Science.gov

Sample records for secure communication systems

  1. Secure video communications system

    DOEpatents

    Smith, Robert L.

    1991-01-01

    A secure video communications system having at least one command network formed by a combination of subsystems. The combination of subsystems to include a video subsystem, an audio subsystem, a communications subsystem, and a control subsystem. The video communications system to be window driven and mouse operated, and having the ability to allow for secure point-to-point real-time teleconferencing.

  2. A new optical secure communication system

    NASA Astrophysics Data System (ADS)

    Luo, Fan; Fang, Nian; Huang, Zhaoming; Wang, Chunhua

    2007-11-01

    An optical secure communication system based on digital chaos and Polarization Shift Keying (PolSK) technology is proposed. In several selected PolSK schemes, states of polarization are partially or totally uniform on Poincare sphere. Different PolSK schemes are chosen according to the real-time chaos-based pseudo-random sequences to modulate original information in different periods of clock of the transmitter. In the receiver, according to the synchronous chaotic sequences, corresponding PolSK schemes are used to demodulate the information. Simulation is carried out by using the softwares of OptiSystem and Matlab. Some analysis results are presented. In the conclusion, this system works well in communication and has strong anti-attack capacity.

  3. Security aspects of RFID communication systems

    NASA Astrophysics Data System (ADS)

    Bîndar, Valericǎ; Popescu, Mircea; Bǎrtuşicǎ, Rǎzvan; Craciunescu, Razvan; Halunga, Simona

    2015-02-01

    The objective of this study is to provide an overview of basic technical elements and security risks of RFID communication systems and to analyze the possible threats arising from the use of RFID systems. A number of measurements are performed on a communication system including RFID transponder and the tag reader, and it has been determined that the uplink signal level is 62 dB larger than the average value of the noise at the distance of 1m from the tag, therefore the shielding effectiveness has to exceed this threshold. Next, the card has been covered with several shielding materials and measurements were carried, under similar conditions to test the recovery of compromising signals. A very simple protection measure to prevent unauthorized reading of the data stored on the card has been proposed, and some electromagnetic shielding materials have been proposed and tested.

  4. Random digital encryption secure communication system

    NASA Technical Reports Server (NTRS)

    Doland, G. D. (Inventor)

    1982-01-01

    The design of a secure communication system is described. A product code, formed from two pseudorandom sequences of digital bits, is used to encipher or scramble data prior to transmission. The two pseudorandom sequences are periodically changed at intervals before they have had time to repeat. One of the two sequences is transmitted continuously with the scrambled data for synchronization. In the receiver portion of the system, the incoming signal is compared with one of two locally generated pseudorandom sequences until correspondence between the sequences is obtained. At this time, the two locally generated sequences are formed into a product code which deciphers the data from the incoming signal. Provision is made to ensure synchronization of the transmitting and receiving portions of the system.

  5. Secure electronic commerce communication system based on CA

    NASA Astrophysics Data System (ADS)

    Chen, Deyun; Zhang, Junfeng; Pei, Shujun

    2001-07-01

    In this paper, we introduce the situation of electronic commercial security, then we analyze the working process and security for SSL protocol. At last, we propose a secure electronic commerce communication system based on CA. The system provide secure services such as encryption, integer, peer authentication and non-repudiation for application layer communication software of browser clients' and web server. The system can implement automatic allocation and united management of key through setting up the CA in the network.

  6. Security alarm communication and display systems development

    SciTech Connect

    Waddoups, I.G.

    1990-01-01

    Sandia National Laboratories has developed a variety of alarm communication and display systems for a broad spectrum of users. This paper will briefly describe the latest systems developed for the Department of Energy (DOE), the Department of Defense (DoD), and the Department of State (DOS) applications. Applications covered will vary from relatively small facilities to large complex sites. Ongoing system developments will also be discussed. The concluding section will summarize the practical, implementable state-of-the-art features available in new systems. 6 figs.

  7. A protocol for secure communication in large distributed systems

    NASA Astrophysics Data System (ADS)

    Anderson, D. P.; Ferrari, D.; Rangan, P. V.; Sartirana, B.

    1987-01-01

    A mechanism for secure communication in large distributed systems is proposed. The mechanism, called Authenticated Datagram Protocol (ADP), provides message authentication and, optionally, privacy of data. ADP is a host-to-host datagram protocol, positioned below the transport layer; it uses public-key encryption to establish secure channels between hosts and to authenticate owners, and single-key encryption for communication over a channel and to ensure privacy of the messages. ADP is shown to satisfy the main security requirements of large distributed systems, to provide end-to-end security in spite of its relatively low level, and to exhibit several advantages over schemes in which security mechanisms are at a higher level. The results of a trace-driven measurement study of ADP performance show that its throughput and latency are acceptable even within the limitations of today's technology, provided single-key encryption/decryption can be done in hardware.

  8. Security Encryption Scheme for Communication of Web Based Control Systems

    NASA Astrophysics Data System (ADS)

    Robles, Rosslin John; Kim, Tai-Hoon

    A control system is a device or set of devices to manage, command, direct or regulate the behavior of other devices or systems. The trend in most systems is that they are connected through the Internet. Traditional Supervisory Control and Data Acquisition Systems (SCADA) is connected only in a limited private network Since the internet Supervisory Control and Data Acquisition Systems (SCADA) facility has brought a lot of advantages in terms of control, data viewing and generation. Along with these advantages, are security issues regarding web SCADA, operators are pushed to connect Control Systems through the internet. Because of this, many issues regarding security surfaced. In this paper, we discuss web SCADA and the issues regarding security. As a countermeasure, a web SCADA security solution using crossed-crypto-scheme is proposed to be used in the communication of SCADA components.

  9. Communication Security for Control Systems in Smart Grid

    NASA Astrophysics Data System (ADS)

    Robles, Rosslin John; Kim, Tai-Hoon

    As an example of Control System, Supervisory Control and Data Acquisition systems can be relatively simple, such as one that monitors environmental conditions of a small office building, or incredibly complex, such as a system that monitors all the activity in a nuclear power plant or the activity of a municipal water system. SCADA systems are basically Process Control Systems, designed to automate systems such as traffic control, power grid management, waste processing etc. Connecting SCADA to the Internet can provide a lot of advantages in terms of control, data viewing and generation. SCADA infrastructures like electricity can also be a part of a Smart Grid. Connecting SCADA to a public network can bring a lot of security issues. To answer the security issues, a SCADA communication security solution is proposed.

  10. On the design of chaos-based secure communication systems

    NASA Astrophysics Data System (ADS)

    Zaher, Ashraf A.; Abu-Rezq, Abdulnasser

    2011-09-01

    This paper discusses the topic of using chaotic models for constructing secure communication systems. It investigates three different case studies that use encryption/decryption functions with varying degrees of complexity and performance. The first case study explores synchronization of identical chaotic systems, which is considered the most crucial step when developing chaos-based secure communication systems. It proposes a fast mechanism for synchronizing the transmitter and the receiver that is based on the drive-response approach. The superiority and causality of this mechanism is demonstrated via contrasting its performance and practical implementation against that of the traditional method of Pecora and Carroll. The second case study explores the use of an improved cryptography method for improving the scrambling of the transmitted signals. The improvement is based on using both the transmitter states and parameters for performing the encryption. The security analysis of this method is analyzed, highlighting its advantages and limitation, via simulating intruder attacks to the communication channel. Finally, the third case study augments a parameter update law to the previous two designs such that the encryption method is more robust. It uses a decoupling technique for which the synchronization process is completely isolated from the parameter identification algorithm. The Lorenz system was used to exemplify all the suggested techniques, and the transmission of both analog and digital signals was explored, while investigating various techniques to optimize the performance of the proposed systems.

  11. Security model for picture archiving and communication systems.

    PubMed

    Harding, D B; Gac, R J; Reynolds, C T; Romlein, J; Chacko, A K

    2000-05-01

    The modern information revolution has facilitated a metamorphosis of health care delivery wrought with the challenges of securing patient sensitive data. To accommodate this reality, Congress passed the Health Insurance Portability and Accountability Act (HIPAA). While final guidance has not fully been resolved at this time, it is up to the health care community to develop and implement comprehensive security strategies founded on procedural, hardware and software solutions in preparation for future controls. The Virtual Radiology Environment (VRE) Project, a landmark US Army picture archiving and communications system (PACS) implemented across 10 geographically dispersed medical facilities, has addressed that challenge by planning for the secure transmission of medical images and reports over their local (LAN) and wide area network (WAN) infrastructure. Their model, which is transferable to general PACS implementations, encompasses a strategy of application risk and dataflow identification, data auditing, security policy definition, and procedural controls. When combined with hardware and software solutions that are both non-performance limiting and scalable, the comprehensive approach will not only sufficiently address the current security requirements, but also accommodate the natural evolution of the enterprise security model.

  12. A Sensor and Communications System for Containerized-Cargo Security

    SciTech Connect

    Leach Jr., R R

    2005-02-10

    A public/private collaboration between federal, state, provincial, and local U.S. and Canadian governmental organizations, called the Canada - United States Cargo Security Project has been formed, with the goal to improve security of containerized cargo moving from overseas locations into eastern Canadian provinces and the Northeastern United States. The current phase of this project has two technical objectives. These are: (1) to build and test a prototype in-container sensor system able to detect unauthorized entry into the container and the presence of radioactive material, to record geographical location and environmental data, and to transmit this information via satellite communications to a remote monitoring facility, and (2) to develop a secure website where data from the in-container sensors and other information will be displayed in real or near-real time and can be made available to law enforcement and emergency response organizations as appropriate. This paper will describe these activities, currently being undertaken by the Lawrence Livermore National Laboratory. An additional goal of the project's current phase is to integrate multi-jurisdictional training and first-responder exercises while monitoring and tracking container shipments from overseas to the US via Canadian ports-of-entry into North America. This activity is being undertaken by other project partners, which include the National Infrastructure Institute--Center for Infrastructure Expertise (NI2CIE), Transport Canada, Canadian Provinces of Quebec and Nova Scotia, Ports of Halifax and Montreal, U.S. Coast Guard (First Coast Guard District), States of New Hampshire, Maine, Vermont, and New York and the Port of Portland.

  13. Secure Communications

    NASA Astrophysics Data System (ADS)

    Bellac, Michel Le

    2014-11-01

    The first practical application of quantum physics examined in this book is quantum cryptography. Quantum cryptography is a relatively recent invention (it dates back from the mid 1980s) but I chose it because it allows me to illustrate the fundamental principles with a minimum number of intermediate steps. I shall begin with a short summary of classical cryptography, reviewing briefly the two systems which are currently used today: the secret key system and the public key system. Quantum cryptography is not a new method for dissimulating the meaning of a message, but it allows one to be certain that no spy has accessed it. There exist many quantum cryptography protocols and various experimental devices have been proposed for implementing them. The simplest device is based on polarization, a concept which will be introduced first in the case of of light polarization, and then in that of photon polarization. The use of photon polarization gives the simplest implementation of the protocol proposed in 1984 by Bennett and Brassard, which is known by the acronym formed with their initials, the BB84 protocol.

  14. Deformable MEMS mirrors in secure optical communication system

    NASA Astrophysics Data System (ADS)

    Ziph-Schatzberg, Leah; Bifano, Thomas; Cornelissen, Steven; Stewart, Jason; Bleier, Zvi

    2009-05-01

    An optical communication system suitable for voice communication, data retrieval from remote sensors and identification had been designed, built and tested. The system design allows operation at ranges of several hundred meters. The heart of the system is a modulated MEMS mirror that is electrostatically actuated and changes between a flat reflective state and a corrugated diffractive state. A process for mass producing these mirrors at low cost was developed and implemented. The mirror was incorporated as a facet in a hollow retro-reflector, allowing temporal modulation of an interrogating beam and the return of the modulated beam to the interrogator. This modulator unit thus consists of a low power, small and light communication node with large (about 60°) angular extent. The system's range and pointing are determined by the interrogator /detector / demodulator unit (the transceiver), whereas the communicating node remains small, low power and low cost. This transceiver is comprised of a magnified optical channel to establish line of sight communication, an interrogating laser at 1550nm, an avalanche photo diode to detect the return signal and electronics to drive the laser and demodulate the returned signal and convert it to an audio signal. Voice communication in free space was demonstrated at ranges larger than 200 meters. A new retro-reflector design, incorporating more modulated mirrors had been constructed. This configuration was built and tested. Its performance and advantages as compared to the single mirror retro-reflector are discussed. An alternative system design that allows higher bandwidth data transmission is described

  15. A Protocol for Secure Communication in Large Distributed Systems

    DTIC Science & Technology

    1987-01-01

    Protocol for Secure Conuunication in Large Distributed Systems 12. PERSONAL AUTHOR( S ) * D.P. Anderson, D. Ferrari, P. V. Rangan , and B. Sartirana 13a...Anderson. D. Ferrari. P. V. Rangan , and S .-Y. Tmu, The DASH Project: Issues in the Design of Very Large Distributed Systems. Rept. No. UCB/CSD 87,338... C .. ................ ...N F... S ... 30 .... ........ - L 25 ................. 10 ............................... 15 .... . 4

  16. Secure optical communication system utilizing deformable MEMS mirrors

    NASA Astrophysics Data System (ADS)

    Ziph-Schatzberg, Leah; Bifano, Thomas; Cornelissen, Steven; Stewart, Jason; Bleier, Zvi

    2009-02-01

    An optical communication system suitable for voice, data retrieval from remote sensors and identification is described. The system design allows operation at ranges of several hundred meters. The heart of the system is a modulated MEMS mirror that is electrostatically actuated and changes between a flat reflective state and a corrugated diffractive state. A process for mass producing these mirrors at low cost was developed and is described. The mirror was incorporated as a facet in a hollow retro-reflector, allowing temporal modulation of an interrogating beam and the return of the modulated beam to the interrogator. This system thus consists of a low power, small and light communication node with large (about 60°) angular extent. The system's range and pointing are determined by the interrogator /detector/demodulator (Transceiver) unit. The transceiver is comprised of an optical channel to establish line of sight communication, an interrogating laser at 1550nm, an avalanche photo diode to detect the return signal and electronics to drive the laser and demodulate the detected signal and convert it to an audio signal. A functional prototype system was built using a modified compact optical sight as the transceiver. Voice communication in free space was demonstrated. The design and test of major components and the complete system are discussed.

  17. Practical secure quantum communications

    NASA Astrophysics Data System (ADS)

    Diamanti, Eleni

    2015-05-01

    We review recent advances in the field of quantum cryptography, focusing in particular on practical implementations of two central protocols for quantum network applications, namely key distribution and coin flipping. The former allows two parties to share secret messages with information-theoretic security, even in the presence of a malicious eavesdropper in the communication channel, which is impossible with classical resources alone. The latter enables two distrustful parties to agree on a random bit, again with information-theoretic security, and with a cheating probability lower than the one that can be reached in a classical scenario. Our implementations rely on continuous-variable technology for quantum key distribution and on a plug and play discrete-variable system for coin flipping, and necessitate a rigorous security analysis adapted to the experimental schemes and their imperfections. In both cases, we demonstrate the protocols with provable security over record long distances in optical fibers and assess the performance of our systems as well as their limitations. The reported advances offer a powerful toolbox for practical applications of secure communications within future quantum networks.

  18. From Fault-Diagnosis and Performance Recovery of a Controlled System to Chaotic Secure Communication

    NASA Astrophysics Data System (ADS)

    Hsu, Wen-Teng; Tsai, Jason Sheng-Hong; Guo, Fang-Cheng; Guo, Shu-Mei; Shieh, Leang-San

    Chaotic systems are often applied to encryption on secure communication, but they may not provide high-degree security. In order to improve the security of communication, chaotic systems may need to add other secure signals, but this may cause the system to diverge. In this paper, we redesign a communication scheme that could create secure communication with additional secure signals, and the proposed scheme could keep system convergence. First, we introduce the universal state-space adaptive observer-based fault diagnosis/estimator and the high-performance tracker for the sampled-data linear time-varying system with unanticipated decay factors in actuators/system states. Besides, robustness, convergence in the mean, and tracking ability are given in this paper. A residual generation scheme and a mechanism for auto-tuning switched gain is also presented, so that the introduced methodology is applicable for the fault detection and diagnosis (FDD) for actuator and state faults to yield a high tracking performance recovery. The evolutionary programming-based adaptive observer is then applied to the problem of secure communication. Whenever the tracker induces a large control input which might not conform to the input constraint of some physical systems, the proposed modified linear quadratic optimal tracker (LQT) can effectively restrict the control input within the specified constraint interval, under the acceptable tracking performance. The effectiveness of the proposed design methodology is illustrated through tracking control simulation examples.

  19. Secure ADS-B: Towards Airborne Communications Security in the Federal Aviation Administration’s Next Generation Air Transportation System

    DTIC Science & Technology

    2014-03-01

    Koziel, Eric A. Effects of Architecture on Information Leakage of a Hardware Advanced Encryption Standard Implementation . Master’s thesis , Air Force...SECURE ADS-B: TOWARDS AIRBORNE COMMUNICATIONS SECURITY IN THE FEDERAL AVIATION ADMINISTRATION’S NEXT GENERATION AIR TRANSPORTATION SYSTEM THESIS ...Patterson Air Force Base, Ohio DISTRIBUTION STATEMENT A: APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED The views expressed in this thesis are those of

  20. Asynchronous error-correcting secure communication scheme based on fractional-order shifting chaotic system

    NASA Astrophysics Data System (ADS)

    Chao, Luo

    2015-11-01

    In this paper, a novel digital secure communication scheme is firstly proposed. Different from the usual secure communication schemes based on chaotic synchronization, the proposed scheme employs asynchronous communication which avoids the weakness of synchronous systems and is susceptible to environmental interference. Moreover, as to the transmission errors and data loss in the process of communication, the proposed scheme has the ability to be error-checking and error-correcting in real time. In order to guarantee security, the fractional-order complex chaotic system with the shifting of order is utilized to modulate the transmitted signal, which has high nonlinearity and complexity in both frequency and time domains. The corresponding numerical simulations demonstrate the effectiveness and feasibility of the scheme.

  1. L-Band Digital Aeronautical Communications System Engineering - Initial Safety and Security Risk Assessment and Mitigation

    NASA Technical Reports Server (NTRS)

    Zelkin, Natalie; Henriksen, Stephen

    2011-01-01

    This document is being provided as part of ITT's NASA Glenn Research Center Aerospace Communication Systems Technical Support (ACSTS) contract NNC05CA85C, Task 7: "New ATM Requirements--Future Communications, C-Band and L-Band Communications Standard Development." ITT has completed a safety hazard analysis providing a preliminary safety assessment for the proposed L-band (960 to 1164 MHz) terrestrial en route communications system. The assessment was performed following the guidelines outlined in the Federal Aviation Administration Safety Risk Management Guidance for System Acquisitions document. The safety analysis did not identify any hazards with an unacceptable risk, though a number of hazards with a medium risk were documented. This effort represents a preliminary safety hazard analysis and notes the triggers for risk reassessment. A detailed safety hazards analysis is recommended as a follow-on activity to assess particular components of the L-band communication system after the technology is chosen and system rollout timing is determined. The security risk analysis resulted in identifying main security threats to the proposed system as well as noting additional threats recommended for a future security analysis conducted at a later stage in the system development process. The document discusses various security controls, including those suggested in the COCR Version 2.0.

  2. Application of Ica-Eemd to Secure Communications in Chaotic Systems

    NASA Astrophysics Data System (ADS)

    Lin, Shih-Lin; Tung, Pi-Cheng; Huang, Norden E.

    2012-04-01

    We propose the application of ICA-EEMD to secure communication systems. ICA-EEMD is employed to retrieve the message data encrypted by a mixture of Gaussian white noise and chaotic noise. The results showed that ICA-EEMD can effectively extract the two original message data.

  3. High security chaotic multiple access scheme for visible light communication systems with advanced encryption standard interleaving

    NASA Astrophysics Data System (ADS)

    Qiu, Junchao; Zhang, Lin; Li, Diyang; Liu, Xingcheng

    2016-06-01

    Chaotic sequences can be applied to realize multiple user access and improve the system security for a visible light communication (VLC) system. However, since the map patterns of chaotic sequences are usually well known, eavesdroppers can possibly derive the key parameters of chaotic sequences and subsequently retrieve the information. We design an advanced encryption standard (AES) interleaving aided multiple user access scheme to enhance the security of a chaotic code division multiple access-based visible light communication (C-CDMA-VLC) system. We propose to spread the information with chaotic sequences, and then the spread information is interleaved by an AES algorithm and transmitted over VLC channels. Since the computation complexity of performing inverse operations to deinterleave the information is high, the eavesdroppers in a high speed VLC system cannot retrieve the information in real time; thus, the system security will be enhanced. Moreover, we build a mathematical model for the AES-aided VLC system and derive the theoretical information leakage to analyze the system security. The simulations are performed over VLC channels, and the results demonstrate the effectiveness and high security of our presented AES interleaving aided chaotic CDMA-VLC system.

  4. The Mobil Integrated C{sup 3} (command control and communications) and Security System

    SciTech Connect

    Eras, A.; Brown, R.D.

    1993-06-15

    The current political and economic situations suggest that significant reductions of nuclear forces outside the US will continue. This implies that in times of crisis the rapid deployment of nuclear weapons into a theater may be required. This paper describes a proposed Mobile Integrated C{sup 3} and Security System (MICSS). The MICSS, together with associated personnel, could satisfy the command and control and security requirements of a deployed nuclear operation. Rapid deployment poses unique nuclear weapon surety difficulties that must be overcome for the operation to be effective and survivable. The MICSS must be portable, reliable, limited in size, and easily emplaced to facilitate movement, reduce the possibility of detection, and minimize manpower requirements. The MICSS will be based on existing technology. Sandia has designed prototype mobile command centers for the military. These command centers are based on an approach that stresses modularity, standards, and the use of an open architecture. Radio, telephone, satellite communications, communication security, and global positioning system equipment has been successfully integrated into the command centers. Sandia is also supporting the development of portable security systems for the military. These systems are rapidly deployable and mission flexible and are capable of intrusion detection, area and alarm display, night assessment, and wireless sensor communications. This paper is organized as follows: Background information about the prototype mobile command centers will be presented first. Background information about portable security systems concepts will then be given. Next, an integrated communications and security system will be presented, and finally, the design and status of a prototype MICSS will be described.

  5. Installation of secure, always available wireless LAN systems as a component of the hospital communication infrastructure.

    PubMed

    Hanada, Eisuke; Kudou, Takato; Tsumoto, Shusaku

    2013-06-01

    Wireless technologies as part of the data communication infrastructure of modern hospitals are being rapidly introduced. Even though there are concerns about problems associated with wireless communication security, the demand is remarkably large. In addition, insuring that the network is always available is important. Herein, we discuss security countermeasures and points to insure availability that must be taken to insure safe hospital/business use of wireless LAN systems, referring to the procedures introduced at Shimane University Hospital. Security countermeasures differ according to their purpose, such as for preventing illegal use or insuring availability, both of which are discussed. It is our hope that this information will assist others in their efforts to insure safe implementation of wireless LAN systems, especially in hospitals where they have the potential to greatly improve information sharing and patient safety.

  6. Deterministic secure quantum communication using a single d-level system

    PubMed Central

    Jiang, Dong; Chen, Yuanyuan; Gu, Xuemei; Xie, Ling; Chen, Lijun

    2017-01-01

    Deterministic secure quantum communication (DSQC) can transmit secret messages between two parties without first generating a shared secret key. Compared with quantum key distribution (QKD), DSQC avoids the waste of qubits arising from basis reconciliation and thus reaches higher efficiency. In this paper, based on data block transmission and order rearrangement technologies, we propose a DSQC protocol. It utilizes a set of single d-level systems as message carriers, which are used to directly encode the secret message in one communication process. Theoretical analysis shows that these employed technologies guarantee the security, and the use of a higher dimensional quantum system makes our protocol achieve higher security and efficiency. Since only quantum memory is required for implementation, our protocol is feasible with current technologies. Furthermore, Trojan horse attack (THA) is taken into account in our protocol. We give a THA model and show that THA significantly increases the multi-photon rate and can thus be detected. PMID:28327557

  7. Deterministic secure quantum communication using a single d-level system

    NASA Astrophysics Data System (ADS)

    Jiang, Dong; Chen, Yuanyuan; Gu, Xuemei; Xie, Ling; Chen, Lijun

    2017-03-01

    Deterministic secure quantum communication (DSQC) can transmit secret messages between two parties without first generating a shared secret key. Compared with quantum key distribution (QKD), DSQC avoids the waste of qubits arising from basis reconciliation and thus reaches higher efficiency. In this paper, based on data block transmission and order rearrangement technologies, we propose a DSQC protocol. It utilizes a set of single d-level systems as message carriers, which are used to directly encode the secret message in one communication process. Theoretical analysis shows that these employed technologies guarantee the security, and the use of a higher dimensional quantum system makes our protocol achieve higher security and efficiency. Since only quantum memory is required for implementation, our protocol is feasible with current technologies. Furthermore, Trojan horse attack (THA) is taken into account in our protocol. We give a THA model and show that THA significantly increases the multi-photon rate and can thus be detected.

  8. Deterministic secure quantum communication using a single d-level system.

    PubMed

    Jiang, Dong; Chen, Yuanyuan; Gu, Xuemei; Xie, Ling; Chen, Lijun

    2017-03-22

    Deterministic secure quantum communication (DSQC) can transmit secret messages between two parties without first generating a shared secret key. Compared with quantum key distribution (QKD), DSQC avoids the waste of qubits arising from basis reconciliation and thus reaches higher efficiency. In this paper, based on data block transmission and order rearrangement technologies, we propose a DSQC protocol. It utilizes a set of single d-level systems as message carriers, which are used to directly encode the secret message in one communication process. Theoretical analysis shows that these employed technologies guarantee the security, and the use of a higher dimensional quantum system makes our protocol achieve higher security and efficiency. Since only quantum memory is required for implementation, our protocol is feasible with current technologies. Furthermore, Trojan horse attack (THA) is taken into account in our protocol. We give a THA model and show that THA significantly increases the multi-photon rate and can thus be detected.

  9. Adaptive synchronization of a switching system and its applications to secure communications.

    PubMed

    Xia, Weiguo; Cao, Jinde

    2008-06-01

    This paper studies the adaptive synchronization of a switching system with unknown parameters which switches between the Rössler system and a unified chaotic system. Using the Lyapunov stability theory and adaptive control method, the receiver system will achieve synchronization with the drive system and the unknown parameters would be estimated by the receiver. Then the proposed switching system is used for secure communications based on the communication schemes including chaotic masking, chaotic modulation, and chaotic shift key strategies. Since the system switches between two chaotic systems and the parameters are almost unknown, it is more difficult for the intruder to extract the useful message from the transmission channel. In addition, two new schemes in which the chaotic signal used to mask (or modulate) the transmitted signal switches between two components of a chaotic system are also presented. Finally, some simulation results are given to show the effectiveness of the proposed communication schemes.

  10. Multiple channel secure communication using chaotic system encoding

    SciTech Connect

    Miller, S.L.

    1996-12-31

    fA new method to encrypt signals using chaotic systems has been developed that offers benefits over conventional chaotic encryption methods. The method simultaneously encodes multiple plaintext streams using a chaotic system; a key is required to extract the plaintext from the chaotic cipertext. A working prototype demonstrates feasibility of the method by simultaneously encoding and decoding multiple audio signals using electrical circuits.

  11. A Basis for Secure Communication in Large Distributed Systems

    DTIC Science & Technology

    1987-01-01

    perhaps! access to remote resources requires no further authentication. Examples are V [11), Eden [3) and Cronus [ 4). The system is controlled...SE-11(1), January 1985. [ ·f R. Schantz et al. Cronus , A Distributed Operating System. BBN Lab: r-atories Report No. 5885 [5: Cheheyl et al

  12. The Physical Layer Security Experiments of Cooperative Communication System with Different Relay Behaviors.

    PubMed

    Su, Yishan; Han, Guangyao; Fu, Xiaomei; Xu, Naishen; Jin, Zhigang

    2017-04-06

    Physical layer security is an attractive security mechanism, which exploits the randomness characteristics of wireless transmission channel to achieve security. However, it is hampered by the limitation of the channel condition that the main channel must be better than the eavesdropper channel. To alleviate the limitation, cooperative communication is introduced. Few studies have investigated the physical layer security of the relay transmission model. In this paper, we performed some experiments to evaluate the physical layer security of a cooperative communication system, with a relay operating in decode-and-forward (DF) cooperative mode, selfish and malicious behavior in real non-ideal transmission environment. Security performance is evaluated in terms of the probability of non-zero secrecy capacity. Experiments showed some different results compared to theoretical simulation: (1) to achieve the maximum secrecy capacity, the optimal relay power according to the experiments result is larger than that of ideal theoretical results under both cooperative and selfish behavior relay; (2) the relay in malicious behavior who forwards noise to deteriorate the main channel may deteriorate the eavesdropper channel more seriously than the main channel; (3) the optimal relay positions under cooperative and selfish behavior relay cases are both located near the destination because of non-ideal transmission.

  13. The Physical Layer Security Experiments of Cooperative Communication System with Different Relay Behaviors

    PubMed Central

    Su, Yishan; Han, Guangyao; Fu, Xiaomei; Xu, Naishen; Jin, Zhigang

    2017-01-01

    Physical layer security is an attractive security mechanism, which exploits the randomness characteristics of wireless transmission channel to achieve security. However, it is hampered by the limitation of the channel condition that the main channel must be better than the eavesdropper channel. To alleviate the limitation, cooperative communication is introduced. Few studies have investigated the physical layer security of the relay transmission model. In this paper, we performed some experiments to evaluate the physical layer security of a cooperative communication system, with a relay operating in decode-and-forward (DF) cooperative mode, selfish and malicious behavior in real non-ideal transmission environment. Security performance is evaluated in terms of the probability of non-zero secrecy capacity. Experiments showed some different results compared to theoretical simulation: (1) to achieve the maximum secrecy capacity, the optimal relay power according to the experiments result is larger than that of ideal theoretical results under both cooperative and selfish behavior relay; (2) the relay in malicious behavior who forwards noise to deteriorate the main channel may deteriorate the eavesdropper channel more seriously than the main channel; (3) the optimal relay positions under cooperative and selfish behavior relay cases are both located near the destination because of non-ideal transmission. PMID:28383501

  14. An Application of Chaotic Chua's System for Secure Chaotic Communication Based on Sliding Mode observer

    NASA Astrophysics Data System (ADS)

    Kemih, K.; Halimi, M.; Ghanes, M.; Zhang, G.

    2011-12-01

    In this paper, we study the design and implementation of analog secure communication systems via synchronized chaotic Chua's circuit with sliding mode observer. For this, we adopt an approach based on an inclusion of the message in the transmitter and in the receiver; we use a sliding mode observer with un-known input in order to recover the information. Finally, an analog electronic circuit with Multisim software is designed to physically realize the complete system (transmitter-receiver).

  15. Control and Communication for a Secure and Reconfigurable Power Distribution System

    NASA Astrophysics Data System (ADS)

    Giacomoni, Anthony Michael

    A major transformation is taking place throughout the electric power industry to overlay existing electric infrastructure with advanced sensing, communications, and control system technologies. This transformation to a smart grid promises to enhance system efficiency, increase system reliability, support the electrification of transportation, and provide customers with greater control over their electricity consumption. Upgrading control and communication systems for the end-to-end electric power grid, however, will present many new security challenges that must be dealt with before extensive deployment and implementation of these technologies can begin. In this dissertation, a comprehensive systems approach is taken to minimize and prevent cyber-physical disturbances to electric power distribution systems using sensing, communications, and control system technologies. To accomplish this task, an intelligent distributed secure control (IDSC) architecture is presented and validated in silico for distribution systems to provide greater adaptive protection, with the ability to proactively reconfigure, and rapidly respond to disturbances. Detailed descriptions of functionalities at each layer of the architecture as well as the whole system are provided. To compare the performance of the IDSC architecture with that of other control architectures, an original simulation methodology is developed. The simulation model integrates aspects of cyber-physical security, dynamic price and demand response, sensing, communications, intermittent distributed energy resources (DERs), and dynamic optimization and reconfiguration. Applying this comprehensive systems approach, performance results for the IEEE 123 node test feeder are simulated and analyzed. The results show the trade-offs between system reliability, operational constraints, and costs for several control architectures and optimization algorithms. Additional simulation results are also provided. In particular, the

  16. Secure Communication Based on Hyperchaotic Chen System with Time-Delay

    NASA Astrophysics Data System (ADS)

    Ren, Hai-Peng; Bai, Chao; Huang, Zhan-Zhan; Grebogi, Celso

    An experimental secure communication method based on the Chen system with time-delay is being proposed in this paper. The Chen system with time-delay is an infinite-dimensional system having more than one positive Lyapunov exponent. The message to be transmitted is encrypted using an hyperchaotic signal generated by the Chen system with time-delay and multishift cipher function. This encryption makes difficult for an eavesdropper to reconstruct the attractor by using time-delay embedding techniques, return map reconstruction, or spectral analysis, consequently, improving the security. Simulations and experiments on TI TMS320C6713 Digital Signal Processor (DSP) show improved resilience against attack and the feasibility of the proposed scheme.

  17. Classical noise, quantum noise and secure communication

    NASA Astrophysics Data System (ADS)

    Tannous, C.; Langlois, J.

    2016-01-01

    Secure communication based on message encryption might be performed by combining the message with controlled noise (called pseudo-noise) as performed in spread-spectrum communication used presently in Wi-Fi and smartphone telecommunication systems. Quantum communication based on entanglement is another route for securing communications as demonstrated by several important experiments described in this work. The central role played by the photon in unifying the description of classical and quantum noise as major ingredients of secure communication systems is highlighted and described on the basis of the classical and quantum fluctuation dissipation theorems.

  18. Framework for Flexible Security in Group Communications

    NASA Technical Reports Server (NTRS)

    McDaniel, Patrick; Prakash, Atul

    2006-01-01

    The Antigone software system defines a framework for the flexible definition and implementation of security policies in group communication systems. Antigone does not dictate the available security policies, but provides high-level mechanisms for implementing them. A central element of the Antigone architecture is a suite of such mechanisms comprising micro-protocols that provide the basic services needed by secure groups.

  19. An application of Chen system for secure chaotic communication based on extended Kalman filter and multi-shift cipher algorithm

    NASA Astrophysics Data System (ADS)

    Fallahi, Kia; Raoufi, Reza; Khoshbin, Hossein

    2008-07-01

    In recent years chaotic secure communication and chaos synchronization have received ever increasing attention. In this paper a chaotic communication method using extended Kalman filter is presented. The chaotic synchronization is implemented by EKF design in the presence of channel additive noise and processing noise. Encoding chaotic communication is used to achieve a satisfactory, typical secure communication scheme. In the proposed system, a multi-shift cipher algorithm is also used to enhance the security and the key cipher is chosen as one of the chaos states. The key estimate is employed to recover the primary data. To illustrate the effectiveness of the proposed scheme, a numerical example based on Chen dynamical system is presented and the results are compared to two other chaotic systems.

  20. A Non-symmetric Digital Image Secure Communication Scheme Based on Generalized Chaos Synchronization System

    NASA Astrophysics Data System (ADS)

    Zhang, Xiao-Hong; Min, Le-Quan

    2005-12-01

    Based on a generalized chaos synchronization system and a discrete Sinai map, a non-symmetric true color (RGB) digital image secure communication scheme is proposed. The scheme first changes an ordinary RGB digital image with 8 bits into unrecognizable disorder codes and then transforms the disorder codes into an RGB digital image with 16 bits for transmitting. A receiver uses a non-symmetric key to verify the authentication of the received data origin, and decrypts the ciphertext. The scheme can encrypt and decrypt most formatted digital RGB images recognized by computers, and recover the plaintext almost without any errors. The scheme is suitable to be applied in network image communications. The analysis of the key space, sensitivity of key parameters, and correlation of encrypted images imply that this scheme has sound security. The project supported by National Natural Science Foundation of China under Grant Nos. 60074034 and 70271068, the Foundation for University Key Teachers, and the Research Fund for the Doctoral Program of Higher Education under Grant No. 20020008004 by the Ministry of Education of China

  1. BER performance enhancement for secure wireless communication systems based on chaotic-MIMO techniques

    NASA Astrophysics Data System (ADS)

    Abdulameer, Lwaa F.; Jignesh, Jokhakar D.; Sripati, U.; Kulkarni, Murlidhar

    2013-01-01

    The growing interest in the use of chaotic techniques for enabling secure communication in recent years has been motivated by the emergence of a number of wireless services which require the service provider to provide low bit error rates (BER) along with information security. This paper investigates the feasibility of using chaotic communications over Multiple-Input-Multiple-Output (MIMO) channels. While the use of Chaotic maps can enhance security, it is seen that the overall BER performance gets degraded when compared to conventional communication schemes. In order to overcome this limitation, we have proposed the use of a combination of Chaotic modulation and Alamouti Space Time Block Code. The performance of Chaos Shift Keying (CSK) with 2×1 and 2×2 Alamouti schemes for different chaotic maps over wireless channels has been studied. It has been shown that the use of these schemes can provide security enhancement without the penalty of degradation of BER performance.

  2. Secure communications using quantum cryptography

    SciTech Connect

    Hughes, R.J.; Buttler, W.T.; Kwiat, P.G.

    1997-08-01

    The secure distribution of the secret random bit sequences known as {open_quotes}key{close_quotes} material, is an essential precursor to their use for the encryption and decryption of confidential communications. Quantum cryptography is an emerging technology for secure key distribution with single-photon transmissions, nor evade detection (eavesdropping raises the key error rate above a threshold value). We have developed experimental quantum cryptography systems based on the transmission of non-orthogonal single-photon states to generate shared key material over multi-kilometer optical fiber paths and over line-of-sight links. In both cases, key material is built up using the transmission of a single-photon per bit of an initial secret random sequence. A quantum-mechanically random subset of this sequence is identified, becoming the key material after a data reconciliation stage with the sender. In our optical fiber experiment we have performed quantum key distribution over 24-km of underground optical fiber using single-photon interference states, demonstrating that secure, real-time key generation over {open_quotes}open{close_quotes} multi-km node-to-node optical fiber communications links is possible. We have also constructed a quantum key distribution system for free-space, line-of-sight transmission using single-photon polarization states, which is currently undergoing laboratory testing. 7 figs.

  3. Chaos Generated from the Fractional-Order Complex Chen System and its Application to Digital Secure Communication

    NASA Astrophysics Data System (ADS)

    Luo, Chao; Wang, Xingyuan

    2013-04-01

    In this paper, a novel dynamic system, the fractional-order complex Chen system, is presented for the first time. Dynamic behaviors of system are studied analytically and numerically. Different routes to chaos are shown, and diverse kinds of motions are identified and exhibited by means of bifurcation diagram, portrait phase and the largest Lyapunov exponent. Secondly, an application to digital secure communication based on the novel system is proposed, in which security is enhanced by continually switching different orders of derivative in an irregular pattern. Furthermore, making full use of the advantage of high-capacity transmission of complex system, the improved digital secure communication scheme is achieved based on hybrid synchronization in coupled fractional-order complex Chen system, that means anti-synchronization in real part of state variables and projective synchronization in imaginary part, respectively. The corresponding numerical simulations demonstrate the effectiveness and feasibility of the proposed schemes.

  4. Secure Intra-Body Wireless Communications (SIWiC) System Project

    NASA Technical Reports Server (NTRS)

    Ahmad, Aftab; Doggett, Terrence P.

    2011-01-01

    SIWiC System is a project to investigate, design and implement future wireless networks of implantable sensors in the body. This futuristic project is designed to make use of the emerging and yet-to-emerge technologies, including ultra-wide band (UWB) for wireless communications, smart implantable sensors, ultra low power networking protocols, security and privacy for bandwidth and power deficient devices and quantum computing. Progress in each of these fronts is hindered by the needs of breakthrough. But, as we will see in this paper, these major challenges are being met or will be met in near future. SIWiC system is a network of in-situ wireless devices that are implanted to coordinate sensed data inside the body, such as symptoms monitoring collected internally, or biometric data collected of an outside object from within the intra-body network. One node has the capability of communicating outside the body to send data or alarm to a relevant authority, e.g., a remote physician.

  5. Systems Security Engineering

    DTIC Science & Technology

    2010-08-22

    microelectronics , printed circuit boards, computing systems, software, mobile telephony, satellite communications and networks). Critical Program...security. The challenge is meant to mirror the gauntlet of canonical hard math problems presented by Hilbert to the International Congress of...threat deflection and internal trust assurance. Research modules in this section propose a new way of approaching security metrics that involve

  6. 78 FR 46582 - Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-01

    ... COMMISSION Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council... Communications Commission's (FCC or Commission) Communications Security, Reliability, and Interoperability... to ensure the security, reliability, and interoperability of communications systems. On March...

  7. Aerospace Communications Security Technologies Demonstrated

    NASA Technical Reports Server (NTRS)

    Griner, James H.; Martzaklis, Konstantinos S.

    2003-01-01

    In light of the events of September 11, 2001, NASA senior management requested an investigation of technologies and concepts to enhance aviation security. The investigation was to focus on near-term technologies that could be demonstrated within 90 days and implemented in less than 2 years. In response to this request, an internal NASA Glenn Research Center Communications, Navigation, and Surveillance Aviation Security Tiger Team was assembled. The 2-year plan developed by the team included an investigation of multiple aviation security concepts, multiple aircraft platforms, and extensively leveraged datalink communications technologies. It incorporated industry partners from NASA's Graphical Weather-in-the-Cockpit research, which is within NASA's Aviation Safety Program. Two concepts from the plan were selected for demonstration: remote "black box," and cockpit/cabin surveillance. The remote "black box" concept involves real-time downlinking of aircraft parameters for remote monitoring and archiving of aircraft data, which would assure access to the data following the loss or inaccessibility of an aircraft. The cockpit/cabin surveillance concept involves remote audio and/or visual surveillance of cockpit and cabin activity, which would allow immediate response to any security breach and would serve as a possible deterrent to such breaches. The datalink selected for the demonstrations was VDL Mode 2 (VHF digital link), the first digital datalink for air-ground communications designed for aircraft use. VDL Mode 2 is beginning to be implemented through the deployment of ground stations and aircraft avionics installations, with the goal of being operational in 2 years. The first demonstration was performed December 3, 2001, onboard the LearJet 25 at Glenn. NASA worked with Honeywell, Inc., for the broadcast VDL Mode 2 datalink capability and with actual Boeing 757 aircraft data. This demonstration used a cockpitmounted camera for video surveillance and a coupling to

  8. Secure communication in fiber optic systems via transmission of broad-band optical noise.

    PubMed

    Buskila, O; Eyal, A; Shtaif, M

    2008-03-03

    We propose a new scheme for data encryption in the physical layer. Our scheme is based on the distribution of a broadband optical noise-like signal between Alice and Bob. The broadband signal is used for the establishment of a secret key that can be used for the secure transmission of information by using the one-time-pad method. We characterize the proposed scheme and study its applicability to the existing fiber-optics communications infrastructure.

  9. Security and Scientific Communication.

    ERIC Educational Resources Information Center

    Chalk, Rosemary

    1983-01-01

    Issues related to reports and proposed regulations seeking to limit openness in scientific work because of national security interests are discussed. Although administration officials argue that free flow of scientific information allows United States' adversaries to grow stronger at our expense, imposition of controls may undermine U.S. vitality…

  10. Security system

    DOEpatents

    Baumann, Mark J.; Kuca, Michal; Aragon, Mona L.

    2016-02-02

    A security system includes a structure having a structural surface. The structure is sized to contain an asset therein and configured to provide a forceful breaching delay. The structure has an opening formed therein to permit predetermined access to the asset contained within the structure. The structure includes intrusion detection features within or associated with the structure that are activated in response to at least a partial breach of the structure.

  11. Trust Relationships, Naming, and Secure Communication in Large Distributed Computer Systems.

    NASA Astrophysics Data System (ADS)

    Rangan, P. Venkata

    Computing systems are evolving into distributed systems that interconnect competing organizations and individuals, and even countries, using high-speed global networks. The relationships among these entities are characterized by the need for competition and cooperation without a common trusted agent. To build such distributed systems that incorporate lack of global trust in them, it is necessary first to understand precisely what trust consists of and then to categorize it. This thesis develops an axiomatic theory of trust in distributed systems. The theory is based on model logics of belief. We present systematic methods for synthesizing protocols that implement a given trust specification. Trust is primarily required to establish channels for secure communication. We present methods for reasoning about trusts required by various channel establishment mechanisms. Channel establishment mechanisms are commonly based on either public key encryption (PKE) or single key encryption (SKE). PKE-based mechanisms require ternary trust relationships known as authenticity trusts. SKE -based mechanisms have much larger trust requirements. Starting from the differences in trust requirements of PKE and SKE, we derive several advantages of the former over the latter. Our analyses provide insight into the trust structure and limitations of various mechanisms. We show that a distributed system must provide a tree of channels at system configuration time, and that this tree also represents the system's global name space. We develop polynomial-time algorithms for synthesizing name spaces so as to satisfy an a priori given set of trust specifications. We present some interesting duality results and NP-completeness results with regard to some variations of the synthesis problems. Sample runs of the polynomial -time algorithms show that small differences in trust relationships can cause substantial differences in the structure of the name spaces. Trust requirements and the performance

  12. 49 CFR 193.2909 - Security communications.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 3 2011-10-01 2011-10-01 false Security communications. 193.2909 Section 193.2909...: FEDERAL SAFETY STANDARDS Security § 193.2909 Security communications. A means must be provided for: (a) Prompt communications between personnel having supervisory security duties and law enforcement...

  13. 49 CFR 193.2909 - Security communications.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false Security communications. 193.2909 Section 193.2909...: FEDERAL SAFETY STANDARDS Security § 193.2909 Security communications. A means must be provided for: (a) Prompt communications between personnel having supervisory security duties and law enforcement...

  14. 49 CFR 193.2909 - Security communications.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 3 2012-10-01 2012-10-01 false Security communications. 193.2909 Section 193.2909...: FEDERAL SAFETY STANDARDS Security § 193.2909 Security communications. A means must be provided for: (a) Prompt communications between personnel having supervisory security duties and law enforcement...

  15. Identical synchronization of chaotic secure communication systems with channel induced coherence resonance

    NASA Astrophysics Data System (ADS)

    Sepantaie, Marc M.; Namazi, Nader M.; Sepantaie, Amir M.

