The future of crypto asset regulation in SA Intelligent security drives eCommerce growth Out-of-the-box spoofing mitigation with Galileo's OS-NMA ...

Page created by Ronald Dennis
 
CONTINUE READING
The future of crypto asset regulation in SA Intelligent security drives eCommerce growth Out-of-the-box spoofing mitigation with Galileo's OS-NMA ...
MAY 2020
                          Automation and Control | Electronics | Measurement and instrumentation | Technology and IoT

The future of crypto
asset regulation in SA

Intelligent security
drives eCommerce
growth

Out-of-the-box
spoofing mitigation
with Galileo’s
OS-NMA service

The Great Geomagnetic
Storm of May 1921

Aurecon develops
building health tool to
mitigate Covid-19 risks

5G 0ver-the-air
performance
measurement

ISSN 1991-5047
The future of crypto asset regulation in SA Intelligent security drives eCommerce growth Out-of-the-box spoofing mitigation with Galileo's OS-NMA ...
The Now Media Group is the new owner of the EngineerIT and Energize titles.

The Marsh family, owners of the Now Media Group, and the Yelland family,
  the previous owners of the titles, go back a generation when their
     parents ran their businesses out of London House in Loveday Street
        in the centre of Johannesburg some 50 years ago.

           That is where the coincidence ends. Yelland was in the electrical
            business and John H Marsh, a journalist and best-selling author
             of Skeleton Coast, was a magazine publisher.

              Now Media was founded in 1953 by John and
              continues to be run as a family business by Dave,
              chairman (2nd generation), and Anton, CEO
             (3rd generation).

            The company has taken an innovative approach to
publishing, whether it be establishing quick-read high frequency
trade newspapers or running its own printing works to ensure it
can be first with the news.

Before the internet was popularised it launched its first online B2B
service in 1989, Travelinfo, which changed the way the travel industry
in South Africa operates. It continues to flourish today with over 4 000 travel
   agents using it repeatedly throughout the day for their operations.

    It now has a strong internet presence with three daily news sites in the
     freight and travel sectors.

     Nico Maritz, who heads up a division that focuses on B2B monthlies and
     upmarket magazines for large residential estates, will manage Energize
         and EngineerIT.

             Most critically we believe in being effective for our clients.
              Through niche publications with highly engaged audiences
                we can provide solid, effective promotional solutions to the
                 industries and audiences we serve.

                    The Now Media Group is a level 2 B-BBEE company
                     based in Illovo, Johannesburg and employs around
                      100 staff across: 5 business magazines, 11 security estate
                     publications, 3 daily news and 3 twice-weekly trade
                   websites, a travel reference and training system, as well
                as its printing works.
The future of crypto asset regulation in SA Intelligent security drives eCommerce growth Out-of-the-box spoofing mitigation with Galileo's OS-NMA ...
FROM THE EDITOR’S DESK
        he April edition of EngineerIT was available in             districts during the National State of Disaster.

T       a soft copy posted on our website. Thanks to
        all of you who downloaded it. We trust you
enjoyed reading it as much as we enjoyed putting it
                                                                    Furthermore, all radio frequency spectrum licensees
                                                                    must zero rate all COVID-19 sites as identified from
                                                                    time to time by the Department of Health and
together. We are still locked down, so we are in the                published in the Government Gazette.
same boat with this edition, no print version, only                      One wonders what will happen after lockdown; will
available on the web.                                               the mobile industry easily give up these additional
     Our twice weekly newsletter readership is growing              frequency assignments?
with every edition. If you are not receiving it on a                     ICASA also authorised Mthinte Communications,
Tuesday and Thursday please visit our website on                    Levin Global and Morai Solutions the use of TV White
www.engineerit.co.za to subscribe. It is free! We will              Spaces (TVWS) in the 470 – 694 MHz band. The
not flood your inbox but send you a list of the latest              applicants had to obtain approval from the CSIR, in
five articles loaded onto the website. Click on the                 conjunction with ICASA, with respect to Geo-Location
ones that catch your interest.                                      Secondary Database (GLSD) connectivity for
     When the lockdown was announced, there was a                   compliance with the use of TVWS in South Africa.
scramble to set up systems that would allow us to                   Applicants must obtain type approval certification from
work from home. Many managed to achieve it in a                     ICASA for their electronic communications equipment,
short time and we soon started receiving invitations                and if harmful interference occurs to existing
to attend virtual product briefings and even mini                   broadcasters, the applicant must immediately terminate
conferences. But platforms were overwhelmed and                     its services and notify the Authority accordingly.
started showing cracks, resulting in unintended                          The use of TV White Spaces is a great solution to
consequences such as being hacked. It did not take                  connect the rural unconnected. The key advantage of
platform providers long to implement lessons                        TV White Space deployment is that the signal
learned. Well done!                                                 coverage can reach up to a 10km radius from the
     Working remotely was not generally an accepted                 base station without the requirement of line of sight.
practice in South Africa, but during the past two                   This makes it ideal for connecting people living in the
months many businesses have gained experience                       rural undulating hills of KwaZulu-Natal and the Eastern
and may continue to carry on the practice after                     Cape, as well as areas in other provinces where there
lockdown. It has always been said that there is                     is poor existing backhaul infrastructure. In the WAPA
nothing to replace face to face meetings, and from                  pilot project launched last year, each TV White Space
experience now there is some truth in that statement.               base station will connect at a bandwidth of 20 Mbps to
Many companies will consider the various options but                30 Wi-Fi access points. These will be scattered within
it is most likely that hybrid models will emerge,                   walking distance of each citizen of the rural
homing in on the best of both worlds.                               community. Participants in the project will be
     When the lockdown was announced, ICASA                         deploying1,600 such base stations reaching 50,000
sprang into action and made much needed radio                       hot spots servicing a potential 13 million rural citizens.
frequency spectrum available to the mobile industry.                It is gratifying to learn that ICASA sees the benefit of
The temporary allocations came with strict conditions.              TVWS as a rural solution.
All successful licensees for temporary IMT radio
frequency spectrum assignments had to ensure that                   Enjoy reading this edition of EngineerIT. We welcome
they supported and created virtual teaching and                     your input and comments. Drop me an email.
classrooms, as determined by the Department of
Basic Education and the Department of                               Hans van de Groenendaal
Communications and Digital Technologies in various                  Email: hansv@nowmedia

                                        EngineerIT | May 2020 | 1
The future of crypto asset regulation in SA Intelligent security drives eCommerce growth Out-of-the-box spoofing mitigation with Galileo's OS-NMA ...
CONTENTS
                                                          MAY 2020

