17,232 research outputs found

    On the Security of the Automatic Dependent Surveillance-Broadcast Protocol

    Full text link
    Automatic dependent surveillance-broadcast (ADS-B) is the communications protocol currently being rolled out as part of next generation air transportation systems. As the heart of modern air traffic control, it will play an essential role in the protection of two billion passengers per year, besides being crucial to many other interest groups in aviation. The inherent lack of security measures in the ADS-B protocol has long been a topic in both the aviation circles and in the academic community. Due to recently published proof-of-concept attacks, the topic is becoming ever more pressing, especially with the deadline for mandatory implementation in most airspaces fast approaching. This survey first summarizes the attacks and problems that have been reported in relation to ADS-B security. Thereafter, it surveys both the theoretical and practical efforts which have been previously conducted concerning these issues, including possible countermeasures. In addition, the survey seeks to go beyond the current state of the art and gives a detailed assessment of security measures which have been developed more generally for related wireless networks such as sensor networks and vehicular ad hoc networks, including a taxonomy of all considered approaches.Comment: Survey, 22 Pages, 21 Figure

    Application of automatic vehicle location in law enforcement: An introductory planning guide

    Get PDF
    A set of planning guidelines for the application of automatic vehicle location (AVL) to law enforcement is presented. Some essential characteristics and applications of AVL are outlined; systems in the operational or planning phases are discussed. Requirements analysis, system concept design, implementation planning, and performance and cost modeling are described and demonstrated with numerous examples. A detailed description of a typical law enforcement AVL system, and a list of vendor sources are given in appendixes

    Design and Implementation of a Secondary Surveillance Radar/Identification Friend or Foe Transceiver Card

    Get PDF
    The performance of SSR/IFF equipment, i.e. the transponder or the interrogator, can be tested by means of an SSR/IFF test set, which is usually extremely expensive, hard to transport and requires end-user certificates. This dissertation thus focuses on the design and implementation of a short-range real- time SSR/IFF Transceiver Card (ITRC), which can be used as an experimental platform for SSR/IFF test applications. User requirements are provided and analysed, resulting in a system breakdown structure, where for each subsystem a summary of related concepts is presented in order to produce the technical requirements for the system. The hardware was designed to be smaller, lighter, less expensive and easy to repair than conventional SSR/IFF test sets. When it has been integrated with an existing SSR/IFF reply emulator, it is capable of generating and analysing RF SSR/IFF signals for modes 1, 2, 3/A, C and secure mode 4 at a frequency of 1030 MHz and 1090 MHz in order to test the functionality of the interrogator and transponder. Verification for the design was accomplished by testing the transceiver hardware and then integrating the system with SSR/IFF transponder and interrogator. The results achieved were found to be compliant with the user requirements

    Assessing the wider benefits arising from university-based research

    Get PDF
    In November 2012, the Government announced its intention to assess the broader economic, social and environmental benefits arising from all elements of government research investment, including those benefits arising from university-based research. In support of this work, the Department of Industry, Innovation, Climate Change, Science, Research and Tertiary Education, in consultation with the Australian Research Council, has prepared a discussion paper on Assessing the wider benefits arising from university-based research.The discussion paper is now available at www.innovation.gov.au/impactThe department invites responses to the issues raised in the paper.A preferred template for responses is also available online.Submissions are due by 16 August 2013. Scope of this paper: Research  is  undertaken  across  many  sectors  including  industry,  universities,  research  institutes  and   publicly  funded  research  agencies.  This  paper  relates  specifically  to  research  undertaken  in   universities  because  of  the  volume  of  data  that  is  already  collected  from  these  institutions  and  the   opportunity  to  build  on  the  assessment  of  research  quality  through  the  Excellence  in  Research  for   Australia  (ERA)  initiative.  The  research  and  engagement  activities  undertaken  within  publicly  funded   research  agencies,  independent  research  institutes  and  within  business  outside  of  universities  are   out  of  scope  for  this  consultation. &nbsp

