ASI Agenzia Spaziale Italiana Galileo Workshop Roma 26/07/2012. Alessandro Pozzobon, Project Manager & Co-founder Qascom

Size: px
Start display at page:

Download "ASI Agenzia Spaziale Italiana Galileo Workshop Roma 26/07/2012. Alessandro Pozzobon, Project Manager & Co-founder Qascom"

Transcription

1 ASI Agenzia Spaziale Italiana Galileo Workshop Roma 26/07/2012 Alessandro Pozzobon, Project Manager & Co-founder Qascom

2 Who is Qascom Quality And Secure COMmunications Bassano del Grappa Focused on: Security of Satellite Navigation Systems Authentication of civil GNSS at signal and receiver level against Signal simulation Intentional interference

3 FP7-Galileo 3 projects as coordinator: TIGER Trusted Innovative GNSS receiver PUMA Precise and secure automotive tracking STON Security Technologies based on location

4 TIGER

5 Mission To develop a trusted GNSS receiver & To enhance security of IT infrastructures with trusted location and time policies

6 Technology and Product Trusted GNSS Receiver Access Control Token Information Security Applications: Access Control for banking Access Control for Enterprise Secure Timestamp Implementation Trusted GNSS Receiver Trusted GNSS Receiver GPS/GSM/ SAT Tracking Road & Marine: Road Tolls Attestation Road Tolls Access control PAYG Attestation Vessels border control Secure HazMat Tracking Future Market Opportunities Trusted GNSS Receiver GNSS Data Logger Security Applications: Covert operations Attestation Law enforcement border control Future Market Opportunities All other applications that demand trusted location 6

7 Tiger Technology Uses civilian GNSS signals GNSS security issues addressed by Tiger: Spoofing Falsification of position Detection of in-band interference Large errors in the navigation solution PVT and signal authentication attestation - PKI Supports SHA-1, SHA-256, RSA 2048 Suitable for the niche of needing high security no mass market

8 Protection from physical attacks Red / Black zone separation Tamper Resistant Coating (TRC) Tamper Detection Mesh Security Supervisor GNSS Security Processing GORE Secure Encapsulated Module RF Tamper detection Mesh Epoxy glue Metal Shielding UART Interface SEC micro SUP Connectors GNSS Inner layers UFL Connector GNSS acquisition,tracking and navigation processing TIGER tamper mesh concept 8

9 Tiger Embodiment TIGER is the first worldwide USB security token with trusted location based functionalities

10 Features Location based authentication and access control Network and VPN access, web access, etc. only from trusted zones Geo-encryption Files, documents, folders, s Attestation On top of standard strong authentication

11 How 1. Trusted token with certified position 2. Location constrains 11 * For geo-encryption: third party or proprietory E-DRM or DLP solutions

12 Geo-encryption process

13 PUMA

14 Mission Authenticate the GNSS Signal in the Road User Charging Domain

15 Scenario GNSS Egnos GNSS Jammer Tunnels Tracking Server Urban canyons Spoofer Precise and Secure Tracking

16 GNSS open challenges Availability RFI Radio Frequency interference Jamming Urban canyon and dense foliage Indoor Integrity Urban canyon and dense foliage Indoor Obstacles Geometry Authentication Spoofing Physical tampering Photo: Rene Schwietzke

17 The concept GNSS Spoofed signal S1 S2 DR s path S0 S3 GNSS s path S-1

18 Advances Attained through Development of PUMA Minimization of obstacles to the introduction of road toll applications, without the need of expensive infrastructure Detection of GNSS jamming, spoofing Navigation Aiding and GNSS Spoofing Detection using Dead-reckoning Interfacing of In-Vehicle Sensors for Dead- Reckoning via automotive interface

19 The demonstrator The project has received funding from European Community s framework programme ([FP7/ ][FP7/ ]) under grant agreement n

20 Spoofing Detection and performance DR Performance: Distance: 23 km Error: 3,16 km Error rate: 18% Green: GPS/theoretical path Blu: Dead Rekoning with PUMA Red point: Start spoofing Start Path

21 Future improvements Map matching Gyroscope Use of additional sensors available in the CAN Initialization of wheel tick Signal of opportunities

22 STON

23 Mission Server side signal authentication & To offer a security layer to authenticate users based on their position

24 The concept Low cost security token (HW or SW) Location anywhere Mass market - SME Medium IT security always connected Focus on IT Authentication -Server side to reduce costs STON token Or REQUEST LOGIN Web service Smartphone/device with STON acquisition layer User requiring access to information Is it a trusted location? Is there any inconsistency? Are the user and the token in the same position?