    2016-05-01

    This paper is devoted to addressing the synchronization, and detection of random binary data exposed to inherent channel variations existing in Free Space Optical (FSO) communication systems. This task is achieved by utilizing the identical synchronization methodology of Lorenz chaotic communication system, and its synergetic interaction in adversities imposed by the FSO channel. Moreover, the Lorenz system has been analyzed, and revealed to induce Stochastic Resonance (SR) once exposed to Additive White Gaussian Noise (AWGN). In particular, the resiliency of the Lorenz chaotic system, in light of channel adversities, has been attributed to the success of the proposed communication system. Furthermore, this paper advocates the use of Haar wavelet transform for enhanced detection capability of the proposed chaotic communication system, which utilizes Chaotic Parameter Modulation (CPM) technique for means of transmission.

  16. Study of dual-directional high rate secure communication systems using chaotic multiple-quantum-well lasers

    NASA Astrophysics Data System (ADS)

    Yan, Sen-Lin

    2007-11-01

    A scheme of synchronized injection multi-quantum-well (MQW) laser system using optical coupling-feedback is presented for performing chaotic dual-directional secure communication. The performance characterization of chaos masking is investigated theoretically, the equation of synchronization demodulation is deduced and its root is also given. Chaos masking encoding with a rate of 5Gbit/s and a modulation frequency of 1GHz, chaos modulation with a rate of 0.2Gbit/s and a modulation frequency of 0.2 GHz and chaos shifting key with a rate of 0.2Gbit/s are numerically simulated, separately. The ratio of the signal to the absolute synchronous error and the time for achieving synchronous demodulation are analysed in detail. The results illustrate that the system has stronger privacy and good performances so that it can be applied in chaotic dual-directional high rate secure communications.

  17. Tools and Methods for Hardening Communication Security of Energy Delivery Systems

    SciTech Connect

    Gadgil, Shrirang; Lin, Yow-Jian; Ghosh, Abhrajit; Samtani, Sunil; Kang, Jaewon; Siegell, Bruce; Kaul, Vikram; Unger, John; De Bruet, Andre; Martinez, Catherine; Vermeulen, Gerald; Rasche, Galen; Sternfeld, Scott; Berthier, Robin; Bobba, Rakesh; Campbell, Roy; Sanders, Williams

    2014-09-28

    This document summarizes the research and development work the TT Government Solutions (TTGS), d.b.a. Applied Communication Sciences (ACS), team performed for the Department of Energy Cybersecurity for Energy Delivery Systems (CEDS) program. It addresses the challenges in protecting critical grid control and data communication, including the identification of vulnerabilities and deficiencies of communication protocols commonly used in energy delivery systems (e.g., ICCP, DNP3, C37.118, C12.22), as well as the development of effective means to detect and prevent the exploitation of such vulnerabilities and deficiencies.

  18. Secure Network-Centric Aviation Communication (SNAC)

    NASA Technical Reports Server (NTRS)

    Nelson, Paul H.; Muha, Mark A.; Sheehe, Charles J.

    2017-01-01

    The existing National Airspace System (NAS) communications capabilities are largely unsecured, are not designed for efficient use of spectrum and collectively are not capable of servicing the future needs of the NAS with the inclusion of new operators in Unmanned Aviation Systems (UAS) or On Demand Mobility (ODM). SNAC will provide a ubiquitous secure, network-based communications architecture that will provide new service capabilities and allow for the migration of current communications to SNAC over time. The necessary change in communication technologies to digital domains will allow for the adoption of security mechanisms, sharing of link technologies, large increase in spectrum utilization, new forms of resilience and redundancy and the possibly of spectrum reuse. SNAC consists of a long term open architectural approach with increasingly capable designs used to steer research and development and enable operating capabilities that run in parallel with current NAS systems.

  19. Secure optical communication using antisqueezing

    SciTech Connect

    Tomaru, Tatsuya; Ban, Masashi

    2006-09-15

    When considering an application of quantum-information technology, we should consider realistic conditions first. From this point of view, we propose using antisqueezed light as a resource for optical communication because antisqueezing maintains its nature even after loss and amplification. Applying antisqueezed light to cipher communication using randomized sender bases, we can increase, by high order of magnitude, the bit-error rate of eavesdroppers who do not have the basis information. Even at macroscopic optical intensity, an ordinary level of optical communication, we can cause the bit-error rate of eavesdroppers to be as high as it would be at low intensity, through increased antisqueezing depending on optical intensity, leading to more secure optical communication.

  20. Policy-based secure communication with automatic key management for industrial control and automation systems

    DOEpatents

    Chernoguzov, Alexander; Markham, Thomas R.; Haridas, Harshal S.

    2016-11-22

    A method includes generating at least one access vector associated with a specified device in an industrial process control and automation system. The specified device has one of multiple device roles. The at least one access vector is generated based on one or more communication policies defining communications between one or more pairs of devices roles in the industrial process control and automation system, where each pair of device roles includes the device role of the specified device. The method also includes providing the at least one access vector to at least one of the specified device and one or more other devices in the industrial process control and automation system in order to control communications to or from the specified device.

  1. Security system signal supervision

    SciTech Connect

    Chritton, M.R. ); Matter, J.C. )

    1991-09-01

    This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

  2. Maximizing the security of chaotic optical communications.

    PubMed

    Hou, T T; Yi, L L; Yang, X L; Ke, J X; Hu, Y; Yang, Q; Zhou, P; Hu, W S

    2016-10-03

    The practical application of chaotic optical communications has been limited by two aspects: the difficulty in concealing the time delay - a critical security parameter in feedback chaotic systems, and the difficulty of significantly enlarging the key space without complicating the implementation. Here we propose an architecture to break the above limits. By introducing a frequency-dependent group delay module with frequency tuning resolution of 1 MHz into the chaotic feedback loop, we demonstrate excellent time delay concealment effect, and an additional huge key space of 1048 can be achieved at the same time. The effectiveness is proved by both numerical simulation and experiment. Besides, the proposed scheme is compatible with the existing commercial optical communication systems, thus pave the way for high-speed secure optical communications.

  3. Increasing security in inter-chip communication

    DOEpatents

    Edwards, Nathan J; Hamlet, Jason; Bauer, Todd; Helinski, Ryan

    2014-10-28

    An apparatus for increasing security in inter-chip communication includes a sending control module, a communication bus, and a receiving control module. The communication bus is coupled between the sending control module and the receiving control module. The sending control module operates to send data on the communication bus, disable the communication bus when threats are detected, or both.

  4. Increasing security in inter-chip communication

    DOEpatents

    Edwards, Nathan J.; Hamlet, Jason; Bauer, Todd; Helinski, Ryan

    2017-08-01

    An apparatus for increasing security in inter-chip communication includes a sending control module, a communication bus, and a receiving control module. The communication bus is coupled between the sending control module and the receiving control module. The sending control module operates to send data on the communication bus, disable the communication bus when threats are detected, or both.

  5. Communications and control for electric power systems: Power flow classification for static security assessment

    NASA Technical Reports Server (NTRS)

    Niebur, D.; Germond, A.

    1993-01-01

    This report investigates the classification of power system states using an artificial neural network model, Kohonen's self-organizing feature map. The ultimate goal of this classification is to assess power system static security in real-time. Kohonen's self-organizing feature map is an unsupervised neural network which maps N-dimensional input vectors to an array of M neurons. After learning, the synaptic weight vectors exhibit a topological organization which represents the relationship between the vectors of the training set. This learning is unsupervised, which means that the number and size of the classes are not specified beforehand. In the application developed in this report, the input vectors used as the training set are generated by off-line load-flow simulations. The learning algorithm and the results of the organization are discussed.

  6. Coalition Game-Based Secure and Effective Clustering Communication in Vehicular Cyber-Physical System (VCPS)

    PubMed Central

    Huo, Yan; Dong, Wei; Qian, Jin; Jing, Tao

    2017-01-01

    In this paper, we address the low efficiency of cluster-based communication for the crossroad scenario in the Vehicular Cyber-Physical System (VCPS), which is due to the overload of the cluster head resulting from a large number of transmission bandwidth requirements. After formulating the issue as a coalition formation game, a coalition-based clustering strategy is proposed, which could converge into a Nash-stable partition to accomplish the clustering formation process. In the proposed strategy, the coalition utility is formulated by the relative velocity, relative position and the bandwidth availability ratio of vehicles among the cluster. Employing the coalition utility, the vehicles are denoted as the nodes that make the decision whether to switch to a new coalition or stay in the current coalition. Based on this, we can make full use of the bandwidth provided by cluster head under the requirement of clustering stability. Nevertheless, there exist selfish nodes during the clustering formation, so as to intend to benefit from networks. This behavior may degrade the communication quality and even destroy the cluster. Thus, we also present a reputation-based incentive and penalty mechanism to stop the selfish nodes from entering clusters. Numerical simulation results show that our strategy, CG-SECC, takes on a better performance for the tradeoff between the stability and efficiency of clustering communication. Besides, a case study demonstrates that the proposed incentive and penalty mechanism can play an important role in discovering and removing malicious nodes. PMID:28264469

  7. Coalition Game-Based Secure and Effective Clustering Communication in Vehicular Cyber-Physical System (VCPS).

    PubMed

    Huo, Yan; Dong, Wei; Qian, Jin; Jing, Tao

    2017-02-27

    In this paper, we address the low efficiency of cluster-based communication for the crossroad scenario in the Vehicular Cyber-Physical System (VCPS), which is due to the overload of the cluster head resulting from a large number of transmission bandwidth requirements. After formulating the issue as a coalition formation game, a coalition-based clustering strategy is proposed, which could converge into a Nash-stable partition to accomplish the clustering formation process. In the proposed strategy, the coalition utility is formulated by the relative velocity, relative position and the bandwidth availability ratio of vehicles among the cluster. Employing the coalition utility, the vehicles are denoted as the nodes that make the decision whether to switch to a new coalition or stay in the current coalition. Based on this, we can make full use of the bandwidth provided by cluster head under the requirement of clustering stability. Nevertheless, there exist selfish nodes duringtheclusteringformation,soastointendtobenefitfromnetworks. Thisbehaviormaydegrade the communication quality and even destroy the cluster. Thus, we also present a reputation-based incentive and penalty mechanism to stop the selfish nodes from entering clusters. Numerical simulation results show that our strategy, CG-SECC, takes on a better performance for the tradeoff between the stability and efficiency of clustering communication. Besides, a case study demonstrates that the proposed incentive and penalty mechanism can play an important role in discovering and removing malicious nodes.

  8. Mixed coherent states in coupled chaotic systems: Design of secure wireless communication

    NASA Astrophysics Data System (ADS)

    Vigneshwaran, M.; Dana, S. K.; Padmanaban, E.

    2016-12-01

    A general coupling design is proposed to realize a mixed coherent (MC) state: coexistence of complete synchronization, antisynchronization, and amplitude death in different pairs of similar state variables of the coupled chaotic system. The stability of coupled system is ensured by the Lyapunov function and a scaling of each variable is also separately taken care of. When heterogeneity as a parameter mismatch is introduced in the coupled system, the coupling function facilitates to retain its coherence and displays the global stability with renewed scaling factor. Robust synchronization features facilitated by a MC state enable to design a dual modulation scheme: binary phase shift key (BPSK) and parameter mismatch shift key (PMSK), for secure data transmission. Two classes of decoders (coherent and noncoherent) are discussed, the noncoherent decoder shows better performance over the coherent decoder, mostly a noncoherent demodulator is preferred in biological implant applications. Both the modulation schemes are demonstrated numerically by using the Lorenz oscillator and the BPSK scheme is demonstrated experimentally using radio signals.

  9. Secure communication via quantum illumination

    NASA Astrophysics Data System (ADS)

    Shapiro, Jeffrey H.; Zhang, Zheshen; Wong, Franco N. C.

    2014-10-01

    In the quantum illumination protocol for secure communication, Alice prepares entangled signal and idler beams via spontaneous parametric downconversion. She sends the signal beam to Bob, while retaining the idler. Bob imposes message modulation on the beam he receives from Alice, amplifies it, and sends it back to her. Alice then decodes Bob's information by making a joint quantum measurement on the light she has retained and the light she has received from him. The basic performance analysis for this protocol—which demonstrates its immunity to passive eavesdropping, in which Eve can only listen to Alice and Bob's transmissions—is reviewed, along with the results of its first proof-of-principle experiment. Further analysis is then presented, showing that secure data rates in excess of 1 Gbps may be possible over 20-km-long fiber links with technology that is available or under development. Finally, an initial scheme for thwarting active eavesdropping, in which Eve injects her own light into Bob's terminal, is proposed and analyzed.

  10. On neural network techniques in the secure management of communication systems through improving and quality assessing pseudorandom stream generators.

    PubMed

    Karras, D A; Zorkadis, V

    2003-01-01

    Random components play an especially important role in the management of secure communication systems, with emphasis on the key management of cryptographic protocols. For this reason, the existence of strong pseudo random number generators is highly required. This paper presents novel techniques, which rely on Artificial Neural Network (ANN) architectures, to strengthen traditional generators such as IDEA and ANSI X.9 based on 3DES and IDEA. Additionally, this paper proposes a non-linear test method for the quality assessment of the required non-predictability property, which relies on feedforward neural networks. This non-predictability test method along with commonly used empirical tests based on statistics is proposed as a methodology for quality assessing strong pseudorandom stream generators. By means of this methodology, traditional and Neural Network based pseudorandom stream generators are evaluated. The results show that the proposed generators behave significantly better than the traditional ones, in particular, in terms of non-predictability.

  11. Provable Security of Communication for Protecting Information Flow in Distributed Systems

    DTIC Science & Technology

    2015-06-01

    Fiber,”  IEEE  Trans.  on  Communications,   62(3): 1080 -­‐90,  March,  2014.   15) S.  Shang,  T.  Wang,  P.  Cuff,  S...Physical Layer Secrecy in Multimode Fiber,” IEEE Trans. on Communications, 62(3): 1080 -90, March, 2014. 15) S. Shang, T. Wang, P. Cuff, S. Kulkarni

  12. 49 CFR 236.1033 - Communications and security requirements.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ..., INSPECTION, MAINTENANCE, AND REPAIR OF SIGNAL AND TRAIN CONTROL SYSTEMS, DEVICES, AND APPLIANCES Positive Train Control Systems § 236.1033 Communications and security requirements. (a) All wireless... exceeding the security strength required to protect the data as defined in the railroad's PTCSP and required...

  13. 49 CFR 236.1033 - Communications and security requirements.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ..., INSPECTION, MAINTENANCE, AND REPAIR OF SIGNAL AND TRAIN CONTROL SYSTEMS, DEVICES, AND APPLIANCES Positive Train Control Systems § 236.1033 Communications and security requirements. (a) All wireless... exceeding the security strength required to protect the data as defined in the railroad's PTCSP and required...

  14. Semiquantum secure direct communication using EPR pairs

    NASA Astrophysics Data System (ADS)

    Zhang, Ming-Hui; Li, Hui-Fang; Xia, Zhao-Qiang; Feng, Xiao-Yi; Peng, Jin-Ye

    2017-05-01

    Quantum secure direct communication can transmit a secret message directly through quantum channels without first generating a shared secret key. In the most of the existing protocols, quantum secure direct communication is possible only when both communicating participants have quantum capabilities. So what happens if either party of two participants just has classical capabilities? In this paper, we propose a semiquantum secure direct communication protocol with Einstein-Podolsky-Rosen photon pairs in which the classical sender Bob transmits a secret message to quantum Alice directly. After checking the security of quantum channels, Bob encodes his secret message on Alice's code sequence. Then, quantum Alice extracts Bob's secret message by measuring her home qubits and the received code qubits, respectively. In addition, we demonstrate the security of the proposed protocol against some individual eavesdropping attacks. The efficiency analysis shows that our protocol can provide higher efficiency.

  15. Advanced quantum communication systems

    NASA Astrophysics Data System (ADS)

    Jeffrey, Evan Robert

    Quantum communication provides several examples of communication protocols which cannot be implemented securely using only classical communication. Currently, the most widely known of these is quantum cryptography, which allows secure key exchange between parties sharing a quantum channel subject to an eavesdropper. This thesis explores and extends the realm of quantum communication. Two new quantum communication protocols are described. The first is a new form of quantum cryptography---relativistic quantum cryptography---which increases communication efficiency by exploiting a relativistic bound on the power of an eavesdropper, in addition to the usual quantum mechanical restrictions intrinsic to quantum cryptography. By doing so, we have observed over 170% improvement in communication efficiency over a similar protocol not utilizing relativity. A second protocol, Quantum Orienteering, allows two cooperating parties to communicate a specific direction in space. This application shows the possibility of using joint measurements, or projections onto an entangled state, in order to extract the maximum useful information from quantum bits. For two-qubit communication, the maximal fidelity of communication using only separable operations is 73.6%, while joint measurements can improve the efficiency to 78.9%. In addition to implementing these protocols, we have improved several resources for quantum communication and quantum computing. Specifically, we have developed improved sources of polarization-entangled photons, a low-loss quantum memory for polarization qubits, and a quantum random number generator. These tools may be applied to a wide variety of future quantum and classical information systems.

  16. Cryptography in a communication system

    NASA Astrophysics Data System (ADS)

    Best, M. R.

    1982-10-01

    Communication system protection by cryptography is reviewed. Privacy and authentication problems are discussed. Conventional cryptographic systems as well as public key systems are complementary. Classical security methods such as signed contracts, physical locks, passwords and keys remain important.

  17. Quantum Secure Direct Communication with Quantum Memory

    NASA Astrophysics Data System (ADS)

    Zhang, Wei; Ding, Dong-Sheng; Sheng, Yu-Bo; Zhou, Lan; Shi, Bao-Sen; Guo, Guang-Can

    2017-06-01

    Quantum communication provides an absolute security advantage, and it has been widely developed over the past 30 years. As an important branch of quantum communication, quantum secure direct communication (QSDC) promotes high security and instantaneousness in communication through directly transmitting messages over a quantum channel. The full implementation of a quantum protocol always requires the ability to control the transfer of a message effectively in the time domain; thus, it is essential to combine QSDC with quantum memory to accomplish the communication task. In this Letter, we report the experimental demonstration of QSDC with state-of-the-art atomic quantum memory for the first time in principle. We use the polarization degrees of freedom of photons as the information carrier, and the fidelity of entanglement decoding is verified as approximately 90%. Our work completes a fundamental step toward practical QSDC and demonstrates a potential application for long-distance quantum communication in a quantum network.

  18. Quantum Secure Direct Communication with Quantum Memory.

    PubMed

    Zhang, Wei; Ding, Dong-Sheng; Sheng, Yu-Bo; Zhou, Lan; Shi, Bao-Sen; Guo, Guang-Can

    2017-06-02

    Quantum communication provides an absolute security advantage, and it has been widely developed over the past 30 years. As an important branch of quantum communication, quantum secure direct communication (QSDC) promotes high security and instantaneousness in communication through directly transmitting messages over a quantum channel. The full implementation of a quantum protocol always requires the ability to control the transfer of a message effectively in the time domain; thus, it is essential to combine QSDC with quantum memory to accomplish the communication task. In this Letter, we report the experimental demonstration of QSDC with state-of-the-art atomic quantum memory for the first time in principle. We use the polarization degrees of freedom of photons as the information carrier, and the fidelity of entanglement decoding is verified as approximately 90%. Our work completes a fundamental step toward practical QSDC and demonstrates a potential application for long-distance quantum communication in a quantum network.

  19. Security Systems Consideration: A Total Security Approach

    NASA Astrophysics Data System (ADS)

    Margariti, S. V.; Meletiou, G.; Stergiou, E.; Vasiliadis, D. C.; Rizos, G. E.

    2007-12-01

    The "safety" problem for protection systems is to determine in a given situation whether a subject can acquire a particular right to an object. Security and audit operation face the process of securing the application on computing and network environment; however, storage security has been somewhat overlooked due to other security solutions. This paper identifies issues for data security, threats and attacks, summarizes security concepts and relationships, and also describes storage security strategies. It concludes with recommended storage security plan for a total security solution.

  20. Secure Communication via a Recycling of Attenuated Classical Signals

    DOE PAGES

    Smith, IV, Amos M.

    2017-01-12

    We describe a simple method of interleaving a classical and quantum signal in a secure communication system at a single wavelength. The system transmits data encrypted via a one-time pad on a classical signal and produces a single-photon reflection of the encrypted signal. This attenuated signal can be used to observe eavesdroppers and produce fresh secret bits. The system can be secured against eavesdroppers, detect simple tampering or classical bit errors, produces more secret bits than it consumes, and does not require any entanglement or complex wavelength division multiplexing, thus, making continuous secure two-way communication via one-time pads practical.

  1. Secure Communication via a Recycling of Attenuated Classical Signals

    NASA Astrophysics Data System (ADS)

    Smith, A. Matthew

    2017-01-01

    We describe a simple method of interleaving a classical and quantum signal in a secure communication system at a single wavelength. The system transmits data encrypted via a one-time pad on a classical signal and produces a single-photon reflection of the encrypted signal. This attenuated signal can be used to observe eavesdroppers and produce fresh secret bits. The system can be secured against eavesdroppers, detect simple tampering or classical bit errors, produces more secret bits than it consumes, and does not require any entanglement or complex wavelength division multiplexing, thus, making continuous secure two-way communication via one-time pads practical.

  2. Secure communication using mesoscopic coherent states.

    PubMed

    Barbosa, Geraldo A; Corndorf, Eric; Kumar, Prem; Yuen, Horace P

    2003-06-06

    We demonstrate theoretically and experimentally that secure communication using intermediate-energy (mesoscopic) coherent states is possible. Our scheme is different from previous quantum cryptographic schemes in that a short secret key is explicitly used and in which quantum noise hides both the bit and the key. This encryption scheme allows optical amplification. New avenues are open to secure communications at high speeds in fiber-optic or free-space channels.

  3. Antigone: Implementing Policy in Secure Group Communication

    DTIC Science & Technology

    2000-01-01

    identification of a highly fault-tolerant key distribution scheme . Process group semantics are used to facilitate secure communication. A single session key...the group views1 constructed through membership protocols. The security context is not changed through shared session keys, but through the secure...is a secret key shared shared between the session leader and a single member. Once the group has been established, each member knows all the keys

  4. Secure communications based on the synchronization of the hyperchaotic Chen and the unified chaotic systems

    NASA Astrophysics Data System (ADS)

    Smaoui, N.; Karouma, A.; Zribi, M.

    2011-08-01

    This paper deals with the adaptive synchronization of two identical hyperchaotic master and slave systems. The master system and the slave system each consists of two subsystems: a hyperchaotic Chen subsystem and a unified chaotic subsystem. The asymptotic convergence of the errors between the states of the master system and the states of the slave system is proven using Lyapunov theory. Simulation results are presented to illustrate the ability of the control law to synchronize the master and slave systems. Moreover, the proposed control scheme is applied to encrypt and decrypt discrete signals such as digital images where computer simulation results are provided to show that the proposed control law works well.

  5. Entanglement swapping secures multiparty quantum communication

    NASA Astrophysics Data System (ADS)

    Lee, Juhui; Lee, Soojoon; Kim, Jaewan; Oh, Sung Dahm

    2004-09-01

    Extending the eavesdropping strategy devised by Zhang, Li, and Guo [

    Zhang, Li, and Guo, Phys. Rev. A 63, 036301 (2001)
    ], we show that the multiparty quantum communication protocol based on entanglement swapping, which was proposed by Cabello (e-print quant-ph/0009025), is not secure. We modify the protocol so that entanglement swapping can secure multiparty quantum communication, such as multiparty quantum key distribution and quantum secret sharing of classical information, and show that the modified protocol is secure against the Zhang-Li-Guo strategy for eavesdropping as well as the basic intercept-resend attack.

  6. Compact mobile-reader system for two-way wireless communication, tracking and status monitoring for transport safety and security

    DOEpatents

    Tsai, Han-Chung; Liu, Yung Y.; Lee, Hok L.; Craig, Brian; Byrne, Kevin; Mittal, Ketan; Scherer, Justin C.

    2016-12-06

    A system for monitoring a plurality radio frequency identification tags is described. The system uses at least one set of radio frequency identification tags. Each tag is attached to a container and includes several sensors for detecting physical conditions of said container. The system includes at least one autonomous intermediate reader in wireless communication with the frequency identification tags. The intermediate reader includes external wireless communication system, intermediate reader logic controller, and a self-contained rechargeable power supply. The system uses a central status reporting system in communication the intermediate reader.

  7. Security Policy for a Generic Space Exploration Communication Network Architecture

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.; Sheehe, Charles J.; Vaden, Karl R.

    2016-01-01

    This document is one of three. It describes various security mechanisms and a security policy profile for a generic space-based communication architecture. Two other documents accompany this document- an Operations Concept (OpsCon) and a communication architecture document. The OpsCon should be read first followed by the security policy profile described by this document and then the architecture document. The overall goal is to design a generic space exploration communication network architecture that is affordable, deployable, maintainable, securable, evolvable, reliable, and adaptable. The architecture should also require limited reconfiguration throughout system development and deployment. System deployment includes subsystem development in a factory setting, system integration in a laboratory setting, launch preparation, launch, and deployment and operation in space.

  8. Trust Relationships, Naming, and Secure Communication In Large Distributed Computer Systems

    DTIC Science & Technology

    1988-09-01

    Discussions with Stuart have greatly contributed to my appreciation of the American culture and society. I owe my life’s work and inspiration to my...trust each other, and agents trust all name servers [Che84,MuT84, STB86]. Systems such as Amoeba [MuT84] further assume that both the network and the...keyx) A receive(Am 2, keyx)) => BiBjreceive(Am2, keyx)) A ((send(A~ co keyx) A receive(Aml• keyx)) => BJBkreceive(Amt• keyx)) A (BjBJcreceive(Aml• keyx

  9. Secure direct communication based on secret transmitting order of particles

    SciTech Connect

    Zhu Aidong; Zhang Shou; Xia Yan; Fan Qiubo

    2006-02-15

    We propose the schemes of quantum secure direct communication based on a secret transmitting order of particles. In these protocols, the secret transmitting order of particles ensures the security of communication, and no secret messages are leaked even if the communication is interrupted for security. This strategy of security for communication is also generalized to a quantum dialogue. It not only ensures the unconditional security but also improves the efficiency of communication.

  10. Laser security systems

    NASA Astrophysics Data System (ADS)

    Kolev, Ivan S.; Stoeva, Ivelina S.

    2004-06-01

    This report presents the development of single-beam barrier laser security system. The system utilizes the near infrared (IR) range λ=(850-900)nm. The security system consists of several blocks: Transmitter; Receiver; Logical Unit; Indication; Power Supply. There are four individually software programmable security zones Z1 - Z4. The control logic is implemented on a PIC16F84 MCU. The infrared beam is a pulse pack, coded and modulated in the transmitter with frequency of 36 kHz. The receiver demodulates and decodes the beam. The software for the MCU is developed along with the electrical circuits of the security system.

  11. Controlled Bidirectional Quantum Secure Direct Communication

    PubMed Central

    Chou, Yao-Hsin; Lin, Yu-Ting; Zeng, Guo-Jyun; Lin, Fang-Jhu; Chen, Chi-Yuan

    2014-01-01

    We propose a novel protocol for controlled bidirectional quantum secure communication based on a nonlocal swap gate scheme. Our proposed protocol would be applied to a system in which a controller (supervisor/Charlie) controls the bidirectional communication with quantum information or secret messages between legitimate users (Alice and Bob). In this system, the legitimate users must obtain permission from the controller in order to exchange their respective quantum information or secret messages simultaneously; the controller is unable to obtain any quantum information or secret messages from the decoding process. Moreover, the presence of the controller also avoids the problem of one legitimate user receiving the quantum information or secret message before the other, and then refusing to help the other user decode the quantum information or secret message. Our proposed protocol is aimed at protecting against external and participant attacks on such a system, and the cost of transmitting quantum bits using our protocol is less than that achieved in other studies. Based on the nonlocal swap gate scheme, the legitimate users exchange their quantum information or secret messages without transmission in a public channel, thus protecting against eavesdroppers stealing the secret messages. PMID:25006596

  12. Controlled bidirectional quantum secure direct communication.

    PubMed

    Chou, Yao-Hsin; Lin, Yu-Ting; Zeng, Guo-Jyun; Lin, Fang-Jhu; Chen, Chi-Yuan

    2014-01-01

    We propose a novel protocol for controlled bidirectional quantum secure communication based on a nonlocal swap gate scheme. Our proposed protocol would be applied to a system in which a controller (supervisor/Charlie) controls the bidirectional communication with quantum information or secret messages between legitimate users (Alice and Bob). In this system, the legitimate users must obtain permission from the controller in order to exchange their respective quantum information or secret messages simultaneously; the controller is unable to obtain any quantum information or secret messages from the decoding process. Moreover, the presence of the controller also avoids the problem of one legitimate user receiving the quantum information or secret message before the other, and then refusing to help the other user decode the quantum information or secret message. Our proposed protocol is aimed at protecting against external and participant attacks on such a system, and the cost of transmitting quantum bits using our protocol is less than that achieved in other studies. Based on the nonlocal swap gate scheme, the legitimate users exchange their quantum information or secret messages without transmission in a public channel, thus protecting against eavesdroppers stealing the secret messages.

  13. Secure videoconferencing equipment switching system and method

    DOEpatents

    Dirks, David H; Gomes, Diane; Stewart, Corbin J; Fischer, Robert A

    2013-04-30

    Examples of systems described herein include videoconferencing systems having audio/visual components coupled to a codec. The codec may be configured by a control system. Communication networks having different security levels may be alternately coupled to the codec following appropriate configuration by the control system. The control system may also be coupled to the communication networks.

  14. Secure quantum communication using classical correlated channel

    NASA Astrophysics Data System (ADS)

    Costa, D.; de Almeida, N. G.; Villas-Boas, C. J.

    2016-10-01

    We propose a secure protocol to send quantum information from one part to another without a quantum channel. In our protocol, which resembles quantum teleportation, a sender (Alice) and a receiver (Bob) share classical correlated states instead of EPR ones, with Alice performing measurements in two different bases and then communicating her results to Bob through a classical channel. Our secure quantum communication protocol requires the same amount of classical bits as the standard quantum teleportation protocol. In our scheme, as in the usual quantum teleportation protocol, once the classical channel is established in a secure way, a spy (Eve) will never be able to recover the information of the unknown quantum state, even if she is aware of Alice's measurement results. Security, advantages, and limitations of our protocol are discussed and compared with the standard quantum teleportation protocol.

  15. Secure communication based on spatiotemporal chaos

    NASA Astrophysics Data System (ADS)

    Ren, Hai-Peng; Bai, Chao

    2015-08-01

    In this paper, we propose a novel approach to secure communication based on spatiotemporal chaos. At the transmitter end, the state variables of the coupled map lattice system are divided into two groups: one is used as the key to encrypt the plaintext in the N-shift encryption function, and the other is used to mix with the output of the N-shift function to further confuse the information to transmit. At the receiver end, the receiver lattices are driven by the received signal to synchronize with the transmitter lattices and an inverse procedure of the encoding is conducted to decode the information. Numerical simulation and experiment based on the TI TMS320C6713 Digital Signal Processor (DSP) show the feasibility and the validity of the proposed scheme. Project supported by the National Natural Science Foundation of China (Grant No. 61172070) and the Funds from the Science and Technology Innovation Team of Shaanxi Province, China (Grant No. 2013CKT-04).

  16. Computer Security Systems Enable Access.

    ERIC Educational Resources Information Center

    Riggen, Gary

    1989-01-01

    A good security system enables access and protects information from damage or tampering, but the most important aspects of a security system aren't technical. A security procedures manual addresses the human element of computer security. (MLW)

  17. On the novel chaotic secure communication scheme design

    NASA Astrophysics Data System (ADS)

    Wang, B.; Zhong, S. M.; Dong, X. C.

    2016-10-01

    In this paper, the problem on the chaotic secure communication is discussed. First a new dual channel transmission mechanism is presented and used in secure communication scheme design, then the channel-switching techniques are adopted to further improve the security of information transmission. Finally some typical numerical simulations are carried out to demonstrate the effectiveness of the proposed secure communication scheme.

  18. Secure Communications Interoperability Protocols (SCIP)

    DTIC Science & Technology

    2006-12-01

    station to the receiving GSM mobile handset) and transmits out to the mobile unit where the signal is decoded into either digital voice or data. In the...standardized inter-working functions that enable communications between differing networks (ISDN, PSTN, GSM , etc.). While currently fielded equipments in...network- independent architecture that implements specific technologies (currently PSTN, ISDN, CDMA and GSM ). Individual SCIP products implement

  19. Non-line-of-sight (NLOS), secure, low-probability of intercept (LPI), antijam (AJ), high frequency (HF), real time video communication system

    SciTech Connect

    Lupinetti, F.

    1988-01-01

    This paper outlines a video communication system capable of non-line-of-sight (NLOS), secure, low-probability of intercept (LPI), antijam, real time transmission and reception of video information in a tactical enviroment. An introduction to a class of ternary PN sequences is presented to familiarize the reader with yet another avenue for spreading and despreading baseband information. The use of the high frequency (HF) band (1.5 to 30 MHz) for real time video transmission is suggested to allow NLOS communication. The spreading of the baseband information by means of multiple nontrivially different ternary pseudonoise (PN) sequence is used in order to assure encryption of the signal, enhanced security, a good degree of LPI, and good antijam features. 18 refs., 3 figs., 1 tab.

  20. Quantum authencryption: one-step authenticated quantum secure direct communications for off-line communicants

    NASA Astrophysics Data System (ADS)

    Hwang, Tzonelih; Luo, Yi-Ping; Yang, Chun-Wei; Lin, Tzu-Han

    2014-04-01

    This work proposes a new direction in quantum cryptography called quantum authencryption. Quantum authencryption (QA), a new term to distinguish from authenticated quantum secure direct communications, is used to describe the technique of combining quantum encryption and quantum authentication into one process for off-line communicants. QA provides a new way of quantum communications without the presence of a receiver on line, and thus makes many applications depending on secure one-way quantum communications, such as quantum E-mail systems, possible. An example protocol using single photons and one-way hash functions is presented to realize the requirements on QA.

  1. Network systems security analysis

    NASA Astrophysics Data System (ADS)

    Yilmaz, Ä.°smail

    2015-05-01

    Network Systems Security Analysis has utmost importance in today's world. Many companies, like banks which give priority to data management, test their own data security systems with "Penetration Tests" by time to time. In this context, companies must also test their own network/server systems and take precautions, as the data security draws attention. Based on this idea, the study cyber-attacks are researched throughoutly and Penetration Test technics are examined. With these information on, classification is made for the cyber-attacks and later network systems' security is tested systematically. After the testing period, all data is reported and filed for future reference. Consequently, it is found out that human beings are the weakest circle of the chain and simple mistakes may unintentionally cause huge problems. Thus, it is clear that some precautions must be taken to avoid such threats like updating the security software.

  2. Chaos Based Secure IP Communications over Satellite DVB

    NASA Astrophysics Data System (ADS)

    Caragata, Daniel; El Assad, Safwan; Tutanescu, Ion; Sofron, Emil

    2010-06-01

    The Digital Video Broadcasting—Satellite (DVB-S) standard was originally conceived for TV and radio broadcasting. Later, it became possible to send IP packets using encapsulation methods such as Multi Protocol Encapsulation, MPE, or Unidirectional Lightweight Encapsulation, ULE. This paper proposes a chaos based security system for IP communications over DVB-S with ULE encapsulation. The proposed security system satisfies all the security requirements while respecting the characteristics of satellite links, such as the importance of efficient bandwidth utilization and high latency time. It uses chaotic functions to generate the keys and to encrypt the data. The key management is realized using a multi-layer architecture. A theoretical analysis of the system and a simulation of FTP and HTTP traffic are presented and discussed to show the cost of the security enhancement and to provide the necessary tools for security parameters setup.

  3. Secure videoconferencing equipment switching system and method

    DOEpatents

    Hansen, Michael E [Livermore, CA

    2009-01-13

    A switching system and method are provided to facilitate use of videoconference facilities over a plurality of security levels. The system includes a switch coupled to a plurality of codecs and communication networks. Audio/Visual peripheral components are connected to the switch. The switch couples control and data signals between the Audio/Visual peripheral components and one but nor both of the plurality of codecs. The switch additionally couples communication networks of the appropriate security level to each of the codecs. In this manner, a videoconferencing facility is provided for use on both secure and non-secure networks.

  4. Securing the Global Airspace System Via Identity-Based Security

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.

    2015-01-01

    Current telecommunications systems have very good security architectures that include authentication and authorization as well as accounting. These three features enable an edge system to obtain access into a radio communication network, request specific Quality-of-Service (QoS) requirements and ensure proper billing for service. Furthermore, the links are secure. Widely used telecommunication technologies are Long Term Evolution (LTE) and Worldwide Interoperability for Microwave Access (WiMAX) This paper provides a system-level view of network-centric operations for the global airspace system and the problems and issues with deploying new technologies into the system. The paper then focuses on applying the basic security architectures of commercial telecommunication systems and deployment of federated Authentication, Authorization and Accounting systems to provide a scalable, evolvable reliable and maintainable solution to enable a globally deployable identity-based secure airspace system.

  5. Secure steganographic communication algorithm based on self-organizing patterns.

    PubMed

    Saunoriene, Loreta; Ragulskis, Minvydas

    2011-11-01

    A secure steganographic communication algorithm based on patterns evolving in a Beddington-de Angelis-type predator-prey model with self- and cross-diffusion is proposed in this paper. Small perturbations of initial states of the system around the state of equilibrium result in the evolution of self-organizing patterns. Small differences between initial perturbations result in slight differences also in the evolving patterns. It is shown that the generation of interpretable target patterns cannot be considered as a secure mean of communication because contours of the secret image can be retrieved from the cover image using statistical techniques if only it represents small perturbations of the initial states of the system. An alternative approach when the cover image represents the self-organizing pattern that has evolved from initial states perturbed using the dot-skeleton representation of the secret image can be considered as a safe visual communication technique protecting both the secret image and communicating parties.

  6. Security Equipment and Systems Certification Program (SESCP)

    SciTech Connect

    Steele, B.J.; Papier, I.I.

    1996-06-20

    Sandia National Laboratories (SNL) and Underwriters Laboratories, Inc., (UL) have jointly established the Security Equipment and Systems Certification Program (SESCP). The goal of this program is to enhance industrial and national security by providing a nationally recognized method for making informed selection and use decisions when buying security equipment and systems. The SESCP will provide a coordinated structure for private and governmental security standardization review. Members will participate in meetings to identify security problems, develop ad-hoc subcommittees (as needed) to address these identified problems, and to maintain a communications network that encourages a meaningful exchange of ideas. This program will enhance national security by providing improved security equipment and security systems based on consistent, reliable standards and certification programs.

  7. Secure software distribution system

    SciTech Connect

    Bartoletti, T.; Dobbs, L.A.; Kelley, M.

    1997-02-01

    Authenticating and upgrading system software plays a critical role in information security, yet practical tools for assessing and installing software are lacking in today`s marketplace. The Secure Software Distribution System (SSDS) will provide automated analysis, notification, distribution, and installation of security patches and related software to network-based computer systems in a vendor-independent fashion. SSDS will assist with the authentication of software by comparing the system`s objects with the patch`s objects. SSDS will monitor vendor`s patch sites to determine when new patches are released and will upgrade system software on target systems automatically. This paper describes the design of SSDS. Motivations behind the project, the advantages of SSDS over existing tools as well as the current status of the project are also discussed. 2 figs.

  8. Communications and Information: Emission Security

    DTIC Science & Technology

    1998-05-01

    temporary waiver is the designated approving authority (DAA). 11.2.2.1.2. For SPECAT information , process the temporary waiver through the SPECAT...EMSEC person to the SPECAT DAA. 11.2.2.1.3. For Global Command and Control System (GCCS) information , process the temporary waiver through the MAJCOM IP...For SPECAT information , process the temporary waiver through the SPECAT EMSEC person to HQ AFCA/GCIS. 11.2.2.2.3. For GCCS information , process the

  9. National Information Systems Security (INFOSEC) Glossary

    DTIC Science & Technology

    2000-09-01

    Systems Security Engineering ISSM Information Systems Security Manager ISSO Information Systems Security Officer IT Information Technology ITAR ...Digital Net Radio Interface Unit SDNS Secure Data Network System SDR System Design Review SFA Security Fault Analysis SHA Secure Hash Algorithm

  10. Variable contour securing system

    NASA Technical Reports Server (NTRS)

    Zebus, P. P.; Packer, P. N.; Haynie, C. C. (Inventor)

    1978-01-01

    A variable contour securing system has a retaining structure for a member whose surface contains a variable contour. The retaining mechanism includes a spaced array of adjustable spindles mounted on a housing. Each spindle has a base member support cup at one end. A vacuum source is applied to the cups for seating the member adjacent to the cups. A locking mechanism sets the spindles in a predetermined position once the member has been secured to the spindle support cups.

  11. Security System Software

    NASA Technical Reports Server (NTRS)

    1993-01-01

    C Language Integration Production System (CLIPS), a NASA-developed expert systems program, has enabled a security systems manufacturer to design a new generation of hardware. C.CURESystem 1 Plus, manufactured by Software House, is a software based system that is used with a variety of access control hardware at installations around the world. Users can manage large amounts of information, solve unique security problems and control entry and time scheduling. CLIPS acts as an information management tool when accessed by C.CURESystem 1 Plus. It asks questions about the hardware and when given the answer, recommends possible quick solutions by non-expert persons.

  12. Secure communication zone for white-light LED visible light communication

    NASA Astrophysics Data System (ADS)

    Chow, Chi-Wai; Liu, Yang; Yeh, Chien-Hung; Chen, Chung-Yen; Lin, Chao-Nan; Hsu, Dar-Zu

    2015-06-01

    As visible light communication (VLC) can be one of the promising wireless communication technologies in the future, improving the transmission security in VLC is highly desirable. We propose and demonstrate a secure VLC system using data superposition of different light emitting diodes (LEDs). The eavesdroppers can receive similar illumination but cannot obtain enough signal-to-noise ratio (SNR) for communication. The channel model and simulation parameters are presented. Analysis of the secure VLC zone forming using practical in-home scenarios is also discussed, showing the flexibly control the size and shift of secure VLC zone. A proof-of-concept experiment is performed, and there is a good match in trend between the experimental and simulation results.

  13. Security systems engineering overview

    SciTech Connect

    Steele, B.J.

    1996-12-31

    Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at $70 billion in direct costs and up to $300 billion in indirect costs. Health insurance fraud alone is estimated to cost American businesses $100 billion. Theft, warranty fraud, and counterfeiting of computer hardware totaled $3 billion in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies (counterfeit currency, cellular phone billing, credit card fraud, health care fraud, passport, green cards, and questionable documents); industrial espionage detection and prevention (intellectual property, computer chips, etc.); and security barrier technology (creation of delay such as gates, vaults, etc.).

  14. Security systems engineering overview

    NASA Astrophysics Data System (ADS)

    Steele, Basil J.

    1997-01-01

    Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at 70 billion dollars in direct costs and up to 300 billion dollars in indirect costs. Health insurance fraud alone is estimated to cost American businesses 100 billion dollars. Theft, warranty fraud, and counterfeiting of computer hardware totaled 3 billion dollars in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies; industrial espionage detection and prevention; security barrier technology.

  15. Internetting tactical security sensor systems

    NASA Astrophysics Data System (ADS)

    Gage, Douglas W.; Bryan, W. D.; Nguyen, Hoa G.

    1998-08-01

    The Multipurpose Surveillance and Security Mission Platform (MSSMP) is a distributed network of remote sensing packages and control stations, designed to provide a rapidly deployable, extended-range surveillance capability for a wide variety of military security operations and other tactical missions. The baseline MSSMP sensor suite consists of a pan/tilt unit with video and FLIR cameras and laser rangefinder. With an additional radio transceiver, MSSMP can also function as a gateway between existing security/surveillance sensor systems such as TASS, TRSS, and IREMBASS, and IP-based networks, to support the timely distribution of both threat detection and threat assessment information. The MSSMP system makes maximum use of Commercial Off The Shelf (COTS) components for sensing, processing, and communications, and of both established and emerging standard communications networking protocols and system integration techniques. Its use of IP-based protocols allows it to freely interoperate with the Internet -- providing geographic transparency, facilitating development, and allowing fully distributed demonstration capability -- and prepares it for integration with the IP-based tactical radio networks that will evolve in the next decade. Unfortunately, the Internet's standard Transport layer protocol, TCP, is poorly matched to the requirements of security sensors and other quasi- autonomous systems in being oriented to conveying a continuous data stream, rather than discrete messages. Also, its canonical 'socket' interface both conceals short losses of communications connectivity and simply gives up and forces the Application layer software to deal with longer losses. For MSSMP, a software applique is being developed that will run on top of User Datagram Protocol (UDP) to provide a reliable message-based Transport service. In addition, a Session layer protocol is being developed to support the effective transfer of control of multiple platforms among multiple control

  16. A chaos secure communication scheme based on multiplication modulation

    NASA Astrophysics Data System (ADS)

    Fallahi, Kia; Leung, Henry

    2010-02-01

    A secure spread spectrum communication scheme using multiplication modulation is proposed. The proposed system multiplies the message by chaotic signal. The scheme does not need to know the initial condition of the chaotic signals and the receiver is based on an extended Kalman filter (EKF). This signal encryption scheme lends itself to cheap implementation and can therefore be used effectively for ensuring security and privacy in commercial consumer electronics products. To illustrate the effectiveness of the proposed scheme, a numerical example based on Genesio-Tesi system and also Chen dynamical system is presented and the results are compared.

  17. Secure Embedded Systems

    DTIC Science & Technology

    2015-08-24

    embedded  12   systems ,  which   consists  of   an  architecture   that  decouples   secure  and   functional   design ...confidentiality   and  14   integrity  of  an   embedded   system  being   designed .    The  development  of  a  hypothetical...secure   embedded  15   system  for  an  unmanned

  18. Security infrastructure requirements for electronic health cards communication.

    PubMed

    Pharow, Peter; Blobel, Bernd

    2005-01-01

    Communication and co-operation processes in the healthcare and welfare domain require a security infrastructure based on services describing status and relation of communicating principals as well as corresponding keys and attributes. Additional services provide trustworthy information on dynamic issues of communication and co-operation such as time and location of processes, workflow relations, integrity of archives and record systems, and system behaviour. To provide this communication and co-operation in a shared care environment, smart cards are widely used. Serving as storage media and portable application systems, patient data cards enable patient-controlled exchange and use of personal health data bound to specific purposes such as prescription and disease management. Additionally, patient status data such as the emergency data set or immunization may be stored in, and communicated by, patient data cards. Another deployment field of smart cards is their token functionality within a security framework, supporting basic security services such as identification, authentication, integrity, confidentiality, or accountability using cryptographic algorithms. In that context, keys, certificates, and card holder's attributes might be stored in the card as well. As an example, the German activity of introducing patient health cards and health professional cards is presented. Specification and enrolment aspects are on-going processes.

