Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 29 of 29

Full-Text Articles in Engineering

Exploitation Of Unintentional Information Leakage From Integrated Circuits, William E. Cobb Dec 2011

Exploitation Of Unintentional Information Leakage From Integrated Circuits, William E. Cobb

Theses and Dissertations

Unintentional electromagnetic emissions are used to recognize or verify the identity of a unique integrated circuit (IC) based on fabrication process-induced variations in a manner analogous to biometric human identification. The effectiveness of the technique is demonstrated through an extensive empirical study, with results presented indicating correct device identification success rates of greater than 99:5%, and average verification equal error rates (EERs) of less than 0:05% for 40 near-identical devices. The proposed approach is suitable for security applications involving commodity commercial ICs, with substantial cost and scalability advantages over existing approaches. A systematic leakage mapping methodology is also proposed to …


Linear-Quadratic Control Of A Mems Micromirror Using Kalman Filtering, Jamie P. Schnapp Dec 2011

Linear-Quadratic Control Of A Mems Micromirror Using Kalman Filtering, Jamie P. Schnapp

Theses and Dissertations

The deflection limitations of electrostatic flexure-beam actuators are well known. Specifically, as the beam is actuated and the gap traversed, the restoring force necessary for equilibrium increases proportionally with the displacement to first order, while the electrostatic actuating force increases with the inverse square of the gap. Equilibrium, and thus stable open-loop voltage control, ceases at one-third the total gap distance, leading to actuator snap-in. A Kalman Filter is designed with an appropriately complex state dynamics model to accurately estimate actuator deflection given voltage input and capacitance measurements, which are then used by a Linear Quadratic controller to generate a …


Optimized Hyperspectral Imagery Anomaly Detection Through Robust Parameter Design, Francis M. Mindrup Oct 2011

Optimized Hyperspectral Imagery Anomaly Detection Through Robust Parameter Design, Francis M. Mindrup

Theses and Dissertations

Anomaly detection algorithms for hyperspectral imagery (HSI) are an important first step in the analysis chain which can reduce the overall amount of data to be processed. The actual amount of data reduced depends greatly on the accuracy of the anomaly detection algorithm implemented. Most, if not all, anomaly detection algorithms require a user to identify some initial parameters. These parameters (or controls) affect overall algorithm performance. Regardless of the anomaly detector being utilized, algorithm performance is often negatively impacted by uncontrollable noise factors which introduce additional variance into the process. In the case of HSI, the noise variables are …


Integrated Approach To Free Space Optical Communications In Strong Turbulence, Jason A. Tellez Sep 2011

Integrated Approach To Free Space Optical Communications In Strong Turbulence, Jason A. Tellez

Theses and Dissertations

The propagation of a free space optical communication signal through atmospheric turbulence experiences random fluctuations in intensity, including signal fades which negatively impact the communications link performance. This research develops an analytical probability density function (PDF) to model the best case scenario of using multiple independent beams to reduce the intensity fluctuations. The PDF was further developed to account for partially correlated beams, such as would be experienced by beams having finite separation. The PDF was validated with results obtained from digital simulations as well as lab experiments. The research showed that as the number of transmitted beams increases the …


Using Reputation Based Trust To Overcome Malfunctions And Malicious Failures In Electric Power Protection Systems, Jose E. Fadul Sep 2011

Using Reputation Based Trust To Overcome Malfunctions And Malicious Failures In Electric Power Protection Systems, Jose E. Fadul

Theses and Dissertations

This dissertation advocates the use of reputation-based trust in conjunction with a trust management framework based on network flow techniques to form a trust management toolkit (TMT) for the defense of future Smart Grid enabled electric power grid from both malicious and non-malicious malfunctions. Increases in energy demand have prompted the implementation of Smart Grid technologies within the power grid. Smart Grid technologies enable Internet based communication capabilities within the power grid, but also increase the grid's vulnerability to cyber attacks. The benefits of TMT augmented electric power protection systems include: improved response times, added resilience to malicious and non-malicious …


Critical Information Technology On Fpgas Through Unique Device Specific Keys, Miles E. Mcgee Sep 2011

Critical Information Technology On Fpgas Through Unique Device Specific Keys, Miles E. Mcgee

Theses and Dissertations

Field Programmable Gate Arrays (FPGAs) are being used for military and other sensitive applications, the threat of an adversary attacking these devices is an ever present danger. While having the ability to be reconfigured is helpful for development, it also poses the risk of its hardware design being cloned. Static random access memory (SRAM) FPGA's are the most common type of FPGA used in industry. Every time an SRAM-FPGA is powered up, its configuration must be downloaded. If an adversary is able to obtain that configuration, they can clone sensitive designs to other FPGAs. A technique that can be used …


