2,979 research outputs found

    BitTorrent Sync: First Impressions and Digital Forensic Implications

    Get PDF
    With professional and home Internet users becoming increasingly concerned with data protection and privacy, the privacy afforded by popular cloud file synchronisation services, such as Dropbox, OneDrive and Google Drive, is coming under scrutiny in the press. A number of these services have recently been reported as sharing information with governmental security agencies without warrants. BitTorrent Sync is seen as an alternative by many and has gathered over two million users by December 2013 (doubling since the previous month). The service is completely decentralised, offers much of the same synchronisation functionality of cloud powered services and utilises encryption for data transmission (and optionally for remote storage). The importance of understanding BitTorrent Sync and its resulting digital investigative implications for law enforcement and forensic investigators will be paramount to future investigations. This paper outlines the client application, its detected network traffic and identifies artefacts that may be of value as evidence for future digital investigations.Comment: Proc. of Digtial Forensics Research Workshop (DFRWS EU 2014

    Improving Air Interface User Privacy in Mobile Telephony

    Full text link
    Although the security properties of 3G and 4G mobile networks have significantly improved by comparison with 2G (GSM), significant shortcomings remain with respect to user privacy. A number of possible modifications to 2G, 3G and 4G protocols have been proposed designed to provide greater user privacy; however, they all require significant modifications to existing deployed infrastructures, which are almost certainly impractical to achieve in practice. In this article we propose an approach which does not require any changes to the existing deployed network infrastructures or mobile devices, but offers improved user identity protection over the air interface. The proposed scheme makes use of multiple IMSIs for an individual USIM to offer a degree of pseudonymity for a user. The only changes required are to the operation of the authentication centre in the home network and to the USIM, and the scheme could be deployed immediately since it is completely transparent to the existing mobile telephony infrastructure. We present two different approaches to the use and management of multiple IMSIs

    Energy-efficient wireless communication

    Get PDF
    In this chapter we present an energy-efficient highly adaptive network interface architecture and a novel data link layer protocol for wireless networks that provides Quality of Service (QoS) support for diverse traffic types. Due to the dynamic nature of wireless networks, adaptations in bandwidth scheduling and error control are necessary to achieve energy efficiency and an acceptable quality of service. In our approach we apply adaptability through all layers of the protocol stack, and provide feedback to the applications. In this way the applications can adapt the data streams, and the network protocols can adapt the communication parameters

    A qualitative cybersecurity analysis of time-triggered communication networks in automotive systems

    Get PDF
    © 2023 The Authors. Published by Elsevier B.V. This is an open access article under the CC BY license. (http://creativecommons.org/licenses/by/4.0/).Security is gaining increasing importance in automotive systems, driven by technical innovations. For example, automotive vehicles become more open systems, allowing the communication with other traffic participants and road infrastructure. Also, automotive vehicles are provided with increased autonomy which raises severe safety concerns, and consequently also security concerns – both concerns that interweave in such systems. In this paper we present a qualitative cybersecurity analysis by comparing different time-triggered (TT) communication networks. While TT communication networks have been analysed extensively for dependability, the contribution of this work is to identify security-related benefits that TT communication networks can provide. In particular, their mechanisms for spacial and temporal encapsulation of network traffic are instrumental to improve network security. The security arguments can be used as a design guide for implementing critical communication in flexible network standards like TSN.Peer reviewe

