-
Spaceborne COTS-Capsule Hodoscope: Detecting and Characterizing Particle Radiation
Authors:
Yoav Simhony,
Alex Segal,
Yuri Orlov,
Dolev Bashi,
Ofer Amrani,
Erez Etzion
Abstract:
The COTS-Capsule Spaceborne hodoscope was launched into low earth orbit aboard the International Space Station and operated during 2021-2022. The primary objectives of the payload are: measuring and characterizing the radiation environment within the space station; serving as a technology demonstrator for the COTS-Capsule radiation mitigation apparatus; and testing the interaction of high-energy c…
▽ More
The COTS-Capsule Spaceborne hodoscope was launched into low earth orbit aboard the International Space Station and operated during 2021-2022. The primary objectives of the payload are: measuring and characterizing the radiation environment within the space station; serving as a technology demonstrator for the COTS-Capsule radiation mitigation apparatus; and testing the interaction of high-energy cosmic particles in space with our detectors. The payload features a particle hodoscope equipped with an array of novel detectors based on polyvinyl toluene scintillators and silicon photomultiplier sensors that are used for radiation detection and characterization. This paper provides a comprehensive account of the construction, preflight performance, testing, qualification, and in-orbit calibration of the COTS-Capsule payload. The hodoscope, sensitive to ionizing cosmic particles, facilitates im**ing particle track reconstruction, energy deposition estimation, and linear energy transfer estimation. In specific instances, it also provides particle identification and energy deposition estimation.
△ Less
Submitted 8 July, 2024; v1 submitted 28 June, 2024;
originally announced June 2024.
-
Scintillator-SiPM Detector for Tracking and Energy Deposition Measurements
Authors:
Yoav Simhony,
Alex Segal,
Yuri Orlov,
Ofer Amrani,
Erez Etzion
Abstract:
An innovative particle detector that offers a compelling combination of cost-effectiveness and high accuracy is introduced. The detector features plastic scintillators paired with a sparse arrangement of SiPMs, strategically positioned within a unique opto-mechanical framework. This configuration delivers precise measurements of spatial impact position and energy deposition of im**ing particles.…
▽ More
An innovative particle detector that offers a compelling combination of cost-effectiveness and high accuracy is introduced. The detector features plastic scintillators paired with a sparse arrangement of SiPMs, strategically positioned within a unique opto-mechanical framework. This configuration delivers precise measurements of spatial impact position and energy deposition of im**ing particles. The manuscript describes the detector's physical model complemented by an analytical representation. These calculations underpin a numerical algorithm, facilitating the estimation of particle im**ement position and energy deposition. The results of the numerical calculations are compared with the output of GEANT4 simulations and evaluated by rigorous laboratory testing. An array of these detectors, intended for deployment in a spaceborne experiment, underwent detailed design, manufacturing, and testing. Their performance and alignment with the physical model were validated through meticulously conducted ground-based laboratory experiments, conclusively affirming the detector's properties.
△ Less
Submitted 8 July, 2024; v1 submitted 28 June, 2024;
originally announced June 2024.
-
Let's shake on it: Extracting secure shared keys from Wi-Fi CSI
Authors:
Tomer Avrahami,
Ofer Amrani,
Avishai Wool
Abstract:
A shared secret key is necessary for encrypted communications. Since Wi-Fi relies on OFDM, we suggest a method to generate such a key by utilizing Wi-Fi's channel state information (CSI). CSI is typically reciprocal but very sensitive to location: While the legitimate Alice and Bob observe the same CSI, an eavesdropper Eve observes an uncorrelated CSI when positioned over 0.5 wavelength away. We s…
▽ More
A shared secret key is necessary for encrypted communications. Since Wi-Fi relies on OFDM, we suggest a method to generate such a key by utilizing Wi-Fi's channel state information (CSI). CSI is typically reciprocal but very sensitive to location: While the legitimate Alice and Bob observe the same CSI, an eavesdropper Eve observes an uncorrelated CSI when positioned over 0.5 wavelength away. We show that if endpoint Bob is shaken, sufficient diversity is induced in the CSI so that it can serve as a source of true randomness. Then we show that the CSI among neighboring sub-carriers is correlated, so we select a small set of judiciously-spaced sub-carriers, and use a majority rule around each. We demonstrate that Alice and Bob observe a 5-15\% bit mismatch rate (BMR) in the extracted bitstream while Eve observes a BMR of around 50\% even when placed within 10cm of Alice. We employ the cryptography-oriented definition of min-entropy to estimate the number of secure bits within the bitstream, and use the Cascade algorithm of quantum-key-distribution to reconcile Alice and Bob's bitstreams, while quantifying the number of bits leaked by the algorithm. Accounting for both the min-entropy and the cascade leakage we quantify the Secured Bit Generation Rate of our method.
We conducted extensive tests in an indoor environment. Our system exhibits a secure bit generation rate of 1.2--1.6 %secure bits per packet, at distances ranging from 0.5m--9m, and can generate a secure shared 128-bit key with 20sec of device shaking.