Hyperspectral-Based Adaptive Matched Filter Detector Error As A Function Of Atmospheric Profile Estimation, Allan W. Yarbrough Sep 2011

Hyperspectral-Based Adaptive Matched Filter Detector Error As A Function Of Atmospheric Profile Estimation, Allan W. Yarbrough

Theses and Dissertations

Hyperspectral imagery is collected as radiance data. This data is a function of multiple variables: the radiation profile of the light source, the reflectance of the target, and the absorption and scattering profile of the medium through which the radiation travels as it reflects off the target and reaches the imager. Accurate target detection requires that the collected image matches as closely as possible the known "true" target in the classification database. Therefore, the effect of the radiation source and the atmosphere must be removed before detection is attempted. While the spectrum of solar light is relatively stable, the effect …


Carbon Nanotube Field Emission Arrays, Benjamin L. Crossley Jun 2011

Carbon Nanotube Field Emission Arrays, Benjamin L. Crossley

Theses and Dissertations

This effort exploits the unique physical and electrical characteristics of carbon nanotubes (CNTs) for field emission applications. Carbon nanotube field emission devices are designed, fabricated, and tested. Two reliable CNT synthesis methods, microwave plasma enhanced chemical vapor deposition (MPE-CVD) and thermal chemical vapor deposition (T-CVD), are developed. The physical properties of the resulting CNTs are analyzed using Raman spectroscopy and Scanning electron microscopy (SEM) and then tested for field emission performance. The T-CVD grown CNTs are shown to have fewer growth defects, but suffer from less process control making integration into devices difficult without further process development. Field emission testing …


Performance Analysis And Optimization Of The Winnow Secret Key Reconciliation Protocol, Kevin C. Lustic Jun 2011

Performance Analysis And Optimization Of The Winnow Secret Key Reconciliation Protocol, Kevin C. Lustic

Theses and Dissertations

Currently, private communications in public and government sectors rely on methods of cryptographic key distribution that will likely be rendered obsolete the moment a full-scale quantum computer is realized, or efficient classical methods of factoring are discovered. There are alternative methods for distributing secret key material in a post-quantum era. One example of a system capable of securely distributing cryptographic key material, known as Quantum Key Distribution (QKD), is secure against quantum factorization techniques as its security rests on generally accepted laws of quantum physics. QKD protocols typically include a phase called Error Reconciliation, a clear-text classical-channel discussion between legitimate …


Characterizing Cyclostationary Features Of Digital Modulated Signals With Empirical Measurements Using Spectral Correlation Function, Mujun Song Jun 2011

Characterizing Cyclostationary Features Of Digital Modulated Signals With Empirical Measurements Using Spectral Correlation Function, Mujun Song

Theses and Dissertations

Signal detection is widely used in many applications. Some examples include Cognitive Radio (CR) and military intelligence. CRs use signal detection to sense spectral occupancy. Without guaranteed signal detection, a CR cannot reliably perform its role. Similarly, signal detection is the first step for garnering an opponent's information. Wireless signal detection can be performed using many different techniques. Some of the most popular include matched filters, energy detectors (which use measurements such as the Power Spectral Density (PSD) of the signal), and Cyclostationary Feature Detectors (CFD). Among these techniques, CFD can be viewed as a compromise technique, in that it …


Simultaneous Range/Velocity Detection With An Ultra-Wideband Random Noise Radar Through Fully Digital Cross-Correlation In The Time Domain, James R. Lievsay Mar 2011

Simultaneous Range/Velocity Detection With An Ultra-Wideband Random Noise Radar Through Fully Digital Cross-Correlation In The Time Domain, James R. Lievsay

Theses and Dissertations

This research effort examines the theory, application, and results of applying two-dimensional cross-correlation in the time domain to ultra-wideband (UWB) random noise waveforms for simultaneous range and velocity estimation. When applying common Doppler processing techniques to random noise waveforms for the purpose of velocity estimation, the velocity resolution degrades as the signal bandwidth or the target speed increase. To mitigate the degradation, the Doppler approximation is not utilized, and instead, wideband signal processing theory is applied in the time domain. The results show that by accurately interpolating each sample in the digitized reference signal, a target's velocity and range can …


Evaluation Of The Single Keybit Template Attack, Eric W. Garcia Mar 2011

Evaluation Of The Single Keybit Template Attack, Eric W. Garcia

Theses and Dissertations

Side Channel leakage is a serious threat to secure devices. Cryptographic information extraction is possible after examining any one of the various side channels, including electromagnetic. This work contributes a new method to achieve such a purpose. The Single Keybit Template Attack (SKTA) is introduced as a means to extract encryption keys from embedded processors and other integrated circuit devices performing DES encryptions by passively monitoring and exploiting unintentional RF emissions. Key extraction is accomplished by creating two templates for each bit value of the key based on instantaneous amplitude responses as a device executes DES operations. The resultant templates …