                Automation and Control | Electronics | Measurement and instrumentation | Technology and IoT

                                                                                         EDITOR
                                                                                         Hans van de Groenendaal -
                                                                                         MIng Honoris Causa (Stellenbosch)
                                                                                         Tel: 012 991 4662
                                                                                         Cell: 082 781 4631
                                                                                         Email: hansv@nowmedia.co.za

                                                                                         ADVERTISING
Teraco Cape Town 2 (CT2) is a new 30MW hyperscale data centre facility and               Merinda Lottering
following the company’s recent 60MW expansion announcement of its                        Cell: 071 765 5702
Johannesburg data centre campus in Isando, makes the proposed Cape Town                  Email: merindal@nowmedia.co.za
facility the second-largest on the continent. Teraco provides carrier and cloud
neutral colocation data centres, and with over 18 000 cross-connects, is                 DESIGNER
                                                                                         Adéle Gouws
Africa’s most interconnected data centre hub. As the first provider of highly
resilient, vendor neutral data environments in sub Saharan Africa, Teraco
                                                                                         PUBLISHED BY
brings global content closer to the digital edge.
                                                                                         African Destination
                                                                                         Publishing (Pty) Ltd
                                                                                         Tel: +27 (0)11 327 4062
                                                                                         Fax: +27 (0)11 327 4094
                                              A VOICE FOR
                                                                                         E-mail: engineerit@nowmedia.co.za
                                                                                         Physical address:
                                                                                         Now Media Centre
                                                                                         32 Fricker Rd, Illovo, Johannesburg
                                                                                         South Africa
                                                                                         Postal address:
                                                                                         PO Box 55251, Northlands, 2116

                                                                                         PUBLISHER
                                                                                         Nico Maritz
                                                                                         Email: nicom@nowmedia.co.za

                                                                                         PRINTED BY
                                                                                         JUKA

                                                                                         WEBSITE
                                                                                         www.engineerit.co.za

                                                     EngineerIT | May 2020 | 2
The future of crypto asset regulation in SA Intelligent security drives eCommerce growth Out-of-the-box spoofing mitigation with Galileo's OS-NMA ...
29
                                      6

                                    16 8                                                  35
FROM THE EDITOR                                                                       1   Copyright
                                                                                          Copyright of all material appearing in EngineerIT
                                                                                          is vested in African Destination Publishing (Pty)
AUTOMATION                                                                                Ltd. In submitting any article for publication, the
                                                                                          authors confirm that they own the copyright to
Aurecon develops building health tool to mitigate Covid-19 risks                      4   the said article, which is ceded to African
More, faster data can make for safer tailings dams                                    6   Destination Publishing (Pty) Ltd for publication.
                                                                                          The editor reserves the right to edit or shorten
Robotics is the new norm in production                                                8   articles submitted for publication. Editing and/or
From beer to hand sanitiser                                                          10   shortening is done with due dilligence, where
                                                                                          necessary in conjuction with the author(s).
                                                                                                No part of this publication may be
ICT                                                                                       reproduced, or stored in a retrieval system, or
                                                                                          transmitted in any form, or by any means,
SDN redefines networking environment                                                 11   except as described below, without the written
Pay-as-you-use makes cyber security cost effective                                   12   permission of African Destination Publishing
                                                                                          (Pty) Ltd. Copying of articles is not permitted
Out-of-the-box spoofing mitigation with Galileo’s OS-NMA service                     14   except for personal and internal use, to the
                                                                                          extent permitted by South African law.
Major expansion for Teraco                                                           16
                                                                                          Permission is not required to make abstracts, on
Intelligent security drives eCommerce growth                                         18   condition that a full reference to the source is
                                                                                          shown. Requests for permission for other kinds
                                                                                          of copying should be addressed to African
ICT TECHNICAL                                                                             Destination Publishing (Pty) Ltd.

5G Over-the-Air Performance                                                          19
                                                                                          Disclaimer
                                                                                          Articles published in EngineerIT do not
                                                                                          necessarily reflect the views of African
TECHNOLOGY                                                                                Destination Publishing (Pty) Ltd or the editor.
NightOwl, a finger apnoea sensor                                                     23   In addition, views expressed by the editor do
                                                                                          not necessarily reflect the views of African
AI to turn the tide on cybercrime                                                    24
                                                                                          Destination Publishing (Pty) Ltd or any other
                                                                                          person or organisation associated with
                                                                                          EngineerIT.
SPACE SCIENCES                                                                                 It is a condition of publishing material in
The Great Geomagnetic Storm of May 1921                                              26   EngineerIT that African Destination Publishing
                                                                                          (Pty) Ltd shall not be liable for any
                                                                                          consequential or other damages arising from
VIEWS AND COMMENT                                                                         the publication in good faith of any article,
                                                                                          advertisement, picture, comment, view or
A sneak-peek at the future of crypto asset regulation in South Africa                29   opinion. This applies to publishing, failing to
                                                                                          publish, late publishing or incorrectly publishing
                                                                                          any article, advertisement, insert, picture,
AMATEUR RADIO                                                                             caption, etc.
Science is meeting Amateur Radio                                                     30        It is acknowledged that errors in transcript,
                                                                                          human and technical errors can and do occur,
                                                                                          but that reasonable effort will be made to
INDUSTRY AND TECHNOLOGY NEWS REVIEW                                                  32   minimise their occurence, and to acknowledge
                                                                                          and correct such errors when they are brought
                                                                                          to the attention of African Destination
                                                                                          Publishing (Pty) Ltd.
NEW PRODUCTS                                                                         35

                                                         EngineerIT | May 2020 | 3
The future of crypto asset regulation in SA Intelligent security drives eCommerce growth Out-of-the-box spoofing mitigation with Galileo's OS-NMA ...
AUTOMATION

Aurecon develops building health
tool to mitigate Covid-19 risks
By Martin Smith (CEng, BEng Mechanical), Technical Director - Buildings, Aurecon (rebranding as Zutari).

