695 research outputs found
A control theoretic approach for security of cyber-physical systems
In this dissertation, several novel defense methodologies for cyber-physical systems have been proposed. First, a special type of cyber-physical system, the RFID system, is considered for which a lightweight mutual authentication and ownership management protocol is proposed in order to protect the data confidentiality and integrity. Then considering the fact that the protection of the data confidentiality and integrity is insufficient to guarantee the security in cyber-physical systems, we turn to the development of a general framework for developing security schemes for cyber-physical systems wherein the cyber system states affect the physical system and vice versa. After that, we apply this general framework by selecting the traffic flow as the cyber system state and a novel attack detection scheme that is capable of capturing the abnormality in the traffic flow in those communication links due to a class of attacks has been proposed. On the other hand, an attack detection scheme that is capable of detecting both sensor and actuator attacks is proposed for the physical system in the presence of network induced delays and packet losses. Next, an attack detection scheme is proposed when the network parameters are unknown by using an optimal Q-learning approach. Finally, this attack detection and accommodation scheme has been further extended to the case where the network is modeled as a nonlinear system with unknown system dynamics --Abstract, page iv
Product life cycle information management in the electronics supply chain
Information availability and data transparency are key requirements from manufacturers when
supporting products throughout the life cycle, for example when implementing product service
systems. The application of embedded wireless technologies into printed circuit boards (PCBs) can
help bridging current knowledge gaps and to minimise both technical and financial risk through
reduced product downtime, improved quality of tracking and enhanced end-of-life decision
making. The application of embedded RFID into PCBs for life cycle monitoring of electronic
products to support Product Service Systems is discussed in this paper
Intelligent Feature Selection Techniques for Pattern Classification of Time-Domain Signals
Time-domain signals form the basis of analysis for a variety of applications, including those involving variable conditions or physical changes that result in degraded signal quality. Typical approaches to signal analysis fail under these conditions, as these types of changes often lie outside the scope of the domain\u27s basic analytic theory and are too complex for modeling. Sophisticated signal processing techniques are required as a result. In this work, we develop a robust signal analysis technique that is suitable for a wide variety of time-domain signal analysis applications. Statistical pattern classification routines are applied to problems of interest involving a physical change in the domain of the problem that translate into changes in the signal characteristics. The basis of this technique involves a signal transformation known as the Dynamic Wavelet Fingerprint, used to generate a feature space in addition to features related to the physical domain of the individual application. Feature selection techniques are explored that incorporate the context of the problem into the feature space reduction in an attempt to identify optimal representations of these data sets
Novel development of distributed manufacturing monitoring systems to support high cost and complexity manufacturing
In the current manufacturing environment, characterized by diverse change sources (e.g.
economical, technological, political, social) and integrated supply chains, success
demands close cooperation and coordination between stakeholders and agility. Tools
and systems based on software agents, intelligent products and virtual enterprises have
been developed to achieve such demands but either because of: (i) focus on a single
application; (ii) focus on a single product; (iii) separation between the product and its
information; or (iv) focus on a single system characteristic (e.g. hardware, software,
architecture, requirements) their use has been limited to trial or academic scenarios. In
this thesis a reusable distributed manufacturing monitoring system for harsh
environments, capable of addressing traceability and controllability requirements within
stakeholders and across high cost and complexity supply chains is presented. [Continues.
CriptografĂa ligera en dispositivos de identificaciĂłn por radiofrecuencia- RFID
Esta tesis se centra en el estudio de la tecnologĂa de identificaciĂłn por radiofrecuencia (RFID), la cual puede ser considerada como una de las tecnologĂas mĂĄs prometedoras dentro del ĂĄrea de la computaciĂłn ubicua. La tecnologĂa RFID podrĂa ser el sustituto de los cĂłdigos de barras. Aunque la tecnologĂa RFID ofrece numerosas ventajas frente a otros sistemas de identificaciĂłn, su uso lleva asociados riesgos de seguridad, los cuales no son fĂĄciles de resolver. Los sistemas RFID pueden ser clasificados, atendiendo al coste de las etiquetas, distinguiendo principalmente entre etiquetas de alto coste y de bajo coste. Nuestra investigaciĂłn se centra fundamentalmente en estas Ășltimas. El estudio y anĂĄlisis del estado del arte nos ha permitido identificar la necesidad de desarrollar soluciones criptogrĂĄficas ligeras adecuadas para estos dispositivos limitados. El uso de soluciones criptogrĂĄficas estĂĄndar supone una aproximaciĂłn correcta desde un punto de vista puramente teĂłrico. Sin embargo, primitivas criptogrĂĄficas estĂĄndar (funciones resumen, cĂłdigo de autenticaciĂłn de mensajes, cifradores de bloque/flujo, etc.) exceden las capacidades de las etiquetas de bajo coste. Por tanto, es necesario el uso de criptografĂa ligera._______________________________________This thesis examines the security issues of Radio Frequency Identification
(RFID) technology, one of the most promising technologies in the field of
ubiquitous computing. Indeed, RFID technology may well replace barcode
technology. Although it offers many advantages over other identification
systems, there are also associated security risks that are not easy to address.
