期刊文献+

多导体连接器孔隙电磁辐射信息泄漏效应研究 被引量:2

Effectiveness research on information eavesdropping caused by aperture EM radiation from multi-conductor connector
在线阅读 下载PDF
导出
摘要 对视频脉冲信号经由多导体连接器孔隙电磁辐射引起的信息泄漏效应进行研究.基于诺顿定理、传输线理论和孔隙激励原理建立了多导体连接器的等效电路模型,提出了连接器电缆"外导体-大地"回路的有限差分模型,在时域计算了连接器电缆外导体上的分布电流,分析了多导体连接器的孔隙辐射系数和电磁泄漏波的特征.研究表明多导体连接器孔隙电磁辐射具有高通特性.电磁泄漏波携带着原始信号的敏感信息.多导体连接器孔隙电磁辐射是导致信息泄漏的重要途径之一. A study was conducted to investigate information leakage caused by the aperture video electromagnetic radiation from a multi-conductor connector. The equivalent circuit of a multi-conductor was set up based on Norton's theorem, transmission line theory and aperture excitation theory. The finite difference model of outer conductor ground circuit was proposed and the current on outer cable conductor calculated. The aperture EM radiation coefficient and the characteristics of electromagnetic leakage were studied. The study shows that the aperture EM radiation from a multi-conductor connector has a high pass characteristic and the EM leakage contains sensitive information. The aperture EM radiation from multi-conductor connector is a key factor in information leakage.
出处 《哈尔滨工程大学学报》 EI CAS CSCD 2004年第4期517-520,共4页 Journal of Harbin Engineering University
基金 国家自然科学基金资助项目(60271018 60331010).
关键词 多导体连接器 有限差分模型 空隙电磁辐射 信息泄漏 Equivalent circuits Finite difference method Transmission line theory
  • 相关文献

参考文献11

  • 1[1]SHUMPERT J D. Penetration through slots in conducting cylinders-Part1: TE case [J]. IEEE trans Antennas Propagation, 1998, 46 (11): 1612-1621.
  • 2[2]SHUMPERT J D. Penetration through slots in conducting cylinders-Part1: TM case[J]. IEEE trans Antennas Propagation, 1998, 46(11): 1622-1628.
  • 3张洪欣,吕英华,吕剑刚.三维柱坐标系下PML的实现及近场—远场转换[J].哈尔滨工程大学学报,2003,24(5):566-570. 被引量:2
  • 4张洪欣,吕英华,黄永明,于学萍.基于FDTD方法的同轴电缆孔缝辐射效应研究[J].电波科学学报,2003,18(2):161-165. 被引量:15
  • 5[5]PLUMB R G. Admittance calculation of a slot in the shield of a multi-conductor transmission line[J]. IEEE trans Microwave Theory and Techniques, 1991,39 (4): 743-747.
  • 6[6]PAUL C R. Useful matrix chain parameter identities for the analysis of multi-conductor liens[J]. IEEE trans. Microwave Theory and Techniques, 1975, 23: 756-760.
  • 7[7]HARRINGTON R F. Time-harmonic electromagnetic fields [M]. New York:McGraw-Hill, 1961.
  • 8[8]PAPATHEODOROU S, MAUTZ J M, HARRINGTON R F. The aperture admittance of a circumferential slot in a circular cylinder[J]. IEEE trans Antennas Propagation, 1992, 40(2): 240-244.
  • 9[9]HURD R A, JACOBSEN J. Admittance of an infinite cylindrical antenna with realistic gap field[J]. Electronics Letters, 1968, 4: 420-421.
  • 10[10]MILLER E K. Admittance dependence of the infinite cylindrical antenna upon exciting gap thickness[J]. Radio Science, 1967, 2: 1431-1435.

二级参考文献18

  • 1BERKE D. Hidden data transmission by controlling electromagnetic emanations of computers[EB/OL], http://altem.org/berke/tempest/, 2000.
  • 2KUHN M G, ANDERSON R J. Soft Tempest: hidden data transmission using electromagnetic emanations[EB/OL]. http://www.cl.cam.ac.uk/~mgk25/ih98-tempest-slides.pdf,2001.
  • 3ANDERSON R J, KUHN M G Soft TEMPEST-An opportunity for NATO[EB/OL]. http://www.cl.cam.ac.uk, May, 2000.
  • 4VAN E W. Electromagnetic radiation form video display units: an eavesdropping risk?[J]. Computers & Security, 1985, 4: 69-286.
  • 5LU L, NIE Y, ZHANG H J. The electromagnetic leakage and protection for computer[A]. Electromagnetic Compatibility Proceedings,1997 International Symposium on EMC[C]. Beijing, 1997.378-382.
  • 6SMULDERS R The threat of information theft by reception of electromagnetic radiation form RS-232 cables[J]. Computers & Security, 1990, 9: 53-58.
  • 7DEMOULIN B, KONE L, POUDROUX C. Electromagnetic radiation of shielded data transmission lines[A]. Symposium on Electromagnetic Security for Information Protection[C]. Rome, Italy, 1991.163-173.
  • 8LACKEY R J, UPMAL D W. Speakeasy: the military software radio[J]. IEEE Communications Magazine, 1995, 33(5): 56-61.
  • 9CHEN H Y, TARN I Y. Analysis of electromagnetic radiation from a video output amplifier inside a monitor by using FDTD method[J]. IEEE Trans EMC, 1997, 39(4): 394-397.
  • 10HARRINGTON R E Time-Harmonic electromagnetic Fields [M]. New York: McGraw-Hill, 2001.

共引文献28

同被引文献22

  • 1张洪欣,吕英华,邱玉春,车树良.计算机电磁信息泄漏阈值效应研究[J].通信学报,2004,25(10):87-92. 被引量:5
  • 2ZHANGHong-xin,LUYing-hua,QIUYu-chun,CHENDa-qing.The Study of the Recognizability of Electromagnetic Leakage Information Arising from Computer[J].The Journal of China Universities of Posts and Telecommunications,2004,11(2):80-85. 被引量:5
  • 3DURAK B. Hidden data transmission by controlling electromagnetic emanations of computers [ EB/OL ]. [ 2000-08-02 ]. http://altern, org/berke/tempest.
  • 4KUHM M G, ANDERSON R J. Soft TEMPEST: hidden data transmission using electromagnetic emanations[ EB/OL]. [2000-08-02]. http://www, cl. cam. ac. uk.
  • 5LU Ling, NIE Yan, ZHANG Hongjin. The electromagnetic leakage and protection for computer [ C ] . 1997 International Symposium on Electromagnetic Compatibility Proceedings. Beijing: IEEE Press, 1997: 378-382.
  • 6van ECK W. Electromagnetic radiation form video display units: an eavesdropping risk? [ J]. Computers & Security, 1985, 4(4) : 269-286.
  • 7SMULDERS P. The threat of information theft by reception of electromagnetic radiation form RS-232 cables[ J]. Computers & Security, 1990, 9(1) : 53-58.
  • 8LACKEY R J, UPMAL D W. Speakeasy: the military software radio[J]. IEEE Communications Magazine, 1995, 33(5) : 56-61.
  • 9ANDERSON R J, KUHN M G. Soft TEMPEST -an opportunity for NATO[ EB/OL]. [ 2001-10-20 ]. http: ffwww, el. cam. ac. uk.
  • 10KUHN G. Optical time-domain eavesdropping risks of CRT displays [ EB/OL]. [ 2002-8-10 ]. http: //www. cl. cam. ac. uk/ - mgk25/ieee02-optical, pdf.

引证文献2

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部