With over 75 Green Star certified projects, and delivering the
first WELL-rated building in Africa, the Aurecon team
 understands the dynamics of buildings and their impact on
     occupant health. To assist property developers and facility
     managers to respond to Covid-19 risks and prepare
 buildings for resumed operations, Aurecon has used its
extensive multi-disciplinary experience to develop a
customised building health assessment tool.

       he tool assists property owners to demonstrate to their shareholders,

T      management, employees and clients that a systematic, balanced approach
       has been taken to find an optimal solution to minimise the health risk.
    The Covid-19 global pandemic has triggered unprecedented disruption,                Martin Smith Technical Director –
impacting organisations across the world. Aurecon is highly experienced in building     Buildings, Aurecon.
design and operations with technical experts who understand how the virus can be
distributed through multiple infection routes within a building and amongst people.
Technical elements such as air conditioning and wet services, along with usage          and create safe and productive spaces
patterns, all contribute to the transmission risks within buildings.                    that will assist with resuming business
    By analysing the work environment and operational practices, while                  and increasing productivity.
understanding the business needs, companies have the power to mitigate risks                Aurecon’s Building Health
                                                                                        Assessment Tool is a comprehensive
                                                                                        diagnostic of the key operational and
                                                                                        physical factors that helps property
                                                                                        owners put in place plans to mitigate
                                                                                        workplace risks, and assists them with
                                                                                        resuming business and increasing
                                                                                        health and productivity. A gap analysis is
                                                                                        used to prepare a short-, medium- and
                                                                                        long-term plan that meets the client’s
                                                                                        business needs.
                                                                                            The aim is to try and find practical
                                                                                        solutions that close the gap between
                                                                                        these business needs and the risk of
                                                                                        infection. These include operational
                                                                                        processes and controls and building
                                                                                        physical and technological
                                                                                        improvements, along with emergency
                                                                                        procedures and awareness. The
                                                                                        challenge here is not to have a knee-jerk
                                                                                        response with short-term actions, but to
The flagship Exxaro head office in Centurion is the first building in South Africa to   systematically reduce risk in a manner
achieve Silver Level WELL certification for Core and Shell by the International WELL    that is affordable and makes sense in
Building Institute (IWBI).                                                              the short and long term.

                                                        EngineerIT | May 2020 | 4
The future of crypto asset regulation in SA Intelligent security drives eCommerce growth Out-of-the-box spoofing mitigation with Galileo's OS-NMA ...
Green Star SA ratings
                                                       The trend for ‘green’ energy-efficient buildings resulted in the development of a set of
     The flagship Exxaro head office in
                                                       building-rating tools by the Green Building Council of South Africa (GBCSA). While these are
Centurion, developed by building owner
                                                       not based on legislation or promulgated in any way, the aim is to establish a common
Growthpoint Properties, is the first
                                                       measurement for ‘green’ buildings. This also serves to showcase innovation and leadership
building in South Africa to achieve Silver
                                                       in property development and construction.
Level WELL certification for Core and
Shell by the International WELL Building
                                                       The Green Star SA rating aims to:
Institute (IWBI).
                                                       1. Establish a common language and measurement standard for ‘green’ buildings
     Exxaro’s head office consists of a
                                                       2. Promote integrated design
five-storey, 2,5 basement structure
                                                       3. Raise awareness of ‘green’ buildings and their benefits
adjacent to Centurion Lake. The building
                                                       4. Reduce the environmental impact of development
achieved a 5 Star Green Star design
                                                       5. Recognise environmental leadership
rating and is targeting an As-Built and an
Interiors rating. Aurecon was appointed
                                                       The Green Star SA rating covers the following categories:
to design the HVAC services, provide
                                                       • Management
environmentally sustainable design
                                                       • Indoor Environment Quality (IEQ)
(ESD) or ‘green’ building design
                                                       • Energy
services, and review the foundation
                                                       • Transport
designs for the project. The HVAC
                                                       • Water
design consists of roof air-cooled chillers
                                                       • Materials
and in-ceiling mounted fan coil units.
                                                       • Land use and ecology
     Another example is One Discovery
                                                       • Emissions
Place, developed by Growthpoint
                                                       • Innovation
Properties in a joint venture with Zenprop
Property Holdings. It is the largest
                                                       These categories are subdivided into credits that address the initiatives that the design and
commercial office building in South
                                                       construction team have undertaken to improve the environmental performance of a
Africa, achieving a 6-Star Green Star As-
                                                       building. Points are awarded to the building according to a calculated score based on the
Built rating. It extends the boundaries of
                                                       appropriate environmental weighting of the environmental initiatives incorporated.
an energy-efficient, environment- and
                                                           Design and As Built certifications are awarded for new construction or major
occupant-friendly building, with Aurecon
                                                       refurbishment projects. Design certifications are submitted for and awarded upon
providing mechanical and ESD services
                                                       completion of the design phase of the project. This enables property developers to market
for the project.
                                                       a proposed building as a Green Star SA certified building. Upon completion, a project can
     Green initiatives include optimally
                                                       be submitted for As Built certification, which verifies the procurement and implementation
designed energy-efficient lighting, grey
                                                       of the ‘green’ building strategies. GBCSA has also developed a Green Star SA tool for
and rainwater harvesting systems,
                                                       existing buildings in operation, which takes a 12-month snapshot of the performance of an
water-efficient sanitary fittings, and
                                                       occupied building, and a Green Star SA tool for interior fit-outs. There is also a Green Star
carbon monoxide monitoring in the
                                                       SA tool for sustainable precincts in terms of neighbourhood-scale developments.               n
basement. Aurecon also carried out an
in-depth analysis on the striking,
swirling façade that draws light into the            rooftop running track, an indigenous landscaped roof garden and visually attractive
building, and which is also critical for             staircases that encourage staff to use stairs instead of elevators. The building features
thermal heat control.                                an abundance of natural light, with most of the building wrapped around a series of
     Some of the strongest design                    sunlit atria that plug into a central concourse; the largest atrium is big enough to house
principles at One Discovery Place are                a Boeing 737.
the ideas of occupant well-being and                     Aurecon offers integrated multi-disciplinary solutions which includes mechanical,
movement, with features such as a                    electrical, water, civil and structural advisory and ESD services.                       n

 About WELL
 The International WELL Building Institute (IWB) is leading the global movement to transform buildings and communities in ways that help people thrive.
      IWBI delivers the cutting-edge WELL Building Standard, the leading global rating system and the first to be focused exclusively on the ways that
 buildings, and everything in them, can improve people’s comfort, drive better choices, and generally enhance, not compromise, our health and wellness..
      IWBI mobilises the global wellness community through management of the WELL AP credential, convenes a global network of organisations through
 IWBI membership, pursues applicable research, develops educational resources, and advocates for policies that promote health and wellness everywhere.
      Launched in October 2014 after six years of research and development, the WELL Building Standard is the premier standard for buildings, interior
 spaces and communities seeking to implement, validate and measure features that support and advance human health and wellness.
      The WELL Building Standard underwent a comprehensive expert peer review process, which included three phases - scientific, practitioner and
 medical review. WELL Certification and the WELL AP credentialing programme are third-party administered through IWBI’s collaboration with Green
 Business Certification Inc. (GBCI).
      The WELL v2 pilot is a recently launched version of its popular WELL Building Standard, and the WELL Community Standard pilot is a district scale
 rating system that sets a new global benchmark for healthy communities.                                                                                n

