SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "hsv:(TEKNIK OCH TEKNOLOGIER) hsv:(Elektroteknik och elektronik) hsv:(Datorsystem) ;lar1:(kth)"

Sökning: hsv:(TEKNIK OCH TEKNOLOGIER) hsv:(Elektroteknik och elektronik) hsv:(Datorsystem) > Kungliga Tekniska Högskolan

  • Resultat 1-10 av 1236
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Zhang, Kewei, et al. (författare)
  • Protecting GNSS Open Service-Navigation Message Authentication against Distance-Decreasing Attacks
  • Annan publikation (övrigt vetenskapligt/konstnärligt)abstract
    • As the security of global navigation satellite systems (GNSS) for civilian usage is increasingly important, navigation message authentication (NMA) significantly improves resilience to spoofing attacks. However, not all attacks can be effectively countered: a strong variant of replay/relay attacks, distance-decreasing (DD) attacks, can shorten pseudorange measurements, without manipulating the cryptographically protected navigation message, thus manipulating the position, velocity, and time solution undetected. First, we discuss how DD attacks can tamper with GNSS signals, demonstrating the attack effectiveness on a recorded Galileo signal. DD attacks might introduce bit errors to the forged signals, but the adversary can keep this error rate very low with proper attack parameter settings. Then, based on our mathematical model of the prompt correlator output of the tracking phase at the victim receiver, we find that the correlator output distribution changes in the presence of DD attacks. This leads us to apply hypothesis testing to detect DD attacks, notably a Goodness of Fit (GoF) test and a generalized likelihood ratio test (GLRT), depending on the victim’s knowledge on the DD attacks. Monte Carlo simulations are used to evaluate the detection probability and the receiver operating characteristic (ROC) curves for two tests, for different adversary configuration and noise settings. Then, we evaluate the effectiveness of the GoF and GLRT tests with a synthesized DD signal. Both tests can detect DD attacks with similar performance in high signal-to-noise ratio (SNR) environments. The GLRT detection probability is approximately 20% higher than that of the GoF test in low SNR environments.
  •  
2.
  • Gülgün, Ziya, et al. (författare)
  • Multiple Spoofer Detection for Mobile GNSS Receivers Using Statistical Tests
  • 2021
  • Ingår i: IEEE Access. - : Institute of Electrical and Electronics Engineers (IEEE). - 2169-3536. ; 9, s. 166382-166394
  • Tidskriftsartikel (refereegranskat)abstract
    • We consider Global Navigation Satellite Systems (GNSS) spoofing attacks and devise a countermeasure appropriate for mobile GNSS receivers. Our approach is to design detectors that, operating after the signal acquisition, enable the victim receiver to determine with high probability whether it is under a spoofing attack or not. Namely, the binary hypothesis is that either the GNSS receiver tracks legitimate satellite signals, H-0, or spoofed signals, H-1. We assume that there exists an unknown number of multiple spoofers in the environment and the attack strategy (which legitimate signals are spoofed by which spoofers) is not known to the receiver. Based on these assumptions, we propose an algorithm that identifies the number of spoofers and clusters the spoofing data by using Bayesian information criterion (BIC) rule. Depending on the estimated and clustered data we propose a detector, called as generalized likelihood ratio (GLRT)-like detector. We compare the performance of the GLRT-like detector with a genie-aided detector in which the attack strategy and the number of spoofers is known by the receiver. In addition to this, we extend the GLRT-like detector for the case where the noise variance is also unknown and present the performance results.
  •  
3.
  • Yanggratoke, Rerngvit, 1983- (författare)
  • Data-driven Performance Prediction and Resource Allocation for Cloud Services
  • 2016
  • Doktorsavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • Cloud services, which provide online entertainment, enterprise resource management, tax filing, etc., are becoming essential for consumers, businesses, and governments. The key functionalities of such services are provided by backend systems in data centers. This thesis focuses on three fundamental problems related to management of backend systems. We address these problems using data-driven approaches: triggering dynamic allocation by changes in the environment, obtaining configuration parameters from measurements, and learning from observations. The first problem relates to resource allocation for large clouds with potentially hundreds of thousands of machines and services. We developed and evaluated a generic gossip protocol for distributed resource allocation. Extensive simulation studies suggest that the quality of the allocation is independent of the system size for the management objectives considered.The second problem focuses on performance modeling of a distributed key-value store, and we study specifically the Spotify backend for streaming music. We developed analytical models for system capacity under different data allocation policies and for response time distribution. We evaluated the models by comparing model predictions with measurements from our lab testbed and from the Spotify operational environment. We found the prediction error to be below 12% for all investigated scenarios.The third problem relates to real-time prediction of service metrics, which we address through statistical learning. Service metrics are learned from observing device and network statistics. We performed experiments on a server cluster running video streaming and key-value store services. We showed that feature set reduction significantly improves the prediction accuracy, while simultaneously reducing model computation time. Finally, we designed and implemented a real-time analytics engine, which produces model predictions through online learning.
