ASI Agenzia Spaziale Italiana Galileo Workshop Roma 26/07/2012. Alessandro Pozzobon, Project Manager & Co-founder Qascom
|
|
- Primrose Merritt
- 8 years ago
- Views:
Transcription
1 ASI Agenzia Spaziale Italiana Galileo Workshop Roma 26/07/2012 Alessandro Pozzobon, Project Manager & Co-founder Qascom
2 Who is Qascom Quality And Secure COMmunications Bassano del Grappa Focused on: Security of Satellite Navigation Systems Authentication of civil GNSS at signal and receiver level against Signal simulation Intentional interference
3 FP7-Galileo 3 projects as coordinator: TIGER Trusted Innovative GNSS receiver PUMA Precise and secure automotive tracking STON Security Technologies based on location
4 TIGER
5 Mission To develop a trusted GNSS receiver & To enhance security of IT infrastructures with trusted location and time policies
6 Technology and Product Trusted GNSS Receiver Access Control Token Information Security Applications: Access Control for banking Access Control for Enterprise Secure Timestamp Implementation Trusted GNSS Receiver Trusted GNSS Receiver GPS/GSM/ SAT Tracking Road & Marine: Road Tolls Attestation Road Tolls Access control PAYG Attestation Vessels border control Secure HazMat Tracking Future Market Opportunities Trusted GNSS Receiver GNSS Data Logger Security Applications: Covert operations Attestation Law enforcement border control Future Market Opportunities All other applications that demand trusted location 6
7 Tiger Technology Uses civilian GNSS signals GNSS security issues addressed by Tiger: Spoofing Falsification of position Detection of in-band interference Large errors in the navigation solution PVT and signal authentication attestation - PKI Supports SHA-1, SHA-256, RSA 2048 Suitable for the niche of needing high security no mass market
8 Protection from physical attacks Red / Black zone separation Tamper Resistant Coating (TRC) Tamper Detection Mesh Security Supervisor GNSS Security Processing GORE Secure Encapsulated Module RF Tamper detection Mesh Epoxy glue Metal Shielding UART Interface SEC micro SUP Connectors GNSS Inner layers UFL Connector GNSS acquisition,tracking and navigation processing TIGER tamper mesh concept 8
9 Tiger Embodiment TIGER is the first worldwide USB security token with trusted location based functionalities
10 Features Location based authentication and access control Network and VPN access, web access, etc. only from trusted zones Geo-encryption Files, documents, folders, s Attestation On top of standard strong authentication
11 How 1. Trusted token with certified position 2. Location constrains 11 * For geo-encryption: third party or proprietory E-DRM or DLP solutions
12 Geo-encryption process
13 PUMA
14 Mission Authenticate the GNSS Signal in the Road User Charging Domain
15 Scenario GNSS Egnos GNSS Jammer Tunnels Tracking Server Urban canyons Spoofer Precise and Secure Tracking
16 GNSS open challenges Availability RFI Radio Frequency interference Jamming Urban canyon and dense foliage Indoor Integrity Urban canyon and dense foliage Indoor Obstacles Geometry Authentication Spoofing Physical tampering Photo: Rene Schwietzke
17 The concept GNSS Spoofed signal S1 S2 DR s path S0 S3 GNSS s path S-1
18 Advances Attained through Development of PUMA Minimization of obstacles to the introduction of road toll applications, without the need of expensive infrastructure Detection of GNSS jamming, spoofing Navigation Aiding and GNSS Spoofing Detection using Dead-reckoning Interfacing of In-Vehicle Sensors for Dead- Reckoning via automotive interface
19 The demonstrator The project has received funding from European Community s framework programme ([FP7/ ][FP7/ ]) under grant agreement n
20 Spoofing Detection and performance DR Performance: Distance: 23 km Error: 3,16 km Error rate: 18% Green: GPS/theoretical path Blu: Dead Rekoning with PUMA Red point: Start spoofing Start Path
21 Future improvements Map matching Gyroscope Use of additional sensors available in the CAN Initialization of wheel tick Signal of opportunities
22 STON
23 Mission Server side signal authentication & To offer a security layer to authenticate users based on their position
24 The concept Low cost security token (HW or SW) Location anywhere Mass market - SME Medium IT security always connected Focus on IT Authentication -Server side to reduce costs STON token Or REQUEST LOGIN Web service Smartphone/device with STON acquisition layer User requiring access to information Is it a trusted location? Is there any inconsistency? Are the user and the token in the same position?