25 Progress beyond the state of the art Innovation in signal acquisition method RF front end with crypto integrity of sampled data Indoor mitigation (GSM, WiFi, IP) Security architecture Centralized security Signal authentication With front end and signal sample Using Galileo Commercial Service Providing strong authentication in different domains (IT security, road toll)

26 Conclusion R&D GNSS signal processing and security, signal authentication e secure GNSS receiver Know how in: Software / Telecommunication Engineering GNSS Security Target all the markets that rely on a secure PVT

27 Thanks Alessandro Pozzobon Qascom S.r.l. ph

Galileo Ready Advanced Mass Market Receiver (GRAMMAR) Project Workshop Outline

Galileo Ready Advanced Mass Market Receiver (GRAMMAR) Project Workshop Outline DLR ACO TUT 2011 Project Overview ICL-GNSS, Tampere, Finland, June 29-30 2011 Page 1 30.06.2010 Galileo Ready Advanced Mass Market Receiver (GRAMMAR) Project Workshop Outline» Part I (9:45-11:00)» Overview

More information

Secure Tracking using Trusted GNSS Receivers and Galileo Authentication Services

Secure Tracking using Trusted GNSS Receivers and Galileo Authentication Services Journal of Global Positioning Systems (2004) Vol. 3, No. 1-2: 200-207 Secure Tracking using Trusted GNSS Receivers and Galileo Authentication Services Oscar Pozzobon 1, Chris Wullems 1, Kurt Kubik 2 1

More information

Secure Navigation and Authentication. Sherman Lo November 2008

Secure Navigation and Authentication. Sherman Lo November 2008 Secure Navigation and Authentication Sherman Lo November 2008 1 Outline Motivating Authentication Proposed techniques for authentication Source authentication Cross checking My research 2 GNSS: Position,

More information

Technologies for PRS Receivers

Technologies for PRS Receivers Seventh Framework Programme of the European Community for Research, Technological Development and Demonstration Activities (2007 to 2013) 'Cooperation' Specific Programme Theme: Transport (including Aeronautics)

More information

siemens.com/tolling Back-office system Sitraffic Sensus Server Supplies all front-end data. Suitable for any GNSS tolling back-office.

siemens.com/tolling Back-office system Sitraffic Sensus Server Supplies all front-end data. Suitable for any GNSS tolling back-office. siemens.com/tolling Back-office system Server Supplies all front-end data. Suitable for any GNSS tolling back-office. Server: The universal back-office for efficient and effective toll collection Server

More information

GNSS Anti-Jam Technology for the Mass Market

GNSS Anti-Jam Technology for the Mass Market GNSS Anti-Jam Technology for the Mass Market Michael Jones, Senior Consultant Engineer, GNSS Protection Roke Manor Research Ltd Communications Sensors Information Systems Contract R&D Consultancy Specialist

More information

Company Presentation and Main Activities

Company Presentation and Main Activities S.r.l. Page 1 Company Presentation and Main Activities Via fiume 23, 57123, Livorno - Italy Prof. Marco Luise Dr. Ing. Marco Della Maggiora Company Profile Page 2 Digital Craftmanship www.wiser.it Page

More information

European best practices in safe transport of dangerous material supported by GNSS

European best practices in safe transport of dangerous material supported by GNSS 2 nd GNSS Vulnerabilities and Solutions 2009 Conference, Baska, Croatia European best practices in safe transport of dangerous material supported by GNSS Gianmarco Baldini IPSC - JRC EC Antonella Di Fazio

More information

IMES (Indoor Messaging System) A Proposal for New Indoor Positioning System Presenter: Dr. Dinesh Manandhar GNSS Technologies Inc., Japan Third Meeting of the International Committee on Global Navigation

More information

Secure and Reliable Wireless Communications for Geological Repositories and Nuclear Facilities

Secure and Reliable Wireless Communications for Geological Repositories and Nuclear Facilities Session S14: Safeguards Needs at Geological Repositories and Encapsulation Facilities Secure and Reliable Wireless Communications for Geological Repositories and Nuclear Facilities Richard E. Twogood Dirac

More information

GPS Forensics Crime, Jamming & Spoofing. Professor David Last

GPS Forensics Crime, Jamming & Spoofing. Professor David Last GPS Forensics Crime, Jamming & Spoofing Professor David Last Consultant Engineer & Expert Witness jdl@navaid.demon.co.uk ABSTRACT. The most widely used of all GPS devices currently are car satellite navigators.

More information

HEOL-N103-OBD, GPS/GPRS Tracking Module with On Board Diagnostic

HEOL-N103-OBD, GPS/GPRS Tracking Module with On Board Diagnostic HEOL-N103-OBD, GPS/GPRS Tracking Module with On Board Diagnostic Heol fleet tracking system GPS N103 -OBD GPRS FTS Software Internet Main office - Control room Other office The specifications in this document

More information

Secure Navigation and Timing Without Local Storage of Secret Keys

Secure Navigation and Timing Without Local Storage of Secret Keys Ph.D. Defense The University of Texas at Austin 9 April 2014 Secure Navigation and Timing Without Local Storage of Secret Keys Kyle D. Wesson Committee Dr. Todd E. Humphreys (supervisor) Dr. Brian L. Evans

More information

GNSS integrity monitoring for the detection and mitigation of interference

GNSS integrity monitoring for the detection and mitigation of interference GNSS integrity monitoring for the detection and mitigation of interference Dr. Shaojun Feng Centre for Transport Studies Outline GNSS vulnerability GNSS integrity monitoring Cases study GAARDIAN ERAIM

More information

GPS Jamming Threat Scenarios CGSIC 2013 Nashville. Prof. Charles Curry BEng, CEng, FIET Managing Director Chronos Technology Ltd

