PyCRA: Physical Challenge-Response Authentication For Active Sensors Under Spoofing Attacks

Size: px
Start display at page:

Download "PyCRA: Physical Challenge-Response Authentication For Active Sensors Under Spoofing Attacks"

Transcription

1 PyCRA: Physical Challenge-Response Auhenicaion For Acive s Under Spoofing Aacks Yasser Shoukry, Paul Marin, Yair Yona, Suhas Diggavi, and Mani Srivasava Elecrical Engineering Deparmen, Universiy of California a Los Angeles, USA {yshoukry, pdmarin, yairyo99, suhasdiggavi,mbs}@ucla.edu ABSTRACT Embedded sensing sysems are pervasively used in life- and securiycriical sysems such as hose found in airplanes, auomobiles, and healhcare. Tradiional securiy mechanisms for hese sensors focus on daa encrypion and oher pos-processing echniques, bu he sensors hemselves ofen remain vulnerable o aacks in he physical/analog domain. If an adversary manipulaes a physical/analog signal prior o digiizaion, no amoun of digial securiy mechanisms afer he fac can help. Forunaely, naure imposes fundamenal consrains on how hese analog signals can behave. This work presens PyCRA, a physical challenge-response auhenicaion scheme designed o proec acive sensing sysems agains physical aacks occurring in he analog domain. PyCRA provides secure acive sensing by coninually challenging he surrounding environmen via random bu deliberae physical probes. By analyzing he responses o hese probes, he sysem is able o ensure ha he underlying physics involved are no violaed, providing an auhenicaion mechanism ha no only deecs malicious aacks bu provides resilience agains hem. We demonsrae he effeciveness of PyCRA in deecing and miigaing aacks hrough several case sudies using wo sensing sysems: (1) magneic sensors like hose found on gear and wheel speed sensors in roboics and auomoive, and (2) commercial Radio Frequency Idenificaion (RFID) ags used in many securiy-criical applicaions. In doing so, we evaluae boh he robusness and he limiaions of he PyCRA securiy scheme, concluding by oulining pracical consideraions as well as furher applicaions for he proposed auhenicaion mechanism. Caegories and Subjec Descripors C.2. [COMPUTER-COMMUNICATION NETWORKS]: General: Securiy and proecion General Terms Securiy Permission o make digial or hard copies of all or par of his work for personal or classroom use is graned wihou fee provided ha copies are no made or disribued for profi or commercial advanage and ha copies bear his noice and he full ciaion on he firs page. Copyrighs for componens of his work owned by ohers han ACM mus be honored. Absracing wih credi is permied. To copy oherwise, or republish, o pos on servers or o redisribue o liss, requires prior specific permission and/or a fee. Reques permissions from Permissions@acm.org. CCS 1, Ocober 12 16, 21, Denver, Colorado, USA. c 21 ACM. ISBN /1/1...$1.. DOI: hp://dx.doi.org/1.114/ Keywords Embedded Securiy; Acive sensors; Challenge-response auhenicaion; Spoofing aacks; Physical aacks 1. INTRODUCTION Recen decades have winessed a proliferaion in embedded sensors for observing a variey of physical phenomena. Increased use of hese sensors in securiy- and life-criical applicaions has been accompanied by a corresponding increase in aacks argeing sensing sofware, hardware, and even physical, analog signals hemselves. While considerable research has explored sensor securiy from a sysem-level perspecive nework redundancy, sensor fusion, and he like sensors hemselves remain largely vulnerable o aacks argeing analog signals prior o digiizaion. This vulnerabiliy can lead o caasrophic failures when a malicious hird pary aemps o spoof he sensor [19, 14, 3, 33]. Several sysem-level sensor securiy schemes have been proposed in he conex of power grids. For example, Dorfler e al. have explored disribued cyber-physical aack deecion in he conex of power neworks [6, 3]. Similar ideas for providing sysem-level securiy in smar grids can be found in [16, 18, 4, 22, 3]. Securiy schemes in his vein include, among ohers, sae-space and conrolheoreic approaches for deecing anomalous sysem behavior [7, 3]. One idea common o hese effors is ha an inheren securiy mechanism and robusness can be found in he physics governing he dynamics of he sysem as a whole. For example, a mismach beween he rae of change in a vehicle s locaion as repored by GPS and by he odomeer sensor may indicae ha one of hese wo sensors is eiher fauly or under aack. A complemenary securiy mechanism can be found in he underlying physics governing he sensor iself. If a sensor observes an analog signal ha appears o violae he physics governing he sensing dynamics, he signal iself may be under aack, necessiaing securiy mechanisms a he analog signal level. To reduce sensor-level vulnerabiliies, engineers ofen place sensors in secure or remoe physical locaions o preclude direc physical conac wih he sensing hardware. Addiionally, he phenomenon being sensed is ofen difficul o access, wheher prohibiively far away or surrounded by proecive maerial. In such scenarios, adversaries have access only o he analog signal prior o i reaching he sensor, and heir aack mus be carried ou wihou direc access o any hardware in he enire sensing pah, from source o sink. Even wih hese counermeasures in place, an adversary can sill aack sensors by manipulaing he physical signals before heir ransducion and subsequen digiizaion [19, 33]. Robus counermeasures for such aacks mus necessarily be carried ou a he physical level as well once hese signals have been sampled and digiized, no amoun of pos-processing can repair he compromised sensor daa. 14

2 Broadly speaking, sensors can be divided ino wo caegories: passive (hose ha sense pre-exising physical signals) and acive (hose ha perform some acion o evoke and measure a physical response from some measurable eniy). Examples of passive sensors include emperaure, humidiy, and ambien ligh, while acive sensors include ulrasound, laser scanners, and radar. Passive sensors are largely naïve lisening devices hey blindly relay informaion o higher levels of sofware wihou regard for he inegriy of ha informaion. Digial filering and oher pos-processing echniques can be used o remove noise from passive sensors, bu hey remain unable o comba aacks a he physical layer in any meaningful way. On he oher hand, acive sensors inroduce he possibiliy for more advanced securiy measures. PyCRA is, a is core, a mehod of ensuring he rusworhiness of informaion obained by acive sensors by comparing heir responses o a series of physical queries or challenges. The driving concep behind PyCRA is ha, by periodically simulaing he environmen wih a known signal and measuring he response, we can ensure ha he signal measured by he sensor is in accordance wih he underlying sensing physics. This periodic simulaion and subsequen behavioral analysis he physical challenge-response auhenicaion, creaing a secure acive sensing plaform is he main conribuion of his work. We demonsrae he effeciveness of PyCRA for hree exemplary cases: physical aack deecion for magneic encoders, physical aack resilience for magneic encoders, and passive eavesdropping deecion for RFID readers. Magneic encoders are used in a wide array of commercial and indusrial applicaions and are represenaive of a large class of inducive acive sensors. We demonsrae no only how acive spoofing aacks can be deeced for hese inducive sensors bu also how he effecs of hese aacks can be miigaed. Eavesdropping deecion on RFID readers serves o illusrae an exension of PyCRA o enable deecion of passive aacks. Our resuls from more han 9 experimens demonsrae ha PyCRA can accuraely deec aacks in a variey of seings. We believe ha he mehods demonsraed in his work can be applied o a broad array of acive sensors beyond hose sudied direcly in his work, including ulrasound, opical sensors, acive radar, and more. 1.1 Conribuions of PyCRA In summary, he conribuions described in his paper are hreefold: We presen a generalizable physical challenge-response auhenicaion scheme for acive sensing subsysems. We inroduce algorihms for deecing he presence of and providing resilience agains physical aacks when using physical challenge-response auhenicaion. We demonsrae he effeciveness of PyCRA, our implemenaion of physical challenge-response auhenicaion, agains several differen aack ypes and for over 9 experimens wih hree exemplary applicaions: (1) deecion of acive aacks on magneic encoders, (2) resilience agains acive aacks on magneic encoders, and (3) deecing passive eavesdropping aacks on RFID readers. The res of his paper is organized as follows. Secion 2 oulines he aacker model. Secion 3 describes he basic operaion of he PyCRA auhenicaion scheme for deecing acive aacks. Secion 4 oulines heoreical limiaions of aackers on physical signals. Secion, 6, and 7 are devoed o he resuls of hree case sudies: aack deecion for magneic encoders, aack deecion for passive eavesdropping on RFID readers, and aack resilience for magneic Sofware Layers Digial Back-End Acuaor Digiizaion (ADC) Acive Analog Fron-End (sensing & filering) Probe physical aack Response Figure 1: A ypical acive sensor archiecure. The acuaor generaes an analog signal (energy) which is refleced by he measured eniy back o he sensor. The received analog signal is capured and processed by he analog fron-end. The signal is hen convered o a digial forma which is processed once more (by he digial backend) before being sen o higher level sofware layers. encoders. Finally, we offer a discussion and concluding houghs in Secions 8.1, 8.2 and ATTACKER MODEL Before describing mechanisms by which we can deec and preven sensor aacks a he physical layer, we mus differeniae beween wo broad caegories of sensors namely passive and acive sensors and define wha we mean by a physical aack. 2.1 Passive vs. Acive s s can be broadly classified as eiher passive or acive based on he source of energy being sensed. Passive sensors measure ambien energy. For example, emperaure sensors like hose found in hermosas are considered passive, because hey measure hea energy in he ambien environmen. By conras, acive sensors probe some physical eniy wih self-generaed energy as shown in Figure 1. This energy is parially refleced back o he sensor where i is measured and used o infer properies abou some physical phenomenon. Examples of acive sensors include ulrasonic range finders (used in roboics), opical and magneic encoders (used in auomoive vehicles, indusrial plans, & chemical refineries), radar, and even radio-frequency idenificaion (RFID) sysems. In RFID, a reader is used o generae elecromagneic waves which are hen used by wireless ags o ransfer back heir unique idenifier o he reader. In his paper, we focus on providing securiy for acive sensors. In paricular, we leverage an acive sensor s abiliy o emi energy in order o 1) provide deecion of acive aackers rying o spoof he sensor, 2) miigae he effecs of acive spoofing aacks and 3) deec passive eavesdropping aacks aemping o lisen o he informaion received by he sensor. In he following subsecions, we define wha we mean by physical aacks on acive sensors and ouline he assumed properies and limiaions of a poenial adversary. 2.2 Defining Physical Aacks In his paper, a physical aack refers o a malicious aleraion of a physical, analog signal (e.g., magneic waves, acousic waves, visible waves) prior o ransducion and digiizaion by a sensor, as shown in Figure Adversarial Goals The adversary considered in his work has a number of goals relaed o misinforming and misleading sensors. These goals are summarized below. G1 Concealmen: An aacker does no wan he presence of his or her aack o be known. If a sensor aack can be easily deeced, prevenaive counermeasures like hardware redundancy and resilience a he sysem-level can ofen be used o miigae he damage done by he aack [7, 3]. Measured Eniy 1