Routing Uavs To Co-Optimize Mission Effectiveness And Network Performance With Dynamic Programming, Spenser D. Lee Mar 2011

Routing Uavs To Co-Optimize Mission Effectiveness And Network Performance With Dynamic Programming, Spenser D. Lee

Theses and Dissertations

In support of the Air Force Research Laboratory's (AFRL) vision of the layered sensing operations center, command and control intelligence surveillance and reconnaissance (C2ISR) more focus must be placed on architectures that support information systems, rather than just the information systems themselves. By extending the role of UAVs beyond simply intelligence, surveillance, and reconnaissance (ISR) operations and into a dual-role with networking operations we can better utilize our information assets. To achieve the goal of dual-role UAVs, a concrete approach to planning must be taken. This research defines a mathematical model and a non-trivial deterministic algorithmic approach to determining UAV …


Software And Critical Technology Protection Against Side Channel Analysis Through Dynamic Hardware Obfuscation, John R. Bochert Mar 2011

Software And Critical Technology Protection Against Side Channel Analysis Through Dynamic Hardware Obfuscation, John R. Bochert

Theses and Dissertations

Side Channel Analysis (SCA) is a method by which an adversary can gather information about a processor by examining the activity being done on a microchip though the environment surrounding the chip. Side Channel Analysis attacks use SCA to attack a microcontroller when it is processing cryptographic code, and can allow an attacker to gain secret information, like a crypto-algorithm's key. The purpose of this thesis is to test proposed dynamic hardware methods to increase the hardware security of a microprocessor such that the software code being run on the microprocessor can be made more secure without having to change …


Radiation Induced Fault Detection, Diagnosis, And Characterization Of Field Programmable Gate Arrays, Thomas B. Getz Mar 2011

Radiation Induced Fault Detection, Diagnosis, And Characterization Of Field Programmable Gate Arrays, Thomas B. Getz

Theses and Dissertations

The development of Field Programmable Gate Arrays (FPGAs) has been a great achievement in the world of micro-electronics. One of these devices can be programmed to do just about anything, and replace the need for thousands of individual specialized devices. Despite their great versatility, FPGAs are still extremely vulnerable to radiation from cosmic waves in space and from adversaries on the ground. Extensive research has been conducted to examine how radiation disrupts different types of FPGAs. The results show, unfortunately, that the newer FPGAs with smaller technology are even more susceptible to radiation damage than the older ones. This research …


Malicious And Malfunctioning Node Detection Via Observed Physical Layer Data, Tyler J. Hardy Mar 2011

Malicious And Malfunctioning Node Detection Via Observed Physical Layer Data, Tyler J. Hardy

Theses and Dissertations

There are many mechanisms that can cause inadequate or unreliable information in sensor networks. A user of the network might be interested in detecting and classifying specific sensors nodes causing these problems. Several network layer based trust methods have been developed in previous research to assess these issues; in contrast this work develops a trust protocol based on observations of physical layer data collected by the sensors. Observations of physical layer data are used for decisions and calculations, and are based on just the measurements collected by the sensors. Although this information is packaged and distributed on the network layer, …


Optical Metamaterial Design, Fabrication And Test, Jack P. Lombardi Mar 2011

Optical Metamaterial Design, Fabrication And Test, Jack P. Lombardi

Theses and Dissertations

Metamaterials, materials that make use of naturally occurring materials and designed structures to create materials with special properties not found in nature, are a fascinating new area of research, combining the fields of physics, microfabrication, and material science. This work will focus on the development of metamaterials operating in the visible and infrared which will be constructed and tested for basic optical properties. Possible applications for these materials will not be investigated. The this work will go into the fabrication and test of layered metal-dielectric structures, called layered metamaterials, as these structures hold potential for applications in advanced optical systems. …


A Simple Non-Destructive Method For Characterizing Non-Dispersive, Low-Loss Dielectrics, Thomas S. Olney Mar 2011

A Simple Non-Destructive Method For Characterizing Non-Dispersive, Low-Loss Dielectrics, Thomas S. Olney