GPS Jamming Threat Scenarios CGSIC 2013 Nashville. Prof. Charles Curry BEng, CEng, FIET Managing Director Chronos Technology Ltd GPS Jamming Threat Scenarios CGSIC 2013 Nashville Prof. Charles Curry BEng, CEng, FIET Managing Director Chronos Technology Ltd Presentation Contents Background How we detect Who is doing it Threat scenarios

More information

Location Identification and Vehicle Tracking using VANET(VETRAC)

Location Identification and Vehicle Tracking using VANET(VETRAC) Location Identification and Vehicle Tracking using VANET(VETRAC) Supervisor Name: Md. Mosaddik Hasan Assistant Professor Dept. of CSE MBSTU Md. Al-Amin Nipu CE-10031 Dept. of CSE MBSTU Abstract: Large

More information

European GNSS Applications in Horizon 2020

European GNSS Applications in Horizon 2020 European GNSS Applications in Horizon 2020 Official International Space Information Day 2015, Brussels 10 November 2015 Marta Krywanis-Brzostowska European GNSS Agency Integrated approach: understanding

More information

iphone in Business Security Overview

iphone in Business Security Overview iphone in Business Security Overview iphone can securely access corporate services and protect data on the device. It provides strong encryption for data in transmission, proven authentication methods

More information

ASPHALT. Advance Galileo Navigation System for Asphalt s Fleet Machines. Galileo Application Days www.application-days.eu 3-5 March 2010, Brussels

ASPHALT. Advance Galileo Navigation System for Asphalt s Fleet Machines. Galileo Application Days www.application-days.eu 3-5 March 2010, Brussels ASPHALT Advance Galileo Navigation System for Asphalt s Fleet Machines Galileo Application Days www.application-days.eu 3-5 March 2010, Brussels Content ASPHALT Team Road Construction Key Data Project

More information

ESNC Kick-off 2015 David Argiles david.argiles@val-space.com 1

ESNC Kick-off 2015 David Argiles david.argiles@val-space.com 1 ESNC Kick-off 2015 David Argiles david.argiles@val-space.com 1 as of 2014 ESNC COMPETITION The European Satellite Navigation Competition is an international contest that annually awards the best services,

More information

Improving Quality of GNSS Vehicle Localization

Improving Quality of GNSS Vehicle Localization Improving Quality of GNSS Vehicle Localization Roman Srp ITS&S FP7 Easy OBU project Telematika, Legislativa, Strategie, 11.4.2014, Praha Contents EasyOBU Research in a Nutshell Signal Loss in GNSS Applications

More information

VEHICLE TRACKING SYSTEM USING GPS. 1 Student, ME (IT) Pursuing, SCOE, Vadgaon, Pune. 2 Asst. Professor, SCOE, Vadgaon, Pune

VEHICLE TRACKING SYSTEM USING GPS. 1 Student, ME (IT) Pursuing, SCOE, Vadgaon, Pune. 2 Asst. Professor, SCOE, Vadgaon, Pune VEHICLE TRACKING SYSTEM USING GPS Pooja P. Dehankar 1, 1 Student, ME (IT) Pursuing, SCOE, Vadgaon, Pune Prof. S. P. Potdar 2 2 Asst. Professor, SCOE, Vadgaon, Pune Abstract- Global Positioning System is

More information

Perfect M2M & Telematic solutions for your perfect data flow. Construction & Agriculture. Remote Control & Maintenance. Electronic Toll Collection

Perfect M2M & Telematic solutions for your perfect data flow. Construction & Agriculture. Remote Control & Maintenance. Electronic Toll Collection Automotive Telematics Construction & Agriculture Track & Trace Remote Control & Maintenance Electronic Toll Collection Smart Metering Perfect M2M & Telematic solutions for your perfect data flow. EN A

More information

Presentation Outline. The NavSAS group; Examples of Software-Radio Technology in GNSS;

Presentation Outline. The NavSAS group; Examples of Software-Radio Technology in GNSS; Telemobility 2008 Progetto Galileo ed altri GNSS Development of GPS-Galileo Galileo Software Radio Receivers Marco Pini - NavSAS group Presentation Outline The NavSAS group; Basic on Software-Radio Technology;

More information

Release Notes. NCP Secure Entry Mac Client. Major Release 2.01 Build 47 May 2011. 1. New Features and Enhancements. Tip of the Day

Release Notes. NCP Secure Entry Mac Client. Major Release 2.01 Build 47 May 2011. 1. New Features and Enhancements. Tip of the Day NCP Secure Entry Mac Client Major Release 2.01 Build 47 May 2011 1. New Features and Enhancements Tip of the Day A Tip of the Day field for configuration tips and application examples is incorporated in

More information

Remote Area Tracking and Mapping

Remote Area Tracking and Mapping Remote Area Tracking and Mapping TM3000 with Iridium Satellite Back up Communications Step Global has developed a solution to remote area GPS tracking by interfacing the Trimble TM3000 Asset Tracking Device

More information

GNSS Scenario. By Dr Ashok Kaushal. GNSS scenario in India in India. 05/08/2007 Slide No.: 1

GNSS Scenario. By Dr Ashok Kaushal. GNSS scenario in India in India. 05/08/2007 Slide No.: 1 GNSS Scenario in India By Dr Ashok Kaushal ASL 1 Advanced Systems Pvt. Aerospace Ltd., Systems Bangalore Pvt. Ltd. Slide No.: 1 Content Introduction Significance of Location Trends G 3 perspective Location