  •  
4.
  • Zhang, Kewei (författare)
  • Secure GNSS-based Positioning and Timing : Distance-Decreasing attacks, fault detection and exclusion, and attack detection with the help of opportunistic signals
  • 2021
  • Doktorsavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • With trillions of devices connected in large scale systems in a wired or wireless manner, positioning and synchronization become vital. Global Navigation Satellite System (GNSS) is the first choice to provide global coverage for positioning and synchronization services. From small mobile devices to aircraft, from intelligent transportation systems to cellular networks, and from cargo tracking to smart grids, GNSS plays an important role, thus, requiring high reliability and security protection.       However, as GNSS signals propagate from satellites to receivers at distance of around 20 000 km, the signal power arriving at the receivers is very low, making the signals easily jammed or overpowered. Another vulnerability stems from that civilian GNSS signals and their specifications are publicly open, so that anyone can craft own signals to spoof GNSS receivers: an adversary forges own GNSS signals and broadcasts them to the victim receiver, to mislead the victim into believing that it is at an adversary desired location or follows a false trajectory, or adjusts its clock to a time dictated by the adversary. Another type of attack is replaying GNSS signals: an adversary transmits a pre-recorded GNSS signal stream to the victim receiver, so that the receiver calculates an erroneous position and time. Recent incidents reported in press show that the GNSS functionalities in a certain area, e.g., Black Sea, have been affected by cyberattacks composed of the above-mentioned attack types.        This thesis, thus, studies GNSS vulnerabilities and proposes detection and mitigation methods for GNSS attacks, notably spoofing and replay attacks. We analyze the effectiveness of one important and powerful replay attack, the so-called Distance-decreasing (DD) attacks that were previously investigated for wireless communication systems, on GNSS signals. DD attacks are physical layer attacks, targeting time-of-flight ranging protocols, to shorten the perceived as measured distance between the transmitter and receiver. The attacker first transmits an adversary-chosen data bit to the victim receiver before the signal arrives at the attacker; upon receipt of the GNSS signal, the attacker estimates the data bit based on the early fraction of the bit period, and then switches to transmitting the estimate to the victim receiver. Consequently, the DD signal arrives at the victim receiver earlier than the genuine GNSS signals would have, which in effect shortens the pseudorange measurement between the sender (satellite) and the victim receiver, consequently, affecting the calculated position and time of the receiver. We study how the DD attacks affect the bit error rate (BER) of the received signals at the victim, and analyze its effectiveness, that is, the ability to shorten pseudorange measurements, on different GNSS signals. Several approaches are considered for the attacker to mount a DD attack with high probability of success (without being detected) against a victim receiver, for cryptographically unprotected and protected signals. We analyze the tracking output of the DD signals at the victim receiver and propose a Goodness of Fit (GoF) test and a Generalized Likelihood Ratio Test (GLRT) to detect the attacks. The evaluation of the two tests shows that they are effective, with the result being perhaps more interesting when considering DD attacks against Galileo signals that can be cryptographically protected.       Moreover, this thesis investigates the feasibility of validating the authenticity of the GNSS signals with the help of opportunistic signals, which is information readily available in modern communication environments, e.g., 3G, 4G and WiFi. We analyze the time synchronization accuracy of different technologies, e.g., Network Time Protocol (NTP), WiFi and local oscillator, as the basis for detecting a discrepancy with the GNSS-obtained time. Two detection approaches are proposed and one testbench is designed for the evaluation. A synthesized spoofing attack is used to verify the effectiveness of the approaches.       Beyond attack detection, we develop algorithms to detect and exclude faulty signals, namely the Clustering-based Solution Separation Algorithm (CSSA) and the Fast Multiple Fault Detection and Exclusion (FM-FDE). They both utilize the redundant available satellites, more than the minimum a GNSS receiver needs for position and time offset calculation. CSSA adopts data clustering to group subsets of positions calculated with different subsets of available satellites. Basically, these positions, calculated with subsets not containing any faulty satellites, should be close to each other, i.e., in a dense area; otherwise they should be scattered. FM-FDE is a more efficient algorithm that uses distances between positions, calculated with fixed-size subsets, as test statistics to detect and exclude faulty satellite signals. As the results show, FM-FDE runs faster than CSSA and other solution-separation fault detection and exclusion algorithms while remaining equally effective.
