Special Topics in Security and Privacy of Medical Information. Reminders. Medical device security. Sujata Garera
|
|
- Morgan Owen
- 8 years ago
- Views:
Transcription
1 Special Topics in Security and Privacy of Medical Information Sujata Garera Reminders Assignment due today Project part 1 due on next Tuesday Assignment 2 will be online today evening 2nd Discussion session Use pdf format images in slides Medical device security Implantable medical devices Security risks Exploiting devices Design goals for secure devices Communication cloakers 1
2 Medical telemetry infrastructure Work by Halperin et al. Security and privacy properties of an implantable cardioverter defibrillator (ICD) Includes pacemaker technology Communicates wirelessly with external programmer device in 175Khz frequency range Implemented several radio-based attacks Designed zero power defenses based on RF power harvesting Human in the loop Results of study 2
3 Implantable Cardioverter Defibrillator Monitors and responds to heart activity Modes for Pacing: Periodically send small stimulus to heart Defibrillation: Send larger shock to restore normal heart rhythm ICD implantation ICD communications Magnetic switch Magnetic field in proximity to this switch causes it to close ICD wirelessly transmits telemetry data including EKG readings Authors were able to activate transmission of telemetry without the presence of a magnetic field Magnetic field usually comes from magnet in programming head 3
4 ICD communications Wireless communications Wirelessly communicates with an external programmer using 175 Khz band (short range communications) Newer ICDs can also communicate in MHz band Why would longer ranges be beneficial? Security model Adversary with commercial ICD programmer Programmer can be operated by anyone Passive adversary Records RF messages between ICDs and programmers Could use equipment like oscilloscopes, software radios, amplifiers and directional antennas Active adversary with software programmer Generates traffic Create spurious transactions Security model Which type of adversary presents the most risk? 4
5 Equipment used Equipment used Recording oscilloscope Universal Software Radio Peripheral (USRP) Programmable device that interacts with open source GNU Radio libraries on a host PC Equipment used - USRP Single board containing an FPGA for fast signal processing Records signals as complex samples which are interconvertible with the data format used by the oscilloscope. Can sample upto 8Mhz samples/second Reverse engineering Commercial Programmer Reverse Engineer 5
6 Reverse engineering Capture around 175 KHz Process RF traces using Matlab and GNU RF toolchain Analyze bits captured Need to reverse engineer these bits at physical layer Determine the bits that correspond to the raw signals obtained from oscilloscope and USRP Reverse engineering Reverse engineering the physical layer Encoding convert data bits into radio symbols Modulation process of varying one waveform in relation to other waveform Reverse engineering Reverse engineering from the programmer Observed that programmer was transmitting at a different frequency for each symbol state Deduced encoding to be binary frequency shift keying (2-FSK) 150Khz and 200Khz were the frequencies used to represent the two possible states 6
7 Reverse engineering Reverse engineering from the ICD Did not have access to wire carrying raw bits Inserted information into the ICD using a programmer Patient name set to string of A s Analyzed RF signal to identify the respective bits Observed the ICD uses differential binary phase shift keying (DPBSK) Symbols are represented by transmission at the same frequency but opposite phase Phase measures displacement from original point Reverse engineering Reverse engineering the physical layer Decoding demodulated symbols What would you look for? Observed that from ICD and programmer have same encoding Non-Return to Zero Inverted with bit stuffing Zero bits are represented with no change in symbol over one symbol period One bits are represented by a change of symbol state Reverse engineering 7
8 Reverse engineering the Eavesdropping What is the first step when eavesdropping? Eavesdropping Transaction timeline of conversation between ICD programmer and ICD 8
9 Eavesdropping Intercepting Patient Data Capture and reverse engineering showed Do not protect cryptographically Data transmitted in clear include Name DOB Medical ID number History Name and phone number of treating physician Dates of ICD implantation Serial number of ICD Intercepting Telemetry When does telemetry get broadcast? 9
10 Intercepting telemetry Telemetry data broadcast in clear Contain representations of patient s EKG Heart rate and private information about patient s cardiac activity in real time Observed with a known plaintext attack What is this? Active attacks Replay attacks Transmit only attacks over 175 KHz band Start with ICD in known state Replay the in a loop One second to 37.7 seconds Observe ICD state after Active attacks Replay attacks Triggering ICD identification Replay 1.5 second auto identification trace recorded from programmer Disclosed several details about ICD such as model and serial number Disclosing patient data After identification programmer asks ICD for rest of information stored on it including patient data GNU Radio used to replay 26 second capture containing autoidentification and interrogation command ICD disclosed same information as with programmer 10
