levels to explore in this part, including a set of waypoints up to
            full AI.
         - Exploration of whether the drone is interacting with other drone in a type of swarm
            (these will vary in complexity).
• Explore whether there are signs a drone is working in a swarm flying / working in silo.
• Explore how to track drone swarm behaviour and then identify predictive behaviours for this.
• Explore smart swarms and predictive behaviour analysis on this.
• Develop a tool to use this identification of drone patterns and AI to predict, inform and
   assess future drone behaviour intent.
• Explore possibility of feeding this predictive data into a counter-drone Detect, Track, Identify
   (DTI) capability to cue a further counter-drone response to disrupt the drone.

                                                 33
Topic 12
What would Socrates think? The legal and ethical implications behind autonomous drones
and future aviation

Key words: autonomy; drones; drone swarms; counter-drones; artificial intelligence; future
aviation; unmanned traffic management; law; ethics; philosophy; human rights; public
acceptance; data privacy

Research topic description, including problem statement:
We seek research proposals that will increase our understanding of the legal and ethical
implications of current, emerging, and future autonomous drones (and other autonomous
vehicles).

The unmanned aircraft (colloquially “drones”) industry is rapidly developing and has the
potential to dramatically impact the UK in a positive way. Drones already positively impact UK
life; delivering medical supplies to remote islands during Covid-19, supporting our emergency
services and as a new leisure activity.

As drone systems become larger and more capable, their potential broadens too. Drones will
be critical to shaping the future of urban mobility, revolutionizing commercial operations and
how we perceive and utilize airspace. Drones have already proven themselves to be incredibly
versatile additions to commercial enterprises. PwC forecast that the drone industry will
contribute an extra £42bn to the UK by 2030, making up 1.9% of UK GDP and supporting over
600,000 jobs in the drones’ economy.

Artificial Intelligence will be likely be used in the management of a future Unmanned Traffic
Management (UTM) system, and the identification of malicious or illegal drones. The largest
advantage to drones of Artificial Intelligence (AI) will be AI’s decision-making ability to achieve
autonomous flight.

The next generation of drones will be able to complete many complex functions that now
require a pilot and crew. AI will allow for multiple drones to cooperate and coordinate in a
swarm as a single, semi-autonomous system. Many applications could benefit from the use
of swarms. For example, a search and rescue swarm might permit more efficient searching in
a complex environment, not only by covering a larger area quicker, but by combining sensor
data.

With autonomous drones, however, comes greater challenge and the need for more
advanced counter-drone technologies to detect, track, identify and disrupt drones. If you
were to have an autonomous drone being detected, tracked, and identified (DTI) by an
autonomous counter-drone system, which could autonomously cue a counter-drone system
to disrupt that autonomous drone, you begin to unravel many complex questions around
potential risk, responsibility, the ethics and legality of AI and true autonomy.

                                                34
This research topic addresses the challenge of needing to look ahead on the topic of
autonomy, AI, drones, and counter-drones, to help inform and shape future policy, legislation,
and regulation. A key objective of this research topic is to ensure domestic and international
legislation, ethics, human rights, safety, and national security requirements are not
overlooked during the rapid technological advancement of the drones and counter-drones
market.

Similar debates have taken place in the past on autonomous cars, and who the legal
responsibility falls to in the case of an incident or accident. There are significant similarities
between these arguments and those for autonomous drones, however there are also critical
nuance which this research topic will seek to explore.

The social and behavioural angle, including exploration of public perception and trust
of AI/autonomous drones and of greater data capture by authorities that monitor drone
movements to support incident response, is a further complex component to consider as part
of this research topic.

Example approaches:
Research proposals could approach this from a variety of disciplines, or as a cross-disciplinary
effort. The problem touches on aspects of data science, international and domestic law,
philosophy and ethics, human rights, psychology, engineering, human-centred computing,
systems and design thinking, software development, with strong links across both physical
and social sciences.

