- 标题
- 摘要
- 关键词
- 实验方案
- 产品
-
[IEEE 2019 11th Electrical Engineering Faculty Conference (BulEF) - Varna, Bulgaria (2019.9.11-2019.9.14)] 2019 11th Electrical Engineering Faculty Conference (BulEF) - Faults in photovoltaic modules and possibilities for their detection by thermographic studies
摘要: This paper presents a network security laboratory project for teaching network traffic anomaly detection methods to electrical engineering students. The project design follows a research-oriented teaching principle, enabling students to make their own discoveries in real network traffic, using data captured from a large IP darkspace monitor operated at the University of California, San Diego (UCSD). Although darkspace traffic does not include bidirectional conversations (only attempts to initiate them), it contains traffic related to or actually perpetrating a variety of network attacks originating from millions of Internet addresses around the world. This breadth of coverage makes this darkspace data an excellent choice for a hands-on study of Internet attack detection techniques. In addition, darkspace data is less privacy-critical than other network traces, because it contains only unwanted network traffic and no legitimate communication. In the lab exercises presented, students learn about network security challenges, search for suspicious anomalies in network traffic, and gain experience in presenting and interpreting their own findings. They acquire not only security-specific technical skills but also general knowledge in statistical data analysis and data mining techniques. They are also encouraged to discover new phenomena in the data, which helps to ignite their general interest in science and engineering research. The Vienna University of Technology, Austria, first implemented this laboratory during the summer semester 2014, with a class of 41 students. With the help of the Center for Applied Internet Data Analysis (CAIDA) at UCSD, all exercises and IP darkspace data are publicly available.
关键词: engineering education,data analysis,security,Communication system security
更新于2025-09-23 15:19:57
-
LuxSteg: First Practical Implementation of Steganography in VLC
摘要: Visible-light communication (VLC) is a new technique for high-speed, low-cost wireless data transmission services. One of the areas in which VLC is considered superior to traditional radio-based communication is security. The common slogan summarizing the VLC security features is WYSIWYS—''What You See Is What You Send.'' However, the broadcast nature of downlink VLC makes it possible for eavesdroppers to easily intercept the light communication in various settings, e.g., offices, conference rooms, plenum spaces, and so on. Similarly to radio-based data broadcasting systems, such as Wi-Fi, VLC opens the possibilities of hiding information in the public channel. In this paper, we describe (for the first time, to the best of our knowledge) the implementation of steganographic data transmission in a VLC system called LuxSteg. This VLC system utilizes pulse position modulation and direct sequence-code division multiple access modulation. In our implementation, multiple steganographic data streams are mixed with the spreading codes and combined with the overt data stream. We achieve a steganographic transmission rate of approximately 1 Mb/s hidden in a 110-Mb/s data stream. We analyze the influence of the spreading factor, spreading code type, number of hidden data streams, and the amplitude on the achievable transmission rate, undetectability, and robustness.
关键词: network security,computer networks,Communication system security,visible light communication
更新于2025-09-19 17:15:36
-
[IEEE 2019 Photonics North (PN) - Quebec City, QC, Canada (2019.5.21-2019.5.23)] 2019 Photonics North (PN) - Performance of diode-pumped Yb:CALGO and Yb:KYW lasers
摘要: Quantum key distribution (QKD) is an innovative technology that exploits the laws of quantum mechanics to generate and distribute unconditionally secure shared key for use in cryptographic applications. However, QKD is a relatively nascent technology where real-world system implementations differ significantly from their ideal theoretical representations. In this paper, we introduce a modeling framework built upon the OMNeT++ discrete event simulation framework to study the impact of implementation nonidealities on QKD system performance and security. Specifically, we demonstrate the capability to study the device imperfections and practical engineering limitations through the modeling and simulation of a polarization-based, prepare and measure BB84 QKD reference architecture. The reference architecture allows users to model and study complex interactions between physical phenomenon and system-level behaviors representative of real-world design and implementation tradeoffs. Our results demonstrate the flexibility of the framework to simulate and evaluate current, future, and notional QKD protocols and components.
