{"title":"Privacy and Security Concerns for the Internet of Things in the GDPR Era - A Survey","authors":"Laura Vegh","doi":"10.32754/JMT.2018.2.01","DOIUrl":"https://doi.org/10.32754/JMT.2018.2.01","url":null,"abstract":"Digital Object Identifier 10.32754/JMT.2018.2.01 5 Abstract—Over the past years the Internet of Things (IoT) has become a subject of utmost interest both in research and industry. Technology is now present in most areas of our lives. As a result, security and privacy have become increasingly important and the idea that they must be put first when designing new systems is accepted by more and more people. The high complexity of IoT systems makes it hard to find the perfect security solution and many wonder if this will not be what will eventually stop their evolution. This year saw the enforcement of one of the most discussed privacy regulations of the past decade – The European General Data Protection Regulation, in short, the GDPR. It is a law that aims to give back to the users the power over their personal data. Furthermore, countries worldwide are starting to understand the need for such regulations and are implementing new provisions. Many are concerned that with the known security issues of the IoT, these new laws will slow down the progress made in this area. This article presents a survey of the most important issues in security and privacy in IoT and looks at existing solutions that can be used in the current scenario.","PeriodicalId":315050,"journal":{"name":"Journal of Military Technology","volume":"224 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133204369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. Barothi, Academia Tehnică Militară, D. Sava, Cătălin-Dumitru Darie, L. Cucu, I. Copae, City Insurance Expert, Asirom Insurance
{"title":"Driving Style Influence on Vehicles Performances","authors":"L. Barothi, Academia Tehnică Militară, D. Sava, Cătălin-Dumitru Darie, L. Cucu, I. Copae, City Insurance Expert, Asirom Insurance","doi":"10.32754/jmt.2018.1.07","DOIUrl":"https://doi.org/10.32754/jmt.2018.1.07","url":null,"abstract":"Digital Object Identifier 10.32754/JMT.2018.1.07 39 1 Abstract—Vehicle dynamics and fuel saving performances are largely influenced by the driving style of the driver. This paper will give an account of this important aspect mentioned in specialty literature, defining some driving style assessment criteria and setting their values based on the experimental data obtained from the tests conducted on a Logan Laureate. The experimental data corresponds to 50 starting samples and 50 normal movement samples, the latter being called “nonstarting” in the paper.","PeriodicalId":315050,"journal":{"name":"Journal of Military Technology","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126234305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Nicolae, Academia Tehnică Militară, Stefania Nistor, P. Ciotirnae
{"title":"Hybrid MPLS - Internet VPN Networks","authors":"V. Nicolae, Academia Tehnică Militară, Stefania Nistor, P. Ciotirnae","doi":"10.32754/jmt.2018.1.05","DOIUrl":"https://doi.org/10.32754/jmt.2018.1.05","url":null,"abstract":"29 Abstract—Nowadays, the data network area offers a very wide range of data switching techniques according to user needs. The current paper is concerned with a new broadband solution, namely the use of an MPLS-Internet VPN hybrid network. Even though MPLS is the basic solution in most private transport networks, with the explosive growth of the Internet, it has begun to be an alternative solution for data transmission. The purpose of this study is to balance the advantages and disadvantages of implementing this solution by bringing arguments on both sides and, finally, to draw an objective conclusion as to its applicability.","PeriodicalId":315050,"journal":{"name":"Journal of Military Technology","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116930155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Constantin Grumazescu, Academia Tehnică Militară, V. Patriciu
{"title":"A Comprehensive Survey on ID-Based Cryptography for Wireless Sensor Networks","authors":"Constantin Grumazescu, Academia Tehnică Militară, V. Patriciu","doi":"10.32754/JMT.2018.1.10","DOIUrl":"https://doi.org/10.32754/JMT.2018.1.10","url":null,"abstract":"Digital Object Identifier 10.32754/JMT.2018.1.10 57 Abstract—Wireless Sensor Networks (WSN) are considered to be the eyes and ears of the Internet of Things (IoT). Whereas sensor boards are becoming cheaper and a lot more diverse, WSN and IoT applications are on a steady upward trend. This leads to an increasing need to ensure the security of data collected and transmitted by these types of applications and networks. Because sensor nodes are still relatively simple, highly constrained devices, security becomes very difficult to implement. While lightweight cryptographic algorithms are still under close supervision by NIST, identity based cryptography (IBC) holds its ground as a viable security approach for WSN based applications. In this paper we are presenting a thorough analysis on identity based cryptographic primitives, techniques, implementation variants and issues. Throughout the paper we are discussing all of these aspects in relation to the specificity of WSN based network infrastructures and applications.","PeriodicalId":315050,"journal":{"name":"Journal of Military Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130393733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Florin Catargiu, Academia Tehnică Militară, Cristian Vidan, R. Mihai, Gavril Alexandru
