Heyno Garbe - Academia.edu (original) (raw)

Uploads

Papers by Heyno Garbe

Research paper thumbnail of Near-field coupling of wireless devices and long communications cables

IET Science, Measurement & Technology, 2008

Research paper thumbnail of Heuristic Approach to Evaluate the Occurrence of IEMI Sources in Criminal Activities

EUROEM 2016

This paper discusses a technique which enables the assessment of key parameter of various intenti... more This paper discusses a technique which enables the assessment of key parameter of various intentional electromagnetic environments (IEME) for electronic systems, including the likelihood of their occurrence. The technique starts with a categorization of aspects, including non-technical aspects like availability of components, required knowledge and costs. Based on this categorization the likelihood that an offender has access to such an IEMI source is determined by a heuristic approach. In a second assessment step the possibility that a considered IEMI source might occur in the ambient of a given target system is estimated.

Research paper thumbnail of Assessing the Likelihood of Various Intentional Electromagnetic Environments The initial step of an IEMI Risk Analysis

—This paper discusses a technique which enables the assessment of key parameter of various intent... more —This paper discusses a technique which enables the assessment of key parameter of various intentional electromagnetic environments (IEME) for electronic systems, including the likelihood of their occurrence. The technique starts with a categorization of aspects, including non-technical aspects like availability of components, required knowledge and costs. Based on this categorization the likelihood that an offender has access to such an IEMI source is determined by a heuristic approach. In a second assessment step the possibility that a considered IEMI source might occur in the ambient of a given target system as well as parameters of the generated IEME are estimated.

Research paper thumbnail of Analysis of IEMI Effects on a Computer Network in a Realistic Environment

—Effects on computer networks due to intentional electromagnetic interference (IEMI) are a well k... more —Effects on computer networks due to intentional electromagnetic interference (IEMI) are a well known phenomena. However, when a perturbation occurs in a real world environment the effects may not always be obvious. In case computers crash or reboot repeatedly it is clear that there is a source of malfunction. The same applies to flickering monitors or unpredictable behaviour of input devices. But more often there are no evident and direct observable effects which can be seen in the network communication between two computers. In this paper a quantitative method for analysing the effects from a commercially available damped sinusoidal source with high output power on a computer network in a typical infrastructure environment is presented. The measurements show the impact on the communication which can directly be observed on the link layer. The results provide approaches for detecting IEMI attacks and give a realistic estimation of the threat potential of today's high-power electromagnetic (HPEM) sources.

Research paper thumbnail of A test method for analysing disturbed ethernet data streams

Advances in Radio Science, 2015

Research paper thumbnail of Estimation of the threat of IEMI to complex electronic systems

Advances in Radio Science, 2009

The threat of ultra wideband (UWB) sources is interesting for military issues. This paper summari... more The threat of ultra wideband (UWB) sources is interesting for military issues. This paper summarizes information concerning the voltages generated from some commercially available UWB generator systems and their produced electromagnetic fields. The paper focuses on the coupling of UWB fields into electronic equipment and discusses possible modeling and measurement techniques to estimate such a threat for modern ships. An

Research paper thumbnail of Reference configurations for the characterization of critical infrastructures

2014 International Symposium on Electromagnetic Compatibility, 2014

Research paper thumbnail of Analysis of the sensitivity for the TEM cross-correlation method to qualify TEM-waveguides for UWB measurements

This paper deals with the TEM cross-correlation method (TCCM) to qualify and characterize transve... more This paper deals with the TEM cross-correlation method (TCCM) to qualify and characterize transverse electromagnetic (TEM) waveguides for arbitrary transient signals. In previous papers the applicability of the TCCM to waveguides was shown. The aim of this investigation is to apply the established limits of the various standards (e.g. the IEC 61000-4-20 Annex C) to this new method and determine the sensitivity of the TCCM.

