Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Computer Engineering

Investigation Of Stun Guns As Intentional Electromagnetic Interference (Emi) Sources, George H. Baker, Ryan C. Tuttle Jul 2008

Investigation Of Stun Guns As Intentional Electromagnetic Interference (Emi) Sources, George H. Baker, Ryan C. Tuttle

George H Baker

Determined malefactors have demonstrated the use of common systems as effective weapons against civilian infrastructures, e.g. commercial jetliners used as kinetic weapons and cell phones used to trigger explosive devices. This undergraduate research project investigated the possibility of using readily available stun gun devices for electro-magnetic interference with or disruption of personal computers. At present, the system effects of high power electromagnetic sources are well recognized by world scientific and military communities. Former CIA Director John Deutch has said that, "the electron is the ultimate precision-guided weapon."1 There has been much research on the deleterious effects of pulsed voltages and …


Mitigation Of Control Channel Jamming Under Node Capture Attacks, Patrick Tague, Mingya Li, Radha Poovendran Dec 2007

Mitigation Of Control Channel Jamming Under Node Capture Attacks, Patrick Tague, Mingya Li, Radha Poovendran

Patrick Tague

Availability of service in many wireless networks depends on the ability for network users to establish and maintain communication channels using control messages from base stations and other users. An adversary with knowledge of the underlying communication protocol can mount an efficient denial of service attack by jamming the communication channels used to exchange control messages. The use of spread spectrum techniques can deter an external adversary from such control channel jamming attacks. However, malicious colluding insiders or an adversary who captures or compromises system users are not deterred by spread spectrum, as they know the required spreading sequences. For …