A possible approach may include:
• Define what the critical questions are that we should be asking now of Government and
   Industry.
• Review of UK (and International) legislation and regulation in place.
• Scope to expand to international legal frameworks.
• Explore overlap between autonomous technologies and human rights legislation.
• Explore varying levels of human control (e.g. a fully autonomous drone and/or counter-drone
   system with no human oversight, or a counter-drone system which identifies and tracks
   a drone autonomously, but which requires a human to issue the command to disrupt the
   drone).
• Literature review of parallel issues explored for other autonomous vehicles (I.e., self-driving
   cars).
• Scope whether the Governance currently in place in the UK (and/or Internationally) needs
   to be expanded to cater for such developments (e.g., do we need bespoke Government
   Departments or new Institutions akin to Bretton Woods to promote international
   cooperation/stability).
• Make recommendations to Government and Industry.

                                                 35
Topic 13
Low shot training and testing of machine learning algorithms for detection of items of
concern

Key words: machine learning; X-Ray screening; artificial intelligence; low shot learning, low
shot testing synthetic imagery

Research topic description, including problem statement:
X-Ray scanners are deployed for security screening of bags at various security checkpoints: in
airports, other transport hubs, and at critical national infrastructure. There is a great interest
to assess the effectiveness of machine learning (ML) algorithms deployed on X-Ray scanners
to detect concealed items of concerns.

To date, it has been considered that a large number and variety of images are required to
train a ML algorithm for effective threat detection. However, it may not be possible to provide
a large image set of items of concern to developers. Therefore, it is of importance to be able to
develop effective ML algorithms using a small number of training images – termed low shot
training.

It is also of interest to explore the feasibility of independently testing an algorithm with a
small test set of images, termed low shot testing. A further option to overcome difficulties
with provision of large image sets of images of concern, is to assess the effectiveness of using
synthetic imagery.

Example approaches:
A small training set of images of items of concern will be provided (open format, not security
classified) to the postdoc to be used to develop a low shot trained detection algorithm. A
small test set of images will be provided to be used to test the algorithm. A large data set of
related images will be provided to train and test an algorithm with a conventional supervised
learning approach. A comparison is to be made of the low shot learning approach and the
supervised learning approach using the large data set. Similarly, a comparison is to be made
of the low shot testing approach with testing using the large test set.

Based on the provided images for items of concern, the postdoc will create synthetic images
and develop a study to compare the effectiveness of synthetic images, real images, and a
combination of both.

Combine the approaches of low shot learning and synthetic imagery to assess the most
effective way to train a ML algorithm for items of concern in the absence of large data sets.

                                                36
Topic 14
Eddy diffusion modelling for enhanced hazard assessments of exposures to airborne toxic
materials

Key words: modelling; particulate matter; post-event Recovery

Research topic description, including problem statement:
Mathematical models are used to calculate the exposure of individuals to airborne toxic
material in indoor environments to provide advice to protect civilian populations. Relevant
indoor environments include public spaces, critical national infrastructure, and transport
platforms. Eddy diffusion models provide spatially resolved concentrations/exposures
while being simple to set up and quick to run. These models have advantages over simpler
spatially averaged approaches, which can significantly over or under-predict exposures. In
eddy diffusion models, a single parameter governs mixing, the eddy diffusion coefficient.
Some relationships that enable the eddy diffusion coefficient to be calculated have been
described in the open literature. However, approaches taken to derive these relationships
have so far been simplistic. There is a requirement that work is undertaken to produce a new
relationship between the eddy diffusion coefficient and room ventilation parameters based
on fundamental fluid dynamics. This relationship would ideally take account of a range of
processes that affect mixing such as the movement of people and thermal stratification.
Improved eddy diffusion modelling would enable more accurate and timely prediction of the
hazard from airborne toxic material in a range of indoor environments of interest.