  •  
5.
  • Chen, Jiajia (författare)
  • 5G Transport networks : Capacity, latency and cost (invited)
  • 2019
  • Ingår i: Optics InfoBase Conference Papers. - : OSA - The Optical Society. - 9781557528209 ; Part F133-Networks 2019
  • Konferensbidrag (refereegranskat)abstract
    • This paper summarizes recent research on 5G transport networks addressing challenges on capacity, service migration and techno-economics that are brought by 5G new attributes, e.g., cloud radio access networks, diverse usage scenarios and heterogeneous deployments.
  •  
6.
  • Ribeiro, Luis, et al. (författare)
  • Industrial Agents for the Fast Deployment of Evolvable Assembly Systems
  • 2015. - 1st ed.
  • Ingår i: Industrial Agents. - Amsterdam, Netherlands : Elsevier. - 9780128003411 ; , s. 301-321, s. 301-322
  • Bokkapitel (refereegranskat)abstract
    • The current manufacturing scenario is characterized by high market unpredictability. Agility is therefore a central challenge for modern companies that need to understand and be proactive towards their product offer in respect to “what is offered, when it is offered, where, how and by whom” (Brown & Bessant 2003).The “what” and the “when” are particularly relevant to the research in emerging paradigms as they account for variety, customization and volume; and timing, speed and seasonality (Brown & Bessant 2003).In this scenario, several design approaches and models have been proposed in the last decade to enable re-configurability and subsequently enhance the companies’ ability to adjust their offer in nature and time.From a paradigmatic point of view research has concentrated on the organizational structure of the shop-floor and the associated controls aspects. Concepts like Reconfigurable Manufacturing Systems (RMS) (Koren & Shpitalni 2010) and Fractal Factories (FF) (Montreuil 1999) support the physical construction of production systems by regulating their layout and making a few assumptions on their logical organization. On the other hand, concepts like Bionic Manufacturing Systems (BMS)(Ueda 1992), Holonic Manufacturing Systems (HMS)(Van Brussel et al. 1998), Evolvable Assembly Systems (Ribeiro et al. 2010) essentially provide the theoretical guidelines for the logical/computational organization of the system (see (Tharumarajah 1996) for a comparison between BMS, HMS and FF and (Setchi & Lagos 2004) for the rationale supporting the shift from Dedicated Lines to Flexible Manufacturing System and finally RMS).While these paradigms provide the conceptual framework and the main design guidelines their actual interpretation and implementation has led to a wider set of architectures (Monostori, Váncza & Kumara 2006; Leitão 2009; Parunak 2000; Pěchouček & Mařík 2008).These architectures align the high-level principles with the technological offer and limitations while seeking to address the re-configurability requirements of (Mehrabi, Ulsoy & Koren 2000; Rösiö & Säfsten 2013):module mobility – modules are easy and quick to move and install;“diagnosability” – it is quick to identify the sources of quality and reliability problems;“integrability” – modules are easy to integrate into the rest of the system.“convertibility” – it is easy and quick to switch between existing products and it is easy to adapt the system to future products;scalability – it is easy to enlarge and downsize the production system;“automatibility” – a dynamic level of automation is enabled;modularity – all system elements are designed to be modular;customization – the capability and flexibility of the production system is designed according to the products to be produced in the system.Instant deployment, as addressed in the present chapter directly addresses mobility, “integrability”, “convertibility”, scalability and customization. Mechatronic modularity is a prerequisite and is enforced by the proposed architecture and the considered modular design. “Diagnosability” was not specifically tackled.In this context, the chapter analyses the agent-based architecture related with the Instantly Deployable Evolvable Assembly System (IDEAS) project that is inspired by the Evolvable Assembly System (EAS) paradigm (Ribeiro et al. 2010) as a mechanism to enable fast deployment of mechatronic modules. EAS advocates the use of process-oriented modules and envisions the production system as a collection of processes and the associated interacting agents.The architecture and the related test cases are used to draw the main lessons learned in respect to technological and conceptual implications.In this context, the remainder of this text is organized as follows: section 1.1 discusses the main deployment challenges, section 1.2 details the reference architecture and associated concepts, section 1.3 presents the principal implementation decisions, section 1.4 features the main lessons learned, sections 1.5 discusses the benefits of the proposed approach and finally section 1.6 reflects on the main conclusions.
