• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 93
  • 19
  • 19
  • 14
  • 14
  • 7
  • 7
  • 6
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 219
  • 46
  • 35
  • 31
  • 31
  • 22
  • 21
  • 19
  • 19
  • 18
  • 17
  • 16
  • 15
  • 15
  • 15
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
181

Security of NFC applications

Pham, Thi Van Anh January 2013 (has links)
Near Field Communication (NFC) refers to a communication technology that enables an effortless connection and data transfers between two devices by putting them in a close proximity. Besides contactless payment and ticketing applications, which were the original key drivers of this technology, a large number of novel use cases can benefit from this rapidly developing technology, as has been illustrated in various NFC-enabled application proposals and pilot trials. Typical NFC-enabled systems combine NFC tags, NFC-enabled mobile phones, and online servers. This thesis explores the trust relationships, security requirements, and security protocol design in these complex systems. We study how to apply the security features of different types of NFC tags to secure NFC applications. We first examine potential weaknesses and problems in some novel use cases where NFC can be employed. Thereafter, we analyze the requirements and propose our system design to secure each use case. In addition, we developed proof-of-concept implementations for two of our proposed protocols: an NFCenabled security-guard monitoring system and an NFC-enabled restaurant menu. For the former use case, we also formally verified our proposed security protocol.  Our analysis shows that among the discussed tags, the NFC tags based on secure memory cards have the least capability and flexibility. Their built-in three-pass mutual authentication can be used to prove the freshness of the event when the tag is tapped. The programmable contactless smart cards are more flexible because they can be programmed to implement new security protocols. In addition, they are able to keep track of a sequence number and can be used in systems that do not require application-specific software on the mobile phone. The sequence number enforces the order of events, thus providing a certain level of replay prevention. The most powerful type of tag is the emulated card since it provides a clock, greater computational capacity, and possibly its own Internet connection, naturally at higher cost of deployment. / Near Field Communication (NFC) hänvisar till en kommunikationsteknik som möjliggör en enkel anslutning och dataöverföring mellan två enheter genom att sätta dem i en närhet. Förutom kontaktlös betalning och biljetthantering ansökningar, vilket var den ursprungliga viktiga drivkrafter för denna teknik, kan ett stort antal nya användningsfall dra nytta av denna snabbt växande teknik, som har visats i olika NFC-aktiverade program förslag och pilotförsök. Typiska NFC-applikationer kombinerar NFC-taggar, NFC-kompatibla mobiltelefoner och online-servrar. Denna avhandling utforskar förtroenderelationer, säkerhetskrav och säkerhetsprotokoll utformning i dessa komplexa system. Vi studerar hur man kan tillämpa de säkerhetsfunktioner för olika typer av NFC-taggar för att säkra NFC-applikationer. Vi undersöker först potentiella svagheter och problem i vissa nya användningsfall där NFC kan användas.  Därefter analyserar vi de krav och föreslå vårt system design för att säkra varje användningsfall. Dessutom utvecklade vi proof-of-concept implementationer för två av våra föreslagna protokoll: en NFC-aktiverad säkerhet-guard övervakningssystem och en NFC-aktiverad restaurang meny. Dessutom, för fd bruk fallet, kontrollerade vi formellt vår föreslagna säkerhetsprotokoll. Vår analys visar att bland de diskuterade taggar, NFC taggar som baseras på säkra minneskort har minst kapacitet och dlexibilitet. Deras inbyggda trepass ömsesidig autentisering kan användas för att bevisa färskhet av händelsen när taggen tappas. De programmerbara beröringsfria smarta kort är mer flexibla eftersom de kan programmeras för att genomföra nya säkerhetsprotokoll.  Dessutom kan de hålla reda på ett löpnummer och kan användas i system som inte kräver ansökan-specik mjukvara på mobiltelefonen. Sekvensnumret framtvingar ordning av händelser, vilket ger en viss nivå av replay förebyggande. Den mest kraftfulla typen av taggen är den emulerade kortet eftersom det ger en klocka, större beräkningskapacitet, och möjligen sin egen Internet-anslutning, naturligtvis till högre kostnad för utplacering.
182