  19. Public eye security system

    NASA Astrophysics Data System (ADS)

    Aviv, David G.

    1999-01-01

    The recently patented system is a software engine that is connected to a television camera that is used for security applications. It will detect in near real time any physical criminal acts occurring within the field of view of the camera. It then instantaneously transmits an alarm to law enforcement and turns on a VCR and other crime deterrent systems, without human involvement.

  20. Secure and Efficient Routable Control Systems

    SciTech Connect

    Edgar, Thomas W.; Hadley, Mark D.; Manz, David O.; Winn, Jennifer D.

    2010-05-01

    This document provides the methods to secure routable control system communication in the electric sector. The approach of this document yields a long-term vision for a future of secure communication, while also providing near term steps and a roadmap. The requirements for the future secure control system environment were spelled out to provide a final target. Additionally a survey and evaluation of current protocols was used to determine if any existing technology could achieve this goal. In the end a four-step path was described that brought about increasing requirement completion and culminates in the realization of the long term vision.

  1. SPCC- Software Elements for Security Partition Communication Controller

    NASA Astrophysics Data System (ADS)

    Herpel, H. J.; Willig, G.; Montano, G.; Tverdyshev, S.; Eckstein, K.; Schoen, M.

    2016-08-01

    Future satellite missions like Earth Observation, Telecommunication or any other kind are likely to be exposed to various threats aiming at exploiting vulnerabilities of the involved systems and communications. Moreover, the growing complexity of systems coupled with more ambitious types of operational scenarios imply increased security vulnerabilities in the future. In the paper we will describe an architecture and software elements to ensure high level of security on-board a spacecraft. First the threats to the Security Partition Communication Controller (SPCC) will be addressed including the identification of specific vulnerabilities to the SPCC. Furthermore, appropriate security objectives and security requirements are identified to be counter the identified threats. The security evaluation of the SPCC will be done in accordance to the Common Criteria (CC). The Software Elements for SPCC has been implemented on flight representative hardware which consists of two major elements: the I/O board and the SPCC board. The SPCC board provides the interfaces with ground while the I/O board interfaces with typical spacecraft equipment busses. Both boards are physically interconnected by a high speed spacewire (SpW) link.

  2. Secure Embedded Systems

    DTIC Science & Technology

    2016-02-26

    computing. An embedded computer system is designed for a dedicated function, in contrast to a general-purpose computer system , e.g., a desktop... embedded system is challenging because security requirements are rarely accurately identified at the start of the design process, and embedded ...architecture that will seamlessly work with various OSA components is a challenge. 3    Design Process (heading level 1) Embedded system CONOPS are

  3. Combined peak-to-average power ratio reduction and physical layer security enhancement in optical orthogonal frequency division multiplexing visible-light communication systems

    NASA Astrophysics Data System (ADS)

    Wang, Zhongpeng; Chen, Shoufa

    2016-07-01

    A physical encryption scheme for discrete Hartley transform (DHT) precoded orthogonal frequency division multiplexing (OFDM) visible-light communication (VLC) systems using frequency domain chaos scrambling is proposed. In the scheme, the chaos scrambling, which is generated by a modified logistic mapping, is utilized to enhance the physical layer of security, and the DHT precoding is employed to reduce of OFDM signal for OFDM-based VLC. The influence of chaos scrambling on peak-to-average power ratio (PAPR) and bit error rate (BER) of systems is studied. The experimental simulation results prove the efficiency of the proposed encryption method for DHT-precoded, OFDM-based VLC systems. Furthermore, the influence of the proposed encryption to the PAPR and BER of systems is evaluated. The experimental results show that the proposed security scheme can protect the DHT-precoded, OFDM-based VLC from eavesdroppers, while keeping the good BER performance of DHT-precoded systems. The BER performance of the encrypted and DHT-precoded system is almost the same as that of the conventional DHT-precoded system without encryption.

  4. Comparison of Routable Control System Security Approaches

    SciTech Connect

    Edgar, Thomas W.; Hadley, Mark D.; Carroll, Thomas E.; Manz, David O.; Winn, Jennifer D.

    2011-06-01

    This document is an supplement to the 'Secure and Efficient Routable Control Systems.' It addressed security in routable control system communication. The control system environment that monitors and manages the power grid historically has utilized serial communication mechanisms. Leased-line serial communication environments operating at 1200 to 9600 baud rates are common. However, recent trends show that communication media such as fiber, optical carrier 3 (OC-3) speeds, mesh-based high-speed wireless, and the Internet are becoming the media of choice. In addition, a dichotomy has developed between the electrical transmission and distribution environments, with more modern communication infrastructures deployed by transmission utilities. The preceding diagram represents a typical control system. The Communication Links cloud supports all of the communication mechanisms a utility might deploy between the control center and devices in the field. Current methodologies used for security implementations are primarily led by single vendors or standards bodies. However, these entities tend to focus on individual protocols. The result is an environment that contains a mixture of security solutions that may only address some communication protocols at an increasing operational burden for the utility. A single approach is needed that meets operational requirements, is simple to operate, and provides the necessary level of security for all control system communication. The solution should be application independent (e.g., Distributed Network Protocol/Internet Protocol [DNP/IP], International Electrotechnical Commission [IEC] C37.118, Object Linking and Embedding for Process Control [OPC], etc.) and focus on the transport layer. In an ideal setting, a well-designed suite of standards for control system communication will be used for vendor implementation and compliance testing. An expected outcome of this effort is an international standard.

  5. Entanglement enhances security in quantum communication

    SciTech Connect

    Demkowicz-Dobrzanski, Rafal; Sen, Aditi; Sen, Ujjwal; Lewenstein, Maciej

    2009-07-15

    Secret sharing is a protocol in which a 'boss' wants to send a classical message secretly to two 'subordinates', such that none of the subordinates is able to know the message alone, while they can find it if they cooperate. Quantum mechanics is known to allow for such a possibility. We analyze tolerable quantum bit error rates in such secret sharing protocols in the physically relevant case when the eavesdropping is local with respect to the two channels of information transfer from the boss to the two subordinates. We find that using entangled encoding states is advantageous to legitimate users of the protocol. We therefore find that entanglement is useful for secure quantum communication. We also find that bound entangled states with positive partial transpose are not useful as a local eavesdropping resource. Moreover, we provide a criterion for security in secret sharing--a parallel of the Csiszar-Koerner criterion in single-receiver classical cryptography.

  6. Enhancing Multilateral Security in and by Reputation Systems

    NASA Astrophysics Data System (ADS)

    Steinbrecher, Sandra

    With the increasing possibilities for interaction between Internet users exceeding pure communication, in multilateral security the research question arises to rethink and extend classical security requirements. Reputation systems are a possible solution to assist new security requirements. But naturally also reputation systems have to be designed in a multilateral secure way. In this paper we discuss both multilateral security by and in reputation systems. An overview on the possibilities how such systems could be realised is given.

  7. Experimental demonstration of audio secure communication with Rossler chaotic circuits

    NASA Astrophysics Data System (ADS)

    Jaimes-Reátegui, R.; García-López, J. H.; Pisarchik, A. N.; Medina-Gutiérrez, C.; Jimenez-Godinez, J. C.; Valdivia-Hernandez, R.; Murguía-Hernandez, A.; Frausto-Reyes, C.

    2006-02-01

    The possibility of secure communication with chaos is demonstrated experimentally with two simple unidirectionally coupled electronic circuits. A traditional approach has been used to synchronize the two chaotic systems. We also study, both numerically and experimentally, the dynamic of the systems in a wide range of the control parameter. The bifurcation diagrams represent a complex behaviour whish varied from periodic orbits to chaos of the Rossler and Shilnikov types. The results of numerical simulations are in a good agreement with experiments.

  8. Building a Secure Library System.

    ERIC Educational Resources Information Center

    Benson, Allen C.

    1998-01-01

    Presents tips for building a secure library system to guard against threats like hackers, viruses, and theft. Topics include: determining what is at risk; recovering from disasters; developing security policies; developing front-end security; securing menu systems; accessing control programs; protecting against damage from viruses; developing…

  9. Building a Secure Library System.

    ERIC Educational Resources Information Center

    Benson, Allen C.

    1998-01-01

    Presents tips for building a secure library system to guard against threats like hackers, viruses, and theft. Topics include: determining what is at risk; recovering from disasters; developing security policies; developing front-end security; securing menu systems; accessing control programs; protecting against damage from viruses; developing…

  10. A Secure Alert System

    DTIC Science & Technology

    2006-12-01

    http://www.cgisecurity.com/ owasp /html/ch10.html, accessed 23 October 2006. [33] Cross Site Scripting by Amit Klein, Former Director of Security...and Research, a whitepaper from Watchfire. [34] CIGSecurity.com, Attacks on the System - Direct SQL Commands, http://www.cgisecurity.com/ owasp ...html/ch11s03.html, accessed 23 October 2006. [35] CIGSecurity.com, Attacks on the System - Direct OS Commands, http://www.cgisecurity.com/ owasp /html

  11. System and method for key generation in security tokens

    DOEpatents

    Evans, Philip G.; Humble, Travis S.; Paul, Nathanael R.; Pooser, Raphael C.; Prowell, Stacy J.

    2015-10-27

    Functional randomness in security tokens (FRIST) may achieve improved security in two-factor authentication hardware tokens by improving on the algorithms used to securely generate random data. A system and method in one embodiment according to the present invention may allow for security of a token based on storage cost and computational security. This approach may enable communication where security is no longer based solely on onetime pads (OTPs) generated from a single cryptographic function (e.g., SHA-256).

  12. Secure and interoperable communication infrastructures for PPDR organisations

    NASA Astrophysics Data System (ADS)

    Müller, Wilmuth; Marques, Hugo; Pereira, Luis; Rodriguez, Jonathan; Brouwer, Frank; Bouwers, Bert; Politis, Ilias; Lykourgiotis, Asimakis; Ladas, Alexandros; Adigun, Olayinka; Jelenc, David

    2016-05-01

    The growing number of events affecting public safety and security (PS&S) on a regional scale with potential to grow up to large scale cross border disasters puts an increased pressure on agencies and organisation responsible for PS&S. In order to respond timely and in an adequate manner to such events, Public Protection and Disaster Relief (PPDR) organisations need to cooperate, align their procedures and activities, share the needed information and be interoperable. Existing PPDR/PMR technologies such as TETRA, TETRAPOL or P25, do not currently provide broadband capability nor is expected such technologies to be upgraded in the future. This presents a major limitation in supporting new services and information flows. Furthermore, there is no known standard that addresses interoperability of these technologies. In this contribution the design of a next generation communication infrastructure for PPDR organisations which fulfills the requirements of secure and seamless end-to-end communication and interoperable information exchange within the deployed communication networks is presented. Based on Enterprise Architecture of PPDR organisations, a next generation PPDR network that is backward compatible with legacy communication technologies is designed and implemented, capable of providing security, privacy, seamless mobility, QoS and reliability support for mission-critical Private Mobile Radio (PMR) voice and broadband data services. The designed solution provides a robust, reliable, and secure mobile broadband communications system for a wide variety of PMR applications and services on PPDR broadband networks, including the ability of inter-system, interagency and cross-border operations with emphasis on interoperability between users in PMR and LTE.

  13. An integrated solution for secure group communication in wide-area networks

    SciTech Connect

    Agarwal, Deborah A.; Chevassut, Olivier; Thompson, Mary; Tsudik, Gene

    2001-04-01

    Many distributed applications require a secure reliable group communication system to provide coordination among the application components. This paper describes a secure group layer (SGL) which bundles a reliable group communication system, a group authorization and access control mechanism, and a group key agreement protocol to provide a comprehensive and practical secure group communication platform. SGL also encapsulates the standard message security services (i.e, confidentiality, authenticity and integrity). A number of challenging issues encountered in the design of SGL are brought to light and experimental results obtained with a prototype implementation are discussed.

  14. A Security Audit Framework to Manage Information System Security

    NASA Astrophysics Data System (ADS)

    Pereira, Teresa; Santos, Henrique

    The widespread adoption of information and communication technology have promoted an increase dependency of organizations in the performance of their Information Systems. As a result, adequate security procedures to properly manage information security must be established by the organizations, in order to protect their valued or critical resources from accidental or intentional attacks, and ensure their normal activity. A conceptual security framework to manage and audit Information System Security is proposed and discussed. The proposed framework intends to assist organizations firstly to understand what they precisely need to protect assets and what are their weaknesses (vulnerabilities), enabling to perform an adequate security management. Secondly, enabling a security audit framework to support the organization to assess the efficiency of the controls and policy adopted to prevent or mitigate attacks, threats and vulnerabilities, promoted by the advances of new technologies and new Internet-enabled services, that the organizations are subject of. The presented framework is based on a conceptual model approach, which contains the semantic description of the concepts defined in information security domain, based on the ISO/IEC_JCT1 standards.

  15. Information Systems, Security, and Privacy.

    ERIC Educational Resources Information Center

    Ware, Willis H.

    1984-01-01

    Computer security and computer privacy issues are discussed. Among the areas addressed are technical and human security threats, security and privacy issues for information in electronic mail systems, the need for a national commission to examine these issues, and security/privacy issues relevant to colleges and universities. (JN)

  16. Robotic Security Systems

    DTIC Science & Technology

    2003-12-01

    robotic security platforms that automatically respond in an adaptive fashion to potential disturbances reported by a broad-area field of fixed unattended...sensors represents a powerful new defensive tool for mitigating the terrorist threat. Background The primary purpose of any robotic system is to...mobile robots , the predominant challenge is one of perception, in that the very nature of mobility introduces a never-ending sequence of dynamically

  17. Secure Reliable Processing Systems

    DTIC Science & Technology

    1981-07-01

    independent security control, i.e. when access control decisions do not depend on stored application data values. This particular case is of considerable prac...kernel supports. It is true that the values stored as access con- trol data , the information used by the system to determine which users may access...following • I-’, responsibilities: 1. assure that a given data item is stored with the correct name labelling it, 2. check the access control

  18. Cyberspace security system

    DOEpatents

    Abercrombie, Robert K; Sheldon, Frederick T; Ferragut, Erik M

    2014-06-24

    A system evaluates reliability, performance and/or safety by automatically assessing the targeted system's requirements. A cost metric quantifies the impact of failures as a function of failure cost per unit of time. The metrics or measurements may render real-time (or near real-time) outcomes by initiating active response against one or more high ranked threats. The system may support or may be executed in many domains including physical domains, cyber security domains, cyber-physical domains, infrastructure domains, etc. or any other domains that are subject to a threat or a loss.

  19. Lightweight and scalable secure communication in VANET

    NASA Astrophysics Data System (ADS)

    Zhu, Xiaoling; Lu, Yang; Zhu, Xiaojuan; Qiu, Shuwei

    2015-05-01

    To avoid a message to be tempered and forged in vehicular ad hoc network (VANET), the digital signature method is adopted by IEEE1609.2. However, the costs of the method are excessively high for large-scale networks. The paper efficiently copes with the issue with a secure communication framework by introducing some lightweight cryptography primitives. In our framework, point-to-point and broadcast communications for vehicle-to-infrastructure (V2I) and vehicle-to-vehicle (V2V) are studied, mainly based on symmetric cryptography. A new issue incurred is symmetric key management. Thus, we develop key distribution and agreement protocols for two-party key and group key under different environments, whether a road side unit (RSU) is deployed or not. The analysis shows that our protocols provide confidentiality, authentication, perfect forward secrecy, forward secrecy and backward secrecy. The proposed group key agreement protocol especially solves the key leak problem caused by members joining or leaving in existing key agreement protocols. Due to aggregated signature and substitution of XOR for point addition, the average computation and communication costs do not significantly increase with the increase in the number of vehicles; hence, our framework provides good scalability.

  20. Quantum Secure Direct Communication Without Using Perfect Quantum Channel

    NASA Astrophysics Data System (ADS)

    Wang, Jian; Zhang, Quan; Tang, Chaojing

    Most of the quantum secure direct communication protocol needs a pre-established secure quantum channel. Only after insuring the security of quantum channel, could the sender encode the secret message and send them to the receiver through the secure channel. In this paper, we present a quantum secure direct communication protocol using Einstein-Podolsky-Rosen pairs without insuring the security of quantum channel before transmitting the secret message. Compared with the protocol proposed by Deng et al. [Phys. Rev. A 68, 042317 (2003)] and the scheme proposed by Yan et al. [ Euro. Phys. J. B 41, 75 (2004)], the present protocol provides higher efficiency.

  1. Chaotic systems in optical communications

    NASA Astrophysics Data System (ADS)

    Siuzdak, J.

    2016-09-01

    Communications application of chaotic oscillations of lasers with optoelectronic feedback was discussed. The possibility of eavesdropping of the transmission was analyzed. It was proved that if the rogue party precisely knows parameters of the chaotic system it may recreate the entire signals solely by observation of the optical signal power causing security breach.

  2. Encrypted IP video communication system

    NASA Astrophysics Data System (ADS)

    Bogdan, Apetrechioaie; Luminiţa, Mateescu

    2010-11-01

    Digital video transmission is a permanent subject of development, research and improvement. This field of research has an exponentially growing market in civil, surveillance, security and military aplications. A lot of solutions: FPGA, ASIC, DSP have been used for this purpose. The paper presents the implementation of an encrypted, IP based, video communication system having a competitive performance/cost ratio .

  3. Constellation-masked secure communication technique for OFDM-PON.

    PubMed

    Liu, Bo; Zhang, Lijia; Xin, Xiangjun; Yu, Jianjun

    2012-10-22

    This paper proposes a novel secure communication technique using constellation masking for applications in orthogonal frequency division multiplexing passive optical network (OFDM-PON). The constellation masking is applied both on each subcarrier and among different subcarriers. The Arnold mapping is utilized as the parameter function for the mask factors. A interleave length is employed to provide a scalable masking granularity for different ONUs. A 15.54 Gb/s constellation-masked 32QAM-OFDM signal has been successfully transmitted over 25-km single mode fiber in the experiment. Experimental results show that the proposed scheme can effectively protect the system from illegal ONU without wasting the bandwidth. The constellation-masked technique suggests an effective solution for the physical secure communication in future OFDM access network.

  4. Integration into Cyber Security Management System

    DTIC Science & Technology

    2005-10-01

    12 APPENDIX B - SOFTWARE USER’S MANUAL...actions have become possible as a result of evolving networks environments: advances in hardware, software , and communications technology; as well...systems. Such resulting technology integrates network security, adaptability, and survivability into existing and evolving architectures and systems

  5. Secure wireless communications via cooperative transmitting.

    PubMed

    Stojanovski, Toni Draganov; Marina, Ninoslav

    2014-01-01

    Information-theoretic secrecy is combined with cryptographic secrecy to create a secret-key exchange protocol for wireless networks. A network of transmitters, which already have cryptographically secured channels between them, cooperate to exchange a secret key with a new receiver at a random location, in the presence of passive eavesdroppers at unknown locations. Two spatial point processes, homogeneous Poisson process and independent uniformly distributed points, are used for the spatial distributions of transmitters and eavesdroppers. We analyse the impact of the number of cooperating transmitters and the number of eavesdroppers on the area fraction where secure communication is possible. Upper bounds on the probability of existence of positive secrecy between the cooperating transmitters and the receiver are derived. The closeness of the upper bounds to the real value is then estimated by means of numerical simulations. Simulations also indicate that a deterministic spatial distribution for the transmitters, for example, hexagonal and square lattices, increases the probability of existence of positive secrecy capacity compared to the random spatial distributions. For the same number of friendly nodes, cooperative transmitting provides a dramatically larger secrecy region than cooperative jamming and cooperative relaying.

  6. 78 FR 69851 - Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-21

    ... including emergency warning systems, 9-1-1 location accuracy, distributed denial-of-service (DDoS), and... security, reliability, and interoperability of communications systems. On March 19, 2013, the FCC,...

  7. Systemization of Secure Computation

    DTIC Science & Technology

    2015-11-01

    previously solved problems in garbled circuits. If the generator does not use the correct values, then it reduces to the problem of creating an incor- rect...FOR THE DIRECTOR: / S / / S / CARL R. THOMAS MARK H. LINDERMAN Work Unit Manager Technical Advisor, Computing & Communications Division...database-as-a-service” application paradigm), but it also creates privacy risks. To mitigate these risks, database- management systems can use

  8. Security for Telecommuting and Broadband Communications: Recommendations of the National Institute of Standards and Technology

    NASA Astrophysics Data System (ADS)

    Kuhn, D. R.; Tracy, Miles C.; Frankel, Sheila E.

    2002-08-01

    This document is intended to assist those responsible - users, system administrators, and management - for telecommuting security, by providing introductory information about broadband communication security and policy, security of home office systems, and considerations for system administrators in the central office. It addresses concepts relating to the selection, deployment, and management of broadband communications for a telecommuting user. This document is not intended to provide a mandatory framework for telecommuting or home office broadband communication environments, but rather to present suggested approaches to the topic.

  9. Engineering quantum communication systems

    NASA Astrophysics Data System (ADS)

    Pinto, Armando N.; Almeida, Álvaro J.; Silva, Nuno A.; Muga, Nelson J.; Martins, Luis M.

    2012-06-01

    Quantum communications can provide almost perfect security through the use of quantum laws to detect any possible leak of information. We discuss critical issues in the implementation of quantum communication systems over installed optical fibers. We use stimulated four-wave mixing to generate single photons inside optical fibers, and by tuning the separation between the pump and the signal we adjust the average number of photons per pulse. We report measurements of the source statistics and show that it goes from a thermal to Poisson distribution with the increase of the pump power. We generate entangled photons pairs through spontaneous four-wave mixing. We report results for different type of fibers to approach the maximum value of the Bell inequality. We model the impact of polarization rotation, attenuation and Raman scattering and present optimum configurations to increase the degree of entanglement. We encode information in the photons polarization and assess the use of wavelength and time division multiplexing based control systems to compensate for the random rotation of the polarization during transmission. We show that time division multiplexing systems provide a more robust solution considering the values of PMD of nowadays installed fibers. We evaluate the impact on the quantum channel of co-propagating classical channels, and present guidelines for adding quantum channels to installed WDM optical communication systems without strongly penalizing the performance of the quantum channel. We discuss the process of retrieving information from the photons polarization. We identify the major impairments that limit the speed and distance of the quantum channel. Finally, we model theoretically the QBER and present results of an experimental performance assessment of the system quality through QBER measurements.

  10. Security analysis of cyber-physical system

    NASA Astrophysics Data System (ADS)

    Li, Bo; Zhang, Lichen

    2017-05-01

    In recent years, Cyber-Physical System (CPS) has become an important research direction of academic circles and scientific and technological circles at home and abroad, is considered to be following the third wave of world information technology after the computer, the Internet. PS is a multi-dimensional, heterogeneous, deep integration of open systems, Involving the computer, communication, control and other disciplines of knowledge. As the various disciplines in the research theory and methods are significantly different, so the application of CPS has brought great challenges. This paper introduces the definition and characteristics of CPS, analyzes the current situation of CPS, analyzes the security threats faced by CPS, and gives the security solution for security threats. It also discusses CPS-specific security technology, to promote the healthy development of CPS in information security.

  11. Secure direct communication with a quantum one-time pad

    SciTech Connect

    Deng Fuguo; Long Guilu

    2004-05-01

    Quantum secure direct communication is the direct communication of secret messages without first producing a shared secret key. It may be used in some urgent circumstances. Here we propose a quantum secure direct communication protocol using single photons. The protocol uses batches of single photons prepared randomly in one of four different states. These single photons serve as a one-time pad which is used directly to encode the secret messages in one communication process. We also show that it is unconditionally secure. The protocol is feasible with present-day technique.

  12. A secure and robust information hiding technique for covert communication

    NASA Astrophysics Data System (ADS)

    Parah, S. A.; Sheikh, J. A.; Hafiz, A. M.; Bhat, G. M.

    2015-08-01

    The unprecedented advancement of multimedia and growth of the internet has made it possible to reproduce and distribute digital media easier and faster. This has given birth to information security issues, especially when the information pertains to national security, e-banking transactions, etc. The disguised form of encrypted data makes an adversary suspicious and increases the chance of attack. Information hiding overcomes this inherent problem of cryptographic systems and is emerging as an effective means of securing sensitive data being transmitted over insecure channels. In this paper, a secure and robust information hiding technique referred to as Intermediate Significant Bit Plane Embedding (ISBPE) is presented. The data to be embedded is scrambled and embedding is carried out using the concept of Pseudorandom Address Vector (PAV) and Complementary Address Vector (CAV) to enhance the security of the embedded data. The proposed ISBPE technique is fully immune to Least Significant Bit (LSB) removal/replacement attack. Experimental investigations reveal that the proposed technique is more robust to various image processing attacks like JPEG compression, Additive White Gaussian Noise (AWGN), low pass filtering, etc. compared to conventional LSB techniques. The various advantages offered by ISBPE technique make it a good candidate for covert communication.

  13. Ultra Wideband (UWB) communication vulnerability for security applications.

    SciTech Connect

    Cooley, H. Timothy

    2010-07-01

    RF toxicity and Information Warfare (IW) are becoming omnipresent posing threats to the protection of nuclear assets, and within theatres of hostility or combat where tactical operation of wireless communication without detection and interception is important and sometimes critical for survival. As a result, a requirement for deployment of many security systems is a highly secure wireless technology manifesting stealth or covert operation suitable for either permanent or tactical deployment where operation without detection or interruption is important The possible use of ultra wideband (UWB) spectrum technology as an alternative physical medium for wireless network communication offers many advantages over conventional narrowband and spread spectrum wireless communication. UWB also known as fast-frequency chirp is nonsinusoidal and sends information directly by transmitting sub-nanosecond pulses without the use of mixing baseband information upon a sinusoidal carrier. Thus UWB sends information using radar-like impulses by spreading its energy thinly over a vast spectrum and can operate at extremely low-power transmission within the noise floor where other forms of RF find it difficult or impossible to operate. As a result UWB offers low probability of detection (LPD), low probability of interception (LPI) as well as anti-jamming (AJ) properties in signal space. This paper analyzes and compares the vulnerability of UWB to narrowband and spread spectrum wireless network communication.

  14. 46 CFR 130.440 - Communications system.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 46 Shipping 4 2011-10-01 2011-10-01 false Communications system. 130.440 Section 130.440 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OFFSHORE SUPPLY VESSELS VESSEL CONTROL, AND MISCELLANEOUS EQUIPMENT AND SYSTEMS Automation of Unattended Machinery Spaces § 130.440 Communications system...

  15. 46 CFR 130.440 - Communications system.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 46 Shipping 4 2012-10-01 2012-10-01 false Communications system. 130.440 Section 130.440 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OFFSHORE SUPPLY VESSELS VESSEL CONTROL, AND MISCELLANEOUS EQUIPMENT AND SYSTEMS Automation of Unattended Machinery Spaces § 130.440 Communications system...

  16. 46 CFR 130.440 - Communications system.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 46 Shipping 4 2013-10-01 2013-10-01 false Communications system. 130.440 Section 130.440 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OFFSHORE SUPPLY VESSELS VESSEL CONTROL, AND MISCELLANEOUS EQUIPMENT AND SYSTEMS Automation of Unattended Machinery Spaces § 130.440 Communications system...

  17. 46 CFR 130.440 - Communications system.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Communications system. 130.440 Section 130.440 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OFFSHORE SUPPLY VESSELS VESSEL CONTROL, AND MISCELLANEOUS EQUIPMENT AND SYSTEMS Automation of Unattended Machinery Spaces § 130.440 Communications system...

  18. 46 CFR 130.440 - Communications system.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 46 Shipping 4 2014-10-01 2014-10-01 false Communications system. 130.440 Section 130.440 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OFFSHORE SUPPLY VESSELS VESSEL CONTROL, AND MISCELLANEOUS EQUIPMENT AND SYSTEMS Automation of Unattended Machinery Spaces § 130.440 Communications system...

  19. Quantum cryptography for secure free-space communications

    SciTech Connect

    Hughes, R.J.; Buttler, W.T.; Kwiat, P.G.; Lamoreaux, S.K.; Luther, G.G.; Morgan, G.L.; Nordholt, J.E.; Peterson, C.G.

    1999-03-01

    The secure distribution of the secret random bit sequences known as key material, is an essential precursor to their use for the encryption and decryption of confidential communications. Quantum cryptography is a new technique for secure key distribution with single-photon transmissions: Heisenberg`s uncertainty principle ensures that an adversary can neither successfully tap the key transmissions, nor evade detection (eavesdropping raises the key error rate above a threshold value). The authors have developed experimental quantum cryptography systems based on the transmission of non-orthogonal photon polarization states to generate shared key material over line-of-sight optical links. Key material is built up using the transmission of a single-photon per bit of an initial secret random sequence. A quantum-mechanically random subset of this sequence is identified, becoming the key material after a data reconciliation stage with the sender. The authors have developed and tested a free-space quantum key distribution (QKD) system over an outdoor optical path of {approximately}1 km at Los Alamos National Laboratory under nighttime conditions. Results show that free-space QKD can provide secure real-time key distribution between parties who have a need to communicate secretly. Finally, they examine the feasibility of surface to satellite QKD.

  20. Quantum cryptography for secure free-space communications

    NASA Astrophysics Data System (ADS)

    Hughes, Richard J.; Buttler, William T.; Kwiat, Paul G.; Lamoreaux, Steve K.; Luther, Gabriel G.; Morgan, George L.; Nordholt, Jane E.; Peterson, C. Glen

    1999-04-01

    The secure distribution of the secret random bit sequences known as 'key' material, is an essential precursor to their use for the encryption and decryption of confidential communications. Quantum cryptography is a new technique for secure key distribution with single-photon transmissions: Heisenberg's uncertainty principle ensures that an adversary can neither successfully tap the key transmissions, nor evade detection (eavesdropping raises the key error rate above a threshold value). We have developed experimental quantum cryptography systems based on the transmission of non- orthogonal photon polarization states to generate shared key material over line-of-sight optical links. Key material is built up using the transmission of a single-photon per bit of an initial secret random sequence. A quantum-mechanically random subset of this sequence is identified, becoming the key material after a data reconciliation stage with the sender. We have developed and tested a free-space quantum key distribution (QKD) system over an outdoor optical path of approximately 1 km at Los Alamos National Laboratory under nighttime conditions. Results show that free-space QKD can provide secure real-time key distribution between parties who have a need to communicate secretly. Finally, we examine the feasibility of surface to satellite QKD.

  1. DICOM image secure communications with Internet protocols IPv6 and IPv4.

    PubMed

    Zhang, Jianguo; Yu, Fenghai; Sun, Jianyong; Yang, Yuanyuan; Liang, Chenwen

    2007-01-01

    Image-data transmission from one site to another through public network is usually characterized in term of privacy, authenticity, and integrity. In this paper, we first describe a general scenario about how image is delivered from one site to another through a wide-area network (WAN) with security features of data privacy, integrity, and authenticity. Second, we give the common implementation method of the digital imaging and communication in medicine (DICOM) image communication software library with IPv6/IPv4 for high-speed broadband Internet by using open-source software. Third, we discuss two major security-transmission methods, the IP security (IPSec) and the secure-socket layer (SSL) or transport-layer security (TLS), being used currently in medical-image-data communication with privacy support. Fourth, we describe a test schema of multiple-modality DICOM-image communications through TCP/IPv4 and TCP/IPv6 with different security methods, different security algorithms, and operating systems, and evaluate the test results. We found that there are tradeoff factors between choosing the IPsec and the SSL/TLS-based security implementation of IPv6/IPv4 protocols. If the WAN networks only use IPv6 such as in high-speed broadband Internet, the choice is IPsec-based security. If the networks are IPv4 or the combination of IPv6 and IPv4, it is better to use SSL/TLS security. The Linux platform has more security algorithms implemented than the Windows (XP) platform, and can achieve better performance in most experiments of IPv6 and IPv4-based DICOM-image communications. In teleradiology or enterprise-PACS applications, the Linux operating system may be the better choice as peer security gateways for both the IPsec and the SSL/TLS-based secure DICOM communications cross public networks.

  2. 76 FR 54234 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-31

    ... COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council AGENCY: Federal Communications Commission. ACTION... Goldthorp, Associate Bureau Chief, Public Safety and Homeland Security Bureau, Federal Communications...

  3. 77 FR 70777 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-27

    ... COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council AGENCY: Federal Communications Commission. ACTION: Notice of cancellation of meeting. SUMMARY: The meeting of the Communications Security, Reliability, and...

  4. 75 FR 56533 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-16

    ... COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council AGENCY: Federal Communications Commission. ACTION... Chief for Cybersecurity and Communications Reliability Public Safety and Homeland Security Bureau...

  5. 77 FR 12054 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-28

    ... COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council AGENCY: Federal Communications Commission. ACTION... Safety and Homeland Security Bureau, Federal Communications Commission, 445 12th Street SW., Room 7- A325...

  6. 76 FR 72922 - Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-28

    ... location accuracy, and network security. The FCC will attempt to accommodate as many attendees as possible... COMMISSION Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council... Communications Commission's (FCC) third Communications Security, Reliability, and Interoperability Council...

  7. A secure communications infrastructure for high-performance distributed computing

    SciTech Connect

    Foster, I.; Koenig, G.; Tuecke, S.

    1997-08-01

    Applications that use high-speed networks to connect geographically distributed supercomputers, databases, and scientific instruments may operate over open networks and access valuable resources. Hence, they can require mechanisms for ensuring integrity and confidentially of communications and for authenticating both users and resources. Security solutions developed for traditional client-server applications do not provide direct support for the program structures, programming tools, and performance requirements encountered in these applications. The authors address these requirements via a security-enhanced version of the Nexus communication library; which they use to provide secure versions of parallel libraries and languages, including the Message Passing Interface. These tools permit a fine degree of control over what, where, and when security mechanisms are applied. In particular, a single application can mix secure and nonsecure communication, allowing the programmer to make fine-grained security/performance tradeoffs. The authors present performance results that quantify the performance of their infrastructure.

  8. All-optical signal processing technique for secure optical communication

    NASA Astrophysics Data System (ADS)

    Qian, Feng-chen; Su, Bing; Ye, Ya-lin; Zhang, Qian; Lin, Shao-feng; Duan, Tao; Duan, Jie

    2015-10-01

    Secure optical communication technologies are important means to solve the physical layer security for optical network. We present a scheme of secure optical communication system by all-optical signal processing technique. The scheme consists of three parts, as all-optical signal processing unit, optical key sequence generator, and synchronous control unit. In the paper, all-optical signal processing method is key technology using all-optical exclusive disjunction (XOR) gate based on optical cross-gain modulation effect, has advantages of wide dynamic range of input optical signal, simple structure and so on. All-optical XOR gate composed of two semiconductor optical amplifiers (SOA) is a symmetrical structure. By controlling injection current, input signal power, delay and filter bandwidth, the extinction ratio of XOR can be greater than 8dB. Finally, some performance parameters are calculated and the results are analyzed. The simulation and experimental results show that the proposed method can be achieved over 10Gbps optical signal encryption and decryption, which is simple, easy to implement, and error-free diffusion.

  9. Secure communications in the presence of pervasive deceit

    SciTech Connect

    Simmons, G.J.

    1980-01-01

    The functions of secrecy, identification of the transmitter and of authentication of messages, and combinations of these, are in principle all achievable with either symmetric or asymmetric cryptosystems. Since secure communications depend on authenticated data exchanges between and/or authenticated actions by some of the parties to the communication, the fundamentals of authentication using symmetric or asymmetric techniques are developed. The surprising conclusion is that they differ only in the secure exchanges required to achieve further secure communications. The problem of authenticating a public-key directory is discussed in the light of these findings.

  10. Secure Control Systems for the Energy Sector

    SciTech Connect

    Smith, Rhett; Campbell, Jack; Hadley, Mark

    2012-03-31

    Schweitzer Engineering Laboratories (SEL) will conduct the Hallmark Project to address the need to reduce the risk of energy disruptions because of cyber incidents on control systems. The goals is to develop solutions that can be both applied to existing control systems and designed into new control systems to add the security measures needed to mitigate energy network vulnerabilities. The scope of the Hallmark Project contains four primary elements: 1. Technology transfer of the Secure Supervisory Control and Data Acquisition (SCADA) Communications Protocol (SSCP) from Pacific Northwest National Laboratories (PNNL) to Schweitzer Engineering Laboratories (SEL). The project shall use this technology to develop a Federal Information Processing Standard (FIPS) 140-2 compliant original equipment manufacturer (OEM) module to be called a Cryptographic Daughter Card (CDC) with the ability to directly connect to any PC enabling that computer to securely communicate across serial to field devices. Validate the OEM capabilities with another vendor. 2. Development of a Link Authenticator Module (LAM) using the FIPS 140-2 validated Secure SCADA Communications Protocol (SSCP) CDC module with a central management software kit. 3. Validation of the CDC and Link Authenticator modules via laboratory and field tests. 4. Creation of documents that record the impact of the Link Authenticator to the operators of control systems and on the control system itself. The information in the documents can assist others with technology deployment and maintenance.

  11. A new reduced-order observer for the synchronization of nonlinear chaotic systems: An application to secure communications

    SciTech Connect

    Castro-Ramírez, Joel; Martínez-Guerra, Rafael; Cruz-Victoria, Juan Crescenciano

    2015-10-15

    This paper deals with the master-slave synchronization scheme for partially known nonlinear chaotic systems, where the unknown dynamics is considered as the master system and we propose the slave system structure which estimates the unknown states. It introduced a new reduced order observer, using the concept of Algebraic Observability; we applied the results to a Sundarapandian chaotic system, and by means of some numerical simulations we show the effectiveness of the suggested approach. Finally, the proposed observer is utilized for encryption, where encryption key is the master system and decryption key is the slave system.

  12. A new reduced-order observer for the synchronization of nonlinear chaotic systems: An application to secure communications.

    PubMed

    Castro-Ramírez, Joel; Martínez-Guerra, Rafael; Cruz-Victoria, Juan Crescenciano

    2015-10-01

    This paper deals with the master-slave synchronization scheme for partially known nonlinear chaotic systems, where the unknown dynamics is considered as the master system and we propose the slave system structure which estimates the unknown states. It introduced a new reduced order observer, using the concept of Algebraic Observability; we applied the results to a Sundarapandian chaotic system, and by means of some numerical simulations we show the effectiveness of the suggested approach. Finally, the proposed observer is utilized for encryption, where encryption key is the master system and decryption key is the slave system.

  13. Airborne space laser communication system and experiments

    NASA Astrophysics Data System (ADS)

    Li, Xiao-Ming; Zhang, Li-zhong; Meng, Li-Xin

    2015-11-01

    Airborne space laser communication is characterized by its high speed, anti-electromagnetic interference, security, easy to assign. It has broad application in the areas of integrated space-ground communication networking, military communication, anti-electromagnetic communication. This paper introduce the component and APT system of the airborne laser communication system design by Changchun university of science and technology base on characteristic of airborne laser communication and Y12 plan, especially introduce the high communication speed and long distance communication experiment of the system that among two Y12 plans. In the experiment got the aim that the max communication distance 144Km, error 10-6 2.5Gbps - 10-7 1.5Gbps capture probability 97%, average capture time 20s. The experiment proving the adaptability of the APT and the high speed long distance communication.

  14. Cryptanalysis and improvement of quantum secure communication network protocol with entangled photons for mobile communications

    NASA Astrophysics Data System (ADS)

    Gao, Gan

    2014-12-01

    Recently, a communication protocol called controlled bidirectional quantum secret direct communication for mobile networks was proposed by Chou et al (2014 Mobile Netw. Appl. 19 121). We study the security of the proposed communication protocol and find that it is not secure. The controller, Telecom Company, may eavesdrop secret messages from mobile devices without being detected. Finally, we give a possible improvement of the communication protocol.

  15. Communication System and Method

    NASA Technical Reports Server (NTRS)

    Sanders, Adam M. (Inventor); Strawser, Philip A. (Inventor)

    2014-01-01

    A communication system for communicating over high-latency, low bandwidth networks includes a communications processor configured to receive a collection of data from a local system, and a transceiver in communication with the communications processor. The transceiver is configured to transmit and receive data over a network according to a plurality of communication parameters. The communications processor is configured to divide the collection of data into a plurality of data streams; assign a priority level to each of the respective data streams, where the priority level reflects the criticality of the respective data stream; and modify a communication parameter of at least one of the plurality of data streams according to the priority of the at least one data stream.

  16. Hyperchaotic Encryption for Secure E-Mail Communication

    NASA Astrophysics Data System (ADS)

    Aguilar-Bustos, A. Y.; Cruz-Hernández, C.; López-Gutiérrez, R. M.; Tlelo-Cuautle, E.; Posadas-Castillo, C.

    In this chapter, secure computer communication based on synchronized hyperchaotic maps is presented. In particular, we appeal to model-matching approach from nonlinear control theory to synchronize the outputs of two coupled hyperchaotic Rössler maps. An application to secure e-mail communication for confidential information is given. By using a hyperchaotic encryption scheme, we show that output synchronization of hyperchaotic Rössler maps is indeed suitable for encryption, transmission, and decryption of information.

  17. Sensor based framework for secure multimedia communication in VANET.

    PubMed

    Rahim, Aneel; Khan, Zeeshan Shafi; Bin Muhaya, Fahad T; Sher, Muhammad; Kim, Tai-Hoon

    2010-01-01

    Secure multimedia communication enhances the safety of passengers by providing visual pictures of accidents and danger situations. In this paper we proposed a framework for secure multimedia communication in Vehicular Ad-Hoc Networks (VANETs). Our proposed framework is mainly divided into four components: redundant information, priority assignment, malicious data verification and malicious node verification. The proposed scheme jhas been validated with the help of the NS-2 network simulator and the Evalvid tool.

  18. Sensor Based Framework for Secure Multimedia Communication in VANET

    PubMed Central

    Rahim, Aneel; Khan, Zeeshan Shafi; Bin Muhaya, Fahad T.; Sher, Muhammad; Kim, Tai-Hoon

    2010-01-01

    Secure multimedia communication enhances the safety of passengers by providing visual pictures of accidents and danger situations. In this paper we proposed a framework for secure multimedia communication in Vehicular Ad-Hoc Networks (VANETs). Our proposed framework is mainly divided into four components: redundant information, priority assignment, malicious data verification and malicious node verification. The proposed scheme jhas been validated with the help of the NS-2 network simulator and the Evalvid tool. PMID:22163462

  19. CORBA security services for health information systems.

    PubMed

    Blobel, B; Holena, M

    1998-01-01

    The structure of healthcare systems in developed countries is changing to 'shared care', enforced by economic constraints and caused by a change in the basic conditions of care. That development results in co-operative health information systems across the boundaries of organisational, technological, and policy domains. Increasingly, these distributed and, as far as their domains are concerned, heterogeneous systems are based on middleware approaches, such as CORBA. Regarding the sensitivity of personal and medical data, such open, distributed, and heterogeneous health information systems require a high level of data protection and data security, both with respect to patient information and with respect to users. This paper, relying on experience gained through our activities in CORBAmed, describes the possibilities the CORBA middleware provides to achieve application and communication security. On the background of the overall CORBA architecture, it outlines the different security services previewed in the adopted CORBA specifications which are discussed in the context of the security requirements of healthcare information systems. Security services required in the healthcare domain but not available at the moment are mentioned. A solution is proposed, which on the one hand allows to make use of the available CORBA security services and additional ones, on the other hand remains open to other middleware approaches, such as DHE or HL7.

  20. Operational use of environmental satellite remote sensing and satellite communications technology for global food security and locust control by FAO: The ARTEMIS and DIANA systems

    NASA Astrophysics Data System (ADS)

    Hielkema, J. U.; Snijders, F. L.

    Since August 1988, after a development period of 3 years, the FAO Remote Sensing Centre has been operating the Africa Real Time Environmental Monitoring Information System (ARTEMIS) in support of the Global Information and Early Warning System on Food and Agriculture and the Desert Locust Plague Prevention Programme of FAO. The ARTEMIS system was implemented by FAO in close co-operation with NASA Goddard Space Flight Center, U.S.A.; the National Aerospace Laboratory of The Netherlands and the University of Reading, U.K. ARTEMIS is a highly automated data acquisition, pre- and thematic processing, production and archiving system for real-time precipitation assessment and near real-time vegetation condition monitoring of Africa, the Near East and Southwest Asia, based on hourly Meteosat thermal infrared and NOAA AVHRR data. The vegetation condition assessment capability is currently being expanded to include the rest of Asia and Latin America. ARTEMIS data products, generated by the system on a 10-day and monthly basis, are currently used operationally by a variety of users at FAO Headquarters and by regional and national food security early warning systems in sixteen Eastern and Southern African countries. The ARTEMIS system plays an important role in the generation and archiving of global satellite derived environmental data sets for use by FAO and other organizations with global monitoring and assessment mandates. An extensive ARTEMIS rainfall estimation calibration programme, covering Sahelian countries as well as Eastern and Southern Africa, has been developed in co-operation with the University of Reading, U.K. and regional FAO field projects. This programme was started in 1990 and will continue through 1995 to obtain statistically valid regression parameters for homogeneous climatic zones to allow automated translation of satellite derived cold cloud duration data into quantities of estimated rainfall. Jointly with the European Space Agency, FAO Has been

  1. Public key suppression and recovery using a PANDA ring resonator for high security communication

    NASA Astrophysics Data System (ADS)

    Juleang, Pakorn; Phongsanam, Prapas; Mitatha, Somsak; Yupapin, Preecha P.

    2011-03-01

    An interesting security technique that uses the dark-bright soliton conversion control within the microring resonator is proposed. The obtained outputs for a dark-bright soliton dynamic state can be controlled and used to form the public key suppression for communication security application. However, a good design should be possible to be fabricated; therefore, by using the parameters based on the practical device parameters, the simulation results obtained have shown that the proposed system can indeed be achieved. The public key suppression and public key recovery can be used in a highly secure communication system and has potential applications in optical cryptography.

  2. Aviation security: A system's perspective

    SciTech Connect

    Martin, J.P.

    1988-01-01

    For many years the aviation industry and airports operated with security methods and equipment common to most other large industrial complexes. At that time, the security systems primarily provided asset and property protection. However, soon after the first aircraft hijacking the focus of security shifted to emphasize the security requirements necessary for protecting the traveling public and the one feature of the aviation industry that makes it unique---the airplane. The airplane and its operation offered attractive opportunities for the homesick refugee, the mentally unstable person and the terrorist wanting to make a political statement. The airport and its aircraft were the prime targets requiring enhanced security against this escalated threat. In response, the FAA, airport operators and air carriers began to develop plans for increasing security and assigning responsibilities for implementation.