3 Volage [vol] Physical/Analog signal 1 7 Logical represenaion Volage [vol] Physical/Analog signal 1 4 Logical represenaion Figure 2: Examples of physical delays seen in ypical sensing and acuaion hardware, including opical sensors (lef) and elecromagneic coupled (e.g., RFID) sensors (righ). In each case, he measured analog signal (blue solid) lags behind he ideal, logical signal (red dashed), causing delays. G2 Signal Injecion: An aacker will aemp o rick he sensor ino hinking ha a malicious, injeced signal is he rue physical signal. The primary goal of an aack is o replace he rue physical signal ha a sensor aims o sense wih a malicious signal. In oher words, an adversary will aemp o injec a signal ino he physical medium ha he sensor is measuring in order o jam or spoof he sensor. G3 Signal Masking: An aacker will aemp o preven he sensor from being able o deec he rue physical signal. If he sensor is sill capable of reliably discerning he correc signal from he malicious, injeced signal, hen he aack may no be successful. Thus, he adversary aims no only o injec a signal bu also o mask he rue signal, wheher by overpowering, modifying, or negaing (canceling) i. 2.4 Assumpions abou he Adversary The physical aacks agains sensors considered in his work operae under four main assumpions: A1 Non-invasiveness: Aacks are of a non-invasive naure ha is, he aacker is no allowed direc access o he sensor hardware. Addiionally, he adversary does no have access o he sensor firmware or sofware, wheher direcly or hrough wired or wireless neworking. In mos life- and safey-criical applicaions, engineers are careful o ensure ha sensors are no physically exposed and vulnerable o direc ampering. For example: s are ofen insalled inside he body of a physically secured infrasrucure (e.g., sensors inside he body of an auomoive sysem, moving UAV drones, ec.). For sensors which are physically accessible, exising echniques in he lieraure demonsrae ways o implemen amperproof packaging o proec sensors from direc, physical modificaions [31, 17, 1]. Numerous sensor sysems have mehods for deecing when wires connecing heir various sensors have been ampered wih. For example, auomoive sysems are equipped wih sensor failure deecion sysems which can deec wheher all sensor subsysems are correcly conneced and aler he driver if any of hem fails [8]. Because of his, any aack mus be carried ou from a disance, wihou direc access o any sensor hardware. In shor, an adversary is assumed o have access only o he physical/analog medium used by he sensor magneic waves, opics, acousics, ec. Addiionally, i is imporan o disinguish hese sensors from sensor nodes (which appear in he lieraure of sensor neworks); he aacks and counermeasures in his work arge sensors hemselves. s are simple subsysems designed o perform only one simple ask; sensing he physical world. Because of his, many sensors do no suppor remoe firmware updaes and do no ypically receive commands from a remoe operaor, making such aack vecors uncommon as many sensors do no have such capabiliies. A2 Trused Measured Eniy We assume ha he physical eniy o be measured by he sensor is rused and incapable of being compromised. Similar o he sensor hardware iself, he eniy ha he sensor aims o measure is ypically difficul o access or aler direcly while mainaining Goals G1 G3. For example, in RFID sysems he ag iself is ofen encased in amper-proof packaging [31, 17]; for ulrasonic ranging and acive radar, maliciously alering he measured eniy (ofen he enire surrounding environmen) is impracical in ime & effor and undoubedly violaes Goal G1; for airplane engine speed sensors, he engines canno easily be modified or replaced; for hear moniors, he hear canno (we hope) be modified [19], and so forh. A3 Physical Delays (τ aack ): Adversaries require physical hardware wih inheren physical delays. This delay, hough variable in duraion, is fundamenal o all physical acuaion and sensing hardware. These same analog/physical signals canno be manipulaed or even observed (i.e. sniffed) wihou physical hardware. Tha is, o amper wih magneic waves, an aacker needs hardware ha is able o generae magneic waves, opical signals need physical hardware ha generaes opical signals, and so on. Furhermore, his hardware has o obey fundamenal physics imposed by naure; he underlying physics dicae ha he response of any physical elemen is governed by a dynamical model (mahemaically modeled using differenial/difference equaions) [9, ch. 2], [2, chs. 8 9]. This dynamical model describes he oupu response for each physical elemen in response o heir inpus, e.g., he ime for a volage o drop from a cerain value o zero and so on. Alhough from a sysem poin of view, we ofen assume ha analog signals like hose in Figure 2 ake on logical values of and 1, he underlying physics is always differen from his sysem poin of view. For example, Figure 2 shows how hardware ha generaes clock waveforms and opical pulse signals behaves quie differenly from he desired, logical signals used o conrol hem. In general, no physical signal can arbirarily jump from one sae o anoher wihou suffering from delays imposed by physics [9, ch. 2]. Furhermore, hese physical delays are lower bounded by a nonzero, fundamenal limi. For example, he ime response of an elecromagneic sensor/acuaor is a muliple of physical consans like magneic permeabiliy [2, chs. 8 9] or permiiviy and elecric consans for capaciive sensors [9, ch. 4]. In general, he ime response of any sensor or acuaor can never be below cerain fundamenal hresholds conrolled by physical consans. We refer o his physical delay as τ aack for he remainder of his paper. A4 Compuaional Delays: PyCRA is designed and analyzed wih a focus on physical delays. We make no assumpion regarding he compuaional power of a poenial adversary. We assume ha an adversary has knowledge of he underlying securiy mechanism, aemping o conceal an aack by reacing o each physical challenge or probe from he PyCRA-secured acive sensor. In pracice, such an adversary would suffer from compuaional delays in addiion o he physical delays addressed above. These delays would make i even more difficul for an adversary o respond o hese challenges in a imely manner. PyCRA is designed 16

4 Acive Acuaor probe response Measured Eniy Malicious Acive Acuaor probe response Measured Eniy Malicious Acuaor Acive (a) (b) (c) Figure 3: An illusraion of hree physical aack ypes: (a) a passive eavesdropping aack, (b) a simple spoofing aack where a malicious acuaor blindly injecs a disrupive signal, and (c) an advanced spoofing aack where an adversary uses a sensor o measure he original signal and an acuaor o acively cancel he original signal and injec a malicious one. Acuaor Shield probe response Measured Eniy Malicious Malicious Acuaor o leverage only he physical delays addressed above, bu addiional compuaional delays would make i even easier o deec he presence of an aack. 2. Physical Aack Types for s Aacks can be classified as eiher passive (eavesdropping) or acive (spoofing). While we consider only physical/analog aacks in accordance wih assumpions A1 A4, he passiviy of an aack is decided by wheher or no he aacker is manipulaing (or spoofing) he physical signal or merely lisening o i. Acive aacks hemselves can be classified once more ino simple spoofing or advanced spoofing aacks. In shor, physical sensor aacks in accordance wih assumpions A1 A4 can be broadly divided ino hree caegories (Types): T1 Eavesdropping Aacks: In an eavesdropping aack, an adversary uses a malicious sensor in order o lisen o he acive sensor s communicaion wih he measured eniy (Figure 3a). T2 Simple Spoofing Aacks: In a simple spoofing aack, an adversary uses a malicious acuaor o blindly injec a malicious signal in order o aler he signal observed by he sensor. These aacks are simple in ha he malicious signal is no a funcion of he original, rue signal (Figure 3b). T3 Advanced Spoofing Aacks In an advanced spoofing aack, an adversary uses a sensor in order o gain full knowledge of he original signal and hen uses a malicious acuaor o injec a malicious signal accordingly. This enables an aacker o suppress he original signal or oherwise aler i in addiion o injecing a malicious signal (Figure 3c). We argue ha hese aack ypes span all possible modes of aacks ha abide by Assumpions A1 A4 wih hose goals oulined in G1 G3. For example, jamming or Denial of service (DoS) aacks falls in caegory T2 where he aacker s acuaor is used o blindly generae high ampliude, wide bandwidh signals o inerfere wih he physical signal before i reaches he sensors; replay aacks fall in eiher caegory T2 or T3 based on wheher he aacker is blindly replaying a physical signal or desrucing he original physical signal before insering he replay signal; spoofing aacks like hose demonsraed in [19] fall in caegory T2; and aacks described in [33] fall wihin boh T2 and T3. A firs glance, aacks of ype T1 may no seem imporan especially if he sensor under aack measures a physical signal ha is publicly accessible (e.g., room emperaure, car speed, ec.). In such cases, an adversary can measure he same physical signal wihou he need o lisen o he ineracion beween he acive sensor and he environmen. However, his may no always be he case. For example, an aacker migh measure magneic waves during an exchange beween an RFID reader and an RFID ag, learning poenially sensiive informaion abou he ag. These aacks are passive, meaning ha he aacker does no injec any energy ino he sysem. Secions describes mehods for deecing aack ypes T2 and T3, leaving aack ype T1 for laer discussion in Secion PYCRA AUTHENTICATION SCHEME The core concep behind PyCRA is ha of physical challengeresponse auhenicaion. In radiional challenge-response auhenicaion schemes, one pary requires anoher pary o prove heir rusworhiness by correcly answering a quesion or challenge. This challenge-response pair could be a simple password query, a random challenge o a known hash funcion, or oher similar mechanisms. In he proposed physical challenge-response auhenicaion, he challenge comes in he form of a physical simulus placed on he environmen by an acive sensor. Unlike radiional schemes, he proposed physical challenge operaes in he analog domain and is designed so ha an adversary canno issue he correc response because of immuable physical consrains raher han compuaional or combinaorial challenges. We begin by modeling he problem of deecing physical sensor aacks as an auhenicaion problem. To draw his analogy, le us consider he communicaion sysem shown in Figure 4a. This figure shows wo paries : (1) an acive sensor composed of acuaion and sensing subsysems and (2) he measured eniy which responds o signals emied by he acuaor conained wihin he acive sensor. The firs pary he acive sensor is responsible for iniiaing he communicaion by generaing some physical signal such as a magneic, acousic, or opical wave. The second pary he measured eniy responds o his communicaion by modulaing his signal and reflecing i back o he sensing subsysem of he acive sensor. Wih his analogy in mind, he problem of deecing physical aacks can be posed as ha of ensuring ha he message seen by he sensor has originaed from a rused pary (he rue eniy o be measured). This is akin o ideniy auhenicaion in he he lieraure of compuer securiy bu applied o he analog domain. 3.1 Simple PyCRA Aack Deecor Using he communicaion analogy shown in Figure 4a and recalling ha we are ineresed only in acive sensors as described in Secion 2.1, we noice ha he measured eniy, as a paricipaing pary in his communicaion, is sricly passive, i.e. i canno iniiae communicaion; i responds only when he sensor generaes an appropriae physical signal. PyCRA explois his passiviy in order o faciliae he deecion of aacks. Wihou PyCRA, an acive sensor s acuaor would probe he measured eniy in a normal fashion using a deermin- 17

