The new processing algorithm for wideband signals, which are propagating in frequency dispersion media, is developed in the context of the ground penetrating radar technology. The mathematical substantiation of offered method is presented on the base of linear functional spaces. The method is described for calculation acceleration on the base of the recursive approach. Results of numerical modeling of this method are presented for electromagnetic waves propagating in frequency dispersion media at utilization of chirp pulse signals. The Debye model is used as the model of electrical medium properties. The frequency dispersion of losses in the medium is taken into consideration at modeling. Results of operation modeling of the ground penetrating radar are described. Results of this paper will be useful for the ground penetrating radar technology and the ultrasonic flaw detection.
{"title":"The Processing Algorithm for Wideband Signals Propagating in Media with Frequency Dispersion","authors":"A. A. Kalshchikov, V. V. Shtykov, S. Smolskiy","doi":"10.36244/icj.2020.3.1","DOIUrl":"https://doi.org/10.36244/icj.2020.3.1","url":null,"abstract":"The new processing algorithm for wideband signals, which are propagating in frequency dispersion media, is developed in the context of the ground penetrating radar technology. The mathematical substantiation of offered method is presented on the base of linear functional spaces. The method is described for calculation acceleration on the base of the recursive approach. Results of numerical modeling of this method are presented for electromagnetic waves propagating in frequency dispersion media at utilization of chirp pulse signals. The Debye model is used as the model of electrical medium properties. The frequency dispersion of losses in the medium is taken into consideration at modeling. Results of operation modeling of the ground penetrating radar are described. Results of this paper will be useful for the ground penetrating radar technology and the ultrasonic flaw detection.","PeriodicalId":42504,"journal":{"name":"Infocommunications Journal","volume":"16 1","pages":""},"PeriodicalIF":1.1,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85015601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
There is an increasing need for true random bits, for which true random number generators (TRNG) are absolutely necessary, because the output of pseudo random number generators is deterministically calculated from the previous states. We introduce our quantum number generator (QRNG) based on amplified spontaneous emission (ASE), a truly random quantum physical process. The experimental setup utilizes the randomness of the process. In this system, optical amplifiers (based on ASE) play the major role. The suitable sampling rate is selected in order to build the fastest generator, while avoiding the correlation between consecutive bits. Furthermore, the applied post-processing increases the quality of the random bits. As a results of this, our system generated random bits which successfully passed the NIST tests. Our real-time generation system – which is currently a trial version implemented with cheap equipment – will be available for public use, generating real time random bits using a web page.
{"title":"Amplified spontaneous emission based quantum random number generator","authors":"Ádám Marosits, Ágoston Schranz, E. Udvary","doi":"10.36244/icj.2020.2.2","DOIUrl":"https://doi.org/10.36244/icj.2020.2.2","url":null,"abstract":"There is an increasing need for true random bits, for which true random number generators (TRNG) are absolutely necessary, because the output of pseudo random number generators is deterministically calculated from the previous states. We introduce our quantum number generator (QRNG) based on amplified spontaneous emission (ASE), a truly random quantum physical process. The experimental setup utilizes the randomness of the process. In this system, optical amplifiers (based on ASE) play the major role. The suitable sampling rate is selected in order to build the fastest generator, while avoiding the correlation between consecutive bits. Furthermore, the applied post-processing increases the quality of the random bits. As a results of this, our system generated random bits which successfully passed the NIST tests. Our real-time generation system – which is currently a trial version implemented with cheap equipment – will be available for public use, generating real time random bits using a web page.","PeriodicalId":42504,"journal":{"name":"Infocommunications Journal","volume":"18 1","pages":""},"PeriodicalIF":1.1,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77557255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The unprecedented breakthrough in the field of quantum computing in the last several years is threatening with the exploitation of our current communication systems. To address this issue, researchers are getting more involved in finding methods to protect these systems. Amongst other tools, quantum key distribution could be a potentially applicable way to achieve the desired level of protection. In this paper we are evaluating the physical layer of an optical system realising continuous variable quantum key distribution (CVQKD) with simulations to determine its weak points and suggest methods to improve them. We found that polarisation dependent devices are crucial for proper operation, therefore we determined their most defining parameters from the point of operation and suggested extra optical devices to largely improve transmission quality. We also paid attention to polarisation controlling in these sort of systems. Our findings could be valuable as practical considerations to construct reliable CVQKD optical transmission links.