Example approaches:
• Development of an eddy diffusion modelling based on empirical data. Possible flow
   visualization.
• Validation of created or existing models against real data

                                             37
Topic 15
Improving energy harvesting in IoT wireless sensor nodes

Key words: battery; batteries; electronics; energy harvesting; electrodynamic;
electromagnetic; Internet of Things (IoT); Li-ion; lithium polymer; low power; piezoelectric;
photovoltaic; PV solar; thermoelectric; triboelectric; wireless sensor nodes (WSN)

Research topic description, including problem statement:
The Internet of Things (IoT) is a growing market with predicted worldwide spending in this
field to exceed $1.2T by 2022 (Forbes.com). Likewise, a complimentary technology, energy
harvesting, is predicted to exceed worldwide spending of $70B by the same year (IDTechEx,
Energy Harvesting MicroWatt to GigaWatt: Opportunities 2020 - 2040).

This topic is focused on powering wireless sensor node (WSN) hardware, which are designed
to be cheap, low power and easy to install without the need to integrate into existing
infrastructure. A major drawback to the use of WSNs is the battery lifetime. The need to
balance energy or power consumption, the frequency of device maintenance, and the
performance of the sensor inevitably leads to a device with compromised functionality or
significant maintenance overheads.

A route to increase the functionality of WSNs is to incorporate energy harvesting into the
device. On a large-scale energy harvesting has already been successful, with solar technology
allowing many millions of people in Africa access to power where the local electricity grid
is inadequate (smart-energy.com). There has been a significant amount of research and
development into smaller scale energy harvesters with limited, but some success. Examples
are tyre temperature and pressure monitoring systems on vehicles which can be powered
from ambient vibrations (Bowen, C. R. and Arafa, M. H. Advanced Energy Materials 2014),
the PowerWatch developed by Matrix Industries which utilises thermoelectric (TEG) and
photovoltaic (PV) harvesters to power a smart watch (powerwatch.com), and PV powered
crop monitoring ensuring farmers can monitor real-time data to improve yields (Telit.com).

The aim of this topic is to address shortcomings in the way WSNs are powered, with the
broad goal of increasing the duration of the device by incorporating energy harvesters that
generates power in the region of 0.1 - 10 mW, with a minimum energy density of 0.1 mW/cm3.
Proposals are welcomed that tackle this goal from a variety of different routes.

Example approaches:
• The following examples highlight several strategies to develop effective energy harvesters to
   power WSNs:
• Development of a full system that can be demonstrated to harvest energy from ambient
   conditions, utilised on a vehicle or within a property for example. This should include
   mechanical housing, power electronics and advanced energy harvester(s). There are many
   energy harvesting devices available, but the topic authors are technology agnostic. All
   efficient systems will be considered.

                                                38
• Focus on crossing the ‘valley of death’ to produce higher TRL energy harvesting systems.
   Several technologies have moved into the high TRL space, such as PV and TEGs, but
   promising technologies such as RF harvesting, piezoelectric and triboelectric are still mostly
   limited to low-TRL demonstrators.
• Development of RF energy harvesters and/or ‘power beaming’ technologies that can
   be used to harvest energy safely at greater than 1 metre separations. Health and safety
   considerations will be key to a proposal in this area.
• Focus on the fundamentals of improving the materials which can provide a step-change
   in various energy harvesting areas in the near future. For example, improving the lifetime
   of organic PVs, improving the electronic conductivity of TEG materials, or broadening the
   resonant frequency of piezoelectric materials.
• Increase the efficiency of power electronics used to convert harvested energy into useful
   power. For example, the power conversion of nanoamps of current at several kilovolts
   typically seen with piezoelectric harvesters results in significant power losses.

                                                39
Topic 16
Automated intelligibility tests through the use of AI or novel algorithms

Key words: AI audio testing; speech intelligibility; speech algorithms; testing efficiencies

Research topic description, including problem statement:
Aim: to Investigate the ability to perform measurably realistic intelligibility listening tests
using AI or novel algorithms to increase the efficiencies of tests and improve the accuracy of
repeated tests.

