recentpopularlog in

pierredv : arxiv   17

[1510.07563] Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems, Aug 2017
Altaf Shaik, Ravishankar Borgaonkar, N. Asokan, Valtteri Niemi, Jean-Pierre Seifert

Abstract

Mobile communication systems now constitute an essential part of life throughout the world. Fourth generation "Long Term Evolution" (LTE) mobile communication networks are being deployed. The LTE suite of specifications is considered to be significantly better than its predecessors not only in terms of functionality but also with respect to security and privacy for subscribers.
We carefully analyzed LTE access network protocol specifications and uncovered several vulnerabilities. Using commercial LTE mobile devices in real LTE networks, we demonstrate inexpensive, and practical attacks exploiting these vulnerabilities. Our first class of attacks consists of three different ways of making an LTE device leak its location: A semi-passive attacker can locate an LTE device within a 2 this http URL area within a city whereas an active attacker can precisely locate an LTE device using GPS co-ordinates or trilateration via cell-tower signal strength information. Our second class of attacks can persistently deny some or all services to a target LTE device. To the best of our knowledge, our work constitutes the first publicly reported practical attacks against LTE access network protocols.
We present several countermeasures to resist our specific attacks. We also discuss possible trade-offs that may explain why these vulnerabilities exist and recommend that safety margins introduced into future specifications to address such trade-offs should incorporate greater agility to accommodate subsequent changes in the trade-off equilibrium.
IMSI-catchers  StingRay  4G  LTE  cyber-spectrum  Arxiv 
october 2019 by pierredv
[1909.05130] Should We Worry About Interference in Emerging Dense NGSO Satellite Constellations? Sep 2019
Many satellite operators are planning to deploy NGSO systems for broadband communication services in the Ku-, Ka-, and V-band, where some of them have already launched. Consequently, new challenges are expected for inter-system satellite coexistence due to the increased interference level and the complexity of the interactions resulting from the heterogeneity of the constellations. This is especially relevant for the Ku-band, where the NGSO systems are most diverse and existing GSO systems, which often support critical services, must be protected from interference. It is thus imperative to evaluate the impact of mutual inter-system interference, the efficiency of the basic interference mitigation techniques, and whether regulatory intervention is needed for the new systems. We conduct an extensive study of inter-satellite coexistence in the Ku-band, where we consider all recently proposed NGSO and some selected GSO systems. Our throughput degradation results suggest that existing spectrum regulation may be insufficient to ensure GSO protection from NGSO interference, especially due to the high transmit power of the LEO Kepler satellites. This also results in strong interference towards other NGSO systems, where traditional interference mitigation techniques like look-aside may perform poorly. Specifically, look-aside can be beneficial for large constellations, but detrimental for small constellations. Furthermore, we confirm that band-splitting among satellite operators significantly degrades throughput, also for the Ku-band. Our results overall show that the complexity of the inter-satellite interactions for new NGSO systems is too high to be managed via simple interference mitigation techniques. This means that more sophisticated engineering solutions, and potentially even more strict regulatory requirements, will be needed to ensure coexistence in emerging, dense NGSO deployments.
iNETS  NGSO  risk-assessment  Arxiv 
september 2019 by pierredv
[pdf] ELROI: A License Plate For Your Satellite, Feb 2018, arXiv
Palmer & Holmes
Abstract
Space object identification is vital for operating spacecraft, space traffic control, and space situational awareness, but initial determination, maintenance, and recovery of identity are all difficult, expensive, and error-prone, especially for small objects like CubeSats. Attaching a beacon or license plate with a unique identification number to a space object before launch would greatly simplify the task, but radio beacons are power-hungry and can cause interference. This paper describes a new concept for a satellite license plate, the Extremely Low Resource Optical Identifier or ELROI. ELROI is a milliwatt-scale self-powered autonomous optical beacon that can be attached to any space object to transmit a persistent identification signal to ground stations. A system appropriate for a LEO CubeSat or other small space object can fit in a package with the area of a postage stamp and a few millimeters thick, and requires no power, data, or control from the host object. The concept has been validated with ground tests, and the first flight test unit is scheduled for launch in 2018. The unique identification number of a LEO satellite can be determined unambiguously in a single orbital pass over a low-cost ground station.
satellite  identity  tracking  arXiv 
december 2018 by pierredv
The first “social network” of brains lets three people transmit thoughts to each other’s heads - MIT Technology Review Sep 2018
Ref: arxiv.org/abs/1809.08632: BrainNet: A Multi-Person Brain-to-Brain Interface for Direct Collaboration Between Brains

"These tools include electroencephalograms (EEGs) that record electrical activity in the brain and transcranial magnetic stimulation (TMS), which can transmit information into the brain.
Sign up for The Download
Your daily dose of what's up in emerging technology

By signing up you agree to receive email newsletters and notifications from MIT Technology Review. You can change your preferences at any time. View our Privacy Policy for more detail.