5 Acive u() Acuaor A () Measured Eniy Acive u() Acuaor B() Measured Eniy Acive u() Acuaor B() Measured Eniy y() a() y() a() y() a() (a) (b) (c) Figure 4: An illusraion of he PyCRA archiecure and aack deecion scheme: (a) During normal operaion, he acive sensor generaes a signal A (). This signal passes hrough environmenal dynamics and is refleced back o he sensor as y(); (b) Using he proposed PyCRA scheme, he sensor generaes a modulaed signal B(). If here is no aack presen, he refleced signal diminishes if he acive sensor s acuaor is driven o zero; (c) Using he proposed PyCRA scheme while he sensor is under aack (by signal a()), a malicious signal is deeced during he period when he acuaor is disabled. isic signal denoed by A (). We embed in his signal a physical challenge hrough pseudo-random binary modulaion of he form: B() = u()a (), u() {,1} (1) where u() is he binary modulaion erm and B() is he modulaed oupu of he acuaor. The oupu of he acive sensor is denoed by y() as shown in Figure 4. In he absence of an aacker and from he passiviy of he measured eniy, seing u() = (and consequenly B() = ) a ime challenge will cause y() o go o zero. Poenial aackers mus acively emi a signal a() o overpower or mask y() (Goals G2 G3). A naïve aacker migh coninue o emi his signal even when B() = as shown in Figure 4c. In his case, he aack can be easily deeced, since any nonzero y() while u() = can be aribued o he exisence of an aacker. More advanced aackers migh aemp o conceal heir aacks when hey sense he absence of B() as in Goal G1. Due o Assumpion A3, an aacker could drive a() o zero only afer a delay of τ aack, where τ aack τ physical limi > is he unavoidable physical delay inheren in he aacker s hardware. Therefore, he mechanism described above can sill deec he presence of an aack wihin his unavoidable ime delay. Furhermore, an aacker canno learn and compensae for his inheren delay preempively due o he randomness of he modulaion erm u(). Again, any nonzero y() sensed while u() = can be aribued o he exisence of an aacker. The simple PyCRA aack deecor can be summarized as follows: [Sep 1] Selec a random ime, challenge [Sep 2] Issue a physical challenge by seing u( challenge ) = [Sep 3] If y( challenge ) >, declare an aack Noe ha he previous process needs o happen wihin small amoun of ime (e.g., in he order of milliseconds) such ha i does no affec he normal operaion of he sysem. 3.2 The Confusion Phase Every physical signal is subjec o random perurbaions known as noise. A fundamenal characerisic of his noise is he signal o noise raio (SNR). This SNR deermines he abiliy of any sensor o disinguish beween changes in a signal of ineres and he random noise. As wih he physical delay, his SNR is fundamenal, and i is never equal o zero. As a resul, if a signal is wihin he noise floor (less han he noise ampliude), i is fundamenally impossible o deec any change in he physical signal [36]. As wih he physical ime delay τ aack, we use his fundamenal limi in order o enhance PyCRA and inroduce addiional securiy. To do so, we modify he physical challenge by inroducing an inermediae sep beween he acive phase (e.g., u() = 1) and he silen phase (e.g., u() = ) called he confusion phase. In his phase, he acive sensor uses is acuaor o generae a signal u() ha is small enough o barely exceed he noise level. Nex, we wai in his confusion phase for a random ime con f usion before enering he silen ime. This process is summarized in Figure. Recall ha one of he aacker s goals is o remain sealhy (Goal G1). If he aacker is unable o insananeously deec he changes in he physical challenge, he or she will reveal hemselves. Due o he exisence of noise, no aacker wheher using sofware or hardware o couner he physical challenges issued by PyCRA can insananeously deec he change in he physical challenge. Tha is, here always exiss a non-zero probabiliy of he aacker missing he changes in he physical challenge. In Secion 4, we deail a heoreical resul ha explains he relaionship beween he ampliude of he physical challenge wihin he confusion phase and he probabiliy ha he aacker will fail o deec changes in he physical challenge. 3.3 Effec of Physical Delays a he As wih he aacker, he acuaor used by he acive sensor iself suffers from physical delays. This means ha when PyCRA issues a physical challenge, he acuaor oupu does no ransiion immediaely. Apparenly, if he physical delay in he acive sensor is greaer han τ aack, hen an adversary can conceal his signal. To couner his, PyCRA consrucs a mahemaical model for he sensor ha is used in real ime o predic and eliminae he effecs of he acive sensor s physics. By calculaing he residual beween he expeced oupu and he measured oupu, PyCRA can sill deec he exisence of an aack even if he sensor s dynamics are slower han hose of he aacker. 3.4 χ 2 PyCRA Aack Deecor If we obain an accurae model of he sensor s acuaor dynamics, hen we can remove is effecs from he measured response, ensuring ha any residual energy measured while u() = belongs o an exernal source such as an aacker Obaining he Model To compensae for he acuaor dynamics, we firs need o acquire an accurae model ha capures he underlying physics of he acive sensor. Below we model he acive sensor using he generic nonlinear sae updae of he form: x( + 1) = f (x(),u()) + w() (2) y() = h(x()) + v() (3) where x() R n is he acive sensor sae a ime N (e.g., he elecrical curren and volages inside he sensor a ime ), u() R is he modulaion inpu o he sensor, he funcion f : R n R R n 18

6 he can reac o hese challenges. In his secion, we show a heoreical resul ha allows PyCRA o increase he probabiliy of an aacker failing o deec he changes in he physical-challenge by correcly designing he confusing phase (discussed in Secion 3.2) and hence increase he probabiliy of deecing he aack. T HEOREM 1. Consider an aacker aemping o deec changes in a physical challenge signal wih mis-deecion probabiliy α. For any sraegy he aacker chooses, and because of he SNR exiss a any sensor, he probabiliy of he aacker having a consan deecion delay τ > is bounded away from zero, i.e., wih high probabiliy he aacker will deec a change and urn off his signal only afer ime T afer he beginning of he confusion period. In addiion, decreasing he ampliude of he signal emied by he acive sensor during he confusion period by a facor of β > 1 increases he delay τ by a facor of β 2. P ROOF S KETCH. We base he proof on he resuls repored in [36] on change poin deecion which measure fundamenal limis on checking changes in noisy signal. In he change poin deecion seing, he false alarm probabiliy is analogous o he even where he aacker swiches off his signal before he beginning of he silen period. Delay in [36] is defined as he ime ha elapses from he change poin unil he change is deeced. When α 1, he false alarm probabiliy induces a probabiliy which is proporional o α for he even ha change is deeced wihin a ime inerval shorer han T (a consan independen of α). Decreasing he ampliude of he signal acuaed by he acive sensor during he confusion period by a facor of β leads o a decrease in SNR by a facor of β 2. Based on his relaion, he aacker has o increase he delay by a facor of β 2 in order o mainain false alarm probabiliy α. Figure : acuaor oupu (op) wih confusion and silence phases and he corresponding raw signal (boom) wih an aack. is a model describing how he physical quaniies of he sensor evolve over ime, and he funcion h : Rn R models he sensor measuremen physics. Such models can be eiher derived from firs principles [9, 2, 1] or hrough experimenal sudies [23, 2]. Addiionally, hese models are used o design he sensors hemselves and are ypically known o he sensor manufacurers. Finally, since no mahemaical model can capure he rue sysem behavior exacly, he erm w() Rn represens he mismach beween he rue sensor and he mahemaical model while v() models he noise in he sensor measuremens. χ 2 Deecor We use he dynamical model of he sensor (Equaions (2) and (3)) in designing a χ 2 deecor o deec he exisence of an aacker. χ 2 deecors appear in he lieraure of auomaic conrol, where hey are used in designing faul oleran sysems [26, 28, 2, 38]. The χ 2 deecor works as follows: [Sep 1] Selec random imes, challenge and con f usion. [Sep 2] Issue a physical challenge by enering he confusion phase a ime challenge and hen ener he silen phase a ime challenge + con f usion. [Sep 3] Residual Calculaion: Here we use Equaions (2) and (3) o calculae an esimae for he curren sensor sae x() ˆ and he prediced oupu y() ˆ = h(x()). ˆ This operaion is iniiaed a challenge + con f usion when u() ransiions o he acuaor silence ime and erminaes once u() ransiions back o one, signaling he end of acuaor silence. The model represened by Equaions (2) and (3) describes he oupu of he sensor when he aack is equal o zero. Therefore, he residual1 beween he measured oupu and he prediced oupu, z() = y() y(), ˆ corresponds o boh he aack signal as well as he environmenal dynamics during he ime inerval before u() drops o. For each segmen of lengh T where u() =, we calculae he norm of he residual z() as: g() = 1 T z2 (τ). Magneic encoders are acive sensors used in a wide array of indusrial, roboics, aerospace, and auomoive applicaions. The goal of an encoder is o measure he angular velociy or posiion of a gear or wheel in order o provide feedback o a moor conroller. The operaion of hese sysems depends heavily on he accuracy and imeliness of he individual encoders. This secion describes he basic operaion of magneic encoders in paricular and he ypes of aacks ha can be mouned agains hem as well as how PyCRA can be used o provide securiy for hem..1 (4) Magneic Encoders Magneic encoders rely on magneic variaions o measure he angular velociy of a gear or wheel and are ofen designed o handle dus, mud, rain, and exreme emperaures wihou failing. The goal of each encoder is o provide a signal whose frequency corresponds o he speed of a gear. These signals are condiioned and passed o a moor conroller uni which deecs if any correcive acions need o be aken. Typical magneic encoders operae by generaing a magneic field in he presence of a roaing ferromagneic one ring or one wheel. This ring has a number of eeh on is edge so ha he refleced magneic wave as observed by he encoder varies over ime as a (noisy) sinusoidal wave. By measuring he frequency of his refleced signal over ime, each sensor and consequenly he moor conroller is able o infer he angular velociy of any given gear, wheel, or moor as illusraed in Figure 6. Aacks on magneic encoders have been sudied in [33] in he conex of Ani-lock Braking Sysems in auomoive vehicles. Boh τ= T +1 [Sep 4] Deecion Alarm: Once calculaed, we compare he χ 2 residual g() agains a pre-compued alarm hreshold α. This alarm hreshold is chosen based on he noise v(). Whenever he condiion g() > α is saisfied, he sensor declares ha an aacker has been deeced. 4. CASE STUDY (1): DETECTING ACTIVE SPOOFING ATTACKS FOR MAGNETIC ENCODERS THEORETICAL GUARANTEES As discussed before, PyCRA is based on he concep ha physics impose fundamenal and immuable consrains on how quickly an aacker can deec changes in he physical-challenge and how fas 1 The name of he Chi-squared (χ 2 ) deecor follows from he fac ha, in he case of no aack, he residual z() is a Gaussian random variable, and hence is square g() is a χ 2 disribued random variable. 19