Integration of Digital tools in Product Realization Process

Salaam, Abdul, Mehmood, Sultan January 2021 (has links)
The market has been evolving lately, with the introduction of more and more digital tools that industries are making use to improve their overall operations within the Production process. The integration of digital tools within the Product realization process has major advantages in improving production performance. Many large industries make use of digital tools to digitize their products making them smart products. Implementing these digital tools can be beneficial for reshaping the organization which can lead to better customer satisfaction and improve business strategy. This project explores different digital tools that can be integrated with the product realization process and how these tools contribute to the different production development phases. This thesis presents a detailed study of the digital tools Simulation, Visualization, Emulation, and Digital twins which can be integrated with the product development process. A pre-study is conducted to gather knowledge regarding the application of these tools and further discover how these tools can support the Product realization process and is used to describe which tool works best at which stage of the product realization process, which can be used to improve the efficiency and accuracy of the production process. Implementing these digital tools within the production facility can be associated to smart factory paradigm of the Fourth industrial revolution Industry4.0.This research aims to contribute to the use of digital tools in the production processes and aids in bridging the gap between traditional and modern manufacturing methods. The outcome of this study is to clarify how the above-mentioned digital tools are linked to the product realization process to support an efficient and digitalized production development, also mentioning the strengths and weaknesses of these tools. The resulting analysis has provided a framework developed to support an efficient digitalized production development and preparation process for assembly tasks utilizing human and robot collaboration. This research paper can be used as a guide for companies that want to explore how implementing digital tools in their product realization process and how it may improve their productivity.
183

Automated modeling and implementation of power converters on a real-time FPGA-based emulator

De Cuyper, Kevin 07 December 2015 (has links) (PDF)
Designing a new power electronic conversion system is a multi-step process that requires the R\&D team(s) to go through an extended prototyping phase whose goal is to validate the design in its nominal state, as well as to test its behavior when it is subjected to abnormal conditions. To properly and safely validate all devices that are external to the power stage itself, such as the controllers and the protection systems, one of the best-suited device is a real-time emulator of the converter circuit, a platform that obeys the same mathematical laws and produces the same signals as the original device withoutactually realizing the power conversion. Unfortunately, these models are often based on analog solvers which are difficult to build, must be redesigned for each modification and are subject to drift and aging. While multiple digital real-time emulators have appeared on the market in the last decades, they typically require powerful and expensive computing platforms to perform their calculations or are not generic enough to emulate the more complex power circuits. In this work, we present a new framework that allows the rapid prototyping of a wide range of power converters by translating a power converter schematic drawn on a computer to a real-time equivalent set of equations which is processed by an FPGA with an emulation time-step of less than one microsecond. Contrary to the previously published works, our tools enable the use of entry-level FPGAs even for the emulation circuits composed of twenty switches or more. This framework takes the form of a tool-chain that starts by extracting the necessary information and a standard description from the initial circuit. However, due to the intricate ways in which the switches and diodes can change their state, this raw information is too complex to be processed and emulated directly.Our first major contribution to the state of the art is a way to automatically analyze these changes in order to reduce the complexity of the problem as much as possible while keeping all the necessary information intact. In this thesis, we develop two tools that are able to find all possible changes in the state of the switches that may appear in the immediate future, thereby reducing the quantity of information required to emulate the circuit. Thanks to the global optimization provided by our tools, simulating a typical AC-to-DC converter composed of 12 switches could require 80\% less resources when compared to existing emulators.To enable the emulation or large power converters, we have created a partitioning method which divides the circuit in multiple sub-circuits which are analyzed and optimized separately. The performances of this partitioning are demonstrated by the emulation of a three-phase three-level converter with a relative error of a less that 5% on the signals.To handle our new framework, a dedicated digital platform has been developed. In order to provide the best results even on small FPGAs, particular attention is given to the low resources usage and the low latency of our design. Through multiple examples, we show that this inexpensive real-time emulation platform is able to accurately emulate many circuits in open- or closed-loop operation with a sampling rate higher than 1 MHz / Doctorat en Sciences de l'ingénieur et technologie / info:eu-repo/semantics/nonPublished
184

