Visible to the public Biblio

Filters: Keyword is Sensor phenomena and characterization  [Clear All Filters]
2020-11-30
Beran, P., Klöhn, M., Hohe, H..  2019.  Measurement Characteristics of Different Integrated Three-Dimensional Magnetic Field Sensors. IEEE Magnetics Letters. 10:1–5.
Datasheets of different commercially available integrated sensors for vector measurements of magnetic fields provide typical specifications, such as measurement range, sampling rate, resolution, and noise. Other characteristics of interest, such as linearity, cross-sensitivity, remanent magnetization, and drifts over temperature, are mostly missing. This letter presents testing results of those characteristics of integrated three-dimensional (3-D) sensors working with different sensor principles and technologies in a reproducible measuring process. The sensors are exposed to temperatures from -20 °C to 80 °C and are cycled in hysteresis loops in fields up to 2.5 mT. For applying high-accuracy magnetic fields, a calibrated 3-D Helmholtz coil setup is used. Commercially available integrated 3-D magnetic field sensors are put in operation on a printed circuit board using nonmagnetic passive components. All sensors are configured for best measurement accuracy according to their data-sheets. The results show that sensors based on anisotropic magnetoresistance have high accuracy and low offsets yet also a high degree of nonlinearity. Hall-based sensors show good linearity but also high cross-sensitivity. A magnetic remanence appears for Hall-based sensors with integrated magnetic concentrators as well as for sensors using anisotropic magnetoresistance. Nearly all sensors show remaining drifts over temperature regarding offset and sensitivity up to several percentages.
2017-12-20
Lee, W. H., Lee, R. B..  2017.  Implicit Smartphone User Authentication with Sensors and Contextual Machine Learning. 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). :297–308.

Authentication of smartphone users is important because a lot of sensitive data is stored in the smartphone and the smartphone is also used to access various cloud data and services. However, smartphones are easily stolen or co-opted by an attacker. Beyond the initial login, it is highly desirable to re-authenticate end-users who are continuing to access security-critical services and data. Hence, this paper proposes a novel authentication system for implicit, continuous authentication of the smartphone user based on behavioral characteristics, by leveraging the sensors already ubiquitously built into smartphones. We propose novel context-based authentication models to differentiate the legitimate smartphone owner versus other users. We systematically show how to achieve high authentication accuracy with different design alternatives in sensor and feature selection, machine learning techniques, context detection and multiple devices. Our system can achieve excellent authentication performance with 98.1% accuracy with negligible system overhead and less than 2.4% battery consumption.

2017-02-27
Orojloo, H., Azgomi, M. A..  2015.  Evaluating the complexity and impacts of attacks on cyber-physical systems. 2015 CSI Symposium on Real-Time and Embedded Systems and Technologies (RTEST). :1–8.

In this paper, a new method for quantitative evaluation of the security of cyber-physical systems (CPSs) is proposed. The proposed method models the different classes of adversarial attacks against CPSs, including cross-domain attacks, i.e., cyber-to-cyber and cyber-to-physical attacks. It also takes the secondary consequences of attacks on CPSs into consideration. The intrusion process of attackers has been modeled using attack graph and the consequence estimation process of the attack has been investigated using process model. The security attributes and the special parameters involved in the security analysis of CPSs, have been identified and considered. The quantitative evaluation has been done using the probability of attacks, time-to-shutdown of the system and security risks. The validation phase of the proposed model is performed as a case study by applying it to a boiling water power plant and estimating the suitable security measures.

2015-05-04
Yuying Wang, Xingshe Zhou.  2014.  Spatio-temporal semantic enhancements for event model of cyber-physical systems. Signal Processing, Communications and Computing (ICSPCC), 2014 IEEE International Conference on. :813-818.

The newly emerging cyber-physical systems (CPS) discover events from multiple, distributed sources with multiple levels of detail and heterogeneous data format, which may not be compare and integrate, and turn to hardly combined determination for action. While existing efforts have mainly focused on investigating a uniform CPS event representation with spatio-temporal attributes, in this paper we propose a new event model with two-layer structure, Basic Event Model (BEM) and Extended Information Set (EIS). A BEM could be extended with EIS by semantic adaptor for spatio-temporal and other attribution enhancement. In particular, we define the event process functions, like event attribution extraction and composition determination, for CPS action trigger exploit the Complex Event Process (CEP) engine Esper. Examples show that such event model provides several advantages in terms of extensibility, flexibility and heterogeneous support, and lay the foundations of event-based system design in CPS.