关键词: system performance,system security,Quantum key distribution,modeling & simulation
更新于2025-09-19 17:13:59
-
[IEEE 2019 IEEE Power & Energy Society General Meeting (PESGM) - Atlanta, GA, USA (2019.8.4-2019.8.8)] 2019 IEEE Power & Energy Society General Meeting (PESGM) - Possible System Security Impacts of Distributed Photovoltaics Behavior During Voltage Disturbances
摘要: Australia has one of the highest penetrations of distributed solar PV worldwide, comprised mostly of residential rooftop systems. This paper explores the behavior of distributed PV during voltage excursions following a major power system disturbance, and implications for managing system security. Previous research has focused on the response of inverters to frequency disturbances. However, this paper presents operational data demonstrating that a major voltage disturbance can result in widespread generation loss from distributed PV. A unique data set containing 30s PV generation and local network voltage for 214 sites in South Australia is analyzed. Aggregate PV generation losses of 42% highlight the need for integration of distributed PV voltage response characteristics into power system planning and operation. Observed curtailment is upscaled to assess the potential severity of response and a method is presented for assessing diversity in individual PV inverter response with regards to depth and duration of generation loss.
关键词: power system control,Distributed PV,power system security,high PV penetration
更新于2025-09-19 17:13:59
-
[IEEE 2019 Device Research Conference (DRC) - Ann Arbor, MI, USA (2019.6.23-2019.6.26)] 2019 Device Research Conference (DRC) - Tunnel junctions for vertically integrated multiple nitrides laser diodes
摘要: Biometric veri?cation systems are designed to accept multiple similar biometric measurements per user due to inherent intrauser variations in the biometric data. This is important to preserve reasonable acceptance rate of genuine queries and the overall feasibility of the recognition system. However, such acceptance of multiple similar measurements decreases the imposter’s dif?culty of obtaining a system-acceptable measurement, thus resulting in a degraded security level. This deteriorated security needs to be measurable to provide truthful security assurance to the users. Entropy is a standard measure of security. However, the entropy formula is applicable only when there is a single acceptable possibility. In this paper, we develop an entropy-measuring model for biometric systems that accepts multiple similar measurements per user. Based on the idea of guessing entropy, the proposed model quanti?es biometric system security in terms of adversarial guessing effort for two practical attacks. Excellent agreement between analytic and experimental simulation-based measurement results on a synthetic and a benchmark face dataset justify the correctness of our model and thus the feasibility of the proposed entropy-measuring approach.
关键词: Biometric system,security,guessing,entropy measurement
更新于2025-09-19 17:13:59
-
[IEEE 2019 International Topical Meeting on Microwave Photonics (MWP) - Ottawa, ON, Canada (2019.10.7-2019.10.10)] 2019 International Topical Meeting on Microwave Photonics (MWP) - Tunable Low-Spurious Heterodyne-Dual-Injection-Locked Optoelectronic Oscillator
摘要: The use of fingerprint embedding at the physical layer enables a receiver to authenticate a transmitter by detecting a low-power authentication tag superimposed upon the message waveform; a theoretical framework for such fingerprinting has been outlined. We carry out single-carrier single-antenna software defined radio (SDR) experiments with a wireless communications link over which we transmit and receive packets with the embedded fingerprinting. We analyze these experimental results and find they match well with theoretical predictions. This paper demonstrates that the method of superimposed fingerprints can deliver high probability of authentication without additional bandwidth and with minimal impact on bit-error rate in SDR systems.