7 Encoder Moor Conroller Gear Figure 6: Flow diagram for a ypical magneic encoder: The signal begins as a refleced magneic wave from a gear. This signal is capured by a pick-up coil or Hall Effec sensor, condiioned ino a clean square wave, and finally ranslaed ino an angular velociy. simple spoofing [T2] and advanced spoofing [T3] aacks are shown o influence he vehicle sabiliy. In his case sudy, we show how PyCRA can deec he exisence of such aacks..2 The PyCRA-secured Magneic Encoder Physically, he proposed secure magneic encoder sensor consiss of wo main pars: (i) he fron-end conaining he acuaor and pickup coils responsible for boh probing he roaing one ring and measuring he response, and (ii) he processing backend. Figure 7 shows he fron-end of he sensor used in our evaluaion. The acuaor coil depiced is much larger han would be required in a commercial produc, because i consiss of a magneic core and a hand-wound high-gauge wire. The following is an overview of he main blocks of he sensor..2.1 Acuaor Coil The main componen required for he secure sensor is he acuaor coil. In his work, we use an insulaed copper wire wrapped around a ferromagneic core and driven using a power amplifier..2.2 Pickup and Filering The pickup (measuremen) coil is wrapped around he same ferromagneic core used for he acuaor coil. In order o reduce he effec of noise from oher EMI sources wihin he vehicle body, he oupu of he pickup coil is conneced o a differenial amplifier wih high common-mode rejecion. The oupu of his differenial amplifier is conneced o he digial processing backend. Anoher securiy concern of he magneic encoder is he wires connecing he coils o he digial backend. These wires pose a poenial vulnerabiliy, as an aacker can cu hem and connec his aack module direcly. However, such aacks are already accouned for in many sysems as addressed in Assumpion A Processing Elemens The secure sensor requires enough processing power o perform he necessary compuaions in real-ime. The DSP calculaions ake place on a high power ARM Corex (M4 STM32F47) processor, which has ample floaing poin suppor. We do no consider any power consumpion issues in our design..3 Obaining he Model The dynamics of he sensor (including he acuaor, high gain curren amplifier, sensors, and he signal condiioning circui) are idenified using sandard sysem idenificaion mehods [23]. Tha is, we applied four differen pseudo random binary sequences (PRBS) o he sysem, colleced he oupu, and hen applied subspace sysem idenificaion echniques in order o build models of increasing complexiy [23]. Finally we used boh whieness ess and correlaion ess o assess he qualiy of he obained model [2]. In order o validae he model, we generaed a random sequence similar o hose used in he real implemenaion of he sensor. We fed he same inpu o boh he sensor and he model and recorded he error. Acuaor Coil Pickup Coil Gear Figure 7: PyCRA encoder acuaor coil, sensor, and gear seup. Experimens show ha he model is reasonably accurae wih an error in he range of milli-vols..4 Tesbed In order o es he PyCRA-secured magneic encoder, we consruced a esbed consising of he proposed secure sensor aached o a Mazda Rx7 one ring. The one ring is aached o a DC moor which simulaes a roaing wheel. An addiional coil is added o simulae he effec of an aacker. The aacker coil is also conrolled by a high gain amplifier conrolled hrough a real-ime xpc Targe sysem conneced o MATLAB. A Mazda RX7 magneic encoder sensor is also aached o he same one ring in order o provide ground ruh. The oupu of his sensor is conneced o a MAX9926U evaluaion ki which includes an inerface capable of convering he raw sinusoidal wave ino he encoded square wave as shown in Figure 6. The oupu of he proposed secure sensor as well as he oupu of he MAX9926U is moniored by he same real-ime xpc Targe for comparison.. Calibraion agains naural variaions modeling is usually done in a conrolled environmen. However, once he sensor is placed in a esbed, muliple naural variaions, mechanical asymmeries, and oher environmenal facors degrade he accuracy of such models. To accoun for hese variaions, we use a simple learning mechanism o esimae he noise level in he measuremens and he deviaion beween he expeced oupus (as per he model) and he acual oupus. Once hese parameers are learned, we can se he alarm hreshold accordingly. Resuls can be furher improved by considering online idenificaion-and-calibraion of he sensor model..6 Aack Deecion for Magneic Encoders We begin wih a simple spoofing aack [T2] in which an aacker injecs a sinusoidal wave of varying frequency. Spoofing aacks of his naure aemp o overpower he rue frequency of he sysem and force he sensor o rack he false frequency (mirroring he simplisic spoofing aack in [13]). In his experimen he original one ring frequency is fixed a 71 Hz, and he frequency of he aacking coil increases linearly from 6 Hz o jus over 4 Hz. As per our aacker model in Secion 2, we assume ha he aacker aemps o conceal his or her presence (Adversarial goal [G1]). This means ha he adversary will be able o deec when he acuaor coil is urned off and will, afer some ime τ aack, emporarily hal he aack. The sealhiness of he aacker necessiaes ha he PyCRA deecion scheme have high accuracy even when he aacker is quick 11

8 True Posiive Rae Deecion F 1 Score ms. ms.2.2 ms ms False Posiive Rae (a) Fs = 3 khz.4 Fs = 2 khz Fs = 1 khz Aacker Physical Delay, τ aack (ms) (b) Figure 8: Resuls from 3 experimens showing (a) he accuracy of aack deecion for a simple spoofing aack wih sampling rae F s = 1 khz and a range of τ aack, and (b) aack deecion accuracy as a funcion of τ aack for several sampling raes, F s. o reac. We evaluaed he PyCRA deecion scheme across a range of τ aack values, χ 2 deecion hresholds (α), and sampling frequencies (F s ). Noe ha in order o simulae an aacker wih ms physical delays (which is physically impossible), we gave he aacker access o he random signal generaed by PyCRA so ha he aacker can sar shuing down his acuaors before PyCRA generaes he physical challenge. In oal, we conduced over 3 experimens on our experimenal esbed o validae he robusness of he proposed securiy scheme. The resuling accuracy wih F s = 1 khz is depiced by he ROC 2 curves in Figure 8a for a range of α. From his figure i is clear ha beween τ aack = and 7 µs is all ha is necessary for PyCRA o accuraely disinguish aacked signals from normal signals, if α is chosen appropriaely. Wih α se o a predeermined value, we can vary F s as shown in Figure 8b 3. These resuls show ha increasing F s from 1 khz o 3 khz reduces required ime for deecion o beween τ aack = 1 and 2 µs. Repeaing hese experimens for he advanced spoofing aack [T3] yields similar resuls. In fac, here is no fundamenal difference beween he wo in erms of aack deecion; his is governed by he dynamics of he aacker s acuaor raher han he naure of he aack iself. I is imporan o evaluae his deecion accuracy (which is our securiy guaranee) in erms of he physical delay propery τ aack of he aacker model. In pracice, he sae-of-he-ar in low-dimension, high Q-facor hardware ha provide enough power o carry ou a spoofing aack will have τ 2µs 4. From Figure 8b i is apparen ha PyCRA has good performance for his range of pracical physical delays. Moreover, he resuls we have shown hus far use a relaively low sampling frequency (high end micro conrollers can operae in he range of 2 khz). As illusraed by Figure 8b, higher sampling 2 A Receiver Operaing Characerisic (ROC) is a visual aid for evaluaing he accuracy of binary classifiers in erms of boh rue and false posiive raes. 3 The F 1 score is a saisical measure of a binary classifier ha measures he classifier accuracy in erms of precision and recall. 4 These values were obained by surveying a range of sae-of-hear, commercially available componens. Proxmark3 Oscilloscope RFID Reader Sniffer Tag (a) (b) Figure 9: The schemaic used in he RFID eavesdropping case sudy (a) and corresponding hardware seup (b). The seup conains wo low frequency anennas (one for he RFID reader and one for he eavesdropper) along wih a Proxmark3 board running he PyCRA deecion algorihm. The analog signal is also capured by a digial oscilloscope for visualizaion raes resul in reduced aack deecion imes. However, using low sampling frequencies in our case sudy serves o illusrae he efficiency of he proposed deecion mechanism. 6. CASE STUDY (2): DETECTION OF PAS- SIVE EAVESDROPPING ON RFID In his secion, we discuss deecion of passive eavesdropping aacks on acive sensors. In his scenario, an adversary lisens or records he same physical signals capured by he sensor. Indeed his ype of aack saisfies assumpions A1 A3 described in Secion 3 and hence i will be useful o exend PyCRA o such cases. 6.1 Passive Eavesdropping on RFID In his secion, we use radio-frequency idenificaion (RFID) as an example where successful passive aacks can have severe consequences. RFID sysems are commonly used o conrol access o physical places and o rack he locaion of cerain objecs. An RFID sysem consiss of wo pars: a reader and a ag. The RFID reader coninuously sends a magneic signal ha probes for exising ags in he near proximiy. Once a ag eners he proximiy of he reader, he ag sars o send is unique idenifier o he reader by modulaing he magneic probe signal. RFID ags can be classified as eiher passive or acive based on he source of heir energy. While passive ags rely on he energy ransmied by an RFID reader in order o power heir elecronics, acive ags have heir own power supplies. As a resul, acive ags can be equipped wih compuaional plaforms ha run crypographic and securiy proocols o miigae cloning aacks []. On he oher hand, passive ags do no enjoy hese luxuries and herefore are more prone o cloning aacks. Cloning of passive RFID ags can ake place in one of wo forms. In he firs, he aacker uses a mobile RFID reader and aemps o place i near he RFID ag. The ag innocenly responds o he communicaion issued by he adversarial reader and sends is unique idenifier. The oher form of aack carried ou agains RFID sysems is o eavesdrop on he communicaion beween he ag and a legiimae reader. RFID proecive shields and blockers [27, 1] are commonly used as counermeasure o he firs form of cloning aacks discussed above. Unforunaely, hese shields are of no use 111