{"title":"Optimisation of Optical Network for Continuous-Variable Quantum Key Distribution by Means of Simulation","authors":"Dávid Kóbor, E. Udvary","doi":"10.36244/icj.2020.2.3","DOIUrl":"https://doi.org/10.36244/icj.2020.2.3","url":null,"abstract":"The unprecedented breakthrough in the field of quantum computing in the last several years is threatening with the exploitation of our current communication systems. To address this issue, researchers are getting more involved in finding methods to protect these systems. Amongst other tools, quantum key distribution could be a potentially applicable way to achieve the desired level of protection. In this paper we are evaluating the physical layer of an optical system realising continuous variable quantum key distribution (CVQKD) with simulations to determine its weak points and suggest methods to improve them. We found that polarisation dependent devices are crucial for proper operation, therefore we determined their most defining parameters from the point of operation and suggested extra optical devices to largely improve transmission quality. We also paid attention to polarisation controlling in these sort of systems. Our findings could be valuable as practical considerations to construct reliable CVQKD optical transmission links.","PeriodicalId":42504,"journal":{"name":"Infocommunications Journal","volume":"81 1","pages":""},"PeriodicalIF":1.1,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80483534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Vehicle to grid (V2G) communication for electric vehicles and their charging points is already well established by the ISO 15118 standard. The standard allows vehicles to communicate with the charging station using the power cable, i.e. a wired link, but it is improved to enable wireless (WLAN) links as well. This paper aims to provide an implementation accomplishes a wireless authentication solution (WAS). With that the electric vehicles can establish V2G connection when approaching the charging pool, then identify and authenticate the driver and/or the vehicle. Furthermore, the paper presents a TTCN-3 based validation and verification (V&V) framework in order to test the conformance of the prototype implementation against the standard.
ISO 15118标准已经很好地建立了电动汽车及其充电点的车辆到电网(V2G)通信。该标准允许车辆使用电缆(即有线链路)与充电站通信,但也改进为支持无线(WLAN)链路。本文旨在提供一个实现无线身份验证的解决方案(WAS)。这样,电动汽车就可以在接近充电池时建立V2G连接,然后对驾驶员和/或车辆进行识别和认证。此外,本文提出了一个基于TTCN-3的验证和验证(V&V)框架,以测试原型实现与标准的一致性。
{"title":"Wireless Authentication Solution and TTCN-3 based Test Framework for ISO-15118 Wireless V2G Communication","authors":"Z. Jakó, Ádám Knapp, N. E. Sayed","doi":"10.36244/icj.2019.2.5","DOIUrl":"https://doi.org/10.36244/icj.2019.2.5","url":null,"abstract":"Vehicle to grid (V2G) communication for electric vehicles and their charging points is already well established by the ISO 15118 standard. The standard allows vehicles to communicate with the charging station using the power cable, i.e. a wired link, but it is improved to enable wireless (WLAN) links as well. This paper aims to provide an implementation accomplishes a wireless authentication solution (WAS). With that the electric vehicles can establish V2G connection when approaching the charging pool, then identify and authenticate the driver and/or the vehicle. Furthermore, the paper presents a TTCN-3 based validation and verification (V&V) framework in order to test the conformance of the prototype implementation against the standard.","PeriodicalId":42504,"journal":{"name":"Infocommunications Journal","volume":"16 1","pages":""},"PeriodicalIF":1.1,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78812419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zhongqiang Luo, Wei Zhang, Lidong Zhu, Chengjie Li
In this paper, a robust blind source separation (BSS) algorithm is investigated based on a new cost function for noise suppression. This new cost function is established according to the criterion of minimum bit error rate (BER) incorporated into maximum likelihood (ML) principle based independent component analysis (ICA). With the help of natural gradient search, the blind separation work is carried out through optimizing this constructed cost function. Simulation results and analysis corroborate that the proposed blind separation algorithm can realize better performance in speed of convergence and separation accuracy as opposed to the conventional ML-based BSS.