25 Progress beyond the state of the art Innovation in signal acquisition method RF front end with crypto integrity of sampled data Indoor mitigation (GSM, WiFi, IP) Security architecture Centralized security Signal authentication With front end and signal sample Using Galileo Commercial Service Providing strong authentication in different domains (IT security, road toll)
26 Conclusion R&D GNSS signal processing and security, signal authentication e secure GNSS receiver Know how in: Software / Telecommunication Engineering GNSS Security Target all the markets that rely on a secure PVT
27 Thanks Alessandro Pozzobon Qascom S.r.l. ph
Galileo Ready Advanced Mass Market Receiver (GRAMMAR) Project Workshop Outline
DLR ACO TUT 2011 Project Overview ICL-GNSS, Tampere, Finland, June 29-30 2011 Page 1 30.06.2010 Galileo Ready Advanced Mass Market Receiver (GRAMMAR) Project Workshop Outline» Part I (9:45-11:00)» Overview
More informationSecure Tracking using Trusted GNSS Receivers and Galileo Authentication Services
Journal of Global Positioning Systems (2004) Vol. 3, No. 1-2: 200-207 Secure Tracking using Trusted GNSS Receivers and Galileo Authentication Services Oscar Pozzobon 1, Chris Wullems 1, Kurt Kubik 2 1
More informationSecure Navigation and Authentication. Sherman Lo November 2008
Secure Navigation and Authentication Sherman Lo November 2008 1 Outline Motivating Authentication Proposed techniques for authentication Source authentication Cross checking My research 2 GNSS: Position,
More informationTechnologies for PRS Receivers
Seventh Framework Programme of the European Community for Research, Technological Development and Demonstration Activities (2007 to 2013) 'Cooperation' Specific Programme Theme: Transport (including Aeronautics)
More informationsiemens.com/tolling Back-office system Sitraffic Sensus Server Supplies all front-end data. Suitable for any GNSS tolling back-office.
siemens.com/tolling Back-office system Server Supplies all front-end data. Suitable for any GNSS tolling back-office. Server: The universal back-office for efficient and effective toll collection Server
More informationGNSS Anti-Jam Technology for the Mass Market
GNSS Anti-Jam Technology for the Mass Market Michael Jones, Senior Consultant Engineer, GNSS Protection Roke Manor Research Ltd Communications Sensors Information Systems Contract R&D Consultancy Specialist
More informationCompany Presentation and Main Activities
S.r.l. Page 1 Company Presentation and Main Activities Via fiume 23, 57123, Livorno - Italy Prof. Marco Luise Dr. Ing. Marco Della Maggiora Company Profile Page 2 Digital Craftmanship www.wiser.it Page
More informationEuropean best practices in safe transport of dangerous material supported by GNSS
2 nd GNSS Vulnerabilities and Solutions 2009 Conference, Baska, Croatia European best practices in safe transport of dangerous material supported by GNSS Gianmarco Baldini IPSC - JRC EC Antonella Di Fazio
More informationIMES (Indoor Messaging System) A Proposal for New Indoor Positioning System Presenter: Dr. Dinesh Manandhar GNSS Technologies Inc., Japan Third Meeting of the International Committee on Global Navigation
More informationSecure and Reliable Wireless Communications for Geological Repositories and Nuclear Facilities
Session S14: Safeguards Needs at Geological Repositories and Encapsulation Facilities Secure and Reliable Wireless Communications for Geological Repositories and Nuclear Facilities Richard E. Twogood Dirac
More informationGPS Forensics Crime, Jamming & Spoofing. Professor David Last
GPS Forensics Crime, Jamming & Spoofing Professor David Last Consultant Engineer & Expert Witness jdl@navaid.demon.co.uk ABSTRACT. The most widely used of all GPS devices currently are car satellite navigators.
