Loading…
EMT based methodology for the vulnerability analysis of complex systems to IEMI
In the field of vulnerability to intentional electro-magnetic interference (IEMI), relevant coupling mechanism into complex electronic systems must be investigated. Thereby the estimation of the coupled disturbances into the systems is of special interest. This paper presents a detailed method, whic...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Conference Proceeding |
Language: | English |
Subjects: | |
Online Access: | Request full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | 248 |
container_issue | |
container_start_page | 243 |
container_title | |
container_volume | |
creator | Nana, R.K. Dickmann, S. Schetelig, B. Keghie, J. Sabath, F. |
description | In the field of vulnerability to intentional electro-magnetic interference (IEMI), relevant coupling mechanism into complex electronic systems must be investigated. Thereby the estimation of the coupled disturbances into the systems is of special interest. This paper presents a detailed method, which allows an estimation of the vulnerability of complex systems to electromagnetic attacks. It is based on the characterisation of external interfering sources and it characterises the system by segmenting it into subproblems with respect to the different coupling mechanisms. Then the obtained subproblems are solved with the electromagnetic topology (EMT), and finally they are superposed to the overall solution. This procedure allows the identification of the critical coupling paths of the investigated system. Afterwards a specific implementation of different solutions for electromagnetic hardening is possible. |
doi_str_mv | 10.1109/ISEMC.2009.5284572 |
format | conference_proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_5284572</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5284572</ieee_id><sourcerecordid>5284572</sourcerecordid><originalsourceid>FETCH-LOGICAL-g131t-b9cc115baf29b70f62d2e2148cba3601486a137d6d223a0ec92a1dacb2d154583</originalsourceid><addsrcrecordid>eNo9kF1LwzAYRoM6cMz9Ab3JH-jM--ajyaWMqoWNXTjBu5E06VZpl9FUsf_egcOr58CBc_EQcg9sAcDMY_lWrJcLZMwsJGohc7wiUwSpMwDQ12Rucg0ChRColLn5d-xjQqaaZ0pIIcwtmaf0yRg7J5XhMCWbYr2lzqbgaReGQ_SxjfuR1rGnwyHQ76_2GHrrmrYZRmqPth1Tk2isaRW7Uxt-aBrTELpEh0jLYl3ekUlt2xTml52R9-diu3zNVpuXcvm0yvbAYcicqSoA6WyNxuWsVugxIAhdOcsVO4OywHOvPCK3LFQGLXhbOfQghdR8Rh7-uk0IYXfqm8724-5yDf8FoJZTmA</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>EMT based methodology for the vulnerability analysis of complex systems to IEMI</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Nana, R.K. ; Dickmann, S. ; Schetelig, B. ; Keghie, J. ; Sabath, F.</creator><creatorcontrib>Nana, R.K. ; Dickmann, S. ; Schetelig, B. ; Keghie, J. ; Sabath, F.</creatorcontrib><description>In the field of vulnerability to intentional electro-magnetic interference (IEMI), relevant coupling mechanism into complex electronic systems must be investigated. Thereby the estimation of the coupled disturbances into the systems is of special interest. This paper presents a detailed method, which allows an estimation of the vulnerability of complex systems to electromagnetic attacks. It is based on the characterisation of external interfering sources and it characterises the system by segmenting it into subproblems with respect to the different coupling mechanisms. Then the obtained subproblems are solved with the electromagnetic topology (EMT), and finally they are superposed to the overall solution. This procedure allows the identification of the critical coupling paths of the investigated system. Afterwards a specific implementation of different solutions for electromagnetic hardening is possible.</description><identifier>ISSN: 2158-110X</identifier><identifier>ISBN: 9781424442669</identifier><identifier>ISBN: 1424442664</identifier><identifier>EISSN: 2158-1118</identifier><identifier>DOI: 10.1109/ISEMC.2009.5284572</identifier><identifier>LCCN: 83-645449</identifier><language>eng</language><publisher>IEEE</publisher><subject>Aperture antennas ; Aperture coupled antennas ; Cable shielding ; Cables ; Electromagnetic analysis ; Electromagnetic coupling ; Electromagnetic interference ; Frequency ; Protection ; Topology</subject><ispartof>2009 IEEE International Symposium on Electromagnetic Compatibility, 2009, p.243-248</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5284572$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2052,27902,54530,54895,54907</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5284572$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Nana, R.K.</creatorcontrib><creatorcontrib>Dickmann, S.</creatorcontrib><creatorcontrib>Schetelig, B.</creatorcontrib><creatorcontrib>Keghie, J.</creatorcontrib><creatorcontrib>Sabath, F.</creatorcontrib><title>EMT based methodology for the vulnerability analysis of complex systems to IEMI</title><title>2009 IEEE International Symposium on Electromagnetic Compatibility</title><addtitle>ISEMC</addtitle><description>In the field of vulnerability to intentional electro-magnetic interference (IEMI), relevant coupling mechanism into complex electronic systems must be investigated. Thereby the estimation of the coupled disturbances into the systems is of special interest. This paper presents a detailed method, which allows an estimation of the vulnerability of complex systems to electromagnetic attacks. It is based on the characterisation of external interfering sources and it characterises the system by segmenting it into subproblems with respect to the different coupling mechanisms. Then the obtained subproblems are solved with the electromagnetic topology (EMT), and finally they are superposed to the overall solution. This procedure allows the identification of the critical coupling paths of the investigated system. Afterwards a specific implementation of different solutions for electromagnetic hardening is possible.