Research paper thumbnail of Investigation of the frequency correlation between radiation patterns of unintentional emitters for large frequency bands

International Symposium on Electromagnetic Compatibility - EMC EUROPE, 2012

ABSTRACT The determination of a radiation pattern for an unintentional emitter is very time-consu... more ABSTRACT The determination of a radiation pattern for an unintentional emitter is very time-consuming. Therefore, approaches are needed to reduce the costs of such measurements. In previous research, stochastic approaches have been developed to describe the distribution of the directivity and to predict the maximum directivity for continuous wave signals. However, if the radiation pattern needs to be known for a large frequency band, the characteristics of the emitter vary with the frequency. In this paper, the radiation patterns of unintentional emitters are examined for a large frequency band. Based on a simulation model, the similarity of the radiation patterns at different frequencies is determined by calculating the correlation coefficient. It is shown that radiation patterns of close frequencies are correlated up to a correlation distance which is dependent on the electrical size of the emitter.

Research paper thumbnail of Stochastic and statistics in superposition of multipole radiators

Research paper thumbnail of Characteristic HPEM Signals for the Detection of IEMI Threats

Ultra-Wideband, Short-Pulse Electromagnetics 10, 2013

Research paper thumbnail of Influence of software effects on the susceptibility of Ethernet connections

2014 IEEE International Symposium on Electromagnetic Compatibility (EMC), 2014

Research paper thumbnail of Concept of stochastic modeling for High-Power Electromagnetics (HPEM) risk analysis at system level

2013 IEEE International Symposium on Electromagnetic Compatibility, 2013

ABSTRACT This paper focuses on specific aspects of a systematic High-Power Electromagnetic (HPEM)... more ABSTRACT This paper focuses on specific aspects of a systematic High-Power Electromagnetic (HPEM) risk analysis at system level. In the first part of the paper the Threat Scenario, Effect and Criticality Analysis (TSECA), a novel risk analysis methodology is introduced. The TSECA is based on the general principle of the well established Failure Mode, Effects and Criticality Analysis (FMECA), which has been modified to analyze HPEM scenarios. In the second part of the paper particular aspects concerning the description and modeling of threat scenarios are discussed. Due to existing uncertainties of the scenario and system description as well as the stochastic nature of key parameters, risk analysis requires appropriate stochastic models.

Research paper thumbnail of Risk potential of radiated HPEM environments

2009 IEEE International Symposium on Electromagnetic Compatibility, 2009

Research paper thumbnail of Coupling of transient ultra wide band electromagnetic fields to complex electronic systems

2005 International Symposium on Electromagnetic Compatibility, 2005. EMC 2005., 2005

Research paper thumbnail of Protective Properties of a Generic Missile Enclosure to Different Electromagnetic Influences

2007 IEEE International Symposium on Electromagnetic Compatibility, 2007

Research paper thumbnail of Protection Properties of Advanced Textile Shields Determined in Frequency and Time Domain

The protective properties of a conductive textile pouch for the storage of electronic equipment a... more The protective properties of a conductive textile pouch for the storage of electronic equipment are investi- gated. In a first step the shielding effectiveness of a textile layer including a newly developed conductive zipper is meas- ured according to MIL-STD 285. The complete pouch is tested in different ways: The shielding effectiveness of the empty pouch is measured in frequency- and time domain. In subse- quent studies the pouch is loaded with different operating electronic devices such as microprocessor boards to observe the protection effect .The devices are exposed to double expo- nential pulses shielded and unshielded. As a criterion of quality the breakdown failure rate found in both cases is compared.