11 Active attacks Replay attacks Disclosing cardiac data Magnetic field can induce telemetry Replaying the initial part of the interrogatory command can also induce such from the ICD Changing patient name Used GNU radio to replay the trace for changing a patient name Active attacks Replay attacks Setting the ICD s clock Attack succeeded after 10 replays Changing therapies Therapies are ICD responses to cardiac events GNU Radio used to turn of therapies Without therapies ICD does not respond to potentially dangerous cardiac conditions Active attacks Replay attacks Inducing fibrillation ICD has a test mode in which it can induce ventricular fibrillation Introduced a 100 ohm resistor between the ICDs defibrillation ports to measure the voltage during a command shock 1 Joule shock sent using programmer Peak voltage observed is V Replayed command with software radio 30 replay attempts succeeded in causing similar voltage spikes 11
12 Zero power defenses What factors must one consider when incorporating security features in an ICD? Zero power defenses Effective approach should either prevent or deter attacks by malicious outsiders with custom equipment as well as insiders with commercial programmers Security and privacy should draw no power from the battery life Prevent DOS on power Security sensitive events should be effortlessly detectable by the patient Security mechanisms should not introduce failure modes This lecture Based on Pacemakers and Implantable Cardiac Defibrillators: Software Radio attacks and Zero Power Defenses by Halperin et al. available on website. 12
Special Topics in Security and Privacy of Medical Information. Reminders. Last lecture: Recap. Sujata Garera. Project part 1 submission
Special Topics in Security and Privacy of Medical Information Sujata Garera Reminders Project part 1 submission Assignment 2 is online Last lecture: Recap Medical Telemetry Infrastructure Devices capturing
More informationPacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses
2008 IEEE Symposium on Security and Privacy Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses Daniel Halperin University of Washington Thomas S. Heydt-Benjamin
More informationPacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses
Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses Daniel Halperin University of Washington Thomas S. Heydt-Benjamin University of Massachusetts Amherst Benjamin
More informationSecurity and Privacy of Wireless Implantable Medical Devices
Security and Privacy of Wireless Implantable Medical Devices Security Forum 2013 Hagenberg, 17.04.2013 Dipl.-Ing. Dr. Gregor Koenig Outlook Overview Device Hacking Safety & Utility Goals Security & Privacy
More informationPacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses
University of Massachusetts - Amherst ScholarWorks@UMass Amherst Computer Science Department Faculty Publication Series Computer Science 2008 Pacemakers and Implantable Cardiac Defibrillators: Software
More informationSecurity and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study
Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study Presenter: Wenyuan Xu Ishtiaq Rouf, Rob Miller, Hossen Mustafa, Travis Taylor, Sangho Oh Wenyuan
More information2.0 System Description
2.0 System Description The wireless alarm system consists of two or more alarm units within a specified range of one another. Each alarm unit employs a radio transceiver, allowing it to communicate with
More informationDepartment of Electrical and Computer Engineering Ben-Gurion University of the Negev. LAB 1 - Introduction to USRP
Department of Electrical and Computer Engineering Ben-Gurion University of the Negev LAB 1 - Introduction to USRP - 1-1 Introduction In this lab you will use software reconfigurable RF hardware from National
More informationKevin Fu Associate Professor Security & Privacy Research Lab UMass Amherst Computer Science http://spqr.cs.umass.edu/
Security and Privacy for Implantable Medical Devices Kevin Fu Associate Professor Security & Privacy Research Lab UMass Amherst Computer Science http://spqr.cs.umass.edu/ SRC/NSF/SFI Forum on Integrated
More informationLocation-Aware and Safer Cards: Enhancing RFID Security and Privacy
Location-Aware and Safer Cards: Enhancing RFID Security and Privacy 1 K.Anudeep, 2 Mrs. T.V.Anantha Lakshmi 1 Student, 2 Assistant Professor ECE Department, SRM University, Kattankulathur-603203 1 anudeepnike@gmail.com,
More informationSoftware Defined Radio
Software Defined Radio GNU Radio and the USRP Overview What is Software Defined Radio? Advantages of Software Defined Radio Traditional versus SDR Receivers SDR and the USRP Using GNU Radio Introduction
More informationRelay Attacks on Passive Keyless Entry and Start Systems in Modern Cars
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Aurélien Francillon, Boris Danev, Srdjan Čapkun 1 Modern Cars Evolution Increasing amount of electronics in cars For convenience
More informationRelay Attacks on Passive Keyless Entry and Start Systems in Modern Cars
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Srdjan Čapkun (joint work with Aurélien Francillon, Boris Danev) 1 Agenda 1. Overview of Car Key Systems 2. Previous Attacks: In
More informationWhat Are Arrhythmias?
