&./3?J- Ornl-5183 Programs

Total Page:16

File Type:pdf, Size:1020Kb

&./3?J- Ornl-5183 Programs }&./3?J- ORNL-5183 PROGRAMS •ll-TEMFEMTIIE US ClllEI lEJtCTM SAFETY STIIIES PRWRESS wrwi lawni 1,1974 • Iwe 31,1975 T. t. Col* J. P. Sondvrs *. R. Kosttn ORRL-51S3 Distribution Category OC-77 Contract Ho. H-7405-eng-26 HICB-TEKPERATURE GAS-COOLED REACTOR SAPETT STUDIES PROGRESS lEPORT FOR JANUARY 1, 1974, THROUGH JURE 30, 1975 Tt S. Cole and J. P. Sanders, Program Managers P. R. Kasten, Prograa Director Dole Published: July 1977 OAK RIDGE RATIONAL LABORATORY Oak Ridge, Tennessee 37830 operated by UWI01I CARBIDE CORPORATIOR for the EHERCY RESEARCH AMD DEVELOPHERT ADMIRISTRATIOR mr CiSlRIBUTICN OF THIS DOCUMENT IS UNUMlTEd 90UHBKD The Gas-Cooled Reactor Program being carried oat at the Oak Ridge national laboratory contribute to the development and evaluation of nign-tenpereture gas-cooled reactors (nTGRs) and of gas-cooled fast reactors (OCRs). The development programa that are •nonsored by the U.S. Energy Besearch and Development Administration (Etta) include the Iberian Utilisation Program (RGg fuel lecycle Development Program), the RGR base Technology Program, the HTCK Safety Programs, and the CCFt Progran. In addition to the Una progress, safety stadias and assess- •eats have aleo been perfornad at the request and under sponsorship of the Division of Systens and Safety and the Division of leactor Safety Research of the U.S. nuclear Regulatory Commission. These stadias con­ sisted of Independent, objective assessnents of the safety aspects of specific systens of power stations for which construction or operating licenses were being considered. This report documents the work perfomed under all phases of the RGB safety atodies at OWL. Major incentives for developing BTCBs are the prospects for economi­ cally attractive power production, improved fuel utilisation, the potential for obtaining low environs*ntal insect at a diversity of sites, the potential for high-tenperature direct-cycle and process heat applications, and the pertinence of the consonant technology to OCFBa. lecognition of these Incentives has led to the developaent, construction, and operation of several experimental and prototype nuclear power plants based on gas-cooled reactora that utilise various configurations of fuel, soderator, and gaseous coolant. More recently a number of construction-permit applications were considered within the U.S. for large central-station power plants based on a particular HTGR concept being offered commercially by General Atonic Company (GA). Much of the work for the Safety Prograa has concerned the study and assessment of the safety of these plants, such am the Summit Station for Delasrva Power and Light Company, and of their systems and components. Although plans for these power stations have since bean cancelled for economic reasons, the original commitment on the pert of the utility companies and GA represented a conviction that ill BLANK PAGE /£ iv 1Kb can be operated with a high degree of reliability and without ansae risk to the health sad safety off the public. The RCft safety stadias have as their objective to docoaeat the assessaeat aad/or development of technology that will inset* appropriate levels of safety wader postalatad accideat coaditioaa that coald affect either on-site or off-site personnel. all tasks sad assessaeats for the safety stadias are coordinated closely with similar work at GA and at the Los Alanos Scientific Laboratory and Broakhavea Ratioaal Laboratory, as well aa with gas-cooled reactor development efforts in Europe. Slgaiflcaat efforts oa RGB. safety-related work are being carried oat at Da in west Geraany, and anch work was conducted and reported by the Dragon Project in England before closure of the Project in March 1976. Before its closme, HTGR safety inforaation was exchanged under the EkDn/Dragon HIC1 Agreeaent. CONTENTS FOREWORD iii SUMMIT xlii PART I. HTGR SAFETY STUDIES FOR CAS REACTOR SAFETY BRANCH OF THE DIVISION OF REACTOR RESEARCH AND DEVELOPMENT 1 1. SYSTEMS AND SAFETY ANALYSIS 3 1.1 PLANNING GUIDE FOR HTGR SAFETY AND SAFETY-RELATED RESEARCH AND DEVELOPMENT 4 1.2 HTGR CORE SUPPORT STRUCTURE 6 1.2.1 Procedure 9 1.2.2 Reliability Pilot Study ..... 10 1.3 CONSEQUENCES OF CORE SUPPORT STRUCTURE FAILURE IN HTGRs 13 1.3.1 Reactivity and Temperature Effects 13 1.3.2 Fission Product Effects Associated with Hypothetical Failure of Core Supports 18 1.3.2.1 Dose Effect of Increased Plant Release During Nonal Operation .... 19 1.3.2.2 Coolant Activity Increase 22 1.4 STEAM GENERATOR REVIEW 26 1.5 REFERENCES 30 2. FISSION PRODUCT TECHNOLOCi 33 2.1 ACCIDENT HAZARD POTENTIAL OF KEY NUCLIDES 33 2.2 IODINE ADSORPTIONS AND DESORPTION 37 2.3 ASSESSMENT OF CESIVM TRANSPORT PARAMETERS 39 2.4 REFERENCES 43 2. PRIMARY COOLANT TECHNOLOGY EFFECT OF STEAM CORROSION ON CORE POST STRENGTH LOSS: CASE OF LOW-LEVEL LONC-TERM IN LEAKAGE 45 v vi 3.1 OBJECTIVE Alt) METHOD 45 3.2 PREDICTED COOLANT IMPURITY COMPOSITIOHS 45 3.3 GBAPHITE STRENGTH LOSS DDE TO STEAM CORBOSIOII 49 3.4 PIEDICTED CORE POST BUBNDFFS AMD STRENGTH LOSS AT ERD OF REACTOR LIFE 51 3.5 REFERENCES 54 SEISMIC AND VIBRATION TECHNOLOGY PEELDflHARY ASSESSMENT OF THE GENERAL ATOMIC COMPANT CORE SEISMIC PROGRAM 57 4.1 SCOPE 57 4.2 PROBLEM DESCRIPTION 57 4.3 DESIGN CRITERIA 58 4.4 CORE ASSEMBLY 60 4.5 REACTOR VESSEL INTERNALS 62 4.6 REACTIVITY CONTROL SYSTEMS 64 4.7 EXPERIMENTAL PROGRAM 66 4.8 ANALYTICAL PROGRAM 72 4.9 SOMMART AND RECOMMENDATIONS 77 CONFINEMENT COMPONENTS — PCRV TECHNOLOGY ASSESSMENT STUDY 79 5.1 STATE-OF-ART INTWHATIOR REVIEW 79 5.1.1 Materials Characterization 79 5.1.2 General Design Philosophy . 80 5.1.3 Model Testing 80 5.1.4 New Materials Development 81 5.1.5 InstriaMntation 83 5.1.6 Liners ... .......... 83 5.2 REVIEW OF WORK IN PROGRESS , 84 5.2.1 PCRV Development in Germany, France, and England 84 vii 5.2.2 PCRV Concrete Materials Evaluation Studies 85 5.2.3 IIscussions at General Atomic Coapany ..... 87 5.2.4 Meeting of the ACRS High-Teaperature Gas-Cooled Reactor Subcommittee, Denver, Colorado, January 30-31, 1975 90 5.3 PCRV SAFETY ANALYSIS STUDIES 95 5.3.1 Analysis Method Selection and Refinement .... 95 5.3.2 Analysis of Ohbayashi-Guni Test Vessel 99 5.3.2.1 Description of Analytical Models ..... 99 5.3.2.2 Conclusions 104 5.4 REFERENCES 104 6. PRIMARY SYSTEM MATERIALS TECHNOLOGY 105 6.1 ASSESSMENT OF METALLIC MATERIALS TECHNOLOGY i3R HTGR PRIMARY SYSTEM AND CC3E SUPPORT STRUCTURES .... 105 6.2 ASSESSMENT OF MATERIALS IN HTGR REACTIVITY CONTROL AND SHIELDING COMPONENTS 109 6.3 ASSESSMENT OF CORE SUPPORT POST GRAPHITE Ill 6.4 REFERENCES 113 7. SAFETY INSTRUMENTATION 115 7.1 REACTOR TRIP SYSTEM 115 7.1.1 Logic and Actuation 115 7.1.2 Reactor Trip Inputs 119 7.2 CORE AUXILIARY COOLING SYSTEM (CACS) 123 7.3 STEAM GENERATOR ISOLATION AND DUMP SYSTEM 127 7.4 CAHE (HELIUM) ISOLATION 128 7.5 ORIFICE CONTROL SYSTEM 129 7.6 MOISTURE DETECTION IN HTGRs: PRESENT STATUS AND DEVELOPMENT NEEDS 130 viii 7.6.1 Requireaents 130 7.6.2 Operating Experience in Detecting Steam Generator Leaks in HTGRs 130 7.6.3 Comparison Among Methods of Hygrcaetry 133 7.6.3.1 Electrolytic Hygrometer . 133 7.6.3.2 Optical Dew-Point Hygroaeter 133 7.6.3.3 Infrared Detectors 134 7.6.3.4 Microwave Methods 134 7.6.3.5 Thermal Conductivity Sensor 135 7.6.3.6 Nuclear Magnetic Resonance (NMR) .... 135 7.6.3.7 Helium Afterglow Monitor 136 7.6.3.8 Other Methods 136 7.6.'* Summary and Recommendations for Developmental Work 137 7.7 BRIEF SUMMARY OF CONCLUSIONS AND RECOMMENDATIONS .... 138 7.7.1 Reactor Trip System 138 7.7.2 Core Auxiliary Cooling System 140 7.7.3 Steam Generator Isolation and Dump Systen .... 140 7.7.4 Core Auxiliary Heat Exchanger Isolation System 140 7.7.5 Moisture Detection in HTGRs 140 7.8 REFERENCES 141 ?ART II. HTGR Si*r£TY STUDIES FOR THE GAS-COOLED REACTORS BRANCH OF THE DIVISION OF REACTOR LICENSING, USNRC 143 8. ANALYSIS OF LOSS OF FORCED CONVECTIVF. COOLING ACCIDENT USING THE HEATUP CODE 145 8.1 DEVELOPMENT OF THE HEATUP COMPUTER CODE 145 8.2 THERMAL ANALYSIS OF LOFC ACCIDENT INVOLVING SUMMIT POWER STATION 146 ix 8.3 THERMAL ANALYSIS OF LOFC ACCIDENT INVOLVING FULTON GENERATING STATION 148 8.3.1 Results of Computations 148 8.3.2 Thermal Analysis Involving Age Dependence in Fuel 149 8.4 REFERENCES 151 DEVELOPMENT AND USE OF THE COUPLED CONDUCTION-CONVECTION MODEL FOR CORE THERMAL ANALYSIS 153 9.1 DEVELOPMENT OF THE COUPLED CO! OUCTION-CONVECTION MODEL 153 9.2 THERMAL ANALYSIS INVOLVING BLOCKED COOLANT CHANNEL AWAY FROM EDGE OF FUEL ELEMENT 154 9.3 THERMAL ANALYSIS INVOLVING BLOCKED COOLANT CHANNEL AT THE EDGE OF A FUEL ELEMENT 15? 9.4 RESULTS OF PARAMETRIC STUDIES IN THE HIGHEST POWERED REFUELING REGION 158 9.5 TEMPERATURE DISTRIBUTION IN THE HIGHEST-POWERED REFUELING REGION FOR A TOTALLY CLOSED ORIFICE CONDITION 159 9.6 THERMAL CALCULATIONS INVOLVING A RAPID DEPRESSURIZATION ACCIDENT FOR THE FORT ST. VRAIN HTGR 159 9.7 REFERENCES 161 . DEVELOPMENT OF THE MULTICHANNEL CONDUCTION-CONVECTION PROGRAM, HEXEREI 163 10.1 HEXEREI CODE 163 10.2 FLOW DISTRIBUTION ROUTINES 165 10.3 REFERENCES 166 . COOLING SYSTEM PERFORMANCE AFTER SHUTDOWN 167 11.1 COMPUTER PROGRAMS FOR CALCULATING CAHE PERFORMANCE 167 11.2 TRANSPORT PROPERTIES FOR CACHE 16S 11.3 CAHE HEAT TRANSFER PERFORMANCE CALCULATIONS 173 11.4 REFERENCES 174 X EVALUATION OF CIRCULATOR AND MOTOR FOR THE CACS 175 12.1 REFERENCES 176 DEVELOPMENT OF THE CORE AUXILIARY COOLING SYSTEM CALCULATION, ACREROHS 177 13.1 SUBROUTINE HELIX 178 13.2 SUBROUTINE TUBE 183 13.3 SUBROUTINE DELTPR 184 13.4 SUBROUTINE AEOLUS 185 13.5 INVESTIGATION OF DBDA FOR FULTON REACTOR 188 13.6 FORT ST.
Recommended publications
  • Tap Code 1 2 3 4 5 1 a B C D E 2 F G H I J 3 L M N O P 4 Q R S T U 5
    Solution to Kryptos 2: Challenge 1 The audio files indicate that the prisoners are communicating with each other by “tapping”. There are two distinct tapping sounds which indicate the two prisoners are exchanging some sort of information back and forth. Furthermore, unlike Morse Code, each audio file is made up of pairs of taps which leads one to believe that each pair of taps corresponds to a word or letter. The longest tapping sequence is five, so if one assumes that each tap-pair corresponds to a pair of integers between 1 and 5, then this code could encipher 25 items – most likely letters. At this point, one could try a frequency analysis to help identify which pairs of integers correspond to which letters. Alternatively, a little research might yield the “tap code” (see e.g. Wikipedia) which has been used by prisoners of war in various conflicts throughout history, most recently Vietnam. It is based on the Polybius square, some of which have slightly different arrangements of the 26 letters placed into 25 cells. Challenge 1 was based on the following key found on Wikipedia: Tap code 1 2 3 4 5 1 A B C D E 2 F G H I J 3 L M N O P 4 Q R S T U 5 V W X Y Z The tap code table This has all letters except “K”, so “C” is used instead. The letter “X” is used to separate sentences. The first audio file begins with the following tap-pairs: (2,4), (4,3), (1,3), (3,4), (5,1), (1,5), (4,2),… which yields the following plaintext: i, s, c, o, v, e, r, … By adding in the likely punctuation, the complete conversation can be decoded: PLAINTEXT Prisoner 1: Is cover intact? Prisoner 2: Yes.
    [Show full text]
  • Jan. 2012 Issue
    AmateurAmateur AA RR SS SocietySociety NewsNews Newsletter of The Amateur Radio Society of India (Member of IARU) English / Hindi Quarterly Volume I Issue 7 KARBIL/2009/38494 Jan. 2012 Price : Rs.10/- President’s message From the Editor’s desk Dear members all of us active hams are looking at Most of us were privileged to be a part learning more about. Here's wishing you all a HAPPY of Hamfest 2011 which was held in ARSI applied for and obtained special NEW YEAR 2012. More and more Kochi. It was an extremely well suffix for use by all Indian hams in amateurs are showing interest in organised and coordinated event with a commemoration of India's first HUGE gathering of hams and SWL's Formula 1 race meet at Greater Noida. working Satellites, so I have all having a chance to have an eyeball Many hams took an active part in the included a list of operational with their old friends and make new effort in running this most prestigious satellites along with the details. ones. The location and facilities were event. really great. Band conditions seems to be The propagation on the HF bands is improving – I expect a lot of activity The display and sales areas were just picking up nicely and we can hear and this year resulting in more news and like a major exhibition and there was work stations worldwide after a gap of space to move around and see what one some months. reports for me to include in the could pick up for homebrew efforts and newsletter, Hi Please send articles, augment one's shack.
    [Show full text]
  • On the Subject of Odd One Out
    Keep Talking and Nobody Explodes Mod Odd One Out On the Subject of Odd One Out One of these things is not like the others! One of these things just doesn’t belong! There are six buttons on the module which may display a variety of things directly on the button or in the display whilst hovering over a button. Five of the buttons, referred to below as the “good buttons”, satisfy a specific property which is described in the table below. Press the button that doesn’t belong — the “odd one out” — to move on to the next stage. The current stage is indicated by LEDs at the top of the module. Once 5 stages have been completed, press the button that has had the correct answer a unique number of times to disarm the module. You may long-press any button to reset the module back to stage 1. Display set Instructions Depending on the color of the LED to the right of the display: Red LED: The good buttons form a sequence of letters with equal distance in the alphabet, wrapping around from Z back to A. Yellow LED: The good buttons, when read in reading order, form a five-letter English word that is encoded using Atbash cipher. In this cipher, A↔Z, B↔Y, C↔X, etc. Green LED: The good buttons, when read in reading order, form a five-letter English word that is encoded using ROT13. In this Letters cipher, A↔N, B↔O, C↔P, etc. Turquoise LED: The good buttons have letters whose Morse code begins with the same two symbols.
    [Show full text]
  • Inferences from Interactions with Smart Devices: Security Leaks and Defenses
    Syracuse University SURFACE Dissertations - ALL SURFACE August 2019 Inferences from Interactions with Smart Devices: Security Leaks and Defenses Diksha Shukla Syracuse University Follow this and additional works at: https://surface.syr.edu/etd Part of the Engineering Commons Recommended Citation Shukla, Diksha, "Inferences from Interactions with Smart Devices: Security Leaks and Defenses" (2019). Dissertations - ALL. 1060. https://surface.syr.edu/etd/1060 This Dissertation is brought to you for free and open access by the SURFACE at SURFACE. It has been accepted for inclusion in Dissertations - ALL by an authorized administrator of SURFACE. For more information, please contact [email protected]. ABSTRACT We unlock our smart devices such as smartphone several times every day using a pin, password, or graphical pattern if the device is secured by one. The scope and usage of smart devices’ are expanding day by day in our everyday life and hence the need to make them more secure. In the near future, we may need to authenticate ourselves on emerging smart devices such as electronic doors, exercise equipment, power tools, medical devices, and smart TV remote control. While recent research focuses on developing new behavior-based methods to authenticate these smart devices, pin and password still remain primary methods to authenticate a user on a device. Although the recent research exposes the observation-based vulnerabilities, the popular belief is that the direct observation attacks can be thwarted by simple methods that obscure the attacker’s view of the input console (or screen). In this dissertation, we study the users’ hand movement pattern while they type on their smart devices.
    [Show full text]
  • A Wire‑Tap Approach to Enhance Security in Communication Systems Using the Encoding‑Encryption Paradigm
    This document is downloaded from DR‑NTU (https://dr.ntu.edu.sg) Nanyang Technological University, Singapore. A wire‑tap approach to enhance security in communication systems using the encoding‑encryption paradigm Mihaljevic, Miodrag; Oggier, Frederique 2010 Mihaljevic, M. & Oggier, F. (2010). A wire‑tap approach to enhance security in communication systems using the encoding‑encryption paradigm. Information and Coding Theory Workshop, International Conference on Telecommunications (ICT) 2010. https://hdl.handle.net/10356/93759 Downloaded on 28 Sep 2021 14:24:25 SGT A Wire-tap Approach to Enhance Security in Communication Systems using the Encoding-Encryption Paradigm Miodrag Mihaljevic´ Fred´ erique´ Oggier Mathematical Institute Division of Mathematical Sciences Serbian Academy of Sciences and Arts, Belgrade, Serbia School of Physical and Mathematical Sciences and Research Center for Information Security (RCIS) Nanyang Technological University Institute of Advanced Industrial Science and Technology (AIST), Singapore Tokyo, Japan Email: [email protected] Email:[email protected] Abstract—Motivated by the GSM system, we consider com- the redundant data from the cryptographic security point of munication systems which employ the encoding-encryption view has been pointed out even in [6] where the cryptography paradigm of first encoding the data before encrypting it for as a scientific topic has been established. Performing error- transmission. We add one level of security to the existing system designs by introducing a wiretap encoder. We analyze the security correction coding of a message before encryption introduces a from an information theoretical point of view, and prove the structured redundancy, which could be an origin for mounting enhanced security of the proposed scheme, focusing on the certain attacks against the employed keystream generator.
    [Show full text]
  • On the Subject of Seven Choose Four
    Keep Talking and Nobody Explodes Mod Seven Choose Four On the Subject of Seven Choose Four Pomelo colors? Pomelo colors! This module consists of four pink buttons, each with a flashing LED next to them. Tips to Success Successfully: In order to solve this module, you must submit four 4-digit codes in sequence. There are 4 possible type of flashes: Morse Code, Tap Code, a sequence of colors, and a number of long flashes between 1 and 7. The morse code and tap codes are deciphered in the usual way. NOTE: Always use C instead of K if the received tap code is 13. The sequence of colors will flash 5 different color. The number of long flashes corresponds to the position of this list below: R G B M C Y W Start from the LED which lights a sequence of colors, take the sequence of the colors and refer to the table below: Position Description 1 Color operator for Stage 1 2 Color operator for Stage 2 3 Color operator for Stage 3 4 Color operator for Stage 4 5 Input for Stage 1 (First letter of the color) The inputs for subsequent stages are based on the position of the LED which lights a sequence of colors, where remaining inputs continue from the its location downward, wrapping around as necessary. The instructions to determine the 4-digit code for each color operator can be found below. NOTE: When entering the code, shift down by N times, wrapping around as necessary, where N = (Current stage number - 1).
    [Show full text]
  • Les Codes Secrets Décryptés
    Les codes secrets décryptés 3ème édition corrigée et augmentée Didier Müller Nymphomath Éditions Contact : [email protected] © Nymphomath Éditions, 2018-2020 version 3.0 : 9 septembre 2018 version 3.2 : 13 décembre 2020 ISBN 978-2-8399-2485-6 À Pierre Baud « It may be roundly asserted that human ingenuity cannot concoct a cipher which human ingenuity cannot resolve... » « On peut affirmer que l'ingéniosité humaine ne peut pas élaborer un chiffre que l'ingéniosité humaine ne peut résoudre... » Edgar Allan Poe A Few Words on Secret Writing, 1841. Avant-propos AVANT-PROPOS La cryptologie, plus communément appelée la science des codes secrets, est à la fois une science et un art. C'est une science, car elle fait appel aux mathématiques et à l'informatique, que ce soit pour chiffrer des messages ou pour les décrypter. La cryptologie est aussi un art, car elle fait appel aux talents d'intuition, d'imagination et d'invention du décrypteur, ces facultés étant elles-mêmes secondées par des connaissances linguistiques approfondies. Je voulais écrire un livre qui s'inscrirait dans la ligne de ceux des grands cryptologues du 20 ème siècle : Baudouin, Friedman, Givierge, Langie, Sacco, Fouché Gaines, Sinkov, et quelques autres. Leurs livres ne se contentaient pas de présenter des systèmes de chiffrement, ils montraient aussi leurs faiblesses et comment les décrypter. Je vous invite donc à un voyage dans le temps, depuis l'Antiquité jusqu'à nos jours, où vous découvrirez les systèmes de chiffrement qui ont marqué leur époque. Nous regarderons plus d'une centaine de chiffres, la plupart ne demandant que du papier et un crayon.
    [Show full text]
  • Perception and Action Planning
    EUROPEANJOURNAL OF COGNITIVE PSYCHOLOGY, 1997, 9 (2), 129± 154 Perception and Action Planning Wolfgang Prinz Max-Planck-Institute for Psychological Research and Institute for Psychology, University of Munich, Munich, Germany A new framework for the understanding of functional relationships between perception and action is discussed. According to this framework, perceived events and planned actions share a common representational domain (common-coding approach). Supporting evidence from two classes of experimental paradigms is presented: induction paradigms and interference paradigms. Induction paradigms study how certain stimuli induce certain actions by virtue of similarity. Evidence from two types of induction tasks is reviewed: sensorimotor synchronisation and spatial compatibility tasks. Interference paradigms study the mutual interference between the perception of ongoing events and the preparation and control of ongoing action. Again, evidence from two types of such tasks is reviewed, implying interfer- ence in either direction. It is concluded that the evidence available supports the common coding principle. A further general principle emerging from these studies is the action e ect principleÐ that is, the principle that cogni- tive representations of action e ects play a critical role in the planning and control of these actions. INTRODUCTION In this paper, I present a framework for understanding some aspects of the functional relationships between perception and action. It is mainly a framework for action control and action planning, but to some extent it is a framework for perception as well. Its core contention is that Downloaded by [University of Arizona] at 05:18 24 December 2012 perceived events and planned actions share a common representational domain.
    [Show full text]
  • Information Theoretic Secrecy for Some Multiuser Wireless
    The Pennsylvania State University The Graduate School College of Engineering INFORMATION THEORETIC SECRECY FOR SOME MULTIUSER WIRELESS COMMUNICATION CHANNELS A Dissertation in Electrical Engineering by Ender Tekin c 2008 Ender Tekin Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy August 2008 The dissertation of Ender Tekin was reviewed and approved∗ by the following: Aylin Yener Associate Professor of Electrical Engineering Dissertation Adviser Chair of Committee David J. Miller Associate Professor of Electrical Engineering John F. Doherty Professor of Electrical Engineering Guohong Cao Associate Professor of Computer Science W. Kenneth Jenkins Professor of Electrical Engineering Head of the Department of Electrical Engineering ∗Signatures are on file in the Graduate School. iii Abstract The widespread use of multiuser wireless communications has been raising the demand for higher data rates and until now that has been the main design focus in wireless systems. This design focus, however, neglects the critical issue of communications security inherent in wireless systems that present a channel that is very easy for people of criminal intent to tap. Existing approaches leave this important issue to the higher layers of the protocol hierarchies, yet the need to deal with it in lower layers is imminent as the security of many cryptographic algorithms is hard to evaluate and has caused disappointment in the past. In addition, there is rising interest in large networks of low-complexity transmitters such as sensor nodes and RF-ID tags that do not have room for complicated and computationally intensive cryptographic algo- rithms. Historically, communication secrecy has been evaluated using one of two approaches: information theory or computational complexity.
    [Show full text]
  • Computer and Data Security Class 4 ﺳﻜﻴﻨﺔ ﺣﺴﻦ هﺎﺷﻢ . د: أﺳﺘﺎذة اﻟﻤﺎدة
    Save from: www.uotechnology.edu.iq/dep‐cs Computer and Data security 4th Class أﺳﺘﺎذة اﻟﻤﺎدة: د. ﺳﻜﻴﻨﺔ ﺣﺴﻦ هﺎﺷﻢ Introduction to Data Security Basic Terminology Suppose that someone wants to send a message to a receiver, and wants to be sure that no-one else can read the message. However, there is the possibility that someone else opens the letter or hears the electronic communication. In cryptographic terminology, the message is called plaintext or cleartext. Encoding the contents of the message in such a way that hides its contents from outsiders is called encryption. The encrypted message is called the ciphertext. The process of retrieving the plaintext from the ciphertext is called decryption. Encryption and decryption usually make use of a key, and the coding method is such that decryption can be performed only by knowing the proper key. Cryptography is the art or science of keeping messages secret. Cryptanalysis is the art of breaking ciphers, i.e. retrieving the plaintext without knowing the proper key. People who do cryptography are cryptographers, and practitioners of cryptanalysis are cryptanalysts. Cryptography deals with all aspects of secure messaging, authentication, digital signatures, electronic money, and other applications. Cryptology is the branch of mathematics that studies the mathematical foundations of cryptographic methods. Basic Cryptographic Algorithms A method of encryption and decryption is called a cipher. Some cryptographic methods rely on the secrecy of the algorithms; such algorithms are only of historical interest and are not adequate for real-world needs. All modern algorithms 1 use a key to control encryption and decryption; a message can be decrypted only if the key matches the encryption key.
    [Show full text]
  • Enhanced Packet Delivery Techniques Using Crypto-Logic Riddle on Jamming Attacks for Wireless Communication Medium
    International Journal of Latest Trends in Engineering and Technology (IJLTET) Enhanced Packet Delivery Techniques Using Crypto-Logic Riddle on Jamming Attacks for Wireless Communication Medium O.S.C Kesavulu Assistant Professor, Department of M.C.A., St.Ann’s College of Engineering and Technology, Chirala, Prakasam(dt), Andhra Pradesh, India B.B.V. Satya Vara Prasad Associate Professor, Department of M.C.A., St.Ann’s College of Engineering and Technology, Chirala, Prakasam(dt), Andhra Pradesh, India Y. Srinivasa Rao Assistant Professor, Department of M.C.A., St.Ann’s College of Engineering and Technology, Chirala, Prakasam(dt), Andhra Pradesh, India Abstract - In this paper, we address the problem of jamming under an internal threat model. We discuss about Swift jamming attacks in wireless networks. We present a challenger model for selective jamming attacks, which may give to the high importance for packet Delivery Techniques. in which specific messages of “high importance” are targeted We illustrate the impact of selective jamming on the network performance by illustrating various selective attacks against the TCP protocol. We show that such attacks can be launched by performing real-time packet classification at the physical layer. We examine the combination of cryptographic primitives with physical layer attributes for preventing real-time packet classification and neutralizing the inside knowledge of the attacker. This intentional interference with wireless transmissions can be used as a launch pad for mounting Denial-of-Service attacks on wireless networks. Typically, jamming has been addressed under an external threat model. we develop three schemes that prevent real-time packet classification by combining cryptographic primitives with physical-layer attributes.
    [Show full text]
  • SUNY Delhi Financial Aid
    SUNY Delhi Financial Aid The Process Obtain a FSA ID for student and one parent at https://fsaid.ed.gov (opens new window). How to apply for a FSA ID Keep FSA IDs in a safe place. Use FSA IDs as electronic signatures on the FAFSA and other aid applications. File the FAFSA on the Web (opens a new window) as soon after Jan. 1st as possible. Filing online is highly recommended. It speeds the aid process. Questions? Click here for "7 Easy Steps to the FAFSA." For a paper FAFSA call 1-800-4FEDAID. SUNY Delhi does not have paper FAFSAs List SUNY Delhi on your FAFSA. Our Federal school code is 002857. Complete a Tuition Assistance Program (TAP) application (New York State residents only) at https://www.tapweb.org. Be sure to list the correct SUNY Delhi's TAP code: 3020 for certificate and associate degree programs 6020 for bachelor's degrees. Review your financial aid awards on the Bronco Web. SUNY Delhi will send you all forms, applications, and instructions needed to complete your aid, including student and parent loans. Read and follow all directions carefully. Respond promptly to all requests from SUNY Delhi for additional information. Use http://www.hesc.ny.gov to check the status of your TAP awards. Use www.studentloans.gov to check the status of your federal direct loans. Track your progress using the Financial Aid Checklist (Adobe Acrobat Reader required) Contact us if you have questions: 1-800-96-DELHI, 1-607-746-4570 or [email protected] .
    [Show full text]