    Power conversion for a modular lightweight direct-drive wind turbine generator

    Get PDF
    A power conversion system for a modular lightweight direct-drive wind turbine generator has been proposed, based on a modular cascaded multilevel voltage-source inverter. Each module of the inverter is connected to two generator coils, which eliminates the problem of DC-link voltage balancing found in multilevel inverters with a large number of levels.The slotless design of the generator, and modular inverter, means that a high output voltage can be achieved from the inverter, while using standard components in the modules. Analysis of the high voltage issues shows that isolating the modules to a high voltage is easily possible, but insulating the generator coils could result in a signicant increase in the airgap size, reducing the generator effciency. A boost rectier input to the modules was calculated to have the highest electrical effciency of all the rectier systems tested, as well as the highest annual power extraction, while having a competitive cost. A rectier control system, based on estimating the generator EMF from the coil current and drawing a sinusoidal current in phase with the EMF, was developed. The control system can mitigate the problem of airgap eccentricity, likely to be present in a lightweight generator. A laboratory test rig was developed, based on two 2.5kW generators, with 12 coils each. A single phase of the inverter, with 12 power modules, was implemented, with each module featuring it's own microcontroller. The system is able to produce a good quality AC voltage waveform, and is able to tolerate the fault of a single module during operation. A decentralised inverter control system was developed, based on all modules estimating the grid voltage position and synchronising their estimates. Distributed output current limiting was also implemented, and the system is capable of riding through grid faults

    Protocol security for third generation telecommunication systems

    Get PDF
    In this thesis, a novel protocol stack architecture is presented. The Future Core Networks System (FCNS) forms a secure reference model for use in packet-switched structures, with its applicability ranging from computer to telecommunication networks. An insight on currently used network protocol systems is given, analysing standardised sets of communication rules with respect to the security they afford to the messages exchanged. The lack of protection schemes for the internal protocol stack messages and the implementation pitfalls of their security architectures are described, in relation to the effects they have on the communication process. The OSI security model is also considered, with disadvantages identified in the placement of security functionality and its management. The drawbacks depicted for currently used systems form the motivation behind this work. The analysis of the FCNS follows, which is composed of three parts. In the first part, the FCNS communication layers are examined, with respect to the mechanisms used to establish, maintain and tear down a connection between peer entities. In the second part, the security mechanisms of the proposed reference architecture are given, including details on the FCNS keystream generator used for the security of the internal FCNS messages. Finally, the FCNS Error Protocol is depicted, illustrating the modes of operation and advantages it exhibits over currently used systems. The work then moves into presenting details of the software FCNS implementation, followed by the presentation of the results and measurements obtained by the case studies created. Comparisons are given in relation to the TCP/IP suite, to provide the means of identifying the FCNS applicability in various network environments. The work is concluded by presenting the FCNS functionality in delivering information for the UMTS, together with further work that may enhance the flexibility and use of the proposed architecture

    An efficient data transmission policy in an integrated voice-data ds-cdma network

    Get PDF
    CDMA schemes appear to be promising access techniques for coping with the requirements of third-generation mobile systems, mainly because of their flexibility. This paper proposes an adaptive S-ALOHA DS-CDMA access scheme as a method for integrating non-real time (i.e. Internet applications) and real-time (i.e. voice) services, by exploiting the potentials of CDMA under time-varying conditions. The adaptive component terminals autonomously change their transmission rate according to the total (voice+data) channel occupancy, so that the minimum possible data delay is almost always achieved.Peer ReviewedPostprint (published version

    Image fusion in the JPEG 2000 domain

    Get PDF

    Issues on packet transmissioin strategies in a TDD-TD/CDMA scenario

    Get PDF
    This paper presents a packet transmission scheme that deals with the problems of a TDD CDMA scenario with different levels of frame structure asymmetry in adjacent base stations by distributing the users in the slots depending on their Time Advance. A multiple access protocol and a scheduling algorithm are also proposed to provide a certain degree of Quality of Service.Peer ReviewedPostprint (published version

    Redundancy and Synchronisation Management in Mission- and Time-Critical Wireless Sensor Networks

    Get PDF
    Wireless sensor networks (WSNs) are a technology that has been increasingly adopted thanks to their ability to inexpensively and safely gather information in difficult-to-access environments. Because of this they are an invaluable tool to gather knowledge about health, usage, and performance parameters of products in any environment as well as identify the onset of, and avoid or mitigate, catastrophic failures. This chapter will introduce the benefits that WSNs can bring to the process of knowledge management for the development and maintenance of products as well as discuss emerging research trends regarding two prominent concerns inherent to WSNs: redundancy management and synchronisation. After reviewing these results, their impact and applicability to mission-critical applications will be discussed, as well as the interaction between the solutions
    corecore