  3. A Secure Communication Suite for Underwater Acoustic Sensor Networks

    PubMed Central

    Dini, Gianluca; Duca, Angelica Lo

    2012-01-01

    In this paper we describe a security suite for Underwater Acoustic Sensor Networks comprising both fixed and mobile nodes. The security suite is composed of a secure routing protocol and a set of cryptographic primitives aimed at protecting the confidentiality and the integrity of underwater communication while taking into account the unique characteristics and constraints of the acoustic channel. By means of experiments and simulations based on real data, we show that the suite is suitable for an underwater networking environment as it introduces limited, and sometimes negligible, communication and power consumption overhead. PMID:23202204

  4. Novel technology for enhanced security and trust in communication networks

    NASA Astrophysics Data System (ADS)

    Milovanov, Alexander; Bukshpun, Leonid; Pradhan, Ranjit; Jannson, Tomasz

    2011-06-01

    A novel technology that significantly enhances security and trust in wireless and wired communication networks has been developed. It is based on integration of a novel encryption mechanism and novel data packet structure with enhanced security tools. This novel data packet structure results in an unprecedented level of security and trust, while at the same time reducing power consumption and computing/communication overhead in networks. As a result, networks are provided with protection against intrusion, exploitation, and cyber attacks and posses self-building, self-awareness, self-configuring, self-healing, and self-protecting intelligence.

  5. Information Security and Integrity Systems

    NASA Technical Reports Server (NTRS)

    1990-01-01

    Viewgraphs from the Information Security and Integrity Systems seminar held at the University of Houston-Clear Lake on May 15-16, 1990 are presented. A tutorial on computer security is presented. The goals of this tutorial are the following: to review security requirements imposed by government and by common sense; to examine risk analysis methods to help keep sight of forest while in trees; to discuss the current hot topic of viruses (which will stay hot); to examine network security, now and in the next year to 30 years; to give a brief overview of encryption; to review protection methods in operating systems; to review database security problems; to review the Trusted Computer System Evaluation Criteria (Orange Book); to comment on formal verification methods; to consider new approaches (like intrusion detection and biometrics); to review the old, low tech, and still good solutions; and to give pointers to the literature and to where to get help. Other topics covered include security in software applications and development; risk management; trust: formal methods and associated techniques; secure distributed operating system and verification; trusted Ada; a conceptual model for supporting a B3+ dynamic multilevel security and integrity in the Ada runtime environment; and information intelligence sciences.

  6. Information Security and Integrity Systems

    NASA Technical Reports Server (NTRS)

    1990-01-01

    Viewgraphs from the Information Security and Integrity Systems seminar held at the University of Houston-Clear Lake on May 15-16, 1990 are presented. A tutorial on computer security is presented. The goals of this tutorial are the following: to review security requirements imposed by government and by common sense; to examine risk analysis methods to help keep sight of forest while in trees; to discuss the current hot topic of viruses (which will stay hot); to examine network security, now and in the next year to 30 years; to give a brief overview of encryption; to review protection methods in operating systems; to review database security problems; to review the Trusted Computer System Evaluation Criteria (Orange Book); to comment on formal verification methods; to consider new approaches (like intrusion detection and biometrics); to review the old, low tech, and still good solutions; and to give pointers to the literature and to where to get help. Other topics covered include security in software applications and development; risk management; trust: formal methods and associated techniques; secure distributed operating system and verification; trusted Ada; a conceptual model for supporting a B3+ dynamic multilevel security and integrity in the Ada runtime environment; and information intelligence sciences.

  7. Three-step semiquantum secure direct communication protocol

    NASA Astrophysics Data System (ADS)

    Zou, XiangFu; Qiu, DaoWen

    2014-09-01

    Quantum secure direct communication is the direct communication of secret messages without need for establishing a shared secret key first. In the existing schemes, quantum secure direct communication is possible only when both parties are quantum. In this paper, we construct a three-step semiquantum secure direct communication (SQSDC) protocol based on single photon sources in which the sender Alice is classical. In a semiquantum protocol, a person is termed classical if he (she) can measure, prepare and send quantum states only with the fixed orthogonal quantum basis {|0>, |1>}. The security of the proposed SQSDC protocol is guaranteed by the complete robustness of semiquantum key distribution protocols and the unconditional security of classical one-time pad encryption. Therefore, the proposed SQSDC protocol is also completely robust. Complete robustness indicates that nonzero information acquired by an eavesdropper Eve on the secret message implies the nonzero probability that the legitimate participants can find errors on the bits tested by this protocol. In the proposed protocol, we suggest a method to check Eves disturbing in the doves returning phase such that Alice does not need to announce publicly any position or their coded bits value after the photons transmission is completed. Moreover, the proposed SQSDC protocol can be implemented with the existing techniques. Compared with many quantum secure direct communication protocols, the proposed SQSDC protocol has two merits: firstly the sender only needs classical capabilities; secondly to check Eves disturbing after the transmission of quantum states, no additional classical information is needed.

  8. Secure Many-to-One Communications in Wireless Sensor Networks.

    PubMed

    Viejo, Alexandre; Domingo-Ferrer, Josep; Sebé, Francesc; Castellà-Roca, Jordi

    2009-01-01

    Wireless Sensor Networks (WSN) are formed by nodes with limited computational and power resources. WSNs are finding an increasing number of applications, both civilian and military, most of which require security for the sensed data being collected by the base station from remote sensor nodes. In addition, when many sensor nodes transmit to the base station, the implosion problem arises. Providing security measures and implosion-resistance in a resource-limited environment is a real challenge. This article reviews the aggregation strategies proposed in the literature to handle the bandwidth and security problems related to many-to-one transmission in WSNs. Recent contributions to secure lossless many-to-one communication developed by the authors in the context of several Spanish-funded projects are surveyed. Ongoing work on the secure lossy many-to-one communication is also sketched.

  9. Thermal noise informatics: totally secure communication via a wire, zero-power communication, and thermal noise driven computing

    NASA Astrophysics Data System (ADS)

    Kish, Laszlo B.; Mingesz, Robert; Gingl, Zoltan

    2007-06-01

    Very recently, it has been shown that Gaussian thermal noise and its artificial versions (Johnson-like noises) can be utilized as an information carrier with peculiar properties therefore it may be proper to call this topic Thermal Noise Informatics. Zero Power (Stealth) Communication, Thermal Noise Driven Computing, and Totally Secure Classical Communication are relevant examples. In this paper, while we will briefly describe the first and the second subjects, we shall focus on the third subject, the secure classical communication via wire. This way of secure telecommunication utilizes the properties of Johnson(-like) noise and those of a simple Kirchhoff's loop. The communicator is unconditionally secure at the conceptual (circuit theoretical) level and this property is (so far) unique in communication systems based on classical physics. The communicator is superior to quantum alternatives in all known aspects, except the need of using a wire. In the idealized system, the eavesdropper can extract zero bit of information without getting uncovered. The scheme is naturally protected against the man-in-the-middle attack. The communication can take place also via currently used power lines or phone (wire) lines and it is not only a point-to-point communication like quantum channels but network-ready. We report that a pair of Kirchhoff-Loop-Johnson(-like)-Noise communicators, which is able to work over variable ranges, was designed and built. Tests have been carried out on a model-line with ranges beyond the ranges of any known direct quantum communication channel and they indicate unrivalled signal fidelity and security performance. This simple device has single-wire secure key generation/sharing rates of 0.1, 1, 10, and 100 bit/second for copper wires with diameters/ranges of 21 mm / 2000 km, 7 mm / 200 km, 2.3 mm / 20 km, and 0.7 mm / 2 km, respectively and it performs with 0.02% raw-bit error rate (99.98 % fidelity). The raw-bit security of this practical system

  10. Secure communications of CAP-4 and OOK signals over MMF based on electro-optic chaos.

    PubMed

    Ai, Jianzhou; Wang, Lulu; Wang, Jian

    2017-09-15

    Chaos-based secure communication can provide a high level of privacy in data transmission. Here, we experimentally demonstrate secure signal transmission over two kinds of multimode fiber (MMF) based on electro-optic intensity chaos. High-quality synchronization is achieved in an electro-optic feedback configuration. Both 5  Gbit/s carrier-less amplitude/phase (CAP-4) modulation and 10  Gbit/s on-off key (OOK) signals are recovered efficiently in electro-optic chaos-based communication systems. Degradations of chaos synchronization and communication system due to mismatch of various hardware keys are also discussed.

  11. Information security management system planning for CBRN facilities

    SciTech Connect

    Lenaeu, Joseph D.; O'Neil, Lori Ross; Leitch, Rosalyn M.; Glantz, Clifford S.; Landine, Guy P.; Bryant, Janet L.; Lewis, John; Mathers, Gemma; Rodger, Robert; Johnson, Christopher

    2015-12-01

    The focus of this document is to provide guidance for the development of information security management system planning documents at chemical, biological, radiological, or nuclear (CBRN) facilities. It describes a risk-based approach for planning information security programs based on the sensitivity of the data developed, processed, communicated, and stored on facility information systems.

  12. Securing a biomedical communications future: thinking strategically.

    PubMed

    Stein, D

    1985-11-01

    Ensuring continued growth and viability of the biomedical communication function has become a critical task of the biomedical communications director. Thinking strategically is a cognitive process which assists a director in visualizing programs and tactics which meet clients needs, creates competitive advantages for the biomedical communications unit and builds on existing unit strengths. Thinking strategically can be divided into five phases: strategic vision, strategy development, strategic plan implementation, strategic plan dissemination, and strategic plan evaluation. Each sequence leads the biomedical communications director through a process designed to increase the effectiveness of the biomedical unit and to meet the challenges posed by an environment characterized by diminished financial, material, and human resources as well as respond to threats and opportunities posed by increased competition in the biomedical communications product and marketplace.

  13. Camouflaging in Digital Image for Secure Communication

    NASA Astrophysics Data System (ADS)

    Jindal, B.; Singh, A. P.

    2013-06-01

    The present paper reports on a new type of camouflaging in digital image for hiding crypto-data using moderate bit alteration in the pixel. In the proposed method, cryptography is combined with steganography to provide a two layer security to the hidden data. The novelty of the algorithm proposed in the present work lies in the fact that the information about hidden bit is reflected by parity condition in one part of the image pixel. The remaining part of the image pixel is used to perform local pixel adjustment to improve the visual perception of the cover image. In order to examine the effectiveness of the proposed method, image quality measuring parameters are computed. In addition to this, security analysis is also carried by comparing the histograms of cover and stego images. This scheme provides a higher security as well as robustness to intentional as well as unintentional attacks.

  14. Communication system modeling

    NASA Technical Reports Server (NTRS)

    Holland, L. D.; Walsh, J. R., Jr.; Wetherington, R. D.

    1971-01-01

    This report presents the results of work on communications systems modeling and covers three different areas of modeling. The first of these deals with the modeling of signals in communication systems in the frequency domain and the calculation of spectra for various modulations. These techniques are applied in determining the frequency spectra produced by a unified carrier system, the down-link portion of the Command and Communications System (CCS). The second modeling area covers the modeling of portions of a communication system on a block basis. A detailed analysis and modeling effort based on control theory is presented along with its application to modeling of the automatic frequency control system of an FM transmitter. A third topic discussed is a method for approximate modeling of stiff systems using state variable techniques.

  15. A Hierarchical Security Architecture for Cyber-Physical Systems

    SciTech Connect

    Quanyan Zhu; Tamer Basar

    2011-08-01

    Security of control systems is becoming a pivotal concern in critical national infrastructures such as the power grid and nuclear plants. In this paper, we adopt a hierarchical viewpoint to these security issues, addressing security concerns at each level and emphasizing a holistic cross-layer philosophy for developing security solutions. We propose a bottom-up framework that establishes a model from the physical and control levels to the supervisory level, incorporating concerns from network and communication levels. We show that the game-theoretical approach can yield cross-layer security strategy solutions to the cyber-physical systems.

  16. Satellite communications system 'Tyulpan'

    NASA Astrophysics Data System (ADS)

    Tchuyan, R. K.; Tarasov, E. V.; Belousov, A. P.; Balyk, V. M.; Kovtunenko, V. M.; Morozov, V. A.; Andreev, V. A.; v'yunenko, K. A.

    1993-10-01

    A concept of the satellite communication system called 'Tyulpan' (because or its tulip-resembling shape) is considered. This conception envisages the use of six satellites-retranslators installed on high-latitude elliptic orbits. Such a system can provide the communication for mean- and high-latitude region of Europe, Asia, and America. For the communication, super small ground stations of 0.4 m in diameter can be used. In the development of system conception, the already existing technical solutions and possibility of conversion or existing installations of military destination were taken into account. Therefore, the system considered can be realized at the earliest possible date.

  17. Research and realization of info-net security controlling system

    NASA Astrophysics Data System (ADS)

    Xu, Tao; Zhang, Wei; Li, Xuhong; Wang, Xia; Pan, Wenwen

    2017-03-01

    The thesis introduces some relative concepts about Network Cybernetics, and we design and realize a new info-net security controlling system based on Network Cybernetics. The system can control the endpoints, safely save files, encrypt communication, supervise actions of users and show security conditions, in order to realize full-scale security management. At last, we simulate the functions of the system. The results show, the system can ensure the controllability of users and devices, and supervise them real-time. The system can maximize the security of the network and users.

  18. Privacy vs usability: a qualitative exploration of patients' experiences with secure Internet communication with their general practitioner.

    PubMed

    Tjora, Aksel; Tran, Trung; Faxvaag, Arild

    2005-05-31

    Direct electronic communication between patients and physicians has the potential to empower patients and improve health care services. Communication by regular email is, however, considered a security threat in many countries and is not recommended. Systems which offer secure communication have now emerged. Unlike regular email, secure systems require that users authenticate themselves. However, the authentication steps per se may become barriers that reduce use. The objective was to study the experiences of patients who were using a secure electronic communication system. The focus of the study was the users' privacy versus the usability of the system. Qualitative interviews were conducted with 15 patients who used a secure communication system (MedAxess) to exchange personal health information with their primary care physician. Six main themes were identified from the interviews: (1) supporting simple questions, (2) security issues, (3) aspects of written communication, (4) trust in the physician, (5) simplicity of MedAxess, and (6) trouble using the system. By using the system, about half of the patients (8/15) experienced easier access to their physician, with whom they tended to solve minor health problems and elaborate on more complex illness experiences. Two thirds of the respondents (10/15) found that their physician quickly responded to their MedAxess requests. As a result of the security barriers, the users felt that the system was secure. However, due to the same barriers, the patients considered the log-in procedure cumbersome, which had considerable negative impact on the actual use of the system. Despite a perceived need for secure electronic patient-physician communication systems, security barriers may diminish their overall usefulness. A dual approach is necessary to improve this situation: patients need to be better informed about security issues, and, at the same time, their experiences of using secure systems must be studied and used to improve

  19. Privacy vs Usability: A Qualitative Exploration of Patients' Experiences With Secure Internet Communication With Their General Practitioner

    PubMed Central

    Tran, Trung; Faxvaag, Arild

    2005-01-01

    Background Direct electronic communication between patients and physicians has the potential to empower patients and improve health care services. Communication by regular email is, however, considered a security threat in many countries and is not recommended. Systems which offer secure communication have now emerged. Unlike regular email, secure systems require that users authenticate themselves. However, the authentication steps per se may become barriers that reduce use. Objectives The objective was to study the experiences of patients who were using a secure electronic communication system. The focus of the study was the users' privacy versus the usability of the system. Methods Qualitative interviews were conducted with 15 patients who used a secure communication system (MedAxess) to exchange personal health information with their primary care physician. Results Six main themes were identified from the interviews: (1) supporting simple questions, (2) security issues, (3) aspects of written communication, (4) trust in the physician, (5) simplicity of MedAxess, and (6) trouble using the system. By using the system, about half of the patients (8/15) experienced easier access to their physician, with whom they tended to solve minor health problems and elaborate on more complex illness experiences. Two thirds of the respondents (10/15) found that their physician quickly responded to their MedAxess requests. As a result of the security barriers, the users felt that the system was secure. However, due to the same barriers, the patients considered the log-in procedure cumbersome, which had considerable negative impact on the actual use of the system. Conclusions Despite a perceived need for secure electronic patient-physician communication systems, security barriers may diminish their overall usefulness. A dual approach is necessary to improve this situation: patients need to be better informed about security issues, and, at the same time, their experiences of using

  20. Department of Homeland Security Interoperable Communications Act

    THOMAS, 113th Congress

    Rep. Payne, Donald M., Jr. [D-NJ-10

    2014-03-24

    07/09/2014 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  1. Department of Homeland Security Interoperable Communications Act

    THOMAS, 113th Congress

    Rep. Payne, Donald M., Jr. [D-NJ-10

    2014-03-24

    07/09/2014 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  2. Department of Homeland Security Interoperable Communications Act

    THOMAS, 113th Congress

    Rep. Payne, Donald M., Jr. [D-NJ-10

    2014-03-24

    Senate - 07/09/2014 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  3. Nonverbal Communication Systems.

    ERIC Educational Resources Information Center

    Leathers, Dale G.

    This book was designed to meet five specific criteria which allow development of a course parallel to the treatment of the book's subject matter, active student involvement in testing and developing their own nonverbal communication capacities, delineation and analysis of the functional capacity of different nonverbal communication systems, an…

  4. Secure Distributed Processing Systems.

    DTIC Science & Technology

    1978-12-01

    34 report prepared for the Institute for Computer Sciences and Technology , National Bureau of Standards, June 30, 1978. Also published as Technical...local networks. For such short distances, one can use communication lines which exhibit high bandwidth and low delay. With current technology , high...the average, ten percent of the database was modified since the last dump was taken. With state-of-the-art technology , typical data transfer rates for

  5. Improved Protocols of Secure Quantum Communication Using W States

    NASA Astrophysics Data System (ADS)

    Shukla, Chitra; Banerjee, Anindita; Pathak, Anirban

    2013-06-01

    Recently, Hwang et al. (Eur. Phys. J. D 61:785, 2011) and Yuan et al. (Int. J. Theor. Phys. 50:2403, 2011) have proposed two efficient protocols of secure quantum communication using 3-qubit and 4-qubit symmetric W state respectively. These two dense coding based protocols are generalized and their efficiencies are considerably improved. Simple bounds on the qubit efficiency of deterministic secure quantum communication (DSQC) and quantum secure direct communication (QSDC) protocols are obtained and it is shown that dense coding is not essential for designing of maximally efficient DSQC and QSDC protocols. This fact is used to design maximally efficient protocols of DSQC and QSDC using 3-qubit and 4-qubit W states.

  6. Efficient deterministic secure quantum communication protocols using multipartite entangled states

    NASA Astrophysics Data System (ADS)

    Joy, Dintomon; Surendran, Supin P.; Sabir, M.

    2017-06-01

    We propose two deterministic secure quantum communication protocols employing three-qubit GHZ-like states and five-qubit Brown states as quantum channels for secure transmission of information in units of two bits and three bits using multipartite teleportation schemes developed here. In these schemes, the sender's capability in selecting quantum channels and the measuring bases leads to improved qubit efficiency of the protocols.

  7. Cyber Security and Resilient Systems

    SciTech Connect

    Robert S. Anderson

    2009-07-01

    The Department of Energy (DOE) Idaho National Laboratory (INL) has become a center of excellence for critical infrastructure protection, particularly in the field of cyber security. It is one of only a few national laboratories that have enhanced the nation’s cyber security posture by performing industrial control system (ICS) vendor assessments as well as user on-site assessments. Not only are vulnerabilities discovered, but described actions for enhancing security are suggested – both on a system-specific basis and from a general perspective of identifying common weaknesses and their corresponding corrective actions. These cyber security programs have performed over 40 assessments to date which have led to more robust, secure, and resilient monitoring and control systems for the US electrical grid, oil and gas, chemical, transportation, and many other sectors. In addition to cyber assessments themselves, the INL has been engaged in outreach to the ICS community through vendor forums, technical conferences, vendor user groups, and other special engagements as requested. Training programs have been created to help educate all levels of management and worker alike with an emphasis towards real everyday cyber hacking methods and techniques including typical exploits that are used. The asset owner or end user has many products available for its use created from these programs. One outstanding product is the US Department of Homeland Security (DHS) Cyber Security Procurement Language for Control Systems document that provides insight to the user when specifying a new monitoring and control system, particularly concerning security requirements. Employing some of the top cyber researchers in the nation, the INL can leverage this talent towards many applications other than critical infrastructure. Monitoring and control systems are used throughout the world to perform simple tasks such as cooking in a microwave to complex ones such as the monitoring and control of the

  8. Resilient Communication: A New Crisis Communication Strategy for Homeland Security

    DTIC Science & Technology

    2012-03-01

    Peter Sandman. Covello and Sandman’s recommendations for improving messages in a crisis represent some of the more significant advances in the...be involved and be more resilient in a crisis. Peter Sandman, in his crisis communication training materials, recommends involving the public in...Opportunity (Seeger et al., 2010), assessed how key community leaders like Steve Hewitt , the city administrator, communicated hope for an even better

  9. 33 CFR 106.255 - Security systems and equipment maintenance.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.255 Security systems and equipment maintenance....

  10. 33 CFR 106.255 - Security systems and equipment maintenance.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.255 Security systems and equipment maintenance....

  11. 33 CFR 106.255 - Security systems and equipment maintenance.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.255 Security systems and equipment maintenance....

  12. 33 CFR 106.255 - Security systems and equipment maintenance.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.255 Security systems and equipment maintenance....

  13. 33 CFR 106.255 - Security systems and equipment maintenance.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.255 Security systems and equipment maintenance....

  14. AMPA experimental communications systems

    NASA Technical Reports Server (NTRS)

    Beckerman, D.; Fass, S.; Keon, T.; Sielman, P.

    1982-01-01

    The program was conducted to demonstrate the satellite communication advantages of Adaptive Phased Array Technology. A laboratory based experiment was designed and implemented to demonstrate a low earth orbit satellite communications system. Using a 32 element, L-band phased array augmented with 4 sets of weights (2 for reception and 2 for transmission) a high speed digital processing system and operating against multiple user terminals and interferers, the AMPA system demonstrated: communications with austere user terminals, frequency reuse, communications in the face of interference, and geolocation. The program and experiment objectives are described, the system hardware and software/firmware are defined, and the test performed and the resultant test data are presented.

  15. A Secure and Efficient Communications Architecture for Global Information Grid Users Via Cooperating Space Assets

    DTIC Science & Technology

    2008-06-19

    novel security framework architecture to provide efficient and scalable secure multicasting in the low earth orbit satellite network environment...Codes MANET Mobile ad hoc network MAODV Multicast extension to Ad hoc On demand Distance Vector routing protocol MBone Multicast Backbone MEF...The GIG Surface Layer Bridging the Aerospace layer and the Surface layer is a new communication system called Joint Tactical Radio System (JTRS

  16. A voice password system for access security

    SciTech Connect

    Birnbaum, M.; Cohen, L.A.; Welsh, F.X.

    1986-09-01

    A voice password system for access security using speaker verification technology has been designed for use over dial-up telephone lines. The voice password system (VPS) can provide secure access to telephone networks, computers, rooms, and buildings. It also has application in office automation systems, electric funds transfer, and ''smart cards'' (interactive computers embedded in credit-card-sized packages). As increasing attention is focused on access security in the public, private, and government sectors, the voice password system can provide a timely solution to the security dilemma. The VPS uses modes of communication available to almost everyone (the human voice and the telephone). A user calls the VPS, enters his or her identification number (ID) by touch-tone telephone, and then speaks a password. This is usually a phrase or a sentence of about seven syllables. On initial calls, the VPS creates a model of the user's voice, called a reference template, and labels it with the caller's unique user ID. To gain access later, the user calls the system, enters the proper user ID, and speaks the password phrase. The VPS compares the user's stored reference template with the spoken password and produces a distance score.

  17. Building Safe and Secure Systems with AADL

    DTIC Science & Technology

    2015-02-15

    Deadlock/starvation Latency Resource Consumption Bandwidth CPU time Power consumption Data precision/ accuracy Temporal correctness Confidence Data...University Security Policy Verification Component integration and composition Partitions share the same level with their tasks Partitions contain objects at...the same security level Communication Policies Communication share the same level A shared device manages objects at the same level 21 AADL meeting

  18. Improving Communications Systems

    NASA Technical Reports Server (NTRS)

    1997-01-01

    The Space Shuttle has many communications systems which are used throughout a typical mission. Given that the radio spectrum has become increasingly congested, the ability to hear extremely weak signals requires greater receiver sensitivity. Dryden Flight Research Center approached Angle Linear, a manufacturer of linear radio frequency products and peripherals for communications, to solve the problem. The solution was a receiving preamplifier specially crafted for NASA. Communications with the Space Shuttle are now more reliable,with Dryden being able to also support local missions without purchasing additional equipment. The work has carried over into the Mir Space Station communication support effort and is under evaluation by other NASA centers. The company's preamplifier line was greatly expanded to cover a broader range of frequencies, providing the same sensational improvement to other areas of communication including business, government, trucking, land mobile, cellular and broadcast.

  19. Communications and Information: Communications Security (COMSEC) User Requirements

    DTIC Science & Technology

    2007-11-02

    CRO ) and COMSEC users to properly secure COMSEC material the local COMSEC manager issued to them. Refer technical comments to Headquarters Air Force...Introduction. This AFI sets procedures for CROs and COMSEC users. It describes their COMSEC duties and the minimum requirements for safeguarding...Secret COMSEC key and Top Secret key-generating equipment. It contains general COMSEC information of interest to all CROs and COMSEC users who receive

  20. Secure Automated Microgrid Energy System

    DTIC Science & Technology

    2016-12-01

    EW-201340) Secure Automated Microgrid Energy System December 2016 This document has been cleared for public release; Distribution Statement A...Operator COTS Commercial-Off-The-Shelf Software DCS Distributed Control System DER Distributed Energy Resources DIACAP Defense Information...Assurance Certification and Accreditation Process DoD Department of Defense DoDI Department of Defense Instruction DOE Department of Energy

  1. Extensible Operating System Security

    DTIC Science & Technology

    2002-09-01

    systems include SPIN [3] and the Exokernel [6] architecture, although each has major conceptual differences in terms of the fundamental approach that was...Jr., “ Exokernel : An Operating System achitecture for Application-level Resource Management”, Proc. of the 15th ACM Symposium on Operating Systems

  2. Communication Systems in Healthcare

    PubMed Central

    Coiera, Enrico

    2006-01-01

    The care of patients now almost inevitably seems to involve many different individuals, all needing to share patient information and discuss their management. As a consequence there is increasing interest in, and use of, information and communication technologies to support health services. Yet, while there is significant discussion of, and investment in, information technologies, communication systems receive much less attention and the clinical adoption of even simpler services like voice-mail or electronic mail is still not commonplace in many health services. There remain enormous gaps in our broad understanding of the role of communication services in health care delivery. Laboratory medicine is perhaps even more poorly studied than many other areas, such as the interface between primary care and hospital services. Given this lack of specific information about laboratory communication services, this paper will step back and generally review the components of a communication system, including the basic concepts of a communication channel, service, device and interaction mode. The review will then try and summarise some of what is known about specific communication problems that arise across health services in the main, including the community and hospital service delivery. PMID:17077879

  3. Digital communication system

    NASA Technical Reports Server (NTRS)

    Monford, L. G., Jr. (Inventor)

    1974-01-01

    A digital communication system is reported for parallel operation of 16 or more transceiver units with the use of only four interconnecting wires. A remote synchronization circuit produces unit address control words sequentially in data frames of 16 words. Means are provided in each transceiver unit to decode calling signals and to transmit calling and data signals. The transceivers communicate with each other over one data line. The synchronization unit communicates the address control information to the transceiver units over an address line and further provides the timing information over a clock line. A reference voltage level or ground line completes the interconnecting four wire hookup.

  4. System and method for secure group transactions

    DOEpatents

    Goldsmith, Steven Y.

    2006-04-25

    A method and a secure system, processing on one or more computers, provides a way to control a group transaction. The invention uses group consensus access control and multiple distributed secure agents in a network environment. Each secure agent can organize with the other secure agents to form a secure distributed agent collective.

  5. Secure optical communication using stimulated Brillouin scattering in optical fiber

    NASA Astrophysics Data System (ADS)

    Yi, Lilin; Zhang, Tao; Li, Zhengxuan; Zhou, Junhe; Dong, Yi; Hu, Weisheng

    2013-03-01

    We propose to encrypt/decrypt high-speed optical signal using stimulated Brillouin scattering (SBS) effect in optical fiber for the first time. The broadened SBS gain or loss distorts the amplitude and phase of the optical signal so as to realize all-optical encryption. The corresponding SBS loss or gain with the same bandwidth and amplitude recovers the distorted signal to implement optical decryption. The encryption/decryption keys could be the SBS gain amplitude, bandwidth, central wavelength and the spectral shape, which are configurable and can be flexibly controlled by the users. The operation principle of the SBS based encryption and decryption is explained in detail. Complete encryption and error-free decryption for a 10.86-Gb/s on-off-keying signal has been experimentally demonstrated using broadband SBS amplification and absorption. The immunity of the proposed encryption method to the eavesdropper's attack is also analyzed. The SBS based secure optical communication is compatible with the current optical communication systems.

  6. Transitioning from analog to digital communications: An information security perspective

    NASA Technical Reports Server (NTRS)

    Dean, Richard A.

    1990-01-01

    A summary is given of the government's perspective on evolving digital communications as they affect secure voice users and approaches for operating during a transition period to an all digital world. An integrated architecture and a mobile satellite interface are discussed.

  7. Network security system for health and medical information using smart IC card

    NASA Astrophysics Data System (ADS)

    Kanai, Yoichi; Yachida, Masuyoshi; Yoshikawa, Hiroharu; Yamaguchi, Masahiro; Ohyama, Nagaaki

    1998-07-01

    A new network security protocol that uses smart IC cards has been designed to assure the integrity and privacy of medical information in communication over a non-secure network. Secure communication software has been implemented as a library based on this protocol, which is called the Integrated Secure Communication Layer (ISCL), and has been incorporated into information systems of the National Cancer Center Hospitals and the Health Service Center of the Tokyo Institute of Technology. Both systems have succeeded in communicating digital medical information securely.

  8. Secure SCADA communication by using a modified key management scheme.

    PubMed

    Rezai, Abdalhossein; Keshavarzi, Parviz; Moravej, Zahra

    2013-07-01

    This paper presents and evaluates a new cryptographic key management scheme which increases the efficiency and security of the Supervisory Control And Data Acquisition (SCADA) communication. In the proposed key management scheme, two key update phases are used: session key update and master key update. In the session key update phase, session keys are generated in the master station. In the master key update phase, the Elliptic Curve Diffie-Hellman (ECDH) protocol is used. The Poisson process is also used to model the Security Index (SI) and Quality of Service (QoS). Our analysis shows that the proposed key management not only supports the required speed in the MODBUS implementation but also has several advantages compared to other key management schemes for secure communication in SCADA networks. Copyright © 2013 ISA. Published by Elsevier Ltd. All rights reserved.

  9. Secure and Authenticated Data Communication in Wireless Sensor Networks

    PubMed Central

    Alfandi, Omar; Bochem, Arne; Kellner, Ansgar; Göge, Christian; Hogrefe, Dieter

    2015-01-01

    Securing communications in wireless sensor networks is increasingly important as the diversity of applications increases. However, even today, it is equally important for the measures employed to be energy efficient. For this reason, this publication analyzes the suitability of various cryptographic primitives for use in WSNs according to various criteria and, finally, describes a modular, PKI-based framework for confidential, authenticated, secure communications in which most suitable primitives can be employed. Due to the limited capabilities of common WSN motes, criteria for the selection of primitives are security, power efficiency and memory requirements. The implementation of the framework and the singular components have been tested and benchmarked in our testbed of IRISmotes. PMID:26266413

  10. Secure Distributed File Systems

    DTIC Science & Technology

    1994-09-01

    practicality and applicability of one such system, Trusted Ficus File System ( TRUFFLES ), in the DoD infrastructure. Integrated into this research are...discussions of Privacy Enhanced Mail (PEM), which is currently an integral part of the TRUFFLES implementation. This thesis concludes with a discussion of the...actual installation of a PEM reference implementation, and future requirements for the TRUFFLES installation at the Naval Postgraduate School. 14

  11. Helicopter Communications System Study.

    DTIC Science & Technology

    1980-02-01

    9~g f3 HELICOPTER COMMUNICATIONS SYSTEM STUDY(U) RRIC v/1 RESEARCH CORP ANNAPOLIS RO M WHITE ET AL. FED SO 1575-01-2-2162 FRR-RD-8U-29 DOT-FA79WAI...W Ww aW - S w W - .. 4w lW ,w w 4111 " ’? "’ % It .pm.I RIpest No. FAA-RDI-O F ILE COPv 00 HELICOPTER COMMUNICATIONS SYSTEM STUDY FINAL KEPORT N. Wt...Virginia 22161. ~ JUL 7987U Prepared for , U.S. DEPARTMENT OF TRANSPORTATION FEDERAL AVIATION ADMINISTRATION Systems Research & Deveopment Service

  12. Method for self reconstruction of holograms for secure communication

    NASA Astrophysics Data System (ADS)

    Babcock, Craig; Donkor, Eric

    2017-05-01

    We present the theory and experimental results behind using a 3D holographic signal for secure communications. A hologram of a complex 3D object is recorded to be used as a hard key for data encryption and decryption. The hologram is cut in half to be used at each end of the system. One piece is used for data encryption, while the other is used for data decryption. The first piece of hologram is modulated with the data to be encrypted. The hologram has an extremely complex phase distribution which encodes the data signal incident on the first piece of hologram. In order to extract the data from the modulated holographic carrier, the signal must be passed through the second hologram, removing the complex phase contributions of the first hologram. The signal beam from the first piece of hologram is used to illuminate the second piece of the same hologram, creating a self-reconstructing system. The 3D hologram's interference pattern is highly specific to the 3D object and conditions during the holographic writing process. With a sufficiently complex 3D object used to generate the holographic hard key, the data will be nearly impossible to recover without using the second piece of the same hologram. This method of producing a self-reconstructing hologram ensures that the pieces in use are from the same original hologram, providing a system hard key, making it an extremely difficult system to counterfeit.

  13. Biomedical devices and systems security.

    PubMed

    Arney, David; Venkatasubramanian, Krishna K; Sokolsky, Oleg; Lee, Insup

    2011-01-01

    Medical devices have been changing in revolutionary ways in recent years. One is in their form-factor. Increasing miniaturization of medical devices has made them wearable, light-weight, and ubiquitous; they are available for continuous care and not restricted to clinical settings. Further, devices are increasingly becoming connected to external entities through both wired and wireless channels. These two developments have tremendous potential to make healthcare accessible to everyone and reduce costs. However, they also provide increased opportunity for technology savvy criminals to exploit them for fun and profit. Consequently, it is essential to consider medical device security issues. In this paper, we focused on the challenges involved in securing networked medical devices. We provide an overview of a generic networked medical device system model, a comprehensive attack and adversary model, and describe some of the challenges present in building security solutions to manage the attacks. Finally, we provide an overview of two areas of research that we believe will be crucial for making medical device system security solutions more viable in the long run: forensic data logging, and building security assurance cases.

  14. Dynamic security assessment processing system

    NASA Astrophysics Data System (ADS)

    Tang, Lei

    The architecture of dynamic security assessment processing system (DSAPS) is proposed to address online dynamic security assessment (DSA) with focus of the dissertation on low-probability, high-consequence events. DSAPS upgrades current online DSA functions and adds new functions to fit into the modern power grid. Trajectory sensitivity analysis is introduced and its applications in power system are reviewed. An index is presented to assess transient voltage dips quantitatively using trajectory sensitivities. Then the framework of anticipatory computing system (ACS) for cascading defense is presented as an important function of DSAPS. ACS addresses various security problems and the uncertainties in cascading outages. Corrective control design is automated to mitigate the system stress in cascading progressions. The corrective controls introduced in the dissertation include corrective security constrained optimal power flow, a two-stage load control for severe under-frequency conditions, and transient stability constrained optimal power flow for cascading outages. With state-of-the-art computing facilities to perform high-speed extended-term time-domain simulation and optimization for large-scale systems, DSAPS/ACS efficiently addresses online DSA for low-probability, high-consequence events, which are not addressed by today's industrial practice. Human interference is reduced in the computationally burdensome analysis.

  15. Multimedia Security System for Security and Medical Applications

    ERIC Educational Resources Information Center

    Zhou, Yicong

    2010-01-01

    This dissertation introduces a new multimedia security system for the performance of object recognition and multimedia encryption in security and medical applications. The system embeds an enhancement and multimedia encryption process into the traditional recognition system in order to improve the efficiency and accuracy of object detection and…

  16. Multimedia Security System for Security and Medical Applications

    ERIC Educational Resources Information Center

    Zhou, Yicong

    2010-01-01

    This dissertation introduces a new multimedia security system for the performance of object recognition and multimedia encryption in security and medical applications. The system embeds an enhancement and multimedia encryption process into the traditional recognition system in order to improve the efficiency and accuracy of object detection and…

  17. PCASSO: a design for secure communication of personal health information via the internet.

    PubMed

    Baker, D B; Masys, D R

    1999-05-01

    The Internet holds both promise and peril for the communications of person-identifiable health information. Because of technical features designed to promote accessibility and interoperability rather than security, Internet addressing conventions and transport protocols are vulnerable to compromise by malicious persons and programs. In addition, most commonly used personal computer (PC) operating systems currently lack the hardware-based system software protection and process isolation that are essential for ensuring the integrity of trusted applications. Security approaches designed for electronic commerce, that trade known security weaknesses for limited financial liability, are not sufficient for personal health data, where the personal damage caused by unintentional disclosure may be far more serious. To overcome these obstacles, we are developing and evaluating an Internet-based communications system called PCASSO (Patient-centered access to secure systems online) that applies state of the art security to health information. PCASSO includes role-based access control, multi-level security, strong device and user authentication, session-specific encryption and audit trails. Unlike Internet-based electronic commerce 'solutions,' PCASSO secures data end-to-end: in the server; in the data repository; across the network; and on the client. PCASSO is designed to give patients as well as providers access to personal health records via the Internet.

  18. Systems Security Engineering

    DTIC Science & Technology

    2010-08-22

    storing, transmitting, retrieving, or processing of information (e.g., microelectronics , printed circuit boards, computing systems, software, mobile...below. Internal use:* Permission to reproduce this material and to prepare derivative works from this material for internal use is granted, provided...hard math problems presented by Hilbert to the International Congress of Mathematicians in Paris in 1900. None of the problems are expected to be

  19. Performance evaluation of secured DICOM image communication with next generation internet protocol IPv6

    NASA Astrophysics Data System (ADS)

    Yu, Fenghai; Zhang, Jianguo; Chen, Xiaomeng; Huang, H. K.

    2005-04-01

    Next Generation Internet (NGI) technology with new communication protocol IPv6 emerges as a potential solution for low-cost and high-speed networks for image data transmission. IPv6 is designed to solve many of the problems of the current version of IP (known as IPv4) with regard to address depletion, security, autoconfiguration, extensibility, and more. We choose CTN (Central Test Node) DICOM software developed by The Mallinckrodt Institute of Radiology to implement IPv6/IPv4 enabled DICOM communication software on different operating systems (Windows/Linux), and used this DICOM software to evaluate the performance of the IPv6/IPv4 enabled DICOM image communication with different security setting and environments. We compared the security communications of IPsec with SSL/TLS on different TCP/IP protocols (IPv6/IPv4), and find that there are some trade-offs to choose security solution between IPsec and SSL/TLS in the security implementation of IPv6/IPv4 communication networks.

  20. Developing a Standard Method for Link-Layer Security of CCSDS Space Communications

    NASA Technical Reports Server (NTRS)

    Biggerstaff, Craig

    2009-01-01

    Communications security for space systems has been a specialized field generally far removed from considerations of mission interoperability and cross-support in fact, these considerations often have been viewed as intrinsically opposed to security objectives. The space communications protocols defined by the Consultative Committee for Space Data Systems (CCSDS) have a twenty-five year history of successful use in over 400 missions. While the CCSDS Telemetry, Telecommand, and Advancing Orbiting Systems protocols for use at OSI Layer 2 are operationally mature, there has been no direct support within these protocols for communications security techniques. Link-layer communications security has been successfully implemented in the past using mission-unique methods, but never before with an objective of facilitating cross-support and interoperability. This paper discusses the design of a standard method for cryptographic authentication, encryption, and replay protection at the data link layer that can be integrated into existing CCSDS protocols without disruption to legacy communications services. Integrating cryptographic operations into existing data structures and processing sequences requires a careful assessment of the potential impediments within spacecraft, ground stations, and operations centers. The objective of this work is to provide a sound method for cryptographic encapsulation of frame data that also facilitates Layer 2 virtual channel switching, such that a mission may procure data transport services as needed without involving third parties in the cryptographic processing, or split independent data streams for separate cryptographic processing.

  1. Developing a Standard Method for Link-Layer Security of CCSDS Space Communications

    NASA Technical Reports Server (NTRS)

    Biggerstaff, Craig

    2009-01-01

    Communications security for space systems has been a specialized field generally far removed from considerations of mission interoperability and cross-support in fact, these considerations often have been viewed as intrinsically opposed to security objectives. The space communications protocols defined by the Consultative Committee for Space Data Systems (CCSDS) have a twenty-five year history of successful use in over 400 missions. While the CCSDS Telemetry, Telecommand, and Advancing Orbiting Systems protocols for use at OSI Layer 2 are operationally mature, there has been no direct support within these protocols for communications security techniques. Link-layer communications security has been successfully implemented in the past using mission-unique methods, but never before with an objective of facilitating cross-support and interoperability. This paper discusses the design of a standard method for cryptographic authentication, encryption, and replay protection at the data link layer that can be integrated into existing CCSDS protocols without disruption to legacy communications services. Integrating cryptographic operations into existing data structures and processing sequences requires a careful assessment of the potential impediments within spacecraft, ground stations, and operations centers. The objective of this work is to provide a sound method for cryptographic encapsulation of frame data that also facilitates Layer 2 virtual channel switching, such that a mission may procure data transport services as needed without involving third parties in the cryptographic processing, or split independent data streams for separate cryptographic processing.

  2. Airborne wireless communication systems, airborne communication methods, and communication methods

    DOEpatents

    Deaton, Juan D [Menan, ID; Schmitt, Michael J [Idaho Falls, ID; Jones, Warren F [Idaho Falls, ID

    2011-12-13

    An airborne wireless communication system includes circuitry configured to access information describing a configuration of a terrestrial wireless communication base station that has become disabled. The terrestrial base station is configured to implement wireless communication between wireless devices located within a geographical area and a network when the terrestrial base station is not disabled. The circuitry is further configured, based on the information, to configure the airborne station to have the configuration of the terrestrial base station. An airborne communication method includes answering a 911 call from a terrestrial cellular wireless phone using an airborne wireless communication system.

  3. REVIEWS OF TOPICAL PROBLEMS: On the use of chaotic synchronization for secure communication

    NASA Astrophysics Data System (ADS)

    Koronovskii, Aleksei A.; Moskalenko, Olga I.; Hramov, Aleksandr E.

    2009-12-01

    Research on the secure communication applications of chaotic synchronization is reviewed. A number of secure communication methods and devices using different types of synchronous behavior are examined. For the purpose of comparing existing methods, quantitative characteristics of operating capacity of various schemes are introduced and estimated. An extremely noise-stable secure information transmission method, based on the phenomenon of generalized chaos synchronization, is proposed. All of the methods considered are systematically checked for efficiency for the first time by numerically simulating unidirectionally coupled chaotic Rössler systems selected for transmitting and receiving oscillators. The key advantages and disadvantages of secure information transmission schemes using synchronized chaotic oscillations are discussed. The experimental data gathered in this field are also reviewed.

  4. INCO shuttle communication system

    NASA Technical Reports Server (NTRS)

    Dikshit, Piyush; Guimaraes, Katia; Ramamurthy, Maya; Agrawala, Ashok K.; Larsen, Ronald L.

    1989-01-01

    In a previous work we have defined a general architectural model for autonomous systems, which can be mapped easily to describe the functions of any automated system (SDAG-86-01). In this note, we use the model to describe the Shuttle communication system. First we briefly review the architecture, then we present the environment of our application, and finally we detail the specific function for each functional block of the architecture for that environment.

  5. INCO shuttle communication system

    NASA Technical Reports Server (NTRS)

    Dikshit, Piyush; Guimaraes, Katia; Ramamurthy, Maya; Agrawala, Ashok K.; Larsen, Ronald L.

    1989-01-01

    In a previous work we have defined a general architectural model for autonomous systems, which can be mapped easily to describe the functions of any automated system (SDAG-86-01). In this note, we use the model to describe the Shuttle communication system. First we briefly review the architecture, then we present the environment of our application, and finally we detail the specific function for each functional block of the architecture for that environment.

  6. Telecommunications Policy Research Conference. Computer and Communications Security Section. Papers.

    ERIC Educational Resources Information Center

    Telecommunications Policy Research Conference, Inc., Washington, DC.

    In his paper, "European Needs and Attitudes towards Information Security," Richard I. Polis notes that the needs for security in computer systems, telecommunications, and media are rather uniform throughout Western Europe, and are seen as being significantly different from the needs in the United States. Recognition of these needs is,…

  7. Three-party quantum secure direct communication against collective noise

    NASA Astrophysics Data System (ADS)

    He, Ye-Feng; Ma, Wen-Ping

    2017-10-01

    Based on logical quantum states, two three-party quantum secure direct communication protocols are proposed, which can realize the exchange of the secret messages between three parties with the help of the measurement correlation property of six-particle entangled states. These two protocols can be immune to the collective-dephasing noise and the collective-rotation noise, respectively; neither of them has information leakage problem. The one-way transmission mode ensures that they can congenitally resist against the Trojan horse attacks and the teleportation attack. Furthermore, these two protocols are secure against other active attacks because of the use of the decoy state technology.

  8. Interoperable Communications Systems: Governance and Risk

    DTIC Science & Technology

    2009-12-01

    COMMUNICATIONS SYSTEMS: GOVERNANCE AND RISK by Michael J. Aspland December 2009 Thesis Advisor: Richard Bergin Second Reader: Jeffrey ...Approved by: Richard Bergin Thesis Advisor Jeffrey Munks Second Reader Harold A. Trinkunas, PhD Chairman, Department of National Security...Bergin Naval Postgraduate School Monterey, California 4. Jeffrey Munks Naval Postgraduate School Monterey, California 5. Fred Meurer City

  9. Strategic Choices for Data Communications Systems.

    ERIC Educational Resources Information Center

    Arns, Robert G.; Urban, Patricia A.