Theses and Dissertations

It is shown how permittivity can be extracted via time domain reflection data from a perfect electric conductor (PEC) backed planar sample of a low-loss, non-dispersive dielectric using two rectangular Ku-band waveguide aperture probes with attached PEC flange plates of the same geometry but different dimensions. Of critical importance is being able to identify the reflection from the edge of the flange plate in the parallel plate region created by the plate and the PEC backing of the sample. A signal processing method that takes advantage of physical insight into the geometry and superposition is developed for identifying this edge …


Effects Of Cyclic Prefix Jamming Versus Noise Jamming In Ofdm Signals, Amber L. Scott Mar 2011

Effects Of Cyclic Prefix Jamming Versus Noise Jamming In Ofdm Signals, Amber L. Scott

Theses and Dissertations

Signal jamming of an orthogonal frequency-division multiplexing (OFDM) signal is simulated in MATLAB. Two different means of jamming are used to see, which is a more efficient way to disrupt a signal using the same signal power. The first way is a basic additive white Gaussian noise (AWGN) jammer that equally jams the entire signal. The second way is an AWGN jammer that targets only the cyclic prefix (CP) of the signal. These two methods of jamming are simulated using different channel models and unknowns to get varying results. The three channel models used in the simulations are the no …


Bistatic 3d Electromagnetic Scattering From A Right-Angle Dihedral At Arbitrary Orientation And Position, Andreas Z. Tempelis Mar 2011

Bistatic 3d Electromagnetic Scattering From A Right-Angle Dihedral At Arbitrary Orientation And Position, Andreas Z. Tempelis

Theses and Dissertations

A method is created to extend a bistatic 3D electromagnetic scattering solution for a dihedral at a given orientation and position to the case of arbitrary orientation and position. Results produced using this method are compared to shooting and bouncing rays (SBR) and method of moments (MoM) predictions, as well as measured data for applicable cases. The model in this thesis shows excellent agreement in magnitude and phase with SBR predictions. It also shows good agreement in magnitude with MoM predictions. Small phase differences between model and MoM data occur due to differences in the underlying scattering solution and the …


Direction Finding With Mutually Orthogonal Antennas, David F. Chick Mar 2011

Direction Finding With Mutually Orthogonal Antennas, David F. Chick

Theses and Dissertations

Estimating the direction-of-arrival of incident electromagnetic plane waves (a.k.a. direction finding or DF) has typically been accomplished in the past using arrays of spatially separated antennas. The spatial separation produces a delay in each antenna's measured voltage due to the finite propagation time as the wave strikes each antenna in succession. In this thesis, we approach the problem differently by using three antennas that have been oriented in orthogonal directions but are co-located at the origin of a coordinate system. Being co-located, this mutually orthogonal arrangement of antennas cannot detect the propagation phase delay and must rely solely on the …


Creating A Network Model For The Integration Of Dynamic And Static Supervisory Control And Data Acquisition (Scada) Test Environment, Marlon Coerbell Mar 2011

Creating A Network Model For The Integration Of Dynamic And Static Supervisory Control And Data Acquisition (Scada) Test Environment, Marlon Coerbell

Theses and Dissertations

Since 9/11 protecting our critical infrastructure has become a national priority. Presidential Decision Directive 63 mandates and lays a foundation for ensuring all aspects of our nation's critical infrastructure remain secure. Key in this debate is the fact that much of our electrical power grid fails to meet the spirit of this requirement. My research leverages the power afforded by Electric Power and Communication Synchronizing Simulator (EPOCHS) developed with the assistance of Dr. Hopkinson, et al. The power environment is modeled in an electrical simulation environment called PowerWorld©. The network is modeled in OPNET® and populated with self-similar network and …


Dynamic Polymorphic Reconfiguration To Effectively “Cloak” A Circuit’S Function, Jeffrey L. Falkinburg Mar 2011

Dynamic Polymorphic Reconfiguration To Effectively “Cloak” A Circuit’S Function, Jeffrey L. Falkinburg

Theses and Dissertations

Today's society has become more dependent on the integrity and protection of digital information used in daily transactions resulting in an ever increasing need for information security. Additionally, the need for faster and more secure cryptographic algorithms to provide this information security has become paramount. Hardware implementations of cryptographic algorithms provide the necessary increase in throughput, but at a cost of leaking critical information. Side Channel Analysis (SCA) attacks allow an attacker to exploit the regular and predictable power signatures leaked by cryptographic functions used in algorithms such as RSA. In this research the focus on a means to counteract …


Characteristics Of A High Intensity, Pulsed, Potassium Vapor Laser In A Heat Pipe, Edward J. Hurd Mar 2011

Characteristics Of A High Intensity, Pulsed, Potassium Vapor Laser In A Heat Pipe, Edward J. Hurd