More informationHEOL-N103-OBD, GPS/GPRS Tracking Module with On Board Diagnostic
HEOL-N103-OBD, GPS/GPRS Tracking Module with On Board Diagnostic Heol fleet tracking system GPS N103 -OBD GPRS FTS Software Internet Main office - Control room Other office The specifications in this document
More informationSecure Navigation and Timing Without Local Storage of Secret Keys
Ph.D. Defense The University of Texas at Austin 9 April 2014 Secure Navigation and Timing Without Local Storage of Secret Keys Kyle D. Wesson Committee Dr. Todd E. Humphreys (supervisor) Dr. Brian L. Evans
More informationGNSS integrity monitoring for the detection and mitigation of interference
GNSS integrity monitoring for the detection and mitigation of interference Dr. Shaojun Feng Centre for Transport Studies Outline GNSS vulnerability GNSS integrity monitoring Cases study GAARDIAN ERAIM
More informationGPS Jamming Threat Scenarios CGSIC 2013 Nashville. Prof. Charles Curry BEng, CEng, FIET Managing Director Chronos Technology Ltd
GPS Jamming Threat Scenarios CGSIC 2013 Nashville Prof. Charles Curry BEng, CEng, FIET Managing Director Chronos Technology Ltd Presentation Contents Background How we detect Who is doing it Threat scenarios
More informationLocation Identification and Vehicle Tracking using VANET(VETRAC)
Location Identification and Vehicle Tracking using VANET(VETRAC) Supervisor Name: Md. Mosaddik Hasan Assistant Professor Dept. of CSE MBSTU Md. Al-Amin Nipu CE-10031 Dept. of CSE MBSTU Abstract: Large
More informationEuropean GNSS Applications in Horizon 2020
European GNSS Applications in Horizon 2020 Official International Space Information Day 2015, Brussels 10 November 2015 Marta Krywanis-Brzostowska European GNSS Agency Integrated approach: understanding
More informationiphone in Business Security Overview
iphone in Business Security Overview iphone can securely access corporate services and protect data on the device. It provides strong encryption for data in transmission, proven authentication methods
More informationASPHALT. Advance Galileo Navigation System for Asphalt s Fleet Machines. Galileo Application Days www.application-days.eu 3-5 March 2010, Brussels
ASPHALT Advance Galileo Navigation System for Asphalt s Fleet Machines Galileo Application Days www.application-days.eu 3-5 March 2010, Brussels Content ASPHALT Team Road Construction Key Data Project
More informationESNC Kick-off 2015 David Argiles david.argiles@val-space.com 1
ESNC Kick-off 2015 David Argiles david.argiles@val-space.com 1 as of 2014 ESNC COMPETITION The European Satellite Navigation Competition is an international contest that annually awards the best services,
More informationImproving Quality of GNSS Vehicle Localization
Improving Quality of GNSS Vehicle Localization Roman Srp ITS&S FP7 Easy OBU project Telematika, Legislativa, Strategie, 11.4.2014, Praha Contents EasyOBU Research in a Nutshell Signal Loss in GNSS Applications
More informationVEHICLE TRACKING SYSTEM USING GPS. 1 Student, ME (IT) Pursuing, SCOE, Vadgaon, Pune. 2 Asst. Professor, SCOE, Vadgaon, Pune
VEHICLE TRACKING SYSTEM USING GPS Pooja P. Dehankar 1, 1 Student, ME (IT) Pursuing, SCOE, Vadgaon, Pune Prof. S. P. Potdar 2 2 Asst. Professor, SCOE, Vadgaon, Pune Abstract- Global Positioning System is
More informationPerfect M2M & Telematic solutions for your perfect data flow. Construction & Agriculture. Remote Control & Maintenance. Electronic Toll Collection
Automotive Telematics Construction & Agriculture Track & Trace Remote Control & Maintenance Electronic Toll Collection Smart Metering Perfect M2M & Telematic solutions for your perfect data flow. EN A
More informationPresentation Outline. The NavSAS group; Examples of Software-Radio Technology in GNSS;
Telemobility 2008 Progetto Galileo ed altri GNSS Development of GPS-Galileo Galileo Software Radio Receivers Marco Pini - NavSAS group Presentation Outline The NavSAS group; Basic on Software-Radio Technology;
More informationRelease Notes. NCP Secure Entry Mac Client. Major Release 2.01 Build 47 May 2011. 1. New Features and Enhancements. Tip of the Day
NCP Secure Entry Mac Client Major Release 2.01 Build 47 May 2011 1. New Features and Enhancements Tip of the Day A Tip of the Day field for configuration tips and application examples is incorporated in