    1984-01-01

    Issues in determining how to develop a data communications system at colleges and universities are discussed including; technical requirements; cost; implications for coordination and (de)centralization of hardware/software; deciding when to create a data network; data security, information integrity, and organizational development. (Author/MLW)

  10. Strategic Choices for Data Communications Systems.

    ERIC Educational Resources Information Center

    Arns, Robert G.; Urban, Patricia A.

    1984-01-01

    Issues in determining how to develop a data communications system at colleges and universities are discussed including; technical requirements; cost; implications for coordination and (de)centralization of hardware/software; deciding when to create a data network; data security, information integrity, and organizational development. (Author/MLW)

  11. Information technology security system engineering methodology

    NASA Technical Reports Server (NTRS)

    Childs, D.

    2003-01-01

    A methodology is described for system engineering security into large information technology systems under development. The methodology is an integration of a risk management process and a generic system development life cycle process. The methodology is to be used by Security System Engineers to effectively engineer and integrate information technology security into a target system as it progresses through the development life cycle. The methodology can also be used to re-engineer security into a legacy system.

  12. Information technology security system engineering methodology

    NASA Technical Reports Server (NTRS)

    Childs, D.

    2003-01-01

    A methodology is described for system engineering security into large information technology systems under development. The methodology is an integration of a risk management process and a generic system development life cycle process. The methodology is to be used by Security System Engineers to effectively engineer and integrate information technology security into a target system as it progresses through the development life cycle. The methodology can also be used to re-engineer security into a legacy system.

  13. Communication Systems. Laboratory Activities.

    ERIC Educational Resources Information Center

    Sutherland, Barbara, Ed.

    This communication systems guide provides teachers with learning activities for secondary students. Introductory materials include an instructional planning outline and worksheet, an outline of essential elements, a list of objectives, a course description, and a content outline. The guide contains 32 modules on the following topics: story…

  14. Communication Systems. Laboratory Activities.

    ERIC Educational Resources Information Center

    Sutherland, Barbara, Ed.

    This communication systems guide provides teachers with learning activities for secondary students. Introductory materials include an instructional planning outline and worksheet, an outline of essential elements, a list of objectives, a course description, and a content outline. The guide contains 32 modules on the following topics: story…

  15. Communication and Information Systems.

    ERIC Educational Resources Information Center

    Wheeler, Peter

    1982-01-01

    Discusses the Microelectronics Education Programme's work in the communication and information systems domain, suggesting that teachers understanding the new technologies and incorporate them into regular classroom instruction. Focuses on computers in the classroom, economy of time, keyboard skills, life skills, and vocational training. (Author/JN)

  16. Quantum-secure covert communication on bosonic channels

    PubMed Central

    Bash, Boulat A.; Gheorghe, Andrei H.; Patel, Monika; Habif, Jonathan L.; Goeckel, Dennis; Towsley, Don; Guha, Saikat

    2015-01-01

    Computational encryption, information-theoretic secrecy and quantum cryptography offer progressively stronger security against unauthorized decoding of messages contained in communication transmissions. However, these approaches do not ensure stealth—that the mere presence of message-bearing transmissions be undetectable. We characterize the ultimate limit of how much data can be reliably and covertly communicated over the lossy thermal-noise bosonic channel (which models various practical communication channels). We show that whenever there is some channel noise that cannot in principle be controlled by an otherwise arbitrarily powerful adversary—for example, thermal noise from blackbody radiation—the number of reliably transmissible covert bits is at most proportional to the square root of the number of orthogonal modes (the time-bandwidth product) available in the transmission interval. We demonstrate this in a proof-of-principle experiment. Our result paves the way to realizing communications that are kept covert from an all-powerful quantum adversary. PMID:26478089

  17. Quantum-secure covert communication on bosonic channels.

    PubMed

    Bash, Boulat A; Gheorghe, Andrei H; Patel, Monika; Habif, Jonathan L; Goeckel, Dennis; Towsley, Don; Guha, Saikat

    2015-10-19

    Computational encryption, information-theoretic secrecy and quantum cryptography offer progressively stronger security against unauthorized decoding of messages contained in communication transmissions. However, these approaches do not ensure stealth--that the mere presence of message-bearing transmissions be undetectable. We characterize the ultimate limit of how much data can be reliably and covertly communicated over the lossy thermal-noise bosonic channel (which models various practical communication channels). We show that whenever there is some channel noise that cannot in principle be controlled by an otherwise arbitrarily powerful adversary--for example, thermal noise from blackbody radiation--the number of reliably transmissible covert bits is at most proportional to the square root of the number of orthogonal modes (the time-bandwidth product) available in the transmission interval. We demonstrate this in a proof-of-principle experiment. Our result paves the way to realizing communications that are kept covert from an all-powerful quantum adversary.

  18. Quantum-secure covert communication on bosonic channels

    NASA Astrophysics Data System (ADS)

    Bash, Boulat A.; Gheorghe, Andrei H.; Patel, Monika; Habif, Jonathan L.; Goeckel, Dennis; Towsley, Don; Guha, Saikat

    2015-10-01

    Computational encryption, information-theoretic secrecy and quantum cryptography offer progressively stronger security against unauthorized decoding of messages contained in communication transmissions. However, these approaches do not ensure stealth--that the mere presence of message-bearing transmissions be undetectable. We characterize the ultimate limit of how much data can be reliably and covertly communicated over the lossy thermal-noise bosonic channel (which models various practical communication channels). We show that whenever there is some channel noise that cannot in principle be controlled by an otherwise arbitrarily powerful adversary--for example, thermal noise from blackbody radiation--the number of reliably transmissible covert bits is at most proportional to the square root of the number of orthogonal modes (the time-bandwidth product) available in the transmission interval. We demonstrate this in a proof-of-principle experiment. Our result paves the way to realizing communications that are kept covert from an all-powerful quantum adversary.

  19. Statistics-based email communication security behavior recognition

    NASA Astrophysics Data System (ADS)

    Yi, Junkai; Su, Yueyang; Zhao, Xianghui

    2017-08-01

    With the development of information technology, e-mail has become a popular communication medium. It has great significant to determine the relationship between the two sides of the communication. Firstly, this paper analysed and processed the content and attachment of e-mail using the skill of steganalysis and malware analysis. And it also conducts the following feature extracting and behaviour model establishing which based on Naive Bayesian theory. Then a behaviour analysis method was employed to calculate and evaluate the communication security. Finally, some experiments about the accuracy of the behavioural relationship of communication identifying has been carried out. The result shows that this method has a great effects and correctness as eighty-four percent.

  20. Children's Security in the Context of Family Instability and Maternal Communications

    ERIC Educational Resources Information Center

    Winter, Marcia A.; Davies, Patrick T.; Cummings, E. Mark

    2010-01-01

    This multimethod study examined the association between family instability and children's internal representations of security in the family system within the context of maternal communications about disruptive family events. Participants included 224 kindergarten children (100 boys and 124 girls) and their parents. Parents reported on the…

  1. Children's Security in the Context of Family Instability and Maternal Communications

    ERIC Educational Resources Information Center

    Winter, Marcia A.; Davies, Patrick T.; Cummings, E. Mark

    2010-01-01

    This multimethod study examined the association between family instability and children's internal representations of security in the family system within the context of maternal communications about disruptive family events. Participants included 224 kindergarten children (100 boys and 124 girls) and their parents. Parents reported on the…

  2. Integrating utility communication systems

    SciTech Connect

    Batra, S.K. ); Colley, R.; Iveson, R.H.; Malcolm, W.P. )

    1992-01-01

    Today, utilities are facing increasing pressures of deregulation, competition, changing business conditions and varying customer requirements. Existing computers and communications systems were installed with limited capabilities to communicate with other systems. The result, say many utilities, is an electronic Tower of Babel among computers that are unable to readily talk to one another or, if they can, haven't much say because of vastly different database structures. This paper reports that estimates of the industry's operating costs for telecommunications range from $2 billion to more likely $5 billion a year, with some individual company budgets growing as much as 25% a year. A typical medium-size utility will spend $35 million in annual telecommunication expenses. EPRI has been tasked by it member utilities to develop guidelines and specification that would support the development of integrated nonproprietary, interoperable utility communications systems. Substantial cost savings and improved performance are the key reasons for communications for new products and services result when a utility can share information, across all operations, in an effective and timely manner.

  3. Security Considerations For Network-Centric Weapon Systems

    DTIC Science & Technology

    2009-09-01

    Cryptography, Authentication, Espionage, Sabotage, Confidentiality , Integrity, Availability 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT...Network-centric weapon systems seek to provide a technological and tactical leap in the efficiency of such communication. A. BENEFITS AND CHALLENGES...critical features of an information system: confidentiality , integrity, and availability (Harris 2008, 59–61). Attacks on the information system

  4. Study of Security Attributes of Smart Grid Systems- Current Cyber Security Issues

    SciTech Connect

    Wayne F. Boyer; Scott A. McBride

    2009-04-01

    This document provides information for a report to congress on Smart Grid security as required by Section 1309 of Title XIII of the Energy Independence and Security Act of 2007. The security of any future Smart Grid is dependent on successfully addressing the cyber security issues associated with the nation’s current power grid. Smart Grid will utilize numerous legacy systems and technologies that are currently installed. Therefore, known vulnerabilities in these legacy systems must be remediated and associated risks mitigated in order to increase the security and success of the Smart Grid. The implementation of Smart Grid will include the deployment of many new technologies and multiple communication infrastructures. This report describes the main technologies that support Smart Grid and summarizes the status of implementation into the existing U.S. electrical infrastructure.

  5. Improving the security of secure direct communication based on the secret transmitting order of particles

    SciTech Connect

    Li Xihan; Deng Fuguo; Zhou Hongyu

    2006-11-15

    We analyzed the security of the secure direct communication protocol based on the secret transmitting order of particles recently proposed by Zhu, Xia, Fan, and Zhang[Phys. Rev. A 73, 022338 (2006)] and found that this scheme is insecure if an eavesdropper, say Eve, wants to steal the secret message with Trojan horse attack strategies. The vital loophole in this scheme is that the two authorized users check the security of their quantum channel only once. Eve can insert another spy photon, an invisible photon, or a delay one in each photon which the sender Alice sends to the receiver Bob, and capture the spy photon when it returns from Bob to Alice. After the authorized users check the security, Eve can obtain the secret message according to the information about the transmitting order published by Bob. Finally, we present a possible improvement of this protocol.

  6. Secure communications with low-orbit spacecraft using quantum cryptography

    DOEpatents

    Hughes, Richard J.; Buttler, William T.; Kwiat, Paul G.; Luther, Gabriel G.; Morgan, George L; Nordholt, Jane E.; Peterson, Charles G.; Simmons, Charles M.

    1999-01-01

    Apparatus and method for secure communication between an earth station and spacecraft. A laser outputs single pulses that are split into preceding bright pulses and delayed attenuated pulses, and polarized. A Pockels cell changes the polarization of the polarized delayed attenuated pulses according to a string of random numbers, a first polarization representing a "1," and a second polarization representing a "0." At the receiving station, a beamsplitter randomly directs the preceding bright pulses and the polarized delayed attenuated pulses onto longer and shorter paths, both terminating in a beamsplitter which directs the preceding bright pulses and a first portion of the polarized delayed attenuated pulses to a first detector, and a second portion of the polarized delayed attenuated pulses to a second detector to generate a key for secure communication between the earth station and the spacecraft.

  7. Quantum secure direct communication with frequency coding scheme

    NASA Astrophysics Data System (ADS)

    Zhao, Xue-Liang; Ruan, Dong

    2016-11-01

    Quantum secure direct communication (QSDC) is an important branch of quantum cryptography. It can transmit secret information directly without establishing a key first, unlike quantum key distribution which requires this precursive event. One of the most highlighted QSDC protocol is the Two-step protocol. This paper will focus on proposing a frequency coding scheme in the Two-step protocol, while retaining other contents of the QSDC protocol. This new coding scheme will significantly increase the protocol's ability against channel noise and loss, and provides an efficient protocol for secure direct quantum communication in a noisy environment. Besides, the frequency coding technology is also easy to understand and highly practical. After numerically simulating the performance of the protocol in a noisy channel, the results showed that the scheme was robust against channel noise and loss.

  8. Control and Non-Payload Communications (CNPC) Prototype Radio - Generation 2 Security Architecture Lab Test Report

    NASA Technical Reports Server (NTRS)

    Iannicca, Dennis C.; McKim, James H.; Stewart, David H.; Thadhani, Suresh K.; Young, Daniel P.

    2015-01-01

    NASA Glenn Research Center, in cooperation with Rockwell Collins, is working to develop a prototype Control and Non-Payload Communications (CNPC) radio platform as part of NASA Integrated Systems Research Program's (ISRP) Unmanned Aircraft Systems (UAS) Integration in the National Airspace System (NAS) project. A primary focus of the project is to work with the FAA and industry standards bodies to build and demonstrate a safe, secure, and efficient CNPC architecture that can be used by industry to evaluate the feasibility of deploying a system using these technologies in an operational capacity. GRC has been working in conjunction with these groups to assess threats, identify security requirements, and to develop a system of standards-based security controls that can be applied to the current GRC prototype CNPC architecture as a demonstration platform. The security controls were integrated into a lab test bed mock-up of the Mobile IPv6 architecture currently being used for NASA flight testing, and a series of network tests were conducted to evaluate the security overhead of the controls compared to the baseline CNPC link without any security. The aim of testing was to evaluate the performance impact of the additional security control overhead when added to the Mobile IPv6 architecture in various modes of operation. The statistics collected included packet captures at points along the path to gauge packet size as the sample data traversed the CNPC network, round trip latency, jitter, and throughput. The effort involved a series of tests of the baseline link, a link with Robust Header Compression (ROHC) and without security controls, a link with security controls and without ROHC, and finally a link with both ROHC and security controls enabled. The effort demonstrated that ROHC is both desirable and necessary to offset the additional expected overhead of applying security controls to the CNPC link.

  9. Clearinghouse: a teleradiology platform emphasizing security of data and communication.

    PubMed

    Spitzer, Michael; Brinkmann, Lars; Ueckert, Frank

    2007-01-01

    The Clearinghouse application platform is a web based solution for secure digital exchange of radiological images and other clinical documents among authorized researchers and physicians. It implements a sophisticated security and role model to protect privacy and to minimize the risk of eavesdropping of patient data. The Clearinghouse serves as a centralized platform for distributed, distantly located medical research and health care. It is based on Open-Source software, thus ensuring continued support, maintenance, security and last but not least continuity of the platform. The use of the Clearinghouse minimizes turnaround times by superseding comparably slow and insecure conventional communication methods otherwise used for the exchange of radiological images and clinical documents, such as standard mail and courier services. Furthermore, it alleviates the integration of distantly located expert knowledge into diagnostic routines, culminating in an increased health care quality regardless of location of patients or physicians.

  10. Ultra Safe And Secure Blasting System

    SciTech Connect

    Hart, M M

    2009-07-27

    The Ultra is a blasting system that is designed for special applications where the risk and consequences of unauthorized demolition or blasting are so great that the use of an extraordinarily safe and secure blasting system is justified. Such a blasting system would be connected and logically welded together through digital code-linking as part of the blasting system set-up and initialization process. The Ultra's security is so robust that it will defeat the people who designed and built the components in any attempt at unauthorized detonation. Anyone attempting to gain unauthorized control of the system by substituting components or tapping into communications lines will be thwarted in their inability to provide encrypted authentication. Authentication occurs through the use of codes that are generated by the system during initialization code-linking and the codes remain unknown to anyone, including the authorized operator. Once code-linked, a closed system has been created. The system requires all components connected as they were during initialization as well as a unique code entered by the operator for function and blasting.

  11. Applying New Network Security Technologies to SCADA Systems.

    SciTech Connect

    Hurd, Steven A; Stamp, Jason Edwin; Duggan, David P; Chavez, Adrian R.

    2006-11-01

    Supervisory Control and Data Acquisition (SCADA) systems for automation are very important for critical infrastructure and manufacturing operations. They have been implemented to work in a number of physical environments using a variety of hardware, software, networking protocols, and communications technologies, often before security issues became of paramount concern. To offer solutions to security shortcomings in the short/medium term, this project was to identify technologies used to secure "traditional" IT networks and systems, and then assess their efficacy with respect to SCADA systems. These proposed solutions must be relatively simple to implement, reliable, and acceptable to SCADA owners and operators. 4This page intentionally left blank.

  12. Inherent secure communications using lattice based waveform design.

    SciTech Connect

    Pugh, Matthew Owen

    2013-12-01

    The wireless communications channel is innately insecure due to the broadcast nature of the electromagnetic medium. Many techniques have been developed and implemented in order to combat insecurities and ensure the privacy of transmitted messages. Traditional methods include encrypting the data via cryptographic methods, hiding the data in the noise floor as in wideband communications, or nulling the signal in the spatial direction of the adversary using array processing techniques. This work analyzes the design of signaling constellations, i.e. modulation formats, to combat eavesdroppers from correctly decoding transmitted messages. It has been shown that in certain channel models the ability of an adversary to decode the transmitted messages can be degraded by a clever signaling constellation based on lattice theory. This work attempts to optimize certain lattice parameters in order to maximize the security of the data transmission. These techniques are of interest because they are orthogonal to, and can be used in conjunction with, traditional security techniques to create a more secure communication channel.

  13. Secure thermal infrared communications using engineered blackbody radiation

    PubMed Central

    Liang, Xiaoxin; Hu, Fangjing; Yan, Yuepeng; Lucyszyn, Stepan

    2014-01-01

    The thermal (emitted) infrared frequency bands, from 20–40 THz and 60–100 THz, are best known for applications in thermography. This underused and unregulated part of the spectral range offers opportunities for the development of secure communications. The ‘THz Torch' concept was recently presented by the authors. This technology fundamentally exploits engineered blackbody radiation, by partitioning thermally-generated spectral noise power into pre-defined frequency channels; the energy in each channel is then independently pulsed modulated and multiplexing schemes are introduced to create a robust form of short-range secure communications in the far/mid infrared. To date, octave bandwidth (25–50 THz) single-channel links have been demonstrated with 380 bps speeds. Multi-channel ‘THz Torch' frequency division multiplexing (FDM) and frequency-hopping spread-spectrum (FHSS) schemes have been proposed, but only a slow 40 bps FDM scheme has been demonstrated experimentally. Here, we report a much faster 1,280 bps FDM implementation. In addition, an experimental proof-of-concept FHSS scheme is demonstrated for the first time, having a 320 bps data rate. With both 4-channel multiplexing schemes, measured bit error rates (BERs) of < 10−6 are achieved over a distance of 2.5 cm. Our approach represents a new paradigm in the way niche secure communications can be established over short links. PMID:24912871

  14. Security and privacy in molecular communication and networking: opportunities and challenges.

    PubMed

    Loscrí, Valeria; Marchal, César; Mitton, Nathalie; Fortino, Giancarlo; Vasilakos, Athanasios V

    2014-09-01

    Molecular Communication (MC) is an emerging and promising communication paradigm for several multi-disciplinary domains like bio-medical, industry and military. Differently to the traditional communication paradigm, the information is encoded on the molecules, that are then used as carriers of information. Novel approaches related to this new communication paradigm have been proposed, mainly focusing on architectural aspects and categorization of potential applications. So far, security and privacy aspects related to the molecular communication systems have not been investigated at all and represent an open question that need to be addressed. The main motivation of this paper lies on providing some first insights about security and privacy aspects of MC systems, by highlighting the open issues and challenges and above all by outlining some specific directions of potential solutions. Existing cryptographic methods and security approaches are not suitable for MC systems since do not consider the pecific issues and challenges, that need ad-hoc solutions. We will discuss directions in terms of potential solutions by trying to highlight the main advantages and potential drawbacks for each direction considered. We will try to answer to the main questions: 1) why this solution can be exploited in the MC field to safeguard the system and its reliability? 2) which are the main issues related to the specific approach?

  15. Communicating Health Risks under Pressure: Homeland Security Applications

    SciTech Connect

    Garrahan, K.G.; Collie, S.L.

    2006-07-01

    The U.S. Environmental Protection Agency's (EPA) Office of Research and Development (ORD) Threat and Consequence Assessment Division (TCAD) within the National Homeland Security Research Center (NHSRC) has developed a tool for rapid communication of health risks and likelihood of exposure in preparation for terrorist incidents. The Emergency Consequence Assessment Tool (ECAT) is a secure web-based tool designed to make risk assessment and consequence management faster and easier for high priority terrorist threat scenarios. ECAT has been designed to function as 'defensive play-book' for health advisors, first responders, and decision-makers by presenting a series of evaluation templates for priority scenarios that can be modified for site-specific applications. Perhaps most importantly, the risk communication aspect is considered prior to an actual release event, so that management or legal advisors can concur on general risk communication content in preparation for press releases that can be anticipated in case of an actual emergency. ECAT serves as a one-stop source of information for retrieving toxicological properties for agents of concern, estimating exposure to these agents, characterizing health risks, and determining what actions need to be undertaken to mitigate the risks. ECAT has the capability to be used at a command post where inputs can be checked and communicated while the response continues in real time. This front-end planning is intended to fill the gap most commonly identified during tabletop exercises: a need for concise, timely, and informative risk communication to all parties. Training and customization of existing chemical and biological release scenarios with modeling of exposure to air and water, along with custom risk communication 'messages' intended for public, press, shareholders, and other partners enable more effective communication during times of crisis. For DOE, the ECAT could serve as a prototype that would be amenable to

  16. Wireless Headset Communication System

    NASA Technical Reports Server (NTRS)

    Lau, Wilfred K.; Swanson, Richard; Christensen, Kurt K.

    1995-01-01

    System combines features of pagers, walkie-talkies, and cordless telephones. Wireless headset communication system uses digital modulation on spread spectrum to avoid interference among units. Consists of base station, 4 radio/antenna modules, and as many as 16 remote units with headsets. Base station serves as network controller, audio-mixing network, and interface to such outside services as computers, telephone networks, and other base stations. Developed for use at Kennedy Space Center, system also useful in industrial maintenance, emergency operations, construction, and airport operations. Also, digital capabilities exploited; by adding bar-code readers for use in taking inventories.

  17. Wireless Headset Communication System

    NASA Technical Reports Server (NTRS)

    Lau, Wilfred K.; Swanson, Richard; Christensen, Kurt K.

    1995-01-01

    System combines features of pagers, walkie-talkies, and cordless telephones. Wireless headset communication system uses digital modulation on spread spectrum to avoid interference among units. Consists of base station, 4 radio/antenna modules, and as many as 16 remote units with headsets. Base station serves as network controller, audio-mixing network, and interface to such outside services as computers, telephone networks, and other base stations. Developed for use at Kennedy Space Center, system also useful in industrial maintenance, emergency operations, construction, and airport operations. Also, digital capabilities exploited; by adding bar-code readers for use in taking inventories.

  18. Picture archiving and communication systems.

    PubMed

    2000-11-01

    Picture archiving and communication systems (PACS) are extremely versatile systems that facilitate the transfer of digital images and patient data throughout a healthcare enterprise. PACS are most commonly used in radiology departments to process images from diagnostic imaging modalities, such as digital radiography devices and magnetic resonance imaging (MRI) systems. In this article, we evaluate three such systems from three of the largest PACS suppliers--the Agfa IMPAX, GE PathSpeed, and Siemens Sienet. The ultimate goal of any PACS is to improve workflow within the enterprise. Our testing focused on whether, and to what degree, the systems could meet this goal. We found that all three PACS are fairly complete and able to support image distribution and improve workflow compared with film-based processes. However, we did identify significant differences--along with some noteworthy limitations--with respect to system design and operation, external integration capabilities, and supplier support and professional services. We have ranked the systems for each of these factors to help healthcare facilities identify the system that will best meet their needs. Also in this Evaluation, we present an overview of the technology, a Glossary of PACS terminology (see page 400), selection guidance, and discussions of PACS-related topics, including data compression options, the role of the DICOM standard, and concerns about data security in many of today's systems.

  19. 33 CFR 127.705 - Security systems.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 2 2012-07-01 2012-07-01 false Security systems. 127.705 Section... Waterfront Facilities Handling Liquefied Natural Gas Security § 127.705 Security systems. The operator shall... manned television monitoring system is used, to detect— (a) Unauthorized personnel; (b) Fires; and (c...

  20. 33 CFR 127.705 - Security systems.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 2 2011-07-01 2011-07-01 false Security systems. 127.705 Section... Waterfront Facilities Handling Liquefied Natural Gas Security § 127.705 Security systems. The operator shall... manned television monitoring system is used, to detect— (a) Unauthorized personnel; (b) Fires; and (c...

  1. 33 CFR 127.705 - Security systems.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 2 2014-07-01 2014-07-01 false Security systems. 127.705 Section... Waterfront Facilities Handling Liquefied Natural Gas Security § 127.705 Security systems. The operator shall... manned television monitoring system is used, to detect— (a) Unauthorized personnel; (b) Fires; and (c...

  2. 33 CFR 127.705 - Security systems.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 2 2013-07-01 2013-07-01 false Security systems. 127.705 Section... Waterfront Facilities Handling Liquefied Natural Gas Security § 127.705 Security systems. The operator shall... manned television monitoring system is used, to detect— (a) Unauthorized personnel; (b) Fires; and (c...

  3. 33 CFR 127.705 - Security systems.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security systems. 127.705 Section... Waterfront Facilities Handling Liquefied Natural Gas Security § 127.705 Security systems. The operator shall... manned television monitoring system is used, to detect— (a) Unauthorized personnel; (b) Fires; and (c...

  4. Survey of holographic security systems

    NASA Astrophysics Data System (ADS)

    Kontnik, Lewis T.; Lancaster, Ian M.

    1990-04-01

    The counterfeiting of products and financial instruments is a major problem throughout the world today. The dimensions of the problem are growing, accelerated by the expanding availability of production technologies to sophisticated counterfeiters and the increasing capabilities of these technologies. Various optical techniques, including holography, are beingused in efforts to mark authentic products and to distinguish them from copies. Industry is recognizing that the effectiveness of these techniques depends on such factors as the economics of the counterfeiting process and the distribution channels for the products involved, in addition to the performance of the particular optical security technologies used. This paper surveys the nature of the growing counterfeit market place and reviews the utility of holographic optical security systems. In particular, we review the use of holograms on credit cards and other products; and outline certain steps the holography industry should take to promote these application.

  5. Introduction to Communication Systems

    DTIC Science & Technology

    2014-01-17

    passband filtering . . . . . . . . . . . . . 75 2.8.4 General Comments on Complex Baseband . . . . . . . . . . . . . . . . . . 76 2.9 Wireless Channel...packages such as Matlab. Thus, we have the opportunity to get a new generation of students excited about this field: by covering abstractions “just in...signals, since these 15 are the messages we wish to convey over a communication system. In their original form– both during generation and consumption

  6. Quantum Communication Systems

    DTIC Science & Technology

    2008-03-15

    0603048 (2006) [3] Q. Zhang et al, Experimental Quantum Teleportation of a Two-Qubit Composite System, quant-ph/0609129 (2006) [4] G. Y. Xiang et...AFOSR project “ Quantum Communication Systems” University of Oxford and UMK Torun Final Report 15 March 2008 Summary This document...temporal characterization by interference with a local oscillator and the theoretical study of their propagation in lossy quantum channels. Also, their

  7. Field test of a practical secure communication network with decoy-state quantum cryptography.

    PubMed

    Chen, Teng-Yun; Liang, Hao; Liu, Yang; Cai, Wen-Qi; Ju, Lei; Liu, Wei-Yue; Wang, Jian; Yin, Hao; Chen, Kai; Chen, Zeng-Bing; Peng, Cheng-Zhi; Pan, Jian-Wei

    2009-04-13

    We present a secure network communication system that operated with decoy-state quantum cryptography in a real-world application scenario. The full key exchange and application protocols were performed in real time among three nodes, in which two adjacent nodes were connected by approximate 20 km of commercial telecom optical fiber. The generated quantum keys were immediately employed and demonstrated for communication applications, including unbreakable real-time voice telephone between any two of the three communication nodes, or a broadcast from one node to the other two nodes by using one-time pad encryption.

  8. Multi-Antenna Secure Communications via Selective Diversity

    NASA Astrophysics Data System (ADS)

    Tang, Ling; Chen, Hao; Wu, Jianhui

    We consider secure wireless communications, where a source is communicating to a destination in the presence of K (K>1) eavesdroppers. The source and destination both are equipped with multiple antennas, while each eavesdropper has a single antenna. The source aims to maximize the communication rate to the destination, while concealing the message from all the eavesdroppers. Combined with selective diversity, we propose a heuristic secrecy transmission scheme where the multiple-input-multiple-output (MIMO) secrecy channel is simplified into a multiple-input-single-output (MISO) one with the highest orthogonality to the eavesdropper channels. Then convex optimization is applied to obtain the optimal transmit covariance matrix for this selected MISO secrecy channel. Numerical results are provided to illustrate the efficacy of the proposed scheme.

  9. Implementing Improved Security and Encryption for Balloon Flight Systems

    NASA Astrophysics Data System (ADS)

    Denney, Andrew; Stilwell, Bryan D.

    The Columbia Scientific Balloon Facility uses a broad array of communication techniques be-tween its balloon-borne flight systems and ground command and control systems. These com-munication mediums vary from commercially available routing such as e-mail and IP based TCP/UDP protocols to military grade proprietary line-of-sight configurations; each with their own unique benefits and shortfalls. While each new advancement in technology improves secu-rity in some capacity, it does not always address the limitation of older, less advanced security or encryption capabilities. As the proliferation of newer, more commercially viable technologies become common place, safeguarding mission critical applications from unauthorized access and improve data integrity in the process becomes ever more necessary. Therefore, this paper will evaluate several security measures and methods of data encryption; including formalizing a standardized security philosophy that improves and addresses the mixture of established and emerging technologies.

  10. Conditions for creating perfectly secure systems

    NASA Astrophysics Data System (ADS)

    Styugin, M.

    2016-11-01

    The present paper reviews a method for establishing secure information systems by complicating the possibility to research them for potential adversaries. A formalized model of a researcher and a definition of a research secure system are presented. A theorem for conditions required for creating a system perfectly secured from research. The Shannon's theorem of absolute security of perfect secrecy ciphers in cryptography is an instance of the theorem presented in the paper.

  11. Cyber secure systems approach for NPP digital control systems

    SciTech Connect

    McCreary, T. J.; Hsu, A.

    2006-07-01

    disrupt network communications by entering the system from an attached utility network or utilizing a modem connected to a control system PC that is in turn connected to a publicly accessible phone; 2)Threat from a user connecting an unauthorized computer to the control network; 3)Threat from a security attack when an unauthorized user gains access to a PC connected to the plant network;. 4)Threat from internal disruption (by plant staff, whether, malicious or otherwise) by unauthorized usage of files or file handling media that opens the system to security threat (as typified in current situation in most control rooms). The plant I and C system cyber security design and the plant specific procedures should adequately demonstrate protection from the four pertinent classes of cyber security attacks. The combination of these features should demonstrate that the system is not vulnerable to any analyzed cyber security attacks either from internal sources or through network connections. The authors will provide configurations that will demonstrate the Cyber Security Zone. (authors)

  12. Threats to financial system security

    SciTech Connect

    McGovern, D.E.

    1997-06-01

    The financial system in the United States is slowly migrating from the bricks and mortar of banks on the city square to branch banks, ATM`s, and now direct linkage through computers to the home. Much work has been devoted to the security problems inherent in protecting property and people. The impact of attacks on the information aspects of the financial system has, however, received less attention. Awareness is raised through publicized events such as the junk bond fraud perpetrated by Milken or gross mismanagement in the failure of the Barings Bank through unsupervised trading activities by Leeson in Singapore. These events, although seemingly large (financial losses may be on the order of several billion dollars), are but small contributors to the estimated $114 billion loss to all types of financial fraud in 1993. Most of the losses can be traced to the contribution of many small attacks perpetrated against a variety of vulnerable components and systems. This paper explores the magnitude of these financial system losses and identifies new areas for security to be applied to high consequence events.

  13. Control and Non-Payload Communications (CNPC) Prototype Radio - Generation 2 Security Flight Test Report

    NASA Technical Reports Server (NTRS)

    Iannicca, Dennis C.; Ishac, Joseph A.; Shalkhauser, Kurt A.

    2015-01-01

    NASA Glenn Research Center (GRC), in cooperation with Rockwell Collins, is working to develop a prototype Control and Non-Payload Communications (CNPC) radio platform as part of NASA Integrated Systems Research Program's (ISRP) Unmanned Aircraft Systems (UAS) Integration in the National Airspace System (NAS) project. A primary focus of the project is to work with the Federal Aviation Administration (FAA) and industry standards bodies to build and demonstrate a safe, secure, and efficient CNPC architecture that can be used by industry to evaluate the feasibility of deploying a system using these technologies in an operational capacity. GRC has been working in conjunction with these groups to assess threats, identify security requirements, and to develop a system of standards-based security controls that can be applied to the GRC prototype CNPC architecture as a demonstration platform. The proposed security controls were integrated into the GRC flight test system aboard our S-3B Viking surrogate aircraft and several network tests were conducted during a flight on November 15th, 2014 to determine whether the controls were working properly within the flight environment. The flight test was also the first to integrate Robust Header Compression (ROHC) as a means of reducing the additional overhead introduced by the security controls and Mobile IPv6. The effort demonstrated the complete end-to-end secure CNPC link in a relevant flight environment.

  14. Developing an Undergraduate Information Systems Security Track

    ERIC Educational Resources Information Center

    Sharma, Aditya; Murphy, Marianne C.; Rosso, Mark A.; Grant, Donna

    2013-01-01

    Information Systems Security as a specialized area of study has mostly been taught at the graduate level. This paper highlights the efforts of establishing an Information Systems (IS) Security track at the undergraduate level. As there were many unanswered questions and concerns regarding the Security curriculum, focus areas, the benefit of…

  15. The application of data encryption technology in computer network communication security

    NASA Astrophysics Data System (ADS)

    Gong, Lina; Zhang, Li; Zhang, Wei; Li, Xuhong; Wang, Xia; Pan, Wenwen

    2017-04-01

    With the rapid development of Intemet and the extensive application of computer technology, the security of information becomes more and more serious, and the information security technology with data encryption technology as the core has also been developed greatly. Data encryption technology not only can encrypt and decrypt data, but also can realize digital signature, authentication and authentication and other functions, thus ensuring the confidentiality, integrity and confirmation of data transmission over the network. In order to improve the security of data in network communication, in this paper, a hybrid encryption system is used to encrypt and decrypt the triple DES algorithm with high security, and the two keys are encrypted with RSA algorithm, thus ensuring the security of the triple DES key and solving the problem of key management; At the same time to realize digital signature using Java security software, to ensure data integrity and non-repudiation. Finally, the data encryption system is developed by Java language. The data encryption system is simple and effective, with good security and practicality.

  16. 77 FR 25488 - Cooperative Research and Development Agreement: Federally Integrated Communications System

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-30

    ... Federal wireless system partner. This integrated communications system should provide for interoperability... SECURITY Coast Guard Cooperative Research and Development Agreement: Federally Integrated Communications System AGENCY: Coast Guard, DHS. ACTION: Notice of intent; request for public comments. SUMMARY:...

  17. Design and Implementation of Secure and Reliable Communication using Optical Wireless Communication

    NASA Astrophysics Data System (ADS)

    Saadi, Muhammad; Bajpai, Ambar; Zhao, Yan; Sangwongngam, Paramin; Wuttisittikulkij, Lunchakorn

    2014-11-01

    Wireless networking intensify the tractability in the home and office environment to connect the internet without wires but at the cost of risks associated with stealing the data or threat of loading malicious code with the intention of harming the network. In this paper, we proposed a novel method of establishing a secure and reliable communication link using optical wireless communication (OWC). For security, spatial diversity based transmission using two optical transmitters is used and the reliability in the link is achieved by a newly proposed method for the construction of structured parity check matrix for binary Low Density Parity Check (LDPC) codes. Experimental results show that a successful secure and reliable link between the transmitter and the receiver can be achieved by using the proposed novel technique.

  18. Lossless quantum data compression and secure direct communication

    NASA Astrophysics Data System (ADS)

    Boström, Kim

    2004-07-01

    This thesis deals with the encoding and transmission of information through a quantum channel. A quantum channel is a quantum mechanical system whose state is manipulated by a sender and read out by a receiver. The individual state of the channel represents the message. The two topics of the thesis comprise 1) the possibility of compressing a message stored in a quantum channel without loss of information and 2) the possibility to communicate a message directly from one party to another in a secure manner, that is, a third party is not able to eavesdrop the message without being detected. The main results of the thesis are the following. A general framework for variable-length quantum codes is worked out. These codes are necessary to make lossless compression possible. Due to the quantum nature of the channel, the encoded messages are in general in a superposition of different lengths. It is found to be impossible to compress a quantum message without loss of information if the message is not apriori known to the sender. In the other case it is shown that lossless quantum data compression is possible and a lower bound on the compression rate is derived. Furthermore, an explicit compression scheme is constructed that works for arbitrarily given source message ensembles. A quantum cryptographic protocol - the “ping-pong protocol” - is presented that realizes the secure direct communication of classical messages through a quantum channel. The security of the protocol against arbitrary eavesdropping attacks is proven for the case of an ideal quantum channel. In contrast to other quantum cryptographic protocols, the ping-pong protocol is deterministic and can thus be used to transmit a random key as well as a composed message. The protocol is perfectly secure for the transmission of a key, and it is quasi-secure for the direct transmission of a message. The latter means that the probability of successful eavesdropping exponentially decreases with the length

  19. Numerical Simulation Bidirectional Chaotic Synchronization of Spiegel-Moore Circuit and Its Application for Secure Communication

    NASA Astrophysics Data System (ADS)

    Sanjaya, W. S. M.; Anggraeni, D.; Denya, R.; Ismail, N.

    2017-03-01

    Spiegel-Moore is a dynamical chaotic system which shows irregular variability in the luminosity of stars. In this paper present the performed the design and numerical simulation of the synchronization Spiegel-Moore circuit and applied to security system for communication. The initial study in this paper is to analyze the eigenvalue structures, various attractors, Bifurcation diagram, and Lyapunov exponent analysis. We have studied the dynamic behavior of the system in the case of the bidirectional coupling via a linear resistor. Both experimental and simulation results have shown that chaotic synchronization is possible. Finally, the effectiveness of the bidirectional coupling scheme between two identical Spiegel-Moore circuits in a secure communication system is presented in details. Integration of theoretical electronic circuit, the numerical simulation by using MATLAB®, as well as the implementation of circuit simulations by using Multisim® has been performed in this study.

  20. SPECS: Secure and Privacy Enhancing Communications Schemes for VANETs

    NASA Astrophysics Data System (ADS)

    Chim, T. W.; Yiu, S. M.; Hui, L. C. K.; Jiang, Zoe L.; Li, Victor O. K.

    Vehicular ad hoc network (VANET) is an emerging type of networks which facilitates vehicles on roads to communicate for driving safety. The basic idea is to allow arbitrary vehicles to broadcast ad hoc messages (e.g. traffic accidents) to other vehicles. However, this raises the concern of security and privacy. Messages should be signed and verified before they are trusted while the real identity of vehicles should not be revealed, but traceable by authorized party. Existing solutions either rely heavily on a tamper-proof hardware device, or cannot satisfy the privacy requirement and do not have an effective message verification scheme. In this paper, we provide a software-based solution which makes use of only two shared secrets to satisfy the privacy requirement and gives lower message overhead and at least 45% higher successful rate than previous solutions in the message verification phase using the bloom filter and the binary search techniques. We also provide the first group communication protocol to allow vehicles to authenticate and securely communicate with others in a group of known vehicles.

  1. Deterministic secure communications using two-mode squeezed states

    SciTech Connect

    Marino, Alberto M.; Stroud, C. R. Jr.

    2006-08-15

    We propose a scheme for quantum cryptography that uses the squeezing phase of a two-mode squeezed state to transmit information securely between two parties. The basic principle behind this scheme is the fact that each mode of the squeezed field by itself does not contain any information regarding the squeezing phase. The squeezing phase can only be obtained through a joint measurement of the two modes. This, combined with the fact that it is possible to perform remote squeezing measurements, makes it possible to implement a secure quantum communication scheme in which a deterministic signal can be transmitted directly between two parties while the encryption is done automatically by the quantum correlations present in the two-mode squeezed state.

  2. Secure Communications in CIoT Networks with a Wireless Energy Harvesting Untrusted Relay.

    PubMed

    Hu, Hequn; Gao, Zhenzhen; Liao, Xuewen; Leung, Victor C M

    2017-09-04

    The Internet of Things (IoT) represents a bright prospect that a variety of common appliances can connect to one another, as well as with the rest of the Internet, to vastly improve our lives. Unique communication and security challenges have been brought out by the limited hardware, low-complexity, and severe energy constraints of IoT devices. In addition, a severe spectrum scarcity problem has also been stimulated by the use of a large number of IoT devices. In this paper, cognitive IoT (CIoT) is considered where an IoT network works as the secondary system using underlay spectrum sharing. A wireless energy harvesting (EH) node is used as a relay to improve the coverage of an IoT device. However, the relay could be a potential eavesdropper to intercept the IoT device's messages. This paper considers the problem of secure communication between the IoT device (e.g., sensor) and a destination (e.g., controller) via the wireless EH untrusted relay. Since the destination can be equipped with adequate energy supply, secure schemes based on destination-aided jamming are proposed based on power splitting (PS) and time splitting (TS) policies, called intuitive secure schemes based on PS (Int-PS), precoded secure scheme based on PS (Pre-PS), intuitive secure scheme based on TS (Int-TS) and precoded secure scheme based on TS (Pre-TS), respectively. The secure performances of the proposed schemes are evaluated through the metric of probability of successfully secure transmission ( P S S T ), which represents the probability that the interference constraint of the primary user is satisfied and the secrecy rate is positive. P S S T is analyzed for the proposed secure schemes, and the closed form expressions of P S S T for Pre-PS and Pre-TS are derived and validated through simulation results. Numerical results show that the precoded secure schemes have better P S S T than the intuitive secure schemes under similar power consumption. When the secure schemes based on PS and TS

  3. Lunar Laser Communication System

    DTIC Science & Technology

    2014-10-01

    an uplink rate to the moon 5000 times that of radio tech- nology. The LLCS, flown aboard NASA’s Lunar Atmosphere and Dust Environment Explorer...NASA’s Lunar Atmosphere and Dust Envi- ronment Explorer spacecraft. Above, the LLCS’s ground terminal was deployed at White Sands, N.M., for the...OCT 2014 2. REPORT TYPE 3. DATES COVERED 00-00-2014 to 00-00-2014 4. TITLE AND SUBTITLE Lunar Laser Communication System 5a. CONTRACT NUMBER 5b

  4. Tactical Automated Security System Air Force expeditionary security

    NASA Astrophysics Data System (ADS)

    Butler, Ken

    2002-08-01

    The US Air Force's TASS (Tactical Automated Security System) program has been in existence since 1996. The TASS program meets the growing need to supplement security personnel with modern technology, when these forces are deployed around the world. TASS combines five equipment elements into an integrated security solution, providing both a detection and an assessment capability. TASS does this in a way which maximizes the mobility and user friendliness objectives of the system. In this paper, we will take a closer look at TASS. We will examine the concepts that drive the TASS development process. We will provide an overview of the TASS technical elements, and provide a roadmap for further development of those elements. Finally, we will provide recommendations to security providers who aim to have their products included in the TASS baseline of equipment.

  5. Synchronized states in a ring of four mutually coupled oscillators and experimental application to secure communications

    NASA Astrophysics Data System (ADS)

    Nana, B.; Woafo, P.

    2011-04-01

    Data encryption has become increasingly important for many applications including phone, internet and satellite communications. Considering the desirable properties of ergodicity and high sensitivity to initial conditions and control parameters, chaotic signals are suitable for encryption systems. Chaotic encryption systems generally have high speed with low cost, which makes them better candidates than many traditional ciphers for multimedia data encryption. In this paper, analytical and numerical methods as well as experimental implementation are used to prove partial and complete synchronized states in a ring of four autonomous oscillators in their chaotic states. Application to secure communication is discussed.

  6. The Next Frontier in Communication and the ECLIPPSE Study: Bridging the Linguistic Divide in Secure Messaging

    PubMed Central

    McNamara, Danielle; Crossley, Scott; Moffet, Howard H.; Sarkar, Urmimala; Duran, Nicholas; Oryn, Danielle; Karter, Andrew J.

    2017-01-01

    Health systems are heavily promoting patient portals. However, limited health literacy (HL) can restrict online communication via secure messaging (SM) because patients' literacy skills must be sufficient to convey and comprehend content while clinicians must encourage and elicit communication from patients and match patients' literacy level. This paper describes the Employing Computational Linguistics to Improve Patient-Provider Secure Email (ECLIPPSE) study, an interdisciplinary effort bringing together scientists in communication, computational linguistics, and health services to employ computational linguistic methods to (1) create a novel Linguistic Complexity Profile (LCP) to characterize communications of patients and clinicians and demonstrate its validity and (2) examine whether providers accommodate communication needs of patients with limited HL by tailoring their SM responses. We will study >5 million SMs generated by >150,000 ethnically diverse type 2 diabetes patients and >9000 clinicians from two settings: an integrated delivery system and a public (safety net) system. Finally, we will then create an LCP-based automated aid that delivers real-time feedback to clinicians to reduce the linguistic complexity of their SMs. This research will support health systems' journeys to become health literate healthcare organizations and reduce HL-related disparities in diabetes care. PMID:28265579

  7. Securing the Aviation Transportation System

    DTIC Science & Technology

    2007-12-01

    accessed 27 May 2007) 13 Robert W. Poole, Jr., “ Airport Security : Time for a New Model,” Reason Foundation online article, January 2006, Available from...15 Robert W. Poole, Jr., “ Airport Security : Time for a New Model,” Reason Foundation online article, January 2006...commercial jetliners. 24 Peter St. John, Air Piracy, Airport Security , and International Terrorism

  8. Security and Privacy in Cyber-Physical Systems

    SciTech Connect

    Fink, Glenn A.; Edgar, Thomas W.; Rice, Theora R.; MacDonald, Douglas G.; Crawford, Cary E.

