Ahmed Bichmou, Joseph Chiocca, Leonarndo Hernandez, R. Hoffmann, Brandon Horsham, H. Lam, Vince McKinsey, S. Bibyk
{"title":"Physical Cyber-Security of SCADA Systems","authors":"Ahmed Bichmou, Joseph Chiocca, Leonarndo Hernandez, R. Hoffmann, Brandon Horsham, H. Lam, Vince McKinsey, S. Bibyk","doi":"10.1109/NAECON46414.2019.9057860","DOIUrl":"https://doi.org/10.1109/NAECON46414.2019.9057860","url":null,"abstract":"This paper seeks to combine the concepts of power signal monitoring with previous research into static embedded system physical cyber-security. This combination presents a potential approach to securing the operation of Supervisory Control and Data Acquisition (SCADA) systems. With this approach, the concepts of trust metrics, derived from power signal data, are applied to ensure the security and consistent performance of the dynamic SCADA system control processes.","PeriodicalId":193529,"journal":{"name":"2019 IEEE National Aerospace and Electronics Conference (NAECON)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114243225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Authentication Circuit with Low Incorporation Barrier for COTs Manufacturers","authors":"Pallavi Ebenezer, Degang Chen, R. Geiger","doi":"10.1109/NAECON46414.2019.9057840","DOIUrl":"https://doi.org/10.1109/NAECON46414.2019.9057840","url":null,"abstract":"A simple PUF-based authentication circuit is proposed that will lower the entry barrier for counterfeit countermeasures by COTs manufacturers of integrated circuits. The on-chip fingerprint circuit does not require additional die area, I/O pins, or a separate read-out circuit. This approach to assuring integrity in the semiconductor supply chain will result in negative financial incentives for counterfeiters. An 80 bit authentication circuit which includes a 16 bit frame header has been designed in a UMC 65nm process with an area estimate of 0.01 mm2.","PeriodicalId":193529,"journal":{"name":"2019 IEEE National Aerospace and Electronics Conference (NAECON)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123707234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analytical Science for Autonomy Evaluation","authors":"E. Blasch, B. Pokines","doi":"10.1109/NAECON46414.2019.9057992","DOIUrl":"https://doi.org/10.1109/NAECON46414.2019.9057992","url":null,"abstract":"Current directions in autonomous systems focus on collecting large amounts of data to verify, validate, test, and evaluate system operations. For multidomain and uncertain scenarios, data sampling may not be adequate to fully explore and represent the entire trade space for verification and validation (V&V). However, leveraging methods from test and evaluation (T&E), a hierarchy of analytics can be developed so as to narrow the trade space, while the opportunity cost of the remaining space is a risk-mitigated deployment strategy. Issues in V&V/T&E employ statistics, but could benefit from theoretical analytics, such as the ability to augment data for testing using simulated models or define tests to minimize operational risk. The use of modeling is not new; however, as analytics of artificial intelligence and machine learning (AI/ML) are designed to exploit data; then these methods are independent of the data developed from the first-principles physics models. The paper highlights the need for methods of analytical science for autonomy evaluation and presents three examples in structural, situation, and cyber awareness.","PeriodicalId":193529,"journal":{"name":"2019 IEEE National Aerospace and Electronics Conference (NAECON)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126707442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Probabilistic Decision Engine for Navigation of Autonomous Vehicles under Uncertainty","authors":"Zhenhua Jiang, Seyed Ata Raziei","doi":"10.1109/NAECON46414.2019.9058291","DOIUrl":"https://doi.org/10.1109/NAECON46414.2019.9058291","url":null,"abstract":"Navigation or route planning under uncertainty is a very challenging but important task for autonomous vehicles such as self-driving cars, drones, unmanned aerial systems (UAS), etc. Probabilistic methods to the modeling and optimization of these systems are attractive in quantitatively capturing the uncertainty present in their dynamic environment. This paper will present a novel probabilistic decision engine that can serve as the core for the navigation of autonomous vehicles under uncertain conditions. This probabilistic decision engine takes in a network connection matrix (based on maps and graph theory) and a cost matrix (with entries of the cost’s mean values and probability distributions) as its input and generates the probability distributions of the optimal routes as its output. The proposed probabilistic decision engine consists primarily of a stochastic network standardization module, a stochastic network decomposition module and a probabilistic solver (i.e., decision kernel). A deterministic network reduction method based upon Dijkstra’s algorithm is first used to derive a standard, reduced network, augmented