More informationRemote Area Tracking and Mapping
Remote Area Tracking and Mapping TM3000 with Iridium Satellite Back up Communications Step Global has developed a solution to remote area GPS tracking by interfacing the Trimble TM3000 Asset Tracking Device
More informationGNSS Scenario. By Dr Ashok Kaushal. GNSS scenario in India in India. 05/08/2007 Slide No.: 1
GNSS Scenario in India By Dr Ashok Kaushal ASL 1 Advanced Systems Pvt. Aerospace Ltd., Systems Bangalore Pvt. Ltd. Slide No.: 1 Content Introduction Significance of Location Trends G 3 perspective Location
More informationRelease Notes. NCP Secure Entry Mac Client. 1. New Features and Enhancements. 2. Improvements / Problems Resolved. 3. Known Issues
NCP Secure Entry Mac Client Service Release 2.05 Build 14711 December 2013 Prerequisites Apple OS X Operating System: The following Apple OS X operating system versions are supported with this release:
More informationChapter 12 Homework CIT 105 - J001/02/04/06. Name: Date: Course: Test:
1. Which of the following is an advantage of installing a client/server network in a business? a. decentralization of peripherals b. centralization of network security protection c. decentralization of
More informationThis is the author s version of a work that was submitted/accepted for publication in the following source:
This is the author s version of a work that was submitted/accepted for publication in the following source: Wullems, Christian, Pozzobon, Oscar, & Kubik, Kurt (2006) Secure tracking for critical applications
More informationSecurity risk analysis approach for on-board vehicle networks
1 Security risk analysis approach for on-board vehicle networks Alastair Ruddle Consultant, MIRA Limited Motivation 2 o o Future vehicles will become mobile nodes in a dynamic transport network vehicle
More informationApogee Series. > > Motion Compensation and Data Georeferencing. > > Smooth Workflow. Mobile Mapping. > > Precise Trajectory and Direct Georeferencing
Ultimate accuracy MEMS Apogee Series Inertial Navigation System Motion Sensing and Georeferencing > INS > MRU > AHRS ITAR free 0,005 RMS Apogee Series High quality, high accuracy Hydrography > > Motion
More informationipad in Business Security
ipad in Business Security Device protection Strong passcodes Passcode expiration Passcode reuse history Maximum failed attempts Over-the-air passcode enforcement Progressive passcode timeout Data security
More informationGPS Jamming Quantifying the Threat
GPS Jamming Quantifying the Threat WSTS April 16-18 th, 2013 Prof. Charles Curry BEng, CEng, FIET Managing Director Chronos Technology Ltd San Jose Presentation Contents Background What, Who and Why? Latest
More informationSecure Vehicle Communications: Results and Challenges Ahead. Galileo, EGNOS and Security
Secure Vehicle Communications: Results and Challenges Ahead Galileo, EGNOS and Security Neil Warfield Export Control and International Security Matters Specialist GNSS Supervisory Authority Neil.Warfield@gsa.europa.eu
More informationWhite Paper Assured PNT Inside Military Ground Vehicles Using D3
White Paper Assured PNT Inside Military Ground Vehicles Using D3 Brian Paul December 2013 Introduction Global Positioning System (GPS) technology has become an integral part of Mission Command systems
More informationMicrowave Photonic Systems Inc. Joshua L. Korson & Richard J. Stewart
Fiber Optic Communications Equipment Provides Backhaul Infrastructure for Critical Satellite Based Continuity of Communications Solutions: IRIDUIM, INMARSAT, GEO SATCOM Microwave Photonic Systems Inc.
More informationINFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG ITMC TECH TIP ROB COONCE, MARCH 2008
INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG What is wireless technology? ITMC TECH TIP ROB COONCE, MARCH 2008 In our world today, this may mean sitting down at a coffee
More informationABB solar inverters. ABB solar inverters Application note Improving CDD wireless reception
ABB solar inverters ABB solar inverters Application note Improving wireless reception Reader note This document is to be used in conjunction with the MICRO- 0.25-0.3-0.3HV-I product manual or Quick Installation
More informationPNT Evolution: Future Benefits and Policy Issues. Scott Pace Director, Space Policy Institute George Washington University Washington, D.C.