Research paper thumbnail of Probabilistic Risk Analysis Technique of Intentional Electromagnetic Interference at System Level

IEEE Transactions on Electromagnetic Compatibility, 2000

Research paper thumbnail of Estimation of the threat of IEMI to complex electronic systems

Advances in Radio Science, 2009

Research paper thumbnail of Radiation analysis of PCB layout using a hybrid MoM-MTL method

IEEE Transactions on Electromagnetic Compatibility, 2003

Research paper thumbnail of Near-field coupling of wireless devices and long communications cables

IET Science, Measurement & Technology, 2008

Research paper thumbnail of Heuristic Approach to Evaluate the Occurrence of IEMI Sources in Criminal Activities

EUROEM 2016

This paper discusses a technique which enables the assessment of key parameter of various intenti... more This paper discusses a technique which enables the assessment of key parameter of various intentional electromagnetic environments (IEME) for electronic systems, including the likelihood of their occurrence. The technique starts with a categorization of aspects, including non-technical aspects like availability of components, required knowledge and costs. Based on this categorization the likelihood that an offender has access to such an IEMI source is determined by a heuristic approach. In a second assessment step the possibility that a considered IEMI source might occur in the ambient of a given target system is estimated.

Research paper thumbnail of Assessing the Likelihood of Various Intentional Electromagnetic Environments The initial step of an IEMI Risk Analysis

—This paper discusses a technique which enables the assessment of key parameter of various intent... more —This paper discusses a technique which enables the assessment of key parameter of various intentional electromagnetic environments (IEME) for electronic systems, including the likelihood of their occurrence. The technique starts with a categorization of aspects, including non-technical aspects like availability of components, required knowledge and costs. Based on this categorization the likelihood that an offender has access to such an IEMI source is determined by a heuristic approach. In a second assessment step the possibility that a considered IEMI source might occur in the ambient of a given target system as well as parameters of the generated IEME are estimated.

Research paper thumbnail of Analysis of IEMI Effects on a Computer Network in a Realistic Environment

—Effects on computer networks due to intentional electromagnetic interference (IEMI) are a well k... more —Effects on computer networks due to intentional electromagnetic interference (IEMI) are a well known phenomena. However, when a perturbation occurs in a real world environment the effects may not always be obvious. In case computers crash or reboot repeatedly it is clear that there is a source of malfunction. The same applies to flickering monitors or unpredictable behaviour of input devices. But more often there are no evident and direct observable effects which can be seen in the network communication between two computers. In this paper a quantitative method for analysing the effects from a commercially available damped sinusoidal source with high output power on a computer network in a typical infrastructure environment is presented. The measurements show the impact on the communication which can directly be observed on the link layer. The results provide approaches for detecting IEMI attacks and give a realistic estimation of the threat potential of today's high-power electromagnetic (HPEM) sources.

Research paper thumbnail of A test method for analysing disturbed ethernet data streams

Advances in Radio Science, 2015

Research paper thumbnail of Estimation of the threat of IEMI to complex electronic systems

Advances in Radio Science, 2009

The threat of ultra wideband (UWB) sources is interesting for military issues. This paper summari... more The threat of ultra wideband (UWB) sources is interesting for military issues. This paper summarizes information concerning the voltages generated from some commercially available UWB generator systems and their produced electromagnetic fields. The paper focuses on the coupling of UWB fields into electronic equipment and discusses possible modeling and measurement techniques to estimate such a threat for modern ships. An

Research paper thumbnail of Reference configurations for the characterization of critical infrastructures

2014 International Symposium on Electromagnetic Compatibility, 2014

Research paper thumbnail of Analysis of the sensitivity for the TEM cross-correlation method to qualify TEM-waveguides for UWB measurements

This paper deals with the TEM cross-correlation method (TCCM) to qualify and characterize transve... more This paper deals with the TEM cross-correlation method (TCCM) to qualify and characterize transverse electromagnetic (TEM) waveguides for arbitrary transient signals. In previous papers the applicability of the TCCM to waveguides was shown. The aim of this investigation is to apply the established limits of the various standards (e.g. the IEC 61000-4-20 Annex C) to this new method and determine the sensitivity of the TCCM.

