Pub Date : 2013-10-01DOI: 10.1109/TELSKS.2013.6704934
J. Brendel, S. Riess, R. Weigel, G. Fischer
Since several years, `cognitive radio' is given much attention in research and is seen as a future technology in communications. In this paper a cognitive radio system for Program Making and Special Event (PMSE) devices (e.g. wireless microphones) is presented and the results of a field test are discussed. First, we outline the challenges which the PMSE industry has to cope with and how changes in regulatory and the digital dividend in the TV UHF band has impact on the operation reliability of PMSE devices. Afterwards, a system is presented that uses cognitive radio techniques to ensure the high audio quality requirements and interference free operation of PMSE devices under the previously mentioned circumstances. Beside a general overview over the developed system we focus on a distributed spectrum sensing network as part of the cognitive information acquisition to monitor the current spectrum situation. The data is used by the cognitive engine to detect potential interferers and to trigger operation parameter changes (e.g. frequency or transmit power) of the PMSE devices to avoid link quality degradation. We present the built-up sensor nodes for the spectrum measurement and the developed software to control the sensor nodes and to preprocess the measured data. Finally, the results, collected with the field test platform in the fair-ground of Berlin, show convincingly how the developed cognitive system makes PMSE devices future-proof.
{"title":"A cognitive system for future-proof wireless microphones: Concept, implementation and results","authors":"J. Brendel, S. Riess, R. Weigel, G. Fischer","doi":"10.1109/TELSKS.2013.6704934","DOIUrl":"https://doi.org/10.1109/TELSKS.2013.6704934","url":null,"abstract":"Since several years, `cognitive radio' is given much attention in research and is seen as a future technology in communications. In this paper a cognitive radio system for Program Making and Special Event (PMSE) devices (e.g. wireless microphones) is presented and the results of a field test are discussed. First, we outline the challenges which the PMSE industry has to cope with and how changes in regulatory and the digital dividend in the TV UHF band has impact on the operation reliability of PMSE devices. Afterwards, a system is presented that uses cognitive radio techniques to ensure the high audio quality requirements and interference free operation of PMSE devices under the previously mentioned circumstances. Beside a general overview over the developed system we focus on a distributed spectrum sensing network as part of the cognitive information acquisition to monitor the current spectrum situation. The data is used by the cognitive engine to detect potential interferers and to trigger operation parameter changes (e.g. frequency or transmit power) of the PMSE devices to avoid link quality degradation. We present the built-up sensor nodes for the spectrum measurement and the developed software to control the sensor nodes and to preprocess the measured data. Finally, the results, collected with the field test platform in the fair-ground of Berlin, show convincingly how the developed cognitive system makes PMSE devices future-proof.","PeriodicalId":144044,"journal":{"name":"2013 11th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Services (TELSIKS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127775336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-10-01DOI: 10.1109/TELSKS.2013.6704448
Jasna D. Marković-Petrović, M. Stojanović
Several factors have contributed to the escalation of risks specific to novel control systems, including the network architecture, adoption of standardized technologies with known vulnerabilities and connectivity of control systems to other networks. This paper considers SCADA (Supervisory Control And Data Acquisition) system vulnerabilities as well as securing the infrastructure of power utility information-telecommunication systems. We first present a concept of SCADA architecture in the hydropower plants. The simulation model assumes Distributed Denial of Service (DDoS) attack to SCADA system. A comprehensive simulation points to SCADA performance deterioration under DDoS attack. Possible security solutions have also been discussed.
