2019
Autores
Beltramo Martin, O; Correia, CM; Ragland, S; Jolissaint, L; Neichel, B; Fusco, T; Wizinowich, PL;
Publicação
MONTHLY NOTICES OF THE ROYAL ASTRONOMICAL SOCIETY
Abstract
In order to enhance the scientific exploitation of adaptive optics (AO)-assisted observations, we investigate a novel hybrid concept to improve the parametric estimation of point spread function (PSF) called PSF Reconstruction and Identification for Multiple-source characterization Enhancement (PRIME). PRIME uses both focal and pupil-plane measurements to estimate jointly the model parameters related to the atmosphere [Cn2(h), seeing] and the AO system (e.g. optical gains and residual low-order errors). Photometry and astrometry are provided as by-products. The parametric model in use is flexible enough to be scaled with field location and wavelength, making it a proper choice for optimized on-axis and off-axis data-reduction across the spectrum. Here, we present the methodology and validate PRIME on engineering and binary Keck II telescope NIRC2 images. We also present applications of PSF model parameters retrieval using PRIME: (i) calibrate the PSF model for observations void of stars on the acquired images, i.e. optimize the PSF reconstruction process, (ii) update the AO error breakdown mutually constrained by the telemetry and the images in order to speculate on the origin of the missing error terms and evaluate their magnitude, and (iii) measure photometry and astrometry with an application to the triple system Gl569 images.
2019
Autores
Janin Potiron, P; Chambouleyron, V; Schatz, L; Fauvarque, O; Bond, CZ; Abautret, Y; Muslimov, E; El Hadi, K; Sauvage, JF; Dohlen, K; Neichel, B; Correia, CM; Fusco, T;
Publicação
JOURNAL OF ASTRONOMICAL TELESCOPES INSTRUMENTS AND SYSTEMS
Abstract
Wavefront sensors (WFSs) encode phase information of an incoming wavefront into an intensity pattern that can be measured on a camera. Several kinds of WFSs are used in astronomical adaptive optics. Among them, Fourier-based WFSs perform a filtering operation on the wavefront in the focal plane. The most well-known example of a WFS of this kind is the Zernike WFS. The pyramid WFS also belongs to this class. Based on this same principle, WFSs can be proposed, such as the n-faced pyramid (which ultimately becomes an axicon) or the flattened pyramid, depending on whether the image formation is incoherent or coherent. To test such concepts, the LAM/ONERA on-sky pyramid sensor (LOOPS) adaptive optics testbed hosted at the Laboratoire d'Astrophysique de Marseille has been upgraded by adding a spatial light modulator (SLM). This device, placed in a focal plane produces high-definition phase masks that mimic otherwise bulk optic devices. We first present the optical design and upgrades made to the experimental setup of the LOOPS bench. Then, we focus on the generation of the phase masks with the SLM and the implications of having such a device in a focal plane. Finally, we present the first closed-loop results in either static or dynamic mode with different WFS applied on the SLM.
2019
Autores
Farley, OJD; Osborn, J; Morris, T; Fusco, T; Neichel, B; Correia, C; Wilson, RW;
Publicação
MONTHLY NOTICES OF THE ROYAL ASTRONOMICAL SOCIETY
Abstract
For extremely large telescopes, adaptive optics will be required to correct the Earth’s turbulent atmosphere. The performance of tomographic adaptive optics is strongly dependent on the vertical distribution (profile) of this turbulence. An important way in which this manifests is the tomographic error, arising from imperfect measurement and reconstruction of the turbulent phase at altitude. Conventionally, a small number of reference profiles are used to obtain this error in simulation; however these profiles are not constructed to be representative in terms of tomographic error. It is therefore unknown whether these simulations are providing realistic performance estimates. Here, we employ analytical adaptive optics simulation that drastically reduces computation times to compute tomographic error for 10 691 measurements of the turbulence profile gathered by the Stereo-SCIDAR instrument at ESO Paranal. We assess for the first time the impact of the profile on tomographic error in a statistical manner. We find, in agreement with previous work, that the tomographic error is most directly linked with the distribution of turbulence into discrete, stratified layers. Reference profiles are found to provide mostly higher tomographic error than expected, which we attribute to the fact that these profiles are primarily composed of averages of many measurements resulting in unrealistic, continuous distributions of turbulence. We propose that a representative profile should be defined with respect to a particular system, and that as such simulations with a large statistical sample of profiles must be an important step in the design process.