                                                               EngineerIT | May 2020 | 5
The future of crypto asset regulation in SA Intelligent security drives eCommerce growth Out-of-the-box spoofing mitigation with Galileo's OS-NMA ...
AUTOMATION

More, faster data can make for
safer tailings dams
By Lyzandra Boshoff, principal engineering geologist at SRK Consulting

Sensors, telemetry, wireless                      The need for knowing more about            installation and aftercare – and manual
                                              tailings dam conditions – and in real          data collection is subject to human error.
capability and cloud                          time – has become a major focus within             This means expending considerable
  technology to upload and                    the mining sector, demanding a steep           effort for relatively little data, which may
    store big data, allows for                change in the way we collect, process          often not exactly reflect the current
  data to be immediately                      and interpret data. As part of these           situation by the time the information
                                              efforts, SRK has been rolling out              reaches the engineer for analysis. Even
accessed and analysed                         initiatives using automated vibrating wire     the automated sensors using vibrating
                                              piezometers (VWPs) on tailings facilities.     wire technology tended to rely on
                                                  Seepage and the associated pore            manual data collection from the logging
         enewed global concern about          pressure regime within a tailings facility     devices connected to the sensors.

R        the risks of tailings dam (dams
         where mining waste is stored)
failure is accelerating a revolution in the
                                              as a vital aspect of the integrity and
                                              stability of the structure, is of particular
                                              significance. This has conventionally
                                                                                                 This is now changing as many
                                                                                             telemetry hardware developers have
                                                                                             improved the wireless capability and cloud
use of automated sensors to generate          been tracked by manual standpipe               technology to upload and store data,
big, real-time data to better monitor and     piezometers whose performance, while           allowing data to be immediately accessed
manage these facilities.                      accurate, depends on the quality of            by engineers and management.

                                                       EngineerIT | May 2020 | 6
The future of crypto asset regulation in SA Intelligent security drives eCommerce growth Out-of-the-box spoofing mitigation with Galileo's OS-NMA ...
AUTOMATION

    This has changed the landscape         available to be harnessed and interpreted.
of data flow and interpretation, as well       The sheer quantity of data generated means that engineers must innovate,
as the potential size of the datasets      finding new and more efficient ways to validate, evaluate and interpret the large
that can be generated. SRK has been        incoming datasets. However, harnessing the full power of big datasets demands the
at the forefront of rolling out            appropriate database structures and validation processes to be in place – which is
automated VWP networks, using              where we are investing considerable effort.
logging systems that can send data             To support this need, we have recently put in place a data services department at
wirelessly to cloud-based databases        SRK, pulling together some of our brightest minds and data analysts. This is helping
and can then be visualised and             champion our initiatives to harness these growing datasets into sound engineering
analysed in real time.                     information – so they can contribute to making informed engineering decisions.
    Among the technological                    Graphs 2a and 2b show the changing pore pressure (green/blue) within the
innovations the company is                 tailings body in response to overburden loads being placed during the
developing is a customised database        construction of a buttress (yellow trend line indicating successive lifts over the
and visualisation platform specifically    measured period). A sudden spike in pore pressures can lead to the pore
for VWP data. This includes built-in,      pressure within the soils becoming greater than other forces acting between
automated validation and interpretive      particles, keeping the soil skeleton intact (e.g. gravity, frictional forces) and strong.
tools to automate some of the                  If and when pore pressures are permitted to become large enough and are not given
routine engineering interpretive           an opportunity to dissipate, they can effectively push the neighbouring soil particles
work. It builds upon available             apart. In extreme cases, almost all strength is lost within the soil skeleton, and this is
software technologies to create a          usually referred to as “liquefaction” in the field of critical state soil mechanics.         n
solution that is customised to the
field of tailings dam management,          SRK is an independent, global network of consulting practices in over
while also presenting opportunities        45 countries on six continents. For further information, visit www.srk.co.za
for applying the principles in a range
of disciplines.
    The datasets generated by VWP
networks can be significantly large,
depending on the frequency at which
data is collected. Conditions on site
would determine the detail required
for tracking where potentially adverse
circumstances may develop.
    These VWP networks are also
useful when needing to confirm
whether the mitigation measures in
place are having the desired effect.
Applying these technologies, SRK
has been able to review the impact of
construction processes and other site      Graph 2a
activities and incidents on pore
pressure responses; they can then
analyse the impact of depositional
patterns on the seepage flow regime
within a facility.
    For the first time, we can see and
correlate in real time what we have
always predicted using models and
assumptions. Harnessing the power
of big data, we can now test our
assumptions and substantially raise
the confidence of our observations.
With the exponential growth in the
application of technology in this field,
more data is being generated and is        Graph 2b

                                                    EngineerIT | May 2020 | 7
The future of crypto asset regulation in SA Intelligent security drives eCommerce growth Out-of-the-box spoofing mitigation with Galileo's OS-NMA ...
Back in the seventies, YASKAWA proposed the innovative
                                                                           concept of an unmanned factory termed “Mechatronics”. Since
                                                                           then, the concept has evolved into i3-mechatronics, featuring
                                                                           further advancements and implementations of automation
                                                                           through the management of digital data. Whether it’s partial or
                                                                           full automation, there are flexible solutions that allow for smart
                                                                           integration, real-time visualisation of systems and industrial
                                                                           evolution through technological innovation. Not only do these
                                                                           solutions increase overall productivity and systems processes,
                                                                           but there’s also the ability to improve standards and quality of
                                                                           both the manufacturing plant and products. The i3 or I-cube
                                                                           mechatronics concept embraces integration, intelligence and
                                                                           innovation. It is factory automation incorporating all equipment
                                                                           in the factory controlled from big data in the cockpit, just like a
                                                                           pilot in an aircraft controlling all operations to get passengers
                                                                           safely on the ground at their destination.
                                                                                Considering the current restrictions on the number of
                                                                           employees allowed back at work and the need for social
                                                                           distancing, the industries that embraced i3-mechatronics are
                                                                           better prepared to deal with the pandemic’s side effects. From
                                                                           the stability and reliability of streamlined production (despite
                                                                           fewer employees at their disposal) to rigorous health and
                                                                           safety standards, a robotised workforce is capable of business