9 Volage [vol] 1 Volage [vol] 1 Volage [vol] Volage [vol] 1 Volage [vol] 1 Volage [vol] Volage [vol] 4 2 Alarm hreshold Volage [vol] 4 2 Alarm hreshold Volage [vol] 4 2 Alarm hreshold Normal response (no aack) Response under aack Residual = oupu - expeced Normal response (no aack) Response under aack Residual = oupu - expeced Normal response (no aack) Response under aack Residual = oupu - expeced (a) (b) (c) Figure 1: Resuls of applying PyCRA o deec he exisence of an eavesdropper in he proximiy of an RFID reader. (a) Resuls of using sandard 12KHz signal for deecion. (b) Resuls of using PyCRA when only an RFID ag is presen in he proximiy of he PyCRA-enabled reader, and (c) Resuls of using PyCRA in deecing eavesdropping when boh an RFID ag and an eavesdropper anenna are presen in he proximiy of he PyCRA-enabled reader. Top figure shows he response o he physical challenges when no eavesdropper is placed in he proximiy of he RFID reader. The middle figure shows he response o he physical challenges when (a) an eavesdropper anenna (b) passive ag only (c) passive ag + eavesdropper anenna are placed in he proximiy of he reader. Finally, he boom figure shows he value of he residuals calculaed by PyCRA along wih he alarm hreshold. agains he second ype of aacks, because he user is obliged o remove he proecive shield before using he ag wih he legiimae RFID reader, a which ime an adversary can successfully eavesdrop. To carry ou an eavesdropping aack, a sniffing device mus be placed in close proximiy o he RFID reader so ha i can measure he elecromagneic waves ransmied by he reader and refleced by he ag. In he following resuls, we show how PyCRA is able o deec he exisence of such an aack, allowing he reader o disable communicaion wih he ag before revealing privae informaion. 6.2 Using PyCRA o Deec Eavesdroppers Recall from he physics of elecromagneic waves ha anennas placed wihin close proximiy will always affec each oher s elecrical signals o some degree. This is a fundamenal law in physics known as magneic coupling [2] and is used in he design of RFID. Noe ha, similar o he physical delays, he magneic coupling assumpion is a fundamenal limiaion ha he aacker canno overcome. Hence, we can use he PyCRA deecion algorihm oulined in Secion 3 by compuing he residual beween he model (which assumes magneic coupling only wih he RFID ag) and he sensor oupu which suffers from magneic coupling wih he eavesdropping anenna. This is shown in he experimenal resuls in he nex subsecion. 6.3 Hardware Seup and Real-ime Resuls Figure 9 shows he hardware seup used o carry ou his casesudy. In his seup, wo idenical low frequency RFID anennas are used. The firs RFID anenna is used as he legiimae RFID reader while he second is used o eavesdrop. We buil a PyCRA-enabled RFID reader on op of he open source RFID Proxmark3 board, adding random modulaion o he probing signal and consrucing he appropriae models as oulined in Secion 3. Figure 1a (op) shows he received elecromagneic wave of an RFID reader operaing in he classical operaional mode. In his mode, he RFID reader generaes he sandard 12KHz sinusoidal wave ha is used o communicae wih he RFID ag. Figure 1a (middle) shows he resuling elecromagneic wave when an eavesdropper uses an idenical anenna o lisen. In his case i is hard o disinguish beween he wo waves and hence hard o deec he exisence of an eavesdropper. This is beer illusraed by he residual beween he wo waves as shown by he residual in Figure 1a (boom). On he oher hand, Figures 1b and 1c show he resul of he same case sudy when PyCRA is used wih and wihou an eavesdropper presen, respecively. In his mode, he PyCRA algorihm occasionally hals he normal operaion of he RFID reader and swiches o deecion mode. In his mode, PyCRA selecs randomized periods of ime o issue he physical challenges by swiching he RFID anenna from on o off and from off o on. In order o selec an appropriae alarm hreshold, we firs sudy he effec of he magneic coupling beween he reader and he ag in he absence of an eavesdropper. This is shown in Figure 1b where he alarm hreshold is chosen such ha no alarm is riggered when he effec of he magneic coupling he residual beween he no ag response (op) and he response wih a ag (middle) is wihin he accepable range. This accepable residual range allows for coupling induced by he ag only. Any increase on op of his allowable hreshold is hen aribued o he exisence of an excessive magneic coupling due o an eavesdropper. Figure 1c (middle) shows he response o he same se of physical challenges when he aacker places an eavesdropping anenna in he proximiy of he RFID reader while he ag is also presen. Thanks o he physical challenge produced by PyCRA, he magneic coupling produced by he eavesdropper anenna is now easily deeced. This can be shown in Figure 1c (boom) which shows he residuals beween he expeced oupu and he measured signal exceeding he alarm hreshold. We recorded over 1 hour of RFID measuremens wih varying disances of he malicious eavesdropping anenna. Of hose experimens where he aacker was close enough o observe he RFID communicaion, PyCRA successfully deeced he exisence of an 112

ECMA st Edition / June Near Field Communication Wired Interface (NFC-WI)

ECMA st Edition / June Near Field Communication Wired Interface (NFC-WI) ECMA-373 1 s Ediion / June 2006 Near Field Communicaion Wired Inerface (NFC-WI) Sandard ECMA-373 1 s Ediion / June 2006 Near Field Communicaion Wired Inerface (NFC-WI) Ecma Inernaional Rue du Rhône 114

More information

EXPERIMENT #9 FIBER OPTIC COMMUNICATIONS LINK

EXPERIMENT #9 FIBER OPTIC COMMUNICATIONS LINK EXPERIMENT #9 FIBER OPTIC COMMUNICATIONS LINK INTRODUCTION: Much of daa communicaions is concerned wih sending digial informaion hrough sysems ha normally only pass analog signals. A elephone line is such

More information

Investigation and Simulation Model Results of High Density Wireless Power Harvesting and Transfer Method

Investigation and Simulation Model Results of High Density Wireless Power Harvesting and Transfer Method Invesigaion and Simulaion Model Resuls of High Densiy Wireless Power Harvesing and Transfer Mehod Jaber A. Abu Qahouq, Senior Member, IEEE, and Zhigang Dang The Universiy of Alabama Deparmen of Elecrical

More information

EXPERIMENT #4 AM MODULATOR AND POWER AMPLIFIER

EXPERIMENT #4 AM MODULATOR AND POWER AMPLIFIER EXPERIMENT #4 AM MODULATOR AND POWER AMPLIFIER INTRODUCTION: Being able o ransmi a radio frequency carrier across space is of no use unless we can place informaion or inelligence upon i. This las ransmier

More information

Memorandum on Impulse Winding Tester

Memorandum on Impulse Winding Tester Memorandum on Impulse Winding Teser. Esimaion of Inducance by Impulse Response When he volage response is observed afer connecing an elecric charge sored up in he capaciy C o he coil L (including he inside

More information

ECMA-373. Near Field Communication Wired Interface (NFC-WI) 2 nd Edition / June Reference number ECMA-123:2009

ECMA-373. Near Field Communication Wired Interface (NFC-WI) 2 nd Edition / June Reference number ECMA-123:2009 ECMA-373 2 nd Ediion / June 2012 Near Field Communicaion Wired Inerface (NFC-WI) Reference number ECMA-123:2009 Ecma Inernaional 2009 COPYRIGHT PROTECTED DOCUMENT Ecma Inernaional 2012 Conens Page 1 Scope...

More information

P. Bruschi: Project guidelines PSM Project guidelines.

P. Bruschi: Project guidelines PSM Project guidelines. Projec guidelines. 1. Rules for he execuion of he projecs Projecs are opional. Their aim is o improve he sudens knowledge of he basic full-cusom design flow. The final score of he exam is no affeced by

More information

LECTURE 1 CMOS PHASE LOCKED LOOPS

LECTURE 1 CMOS PHASE LOCKED LOOPS Lecure 01 (8/9/18) Page 1-1 Objecive LECTURE 1 CMOS PHASE LOCKED LOOPS OVERVIEW Undersand he principles and applicaions of phase locked loops using inegraed circui echnology wih emphasis on CMOS echnology.

More information

4 20mA Interface-IC AM462 for industrial µ-processor applications

4 20mA Interface-IC AM462 for industrial µ-processor applications Because of he grea number of indusrial buses now available he majoriy of indusrial measuremen echnology applicaions sill calls for he sandard analog curren nework. The reason for his lies in he fac ha

More information

Pulse Train Controlled PCCM Buck-Boost Converter Ming Qina, Fangfang Lib

Pulse Train Controlled PCCM Buck-Boost Converter Ming Qina, Fangfang Lib 5h Inernaional Conference on Environmen, Maerials, Chemisry and Power Elecronics (EMCPE 016 Pulse Train Conrolled PCCM Buck-Boos Converer Ming Qina, Fangfang ib School of Elecrical Engineering, Zhengzhou

More information

Lecture #7: Discrete-time Signals and Sampling

Lecture #7: Discrete-time Signals and Sampling EEL335: Discree-Time Signals and Sysems Lecure #7: Discree-ime Signals and Sampling. Inroducion Lecure #7: Discree-ime Signals and Sampling Unlike coninuous-ime signals, discree-ime signals have defined

More information

Table of Contents. 3.0 SMPS Topologies. For Further Research. 3.1 Basic Components. 3.2 Buck (Step Down) 3.3 Boost (Step Up) 3.4 Inverter (Buck/Boost)

Table of Contents. 3.0 SMPS Topologies. For Further Research. 3.1 Basic Components. 3.2 Buck (Step Down) 3.3 Boost (Step Up) 3.4 Inverter (Buck/Boost) Table of Conens 3.0 SMPS Topologies 3.1 Basic Componens 3.2 Buck (Sep Down) 3.3 Boos (Sep Up) 3.4 nverer (Buck/Boos) 3.5 Flyback Converer 3.6 Curren Boosed Boos 3.7 Curren Boosed Buck 3.8 Forward Converer

More information

Communication Systems. Department of Electronics and Electrical Engineering

Communication Systems. Department of Electronics and Electrical Engineering COMM 704: Communicaion Lecure : Analog Mulipliers Dr Mohamed Abd El Ghany Dr. Mohamed Abd El Ghany, Mohamed.abdel-ghany@guc.edu.eg nroducion Nonlinear operaions on coninuous-valued analog signals are ofen

More information

EE 330 Lecture 24. Amplification with Transistor Circuits Small Signal Modelling

EE 330 Lecture 24. Amplification with Transistor Circuits Small Signal Modelling EE 330 Lecure 24 Amplificaion wih Transisor Circuis Small Signal Modelling Review from las ime Area Comparison beween BJT and MOSFET BJT Area = 3600 l 2 n-channel MOSFET Area = 168 l 2 Area Raio = 21:1

More information

4.5 Biasing in BJT Amplifier Circuits

4.5 Biasing in BJT Amplifier Circuits 4/5/011 secion 4_5 Biasing in MOS Amplifier Circuis 1/ 4.5 Biasing in BJT Amplifier Circuis eading Assignmen: 8086 Now le s examine how we C bias MOSFETs amplifiers! f we don bias properly, disorion can

More information

AN303 APPLICATION NOTE

AN303 APPLICATION NOTE AN303 APPLICATION NOTE LATCHING CURRENT INTRODUCTION An imporan problem concerning he uilizaion of componens such as hyrisors or riacs is he holding of he componen in he conducing sae afer he rigger curren

More information

Development of Temporary Ground Wire Detection Device

Development of Temporary Ground Wire Detection Device Inernaional Journal of Smar Grid and Clean Energy Developmen of Temporary Ground Wire Deecion Device Jing Jiang* and Tao Yu a Elecric Power College, Souh China Universiy of Technology, Guangzhou 5164,

More information

Chapter 2 Introduction: From Phase-Locked Loop to Costas Loop

Chapter 2 Introduction: From Phase-Locked Loop to Costas Loop Chaper 2 Inroducion: From Phase-Locked Loop o Cosas Loop The Cosas loop can be considered an exended version of he phase-locked loop (PLL). The PLL has been invened in 932 by French engineer Henri de Belleszice

More information

EECE 301 Signals & Systems Prof. Mark Fowler

EECE 301 Signals & Systems Prof. Mark Fowler EECE 301 s & Sysems Prof. Mark Fowler Noe Se #1 Wha is s & Sysems all abou??? 1/9 Do All EE s & CoE s Design Circuis? No!!!! Someone has o figure ou wha funcion hose circuis need o do Someone also needs

More information

Experiment 6: Transmission Line Pulse Response

Experiment 6: Transmission Line Pulse Response Eperimen 6: Transmission Line Pulse Response Lossless Disribued Neworks When he ime required for a pulse signal o raverse a circui is on he order of he rise or fall ime of he pulse, i is no longer possible

More information

Programmable DC Electronic Load 8600 Series

Programmable DC Electronic Load 8600 Series Daa Shee Programmable DC Elecronic Load The programmable DC elecronic loads provide he performance of modular sysem DC elecronic loads in a compac benchop form facor. Wih fas ransien operaion speeds and

More information

Lab 3 Acceleration. What You Need To Know: Physics 211 Lab

Lab 3 Acceleration. What You Need To Know: Physics 211 Lab b Lab 3 Acceleraion Wha You Need To Know: The Physics In he previous lab you learned ha he velociy of an objec can be deermined by finding he slope of he objec s posiion vs. ime graph. x v ave. = v ave.