PNT Evolution: Future Benefits and Policy Issues Scott Pace Director, Space Policy Institute George Washington University Washington, D.C. 5 November 2009 GPS is a Critical Component of the Global Information
More informationThe benefits of satellite telecom systems for civil protection
The benefits of satellite telecom systems for civil protection Pascale SOURISSE President 15-17 avenue de Ségur 75007 Paris, France www.eurospace.org T+33-1-44420070 F+33-1-44420079 1 The benefits of satellite
More informationMobile Access Controller
Solution overview Mobile Access Controller Mobile Workforce Communication Solution NEC Australia nec.com.au Reliable voice and data coverage for field workers. Overview Designed specifically for vehicle
More informationGPS Based Low Cost Intelligent Vehicle Tracking System (IVTS)
2012 International Conference on Traffic and Transportation Engineering (ICTTE 2012) IPCSIT vol. 26 (2012) (2012) IACSIT Press, Singapore GPS Based Low Cost Intelligent Vehicle Tracking System (IVTS) Dr.
More informationDeploying iphone and ipad Security Overview
Deploying iphone and ipad Security Overview ios, the operating system at the core of iphone and ipad, is built upon layers of security. This enables iphone and ipad to securely access corporate services
More informationSEC100 Secure Authentication and Data Transfer with SAP Single Sign-On. Public
SEC100 Secure Authentication and Data Transfer with SAP Single Sign-On Public Speakers Las Vegas, Oct 19-23 Christian Cohrs, Area Product Owner Barcelona, Nov 10-12 Regine Schimmer, Product Management
More informationIPsec VPN Security between Aruba Remote Access Points and Mobility Controllers
IPsec VPN Security between Aruba Remote Access Points and Mobility Controllers Application Note Revision 1.0 10 February 2011 Copyright 2011. Aruba Networks, Inc. All rights reserved. IPsec VPN Security
More informationHow To Create A Virtual Network With A Router And Network Operating System (Ip) For A Network (Ipv) (Ip V2) (Netv) And A Virtualization) (Network) (Wired) (Virtual) (Wire)
Post-IP technologies virtualization and security Guy Pujolle 1 Virtualization for a post-ip network 2 Geni Intel would like to propose a generic router Intel proposes to have a generic hardware with virtual
More informationEGNOS: an emerging technology to support urban transport. POLIS Bruxelles November 2011
EGNOS: an emerging technology to support urban transport POLIS Bruxelles November 2011 21 October 2011 : GALILEO becomes a reality What is EGNOS? 6 Navigation Land Earth Stations 34 Ranging & Integrity
More informationHybrid positioning and CellLocate TM
Hybrid positioning and CellLocate TM Increased reliability and indoor positioning based on mobile network attributes Dr. Chris Marshall, Visionary Program Manager, u-blox Carl Fenger, Communications Manager,
More informationRelease Notes. NCP Secure Client Juniper Edition. 1. New Features and Enhancements. 2. Problems Resolved
NCP Secure Client Juniper Edition Service Release: 9.30 Build 102 Date: February 2012 1. New Features and Enhancements The following describe the new features introduced in this release: Visual Feedback
More informationIDD-213T User Manual. (Rev. 1.0) China Aerospace Telecommunications Limited
(Rev. 1.0) China Aerospace Telecommunications Limited Contents 1. Introduction......3 2. Specifications...4 2.1 External Interface... 4 2.2 Status Indicator...... 5 2.3 Technical Parameters... 6 3. Device
More informationSNRS. Securing Networks with Cisco Routers and Switches. Length 5 days. Format Lecture/lab
Length 5 days Format Lecture/lab Version 3.0 SNRS Course Description SNRS 1.0 is a 5-day, lab-intensive course that provides the knowledge and skills needed to secure Cisco IOS router and switch networks.