Developing an emulator for 360° video : intended for algorithm development

Lindskog, Eric January 2020 (has links)
Streaming 360° video has become more commonplace with content delivery services such as YouTube having support for it. By its nature, 360° video requires more bandwidth as only a fraction of the image is actually in view, while the user is expecting the same "in view" quality as with a regular video. Several studies and lots of work have been done to mitigate this higher demand for bandwidth. One solution is advanced algorithms that take in to account the direction that the user is looking when fetching the video from the server; e.g., by fetching content that is not in the user’s view at a lower quality or by not fetching this data at all. Developing these algorithms is a timely process, especially in the later stages where tweaking one parameter might require the video to be re-encoded, and therefore taking up time that could otherwise be spent on getting results and continued iteration on the algorithm. The viewer should also be considered as the best experience might not correlate with the mathematically best solution calculated by the algorithm. This thesis presents a modular emulator that allows for easy implementation of fetching algorithms that make use of state-of-the-art techniques. It intends to reduce the time it takes to iterate over an algorithm through removing the need to set up a server and encode the video in all of the wanted quality levels when a parameter change would require it. It also makes it easy to include the viewer in the process so that the subjective performance is taken into consideration. The emulator is evaluated through the implementation and evaluation of two algorithms, one serving as a baseline to the second one, which is based on an algorithm developed by another group of researchers. These algorithms are tested on two different types of 360° videos, under four different network conditions and with two values for the maximum buffer size. The results from the evaluation of the two algorithms suggest that the emulator functions as intended from a technical point of view, and as such fulfills its purpose. There is, however, future work that would further prove the emulators performance in regards to replicating real scenarios and a few examples are suggested.
185

The design of an effective extreme controller mechanism scheme for software defined cognitive radio network

Sibanda, Brian January 2021 (has links)
Thesis( M. A. (Computer Science)) -- University of Limpopo , 2021 / In Software Defined Cognitive Radio Network (SDCRN), network security is a significant issue. This issue arises when Software Defined Network (SDN) architecture integrates with the Cognitive Radio Network (CRN) technology. SDN is designed to improve network resource management, while CRN technology is meant at improving spectrum management. These technologies are vulnerable to several malicious attacks. These attacks include Distributed Denial of Service (DDoS) and Primary User Emulation (PUE). Both the DDoS and PUE can be disrupt services in the SDCRN. To curb these attacks, schemes which hardens the security of SDCRN need to be designed. Thus, in this study we propose a security mechanism called Extreme_Controller_Mechanism (XCM) that reduce the effects of DDoS and PUE. The proposed XCM scheme was designed and evaluated in three simulation environment, the OMNeT++, Octave, and MATLAB simulators. The SDCRN data set was generated using the Neural Network back propagation algorithms. The data set was then used in Matlab to evaluate the effectiveness of the prosed XCM scheme. XCM proved to be effective and efficient at detection and prevention of DDoS and PUE attacks in SDCRN. In terms of memory and processor utilisation, XCM proved to the best when compared to other schemes such as the Advanced Support Vector Machine (ASVM) and deep learning convolution network (CDLN). But in terms of detection time, the ASVM was found to be the best performing scheme. Regarding our test for detection rate, false positive and false negative, the XCM, ASVM and CDLM performed the same. The results of the XCM were therefore the best and superior to the ASVM and CDLM. This can be attributed to the fact that the XCM scheme is optimised for DDoS and PUE attacks. We can therefore conclude that our XCM scheme is the best performing scheme compared to the ASVM and CDLN schemes.
186

