共查询到20条相似文献,搜索用时 0 毫秒
1.
Recently, several companies have introduced passive entry systems for automotive applications. These systems are intended to increase user comfort by eliminating the requirement that the user has to reach for the customer identification device (CID), a credit card like tool, to gain access to the vehicle compartment. While this extra level of comfort is a desirable feature, especially in luxury vehicles, it introduces several key attacks against the system. This paper describes several techniques of potential attacks against the passive entry system and proposes solutions to protect the vehicle from such attacks. 相似文献
2.
基于5G网络架构逐层对5G网络存在的安全风险进行梳理与分析,总结出四大安全风险点,即用户标识的安全性、数据的机密性与完整性、终端的真实性以及网络功能的可用性,并提出对策与建议。 相似文献
3.
《Vehicular Technology, IEEE Transactions on》1973,22(1):13-19
This paper is a digest of the electrical system section of a report [8] on the feasibility of using a hybrid heat engine/electrical propulsion system as a means of reducing exhaust emissions from street-operated vehicles. The electrical system is composed of an electric traction motor, a generator, control system, and batteries. Batteries are not covered in this paper, but the remainder of the items will be treated here. First, the electrical system parameters or characteristics that have the greatest impact on the total system are considered; next, details of the advantages and disadvantages of various approaches are summarized; and, finally, development efforts are recommended. 相似文献
4.
5.
We consider window designs for discrete Fourier transform (DFT) based multicarrier transceivers without using extra cyclic prefix. As in previous works of window designs for DFT-based transceivers, a postprocessing matrix that is generally channel dependent, is needed to have a zero-forcing receiver. We show that postprocessing is channel independent if and only if the window itself has the cyclic-prefixed property. We design optimal windows with minimum spectral leakage subject to the cyclic-prefixed condition. Moreover, we analyze how postprocessing affects the signal-to-noise ratio (SNR) at the receiver, which is an aspect that is not considered in most of the earlier works. The resulting SNR can be given in a closed form. Join optimization of spectral leakage and SNR are also considered. Furthermore, examples demonstrate that we can have a significant reduction in spectral leakage at the cost of a small SNR loss. In addition to cyclic-prefixed systems, window designs for zero-padded DFT-based transceivers are considered. For the zero-padded transceivers, windows that minimize spectral leakage can also be designed. 相似文献
6.
7.
《Vehicular Technology, IEEE Transactions on》1978,27(3):132-137
The characteristics and relative advantages of several types of electric vehicle control systems are discussed. An advanced electronic control system for a separately excited dc motor is described. Performance characteristics of an electric vehicle using this control are discussed and recommendations for future systems are given. 相似文献
8.
Patterned electrode designs are used to control optical mode shape in high-power semiconductor lasers by localizing current injection. In this letter, we present comparison of current density profiles in the active layer achieved by different contact designs. Single-voltage digitated contact, distributed regular and random Gaussian contact configurations are studied using numerical solutions of semiconductor device equations that govern electrostatic potential and carrier concentrations in three spatial dimensions. The results of our calculations indicate that lateral current profile is influenced by the contact shape in the transverse direction and the thickness of the junction on the contact side 相似文献
9.
Optimal authentication systems and combinatorial designs 总被引:2,自引:0,他引:2
Jimbo M. Fuji-Hara R. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》1990,36(1):54-62
In 1982, G.J. Simmons introduced a mathematical model of authentication theory. Recently, E.F. Brickell (1984) and D.R. Stinson (1988) have shown some combinatorial constructions for optimal authentication systems. In the present work, game-theoretical models are proposed for authentication systems that have multilevel costs on sources, and lower bounds of the game values are obtained. Some constructions of the optimal authentication systems that attain the bounds are shown 相似文献
10.
11.
《Proceedings of the IEEE. Institute of Electrical and Electronics Engineers》1972,60(12):1519-1533
The energy and power requirements of a class of on-the-road electric vehicles are developed, and acceleration and speed characteristics of such vehicles in urban traffic are discussed. Curves of average speed under different conditions of traffic are presented, as are curves of average power required during acceleration, average power required during cruising, and peak power required. A dc drive system for propulsion of such a vehicle and an ac drive system appropriate for such an application are described. The two kinds of system are then compared, on an economic as well as a technical basis. A procedure for designing an electric vehicle is outlined, pertinent fields in which research and development are needed are listed, and a reference list on electric vehicles is included. 相似文献
12.
Security assessment of a system is a difficult problem. Most of the current efforts in security assessment involve searching for known vulnerabilities. Finding unknown vulnerabilities still largely remains a subjective process. The process can be improved by understanding the characteristics and nature of known vulnerabilities. The knowledge thus gained can be organized into a suitable taxonomy, which can then be used as a framework for systematically examining new systems for similar but as yet unknown vulnerabilities. There have been many attempts at producing such taxonomies. This article provides a comprehensive survey of the important work done on developing taxonomies of attacks and vulnerabilities in computer systems. This survey covers work done in security related taxonomies from 1974 until 2006. Apart from providing a state-of-the-art survey of taxonomies, we also analyze their effectiveness for use in a security assessment process. Finally, we summarize the important properties of various taxonomies to provide a framework for organizing information about known attacks and vulnerabilities into a taxonomy that would benefit the security assessment process. 相似文献
13.
噪声主动控制基本思想是由德国物理学家Paul Lueg于1936年发明“电子消声器”时首次提出的。噪声主动控制技术相对传统的被动控制,具有对中、低频段噪声控制效果明显、系统轻巧、实时性强等优点,具有潜在的工程应用价值。 相似文献
14.
15.
Ejnioui A. Ranganathan N. 《Very Large Scale Integration (VLSI) Systems, IEEE Transactions on》2001,9(2):407-410
Reconfigurable single-chip emulation systems were proposed as an alternative to multichip emulation systems. Because they cannot be emulated on a single chip at once, large designs are sliced into partitions that are downloaded and executed sequentially on the same reconfigurable emulation chip. In this paper, we address the problem of partitioning a design on a reconfigurable single-chip emulator under resource constraints. First, we extract an acyclic flow graph of the design to be emulated. Then, we model the problem as an integer linear programming problem (IP) based on the acyclic flow graph of the design where the structure of the assignment and precedence constraints produce a tight formulation. To partition a design, our algorithm uses two distinct steps with different objectives. In the first step, we minimize the number of cycles needed to schedule every look-up table (LUT) in the circuit. Then flip-flops (FFs) are inserted into the appropriate cycles of the schedule in the second step. Experiments are conducted on small- and medium-size circuits from the MCNC Partitioning93 benchmark suite. The obtained results show that our algorithm produces optimal partitioning schedules 相似文献
16.
17.
18.
In MANET, providing authentication and security to location-based routing is a big task. To overcome this problem, in this paper, we proposed a defense against Sybil attacks and authentication for anonymous location-based routing in MANET. Each random forwarder has a table of RSS values estimated from the previous message exchanges across a zone to detect the Sybil attack. The difference in RSS values of two neighboring nodes is estimated based on which the node’s arrival angle into the zone is detected. Depending on the arrival angle, the nodes can be categorized as safety zone and caution zone. The messages exchanged between the RFs and senders can be protected by means of group signature. Finally, misrouting packet drop attack is detected and eliminated by using ant colony optimization technique. By simulation results, we show the proposed technique reduces the packet drop due to attacks, thereby increasing the delivery ratio. 相似文献
19.