Understanding the impact a device, component or algorithm has on speech intelligibility is
vital when designing or buying a product that captures or processes speech. At present there
are a few standard techniques to test intelligibility including; Speech Transmission Index (STI),
Speech Intelligibility Index (SII) and listening tests. STI and SII are limited in their application
and hence do not always accurately reflect the intelligibility impact from a system. The most
accurate approach to date involves listening tests. Listening tests are both time and resource
intensive meaning their use is often restricted. Over recent years academia have been de-
veloping algorithms to calculate intelligibility metrics and some of those metrics have been
shown to have a one-to-one mapping with listening test data used by the developers. Wheth-
er the mappings remain consistent for different scenarios is currently unknown. Before a new
algorithm can be adopted it is important to understand the reliability of the algorithm and
understand the circumstances or scenarios in which the algorithm can or cannot be used.

Example approaches:
• The researchers may wish to examine approaches and algorithms from different disciplines
   including but not limited to data science, acoustics, and hearing aid research.

• Proposals could consider:
       - Understanding the latest techniques employed in listening tests
       - Researching a range of approaches and algorithms that exist that relate to speech
          intelligibility prediction
       - Understanding capabilities and limitations of approaches that could be used to re-
          duce dependency on listening tests
       - If mapping between metrics and listening test data the researchers may want to
          consider the data set used and may also want to consider performing independent
          listening tests.

                                                 40
Topic 17
Detecting the use of synthetic biology methods

Key words: biosecurity; CRISPR/Cas; pathogen; synthetic biology; detection; virus; bacteria;
engineering biology; genetic engineering

Research topic description, including problem statement:
The development of synthetic biology techniques has broad ranging beneficial applications
across a number of areas, including medical, agricultural, and environmental domains.
However, as an example of a dual use technology, synthetic biology may also be exploited
for the nefarious creation or modification of harmful biological systems and products. This
presents a real biosecurity concern for the development and use of this rapidly advancing
technology. This has been demonstrated recently by the recreation of the horsepox virus
using standard synthetic biology techniques by a Canadian research group interested in
smallpox vaccine development

The exploitation of established molecular biology tools such as TALENs, the widespread
interest in CRISPR-Cas systems, and the development of novel and emerging techniques
such as the LEAPER method are facilitating the process of genetic engineering, rendering
it simpler, faster, and more efficient. This brings with it a growing biosecurity risk that
pathogens could be recreated or their pathogenic characteristic amplified by a nefarious
actor with increasing ease. Identifying and detecting when and where synthetic biology
techniques have been used and the impact of their application by applying an understanding
of synthetic biology is therefore essential, so as to lead to the development of detection
capabilities and support attribution as a countermeasure to their nefarious use.

This proposal seeks to understand how synthetic biology techniques and engineering
biology can be identified once used, so as to provide a technical component to support an
overarching regulatory framework for the use of synthetic biology.

Example approaches:
A possible approach may include:
• Reviewing existing and novel synthetic biology techniques and processes e.g. CRISPR/Cas,
   LEAPER systems etc. and their applications to pathogen creation/modification.
• Developing understanding, characterising, and collating markers of synthetic biology use,
   as well as identifying techniques that can be used to detect created or modified pathogens,
   including those that resemble natural pathogens.
• Developing a set of criteria or a detection framework including required capabilities to
   identify when synthetic biology has taken place.
• Characterizing the impact of future, emerging synthetic biology techniques and how these
   may impact detection of use.

                                               41
Topic 18
Cyber influence on behaviour change: prevalence, predictors, progress, and prevention

Key words: social influence; persuasion; coercion; social cyber security; narratives; behaviour
change; cyber-medicated changes

Research topic description, including problem statement:
The aim of this project is to understand and forecast the impact of cyberspace on changes
in human behaviour which has implications for social and political outcomes. Social cyber
security has been identified as a key area where social behavioural science (SBS) can
exchange knowledge and contribute to issues and challenges for the IC (US Decadal survey,
2019). How cyber may mediate behaviour change and the boundary conditions to such
influence (‘when and for whom’) are core research areas for the SBS.

There are recently developed models of social influence that draw, in particular, on group-
level identity processes tied to common interests, belonging and shared norms. A key
step forward would be to investigate the applicability of these models to cyber and their
implications for actual behaviour change in the ‘real-world’. Key questions are whether 1)
existing models of social influence translate straightforwardly to the cyber environment and if
not, how to redefine them accordingly and 2) cyber influence does have a direct relationship
to behaviour and when this is most likely to occur. This research area is of broad scope and
interest with potential to form a much larger research enterprise.