Emulation of Network Device Behaviour for Robot Controller Testing

Opacin, Muhamed January 2023 (has links)
The testing of software for robot controllers has become increasingly difficult as robotic systems become more complex. As the complexity of the systems increases, the number of hardware systems that the robot relies on also grows. This poses a challenge in testing robot controllers, which is crucial to ensure that robots function safely and effectively in their intended applications. While simulation can be used as a platform for software testing, it is not feasible to simulate everything in a virtual environment, especially when test cases require physical connections to hardware for input and output signals sent to robot controllers. Therefore, the objective of this thesis is to replicate I/O device network communication in order to enhance virtual testing processes. The approach employed involves capturing real-time network traffic, modifying and rebuilding it, and subsequently replaying it. The work examines existing academic research on these approaches and technologies, and investigates the specific challenges in the testing process by conducting research within a company leading globally in industrial robot development. A conceptual model is proposed, and a prototype is developed. The solution demonstrates potential in addressing the current challenges in robot controller testing by enabling network capture, modification, and level 4 network traffic replay. However, experimental results reveal various limitations, such as significant delays in generating responses. Therefore, further research and development are required if the solution is to be implemented in a real-world setting.
187

Enhancing Cybersecurity of Unmanned Aircraft Systems in Urban Environments

Kartik Anand Pant (16547862) 17 July 2023 (has links)
<p>The use of lower airspace for air taxi and cargo applications opens up exciting prospects for futuristic Unmanned Aircraft Systems (UAS). However, ensuring the safety and security of these UAS within densely populated urban areas presents significant challenges. Most modern aircraft systems, whether unmanned or otherwise, rely on the Global Navigation Satellite System (GNSS) as a primary sensor for navigation. From satellite navigations point of view, the dense urban environment compromises positioning accuracy due to signal interference, multipath effects, etc. Furthermore, civilian GNSS receivers are susceptible to spoofing attacks since they lack encryption capabilities. Therefore, in this thesis, we focus on examining the safety and cybersecurity assurance of UAS in dense urban environments, from both theoretical and experimental perspectives. </p> <p>To facilitate the verification and validation of the UAS, the first part of the thesis focuses on the development of a realistic GNSS sensor emulation using a Gazebo plugin. This plugin is designed to replicate the complex behavior of the GNSS sensor in urban settings, such as multipath reflections, signal blockages, etc. By leveraging the 3D models of the urban environments and the ray-tracing algorithm, the plugin predicts the spatial and temporal patterns of GNSS signals in densely populated urban environments. The efficacy of the plugin is demonstrated for various scenarios including routing, path planning, and UAS cybersecurity. </p> <p>Subsequently, a robust state estimation algorithm for dynamical systems whose states can be represented by Lie Groups (e.g., rigid body motion) is presented. Lie groups provide powerful tools to analyze the complex behavior of non-linear dynamical systems by leveraging their geometrical properties. The algorithm is designed for time-varying uncertainties in both the state dynamics and the measurements using the log-linear property of the Lie groups. When unknown disturbances are present (such as GNSS spoofing, and multipath effects), the log-linearization of the non-linear estimation error dynamics results in a non-linear evolution of the linear error dynamics. The sufficient conditions under which this non-linear evolution of estimation error is bounded are derived, and Lyapunov stability theory is employed to design a robust filter in the presence of an unknown-but-bounded disturbance. </p>
188

