scholarly journals Analysis of requirements for modern spacecraft onboard network protocols

Author(s):  
Valentin Olenev

Introduction: New technologies are replacing the onboard space networks based on bus topologies. One of these technologies is SpaceWire. New communication protocols are being developed, expanding SpaceWire functionality. The protocol developers should provide all the required technical characteristics for data transmission and processing. Purpose: Analysis of the existing requirements for communication protocols, and development of consolidated set of requirements that will take into account the modern requests of the space industry. Results: The analysis of the existing demands on communication protocols resulted in a set of consolidated requirements for the physical-network layers’ protocols and the transport layer protocols. The requirements cover the speed, latencies, transmission distance, transmitted information amount, fault detection functionality, time synchronization between the devices, quality of service, main user data types, and data transfer modes at the transport level. The existing SpaceWire protocols are defined as a special class of protocols, possessing unique characteristics. Practical relevance: The performed analysis can simplify the implementation of new onboard communication protocols and provide a required level of technique for new generation spacecraft.

Sensors ◽  
2019 ◽  
Vol 19 (16) ◽  
pp. 3612 ◽  
Author(s):  
Algimantas Venčkauskas ◽  
Nerijus Morkevicius ◽  
Vaidas Jukavičius ◽  
Robertas Damaševičius ◽  
Jevgenijus Toldinas ◽  
...  

Development of the Internet of Things (IoT) opens many new challenges. As IoT devices are getting smaller and smaller, the problems of so-called “constrained devices” arise. The traditional Internet protocols are not very well suited for constrained devices comprising localized network nodes with tens of devices primarily communicating with each other (e.g., various sensors in Body Area Network communicating with each other). These devices have very limited memory, processing, and power resources, so traditional security protocols and architectures also do not fit well. To address these challenges the Fog computing paradigm is used in which all constrained devices, or Edge nodes, primarily communicate only with less-constrained Fog node device, which collects all data, processes it and communicates with the outside world. We present a new lightweight secure self-authenticable transfer protocol (SSATP) for communications between Edge nodes and Fog nodes. The primary target of the proposed protocol is to use it as a secure transport for CoAP (Constrained Application Protocol) in place of UDP (User Datagram Protocol) and DTLS (Datagram Transport Layer Security), which are traditional choices in this scenario. SSATP uses modified header fields of standard UDP packets to transfer additional protocol handling and data flow management information as well as user data authentication information. The optional redundant data may be used to provide increased resistance to data losses when protocol is used in unreliable networks. The results of experiments presented in this paper show that SSATP is a better choice than UDP with DTLS in the cases, where the CoAP block transfer mode is used and/or in lossy networks.


2021 ◽  
Vol 21 (4) ◽  
pp. 1-23
Author(s):  
Bin Yuan ◽  
Chen Lin ◽  
Deqing Zou ◽  
Laurence Tianruo Yang ◽  
Hai Jin

The rapid development of the Internet of Things has led to demand for high-speed data transformation. Serving this purpose is the Tactile Internet, which facilitates data transfer in extra-low latency. In particular, a Tactile Internet based on software-defined networking (SDN) has been broadly deployed because of the proven benefits of SDN in flexible and programmable network management. However, the vulnerabilities of SDN also threaten the security of the Tactile Internet. Specifically, an SDN controller relies on the network status (provided by the underlying switches) to make network decisions, e.g., calculating a routing path to deliver data in the Tactile Internet. Hence, the attackers can compromise the switches to jeopardize the SDN and further attack Tactile Internet systems. For example, an attacker can compromise switches to launch distributed denial-of-service attacks to overwhelm the SDN controller, which will disrupt all the applications in the Tactile Internet. In pursuit of a more secure Tactile Internet, the problem of abnormal SDN switches in the Tactile Internet is analyzed in this article, including the cause of abnormal switches and their influences on different network layers. Then we propose an approach that leverages the messages sent by all switches to identify abnormal switches, which adopts a linear structure to store historical messages at a relatively low cost. By mapping each flow message to the flow establishment model, our method can effectively identify malicious SDN switches in the Tactile Internet and thus enhance its security.