In 2015, Andrea Stocco and his colleagues at the University of Washington in Seattle used this gear to connect two people via a brain-to-brain interface. The people then played a 20 questions–type game.

An obvious next step is to allow several people to join such a conversation, and today Stocco and his colleagues announced they have achieved this using a world-first brain-to-brain network. "

"The proof-of-principle network connects three people: two senders and one person able to receive and transmit, all in separate rooms and unable to communicate conventionally. The group together has to solve a Tetris-like game in which a falling block has to be rotated so that it fits into a space at the bottom of the screen."
MIT-Technology-Review  neuroscience  communication  EEG  TMS  Arxiv 
october 2018 by pierredv
[1610.06754] A Localization Approach for Crowdsourced Air Traffic Communication Networks
In this work, we argue that current state-of-the-art methods of aircraft localization such as multilateration are insufficient, in particular for modern crowdsourced air traffic networks with random, unplanned deployment geometry. We propose an alternative, a grid-based localization approach using the k-Nearest Neighbor algorithm, to deal with the identified shortcomings. Our proposal does not require any changes to the existing air traffic protocols and transmitters, and is easily implemented using only low-cost, commercial-off-the-shelf hardware.
Arxiv  crowdsourcing  aviation  navigation 
october 2016 by pierredv
Cause And Effect: The Revolutionary New Statistical Test That Can Tease Them Apart — The Physics arXiv Blog — Medium
"The basis of the new approach is to assume that the relationship between X and Y is not symmetrical. In particular, they say that in any set of measurements there will always be noise from various cause. The key assumption is that the pattern of noise in the cause will be different to the pattern of noise in the effect. That’s because any noise in X can have an influence on Y but not vice versa."
statistics  causality  arxiv 
december 2014 by pierredv
[1311.5253] An Introduction to QBism with an Application to the Locality of Quantum Mechanics
also via bit.ly/qbism Christopher A. Fuchs, N. David Mermin, Ruediger Schack (Submitted on 20 Nov 2013) "We give an introduction to the QBist interpretation of quantum mechanics. We note that it removes the paradoxes, conundra, and pseudo-problems that have plagued quantum foundations for the past nine decades. As an example, we show in detail how it eliminates quantum "nonlocality"."
quantum-mechanics  David  Mermin  QBism  arXiv 
july 2014 by pierredv
How Anybody Can Measure Your Computer's Wi-Fi Fingerprint | MIT Technology Review
"Christoph Neumann and pals at the Technicolor Security and Content Protection Labs in Rennes, France, say they’ve developed a way of uniquely identifying a computer by the way it accesses Wi-Fi resources. They point out that characteristics such as transmission rates and frame inter-arrival time, depend on the Wi-Fi card a computer uses as well as the drivers and the applications involved. The large number of permutations of these ensures that most computers have a “Wi-Fi fingerprint” that uniquely identifies them. And that could help distinguish an authorized user from a malicious one." “We find that the network parameters transmission time and frame inter-arrival time perform best in comparison to the other network parameters considered,” they say. "And the results are pretty good. They say that in ordinary conditions such as their office network, they uniquely identify machines with an accuracy of up to 95 percent."
Wi-Fi  security  arxiv  MIT-Technology-Review 
may 2014 by pierredv
Carbon, Avogadro's Constant and the Importance of the Number 12
"Materials scientists have decided to define, rather than measure, Avogadro’s constant, triggering a lengthy debate over what number to choose. Now one physicist thinks he has the answer."
arxiv  carbon  chemistry  MITtechnologyreview  physics 
may 2014 by pierredv
[1304.6690] Massive MIMO for Next Generation Wireless Systems
"Multi-user Multiple-Input Multiple-Output (MIMO) offers big advantages over conventional point-to-point MIMO: it works with cheap single-antenna terminals, a rich scattering environment is not required, and resource allocation is simplified because every active terminal utilizes all of the time-frequency bins. However, multi-user MIMO, as originally envisioned with roughly equal numbers of service-antennas and terminals and frequency division duplex operation, is not a scalable technology. Massive MIMO (also known as "Large-Scale Antenna Systems", "Very Large MIMO", "Hyper MIMO", "Full-Dimension MIMO" & "ARGOS") makes a clean break with current practice through the use of a large excess of service-antennas over active terminals and time division duplex operation. Extra antennas help by focusing energy into ever-smaller regions of space to bring huge improvements in throughput and radiated energy efficiency. Other benefits of massive MIMO include ..."