More information

Release Notes. NCP Secure Entry Mac Client. 1. New Features and Enhancements. 2. Improvements / Problems Resolved. 3. Known Issues

Release Notes. NCP Secure Entry Mac Client. 1. New Features and Enhancements. 2. Improvements / Problems Resolved. 3. Known Issues NCP Secure Entry Mac Client Service Release 2.05 Build 14711 December 2013 Prerequisites Apple OS X Operating System: The following Apple OS X operating system versions are supported with this release:

More information

Chapter 12 Homework CIT 105 - J001/02/04/06. Name: Date: Course: Test:

Chapter 12 Homework CIT 105 - J001/02/04/06. Name: Date: Course: Test: 1. Which of the following is an advantage of installing a client/server network in a business? a. decentralization of peripherals b. centralization of network security protection c. decentralization of

More information

This is the author s version of a work that was submitted/accepted for publication in the following source:

This is the author s version of a work that was submitted/accepted for publication in the following source: This is the author s version of a work that was submitted/accepted for publication in the following source: Wullems, Christian, Pozzobon, Oscar, & Kubik, Kurt (2006) Secure tracking for critical applications

More information

Security risk analysis approach for on-board vehicle networks

Security risk analysis approach for on-board vehicle networks 1 Security risk analysis approach for on-board vehicle networks Alastair Ruddle Consultant, MIRA Limited Motivation 2 o o Future vehicles will become mobile nodes in a dynamic transport network vehicle

More information

Apogee Series. > > Motion Compensation and Data Georeferencing. > > Smooth Workflow. Mobile Mapping. > > Precise Trajectory and Direct Georeferencing

Apogee Series. > > Motion Compensation and Data Georeferencing. > > Smooth Workflow. Mobile Mapping. > > Precise Trajectory and Direct Georeferencing Ultimate accuracy MEMS Apogee Series Inertial Navigation System Motion Sensing and Georeferencing > INS > MRU > AHRS ITAR free 0,005 RMS Apogee Series High quality, high accuracy Hydrography > > Motion

More information

ipad in Business Security

ipad in Business Security ipad in Business Security Device protection Strong passcodes Passcode expiration Passcode reuse history Maximum failed attempts Over-the-air passcode enforcement Progressive passcode timeout Data security

More information

GPS Jamming Quantifying the Threat

GPS Jamming Quantifying the Threat GPS Jamming Quantifying the Threat WSTS April 16-18 th, 2013 Prof. Charles Curry BEng, CEng, FIET Managing Director Chronos Technology Ltd San Jose Presentation Contents Background What, Who and Why? Latest

More information

Secure Vehicle Communications: Results and Challenges Ahead. Galileo, EGNOS and Security

Secure Vehicle Communications: Results and Challenges Ahead. Galileo, EGNOS and Security Secure Vehicle Communications: Results and Challenges Ahead Galileo, EGNOS and Security Neil Warfield Export Control and International Security Matters Specialist GNSS Supervisory Authority Neil.Warfield@gsa.europa.eu

More information

White Paper Assured PNT Inside Military Ground Vehicles Using D3

White Paper Assured PNT Inside Military Ground Vehicles Using D3 White Paper Assured PNT Inside Military Ground Vehicles Using D3 Brian Paul December 2013 Introduction Global Positioning System (GPS) technology has become an integral part of Mission Command systems

More information

Microwave Photonic Systems Inc. Joshua L. Korson & Richard J. Stewart

Microwave Photonic Systems Inc. Joshua L. Korson & Richard J. Stewart Fiber Optic Communications Equipment Provides Backhaul Infrastructure for Critical Satellite Based Continuity of Communications Solutions: IRIDUIM, INMARSAT, GEO SATCOM Microwave Photonic Systems Inc.

More information

INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG ITMC TECH TIP ROB COONCE, MARCH 2008

INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG ITMC TECH TIP ROB COONCE, MARCH 2008 INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG What is wireless technology? ITMC TECH TIP ROB COONCE, MARCH 2008 In our world today, this may mean sitting down at a coffee

More information

ABB solar inverters. ABB solar inverters Application note Improving CDD wireless reception

ABB solar inverters. ABB solar inverters Application note Improving CDD wireless reception ABB solar inverters ABB solar inverters Application note Improving wireless reception Reader note This document is to be used in conjunction with the MICRO- 0.25-0.3-0.3HV-I product manual or Quick Installation

More information

PNT Evolution: Future Benefits and Policy Issues. Scott Pace Director, Space Policy Institute George Washington University Washington, D.C.