by a stochastic network reduction process. The standard network is then decomposed into a series of stochastic subnetworks by using sequential convolution, PDF (probability distribution function) shifting and reshaping techniques. A purely-analytical probabilistic solver is finally used to solve the stochastic decision-making problem. In this paper, the principle of operation and implementation methods of the entire probabilistic decision engine will be discussed in detail. Some representative simulation results will be provided to demonstrate the effectiveness of the proposed computational methodology and compared with the traditional Monte-Carlo simulation method to validate the analytical results. This study suggests that the time needed to find the solution using the proposed decision engine can be reduced by three to four orders of magnitude, compared with the Monte-Carlo simulation method.","PeriodicalId":193529,"journal":{"name":"2019 IEEE National Aerospace and Electronics Conference (NAECON)","volume":"176 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116215019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Emmert, Anvesh Perumalla, Scott Fischer, Barry Vincent
{"title":"NSF CHEST IUCRC: Case Study for Leveraging NSF IUCRCs for R&D","authors":"J. Emmert, Anvesh Perumalla, Scott Fischer, Barry Vincent","doi":"10.1109/NAECON46414.2019.9058288","DOIUrl":"https://doi.org/10.1109/NAECON46414.2019.9058288","url":null,"abstract":"Besides a 10% overhead rate for university research, there are many other advantages for industry and DoD sponsors of National Science Foundation (NSF) Industry University Cooperative Research Centers (IUCRCs). This paper not only enumerates existing advantages, but it also proposes an improved, business friendly paradigm for standing up IUCRCs that provides additional benefits to both industry, DoD, and university members. The NSF Hardware and Embedded Systems Security and Trust (CHEST) IUCRC is presented and used as an example to demonstrate how the process has worked.","PeriodicalId":193529,"journal":{"name":"2019 IEEE National Aerospace and Electronics Conference (NAECON)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116345223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Blockchain Technology Approach for the Security and Trust of the IC Supply Chain","authors":"Akshay Kulkarni, Noor Ahmad Hazari, M. Niamat","doi":"10.1109/NAECON46414.2019.9058027","DOIUrl":"https://doi.org/10.1109/NAECON46414.2019.9058027","url":null,"abstract":"In trying to lower the costs of integrated circuit (IC) fabrication, the IC supply chain is becoming global. However, if the foundry or the supply chain, to which the fabrication process is outsourced, is not reliable or trustworthy, it may result in the quality of ICs being compromised. There have been well documented instances of counterfeit chips, and chips secretly implanted with Trojans, creeping into the supply chain. With the above background in mind, we propose to strengthen the supply chain process by attempting to use a very secure technique which has been widely used in many other fields, namely, the blockchain technology. Blockchain, first introduced for the security and mining of bitcoins, is one of the most trusted security techniques in today’s world. In this paper, we propose a blockchain technology enabled ‘smart contract’ approach for ensuring the security and trust of these ICs by tracking down the stage of alteration at which the chip may have been compromised in the IC supply chain.","PeriodicalId":193529,"journal":{"name":"2019 IEEE National Aerospace and Electronics Conference (NAECON)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114843501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Compact Onboard Battery Self-Heater for All-Electric Aircraft Applications at Cold Climates","authors":"Chong Zhu, Hua Zhang, F. Lu","doi":"10.1109/NAECON46414.2019.9058034","DOIUrl":"https://doi.org/10.1109/NAECON46414.2019.9058034","url":null,"abstract":"The concept of all-electric aircraft (AEA) is fascinating due to its zero emissions and lower operation cost. As the primary power source of AEAs, the lithium-ion batteries suffer severe capacity and power degradation at subzero temperatures, leading to serious \"range anxiety\" in winter. Therefore, the onboard battery preheating equipment is essential for AEAs at cold climates. In this digest, an interleaved resonant onboard battery self-heater is developed for internally preheating the batteries without external power supplies, thereby providing great flexibility for AEAs at different apron areas. By properly adjusting the switching frequency, the self-heater can achieve the zero-current-switching (ZCS) to improve the energy consumption and eliminate the voltage spikes during the turn-off. Meanwhile, a detailed guideline for optimizing the resonant tank parameters is presented so that the efficiency of the self-heater can be further developed by reducing the circulating current. The experimental validation on 18650 cells demonstrates the proposed heater