{"title":"Minimum BER Criterion Based Robust Blind Separation for MIMO Systems","authors":"Zhongqiang Luo, Wei Zhang, Lidong Zhu, Chengjie Li","doi":"10.36244/icj.2019.1.5","DOIUrl":"https://doi.org/10.36244/icj.2019.1.5","url":null,"abstract":"In this paper, a robust blind source separation (BSS) algorithm is investigated based on a new cost function for noise suppression. This new cost function is established according to the criterion of minimum bit error rate (BER) incorporated into maximum likelihood (ML) principle based independent component analysis (ICA). With the help of natural gradient search, the blind separation work is carried out through optimizing this constructed cost function. Simulation results and analysis corroborate that the proposed blind separation algorithm can realize better performance in speed of convergence and separation accuracy as opposed to the conventional ML-based BSS.","PeriodicalId":42504,"journal":{"name":"Infocommunications Journal","volume":"1 1","pages":""},"PeriodicalIF":1.1,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89291251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, performance of device-to-device (D2D) communication system over Fluctuating Beckmann (FB) fading channels is analyzed. FB fading model is a novel generalized fading model that unifies various fading models such as Rayleigh, Nakagami, one-sided Gaussian, Rician, Rician shadowed, κ-μ, κ-μ shadowed, η-μ and Beckmann. The considered D2D system is assumed to be affected by various FB faded co-channel interferers. Using the characteristic function (CF) approach outage probability and success probability expressions are given. These expressions are functions of D2D and interference path-loss exponents, distance between the D2D devices, distances between interferers and the D2D receiver and, interference and D2D fading channel conditions. Maximum ratio combining (MRC) and selection combining (SC) based diversity schemes are considered to itigate channel fading effects. D2D communication system under various conditions of channel fading and interference is numerically analyzed and discussed.
{"title":"Performance Analysis of Communication System with Fluctuating Beckmann Fading","authors":"Zakir Hussain, A. Khan, H. Mehdi, Aamir Ali","doi":"10.36244/icj.2019.4.6","DOIUrl":"https://doi.org/10.36244/icj.2019.4.6","url":null,"abstract":"In this paper, performance of device-to-device (D2D) communication system over Fluctuating Beckmann (FB) fading channels is analyzed. FB fading model is a novel generalized fading model that unifies various fading models such as Rayleigh, Nakagami, one-sided Gaussian, Rician, Rician shadowed, κ-μ, κ-μ shadowed, η-μ and Beckmann. The considered D2D system is assumed to be affected by various FB faded co-channel interferers. Using the characteristic function (CF) approach outage probability and success probability expressions are given. These expressions are functions of D2D and interference path-loss exponents, distance between the D2D devices, distances between interferers and the D2D receiver and, interference and D2D fading channel conditions. Maximum ratio combining (MRC) and selection combining (SC) based diversity schemes are considered to itigate channel fading effects. D2D communication system under various conditions of channel fading and interference is numerically analyzed and discussed.","PeriodicalId":42504,"journal":{"name":"Infocommunications Journal","volume":"27 1","pages":""},"PeriodicalIF":1.1,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80926513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Two types of MAC mechanisms i.e., random access and reservation could be adopted for OFDMA-based wireless LANs. Reservation-based MAC is more appropriate than random access MAC for connection-oriented applications as connectionoriented applications provide strict requirements of traffic demands. On the other hand, random access mechanism is a preferred choice for bursty traffic i.e., data packets which have no fixed pattern and rate. As OFDMA-based wireless networks promise to support heterogeneous applications, researchers assume that applications with and without traffic specifications will coexist. Eventually, OFDMA-based wireless LAN will deploy hybrid MAC mechanisms inheriting traits from random access and reservation. In this article, we design a new MAC protocol which employs one kind of hybrid mechanism that will provide high throughput of data as well as maintains improved fair access policy to the medium among the terminals. The protocol works in two steps, where at step 1 sub-channels are approximately evenly distributed to the terminals and at step 2 terminals within in a subchannel will contend for medium randomly if the total number of terminals of the system is larger than the number of sub-channels. The details of the protocol is illustrated in the paper and we analyze the performance of our OFDMA-based multi-channel hybrid protocol using comprehensive computer simulations. Simulation results validate that our proposed protocol is more robust than the conventional CSMA/CA protocol in terms of throughput, collision reduction and fair access. In addition, the theoretical analysis of the saturation throughput of the protocol is also evaluated using an existing comprehensive model.
