首页 > 最新文献

Infocommunications Journal最新文献

英文 中文
The Processing Algorithm for Wideband Signals Propagating in Media with Frequency Dispersion 频散介质中宽带信号传播的处理算法
IF 1.1 Q4 TELECOMMUNICATIONS Pub Date : 2020-01-01 DOI: 10.36244/icj.2020.3.1
A. A. Kalshchikov, V. V. Shtykov, S. Smolskiy
The new processing algorithm for wideband signals, which are propagating in frequency dispersion media, is developed in the context of the ground penetrating radar technology. The mathematical substantiation of offered method is presented on the base of linear functional spaces. The method is described for calculation acceleration on the base of the recursive approach. Results of numerical modeling of this method are presented for electromagnetic waves propagating in frequency dispersion media at utilization of chirp pulse signals. The Debye model is used as the model of electrical medium properties. The frequency dispersion of losses in the medium is taken into consideration at modeling. Results of operation modeling of the ground penetrating radar are described. Results of this paper will be useful for the ground penetrating radar technology and the ultrasonic flaw detection.
针对在频散介质中传播的宽带信号,在探地雷达技术的背景下,提出了一种新的处理算法。在线性泛函空间的基础上,给出了所提方法的数学证明。介绍了在递归法的基础上计算加速度的方法。给出了利用啁啾脉冲信号在频散介质中传播的电磁波的数值模拟结果。采用德拜模型作为电介质性质的模型。在建模时考虑了介质中损耗的频散。介绍了探地雷达工作建模的结果。本文的研究结果对探地雷达技术和超声波探伤具有一定的指导意义。
{"title":"The Processing Algorithm for Wideband Signals Propagating in Media with Frequency Dispersion","authors":"A. A. Kalshchikov, V. V. Shtykov, S. Smolskiy","doi":"10.36244/icj.2020.3.1","DOIUrl":"https://doi.org/10.36244/icj.2020.3.1","url":null,"abstract":"The new processing algorithm for wideband signals, which are propagating in frequency dispersion media, is developed in the context of the ground penetrating radar technology. The mathematical substantiation of offered method is presented on the base of linear functional spaces. The method is described for calculation acceleration on the base of the recursive approach. Results of numerical modeling of this method are presented for electromagnetic waves propagating in frequency dispersion media at utilization of chirp pulse signals. The Debye model is used as the model of electrical medium properties. The frequency dispersion of losses in the medium is taken into consideration at modeling. Results of operation modeling of the ground penetrating radar are described. Results of this paper will be useful for the ground penetrating radar technology and the ultrasonic flaw detection.","PeriodicalId":42504,"journal":{"name":"Infocommunications Journal","volume":"16 1","pages":""},"PeriodicalIF":1.1,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85015601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Amplified spontaneous emission based quantum random number generator 基于放大自发发射的量子随机数发生器
IF 1.1 Q4 TELECOMMUNICATIONS Pub Date : 2020-01-01 DOI: 10.36244/icj.2020.2.2
Ádám Marosits, Ágoston Schranz, E. Udvary
There is an increasing need for true random bits, for which true random number generators (TRNG) are absolutely necessary, because the output of pseudo random number generators is deterministically calculated from the previous states. We introduce our quantum number generator (QRNG) based on amplified spontaneous emission (ASE), a truly random quantum physical process. The experimental setup utilizes the randomness of the process. In this system, optical amplifiers (based on ASE) play the major role. The suitable sampling rate is selected in order to build the fastest generator, while avoiding the correlation between consecutive bits. Furthermore, the applied post-processing increases the quality of the random bits. As a results of this, our system generated random bits which successfully passed the NIST tests. Our real-time generation system – which is currently a trial version implemented with cheap equipment – will be available for public use, generating real time random bits using a web page.
