Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 78

Full-Text Articles in Engineering

Development Of A Security-Focused Multi-Channel Communication Protocol And Associated Quality Of Secure Service (Qoss) Metrics, Paul M. Simon Sep 2022

Development Of A Security-Focused Multi-Channel Communication Protocol And Associated Quality Of Secure Service (Qoss) Metrics, Paul M. Simon

Theses and Dissertations

The threat of eavesdropping, and the challenge of recognizing and correcting for corrupted or suppressed information in communication systems is a consistent challenge. Effectively managing protection mechanisms requires an ability to accurately gauge the likelihood or severity of a threat, and adapt the security features available in a system to mitigate the threat. This research focuses on the design and development of a security-focused communication protocol at the session-layer based on a re-prioritized communication architecture model and associated metrics. From a probabilistic model that considers data leakage and data corruption as surrogates for breaches of confidentiality and integrity, a set …


Convolutional Neural Network Architecture Study For Aerial Visual Localization, Jedediah M. Berhold Mar 2019

Convolutional Neural Network Architecture Study For Aerial Visual Localization, Jedediah M. Berhold

Theses and Dissertations

In unmanned aerial navigation the ability to determine the aircraft's location is essential for safe flight. The Global Positioning System (GPS) is the default modern application used for geospatial location determination. GPS is extremely robust, very accurate, and has essentially solved aerial localization. Unfortunately, the signals from all Global Navigation Satellite Systems (GNSS) to include GPS can be jammed or spoofed. To this response it is essential to develop alternative systems that could be used to supplement navigation systems, in the event of a lost GNSS signal. Public and governmental satellites have provided large amounts of high-resolution satellite imagery. These …


Machine Translation With Image Context From Mandarin Chinese To English, Brooke E. Johnson Mar 2019

Machine Translation With Image Context From Mandarin Chinese To English, Brooke E. Johnson

Theses and Dissertations

Despite ongoing improvements in machine translation, machine translators still lack the capability of incorporating context from which source text may have been derived. Machine translators use text from a source language to translate it into a target language without observing any visual context. This work aims to produce a neural machine translation model that is capable of accepting both text and image context as a multimodal translator from Mandarin Chinese to English. The model was trained on a small multimodal dataset of 700 images and sentences, and compared to a translator trained only on the text associated with those images. …


Serious Game Design Using Mda And Bloom’S Taxonomy, Senobio V. Chavez Mar 2019

Serious Game Design Using Mda And Bloom’S Taxonomy, Senobio V. Chavez

Theses and Dissertations

The field of Serious Games (SG) studies the use of games as a learning tool and it has been in existence for over forty years. During this period the primary focus of the field has been designing systems to evaluate the educational efficacy of existing games. This translates to a lack of systems designed to aid in the creation of serious games, but this does not have to remain an issue. The rise in popularity of games means that there is no shortage of ideas on how to methodically create them for commercial production which can just as easily be …


Preserving Privacy In Automotive Tire Pressure Monitoring Systems, Kenneth L. Hacker Mar 2019

Preserving Privacy In Automotive Tire Pressure Monitoring Systems, Kenneth L. Hacker

Theses and Dissertations

The automotive industry is moving towards a more connected ecosystem, with connectivity achieved through multiple wireless systems. However, in the pursuit of these technological advances and to quickly satisfy requirements imposed on manufacturers, the security of these systems is often an afterthought. It has been shown that systems in a standard new automobile that one would not expect to be vulnerable can be exploited for a variety of harmful effects. This thesis considers a seemingly benign, but government mandated, safety feature of modern vehicles; the Tire Pressure Monitoring System (TPMS). Typical implementations have no security-oriented features, leaking data that can …


Autonomous Association Of Geo Rso Observations Using Deep Neural Networks, Ian W. Mcquaid Mar 2019

Autonomous Association Of Geo Rso Observations Using Deep Neural Networks, Ian W. Mcquaid

Theses and Dissertations

Ground-based non-resolved optical observations of resident space objects (RSOs) in geosynchronous orbit (GEO) represent the majority of the space surveillance network’s (SSN’s) deep-space tracking. Reliable and accurate tracking necessitates temporal separation of the observations. This requires that subsequent observations be associated with prior observations of a given RSO before they can be used to create or refine that RSO’s ephemeris. The use of astrometric data (e.g. topocentric angular position) alone for this association task is complicated by RSO maneuvers between observations, and by RSOs operating in close proximity. Accurately associating an observation with an RSO thus motivates the use of …


Orthogonal Frequency Division Multiplexed Waveform Effects On Passive Bistatic Radar, Forrest D. Taylor Mar 2019