{"title":"An OFDMA-based Hybrid MAC Protocol for IEEE 802.11ax","authors":"G. Z. Islam, M. A. Kashem","doi":"10.36244/icj.2019.2.6","DOIUrl":"https://doi.org/10.36244/icj.2019.2.6","url":null,"abstract":"Two types of MAC mechanisms i.e., random access and reservation could be adopted for OFDMA-based wireless LANs. Reservation-based MAC is more appropriate than random access MAC for connection-oriented applications as connectionoriented applications provide strict requirements of traffic demands. On the other hand, random access mechanism is a preferred choice for bursty traffic i.e., data packets which have no fixed pattern and rate. As OFDMA-based wireless networks promise to support heterogeneous applications, researchers assume that applications with and without traffic specifications will coexist. Eventually, OFDMA-based wireless LAN will deploy hybrid MAC mechanisms inheriting traits from random access and reservation. In this article, we design a new MAC protocol which employs one kind of hybrid mechanism that will provide high throughput of data as well as maintains improved fair access policy to the medium among the terminals. The protocol works in two steps, where at step 1 sub-channels are approximately evenly distributed to the terminals and at step 2 terminals within in a subchannel will contend for medium randomly if the total number of terminals of the system is larger than the number of sub-channels. The details of the protocol is illustrated in the paper and we analyze the performance of our OFDMA-based multi-channel hybrid protocol using comprehensive computer simulations. Simulation results validate that our proposed protocol is more robust than the conventional CSMA/CA protocol in terms of throughput, collision reduction and fair access. In addition, the theoretical analysis of the saturation throughput of the protocol is also evaluated using an existing comprehensive model.","PeriodicalId":42504,"journal":{"name":"Infocommunications Journal","volume":"13 1","pages":""},"PeriodicalIF":1.1,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81162977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The Internet of Things (IoT) enables many new and exciting applications, but it also creates a number of new risks related to information security. Several recent attacks on IoT devices and systems illustrate that they are notoriously insecure. It has also been shown that a major part of the attacks resulted in full adversarial control over IoT devices, and the reason for this is that IoT devices themselves are weakly protected and they often cannot resist even the most basic attacks. Penetration testing or ethical hacking of IoT devices can help discovering and fixing their vulnerabilities that, if exploited, can result in highly undesirable conditions, including damage of expensive physical equipment or even loss of human life. In this paper, we give a basic introduction into hacking IoT devices. We give an overview on the methods and tools for hardware hacking, firmware extraction and unpacking, and performing basic firmware analysis. We also provide a survey on recent research on more advanced firmware analysis methods, including static and dynamic analysis of binaries, taint analysis, fuzzing, and symbolic execution techniques. By giving an overview on both practical methods and readily available tools as well as current scientific research efforts, our work can be useful for both practitioners and academic researchers.