    2016-08-30

    As you have seen from the previous chapters, cyber-physical systems (CPS) are broadly used across technology and industrial domains. While these systems enable process optimization and efficiency and allow previously impossible functionality, security and privacy are key concerns for their design, development, and operation. CPS have been key components utilized in some of the highest publicized security breaches over the last decade. In this chapter, we will look over the CPS described in the previous chapters from a security perspective. In this chapter, we explain classical information and physical security fundamentals in the context of CPS and contextualize them across application domains. We give examples where the interplay of functionality and diverse communication can introduce unexpected vulnerabilities and produce larger impacts. We will discuss how CPS security and privacy is inherently different from that of pure cyber or physical systems and what may be done to secure these systems, considering their emergent cyber-physical properties. Finally, we will discuss security and privacy implications of merging infrastructural and personal CPS. Our hope is to impart the knowledge of what CPS security and privacy are, why they are important, and explain existing processes and challenges.

  9. LANSCE radiation security system (RSS)

    SciTech Connect

    Gallegos, F.R.

    1996-12-31

    The Radiation Security System (RSS) is an engineered safety system which automatically terminates transmission of accelerated ion beams in response to pre-defined abnormal conditions. It is one of the four major mechanisms used to protect people from radiation hazards induced by accelerated pulsed ion beams at the Los Alamos Neutron Science Center (LANSCE). The others are shielding, administrative policies and procedures, and qualified, trained personnel. Prompt radiation hazards at the half-mile long LANSCE accelerator exist due to average beam intensities ranging from 1 milli-amp for H{sup +} beam to 100 micro-amps for the high intensity H{sup {minus}} beam. Experimental programs are supplied with variable energy (maximum 800 MeV), pulse-width (maximum 1 msec), and pulse frequency (maximum 120 Hz) ion beams. The RSS includes personnel access control systems, beam spill monitoring systems, and beam current level limiting systems. It is a stand-alone system with redundant logic chains. A fault of the RSS will cause the insertion of fusible beam plugs in the accelerator low energy beam transport. The design philosophy, description, and operation of the RSS are described in this paper.

  10. 33 CFR 105.250 - Security systems and equipment maintenance.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Requirements § 105.250 Security systems and equipment maintenance. (a) Security systems and equipment must be in good working order and... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Security systems and...

  11. 33 CFR 104.260 - Security systems and equipment maintenance.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.260 Security systems and equipment maintenance. (a) Security systems and equipment must be in good working order and... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Security systems and...

  12. 33 CFR 105.250 - Security systems and equipment maintenance.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Requirements § 105.250 Security systems and equipment maintenance. (a) Security systems and equipment must be in good working order and... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Security systems and...

  13. 33 CFR 104.260 - Security systems and equipment maintenance.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.260 Security systems and equipment maintenance. (a) Security systems and equipment must be in good working order and... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Security systems and...

  14. 33 CFR 105.250 - Security systems and equipment maintenance.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Requirements § 105.250 Security systems and equipment maintenance. (a) Security systems and equipment must be in good working order and... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Security systems and...

  15. 33 CFR 104.260 - Security systems and equipment maintenance.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.260 Security systems and equipment maintenance. (a) Security systems and equipment must be in good working order and... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Security systems and...

  16. High level security policies for Healthcare Information Systems.

    PubMed

    Katsikas, Sokratis; Kokolakis, Spyros

    2003-01-01

    Healthcare Establishments (HCE) have are today highly dependent upon Information and Communications Technologies (ICT). This increasing reliance upon ICT has stressed the need to foster security in Healthcare Information Systems (HIS). Security policies may have a significant contribution to this effort, but they could become the cause of portability and interoperability problems. Moreover, policies that fail to take into account all the aspects of HIS security, the legal and regulatory requirements, and the existence of several stakeholders may lead to ineffective or inefficient security measures. Policies of a special category, named Generic Security Policies (GSPs), should be developed to provide policy-level harmonisation and guidance to policy-makers within HCEs. Five such policies are comparatively reviewed herein.

  17. Secure resource management: Specifying and testing secure operating systems

    SciTech Connect

    Archer, M.; Frincke, D.A.; Levitt, K. . Div. of Computer Science)

    1990-04-10

    Much work has been devoted to methods for reasoning about the specifications of operating system specifications, the goal being to develop specifications for an operating system that are verified to be secure. Before the verification should be attempted, the specifications should be tested. This paper presents tools that can assist in the security testing of specifications. The first tool is based on the final Algebra Specification and Execution (FASE) system, and would be used to test specifications with real input values. FASE is an executable specification language which is operational in style, in which entities are represented in terms of their observable behavior. To facilitate the testing of an operating system (and its specification), use FASE we have specified a Secure Resource Manager (SRM), a generic template of an operating system. The SRM specification can be specialized to a specification of a particular operating system; the SRM is quite general and handles most features of modern nondistributed operating systems. The second tool, called the PLANNER, is used to derive a sequence of operations that exhibits a security flaw, most often a covert channel for information flow. The PLANNER is based on classical methods of AI planning, specialized to achieve goals concerned with information flow. The tools are demonstrated with respect to a simple operating system specification develop by Millen.

  18. Cyberspace Security Econometrics System (CSES)

    SciTech Connect

    2012-07-27

    Information security continues to evolve in response to disruptive changes with a persistent focus on information-centric controls and a healthy debate about balancing endpoint and network protection, with a goal of improved enterprise/business risk management. Economic uncertainty, intensively collaborative styles of work, virtualization, increased outsourcing and ongoing complance pressures require careful consideration and adaption. The CSES provides a measure (i.e. a quantitative indication) of reliability, performance, and/or safety of a system that accounts for the criticality of each requirement as a function of one or more stakeholders' interests in that requirement. For a given stakeholder, CSES accounts for the variance that may exist among the stakes one attaches to meeting each requirement.

  19. Computer access security code system

    NASA Technical Reports Server (NTRS)

    Collins, Earl R., Jr. (Inventor)

    1990-01-01

    A security code system for controlling access to computer and computer-controlled entry situations comprises a plurality of subsets of alpha-numeric characters disposed in random order in matrices of at least two dimensions forming theoretical rectangles, cubes, etc., such that when access is desired, at least one pair of previously unused character subsets not found in the same row or column of the matrix is chosen at random and transmitted by the computer. The proper response to gain access is transmittal of subsets which complete the rectangle, and/or a parallelepiped whose opposite corners were defined by first groups of code. Once used, subsets are not used again to absolutely defeat unauthorized access by eavesdropping, and the like.

  20. Digital and analog communication systems

    NASA Technical Reports Server (NTRS)

    Shanmugam, K. S.

    1979-01-01

    The book presents an introductory treatment of digital and analog communication systems with emphasis on digital systems. Attention is given to the following topics: systems and signal analysis, random signal theory, information and channel capacity, baseband data transmission, analog signal transmission, noise in analog communication systems, digital carrier modulation schemes, error control coding, and the digital transmission of analog signals.

  1. Secured optical fiber communication using polarization restoration technique and channel characterization

    NASA Astrophysics Data System (ADS)

    Punekar, Nikhil; Darunkar, Bhagyashri; Verma, Pramode

    2016-02-01

    Optical fiber channels are used as media to transfer the information globally. This paper presents an implementation of a novel procedure using which a secured communication between two parties can be carried out using polarized beam of light over an optical fiber. The paper presents the experimental results obtained of the procedure in the lab environment and a security analysis of the same. It is observed that polarization state of a light pulse cannot be retained as it travels over an optical fiber because of the birefringence phenomenon. Multiple environmental factors such as pressure, vibration, temperature, etc. also add a non-linearity to the birefringence of an optical fiber leading towards an unpredictable polarization state changes over the course of an optical fiber. The proposed procedure helps the receiving party to successfully retrieve the data in the form of a polarization state transmitted by the sending party without having any knowledge about the state of polarization at the transmitting end. The paper also explains an added layer of security the procedure provides to the communicating parties to make it difficult for an adversary to fetch the data being transferred. The proposed system does not depend on the wavelength of the light being used, nor does it depend upon the type of the optical fiber used for the communication. Using this procedure, multiple bits of secured information can be sent over an optical fiber in a single polarized pulse and retrieved at the receiving end, also known as Polarization Shift Keying.

  2. Communication Simulations for Power System Applications

    SciTech Connect

    Fuller, Jason C.; Ciraci, Selim; Daily, Jeffrey A.; Fisher, Andrew R.; Hauer, Matthew L.

    2013-05-29

    New smart grid technologies and concepts, such as dynamic pricing, demand response, dynamic state estimation, and wide area monitoring, protection, and control, are expected to require considerable communication resources. As the cost of retrofit can be high, future power grids will require the integration of high-speed, secure connections with legacy communication systems, while still providing adequate system control and security. While considerable work has been performed to create co-simulators for the power domain with load models and market operations, limited work has been performed in integrating communications directly into a power domain solver. The simulation of communication and power systems will become more important as the two systems become more inter-related. This paper will discuss ongoing work at Pacific Northwest National Laboratory to create a flexible, high-speed power and communication system co-simulator for smart grid applications. The framework for the software will be described, including architecture considerations for modular, high performance computing and large-scale scalability (serialization, load balancing, partitioning, cross-platform support, etc.). The current simulator supports the ns-3 (telecommunications) and GridLAB-D (distribution systems) simulators. Ongoing and future work will be described, including planned future expansions for a traditional transmission solver. A test case using the co-simulator, utilizing a transactive demand response system created for the Olympic Peninsula and AEP gridSMART demonstrations, requiring two-way communication between distributed and centralized market devices, will be used to demonstrate the value and intended purpose of the co-simulation environment.

  3. High-capacity quantum secure direct communication using hyper-entanglement of photonic qubits

    NASA Astrophysics Data System (ADS)

    Cai, Jiarui; Pan, Ziwen; Wang, Tie-Jun; Wang, Sihai; Wang, Chuan

    2016-11-01

    Hyper-entanglement is a system constituted by photons entangled in multiple degrees of freedom (DOF), being considered as a promising way of increasing channel capacity and guaranteeing powerful eavesdropping safeguard. In this work, we propose a coding scheme based on a 3-particle hyper-entanglement of polarization and orbital angular momentum (OAM) system and its application as a quantum secure direct communication (QSDC) protocol. The OAM values are specially encoded by Fibonacci sequence and the polarization carries information by defined unitary operations. The internal relations of the secret message enhances security due to principle of quantum mechanics and Fibonacci sequence. We also discuss the coding capacity and security property along with some simulation results to show its superiority and extensibility.

  4. Information Systems and Business Communication.

    ERIC Educational Resources Information Center

    Beswick, Raymond W., Ed.; Williams, Alfred B., Ed.

    Intended to provide orientation about the integration of business communication, business systems, and the researching and teaching of business communication, this books offers articles on a variety of topics concerning business communication. Titles of the articles and their authors are as follows: (1) "Office Technology: Voice Store-and-Forward"…

  5. Security assurances for intelligent complex systems

    NASA Astrophysics Data System (ADS)

    Naqvi, Syed; Riguidel, Michel

    2007-04-01

    Intelligent complex systems are drawing considerable attention of researchers in various scientific areas. These architectures require adequate assurances of security, reliability, and fault-tolerance. The implementation of security functions such as identification, authentication, access control, and data protection can be viewed in terms of a security assurance model. This model relies on the security architecture of a system, which in turn is based on a trusted infrastructure. This assurance model defines the level and features of the protection it offers, and determines the need and relevance of the deployment of specific security mechanisms. In this article, we first examine how the verification of the security measures, and notably their presence, correctness, effectiveness, the impact of changes in the existing intelligent complex systems with respect to vulnerabilities, systems engineering choices, reconfigurations, patch installations, network management, etc. We then explore how we can evaluate the overall security assurance of a given system. We emphasis that it is desirable to separate the trust providing assurance model and the security architecture, into two separated distributed entities (instrumentations, protocols, architectures, management). We believe that this segregation will allow us to automate and boost the trusted infrastructure and security infrastructure, while the authorizations, exceptions, and security management as a whole, are achieved through their interaction. Finally, we discuss the security metrics for these complex intelligent systems. New mechanisms and tools are needed for assessing and proving the security and dependability of a complex system as the scale of these systems and the kind of threats and assumptions on their operational environment pose new challenges. We conclude with a description of our proposed security management model.

  6. Design of acousto-optic chaos based secure free-space optical communication links

    NASA Astrophysics Data System (ADS)

    Ghosh, A. K.; Verma, P.; Cheng, S.; Huck, R. C.; Chatterjee, M. R.; Al-Saedi, M.

    2009-08-01

    We discuss the design of an acousto-optic cell based free space optical communication link where the data beam is made secure through chaos encryption. Using external signal modulation of the diffracted light from a hybrid acousto-optic cell chaos (or directly via incorporation in the sound-cell driver's bias voltage) encryption of data is possible. We have shown numerically that decryption of the encoded data is possible by using an identical acousto-optic system in the receiver.

  7. A secure network access system for mobile IPv6

    NASA Astrophysics Data System (ADS)

    Zhang, Hong; Yuan, Man; He, Rui; Jiang, Luliang; Ma, Jian; Qian, Hualin

    2004-03-01

    With the fast development of Internet and wireless and mobile communication technology, the Mobile Internet Age is upcoming. For those providing Mobile Internet services, especially from the view of ISP (Internet Service Provider), current mobile IP protocol is insufficient. Since the Mobile IPv6 protocol will be popular in near future, how to provide a secure mobile IPv6 service is important. A secure mobile IPv6 network access system is highly needed for mobile IPv6 deployment. Current methods and systems are still inadequate, including EAP, PANA, 802.1X, RADIUS, Diameter, etc. In this paper, we describe main security goals for a secure mobile IPv6 access system, and propose a secure network access system to achieve them. This access system consists of access router, attendant and authentication servers. The access procedure is divided into three phases, which are initial phase, authentication and registration phase and termination phase. This system has many advantages, including layer two independent, flexible and extensible, no need to modify current IPv6 address autoconfiguration protocols, binding update optimization, etc. Finally, the security of the protocol in this system is analyzed and proved with Extended BAN logic method, and a brief introduction of system implementation is given.

  8. Security analysis of the “Ping-Pong” quantum communication protocol in the presence of collective-rotation noise

    NASA Astrophysics Data System (ADS)

    Li, Jian; Li, Lingyun; Jin, Haifei; Li, Ruifan

    2013-11-01

    Environmental noise is inevitable in non-isolated systems. It is, therefore, necessary to analyze the security of the “Ping-Pong” protocol in a noisy environment. An excellent model for collective-rotation noise is introduced, and information theoretical methods are applied to analyze the security of this protocol. If noise level ε is lower than 11%, an eavesdropper can gain some, but not all, information freely without being detected. Otherwise, the protocol becomes insecure. We conclude that the use of ‘Ping-Pong’ protocol as a quantum secure direct communication (QSDC) protocol is quasi-secure, as declared by the original author when ε⩽11%.

  9. Security Issues in E-learning Systems

    NASA Astrophysics Data System (ADS)

    Tsiantis, L. E.; Stergiou, E.; Margariti, S. V.

    2007-12-01

    With increasing threats to e-software, security will become a high priority in the systems of the future. What is debatable, however, is how that security will be approached. Current security methods manage potential risks with restrictive, autocratic mechanisms that ignore users, their tasks and the organisational setting. The result is a dramatic decrease in the usability of online programs. Another approach, proposed by this paper, is to develop security and its mechanisms for and with its users. Whichever approach is taken, security is set to be the burning issue of the future as users trust the global online world less and the threats from unauthorised access increase.

  10. KSOS System Specification (Type A) (Kernelized Secure Operating System).

    DTIC Science & Technology

    1980-11-01

    AD-Alll 705 FORD AEROSPACE AND COMMNICATIONS CORP PALO ALTO CA w-gTYC PI0 9/1 K105 SYSTEM SPECIFICATION (T’YPE A) (KERNELIZED SECURE OftNATINS-CTC (U...20310 Approvedl for public release; distributionl unlimited. E Z 1a W~~A 5 1982 - Ford Aerospace & Communications Corporation WsenDevelopment...registered trademarks of the Digital Equipment Corporation , May- nard MA. • T ,r ". ...- .," NSPECTEtI -~A,_a Codes ................ r t~ r CONTENTS 1. SCE

  11. Communications systems checkout study

    NASA Technical Reports Server (NTRS)

    Ginter, W. G.

    1972-01-01

    The results and conclusions of an engineering study of Space Station communications subsystem checkout are reported. The primary purpose of the study is to recommend specific guidelines and constraints for the design and utilization of the communications subsystem leading to a practical and effective means of onboard checkout implementation. Major study objectives are as follows: (1) identify candidate communications subsystem checkout concepts, (2) determine implementation impacts of feasible concepts, (3) evaluate practicality and effectiveness of alternative concepts, (4) propose baseline modifications to accommodate preferred concepts, and (5) recommend areas for additional investigation. In addition, study results are interpreted, where appropriate, in terms of their applicability to checkout of Shuttle-Orbiter communications subsystem.

  12. Improving Control System Security through the Evaluation of Current Trends in Computer Security Research

    SciTech Connect

    Rolston

    2005-03-01

    At present, control system security efforts are primarily technical and reactive in nature. What has been overlooked is the need for proactive efforts, focused on the IT security research community from which new threats might emerge. Evaluating cutting edge IT security research and how it is evolving can provide defenders with valuable information regarding what new threats and tools they can anticipate in the future. Only known attack methodologies can be blocked, and there is a gap between what is known to the general security community and what is being done by cutting edge researchers --both those trying to protect systems and those trying to compromise them. The best security researchers communicate with others in their field; they know what cutting edge research is being done; what software can be penetrated via this research; and what new attack techniques and methodologies are being circulated in the black hat community. Standardization of control system applications, operating systems, and networking protocols is occurring at a rapid rate, following a path similar to the standardization of modern IT networks. Many attack methodologies used on IT systems can be ported over to the control system environment with little difficulty. It is extremely important to take advantage of the lag time between new research, its use on traditional IT networks, and the time it takes to port the research over for use on a control system network. Analyzing nascent trends in IT security and determining their applicability to control system networks provides significant information regarding defense mechanisms needed to secure critical infrastructure more effectively. This work provides the critical infrastructure community with a better understanding of how new attacks might be launched, what layers of defense will be needed to deter them, how the attacks could be detected, and how their impact could be limited.

  13. Design and Hardware Implementation of a New Chaotic Secure Communication Technique

    PubMed Central

    Xiong, Li; Lu, Yan-Jun; Zhang, Yong-Fang; Zhang, Xin-Guo; Gupta, Parag

    2016-01-01

    In this paper, a scheme for chaotic modulation secure communication is proposed based on chaotic synchronization of an improved Lorenz system. For the first time, the intensity limit and stability of the transmitted signal, the characteristics of broadband and the requirements for accuracy of electronic components are presented by Multisim simulation. In addition, some improvements are made on the measurement method and the proposed experimental circuit in order to facilitate the experiments of chaotic synchronization, chaotic non-synchronization, experiment without signal and experiment with signal. To illustrate the effectiveness of the proposed scheme, some numerical simulations are presented. Then, the proposed chaotic secure communication circuit is implemented through analog electronic circuit, which is characterized by its high accuracy and good robustness. PMID:27548385

  14. Design and Hardware Implementation of a New Chaotic Secure Communication Technique.

    PubMed

    Xiong, Li; Lu, Yan-Jun; Zhang, Yong-Fang; Zhang, Xin-Guo; Gupta, Parag

    2016-01-01

    In this paper, a scheme for chaotic modulation secure communication is proposed based on chaotic synchronization of an improved Lorenz system. For the first time, the intensity limit and stability of the transmitted signal, the characteristics of broadband and the requirements for accuracy of electronic components are presented by Multisim simulation. In addition, some improvements are made on the measurement method and the proposed experimental circuit in order to facilitate the experiments of chaotic synchronization, chaotic non-synchronization, experiment without signal and experiment with signal. To illustrate the effectiveness of the proposed scheme, some numerical simulations are presented. Then, the proposed chaotic secure communication circuit is implemented through analog electronic circuit, which is characterized by its high accuracy and good robustness.

  15. Secure control systems with application to cyber-physical systems

    SciTech Connect

    Dong, Jin; Djouadi, Seddik M; Nutaro, James J; Kuruganti, Phani Teja

    2014-01-01

    Control systems are computer-based systems with networked units consisting of sensors, actuators, control processing units, and communication devices. The role of control system is to interact, monitor, and control physical processes. Reactive power control is a fundamental issue in ensuring the security of the power network. It is claimed that Synchronous Condensers (SC) have been used at both distribution and transmission voltage levels to improve stability and to maintain voltages within desired limits under changing load conditions and contingency situations. Performance of PI controller corresponding to various tripping faults are analyzed for SC systems. Most of the eort in protecting these systems has been in protection against random failures or reliability. However, besides failures these systems are subject to various signal attacks for which new analysis are discussed here. When a breach does occur, it is necessary to react in a time commensurate with the physical dynamics of the system as it responds to the attack. Failure to act swiftly enough may result in undesirable, and possibly irreversible, physical eects. Therefore, it is meaningful to evaluate the security of a cyber-physical system, especially to protect it from cyber-attack. Illustrative numerical examples are provided together with an application to the SC systems.

  16. Speaker identification for the improvement of the security communication between law enforcement units

    NASA Astrophysics Data System (ADS)

    Tovarek, Jaromir; Partila, Pavol

    2017-05-01

    This article discusses the speaker identification for the improvement of the security communication between law enforcement units. The main task of this research was to develop the text-independent speaker identification system which can be used for real-time recognition. This system is designed for identification in the open set. It means that the unknown speaker can be anyone. Communication itself is secured, but we have to check the authorization of the communication parties. We have to decide if the unknown speaker is the authorized for the given action. The calls are recorded by IP telephony server and then these recordings are evaluate using classification If the system evaluates that the speaker is not authorized, it sends a warning message to the administrator. This message can detect, for example a stolen phone or other unusual situation. The administrator then performs the appropriate actions. Our novel proposal system uses multilayer neural network for classification and it consists of three layers (input layer, hidden layer, and output layer). A number of neurons in input layer corresponds with the length of speech features. Output layer then represents classified speakers. Artificial Neural Network classifies speech signal frame by frame, but the final decision is done over the complete record. This rule substantially increases accuracy of the classification. Input data for the neural network are a thirteen Mel-frequency cepstral coefficients, which describe the behavior of the vocal tract. These parameters are the most used for speaker recognition. Parameters for training, testing and validation were extracted from recordings of authorized users. Recording conditions for training data correspond with the real traffic of the system (sampling frequency, bit rate). The main benefit of the research is the system developed for text-independent speaker identification which is applied to secure communication between law enforcement units.

  17. INMARSAT's personal communicator system

    NASA Technical Reports Server (NTRS)

    Hart, Nick; Haugli, HANS-C.; Poskett, Peter; Smith, K.

    1993-01-01

    Inmarsat has been providing near global mobile satellite communications since 1982 and Inmarsat terminals are currently being used in more than 130 countries. The terminals have been reduced in size and cost over the years and new technology has enabled the recent introduction of briefcase sized personal telephony terminals (Inmarsat-M). This trend continues and we are likely to see Inmarsat handheld terminals by the end of the decade. These terminals are called Inmarsat-P and this paper focuses on the various elements required to support a high quality service to handheld terminals. The main system elements are: the handheld terminals; the space segment with the associated orbits; and the gateways to terrestrial networks. It is both likely and desirable that personal handheld satellite communications will be offered by more than one system provider and this competition will ensure strong emphasis on service quality and cost of ownership. The handheld terminals also have to be attractive to a large number of potential users, and this means that the terminals must be small enough to fit in a pocket. Battery lifetime is another important consideration, and this coupled with radiation safety requirements limits the maximum radiated EIRP. The terminal G/T is mainly constrained by the gain of the omnidirectional antenna and the noise figure of the RF front end (including input losses). Inmarsat has examined, with the support of industry, a number of Geosynchronous (GSO), Medium Earth Orbit (MEO) and Low Earth Orbit (LEO) satellite options for the provision of a handheld mobile satellite service. This paper describes the key satellite and orbit parameters and tradeoffs which affect the overall quality of service and the space segment costing. The paper also stresses not only the importance of using and sharing the available mobile frequency band allocations efficiently, but also the key considerations affecting the choice of feeder link bands. The design of the gateways

  18. Optimized ECC Implementation for Secure Communication between Heterogeneous IoT Devices

    PubMed Central

    Marin, Leandro; Piotr Pawlowski, Marcin; Jara, Antonio

    2015-01-01

    The Internet of Things is integrating information systems, places, users and billions of constrained devices into one global network. This network requires secure and private means of communications. The building blocks of the Internet of Things are devices manufactured by various producers and are designed to fulfil different needs. There would be no common hardware platform that could be applied in every scenario. In such a heterogeneous environment, there is a strong need for the optimization of interoperable security. We present optimized elliptic curve Cryptography algorithms that address the security issues in the heterogeneous IoT networks. We have combined cryptographic algorithms for the NXP/Jennic 5148- and MSP430-based IoT devices and used them to created novel key negotiation protocol. PMID:26343677

  19. Optimized ECC Implementation for Secure Communication between Heterogeneous IoT Devices.

    PubMed

    Marin, Leandro; Pawlowski, Marcin Piotr; Jara, Antonio

    2015-08-28

    The Internet of Things is integrating information systems, places, users and billions of constrained devices into one global network. This network requires secure and private means of communications. The building blocks of the Internet of Things are devices manufactured by various producers and are designed to fulfil different needs. There would be no common hardware platform that could be applied in every scenario. In such a heterogeneous environment, there is a strong need for the optimization of interoperable security. We present optimized elliptic curve Cryptography algorithms that address the security issues in the heterogeneous IoT networks. We have combined cryptographic algorithms for the NXP/Jennic 5148- and MSP430-based IoT devices and used them to created novel key negotiation protocol.

  20. The NASA personnel security processing expert system

    SciTech Connect

    Silberberg, D.; Thomas, R.

    1996-12-31

    The NASA Personnel Security Processing Expert System is a tool that automatically determines the appropriate personnel background investigation required for a civil servant or contractor occupying a position of national security or public trust. It also instructs the personnel security processing staff to perform special checks based on a specific position. The system is implemented using a rule-based expert system and a World Wide Web interface. The system design separates the user interface, knowledge base and control structure to simplify system evolution. When one subsystem is modified, the others are impacted minimally. This system provides many benefits to the NASA Personnel Security Program. First, it frees the agency personnel security specialist from trouble-shooting and correcting all investigative problems. It also provides a learning tool for security processing staff at each installation. The system ensures that each installation security office is in compliance with all applicable laws, regulations and policies. Finally, eliminating overlapping, inappropriate and duplicative efforts to process employees saves many resources. The system was deployed less than a year ago. To date, it saved $1.2 million of the $1.5 million agency-wide personnel security budget.

  1. 76 FR 81359 - National Security Personnel System

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-28

    ...;having general applicability and legal effect, most of which are keyed #0;to and codified in the Code of... MANAGEMENT 5 CFR Chapter XCIX RIN 3206-AM 53 National Security Personnel System AGENCY: Department of Defense... Defense and Office of Personnel Management regulations concerning the National Security Personnel System...

  2. Laser communication system

    SciTech Connect

    Fredriksen, H.A.; Walter, R.K.; Mentzer, R.B.

    1987-04-28

    A laser communication system is described for transmission across an atmospheric link between a radio frequency source and a load comprising: a primary transmitter including a primary laser, a primary laser modulator connected to the primary laser and to a signal source, and a laser intensity control means connected to the laser for varying the primary laser intensity; a primary receiver located in the path of a beam from the primary laser; a haze comparator circuit connected to a primary photodetector means and comparing the electrical signal from the primary photodetector means to a standard signal to produce an output signal which indicates the sense and degree of difference between the two; a secondary laser located at the primary receiver location; secondary laser modulator circuit; a secondary laser control circuit; a secondary photodetector; a first control means connected to the secondary photodetector and the primary laser intensity control means; and an interconnection between the output of the haze comparator circuit and the secondary laser intensity control circuit so that the intensity of the output of the secondary laser is varied by the haze comparator in the same manner as is the intensity of the output of the primary laser.

  3. The SEISMED guidelines for host systems security.

    PubMed

    Furnell, S M; Sanders, P W

    1996-01-01

    The increasing use of and reliance upon information technology within modern healthcare establishments underlines a need for adequate security controls to protect the confidentiality, integrity and availability of systems and data. Whilst the consideration of security is now generally accepted as part of the design and implementation of new systems, many systems are already in operation in which these needs have not been adequately addressed. This paper presents a summary of the recommendations arising from the AIM SEISMED (Secure Environment for Information Systems in MEDicine) project relating to the addition and enhancement of security in existing healthcare systems. The paper is based upon material originally presented at the SEISMED Workshop "Security and Legal Aspects of Advanced Health Telematics", Brussels, 11 July 1994. The content has been revised in light of the workshop discussion and the further development of the guidelines since that time.

  4. Toddlers' Complex Communication: Playfulness from a Secure Base

    ERIC Educational Resources Information Center

    Alcock, Sophie

    2013-01-01

    Attachment theory is presented in this article as involving embodied relational processes within complex relational systems. Two narrative-like "events" are represented to illustrate very young children playfully relating -- connecting and communicating inter- and intrasubjectively. The ethnographic-inspired research methods included…

  5. Toddlers' Complex Communication: Playfulness from a Secure Base

    ERIC Educational Resources Information Center

    Alcock, Sophie

    2013-01-01

    Attachment theory is presented in this article as involving embodied relational processes within complex relational systems. Two narrative-like "events" are represented to illustrate very young children playfully relating -- connecting and communicating inter- and intrasubjectively. The ethnographic-inspired research methods included…

  6. 49 CFR 236.1033 - Communications and security requirements.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... communications between the office, wayside, and onboard components in a PTC system shall provide cryptographic message integrity and authentication. (b) Cryptographic keys required under paragraph (a) of this section... approval of the algorithm. (c) The cleartext form of the cryptographic keys shall be protected...

  7. An overview in healthcare information systems security.

    PubMed

    Bourka, A; Polemi, N; Koutsouris, D

    2001-01-01

    The scope of this paper is to present the current needs and trends in the field of healthcare systems security. The approach applied within the described review was based on three major steps. The first step was to define the point and ways of penetration and integration of security services in current healthcare related applications addressing technical, organisational and legal/regulatory issues. The second step was to specify and evaluate common security technologies applied in healthcare information systems pointing out gaps and efficient solutions, whereas the third was to draw conclusions for the present conditions and identify the future trends of healthcare information security. A number of EU RTD Projects were selected, categorised, analysed and comparatively evaluated in terms of security. The technical focus was on key security technologies, like Public Key Infrastructures (PKIs) based on Trusted Third Parties (TTPs) in conjunction with other state-of-the-art security components (programming tools, data representation formats, security standards and protocols, security policies and risk assessment techniques). The experience gained within this review will provide valuable input for future security applications in the healthcare sector, solving existing problems and addressing real user needs.

  8. Sustainable Food Security Measurement: A Systemic Methodology

    NASA Astrophysics Data System (ADS)

    Findiastuti, W.; Singgih, M. L.; Anityasari, M.

    2017-04-01

    Sustainable food security measures how a region provides food for its people without endangered the environment. In Indonesia, it was legally measured in Food Security and Vulnerability (FSVA). However, regard to sustainable food security policy, the measurement has not encompassed the environmental aspect. This will lead to lack of environmental aspect information for adjusting the next strategy. This study aimed to assess Sustainable Food security by encompassing both food security and environment aspect using systemic eco-efficiency. Given existing indicator of cereal production level, total emission as environment indicator was generated by constructing Causal Loop Diagram (CLD). Then, a stock-flow diagram was used to develop systemic simulation model. This model was demonstrated for Indonesian five provinces. The result showed there was difference between food security order with and without environmental aspect assessment.

  9. Communications device identification methods, communications methods, wireless communications readers, wireless communications systems, and articles of manufacture

    DOEpatents

    Steele, Kerry D [Kennewick, WA; Anderson, Gordon A [Benton City, WA; Gilbert, Ronald W [Morgan Hill, CA

    2011-02-01

    Communications device identification methods, communications methods, wireless communications readers, wireless communications systems, and articles of manufacture are described. In one aspect, a communications device identification method includes providing identification information regarding a group of wireless identification devices within a wireless communications range of a reader, using the provided identification information, selecting one of a plurality of different search procedures for identifying unidentified ones of the wireless identification devices within the wireless communications range, and identifying at least some of the unidentified ones of the wireless identification devices using the selected one of the search procedures.

  10. A Review of the Security of Insulin Pump Infusion Systems

    PubMed Central

    Paul, Nathanael; Kohno, Tadayoshi; Klonoff, David C

    2011-01-01

    Insulin therapy has enabled patients with diabetes to maintain blood glucose control to lead healthier lives. Today, rather than injecting insulin manually using syringes, a patient can use a device such as an insulin pump to deliver insulin programmatically. This allows for more granular insulin delivery while attaining blood glucose control. Insulin pump system features have increasingly benefited patients, but the complexity of the resulting system has grown in parallel. As a result, security breaches that can negatively affect patient health are now possible. Rather than focus on the security of a single device, we concentrate on protecting the security of the entire system. In this article, we describe the security issues as they pertain to an insulin pump system that includes an embedded system of components, which include the insulin pump, continuous glucose management system, blood glucose monitor, and other associated devices (e.g., a mobile phone or personal computer). We detail not only the growing wireless communication threat in each system component, but also describe additional threats to the system (e.g., availability and integrity). Our goal is to help create a trustworthy infusion pump system that will ultimately strengthen pump safety, and we describe mitigating solutions to address identified security issues. PMID:22226278

  11. A review of the security of insulin pump infusion systems.

    PubMed

    Paul, Nathanael; Kohno, Tadayoshi; Klonoff, David C

    2011-11-01

    Insulin therapy has enabled patients with diabetes to maintain blood glucose control to lead healthier lives. Today, rather than injecting insulin manually using syringes, a patient can use a device such as an insulin pump to deliver insulin programmatically. This allows for more granular insulin delivery while attaining blood glucose control. Insulin pump system features have increasingly benefited patients, but the complexity of the resulting system has grown in parallel. As a result, security breaches that can negatively affect patient health are now possible. Rather than focus on the security of a single device, we concentrate on protecting the security of the entire system. In this article, we describe the security issues as they pertain to an insulin pump system that includes an embedded system of components, which include the insulin pump, continuous glucose management system, blood glucose monitor, and other associated devices (e.g., a mobile phone or personal computer). We detail not only the growing wireless communication threat in each system component, but also describe additional threats to the system (e.g., availability and integrity). Our goal is to help create a trustworthy infusion pump system that will ultimately strengthen pump safety, and we describe mitigating solutions to address identified security issues.

  12. A Review of the Security of Insulin Pump Infusion Systems

    SciTech Connect

    Klonoff, David C.; Paul, Nathanael R; Kohno, Tadayoshi

    2011-01-01

    Insulin therapy has enabled diabetic patients to maintain blood glucose control to lead healthier lives. Today, rather than manually injecting insulin using syringes, a patient can use a device, such as an insulin pump, to programmatically deliver insulin. This allows for more granular insulin delivery while attaining blood glucose control. The insulin pump system features have increasingly benefited patients, but the complexity of the resulting system has grown in parallel. As a result security breaches that can negatively affect patient health are now possible. Rather than focus on the security of a single device, we concentrate on protecting the security of the entire system. In this paper we describe the security issues as they pertain to an insulin pump system that includes an embedded system of components including the insulin pump, continuous glucose management system, blood glucose monitor, and other associated devices (e.g., a mobile phone or personal computer). We detail not only the growing wireless communication threat in each system component, but we also describe additional threats to the system (e.g., availability and integrity). Our goal is to help create a trustworthy infusion pump system that will ultimately strengthen pump safety, and we describe mitigating solutions to address identified security issues both for now and in the future.

  13. Security requirements in EHR systems and archives.

    PubMed

    Ruotsalainen, Pekka

    2004-01-01

    EHR system is a system for recording, retrieving, and manipulating information in electronic health care records. Archive is an organisation that intends to preserve health records for access and use for an identified group of consumers. There exist many combinations of EHR-systems and archives. EHR-system can be a single on-line system with integrated archiving functions or archive and EHR-system are co-operative or federated systems. This paper describes both common security requirements for EHR-systems and archives and security requirement specific for archives. Requirements are derived from ethical and legal principles. From principles a set of security requirements are derived. Safeguards for implementing security are discussed. In practise EHR-system and archive share many security services. This document is proposing that inside a security domain both the archive and EHR-system have a common security policy. In addition to this the archiving organisation needs a documented policy for information preserving and a policy for access and distribution of information between other archives.

  14. Cyber Hygiene for Control System Security

    DOE PAGES

    Oliver, David

    2015-10-08

    There are many resources from government and private industry available to assist organizations in reducing their attack surface and enhancing their security posture. Furthermore, standards are being written and improved upon to make the practice of securing a network more manageable. And while the specifics of network security are complex, most system vulnerabilities can be mitigated using fairly simple cyber hygiene techniques like those offered above.

  15. Secure digital voice communications in the Defense Data Network (DDN)

    NASA Astrophysics Data System (ADS)

    Bernet, M.; Gan, D.; Oesterreicher, C.

    1985-03-01

    This final report has investigated and validated one of the fourteen key features of the future, all-digital World-wide Digital Systems Architecture (WWDSA), namely the enhanced 2.4 Kbps secure voice survivability through the use of packetized voice and the use of packetized voice and the interconnection between the voice survivability through the use of packetized voice and the interconnection between the voice (DSN) phase implementation plan in the report, Secure Voice, as provided by the STU-IIs, can be implemented in the DDN in the late 1980s time-frame with no technical and minimum schedule risk. VIUs are proposed to interconnect, the family of secure voice terminals, called STU-IIs, to the DDN. VIUs contain modan, signalling and supervision (S/S), and processor modules and are supported by the implementation model of the protocol architecture that (with the TAC as processor module) was proposed in the report. An optimum system-level architecture employing the VIUs and the proposed in the implementation plan based on an extensive evaluation.

  16. Library Security Systems Come of Age.

    ERIC Educational Resources Information Center

    Knight, Nancy H.

    1978-01-01

    Although all library security systems reduce losses, there are significant differences among them in terms of types of protection, cost, and false alarms. Systems from five companies are assessed: 3M, Checkpoint, Gaylord, Knogo, and Sentronic International. (JPF)

  17. Quantum secure direct communication protocol with blind polarization bases and particles' transmitting order

    NASA Astrophysics Data System (ADS)

    Song, Jie; Zhu, Ai-Dong; Zhang, Shou

    2007-03-01

    This paper presents a modified secure direct communication protocol by using the blind polarization bases and particles' random transmitting order. In our protocol, a sender (Alice) encodes secret messages by rotating a random polarization angle of particle and then the receiver (Bob) sends back these particles as a random sequence. This ensures the security of communication.

  18. 77 FR 64546 - Certain Devices With Secure Communication Capabilities, Components Thereof, and Products...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-22

    ... COMMISSION Certain Devices With Secure Communication Capabilities, Components Thereof, and Products..., 19 U.S.C. Sec. 1337, on behalf of VirnetX, Inc., of Zephyr Cove, Nevada and Science Applications... secure communication capabilities, components thereof, and products containing the same by reason of...

  19. Ultramicrowave communications system, phase 3

    NASA Technical Reports Server (NTRS)

    1981-01-01

    The ultramicrowave communications system program investigated the feasibility of a solid state system that meets the projected space to space requirements, while using the advantages of the 100 to 200 GHz band. The program successfully demonstrated a laboratory model of a high frequency communications system operating between 100 to 200 GHz. In the process, vendor claims for performance specifications of discrete components were evaluated, and a window was provided into system design and integration problems.

  20. Security in the management of information systems.

    PubMed

    Huston, T L; Huston, J L

    1998-06-01

    Although security technology exists in abundance in health information management systems, the implementation of that technology is often lacking. This lack of implementation can be heavily affected by the attitudes and perceptions of users and management, the "people part" of systems. Particular operational, organizational, and economic factors must be addressed along with employment of security objectives and accountability. Unique threats, as well as controls, pervade the use of microcomputer-based systems as these systems permeate health care information management.

  1. Information Data Security Specialists' and Business Leaders' Experiences Regarding Communication Challenges

    ERIC Educational Resources Information Center

    Lopez, Robert H.

    2012-01-01

    The problem addressed was the need to maintain data security in the field of information technology. Specifically, the breakdown of communication between business leaders and data security specialists create risks to data security. The purpose of this qualitative phenomenological study was to determine which factors would improve communication…

  2. Information Data Security Specialists' and Business Leaders' Experiences Regarding Communication Challenges

    ERIC Educational Resources Information Center

    Lopez, Robert H.

    2012-01-01

    The problem addressed was the need to maintain data security in the field of information technology. Specifically, the breakdown of communication between business leaders and data security specialists create risks to data security. The purpose of this qualitative phenomenological study was to determine which factors would improve communication…

  3. Data security in medical computer systems.

    PubMed

    White, R

    1986-10-01

    A computer is secure if it works reliably and if problems that do arise can be corrected easily. The steps that can be taken to ensure hardware, software, procedural, physical, and legal security are outlined. Most computer systems are vulnerable because their operators do not have sufficient procedural safeguards in place.

  4. High Assurance Models for Secure Systems

    ERIC Educational Resources Information Center

    Almohri, Hussain M. J.

    2013-01-01

    Despite the recent advances in systems and network security, attacks on large enterprise networks consistently impose serious challenges to maintaining data privacy and software service integrity. We identify two main problems that contribute to increasing the security risk in a networked environment: (i) vulnerable servers, workstations, and…

  5. Establishing Information Security Systems via Optical Imaging

    DTIC Science & Technology

    2015-08-11

    to encrypt and authenticate information for data/images storage and transmission, including optical systems for secured information. 15. SUBJECT...TERMS Optical Imaging, Optical Cryptosystems , Diffractive Imaging, Optical Encryption 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT SAR 18...sector). The main objective is to develop optical imaging technologies to encrypt and authenticate information for data/images storage and

  6. High Assurance Models for Secure Systems

    ERIC Educational Resources Information Center

    Almohri, Hussain M. J.

    2013-01-01

    Despite the recent advances in systems and network security, attacks on large enterprise networks consistently impose serious challenges to maintaining data privacy and software service integrity. We identify two main problems that contribute to increasing the security risk in a networked environment: (i) vulnerable servers, workstations, and…

  7. Quantum secure direct communication of digital and analog signals using continuum coherent states

    NASA Astrophysics Data System (ADS)

    Guerra, Antônio Geovan de Araújo Holanda; Rios, Francisco Franklin Sousa; Ramos, Rubens Viana

    2016-11-01

    In this work, we present optical schemes for secure direct quantum communication of digital and analog signals using continuum coherent states and frequency-dependent phase modulation. The main advantages of the proposed schemes are that they do not use entangled states and they can be implemented with today technology. The theory of quantum interference of continuum coherent state is described, and the optical setups for secure direct communication are presented and their securities are discussed.

  8. Practical Quantum Cryptography for Secure Free-Space Communications

    SciTech Connect

    Buttler, W.T.; Hughes, R.J.; Kwiat, P.G.; Lamoreaux, S.K.; Morgan, G.L.; Nordholt, J.E.; Peterson, C.G.

    1999-02-01

    Quantum cryptography is an emerging technology in which two parties may simultaneously generate shared, secret cryptographic key material using the transmission of quantum states of light. The security of these transmissions is based on the inviolability of the laws of quantum mechanics and information-theoretically secure post-processing methods. An adversary can neither successfully tap the quantum transmissions, nor evade detection, owing to Heisenberg's uncertainty principle. In this paper we describe the theory of quantum cryptography, and the most recent results from our experimental free-space system with which we have demonstrated for the first time the feasibility of quantum key generation over a point-to-point outdoor atmospheric path in daylight. We achieved a transmission distance of 0.5 km, which was limited only by the length of the test range. Our results provide strong evidence that cryptographic key material could be generated on demand between a ground station and a satellite (or between two satellites), allowing a satellite to be securely re-keyed on orbit. We present a feasibility analysis of surface-to-satellite quantum key generation.

  9. Secure scalable disaster electronic medical record and tracking system.

    PubMed

    Demers, Gerard; Kahn, Christopher; Johansson, Per; Buono, Colleen; Chipara, Octav; Griswold, William; Chan, Theodore

    2013-10-01

    Electronic medical records (EMRs) are considered superior in documentation of care for medical practice. Current disaster medical response involves paper tracking systems and radio communication for mass-casualty incidents (MCIs). These systems are prone to errors, may be compromised by local conditions, and are labor intensive. Communication infrastructure may be impacted, overwhelmed by call volume, or destroyed by the disaster, making self-contained and secure EMR response a critical capability. Report As the prehospital disaster EMR allows for more robust content including protected health information (PHI), security measures must be instituted to safeguard these data. The Wireless Internet Information System for medicAl Response in Disasters (WIISARD) Research Group developed a handheld, linked, wireless EMR system utilizing current technology platforms. Smart phones connected to radio frequency identification (RFID) readers may be utilized to efficiently track casualties resulting from the incident. Medical information may be transmitted on an encrypted network to fellow prehospital team members, medical dispatch, and receiving medical centers. This system has been field tested in a number of exercises with excellent results, and future iterations will incorporate robust security measures. A secure prehospital triage EMR improves documentation quality during disaster drills.

  10. Towards a Scalable Group Vehicle-based Security System

    SciTech Connect

    Carter, Jason M

    2016-01-01

    In August 2014, the National Highway Traffic Safety Administration (NHTSA) proposed new rulemaking to require V2V communication in light vehicles. To establish trust in the basic safety messages (BSMs) that are exchanged by vehicles to improve driver safety, a vehicle public key infrastructure (VPKI) is required. We outline a system where a group or groups of vehicles manage and generate their own BSM signing keys and authenticating certificates -- a Vehicle-Based Security System (VBSS). Based on our preliminary examination, we assert the mechanisms exist to implement a VBSS that supports V2V communications; however, maintaining uniform trust throughout the system while protecting individual privacy does require reliance on nascent group signature technology which may require a significant amount of communication overhead for trust maintenance. To better evaluate the VBSS approach, we compare it to the proposed Security Credential Management System (SCMS) in four major areas including bootstrapping, pseudonym provisioning, BSM signing and authentication, and revocation. System scale, driver privacy, and the distribution and dynamics of participants make designing an effective VPKI an interesting and challenging problem; no clear-cut strategy exists to satisfy the security and privacy expectations in a highly efficient way. More work is needed in VPKI research, so the life-saving promise of V2V technology can be achieved.