关键词: communication system security,Cognitive radio,message authentication
更新于2025-09-19 17:13:59
-
[IEEE 2019 Workshop on Recent Advances in Photonics (WRAP) - Guwahati, India (2019.12.13-2019.12.14)] 2019 Workshop on Recent Advances in Photonics (WRAP) - Refractive Index sensing using plasmonic mode in a periodically corrugated waveguide at terahertz frequencies
摘要: This paper presents a network security laboratory project for teaching network traffic anomaly detection methods to electrical engineering students. The project design follows a research-oriented teaching principle, enabling students to make their own discoveries in real network traffic, using data captured from a large IP darkspace monitor operated at the University of California, San Diego (UCSD). Although darkspace traffic does not include bidirectional conversations (only attempts to initiate them), it contains traffic related to or actually perpetrating a variety of network attacks originating from millions of Internet addresses around the world. This breadth of coverage makes this darkspace data an excellent choice for a hands-on study of Internet attack detection techniques. In addition, darkspace data is less privacy-critical than other network traces, because it contains only unwanted network traffic and no legitimate communication. In the lab exercises presented, students learn about network security challenges, search for suspicious anomalies in network traffic, and gain experience in presenting and interpreting their own findings. They acquire not only security-specific technical skills but also general knowledge in statistical data analysis and data mining techniques. They are also encouraged to discover new phenomena in the data, which helps to ignite their general interest in science and engineering research. The Vienna University of Technology, Austria, first implemented this laboratory during the summer semester 2014, with a class of 41 students. With the help of the Center for Applied Internet Data Analysis (CAIDA) at UCSD, all exercises and IP darkspace data are publicly available.
关键词: engineering education,data analysis,security,Communication system security
更新于2025-09-16 10:30:52
-
[IEEE 2018 IEEE International Power Modulator and High Voltage Conference (IPMHVC) - Jackson, WY, USA (2018.6.3-2018.6.7)] 2018 IEEE International Power Modulator and High Voltage Conference (IPMHVC) - Aging Evaluation of Composite Insulator with Laser-induced Breakdown Spectroscopy
摘要: Quantum key distribution (QKD) is an innovative technology that exploits the laws of quantum mechanics to generate and distribute unconditionally secure shared key for use in cryptographic applications. However, QKD is a relatively nascent technology where real-world system implementations differ significantly from their ideal theoretical representations. In this paper, we introduce a modeling framework built upon the OMNeT++ discrete event simulation framework to study the impact of implementation nonidealities on QKD system performance and security. Specifically, we demonstrate the capability to study the device imperfections and practical engineering limitations through the modeling and simulation of a polarization-based, prepare and measure BB84 QKD reference architecture. The reference architecture allows users to model and study complex interactions between physical phenomenon and system-level behaviors representative of real-world design and implementation tradeoffs. Our results demonstrate the flexibility of the framework to simulate and evaluate current, future, and notional QKD protocols and components.
关键词: Quantum key distribution,system security,system performance,modeling & simulation
更新于2025-09-16 10:30:52
-
A Novel Optical Frequency-Hopping System Based on DFB Laser Integrated With an EA Modulator
摘要: A novel optical frequency-hopping system based on distributed feedback laser integrated with an electroabsorption modulator is proposed and demonstrated. In the proposed system, a user’s data are split into segments and modulated onto multiple optical frequency shift keying carries, therefore, a single wavelength of optical carrier only carries partial user’s data. By this way, the security of optical communication system is improved. In this paper, we demonstrate an error free transmission through 32-km single mode ?ber and 8-km dispersion compensation ?ber with 2.5 Gb/s hopping rate and 10 Gb/s data rate. Meanwhile, we also compare and analyze the performance of the proposed system with different hopping rate and data rate.
关键词: communication system security,Optical frequency hopping,optical frequency shift keying
更新于2025-09-16 10:30:52
-
A Low-Cost Surveillance and Information System for Museum Using Visible Light Communication
摘要: This paper designed and implemented a low-cost surveillance and information system for museums with two new coding schemes using Visible Light Communication (VLC). For security, we use a key in place of the clock in the Manchester coding. For the enhanced data transfer, we use the unbalanced time duration for data one and zero. The prototype system was built with two low-cost microcontrollers, an LED, and linear light sensors. With 1 m distance in a dark environment, the maximum data transfer rate was roughly 1.93 kbits/s with a 10 Φ white LED. Under the dark-to-modest ambient brightness of up to 120 lux, the white LEDs were performed well in terms of the transmission to LEDs with different colors. The distance, compared experiments with flashlights reveal that our system can easily detect the prohibited use of flashlight. Experiments with the mobile phones’ flashlight also revealed that photographing with the flashlight would have a worse impact on arts than the continuous illumination. We also measured the distance between arts to avoid inevitable interference between illumination sources in neighbor.
关键词: Encoding,Indoor communication,Communication system security,Visible light communication
更新于2025-09-10 09:29:36