有几个因素导致了新型控制系统特有的风险升级,包括网络架构、采用具有已知漏洞的标准化技术以及控制系统与其他网络的连接。本文考虑了SCADA (Supervisory Control And Data Acquisition,监控与数据采集)系统的脆弱性,以及保障电力企业信息通信系统基础设施的安全。我们首先提出了水电站SCADA体系结构的概念。仿真模型假设SCADA系统受到分布式拒绝服务(DDoS)攻击。综合仿真表明,在DDoS攻击下SCADA的性能会下降。还讨论了可能的安全解决方案。
{"title":"Analysis of SCADA system vulnerabilities to DDoS attacks","authors":"Jasna D. Marković-Petrović, M. Stojanović","doi":"10.1109/TELSKS.2013.6704448","DOIUrl":"https://doi.org/10.1109/TELSKS.2013.6704448","url":null,"abstract":"Several factors have contributed to the escalation of risks specific to novel control systems, including the network architecture, adoption of standardized technologies with known vulnerabilities and connectivity of control systems to other networks. This paper considers SCADA (Supervisory Control And Data Acquisition) system vulnerabilities as well as securing the infrastructure of power utility information-telecommunication systems. We first present a concept of SCADA architecture in the hydropower plants. The simulation model assumes Distributed Denial of Service (DDoS) attack to SCADA system. A comprehensive simulation points to SCADA performance deterioration under DDoS attack. Possible security solutions have also been discussed.","PeriodicalId":144044,"journal":{"name":"2013 11th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Services (TELSIKS)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132689858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-10-01DOI: 10.1109/TELSKS.2013.6704904
Damian Ruiz, S. Sladojevic, D. Culibrk, G. Fernández-Escribano
H.264 is one of the first video coding standard incorporating coding formats with a bit-depth of above 8 bits. This paper presents the results of compression comparison tests for the H.264 “High 422” profile, between 10-bit and 8-bit sample depths. The simulations were run on five 720p and 1080i high definition sequences. PSNR and SSIM metrics were used to evaluate the objective quality performance of both bit-depths, and with the aim of enabling a fair comparison, both metrics were computed with 10-bit precision, up-scaling the 8-bit decoded sequences to 10-bits. Some works have been published in this field based on the evaluation of commercial 10-bit H.264 implementations. In this work, we carry out a neutral evaluation of H.264 standard performance using the official H.264 Reference Software. Unlike the expected 10-bit coding gains, the results show unnoticeable differences between both sample depths in terms of objective quality, lower 0.1dB for PSNR and 0.002 for SSIM, with a 5% bit rate saving that can be achieved for the luminance component, especially for the 720p format, and negligible quality improvement for U and V chroma components.
{"title":"Comparison of compression performance of 10-bit vs. 8-bit depth, under H.264 Hi422 profile","authors":"Damian Ruiz, S. Sladojevic, D. Culibrk, G. Fernández-Escribano","doi":"10.1109/TELSKS.2013.6704904","DOIUrl":"https://doi.org/10.1109/TELSKS.2013.6704904","url":null,"abstract":"H.264 is one of the first video coding standard incorporating coding formats with a bit-depth of above 8 bits. This paper presents the results of compression comparison tests for the H.264 “High 422” profile, between 10-bit and 8-bit sample depths. The simulations were run on five 720p and 1080i high definition sequences. PSNR and SSIM metrics were used to evaluate the objective quality performance of both bit-depths, and with the aim of enabling a fair comparison, both metrics were computed with 10-bit precision, up-scaling the 8-bit decoded sequences to 10-bits. Some works have been published in this field based on the evaluation of commercial 10-bit H.264 implementations. In this work, we carry out a neutral evaluation of H.264 standard performance using the official H.264 Reference Software. Unlike the expected 10-bit coding gains, the results show unnoticeable differences between both sample depths in terms of objective quality, lower 0.1dB for PSNR and 0.002 for SSIM, with a 5% bit rate saving that can be achieved for the luminance component, especially for the 720p format, and negligible quality improvement for U and V chroma components.","PeriodicalId":144044,"journal":{"name":"2013 11th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Services (TELSIKS)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132005745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-10-01DOI: 10.1109/TELSKS.2013.6704424
D. Vucic, M. Eric, I. Pokrajac
A new, matrix-based, stochastic method for cyclic spectral analysis of MB-OFDM signals, based on their Markov chain representation, is proposed. Explicit expression for the cyclic spectrum of these signals is derived. Some theoretical and simulation results for the spectral correlation characterization of MB-OFDM signals are presented, as well.