  11. Communication, Work Systems and HRD

    ERIC Educational Resources Information Center

    Pace, R. Wayne

    2013-01-01

    Purpose: The purpose of this article is to show the foundational place that communication theory and its practice occupies in functioning work systems. Design/methodology/approach: This paper defines the word communication in terms of the creation and interpretation of displays, describes what it means to have a theoretical foundation for a…

  12. Recommended Practice for Securing Control System Modems

    SciTech Connect

    James R. Davidson; Jason L. Wright

    2008-01-01

    This paper addresses an often overlooked “backdoor” into critical infrastructure control systems created by modem connections. A modem’s connection to the public telephone system is similar to a corporate network connection to the Internet. By tracing typical attack paths into the system, this paper provides the reader with an analysis of the problem and then guides the reader through methods to evaluate existing modem security. Following the analysis, a series of methods for securing modems is provided. These methods are correlated to well-known networking security methods.

  13. Situated Usability Testing for Security Systems

    SciTech Connect

    Greitzer, Frank L.

    2011-03-02

    While usability testing is well established, assessing the usability of security software, tools, or methods deserves more careful consideration. It has been argued that dealing with security has become too difficult for individuals or organizations to manage effectively or to use conveniently. As difficult as it is for system administrators and developers to deal with, security is even more challenging for casual users. Indeed, it is much too easy for casual/home users to configure the security of their systems in non-optimal ways that leave their systems inadvertently insecure. This is exacerbated by the fact that casual users are focused on matters other than security, and likely would prefer not even to think about security. This brief report argues that when security and/or privacy are part of the equation, traditional methods for usability testing should be re-considered. The purpose of this brief report is to argue for and outline a method associated with a new approach to usability testing for examining usable security issues.

  14. A security scheme of SMS system

    NASA Astrophysics Data System (ADS)

    Zhang, Fangzhou; Yang, Hong-Wei; Song, Chuck

    2005-02-01

    With the prosperous development and the use of SMS, more and more important information need to be transferred through the wireless and mobile networks by the users. But in the GSM/GPRS network, the SMS messages are transferred in text mode through the signaling channel and there is no integrality for SMS messages. Because of the speciality of the mobile communications, the security of signaling channel is very weak. So we need to improve and enhance the security and integrality of SMS. At present, developed investigation based on SMS security is still incomplete. The key distribution and management is not perfect to meet the usability in a wide area. This paper introduces a high-level security method to solve this problem. We design the Secure SMS of GSM/GPRS in order to improve the security of the important information that need to be transferred by the mobile networks. Using this method, we can improve the usability of E-payment and other mobile electronic commerce.

  15. 76 FR 50811 - Seventeenth Meeting: EUROCAE WG-72: RTCA Special Committee 216: Aeronautical Systems Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-16

    ...-Meeting Events) 9 a.m. to 12 p.m. Optional--DHS National Cybersecurity and Communications Integration....m.-12 p.m., DHS Briefing on the Cybersecurity Control System Security (CSSP) Program. 1 p.m.--Joint...

  16. Security-enhanced chaos communication with time-delay signature suppression and phase encryption.

    PubMed

    Xue, Chenpeng; Jiang, Ning; Lv, Yunxin; Wang, Chao; Li, Guilan; Lin, Shuqing; Qiu, Kun

    2016-08-15

    A security-enhanced chaos communication scheme with time delay signature (TDS) suppression and phase-encrypted feedback light is proposed, in virtue of dual-loop feedback with independent high-speed phase modulation. We numerically investigate the property of TDS suppression in the intensity and phase space and quantitatively discuss security of the proposed system by calculating the bit error rate of eavesdroppers who try to crack the system by directly filtering the detected signal or by using a similar semiconductor laser to synchronize the link signal and extract the data. The results show that TDS embedded in the chaotic carrier can be well suppressed by properly setting the modulation frequency, which can keep the time delay a secret from the eavesdropper. Moreover, because the feedback light is encrypted, without the accurate time delay and key, the eavesdropper cannot reconstruct the symmetric operation conditions and decode the correct data.

  17. Secure Communication Based on a Hybrid of Chaos and Ica Encryptions

    NASA Astrophysics Data System (ADS)

    Chen, Wei Ching; Yuan, John

    Chaos and independent component analysis (ICA) encryptions are two novel schemes for secure communications. In this paper, a new scheme combining chaos and ICA techniques is proposed to enhance the security level during communication. In this scheme, a master chaotic system is embedded at the transmitter. The message signal is mixed with a chaotic signal and a Gaussian white noise into two mixed signals and then transmitted to the receiver through the public channels. A signal for synchronization is transmitted through another public channel to the receiver where a slave chaotic system is embedded to reproduce the chaotic signal. A modified ICA is used to recover the message signal at the receiver. Since only two of the three transmitted signals contain the information of message signal, a hacker would not be able to retrieve the message signal by using ICA even though all the transmitted signals are intercepted. Spectrum analyses are used to prove that the message signal can be securely hidden under this scheme.

  18. Information Security: Progress Made on Harmonizing Policies and Guidance for National Security and Non-National Security Systems

    DTIC Science & Technology

    2010-09-01

    checklist, which may include items such as security controls used in FISMA system assessments.12 • NIST SP 800-53A, revision 1, Guide for...Assessing the Security Controls in Federal Information Systems, SP 800-53A (Gaithersburg, Md.: June 2010). Page 8 GAO -10-916 Harmonizing IT Security ...minimum security controls defined for a low- impact, moderate-impact, or high-impact information system. Page 20 GAO -10-916 Harmonizing IT Security

  19. A Multifactor Secure Authentication System for Wireless Payment

    NASA Astrophysics Data System (ADS)

    Sanyal, Sugata; Tiwari, Ayu; Sanyal, Sudip

    Organizations are deploying wireless based online payment applications to expand their business globally, it increases the growing need of regulatory requirements for the protection of confidential data, and especially in internet based financial areas. Existing internet based authentication systems often use either the Web or the Mobile channel individually to confirm the claimed identity of the remote user. The vulnerability is that access is based on only single factor authentication which is not secure to protect user data, there is a need of multifactor authentication. This paper proposes a new protocol based on multifactor authentication system that is both secure and highly usable. It uses a novel approach based on Transaction Identification Code and SMS to enforce another security level with the traditional Login/password system. The system provides a highly secure environment that is simple to use and deploy with in a limited resources that does not require any change in infrastructure or underline protocol of wireless network. This Protocol for Wireless Payment is extended as a two way authentications system to satisfy the emerging market need of mutual authentication and also supports secure B2B communication which increases faith of the user and business organizations on wireless financial transaction using mobile devices.

  20. Control Systems Cyber Security Standards Support Activities

    SciTech Connect

    Robert Evans

    2009-01-01

    The Department of Homeland Security’s Control Systems Security Program (CSSP) is working with industry to secure critical infrastructure sectors from cyber intrusions that could compromise control systems. This document describes CSSP’s current activities with industry organizations in developing cyber security standards for control systems. In addition, it summarizes the standards work being conducted by organizations within the sector and provides a brief listing of sector meetings and conferences that might be of interest for each sector. Control systems cyber security standards are part of a rapidly changing environment. The participation of CSSP in the development effort for these standards has provided consistency in the technical content of the standards while ensuring that information developed by CSSP is included.

  1. Anchor Toolkit - a secure mobile agent system

    SciTech Connect

    Mudumbai, Srilekha S.; Johnston, William; Essiari, Abdelilah

    1999-05-19

    Mobile agent technology facilitates intelligent operation insoftware systems with less human interaction. Major challenge todeployment of mobile agents include secure transmission of agents andpreventing unauthorized access to resources between interacting systems,as either hosts, or agents, or both can act maliciously. The Anchortoolkit, designed by LBNL, handles the transmission and secure managementof mobile agents in a heterogeneous distributed computing environment. Itprovides users with the option of incorporating their security managers.This paper concentrates on the architecture, features, access control anddeployment of Anchor toolkit. Application of this toolkit in a securedistributed CVS environment is discussed as a case study.

  2. A new image representation for compact and secure communication

    SciTech Connect

    Prasad, Lakshman; Skourikhine, A. N.

    2004-01-01

    In many areas of nuclear materials management there is a need for communication, archival, and retrieval of annotated image data between heterogeneous platforms and devices to effectively implement safety, security, and safeguards of nuclear materials. Current image formats such as JPEG are not ideally suited in such scenarios as they are not scalable to different viewing formats, and do not provide a high-level representation of images that facilitate automatic object/change detection or annotation. The new Scalable Vector Graphics (SVG) open standard for representing graphical information, recommended by the World Wide Web Consortium (W3C) is designed to address issues of image scalability, portability, and annotation. However, until now there has been no viable technology to efficiently field images of high visual quality under this standard. Recently, LANL has developed a vectorized image representation that is compatible with the SVG standard and preserves visual quality. This is based on a new geometric framework for characterizing complex features in real-world imagery that incorporates perceptual principles of processing visual information known from cognitive psychology and vision science, to obtain a polygonal image representation of high fidelity. This representation can take advantage of all textual compression and encryption routines unavailable to other image formats. Moreover, this vectorized image representation can be exploited to facilitate automated object recognition that can reduce time required for data review. The objects/features of interest in these vectorized images can be annotated via animated graphics to facilitate quick and easy display and comprehension of processed image content.

  3. Cyber-Physical System Security of Smart Grids

    SciTech Connect

    Dagle, Jeffery E.

    2012-01-31

    Abstract—This panel presentation will provide perspectives of cyber-physical system security of smart grids. As smart grid technologies are deployed, the interconnected nature of these systems is becoming more prevalent and more complex, and the cyber component of this cyber-physical system is increasing in importance. Studying system behavior in the face of failures (e.g., cyber attacks) allows a characterization of the systems’ response to failure scenarios, loss of communications, and other changes in system environment (such as the need for emergent updates and rapid reconfiguration). The impact of such failures on the availability of the system can be assessed and mitigation strategies considered. Scenarios associated with confidentiality, integrity, and availability are considered. The cyber security implications associated with the American Recovery and Reinvestment Act of 2009 in the United States are discussed.

  4. Secure Automated Microgrid Energy System (SAMES)

    DTIC Science & Technology

    2017-04-20

    FINAL REPORT Secure Automated Microgrid Energy System (SAMES) ESTCP Project EW-201340 DECEMBER 2016 Kevin Meagher Power Analytics Corporation...Microgrid Energy System (SAMES) 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER EW-201340 5e...NOTES 14. ABSTRACT The sound bite: The objective of SAMES is the creation and operation of a secure microgrid cluster. The cluster maximizes energy

  5. Security for safety critical space borne systems

    NASA Technical Reports Server (NTRS)

    Legrand, Sue

    1987-01-01

    The Space Station contains safety critical computer software components in systems that can affect life and vital property. These components require a multilevel secure system that provides dynamic access control of the data and processes involved. A study is under way to define requirements for a security model providing access control through level B3 of the Orange Book. The model will be prototyped at NASA-Johnson Space Center.

  6. Securing iris recognition systems against masquerade attacks

    NASA Astrophysics Data System (ADS)

    Galbally, Javier; Gomez-Barrero, Marta; Ross, Arun; Fierrez, Julian; Ortega-Garcia, Javier

    2013-05-01

    A novel two-stage protection scheme for automatic iris recognition systems against masquerade attacks carried out with synthetically reconstructed iris images is presented. The method uses different characteristics of real iris images to differentiate them from the synthetic ones, thereby addressing important security flaws detected in state-of-the-art commercial systems. Experiments are carried out on the publicly available Biosecure Database and demonstrate the efficacy of the proposed security enhancing approach.

  7. Efficiency in the transmission of information through digital imaging and communications in medicine using security mechanisms: tests with DISCUS.

    PubMed

    Pérez, Juan L; Servia, Francisco; Mato, Virginia; Vázquez, José Manuel; Pereira, Javier; Dorado, Julian; Díaz, Juan; Novoa, Francisco J; Pazos, Alejandro

    2010-06-01

    This article describes our experience in using a Picture Archiving and Communications System, known as Secure Medical Image Information System, based on the Digital Imaging and Communications in Medicine standard that supports the use of secure transmissions, from the point of view of how the use of secure sending methods has an effect on the efficiency in the transmission according to the network employed, to quantify productivity loss due to the encryption, the secure transmission, and the subsequent decryption. To test the Secure Medical Image Information System, a series of medical data transmission were conducted from A Coruña (Spain) to the Virgen de las Nieves Hospital, situated 1,000 km away, in Granada (Spain). Once we studied the networking infrastructure of the hospital and its available image generation devices, we subsequently carried out a series of measurements during the transmissions, which allowed us to analyze the behavior of the system with different network schemes and connection speeds. The results obtained from these investigations demonstrate that the impact of secure data-sending methods on the productivity of the system is higher in networks whose capacities are higher and it is not affected by sending data during different periods in the day. In this regard, the presented approach may serve as a model for other small, and possibly mid-sized, medical centers.

  8. Birds of a Feather: Supporting Secure Systems

    SciTech Connect

    Braswell III, H V

    2006-04-24

    Over the past few years Lawrence Livermore National Laboratory has begun the process of moving to a diskless environment in the Secure Computer Support realm. This movement has included many moving targets and increasing support complexity. We would like to set up a forum for Security and Support professionals to get together from across the Complex and discuss current deployments, lessons learned, and next steps. This would include what hardware, software, and hard copy based solutions are being used to manage Secure Computing. The topics to be discussed include but are not limited to: Diskless computing, port locking and management, PC, Mac, and Linux/UNIX support and setup, system imaging, security setup documentation and templates, security documentation and management, customer tracking, ticket tracking, software download and management, log management, backup/disaster recovery, and mixed media environments.

  9. Secure multi-party communication with quantum key distribution managed by trusted authority

    DOEpatents

    Hughes, Richard John; Nordholt, Jane Elizabeth; Peterson, Charles Glen

    2015-01-06

    Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.

  10. Secure multi-party communication with quantum key distribution managed by trusted authority

    DOEpatents

    Nordholt, Jane Elizabeth; Hughes, Richard John; Peterson, Charles Glen

    2013-07-09

    Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.

  11. Secure multi-party communication with quantum key distribution managed by trusted authority

    DOEpatents

    Hughes, Richard John; Nordholt, Jane Elizabeth; Peterson, Charles Glen

    2017-06-14

    Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.

  12. Final Report: 03-LW-005 Space-Time Secure Communications for Hostile Environments

    SciTech Connect

    Candy, J V; Poggio, A J; Chambers, D H; Guidry, B L; Robbins, C L; Hertzog, C A; Dowla, F; Burke, G; Kane, R

    2005-10-31

    The development of communications for highly reverberative environments is a major concern for both the private and military sectors whether the application is aimed at the securing a stock order or stalking hostile in a tunnel or cave. Other such environments can range from a hostile urban setting populated with a multitude of buildings and vehicles to the simple complexity of a large number of sound sources that are common in the stock exchange, or military operations in an environment with a topographic features hills, valleys, mountains or even a maze of buried water pipes attempting to transmit information about any chemical anomalies in the water system servicing a city or town. These inherent obstructions cause transmitted signals to reflect, refract and disperse in a multitude of directions distorting both their shape and arrival times at network receiver locations. Imagine troops attempting to communicate on missions in underground caves consisting of a maze of chambers causing multiple echoes with the platoon leader trying to issue timely commands to neutralize terrorists. This is the problem with transmitting information in a complex environment. Waves are susceptible to multiple paths and distortions created by a variety of possible obstructions, which may exist in the particular propagation medium. This is precisely the communications problem we solve using the physics of wave propagation to not only mitigate the noxious effects created by the hostile medium, but also to utilize it in a constructive manner enabling a huge benefit in communications. We employ time-reversal (T/R) communications to accomplish this task. This project is concerned with the development of secure communications techniques that can operate even in the most extreme conditions while maintaining a secure link between host and client stations. We developed an approach based on the concept of time-reversal (T/R) signal processing. In fact, the development of T/R communication

  13. Research on the information security system in electrical gis system in mobile application

    NASA Astrophysics Data System (ADS)

    Zhou, Chao; Feng, Renjun; Jiang, Haitao; Huang, Wei; Zhu, Daohua

    2017-05-01

    With the rapid development of social informatization process, the demands of government, enterprise, and individuals for spatial information becomes larger. In addition, the combination of wireless network technology and spatial information technology promotes the generation and development of mobile technologies. In today’s rapidly developed information technology field, network technology and mobile communication have become the two pillar industries by leaps and bounds. They almost absorbed and adopted all the latest information, communication, computer, electronics and so on new technologies. Concomitantly, the network coverage is more and more big, the transmission rate is faster and faster, the volume of user’s terminal is smaller and smaller. What’s more, from LAN to WAN, from wired network to wireless network, from wired access to mobile wireless access, people’s demand for communication technology is increasingly higher. As a result, mobile communication technology is facing unprecedented challenges as well as unprecedented opportunities. When combined with the existing mobile communication network, it led to the development of leaps and bounds. However, due to the inherent dependence of the system on the existing computer communication network, information security problems cannot be ignored. Today’s information security has penetrated into all aspects of life. Information system is a complex computer system, and it’s physical, operational and management vulnerabilities constitute the security vulnerability of the system. Firstly, this paper analyzes the composition of mobile enterprise network and information security threat. Secondly, this paper puts forward the security planning and measures, and constructs the information security structure.

  14. Hughes communications' Galaxy Satellite System

    NASA Astrophysics Data System (ADS)

    Farrell, J. F.

    1986-03-01

    This paper presents an overview of the Galaxy Satellite System owned and operated by Hughes Communications, Inc. Summary descriptions of the spacecraft and the architecture of the spacecraft ground operations are given, as well as a discussion of the business applications of the system. Finally, plans for future expansion of the system into other frequency bands and for other applications are presented.

  15. Information Systems, Security, and Privacy,

    DTIC Science & Technology

    1983-11-01

    media reported the Security Pacific National Bank as having diverted a presumed penetrator by offering him a game to play while tracing the origin of the...malfeasance by operators, but they do not exist in marketed machines. Even the procedure of two-person control as used by the military would be a deterrent...flivortodl much le-s- poop1o tim’ from1 ’,he J,11 !1111 nIiv o’ 1’ r. mo,<) it0r-or soial Icomnirli ct ion. Certainly there- are manaigemenit pro:’i’...in in

  16. Chaotic synchronization based on nonlinear state-observer and its application in secure communication

    NASA Astrophysics Data System (ADS)

    Chen, Ming-Jie; Li, Dian-Pu; Zhang, Ai-Jun

    2004-06-01

    Chaotic synchronization is a branch of chaotic control. Nowadays, the research and application of chaotic synchronization have become a hot topic and one of the development directions is for the research on chaos. In this paper, a universal nonlinear state-observer is presented for a class of universal chaotic systems to realize the chaotic synchronization, according to the theory of state-observer in the modern control theory. And theoretic analysis and simulation results have illustrated the validity of the approach. Moreover, the approach of synchronization proposed in this paper is very easy, flexible and universal with high synchronization precision. When the approach is applied to secure communication, the results are satisfying.

  17. Experimental demonstration of security-enhanced WDM-PON based on chaotic optical communications

    NASA Astrophysics Data System (ADS)

    Yin, Hongxi; Chen, Xiaolei; Yue, Hehe; Zhao, Qingchun; Hao, Yang; Wu, Chenguang; Zhao, Nan

    2015-08-01

    The message-decryption process of subtracting chaotic synchronization carrier from receiving signal is explained by modeling and numerically solving the rate equations for semiconductor lasers. An experimental system of wavelength division multiplexing passive optical network (WDM-PON) based on chaotic-light secure communications is first built up. The bidirectional transmissions of downstream and upstream data are experimentally realized with only two lasers and a single wavelength channel in a WDM fiber-optic link. When the data rate is 1.25 Gb/s, the secure transmission distance can be up to 11 km with SSMF of G.652. After sampling and decision, the BER of the recovered messages is calculated to be approximately 1×10-4.

  18. Biometric Methods for Secure Communications in Body Sensor Networks: Resource-Efficient Key Management and Signal-Level Data Scrambling

    NASA Astrophysics Data System (ADS)

    Bui, Francis Minhthang; Hatzinakos, Dimitrios

    2007-12-01

    As electronic communications become more prevalent, mobile and universal, the threats of data compromises also accordingly loom larger. In the context of a body sensor network (BSN), which permits pervasive monitoring of potentially sensitive medical data, security and privacy concerns are particularly important. It is a challenge to implement traditional security infrastructures in these types of lightweight networks since they are by design limited in both computational and communication resources. A key enabling technology for secure communications in BSN's has emerged to be biometrics. In this work, we present two complementary approaches which exploit physiological signals to address security issues: (1) a resource-efficient key management system for generating and distributing cryptographic keys to constituent sensors in a BSN; (2) a novel data scrambling method, based on interpolation and random sampling, that is envisioned as a potential alternative to conventional symmetric encryption algorithms for certain types of data. The former targets the resource constraints in BSN's, while the latter addresses the fuzzy variability of biometric signals, which has largely precluded the direct application of conventional encryption. Using electrocardiogram (ECG) signals as biometrics, the resulting computer simulations demonstrate the feasibility and efficacy of these methods for delivering secure communications in BSN's.

  19. Advanced satellite communication system

    NASA Technical Reports Server (NTRS)

    Staples, Edward J.; Lie, Sen

    1992-01-01

    The objective of this research program was to develop an innovative advanced satellite receiver/demodulator utilizing surface acoustic wave (SAW) chirp transform processor and coherent BPSK demodulation. The algorithm of this SAW chirp Fourier transformer is of the Convolve - Multiply - Convolve (CMC) type, utilizing off-the-shelf reflective array compressor (RAC) chirp filters. This satellite receiver, if fully developed, was intended to be used as an on-board multichannel communications repeater. The Advanced Communications Receiver consists of four units: (1) CMC processor, (2) single sideband modulator, (3) demodulator, and (4) chirp waveform generator and individual channel processors. The input signal is composed of multiple user transmission frequencies operating independently from remotely located ground terminals. This signal is Fourier transformed by the CMC Processor into a unique time slot for each user frequency. The CMC processor is driven by a waveform generator through a single sideband (SSB) modulator. The output of the coherent demodulator is composed of positive and negative pulses, which are the envelopes of the chirp transform processor output. These pulses correspond to the data symbols. Following the demodulator, a logic circuit reconstructs the pulses into data, which are subsequently differentially decoded to form the transmitted data. The coherent demodulation and detection of BPSK signals derived from a CMC chirp transform processor were experimentally demonstrated and bit error rate (BER) testing was performed. To assess the feasibility of such advanced receiver, the results were compared with the theoretical analysis and plotted for an average BER as a function of signal-to-noise ratio. Another goal of this SBIR program was the development of a commercial product. The commercial product developed was an arbitrary waveform generator. The successful sales have begun with the delivery of the first arbitrary waveform generator.

  20. Advanced satellite communication system

    NASA Astrophysics Data System (ADS)

    Staples, Edward J.; Lie, Sen

    1992-05-01

    The objective of this research program was to develop an innovative advanced satellite receiver/demodulator utilizing surface acoustic wave (SAW) chirp transform processor and coherent BPSK demodulation. The algorithm of this SAW chirp Fourier transformer is of the Convolve - Multiply - Convolve (CMC) type, utilizing off-the-shelf reflective array compressor (RAC) chirp filters. This satellite receiver, if fully developed, was intended to be used as an on-board multichannel communications repeater. The Advanced Communications Receiver consists of four units: (1) CMC processor, (2) single sideband modulator, (3) demodulator, and (4) chirp waveform generator and individual channel processors. The input signal is composed of multiple user transmission frequencies operating independently from remotely located ground terminals. This signal is Fourier transformed by the CMC Processor into a unique time slot for each user frequency. The CMC processor is driven by a waveform generator through a single sideband (SSB) modulator. The output of the coherent demodulator is composed of positive and negative pulses, which are the envelopes of the chirp transform processor output. These pulses correspond to the data symbols. Following the demodulator, a logic circuit reconstructs the pulses into data, which are subsequently differentially decoded to form the transmitted data. The coherent demodulation and detection of BPSK signals derived from a CMC chirp transform processor were experimentally demonstrated and bit error rate (BER) testing was performed. To assess the feasibility of such advanced receiver, the results were compared with the theoretical analysis and plotted for an average BER as a function of signal-to-noise ratio. Another goal of this SBIR program was the development of a commercial product. The commercial product developed was an arbitrary waveform generator. The successful sales have begun with the delivery of the first arbitrary waveform generator.

  1. The security of mass transport ticketing systems

    NASA Astrophysics Data System (ADS)

    Sel, Marc; Seys, Stefaan; Verheul, Eric

    Mass transport ticketing systems in most developed countries are making a rapid transition from ‘traditional’ paper or carton-based ticketing systems towards a contactless ‘smart card‘ based approach. This article discusses the main IT security aspects of mass transport ticketing systems (metro, bus, etc).

  2. Three Corner Sat Communications System

    NASA Technical Reports Server (NTRS)

    Anderson, Bobby; Horan, Stephen

    2000-01-01

    Three Corner Satellite is a constellation of three nanosatellites designed and built by students. New Mexico State University has taken on the design of the communications system for this constellation. The system includes the forward link, return link, and the crosslink. Due to size, mass, power, and financial constraints, we must design a small, light, power efficient, and inexpensive communications system. This thesis presents the design of a radio system to accomplish the data transmission requirements in light of the system constraints. In addition to the hardware design, the operational commands needed by the satellite's on-board computer to control and communicate with the communications hardware will be presented. In order for the hardware to communicate with the ground stations, we will examine the link budgets derived from the radiated power of the transmitters, link distance, data modulation, and data rate for each link. The antenna design for the constellation is analyzed using software and testing the physical antennas on a model satellite. After the analysis and testing, a combination of different systems will meet and exceed the requirements and constraints of the Three Corner Satellite constellation.

  3. Polarization encoding for optical security systems

    NASA Astrophysics Data System (ADS)

    Javidi, Bahram; Nomura, Takanori

    1999-10-01

    An idea for security verification of identification such as passports, credit cards, and others in terms of difficulty of reproduction is proposed. The polarization information is used for security verification. As the state of the polarization encoded cannot be seen by an ordinary intensity sensitive device such as a CCD camera, it cannot be copied. For optical validation system, a joint transform correlator is used. Computer simulations and optical experimental results are shown to confirm our proposed method.

  4. 6 CFR 5.31 - Security of systems of records.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 6 Domestic Security 1 2011-01-01 2011-01-01 false Security of systems of records. 5.31 Section 5.31 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY DISCLOSURE OF RECORDS AND INFORMATION Privacy Act § 5.31 Security of systems of records. (a) In general. Each...

  5. 6 CFR 5.31 - Security of systems of records.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Security of systems of records. 5.31 Section 5.31 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY DISCLOSURE OF RECORDS AND INFORMATION Privacy Act § 5.31 Security of systems of records. (a) In general. Each...

  6. 49 CFR 659.23 - System security plan: contents.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 7 2010-10-01 2010-10-01 false System security plan: contents. 659.23 Section 659... State Oversight Agency § 659.23 System security plan: contents. The system security plan must, at a... system security plan; and (e) Document the rail transit agency's process for making its system...

  7. 49 CFR 659.23 - System security plan: contents.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 7 2011-10-01 2011-10-01 false System security plan: contents. 659.23 Section 659... State Oversight Agency § 659.23 System security plan: contents. The system security plan must, at a... system security plan; and (e) Document the rail transit agency's process for making its system...

  8. 17 CFR 230.167 - Communications in connection with certain registered offerings of asset-backed securities.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Communications in connection with certain registered offerings of asset-backed securities. 230.167 Section 230.167 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION GENERAL RULES AND REGULATIONS, SECURITIES ACT OF...

  9. The evolving defense communications system

    NASA Astrophysics Data System (ADS)

    Testa, Ann M.; Jones, Walter I.

    1992-05-01

    Command, control, and communications (C3) systems 'help lift the fog of war that adds uncertainty to any military operation.' They multiply the effectiveness of weapon systems and are critical components of our nation's warfighting capability. One of these critical systems is the Defense Communications System (DCS) which evolved over the past 30 years. Several factors drove this evolution, including constrained budgets, the need to improve the effectiveness and efficiency of the service provided, compatibility and interoperability, and technological advances. Based on lessons learned from Desert Shield/Desert Storm and the changing environment, force structure, and strategy, it is time to advance the DCS to its next stage. The future DCS must be flexible enough to adapt to any situation anywhere in the world. Mobile, modular building block packages of communications equipment must be available to provide effective communications capability to deployed units immediately upon arrival. Total integration and interoperability among military, commercial, and other government agencies' communication systems is a must if survivable, robust connectivity is going to be available when needed. Integration planning must begin now.

  10. Security of electronic mental health communication and record-keeping in the digital age.

    PubMed

    Elhai, Jon D; Frueh, B Christopher

    2016-02-01

    The mental health field has seen a trend in recent years of the increased use of information technology, including mobile phones, tablets, and laptop computers, to facilitate clinical treatment delivery to individual patients and for record keeping. However, little attention has been paid to ensuring that electronic communication with patients is private and secure. This is despite potentially deleterious consequences of a data breach, which are reported in the news media very frequently in modern times. In this article, we present typical security concerns associated with using technology in clinical services or research. We also discuss enhancing the privacy and security of electronic communication with clinical patients and research participants. We offer practical, easy-to-use software application solutions for clinicians and researchers to secure patient communication and records. We discuss such issues as using encrypted wireless networks, secure e-mail, encrypted messaging and videoconferencing, privacy on social networks, and others.

  11. Communication Alarm Processor Expert System.

    SciTech Connect

    Purucker, S.L.; Tonn, B.E.; Goeltz, R.T.; Hemmelman, K.M.; Rasmussen, R.D.; Borys, S.F.

    1988-01-01

    A prototype expert system is being developed by the Oak Ridge National Laboratory and Bonneville Power Administration to process alarms from Bonneville's microwave communication system. The microwave system transmits data from power facilities in four Pacific Northwestern states to a central operations control facility. The communications alarm processor (CAP) will receive real-time data, diagnose operational problems, archive alarm information, and support analysis aimed at improving equipment maintenance. The expert system will operate in an advisory capacity. The ultimate goal is to develop systems that will enhance the operation and maintenance for the entire power system. This paper describes Bonneville's operations, the domain and architecture of the expert system, the methods used for knowledge representation and acquisition, the hardware and software of the prototype, and implementation challenges of real-time expert systems. 7 refs., 3 figs.

  12. Water System Security and Resilience in Homeland Security Research

    EPA Pesticide Factsheets

    EPA's water security research provides tools needed to improve infrastructure security and to recover from an attack or contamination incident involving chemical, biological, or radiological (CBR) agents or weapons.

  13. An Experimental Realization of a Chaos-Based Secure Communication Using Arduino Microcontrollers.

    PubMed

    Zapateiro De la Hoz, Mauricio; Acho, Leonardo; Vidal, Yolanda

    2015-01-01

    Security and secrecy are some of the important concerns in the communications world. In the last years, several encryption techniques have been proposed in order to improve the secrecy of the information transmitted. Chaos-based encryption techniques are being widely studied as part of the problem because of the highly unpredictable and random-look nature of the chaotic signals. In this paper we propose a digital-based communication system that uses the logistic map which is a mathematically simple model that is chaotic under certain conditions. The input message signal is modulated using a simple Delta modulator and encrypted using a logistic map. The key signal is also encrypted using the same logistic map with different initial conditions. In the receiver side, the binary-coded message is decrypted using the encrypted key signal that is sent through one of the communication channels. The proposed scheme is experimentally tested using Arduino shields which are simple yet powerful development kits that allows for the implementation of the communication system for testing purposes.

  14. An Experimental Realization of a Chaos-Based Secure Communication Using Arduino Microcontrollers

    PubMed Central

    Zapateiro De la Hoz, Mauricio; Acho, Leonardo; Vidal, Yolanda

    2015-01-01

    Security and secrecy are some of the important concerns in the communications world. In the last years, several encryption techniques have been proposed in order to improve the secrecy of the information transmitted. Chaos-based encryption techniques are being widely studied as part of the problem because of the highly unpredictable and random-look nature of the chaotic signals. In this paper we propose a digital-based communication system that uses the logistic map which is a mathematically simple model that is chaotic under certain conditions. The input message signal is modulated using a simple Delta modulator and encrypted using a logistic map. The key signal is also encrypted using the same logistic map with different initial conditions. In the receiver side, the binary-coded message is decrypted using the encrypted key signal that is sent through one of the communication channels. The proposed scheme is experimentally tested using Arduino shields which are simple yet powerful development kits that allows for the implementation of the communication system for testing purposes. PMID:26413563

  15. Secure Communications in High Speed Fiber Optical Networks Using Code Division Multiple Access (CDMA) Transmission

    SciTech Connect

    Han, I; Bond, S; Welty, R; Du, Y; Yoo, S; Reinhardt, C; Behymer, E; Sperry, V; Kobayashi, N

    2004-02-12

    This project is focused on the development of advanced components and system technologies for secure data transmission on high-speed fiber optic data systems. This work capitalizes on (1) a strong relationship with outstanding faculty at the University of California-Davis who are experts in high speed fiber-optic networks, (2) the realization that code division multiple access (CDMA) is emerging as a bandwidth enhancing technique for fiber optic networks, (3) the realization that CDMA of sufficient complexity forms the basis for almost unbreakable one-time key transmissions, (4) our concepts for superior components for implementing CDMA, (5) our expertise in semiconductor device processing and (6) our Center for Nano and Microtechnology, which is where the majority of the experimental work was done. Here we present a novel device concept, which will push the limits of current technology, and will simultaneously solve system implementation issues by investigating new state-of-the-art fiber technologies. This will enable the development of secure communication systems for the transmission and reception of messages on deployed commercial fiber optic networks, through the CDMA phase encoding of broad bandwidth pulses. CDMA technology has been developed as a multiplexing technology, much like wavelength division multiplexing (WDM) or time division multiplexing (TDM), to increase the potential number of users on a given communication link. A novel application of the techniques created for CDMA is to generate secure communication through physical layer encoding. Physical layer encoding devices are developed which utilize semiconductor waveguides with fast carrier response times to phase encode spectral components of a secure signal. Current commercial technology, most commonly a spatial light modulator, allows phase codes to be changed at rates of only 10's of Hertz ({approx}25ms response). The use of fast (picosecond to nanosecond) carrier dynamics of semiconductors, as

  16. The PLATO IV Communications System.

    ERIC Educational Resources Information Center

    Sherwood, Bruce Arne; Stifle, Jack

    The PLATO IV computer-based educational system contains its own communications hardware and software for operating plasma-panel graphics terminals. Key echoing is performed by the central processing unit: every key pressed at a terminal passes through the entire system before anything appears on the terminal's screen. Each terminal is guaranteed…

  17. 75 FR 74050 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-30

    ... include: Cybersecurity best practices, ISP network protection practices, transition to NG9-1-1, technical..., Associate Chief for Cybersecurity and Communications Reliability Public Safety and Homeland Security Bureau...

  18. Primer Control System Cyber Security Framework and Technical Metrics

    SciTech Connect

    Wayne F. Boyer; Miles A. McQueen

    2008-05-01

    The Department of Homeland Security National Cyber Security Division supported development of a control system cyber security framework and a set of technical metrics to aid owner-operators in tracking control systems security. The framework defines seven relevant cyber security dimensions and provides the foundation for thinking about control system security. Based on the developed security framework, a set of ten technical metrics are recommended that allow control systems owner-operators to track improvements or degradations in their individual control systems security posture.

  19. A Model of Internal Communication in Adaptive Communication Systems.

    ERIC Educational Resources Information Center

    Williams, M. Lee

    A study identified and categorized different types of internal communication systems and developed an applied model of internal communication in adaptive organizational systems. Twenty-one large organizations were selected for their varied missions and diverse approaches to managing internal communication. Individual face-to-face or telephone…

  20. Emerging Security Mechanisms for Medical Cyber Physical Systems.

    PubMed

    Kocabas, Ovunc; Soyata, Tolga; Aktas, Mehmet K

    2016-01-01

    The following decade will witness a surge in remote health-monitoring systems that are based on body-worn monitoring devices. These Medical Cyber Physical Systems (MCPS) will be capable of transmitting the acquired data to a private or public cloud for storage and processing. Machine learning algorithms running in the cloud and processing this data can provide decision support to healthcare professionals. There is no doubt that the security and privacy of the medical data is one of the most important concerns in designing an MCPS. In this paper, we depict the general architecture of an MCPS consisting of four layers: data acquisition, data aggregation, cloud processing, and action. Due to the differences in hardware and communication capabilities of each layer, different encryption schemes must be used to guarantee data privacy within that layer. We survey conventional and emerging encryption schemes based on their ability to provide secure storage, data sharing, and secure computation. Our detailed experimental evaluation of each scheme shows that while the emerging encryption schemes enable exciting new features such as secure sharing and secure computation, they introduce several orders-of-magnitude computational and storage overhead. We conclude our paper by outlining future research directions to improve the usability of the emerging encryption schemes in an MCPS.

  1. Design tools for complex dynamic security systems.

    SciTech Connect

    Byrne, Raymond Harry; Rigdon, James Brian; Rohrer, Brandon Robinson; Laguna, Glenn A.; Robinett, Rush D. III; Groom, Kenneth Neal; Wilson, David Gerald; Bickerstaff, Robert J.; Harrington, John J.

    2007-01-01

    The development of tools for complex dynamic security systems is not a straight forward engineering task but, rather, a scientific task where discovery of new scientific principles and math is necessary. For years, scientists have observed complex behavior but have had difficulty understanding it. Prominent examples include: insect colony organization, the stock market, molecular interactions, fractals, and emergent behavior. Engineering such systems will be an even greater challenge. This report explores four tools for engineered complex dynamic security systems: Partially Observable Markov Decision Process, Percolation Theory, Graph Theory, and Exergy/Entropy Theory. Additionally, enabling hardware technology for next generation security systems are described: a 100 node wireless sensor network, unmanned ground vehicle and unmanned aerial vehicle.

  2. Selecting RMF Controls for National Security Systems

    SciTech Connect

    Witzke, Edward L.

    2015-08-01

    In 2014, the United States Department of Defense started tra nsitioning the way it performs risk management and accreditation of informatio n systems to a process entitled Risk Management Framework for DoD Information Technology or RMF for DoD IT. There are many more security and privacy contro ls (and control enhancements) from which to select in RMF, than there w ere in the previous Information Assurance process. This report is an attempt t o clarify the way security controls and enhancements are selected. After a brief overview and comparison of RMF for DoD I T with the previously used process, this report looks at the determination of systems as National Security Systems (NSS). Once deemed to be an NSS, this report addr esses the categorization of the information system with respect to impact level s of the various security objectives and the selection of an initial baseline o f controls. Next, the report describes tailoring the controls through the use of overl ays and scoping considerations. Finally, the report discusses organizatio n-defined values for tuning the security controls to the needs of the information system.

  3. The Secure Distributed Operating System Design Project

    DTIC Science & Technology

    1988-06-01

    system policy and having only the system manager possess that level. 2.2.2.2.1 Integrity Levels for Data Objects An integrity level could be used for...for all applications in file-based operating systems. Although the file type of object is supported in SDOS, it is only one way of storing data . The...security must not be tampered with; " stable storage - data needed for enforcing security, such as user authentication data , must be stored in a fault

  4. T3: Secure, Scalable, Distributed Data Movement and Remote System Control for Enterprise Level Cyber Security

    SciTech Connect

    Thomas, Gregory S.; Nickless, William K.; Thiede, David R.; Gorton, Ian; Pitre, Bill J.; Christy, Jason E.; Faultersack, Elizabeth M.; Mauth, Jeffery A.

    2009-07-20

    Enterprise level cyber security requires the deployment, operation, and monitoring of many sensors across geographically dispersed sites. Communicating with the sensors to gather data and control behavior is a challenging task when the number of sensors is rapidly growing. This paper describes the system requirements, design, and implementation of T3, the third generation of our transport software that performs this task. T3 relies on open source software and open Internet standards. Data is encoded in MIME format messages and transported via NNTP, which provides scalability. OpenSSL and public key cryptography are used to secure the data. Robustness and ease of development are increased by defining an internal cryptographic API, implemented by modules in C, Perl, and Python. We are currently using T3 in a production environment. It is freely available to download and use for other projects.

  5. Reply to 'Comment on 'Secure direct communication with a quantum one-time-pad''

    SciTech Connect

    Deng Fuguo; Long Guilu

    2005-07-15

    We reply to the preceding comment which focused on whether there exists a quantum privacy amplification technique for purifying the unknown single-photon states transmitted. In this Reply, we will show that quantum privacy amplification is principally possible, and a specific scheme for direct communication protocol based on single photons has been constructed and will be published elsewhere. Then the secure direct quantum communication is secure against the attack strategy in the preceding comment by using quantum privacy amplification directly.

  6. Implementation of an Electronic Media Security System

    SciTech Connect

    Silvers, Kurt L.; Burghard, Brion J.; Skorpik, James R.; Clark, Dave A.

    2005-09-01

    Recent security lapses within the Department of Energy Laboratories prompted the establishment and implementation of additional procedures and training for operations involving classified removable electronic media (CREM) storage. In addition, the definition of CREM has been expanded and the number of CREM has increased significantly. Procedures now require that all CREM be inventoried and accounted for on a weekly basis. Weekly inventories consist of a physical comparison of each item against the reportable inventory listing. Securing and accounting for CREM is a continuous challenge for existing security systems. To address the challenge, Pacific Northwest National Laboratory (PNNL) has developed an automated Electronic Media Security System (EMSS) for a weekly CREM inventory collection and reporting system. The EMSS approach is to tag the CREM with an electronically readable unique identification code and automatically collect data on the inventory in each security container or vault at a user-defined interval and upon detection of an access event; thus eliminating the need for hand-written inventory sheets while allowing automated transfer of the collected inventory data to an electronic reporting system. An electronic log of CREM access events is maintained, providing enhanced accountability for daily/weekly checks, routine audits, and follow-up investigations. The key attributes of the EMSS include improved accountability, reduced risk of human error, improved accuracy and timeliness of inventory data, and reduced costs as a result of man-hour reductions.

  7. Method of Performance-Aware Security of Unicast Communication in Hybrid Satellite Networks

    NASA Technical Reports Server (NTRS)

    Roy-Chowdhury, Ayan (Inventor); Baras, John S. (Inventor)

    2014-01-01

    A method and apparatus utilizes Layered IPSEC (LES) protocol as an alternative to IPSEC for network-layer security including a modification to the Internet Key Exchange protocol. For application-level security of web browsing with acceptable end-to-end delay, the Dual-mode SSL protocol (DSSL) is used instead of SSL. The LES and DSSL protocols achieve desired end-to-end communication security while allowing the TCP and HTTP proxy servers to function correctly.

  8. Windows XP Operating System Security Analysis

    DTIC Science & Technology

    2002-09-01

    organizations. The purpose of this research is to determine if Windows XP, when used as a workstation operating system in domain- based networks, provides...... research is to determine if Windows XP, when used as a workstation operating system in domain based networks, provides adequate security policy

  9. Time reversal communication system

    DOEpatents

    Candy, James V.; Meyer, Alan W.

    2008-12-02

    A system of transmitting a signal through a channel medium comprises digitizing the signal, time-reversing the digitized signal, and transmitting the signal through the channel medium. The channel medium may be air, earth, water, tissue, metal, and/or non-metal.

  10. Advanced imaging communication system

    NASA Technical Reports Server (NTRS)

    Hilbert, E. E.; Rice, R. F.

    1977-01-01

    Key elements of system are imaging and nonimaging sensors, data compressor/decompressor, interleaved Reed-Solomon block coder, convolutional-encoded/Viterbi-decoded telemetry channel, and Reed-Solomon decoding. Data compression provides efficient representation of sensor data, and channel coding improves reliability of data transmission.

  11. The ORBCOMM data communications system

    NASA Technical Reports Server (NTRS)

    Schoen, David C.; Locke, Paul A.

    1993-01-01

    The ORBCOMM system is designed to provide low-cost, two-way data communications for mobile and remote users. The communications system is ideally configured for low data rate applications where communicating devices are geographically dispersed and two-way communications through terrestrial means is cumbersome and not cost effective. The remote terminals use VHF frequencies which allow for the use of very small, low-cost terminals. ORBCOMM has entered into joint development agreements with several large manufacturers of both consumer and industrial electronics to design and build the remote terminals. Based on prototype work, the estimated retail cost of these units will range from $50 to $400 depending on the complexity of the design. Starting in the fall of 1993, ORBCOMM will begin service with a demonstration network consisting of two operating satellites. By the end of 1994, a full operating network of 26 satellites, four Gateway Earth Stations, and a Network Control Center will be in place. The full constellation will provide full coverage of the entire world with greater than 94 percent communications availability for the continental U.S. This paper describes the ORBCOMM system, the technology used in its implementation, and its applications.

  12. Atmospheric Optical Communication Systems.

    DTIC Science & Technology

    1981-02-01

    Tnteral system noise due to dark current id is Oven by . 1d = 2qGrB"" (2-9) Dark current is due to detecor biasing in some instances, and in somue...8217 without extansive pro- gr-=:ing exer’ence. Although. the znodel is designed to be Lteracdve, slight mod-.- i~cadons winl ezw :&31 r~ing of the progrsm

  13. Rapidly deployable emergency communication system

    DOEpatents

    Gladden, Charles A.; Parelman, Martin H.

    1979-01-01

    A highly versatile, highly portable emergency communication system which permits deployment in a very short time to cover both wide areas and distant isolated areas depending upon mission requirements. The system employs a plurality of lightweight, fully self-contained repeaters which are deployed within the mission area to provide communication between field teams, and between each field team and a mobile communication control center. Each repeater contains a microcomputer controller, the program for which may be changed from the control center by the transmission of digital data within the audible range (300-3,000 Hz). Repeaters are accessed by portable/mobile transceivers, other repeaters, and the control center through the transmission and recognition of digital data code words in the subaudible range.

  14. Exploration of Best-Fit Solution for Harbormaster Security Information Sharing Systems

    DTIC Science & Technology

    2012-06-01

    enterprises (e.g., trucking industry ) that lack motivation to provide funding for improved communications infrastructure. Future research efforts may include...e.g., trucking industry ) that lack motivation to provide funding for improved communications infrastructure. Future research efforts may include...SECURITY ........................................................................11  D.  BEST PRACTICES IN HUMAN FACTORS DESIGN OF INFORMATION SYSTEMS

  15. Enabling Secure XMPP Communications in Federated IoT Clouds Through XEP 0027 and SAML/SASL SSO.

    PubMed

    Celesti, Antonio; Fazio, Maria; Villari, Massimo

    2017-02-07

    Nowadays, in the panorama of Internet of Things (IoT), finding a right compromise between interactivity and security is not trivial at all. Currently, most of pervasive communication technologies are designed to work locally. As a consequence, the development of large-scale Internet services and applications is not so easy for IoT Cloud providers. The main issue is that both IoT architectures and services have started as simple but they are becoming more and more complex. Consequently, the web service technology is often inappropriate. Recently, many operators in both academia and industry fields are considering the possibility to adopt the eXtensible Messaging and Presence Protocol (XMPP) for the implementation of IoT Cloud communication systems. In fact, XMPP offers many advantages in term of real-time capabilities, efficient data distribution, service discovery and inter-domain communication compared to other technologies. Nevertheless, the protocol lacks of native security, data confidentiality and trustworthy federation features. In this paper, considering an XMPP-based IoT Cloud architectural model, we discuss how can be possible to enforce message signing/encryption and Single-Sign On (SSO) authentication respectively for secure inter-module and inter-domain communications in a federated environment. Experiments prove that security mechanisms introduce an acceptable overhead, considering the obvious advantages achieved in terms of data trustiness and privacy.

