Heyno Garbe - Academia.edu (original) (raw)
Uploads
Papers by Heyno Garbe
IET Science, Measurement & Technology, 2008
EUROEM 2016
This paper discusses a technique which enables the assessment of key parameter of various intenti... more This paper discusses a technique which enables the assessment of key parameter of various intentional electromagnetic environments (IEME) for electronic systems, including the likelihood of their occurrence. The technique starts with a categorization of aspects, including non-technical aspects like availability of components, required knowledge and costs. Based on this categorization the likelihood that an offender has access to such an IEMI source is determined by a heuristic approach. In a second assessment step the possibility that a considered IEMI source might occur in the ambient of a given target system is estimated.
—This paper discusses a technique which enables the assessment of key parameter of various intent... more —This paper discusses a technique which enables the assessment of key parameter of various intentional electromagnetic environments (IEME) for electronic systems, including the likelihood of their occurrence. The technique starts with a categorization of aspects, including non-technical aspects like availability of components, required knowledge and costs. Based on this categorization the likelihood that an offender has access to such an IEMI source is determined by a heuristic approach. In a second assessment step the possibility that a considered IEMI source might occur in the ambient of a given target system as well as parameters of the generated IEME are estimated.
—Effects on computer networks due to intentional electromagnetic interference (IEMI) are a well k... more —Effects on computer networks due to intentional electromagnetic interference (IEMI) are a well known phenomena. However, when a perturbation occurs in a real world environment the effects may not always be obvious. In case computers crash or reboot repeatedly it is clear that there is a source of malfunction. The same applies to flickering monitors or unpredictable behaviour of input devices. But more often there are no evident and direct observable effects which can be seen in the network communication between two computers. In this paper a quantitative method for analysing the effects from a commercially available damped sinusoidal source with high output power on a computer network in a typical infrastructure environment is presented. The measurements show the impact on the communication which can directly be observed on the link layer. The results provide approaches for detecting IEMI attacks and give a realistic estimation of the threat potential of today's high-power electromagnetic (HPEM) sources.
Advances in Radio Science, 2015
Advances in Radio Science, 2009
The threat of ultra wideband (UWB) sources is interesting for military issues. This paper summari... more The threat of ultra wideband (UWB) sources is interesting for military issues. This paper summarizes information concerning the voltages generated from some commercially available UWB generator systems and their produced electromagnetic fields. The paper focuses on the coupling of UWB fields into electronic equipment and discusses possible modeling and measurement techniques to estimate such a threat for modern ships. An
2014 International Symposium on Electromagnetic Compatibility, 2014
This paper deals with the TEM cross-correlation method (TCCM) to qualify and characterize transve... more This paper deals with the TEM cross-correlation method (TCCM) to qualify and characterize transverse electromagnetic (TEM) waveguides for arbitrary transient signals. In previous papers the applicability of the TCCM to waveguides was shown. The aim of this investigation is to apply the established limits of the various standards (e.g. the IEC 61000-4-20 Annex C) to this new method and determine the sensitivity of the TCCM.
International Symposium on Electromagnetic Compatibility - EMC EUROPE, 2012
ABSTRACT The determination of a radiation pattern for an unintentional emitter is very time-consu... more ABSTRACT The determination of a radiation pattern for an unintentional emitter is very time-consuming. Therefore, approaches are needed to reduce the costs of such measurements. In previous research, stochastic approaches have been developed to describe the distribution of the directivity and to predict the maximum directivity for continuous wave signals. However, if the radiation pattern needs to be known for a large frequency band, the characteristics of the emitter vary with the frequency. In this paper, the radiation patterns of unintentional emitters are examined for a large frequency band. Based on a simulation model, the similarity of the radiation patterns at different frequencies is determined by calculating the correlation coefficient. It is shown that radiation patterns of close frequencies are correlated up to a correlation distance which is dependent on the electrical size of the emitter.
Ultra-Wideband, Short-Pulse Electromagnetics 10, 2013
2014 IEEE International Symposium on Electromagnetic Compatibility (EMC), 2014
2013 IEEE International Symposium on Electromagnetic Compatibility, 2013
ABSTRACT This paper focuses on specific aspects of a systematic High-Power Electromagnetic (HPEM)... more ABSTRACT This paper focuses on specific aspects of a systematic High-Power Electromagnetic (HPEM) risk analysis at system level. In the first part of the paper the Threat Scenario, Effect and Criticality Analysis (TSECA), a novel risk analysis methodology is introduced. The TSECA is based on the general principle of the well established Failure Mode, Effects and Criticality Analysis (FMECA), which has been modified to analyze HPEM scenarios. In the second part of the paper particular aspects concerning the description and modeling of threat scenarios are discussed. Due to existing uncertainties of the scenario and system description as well as the stochastic nature of key parameters, risk analysis requires appropriate stochastic models.