PNT Evolution: Future Benefits and Policy Issues. Scott Pace Director, Space Policy Institute George Washington University Washington, D.C. PNT Evolution: Future Benefits and Policy Issues Scott Pace Director, Space Policy Institute George Washington University Washington, D.C. 5 November 2009 GPS is a Critical Component of the Global Information

More information

The benefits of satellite telecom systems for civil protection

The benefits of satellite telecom systems for civil protection The benefits of satellite telecom systems for civil protection Pascale SOURISSE President 15-17 avenue de Ségur 75007 Paris, France www.eurospace.org T+33-1-44420070 F+33-1-44420079 1 The benefits of satellite

More information

Mobile Access Controller

Mobile Access Controller Solution overview Mobile Access Controller Mobile Workforce Communication Solution NEC Australia nec.com.au Reliable voice and data coverage for field workers. Overview Designed specifically for vehicle

More information

GPS Based Low Cost Intelligent Vehicle Tracking System (IVTS)

GPS Based Low Cost Intelligent Vehicle Tracking System (IVTS) 2012 International Conference on Traffic and Transportation Engineering (ICTTE 2012) IPCSIT vol. 26 (2012) (2012) IACSIT Press, Singapore GPS Based Low Cost Intelligent Vehicle Tracking System (IVTS) Dr.

More information

Deploying iphone and ipad Security Overview

Deploying iphone and ipad Security Overview Deploying iphone and ipad Security Overview ios, the operating system at the core of iphone and ipad, is built upon layers of security. This enables iphone and ipad to securely access corporate services

More information

SEC100 Secure Authentication and Data Transfer with SAP Single Sign-On. Public

SEC100 Secure Authentication and Data Transfer with SAP Single Sign-On. Public SEC100 Secure Authentication and Data Transfer with SAP Single Sign-On Public Speakers Las Vegas, Oct 19-23 Christian Cohrs, Area Product Owner Barcelona, Nov 10-12 Regine Schimmer, Product Management

More information

IPsec VPN Security between Aruba Remote Access Points and Mobility Controllers

IPsec VPN Security between Aruba Remote Access Points and Mobility Controllers IPsec VPN Security between Aruba Remote Access Points and Mobility Controllers Application Note Revision 1.0 10 February 2011 Copyright 2011. Aruba Networks, Inc. All rights reserved. IPsec VPN Security

More information

How To Create A Virtual Network With A Router And Network Operating System (Ip) For A Network (Ipv) (Ip V2) (Netv) And A Virtualization) (Network) (Wired) (Virtual) (Wire)

How To Create A Virtual Network With A Router And Network Operating System (Ip) For A Network (Ipv) (Ip V2) (Netv) And A Virtualization) (Network) (Wired) (Virtual) (Wire) Post-IP technologies virtualization and security Guy Pujolle 1 Virtualization for a post-ip network 2 Geni Intel would like to propose a generic router Intel proposes to have a generic hardware with virtual

More information

EGNOS: an emerging technology to support urban transport. POLIS Bruxelles November 2011

EGNOS: an emerging technology to support urban transport. POLIS Bruxelles November 2011 EGNOS: an emerging technology to support urban transport POLIS Bruxelles November 2011 21 October 2011 : GALILEO becomes a reality What is EGNOS? 6 Navigation Land Earth Stations 34 Ranging & Integrity

More information

Hybrid positioning and CellLocate TM

Hybrid positioning and CellLocate TM Hybrid positioning and CellLocate TM Increased reliability and indoor positioning based on mobile network attributes Dr. Chris Marshall, Visionary Program Manager, u-blox Carl Fenger, Communications Manager,

More information

Release Notes. NCP Secure Client Juniper Edition. 1. New Features and Enhancements. 2. Problems Resolved

Release Notes. NCP Secure Client Juniper Edition. 1. New Features and Enhancements. 2. Problems Resolved NCP Secure Client Juniper Edition Service Release: 9.30 Build 102 Date: February 2012 1. New Features and Enhancements The following describe the new features introduced in this release: Visual Feedback

More information

IDD-213T User Manual. (Rev. 1.0) China Aerospace Telecommunications Limited

IDD-213T User Manual. (Rev. 1.0) China Aerospace Telecommunications Limited (Rev. 1.0) China Aerospace Telecommunications Limited Contents 1. Introduction......3 2. Specifications...4 2.1 External Interface... 4 2.2 Status Indicator...... 5 2.3 Technical Parameters... 6 3. Device

More information

SNRS. Securing Networks with Cisco Routers and Switches. Length 5 days. Format Lecture/lab

SNRS. Securing Networks with Cisco Routers and Switches. Length 5 days. Format Lecture/lab Length 5 days Format Lecture/lab Version 3.0 SNRS Course Description SNRS 1.0 is a 5-day, lab-intensive course that provides the knowledge and skills needed to secure Cisco IOS router and switch networks.

More information

iphone in Business How-To Setup Guide for Users

iphone in Business How-To Setup Guide for Users iphone in Business How-To Setup Guide for Users iphone 3G is ready for business. It supports Microsoft Exchange ActiveSync, delivering push email, calendars, and contacts. And it gives mobile users secure

More information

Vehicle tracking/remote

Vehicle tracking/remote Secure tracking for critical applications Application by Chris Wullems, Oscar Pozzobon, Qascom, and Kurt Kubik, University of Queensland From the safety of workers to the protection of assets and the transportation

More information

Easily Connect, Control, Manage, and Monitor All of Your Devices with Nivis Cloud NOC

Easily Connect, Control, Manage, and Monitor All of Your Devices with Nivis Cloud NOC Easily Connect, Control, Manage, and Monitor All of Your Devices with Nivis Cloud NOC As wireless standards develop and IPv6 gains widespread adoption, more and more developers are creating smart devices