More informationiphone in Business How-To Setup Guide for Users
iphone in Business How-To Setup Guide for Users iphone 3G is ready for business. It supports Microsoft Exchange ActiveSync, delivering push email, calendars, and contacts. And it gives mobile users secure
More informationVehicle tracking/remote
Secure tracking for critical applications Application by Chris Wullems, Oscar Pozzobon, Qascom, and Kurt Kubik, University of Queensland From the safety of workers to the protection of assets and the transportation
More informationEasily Connect, Control, Manage, and Monitor All of Your Devices with Nivis Cloud NOC
Easily Connect, Control, Manage, and Monitor All of Your Devices with Nivis Cloud NOC As wireless standards develop and IPv6 gains widespread adoption, more and more developers are creating smart devices
More information3. Designed for installation by the user without further substantial support by the supplier; and
Commerce Control List Supplement No. 1 to Part 774 Category 5 - Info. Security page 1 CATEGORY 5 TELECOMMUNICATIONS AND INFORMATION SECURITY Part 2 INFORMATION SECURITY Note 1: The control status of information
More informationTracking Solutions for Fleet Management Systems
Tracking Solutions for Fleet Management Systems By Priya Shukla, Anand Kumar Swami, Neha Kochar and Filippo Colaianni STMicroelectronics Design and development of commercial GPS receivers has gained tremendous
More informationVehicular On-board Security: EVITA Project
C2C-CC Security Workshop 5 November 2009 VW, MobileLifeCampus Wolfsburg Hervé Seudié Corporate Sector Research and Advance Engineering Robert Bosch GmbH Outline 1. Project Scope and Objectives 2. Security
More informationSecuring your future DEFENCE AND SECURITY
DEFENCE AND SECURITY Defence and security system developers Rapid evolution of technology poses both an opportunity and a threat for defence and security systems. Today s solutions need to adapt to an
More informationISG50 Application Note Version 1.0 June, 2011
ISG50 Application Note Version 1.0 June, 2011 Scenario 1 - ISG50 is placed behind an existing ZyWALL 1.1 Application Scenario For companies with existing network infrastructures and demanding VoIP requirements,
More informationLegislative Council Panel on Information Technology and Broadcasting. Information Note on the Development of Global Positioning System in Hong Kong
CB(1)1709/03-04(01) Legislative Council Panel on Information Technology and Broadcasting Information Note on the Development of Global Positioning System in Hong Kong PURPOSE At the meeting of the Panel
More informationGNSS MONITORING NETWORKS
SPACE GNSS MONITORING NETWORKS Satellite communications, earth observation, navigation and positioning and control stations indracompany.com GNSS MONITORING NETWORKS GNSS MONITORING NETWORKS Indra s solutions
More informationContents Chapter 1: Introduction... 3 Chapter 2: Ethernet (LAN)... 5 Chapter 3: ZigBee Wireless Connection Options... 7
Contents Chapter 1: Introduction... 3 Communication Types and Functionality... 3 Communication Connectors... 3 Communication Lightning Protection... 4 Chapter 2: Ethernet (LAN)... 5 Single/Multiple Devices,
More informationSetting Up the Cisco Unified IP Phone
CHAPTER 3 This chapter includes the following topics, which help you install the Cisco Unified IP Phone on an IP telephony network: Before You Begin, page 3-1 Understanding the Cisco Unified IP Phone 7962G
More informationGlobal Navigation Satellite Systems
White Paper Global Navigation Satellite Systems The Present and the Future For more information, please visit: 2012 IEIMobile Global Navigation Satellite System, or GNSS in short, is a generic term used
More informationRadio Technical Commission for Maritime Services. GPS Update. Bob Markle RTCM Arlington, VA USA. NMEA Convention & Expo 2010
Radio Technical Commission for Maritime Services GPS Update NMEA Convention & Expo 2010 Bob Markle RTCM Arlington, VA USA What is RTCM? International non-profit scientific, professional and membership
More informationMAXIMIZING YOUR DATA CENTER INFRASTRUCTURE: CENTRALIZED MANAGEMENT AND WIRE-FREE ENVIRONMENTAL MONITORING
MAXIMIZING YOUR DATA CENTER INFRASTRUCTURE: CENTRALIZED MANAGEMENT AND WIRE-FREE Chris C. Gaskins Vice President of Product Development RF Code, Inc. AUGUST 2010 Shawn Griggs Director of Product Management
More informationVidder PrecisionAccess
Vidder PrecisionAccess Security Architecture February 2016 910 E HAMILTON AVENUE. SUITE 410 CAMPBELL, CA 95008 P: 408.418.0440 F: 408.706.5590 WWW.VIDDER.COM Table of Contents I. Overview... 3 II. Components...