△ Less
Submitted 11 July, 2023;
originally announced July 2023.
-
Sub-Rate Linear Network Coding
Authors:
Ben Grinboim,
Itay Shrem,
Ofer Amrani
Abstract:
Increasing network utilization is often considered as the holy grail of communications. In this article, the concept of sub-rate coding and decoding in the framework of linear network coding (LNC) is discussed for single-source multiple-sinks finite acyclic networks. Sub-rate coding offers an add-on to existing LNC. It allows sinks whose max-flow is smaller than the source message-rate, termed \em…
▽ More
Increasing network utilization is often considered as the holy grail of communications. In this article, the concept of sub-rate coding and decoding in the framework of linear network coding (LNC) is discussed for single-source multiple-sinks finite acyclic networks. Sub-rate coding offers an add-on to existing LNC. It allows sinks whose max-flow is smaller than the source message-rate, termed \emph{sub-rate sinks}, to decode a portion of the transmitted message without degrading the maximum achievable rate of LNC sinks whose max-flow is equal (or greater) than the rate of the source node. The article studies theoretical aspects of sub-rate coding by formulating the conditions a node (and indeed the network) must fulfill so as to qualify as a legitimate sub-rate sink.
△ Less
Submitted 26 May, 2022;
originally announced May 2022.
-
Dynamic Network-Code Design for Satellite Networks
Authors:
Itay Shrem,
Ben Grinboim,
OFer Amrani
Abstract:
Internet access from space enjoys renaissance as satellites in Mega-Constellations is no longer fictitious. Network capacity, subject to power and computational complexity constraints among other challenges, is a major goal in this type of networks. This work studies Network Coding in the presence of dynamically changing network conditions. The notion of generalized acyclic network is introduced a…
▽ More
Internet access from space enjoys renaissance as satellites in Mega-Constellations is no longer fictitious. Network capacity, subject to power and computational complexity constraints among other challenges, is a major goal in this type of networks. This work studies Network Coding in the presence of dynamically changing network conditions. The notion of generalized acyclic network is introduced and employed for promoting the generation of linear-multicast network code for what is considered to be a cyclic network. The performance of several network coding schemes, among these is the known static network code, is evaluated by a STK simulation for a swarm of communicating satellites, conceptually based on the Iridium system. Exploiting the prior knowledge of the networks topology over time, new network coding approaches are described, whose aim is to better cope with the time-varying, dynamic behavior of the network. It is demonstrated that in all cases, pertaining to our example network, static network codes under-perform compared to the presented approach. In addition, an efficient test for identifying the most appropriate coding approach is presented.
△ Less
Submitted 4 April, 2022;
originally announced April 2022.
-
Graph-based Detection of Multiuser Impulse Radio Systems
Authors:
Y. Shen Bachar,
O. Amrani
Abstract:
Impulse-Radio (IR) is a wideband modulation technique that can support multiple users by employing random Time-Hop** (TH) combined with repeated transmissions. The latter is aimed at alleviating the impact of collisions. This work employs a graphical model for describing the multiuser system which, in turn, facilitates the inclusion of general coding schemes. Based on factor graph representation…
▽ More
Impulse-Radio (IR) is a wideband modulation technique that can support multiple users by employing random Time-Hop** (TH) combined with repeated transmissions. The latter is aimed at alleviating the impact of collisions. This work employs a graphical model for describing the multiuser system which, in turn, facilitates the inclusion of general coding schemes. Based on factor graph representation of the system, several iterative multiuser detectors are presented. These detectors are applicable for any binary linear coding scheme. The performance of the proposed multiuser detectors is evaluated via simulations revealing large gains with low complexity.
△ Less
Submitted 23 May, 2021;
originally announced May 2021.
-
Direct-Digital-Drive Microring Modulator
Authors:
Yossef Ehrlichman,
Ofer Amrani,
Shlomo Ruschin
Abstract:
The method of Direct Digital Drive is applied to a microring resonator. The microring resonator is thus controlled by a segmented set of electrodes each of which is driven by binary (digital) signal. Digital linearization is performed with the aid of digital memory lookup table. The method is applied to a single microring modulator to provide an M-bit digital-toanalog converter (DAC), which may al…
▽ More
The method of Direct Digital Drive is applied to a microring resonator. The microring resonator is thus controlled by a segmented set of electrodes each of which is driven by binary (digital) signal. Digital linearization is performed with the aid of digital memory lookup table. The method is applied to a single microring modulator to provide an M-bit digital-toanalog converter (DAC), which may also be viewed as an M-level pulse amplitude modulator (M-PAM). It is shown, by means of simulation, that a 4-bit DAC can achieve an effective number of bits (ENOB) of 3.74bits. Applying the same method for two rings, enables the generation of two-dimensional optical M-QAM signals. It is shown, by means of simulation, that a 16-QAM modulator achieves an EVM better than -30dB.
△ Less
Submitted 11 March, 2016;
originally announced March 2016.