More information

3. Designed for installation by the user without further substantial support by the supplier; and

3. Designed for installation by the user without further substantial support by the supplier; and Commerce Control List Supplement No. 1 to Part 774 Category 5 - Info. Security page 1 CATEGORY 5 TELECOMMUNICATIONS AND INFORMATION SECURITY Part 2 INFORMATION SECURITY Note 1: The control status of information

More information

Tracking Solutions for Fleet Management Systems

Tracking Solutions for Fleet Management Systems Tracking Solutions for Fleet Management Systems By Priya Shukla, Anand Kumar Swami, Neha Kochar and Filippo Colaianni STMicroelectronics Design and development of commercial GPS receivers has gained tremendous

More information

Vehicular On-board Security: EVITA Project

Vehicular On-board Security: EVITA Project C2C-CC Security Workshop 5 November 2009 VW, MobileLifeCampus Wolfsburg Hervé Seudié Corporate Sector Research and Advance Engineering Robert Bosch GmbH Outline 1. Project Scope and Objectives 2. Security

More information

Securing your future DEFENCE AND SECURITY

Securing your future DEFENCE AND SECURITY DEFENCE AND SECURITY Defence and security system developers Rapid evolution of technology poses both an opportunity and a threat for defence and security systems. Today s solutions need to adapt to an

More information

ISG50 Application Note Version 1.0 June, 2011

ISG50 Application Note Version 1.0 June, 2011 ISG50 Application Note Version 1.0 June, 2011 Scenario 1 - ISG50 is placed behind an existing ZyWALL 1.1 Application Scenario For companies with existing network infrastructures and demanding VoIP requirements,

More information

Legislative Council Panel on Information Technology and Broadcasting. Information Note on the Development of Global Positioning System in Hong Kong

Legislative Council Panel on Information Technology and Broadcasting. Information Note on the Development of Global Positioning System in Hong Kong CB(1)1709/03-04(01) Legislative Council Panel on Information Technology and Broadcasting Information Note on the Development of Global Positioning System in Hong Kong PURPOSE At the meeting of the Panel

More information

GNSS MONITORING NETWORKS

GNSS MONITORING NETWORKS SPACE GNSS MONITORING NETWORKS Satellite communications, earth observation, navigation and positioning and control stations indracompany.com GNSS MONITORING NETWORKS GNSS MONITORING NETWORKS Indra s solutions

More information

Contents Chapter 1: Introduction... 3 Chapter 2: Ethernet (LAN)... 5 Chapter 3: ZigBee Wireless Connection Options... 7

Contents Chapter 1: Introduction... 3 Chapter 2: Ethernet (LAN)... 5 Chapter 3: ZigBee Wireless Connection Options... 7 Contents Chapter 1: Introduction... 3 Communication Types and Functionality... 3 Communication Connectors... 3 Communication Lightning Protection... 4 Chapter 2: Ethernet (LAN)... 5 Single/Multiple Devices,

More information

Setting Up the Cisco Unified IP Phone

Setting Up the Cisco Unified IP Phone CHAPTER 3 This chapter includes the following topics, which help you install the Cisco Unified IP Phone on an IP telephony network: Before You Begin, page 3-1 Understanding the Cisco Unified IP Phone 7962G

More information

Global Navigation Satellite Systems

Global Navigation Satellite Systems White Paper Global Navigation Satellite Systems The Present and the Future For more information, please visit: 2012 IEIMobile Global Navigation Satellite System, or GNSS in short, is a generic term used

More information

Radio Technical Commission for Maritime Services. GPS Update. Bob Markle RTCM Arlington, VA USA. NMEA Convention & Expo 2010

Radio Technical Commission for Maritime Services. GPS Update. Bob Markle RTCM Arlington, VA USA. NMEA Convention & Expo 2010 Radio Technical Commission for Maritime Services GPS Update NMEA Convention & Expo 2010 Bob Markle RTCM Arlington, VA USA What is RTCM? International non-profit scientific, professional and membership

More information

MAXIMIZING YOUR DATA CENTER INFRASTRUCTURE: CENTRALIZED MANAGEMENT AND WIRE-FREE ENVIRONMENTAL MONITORING

MAXIMIZING YOUR DATA CENTER INFRASTRUCTURE: CENTRALIZED MANAGEMENT AND WIRE-FREE ENVIRONMENTAL MONITORING MAXIMIZING YOUR DATA CENTER INFRASTRUCTURE: CENTRALIZED MANAGEMENT AND WIRE-FREE Chris C. Gaskins Vice President of Product Development RF Code, Inc. AUGUST 2010 Shawn Griggs Director of Product Management

More information

Vidder PrecisionAccess

Vidder PrecisionAccess Vidder PrecisionAccess Security Architecture February 2016 910 E HAMILTON AVENUE. SUITE 410 CAMPBELL, CA 95008 P: 408.418.0440 F: 408.706.5590 WWW.VIDDER.COM Table of Contents I. Overview... 3 II. Components...