Orthogonal Frequency Division Multiplexed Waveform Effects On Passive Bistatic Radar, Forrest D. Taylor

Theses and Dissertations

Communication waveforms act as signals of opportunity for passive radars. However, these signals of opportunity suffer from range-Doppler processing losses due to their high range sidelobes and pulse-diverse waveform aspects. Signals such as the long term evolution (LTE) encode information within the phase and amplitude of the waveform. This research explores aspects of the LTE, such as the encoding scheme and bandwidth modes on passive bistatic Doppler radar. Signal space-time adaptive processing (STAP) performance is evaluated and parameters are compared with the signal to interference-plus-noise ratio (SINR) metric.


Magnetic Field Aided Indoor Navigation, William F. Storms Feb 2019

Magnetic Field Aided Indoor Navigation, William F. Storms

Theses and Dissertations

This research effort examines inertial navigation system aiding using magnetic field intensity data and a Kalman filter in an indoor environment. Many current aiding methods do not work well in an indoor environment, like aiding using the Global Positioning System. The method presented in this research uses magnetic field intensity data from a three-axis magnetometer in order to estimate position using a maximum – likelihood approach. The position measurements are then combined with a motion model using a Kalman filter. The magnetic field navigation algorithm is tested using a combination of simulated and real measurements. These tests are conducted using …


Passive Radiolocation Of Ieee 802.11 Emitters Using Directional Antennae, Bradford E. Law Mar 2018

Passive Radiolocation Of Ieee 802.11 Emitters Using Directional Antennae, Bradford E. Law

Theses and Dissertations

Low-cost commodity hardware and cheaper, more capable consumer-grade drones make the threat of home-made, inexpensive drone-mounted wireless attack platforms (DWAPs) greater than ever. Fences and physical security do little to impede a drone from approaching private, commercial, or government wireless access points (WAPs) and conducting wireless attacks. At the same time, unmanned aerial vehicles (UAVs) present a valuable tool for network defenders conducting site surveys and emulating threats. These platforms present near-term dangers and opportunities for corporations and governments. Despite the vast leaps in technology these capabilities represent, UAVs are noisy and consequently difficult to conceal as they approach a …


Dual Source Excitation Rectangular Waveguide Design And Evaluation For The Measurement Of Electromagnetic Material Properties, Daniel K. Koch Mar 2018

Dual Source Excitation Rectangular Waveguide Design And Evaluation For The Measurement Of Electromagnetic Material Properties, Daniel K. Koch

Theses and Dissertations

Broadband material parameter measurements are essential in understanding how materials interact with electromagnetic waves. Traditional rectangular waveguide material measurement systems are bandwidth limited. This results in multiple rectangular waveguides of different sizes used to conduct broadband material parameter extraction. Efforts to produce a broadband rectangular waveguide have focused on the inclusion of different guiding structures in the waveguide body. These designs have the drawback of requiring precise machining and time-consuming sample preparation. This research proposes a new broadband rectangular waveguide design which uses a dual source excitation design. This is enabled by the fact that rectangular waveguides are linear time …


An Exploration Of Error-Correcting Codes For Use In Noise-Prone Satellite Environments, Min W. Kang Mar 2018

An Exploration Of Error-Correcting Codes For Use In Noise-Prone Satellite Environments, Min W. Kang

Theses and Dissertations

Satellites are crucial for the modern world to function properly as they provide Global Navigation Satellite System (GNSS) and global communication. However, the data that is stored on these satellites can be corrupted by the radiation found in space, and its bits can be improperly flipped. In the past, Forward Error Correction (FEC) algorithms were selected based on their strength and implemented to correct these bit flips back to their original values. This thesis seeks to determine if the strength of the FEC algorithms Reed Solomon (RS) code and Reed Solomon Product Code (RSPC) directly translates to their effectiveness. These …


Securing Data In Transit Using Two Channel Communication, Clark L. Wolfe Mar 2018

Securing Data In Transit Using Two Channel Communication, Clark L. Wolfe

Theses and Dissertations

Securing data in transit is critically important to the Department of Defense in todays contested environments. While encryption is often the preferred method to provide security, there exist applications for which encryption is too resource intensive, not cost-effective or simply not available. In this thesis, a two-channel communication system is proposed in which the message being sent can be intelligently and dynamically split over two or more channels to provide a measure of data security either when encryption is not available, or perhaps in addition to encryption. This data spiting technique employs multiple wireless channels operating at the physical layer, …


Conceptual Systems Security Analysis Aerial Refueling Case Study, Martin Trae Span Iii Mar 2018