Research paper thumbnail of Investigation of the frequency correlation between radiation patterns of unintentional emitters for large frequency bands

International Symposium on Electromagnetic Compatibility - EMC EUROPE, 2012

ABSTRACT The determination of a radiation pattern for an unintentional emitter is very time-consu... more ABSTRACT The determination of a radiation pattern for an unintentional emitter is very time-consuming. Therefore, approaches are needed to reduce the costs of such measurements. In previous research, stochastic approaches have been developed to describe the distribution of the directivity and to predict the maximum directivity for continuous wave signals. However, if the radiation pattern needs to be known for a large frequency band, the characteristics of the emitter vary with the frequency. In this paper, the radiation patterns of unintentional emitters are examined for a large frequency band. Based on a simulation model, the similarity of the radiation patterns at different frequencies is determined by calculating the correlation coefficient. It is shown that radiation patterns of close frequencies are correlated up to a correlation distance which is dependent on the electrical size of the emitter.

Research paper thumbnail of Stochastic and statistics in superposition of multipole radiators

Research paper thumbnail of Characteristic HPEM Signals for the Detection of IEMI Threats

Ultra-Wideband, Short-Pulse Electromagnetics 10, 2013

Research paper thumbnail of Influence of software effects on the susceptibility of Ethernet connections

2014 IEEE International Symposium on Electromagnetic Compatibility (EMC), 2014

Research paper thumbnail of Concept of stochastic modeling for High-Power Electromagnetics (HPEM) risk analysis at system level

2013 IEEE International Symposium on Electromagnetic Compatibility, 2013

ABSTRACT This paper focuses on specific aspects of a systematic High-Power Electromagnetic (HPEM)... more ABSTRACT This paper focuses on specific aspects of a systematic High-Power Electromagnetic (HPEM) risk analysis at system level. In the first part of the paper the Threat Scenario, Effect and Criticality Analysis (TSECA), a novel risk analysis methodology is introduced. The TSECA is based on the general principle of the well established Failure Mode, Effects and Criticality Analysis (FMECA), which has been modified to analyze HPEM scenarios. In the second part of the paper particular aspects concerning the description and modeling of threat scenarios are discussed. Due to existing uncertainties of the scenario and system description as well as the stochastic nature of key parameters, risk analysis requires appropriate stochastic models.

Research paper thumbnail of Risk potential of radiated HPEM environments

2009 IEEE International Symposium on Electromagnetic Compatibility, 2009

Research paper thumbnail of Coupling of transient ultra wide band electromagnetic fields to complex electronic systems

2005 International Symposium on Electromagnetic Compatibility, 2005. EMC 2005., 2005

Research paper thumbnail of Protective Properties of a Generic Missile Enclosure to Different Electromagnetic Influences

2007 IEEE International Symposium on Electromagnetic Compatibility, 2007

Research paper thumbnail of Protection Properties of Advanced Textile Shields Determined in Frequency and Time Domain

The protective properties of a conductive textile pouch for the storage of electronic equipment a... more The protective properties of a conductive textile pouch for the storage of electronic equipment are investi- gated. In a first step the shielding effectiveness of a textile layer including a newly developed conductive zipper is meas- ured according to MIL-STD 285. The complete pouch is tested in different ways: The shielding effectiveness of the empty pouch is measured in frequency- and time domain. In subse- quent studies the pouch is loaded with different operating electronic devices such as microprocessor boards to observe the protection effect .The devices are exposed to double expo- nential pulses shielded and unshielded. As a criterion of quality the breakdown failure rate found in both cases is compared.