Trace-Driven WiFi Emulation: Accurate Record-and-Replay for WiFi

Mishra, Abishek Kumar January 2020 (has links)
Researchers and application designers need repeatable methods to evaluateapplications/systems over WiFi. It is hard to reproduce evaluations overWiFi because of rapidly changing wireless quality over time. In this degreeproject, we present NemFi, a trace-driven emulator for accurately recordingthe WiFi trac and later using it to emulate WiFi links in a repeatable fashion.First, we present the advantages of trace-driven emulation over simulationand experimentation. We capture the uctuating WiFi link conditionsin terms of capacity and losses over time and replay captured behavior forany application running in the emulator. Current record-and-replay techniquesfor web trac and cellular networks do not work for WiFi becauseof their inability to distinguish between WiFi losses and losses due to selfinducedcongestion. They are also lacking other WiFi specic features. Inthe absence of a trace-driven emulator for WiFi, NemFi is also equipped toavoid self-induced packet losses. It is thus capable of isolating WiFi relatedlosses which are then replayed by the NemFi's replay. NemFi's record alsoaddresses the frame aggregation and the eect it has on the actual datatransmission capability over the wireless link. NemFi can record frame aggregation,at all instants of the record phase and later accurately replays theaggregation.Experimental results demonstrate that NemFi is not only accurate inrecording the variable-rate WiFi link but also in capturing cross-trac. NemFialso replays the recorded conditions with considerable accuracy. / Forskare och applikationsdesigners behöver repeterbara metoder för att utvärderaapplikationer och system via WiFi. Det är svårt att reproducera utvärderingar genom WiFi eftersom den trådlösa kvalit´en snabbt förändras över tid. I denna rapport presenterar vi NemFi, en spårstyrd emulator för att noggrant registrera WiFi-trafiken och senare använda den för att emulera WiFi-länkar påett repeterbart sätt. Först presenterar vi fördelarna med spårstyrd emulering jämfört med simulering och experiment. Vi fångar de varierande WiFi förhållanden med avseende påkapacitet och förluster över tid och spelar upp fångat beteende för alla applikationer som körs i emulatorn. Nuvarande inspelning och uppspelningstekniker för webbtrafik och mobilnät fungerar inte för WiFi pågrund av deras oförmåga att skilja mellan WiFi-förluster ochförluster pågrund av självinducerad överbelastning. De saknar ocksåandraWiFi-specifika funktioner. I avsaknad av en spårdriven emulator för WiFi är NemFi ocksåutrustade för att undvika självinducerade paketförluster. Den kan alltsåisolera WiFi-relaterade förluster som sedan spelas upp igen av NemFi: s uppspelning. NemFi adresserar ocksåramaggregering och det är effekten påfaktiska dataöverföringsförmåga via den trådlösa länken. NemFi kan spela in ramsamling, vid alla ögonblick i inspelningsfasen och ersätter senare noggrant aggregeringen.Experimentella resultat visar att NemFi inte bara är användbart när det gäller att registrera WiFi-länken med variabel hastighet, utan ocksåför att fånga tvärgående trafik. NemFi ersätter ocksåde inspelade förhållandena medbetydande noggrannhet.
189

Enhancing Attack Resilience in Cognitive Radio Networks

Chen, Ruiliang 07 March 2008 (has links)
The tremendous success of various wireless applications operating in unlicensed bands has resulted in the overcrowding of those bands. Cognitive radio (CR) is a new technology that enables an unlicensed user to coexist with incumbent users in licensed spectrum bands without inducing interference to incumbent communications. This technology can significantly alleviate the spectrum shortage problem and improve the efficiency of spectrum utilization. Networks consisting of CR nodes (i.e., CR networks)---often called dynamic spectrum access networks or NeXt Generation (XG) communication networks---are envisioned to provide high bandwidth to mobile users via heterogeneous wireless architectures and dynamic spectrum access techniques. In recent years, the operational aspects of CR networks have attracted great research interest. However, research on the security aspects of CR networks has been very limited. In this thesis, we discuss security issues that pose a serious threat to CR networks. Specifically, we focus on three potential attacks that can be launched at the physical or MAC layer of a CR network: primary user emulation (PUE) attack, spectrum sensing data falsification (SSDF) attack, and control channel jamming (CCJ) attack. These attacks can wreak havoc to the normal operation of CR networks. After identifying and analyzing the attacks, we discuss countermeasures. For PUE attacks, we propose a transmitter verification scheme for attack detection. The scheme utilizes the location information of transmitters together with their signal characteristics to verify licensed users and detect PUE attackers. For both SSDF attacks and CCJ attacks, we seek countermeasures for attack mitigation. In particular, we propose Weighted Sequential Probability Ratio Test (WSPRT) as a data fusion technique that is robust against SSDF attacks, and introduce a multiple-rendezvous cognitive MAC (MRCMAC) protocol that is robust against CCJ attacks. Using security analysis and extensive numerical results, we show that the proposed schemes can effectively counter the aforementioned attacks in CR networks. / Ph. D.
190

Terminal Behavioral Modeling of Electric Machines for Real-time Emulation and System-level Analysis