对真随机数的需求越来越大,因此真随机数生成器(TRNG)是绝对必要的,因为伪随机数生成器的输出是根据以前的状态确定地计算的。我们介绍了一种基于放大自发发射(ASE)的量子数发生器(QRNG),这是一种真正随机的量子物理过程。实验装置利用了过程的随机性。在该系统中,光放大器(基于ASE)起着主要作用。选择合适的采样率,以建立最快的发生器,同时避免连续位之间的相关。此外,应用后处理提高了随机比特的质量。因此,我们的系统生成的随机比特成功地通过了NIST的测试。我们的实时生成系统——目前是用廉价设备实现的试用版本——将可供公众使用,通过网页生成实时随机比特。
{"title":"Amplified spontaneous emission based quantum random number generator","authors":"Ádám Marosits, Ágoston Schranz, E. Udvary","doi":"10.36244/icj.2020.2.2","DOIUrl":"https://doi.org/10.36244/icj.2020.2.2","url":null,"abstract":"There is an increasing need for true random bits, for which true random number generators (TRNG) are absolutely necessary, because the output of pseudo random number generators is deterministically calculated from the previous states. We introduce our quantum number generator (QRNG) based on amplified spontaneous emission (ASE), a truly random quantum physical process. The experimental setup utilizes the randomness of the process. In this system, optical amplifiers (based on ASE) play the major role. The suitable sampling rate is selected in order to build the fastest generator, while avoiding the correlation between consecutive bits. Furthermore, the applied post-processing increases the quality of the random bits. As a results of this, our system generated random bits which successfully passed the NIST tests. Our real-time generation system – which is currently a trial version implemented with cheap equipment – will be available for public use, generating real time random bits using a web page.","PeriodicalId":42504,"journal":{"name":"Infocommunications Journal","volume":"18 1","pages":""},"PeriodicalIF":1.1,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77557255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Optimisation of Optical Network for Continuous-Variable Quantum Key Distribution by Means of Simulation 基于仿真的连续变量量子密钥分配光网络优化
IF 1.1 Q4 TELECOMMUNICATIONS Pub Date : 2020-01-01 DOI: 10.36244/icj.2020.2.3
Dávid Kóbor, E. Udvary
The unprecedented breakthrough in the field of quantum computing in the last several years is threatening with the exploitation of our current communication systems. To address this issue, researchers are getting more involved in finding methods to protect these systems. Amongst other tools, quantum key distribution could be a potentially applicable way to achieve the desired level of protection. In this paper we are evaluating the physical layer of an optical system realising continuous variable quantum key distribution (CVQKD) with simulations to determine its weak points and suggest methods to improve them. We found that polarisation dependent devices are crucial for proper operation, therefore we determined their most defining parameters from the point of operation and suggested extra optical devices to largely improve transmission quality. We also paid attention to polarisation controlling in these sort of systems. Our findings could be valuable as practical considerations to construct reliable CVQKD optical transmission links.
在过去的几年里,量子计算领域取得了前所未有的突破,这对我们当前的通信系统构成了威胁。为了解决这个问题,研究人员正在更多地参与寻找保护这些系统的方法。在其他工具中,量子密钥分发可能是实现所需保护级别的潜在适用方法。本文对实现连续可变量子密钥分发(CVQKD)的光学系统的物理层进行了仿真评估,以确定其弱点并提出改进方法。我们发现偏振相关器件对于正常运行至关重要,因此我们从运行的角度确定了它们最具决定性的参数,并建议额外的光学器件来大大提高传输质量。我们还关注了这类系统的极化控制。本研究结果对构建可靠的CVQKD光传输链路具有实际参考价值。
{"title":"Optimisation of Optical Network for Continuous-Variable Quantum Key Distribution by Means of Simulation","authors":"Dávid Kóbor, E. Udvary","doi":"10.36244/icj.2020.2.3","DOIUrl":"https://doi.org/10.36244/icj.2020.2.3","url":null,"abstract":"The unprecedented breakthrough in the field of quantum computing in the last several years is threatening with the exploitation of our current communication systems. To address this issue, researchers are getting more involved in finding methods to protect these systems. Amongst other tools, quantum key distribution could be a potentially applicable way to achieve the desired level of protection. In this paper we are evaluating the physical layer of an optical system realising continuous variable quantum key distribution (CVQKD) with simulations to determine its weak points and suggest methods to improve them. We found that polarisation dependent devices are crucial for proper operation, therefore we determined their most defining parameters from the point of operation and suggested extra optical devices to largely improve transmission quality. We also paid attention to polarisation controlling in these sort of systems. Our findings could be valuable as practical considerations to construct reliable CVQKD optical transmission links.","PeriodicalId":42504,"journal":{"name":"Infocommunications Journal","volume":"81 1","pages":""},"PeriodicalIF":1.1,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80483534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Wireless Authentication Solution and TTCN-3 based Test Framework for ISO-15118 Wireless V2G Communication ISO-15118无线V2G通信的无线认证方案和基于TTCN-3的测试框架
IF 1.1 Q4 TELECOMMUNICATIONS Pub Date : 2019-01-01 DOI: 10.36244/icj.2019.2.5
Z. Jakó, Ádám Knapp, N. E. Sayed
Vehicle to grid (V2G) communication for electric vehicles and their charging points is already well established by the ISO 15118 standard. The standard allows vehicles to communicate with the charging station using the power cable, i.e. a wired link, but it is improved to enable wireless (WLAN) links as well. This paper aims to provide an implementation accomplishes a wireless authentication solution (WAS). With that the electric vehicles can establish V2G connection when approaching the charging pool, then identify and authenticate the driver and/or the vehicle. Furthermore, the paper presents a TTCN-3 based validation and verification (V&V) framework in order to test the conformance of the prototype implementation against the standard.