    Patent analysis, detection of new markets for employment: Example of technologies related to the aging of population

    No full text
    International audienceAs regards of employment creation, the services for the elderly are an expending market area. But, this is only one aspect of the solution, because the apparatuses, equipment and systems likely to help the elderly people constitute also a source of employment of high added value for industrial production. This field of study is analyzed using the APA (Automatic Patent Analysis). The world patent database from the EPO (the European Patent Office), covers more than 90 countries and provides access to approximately 80 million notices. This living technological encyclopedia can be exploited via bibliometric analysis to provide an accurate view of the trend of the technological environment related to the elderly people. After having determined the most exactly as possible the elements of querying the base, the search result was downloaded and analyzed. Various tendencies were determined: technological change and chronology of patent deposits, applicants, orientations of the R&D by country, etc. This leads to knowledge of the environment of this field and among other current developments, potential markets and the main actors as well as the possible entrants. These results are useful because they allow companies having competencies close to that used in the patents selected, to consider a diversification in this field. (Kister & Dou, 2011). Then a query on a database of scientific publications will be able to supplement the patent information to analyze the world of the scientific research in the field and to initiate possible PPP (Public and Private Partnerships) between industry, research and policy makers.En matière de création emploi, les services à la personne et à l'aide aux personnes âgées sont un créneau porteur. Mais, ceci n'est qu'un aspect de la solution, car les appareils, appareillages et systèmes susceptibles d'aider les personnes âgées constituent aussi une source d'emploi à forte valeur ajoutée car de production industrielle. Ce champ d'étude a été analysé à partir de l'APA (Analyse Automatique des Brevets). La base mondiale des brevets de l'OEB (Office Européen des Brevets), couvre plus de 90 pays et donne accès à environ 80 millions de notices. Cette encyclopédie technologique vivante peut être exploitée via des analyses bibliométriques pour fournir une vision précise de l'évolution de l'environnement technologique lié aux personnes âgées. Après avoir déterminé le plus exactement possible les éléments de l'interrogation de la base, le résultat de la recherche a été téléchargé et analysé. Les différentes tendances : évolution technologique et chronologie des dépôts, déposants, orientations des dépôts par pays, etc. ont été déterminés. Ceci conduit à une connaissance de l'environnement de ce domaine et entre autre les évolutions en cours, les marchés possibles et les principaux acteurs impliqués. Ces résultats sont utiles car ils permettent à des entreprises possédant un savoir proche de celui utilisé dans les brevets sélectionnés d'envisager une diversification dans ce domaine. (Kister & Dou, 2011). Ensuite une interrogation d'une base de données de publications scientifiques pourra compléter l'analyse pour analyser le monde de la recherche scientifique dans le domaine et initier des rapprochements avec le monde industriel

    Bridges Structural Health Monitoring and Deterioration Detection Synthesis of Knowledge and Technology

    Get PDF
    INE/AUTC 10.0

    Information-Theoretically Secret Reed-Muller Identification with Affine Designs

    Full text link
    We consider the problem of information-theoretic secrecy in identification schemes rather than transmission schemes. In identification, large identities are encoded into small challenges sent with the sole goal of allowing at the receiver reliable verification of whether the challenge could have been generated by a (possibly different) identity of his choice. One of the reasons to consider identification is that it trades decoding for an exponentially larger rate, however this may come with such encoding complexity and latency that it can render this advantage unusable. Identification still bears one unique advantage over transmission in that practical implementation of information-theoretic secrecy becomes possible, even considering that the information-theoretic secrecy definition needed in identification is that of semantic secrecy. Here, we implement a family of encryption schemes, recently shown to achieve semantic-secrecy capacity, and apply it to a recently-studied family of identification codes, confirming that, indeed, adding secrecy to identification comes at essentially no cost. While this is still within the one-way communication scenario, it is a necessary step into implementing semantic secrecy with two-way communication, where the information-theoretic assumptions are more realistic.Comment: 6 pages, 3 figures, accepted at European Wireless 202
    • …
    corecore