Theses and Dissertations

This thesis research paper presents the results of experiments using an optically pumped, pulsed potassium vapor laser in a heat pipe. The absorption on the potassium D2 line, output laser characteristics, and Raman scattering in potassium vapor are discussed. The spectral full width at half maximum (FWHM) of the D2 absorption line was much greater than predicted values for pressure broadening due to the high number density of potassium atoms and the long path length. At 320°C and 0 torr of helium, the FWHM was 765 GHz. At 100 torr it was 968 GHz. At 200 torr it …


Electromagnetic Modeling And Measurement Of Adaptive Metamaterial Structural Elements, Matthew E. Jussaume Mar 2011

Electromagnetic Modeling And Measurement Of Adaptive Metamaterial Structural Elements, Matthew E. Jussaume

Theses and Dissertations

This document addresses two major obstacles facing metamaterial development: uncertainty in the characterization of electromagnetic field behavior in metamaterial structures and the relatively small operational bandwidth of metamaterial structures. To address the first obstacle, a method of prediction aided measurement is developed and exploited to examine the field interactions within metamaterial devices. The fusion of simulation and measurement techniques enhances the understanding of the physical interactions of fields in the presence of metamaterials. To address the second obstacle, this document characterizes the effectiveness of an adaptive metamaterial design that incorporates a microelectromechanical systems (MEMS) variable capacitor. Applying voltages to the …


Characterization Of Noise Technology Radar Signal Detectability Using A Non-Cooperative Receiver, Daniel V. Atienza Mar 2011

Characterization Of Noise Technology Radar Signal Detectability Using A Non-Cooperative Receiver, Daniel V. Atienza

Theses and Dissertations

As Noise Technology Radar (NTR) systems emerge, there is a need for non-cooperative, non-matched filter detection and exploitation. This work is based on that need and AFIT's Noise Network (NoNET) radar system. These signals are associated with Low Probability of Detection/ Intercept (LPD/LPI) signals. Quadrature Mirror Filter Banks (QMFB) has been effectively used for non-cooperatively detecting structured LPD/LPI signals and extracting various waveform characteristics. However, the QMFB process performance with unstructured NTR signals was challenging and motivated a need for a transformed QMFB. This transform was based on AFIT research by Gronholz and Mims (G-M), who used a multi-channel receiver …


Blind Deconvolution Method Of Image Deblurring Using Convergence Of Variance, Quentin D. Macmanus Mar 2011

Blind Deconvolution Method Of Image Deblurring Using Convergence Of Variance, Quentin D. Macmanus

Theses and Dissertations

Images are used for both aerial and space imagery applications, including target detection and tracking. The current problem concerning objects in geosynchronous orbit is that they are dim and hard to resolve because of their distance. This work will further the combined effort of AFIT and AFRL to provide enhanced space situational awareness (SSA) and space surveillance. SSA is critical in a time when many countries possess the technology to put satellites into orbit. Enhanced imaging technology improves the Air Force's ability to see if foreign satellites or other space hardware are operating in the vicinity of our own assets …


Evaluating Information Assurance Control Effectiveness On An Air Force Supervisory Control And Data Acquisition (Scada) System, Jason R. Nielsen Mar 2011

Evaluating Information Assurance Control Effectiveness On An Air Force Supervisory Control And Data Acquisition (Scada) System, Jason R. Nielsen

Theses and Dissertations

Supervisory Control and Data Acquisition (SCADA) systems are increasingly being connected to corporate networks which has dramatically expanded their attack surface to remote cyber attack. Adversaries are targeting these systems with increasing frequency and sophistication. This thesis seeks to answer the research question addressing which Information Assurance (IA) controls are most significant for network defenders and SCADA system managers/operators to focus on in order to increase the security of critical infrastructure systems against a Stuxnet-like cyber attack. This research applies the National Institute of Science and Technology (NIST) IA controls to an attack tree modeled on a remote Stuxnet-like cyber …


Signals Of Opportunity Navigation Using Wi-Fi Signals, Wilfred E. Noel Mar 2011

Signals Of Opportunity Navigation Using Wi-Fi Signals, Wilfred E. Noel

Theses and Dissertations

Since GPS is generally limited to areas with clear sky view, additional methods of navigation are currently being explored. This thesis explores navigation using Signals of Opportunity(SoOP). The signals chosen for evaluation in this thesis are the common Internet IEEE 802.11a/g signals, or Wi-Fi. This thesis presents SoOP navigation based on cross-correlations of received data from multiple Wi-Fi stations. It shows the effectiveness of the methods using collected Wi-Fi signals in a real-world environment. By using simple statistical representations of collected data in large groups, or windows, cross-correlation calculations can produce timing offsets between simulated stations. The timing offsets, or …