Nazari, Arash 20 September 2022 (has links)
Stability and sustainability of operation of interconnected power converter systems has been an important focus of study in the field of power electronics and power systems. With ever-increasing application of electrical machines by means of electrification of vehicles, airplanes and shipboards, detailed study of the relating dynamics is very important to ensure the proper implementation and stable behavior of the overall system. In this work, the application of the black box approach study of the power converters has been expanded to the electrical machines. Using this modeling method, it is possible of have accurate behavior of electrical and mechanical terminals of the machine without the detailed information about the internal structure of the machine, material characteristics or topology of the machine. Instead, accurate model of electrical and mechanical terminals of the machine are achieved by measuring specific frequency responses of the machine to distinguish dynamic relation of the various electrical and mechanical quantities of the machine. The directly measured frequency responses, are coupled with the dynamics of the source and load in the electrical and mechanical terminals of the machine thus in order to decoupled the described couplings a mathematical process is used that results in decoupling of the controller and drive on the electrical side and the dynamics of the mechanical load and mechanical shaft at the mechanical terminal of the machine. Resulting model is the linear time invariant representation of the electrical machine at a specific operating point. Additionally, this work represents the application of this modeling method for accurate measurement of internal parameters of the machine such as inductances and mechanical inertia and characterization of the mechanical shaft coupler. Resulting unterminated model of the machine is a very important matter of information for system integrators and electrical and mechanical designs related to the application of the machine, to ensure the stable and sustainable operation of the machine. This work for the first time, represents the experimental implementation of this terminal behavioral modeling method for studying electrical machines as well as describes some of the practical limitations of this methodology. By incorporating and integrating a combination of commercially available devices such as frequency response analyzer, Hardware-In-The-Loop (HIL), Power-Hardware-In-The-Loop (PHIL), a test setup has been developed that is capable of control, operate and study arbitrary frame small-signal related measurements required for terminal behavioral study of the electrical machines. Resulting model of the machine that has been extracted from this modeling method is then used to compare in time domain with the real machine in the case of transient change in the mechanical load on the shaft to discover the validity of this modeling procedure. / Master of Science / According to the data from the International Energy Agency, around half of the electricity used globally is consumed by electric motors. Moreover, the growth in the electrical vehicle industry will increase their application even further, hence the development of high-fidelity models of electric machines for real-time emulation, system-level analyses, and stability studies still stands out as an important and needed research focus. New modeling concepts that go beyond the standard industry practice can be used at the design and integration stage to ensure the stable behavior of the overall system. Furthermore, convenient testing and identification pressures can help ensure the long-term operation of the system. Aligned with this trend, this thesis is studying permanent magnet synchronous machines (PMSM) using small-signal terminal-behavioral three-port networks. Having such a behavioral model of the machine available provides many opportunities for system integrators, and even enables an in-situ system observation and stability assessment at both the machine's electrical and mechanical interfaces. This capability can undoubtedly be of high importance in practice, as it is offering new insights into dynamic interactions of the electro-mechanical systems, the governor or turbine control design in ships, aircrafts, electrical vehicles, and even large synchronous machines in power plants. A so-called characterization testbed has been built that combines Hardware-In-The-Loop (HIL) and Power-Hardware-In-The-Loop (PHIL) environments, with sensor-interface boards that are used to properly scale measured signals for machine control. The Frequency-Response-Analyzer is used to sweep the proper electrical or mechanical terminal of the machine by perturbing the proper control signal within the machine controller running in PHIL and reading d-q currents, voltages, torque, and speed variables whose dynamic ratios are then obtained without the need for interrupting the normal operation of the electrical machine. The capability of acquiring such a detailed model of the machine while the machine is in operation is an important benefit of this modeling method, in comparison to the conventional identification methods widely applied in the industry. The resulting model is a linearized time invariant representation of the electrical machine at a specific operating point of interest, and can be used by system integrators to ensure the stability of the system using well known stability assessment methodologies. Furthermore, this modeling strategy has been experimentally verified for the first time on electrical machines, and the resulting model has been compared with the transient behavior of the machine in the presence of a step change in the mechanical load of the machine.

Page generated in 0.0286 seconds