ISO 15118标准已经很好地建立了电动汽车及其充电点的车辆到电网(V2G)通信。该标准允许车辆使用电缆(即有线链路)与充电站通信,但也改进为支持无线(WLAN)链路。本文旨在提供一个实现无线身份验证的解决方案(WAS)。这样,电动汽车就可以在接近充电池时建立V2G连接,然后对驾驶员和/或车辆进行识别和认证。此外,本文提出了一个基于TTCN-3的验证和验证(V&V)框架,以测试原型实现与标准的一致性。
{"title":"Wireless Authentication Solution and TTCN-3 based Test Framework for ISO-15118 Wireless V2G Communication","authors":"Z. Jakó, Ádám Knapp, N. E. Sayed","doi":"10.36244/icj.2019.2.5","DOIUrl":"https://doi.org/10.36244/icj.2019.2.5","url":null,"abstract":"Vehicle to grid (V2G) communication for electric vehicles and their charging points is already well established by the ISO 15118 standard. The standard allows vehicles to communicate with the charging station using the power cable, i.e. a wired link, but it is improved to enable wireless (WLAN) links as well. This paper aims to provide an implementation accomplishes a wireless authentication solution (WAS). With that the electric vehicles can establish V2G connection when approaching the charging pool, then identify and authenticate the driver and/or the vehicle. Furthermore, the paper presents a TTCN-3 based validation and verification (V&V) framework in order to test the conformance of the prototype implementation against the standard.","PeriodicalId":42504,"journal":{"name":"Infocommunications Journal","volume":"16 1","pages":""},"PeriodicalIF":1.1,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78812419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Minimum BER Criterion Based Robust Blind Separation for MIMO Systems 基于最小误码率准则的MIMO系统鲁棒盲分离
IF 1.1 Q4 TELECOMMUNICATIONS Pub Date : 2019-01-01 DOI: 10.36244/icj.2019.1.5
Zhongqiang Luo, Wei Zhang, Lidong Zhu, Chengjie Li
In this paper, a robust blind source separation (BSS) algorithm is investigated based on a new cost function for noise suppression. This new cost function is established according to the criterion of minimum bit error rate (BER) incorporated into maximum likelihood (ML) principle based independent component analysis (ICA). With the help of natural gradient search, the blind separation work is carried out through optimizing this constructed cost function. Simulation results and analysis corroborate that the proposed blind separation algorithm can realize better performance in speed of convergence and separation accuracy as opposed to the conventional ML-based BSS.