Conceptual Systems Security Analysis Aerial Refueling Case Study, Martin Trae Span Iii

Theses and Dissertations

In today’s highly interconnected and technology reliant environment, systems security is rapidly growing in importance to complex systems such as automobiles, airplanes, and defense-oriented weapon systems. While systems security analysis approaches are critical to improving the security of these advanced cyber-physical systems-of-systems, such approaches are often poorly understood and applied in ad hoc fashion. To address these gaps, first a study of key architectural analysis concepts and definitions is provided with an assessment of their applicability towards complex cyber-physical systems. From this initial work, a definition of cybersecurity architectural analysis for cyber-physical systems is proposed. Next, the System Theory Theoretic …


Expected Coverage (Excov): A Proposal To Compare Fuzz Test Coverage Within An Infinite Input Space, Evan V. Swihart Mar 2018

Expected Coverage (Excov): A Proposal To Compare Fuzz Test Coverage Within An Infinite Input Space, Evan V. Swihart

Theses and Dissertations

A Fuzz test is an approach used to discover vulnerabilities by intentionally sending invalid inputs to a system for the purpose of triggering some type of fault or unintended effect that renders the system vulnerable to an exploit. Fuzz testing is an important cyber-testing technique used to find and fix vulnerabilities before they are exploited. The fuzzing of military data links presents a particular challenge because existing fuzzing tools cannot be easily applied to these systems. As a result, the tools and techniques used to fuzz these links vary widely in sophistication and effectiveness. Because of the infinite, or nearly …


Effects Of Position Uncertainty On Passive Multistatic Sar Resolution Measures, Duy K. Nguyen Mar 2018

Effects Of Position Uncertainty On Passive Multistatic Sar Resolution Measures, Duy K. Nguyen

Theses and Dissertations

Given numerous exciting potentials including substantial cost savings, passive multistatic synthetic aperture radar (PMSAR) has been gaining more attention in the radar community. However, PMSAR research efforts such as emitters of opportunity selection thus far have not considered radar position uncertainty. Seeking to fill this knowledge gap, we run Monte Carlo trials to simulate transmitter position uncertainty and examine the effects on the multistatic resolution of radar sets of different geometries, center frequencies and bandwidths. By monitoring the 3dB contour of the multistatic point spread function, we find that the multistatic resolution worsens on average and the data spread grows …


Framework For Industrial Control System Honeypot Network Traffic Generation, Htein A. Lin Mar 2017

Framework For Industrial Control System Honeypot Network Traffic Generation, Htein A. Lin

Theses and Dissertations

Defending critical infrastructure assets is an important but extremely difficult and expensive task. Historically, decoys have been used very effectively to distract attackers and in some cases convince an attacker to reveal their attack strategy. Several researchers have proposed the use of honeypots to protect programmable logic controllers, specifically those used to support critical infrastructure. However, most of these honeypot designs are static systems that wait for a would-be attacker. To be effective, honeypot decoys need to be as realistic as possible. This paper introduces a proof-of-concept honeypot network traffic generator that mimics genuine control systems. Experiments are conducted using …


Autoprov: An Automated File Provenance Collection Tool, Ryan A. Good Mar 2017

Autoprov: An Automated File Provenance Collection Tool, Ryan A. Good

Theses and Dissertations

A file's provenance is a detailing of its origins and activities. There are tools available that are useful in maintaining the provenance of a file. Unfortunately for digital forensics, these tools require prior installation on the computer of interest while provenance generating events happen. The presented tool addresses this by reconstructing a file's provenance from several temporal artifacts. It identifies relevant temporal and user correlations between these artifacts, and presents them to the user. A variety of predefined use cases and real world data are tested against to demonstrate that this software allows examiners to draw useful conclusions about the …


Sound Based Positioning, David L. Weathers Mar 2017

Sound Based Positioning, David L. Weathers

Theses and Dissertations

With a growing interest in non-GPS positioning, navigation, and timing (PNT), sound based positioning provides a precise way to locate both sound sources and microphones through audible signals of opportunity (SoOPs). Exploiting SoOPs allows for passive location estimation. But, attributing each signal to a specific source location when signals are simultaneously emitting proves problematic. Using an array of microphones, unique SoOPs are identified and located through steered response beamforming. Sound source signals are then isolated through time-frequency masking to provide clear reference stations by which to estimate the location of a separate microphone through time difference of arrival measurements. Results …


Applying Cyber Threat Intelligence To Industrial Control Systems, Matthew P. Sibiga Mar 2017

Applying Cyber Threat Intelligence To Industrial Control Systems, Matthew P. Sibiga