What Are Arrhythmias? Many people have questions about what the word arrhythmia means, and arrhythmias can be a difficult subject to understand. The text below should give you a better understanding of
More informationHow To Attack A Key Card With A Keycard With A Car Key (For A Car)
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars (NDSS ) Aurélien Francillon, Boris Danev, Srdjan Čapkun (ETHZ) Wednesday System Security April Group 6, 1 Agenda 1. Overview of Car
More informationStudy Guide for the Electronics Technician Pre-Employment Examination
Bay Area Rapid Transit District Study Guide for the Electronics Technician Pre-Employment Examination INTRODUCTION The Bay Area Rapid Transit (BART) District makes extensive use of electronics technology
More informationDigital Investigation of Security Attacks on Cardiac Implantable Medical Devices
Digital Investigation of Security Attacks on Cardiac Implantable Medical Devices Nourhene Ellouze Communication Networks and Security Research Lab. University of Carthage, Tunisia. nourhene_ellouze@yahoo.fr
More informationHow To Hack An Rdi Credit Card
RFID Payment Card Vulnerabilities Technical Report Thomas S. Heydt-Benjamin 1, Daniel V. Bailey 2, Kevin Fu 1, Ari Juels 2, and Tom O'Hare 3 Abstract 1: University of Massachusetts at Amherst {tshb, kevinfu}@cs.umass.edu
More informationDRM compatible RF Tuner Unit DRT1
FEATURES DRM compatible RF Tuner Unit DRT1 High- Performance RF Tuner Frequency Range: 10 KHz to 30 MHz Input ICP3: +13,5dBm, typ. Noise Figure @ full gain: 14dB, typ. Receiver Factor: -0,5dB, typ. Input
More informationREMOTE KEYLESS ENTRY SYSTEM RECEIVER DESIGN
INTRODUCTION: REMOTE KEYLESS ENTRY SYSTEM RECEIVER DESIGN Remote keyless entry (RKE) has captivated automobile buyers, as evidenced by the popularity of RKE on new automobiles and as an aftermarket item.
More informationGnuRadio CONTACT INFORMATION: phone: +1.301.527.1629 fax: +1.301.527.1690 email: whitepaper@hsc.com web: www.hsc.com
GnuRadio CONTACT INFORMATION: phone: +1.301.527.1629 fax: +1.301.527.1690 email: whitepaper@hsc.com web: www.hsc.com PROPRIETARY NOTICE All rights reserved. This publication and its contents are proprietary
More informationSingle channel data transceiver module WIZ2-434
Single channel data transceiver module WIZ2-434 Available models: WIZ2-434-RS: data input by RS232 (±12V) logic, 9-15V supply WIZ2-434-RSB: same as above, but in a plastic shell. The WIZ2-434-x modules
More informationSDR Architecture. Introduction. Figure 1.1 SDR Forum High Level Functional Model. Contributed by Lee Pucker, Spectrum Signal Processing
SDR Architecture Contributed by Lee Pucker, Spectrum Signal Processing Introduction Software defined radio (SDR) is an enabling technology, applicable across a wide range of areas within the wireless industry,
More informationHow To Understand The Power Of An Freddi Tag (Rfid) System
Radio Frequency Identification Done by: Haitham Habli. Table of contents Definition of RFID. Do they need license? RFID vs other identification systems. Classification of RFID systems. Emerge of passive
More informationDesign of Bidirectional Coupling Circuit for Broadband Power-Line Communications
Journal of Electromagnetic Analysis and Applications, 2012, 4, 162-166 http://dx.doi.org/10.4236/jemaa.2012.44021 Published Online April 2012 (http://www.scirp.org/journal/jemaa) Design of Bidirectional
More informationMODULATION Systems (part 1)
Technologies and Services on Digital Broadcasting (8) MODULATION Systems (part ) "Technologies and Services of Digital Broadcasting" (in Japanese, ISBN4-339-62-2) is published by CORONA publishing co.,
