Physical layer security for real-world applications: use cases, results and open challenges

2018 ◽  
Vol 108 (07-08) ◽  
pp. 543-548
Author(s):  
T. Pschybilla ◽  
D. Baumann ◽  
S. Manz ◽  
W. Wenger ◽  

Mit der fortschreitenden Digitalisierung in der Produktion werden konstant ansteigende Datenmengen generiert. Eine besondere Rolle kommt dabei dem Gebiet der Data Analytics zu, welches die Gewinnung von Wissen aus Daten und damit die Entscheidungsfindung unterstützen kann. Im Beitrag wird ein Reifegradmodell zur Einordnung von Anwendungsfällen der Data Analytics in der Produktion vorgestellt und an einem Beispiel der Smart Services der Trumpf GmbH + Co. KG angewendet.   With the progressing digitization in manufacturing, continuously increasing amounts of data are being generated. The field of data analytics plays an important role in this context by advancing the acquisition of knowledge from data and thus decision-making. This paper presents a maturity model for the classification of data analytics use cases in manufacturing. The model is applied to an example of Smart Services at Trumpf GmbH + Co. KG.


2019 ◽  
Author(s):  
Yuan Ding ◽  
Adam Narbudowicz

In this paper, the concept and recent development of exploiting frequency diverse array (FDA) and its variants for the physical-layer wireless security have been revisited and carefully examined. Following rigorous analytical derivation and illustrative simulations, the authors argue that the investigations performed in some recent works did not reveal one critical issue facing the real-world applications, and system models established and used before were based on an unrealistic assumption, i.e. that the legitimate and eavesdropping users at different ranges sample the signal waveforms at the same time instant. This misunderstanding results in conclusions that are misleading. The authors aim to take the first step to divert research efforts and rectify the previous problematic analyses. The authors prove that the FDA cannot secure a free-space wireless transmission in range domain, because the previously claimed ‘secure reception region’ propagates in range domain as time elapses.


2019 ◽  
Author(s):  
Yuan Ding ◽  
Adam Narbudowicz

In this paper, the concept and recent development of exploiting frequency diverse array (FDA) and its variants for the physical-layer wireless security have been revisited and carefully examined. Following rigorous analytical derivation and illustrative simulations, the authors argue that the investigations performed in some recent works did not reveal one critical issue facing the real-world applications, and system models established and used before were based on an unrealistic assumption, i.e. that the legitimate and eavesdropping users at different ranges sample the signal waveforms at the same time instant. This misunderstanding results in conclusions that are misleading. The authors aim to take the first step to divert research efforts and rectify the previous problematic analyses. The authors prove that the FDA cannot secure a free-space wireless transmission in range domain, because the previously claimed ‘secure reception region’ propagates in range domain as time elapses.


2020 ◽  
Vol 25 ◽  
Author(s):  
D. Popovic ◽  
C. Avis ◽  
M. Byrne ◽  
C. Cheung ◽  
M. Donovan ◽  
...  

Abstract Insurance industry practitioners have deep knowledge of their industry, but there is a lack of a simple-to-understand, practical blueprint on applying distributed ledger technology solutions, including blockchain. This paper provides a practical guide for actuaries, risk professionals, insurance companies and their Boards on blockchain, including an education piece to provide an understanding of the technology. Examples of real-world applications and use cases in insurance are provided to illustrate the capability of the technology. The current risks and challenges in adopting the technology are also considered. Finally, a checklist of issues to consider in adopting a blockchain solution for insurance business problems is provided.


Author(s):  
Matthieu Bloch ◽  
Joao Barros

Author(s):  
Shijie WANG ◽  
Yuanyuan GAO ◽  
Xiaochen LIU ◽  
Guangna ZHANG ◽  
Nan SHA ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document