Theses and Dissertations

A cybersecurity initiative known as cyber threat intelligence (CTI) has recently been developed and deployed. The overall goal of this new technology is to help protect network infrastructures. Threat intelligence platforms (TIPs) have also been created to help facilitate CTI effectiveness within organizations. There are many benefits that both can achieve within the information technology (IT) sector. The industrial control system (ICS) sector can also benefit from these technologies as most ICS networks are connected to IT networks. CTI and TIPs become resourceful when using indicators of compromise (IOCs) from known ICS malware attacks and an open source intrusion detection …


Satellite Communications In The V And W Band: Natural And Artificial Scintillation Effects, David A. Smith Mar 2017

Satellite Communications In The V And W Band: Natural And Artificial Scintillation Effects, David A. Smith

Theses and Dissertations

In a natural atmospheric environment the troposphere will be the primary source of loss with the ionosphere loss being negligible. If the ionosphere was disturbed from a high altitude nuclear explosion (HANE) more than three times the amount of electrons would be present in the ionosphere and could represent a source of significant loss. In order to determine the amount of electrons distributed from a HANE, GSCENARIO, developed by Defense Threat Reduction Agency was used. The two sources of loss that were examined was signal absorption and amplitude scintillation. Signal loss was determined using GSCENARIO and amplitude scintillation loss was …


Scalable System Design For Covert Mimo Communications, Jason R. Pennington Jun 2014

Scalable System Design For Covert Mimo Communications, Jason R. Pennington

Theses and Dissertations

In modern communication systems, bandwidth is a limited commodity. Bandwidth efficient systems are needed to meet the demands of the ever-increasing amount of data that users share. Of particular interest is the U.S. Military, where high-resolution pictures and video are used and shared. In these environments, covert communications are necessary while still providing high data rates. The promise of multi-antenna systems providing higher data rates has been shown on a small scale, but limitations in hardware prevent large systems from being implemented.


Metrics For Emitter Selection For Multistatic Synthetic Aperture Radar, Sean R. Stevens Sep 2013

Metrics For Emitter Selection For Multistatic Synthetic Aperture Radar, Sean R. Stevens

Theses and Dissertations

A bistatic implementation of synthetic aperture radar (SAR) to form images of the ground from an aircraft makes use of separate emitters and receivers. When not using cooperative emitters, ground based communications systems can provide illumination. One way to improve performance of these waveforms, which are not designed for SAR, is a multistatic implementation, formed from multiple bistatic systems. This leads to the problem of selecting a subset from a potentially large set of emitters to use for image formation. A framework for this selection between sets of emitters is proposed using multiple objective optimization. This approach requires use of …


The Design And Analysis Of Electrically Large Custom-Shaped Reflector Antennas, Joshua M. Wilson Jun 2013

The Design And Analysis Of Electrically Large Custom-Shaped Reflector Antennas, Joshua M. Wilson

Theses and Dissertations

Designing and analyzing electrically large reflectors poses numerically complex problems because the reflector must be sampled finely to obtain an accurate solution, causing an unwieldy number of samples. In addition to these complexities, a custom-shaped reflector poses a new analysis problem. Previously developed methods and theorems including Geometric Optics, Ray-Tracing, Surface Equivalence Theorems, Image Theory, and Physical Optics can be applied to these custom-shaped reflectors however. These methods all share in common their capability to provide accurate results in the analysis of electrically large structures. In this thesis, two custom-shaped reflector concepts are explored which include a rectangular shaped, spherically …


Automatic Modulation Classification Of Common Communication And Pulse Compression Radar Waveforms Using Cyclic Features, John A . Hadjis Mar 2013

Automatic Modulation Classification Of Common Communication And Pulse Compression Radar Waveforms Using Cyclic Features, John A . Hadjis

Theses and Dissertations

This research develops a feature-based MAP classification system and applies it to classify several common pulse compression radar and communication modulations. All signal parameters are treated as unknown to the classifier system except SNR and the signal carrier frequency. The features are derived from estimated duty cycle, cyclic spectral correlation, and cyclic cumulants. The modulations considered in this research are BPSK, QPSK, 16-QAM, 64-QAM, 8-PSK, and 16-PSK communication modulations, as well as Barker coded, Barker coded, Barker coded, Frank coded, Px49 coded, and LFM pulse compression modulations. Simulations show that average correct signal modulation type classification %C 90% is achieved …


Distributed Localization Of Active Transmitters In A Wireless Sensor Network, Oba L. Vincent Mar 2012

Distributed Localization Of Active Transmitters In A Wireless Sensor Network, Oba L. Vincent