More information

Automatic Power Factor Control Using Pic Microcontroller

Automatic Power Factor Control Using Pic Microcontroller IDL - Inernaional Digial Library Of Available a:www.dbpublicaions.org 8 h Naional Conference on Advanced Techniques in Elecrical and Elecronics Engineering Inernaional e-journal For Technology And Research-2017

More information

Lecture 11. Digital Transmission Fundamentals

Lecture 11. Digital Transmission Fundamentals CS4/MSc Compuer Neworking Lecure 11 Digial Transmission Fundamenals Compuer Neworking, Copyrigh Universiy of Edinburgh 2005 Digial Transmission Fundamenals Neworks consruced ou of Links or ransmission

More information

Signal Characteristics

Signal Characteristics Signal Characerisics Analog Signals Analog signals are always coninuous (here are no ime gaps). The signal is of infinie resoluion. Discree Time Signals SignalCharacerisics.docx 8/28/08 10:41 AM Page 1

More information

Digital Communications - Overview

Digital Communications - Overview EE573 : Advanced Digial Communicaions Digial Communicaions - Overview Lecurer: Assoc. Prof. Dr Noor M Khan Deparmen of Elecronic Engineering, Muhammad Ali Jinnah Universiy, Islamabad Campus, Islamabad,

More information

Multiple Load-Source Integration in a Multilevel Modular Capacitor Clamped DC-DC Converter Featuring Fault Tolerant Capability

Multiple Load-Source Integration in a Multilevel Modular Capacitor Clamped DC-DC Converter Featuring Fault Tolerant Capability Muliple Load-Source Inegraion in a Mulilevel Modular Capacior Clamped DC-DC Converer Feauring Faul Toleran Capabiliy Faisal H. Khan, Leon M. Tolber The Universiy of Tennessee Elecrical and Compuer Engineering

More information

Programmable DC Electronic Loads 8600 Series

Programmable DC Electronic Loads 8600 Series Daa Shee Programmable DC Elecronic Loads The programmable DC elecronic loads provide he performance of modular sysem DC elecronic loads in a compac benchop form facor. Wih fas ransien operaion speeds and

More information

Chapter 2 Summary: Continuous-Wave Modulation. Belkacem Derras

Chapter 2 Summary: Continuous-Wave Modulation. Belkacem Derras ECEN 44 Communicaion Theory Chaper Summary: Coninuous-Wave Modulaion.1 Modulaion Modulaion is a process in which a parameer of a carrier waveform is varied in accordance wih a given message (baseband)

More information

UNIT IV DIGITAL MODULATION SCHEME

UNIT IV DIGITAL MODULATION SCHEME UNI IV DIGIAL MODULAION SCHEME Geomeric Represenaion of Signals Ojecive: o represen any se of M energy signals {s i (} as linear cominaions of N orhogonal asis funcions, where N M Real value energy signals

More information

Electrical connection

Electrical connection Reference scanner Dimensioned drawing en 02-2014/06 50117040-01 200 500mm Disance on background/reference 10-30 V DC We reserve he righ o make changes DS_HRTR46Bref_en_50117040_01.fm Robus objec deecion

More information

Control and Protection Strategies for Matrix Converters. Control and Protection Strategies for Matrix Converters

Control and Protection Strategies for Matrix Converters. Control and Protection Strategies for Matrix Converters Conrol and Proecion Sraegies for Marix Converers Dr. Olaf Simon, Siemens AG, A&D SD E 6, Erlangen Manfred Bruckmann, Siemens AG, A&D SD E 6, Erlangen Conrol and Proecion Sraegies for Marix Converers To

More information

PRM and VTM Parallel Array Operation

PRM and VTM Parallel Array Operation APPLICATION NOTE AN:002 M and V Parallel Array Operaion Joe Aguilar VI Chip Applicaions Engineering Conens Page Inroducion 1 High-Level Guidelines 1 Sizing he Resisor 4 Arrays of Six or More Ms 5 Sysem

More information

Variation Aware Cross-Talk Aggressor Alignment by Mixed Integer Linear Programming

Variation Aware Cross-Talk Aggressor Alignment by Mixed Integer Linear Programming ariaion Aware Cross-alk Aggressor Alignmen by Mixed Ineger Linear Programming ladimir Zoloov IBM. J. Wason Research Cener, Yorkown Heighs, NY zoloov@us.ibm.com Peer Feldmann D. E. Shaw Research, New York,

More information

EE201 Circuit Theory I Fall

EE201 Circuit Theory I Fall EE1 Circui Theory I 17 Fall 1. Basic Conceps Chaper 1 of Nilsson - 3 Hrs. Inroducion, Curren and Volage, Power and Energy. Basic Laws Chaper &3 of Nilsson - 6 Hrs. Volage and Curren Sources, Ohm s Law,

More information

Dimensions. Model Number. Electrical connection emitter. Features. Electrical connection receiver. Product information. Indicators/operating means

Dimensions. Model Number. Electrical connection emitter. Features. Electrical connection receiver. Product information. Indicators/operating means OBE-R-SE Dimensions.8.8 ø..75 7.5 6. 5 6.7 4.9 4. 5.9 ø.6 Model Number OBE-R-SE Elecrical connecion emier Thru-beam sensor wih m fixed cable Feaures 45 cable oule for maximum mouning freedom under exremely

More information

Universal microprocessor-based ON/OFF and P programmable controller MS8122A MS8122B

Universal microprocessor-based ON/OFF and P programmable controller MS8122A MS8122B COMPETENCE IN MEASUREMENT Universal microprocessor-based ON/OFF and P programmable conroller MS8122A MS8122B TECHNICAL DESCRIPTION AND INSTRUCTION FOR USE PLOVDIV 2003 1 I. TECHNICAL DATA Analog inpus

More information

TELE4652 Mobile and Satellite Communications

TELE4652 Mobile and Satellite Communications TELE465 Mobile and Saellie Communicaions Assignmen (Due: 4pm, Monday 7 h Ocober) To be submied o he lecurer before he beginning of he final lecure o be held a his ime.. This quesion considers Minimum Shif

More information

Phase-Shifting Control of Double Pulse in Harmonic Elimination Wei Peng1, a*, Junhong Zhang1, Jianxin gao1, b, Guangyi Li1, c

Phase-Shifting Control of Double Pulse in Harmonic Elimination Wei Peng1, a*, Junhong Zhang1, Jianxin gao1, b, Guangyi Li1, c Inernaional Symposium on Mechanical Engineering and Maerial Science (ISMEMS 016 Phase-Shifing Conrol of Double Pulse in Harmonic Eliminaion Wei Peng1, a*, Junhong Zhang1, Jianxin gao1, b, Guangyi i1, c

More information

EE 40 Final Project Basic Circuit

EE 40 Final Project Basic Circuit EE 0 Spring 2006 Final Projec EE 0 Final Projec Basic Circui Par I: General insrucion 1. The final projec will coun 0% of he lab grading, since i s going o ake lab sessions. All oher individual labs will

More information

ELEG 3124 SYSTEMS AND SIGNALS Ch. 1 Continuous-Time Signals

ELEG 3124 SYSTEMS AND SIGNALS Ch. 1 Continuous-Time Signals Deparmen of Elecrical Engineering Universiy of Arkansas ELEG 3124 SYSTEMS AND SIGNALS Ch. 1 Coninuous-Time Signals Dr. Jingxian Wu wuj@uark.edu OUTLINE 2 Inroducion: wha are signals and sysems? Signals

More information

Connection. Input II EEx ia IIC without SC red. Composition

Connection. Input II EEx ia IIC without SC red. Composition Sandsill conroller Oupu: relay Connecion Inpu I EEx ia IIC Inpu II EEx ia IIC 1-channel Conrol circui EEx ia IIC Addiional inpu or roaion direcion deecion or sar-up override 2 relay oupus Inpu requency

More information

Dimensions. Transmitter Receiver ø2.6. Electrical connection. Transmitter +UB 0 V. Emitter selection. = Light on = Dark on

Dimensions. Transmitter Receiver ø2.6. Electrical connection. Transmitter +UB 0 V. Emitter selection. = Light on = Dark on OBE-R-SE Dimensions Transmier.. 7.5 9..5.8 4.9 4 5 M 8.9 7.5 9..5.8 4 5 M 8.9 ø.6 ø.6 Model Number OBE-R-SE Thru-beam sensor wih m fixed cable Elecrical connecion Transmier Feaures BN +UB WH IN Ulra-small

More information

Explanation of Maximum Ratings and Characteristics for Thyristors

Explanation of Maximum Ratings and Characteristics for Thyristors 8 Explanaion of Maximum Raings and Characerisics for Thyrisors Inroducion Daa shees for s and riacs give vial informaion regarding maximum raings and characerisics of hyrisors. If he maximum raings of

More information

Dimensions. Transmitter Receiver ø2.6. Electrical connection. Transmitter +UB 0 V. Emitter selection. = Light on = Dark on

Dimensions. Transmitter Receiver ø2.6. Electrical connection. Transmitter +UB 0 V. Emitter selection. = Light on = Dark on OBE-R-SE Dimensions Transmier.. 7.5 9..5.8 4.9 4 5 M 8.9 7.5 9..5.8 4 5 M 8.9 ø.6 ø.6 Model Number OBE-R-SE Thru-beam sensor wih m fixed cable Elecrical connecion Transmier Feaures BN +UB WH IN Ulra-small

