Spying With Nano Robots Disguised As Insects

Soon, spies could be using a robot that takes its cue from nature. This bee-inspired micro aerial vehicle (MAV) robot is the creation of Harvard University researchers who were out on a mission to extend tiny robot legs by imitating nature.

Hovering, like flying, is incredibly energy intensive. For a tiny robot this can be a huge issue, as with small size comes small battery capacity. This greatly reduces operational time and possible missions.

The team behind the robo-bee, who published their findings in the Journal Science, confirmed the suspicion that robots could save a lot of energy if they simply landed and perched whenever they could, much like a bee flying from flower to flower.

To achieve a workable solution, the team tried out different surface adhesion methods, finally settling on a unique combination of an electrostatic material and foam. In essence, they’ve given tiny robot built-in landing pads.

The researchers tested out their findings by building a MAV with an attached electrostatic patch made of copper electrodes over a carbon-fibre base and coated with polyamide. The whole contraption rests atop a small foam cylinder – to cushion the landing.

When charged, the electrostatic plate can adhere to most surfaces that respond to static electricity, like wood, glass, and many others. The technology works just as well on a ceiling as it does on a floor, Robert Wood, a co-author of the new study, told Mashable.

Despite needing power to stick to surfaces, the energy requirements for adhesion are significantly lower than for flight. This allows the robot to operate for far longer periods.

And what could it do? Wood says it could be useful in “basically any situation where you want to have low cost and distributed sensing [that] would be too difficult or too dangerous for a human.” But another advantage this technique provides is stealth. A tiny robot bug could land anywhere and stay out of sight for extended periods of time, only to take off when no one is around. Spies will love them.

i-HLS:

 

« Connected: The Mobile Police Station
North Korea’s Psychological Cyberwar Against Its Neighbour »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CyberSecurity Malaysia

CyberSecurity Malaysia

CyberSecurity Malaysia is the national cyber security specialist agency under the Ministry of Science, Technology and Innovation (MOSTI).

Operational Center for Information Systems Security (COSSI)

Operational Center for Information Systems Security (COSSI)

COSSI is responsible for the detection and mitigation of cyber attacks directed at French Government information systems.

Alan Boswell Group

Alan Boswell Group

We are a Group of Companies providing specialist Insurance Broking and Risk Management advice and services including Cyber Risk cover.

Exonar

Exonar

We enable organisations to better organise their information, removing risk and making it more productive and secure.

IBA Security

IBA Security

IBA Security is a center of competence consolidating the cybersecurity expertise of the IBA Group.

CyberStream

CyberStream

CyberStream, a division of the TechStream Group, is an information & cybersecurity talent acquisition solution provider.

Dellfer

Dellfer

Dellfer secures connected cars and other IOT devices through Intrinsic protection, enabling the most sophisticated cybersecurity attacks to be seen instantly and remediated with precision.

RUSCADASEC

RUSCADASEC

RUSCADASEC is an independent non-profit initiative on developing the open Russian-speaking international community of industrial cyber security/ICS/SCADA cyber security professionals.

Adyta

Adyta

Adyta specializes in cybersecurity solutions adapted to the needs of sovereign institutions, business groups and other organizations that handle information and sensitive or classified data.

Authomize

Authomize

Authomize aggregates identities and authorization mechanisms from any applications around your hybrid environment into one unified platform so you can easily and rapidly manage and secure all users.

Ukrainian Special Systems (USS)

Ukrainian Special Systems (USS)

Ukrainian Special Systems (USS) is a state-owned commercial enterprise providing confidential communication, trust services and services in the field of information protection.

Conference on Applied Machine Learning in Information Security (CAMLIS)

Conference on Applied Machine Learning in Information Security (CAMLIS)

CAMLIS is a venue for discussing applied research on machine learning, deep learning and data science in information security.

EdgeWatch

EdgeWatch

EdgeWatch is a platform that helps information accredited security practitioners discover, monitor, and analyze devices that are accessible from the Internet.

ITQ Latam

ITQ Latam

ITQ Latam are specialists in cybersecurity, in a convergent ecosystem of technological solutions in infrastructure, cloud and security networks.

FutureRange

FutureRange

Specialising in IT Managed Services, Cybersecurity and Digital Transformation, FutureRange experts provide professional IT services for clients throughout Ireland and beyond.

Roundsec

Roundsec

Roundsec provide information security services including risk assessment and pentesting of sites and apps.