Example approaches:
Proposals could consider the following approaches or perspectives:
•Investigate the personal and social characteristics of users (strengths and vulnerabilities)
   that are most and least likely to be cyber influenced.
• Identify and demonstrate through experimental studies key factors that facilitate and
   disrupt cyber influence on users’ behaviour.
• Understand the factors that escalate the success of cyber influence to widespread
   behaviour.
• Explore methods that can prepare and inoculate users to cyber influence tactics and assess
   their success.
• Examine the underlying personal and social motivations that underpin certain areas of cyber
   influence including extremism and promoting actions that present security threats.

                                               42
Topic 19
Autonomous control for small uninhabited air vehicles enabling monitoring of
infrastructure

Key words: uninhabited air vehicles (UAV); autonomous flight control; autonomous
navigation; remote monitoring; national infrastructure; radio frequencies

Research topic description, including problem statement:
Having small UAVs conduct inspection and monitoring of national infrastructure (i.e., bridges,
railroads, power lines, pipelines, traffic flow, etc.) is becoming more common but if the
systems could do the job autonomously (flight control, obstacle avoidance and navigation) it
would enable even more frequent and affordable use. This topic is interested in autonomous
behaviour for the small UAVs that enable the system to operate safety with a minimum of
human intervention.

Example approaches:
As referenced in the topic paragraph, inspection and monitoring of national infrastructure
is becoming more frequently done by small UAVs, but today that requires human hands-on
control or at the very least supervised limited autonomy. In addition, human monitors the
imaging (or other collections) and the human often directly controls them.

If the UAV could autonomously fly along electrical power lines scanning for hot spots in
the line with an IR imagery. The UAV would also be able to scan for other things that might
interfere with the power transmission (e.g., a tree branch that is leaning over the lines). The
data could be stored and Geo-registered as well as any anomalies identified for human
assessment later, but the autonomous vehicle has to ensure that safety will verifiably be
better than the remote-controlled vehicle and the human piloted aircraft.

Another example is bridge inspection looking for damage, corrosion, etc. needing repairs to
ensure the structural safety. A different example is traffic monitoring for updating guidance
for automobiles on the fastest way to get to work, school, home, hospital, etc. The guidance
could be to a human driver or even an autonomous system on the automobile.

                                                43
Topic 20
Quantum engineering for quantum sensors

Key words: quantum; quantum engineering; quantum sensors; atomic sensors; machine
learning; control theory; quantum control; enabling technology; magnetometer; gyroscope;
accelerometer; gravimeter; atomic clock; atom interferometer; NV diamond

Research topic description, including problem statement:
Quantum sensors are devices that encode a physical quantity into a few quantum states of
the system—for example, atomic magnetometers, atom interferometer gravimeters, atomic
clocks, Nitrogen Vacancy-centre Diamond (NVD) magnetometers, and so on. Quantum
sensors may optionally utilize nonclassical states to increase their performance. As quantum
sensors become more sensitive and accurate, a key remaining challenge is to make them
more practical outside the laboratory. They need to be easy to operate, fast to turn on, robust
against vibration and thermal changes, small, and low power. The emerging field of quantum
engineering can address these problems by applying standards and new engineering
techniques to quantum devices.

Example approaches:
Example approaches will depend on the maturity of the quantum sensor and its intended
application environment. Some interesting directions include, but are not limited to, using
machine learning techniques to simplify the user experience, using quantum or classical
control techniques to increase robustness against noise, employing digital signal processing
algorithms to increase sensor speed or improve accuracy, and applying advanced packaging
techniques to reduce sensor size. These techniques may also be used to improve the
performance of enabling technologies for the quantum sensor, such as lasers or photon
detectors, but the proposal should then include the use of these enabling technologies in an
actual quantum sensor. Proposals may include work on theory, modelling, or algorithms, but
must apply these to a quantum sensor in the lab during the first year of the effort.

                                              44
You can also read