本文基于一种新的噪声抑制代价函数,研究了一种鲁棒盲源分离算法。将最小误码率(BER)准则与基于独立分量分析(ICA)的最大似然(ML)原理相结合,建立了新的代价函数。在自然梯度搜索的帮助下,通过优化构造的代价函数进行盲分离工作。仿真和分析结果表明,该盲分离算法在收敛速度和分离精度上都优于传统的基于ml的盲分离算法。
{"title":"Minimum BER Criterion Based Robust Blind Separation for MIMO Systems","authors":"Zhongqiang Luo, Wei Zhang, Lidong Zhu, Chengjie Li","doi":"10.36244/icj.2019.1.5","DOIUrl":"https://doi.org/10.36244/icj.2019.1.5","url":null,"abstract":"In this paper, a robust blind source separation (BSS) algorithm is investigated based on a new cost function for noise suppression. This new cost function is established according to the criterion of minimum bit error rate (BER) incorporated into maximum likelihood (ML) principle based independent component analysis (ICA). With the help of natural gradient search, the blind separation work is carried out through optimizing this constructed cost function. Simulation results and analysis corroborate that the proposed blind separation algorithm can realize better performance in speed of convergence and separation accuracy as opposed to the conventional ML-based BSS.","PeriodicalId":42504,"journal":{"name":"Infocommunications Journal","volume":"1 1","pages":""},"PeriodicalIF":1.1,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89291251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Analysis of Communication System with Fluctuating Beckmann Fading 具有波动贝克曼衰落的通信系统性能分析
IF 1.1 Q4 TELECOMMUNICATIONS Pub Date : 2019-01-01 DOI: 10.36244/icj.2019.4.6
Zakir Hussain, A. Khan, H. Mehdi, Aamir Ali
In this paper, performance of device-to-device (D2D) communication system over Fluctuating Beckmann (FB) fading channels is analyzed. FB fading model is a novel generalized fading model that unifies various fading models such as Rayleigh, Nakagami, one-sided Gaussian, Rician, Rician shadowed, κ-μ, κ-μ shadowed, η-μ and Beckmann. The considered D2D system is assumed to be affected by various FB faded co-channel interferers. Using the characteristic function (CF) approach outage probability and success probability expressions are given. These expressions are functions of D2D and interference path-loss exponents, distance between the D2D devices, distances between interferers and the D2D receiver and, interference and D2D fading channel conditions. Maximum ratio combining (MRC) and selection combining (SC) based diversity schemes are considered to itigate channel fading effects. D2D communication system under various conditions of channel fading and interference is numerically analyzed and discussed.
本文分析了波动贝克曼(FB)衰落信道下D2D通信系统的性能。FB衰落模型是将Rayleigh、Nakagami、片面高斯、fourier、fourier阴影、κ-μ、κ-μ阴影、η-μ、Beckmann等多种衰落模型统一起来的一种新型广义衰落模型。假设所考虑的D2D系统受到各种FB褪色同信道干扰的影响。利用特征函数法给出了故障概率和成功概率的表达式。这些表达式是D2D和干扰路径损耗指数、D2D设备之间的距离、干扰器与D2D接收器之间的距离以及干扰和D2D衰落信道条件的函数。考虑了基于最大比率组合(MRC)和基于选择组合(SC)的分集方案来消除信道衰落效应。对各种信道衰落和干扰条件下的D2D通信系统进行了数值分析和讨论。
{"title":"Performance Analysis of Communication System with Fluctuating Beckmann Fading","authors":"Zakir Hussain, A. Khan, H. Mehdi, Aamir Ali","doi":"10.36244/icj.2019.4.6","DOIUrl":"https://doi.org/10.36244/icj.2019.4.6","url":null,"abstract":"In this paper, performance of device-to-device (D2D) communication system over Fluctuating Beckmann (FB) fading channels is analyzed. FB fading model is a novel generalized fading model that unifies various fading models such as Rayleigh, Nakagami, one-sided Gaussian, Rician, Rician shadowed, κ-μ, κ-μ shadowed, η-μ and Beckmann. The considered D2D system is assumed to be affected by various FB faded co-channel interferers. Using the characteristic function (CF) approach outage probability and success probability expressions are given. These expressions are functions of D2D and interference path-loss exponents, distance between the D2D devices, distances between interferers and the D2D receiver and, interference and D2D fading channel conditions. Maximum ratio combining (MRC) and selection combining (SC) based diversity schemes are considered to itigate channel fading effects. D2D communication system under various conditions of channel fading and interference is numerically analyzed and discussed.","PeriodicalId":42504,"journal":{"name":"Infocommunications Journal","volume":"27 1","pages":""},"PeriodicalIF":1.1,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80926513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An OFDMA-based Hybrid MAC Protocol for IEEE 802.11ax 基于ofdma的IEEE 802.11ax混合MAC协议