 Robotics is the new                                                       as usual even in unusual times.
                                                                                Crackett believes a robot-powered workforce is the way of
                                                                           the future, both locally and internationally. While he has not

 norm in production
                                                                           seen a significant uptake in robotic technology in South Africa,
                                                                           there are positive signs it will grow in the years to come as
                                                                           businesses provision for these types of advancements.
                                                                                At the same time, there is a fear that robots will take the
                                                                           place of humans in the workplace, hence the reluctance to
                                                                           embrace technology. Crackett believes it is actually affording
         s the world moves towards a different tomorrow, future-

A
                                                                           more opportunities to both organisations and employees.
         orientated solutions will not merely be an option for                  “We’ve implemented several projects at labour-intensive
         industries but an absolute necessity. Robotics and                organisations to streamline operations,” says Crackett. “Instead
automation technology are already playing a pivotal role in the            of seeing a reduction in staff, we’ve actually witnessed the
health sector – from the use of automated laboratory tests to              employees reassigned to other areas or new positions. By
autonomous disinfectors utilised in hospitals – but they’re about          freeing up resources, there’s the possibility to upskill and
to extend further into other industries faster than anyone could           redeploy, while still improving the overall process and positively
have predicted.                                                            influencing the organisation. Robots will still need quality
    “The automotive industry has always been closely tied to               assurance, operators and support staff, as an example.”
robotics, and this is unlikely to change,” says Andrew Crackett of              Crackett said people who are critical of his point of view
YASKAWA Southern Africa.                                                   should look at the motor industry where automation has
    “The fast-moving consumer goods (FMCG) and food markets,               improved the quality and exponential increased plant output
however, should see an increase and acceptance in the usage of             which, without automation, would not have been possible.
robots and automation technologies. This is largely due to the             “With improved proactivity and increased output, more staff
‘contact’ element, as health and safety officers will be even more         were employed. Upskill people to do more interesting work
concerned about cleanliness, sanitisation and hygiene in                   and leave the repetitive jobs to robotics. If South Africa wants
manufacturing processes, handling and distribution of goods, and           to compete with the rest of the world, we must automate to
factories. Considering COVID-19 can survive on certain surfaces,           step up production, reduce cost and upskill our people to
measures will need to be put in place to future-proof businesses           ensure a quality product is delivered at a competitive price.”
from any potential outbreaks. And this is where robotics could                  While the havoc caused by COVID-19 cannot be
come in to reduce contact and cross-contamination.”                        understated, it has also pushed industries to think towards the
    While many industries have instituted stringent hygiene                future and plan better. A robotised workforce might not seem
standards and practices for operations, they are also acutely              like something out of a sci-fi film anymore, but a necessary
aware of the human element. All it takes is one lapse and the risk         requisite for any business to survive in the face of disaster. n
of infection is catastrophic. There have already been several high-
profile instances where essential services, such as hospitals and          For more information email Andrew Crackett at
factories, have had to temporarily shut their doors because their          andrew@yaskawa.za.com. Share your views with our
staff have been infected by the virus.                                     readers. Email hansv@nowmedia.co.za.

                                                        EngineerIT | May 2020 | 8
AUTOMATION

From beer to hand sanitiser
                                                                                                        Mass-customized
                                                                                                        production is enabled based
                                                                                                        on several driving demands
                                                                                                        at the same time.
                                                                                                            But it goes beyond
                                                                                                        unlimited flexibility.
                                                                                                        Implementing pitchless
                                                                                                        technology increases your
                                                                                                        throughput and uptime while
                                                                                                        eliminating chains, belts and
                                                                                                        other traditional mechanics that
                                                                                                        limit speed. The mix of
                                                                                                        continuous and intermittent
                                                                                                        motion, as well as easy
                                                                                                        synchronisation with any other
                                                                                                        external axis, like robots,
                                                                                                        improves operational efficiency
                                                                                                        and contributes to higher
                                                                                                        productivity. With this, the
                                                                                                        common bottleneck of in-feed
                                                                                                        complexity belongs to the past.
Adapting manufacturing for COVID-19                                      Floor space can be reduced because machines are now
The world stands still as COVID-19 continues to turn it upside           designed to be scalable and modular. It’s now easier to re-
down but hidden in the background we find manufacturers,                 deploy existing machines for new products and integrate
machine builders and their suppliers. These are the people               multiple machine functions.
responsible for producing food, life-saving medicines, masks                Analytics and smart track-and-trace of individual
and wipes.                                                               products throughout the entire process help ensure quality,
    Rockwell Automation believes it is unquestionable that in            improve production process and reduced energy
times like these we must move together to ensure the continued           consumption while always being aware of your customised
production of the products that are so urgently needed. Not only         production—even remotely.
that, but we must do it as quickly as possible to serve the
greater good and avoid interrupting mass production.                     Innovation never stops
    Societally, we have now experienced a lack of ventilator             ICT combined with analytics, simulation and other leading-
masks, cleaning and disinfecting products, medical devices and           edge technologies, such as wireless power transfer and
many other products. But the question remains, how do we                 wireless communication, bring manufacturing to the next
quickly change from beer or spirits to hand sanitizer? How do            level. Analytics provide full transparency into how machines
we adapt newly developed medical device designs for our                  are running, maximizing uptime. Simulation can be used to
current machine lines? How do we answer the difficult question           create Digital Twins and access virtual training and support,
of which medication production to prioritize? Which machine              which helps decrease time to market. This is especially
line to change? Obviously, there is high demand to manufacture           important in our current uncertain times, requiring
products to combat the current pandemic, but at the same time            manufacturers to pivot quickly.
other life-saving medication demands do not stop. Therefore,                 Unimaginable speeds can be achieved for light products
how do we adapt to the increase in demand for certain                    because communication and power at the mover make it
products, while overcoming challenges such as the lack of                possible to affix products that would have flown off the
physical infrastructure to allow production growth?                      conveyors of older machines.
                                                                             These are just a few examples demonstrating that
Independent Cart Technologies serve several                              creativity and innovation never stop.
production demands, all in one                                               So, don’t decide which demand is most important. Let’s
Independent Cart Technologies (ICT) allow changeovers for                lay the foundation for the future while meeting the needs of
different products and formats with the push of a button,                the world in the present. Let us help you combine and serve
providing the ability to manufacture a variety of products on a          every need.
single line.
- Individual medical packages? No problem.                               To learn more about how we are making
- Single and large packs? You’ve got it.                                 Smart Manufacturing more productive, visit
- Switch from diapers to masks? Right away.                              www.rockwellautomation.com.