{"title":"Helical Antenna Design for Automated UAV Tracking System","authors":"Florin Catargiu, Academia Tehnică Militară, Cristian Vidan, R. Mihai, Gavril Alexandru","doi":"10.32754/jmt.2018.1.04","DOIUrl":"https://doi.org/10.32754/jmt.2018.1.04","url":null,"abstract":"Digital Object Identifier 10.32754/JMT.2018.1.04 25 Abstract—Recently, the use of unmanned aerial systems (UAS) has increased dramatically in the civilian and military environments. The current paper is mainly concerned with the limitations of radio communications between a UAV and ground control stations. A new approach will be presented by creating a dynamic ground control station that can automatically and real-time track a UAV that has a 5.8 GHz video transmitter on board. To do that, an axial mode helical antenna is proposed. The antenna is simulated and the performance analysis is presented. Helical antennas play an important role in establishing communications for UAV. Also it describes a portable tracking antenna system that is used for line of sight communications with the small UAVs. Our antenna is mechanically rotated in an elevation and azimuth mode in response to the tracking signals derived from the UAV video link transmissions. The antenna tracking system with 7 turns and a pitch angle of 18o has achieved good results. This satisfies the requirements for establishing a reliable communication in UAV applications.","PeriodicalId":315050,"journal":{"name":"Journal of Military Technology","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134066138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Milăşan, Academia Tehnică Militară, C. Molder, S. Dumitrescu
{"title":"A Comparative Study of Digital Filtering Techniques in Ultrasound and Carotid Bifurcation Atherosclerosis","authors":"A. Milăşan, Academia Tehnică Militară, C. Molder, S. Dumitrescu","doi":"10.32754/jmt.2018.1.01","DOIUrl":"https://doi.org/10.32754/jmt.2018.1.01","url":null,"abstract":"Digital Object Identifier 10.32754/JMT.2018.1.01 5 Abstract—The current paper presents a method for speckle cancellation in digital images obtained in ultrasound and carotid bifurcation atherosclerosis. Filtering techniques are usually used for noise reduction and contrast enhancement in digital images. Due to interferences and other phenomena in the acquisition chain, ultrasound images usually have perturbations and artifacts. Speckle is often considered a powerful source of noise in the ultrasound imagery and it must be filtered without affecting the rest of the most important features in the image. Linear, nonlinear, diffusion and wavelet filters are applied on various ultrasound images of carotid bifurcation. In order to evaluate the quality difference between original and anti-speckle filtered images, a comparative study of results is presented at the end.","PeriodicalId":315050,"journal":{"name":"Journal of Military Technology","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124226706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Daniel Didulescu, Academia Tehnică Militară, Claudiu Buciu, D. Raducanu
{"title":"Mission Planner for GEOINT Data Acquisition","authors":"Daniel Didulescu, Academia Tehnică Militară, Claudiu Buciu, D. Raducanu","doi":"10.32754/jmt.2018.1.09","DOIUrl":"https://doi.org/10.32754/jmt.2018.1.09","url":null,"abstract":"Digital Object Identifier 10.32754/JMT.2018.1.09 51 Abstract—Across all North Atlantic Treaty nations there is a very well implemented way of military thinking when preparing for war or for crisis operations. Starting from scratch we consider first the military intelligence, afterwards looking for planning, carrying out the operation, and finally assessing the whole campaign. The real first step of this process is the Geospatial Intelligence (GEOINT). In order to collect, analyze, and disseminate as much intelligence as possible, the military maps will look for integrating data from different aerial and spatial sensors. Having in mind that not all the enemy’s soil could be surveyed by us, we are trying to match pan-sharpened digital pictures taken by Copter Unmanned Air Vehicles with images taken by commercial satellites and to extend by induction, using the relationship between the different levels of grey of the multi-sensors final products, the geographical knowledge management over the white spots.","PeriodicalId":315050,"journal":{"name":"Journal of Military Technology","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130547953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Pahonie, Academia Tehnică Militară, R. Mihai, Radu Buse, Mihai Mihăilă-Andres