IF 1.1 Q4 TELECOMMUNICATIONS Pub Date : 2019-01-01 DOI: 10.36244/icj.2019.2.6
G. Z. Islam, M. A. Kashem
Two types of MAC mechanisms i.e., random access and reservation could be adopted for OFDMA-based wireless LANs. Reservation-based MAC is more appropriate than random access MAC for connection-oriented applications as connectionoriented applications provide strict requirements of traffic demands. On the other hand, random access mechanism is a preferred choice for bursty traffic i.e., data packets which have no fixed pattern and rate. As OFDMA-based wireless networks promise to support heterogeneous applications, researchers assume that applications with and without traffic specifications will coexist. Eventually, OFDMA-based wireless LAN will deploy hybrid MAC mechanisms inheriting traits from random access and reservation. In this article, we design a new MAC protocol which employs one kind of hybrid mechanism that will provide high throughput of data as well as maintains improved fair access policy to the medium among the terminals. The protocol works in two steps, where at step 1 sub-channels are approximately evenly distributed to the terminals and at step 2 terminals within in a subchannel will contend for medium randomly if the total number of terminals of the system is larger than the number of sub-channels. The details of the protocol is illustrated in the paper and we analyze the performance of our OFDMA-based multi-channel hybrid protocol using comprehensive computer simulations. Simulation results validate that our proposed protocol is more robust than the conventional CSMA/CA protocol in terms of throughput, collision reduction and fair access. In addition, the theoretical analysis of the saturation throughput of the protocol is also evaluated using an existing comprehensive model.
基于ofdma的无线局域网可以采用随机接入和预留两种MAC机制。由于面向连接的应用对流量需求的要求比较严格,所以基于预约的MAC比随机接入的MAC更适合于面向连接的应用。另一方面,随机访问机制是突发流量(即没有固定模式和速率的数据包)的首选。由于基于ofdma的无线网络承诺支持异构应用,研究人员假设有和没有流量规范的应用将共存。最终,基于ofdma的无线局域网将采用混合MAC机制,继承随机接入和保留的特点。在本文中,我们设计了一种新的MAC协议,该协议采用一种混合机制,在提供高数据吞吐量的同时,在终端之间保持对介质的改进的公平访问策略。该协议分两步工作,在第一步,子信道近似均匀地分布到终端上,在第二步,如果系统的终端总数大于子信道的数量,则子信道内的终端将随机竞争介质。本文详细阐述了该协议的实现细节,并通过计算机仿真分析了基于ofdma的多通道混合协议的性能。仿真结果验证了我们提出的协议在吞吐量、减少冲突和公平接入方面比传统的CSMA/CA协议具有更高的鲁棒性。此外,还利用已有的综合模型对协议的饱和吞吐量进行了理论分析。
{"title":"An OFDMA-based Hybrid MAC Protocol for IEEE 802.11ax","authors":"G. Z. Islam, M. A. Kashem","doi":"10.36244/icj.2019.2.6","DOIUrl":"https://doi.org/10.36244/icj.2019.2.6","url":null,"abstract":"Two types of MAC mechanisms i.e., random access and reservation could be adopted for OFDMA-based wireless LANs. Reservation-based MAC is more appropriate than random access MAC for connection-oriented applications as connectionoriented applications provide strict requirements of traffic demands. On the other hand, random access mechanism is a preferred choice for bursty traffic i.e., data packets which have no fixed pattern and rate. As OFDMA-based wireless networks promise to support heterogeneous applications, researchers assume that applications with and without traffic specifications will coexist. Eventually, OFDMA-based wireless LAN will deploy hybrid MAC mechanisms inheriting traits from random access and reservation. In this article, we design a new MAC protocol which employs one kind of hybrid mechanism that will provide high throughput of data as well as maintains improved fair access policy to the medium among the terminals. The protocol works in two steps, where at step 1 sub-channels are approximately evenly distributed to the terminals and at step 2 terminals within in a subchannel will contend for medium randomly if the total number of terminals of the system is larger than the number of sub-channels. The details of the protocol is illustrated in the paper and we analyze the performance of our OFDMA-based multi-channel hybrid protocol using comprehensive computer simulations. Simulation results validate that our proposed protocol is more robust than the conventional CSMA/CA protocol in terms of throughput, collision reduction and fair access. In addition, the theoretical analysis of the saturation throughput of the protocol is also evaluated using an existing comprehensive model.","PeriodicalId":42504,"journal":{"name":"Infocommunications Journal","volume":"13 1","pages":""},"PeriodicalIF":1.1,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81162977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