2009 IEEE International Symposium on Electromagnetic Compatibility, 2009
2005 International Symposium on Electromagnetic Compatibility, 2005. EMC 2005., 2005
2007 IEEE International Symposium on Electromagnetic Compatibility, 2007
The protective properties of a conductive textile pouch for the storage of electronic equipment a... more The protective properties of a conductive textile pouch for the storage of electronic equipment are investi- gated. In a first step the shielding effectiveness of a textile layer including a newly developed conductive zipper is meas- ured according to MIL-STD 285. The complete pouch is tested in different ways: The shielding effectiveness of the empty pouch is measured in frequency- and time domain. In subse- quent studies the pouch is loaded with different operating electronic devices such as microprocessor boards to observe the protection effect .The devices are exposed to double expo- nential pulses shielded and unshielded. As a criterion of quality the breakdown failure rate found in both cases is compared.
IEEE Transactions on Electromagnetic Compatibility, 2000
Advances in Radio Science, 2009
IEEE Transactions on Electromagnetic Compatibility, 2003
IET Science, Measurement & Technology, 2008
EUROEM 2016
This paper discusses a technique which enables the assessment of key parameter of various intenti... more This paper discusses a technique which enables the assessment of key parameter of various intentional electromagnetic environments (IEME) for electronic systems, including the likelihood of their occurrence. The technique starts with a categorization of aspects, including non-technical aspects like availability of components, required knowledge and costs. Based on this categorization the likelihood that an offender has access to such an IEMI source is determined by a heuristic approach. In a second assessment step the possibility that a considered IEMI source might occur in the ambient of a given target system is estimated.
—This paper discusses a technique which enables the assessment of key parameter of various intent... more —This paper discusses a technique which enables the assessment of key parameter of various intentional electromagnetic environments (IEME) for electronic systems, including the likelihood of their occurrence. The technique starts with a categorization of aspects, including non-technical aspects like availability of components, required knowledge and costs. Based on this categorization the likelihood that an offender has access to such an IEMI source is determined by a heuristic approach. In a second assessment step the possibility that a considered IEMI source might occur in the ambient of a given target system as well as parameters of the generated IEME are estimated.
—Effects on computer networks due to intentional electromagnetic interference (IEMI) are a well k... more —Effects on computer networks due to intentional electromagnetic interference (IEMI) are a well known phenomena. However, when a perturbation occurs in a real world environment the effects may not always be obvious. In case computers crash or reboot repeatedly it is clear that there is a source of malfunction. The same applies to flickering monitors or unpredictable behaviour of input devices. But more often there are no evident and direct observable effects which can be seen in the network communication between two computers. In this paper a quantitative method for analysing the effects from a commercially available damped sinusoidal source with high output power on a computer network in a typical infrastructure environment is presented. The measurements show the impact on the communication which can directly be observed on the link layer. The results provide approaches for detecting IEMI attacks and give a realistic estimation of the threat potential of today's high-power electromagnetic (HPEM) sources.
Advances in Radio Science, 2015
Advances in Radio Science, 2009
The threat of ultra wideband (UWB) sources is interesting for military issues. This paper summari... more The threat of ultra wideband (UWB) sources is interesting for military issues. This paper summarizes information concerning the voltages generated from some commercially available UWB generator systems and their produced electromagnetic fields. The paper focuses on the coupling of UWB fields into electronic equipment and discusses possible modeling and measurement techniques to estimate such a threat for modern ships. An
2014 International Symposium on Electromagnetic Compatibility, 2014
This paper deals with the TEM cross-correlation method (TCCM) to qualify and characterize transve... more This paper deals with the TEM cross-correlation method (TCCM) to qualify and characterize transverse electromagnetic (TEM) waveguides for arbitrary transient signals. In previous papers the applicability of the TCCM to waveguides was shown. The aim of this investigation is to apply the established limits of the various standards (e.g. the IEC 61000-4-20 Annex C) to this new method and determine the sensitivity of the TCCM.
International Symposium on Electromagnetic Compatibility - EMC EUROPE, 2012
ABSTRACT The determination of a radiation pattern for an unintentional emitter is very time-consu... more ABSTRACT The determination of a radiation pattern for an unintentional emitter is very time-consuming. Therefore, approaches are needed to reduce the costs of such measurements. In previous research, stochastic approaches have been developed to describe the distribution of the directivity and to predict the maximum directivity for continuous wave signals. However, if the radiation pattern needs to be known for a large frequency band, the characteristics of the emitter vary with the frequency. In this paper, the radiation patterns of unintentional emitters are examined for a large frequency band. Based on a simulation model, the similarity of the radiation patterns at different frequencies is determined by calculating the correlation coefficient. It is shown that radiation patterns of close frequencies are correlated up to a correlation distance which is dependent on the electrical size of the emitter.
Ultra-Wideband, Short-Pulse Electromagnetics 10, 2013
2014 IEEE International Symposium on Electromagnetic Compatibility (EMC), 2014
2013 IEEE International Symposium on Electromagnetic Compatibility, 2013
ABSTRACT This paper focuses on specific aspects of a systematic High-Power Electromagnetic (HPEM)... more ABSTRACT This paper focuses on specific aspects of a systematic High-Power Electromagnetic (HPEM) risk analysis at system level. In the first part of the paper the Threat Scenario, Effect and Criticality Analysis (TSECA), a novel risk analysis methodology is introduced. The TSECA is based on the general principle of the well established Failure Mode, Effects and Criticality Analysis (FMECA), which has been modified to analyze HPEM scenarios. In the second part of the paper particular aspects concerning the description and modeling of threat scenarios are discussed. Due to existing uncertainties of the scenario and system description as well as the stochastic nature of key parameters, risk analysis requires appropriate stochastic models.
2009 IEEE International Symposium on Electromagnetic Compatibility, 2009
2005 International Symposium on Electromagnetic Compatibility, 2005. EMC 2005., 2005
2007 IEEE International Symposium on Electromagnetic Compatibility, 2007
The protective properties of a conductive textile pouch for the storage of electronic equipment a... more The protective properties of a conductive textile pouch for the storage of electronic equipment are investi- gated. In a first step the shielding effectiveness of a textile layer including a newly developed conductive zipper is meas- ured according to MIL-STD 285. The complete pouch is tested in different ways: The shielding effectiveness of the empty pouch is measured in frequency- and time domain. In subse- quent studies the pouch is loaded with different operating electronic devices such as microprocessor boards to observe the protection effect .The devices are exposed to double expo- nential pulses shielded and unshielded. As a criterion of quality the breakdown failure rate found in both cases is compared.
IEEE Transactions on Electromagnetic Compatibility, 2000
Advances in Radio Science, 2009
IEEE Transactions on Electromagnetic Compatibility, 2003
Ethernet connections, which are widely used in many computer networks, can suffer from electromag... more Ethernet connections, which are widely used in many computer networks, can suffer from electromagnetic interference. Typically, a degradation of the data transmission rate can be perceived as electromagnetic disturbances lead to corruption of data frames on the network media. In this paper a software-based measuring method is presented, which allows a direct assessment of the effects on the link layer. The results can directly be linked to the physical interaction without the influence of software related effects on higher protocol layers. This gives a simple tool for a quantitative analysis of the disturbance of an Ethernet connection based on time domain data. An example is shown, how the data can be used for further investigation of mechanisms and detection of intentional electromagnetic attacks.
In order to protect electronic systems against the effects of transient electromagnetic interfere... more In order to protect electronic systems against the effects of transient electromagnetic interferences, shields made of electrically conductive material can be used. The subject of this paper is an electrically conductive textile. When applying the shield, a reliable measure is needed in order to determine the effectiveness of the shield to protect against electromagnetic pulses. For this purpose, a time domain measurement technique is presented using double exponential pulses. With these pulses, the susceptibility of an operating electronic device with and without the shield is determined. As a criterion of quality of a shield, the breakdown failure rate found in both cases is compared.
This paper considers the effect of changes of the waveform parameters over the distance. The obje... more This paper considers the effect of changes of the waveform parameters over the distance. The objective is to show the near field effects on transient radiation and how near the equipment under test can be located to an antenna without significant changes of the width or rise time of the field pulse. It is shown that the well known frequency domain estimation models fail because the dimension of antenna systems and the wave propagation lead to a special kind of dispersion. The importance of this near field dispersion for practical applications is demonstrated by both theoretical considerations and measurements with a half impulse radiation antenna.
—A new hybrid method which combines the method of moments and the multiconductor transmission lin... more —A new hybrid method which combines the method of moments and the multiconductor transmission line equations is presented. Both methods are combined by an iterative algorithm which utilizes an integral description for the electric field strength. In order to choose the appropriate method for the several parts of a printed-circuit-board layout, it is necessary to divide the structure. Based on a capacitive coupling model, an error coefficient is described which enables the prediction of worst-case error of the current distribution. The comparison of measurements with results of the hybrid method exposes the applicability of the hybrid method. Index Terms—Estimation of computation error, hybrid field calculation , printed circuit board (PCB) design, radiation analysis.
—This paper introduces a new procedural method for the systematic analysis of the risk when a spe... more —This paper introduces a new procedural method for the systematic analysis of the risk when a specific facility is exposed to an intentional electromagnetic environment (IEME). The analysis is performed from the viewpoint of the system owner. The exposure of a system to IEME can be described by a set of different scenarios. The method presented in this paper combines characteristics of intentional electromagnetic interference scenarios with susceptibility data of components using statistical-based models for the coupling as well as the system behavior. Within each scenario the coupling to components of the system under assessment is ascertained by an analysis of the electromagnetic topology. The reaction of the system under assessment is modeled by combining the failure probabilities of the components employing the fault tree analysis. The application of a Monte Carlo simulation on the resulting model provides the probability of the top events of the fault trees which are the system level effects or consequences. In a final step, the importance analysis enables the identification of critical elements, e.g., those elements which contribute most to the risk, and therefore starting points for the improvement of the system protection. Index Terms—Electromagnetic (EM) effects, effect analysis, intentional electromagnetic environment (IEME), intentional electromagnetic interference (IEMI), probabilistic risk analysis, threat assessment.