More informationTire pressure monitoring
Application Note AN601 Tire pressure monitoring 1 Purpose This document is intended to give hints on how to use the Intersema pressure sensors in a low cost tire pressure monitoring system (TPMS). 2 Introduction
More informationIntroduction. Planned surgical procedures
Guidelines for the perioperative management of patients with implantable pacemakers or implantable cardioverter defibrillators, where the use of surgical diathermy/electrocautery is anticipated. Introduction
More informationLecture 3: Signaling and Clock Recovery. CSE 123: Computer Networks Stefan Savage
Lecture 3: Signaling and Clock Recovery CSE 123: Computer Networks Stefan Savage Last time Protocols and layering Application Presentation Session Transport Network Datalink Physical Application Transport
More informationUsing RFID Techniques for a Universal Identification Device
Using RFID Techniques for a Universal Identification Device Roman Zharinov, Ulia Trifonova, Alexey Gorin Saint-Petersburg State University of Aerospace Instrumentation Saint-Petersburg, Russia {roman,
More informationHow To Sell A Talan
The TALAN represents state-of-the-art capability to rapidly and reliably detect and locate illicit tampering and security vulnerabilities on both digital and analog telephone systems. Marketing Characteristics
More informationNote monitors controlled by analog signals CRT monitors are controlled by analog voltage. i. e. the level of analog signal delivered through the
DVI Interface The outline: The reasons for digital interface of a monitor the transfer from VGA to DVI. DVI v. analog interface. The principles of LCD control through DVI interface. The link between DVI
More informationDAC Digital To Analog Converter
DAC Digital To Analog Converter DAC Digital To Analog Converter Highlights XMC4000 provides two digital to analog converters. Each can output one analog value. Additional multiple analog waves can be generated
More informationRadio Frequency Identification (RFID)
Radio Frequency Identification (RFID) Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-06/
More informationAPPLICATION NOTE GaGe CompuScope 14200-based Lightning Monitoring System
APPLICATION NOTE GaGe CompuScope 14200-based Lightning Monitoring System Challenge A customer needed to upgrade an older data acquisition unit for a real-time lightning monitoring system. Unlike many lightning
More informationConstructing a precision SWR meter and antenna analyzer. Mike Brink HNF, Design Technologist.
Constructing a precision SWR meter and antenna analyzer. Mike Brink HNF, Design Technologist. Abstract. I have been asked to put together a detailed article on a SWR meter. In this article I will deal
More informationAM Radio Field Strength Measurements with Confidence November 2004
AM Radio Field Strength Measurements with Confidence November 2004 Understanding the AM Broadcast signal The AM Broadcast service in the United States and many other countries is implemented in 10 khz
More informationINTRODUCTION TO COMMUNICATION SYSTEMS AND TRANSMISSION MEDIA
COMM.ENG INTRODUCTION TO COMMUNICATION SYSTEMS AND TRANSMISSION MEDIA 9/6/2014 LECTURES 1 Objectives To give a background on Communication system components and channels (media) A distinction between analogue
More informationFiber Optic Communications Educational Toolkit
Fiber Optic Communications Educational Toolkit ASEE National Conference Summer 2008 Dr. Akram Abu-aisheh & Dr. Jonathan Hill Introduction The main motive for this work was the need for a low cost laboratory
More informationPCM Encoding and Decoding:
PCM Encoding and Decoding: Aim: Introduction to PCM encoding and decoding. Introduction: PCM Encoding: The input to the PCM ENCODER module is an analog message. This must be constrained to a defined bandwidth
More informationDKWF121 WF121-A 802.11 B/G/N MODULE EVALUATION BOARD
DKWF121 WF121-A 802.11 B/G/N MODULE EVALUATION BOARD PRELIMINARY DATA SHEET Wednesday, 16 May 2012 Version 0.5 Copyright 2000-2012 Bluegiga Technologies All rights reserved. Bluegiga Technologies assumes
More informationDT3: RF On/Off Remote Control Technology. Rodney Singleton Joe Larsen Luis Garcia Rafael Ocampo Mike Moulton Eric Hatch
DT3: RF On/Off Remote Control Technology Rodney Singleton Joe Larsen Luis Garcia Rafael Ocampo Mike Moulton Eric Hatch Agenda Radio Frequency Overview Frequency Selection Signals Methods Modulation Methods
More informationWireless Home Security System
Wireless Home Security System Group: D14 Members: Vaibhav Singh (05D07026) Abhishek Tiwari (05D07028) Sauvik Chowdhury (05D07029) 1. Abstract The project is aimed at designing a low cost and reliable wireless
More informationWireless Transmission of JPEG file using GNU Radio and USRP
1 Wireless Transmission of JPEG file using GNU Radio and USRP Sachin Hirve, Saikrishna Gumudavally, Department of Electrical and Computer Engineering, Cleveland State University Abstract Wireless applications
More informationRS - SPM. Serial parallel translator module
ReSatron GmbH Boisheimer Str. 162 D-41751 Viersen Telefon (+49) 02162-45 06 80 Telefax (+49) 02162-45 03 04 email: info@resatron.de RS - SPM Serial parallel translator module RSSPM000215SPM-021 - Subject
More informationRF Measurements Using a Modular Digitizer
RF Measurements Using a Modular Digitizer Modern modular digitizers, like the Spectrum M4i series PCIe digitizers, offer greater bandwidth and higher resolution at any given bandwidth than ever before.
More informationRX-AM4SF Receiver. Pin-out. Connections
RX-AM4SF Receiver The super-heterodyne receiver RX-AM4SF can provide a RSSI output indicating the amplitude of the received signal: this output can be used to create a field-strength meter capable to indicate
More informationObjectives. Lecture 4. How do computers communicate? How do computers communicate? Local asynchronous communication. How do computers communicate?
Lecture 4 Continuation of transmission basics Chapter 3, pages 75-96 Dave Novak School of Business University of Vermont Objectives Line coding Modulation AM, FM, Phase Shift Multiplexing FDM, TDM, WDM
More informationRFID Penetration Tests when the truth is stranger than fiction
RFID Penetration Tests when the truth is stranger than fiction Dr. Tomáš Rosa, tomas.rosa@rb.cz Raiffeisenbank, a.s. Agenda Technology overview Physical layer of LF and HF bands The Unique ID phenomenon
More informationAN1200.04. Application Note: FCC Regulations for ISM Band Devices: 902-928 MHz. FCC Regulations for ISM Band Devices: 902-928 MHz
AN1200.04 Application Note: FCC Regulations for ISM Band Devices: Copyright Semtech 2006 1 of 15 www.semtech.com 1 Table of Contents 1 Table of Contents...2 1.1 Index of Figures...2 1.2 Index of Tables...2
More informationWireless Encryption Protection
Wireless Encryption Protection We re going to jump around a little here and go to something that I really find interesting, how do you secure yourself when you connect to a router. Now first and foremost
More informationVMR6512 Hi-Fi Audio FM Transmitter Module
General Description VMR6512 is a highly integrated FM audio signal transmitter module. It integrates advanced digital signal processor (DSP), frequency synthesizer RF power amplifier and matching network.