IoT Hacking – A Primer 物联网黑客-入门
IF 1.1 Q4 TELECOMMUNICATIONS Pub Date : 2019-01-01 DOI: 10.36244/icj.2019.2.1
Dorottya Papp, Kristóf Tamás, Levente Buttyán
The Internet of Things (IoT) enables many new and exciting applications, but it also creates a number of new risks related to information security. Several recent attacks on IoT devices and systems illustrate that they are notoriously insecure. It has also been shown that a major part of the attacks resulted in full adversarial control over IoT devices, and the reason for this is that IoT devices themselves are weakly protected and they often cannot resist even the most basic attacks. Penetration testing or ethical hacking of IoT devices can help discovering and fixing their vulnerabilities that, if exploited, can result in highly undesirable conditions, including damage of expensive physical equipment or even loss of human life. In this paper, we give a basic introduction into hacking IoT devices. We give an overview on the methods and tools for hardware hacking, firmware extraction and unpacking, and performing basic firmware analysis. We also provide a survey on recent research on more advanced firmware analysis methods, including static and dynamic analysis of binaries, taint analysis, fuzzing, and symbolic execution techniques. By giving an overview on both practical methods and readily available tools as well as current scientific research efforts, our work can be useful for both practitioners and academic researchers.
物联网(IoT)使许多新的和令人兴奋的应用成为可能,但它也产生了许多与信息安全相关的新风险。最近对物联网设备和系统的几次攻击表明,它们是出了名的不安全。研究还表明,大部分攻击导致对物联网设备的完全对抗性控制,其原因是物联网设备本身的保护很弱,它们往往无法抵抗最基本的攻击。物联网设备的渗透测试或道德黑客攻击可以帮助发现和修复其漏洞,如果这些漏洞被利用,可能会导致非常不希望的情况,包括损坏昂贵的物理设备,甚至造成人员伤亡。在本文中,我们对入侵物联网设备进行了基本介绍。我们概述了硬件黑客攻击、固件提取和解包以及执行基本固件分析的方法和工具。我们还提供了对更先进的固件分析方法的最新研究的调查,包括二进制文件的静态和动态分析、污点分析、模糊测试和符号执行技术。通过对实际方法和现成工具以及当前科学研究成果的概述,我们的工作对从业者和学术研究人员都很有用。
{"title":"IoT Hacking – A Primer","authors":"Dorottya Papp, Kristóf Tamás, Levente Buttyán","doi":"10.36244/icj.2019.2.1","DOIUrl":"https://doi.org/10.36244/icj.2019.2.1","url":null,"abstract":"The Internet of Things (IoT) enables many new and exciting applications, but it also creates a number of new risks related to information security. Several recent attacks on IoT devices and systems illustrate that they are notoriously insecure. It has also been shown that a major part of the attacks resulted in full adversarial control over IoT devices, and the reason for this is that IoT devices themselves are weakly protected and they often cannot resist even the most basic attacks. Penetration testing or ethical hacking of IoT devices can help discovering and fixing their vulnerabilities that, if exploited, can result in highly undesirable conditions, including damage of expensive physical equipment or even loss of human life. In this paper, we give a basic introduction into hacking IoT devices. We give an overview on the methods and tools for hardware hacking, firmware extraction and unpacking, and performing basic firmware analysis. We also provide a survey on recent research on more advanced firmware analysis methods, including static and dynamic analysis of binaries, taint analysis, fuzzing, and symbolic execution techniques. By giving an overview on both practical methods and readily available tools as well as current scientific research efforts, our work can be useful for both practitioners and academic researchers.","PeriodicalId":42504,"journal":{"name":"Infocommunications Journal","volume":"32 1","pages":""},"PeriodicalIF":1.1,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73291041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Performance Evaluation of Closed-loop Industrial Applications Over Imperfect Networks 不完全网络下闭环工业应用的性能评价
IF 1.1 Q4 TELECOMMUNICATIONS Pub Date : 2019-01-01 DOI: 10.36244/icj.2019.2.4
Sándor Rácz, G. Szabó, József Peto
5G networks provide technology enablers targeting industrial applications. One key enabler is the Ultra Reliable Low Latency Communication (URLLC). This paper studies the performance impact of network delay on closed-loop control for industrial applications. We investigate the performance of the closed-loop control of an UR5 industrial robot arm assuming fix delay. The goal is to stress the system at the upper limit of the possible network delay. We prove that to achieve the maximum speed, URLLC is a must have.