                                                        EngineerIT | May 2020 | 10
ICT

SDN redefines
networking environment
By Joshua Ward, Associate Client Partner at Decision Inc.

           any consider software-defined networking (SDN) to be one of the most disruptive

M          areas to have arrived in the ICT landscape in recent years. It fundamentally
           changes network management to enable a more dynamic, software-driven and
efficient way of improving performance.
     Within the South African market, there has been a continued drive towards the cloud          Joshua Ward, Associate Client Partner
with numerous companies adopting a hybrid strategy. In turn, this has led to an increase in       at Decision Inc
demand for reliable bandwidth from network providers. For their part, these providers have
increased investments in their infrastructure to scale according to customer needs. From          device, accompanied by a broadband
an ISP perspective, the focus has been on investing in burstable bandwidth network                medium, would allow for a low cost, quick
capabilities across their core infrastructure.                                                    deployment and safe means to connect to
     And given how 5G is around the corner, the infrastructure overhaul will play a significant   the network.
role in the SDN market not only in this country, but across the continent. 5G will allow               Because of the infrastructure challenges
sectors that have traditionally struggled with access to high-speed and reliable connectivity     in Africa, the biggest potential for SDN in
at remote operations such as mining and agriculture, to start benefitting from SDN.               the coming year is to link it with 5G. SDN
     To prepare for this SDN-led future, there has been significant consolidation of              devices could run over a 5G network so
technologies. For example, SD-WAN devices are shipping with firewall and cyber security           businesses could quickly deploy these to
capabilities built in. Inevitably, this will see companies look to reduce their Capex spend on    their branches or sites in a short amount
a myriad of edge devices towards a single, managed service point per device with                  of time. This means they would no longer
multiple features.                                                                                be restricted by long time frames to get
                                                                                                  physical infrastructure in place.
Overhaul bandwidth                                                                                     Going the SDN route does not mean
Initially, these SDN shifts will be more beneficial to those with cyclical bandwidth              the company must adopt an all or nothing
requirements, for example the education sector that experiences ‘quiet’ months where              approach. In fact, those who immediately
schools and universities are closed for holidays. Burstable bandwidth will accommodate for        roll out a full SD-WAN often expose
high demand. Keeping this in mind, the ‘pay for what you use’ principle will apply to allow       themselves to downtime due to
these institutions to better manage their budget during the year.                                 unforeseen issues. This can include
     But how does SDN impact the network on a more functional level?                              unreliable broadband connectivity.
     Most network requirements are built around three metrics – quality, low cost and             Therefore, the SD-WAN road map should
bandwidth. Traditionally, businesses were forced into choosing two of the three, i.e. a           be done on a per site basis, built around
quality (reliable) network featuring high bandwidth capabilities would come at a high cost.       business requirements.
     The advent of low-cost broadband, especially within the African market, enables                   Clients must understand how SDN fits
businesses to adopt a hybrid approach of using SD-WAN on certain sites on the network,            into their cloud strategy. Additionally, they
while keeping the more robust MPLS network on critical sites. This allows clients to benefit      must also see how far along their service
from increased bandwidth and higher network availability at a more manageable cost.               provider is in terms of its own SDN rollout
Those organisations not adopting SDN will continue to battle with trying to choose two of         to be capable of delivering effective
the three metrics.                                                                                solutions. All told, the network environment
                                                                                                  has changed irrevocably. Now is the time
Overcoming challenges                                                                             to embrace this innovation.                  n
Implementing SDN is not without its own challenges, especially in Africa.
    Typically, finding quality base connectivity is a problem. Clients also need to match this
with their site or business requirements. The allure of implementing SD-WAN to increase
bandwidth and reduce costs using broadband, often means clients are exposed to the
unstable nature of broadband. Therefore, large head office sites should typically look at a
hybrid approach of dedicated internet access or MPLS, as well as a secondary medium to
avoid contention waves during peak periods.
    SD-WAN can deliver the goods when site requirements are appropriately matched with
the correct under-lay services. An example of this is a satellite site with a few employees
who need to connect back to the network. In this instance, a self-provisioning SD-WAN

                                                           EngineerIT | May 2020 | 11
ICT

Pay-as-you-use makes cyber
security cost effective
By Charl Ueckermann, CEO at AVeS Cyber Security

           ompanies are seeking drastic                                                         proactively manage it, as well as pre-

C          measures to become more cost-
           efficient in a severely constrained
economy without compromising their
                                                                                                empt and mitigate the risks. Offered as
                                                                                                a fully managed service, the Next-
                                                                                                Generation SOC eliminates the need for
security. There are many solutions avaible                                                      on-site SOC infrastructure and in-house
and often it becomes a very difficult choice.                                                   cyber security analysts, both of which
An interesting solution launched recently is                                                    can be prohibitively expensive for small
the Next-Generation SOC (security                                                               and medium-sized companies to recruit
operations centre) which, at a signifcantly                                                     and manage. Our Next-Generation SOC
lower cost, is allowing companies to tap into                                                   model is based on three standards of
the very best skills, tools and services,                                                       best practice; COBIT 2019, the NIST
which were previously only available to                                                         Cybersecurity Framework and the SANS
companies with substantial capital budgets.                                                     Cyber Incident Management
With our Next-Generation SOC, we are                                                            Framework. So it is not simply about
doing ‘business as unusual’; there are no                                                       remote security monitoring and alerts,
upfront setup costs and companies only                                                          but also active incident response. Our
pay for what they use.                           Charl Ueckermann, CEO at AVeS                  team of highly-qualified and
     The latest version of the Next-             Cyber Security                                 experienced security specialists working
Generation SOC is a fully managed platform                                                      alongside leading technologies
for monitoring, managing, and proactively        depth tracking and analysis of the genuine     underpinning the Next-Generation SOC
maintaining cyber security environments,         and constantly increasing number of            are a powerful combination.
giving companies access to higher levels of      cyber-related threats to which companies           Furthermore, capital expenses that
productivity efficiency than before. The         are exposed every day. Many companies          were previously required to gain access to
Next-Generation SOC integrates predictive,       do not have the skills and resources in-       SOC infrastructure are now eliminated.
machine learning-enabled cyber security          house to analyse network traffic, malware,     SOC tools, such as log collectors, are
tools that are aligned with international best   firewall health and global threat feeds. Not   installed on a client's network in the areas
practice and upskilling of IT staff and          only are these skills expensive to retain,     where log ingestion is needed. Secure site-
continuous upgrading of systems without          but they are also in short supply.             to-site VPN will also be configured for
additional costs.                                     One has to eat, sleep and breathe         remote dashboards and alerts into the
     It also gives companies access to           cyber security to understand it,               Next-Generation SOC.
actionable intelligence with comprehensive
visibility of security-type logs, without
sharing confidential customer information.
Several cutting-edge technologies to
monitor companies' cyber environments,
integrating with almost any application and
system, are included. The system will
proactively monitor critical firewall event
logs, firewalls' uptime, endpoints' security,
critical server system logs, email security
and global threat feeds on behalf of
subscribing clients. These logs are
ingested into the Next-Generation
SOC tool sets, and a highly specialised
team of security experts oversee and
respond to the security alerts generated
by the system.
     The Next-Generation SOC delivers in-        Pay-as-you-use cyber security allows all businesses access to world-class expertise