More information

Knowledge Transfer in Semi-automatic Image Interpretation

Knowledge Transfer in Semi-automatic Image Interpretation Knowledge Transfer in Semi-auomaic Image Inerpreaion Jun Zhou 1, Li Cheng 2, Terry Caelli 23, and Waler F. Bischof 1 1 Deparmen of Compuing Science, Universiy of Albera, Edmonon, Albera, Canada T6G 2E8

More information

5 Spatial Relations on Lines

5 Spatial Relations on Lines 5 Spaial Relaions on Lines There are number of useful problems ha can be solved wih he basic consrucion echniques developed hus far. We now look a cerain problems, which involve spaial relaionships beween

More information

IR Sensor Module for Reflective Sensor, Light Barrier, and Fast Proximity Applications

IR Sensor Module for Reflective Sensor, Light Barrier, and Fast Proximity Applications IR Sensor Module for Reflecive Sensor, Ligh Barrier, and Fas Proximiy Applicaions 2 3 DESIGN SUPPORT TOOLS 6672 click logo o ge sared FEATURES Up o 2 m for presence and proximiy sensing Uses modulaed burss

More information

RITEC, Inc. 60 Alhambra Rd., Suite 5 Warwick, RI (401) FAX (401) Powerful Ultrasonic Research Tool. A Modular Approach

RITEC, Inc. 60 Alhambra Rd., Suite 5 Warwick, RI (401) FAX (401) Powerful Ultrasonic Research Tool. A Modular Approach RITEC RAM-5 Versaile Compuer Conrolled Ulrasonic Sysem: Modular Approach allows Cusomizaion o Specific Experimenal Requiremens. High Power RF Burs Oupus as high as 5 kilowas for frequencies o 7 MHz. Three

More information

ECE-517 Reinforcement Learning in Artificial Intelligence

ECE-517 Reinforcement Learning in Artificial Intelligence ECE-517 Reinforcemen Learning in Arificial Inelligence Lecure 11: Temporal Difference Learning (con.), Eligibiliy Traces Ocober 8, 2015 Dr. Iamar Arel College of Engineering Deparmen of Elecrical Engineering

More information

Programmable DC Electronic Loads 8600 Series

Programmable DC Electronic Loads 8600 Series Daa Shee Programmable DC Elecronic Loads 99 Washingon Sree Melrose, MA 02176 Phone 781-665-1400 Toll Free 1-800-517-8431 Visi us a www.tesequipmendepo.com 2U half-rack 3U 6U USB RS232 GPIB The programmable

More information

A New Voltage Sag and Swell Compensator Switched by Hysteresis Voltage Control Method

A New Voltage Sag and Swell Compensator Switched by Hysteresis Voltage Control Method Proceedings of he 8h WSEAS Inernaional Conference on ELECTRIC POWER SYSTEMS, HIGH VOLTAGES, ELECTRIC MACHINES (POWER '8) A New Volage Sag and Swell Compensaor Swiched by Hyseresis Volage Conrol Mehod AMIR

More information

A-LEVEL Electronics. ELEC4 Programmable Control Systems Mark scheme June Version: 1.0 Final

A-LEVEL Electronics. ELEC4 Programmable Control Systems Mark scheme June Version: 1.0 Final A-LEVEL Elecronics ELEC4 Programmable Conrol Sysems scheme 243 June 26 Version:. Final schemes are prepared by he Lead Assessmen Wrier and considered, ogeher wih he relevan quesions, by a panel of subjec

More information

IR Sensor Module for Reflective Sensor, Light Barrier, and Fast Proximity Applications

IR Sensor Module for Reflective Sensor, Light Barrier, and Fast Proximity Applications IR Sensor Module for Reflecive Sensor, Ligh Barrier, and Fas Proximiy Applicaions 2 3 DESIGN SUPPORT TOOLS Models Available MECHANICAL DATA Pinning: = OUT, 2 = GND, 3 = V S click logo o ge sared 6672 APPLICATIONS

More information

A WIDEBAND RADIO CHANNEL MODEL FOR SIMULATION OF CHAOTIC COMMUNICATION SYSTEMS

A WIDEBAND RADIO CHANNEL MODEL FOR SIMULATION OF CHAOTIC COMMUNICATION SYSTEMS A WIDEBAND RADIO CHANNEL MODEL FOR SIMULATION OF CHAOTIC COMMUNICATION SYSTEMS Kalle Rui, Mauri Honanen, Michael Hall, Timo Korhonen, Veio Porra Insiue of Radio Communicaions, Helsini Universiy of Technology

More information

Comparative Analysis of the Large and Small Signal Responses of "AC inductor" and "DC inductor" Based Chargers

Comparative Analysis of the Large and Small Signal Responses of AC inductor and DC inductor Based Chargers Comparaive Analysis of he arge and Small Signal Responses of "AC inducor" and "DC inducor" Based Chargers Ilya Zelser, Suden Member, IEEE and Sam Ben-Yaakov, Member, IEEE Absrac Two approaches of operaing

More information

Technology Trends & Issues in High-Speed Digital Systems

Technology Trends & Issues in High-Speed Digital Systems Deailed comparison of dynamic range beween a vecor nework analyzer and sampling oscilloscope based ime domain reflecomeer by normalizing measuremen ime Sho Okuyama Technology Trends & Issues in High-Speed

More information

Disribued by: www.jameco.com 1-800-831-4242 The conen and copyrighs of he aached maerial are he propery of is owner. 16K-Bi CMOS PARALLEL E 2 PROM FEATURES Fas Read Access Times: 200 ns Low Power CMOS

More information

Installation and Operating Instructions for ROBA -brake-checker Typ

Installation and Operating Instructions for ROBA -brake-checker Typ (B.018102.EN) Guidelines on he Declaraion of Conformiy A conformiy evaluaion has been carried ou for he produc in erms of he EC Low Volage Direcive 2006/95/ EC and EMC Direcive 2004/108/EC. The Declaraion

More information

M2 3 Introduction to Switching Regulators. 1. What is a switching power supply? 2. What types of switchers are available?

M2 3 Introduction to Switching Regulators. 1. What is a switching power supply? 2. What types of switchers are available? M2 3 Inroducion o Swiching Regulaors Objecive is o answerhe following quesions: 1. Wha is a swiching power supply? 2. Wha ypes of swichers are available? 3. Why is a swicher needed? 4. How does a swicher

More information

Power losses in pulsed voltage source inverters/rectifiers with sinusoidal currents

Power losses in pulsed voltage source inverters/rectifiers with sinusoidal currents ree-wheeling diode Turn-off power dissipaion: off/d = f s * E off/d (v d, i LL, T j/d ) orward power dissipaion: fw/t = 1 T T 1 v () i () d Neglecing he load curren ripple will resul in: fw/d = i Lavg

More information

Spring Localization I. Roland Siegwart, Margarita Chli, Martin Rufli. ASL Autonomous Systems Lab. Autonomous Mobile Robots

Spring Localization I. Roland Siegwart, Margarita Chli, Martin Rufli. ASL Autonomous Systems Lab. Autonomous Mobile Robots Spring 2017 Localizaion I Localizaion I 10.04.2017 1 2 ASL Auonomous Sysems Lab knowledge, daa base mission commands Localizaion Map Building environmen model local map posiion global map Cogniion Pah

More information

White paper. RC223 (type B) residual-current release

White paper. RC223 (type B) residual-current release Whie paper (ype B) residual-curren release (ype B) residual curren release Index 1. Generals... 2 2. Applicaion descripion... 3 2.1 Applicaions...3 2.2 Applicaion examples...4 2.3 How does an operae?...6

More information

Communications II Lecture 7: Performance of digital modulation

Communications II Lecture 7: Performance of digital modulation Communicaions II Lecure 7: Performance of digial modulaion Professor Kin K. Leung EEE and Compuing Deparmens Imperial College London Copyrigh reserved Ouline Digial modulaion and demodulaion Error probabiliy

More information

Wrap Up. Fourier Transform Sampling, Modulation, Filtering Noise and the Digital Abstraction Binary signaling model and Shannon Capacity

Wrap Up. Fourier Transform Sampling, Modulation, Filtering Noise and the Digital Abstraction Binary signaling model and Shannon Capacity Wrap Up Fourier ransorm Sampling, Modulaion, Filering Noise and he Digial Absracion Binary signaling model and Shannon Capaciy Copyrigh 27 by M.H. Perro All righs reserved. M.H. Perro 27 Wrap Up, Slide

More information

Answer Key for Week 3 Homework = 100 = 140 = 138

Answer Key for Week 3 Homework = 100 = 140 = 138 Econ 110D Fall 2009 K.D. Hoover Answer Key for Week 3 Homework Problem 4.1 a) Laspeyres price index in 2006 = 100 (1 20) + (0.75 20) Laspeyres price index in 2007 = 100 (0.75 20) + (0.5 20) 20 + 15 = 100

More information

THE OSCILLOSCOPE AND NOISE. Objectives:

THE OSCILLOSCOPE AND NOISE. Objectives: -26- Preparaory Quesions. Go o he Web page hp://www.ek.com/measuremen/app_noes/xyzs/ and read a leas he firs four subsecions of he secion on Trigger Conrols (which iself is a subsecion of he secion The

More information

IR Receiver Module for Light Barrier Systems

IR Receiver Module for Light Barrier Systems IR Receiver Module for Ligh Barrier Sysems DESIGN SUPPORT TOOLS 19026 click logo o ge sared FEATURES Up o 2 m for presence sensing Uses modulaed burss a 38 khz 940 nm peak wavelengh PIN diode and sensor

More information

Role of Kalman Filters in Probabilistic Algorithm

Role of Kalman Filters in Probabilistic Algorithm Volume 118 No. 11 2018, 5-10 ISSN: 1311-8080 (prined version); ISSN: 1314-3395 (on-line version) url: hp://www.ijpam.eu doi: 10.12732/ijpam.v118i11.2 ijpam.eu Role of Kalman Filers in Probabilisic Algorihm

More information

Revision: June 11, E Main Suite D Pullman, WA (509) Voice and Fax

Revision: June 11, E Main Suite D Pullman, WA (509) Voice and Fax 2.5.3: Sinusoidal Signals and Complex Exponenials Revision: June 11, 2010 215 E Main Suie D Pullman, W 99163 (509) 334 6306 Voice and Fax Overview Sinusoidal signals and complex exponenials are exremely

More information

Usually use an op-amp circuit Often found as a pre-amplifier to ADC circuitry Simple circuit to computer natural logarithm

Usually use an op-amp circuit Often found as a pre-amplifier to ADC circuitry Simple circuit to computer natural logarithm Connecing he compuaion capabiliies of a microconroller o exernal signals Transforming variable values ino volages and vice-versa Digial and analog Issues How many signals can be conrolled? How can digial

More information

Industrial, High Repetition Rate Picosecond Laser

Industrial, High Repetition Rate Picosecond Laser RAPID Indusrial, High Repeiion Rae Picosecond Laser High Power: RAPID is a very cos efficien, compac, diode pumped Nd:YVO4 picosecond laser wih 2 W average power a 1064 nm. Is 10 ps-pulses have high pulse

More information

Optical Short Pulse Generation and Measurement Based on Fiber Polarization Effects

Optical Short Pulse Generation and Measurement Based on Fiber Polarization Effects Opical Shor Pulse Generaion and Measuremen Based on Fiber Polarizaion Effecs Changyuan Yu Deparmen of Elecrical & Compuer Engineering, Naional Universiy of Singapore, Singapore, 117576 A*STAR Insiue for

More information

Pointwise Image Operations

Pointwise Image Operations Poinwise Image Operaions Binary Image Analysis Jana Kosecka hp://cs.gmu.edu/~kosecka/cs482.hml - Lookup able mach image inensiy o he displayed brighness values Manipulaion of he lookup able differen Visual

More information

Lecture 4. EITN Chapter 12, 13 Modulation and diversity. Antenna noise is usually given as a noise temperature!