  16. Enabling Secure XMPP Communications in Federated IoT Clouds Through XEP 0027 and SAML/SASL SSO

    PubMed Central

    Celesti, Antonio; Fazio, Maria; Villari, Massimo

    2017-01-01

    Nowadays, in the panorama of Internet of Things (IoT), finding a right compromise between interactivity and security is not trivial at all. Currently, most of pervasive communication technologies are designed to work locally. As a consequence, the development of large-scale Internet services and applications is not so easy for IoT Cloud providers. The main issue is that both IoT architectures and services have started as simple but they are becoming more and more complex. Consequently, the web service technology is often inappropriate. Recently, many operators in both academia and industry fields are considering the possibility to adopt the eXtensible Messaging and Presence Protocol (XMPP) for the implementation of IoT Cloud communication systems. In fact, XMPP offers many advantages in term of real-time capabilities, efficient data distribution, service discovery and inter-domain communication compared to other technologies. Nevertheless, the protocol lacks of native security, data confidentiality and trustworthy federation features. In this paper, considering an XMPP-based IoT Cloud architectural model, we discuss how can be possible to enforce message signing/encryption and Single-Sign On (SSO) authentication respectively for secure inter-module and inter-domain communications in a federated environment. Experiments prove that security mechanisms introduce an acceptable overhead, considering the obvious advantages achieved in terms of data trustiness and privacy. PMID:28178214

  17. Secure alignment of coordinate systems using quantum correlation

    NASA Astrophysics Data System (ADS)

    Rezazadeh, F.; Mani, A.; Karimipour, V.

    2017-08-01

    We show that two parties far apart can use shared entangled states and classical communication to align their coordinate systems with a very high fidelity. Moreover, compared with previous methods proposed for such a task, i.e., sending parallel or antiparallel pairs or groups of spin states, our method has the extra advantages of using single-qubit measurements and also being secure, so that third parties do not extract any information about the aligned coordinate system established between the two parties. The latter property is important in many other quantum information protocols in which measurements inevitably play a significant role.

  18. Ultramicrowave communications system, phase 2

    NASA Technical Reports Server (NTRS)

    1980-01-01

    Communications system design was completed and reviewed. Minor changes were made in order to make it more cost effective and to increase design flexibility. System design activities identified the techniques and procedures to generate and monitor high data rate test signals. Differential bi-phase demodulation is the proposed method for this system. The mockup and packaging designs were performed, and component layout and interconnection constraints were determined, as well as design drawings for dummy parts of the system. The possibility of adding a low cost option to the transceiver system was studied. The communications program has the advantage that new technology signal processing devices can be readily interfaced with the existing radio frequency subsystem to produce a short range radar.

  19. Odyssey personal communications satellite system

    NASA Astrophysics Data System (ADS)

    Spitzer, Christopher J.

    The spectacular growth of cellular telephone networks has proved the demand for personal communications. Large regions of the world are too sparsely populated to be economically served by terrestrial cellular communications. Since satellites are well suited to this application, TRW filed with the FCC on May 31, 1993 for the Odyssey construction permit. Odyssey will provide high quality wireless communication services worldwide from satellites. These services will include: voice, data, paging, and messaging. Odyssey will be an economical approach to providing communications. A constellation of 12 satellites will be orbited in three, 55 deg. inclined planes at an altitude of 10,354 km to provide continuous coverage of designated regions. Two satellites will be visible anywhere in the world at all times. This dual visibility leads to high line-of-sight elevation angles, minimizing obstructions by terrain, trees and buildings. Each satellite generates a multibeam antenna pattern that divides its coverage area into a set of contiguous cells. The communications system employs spread spectrum CDMA on both the uplinks and downlinks. This signaling method permits band sharing with other systems and applications. Signal processing is accomplished on the ground at the satellite's 'Gateway' stations. The 'bent pipe' transponders accommodates different regional standards, as well as signaling changes over time. The low power Odyssey handset will be cellular compatible. Multipath fade protection is provided in the handset.

  20. Odyssey personal communications satellite system

    NASA Technical Reports Server (NTRS)

    Spitzer, Christopher J.

    1993-01-01

    The spectacular growth of cellular telephone networks has proved the demand for personal communications. Large regions of the world are too sparsely populated to be economically served by terrestrial cellular communications. Since satellites are well suited to this application, TRW filed with the FCC on May 31, 1993 for the Odyssey construction permit. Odyssey will provide high quality wireless communication services worldwide from satellites. These services will include: voice, data, paging, and messaging. Odyssey will be an economical approach to providing communications. A constellation of 12 satellites will be orbited in three, 55 deg. inclined planes at an altitude of 10,354 km to provide continuous coverage of designated regions. Two satellites will be visible anywhere in the world at all times. This dual visibility leads to high line-of-sight elevation angles, minimizing obstructions by terrain, trees and buildings. Each satellite generates a multibeam antenna pattern that divides its coverage area into a set of contiguous cells. The communications system employs spread spectrum CDMA on both the uplinks and downlinks. This signaling method permits band sharing with other systems and applications. Signal processing is accomplished on the ground at the satellite's 'Gateway' stations. The 'bent pipe' transponders accommodates different regional standards, as well as signaling changes over time. The low power Odyssey handset will be cellular compatible. Multipath fade protection is provided in the handset.

  1. A security architecture for interconnecting health information systems.

    PubMed

    Gritzalis, Dimitris; Lambrinoudakis, Costas

    2004-03-31

    Several hereditary and other chronic diseases necessitate continuous and complicated health care procedures, typically offered in different, often distant, health care units. Inevitably, the medical records of patients suffering from such diseases become complex, grow in size very fast and are scattered all over the units involved in the care process, hindering communication of information between health care professionals. Web-based electronic medical records have been recently proposed as the solution to the above problem, facilitating the interconnection of the health care units in the sense that health care professionals can now access the complete medical record of the patient, even if it is distributed in several remote units. However, by allowing users to access information from virtually anywhere, the universe of ineligible people who may attempt to harm the system is dramatically expanded, thus severely complicating the design and implementation of a secure environment. This paper presents a security architecture that has been mainly designed for providing authentication and authorization services in web-based distributed systems. The architecture has been based on a role-based access scheme and on the implementation of an intelligent security agent per site (i.e. health care unit). This intelligent security agent: (a). authenticates the users, local or remote, that can access the local resources; (b). assigns, through temporary certificates, access privileges to the authenticated users in accordance to their role; and (c). communicates to other sites (through the respective security agents) information about the local users that may need to access information stored in other sites, as well as about local resources that can be accessed remotely.

  2. Multiple Object Based RFID System Using Security Level

    NASA Astrophysics Data System (ADS)

    Kim, Jiyeon; Jung, Jongjin; Ryu, Ukjae; Ko, Hoon; Joe, Susan; Lee, Yongjun; Kim, Boyeon; Chang, Yunseok; Lee, Kyoonha

    2007-12-01

    RFID systems are increasingly applied for operational convenience in wide range of industries and individual life. However, it is uneasy for a person to control many tags because common RFID systems have the restriction that a tag used to identify just a single object. In addition, RFID systems can make some serious problems in violation of privacy and security because of their radio frequency communication. In this paper, we propose a multiple object RFID tag which can keep multiple object identifiers for different applications in a same tag. The proposed tag allows simultaneous access for their pair applications. We also propose an authentication protocol for multiple object tag to prevent serious problems of security and privacy in RFID applications. Especially, we focus on efficiency of the authentication protocol by considering security levels of applications. In the proposed protocol, the applications go through different authentication procedures according to security level of the object identifier stored in the tag. We implemented the proposed RFID scheme and made experimental results about efficiency and stability for the scheme.

  3. Robust Networking Architecture and Secure Communication Scheme for Heterogeneous Wireless Sensor Networks

    ERIC Educational Resources Information Center

    McNeal, McKenzie, III.

    2012-01-01

    Current networking architectures and communication protocols used for Wireless Sensor Networks (WSNs) have been designed to be energy efficient, low latency, and long network lifetime. One major issue that must be addressed is the security in data communication. Due to the limited capabilities of low cost and small sized sensor nodes, designing…

  4. Robust Networking Architecture and Secure Communication Scheme for Heterogeneous Wireless Sensor Networks

    ERIC Educational Resources Information Center

    McNeal, McKenzie, III.

    2012-01-01

    Current networking architectures and communication protocols used for Wireless Sensor Networks (WSNs) have been designed to be energy efficient, low latency, and long network lifetime. One major issue that must be addressed is the security in data communication. Due to the limited capabilities of low cost and small sized sensor nodes, designing…

  5. 77 FR 48153 - Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-13

    ...In accordance with the Federal Advisory Committee Act, this notice advises interested persons that the Federal Communications Commission's (FCC or Commission) Communications Security, Reliability, and Interoperability Council (CSRIC) will hold its fifth meeting. The CSRIC will vote on recommendations from several Working Groups and receive progress reports from the remaining Working Groups.

  6. 77 FR 35336 - Privacy and Security of Information Stored on Mobile Communications Devices

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-13

    ... COMMISSION 47 CFR Part 64 Privacy and Security of Information Stored on Mobile Communications Devices AGENCY... information stored on their users' mobile communications devices. In addition, the document seeks comment on... business practices have evolved dramatically. The devices consumers use to access mobile wireless networks...

  7. Blue Rose perimeter defense and security system

    NASA Astrophysics Data System (ADS)

    Blackmon, F.; Pollock, J.

    2006-05-01

    An in-ground perimeter security system has been developed by the Naval Undersea Warfare Center Division Newport based upon fiber optic sensor technology. The system, called Blue Rose, exploits the physical phenomenon of Rayleigh optical scattering, which occurs naturally in optical fibers used traditionally for Optical Time Domain Reflectometry techniques to detect sound and vibration transmitted by intruders such as people walking or running and moving vehicles near the sensor. The actual sensor is a single-mode optical fiber with an elastomeric coating that is buried in the ground. A long coherence length laser is used to transmit encoded light down the fiber. Minute changes in the fiber in response to the intrusion produce phase changes to the returning backscattered light signal. The return light signal contains both the actual intrusion sound and the location information of where along the fiber the intrusion has occurred. A digital, in-ground, Blue Rose system has been built and is now operational at NUWC. Due to the low cost of the optical fiber sensor and unique benefits of the system, the Blue Rose system provides an advantage in long perimeter or border security applications and also reduces security manning requirements and therefore overall cost for security.

  8. 49 CFR 236.1033 - Communications and security requirements.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... components may be temporarily displayed to allow visual verification. When encrypted keys or key components... exceeding the security strength required to protect the data as defined in the railroad's PTCSP and required...

  9. Communications satellite systems capacity analysis

    NASA Technical Reports Server (NTRS)

    Browne, L.; Hines, T.; Tunstall, B.

    1982-01-01

    Analog and digital modulation techniques are compared with regard to efficient use of the geostationary orbit by communications satellites. Included is the definition of the baseline systems (both space and ground segments), determination of interference susceptibility, calculation of orbit spacing, and evaluation of relative costs. It is assumed that voice or TV is communicated at 14/11 GHz using either FM or QPSK modulation. Both the Fixed-Satellite Service and the Broadcasting-Satellite Service are considered. For most of the cases examined the digital approach requires a satellite spacing less than or equal to that required by the analog approach.

  10. The Secure, Transportable, Autonomous Reactor System

    SciTech Connect

    Brown, N.W.; Hassberger, J.A.; Smith, C.; Carelli, M.; Greenspan, E.; Peddicord, K.L.; Stroh, K.; Wade, D.C.; Hill, R.N.

    1999-05-27

    The Secure, Transportable, Autonomous Reactor (STAR) system is a development architecture for implementing a small nuclear power system, specifically aimed at meeting the growing energy needs of much of the developing world. It simultaneously provides very high standards for safety, proliferation resistance, ease and economy of installation, operation, and ultimate disposition. The STAR system accomplishes these objectives through a combination of modular design, factory manufacture, long lifetime without refueling, autonomous control, and high reliability.

  11. The HTV Proximity Communication System

    NASA Astrophysics Data System (ADS)

    Harada, Motoyuki; Takahashi, Tetsuo; Tanaka, Tetsuo

    2002-01-01

    National Space Development Agency of Japan (NASDA) is developing the H-II Transfer Vehicle (HTV) as an unmanned logistic support vehicle for the International Space Station (ISS). The HTV, which is launched by the H-IIA rocket, transports both pressurized and un-pressurized cargoes to the ISS, reloads disposal items from the ISS and performs destructive reentry over ocean area. NASDA plans the first flight of HTV in 2005 for demonstration. The HTV will contribute the ISS assembly and logistic re-supply operations with international commonality. For unmanned vehicle operation, communication link is critical with commanding and control, especially in proximity region to the ISS. As for the HTV operation, NASDA is developing dedicated communication system installed on the Japanese Experiment Module (JEM) of the ISS, which is called the Proximity Communication System (PROX). The HTV receives commands and transmits telemetry data through the PROX in its proximity operation to the ISS. To achieve this, the PROX can communicate with the HTV on its nominal trajectory within 23km of the ISS. Especially within 3km of the ISS, the PROX has capability to perform omni-directional communication to the HTV. The PROX also has GPS receiver and send GPS data to the HTV to support the HTV navigation for relative GPS navigation used in "far" range (500m away from the ISS). In addition to the above fundamental functions, the PROX has a capability of range and range-rate measurement between the ISS and the HTV by the pseudo noise (PN) code epoch and the Doppler shift frequency. This provides a reference data independent of "main" navigation methods (rendezvous sensor navigation or GPS navigation) of the HTV. The PROX also assists the ISS crew with its commanding device, called the Hardware Command Panel (HCP), to issue time-dependent safety-related critical commands for HTV berthing/un-berthing operation. When a failure occurs somewhere on "communication path" from the PROX Base Band

  12. Cyber security with radio frequency interferences mitigation study for satellite systems

    NASA Astrophysics Data System (ADS)

    Wang, Gang; Wei, Sixiao; Chen, Genshe; Tian, Xin; Shen, Dan; Pham, Khanh; Nguyen, Tien M.; Blasch, Erik

    2016-05-01

    Satellite systems including the Global Navigation Satellite System (GNSS) and the satellite communications (SATCOM) system provide great convenience and utility to human life including emergency response, wide area efficient communications, and effective transportation. Elements of satellite systems incorporate technologies such as navigation with the global positioning system (GPS), satellite digital video broadcasting, and information transmission with a very small aperture terminal (VSAT), etc. The satellite systems importance is growing in prominence with end users' requirement for globally high data rate transmissions; the cost reduction of launching satellites; development of smaller sized satellites including cubesat, nanosat, picosat, and femtosat; and integrating internet services with satellite networks. However, with the promising benefits, challenges remain to fully develop secure and robust satellite systems with pervasive computing and communications. In this paper, we investigate both cyber security and radio frequency (RF) interferences mitigation for satellite systems, and demonstrate that they are not isolated. The action space for both cyber security and RF interferences are firstly summarized for satellite systems, based on which the mitigation schemes for both cyber security and RF interferences are given. A multi-layered satellite systems structure is provided with cross-layer design considering multi-path routing and channel coding, to provide great security and diversity gains for secure and robust satellite systems.

  13. The PALAPA space communication system

    NASA Astrophysics Data System (ADS)

    Bratahalim, S.; Portmann, P. A.

    Indonesia's space communication system is discussed. The country's social objectives are reviewed, and the PALAPA satellite system is described, including the history of its growth and the types of satellites it uses. The reevaluation of TWTA lifespan and of on-board fuel reserves is described, as is a recent examination of power subsystem performance. The choice of launch vehicle is discussed in terms of the cost and risks involved, with the constraints on Delta and STS summarized.

  14. Global services systems - Space communication

    NASA Technical Reports Server (NTRS)

    Shepphird, F. H.; Wolbers, H. L.

    1979-01-01

    The requirements projected to the year 2000 for space-based global service systems, including both personal communications and innovative services, are developed based on historic trends and anticipated worldwide demographic and economic growth patterns. The growing demands appear to be best satisfied by developing larger, more sophisticated space systems in order to reduce the size, complexity, and expense of ground terminals. The availability of low-cost ground terminals will, in turn, further stimulate the generation of new services and new customers.

  15. Underground Test Area Activity Communication/Interface Plan, Nevada National Security Site, Nevada, Revision 0

    SciTech Connect

    Farnham, Irene; Rehfeldt, Kenneth

    2016-10-01

    The purpose of this plan is to provide guidelines for effective communication and interfacing between Underground Test Area (UGTA) Activity participants, including the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO) and its contractors. This plan specifically establishes the following: • UGTA mission, vision, and core values • Roles and responsibilities for key personnel • Communication with stakeholders • Guidance in key interface areas • Communication matrix

  16. Privacy and Security in Computer Systems.

    ERIC Educational Resources Information Center

    Liu, Yung-Ying

    Materials in the Library of Congress (LC) concerned with the topic of privacy and security in computer systems are listed in this "LC Science Tracer Bullet." The guide includes a total of 59 sources: (1) an introductory source; (2) relevant LC subject headings; (3) basic and additional texts; (4) handbooks, encyclopedias, and…

  17. Securing Wireless Communications of the Internet of Things from the Physical Layer, An Overview

    NASA Astrophysics Data System (ADS)

    Zhang, Junqing; Duong, Trung; Woods, Roger; Marshall, Alan

    2017-08-01

    The security of the Internet of Things (IoT) is receiving considerable interest as the low power constraints and complexity features of many IoT devices are limiting the use of conventional cryptographic techniques. This article provides an overview of recent research efforts on alternative approaches for securing IoT wireless communications at the physical layer, specifically the key topics of key generation and physical layer encryption. These schemes can be implemented and are lightweight, and thus offer practical solutions for providing effective IoT wireless security. Future research to make IoT-based physical layer security more robust and pervasive is also covered.

  18. Chaos and Cryptography: A new dimension in secure communications

    NASA Astrophysics Data System (ADS)

    Banerjee, Santo; Kurths, J.

    2014-06-01

    This issue is a collection of contributions on recent developments and achievements of cryptography and communications using chaos. The various contributions report important and promising results such as synchronization of networks and data transmissions; image cipher; optical and TDMA communications, quantum keys etc. Various experiments and applications such as FPGA, smartphone cipher, semiconductor lasers etc, are also included.

  19. Biosensor Systems for Homeland Security

    SciTech Connect

    Bruckner-Lea, Cindy J.

    2004-05-30

    The detection of biological agents is important to minimize the effects of pathogens that can harm people, livestock, or plants. In addition to pathogens distributed by man, there is a need to detect natural outbreaks. Recent outbreaks of SARS, mad cow disease, pathogenic E. coli and Salmonella, as well as the discovery of letters filled with anthrax spores have highlighted the need for biosensor systems to aid in prevention, early warning, response, and recovery. Rapid detection can be used to prevent exposure; and detection on a longer timescale can be used to minimize exposure, define treatment, and determine whether contaminated areas are clean enough for reuse. The common types of biological agents of concern include bacteria, spores, and viruses (Figure 1). From a chemist’s point of view, pathogens are essentially complex packages of chemicals that are assembled into organized packages with somewhat predictable physical characteristics such as size and shape. Pathogen detection methods can be divided into three general approaches: selective detection methods for specific identification such as nucleic acid analysis and structural recognition, semi-selective methods for broad-spectrum detection (e.g. physical properties, metabolites, lipids), and function-based methods (e.g. effect of the pathogen on organisms, tissues, or cells). The requirements for biodetection systems depend upon the application. While detect to warn sensors may require rapid detection on the order one minute, detection times of many minutes or hours may be suitable for determining appropriate treatments or for forensic analysis. Of course ideal sensor systems will meet the needs of many applications, and will be sensitive, selective, rapid, and simultaneously detect all agents of concern. They will also be reliable with essentially no false negatives or false positives, small, easy to use, and low cost with minimal consumables.

  20. QuickCash: Secure Transfer Payment Systems

    PubMed Central

    Alhothaily, Abdulrahman; Alrawais, Arwa; Song, Tianyi; Lin, Bin; Cheng, Xiuzhen

    2017-01-01

    Payment systems play a significant role in our daily lives. They are an important driver of economic activities and a vital part of the banking infrastructure of any country. Several current payment systems focus on security and reliability but pay less attention to users’ needs and behaviors. For example, people may share their bankcards with friends or relatives to withdraw money for various reasons. This behavior can lead to a variety of privacy and security issues since the cardholder has to share a bankcard and other sensitive information such as a personal identification number (PIN). In addition, it is commonplace that cardholders may lose their cards, and may not be able to access their accounts due to various reasons. Furthermore, transferring money to an individual who has lost their bankcard and identification information is not a straightforward task. A user-friendly person-to-person payment system is urgently needed to perform secure and reliable transactions that benefit from current technological advancements. In this paper, we propose two secure fund transfer methods termed QuickCash Online and QuickCash Offline to transfer money from peer to peer using the existing banking infrastructure. Our methods provide a convenient way to transfer money quickly, and they do not require using bank cards or any identification card. Unlike other person-to-person payment systems, the proposed methods do not require the receiving entity to have a bank account, or to perform any registration procedure. We implement our QuickCash payment systems and analyze their security strengths and properties. PMID:28608846

  1. QuickCash: Secure Transfer Payment Systems.

    PubMed

    Alhothaily, Abdulrahman; Alrawais, Arwa; Song, Tianyi; Lin, Bin; Cheng, Xiuzhen

    2017-06-13

    Payment systems play a significant role in our daily lives. They are an important driver of economic activities and a vital part of the banking infrastructure of any country. Several current payment systems focus on security and reliability but pay less attention to users' needs and behaviors. For example, people may share their bankcards with friends or relatives to withdraw money for various reasons. This behavior can lead to a variety of privacy and security issues since the cardholder has to share a bankcard and other sensitive information such as a personal identification number (PIN). In addition, it is commonplace that cardholders may lose their cards, and may not be able to access their accounts due to various reasons. Furthermore, transferring money to an individual who has lost their bankcard and identification information is not a straightforward task. A user-friendly person-to-person payment system is urgently needed to perform secure and reliable transactions that benefit from current technological advancements. In this paper, we propose two secure fund transfer methods termed QuickCash Online and QuickCash Offline to transfer money from peer to peer using the existing banking infrastructure. Our methods provide a convenient way to transfer money quickly, and they do not require using bank cards or any identification card. Unlike other person-to-person payment systems, the proposed methods do not require the receiving entity to have a bank account, or to perform any registration procedure. We implement our QuickCash payment systems and analyze their security strengths and properties.

  2. Adaptive security systems -- Combining expert systems with adaptive technologies

    SciTech Connect

    Argo, P.; Loveland, R.; Anderson, K.

    1997-09-01

    The Adaptive Multisensor Integrated Security System (AMISS) uses a variety of computational intelligence techniques to reason from raw sensor data through an array of processing layers to arrive at an assessment for alarm/alert conditions based on human behavior within a secure facility. In this paper, the authors give an overview of the system and briefly describe some of the major components of the system. This system is currently under development and testing in a realistic facility setting.

  3. Quantum Secure Direct Communication in a noisy environment: Theory and Experiment

    NASA Astrophysics Data System (ADS)

    Long, Gui Lu

    Quantum communication holds promise for absolutely security in secret message transmission. Quantum secure direct communication (QSDC) is an important branch of the quantum communication in which secret messages are sent directly over a quantum channel with security[Phys. Rev. A 65 , 032302 (2002)]. QSDC offers higher security and is instantaneous in communication, and is a great improvement to the classical communication mode. It is also a powerful basic quantum communication primitive for constructing many other quantum communication tasks such as quantum bidding, quantum signature and quantum dialogue and so on. Since the first QSDC protocol proposed in 2000, it has become one of the extensive research focuses. In this talk, the basic ideas of QSDC will be reviewed, and major QSDC protocols will be described, such as the efficient-QSDC protocol, the two-step QSDC protocol, the one-time-pad QSDC protocol, the high-dimensional QSDC protocol and so on. Experimental progress is also developing steadily, and will also be reviewed. In particular, the quantum one-time-pad QSDC protocol has recently been successfully demonstrated experimentally[arXiv:1503.00451]. Work supported by China National Natural Science Foundation, the Ministry of Science and Technology of China.

  4. Control Systems Cyber Security:Defense in Depth Strategies

    SciTech Connect

    David Kuipers; Mark Fabro

    2006-05-01

    Information infrastructures across many public and private domains share several common attributes regarding IT deployments and data communications. This is particularly true in the control systems domain. A majority of the systems use robust architectures to enhance business and reduce costs by increasing the integration of external, business, and control system networks. However, multi-network integration strategies often lead to vulnerabilities that greatly reduce the security of an organization, and can expose mission-critical control systems to cyber threats. This document provides guidance and direction for developing ‘defense-in-depth’ strategies for organizations that use control system networks while maintaining a multi-tier information architecture that requires: Maintenance of various field devices, telemetry collection, and/or industrial-level process systems Access to facilities via remote data link or modem Public facing services for customer or corporate operations A robust business environment that requires connections among the control system domain, the external Internet, and other peer organizations.

  5. 8 CFR 103.34 - Security of records systems.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 8 Aliens and Nationality 1 2010-01-01 2010-01-01 false Security of records systems. 103.34 Section 103.34 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS POWERS AND DUTIES; AVAILABILITY OF RECORDS § 103.34 Security of records systems. The security of records...

  6. 8 CFR 103.34 - Security of records systems.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 8 Aliens and Nationality 1 2011-01-01 2011-01-01 false Security of records systems. 103.34 Section 103.34 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS POWERS AND DUTIES; AVAILABILITY OF RECORDS § 103.34 Security of records systems. The security of records...

  7. 28 CFR 700.24 - Security of systems of records.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Security of systems of records. 700.24... Records Under the Privacy Act of 1974 § 700.24 Security of systems of records. (a) The Office Administrator or Security Officer shall be responsible for issuing regulations governing the security of...

  8. 28 CFR 700.24 - Security of systems of records.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 28 Judicial Administration 2 2011-07-01 2011-07-01 false Security of systems of records. 700.24... Records Under the Privacy Act of 1974 § 700.24 Security of systems of records. (a) The Office Administrator or Security Officer shall be responsible for issuing regulations governing the security of...

  9. Secured Optical Communications Using Quantum Entangled Two-Photon Transparency Modulation

    NASA Technical Reports Server (NTRS)

    Kojima, Jun (Inventor); Nguyen, Quang-Viet (Inventor); Lekki, John (Inventor)

    2015-01-01

    A system and method is disclosed wherein optical signals are coded in a transmitter by tuning or modulating the interbeam delay time (which modulates the fourth-order coherence) between pairs of entangled photons. The photon pairs are either absorbed or not absorbed (transparent) by an atomic or molecular fluorescer in a receiver, depending on the inter-beam delay that is introduced in the entangled photon pairs. Upon the absorption, corresponding fluorescent optical emissions follow at a certain wavelength, which are then detected by a photon detector. The advantage of the disclosed system is that it eliminates a need of a coincidence counter to realize the entanglement-based secure optical communications because the absorber acts as a coincidence counter for entangled photon pairs.

  10. 17 CFR 230.167 - Communications in connection with certain registered offerings of asset-backed securities.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Communications in connection... General § 230.167 Communications in connection with certain registered offerings of asset-backed securities. Preliminary Note: This section is available only to communications in connection with certain...

  11. Security threat assessment of an Internet security system using attack tree and vague sets.

    PubMed

    Chang, Kuei-Hu

    2014-01-01

    Security threat assessment of the Internet security system has become a greater concern in recent years because of the progress and diversification of information technology. Traditionally, the failure probabilities of bottom events of an Internet security system are treated as exact values when the failure probability of the entire system is estimated. However, security threat assessment when the malfunction data of the system's elementary event are incomplete--the traditional approach for calculating reliability--is no longer applicable. Moreover, it does not consider the failure probability of the bottom events suffered in the attack, which may bias conclusions. In order to effectively solve the problem above, this paper proposes a novel technique, integrating attack tree and vague sets for security threat assessment. For verification of the proposed approach, a numerical example of an Internet security system security threat assessment is adopted in this paper. The result of the proposed method is compared with the listing approaches of security threat assessment methods.

  12. Secure Mobile Distributed File System (MDFS)

    DTIC Science & Technology

    2011-03-01

    NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS SECURE MOBILE DISTRIBUTED FILE SYSTEM ( MDFS ) by Scott Huchton March 2011 Thesis Co-Advisors...Distributed File System ( MDFS ) Scott Huchton Naval Postgraduate School Monterey, CA 93943 Department of the Navy Approved for public release...demonstrate a functional version of MDFS on Android hardware. Due to the device’s limited resources, there are some issues that must be explored before MDFS

  13. The enhancement of security in healthcare information systems.

    PubMed

    Liu, Chia-Hui; Chung, Yu-Fang; Chen, Tzer-Shyong; Wang, Sheng-De

    2012-06-01

    With the progress and the development of information technology, the internal data in medical organizations have become computerized and are further established the medical information system. Moreover, the use of the Internet enhances the information communication as well as affects the development of the medical information system that a lot of medical information is transmitted with the Internet. Since there is a network within another network, when all networks are connected together, they will form the "Internet". For this reason, the Internet is considered as a high-risk and public environment which is easily destroyed and invaded so that a relevant protection is acquired. Besides, the data in the medical network system are confidential that it is necessary to protect the personal privacy, such as electronic patient records, medical confidential information, and authorization-controlled data in the hospital. As a consequence, a medical network system is considered as a network requiring high security that excellent protections and managerial strategies are inevitable to prevent illegal events and external attacks from happening. This study proposes secure medical managerial strategies being applied to the network environment of the medical organization information system so as to avoid the external or internal information security events, allow the medical system to work smoothly and safely that not only benefits the patients, but also allows the doctors to use it more conveniently, and further promote the overall medical quality. The objectives could be achieved by preventing from illegal invasion or medical information being stolen, protecting the completeness and security of medical information, avoiding the managerial mistakes of the internal information system in medical organizations, and providing the highly-reliable medical information system.

  14. Tactical Automated Security System (TASS) operational concept field evaluation results

    SciTech Connect

    Lowe, D.; Vinkels, G.

    1995-12-31

    The worldwide quick reaction deployment concept for the Tactical Automated Security System (TASS) was demonstrated to have great value in a base defense operational exercise. TASS equipment was deployed and used as part of the Foal Eagle 94 exercise at Kunsan AB, Korea. The TASS functions of detection, data communication, annunciation, assessment and portable power were evaluated using prototype equipment. The results of the TASS operation during the exercise was very impressive. The friendly forces quickly incorporated the TASS equipment into their defensive operations and were able to intercept and neutralize approximately 80% of the aggressor force penetration attempts at the defensive perimeter.

  15. Security middleware infrastructure for DICOM images in health information systems.

    PubMed

    Kallepalli, Vijay N V; Ehikioya, Sylvanus A; Camorlinga, Sergio; Rueda, Jose A

    2003-12-01

    In health care, it is mandatory to maintain the privacy and confidentiality of medical data. To achieve this, a fine-grained access control and an access log for accessing medical images are two important aspects that need to be considered in health care systems. Fine-grained access control provides access to medical data only to authorized persons based on priority, location, and content. A log captures each attempt to access medical data. This article describes an overall middleware infrastructure required for secure access to Digital Imaging and Communication in Medicine (DICOM) images, with an emphasis on access control and log maintenance. We introduce a hybrid access control model that combines the properties of two existing models. A trust relationship between hospitals is used to make the hybrid access control model scalable across hospitals. We also discuss events that have to be logged and where the log has to be maintained. A prototype of security middleware infrastructure is implemented.

  16. Short-range communication system

    NASA Technical Reports Server (NTRS)

    Alhorn, Dean C. (Inventor); Howard, David E. (Inventor); Smith, Dennis A. (Inventor)

    2012-01-01

    A short-range communication system includes an antenna, a transmitter, and a receiver. The antenna is an electrical conductor formed as a planar coil with rings thereof being uniformly spaced. The transmitter is spaced apart from the plane of the coil by a gap. An amplitude-modulated and asynchronous signal indicative of a data stream of known peak amplitude is transmitted into the gap. The receiver detects the coil's resonance and decodes same to recover the data stream.

  17. 33 CFR 127.1111 - Communication systems.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 2 2013-07-01 2013-07-01 false Communication systems. 127.1111... systems. (a) The marine transfer area for LHG must possess a communication system that enables continuous... in charge of transfer for the facility. (b) The communication system required by paragraph (a) of...

  18. 33 CFR 127.1111 - Communication systems.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Communication systems. 127.1111... systems. (a) The marine transfer area for LHG must possess a communication system that enables continuous... in charge of transfer for the facility. (b) The communication system required by paragraph (a) of...

  19. Secure Communications Processor STOP Release 2.1.

    DTIC Science & Technology

    1985-09-23

    obtained through descriptors. Descriptors contain the logical access permissions (e.g., read, write, execute) and the necessary data to map a virtual ... reference to a physical reference. The logical access permissions are those that are allowed based on the security attributes of the subject and the

  20. Communications Security: A Timeless Requirement While Conducting Warfare

    DTIC Science & Technology

    2012-04-10

    the European theater, such as the events surrounding the capturing of the German Engima machine and how the Allies exploited this information. I...8 As technology improved, imaginative solutions, such as the Engima and the Navajo code, came along to assist people with securing information

  1. Security audit for embedded avionics systems

    NASA Astrophysics Data System (ADS)

    Rao, K. N.

    The design of security audit subsystems for real-time embedded avionics systems is described. The selection criteria of auditable events and the design of the audit functions are described. The data storage requirements and the data compression features of embedded avionics systems are analyzed. Two data compression algorithms applicable to avionics systems are described. Huffman encoding is optimal, but Fibonacci encoding is shown to be nearly optimal and better suited for airborne avionics systems. The memory capacity needed for audit data storage is computed for typical avionics missions.

  2. Hacker tracking Security system for HMI

    NASA Astrophysics Data System (ADS)

    Chauhan, Rajeev Kumar

    2011-12-01

    Conventional Supervisory control and data Acquisition (SCADA) systems use PC, notebook, thin client, and PDA as a Client. Nowadays the Process Industries are following multi shift system that's why multi- client of different category have to work at a single human Machine Interface (HMI). They may hack the HMI Display and change setting of the other client. This paper introduces a Hacker tracking security (HTS) System for HMI. This is developed by using the conventional and Biometric authentication. HTS system is developed by using Numeric passwords, Smart card, biometric, blood flow and Finger temperature. This work is also able to identify the hackers.

  3. PREFACE: 1st International Conference on Sensing for Industry, Control, Communication & Security Technologies

    NASA Astrophysics Data System (ADS)

    Shuja Syed, Ahmed

    2013-12-01

    The 1st International Conference on Sensing for Industry, Control, Communication & Security Technologies (ICSICCST-2013), took place in Karachi, Pakistan, from 24-26 June 2013. It was organized by Indus University, Karachi, in collaboration with HEJ Research Institute of Chemistry, University of Karachi, Karachi. More than 80 abstracts were submitted to the conference and were double blind-reviewed by an international scientific committee. The topics of the Conference were: Video, Image & Voice Sensing Sensing for Industry, Environment, and Health Automation and Controls Laser Sensors and Systems Displays for Innovative Applications Emerging Technologies Unmanned, Robotic, and Layered Systems Sensing for Defense, Homeland Security, and Law Enforcement The title of the conference, 'Sensing for Industry, Control, Communication & Security Technologies' is very apt in capturing the main issues facing the industry of Pakistan and the world. We believe the sensing industry, particularly in Pakistan, is currently at a critical juncture of its development. The future of the industry will depend on how the industry players choose to respond to the challenge of global competition and opportunities arising from strong growth in the Asian region for which we are pleased to note that the conference covered a comprehensive spectrum of issues with an international perspective. This will certainly assist industry players to make informed decisions in shaping the future of the industry. The conference gathered qualified researchers from developed countries like USA, UK, Sweden, Saudi Arabia, China, South Korea and Malaysia etc whose expertise resulting from the research can be drawn upon to build an exploitable area of new technology that has potential Defense, Homeland Security, and Military applicability. More than 250 researchers/students attended the event and made the event great success as the turnout was 100%. An exceptional line-up of speakers spoke at the occasion. We want

  4. GSM-PKI solution enabling secure mobile communications.

    PubMed

    Jelekäinen, Pekka

    2004-03-31

    Because of its wide distribution and ease of use, the mobile phone, as a reliable personal communications channel, offers an excellent basis for the provision of reliable electronic communications services. In Finland, ca. 75% of the citizens have a mobile phone and, at present and most likely also in the future, it is the most widely spread service channel allowing reliable electronic communications. Despite the restricted functions of the mobile phone, the citizens can use the phone also as a communications medium. In 2001, the Finns sent over 1 billion SMS messages. In Finland, TeliaSonera Finland Oyi and the Population Register Centre (PRC) have closed a co-operation agreement with the aim of creating a mobile phone service for the electronic identification of a person. The co-operation launched is a significant development project from the perspective of the citizens. As a result, the consumers will have a new alternative for reliable electronic communications and commerce in data networks in addition to the electronic identification card. In the future, it will be possible to use the services of both public administration and the private sector by means of a mobile phone more reliably than before, without a physical visit, e.g. to a health centre or to another provider of healthcare services. The possibility of identification and signature by a mobile phone allows an easier provision of versatile services irrespective of time and place, because, in addition to voice, text message, and WAP functions, the service can be utilised also in communications services through the Internet, in which case, the mobile phone acts like a card reader. From the perspective of reliable personal mobile communications, the healthcare sector is one of the most significant and challenging application areas.

  5. 33 CFR 105.250 - Security systems and equipment maintenance.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Security systems and equipment... systems and equipment maintenance. (a) Security systems and equipment must be in good working order and... include procedures for identifying and responding to security system and equipment failures...

  6. 33 CFR 104.260 - Security systems and equipment maintenance.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Security systems and equipment... systems and equipment maintenance. (a) Security systems and equipment must be in good working order and... procedures for identifying and responding to security system and equipment failures or malfunctions....

  7. 33 CFR 105.250 - Security systems and equipment maintenance.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Security systems and equipment... systems and equipment maintenance. (a) Security systems and equipment must be in good working order and... include procedures for identifying and responding to security system and equipment failures...

  8. 33 CFR 104.260 - Security systems and equipment maintenance.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Security systems and equipment... systems and equipment maintenance. (a) Security systems and equipment must be in good working order and... procedures for identifying and responding to security system and equipment failures or malfunctions....

  9. 49 CFR 659.23 - System security plan: contents.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 7 2013-10-01 2013-10-01 false System security plan: contents. 659.23 Section 659... ADMINISTRATION, DEPARTMENT OF TRANSPORTATION RAIL FIXED GUIDEWAY SYSTEMS; STATE SAFETY OVERSIGHT Role of the State Oversight Agency § 659.23 System security plan: contents. The system security plan must, at...

  10. 49 CFR 659.23 - System security plan: contents.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 7 2012-10-01 2012-10-01 false System security plan: contents. 659.23 Section 659... ADMINISTRATION, DEPARTMENT OF TRANSPORTATION RAIL FIXED GUIDEWAY SYSTEMS; STATE SAFETY OVERSIGHT Role of the State Oversight Agency § 659.23 System security plan: contents. The system security plan must, at...

  11. Novel communication security scheme using dark-bright soliton conversion behaviors

    NASA Astrophysics Data System (ADS)

    Pongwongtragull, Paiboon; Teeka, Chat; Kamoldilok, Surachart; Yupapin, Preecha P.

    2011-02-01

    We propose a novel scheme of communication security using dark-bright soliton conversion behaviors in which the transmission signals can be secured by using the random codes generated by dark-bright soliton conversion within the system. The system consists of two parts, where first, an optical Mach Zhender interferometer (MZI) is used to generate the coincidence dark and bright soliton pair by using the (π/2) phase retarder (i.e., a coupler), in which |D> and |B> states represent the orthogonal dark and bright soliton pulses. The signals from through (Th) port are formed and transmitted via the transmission line to the end user. Second, the add/drop filter is used to separate(filter) the required signal form the transmission link, in which the Th and drop port signals are formed as a reference and signal, respectively. In this case, we assume that both solitons are input into the MZI ports simultaneously (coincidently), in which the binary codes are randomly formed and used to present the transmission data, in which the states ``0'' and ``1'' are represented by |DB> and |BD>, respectively. Finally, the eavesdropper and signal accuracy are also described.

  12. Technical comparison of several global mobile satellite communications systems

    NASA Astrophysics Data System (ADS)

    Comparetto, Gary M.

    The era of satellite-based mobile satellite communications (MSC) systems started with the first MARISAT satellite which was launched into a geostationary orbit over the Pacific Ocean in 1976 to provide communications between ships and shore stations. The combination of high cost and unacceptably large equipment has kept the space-based MSC systems from appealing to the wider market of personal mobile communications. The progress made over the last ten years, however, in digital voice processing, satellite technology, and component miniaturization has resulted in the viability of satellite-based mobile satellite communications systems to meet the growing market in personal mobile communications using handsets similar to those currently in use with land-based cellular systems. Three of the more mature LEO/MEO satellite systems are addressed in this paper including GLOBALSTAR, Iridium, and Odyssey. The system architectures of each system are presented along with a description of the satellite and user handset designs and the multiaccess techniques employed. It will be shown that, although a number of similarities exist among the system addressed, each system is unique in a variety of significant design areas. It is concluded that the technical feasibility of satellite-based mobile satellite communications systems seems to be secure. It will be challenging, however, for the vendors to actually develop and deploy these systems in a cost effective, timely, and reliable way that meets a continually evolving set of requirements based upon a rapidly changing technology base.

  13. Communications Systems for Mobile Robotics

    SciTech Connect

    Futterman, J A; Pao, H

    2003-12-08

    Performance Confirmation is the activity by which the Yucca Mountain Project confirms that the engineered and natural containment barriers of this national nuclear waste repository are performing as predicted, so that an eventual decision to close the repository can be made. This activity involves systems that must be inspected and, in some cases, serviced by mobile robots. This paper discusses systems for underground mobile robot communications, including requirements, environments, options, issues, and down-select criteria. We reviewed a variety of systems, including Slotted Waveguide, Powerline Carrier, Leaky Feeder, Photonic Bandgap Fiber, Free-Space Optics, Millimeter Waves, Terahertz Systems, and RF Systems (including IEEE 802.11 a,b, and g, and Ultra-Wideband radio).

  14. Communicating Homeland Security Threats: Government and Public Efforts

    DTIC Science & Technology

    2010-12-01

    further analyze public perception and involvement in homeland security, this research will continue beyond the evolution of the National Exercise Program...information continues to undermine the importance of threats to the homeland. Current research identifies a growing perception disparity relative to...localities, loss to tourism , and the indirect cost on the economy during a period of heightened threat level.”15 Yim also presents a perspective

  15. Security Analysis of Accountable Anonymous Group Communication in Dissent

    DTIC Science & Technology

    2013-01-31

    simple yet powerful attack against one scheme (Park, Itoh, and Kurosawa 1994) trivially breaks an honest member’s anonymity if an attacker can create a...probably secure (Jakobsson 1998) was given by Mitomo and Kurosawa (2000). A corrupted mix server can alter intermediate ciphertexts, affect- ing the...Pfizmann 1990; Desmedt and Kurosawa 2000) general design flaws as well 62 as the ability of mix servers to use incorrect and specially-prepared inputs

  16. Quantum secure communication using continuous variable Einstein-Podolsky-Rosen correlations

    SciTech Connect

    He Guangqiang; Zhu Jun; Zeng Guihua

    2006-01-15

    A quantum secure communication protocol using correlations of continuous variable Einstein-Podolsky-Rosen (EPR) pairs is proposed. The proposed protocol may implement both quantum key distribution and quantum message encryption by using a nondegenerate optical parametric amplifier (NOPA). The general Gaussian-cloner attack strategy is investigated in detail by employing Shannon information theory. Results show that the proposed scheme is secure, which is guaranteed physically by the correlations of the continuous variable EPR entanglement pairs generated by the NOPA.

  17. Concepts and applications of wireless security systems for tactical, portable, and fixed sites

    SciTech Connect

    Harrington, J.J.

    1997-06-01

    Intrusion detection systems sometimes use radio signals to convey sensor status in areas that wire conduits do not service or as a redundant path to wired systems. Some applications benefit from radio technology by minimizing setup time and reducing installation and operation costs. In recent years with the explosion in wireless communications, these radio-based security systems have become more capable while lowering costs, size, and power consumption. However, the very nature of radio communication raises issues regarding setup, operation, and security of these systems. Sandia National Laboratories, in cooperation with government and industry, has addressed many of these issues through the analysis and development of security systems, communications protocols, and operational procedures. Message encryption and frequent channel supervision are used to enhance security. Installation and maintenance of these systems are simplified by incorporating built-in radio link analysis, menu-driven configuration equipment, and other techniques. Commercial communications satellites and spread-spectrum radios are also being integrated to provide unique capabilities to the security community. The status of this work is presented here along with details of its development.

  18. Practice and communications systems: a word processor based communications system.

    PubMed

    Abelson, M N

    1992-12-01

    The majority of computerized systems currently available for the orthodontic office have been designed for and aimed at those offices that have a volume practice and frequently have multiple practitioners. The stand-alone practitioner and the small office have been grossly ignored. Systems designed for large practices are frequently too complex, too involved in business administration, and too costly for the small office to use effectively. This article describes how an office communications system can be assembled by using commercially available programs. For background information and definition of terms used in this article, I suggest referring to "An Introduction to the Computerization of the Orthodontic Practice," in the Oct. issue of this Journal.

  19. [The security system of SIEMENS digital linear accelerator].

    PubMed

    Wang, Jianping

    2013-03-01

    The security system plays an important role to protect the safety of patients and equipment in radiotherapy. The principle and structure of three kinds of security system of the Siemens digital linear accelerator were analyzed with some examples.

  20. 33 CFR 127.111 - Communications systems.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 2 2013-07-01 2013-07-01 false Communications systems. 127.111... Waterfront Facilities Handling Liquefied Natural Gas § 127.111 Communications systems. (a) The marine transfer area for LNG must have a ship-to-shore communication system and a separate emergency ship-to-shore...