More information

Introduction to Computer Networks and Data Communications

Introduction to Computer Networks and Data Communications Introduction to Computer Networks and Data Communications Chapter 1 Learning Objectives After reading this chapter, you should be able to: Define the basic terminology of computer networks Recognize the

More information

Cellular and 802.11 Networks Application and Data Usage

Cellular and 802.11 Networks Application and Data Usage Cellular and 802.11 Networks Application and Data Usage Wireless connectivity has become a necessity for application usage and productivity workflows. Network connectivity changes as users move from indoors

More information

Federal Communications Commission Office of Engineering and Technology Laboratory Division

Federal Communications Commission Office of Engineering and Technology Laboratory Division Federal Communications Commission Office of Engineering and Technology Laboratory Division August 14, 2014 GUIDANCE ON SOFTWARE OR NETWORK CONFIGURATION OF NON-SDR DEVICES TO ENSURE COMPLIANCE I. GENERAL

More information

Innovations in Digital Signature. Rethinking Digital Signatures

Innovations in Digital Signature. Rethinking Digital Signatures Innovations in Digital Signature Rethinking Digital Signatures Agenda 2 Rethinking the Digital Signature Benefits Implementation & cost issues A New Implementation Models Network-attached signature appliance

More information

Smart Transportation Pricing - Technical Architectures. Cisco Internet Business Solutions Group - December 2008

Smart Transportation Pricing - Technical Architectures. Cisco Internet Business Solutions Group - December 2008 Smart Transportation Pricing - Technical Architectures Cisco Internet Business Solutions Group - December 2008 Smart Transportation Pricing - Applications Citizen Register and Update Vehicle profiles Personal

More information

USER MANUAL V5.0 ST100

USER MANUAL V5.0 ST100 GPS Vehicle Tracker USER MANUAL V5.0 ST100 Updated on 15 September 2009-1 - Contents 1 Product Overview 3 2 For Your Safety 3 3 ST100 Parameters 3 4 Getting Started 4 4.1 Hardware and Accessories 4 4.2

More information

Cisco IOS Firewall. Scenarios

Cisco IOS Firewall. Scenarios Cisco IOS Firewall Common Deployment Scenarios http://www.cisco.com/go/iosfirewall com/go/iosfirewall Presentation_ID 2007 Cisco Systems, Inc. All rights reserved. 1 Cisco IOS Firewall Feature Overview

More information

Using Application Layer Technology to Overcome the Impact of Satellite Circuit Latency on VPN Performance

Using Application Layer Technology to Overcome the Impact of Satellite Circuit Latency on VPN Performance Using Application Layer Technology to Overcome the Impact of Satellite Circuit Latency on VPN Performance Ground Control February 2003 Abstract This paper explains the source of severe throughput degradation

More information

Best Practices for Outdoor Wireless Security

Best Practices for Outdoor Wireless Security Best Practices for Outdoor Wireless Security This paper describes security best practices for deploying an outdoor wireless LAN. This is standard body copy, style used is Body. Customers are encouraged

More information

Effective Methods to Detect Current Security Threats

Effective Methods to Detect Current Security Threats terreactive AG. Swiss Cyber Storm 2015. Effective Methods to Detect Current Security Threats Taking your IT security to the next level, you have to consider a paradigm shift. In the past companies mostly

More information

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

Module 8. Network Security. Version 2 CSE IIT, Kharagpur Module 8 Network Security Lesson 2 Secured Communication Specific Instructional Objectives On completion of this lesson, the student will be able to: State various services needed for secured communication

More information

Thatcham Research The Insurers Automotive Research Centre

Thatcham Research The Insurers Automotive Research Centre Thatcham Research The Insurers Automotive Research Centre 15 th October 2014 Mike Briggs- Vehicle Crime Research Manager Overview of Thatcham The Motor Insurance Research Centre Owned by the major UK Motor

More information

Telematics & Wireless M2M

Telematics & Wireless M2M www.lairdtech.com Telematics & Wireless M2M DEVICE PORTFOLIO About Laird Technologies Laird Technologies designs and manufactures customized, performance-critical products for wireless and other advanced

More information

app coverage applied EXTRACT FROM THE ERICSSON MOBILITY REPORT

app coverage applied EXTRACT FROM THE ERICSSON MOBILITY REPORT app applied EXTRACT FROM THE ERICSSON MOBILITY REPORT NOVEMBER 2013 App COVERAGE applied The use of smartphones and tablets has caused a surge in mobile data around the world. Today, users want reliable

More information

Tracking Vehicles with GPS:

Tracking Vehicles with GPS: Zheng, Wang, and Nihan Page 1 Tracking Vehicles with GPS: Is it a Feasible Solution? Jianyang Zheng Box 352700 Department of Civil and Environmental Engineering University of Washington Seattle, WA 98195-2700

More information

The European GNSS Programmes EGNOS and Galileo

The European GNSS Programmes EGNOS and Galileo The European GNSS Programmes EGNOS and Galileo 6th ICG Conference Pieter De Smet European Commission 5 September 2011 1. State of Play of EGNOS 2. State of Play of Galileo 5 September, 2011 The European

More information

mysensors mysensors Wireless Sensors and Ethernet Gateway Quick Start Guide Information to Users Inside the Box mysensors Ethernet Gateway Quick Start

mysensors mysensors Wireless Sensors and Ethernet Gateway Quick Start Guide Information to Users Inside the Box mysensors Ethernet Gateway Quick Start mysensors Information to Users mysensors Wireless Sensors and Ethernet Gateway Quick Start Guide This equipment has been tested and found to comply with the limits for a Class B digital devices, pursuant