{"title":"Spectral correlation characterization of MB-OFDM signals","authors":"D. Vucic, M. Eric, I. Pokrajac","doi":"10.1109/TELSKS.2013.6704424","DOIUrl":"https://doi.org/10.1109/TELSKS.2013.6704424","url":null,"abstract":"A new, matrix-based, stochastic method for cyclic spectral analysis of MB-OFDM signals, based on their Markov chain representation, is proposed. Explicit expression for the cyclic spectrum of these signals is derived. Some theoretical and simulation results for the spectral correlation characterization of MB-OFDM signals are presented, as well.","PeriodicalId":144044,"journal":{"name":"2013 11th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Services (TELSIKS)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127766722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-10-01DOI: 10.1109/TELSKS.2013.6704410
A. Jevremović, Nenad Ristić, M. Veinovic
Nowadays there is growing issue in protecting PHP scripts from unwanted using, copying and modifications. Existing solutions on source code level are mostly working as obfuscators, are free, and are not providing any serious protection. Solutions that encode opcode are more secure but are commercial and require closed-source proprietary PHP interpreter's extension. Additionally, encoded opcode is not compatible with future versions of interpreters which imply rebuying encoders from authors. Finally, if extension source-code is compromised, all script encoded by that solution are compromised too. In this paper we present a novel model for free and open-source PHP script protection solution. Protection level provided by proposed solution is equal to protection level of commercial solutions. Model is based on conclusions from using standard cryptology models for analyzing strengths and weaknesses of existing solutions when scripts protection is seen as secure communication channel in cryptology.
{"title":"Improving protection of PHP source code using cryptology models","authors":"A. Jevremović, Nenad Ristić, M. Veinovic","doi":"10.1109/TELSKS.2013.6704410","DOIUrl":"https://doi.org/10.1109/TELSKS.2013.6704410","url":null,"abstract":"Nowadays there is growing issue in protecting PHP scripts from unwanted using, copying and modifications. Existing solutions on source code level are mostly working as obfuscators, are free, and are not providing any serious protection. Solutions that encode opcode are more secure but are commercial and require closed-source proprietary PHP interpreter's extension. Additionally, encoded opcode is not compatible with future versions of interpreters which imply rebuying encoders from authors. Finally, if extension source-code is compromised, all script encoded by that solution are compromised too. In this paper we present a novel model for free and open-source PHP script protection solution. Protection level provided by proposed solution is equal to protection level of commercial solutions. Model is based on conclusions from using standard cryptology models for analyzing strengths and weaknesses of existing solutions when scripts protection is seen as secure communication channel in cryptology.","PeriodicalId":144044,"journal":{"name":"2013 11th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Services (TELSIKS)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116337451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-10-01DOI: 10.1109/TELSKS.2013.6704446
Ljubomir Ivanis, S. Adamovic, A. Jevremović
This paper describes security problems in communication between DNS service and its clients. It describes the use of new technologies that provide increased safety in terms of communication, and their application to a specific case. The paper is based on the experiences gained during the implementation of security solutions in CPU Ltd., specifically the section relating to the protection of DNS service from abuse. This paper will describe some practical solutions that have been implemented.
{"title":"Case study: DNS service protection methods","authors":"Ljubomir Ivanis, S. Adamovic, A. Jevremović","doi":"10.1109/TELSKS.2013.6704446","DOIUrl":"https://doi.org/10.1109/TELSKS.2013.6704446","url":null,"abstract":"This paper describes security problems in communication between DNS service and its clients. It describes the use of new technologies that provide increased safety in terms of communication, and their application to a specific case. The paper is based on the experiences gained during the implementation of security solutions in CPU Ltd., specifically the section relating to the protection of DNS service from abuse. This paper will describe some practical solutions that have been implemented.","PeriodicalId":144044,"journal":{"name":"2013 11th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Services (TELSIKS)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116744006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-10-01DOI: 10.1109/TELSKS.2013.6704461
Aleksandra Denda, D. Drajic
The main objective of this consolidation work is to define and implement TO - BE Incident Management process between three different company that operate in three different countries which incorporate both eTOM and ITIL frameworks taking in eTOM process definitions within the context of the wider ITIL processes. It will enable process automation for network and service assurance for multi-vendor, multi-technology resource infrastructures. Implementation of the new common regional Service management system together with the redesign and implementation of new service management processes are expected to enable the effective and efficient delivery of services and support of changing business needs.
