Built for the Maker Ecosystem
All Robots and systems are designed to be manufactured, maintained and scaled using the tools and skills already present in Europe's maker and defense-adjacent communities.
Europe alone has over two million registered drone operators, a desktop 3D printing market that surpassed one million unit shipments globally in the first quarter of 2025, a deep base of CNC hobbyists and small-batch fabricators and an active rocketry community spanning university teams, national associations and licensed high-power practitioners.
The Wiewiorka Works platforms are engineered so that anyone with access to a 3D printer, basic CNC capability and common electronics sourcing channels can fabricate, assemble and repair these systems.
This approach draws directly from the central lesson of Ukraine's drone and UGV development since 2022: the advantage belongs to forces that can adapt widely available civilian technologies, iterate designs based on frontline feedback and sustain production through distributed workshops rather than centralized factories.
Modular Architecture and Cross-Platform Reuse
The robotic architecture emphasizes modularity and hot-swappability to support rapid field repair, high system availability and cross-platform reuse. Core modules - power distribution, compute and IMU cores, communications, sensor blocks and actuator I/O - are designed to be replaced without soldering or major reconfiguration. This approach reduces mean time to repair and keeps systems operational even when individual components fail or go end-of-life.
A critical design feature is that the same components appear across multiple platforms. The Arduino Mega 2560 serves as the deterministic safety-layer microcontroller on Ed-Remote, Kagura and YATO-Umbrella. The nRF24L01+ radio module provides low-latency command links on every platform. The LoRa E32 handles long-range telemetry across Ed-Remote, Kagura, YATO-Umbrella and Shinpachi. The QMC5883L compass and NEO-series GPS receivers are shared across all ground and handheld platforms. The MPU6050 IMU appears in Kagura (single) and YATO-Umbrella (dual, enabling both stabilization and anti-weaponization recoil detection). The NVIDIA Jetson Nano provides the compute layer for YATO-Umbrella's vision pipeline and Shinpachi's sensor fusion and is planned for Kagura's autonomy stack.
This means that in the field, components are genuinely interchangeable. If YATO-Umbrella's Jetson Nano fails and Kagura's SLAM capabilities are not immediately needed, the Jetson can be moved from Kagura to YATO-Umbrella - and Kagura continues to operate in its standalone mode on the Arduino Mega, retaining manual control, telemetry and safety functions. The same logic applies to radios, GPS modules, compasses and IMUs. A single spares inventory serves the entire suite.
All platforms share the same nRF24 control payload structure, the same LoRa telemetry format, the same USB NDJSON data protocol and the same firmware architecture (.h/.cpp logic with thin .ino wrappers, following NASA+JSF coding standards). This uniformity means that an operator or technician trained on one platform can maintain any platform in the suite.
The design supports selective integration tailored to platform-specific needs. Okita consolidates avionics onto fewer lightweight PCBs and employs a higher-performance microcontroller (Teensy 4.1) to optimize size, weight and power for aerial use - but still uses the same radio protocols and telemetry formats. Ground-based systems retain the Arduino Mega safety-layer architecture to prioritize robustness, accessibility and hardware isolation between safety-critical and higher-level functions.
The Wiewiorka Works platforms map key design elements to relevant NATO STANAG concepts for prototype guidance, gap analysis and potential future interoperability. All alignments are conceptual only. The system is strictly intended for civilian, non-lethal applications, including education, research, public safety demonstrations, environmental monitoring, search assistance and non-destructive drone interception. No NATO certification, affiliation or military use is claimed or intended.
Legend:
Aligned - Addressed by SOP design or architecture
Partial - Conceptually addressed; further work required
Planned - Not implemented; architecture prepared
Out of Scope - Intentionally excluded at this stage
STANAG 4586 - Standard Interfaces for UAV Control Systems
C2 system modularity: Aligned (via abstraction layer and middleware)
Standardized vehicle state reporting: Partial
Payload control abstraction: Aligned
Multi-vehicle control: Partial
External GCS interoperability: Planned
Operator role separation: Aligned (Operator vs. Incident Commander)
STANAG 4703 - Light UAS Airworthiness
Defined operational envelope: Aligned
Hazard identification & classification: Aligned (integrated with CBRN playbooks)
Fail-safe / fail-passive behaviour: Partial
Configuration control: Partial
Continued airworthiness monitoring: Planned
STANAG 4671 - UAV Airworthiness Requirements
Structured safety case: Partial
System redundancy philosophy: Partial
Verification & validation planning: Planned
STANAG 4811 - Sense-and-Avoid
Cooperative traffic detection: Partial
Non-cooperative detection: Partial
Collision risk assessment: Planned
Degraded mode declaration: Aligned
Airspace restriction enforcement: Aligned
STANAG 7023 / 4545 / 4609 - Imagery Formats
STANAG 4559 - ISR Library Interface
Indexing and retrieval: Planned
Product discovery: Planned
External interop: Out of Scope
STANAG 4774 / 4778 - Information Confidentiality Labeling
STANAG 2290 - Unique Identification
STANAG 7074 - DIGEST (Geospatial)
STANAG 2352 - CBRN Defense Equipment
Hazard terminology: Aligned
Source-term control: Partial (via SLF/PFE)
Certification: Out of Scope
STANAG 4370 - Environmental Testing (AECTP)
Mission profiles & tailoring: Partial / Planned
Climatic/mechanical tests: Planned
Combined environments: Planned
STANAG 5068 - SCIP (Secure Communications Interoperability Protocol)
Secure voice/data: Partial (custom AES-256-GCM transport)
Cryptographic mechanisms: Partial (extends to post-quantum)
Interoperability with NATO: Planned
STANAG 4406 - Military Messaging
STANAG 4787 - NINE (Network Information Exchange)
Post-Quantum Cryptography Considerations
The suite incorporates forward-looking post-quantum key encapsulation based on ML-KEM-768 (Kyber family) using Bouncy Castle 1.82. This provides quantum-resistant key agreement combined with Ed25519 identity verification and key pinning to mitigate man-in-the-middle risk. Transport encryption uses AES-256-GCM with replay protection, custom framing and in-channel authentication.