More informationApplication Note Receiving HF Signals with a USRP Device Ettus Research
Application Note Receiving HF Signals with a USRP Device Ettus Research Introduction The electromagnetic (EM) spectrum between 3 and 30 MHz is commonly referred to as the HF band. Due to the propagation
More informationEnergy Efficient Security in Implantable Medical Devices
Proceedings of the Federated Conference on Computer Science and Information Systems pp. 773 778 ISBN 978-83-60810-51-4 Energy Efficient Security in Implantable Medical Devices Krzysztof Daniluk Warsaw
More informationUnmatched RF Spectrum Analysis
Datasheet: AirMagnet Spectrum XT AirMagnet Spectrum XT is the industry s first professional spectrum analyzer solution that combines in-depth RF analysis with real-time WLAN information for quicker and
More informationTIMING SIGNALS, IRIG-B AND PULSES
TIMING SIGNALS, IRIG-B AND PULSES Document No. PD0043200B July 2013 Arbiter Systems, Inc. 1324 Vendels Circle, Suite 121 Paso Robles, CA 93446 U.S.A. (805) 237-3831, (800) 321-3831 http://www.arbiter.com
More informationProximity-based Access Control for Implantable Medical Devices
Proximity-based Access Control for Implantable Medical Devices Kasper B. Rasmussen Dept. of Comp. Science ETH Zurich 8092 Zurich, Switzerland kasperr@inf.ethz.ch Claude Castelluccia INRIA 655, avenue de
More informationBasics of Pacing. Ruth Hickling, RN-BSN Tasha Conley, RN-BSN
Basics of Pacing Ruth Hickling, RN-BSN Tasha Conley, RN-BSN The Cardiac Conduction System Cardiac Conduction System Review Normal Conduction Conduction QRS QRS Complex Complex RR PP ST ST segment segment
More informationWIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006
WIRELESS SECURITY Information Security in Systems & Networks Public Development Program Sanjay Goel University at Albany, SUNY Fall 2006 1 Wireless LAN Security Learning Objectives Students should be able
More informationSatellite Telemetry, Tracking and Control Subsystems
Satellite Telemetry, Tracking and Control Subsystems Col John E. Keesee 1 Overview The telemetry, tracking and control subsystem provides vital communication to and from the spacecraft TT&C is the only
More informationModification Details.
Front end receiver modification for DRM: AKD Target Communications receiver. Model HF3. Summary. The receiver was modified and capable of receiving DRM, but performance was limited by the phase noise from
More informationSix-defense zone Display Alarm System. User Manual
Six-defense zone Display Alarm System User Manual Feature 1. Anti-interfere function. When someone interferes it with same frequency, the control unit will activate siren to alarm. 2. Support anti-decode
More informationAND9035/D. BELASIGNA 250 and 300 for Low-Bandwidth Applications APPLICATION NOTE
BELASIGNA 250 and 300 for Low-Bandwidth Applications APPLICATION NOTE Introduction This application note describes the use of BELASIGNA 250 and BELASIGNA 300 in low bandwidth applications. The intended
More informationGNU Radio. An introduction. Jesper M. Kristensen Department of Electronic Systems jmk@es.aau.dk. Programmerbare digitale enheder Tuesday 6/3 2007
GNU Radio An introduction Jesper M. Kristensen Department of Electronic Systems jmk@es.aau.dk Programmerbare digitale enheder Tuesday 6/3 2007 Programmerbare digitale enheder GNU Radio 1 / 36 Outline Introduction
More informationCLINICIAN MANUAL. LATITUDE Patient Management System
CLINICIAN MANUAL LATITUDE Patient Management System CAUTION: Federal law restricts this device to sale by or on the order of a physician trained or experienced in device implant and follow-up procedures.
More informationRDF1. RF Receiver Decoder. Features. Applications. Description. Ordering Information. Part Number Description Packages available
RDF1 RF Receiver Decoder Features Complete FM Receiver and Decoder. Small Form Factor Range up to 200 Metres* Easy Learn Transmitter Feature. Learns 40 transmitter Switches 4 Digital and 1 Serial Data
More informationElettronica dei Sistemi Digitali Costantino Giaconia SERIAL I/O COMMON PROTOCOLS
SERIAL I/O COMMON PROTOCOLS RS-232 Fundamentals What is RS-232 RS-232 is a popular communications interface for connecting modems and data acquisition devices (i.e. GPS receivers, electronic balances,
More informationIntelligent Fleet Management System Using Active RFID
Intelligent Fleet Management System Using Active RFID Ms. Rajeshri Prakash Mane 1 1 Student, Department of Electronics and Telecommunication Engineering, Rajarambapu Institute of Technology, Rajaramnagar,
More informationDesign and Certification of ASH Radio Systems for Japan
Design and Certification of ASH Radio Systems for Japan RFM s second-generation ASH radio hybrids are being used in a wide variety of applications in Japan, operating under the Japanese BIJAKU radio regulations.
