Risk

9/20/2010
04:16 PM
50%
50%

NIST Research Could Boost Mobile Device Security

An electron spinning technique could pave the way for a new generation of wireless device signals that are difficult for enemies to intercept, according to researchers at the National Institutes of Standards and Technology.




Slideshow: Next Generation Defense Technologies
(click for larger image and for full photo gallery)
Particle physics could be the key to creating a new generation of wireless technology that would be more secure and resistant to interference than current methods, according to the National Institutes of Standards and Technology (NIST).

The research could pave the way for federal agencies like the U.S. military to create wireless devices with signals that would be difficult for enemies to intercept or scramble. If NIST research and analysis is correct, it may be possible to create an oscillator that could leverage the spin of electrons to generate microwaves for use in mobile devices.

The effect of this process could be used to create a cell-phone oscillator that enables the frequency of the devices to be changed very quickly. This would make the signals from the devices very hard for enemies to intercept or jam, making them optimal for use by the military or other defense or intelligence agencies, according to NIST.

Electron spin is a property that also can be applied to electronic circuits. The technique proposed by NIST researchers for cell phones could develop a type of wave called a "soliton," a shape-preserving wave that is already used in a variety of media, including optical fiber communications.

In theory, a soliton would be created in a layer of what NIST describes as a "multilayered magnetic sandwich." One of the sandwich layers must be magnetized perpendicular to the plane of the layers. To generate a soliton, an electric current then must be forced through a small channel in the sandwich.

Once the soliton is generated, the magnetic orientation oscillates at more than a billion times a second, which is the frequency of microwaves, according to NIST.

According to NIST, the oscillator, as predicted by researchers, would maintain a constant frequency even with variations in wave current. The result would be a steady, strong output signal that also would reduce unwanted noise.

While only mathematical research has been done so far to prove the theory, NIST researchers believe they can realize the effect in devices. They are currently seeking experimental evidence to support the theory, according to NIST.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
'Hidden Tunnels' Help Hackers Launch Financial Services Attacks
Kelly Sheridan, Staff Editor, Dark Reading,  6/20/2018
Tesla Employee Steals, Sabotages Company Data
Jai Vijayan, Freelance writer,  6/19/2018
Inside a SamSam Ransomware Attack
Ajit Sancheti, CEO and Co-Founder, Preempt,  6/20/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-7682
PUBLISHED: 2018-06-22
Micro Focus Solutions Business Manager versions prior to 11.4 allows a user to invoke SBM RESTful services across domains.
CVE-2018-12689
PUBLISHED: 2018-06-22
phpLDAPadmin 1.2.2 allows LDAP injection via a crafted server_id parameter in a cmd.php?cmd=login_form request, or a crafted username and password in the login panel.
CVE-2018-12538
PUBLISHED: 2018-06-22
In Eclipse Jetty versions 9.4.0 through 9.4.8, when using the optional Jetty provided FileSessionDataStore for persistent storage of HttpSession details, it is possible for a malicious user to access/hijack other HttpSessions and even delete unmatched HttpSessions present in the FileSystem's storage...
CVE-2018-12684
PUBLISHED: 2018-06-22
Out-of-bounds Read in the send_ssi_file function in civetweb.c in CivetWeb through 1.10 allows attackers to cause a Denial of Service or Information Disclosure via a crafted SSI file.
CVE-2018-12687
PUBLISHED: 2018-06-22
tinyexr 0.9.5 has an assertion failure in DecodePixelData in tinyexr.h.