17,232 research outputs found
On the Security of the Automatic Dependent Surveillance-Broadcast Protocol
Automatic dependent surveillance-broadcast (ADS-B) is the communications
protocol currently being rolled out as part of next generation air
transportation systems. As the heart of modern air traffic control, it will
play an essential role in the protection of two billion passengers per year,
besides being crucial to many other interest groups in aviation. The inherent
lack of security measures in the ADS-B protocol has long been a topic in both
the aviation circles and in the academic community. Due to recently published
proof-of-concept attacks, the topic is becoming ever more pressing, especially
with the deadline for mandatory implementation in most airspaces fast
approaching.
This survey first summarizes the attacks and problems that have been reported
in relation to ADS-B security. Thereafter, it surveys both the theoretical and
practical efforts which have been previously conducted concerning these issues,
including possible countermeasures. In addition, the survey seeks to go beyond
the current state of the art and gives a detailed assessment of security
measures which have been developed more generally for related wireless networks
such as sensor networks and vehicular ad hoc networks, including a taxonomy of
all considered approaches.Comment: Survey, 22 Pages, 21 Figure
Application of automatic vehicle location in law enforcement: An introductory planning guide
A set of planning guidelines for the application of automatic vehicle location (AVL) to law enforcement is presented. Some essential characteristics and applications of AVL are outlined; systems in the operational or planning phases are discussed. Requirements analysis, system concept design, implementation planning, and performance and cost modeling are described and demonstrated with numerous examples. A detailed description of a typical law enforcement AVL system, and a list of vendor sources are given in appendixes
Design and Implementation of a Secondary Surveillance Radar/Identification Friend or Foe Transceiver Card
The performance of SSR/IFF equipment, i.e. the transponder or the interrogator, can be tested by means of an SSR/IFF test set, which is usually extremely expensive, hard to transport and requires end-user certificates. This dissertation thus focuses on the design and implementation of a short-range real- time SSR/IFF Transceiver Card (ITRC), which can be used as an experimental platform for SSR/IFF test applications. User requirements are provided and analysed, resulting in a system breakdown structure, where for each subsystem a summary of related concepts is presented in order to produce the technical requirements for the system. The hardware was designed to be smaller, lighter, less expensive and easy to repair than conventional SSR/IFF test sets. When it has been integrated with an existing SSR/IFF reply emulator, it is capable of generating and analysing RF SSR/IFF signals for modes 1, 2, 3/A, C and secure mode 4 at a frequency of 1030 MHz and 1090 MHz in order to test the functionality of the interrogator and transponder. Verification for the design was accomplished by testing the transceiver hardware and then integrating the system with SSR/IFF transponder and interrogator. The results achieved were found to be compliant with the user requirements
Assessing the wider benefits arising from university-based research
In November 2012, the Government announced its intention to assess the broader economic, social and environmental benefits arising from all elements of government research investment, including those benefits arising from university-based research. In support of this work, the Department of Industry, Innovation, Climate Change, Science, Research and Tertiary Education, in consultation with the Australian Research Council, has prepared a discussion paper on Assessing the wider benefits arising from university-based research.The discussion paper is now available at www.innovation.gov.au/impactThe department invites responses to the issues raised in the paper.A preferred template for responses is also available online.Submissions are due by 16 August 2013. Scope of this paper: Research is undertaken across many sectors including industry, universities, research institutes and publicly funded research agencies. This paper relates specifically to research undertaken in universities because of the volume of data that is already collected from these institutions and the opportunity to build on the assessment of research quality through the Excellence in Research for Australia (ERA) initiative. The research and engagement activities undertaken within publicly funded research agencies, independent research institutes and within business outside of universities are out of scope for this consultation.  
Patent analysis, detection of new markets for employment: Example of technologies related to the aging of population
International audienceAs regards of employment creation, the services for the elderly are an expending market area. But, this is only one aspect of the solution, because the apparatuses, equipment and systems likely to help the elderly people constitute also a source of employment of high added value for industrial production. This field of study is analyzed using the APA (Automatic Patent Analysis). The world patent database from the EPO (the European Patent Office), covers more than 90 countries and provides access to approximately 80 million notices. This living technological encyclopedia can be exploited via bibliometric analysis to provide an accurate view of the trend of the technological environment related to the elderly people. After having determined the most exactly as possible the elements of querying the base, the search result was downloaded and analyzed. Various tendencies were determined: technological change and chronology of patent deposits, applicants, orientations of the R&D by country, etc. This leads to knowledge of the environment of this field and among other current developments, potential markets and the main actors as well as the possible entrants. These results are useful because they allow companies having competencies close to that used in the patents selected, to consider a diversification in this field. (Kister & Dou, 2011). Then a query on a database of scientific publications will be able to supplement the patent information to analyze the world of the scientific research in the field and to initiate possible PPP (Public and Private Partnerships) between industry, research and policy makers.En matière de création emploi, les services à la personne et à l'aide aux personnes âgées sont un créneau porteur. Mais, ceci n'est qu'un aspect de la solution, car les appareils, appareillages et systèmes susceptibles d'aider les personnes âgées constituent aussi une source d'emploi à forte valeur ajoutée car de production industrielle. Ce champ d'étude a été analysé à partir de l'APA (Analyse Automatique des Brevets). La base mondiale des brevets de l'OEB (Office Européen des Brevets), couvre plus de 90 pays et donne accès à environ 80 millions de notices. Cette encyclopédie technologique vivante peut être exploitée via des analyses bibliométriques pour fournir une vision précise de l'évolution de l'environnement technologique lié aux personnes âgées. Après avoir déterminé le plus exactement possible les éléments de l'interrogation de la base, le résultat de la recherche a été téléchargé et analysé. Les différentes tendances : évolution technologique et chronologie des dépôts, déposants, orientations des dépôts par pays, etc. ont été déterminés. Ceci conduit à une connaissance de l'environnement de ce domaine et entre autre les évolutions en cours, les marchés possibles et les principaux acteurs impliqués. Ces résultats sont utiles car ils permettent à des entreprises possédant un savoir proche de celui utilisé dans les brevets sélectionnés d'envisager une diversification dans ce domaine. (Kister & Dou, 2011). Ensuite une interrogation d'une base de données de publications scientifiques pourra compléter l'analyse pour analyser le monde de la recherche scientifique dans le domaine et initier des rapprochements avec le monde industriel
Bridges Structural Health Monitoring and Deterioration Detection Synthesis of Knowledge and Technology
INE/AUTC 10.0
Information-Theoretically Secret Reed-Muller Identification with Affine Designs
We consider the problem of information-theoretic secrecy in identification
schemes rather than transmission schemes. In identification, large identities
are encoded into small challenges sent with the sole goal of allowing at the
receiver reliable verification of whether the challenge could have been
generated by a (possibly different) identity of his choice. One of the reasons
to consider identification is that it trades decoding for an exponentially
larger rate, however this may come with such encoding complexity and latency
that it can render this advantage unusable. Identification still bears one
unique advantage over transmission in that practical implementation of
information-theoretic secrecy becomes possible, even considering that the
information-theoretic secrecy definition needed in identification is that of
semantic secrecy. Here, we implement a family of encryption schemes, recently
shown to achieve semantic-secrecy capacity, and apply it to a recently-studied
family of identification codes, confirming that, indeed, adding secrecy to
identification comes at essentially no cost. While this is still within the
one-way communication scenario, it is a necessary step into implementing
semantic secrecy with two-way communication, where the information-theoretic
assumptions are more realistic.Comment: 6 pages, 3 figures, accepted at European Wireless 202
- …