                                                         EngineerIT | May 2020 | 12
COBIT 2019 goals
Why did we use COBIT                                                  According to the ISACA, COBIT 2019 was updated to include:

2019 as a framwork?                                                   • Focus areas and design factors that give more clarity on creating a
                                                                         governance system for business needs
                                                                      • Better alignment with global standards, frameworks and best practices to
                                                                         bolster the framework’s relevance
                                                                      • An open-source model that allows for feedback from the global governance
                                                                         community to encourage faster updates and enhancements
                                                                      • Regular updates released on a rolling basis
                                                                      • More guidance and tools to support businesses when developing a “best-fit
                                                                         governance system, making COBIT 2019 more prescriptive”
                                                                      • A better tool to measure performance of IT and alignment with the CMMI
                                                                      • More support for decision making including new online collaborative features.

                                                                      COBIT 2019 also introduces “focus area” concepts that describe specific
                                                                      governance topics and issues, which can be addressed by management or
                                                                      governance objectives. Some examples of these focus areas include small and
                                                                      medium enterprises, cybersecurity, digital transformation and cloud computing.
                                                                      Focus areas will be added and changed as needed based on trends, research and
                                                                      feedback – there’s no limit for the number of focus areas that can be included in
                                                                      COBIT 2019.
COBIT 2019 updates the framework for modern enterprises by
addressing new trends, technologies and security needs. The           The two industry standard incident response frameworks we used in AVeS
framework still plays nicely with other IT management                 NIST and SANS are the dominant institutes whose incident response steps have
frameworks such as ITIL, CMMI and TOGAF, which makes it a             become industry standard.
great option as an umbrella framework to unify processes
across an entire organisation.                                        NIST: NIST stands for National Institute of Standards and Technology. They’re a
    New concepts and terminology have been introduced in the          government agency proudly proclaiming themselves as “one of the nation’s oldest
COBIT core model, which includes 40 governance and                    physical science laboratories”. They work in all-things-technology, including
management objectives for establishing a governance programme.        cybersecurity, where they’ve become one of the two industry standard go-tos for
The performance management system now allows more flexibility         incident response with their incident response steps.
when using maturity and capability measurements. Overall, the
framework is designed to give businesses more flexibility when        The NIST incident response process contains four steps:
customising an IT governance strategy.                                1. Preparation
    Like other IT management frameworks, COBIT helps align            2. Detection and analysis
business goals with IT goals by establishing links between the two    3. Containment, eradication and recovery
and creating a process that can help bridge a gap between IT —        4. Post-incident activity
or IT silos — and outside departments.
    One major difference between COBIT and other                      SANS: SANS is the acronym for SysAdmin, Audit, Network, and Security. It is a
frameworks is that it focuses specifically on security, risk          private organisation that, per its own description, is “a cooperative research and
management and information governance. This is emphasised             education organisation”. Though more youthful than NIST, its sole focus is security,
in COBIT 2019, with better definitions of what COBIT is and           and it has become an industry standard framework for incident response.
what it isn’t. For example, ISACA says COBIT 2019 isn’t a
framework for organising business processes, managing                 The SANS incident response process consists of six steps:
technology, making IT-related decisions, or determining IT            1. Preparation
strategies or architecture. Rather, it’s designed strictly as a       2. Identification
framework for governance and management of enterprise IT              3. Containment
across the organisation. That’s better clarified for businesses in    4. Eradication
the updated version, so there’s less confusion about how COBIT        5. Recovery
should be used and implemented.                                       6. Lessons learned                                                                  n

                                                          Pricing for services is based on the amount of data (logs) (GB) consumed per day.
                                                     Companies get around the clock monitoring, threat analyses, monthly risk profile reports,
                                                     cyber incident response and a dedicated dashboard. Although software-as-a-service and the
                                                     outsourcing of cyber security are not new, the concept of consumption-based managed
                                                     security services is emerging throughout Africa.
                                                          Fixed licenses and service level agreements can be a burden because companies pay
                                                     for the same amount of services, software and capacity that they do not need every month.
                                                     Upfront annual costs and fixed agreements can also place the outsourcing of cyber services
                                                     out of reach for smaller businesses, especially for those with long business cycles, project-
                                                     driven organisations or cash-strapped businesses. It is time for a change. With a
                                                     consumption-based structure, companies of all shapes and sizes have an opportunity.           n

                                                       About AVeS Cyber Security
                                                       AVeS Cyber Security is a specialist in industry-specific IT governance and architectural
COBIT 2019 - Components of a                           services, combining expert knowledge and services with leading technology products to
Governance System                                      provide comprehensive information security and advanced IT infrastructure solutions.     n

                                                              EngineerIT | May 2020 | 13
ICT

Out-of-the-box spoofing mitigation
with Galileo’s OS-NMA service
By Franco de Lorenzo, Product Strategist for Standard Precision GNSS, u blox Espoo

          ver the past two decades,

O         satellite based positioning has
          become an indispensable, every
day technology that we constantly rely
                                            u blox M9 and F9 GNSS
                                            receivers are set up to
                                            leverage Galileo’s long
                                            awaited authenticated
                                            GNSS signals.
on – often even without being aware of
it. With the relentless expansion of
applications and use cases, driven
largely by falling cost of ownership and
improvements in positioning accuracy,
there will soon be one GNSS receiver in
operation for every person on the planet.
But now, with the accuracy challenge all
but solved, security is becoming a key
factor slowing the development of new,
lucrative business models and emerging
critical applications.
     That’s why there is so much
excitement around a new service from
Galileo, the EU’s global navigation         receivers by feeding them fraudulent signals. The European GNSS constellation will
satellite system. First conceived in        be the first to offer authenticated navigation messages to civilian users free of charge.
2013, Galileo’s open service                    The approach the European GNSS Agency (GSA) adopted to authenticate the
navigation message authentication           signals is already well established for digital communication on the internet. It consists
(OS NMA) system lets GNSS                   of appending an encrypted authentication signature to GNSS navigation messages,
receivers ensure that the satellite         which can be used to verify the messages based on a hybrid symmetric / asymmetric
signals they receive are, indeed, from      key approach (described in more detail here).
Galileo satellites, and that they have          The service will only be available to advanced GNSS receivers that are able to
not been modified. The approach             securely store a copy of the public key used to decrypt the authentication message
makes it more difficult for hackers and     and to ensure that it can be trusted. To ensure that current users of Galileo’s
other bad actors to spoof GNSS              navigation services do not see their service interrupted, the new navigation messages,
                                                                                            broadcast on Galileo’s E1B frequency
                                                                                            band, will be fully backward compatible.
                                                                                            This means that older receivers will still
                                                                                            be able to use them to determine their
                                                                                            position, simply without the value add of
                                                                                            message authentication.