  •  
7.
  • Shafiq, ur Réhman, 1978-, et al. (författare)
  • Using Vibrotactile Language for Multimodal Human Animals Communication and Interaction
  • 2014
  • Ingår i: Proceedings of the 2014 Workshops on Advances in Computer Entertainment Conference, ACE '14. - New York, NY, USA : Association for Computing Machinery (ACM). - 9781450333146 ; , s. 1:1-1:5
  • Konferensbidrag (refereegranskat)abstract
    • In this work we aim to facilitate computer mediated multimodal communication and interaction between human and animal based on vibrotactile stimuli. To study and influence the behavior of animals, usually researchers use 2D/3D visual stimuli. However we use vibrotactile pattern based language which provides the opportunity to communicate and interact with animals. We have performed experiment with a vibrotactile based human-animal multimodal communication system to study the effectiveness of vibratory stimuli applied to the animal skin along with audio and visual stimuli. The preliminary results are encouraging and indicate that low-resolution tactual displays are effective in transmitting information.
  •  
8.
  • Fallgren, Mikael, et al. (författare)
  • Multicast and Broadcast Enablers for High-Performing Cellular V2X Systems
  • 2019
  • Ingår i: IEEE Transactions on Broadcasting. - : IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC. - 0018-9316 .- 1557-9611. ; 65:2, s. 454-463
  • Tidskriftsartikel (refereegranskat)abstract
    • This paper focuses on capabilities enabled by 5G connectivity in the cooperative, connected and autonomous cars, and elaborates on two technical enablers. One of the technical enablers consists of a beamformed broadcast/multicast technology that builds on adaptive and robust beam management techniques at the air interface. The other proposed technical component aims to improve the end-to-end architectural design of 5G networks to enable efficient broadcast and multicast transmissions for vehicle-to-anything services. Finally, the key results of multicast and broadcast technical components are described and ongoing and future areas of work and research are detailed.
  •  
9.
  • Sundman, Dennis, et al. (författare)
  • Parallel pursuit for distributed compressed sensing
  • 2013
  • Ingår i: 2013 IEEE Global Conference on Signal and Information Processing, GlobalSIP 2013 - Proceedings. - : IEEE conference proceedings. - 9781479902484 ; , s. 783-786
  • Konferensbidrag (refereegranskat)abstract
    • We develop a greedy (pursuit) algorithm for a distributed compressed sensing problem where multiple sensors are connected over a de-centralized network. The algorithm is referred to as distributed parallel pursuit and it solves the distributed compressed sensing problem in two stages; first by a distributed estimation stage and then an information fusion stage. Along with worst case theoretical analysis for the distributed algorithm, we also perform simulation experiments in a controlled manner. We show that the distributed algorithm performs significantly better than the stand-alone (disconnected) solution and close to a centralized (fully connected to a central point) solution.
  •  
10.
