Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Theses/Dissertations

Air Force Institute of Technology

2011

Discipline
Keyword

Articles 151 - 167 of 167

Full-Text Articles in Engineering

Creating A Network Model For The Integration Of Dynamic And Static Supervisory Control And Data Acquisition (Scada) Test Environment, Marlon Coerbell Mar 2011

Creating A Network Model For The Integration Of Dynamic And Static Supervisory Control And Data Acquisition (Scada) Test Environment, Marlon Coerbell

Theses and Dissertations

Since 9/11 protecting our critical infrastructure has become a national priority. Presidential Decision Directive 63 mandates and lays a foundation for ensuring all aspects of our nation's critical infrastructure remain secure. Key in this debate is the fact that much of our electrical power grid fails to meet the spirit of this requirement. My research leverages the power afforded by Electric Power and Communication Synchronizing Simulator (EPOCHS) developed with the assistance of Dr. Hopkinson, et al. The power environment is modeled in an electrical simulation environment called PowerWorld©. The network is modeled in OPNET® and populated with self-similar network and …


Trust Management And Security In Satellite Telecommand Processing, Mark C. Duncan Mar 2011

Trust Management And Security In Satellite Telecommand Processing, Mark C. Duncan

Theses and Dissertations

New standards and initiatives in satellite system architecture are moving the space industry to more open and efficient mission operations. Primarily, these standards allow multiple missions to share standard ground and space based resources to reduce mission development and sustainment costs. With the benefits of these new concepts comes added risk associated with threats to the security of our critical space assets in a contested space and cyberspace domain. As one method to mitigate threats to space missions, this research develops, implements, and tests the Consolidated Trust Management System (CTMS) for satellite flight software. The CTMS architecture was developed using …


Virtual Battlespace Behavior Generation Through Class Imitation, Bryon K. Fryer Jr. Mar 2011

Virtual Battlespace Behavior Generation Through Class Imitation, Bryon K. Fryer Jr.

Theses and Dissertations

Military organizations need realistic training scenarios to ensure mission readiness. Developing the skills required to differentiate combatants from non-combatants is very important for ensuring the international law of armed conflict is upheld. In Simulated Training Environments, one of the open challenges is to correctly simulate the appearance and behavior of combatant and non-combatant agents in a realistic manner. This thesis outlines the construction of a data driven agent that is capable of imitating the behaviors of the Virtual BattleSpace 2 behavior classes while our agent is configured to advance to a geographically specific goal. The approach and the resulting agent …


Dynamic Polymorphic Reconfiguration To Effectively “Cloak” A Circuit’S Function, Jeffrey L. Falkinburg Mar 2011

Dynamic Polymorphic Reconfiguration To Effectively “Cloak” A Circuit’S Function, Jeffrey L. Falkinburg

Theses and Dissertations

Today's society has become more dependent on the integrity and protection of digital information used in daily transactions resulting in an ever increasing need for information security. Additionally, the need for faster and more secure cryptographic algorithms to provide this information security has become paramount. Hardware implementations of cryptographic algorithms provide the necessary increase in throughput, but at a cost of leaking critical information. Side Channel Analysis (SCA) attacks allow an attacker to exploit the regular and predictable power signatures leaked by cryptographic functions used in algorithms such as RSA. In this research the focus on a means to counteract …


A Multi Agent System For Flow-Based Intrusion Detection Using Reputation And Evolutionary Computation, David Hancock Mar 2011

A Multi Agent System For Flow-Based Intrusion Detection Using Reputation And Evolutionary Computation, David Hancock

Theses and Dissertations

The rising sophistication of cyber threats as well as the improvement of physical computer network properties present increasing challenges to contemporary Intrusion Detection (ID) techniques. To respond to these challenges, a multi agent system (MAS) coupled with flow-based ID techniques may effectively complement traditional ID systems. This paper develops: 1) a scalable software architecture for a new, self-organized, multi agent, flow-based ID system; and 2) a network simulation environment suitable for evaluating implementations of this MAS architecture and for other research purposes. Self-organization is achieved via 1) a reputation system that influences agent mobility in the search for effective vantage …


Characteristics Of A High Intensity, Pulsed, Potassium Vapor Laser In A Heat Pipe, Edward J. Hurd Mar 2011

Characteristics Of A High Intensity, Pulsed, Potassium Vapor Laser In A Heat Pipe, Edward J. Hurd