More informationHigher National Unit Specification. General information for centres. Transmission of Measurement Signals. Unit code: DX4T 35
Higher National Unit Specification General information for centres Unit title: Transmission of Measurement Signals Unit code: DX4T 35 Unit purpose: This Unit is designed to enable candidates to gain knowledge
More informationAFG-100/200 series USB Modular Arbitrary Function Generator. Date: Oct, 2014
AFG-100/200 series USB Modular Arbitrary Function Generator Date: Oct, 2014 Outline Product Overview Feature, Advantage and Benefit Comparison Chart Ordering Information 22 Product information AFG-125,
More informationTHE BCS PROFESSIONAL EXAMINATIONS BCS Level 5 Diploma in IT. October 2009 EXAMINERS' REPORT. Computer Networks
THE BCS PROFESSIONAL EXAMINATIONS BCS Level 5 Diploma in IT October 2009 EXAMINERS' REPORT Computer Networks General Comments The responses to questions were of marginally better quality than April 2009
More informationThe Answer to the 14 Most Frequently Asked Modbus Questions
Modbus Frequently Asked Questions WP-34-REV0-0609-1/7 The Answer to the 14 Most Frequently Asked Modbus Questions Exactly what is Modbus? Modbus is an open serial communications protocol widely used in
More informationHIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper
HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper Rev 1.0 HIPAA Security Considerations for Broadband Fixed Wireless Access Systems This white paper will investigate
More informationWireless Medical Telemetry Laboratory
Wireless Medical Telemetry Laboratory 0 Introduction The development of wireless medical telemetry has become an increasingly popular application in recent years. As the elderly population continues to
More informationUsing ISO 15693 Compliant RFID Tags in an Inventory Control System
Using ISO 15693 Compliant RFID Tags in an Inventory Control System University: Louisiana State University, Baton Rouge, Louisiana Course: Undergraduate Capstone Project Student Team Members: Joseph Gates,
More informationTECHNICAL TBR 12 BASIS for December 1993 REGULATION
TECHNICAL TBR 12 BASIS for December 1993 REGULATION Source: ETSI TC-BT Reference: DTBR/BT-02036 ICS: 33.040.40 Key words: ONP, leased lines, D2048U Business Telecommunications (BT); Open Network Provision
More informationContactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council
Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions July, 2006 Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked
More informationElectronic Access Control Security. Matteo Beccaro HackInTheBox Amsterdam, May 27 th, 2016
Electronic Access Control Security Matteo Beccaro HackInTheBox Amsterdam, May 27 th, 2016 Me Matteo Beccaro Founder & Chief Technology Officer at Opposing Force The first Italian company specialize in
More informationRevision of Lecture Eighteen
Revision of Lecture Eighteen Previous lecture has discussed equalisation using Viterbi algorithm: Note similarity with channel decoding using maximum likelihood sequence estimation principle It also discusses
More informationSecurity in Ad Hoc Network
Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops
More informationHow To Get A Phone In The United States
Telephone Systems COMP476 Home Telephones Plain Old Telephone Service (POTS) provides a twisted pair connection from your phone to the central office. You own your home wiring and the telephone company
More informationNew CPT Codes for Cardiac Device Monitoring SIDE-BY-SIDE COMPARISON 2008-2009
New CPT Codes for Cardiac Device Monitoring SIDE-BY-SIDE COMPARISON 2008-2009 Effective January 1, 2009 NEW CPT 1 CODES FOR CARDIAC DEVICE MONITORING Twenty-three new CPT codes for Cardiac Device Monitoring
More informationAppendix C GSM System and Modulation Description
C1 Appendix C GSM System and Modulation Description C1. Parameters included in the modelling In the modelling the number of mobiles and their positioning with respect to the wired device needs to be taken
More informationProduct Datasheet P1110 915 MHz RF Powerharvester Receiver
DESCRIPTION The Powercast P1110 Powerharvester receiver is an RF energy harvesting device that converts RF to DC. Housed in a compact SMD package, the P1110 receiver provides RF energy harvesting and power