2021 ◽  
Vol 1 (132) ◽  
pp. 136-144
Author(s):  
Volodymyr Khandetskyi ◽  
Dmutro Sivtsov ◽  
Kostjantun Panin

Analysis of new technologies IEEE 802.11ac/ax of wireless networks showed that increasing their noise immunity is an actual task. The article studies the efficiency of fragmented data frames transmission. Comparison of the efficiencies in the case of retransmission of the corrupted original frame and in the case of its fragmentation in a wide range of the physical data transfer rates is carried out.


Author(s):  
Jungwoo Ryoo ◽  
Young Choi

Due to increased awareness of human’s adverse effect on the environment, many new technologies to mitigate the environmental damage are under development. Although innovative, many of these technologies are often developed in isolation and consequently incompatible with each other. From the viewpoint of Systems Engineering, this presents an enormous challenge since compatibility among different elements of a system is crucial in achieving an optimal operational state that minimizes energy consumption. Therefore, standardization in the form of protocols is a key to accomplishing the goal of green Information and Communication Technology (ICT). In this chapter, the authors examine the existing green ICT technologies and their protocols to identify both obvious and subtle strengths and weaknesses. Particularly, the authors scrutinize the interoperability of the existing green ICT protocols and provide insights on how to improve the status quo. In addition, information on emerging governing bodies of green ICT protocols is provided.


2017 ◽  
pp. 83-99
Author(s):  
Sivamathi Chokkalingam ◽  
Vijayarani S.

The term Big Data refers to large-scale information management and analysis technologies that exceed the capability of traditional data processing technologies. Big Data is differentiated from traditional technologies in three ways: volume, velocity and variety of data. Big data analytics is the process of analyzing large data sets which contains a variety of data types to uncover hidden patterns, unknown correlations, market trends, customer preferences and other useful business information. Since Big Data is new emerging field, there is a need for development of new technologies and algorithms for handling big data. The main objective of this paper is to provide knowledge about various research challenges of Big Data analytics. A brief overview of various types of Big Data analytics is discussed in this paper. For each analytics, the paper describes process steps and tools. A banking application is given for each analytics. Some of research challenges and possible solutions for those challenges of big data analytics are also discussed.


Author(s):  
Yao Yuan ◽  
Dalin Zhang ◽  
Lin Tian ◽  
Jinglin Shi

As a promising candidate of general-purpose transport layer protocol, the Stream Control Transmission Protocol (SCTP) has its new features such as multi-homing and multi-streaming. SCTP association can make concurrent multi-path transfer an appealing candidate to satisfy the ever increasing user demands for bandwidth by using Multi-homing feature. And multiple streams provide an aggregation mechanism to accommodate heterogeneous objects, which belong to the same application but may require different QoS from the network. In this paper, the authors introduce WM2-SCTP (Wireless Multi-path Multi-flow - Stream Control Transmission Protocol), a transport layer solution for concurrent multi-path transfer with parallel sub-flows. WM2-SCTP aims at exploiting SCTP's multi-homing and multi-streaming capability by grouping SCTP streams into sub-flows based on their required QoS and selecting best paths for each sub-flow to improve data transfer rates. The results show that under different scenarios WM2-SCTP is able to support QoS among the SCTP stream, and it achieves a better throughput.


Sensors ◽  
2020 ◽  
Vol 20 (17) ◽  
pp. 4828 ◽  
Author(s):  
Dimitris Koutras ◽  
George Stergiopoulos ◽  
Thomas Dasaklis ◽  
Panayiotis Kotzanikolaou ◽  
Dimitris Glynos ◽  
...  

The Internet of Medical Things (IoMT) couples IoT technologies with healthcare services in order to support real-time, remote patient monitoring and treatment. However, the interconnectivity of critical medical devices with other systems in various network layers creates new opportunities for remote adversaries. Since most of the communication protocols have not been specifically designed for the needs of connected medical devices, there is a need to classify the available IoT communication technologies in terms of security. In this paper we classify IoT communication protocols, with respect to their application in IoMT. Then we describe the main characteristics of IoT communication protocols used at the perception, network and application layer of medical devices. We examine the inherent security characteristics and limitations of IoMT-specific communication protocols. Based on realistic attacks we identify available mitigation controls that may be applied to secure IoMT communications, as well as existing research and implementation gaps.