</description><subject>Aperture antennas</subject><subject>Aperture coupled antennas</subject><subject>Cable shielding</subject><subject>Cables</subject><subject>Electromagnetic analysis</subject><subject>Electromagnetic coupling</subject><subject>Electromagnetic interference</subject><subject>Frequency</subject><subject>Protection</subject><subject>Topology</subject><issn>2158-110X</issn><issn>2158-1118</issn><isbn>9781424442669</isbn><isbn>1424442664</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2009</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNo9kF1LwzAYRoM6cMz9Ab3JH-jM--ajyaWMqoWNXTjBu5E06VZpl9FUsf_egcOr58CBc_EQcg9sAcDMY_lWrJcLZMwsJGohc7wiUwSpMwDQ12Rucg0ChRColLn5d-xjQqaaZ0pIIcwtmaf0yRg7J5XhMCWbYr2lzqbgaReGQ_SxjfuR1rGnwyHQ76_2GHrrmrYZRmqPth1Tk2isaRW7Uxt-aBrTELpEh0jLYl3ekUlt2xTml52R9-diu3zNVpuXcvm0yvbAYcicqSoA6WyNxuWsVugxIAhdOcsVO4OywHOvPCK3LFQGLXhbOfQghdR8Rh7-uk0IYXfqm8724-5yDf8FoJZTmA</recordid><startdate>200908</startdate><enddate>200908</enddate><creator>Nana, R.K.</creator><creator>Dickmann, S.</creator><creator>Schetelig, B.</creator><creator>Keghie, J.</creator><creator>Sabath, F.</creator><general>IEEE</general><scope>6IE</scope><scope>6IH</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIO</scope></search><sort><creationdate>200908</creationdate><title>EMT based methodology for the vulnerability analysis of complex systems to IEMI</title><author>Nana, R.K. ; Dickmann, S. ; Schetelig, B. ; Keghie, J. ; Sabath, F.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-g131t-b9cc115baf29b70f62d2e2148cba3601486a137d6d223a0ec92a1dacb2d154583</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2009</creationdate><topic>Aperture antennas</topic><topic>Aperture coupled antennas</topic><topic>Cable shielding</topic><topic>Cables</topic><topic>Electromagnetic analysis</topic><topic>Electromagnetic coupling</topic><topic>Electromagnetic interference</topic><topic>Frequency</topic><topic>Protection</topic><topic>Topology</topic><toplevel>online_resources</toplevel><creatorcontrib>Nana, R.K.</creatorcontrib><creatorcontrib>Dickmann, S.</creatorcontrib><creatorcontrib>Schetelig, B.</creatorcontrib><creatorcontrib>Keghie, J.</creatorcontrib><creatorcontrib>Sabath, F.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan (POP) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP) 1998-present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Nana, R.K.</au><au>Dickmann, S.</au><au>Schetelig, B.</au><au>Keghie, J.</au><au>Sabath, F.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>EMT based methodology for the vulnerability analysis of complex systems to IEMI</atitle><btitle>2009 IEEE International Symposium on Electromagnetic Compatibility</btitle><stitle>ISEMC</stitle><date>2009-08</date><risdate>2009</risdate><spage>243</spage><epage>248</epage><pages>243-248</pages><issn>2158-110X</issn><eissn>2158-1118</eissn><isbn>9781424442669</isbn><isbn>1424442664</isbn><abstract>In the field of vulnerability to intentional electro-magnetic interference (IEMI), relevant coupling mechanism into complex electronic systems must be investigated. Thereby the estimation of the coupled disturbances into the systems is of special interest. This paper presents a detailed method, which allows an estimation of the vulnerability of complex systems to electromagnetic attacks. It is based on the characterisation of external interfering sources and it characterises the system by segmenting it into subproblems with respect to the different coupling mechanisms. Then the obtained subproblems are solved with the electromagnetic topology (EMT), and finally they are superposed to the overall solution. This procedure allows the identification of the critical coupling paths of the investigated system. Afterwards a specific implementation of different solutions for electromagnetic hardening is possible.</abstract><pub>IEEE</pub><doi>10.1109/ISEMC.2009.5284572</doi><tpages>6</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 2158-110X |
ispartof | 2009 IEEE International Symposium on Electromagnetic Compatibility, 2009, p.243-248 |
issn | 2158-110X 2158-1118 |
language | eng |
recordid | cdi_ieee_primary_5284572 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Aperture antennas Aperture coupled antennas Cable shielding Cables Electromagnetic analysis Electromagnetic coupling Electromagnetic interference Frequency Protection Topology |
title | EMT based methodology for the vulnerability analysis of complex systems to IEMI |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-08T06%3A39%3A18IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=EMT%20based%20methodology%20for%20the%20vulnerability%20analysis%20of%20complex%20systems%20to%20IEMI&rft.btitle=2009%20IEEE%20International%20Symposium%20on%20Electromagnetic%20Compatibility&rft.au=Nana,%20R.K.&rft.date=2009-08&rft.spage=243&rft.epage=248&rft.pages=243-248&rft.issn=2158-110X&rft.eissn=2158-1118&rft.isbn=9781424442669&rft.isbn_list=1424442664&rft_id=info:doi/10.1109/ISEMC.2009.5284572&rft_dat=%3Cieee_6IE%3E5284572%3C/ieee_6IE%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-g131t-b9cc115baf29b70f62d2e2148cba3601486a137d6d223a0ec92a1dacb2d154583%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=5284572&rfr_iscdi=true |