MIMO  research  arXiv 
february 2014 by pierredv
The Remarkable Properties of Mythological Social Networks | MIT Technology Review
"P J Miranda at the Federal Technological University of Paraná in Brazil and a couple of pals study the social network between characters in Homer’s ancient Greek poem, the Odyssey. Their conclusion is that this social network bears remarkable similarities to Facebook, Twitter and the like and that this may offer an important clue about the origin of this ancient story." "This is not the first time that researchers have examined the social networks associated with ancient texts. Last year, researchers analysed three narratives in this way-Homer’s Iliad, the early English story Beowulf and the Irish epic poem Tain Bo Cuailnge.They discovered that while the networks associated with Beowulf and the Iliad had many of the properties of real social networks, the network associated with Tain was less realistic.That led them to conclude that the societies described in the Iliad and Beowulf are probably based on real ones, whereas the Tain appears more artificial." Same for Odyssey
arXiv  Odyssey  Homer  MIT-Technology-Review  socialnetworks 
june 2013 by pierredv
[1304.1658v1] Beyond Nash Equilibrium in Open Spectrum Sharing: Lorenz Equilibrium in Discrete Games
"A new game theoretical solution concept for open spectrum sharing in cognitive radio (CR) environments is presented, the Lorenz equilibrium (LE). Both Nash and Pareto solution concepts have limitations when applied to real world problems. Nash equilibrium (NE) rarely ensures maximal payoff and it is frequently Pareto inefficient. The Pareto set is usually a large set of solutions, often too hard to process. The Lorenz equilibrium is a subset of Pareto efficient solutions that are equitable for all players and ensures a higher payoff than the Nash equilibrium. LE induces a selection criterion of NE, when several are present in a game (e.g. many-player discrete games) and when fairness is an issue. Besides being an effective NE selection criterion, the LE is an interesting game theoretical situation per se, useful for CR interaction analysis."
arXiv  spectrum-sharing  spectrum  economics 
may 2013 by pierredv
Why A Botched IT Project Will Destroy A Major Corporation in the Near Future | MIT Technology Review
Flyvbjerg and Budzier: “This highlights the true pitfall of IT change initiatives: It’s not that they’re particularly prone to high cost overruns on average, as management consultants and academic studies have previously suggested. It’s that an unusually large proportion of them incur massive overages,” "Calculating the risk associated with an IT project using the average cost overrun is like creating building standards using the average size of earthquakes. Both are bound to be inadequate."
failure  project-management  Arxiv  MIT-Technology-Review 
may 2013 by pierredv
Participants in Personal Genome Project Identified by Privacy Experts | MIT Technology Review
"Privacy experts have identified participants in the Personal Genome Project using “de-identified” data."
Personal  Genome  Project  Arxiv  de-anonymization  privacy  MIT-Technology-Review 
may 2013 by pierredv
Braess' Paradox Infects Social Networks Too, Say Computer Scientists | MIT Technology Review Mar 2013
"One of the increasingly famous paradoxes in science is named after the German mathematician Dietrich Braess who noted that adding extra roads to a network can lead to greater congestion. Similarly, removing roads can improve travel times. Traffic planners have recorded many examples of Braess’ paradox in cities such as Seoul, Stuttgart, New York and London. And in recent years, physicists have begun to study how it might be applied in other areas too, such as power transmission, sporting performance where the removal of one player can sometimes improve a team’s performance and materials science where the network of forces within a material  can be modified in counterintuitive ways, to make it expand under compression, for example. Today,  Krzysztof Apt at the University of Amsterdam in The Netherlands and a couple of pals reveal an entirely new version of this paradox that occurs in social networks in which people choose products based on the decisions made by their friends. "
traffic  Arxiv  MIT-Technology-Review  complex-systems  Braess 
march 2013 by pierredv

Copy this bookmark:





to read