Theses and Dissertations

This thesis research paper presents the results of experiments using an optically pumped, pulsed potassium vapor laser in a heat pipe. The absorption on the potassium D2 line, output laser characteristics, and Raman scattering in potassium vapor are discussed. The spectral full width at half maximum (FWHM) of the D2 absorption line was much greater than predicted values for pressure broadening due to the high number density of potassium atoms and the long path length. At 320°C and 0 torr of helium, the FWHM was 765 GHz. At 100 torr it was 968 GHz. At 200 torr it …


Electromagnetic Modeling And Measurement Of Adaptive Metamaterial Structural Elements, Matthew E. Jussaume Mar 2011

Electromagnetic Modeling And Measurement Of Adaptive Metamaterial Structural Elements, Matthew E. Jussaume

Theses and Dissertations

This document addresses two major obstacles facing metamaterial development: uncertainty in the characterization of electromagnetic field behavior in metamaterial structures and the relatively small operational bandwidth of metamaterial structures. To address the first obstacle, a method of prediction aided measurement is developed and exploited to examine the field interactions within metamaterial devices. The fusion of simulation and measurement techniques enhances the understanding of the physical interactions of fields in the presence of metamaterials. To address the second obstacle, this document characterizes the effectiveness of an adaptive metamaterial design that incorporates a microelectromechanical systems (MEMS) variable capacitor. Applying voltages to the …


Polarimetric Enhancements To Electro-Optical Aided Navigation Techniques, Jeremiah D. Johnson Mar 2011

Polarimetric Enhancements To Electro-Optical Aided Navigation Techniques, Jeremiah D. Johnson

Theses and Dissertations

Navigation in indoor and urban environments by small unmanned systems is a topic of interest for the Air Force. The Advanced Navigation Technology Center at the Air Force Institute of Technology is continually looking for novel approaches to navigation in GPS deprived environments. Inertial sensors have been coupled with image aided concepts, such as feature tracking, with good results. However, feature density in areas with large, flat, smooth surfaces tends to be low. Polarimetric sensors have been used for surface reconstruction, surface characterization and outdoor navigation. This thesis combines aspects of some of these algorithms along with a realistic, micro-facet …


Characterization Of Noise Technology Radar Signal Detectability Using A Non-Cooperative Receiver, Daniel V. Atienza Mar 2011

Characterization Of Noise Technology Radar Signal Detectability Using A Non-Cooperative Receiver, Daniel V. Atienza

Theses and Dissertations

As Noise Technology Radar (NTR) systems emerge, there is a need for non-cooperative, non-matched filter detection and exploitation. This work is based on that need and AFIT's Noise Network (NoNET) radar system. These signals are associated with Low Probability of Detection/ Intercept (LPD/LPI) signals. Quadrature Mirror Filter Banks (QMFB) has been effectively used for non-cooperatively detecting structured LPD/LPI signals and extracting various waveform characteristics. However, the QMFB process performance with unstructured NTR signals was challenging and motivated a need for a transformed QMFB. This transform was based on AFIT research by Gronholz and Mims (G-M), who used a multi-channel receiver …


Airborne Pseudolites In A Global Positioning System Degraded, Halit Oktay Mar 2011

Airborne Pseudolites In A Global Positioning System Degraded, Halit Oktay

Theses and Dissertations

The high accuracy of the Global Positioning System allows for precision navigation in support of current and future military operations. However, generating a three-dimensional position using GPS requires a clear line-of-sight between the user and at least four GPS satellites, and so the GPS service can be denied in scenarios such as a street surrounded by tall buildings. Therefore, there is a need for augmentation in these environments. Pseudolites, which transmit GPS-like ranging signals, can be deployed in order to improve the geometry and provide additional ranging signals. Users can then receive and process both GPS and pseudolite signals simultaneously …


Long Term Quadrotor Stabilization, Nicolas S. Hamilton Mar 2011

Long Term Quadrotor Stabilization, Nicolas S. Hamilton

Theses and Dissertations

The work of this thesis focuses on the IMU and getting the best performance possible out of the IMU to achieve better long term stability and a better navigation solution. This is done in two ways. First, the IMU accelerometer output is examined to determine if it is possible to use accelerometers to determine attitude. If the quadrotor is stationary or moving at constant velocity, the roll and pitch angles can be determined. Additionally, the accelerometers can be used to determine angular accelerations and angular rates which are integrated to determine heading. The second approach models the quadrotor and uses …


Non-Gps Navigation Using Vision-Aiding And Active Radio Range Measurements, Erich H. Lichtfuss Mar 2011

Non-Gps Navigation Using Vision-Aiding And Active Radio Range Measurements, Erich H. Lichtfuss