{"title":"Improved Ducted Fan Design for Small Flexible Wing Unmanned Air Vehicle","authors":"R. Pahonie, Academia Tehnică Militară, R. Mihai, Radu Buse, Mihai Mihăilă-Andres","doi":"10.32754/JMT.2018.1.06","DOIUrl":"https://doi.org/10.32754/JMT.2018.1.06","url":null,"abstract":"Digital Object Identifier 10.32754/JMT.2018.1.06 33 Abstract—Nowadays, equipment transportation or real time surveillance flights can be done with different types of UAVs (Unmanned Aerial Vehicles) ranging from quads to fixed wing vehicles and flexible winged ones. The purpose of this article is to build upon the research available in the field of small unmanned paramotor flexible winged gliders. Such a functional aerial vehicle has been built and initial flight data evaluation undertaken. In this paper we improve upon the initial design of the UAV and the flight behavior of its initial fan configuration. A new ducted structure is proposed and tested (numerically and experimental) for the electric fan propulsion system.","PeriodicalId":315050,"journal":{"name":"Journal of Military Technology","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130552274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. Roşu, Academia Tehnică Militară, Georgiana Subaşu
{"title":"Digital Forensics in Cyber Security Exercises","authors":"L. Roşu, Academia Tehnică Militară, Georgiana Subaşu","doi":"10.32754/JMT.2018.1.02","DOIUrl":"https://doi.org/10.32754/JMT.2018.1.02","url":null,"abstract":"Digital Object Identifier 10.32754/JMT.2018.1.02 13 Abstract—The increased exposure to cyber threats is determined by the use of digital systems and their highly available connectivity. In order to mitigate cyber risks, optimum solutions are sought regarding the development of various methods for training in cyber security. Cyber training exercises have been created from the need to improve knowledge and skills, currently providing an enhancement to the detection and response capability to security incidents. One area in which cyber training exercises bring a major benefit is digital forensics. This paper aims to review the required criteria for building cyber exercises for training in the digital forensics field. It also emphasizes the importance of these training exercises in acquiring and improving the necessary skills for a promptly and efficiently response to security incidents. Our paper focuses on the benefits of using digital forensics methods and techniques to extract the information needed for monitoring and scoring participants' activities.","PeriodicalId":315050,"journal":{"name":"Journal of Military Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131065851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. Alil, Academia Tehnică Militară, L. Matache, S. Sandu
{"title":"Numerical Simulation of a Ballistic Impact on Tensylon® UHMWPE Laminates Using the Plastic Kinematic Model in LS-Dyna®","authors":"L. Alil, Academia Tehnică Militară, L. Matache, S. Sandu","doi":"10.32754/JMT.2018.1.08","DOIUrl":"https://doi.org/10.32754/JMT.2018.1.08","url":null,"abstract":"Digital Object Identifier 10.32754/JMT.2018.1.08 43 Abstract—Based on experimental results, the numerical simulation of a ballistic impact between a Ultra-High Molecular Weight Polyethylene (UHMWPE) laminate panel and a 7.62×39 lead core bullet is performed. The aim of the paper is to demonstrate that a simple constitutive model, such as the plastic kinematic model available in LS-Dyna® version R7.0.0, can be used to accurately describe real ballistic impact events with UHMWPE laminate targets, which are normally simulated using orthotropic material models. Two representations of the UHMWPE laminate panel are proposed: a version constituted by a number of identical layers, treated individually as isentropic solids with the possibility of detaching from each other (in order to simulate delamination), and a version containing additional layers between the main UHMWPE layers, having the role of acting, on one hand, as an interface which plays the main role in delamination phenomenon and, on the other hand, to introduce a softer component by imitating the behavior of a resin. Having clearly advantages over the simple non-adhesive version, the adhesive version proposed within this paper had a less accurate performance than the simple version.","PeriodicalId":315050,"journal":{"name":"Journal of Military Technology","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131479141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}