More informationCardiac Conduction System (1) ECG (Electrocardiogram) Cardiac Conduction System (2) The ECG (1) The ECG (1) The ECG (1) Achmad Rizal BioSPIN
ECG (Electrocardiogram) Cardiac Conduction System (1) Achmad Rizal BioSPIN ARL-EL4703-Instrumentasi Biomedis 2 Cardiac Conduction System (2) The ECG (1) ARL-EL4703-Instrumentasi Biomedis 3 ARL-EL4703-Instrumentasi
More informationINFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG ITMC TECH TIP ROB COONCE, MARCH 2008
INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG What is wireless technology? ITMC TECH TIP ROB COONCE, MARCH 2008 In our world today, this may mean sitting down at a coffee
More informationSpectrum Analyzer Two models available: OGR-24 (24 GHz) and OGR-8 (8 GHz)
Whip antenna extension connector Auto Switching (utilizes 5 independent antennas) Green ADVANTAGES OSCOR FAST SWEEP TIME Headphone Jack 24 GHz IN LESS THAN 1 SECOND (depending on model) COMPLETE PACKAGE
More informationRemote control circuitry via mobile phones and SMS
Remote control circuitry via mobile phones and SMS Gunther Zielosko 1. Introduction In application note No. 56 ( BASIC-Tiger sends text messages, in which we described a BASIC-Tiger sending text messages
More informationTECHNICAL TBR 14 BASIS for April 1994 REGULATION
TECHNICAL TBR 14 BASIS for April 1994 REGULATION Source: ETSI TC-BTC Reference: DTBR/BTC-02038 ICS: 33.040.40 Key words: ONP, leased line Business TeleCommunications (BTC); 64 kbit/s digital unrestricted
More informationRADIUS. Brief brochure. Product Purpose
Product Purpose The Product is designed for searching, intercepting, registering and analyzing of communication sessions as well as service information circulating in cellular GSM networks without encryption
More informationComputer Networks and Internets, 5e Chapter 6 Information Sources and Signals. Introduction
Computer Networks and Internets, 5e Chapter 6 Information Sources and Signals Modified from the lecture slides of Lami Kaya (LKaya@ieee.org) for use CECS 474, Fall 2008. 2009 Pearson Education Inc., Upper
More informationAndroid based Alcohol detection system using Bluetooth technology
For more Project details visit: http://www.projectsof8051.com/android-based-alcohol-detection-system-usingbluetooth-technology/ Code 1435 Project Title Android based Alcohol detection system using Bluetooth
More informationSpectrum Analyzer Two models available: OGR-24 (24 GHz) and OGR-8 (8 GHz)
TM Spectrum Analyzer Two models available: OGR-24 (24 GHz) and OGR-8 (8 GHz) U.S. PATENTS: 6,397,154; 7,058,530 Additional Patents Pending Whip antenna extension connector Auto Switching Antenna Panel
More informationRECOMMENDATION ITU-R F.1113. (Question ITU-R 157/9) b) that systems using this mode of propagation are already in service for burst data transmission,
Rec. ITU-R F.1113 1 RECOMMENDATION ITU-R F.1113 RADIO SYSTEMS EMPLOYING METEOR-BURST PROPAGATION (Question ITU-R 157/9) (1994) Rec. ITU-R F.1113 The ITU Radiocommunication Assembly, considering a) that
More informationElectronic Communications Committee (ECC) within the European Conference of Postal and Telecommunications Administrations (CEPT)
Electronic Communications Committee (ECC) within the European Conference of Postal and Telecommunications Administrations (CEPT) COMPATIBILITY BETWEEN INDUCTIVE LF AND HF RFID TRANSPONDER AND OTHER RADIO
More informationRFID BASED VEHICLE TRACKING SYSTEM
RFID BASED VEHICLE TRACKING SYSTEM Operating a managed, busy parking lot can pose significant challenges, especially to a government organization that also owns some of the vehicles in the lot. The parking
More informationFlexible Active Shutter Control Interface using the MC1323x
Freescale Semiconductor Document Number: AN4353 Application Note Rev. 0, 9/2011 Flexible Active Shutter Control Interface using the MC1323x by: Dennis Lui Freescale Hong Kong 1 Introduction This application
More informationHello viewers, welcome to today s lecture on cellular telephone systems.
Data Communications Prof. A. Pal Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture minus 31 Cellular Telephone Systems Hello viewers, welcome to today s lecture
More information