More information

Post Processing Service

Post Processing Service Post Processing Service The delay of propagation of the signal due to the ionosphere is the main source of generation of positioning errors. This problem can be bypassed using a dual-frequency receivers

More information

GoldKey Product Info. Do not leave your Information Assets at risk Read On... Detailed Product Catalogue for GoldKey

GoldKey Product Info. Do not leave your Information Assets at risk Read On... Detailed Product Catalogue for GoldKey GoldKey Product Info Detailed Product Catalogue for GoldKey Do not leave your Information Assets at risk Read On... GoldKey: Reinventing the Security Strategy The Changing Landscape of Data Security With

More information

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS Sumanta Saha, Md. Safiqul Islam, Md. Sakhawat Hossen School of Information and Communication Technology The Royal Institute of Technology (KTH) Stockholm,

More information

How To Integrate Hosted Email Security With Office 365 And Microsoft Mail Flow Security With Microsoft Email Security (Hes)

How To Integrate Hosted Email Security With Office 365 And Microsoft Mail Flow Security With Microsoft Email Security (Hes) A Trend Micro Integration Guide I August 2015 Hosted Email Security Integration with Microsoft Office 365» This document highlights the benefits of Hosted Email Security (HES) for Microsoft Office 365

More information

Wireless solutions for electro-mobility fleets

Wireless solutions for electro-mobility fleets Wireless solutions for electro-mobility fleets SMASH Smart Sharing Alessandro Cantore CEO Greenspider gmbh www.greenspider.eu Electro-mobility is entering a booming phase; millions of electric Vehicles

More information

Development of Automatic shooting and telemetry system for UAV photogrammetry INTRODUCTION

Development of Automatic shooting and telemetry system for UAV photogrammetry INTRODUCTION Development of Automatic shooting and telemetry system for UAV photogrammetry Jinwoo PARK 1, Minseok KIM 1, Khin Mar Yee 1, Chuluong CHOI 1 1 Department of Spatial Information Engineering, Pukyong National

More information

Positioning (DiNO) DISTRIBUTION A. Approved for public release; distribution is unlimited

Positioning (DiNO) DISTRIBUTION A. Approved for public release; distribution is unlimited Distributed Network Opportunistic Positioning (DiNO) 2012 Joint Navigation Conference Session B7: Collaborative Navigation Techniques Dr. Alison K. Brown, Cayle Stickler, and Jarrett Redd NAVSYS Corporation

More information

Topics in Network Security

Topics in Network Security Topics in Network Security Jem Berkes MASc. ECE, University of Waterloo B.Sc. ECE, University of Manitoba www.berkes.ca February, 2009 Ver. 2 In this presentation Wi-Fi security (802.11) Protecting insecure

More information

Networking: Certified Wireless Network Administrator Wi Fi Engineering CWNA

Networking: Certified Wireless Network Administrator Wi Fi Engineering CWNA coursemonster.com/uk Networking: Certified Wireless Network Administrator Wi Fi Engineering CWNA View training dates» Overview This new market-leading course from us delivers the best in Wireless LAN training,

More information

Date Reference Edition Page 04.08.2006 EXT_MVW_0002_01_PS 02 1/67

Date Reference Edition Page 04.08.2006 EXT_MVW_0002_01_PS 02 1/67 04.08.2006 EXT_MVW_0002_01_PS 02 1/67 Management Summary Within the project Cost Monitor the Ministry of Transport, Public Works and Water Management tasked mm-lab with the provision of cost information

More information

Development and Implementation of a Peer-to-Peer Kalman Filter for Pedestrian and Indoor Navigation

Development and Implementation of a Peer-to-Peer Kalman Filter for Pedestrian and Indoor Navigation Development and Implementation of a Peer-to-Peer Kalman Filter for Pedestrian and Indoor Navigation Doktorarbeit Institut für Raumfahrttechnik und Weltraumnutzung Isabelle Krämer Development and Implementation

More information

GPS Vehicle Tracker (GPS+GSM+GPRS) User Manual For GT02 (Version 1.2)

GPS Vehicle Tracker (GPS+GSM+GPRS) User Manual For GT02 (Version 1.2) GPS Vehicle Tracker (GPS+GSM+GPRS) User Manual For GT02 (Version 1.2) UVI Group Corporation 11C, HaiYue Building, HuiJing Garden, Nanshan Technology Park, Shenzhen, China Tel: +86-755-83315079 Mobile:

More information

Networks. The two main network types are: Peer networks

Networks. The two main network types are: Peer networks Networks Networking is all about sharing information and resources. Computers connected to a network can avail of many facilities not available to standalone computers: Share a printer or a plotter among

More information

An In-vehicle ecall Platform for Efficient Road Safety

An In-vehicle ecall Platform for Efficient Road Safety An In-vehicle ecall Platform for Efficient Road Safety W. Ait-Cheik-Bihi, A. Chariette, M. Bakhouya, A. Nait-Sidi-Moh, J. Gaber, M. Wack Université de Technologie de Belfort-Montbéliard Rue Thierry Mieg,

More information