7 research outputs found

    SELECTIVE FORWARD ERROR CORRECTION WITH FULL DUPLEX FEEDBACK LOOP

    Get PDF
    Numerous techniques exist for detecting and correcting errors that are introduced during the transmission of information (e.g., a data frame) between two pieces of network equipment, including, for example, forward error correction (FEC), cyclic redundancy check (CRC), hybrid automatic repeat request (HARQ), etc. Use of such techniques carries a cost, often shared between the transmitter and the receiver, comprising increased latency, consumption of bandwidth, the use of computational resources for verification and correction, etc. Techniques are presented herein that support a new method for detecting and correcting errors that leverages a return channel of a bidirectional radio environment to provide a feedback loop through which FEC may be focused just on the areas of a frame that are poorly received, thereby avoiding the latency, bandwidth, etc. costs that would be associated with retransmission of areas of the frame that are well received. The techniques presented herein build on new capabilities of full duplex radios and apply to, for example, Wi-FiÂź 6 and 7 and Third Generation Partnership Project (3GPP) Fifth Generation (5G) networks

    ENHANCED NETWORK SLICING FOR INDUSTRIAL AND ENERGY PROTOCOLS

    Get PDF
    With the development of industry 4.0 and the recent evolution of the substation automation, as prescribed at least by the International Electrotechnical Commission (IEC) 61850 Standard, the network is becoming one of the key element of these trends. Network design and network architecture are becoming more and more complex and leading to challenging problems and issues, such as network security, multiplication of unmanaged broadcast domains, and bandwidth limitations. Recent tools have been introduced to help network engineers visualize different industrial Internet of Things (IIoT) protocol flows and characterizations for devices connected to the network. However, visualization is not enough and any help in the design and configuration of the network would be a great differentiator. Techniques herein provide for the ability to utilize sensors to build a network map of industrial and power data flows. The network map can then be used to configure different network slices with guaranteed bandwidth and flow isolation

    BootKeeper: Validating Software Integrity Properties on Boot Firmware Images

    Get PDF
    International audienceBoot firmware, like UEFI-compliant firmware, has been the target of numerous attacks, giving the attacker control over the entire system while being undetected. The measured boot mechanism of a computer platform ensures its integrity by using cryptographic measurements to detect such attacks. This is typically performed by relying on a Trusted Platform Module (TPM). Recent work, however, shows that vendors do not respect the specifications that have been devised to ensure the integrity of the firmware’s loading process. As a result, attackers may bypass such measurement mechanisms and successfully load a modified firmware image while remaining unnoticed. In this paper we introduce BootKeeper, a static analysis approach verifying a set of key security properties on boot firmware images before deployment, to ensure the integrity of the measured boot process. We evaluate BootKeeper against several attacks on common boot firmware implementations and demonstrate its applicability
    corecore