More informationIntroduction to Computer Networks and Data Communications
Introduction to Computer Networks and Data Communications Chapter 1 Learning Objectives After reading this chapter, you should be able to: Define the basic terminology of computer networks Recognize the
More informationCellular and 802.11 Networks Application and Data Usage
Cellular and 802.11 Networks Application and Data Usage Wireless connectivity has become a necessity for application usage and productivity workflows. Network connectivity changes as users move from indoors
More informationFederal Communications Commission Office of Engineering and Technology Laboratory Division
Federal Communications Commission Office of Engineering and Technology Laboratory Division August 14, 2014 GUIDANCE ON SOFTWARE OR NETWORK CONFIGURATION OF NON-SDR DEVICES TO ENSURE COMPLIANCE I. GENERAL
More informationInnovations in Digital Signature. Rethinking Digital Signatures
Innovations in Digital Signature Rethinking Digital Signatures Agenda 2 Rethinking the Digital Signature Benefits Implementation & cost issues A New Implementation Models Network-attached signature appliance
More informationSmart Transportation Pricing - Technical Architectures. Cisco Internet Business Solutions Group - December 2008
Smart Transportation Pricing - Technical Architectures Cisco Internet Business Solutions Group - December 2008 Smart Transportation Pricing - Applications Citizen Register and Update Vehicle profiles Personal
More informationUSER MANUAL V5.0 ST100
GPS Vehicle Tracker USER MANUAL V5.0 ST100 Updated on 15 September 2009-1 - Contents 1 Product Overview 3 2 For Your Safety 3 3 ST100 Parameters 3 4 Getting Started 4 4.1 Hardware and Accessories 4 4.2
More informationCisco IOS Firewall. Scenarios
Cisco IOS Firewall Common Deployment Scenarios http://www.cisco.com/go/iosfirewall com/go/iosfirewall Presentation_ID 2007 Cisco Systems, Inc. All rights reserved. 1 Cisco IOS Firewall Feature Overview
More informationUsing Application Layer Technology to Overcome the Impact of Satellite Circuit Latency on VPN Performance
Using Application Layer Technology to Overcome the Impact of Satellite Circuit Latency on VPN Performance Ground Control February 2003 Abstract This paper explains the source of severe throughput degradation
More informationBest Practices for Outdoor Wireless Security
Best Practices for Outdoor Wireless Security This paper describes security best practices for deploying an outdoor wireless LAN. This is standard body copy, style used is Body. Customers are encouraged
More informationEffective Methods to Detect Current Security Threats
terreactive AG. Swiss Cyber Storm 2015. Effective Methods to Detect Current Security Threats Taking your IT security to the next level, you have to consider a paradigm shift. In the past companies mostly
More informationModule 8. Network Security. Version 2 CSE IIT, Kharagpur
Module 8 Network Security Lesson 2 Secured Communication Specific Instructional Objectives On completion of this lesson, the student will be able to: State various services needed for secured communication
More informationThatcham Research The Insurers Automotive Research Centre
Thatcham Research The Insurers Automotive Research Centre 15 th October 2014 Mike Briggs- Vehicle Crime Research Manager Overview of Thatcham The Motor Insurance Research Centre Owned by the major UK Motor
More informationTelematics & Wireless M2M
www.lairdtech.com Telematics & Wireless M2M DEVICE PORTFOLIO About Laird Technologies Laird Technologies designs and manufactures customized, performance-critical products for wireless and other advanced
More informationapp coverage applied EXTRACT FROM THE ERICSSON MOBILITY REPORT
app applied EXTRACT FROM THE ERICSSON MOBILITY REPORT NOVEMBER 2013 App COVERAGE applied The use of smartphones and tablets has caused a surge in mobile data around the world. Today, users want reliable
More informationTracking Vehicles with GPS:
Zheng, Wang, and Nihan Page 1 Tracking Vehicles with GPS: Is it a Feasible Solution? Jianyang Zheng Box 352700 Department of Civil and Environmental Engineering University of Washington Seattle, WA 98195-2700
More informationThe European GNSS Programmes EGNOS and Galileo
The European GNSS Programmes EGNOS and Galileo 6th ICG Conference Pieter De Smet European Commission 5 September 2011 1. State of Play of EGNOS 2. State of Play of Galileo 5 September, 2011 The European