RFID systems can be classified according to tag price, with distinction
between high-cost and low-cost tags. Our research work focuses mainly
on low-cost RFID tags. An initial study and analysis of the state of the
art identifies the need for lightweight cryptographic solutions suitable for
these very constrained devices. From a purely theoretical point of view,
standard cryptographic solutions may be a correct approach. However,
standard cryptographic primitives (hash functions, message authentication
codes, block/stream ciphers, etc.) are quite demanding in terms of circuit
size, power consumption and memory size, so they make costly solutions
for low-cost RFID tags. Lightweight cryptography is therefore a pressing
need.
First, we analyze the security of the EPC Class-1 Generation-2 standard,
which is considered the universal standard for low-cost RFID tags.
Secondly, we cryptanalyze two new proposals, showing their unsuccessful
attempt to increase the security level of the specification without much further
hardware demands. Thirdly, we propose a new protocol resistant to
passive attacks and conforming to low-cost RFID tag requirements. In this
protocol, costly computations are only performed by the reader, and security
related computations in the tag are restricted to very simple operations.
The protocol is inspired in the family of Ultralightweight Mutual Authentication
Protocols (UMAP: M2AP, EMAP, LMAP) and the recently proposed
SASI protocol. The thesis also includes the first published cryptanalysis of
xi
SASI under the weakest attacker model, that is, a passive attacker. Fourthly,
we propose a new protocol resistant to both passive and active attacks and
suitable for moderate-cost RFID tags. We adapt Shieh et.âs protocol for
smart cards, taking into account the unique features of RFID systems. Finally,
because this protocol is based on the use of cryptographic primitives
and standard cryptographic primitives are not supported, we address the
design of lightweight cryptographic primitives. Specifically, we propose
a lightweight hash function (Tav-128) and a lightweight Pseudo-Random
Number Generator (LAMED and LAMED-EPC).We analyze their security
level and performance, as well as their hardware requirements and show that both could be realistically implemented, even in low-cost RFID tags
Experimental Assessment of Orientation Sensing and Constructive Interference in Passive RFID Systems
EXPERIMENTAL INVESTIGATION TO INFORM OPTIMAL CONFIGURATIONS FOR DYNAMIC NEAR-FIELD PASSIVE UHF RFID SYSTEMS
RFID has been characterized as a âdisruptive technologyâ that has the potential to revolutionize numerous key sectors. A key advantage of passive RFID applications is the ability to wirelessly transmit automatic identification and related information using very little power. This paper presents an experimental investigation to inform the optimal configuration for programming passive ultra-high frequency (UHF) RFID media in dynamic applications. Dynamic programming solutions must be designed around the tagâs functionality, the physical programming configuration and environment. In this investigation, we present a methodology to determine an optimal configuration to maximize the systems programming efficiency for dynamic applications
Dense and long-term monitoring of Earth surface processes with passive RFID -- a review
Billions of Radio-Frequency Identification (RFID) passive tags are produced
yearly to identify goods remotely. New research and business applications are
continuously arising, including recently localization and sensing to monitor
earth surface processes. Indeed, passive tags can cost 10 to 100 times less
than wireless sensors networks and require little maintenance, facilitating
years-long monitoring with ten's to thousands of tags. This study reviews the
existing and potential applications of RFID in geosciences. The most mature
application today is the study of coarse sediment transport in rivers or
coastal environments, using tags placed into pebbles. More recently, tag
localization was used to monitor landslide displacement, with a centimetric
accuracy. Sensing tags were used to detect a displacement threshold on unstable
rocks, to monitor the soil moisture or temperature, and to monitor the snowpack
temperature and snow water equivalent. RFID sensors, available today, could
monitor other parameters, such as the vibration of structures, the tilt of
unstable boulders, the strain of a material, or the salinity of water. Key
challenges for using RFID monitoring more broadly in geosciences include the
use of ground and aerial vehicles to collect data or localize tags, the
increase in reading range and duration, the ability to use tags placed under
ground, snow, water or vegetation, and the optimization of economical and
environmental cost. As a pattern, passive RFID could fill a gap between
wireless sensor networks and manual measurements, to collect data efficiently
over large areas, during several years, at high spatial density and moderate
cost.Comment: Invited paper for Earth Science Reviews. 50 pages without references.
31 figures. 8 table
COMPLEX PULSE FORMING TEACHNIQUE USING AM DETECTOR TYPE CIRCUITRY AND THE APPLICATION OF CDMA TO RFID FOR THE SIMULTANEOUS READING OF MULTIPLE TAGS
A novel complex ultra wideband RF pulse forming technique has been implemented in this research, using the coefficients derived from discrete Fourier transform of a virtual pulse train. Incorporated in this technique is a multiple frequency communication systems designed such that transmitter receiver proximity and the fading effect of the individual frequencies make part of a corresponding modulation technique. A code division multiple access (CDMA) application to RFID to greatly reduce read time, while at the same time eliminating inter tag interference, has been investigated with the analysis of a typical cart aisle scenario. With the current rate of growth of inventory world wide there is a tremendous need for more efficient method of data gathering, data storage, and data retrieval. In this dissertation, the application of the CDMA RFID technology has been analyzed to demonstrate the potentials of integrating the RFID technology to the EPC global numbering system
- âŠ