5G网络为工业应用提供技术支持。一个关键的促成因素是超可靠低延迟通信(URLLC)。本文研究了工业应用中网络时延对闭环控制性能的影响。研究了在固定时滞条件下UR5工业机械臂的闭环控制性能。目标是使系统处于可能的网络延迟的上限。我们证明,要实现最大速度,URLLC是必须拥有的。
{"title":"Performance Evaluation of Closed-loop Industrial Applications Over Imperfect Networks","authors":"Sándor Rácz, G. Szabó, József Peto","doi":"10.36244/icj.2019.2.4","DOIUrl":"https://doi.org/10.36244/icj.2019.2.4","url":null,"abstract":"5G networks provide technology enablers targeting industrial applications. One key enabler is the Ultra Reliable Low Latency Communication (URLLC). This paper studies the performance impact of network delay on closed-loop control for industrial applications. We investigate the performance of the closed-loop control of an UR5 industrial robot arm assuming fix delay. The goal is to stress the system at the upper limit of the possible network delay. We prove that to achieve the maximum speed, URLLC is a must have.","PeriodicalId":42504,"journal":{"name":"Infocommunications Journal","volume":"35 1","pages":""},"PeriodicalIF":1.1,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88063837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
SAT Attacks on ARX Ciphers with Automated Equations Generation 基于自动生成方程的ARX密码的SAT攻击
IF 1.1 Q4 TELECOMMUNICATIONS Pub Date : 2019-01-01 DOI: 10.36244/icj.2019.4.1
Michal Andrzejczak, Władysław Dudzic
We propose a novel and simple approach to algebraic attack on block ciphers with the SAT-solvers. As opposed to a standard approach, the equations for key expansion algorithms are not included in the formulas that are converted to satisfiability problem. The lack of equations leads to finding the solution much faster. The method was used to attack a lightweight block ciphers SIMON and SPECK. We report the timings for roundreduced versions of selected ciphers and discuss the potential factors affecting the execution time of our attack.
我们提出了一种利用sat求解器对分组密码进行代数攻击的新颖而简单的方法。与标准方法相反,关键展开算法的方程不包括在转化为可满足性问题的公式中。由于没有方程,求解速度要快得多。利用该方法对轻量级分组密码SIMON和SPECK进行了攻击。我们报告了所选密码的缩减版本的时间,并讨论了影响攻击执行时间的潜在因素。
{"title":"SAT Attacks on ARX Ciphers with Automated Equations Generation","authors":"Michal Andrzejczak, Władysław Dudzic","doi":"10.36244/icj.2019.4.1","DOIUrl":"https://doi.org/10.36244/icj.2019.4.1","url":null,"abstract":"We propose a novel and simple approach to algebraic attack on block ciphers with the SAT-solvers. As opposed to a standard approach, the equations for key expansion algorithms are not included in the formulas that are converted to satisfiability problem. The lack of equations leads to finding the solution much faster. The method was used to attack a lightweight block ciphers SIMON and SPECK. We report the timings for roundreduced versions of selected ciphers and discuss the potential factors affecting the execution time of our attack.","PeriodicalId":42504,"journal":{"name":"Infocommunications Journal","volume":"102 1","pages":""},"PeriodicalIF":1.1,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79411525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
Infocommunications Journal
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1