Lecture 4. EITN Chapter 12, 13 Modulation and diversity. Antenna noise is usually given as a noise temperature! Lecure 4 EITN75 2018 Chaper 12, 13 Modulaion and diversiy Receiver noise: repeiion Anenna noise is usually given as a noise emperaure! Noise facors or noise figures of differen sysem componens are deermined

More information

MODELING OF CROSS-REGULATION IN MULTIPLE-OUTPUT FLYBACK CONVERTERS

MODELING OF CROSS-REGULATION IN MULTIPLE-OUTPUT FLYBACK CONVERTERS MODELING OF CROSS-REGULATION IN MULTIPLE-OUTPUT FLYBACK CONVERTERS Dragan Maksimovićand Rober Erickson Colorado Power Elecronics Cener Deparmen of Elecrical and Compuer Engineering Universiy of Colorado,

More information

OpenStax-CNX module: m Elemental Signals. Don Johnson. Perhaps the most common real-valued signal is the sinusoid.

OpenStax-CNX module: m Elemental Signals. Don Johnson. Perhaps the most common real-valued signal is the sinusoid. OpenSax-CNX module: m0004 Elemenal Signals Don Johnson This work is produced by OpenSax-CNX and licensed under he Creaive Commons Aribuion License.0 Absrac Complex signals can be buil from elemenal signals,

More information

Special Insert. Everything you wanted to know about Type B residual current circuit breakers but never dared to ask

Special Insert. Everything you wanted to know about Type B residual current circuit breakers but never dared to ask Special Inser Everyhing you waned o know abou Type B residual curren circui breakers bu never dared o ask Claudio Amadori: R&D ABB 1 Figure 1 - Marking of he Type B residual curren circui breakers Type

More information

Primary Side Control SMPS with Integrated MOSFET

Primary Side Control SMPS with Integrated MOSFET General Descripion GG64 is a primary side conrol SMPS wih an inegraed MOSFET. I feaures programmable cable drop compensaion and a peak curren compensaion funcion, PFM echnology, and a CV/CC conrol loop

More information

Negative frequency communication

Negative frequency communication Negaive frequency communicaion Fanping DU Email: dufanping@homail.com Qing Huo Liu arxiv:2.43v5 [cs.it] 26 Sep 2 Deparmen of Elecrical and Compuer Engineering Duke Universiy Email: Qing.Liu@duke.edu Absrac

More information

Optical phase locked loop for transparent inter-satellite communications

Optical phase locked loop for transparent inter-satellite communications Opical phase locked loop for ransparen iner-saellie communicaions F. Herzog 1, K. Kudielka 2,D.Erni 1 and W. Bächold 1 1 Communicaion Phoonics Group, Laboraory for Elecromagneic Fields and Microwave Elecronics,

More information

Lecture 5: DC-DC Conversion

Lecture 5: DC-DC Conversion 1 / 31 Lecure 5: DC-DC Conversion ELEC-E845 Elecric Drives (5 ECTS) Mikko Rouimo (lecurer), Marko Hinkkanen (slides) Auumn 217 2 / 31 Learning Oucomes Afer his lecure and exercises you will be able o:

More information

IR Receiver Module for Light Barrier Systems

IR Receiver Module for Light Barrier Systems IR Receiver Module for Ligh Barrier Sysems TSSP4..SSXB Vishay Semiconducors DESIGN SUPPORT TOOLS Models Available 3 MECHANICAL DATA Pinning: = OUT, = GND, 3 = V S 7 click logo o ge sared DESCRIPTION The

More information

Application Note 5324

Application Note 5324 Desauraion Faul Deecion Opocoupler Gae Drive Producs wih Feaure: PLJ, PL0J, PLJ, PL1J and HCPLJ Applicaion Noe 1. Inroducion A desauraion faul deecion circui provides proecion for power semiconducor swiches

More information

FROM ANALOG TO DIGITAL

FROM ANALOG TO DIGITAL FROM ANALOG TO DIGITAL OBJECTIVES The objecives of his lecure are o: Inroduce sampling, he Nyquis Limi (Shannon s Sampling Theorem) and represenaion of signals in he frequency domain Inroduce basic conceps

More information

Examination Mobile & Wireless Networking ( ) April 12,

Examination Mobile & Wireless Networking ( ) April 12, Page 1 of 5 Examinaion Mobile & Wireless Neworking (192620010) April 12, 2017 13.45 16.45 Noes: Only he overhead shees used in he course, 2 double-sided shees of noes (any fon size/densiy!), and a dicionary

More information

Receiver-Initiated vs. Short-Preamble Burst MAC Approaches for Multi-channel Wireless Sensor Networks

Receiver-Initiated vs. Short-Preamble Burst MAC Approaches for Multi-channel Wireless Sensor Networks Receiver-Iniiaed vs. Shor-Preamble Burs MAC Approaches for Muli-channel Wireless Sensor Neworks Crisina Cano, Boris Bellala, and Miquel Oliver Universia Pompeu Fabra, C/ Tànger 122-140, 08018 Barcelona,

More information

Notes on the Fourier Transform

Notes on the Fourier Transform Noes on he Fourier Transform The Fourier ransform is a mahemaical mehod for describing a coninuous funcion as a series of sine and cosine funcions. The Fourier Transform is produced by applying a series

More information

HF Transformer Based Grid-Connected Inverter Topology for Photovoltaic Systems

HF Transformer Based Grid-Connected Inverter Topology for Photovoltaic Systems 1 HF Transformer Based Grid-Conneced Inverer Topology for Phoovolaic Sysems Abhiji Kulkarni and Vinod John Deparmen of Elecrical Engineering, IISc Bangalore, India. (abhijik@ee.iisc.erne.in, vjohn@ee.iisc.erne.in)

More information

Dead Zone Compensation Method of H-Bridge Inverter Series Structure

Dead Zone Compensation Method of H-Bridge Inverter Series Structure nd Inernaional Conference on Elecrical, Auomaion and Mechanical Engineering (EAME 7) Dead Zone Compensaion Mehod of H-Bridge Inverer Series Srucure Wei Li Insiue of Elecrical Engineering and Informaion

More information

Chapter 2. The Physical Layer

Chapter 2. The Physical Layer Chaper 2 The Physical Layer The Physical Layer Defines he mechanical, elecrical and iming inerfaces o he nework Transmission media - guided (copper and fiber opics) - wireless (radio erresrial) - saellie

More information

Mobile Communications Chapter 3 : Media Access

Mobile Communications Chapter 3 : Media Access Moivaion Can we apply media access mehods from fixed neworks? Mobile Communicaions Chaper 3 : Media Access Moivaion SDMA, FDMA, TDMA Aloha Reservaion schemes Collision avoidance, MACA Polling CDMA SAMA

More information

f t 2cos 2 Modulator Figure 21: DSB-SC modulation.

f t 2cos 2 Modulator Figure 21: DSB-SC modulation. 4.5 Ampliude modulaion: AM 4.55. DSB-SC ampliude modulaion (which is summarized in Figure 21) is easy o undersand and analyze in boh ime and frequency domains. However, analyical simpliciy is no always

More information

Experimental Validation of Build-Up Factor Predictions of Numerical Simulation Codes

Experimental Validation of Build-Up Factor Predictions of Numerical Simulation Codes Inernaional Symposium on Digial Indusrial Radiology and Compued Tomography - Tu.. Experimenal Validaion of Build-Up Facor Predicions of Numerical Simulaion Codes Andreas SCHUMM *, Chrisophe BENTO *, David

More information

Foreign Fiber Image Segmentation Based on Maximum Entropy and Genetic Algorithm

Foreign Fiber Image Segmentation Based on Maximum Entropy and Genetic Algorithm Journal of Compuer and Communicaions, 215, 3, 1-7 Published Online November 215 in SciRes. hp://www.scirp.org/journal/jcc hp://dx.doi.org/1.4236/jcc.215.3111 Foreign Fiber Image Segmenaion Based on Maximum

More information

The University of Melbourne Department of Mathematics and Statistics School Mathematics Competition, 2013 JUNIOR DIVISION Time allowed: Two hours

The University of Melbourne Department of Mathematics and Statistics School Mathematics Competition, 2013 JUNIOR DIVISION Time allowed: Two hours The Universiy of Melbourne Deparmen of Mahemaics and Saisics School Mahemaics Compeiion, 203 JUNIOR DIVISION Time allowed: Two hours These quesions are designed o es your abiliy o analyse a problem and

More information

16.5 ADDITIONAL EXAMPLES

16.5 ADDITIONAL EXAMPLES 16.5 ADDITIONAL EXAMPLES For reiew purposes, more examples of boh piecewise linear and incremenal analysis are gien in he following subsecions. No new maerial is presened, so readers who do no need addiional

More information

Proceedings of International Conference on Mechanical, Electrical and Medical Intelligent System 2017

Proceedings of International Conference on Mechanical, Electrical and Medical Intelligent System 2017 on Mechanical, Elecrical and Medical Inelligen Sysem 7 Consan On-ime Conrolled Four-phase Buck Converer via Saw-oohwave Circui and is Elemen Sensiiviy Yi Xiong a, Koyo Asaishi b, Nasuko Miki c, Yifei Sun

More information

Development of Pulse Width Modulation LED drive

Development of Pulse Width Modulation LED drive ISSN 23069392, Inernaional Journal of Technology People Developing, Vol. 2, No. 3, DEC. 2012 Developmen of Pulse Widh Modulaion LED drive YuanPiao. Lee 1 ShihKuen. Changchien 2 ChainKuo Technology Universiy,

More information

RESISTANCE ESTIMATION OF A PWM-DRIVEN SOLENOID

RESISTANCE ESTIMATION OF A PWM-DRIVEN SOLENOID Inernaional Journal of Auomoive echnology, Vol. 8, No. 2, pp. 249 258 (2007) Copyrigh 2007 KSAE 1229 9138/2007/033 15 RESISANCE ESIMAION OF A PWM-DRIVEN SOLENOID H. G. JUNG 1),2)*, J. Y. HWANG 1), P. J.

More information