Symmetry ◽  
2020 ◽  
Vol 12 (5) ◽  
pp. 788
Author(s):  
Heewon Chung ◽  
Myungsun Kim ◽  
Ahmad Al Badawi ◽  
Khin Mi Mi Aung ◽  
Bharadwaj Veeravalli

This work is mainly interested in ensuring users’ privacy in asymmetric computing, such as cloud computing. In particular, because lots of user data are expressed in non-integer data types, privacy-enhanced applications built on fully homomorphic encryption (FHE) must support real-valued comparisons due to the ubiquity of real numbers in real-world applications. However, as FHE schemes operate in specific domains, such as that of congruent integers, most FHE-based solutions focus only on homomorphic comparisons of integers. Attempts to overcome this barrier can be grouped into two classes. Given point numbers in the form of approximate real numbers, one class of solution uses a special-purpose encoding to represent the point numbers, whereas the other class constructs a dedicated FHE scheme to encrypt point numbers directly. The solutions in the former class may provide depth-efficient arithmetic (i.e., logarithmic depth in the size of the data), but not depth-efficient comparisons between FHE-encrypted point numbers. The second class may avoid this problem, but it requires the precision of point numbers to be determined before the FHE setup is run. Thus, the precision of the data cannot be controlled once the setup is complete. Furthermore, because the precision accuracy is closely related to the sizes of the encryption parameters, increasing the precision of point numbers results in increasing the sizes of the FHE parameters, which increases the sizes of the public keys and ciphertexts, incurring more expensive computation and storage. Unfortunately, this problem also occurs in many of the proposals that fall into the first class. In this work, we are interested in depth-efficient comparison over FHE-encrypted point numbers. In particular, we focus on enabling the precision of point numbers to be manipulated after the system parameters of the underlying FHE scheme are determined, and even after the point numbers are encrypted. To this end, we encode point numbers in continued fraction (CF) form. Therefore, our work lies in the first class of solutions, except that our CF-based approach allows depth-efficient homomorphic comparisons (more precisely, the complexity of the comparison is O ( log κ + log n ) for a number of partial quotients n and their bit length κ , which is normally small) while allowing users to determine the precision of the encrypted point numbers when running their applications. We develop several useful applications (e.g., sorting) that leverage our CF-based homomorphic comparisons.


2020 ◽  
Vol 10 (1) ◽  
pp. 46
Author(s):  
Siddharth Siddharth ◽  
Mohan M. Trivedi

Automobiles for our roadways are increasingly using advanced driver assistance systems. The adoption of such new technologies requires us to develop novel perception systems not only for accurately understanding the situational context of these vehicles, but also to infer the driver’s awareness in differentiating between safe and critical situations. This manuscript focuses on the specific problem of inferring driver awareness in the context of attention analysis and hazardous incident activity. Even after the development of wearable and compact multi-modal bio-sensing systems in recent years, their application in driver awareness context has been scarcely explored. The capability of simultaneously recording different kinds of bio-sensing data in addition to traditionally employed computer vision systems provides exciting opportunities to explore the limitations of these sensor modalities. In this work, we explore the applications of three different bio-sensing modalities namely electroencephalogram (EEG), photoplethysmogram (PPG) and galvanic skin response (GSR) along with a camera-based vision system in driver awareness context. We assess the information from these sensors independently and together using both signal processing- and deep learning-based tools. We show that our methods outperform previously reported studies to classify driver attention and detecting hazardous/non-hazardous situations for short time scales of two seconds. We use EEG and vision data for high resolution temporal classification (two seconds) while additionally also employing PPG and GSR over longer time periods. We evaluate our methods by collecting user data on twelve subjects for two real-world driving datasets among which one is publicly available (KITTI dataset) while the other was collected by us (LISA dataset) with the vehicle being driven in an autonomous mode. This work presents an exhaustive evaluation of multiple sensor modalities on two different datasets for attention monitoring and hazardous events classification.


Sign in / Sign up

Export Citation Format

Share Document