More informationmysensors mysensors Wireless Sensors and Ethernet Gateway Quick Start Guide Information to Users Inside the Box mysensors Ethernet Gateway Quick Start
mysensors Information to Users mysensors Wireless Sensors and Ethernet Gateway Quick Start Guide This equipment has been tested and found to comply with the limits for a Class B digital devices, pursuant
More informationPost Processing Service
Post Processing Service The delay of propagation of the signal due to the ionosphere is the main source of generation of positioning errors. This problem can be bypassed using a dual-frequency receivers
More informationGoldKey Product Info. Do not leave your Information Assets at risk Read On... Detailed Product Catalogue for GoldKey
GoldKey Product Info Detailed Product Catalogue for GoldKey Do not leave your Information Assets at risk Read On... GoldKey: Reinventing the Security Strategy The Changing Landscape of Data Security With
More informationA NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS
A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS Sumanta Saha, Md. Safiqul Islam, Md. Sakhawat Hossen School of Information and Communication Technology The Royal Institute of Technology (KTH) Stockholm,
More informationHow To Integrate Hosted Email Security With Office 365 And Microsoft Mail Flow Security With Microsoft Email Security (Hes)
A Trend Micro Integration Guide I August 2015 Hosted Email Security Integration with Microsoft Office 365» This document highlights the benefits of Hosted Email Security (HES) for Microsoft Office 365
More informationWireless solutions for electro-mobility fleets
Wireless solutions for electro-mobility fleets SMASH Smart Sharing Alessandro Cantore CEO Greenspider gmbh www.greenspider.eu Electro-mobility is entering a booming phase; millions of electric Vehicles
More informationDevelopment of Automatic shooting and telemetry system for UAV photogrammetry INTRODUCTION
Development of Automatic shooting and telemetry system for UAV photogrammetry Jinwoo PARK 1, Minseok KIM 1, Khin Mar Yee 1, Chuluong CHOI 1 1 Department of Spatial Information Engineering, Pukyong National
More informationPositioning (DiNO) DISTRIBUTION A. Approved for public release; distribution is unlimited
Distributed Network Opportunistic Positioning (DiNO) 2012 Joint Navigation Conference Session B7: Collaborative Navigation Techniques Dr. Alison K. Brown, Cayle Stickler, and Jarrett Redd NAVSYS Corporation
More informationTopics in Network Security
Topics in Network Security Jem Berkes MASc. ECE, University of Waterloo B.Sc. ECE, University of Manitoba www.berkes.ca February, 2009 Ver. 2 In this presentation Wi-Fi security (802.11) Protecting insecure
More informationNetworking: Certified Wireless Network Administrator Wi Fi Engineering CWNA
coursemonster.com/uk Networking: Certified Wireless Network Administrator Wi Fi Engineering CWNA View training dates» Overview This new market-leading course from us delivers the best in Wireless LAN training,
More informationDate Reference Edition Page 04.08.2006 EXT_MVW_0002_01_PS 02 1/67
04.08.2006 EXT_MVW_0002_01_PS 02 1/67 Management Summary Within the project Cost Monitor the Ministry of Transport, Public Works and Water Management tasked mm-lab with the provision of cost information
More informationDevelopment and Implementation of a Peer-to-Peer Kalman Filter for Pedestrian and Indoor Navigation
Development and Implementation of a Peer-to-Peer Kalman Filter for Pedestrian and Indoor Navigation Doktorarbeit Institut für Raumfahrttechnik und Weltraumnutzung Isabelle Krämer Development and Implementation
More informationGPS Vehicle Tracker (GPS+GSM+GPRS) User Manual For GT02 (Version 1.2)
GPS Vehicle Tracker (GPS+GSM+GPRS) User Manual For GT02 (Version 1.2) UVI Group Corporation 11C, HaiYue Building, HuiJing Garden, Nanshan Technology Park, Shenzhen, China Tel: +86-755-83315079 Mobile:
More informationNetworks. The two main network types are: Peer networks
Networks Networking is all about sharing information and resources. Computers connected to a network can avail of many facilities not available to standalone computers: Share a printer or a plotter among
More informationAn In-vehicle ecall Platform for Efficient Road Safety
An In-vehicle ecall Platform for Efficient Road Safety W. Ait-Cheik-Bihi, A. Chariette, M. Bakhouya, A. Nait-Sidi-Moh, J. Gaber, M. Wack Université de Technologie de Belfort-Montbéliard Rue Thierry Mieg,
More information