2019
Autores
Eldefrawy, MH; Pereira, N; Gidlund, M;
Publicação
IEEE INTERNET OF THINGS JOURNAL
Abstract
The deployment of the Internet of Things (IoT) in industry, called the Industrial IoT (IIoT), is supporting the introduction of very desirable improvements, such as increasing production flexibility, self-organization, and real-time and quick response to events. However, security and privacy challenges are still to be well addressed. The IIoT requires different properties to achieve secure and reliable systems and these requirements create extra challenges considering the limited processing and communication power available to IIoT field devices. In this research article, we present a key distribution protocol for IIoT that is computationally and communicationally lightweight (requires a single message exchange) and handles node addition and revocation, as well as fast rekeying. The scheme can also resist the consequences of node capture attacks (we assume that captured nodes can be detected by the gateway and previous works have shown this assumption to be acceptable in practice), server impersonation attacks and provides forward/backward secrecy. We show formally the correctness of our protocol and evaluate its energy consumption under realistic scenarios using a real embedded platform compared to previous state-of-theart key-exchange protocols, to show our protocol reliability for IIoT.
2019
Autores
Butun, I; Pereira, N; Gidlund, M;
Publicação
FUTURE INTERNET
Abstract
LoRa (along with its upper layers definition-LoRaWAN) is one of the most promising Low Power Wide Area Network (LPWAN) technologies for implementing Internet of Things (IoT)-based applications. Although being a popular technology, several works in the literature have revealed vulnerabilities and risks regarding the security of LoRaWAN v1.0 (the official 1st specification draft). The LoRa-Alliance has built upon these findings and introduced several improvements in the security and architecture of LoRa. The result of these efforts resulted in LoRaWAN v1.1, released on 11 October 2017. This work aims at reviewing and clarifying the security aspects of LoRaWAN v1.1. By following ETSI guidelines, we provide a comprehensive Security Risk Analysis of the protocol and discuss several remedies to the security risks described. A threat catalog is presented, along with discussions and analysis in view of the scale, impact, and likelihood of each threat. To the best of the authors' knowledge, this work is one of the first of its kind, by providing a detailed security risk analysis related to the latest version of LoRaWAN. Our analysis highlights important practical threats, such as end-device physical capture, rogue gateway and self-replay, which require particular attention by developers and organizations implementing LoRa networks.
2019
Autores
Eldefrawy, M; Butun, I; Pereira, N; Gidlund, M;
Publicação
COMPUTER NETWORKS
Abstract
Recent Low Power Wide Area Networks (LPWAN) protocols are receiving increased attention from industry and academia to offer accessibility for Internet of Things (IoT) connected remote sensors and actuators. In this work, we present a formal study of LoRaWAN security, an increasingly popular technology, which defines the structure and operation of LPWAN networks based on the LoRa physical layer. There are previously known security vulnerabilities in LoRaWAN that lead to the proposal of several improvements, some already incorporated into the latest protocol specification. Our analysis of LoRaWAN security uses Scyther, a formal security analysis tool and focuses on the key exchange portion of versions 1.0 (released in 2015) and 1.1 (the latest, released in 2017). For version 1.0, which is still the most widely deployed version of LoRaWAN, we show that our formal model allowed to uncover weaknesses that can be related to previously reported vulnerabilities. Our model did not find weaknesses in the latest version of the protocol (v1.1), and we discuss what this means in practice for the security of LoRaWAN as well as important aspects of our model and tools employed that should be considered. The Scyther model developed provides realistic models for LoRaWAN v1.0 and v1.1 that can be used and extended to formally analyze, inspect, and explore the security features of the protocols. This, in turn, can clarify the methodology for achieving secrecy, integrity, and authentication for designers and developers interested in these LPWAN standards. We believe that our model and discussion of the protocols security properties are beneficial for both researchers and practitioners. To the best of our knowledge, this is the first work that presents a formal security analysis of LoRaWAN.
The access to the final selection minute is only available to applicants.
Please check the confirmation e-mail of your application to obtain the access code.