Research paper thumbnail of Probabilistic Risk Analysis Technique of Intentional Electromagnetic Interference at System Level

IEEE Transactions on Electromagnetic Compatibility, 2000

Research paper thumbnail of Estimation of the threat of IEMI to complex electronic systems

Advances in Radio Science, 2009

Research paper thumbnail of Radiation analysis of PCB layout using a hybrid MoM-MTL method

IEEE Transactions on Electromagnetic Compatibility, 2003

Research paper thumbnail of A test method for analysing disturbed ethernet data streams

Ethernet connections, which are widely used in many computer networks, can suffer from electromag... more Ethernet connections, which are widely used in many computer networks, can suffer from electromagnetic interference. Typically, a degradation of the data transmission rate can be perceived as electromagnetic disturbances lead to corruption of data frames on the network media. In this paper a software-based measuring method is presented, which allows a direct assessment of the effects on the link layer. The results can directly be linked to the physical interaction without the influence of software related effects on higher protocol layers. This gives a simple tool for a quantitative analysis of the disturbance of an Ethernet connection based on time domain data. An example is shown, how the data can be used for further investigation of mechanisms and detection of intentional electromagnetic attacks.

Research paper thumbnail of Shielding of Electronic Systems against Transient Electromagnetic Interferences

In order to protect electronic systems against the effects of transient electromagnetic interfere... more In order to protect electronic systems against the effects of transient electromagnetic interferences, shields made of electrically conductive material can be used. The subject of this paper is an electrically conductive textile. When applying the shield, a reliable measure is needed in order to determine the effectiveness of the shield to protect against electromagnetic pulses. For this purpose, a time domain measurement technique is presented using double exponential pulses. With these pulses, the susceptibility of an operating electronic device with and without the shield is determined. As a criterion of quality of a shield, the breakdown failure rate found in both cases is compared.

Research paper thumbnail of Impact of near field dispersion on time domain susceptibility tests

This paper considers the effect of changes of the waveform parameters over the distance. The obje... more This paper considers the effect of changes of the waveform parameters over the distance. The objective is to show the near field effects on transient radiation and how near the equipment under test can be located to an antenna without significant changes of the width or rise time of the field pulse. It is shown that the well known frequency domain estimation models fail because the dimension of antenna systems and the wave propagation lead to a special kind of dispersion. The importance of this near field dispersion for practical applications is demonstrated by both theoretical considerations and measurements with a half impulse radiation antenna.

Research paper thumbnail of Radiation Analysis of PCB Layout Using a Hybrid MoM–MTL Method

—A new hybrid method which combines the method of moments and the multiconductor transmission lin... more —A new hybrid method which combines the method of moments and the multiconductor transmission line equations is presented. Both methods are combined by an iterative algorithm which utilizes an integral description for the electric field strength. In order to choose the appropriate method for the several parts of a printed-circuit-board layout, it is necessary to divide the structure. Based on a capacitive coupling model, an error coefficient is described which enables the prediction of worst-case error of the current distribution. The comparison of measurements with results of the hybrid method exposes the applicability of the hybrid method. Index Terms—Estimation of computation error, hybrid field calculation , printed circuit board (PCB) design, radiation analysis.

Research paper thumbnail of Probabilistic Risk Analysis Technique of Intentional Electromagnetic Interference at System Level

—This paper introduces a new procedural method for the systematic analysis of the risk when a spe... more —This paper introduces a new procedural method for the systematic analysis of the risk when a specific facility is exposed to an intentional electromagnetic environment (IEME). The analysis is performed from the viewpoint of the system owner. The exposure of a system to IEME can be described by a set of different scenarios. The method presented in this paper combines characteristics of intentional electromagnetic interference scenarios with susceptibility data of components using statistical-based models for the coupling as well as the system behavior. Within each scenario the coupling to components of the system under assessment is ascertained by an analysis of the electromagnetic topology. The reaction of the system under assessment is modeled by combining the failure probabilities of the components employing the fault tree analysis. The application of a Monte Carlo simulation on the resulting model provides the probability of the top events of the fault trees which are the system level effects or consequences. In a final step, the importance analysis enables the identification of critical elements, e.g., those elements which contribute most to the risk, and therefore starting points for the improvement of the system protection. Index Terms—Electromagnetic (EM) effects, effect analysis, intentional electromagnetic environment (IEME), intentional electromagnetic interference (IEMI), probabilistic risk analysis, threat assessment.