Theses and Dissertations

The military depends on the Global Positioning System (GPS) for a wide array of advanced weaponry guidance and precision navigation systems. Lack of GPS access makes precision navigation very difficult. Inclusion of inertial sensors in existing navigation systems provides short-term precision navigation, but drifts significantly over long-term navigation. This thesis is motivated by the need for inertial sensor drift-constraint in degraded and denied GPS environments. The navigation system developed consists of inertial sensors, a simulated barometer, three Raytheon DH500 radios, and a stereo-camera image-aiding system. The Raytheon DH500 is a combat communication radio which also provides range measurements between radios. …


Blind Deconvolution Method Of Image Deblurring Using Convergence Of Variance, Quentin D. Macmanus Mar 2011

Blind Deconvolution Method Of Image Deblurring Using Convergence Of Variance, Quentin D. Macmanus

Theses and Dissertations

Images are used for both aerial and space imagery applications, including target detection and tracking. The current problem concerning objects in geosynchronous orbit is that they are dim and hard to resolve because of their distance. This work will further the combined effort of AFIT and AFRL to provide enhanced space situational awareness (SSA) and space surveillance. SSA is critical in a time when many countries possess the technology to put satellites into orbit. Enhanced imaging technology improves the Air Force's ability to see if foreign satellites or other space hardware are operating in the vicinity of our own assets …


Spear Phishing Attack Detection, David T. Merritt Mar 2011

Spear Phishing Attack Detection, David T. Merritt

Theses and Dissertations

This thesis addresses the problem of identifying email spear phishing attacks, which are indicative of cyber espionage. Spear phishing consists of targeted emails sent to entice a victim to open a malicious file attachment or click on a malicious link that leads to a compromise of their computer. Current detection methods fail to detect emails of this kind consistently. The SPEar phishing Attack Detection system (SPEAD) is developed to analyze all incoming emails on a network for the presence of spear phishing attacks. SPEAD analyzes the following file types: Windows Portable Executable and Common Object File Format (PE/COFF), Adobe Reader, …


Evaluating Information Assurance Control Effectiveness On An Air Force Supervisory Control And Data Acquisition (Scada) System, Jason R. Nielsen Mar 2011

Evaluating Information Assurance Control Effectiveness On An Air Force Supervisory Control And Data Acquisition (Scada) System, Jason R. Nielsen

Theses and Dissertations

Supervisory Control and Data Acquisition (SCADA) systems are increasingly being connected to corporate networks which has dramatically expanded their attack surface to remote cyber attack. Adversaries are targeting these systems with increasing frequency and sophistication. This thesis seeks to answer the research question addressing which Information Assurance (IA) controls are most significant for network defenders and SCADA system managers/operators to focus on in order to increase the security of critical infrastructure systems against a Stuxnet-like cyber attack. This research applies the National Institute of Science and Technology (NIST) IA controls to an attack tree modeled on a remote Stuxnet-like cyber …


Signals Of Opportunity Navigation Using Wi-Fi Signals, Wilfred E. Noel Mar 2011

Signals Of Opportunity Navigation Using Wi-Fi Signals, Wilfred E. Noel

Theses and Dissertations

Since GPS is generally limited to areas with clear sky view, additional methods of navigation are currently being explored. This thesis explores navigation using Signals of Opportunity(SoOP). The signals chosen for evaluation in this thesis are the common Internet IEEE 802.11a/g signals, or Wi-Fi. This thesis presents SoOP navigation based on cross-correlations of received data from multiple Wi-Fi stations. It shows the effectiveness of the methods using collected Wi-Fi signals in a real-world environment. By using simple statistical representations of collected data in large groups, or windows, cross-correlation calculations can produce timing offsets between simulated stations. The timing offsets, or …


Defensive Cyber Battle Damage Assessment Through Attack Methodology Modeling, Ryan T. Ostler Mar 2011

Defensive Cyber Battle Damage Assessment Through Attack Methodology Modeling, Ryan T. Ostler

Theses and Dissertations

Due to the growing sophisticated capabilities of advanced persistent cyber threats, it is necessary to understand and accurately assess cyber attack damage to digital assets. This thesis proposes a Defensive Cyber Battle Damage Assessment (DCBDA) process which utilizes the comprehensive understanding of all possible cyber attack methodologies captured in a Cyber Attack Methodology Exhaustive List (CAMEL). This research proposes CAMEL to provide detailed knowledge of cyber attack actions, methods, capabilities, forensic evidence and evidence collection methods. This product is modeled as an attack tree called the Cyber Attack Methodology Attack Tree (CAMAT). The proposed DCBDA process uses CAMAT to analyze …