OpenDroneID

Building Firmware for Production

ArduPilot provides methods for making firmware for autopilot systems integrating OpenDroneID Remote ID transmitter modules tamper-resistant as well as compliant with various countries initiatives.

ArduPilot’s tamper resistance currently consists of:

  • Using a special board ID for ODID (OpenDroneID) firmware that will reject normal attempts of loading firmware without the necessary functions and parameters required for compliance. Any bootloader created with OpenDroneID capabilities also has firmware checking enabled such that it will not boot main firmware unless the board ids match.

  • Special READONLY parameters which can be set in the firmware during the compilation

Future enhancements are planned.

For an example see the hwdef and param files for an ODID version of CubeOrange with a CAN OpenDroneID module integrated on the carrier board.

Note

that the board ID has been changed different from normal firmware, to prevent loading it on a remoteid equipped system by a GCS. And the DID params have been set to read-only to prevent users from changing them and defeating the system.

Building Firmware for Bench Testing and Experimentation

An experimental firmware version can be built for any autopilot by:

  • Adding the line “define AP_OPENDRONEID_ENABLED 1” to its hwdef.dat file, or simply building with the waf configure option, --enable-opendroneid

  • Any OpenDroneID capable firmware will add another tamper proofing check. An OpenDroneID enabled bootloader will not run firmware with a different board ID. This extends the protection already afforded by using a unique board ID for OpenDroneID enabled autopilots that will reject normal attempts of loading firmware without the necessary functions and parameters required for compliance.

Note

you will need to build both the bootloader and the main firmware. Use “Tools/scripts/build_bootloaders.py BOARDNAME” to build the bootloader before reconfiguring waf and building the main firmware to include the bootloader with the new board id.

Here is a video illustrating the entire process:

Testing

module load OpenDroneID

opendroneid set UAS_ID_type 1
opendroneid set UA_type 1
opendroneid set area_ceiling 700  #only needed if testing swarms
opendroneid set area_count 1      #only needed if testing swarms
opendroneid set area_floor -200   #only needed if testing swarms
opendroneid set area_radius 1000  #only needed if testing swarms
opendroneid set category_eu 1
opendroneid set class_eu 1
opendroneid set classification_type 1
opendroneid set description "TestDrone1"
opendroneid set description_type 1
opendroneid set operator_id "TestPilot1"
opendroneid set operator_id_type 1
opendroneid set operator_location_type 0      #note that a value of 1 is usually required in actual operation. This requires using a GCS with its own GPS for testing.
opendroneid set rate_hz 1

This sets up the required parameters a user would normally have to enter into the Remote ID system from a GCS.

  • Attach autopilot with an OpenDroneID compatible Remote ID module , like this , attached to one of its serial ports to PC and start MAVProxy with the console and map with the option to set the operator location to the vehicle arming location:

MAVProxy.py --console --map

Note

this may not be legal in some jurisdictions in actual use, but the OpenDroneID module firmware will reject this assignment with a suitable build option set in its firmware for those jurisdictions. This allows testing on PCs without a GPS attached to determine operator location.

../_images/opendroneid-android-app.jpg

Using SITL for testing

SITL can also be used to run simulated missions and observe on the above OpenDroneID phone app by attaching the ODID Remote ID module to the PC via an USB FTDI connector.

If the module is attached to the PC via USB or a serial FTDI adapter, then you can discover the Linux path to its port using:

ls /dev/serial/by-id/*

this will return a rather lengthy path in a similar form to:

/dev/serial/by-id/usb-Silicon_Labs_CP2102N_USB_to_UART_Bridge_Controller_4e7564343210ec11a33426947a109228-if00-port0

Start SITL using the following, and if you will be using the SERIAL1 interface in the code (ie DID_MAVPORT = 1) and the <path> discovered above:

sim_vehicle.py --console --map -A --serial1=uart:<path>

Follow the rest of the instructions above for loading the remoteid.scr script and setup once MAVProxy starts. You should see the plane on your phone app. You can now create and fly missions and monitor them on the phone app.

Using Mission Planner as the GCS

Mission Planner has a special Drone ID tab in its DATA view for use with OpenDroneID modules attached to the autopilot which allows monitoring status, attaching the required GPS for operator location of the GCS, and UAS and Operator ID string setup. See OpenDroneID Panel.