                                                                                          A critical step towards fully
                                                                                          secure positioning
                                                                                          The move by the GSA comes in response
                                                                                          to growing demand across industries for
                                                                                          secure positioning technology. “At the GSA,
                                                                                          we work in close collaboration with the
                                                                                          industry to design and leverage Galileo’s
                                                                                          unique capabilities and rapidly develop new
                                                                                          applications to respond to user needs,” said
                                                                                          Fiammetta Diani, Head of Market
                                                                                          Development at the European GNSS
                                                                                          Agency (GSA).

                                                   EngineerIT | May 2020 | 14
How does NMA work?
     OS NMA, step one in the agency’s           Message authentication has been referred to as the “second face” of cryptology, and it
plans, will not entirely solve the GNSS         uses many of the same tools and techniques as the more well-known first face of
security challenge. It will, however,           cryptology: cryptography, or data secrecy. In message authentication the sender uses a
considerably raise the level of                 secret key to generate an authentication signature from the original message. Both
sophistication that such attacks require,       message and signature are then transmitted to the receiver, which uses a key
benefiting a variety of applications that       (potentially different to that used by the transmitter) to verify that the message and
are frequent targets of spoofing attacks.       authentication signature correspond.
These include smart tachographs used
in trucks, taxis and ride-sharing               When the received message is authenticated the receiver can conclude that:
vehicles, and tracking devices used in          1. The transmitted and received message are the same
commercial cargo and fishing vessels.           2. Only someone with access to the transmitter’s secret key could have generated the
Reliably flagging spoofing attempts will           authentication message
make it more difficult for companies to
skirt legislation by tampering with the         There are two different ways to generate authentication signatures:
GNSS receivers.                                 1. Using symmetric key techniques in which both transmitter and receiver share a
     GNSS data authentication will also play       secret key
an important role in so called mission          2. Using asymmetric key techniques in which the secret key is split into two parts, a
critical use cases - think advanced driver         “private” key, known only to the transmitter, and a public key which can be
assistance systems, autonomous driving,            distributed publicly. The private key is used to generate the authentication message,
or any number of risk prone commercial             while the public key is used in the verification step.
activities. And, by mitigating one of
GNSS’s main vulnerabilities, it will no         There are some issues associated with each of the two techniques. In the symmetric key
doubt add value in less critical ones as        case, the most difficult issue is how to distribute the “private” key to all users, without also
well, in retail and logistics, smart cities,    giving the spoofer access to this key. Similarly, for the asymmetric case, the receiver needs
and connected industries.                       some mechanism to ensure that the “public” key does indeed come from the trusted
                                                transmitter (the GNSS system operator in the case of NMA). This problem is usually solved
Leveraging OS NMA from day one                  using a Public Key Infrastructure (PKI) consisting of a trusted authority that manages the
As a leading supplier of GNSS receivers         certification that public keys do indeed belong to the organisation that claims them.
for telematics solutions, we at u blox have         So it would appear that the asymmetric approach is superior, as the infrastructure is
long been at the front line in bringing the     simplified and the “secret” key can remain secret. However, asymmetric encryption has
benefits of OS NMA to the market.               two major drawbacks: firstly, it is much more computationally intensive than symmetric
Through our active involvement in the EU        key encryption; secondly, much longer keys are required for the same level of security.
led group of experts on the smart                   Interestingly, both symmetric and asymmetric NMA approaches have been proposed for
tachograph, for example, we are helping         GPS (on the new L1C signal) and Galileo (on the E1 Open Service signal), as discussed below.
drive the implementation of OS NMA.
That’s why it should hardly come as a           The GPS Approach – Asymmetric NMA
surprise that our latest GNSS platforms are     The Chips-Message Robust Authentication (Chimera) is a hybrid NMA and spreading code
designed to leverage Galileo’s                  authentication technique proposed for use with the GPS L1C signal. The NMA portion of
authenticated navigation signals from the       this scheme is based on the asymmetric elliptic curve digital signature algorithm (ECDSA)
day they go live.                               P-224, which is a well-established standard. The public key is 448-bits long for an
     “We are glad to see that a key player in   equivalent security of about 112 bits (i.e. it is equivalent to a 112-bit symmetric key system).
GNSS manufacturing, such as u blox, is               The Chimera proposal uses two Subframe 3 pages of the C/NAV message to transmit
already looking forward to exploit Galileo      each digital signature, with a repetition rate of at most once every three minutes. In this
new features and in particular the Open         way a receiver can verify that the navigation message is authentic every three minutes.
Service Navigation Message                           The ECDSA scheme is a well-established Federal Information Processing Standard
Authentication to contribute to safer road      (FIPS) and is implemented in most open source and commercially available cryptographic
transportation on European roads, and           libraries, which simplifies the integration of the scheme into existing GNSS receivers.
beyond,” says GSA’s Fiammetta Diani.                 Chimera requires receivers to have occasional access, via non-GPS channels, to
     OS NMA is one of the corner stones of      infrastructure to provide authenticated GPS system public keys. This Public Key
our approach to increase the security and       Infrastructure (PKI) is essential to any asymmetric crypto-system, including the Transport
reliability of our GNSS receivers. It adds to   Layer Security (TLS) system used in securing websites. In this system, each entity that
improvements made by concurrently               wishes to provide an authenticated public key obtains a signed certificate from a trusted
monitoring signals from several GNSS            Certification Authority (CA). A user can then verify that the public key provided
constellations on multiple frequency            corresponds to that in the signed certificate. Reusing this certification process should be
bands, as well as integrating other data,       straightforward in the GNSS context.
such as input from inertial sensors. That
being said, for Galileo and for u blox, OS      The Galileo Approach – Hybrid Symmetric/Asymmetric NMA
NMA is just one more stepping stone             The proposal for Galileo Open Service Navigation Message Authentication (OSNMA)
towards fully secured GNSS based                differs from Chimera in that it is based on a hybrid symmetric/ asymmetric key approach
positioning technology.                     n   known as the Timed Efficient Streamed Loss-Tolerant Authentication (TESLA) scheme. n

                                                   EngineerIT | May 2020 | 15
You can also read