Jonas Van Waes, J. Vankeirsbilck, Jonas Lannoo, D. Vanoost, D. Pissoort, J. Boydens
{"title":"Complementary Fault Models for Assessing the Effectiveness of Hamming Codes","authors":"Jonas Van Waes, J. Vankeirsbilck, Jonas Lannoo, D. Vanoost, D. Pissoort, J. Boydens","doi":"10.1109/ET.2019.8878632","DOIUrl":null,"url":null,"abstract":"Communication channels have always been errorprone. To counteract these transmission errors, Error Detection and Correction Codes have been used for a long time. To test the effectiveness of these codes, different fault models can be used. This paper presents two fault models: a systematic fault injection model and an EMI fault model. Both models resemble different kinds of disturbance sources, such as thermal noise, degrading components or electromagnetic interference. By combining both models, as is the aim of this paper, a comprehensive study on the vulnerabilities within a communication channel can be made.","PeriodicalId":306452,"journal":{"name":"2019 IEEE XXVIII International Scientific Conference Electronics (ET)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE XXVIII International Scientific Conference Electronics (ET)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ET.2019.8878632","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6
Abstract
Communication channels have always been errorprone. To counteract these transmission errors, Error Detection and Correction Codes have been used for a long time. To test the effectiveness of these codes, different fault models can be used. This paper presents two fault models: a systematic fault injection model and an EMI fault model. Both models resemble different kinds of disturbance sources, such as thermal noise, degrading components or electromagnetic interference. By combining both models, as is the aim of this paper, a comprehensive study on the vulnerabilities within a communication channel can be made.