  • Theorin, Alfred, et al. (författare)
  • An event-driven manufacturing information system architecture for Industry 4.0
  • 2017
  • Ingår i: International Journal of Production Research. - : Taylor & Francis. - 0020-7543 .- 1366-588X. ; 55:5, s. 1297-1311
  • Forskningsöversikt (refereegranskat)abstract
    • Future manufacturing systems need to be more flexible, to embrace tougher and constantly changing market demands. They need to make better use of plant data, ideally utilising all data from the entire plant. Low-level data should be refined to real-time information for decision-making, to facilitate competitiveness through informed and timely decisions. The Line Information System Architecture (LISA), is presented in this paper. It is an event-driven architecture featuring loose coupling, a prototype-oriented information model and formalised transformation services. LISA is designed to enable flexible factory integration and data utilisation. The focus of LISA is on integration of devices and services on all levels, simplifying hardware changes and integration of new smart services as well as supporting continuous improvements on information visualisation and control. The architecture has been evaluated on both real industrial data and industrial demonstrators and it is also being installed at a large automotive company. This article is an extended and revised version of the paper presented at the 2015 IFAC Symposium on Information Control in Manufacturing (INCOM 2015). The paper has been restructured in regards to the order and title of the chapters, and additional information about the integration between devices and services aspects have been added. The introduction and the general structure of the paper now better highlight the contributions of the paper and the uniqueness of the framework.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-10 av 1236
Typ av publikation
konferensbidrag (726)
tidskriftsartikel (310)
doktorsavhandling (72)
bokkapitel (37)
rapport (36)
annan publikation (23)
visa fler...
licentiatavhandling (19)
bok (6)
forskningsöversikt (3)
proceedings (redaktörskap) (2)
samlingsverk (redaktörskap) (1)
patent (1)
visa färre...
Typ av innehåll
refereegranskat (1034)
övrigt vetenskapligt/konstnärligt (193)
populärvet., debatt m.m. (8)
Författare/redaktör
Maki, Atsuto (60)
Brorsson, Mats (45)
Vlassov, Vladimir (28)
Vlassov, Vladimir, 1 ... (28)
Tenhunen, Hannu (23)
Markidis, Stefano (22)
visa fler...
Maguire Jr., Gerald ... (22)
Lagerström, Robert, ... (22)
Öberg, Johnny (20)
Laure, Erwin (20)
Ayani, Rassul (19)
Dowling, Jim (18)
Wang, Lihui (17)
Haridi, Seif (17)
Dán, György (17)
Haridi, Seif, 1953- (16)
Kostic, Dejan (16)
Biehl, Matthias (16)
Brorsson, Mats, 1962 ... (16)
Monperrus, Martin (16)
Girdzijauskas, Sarun ... (15)
Balliu, Musard (15)
Baudry, Benoit (15)
Ebrahimi, Masoumeh (14)
Törngren, Martin (14)
Ekstedt, Mathias, 19 ... (14)
Chiesa, Marco (14)
Guanciale, Roberto (14)
Ekstedt, Mathias (13)
Girdzijauskas, Sarun ... (12)
Stadler, Rolf (12)
Lu, Zhonghai (12)
Daneshtalab, Masoud (11)
Matskin, Mihhail, 19 ... (11)
Broman, David, 1977- (10)
Aguilar, Xavier (10)
Yanggratoke, Rerngvi ... (10)
Johnson, Pontus (10)
Gross, James, Profes ... (10)
Popov, Konstantin (10)
Podobas, Artur, 1982 ... (10)
Troubitsyna, Elena (10)
Castañeda Lozano, Ro ... (10)
Hemani, Ahmed (9)
Papadimitratos, Pano ... (9)
Papadimitratos, Pana ... (9)
Buchegger, Sonja (9)
Schulte, Christian (9)
Hjort Blindell, Gabr ... (9)
Corcoran, Diarmuid (9)
visa färre...
Lärosäte
RISE (74)
Mälardalens universitet (43)
Chalmers tekniska högskola (38)
Stockholms universitet (25)
Uppsala universitet (21)
visa fler...
Linköpings universitet (20)
Umeå universitet (12)
Lunds universitet (10)
Göteborgs universitet (8)
Karolinska Institutet (5)
Mittuniversitetet (4)
Högskolan i Borås (4)
Blekinge Tekniska Högskola (4)
Högskolan i Halmstad (3)
Linnéuniversitetet (3)
Högskolan Kristianstad (2)
Malmö universitet (2)
Högskolan i Skövde (2)
Högskolan Väst (1)
Örebro universitet (1)
Karlstads universitet (1)
Försvarshögskolan (1)
Kungl. Musikhögskolan (1)
visa färre...
Språk
Engelska (1224)
Japanska (9)
Svenska (3)
Forskningsämne (UKÄ/SCB)
Teknik (1236)
Naturvetenskap (261)
Samhällsvetenskap (19)
Medicin och hälsovetenskap (12)
Humaniora (7)

År

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy