Architectural Approaches to Network and Service Access Authentication Marcin Dabrowski Piotr Pacyna

Total Page:16

File Type:pdf, Size:1020Kb

Architectural Approaches to Network and Service Access Authentication Marcin Dabrowski Piotr Pacyna Feature Articles: Communications & Information Security Contents Feature Articles: Communications & Information Security 4 Architectural Approaches to Network and Service Access Authentication Marcin Dabrowski Piotr Pacyna 17 Analysis of Security Vulnerabilities and Countermeasures of Ethernet Passive Optical Network (EPON) Di Jin, Stamatios V. Kartalopoulos, Pramode K. Verma 30 Analysis on the Resilience of Key Pre-distribution in Sensor Networks Shen Yulong Ma Jianfeng Pei Qingqi 38 Hierarchical Spectrum Sharing Networks Jie Chen, Chuan Han, Chulin Liao, and Shaoqian Li 48 Security Measures Against CBRN Threats: Case Study Olympic Games P. Stavroulakis, Professor 54 Customized Biometric Architecture for Access Control in Stadiums based on Federated Identities Christos K. Dimitriadis, Peter Stavroulakis, D. Polemi 63 Simulation of Propagation Loss Models and Antenna Designs for Naval Troposcatter and Tropo spheric Duct Communications Nikos J. Farsaris, Prof. Peter P. Stavroulakis 69 Chaos-based Applications in Secure Optical Communications A. Argyris, A.Bogris and D. Syvridis 79 PIM Interference Analysis under Multi-band Multi-signal Input in Duplex Indoor Distribution System Pauling Huang, Wang Baohua , Senior Engineer, China Unicom China Communications June 2007 3 Feature Articles:FEATURE Communications & Information ARTICLES Security Architectural Approaches to Network and Service Access Authentication Marcin Dabrowski1 , Piotr Pacyna1,2 , 1 AGH University of Science and Technology, Poland, [email protected] 2 Universidad Carlos III de Madrid, Spain, [email protected] ABSTRACT governmental organizations and in public access networks. The success of the radio access networks Authentication is the first step, of central importance, is attributed to their high usability, flexibility, cost- for access control and for security protection in radio efficiency and especially to the unrestricted commu- access networks. A general model for authentication nications capability. Multiple radio access technolo- was adopted from fixed networks and applied to the gies favor competitiveness, accelerate progress in wireless world. However, the differences in the the field and propel the wireless industry. operational environment between the fixed and the Diversity has led to heterogeneity, with the side wireless world, heterogeneity of the radio communi- effect of a burden with inter-working between tech- cations systems, new trends in service provisioning, nologies and systems. Many challenges of inter- emerging business models and performance require- working are characteristic of a particular network ments raise the need to revisit the original require- setup, the technologies in use and the services under ments for authentication systems and to come up deployment. Some of them, however, are common to with schemes that better suit current needs. In this all installations. Specifically, in all the systems the review paper we discuss authentication in single- network infrastructure and the services need to be hop radio access networks by characterizing the protected against misuse. Authentication is the first current as well as the emerging authentication step, of central importance, in network and service schemes. access control and in security protection. This re- Key words: authentication, access control, wire- view paper studies the current and the emerging less networks, next-generation Internet approaches to authentication in single-hop radio access networks. I. INTRODUCTION II. SCOPE OF AUTHENTICATION In recent years, the wireless access networks have received broadband capabilities and have become Authentication allows to proove identity of a available for residential and institutional users. Broad- subject-a user, a system or a device-by verifying band radio access networks have been under deploy- credentials which are presented by the subject. The ment in enterprises, campuses, public institutions, subject is referred to by means of an identifier - some 4 China Communications June 2007 Feature Articles: Communications & Information Security naming convention, such as true name, a pseudonym New requirements for authentication in the wire- or, in an indirect way, by means of identifier of a less access networks are mainly related to user device owned by the subject, which allows for the so mobility, which is defined as the ability to change called user- or device authentication schemes. The point of attachment in a network. A physical change authentication is performed by a verifier in a uni- of the attachment due to a movement can also imply directional authentication or by both parties when a logical change of location in the network topology involved in the mutual authentication process. The or a change of the network operator, known as intra- subject and the verifier may have come across each domain and inter-domain handoff, respectively. A other before, but they needn’t necessarily have had a default requirement of almost any mobility scenario relationship at any time before. is continuous reachability of a mobile user. The Verification of the credentials submitted in the ability to sustain previously established sessions in process is conducted with support of trusted entities, spite of the movement, preferably with little or no such as e.g. authentication servers, which maintain a impact on session continuity, is another requirement. binding between the credentials and the subject and In the new context defined by mobility, a few are in a position to ascertain at any time validity of essential technology requirements need to be taken the binding. to account with respect to an authentication system: Authentication serves secure bootstrapping of net- 1) In systems which are supporting mobility, the work attachment, as a part of an access control users are ‘always on’ the network and may own process aimed to prevent service theft by unautho- multi-mode capable devices. With such diversity, rized individuals, impersonation of legitimate users the authentication systems need to be particularly also known as the identity theft. robust, scaleable and resilient to attacks. Methods Although a general model for authentication in of various complexity must be supported and the radio access networks was adopted from fixed system must be extensible for the emerging copper-wire access and cable networks, and next authentication methods. applied to the wireless world, some methods have 2) Mobile users prefer to be involved in a few been devised specifically for the wireless networks. business, relationships, preferably only with an These new methods are evolving due to signifi- operator in their home area. Multiple business cant differences of the operational environment relationships are either troublesome for users and between the fixed and the wireless world and due hence disfavoured or, simply unfeasible because to changing threat models when new forms of of random roaming patterns. attacks are discovered. 3) The employed authentication system must not overly depend on the mobility management A. New requirements for the wireless en- scheme or type of re-addressing used to support vironment mobility. 4) In open access systems, where multi-access tech Successful authentication establishes a trust rela- nologies are used, the necessity for frequent tionship between the subject and the verifier (also re-authentication, likely at every handoff, is known as the authenticator). The trust can be uni- or required. Also, small cell sizes, typical of some bi-directional, symmetric or asymmetric depending wireless technologies, imply short visiting times on the type and strength of the employed authentica- and quite frequent intra-domain handoffs. Low tion method. It is represented by unidirectional secu- protocol overhead and low overall latency of the rity association(s) which define a ciphersuite and authentication process is an advantage. cryptographic keying material used for subsequent 5) Delay sensitive application, in particular conver protection of communications on the wireless link. sational services, leave little tolerance margins China Communications June 2007 5 Feature Articles: Communications & Information Security for re-authentication during handoff. The new requirements. On the contrary, existence of requirement for voice call continuity favors large install base of authentication systems used so low-latency re-authentication and make-before- far, calls for incremental upgrades to build upon the brake authentication (pre-authentication), so that existing infrastructure and experience. Today, new the latency does not add to handover latency. requirements for authentication are diffusing the New business models are also expected to change well established methods. service provisioning. In particular: In the following sections we present recent ad- 6) Deregulation of the markets allows for market vances in network access authentication. In order to fragmentation. Pre-established security associations make the text comprehensive we begin with a revi- between a customer and the serving network will sion of legacy methods for better presentation of the differences in the new methods. be rare due to continuous roaming of users. 7) Wireless or cellular network service providers with disproportionate geographical coverage will III. AUTHENTICATION IN WIRELINE exist in the future, so that inter-domain handoffs NETWORKS will be more frequent than so far. Authentication should be robust also where roaming agreements Extensible
Recommended publications
  • Ii' C Aeronautical Engineering Aeron ^Al Engineering Aeronautical Er Lautical Engineering Aeronautic Aeronautical Engineering Ae
    ft • f^^m Jt Aeronautical NASA SP-7037(145) \\ I/%%i/\ Engineering February 1982 eg ^VV ^^•Pv % A Continuin9 Bibliography with Indexes National Aeronautics and Space Administration i' c Aeronautica• ^ l Engineerin•• ^^ • ^"— *g ^^ Aero* n (NASA-SP-7037 (1U5) ) AERONAUTICAL N82-21138 •^I ENGINEERING. A CONTINUING BIBLIOGRAPHY WITH _ ^NDEXFS (National Aeronautics and Space \ p^^^il Administration) 100 p HC $5.00 CSCL 01A ^al Engineering Aeronautical Er lautical Engineering Aeronautic Aeronautical Engineering Aeror sring Aeronautical Engineering ngineering Aeronautical Engine :al Engineering Aeronautical Er lautical Engineering Aeronauts Aeronautical Engineering Aeror 3ring Aeronautical Engineering NASASP-7037(145) AERONAUTICAL ENGINEERING A CONTINUING BIBLIOGRAPHY WITH INDEXES (Supplement 145) A selection of annotated references to unclassified reports and journal articles that were introduced into the NASA scientific and technical information sys- tem and announced in January 1982 in • Scientific and Technical Aerospace-Reports (STAR) • International Aerospace Abstracts (IAA). Scientific and Technical Information Branch 1982 National Aeronautics and Space Administration Washington, DC This supplement is available as NTISUB/141/093 from .the National Technical Information Service (NTIS), Springfield, Virginia 22161 at the price of $5.00 domestic; $10.00 foreign. INTRODUCTION Under the terms of an interagency agreement with the Federal Aviation Administration this publication has been prepared by the National Aeronautics and Space Administration for the joint use of both agencies and the scientific and technical community concerned with the field of aeronautical engineering. The first issue of this bibliography was published in September 1970 and the first supplement in January 1971. This supplement to Aeronautical Engineering -- A Continuing Bibliography (NASA SP- 7037) lists 326 reports, journal articles, and other documents originally announced in January 1982 in Scientific and Technical Aerospace Reports (STAR) or in International Aerospace Abstracts (IAA).
    [Show full text]
  • Information-Based Complexity of Uncertainty Sets in Feedback Control Le Yi Wang and Lin Lin, Member, IEEE
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 46, NO. 4, APRIL 2001 519 Information-Based Complexity of Uncertainty Sets in Feedback Control Le Yi Wang and Lin Lin, Member, IEEE Abstract—In this paper, a notion of information-based in this paper to characterize complexity of an uncertainty set can complexity is introduced to characterize complexities of plant be illustrated in the following example. uncertainty sets in feedback control settings, and to understand relationships between identification and feedback control in dealing with uncertainty. This new complexity measure extends A. Illustrative Examples the Kolmogorov entropy to problems involving information Example 1: A device’s dynamic behavior varies signifi- acquisition (identification) and processing (control), and provides cantly with the altitude where it is installed. The installer of a tangible measure of “difficulty” of an uncertainty set of plants. In the special cases of robust stabilization for systems with either the device is supposed to input the value , and then a pre- gain uncertainty or unstructured additive uncertainty, the com- designed controller suitable for that is automatically selected plexity measures are explicitly derived. for implementation. Suppose that the total range of altitude is Index Terms—Complexity, feedback, identification, informa- . is equipped with a metric, namely, the tion, metric robustness, uncertainty. absolute value . Assume that the best controllers can provide robust stability and performance only for a range of uncertainty on of length . is a metric measure of optimal robustness of I. INTRODUCTION controllers. The question is: How many robust controllers must N THIS PAPER, a notion of information-based complexity, be predesigned and stored in the system computer? Let be I termed as control complexity, is introduced to characterize the minimum number of such controllers.
    [Show full text]
  • Critical Survey of Approaches to EWR Target Tracking: Endorsing Use of an EKF’S Structure Thomas H
    IEEE TRANSACTIONS ON AEROSPACE AND ELECTRONIC SYSTEMS, VOL. 6, NO. 12, JUNE 2018 1 Critical Survey of Approaches to EWR Target Tracking: endorsing use of an EKF’s structure Thomas H. Kerr III, Ph.D., Life Senior, IEEE, Assoc. Fellow, AIAA, Member ION & Life NDIA Abstract—New methodologies for target tracking and for can be incurred). Among the first cogent modern treatments evaluating its efficacy have recently emerged, all potentially of Reentry Vehicle (RV) target modeling for radar target being a “magic bullet”. The questionable accuracy benefits, tracking were1 [290]-[292], [59]-[61] (and, afterwards, quickly missing rigor (in some cases), and definitely large CPU-time computer loading drawbacks of the new estimation approaches followed by several others [62], [293]-[295]). are discussed as compared to conventional Extended Kalman Filters (EKF’s) and the novel Batch Maximum Likelihood Least Squares algorithm, as the well-known previous candidates for use in land-based Early Warning Radar (EWR) target tracking. A reminder is that the existing 40 year old Cramer-Rao lower bound evaluation methodology is already rigorous and adequate for evaluating target tracking efficacy in Pd < 1 situations when confined to exo-atmospheric target tracking, as arises in EWR for NMD/GMD. We also discuss the more challenging and Fig. 1. Gating after each incremental EKF output enables MTT associations numerically sensitive angle-only filter methodologies, needed to handle target tracking when enemy escort jamming denies radar EKF’s are typically used for tracking the target state in a range measurements and impedes target tracking unless two or ballistic trajectory; but over the last 30+ years, some form more radars cooperatively triangulate synchronously to thereby of nonlinear batch least squares (BLS) algorithm has also enable joint tracking of enemy jammers within the tight target threat complex.
    [Show full text]
  • Weighted Sensitivity Minimization for Delay Systems S&)= W(S)(L +Po(S)C(S))-L
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. AC-31. NO. 8, AUGUST 1986 763 case reduces to simple Nevanlinna-Pick interpolation, the weighted case turns out to be much more complicated and demands certain functional- analytic techniques for its solution. NOMENCLATURE open unit disk closed unit disk unit circle open right half plane closed right half plane RU {m} the standard Hardy p-space (1 5 p 5 01) on X where X = D or H. (See [2] or [15] for details.) We will also use some Fig. 1. Maximum sample time for global %-holdability in X. elementary facts about LP-spaces. Again see [2] or [15] for details,Finally, if u E Ha(X) is an inner function, then and the holding set be given by @(X) e u@(X) will denote the orthogonal complement of uH*(X) in @(X). X={(xI, XZ) : Ix’+x215R, lxl-x211R, RZO). For a given value of R, it was determined from Theorem 1 that the I. INTRODUCTION discrete-time system is globally QD-holdable in X if the sample time T Since the paper of Zames [16], there has been much literature on satisfies T T,,,. If T T,,, the discrete-time system is not globally 5 > weighted Ha-sensitivity minimization in control (see [6] for an extensive QD-holdablein X. Fig. 1 gives some values of and the corresponding R list of references). In the papers [l], [7], [9] explicit algorithms are values of TmLx.Note that as T,, decreases, R increases. Hence, the size derived for computing the optimal sensitivity and controllers for LTI of the set in which the system is globally QD-holdableis dependent on the finitedimensional systems.
    [Show full text]
  • Local-Global Double Algebras for Slow H- Adaptation: Part 11- Optimization of Stable Plants Le Y
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 36, NO. 2, FEBRUARY 1991 143 Local-Global Double Algebras for Slow H- Adaptation: Part 11- Optimization of Stable Plants Le Y. Wang, Member, IEEE, and George Zames, Fellow, IEEE Aktruct-In this two-part paper, a common algebraic framework is In this section, the double algebra will be E,, with local norm introduced for the frozen-time analysis of stability and H" optimiza- PJ.) and global norm It II(l(,). tion in slowly timevarying systems, based on the notion of a normed Suppose that W,,W, E IS, represent two weightings, and algebra on which local and global products are defined. Relations E represents a strictly causal plant. It is standard that between local stability, local (near) optimality, local coprime factoriza- G E, tion, and global versions of these properties are sought. feedbacks which are globally stabilizing in IS,, i.e., maintain all The framework is valid for time-domain disturbances in I". H"-be- closed-loop operators in E ,, can be parametrized by a compen- havior is related to I" input-output behavior via the device of an sator QEE, which gives a sensitivity (I- GQ),and a approximate isometry between frequency and time-domain norms. weighted sensitivity S E , In Part 1, some of the main features of normed double algebras were introduced. S = - Part 11 establishes an explicit formula linking global and local sensitiv- W,(Z GQ)W,. (2.1) ity for systems with stable plants, where local sensitivity is a Lipschitz- continuous function of data. Frequencydomain estimates of time-do- Denote W,G by G, and suppose that it has a local factoriza- main sensitivity norms, which become accurate as rates of time variation tion approach zero, are obtained.
    [Show full text]
  • Reading Counts
    Title Author Reading Level Sorted Alphabetically by Author's First Name Barn, The Avi 5.8 Oedipus The King (Knox) Sophocles 9 Enciclopedia Visual: El pla... A. Alessandrello 6 Party Line A. Bates 3.5 Green Eyes A. Birnbaum 2.2 Charlotte's Rose A. E. Cannon 3.7 Amazing Gracie A. E. Cannon 4.1 Shadow Brothers, The A. E. Cannon 5.5 Cal Cameron By Day, Spiderman A. E. Cannon 5.9 Four Feathers, The A. E. W. Mason 9 Guess Where You're Going... A. F. Bauman 2.5 Minu, yo soy de la India A. Farjas 3 Cat-Dogs, The A. Finnis 5.5 Who Is Tapping At My Window? A. G. Deming 1.5 Infancia animal A. Ganeri 2 camellos tienen joroba, Los A. Ganeri 4 Me pregunto-el mar es salado A. Ganeri 4.3 Comportamiento animal A. Ganeri 6 Lenguaje animal A. Ganeri 7 vida (origen y evolución), La A. Garassino 7.9 Takao, yo soy de Japón A. Gasol Trullols 6.9 monstruo y la bibliotecaria A. Gómez Cerdá 4.5 Podría haber sido peor A. H. Benjamin 1.2 Little Mouse...Big Red Apple A. H. Benjamin 2.3 What If? A. H. Benjamin 2.5 What's So Funny? (FX) A. J. Whittier 1.8 Worth A. LaFaye 5 Edith Shay A. LaFaye 7.1 abuelita aventurera, La A. M. Machado 2.9 saltamontes verde, El A. M. Matute 7.1 Wanted: Best Friend A. M. Monson 2.8 Secret Of Sanctuary Island A. M. Monson 4.9 Deer Stand A.
    [Show full text]
  • PERFORMING HYSTERIA Contemporary Images and Imaginations of Hysteria PERFORMING HYSTERIA PERFORMING HYSTERIA CONTEMPORARY IMAGES and IMAGINATIONS of HYSTERIA
    PERFORMING HYSTERIA Contemporary Images and Imaginations of Hysteria PERFORMING HYSTERIA PERFORMING HYSTERIA CONTEMPORARY IMAGES AND IMAGINATIONS OF HYSTERIA EDITED BY JOHANNA BRAUN Leuven University Press Published with the support of the KU Leuven Fund for Fair Open Access and funded by the Austrian Science Fund (FWF) as part of the Erwin Schrödinger research project “The Hysteric as Conceptual Operator”: [J 4164-G24]. Published in 2020 by Leuven University Press / Presses Universitaires de Louvain / Universitaire Pers Leuven. Minderbroedersstraat 4, B-3000 Leuven (Belgium). © Selection and editorial matter: Johanna Braun, 2020 © Individual chapters: the respective authors, 2020 This book is published under a Creative Commons Attribution Non-Commercial 4.0 Licence. Further details about Creative Commons licenses are available at h t t p : // creativecommons.org/licenses/ Attribution should include the following information: Johanna Braun (ed.), Performing Hysteria: Contemporary Images and Imaginations of Hysteria. Leuven, Leuven University Press. (CC BY-NC- 4.0) ISBN 978 94 6270 211 0 (Paperback) ISBN 978 94 6166 313 9 (ePDF) ISBN 978 94 6166 314 6 (ePUB) https://doi.org/10.11116/9789461663139 D/2020/1869/1 NUR: 670, 612, 757 Layout: Coco Bookmedia, Amersfoort Cover design: Daniel Benneworth-Gray Cover illustrations: left: J. Babinski, ‘Contracture hysterique’ 1891. right: detail from Three photos in a series showing a hysterical woman yawning. Photograph c.1890, by Albert Londe in ‘Nouvelle Iconographie de la Salpetriere’; Clinique des Maladies du Système Nerveux’, 1890. (Wellcome Library, London. Wellcome Images [email protected] http:// wellcomeimages.org) Copyrighted work available under Creative Commons Attribution only licence CC BY 4.0 http://creativecommons.org/licenses/by/4.0/ Illustrations on pp.
    [Show full text]
  • Extensions of Input-Output Stability Theory and the Control of Aerospace Systems
    Extensions of Input-Output Stability Theory and the Control of Aerospace Systems by James Richard Forbes A thesis submitted in conformity with the requirements for the degree of Doctor of Philosophy Graduate Department of Aerospace Science and Engineering University of Toronto Copyright c 2011 by James Richard Forbes Abstract Extensions of Input-Output Stability Theory and the Control of Aerospace Systems James Richard Forbes Doctor of Philosophy Graduate Department of Aerospace Science and Engineering University of Toronto 2011 This thesis is concerned with input-output stability theory. Within this framework, it is of interest how inputs map to outputs through an operator that represents a system to be controlled or the controller itself. The Small Gain, Passivity, and Conic Sector Stability Theorems can be used to assess the stability of a negative feedback interconnection involving two systems that each have specific input-output properties. Our first contribution concerns characterization of the input-output properties of linear time- varying (LTV) systems. We present various theorems that ensure that a LTV system has finite gain, is passive, or is conic. We also consider the stability of various negative feedback intercon- nections. Motivated by the robust nature of passivity-based control, we consider how to overcome passivity violations. This investigation leads to the hybrid conic systems framework whereby systems are described in terms of multiple conic bounds over different operating ranges. A special case relevant to systems that experience a passivity violation is the hybrid passive/finite gain framework. Sufficient conditions are derived that ensure the negative feedback interconnection of two hybrid conic systems is stable.
    [Show full text]
  • Resume of Allen Tannenbaum
    Resume of Allen Tannenbaum Personal Data Name: Allen Robert Tannenbaum. Date and Place of Birth: January 25, 1953, New York City, New York. Telephone Number: 631-632-8654. Email: [email protected]. Education 1. Columbia University, B.A. in Mathematics, June 1973. 2. Harvard University, Ph.D. in Mathematics, June 1976. Ph.D. advisor: Professor Heisuke Hironaka, Harvard University. Thesis title: Deformations of 1-Cycles and the Chow Scheme. Main Fields of Interest Medical image analysis, computer vision, systems and control, image pro- cessing, controlled active vision, mathematical systems theory, bioinfor- matics, computer graphics, control of semiconductor fabrication processes, robotics, operator theory, functional analysis, algebraic geometry, differen- tial geometry, invariant theory, and partial differential equations. Positions Held 1. Member (affiliate) and Attending Computer Scientist, Memorial Sloan Kettering Cancer Center, December 2018-present. 2. Distinguished Professor, Departments of Computer Science and Ap- plied Mathematics, Stony Brook University, November 2015-present. 3. Visiting Investigator, Medical Physics, Memorial Sloan Kettering Can- cer Center, June 2015-November 2018. 4. Professor, Departments of Computer Science and Applied Mathemat- ics, Stony Brook University, August 2013-November 2015. 5. Adjunct Professor, Departments of Radiology and BMI, Stony Brook University, November 2013-present. 1 6. Interim Departmental Chairperson, ECE, UAB, August 2012-July 2013. 7. Bunn Professor, Comprehensive Cancer Center/ECE/Radiology, UAB, January 2012-July 2013. 8. Visiting Professor, Departments of Biomedical and Electrical/Computer Engineering, Boston University, July 2011-August 2012. 9. Adjunct Professor, School of Mathematics, Georgia Tech, September 2007-present. 10. Adjunct Professor, College of Computing, Georgia Tech, June 2007- present. 11. Adjunct Professor, Department of Radiology, Emory Medical School, January 2002-present.
    [Show full text]
  • Robust Control of Structures Subject to Uncertain Disturbances and Actuator Dynamics
    Robust Control of Structures Subject to Uncertain Disturbances and Actuator Dynamics Research Report Submitted to the Doctoral Commission of the Department of Electronics, Computer Science and Automatic Control of the University of Girona, in Partial fulfillment of the requirements for the Certification of Advanced Studies by Rodolfo Villamizar Mej´ıa Supervised by Dr. Josep Veh´ıand Dr. Ningsu Luo Department of Electronics, Computer Science and Automatic Control University of Girona Girona, Spain June, 2003 Contents 1 Introduction 5 2 Structural Control: State-of-the-art 7 2.1 Introduction . 7 2.2 Structural Control Devices . 8 2.2.1 Introduction . 8 2.2.2 Passive Control Devices . 8 2.2.3 Active Control Devices . 9 2.2.4 Semi-active control devices . 12 2.3 Structural Control Algorithms . 18 2.3.1 Introduction . 18 2.3.2 Optimal Control . 18 2.3.3 Robust Control . 20 2.3.4 Predictive Control . 22 3 Open Problems in Structural Control 25 3.1 Introduction . 25 3.2 Uncertainty in Civil Engineering Structures . 25 3.2.1 Parametric Uncertainty . 25 3.2.2 Unmodelled Dynamics . 26 3.2.3 Uncertain Disturbances . 26 3.3 Nonlinearity . 27 3.4 Coupling . 27 3.5 Actuator Dynamics . 28 3.5.1 Actuator Time Delay . 29 3.5.2 Actuator Saturation . 29 3.5.3 Actuator Friction . 29 3.5.4 Actuator Hysteresis . 29 3.6 Measurements Limitations . 30 3.7 Conclusions . 31 4 Exploratory Work 33 4.1 Previous Work . 33 4.1.1 Paper 1 . 33 2 4.1.2 Paper 2 . 34 4.1.3 Paper 3 .