{"title":"Aligned software and process models with both the eTOM framework and the ITIL processes","authors":"Aleksandra Denda, D. Drajic","doi":"10.1109/TELSKS.2013.6704461","DOIUrl":"https://doi.org/10.1109/TELSKS.2013.6704461","url":null,"abstract":"The main objective of this consolidation work is to define and implement TO - BE Incident Management process between three different company that operate in three different countries which incorporate both eTOM and ITIL frameworks taking in eTOM process definitions within the context of the wider ITIL processes. It will enable process automation for network and service assurance for multi-vendor, multi-technology resource infrastructures. Implementation of the new common regional Service management system together with the redesign and implementation of new service management processes are expected to enable the effective and efficient delivery of services and support of changing business needs.","PeriodicalId":144044,"journal":{"name":"2013 11th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Services (TELSIKS)","volume":"184 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117340111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-10-01DOI: 10.1109/TELSKS.2013.6704937
S. Brkić, M. Eric
In this paper a practical implementation of joint spatio-temporal spectrum sensing method based on direct localization is presented. The chosen algorithm was implemented in FPGA (Field-Programmable Gate Array) technology which can provide necessary computation power for executing complex sensing operation and achieves sensing duration measured in microseconds.
{"title":"FPGA Implementation of Joint Spatio-Temporal Spectrum Sensing Algorithm Based on Direct Localization Method","authors":"S. Brkić, M. Eric","doi":"10.1109/TELSKS.2013.6704937","DOIUrl":"https://doi.org/10.1109/TELSKS.2013.6704937","url":null,"abstract":"In this paper a practical implementation of joint spatio-temporal spectrum sensing method based on direct localization is presented. The chosen algorithm was implemented in FPGA (Field-Programmable Gate Array) technology which can provide necessary computation power for executing complex sensing operation and achieves sensing duration measured in microseconds.","PeriodicalId":144044,"journal":{"name":"2013 11th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Services (TELSIKS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115306149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-10-01DOI: 10.1109/TELSKS.2013.6704399
L. Vietzorreck, Taeyoung Kim
In this paper novel concepts for space communication systems are introduced. A switch matrix system for satellite applications based on RF MEMS switches is described. For space applications RF MEMS switches have several advantages compared to their mechanical or solid-state counterparts. They are small, compact and lightweight with a high linearity up to high frequencies. The simulated performance of the 12×12 switch matrix is below -12dB IL (Insertion Loss) up to C band and better than -15dB RL (Return Loss) up to Ku band. Moreover, it has a good isolation better than -50dB. Technology, performance and limitations of the proposed system are discussed.
{"title":"RF MEMS based systems for space communications","authors":"L. Vietzorreck, Taeyoung Kim","doi":"10.1109/TELSKS.2013.6704399","DOIUrl":"https://doi.org/10.1109/TELSKS.2013.6704399","url":null,"abstract":"In this paper novel concepts for space communication systems are introduced. A switch matrix system for satellite applications based on RF MEMS switches is described. For space applications RF MEMS switches have several advantages compared to their mechanical or solid-state counterparts. They are small, compact and lightweight with a high linearity up to high frequencies. The simulated performance of the 12×12 switch matrix is below -12dB IL (Insertion Loss) up to C band and better than -15dB RL (Return Loss) up to Ku band. Moreover, it has a good isolation better than -50dB. Technology, performance and limitations of the proposed system are discussed.","PeriodicalId":144044,"journal":{"name":"2013 11th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Services (TELSIKS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127149115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-10-01DOI: 10.1109/TELSKS.2013.6704909
Goran Murić, D. Macura, N. Gospic, D. Bogojevic
In this paper the new approach to assessment an importance/criticality of elements within the critical information infrastructure is presented. The proposed method is based on the identification of critical routes within the network, and the recognition of the most important nodes without using centrality measures and simulation techniques. The elements and their dependencies within the information infrastructure are transformed into a relational topological graph. The elements are presented as the nodes, and the relations between them as the edges of the graph.
{"title":"An approach to assess criticality of elements in the process of information infrastructure protection","authors":"Goran Murić, D. Macura, N. Gospic, D. Bogojevic","doi":"10.1109/TELSKS.2013.6704909","DOIUrl":"https://doi.org/10.1109/TELSKS.2013.6704909","url":null,"abstract":"In this paper the new approach to assessment an importance/criticality of elements within the critical information infrastructure is presented. The proposed method is based on the identification of critical routes within the network, and the recognition of the most important nodes without using centrality measures and simulation techniques. The elements and their dependencies within the information infrastructure are transformed into a relational topological graph. The elements are presented as the nodes, and the relations between them as the edges of the graph.","PeriodicalId":144044,"journal":{"name":"2013 11th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Services (TELSIKS)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124937357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}