{"title":"IoT Hacking – A Primer","authors":"Dorottya Papp, Kristóf Tamás, Levente Buttyán","doi":"10.36244/icj.2019.2.1","DOIUrl":"https://doi.org/10.36244/icj.2019.2.1","url":null,"abstract":"The Internet of Things (IoT) enables many new and exciting applications, but it also creates a number of new risks related to information security. Several recent attacks on IoT devices and systems illustrate that they are notoriously insecure. It has also been shown that a major part of the attacks resulted in full adversarial control over IoT devices, and the reason for this is that IoT devices themselves are weakly protected and they often cannot resist even the most basic attacks. Penetration testing or ethical hacking of IoT devices can help discovering and fixing their vulnerabilities that, if exploited, can result in highly undesirable conditions, including damage of expensive physical equipment or even loss of human life. In this paper, we give a basic introduction into hacking IoT devices. We give an overview on the methods and tools for hardware hacking, firmware extraction and unpacking, and performing basic firmware analysis. We also provide a survey on recent research on more advanced firmware analysis methods, including static and dynamic analysis of binaries, taint analysis, fuzzing, and symbolic execution techniques. By giving an overview on both practical methods and readily available tools as well as current scientific research efforts, our work can be useful for both practitioners and academic researchers.","PeriodicalId":42504,"journal":{"name":"Infocommunications Journal","volume":"32 1","pages":""},"PeriodicalIF":1.1,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73291041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
5G networks provide technology enablers targeting industrial applications. One key enabler is the Ultra Reliable Low Latency Communication (URLLC). This paper studies the performance impact of network delay on closed-loop control for industrial applications. We investigate the performance of the closed-loop control of an UR5 industrial robot arm assuming fix delay. The goal is to stress the system at the upper limit of the possible network delay. We prove that to achieve the maximum speed, URLLC is a must have.
{"title":"Performance Evaluation of Closed-loop Industrial Applications Over Imperfect Networks","authors":"Sándor Rácz, G. Szabó, József Peto","doi":"10.36244/icj.2019.2.4","DOIUrl":"https://doi.org/10.36244/icj.2019.2.4","url":null,"abstract":"5G networks provide technology enablers targeting industrial applications. One key enabler is the Ultra Reliable Low Latency Communication (URLLC). This paper studies the performance impact of network delay on closed-loop control for industrial applications. We investigate the performance of the closed-loop control of an UR5 industrial robot arm assuming fix delay. The goal is to stress the system at the upper limit of the possible network delay. We prove that to achieve the maximum speed, URLLC is a must have.","PeriodicalId":42504,"journal":{"name":"Infocommunications Journal","volume":"35 1","pages":""},"PeriodicalIF":1.1,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88063837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
We propose a novel and simple approach to algebraic attack on block ciphers with the SAT-solvers. As opposed to a standard approach, the equations for key expansion algorithms are not included in the formulas that are converted to satisfiability problem. The lack of equations leads to finding the solution much faster. The method was used to attack a lightweight block ciphers SIMON and SPECK. We report the timings for roundreduced versions of selected ciphers and discuss the potential factors affecting the execution time of our attack.
{"title":"SAT Attacks on ARX Ciphers with Automated Equations Generation","authors":"Michal Andrzejczak, Władysław Dudzic","doi":"10.36244/icj.2019.4.1","DOIUrl":"https://doi.org/10.36244/icj.2019.4.1","url":null,"abstract":"We propose a novel and simple approach to algebraic attack on block ciphers with the SAT-solvers. As opposed to a standard approach, the equations for key expansion algorithms are not included in the formulas that are converted to satisfiability problem. The lack of equations leads to finding the solution much faster. The method was used to attack a lightweight block ciphers SIMON and SPECK. We report the timings for roundreduced versions of selected ciphers and discuss the potential factors affecting the execution time of our attack.","PeriodicalId":42504,"journal":{"name":"Infocommunications Journal","volume":"102 1","pages":""},"PeriodicalIF":1.1,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79411525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}