    [Show full text]
  • PUBLICATIONS by MICHAEL G. SAFONOV
    PUBLICATIONS by MICHAEL G. SAFONOV Books [1] M. G. Safonov. Stability and Robustness of Multivariable Feedback Systems. MIT Press, Cambridge, MA, 1980. Based on author’s PhD Thesis, “Robustness and Stability Aspects of Stochastic Multivariable Feedback System Design,” MIT, 1977. [2] R. Y. Chiang and M. G. Safonov. Robust Control Toolbox. MathWorks, South Natick, MA, 1988. [3] R. Y. Chiang and M. G. Safonov. Robust Control Toolbox. MathWorks, Natick, MA, 1988 (Ver. 2.0, 1992). 221 pages. [4] G. J. Balas, R. Y. Chiang, A. K. Packard, and M. G. Safonov. Robust Control Toolbox, Version 3. MathWorks, Natick, MA, 2005. [5] M. Stefanovic and M. G. Safonov. Safe Adaptive Control: Data-driven Stability Analysis and Robust Synthesis. Springer-Verlag, Berlin, 2011. Lecture Notes in Control and Information Sciences, Vol. 405. Book Chapters and Articles [1] M. G. Safonov. Large systems control theory. In Encyclopedia of Science and Technology. McGraw-Hill, NY, 5th edition, 1982. [2] M. G. Safonov and J. C. Doyle. Minimizing conservativeness of robustness singular values. In S. G. Tzafestas, editor, Multivariable Control, chapter 11. D.Reidel, Dordrecht, Holland, 1984. [3] M. G. Safonov. Imaginary-axis zeros in multivariable H∞ optimal control. In R. F. Curtain, editor, Modelling, Robustness and Sensitivity Reduction in Control Systems, pages 71–82. Springer-Verlag, New York, 1987. [4] M. G. Safonov. Robustness in linear systems. In Encyclopedia of Systems and Control. Pergamon Press, Oxford, 1987. [5] M. G. Safonov and V. X. Le. An alternative solution to the H∞ control problem. In C. I. Byrnes, C. F. Martin, and R. E. Saeks, editors, Linear Circuits, Systems and Signal Process- ing: Theory and Application, chapter 8.
    [Show full text]
  • Wayne State University
    Wayne State University Academic Program Review For The Graduate Program of The Department of Electrical and Computer Engineering Self-Study Report January, 2005 Dr. Yang Zhao, ECE Chair 1 Table of Contents Instructions for Completing the Self-study Section 1: Departmental Overview & Mission Section 2: Faculty Part 1 – Overview Part 2 – Supporting Data 1. Curriculum vitae 2. Faculty General Summary Data – Form F1 3. Individual Faculty Data – Form F2 4. Doctoral Supervision Record – Form F3 Section 3: The Doctoral Program Part 1 – Background Data 1. Principle Mission 2. Comparable Universities Data – Form BD1 3. Aspire to Data – Form BD2 Part 2 – Program 1. Program Policies, Procedures & Goals - Form PD1 2. Graduate Officers Checklist – Form PD2 3. Program Recruitment Materials – Form PD3 Part 3 – Doctoral Student Profile 1. General Data: Admission & Retention Data – Form SD1 2. Recruitment Background Data Form SD2 3. Support for Students – Form SD3 Admissions Recruitment Retention Mentoring Employment Assistance Section 4: Master’s and Certificate Programs Part 1 – Background Data 1. Principle Mission 2. Comparable Universities Data – Form MC1 3. Aspire to Data – Form MC2 Part 2 – Program 1. Program Policies, Procedures & Goals - Form PMC1 2. Graduate Officers Checklist – Form PMC2 2 3. Program Recruitment Materials – Form PMC3 Part 3 – Masters/Certificate Student Profile 1. General Data: Admission & Retention Data – Form SMC1 2. Recruitment Background Data Form SMC2 3. Support for Students – Form SMC3 Admissions Recruitment Retention
    [Show full text]