Theses and Dissertations

In today's military environment, emphasis has been placed on bandwidth efficiency and total use of the available spectrum. Current communication standards divide the spectrum into several different frequency bands, all of which are assigned to one or multiple primary users. Cognitive Radio utilizes potential white spaces that exist between currently defined channels or in time. One under-explored dimension of white space exploration is spatial. If a frequency band is being used in one region, it may be underutilized, or not occupied in another. Using an active localization method can allow for the discovery of spatial white; trying to spatially map …


A Performance Analysis Of The Optimized Link State Routing Protocol Using Voice Traffic Over Mobile Ad Hoc Networks, André Wolf Mar 2012

A Performance Analysis Of The Optimized Link State Routing Protocol Using Voice Traffic Over Mobile Ad Hoc Networks, André Wolf

Theses and Dissertations

Mobile ad hoc networks (MANETs) have grown in popularity over the past decade and are increasingly considered for time-sensitive multimedia applications. The impact of various routing protocols on voice traffic using different IEEE 802.11 extensions has been investigated via analytical models, simulations and experimental test beds. Many studies determined that optimized link state routing (OLSR) is a suitable routing protocol to support voice over internet protocol (VoIP) conversations. This research expands upon this understanding by determining the point at which voice traffic is no longer feasible in an ad hoc environment and determines which audio codec is best suited for …


Routing Uavs To Co-Optimize Mission Effectiveness And Network Performance With Dynamic Programming, Spenser D. Lee Mar 2011

Routing Uavs To Co-Optimize Mission Effectiveness And Network Performance With Dynamic Programming, Spenser D. Lee

Theses and Dissertations

In support of the Air Force Research Laboratory's (AFRL) vision of the layered sensing operations center, command and control intelligence surveillance and reconnaissance (C2ISR) more focus must be placed on architectures that support information systems, rather than just the information systems themselves. By extending the role of UAVs beyond simply intelligence, surveillance, and reconnaissance (ISR) operations and into a dual-role with networking operations we can better utilize our information assets. To achieve the goal of dual-role UAVs, a concrete approach to planning must be taken. This research defines a mathematical model and a non-trivial deterministic algorithmic approach to determining UAV …


Malicious And Malfunctioning Node Detection Via Observed Physical Layer Data, Tyler J. Hardy Mar 2011

Malicious And Malfunctioning Node Detection Via Observed Physical Layer Data, Tyler J. Hardy

Theses and Dissertations

There are many mechanisms that can cause inadequate or unreliable information in sensor networks. A user of the network might be interested in detecting and classifying specific sensors nodes causing these problems. Several network layer based trust methods have been developed in previous research to assess these issues; in contrast this work develops a trust protocol based on observations of physical layer data collected by the sensors. Observations of physical layer data are used for decisions and calculations, and are based on just the measurements collected by the sensors. Although this information is packaged and distributed on the network layer, …


Evaluating Information Assurance Control Effectiveness On An Air Force Supervisory Control And Data Acquisition (Scada) System, Jason R. Nielsen Mar 2011

Evaluating Information Assurance Control Effectiveness On An Air Force Supervisory Control And Data Acquisition (Scada) System, Jason R. Nielsen

Theses and Dissertations

Supervisory Control and Data Acquisition (SCADA) systems are increasingly being connected to corporate networks which has dramatically expanded their attack surface to remote cyber attack. Adversaries are targeting these systems with increasing frequency and sophistication. This thesis seeks to answer the research question addressing which Information Assurance (IA) controls are most significant for network defenders and SCADA system managers/operators to focus on in order to increase the security of critical infrastructure systems against a Stuxnet-like cyber attack. This research applies the National Institute of Science and Technology (NIST) IA controls to an attack tree modeled on a remote Stuxnet-like cyber …


A Linear Combination Of Heuristics Approach To Spatial Sampling Hyperspectral Data For Target Tracking, Barry R. Secrest Dec 2010

A Linear Combination Of Heuristics Approach To Spatial Sampling Hyperspectral Data For Target Tracking, Barry R. Secrest

Theses and Dissertations

Persistent surveillance of the battlespace results in better battlespace awareness which aids in obtaining air superiority, winning battles, and saving friendly lives. Although hyperspectral imagery (HSI) data has proven useful for discriminating targets, it presents many challenges as a useful tool in persistent surveillance. A new sensor under development has the potential of overcoming these challenges and transforming our persistent surveillance capability by providing HSI data for a limited number of pixels and grayscale video for the remainder. The challenge of exploiting this new sensor is determining where the HSI data in the sensor's field of view will be the …