can preheat the battery from -20°C to 0°C within only 3.5 minutes, and only consume 5% of the cell energy.","PeriodicalId":193529,"journal":{"name":"2019 IEEE National Aerospace and Electronics Conference (NAECON)","volume":"2021 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128516768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"High Performance Gnrfet Based Serializer","authors":"Avinash Yadav, Mounica Patnala, M. Rizkalla","doi":"10.1109/NAECON46414.2019.9057943","DOIUrl":"https://doi.org/10.1109/NAECON46414.2019.9057943","url":null,"abstract":"ULSI technology is characterized by high speed and low power devices with nano scale features. Scaling down the silicon devices has come to an end due to its physical limitations with ballistic effects. For high speed data transmission, conversion of object codes into serial data, will require high speed serialized devices. GNRFET with channel length of nearly 10nm is used in this study to implement 2:1 serializer. A negative edge triggered D-flipflops and transmission gate 2:1 multiplexer were used in the design. ADS (Advanced Design System) tools were used with 0.7V power for biasing the devices. The data obtained in this work was compared with standard CMOS serializer for addressing the features of these nano scale technology for this application. The power consumption of the serializer was found to be 0.4mW.","PeriodicalId":193529,"journal":{"name":"2019 IEEE National Aerospace and Electronics Conference (NAECON)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128779589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Fakoorian, Reza Izanloo, Azin Shamshirgaran, D. Simon
{"title":"Maximum Correntropy Criterion Kalman Filter with Adaptive Kernel Size","authors":"S. Fakoorian, Reza Izanloo, Azin Shamshirgaran, D. Simon","doi":"10.1109/NAECON46414.2019.9057886","DOIUrl":"https://doi.org/10.1109/NAECON46414.2019.9057886","url":null,"abstract":"Kernel size plays a significant role in the performance of the maximum correntropy Kalman filter (MCC-KF). Kernel size is usually chosen by trail and error. If the kernel size is large, the MCC-KF reduces to the Kalman filter (KF). However, if the kernel size is small, the MCC-KF may diverge, or converge slowly. We propose a novel method for adaptive kernel size selection. We calculate kernel size as a weighted sum of the innovation term and the covariance of the filter-indicated estimation error at each time step. We call this filter the \"MCC with adaptive kernel size filter\" (MCC-AKF). We analytically prove that the true mean square error (TMSE) of the MCC-AKF is less than or equal to that of the MCC-KF under certain conditions. A simulation example is provided to illustrate the analytical results.","PeriodicalId":193529,"journal":{"name":"2019 IEEE National Aerospace and Electronics Conference (NAECON)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121863447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Aggregate Channel Features Based on Local Phase, Color, Texture, and Gradient Features for People Localization","authors":"Hussin K. Ragb, Redha Ali, V. Asari","doi":"10.1109/NAECON46414.2019.9057942","DOIUrl":"https://doi.org/10.1109/NAECON46414.2019.9057942","url":null,"abstract":"Detection of human beings in a complex background environment is a great challenge in computer vision. For such a difficult task, most of the time no single feature algorithm is rich enough to capture all the relevant information available in the image. To improve the detection accuracy, we propose a new descriptor that is constructed from the channels of image gradients, texture features, local phase information, and color features. This information is fused together to build one descriptor named Channels of Chromatic domain, local Phase with Gradient and Texture features (CCPGT). The image gradients, and local phase information based on the phase congruency concept are used to extract the human body shape features. Local binary pattern approach (LBP) is used to capture the texture features, and additional significant information for human detection are added by the color channels. The phase congruency magnitude and orientation of each pixel in the input image is computed with respect to its neighborhood and then six channels representing the histogram of oriented phase are generated. Gradient magnitude channel, LBP channel, and three LUV color channels are also computed for the input image. A maximum pooling of the candidate features is applied for these generated channels. All these features are concatenated in one feature vector and fed to a decision tree Adaboost classifier for training and to classify between the different objects classes. Several experiments were conducted to evaluate the proposed approach using challenging INRIA dataset, and a promising performance is observed.","PeriodicalId":193529,"journal":{"name":"2019 IEEE National Aerospace and Electronics Conference (NAECON)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122708242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}