You are on page 1of 54

Future Access Enablers for Ubiquitous

and Intelligent Infrastructures Third


International Conference FABULOUS
2017 Bucharest Romania October 12 14
2017 Proceedings Octavian Fratu
Visit to download the full and correct content document:
https://textbookfull.com/product/future-access-enablers-for-ubiquitous-and-intelligent-i
nfrastructures-third-international-conference-fabulous-2017-bucharest-romania-octob
er-12-14-2017-proceedings-octavian-fratu/
More products digital (pdf, epub, mobi) instant
download maybe you interests ...

Communications and Networking: 12th International


Conference, ChinaCom 2017, Xi’an, China, October 10-12,
2017, Proceedings, Part II Bo Li

https://textbookfull.com/product/communications-and-
networking-12th-international-conference-chinacom-2017-xian-
china-october-10-12-2017-proceedings-part-ii-bo-li/

Computational Intelligence Cyber Security and


Computational Models Models and Techniques for
Intelligent Systems and Automation Third International
Conference ICC3 2017 Coimbatore India December 14 16
2017 Proceedings Geetha Ganapathi
https://textbookfull.com/product/computational-intelligence-
cyber-security-and-computational-models-models-and-techniques-
for-intelligent-systems-and-automation-third-international-
conference-icc3-2017-coimbatore-india-december-14-16/

Computer Aided Architectural Design Future Trajectories


17th International Conference CAAD Futures 2017
Istanbul Turkey July 12 14 2017 Selected Papers 1st
Edition Gülen Ça■da■
https://textbookfull.com/product/computer-aided-architectural-
design-future-trajectories-17th-international-conference-caad-
futures-2017-istanbul-turkey-july-12-14-2017-selected-papers-1st-
edition-gulen-cagdas/

Critical Information Infrastructures Security: 12th


International Conference, CRITIS 2017, Lucca, Italy,
October 8-13, 2017, Revised Selected Papers Gregorio
D'Agostino
https://textbookfull.com/product/critical-information-
infrastructures-security-12th-international-conference-
critis-2017-lucca-italy-october-8-13-2017-revised-selected-
Theoretical Computer Science 35th National Conference
NCTCS 2017 Wuhan China October 14 15 2017 Proceedings
1st Edition Dingzhu Du

https://textbookfull.com/product/theoretical-computer-
science-35th-national-conference-nctcs-2017-wuhan-china-
october-14-15-2017-proceedings-1st-edition-dingzhu-du/

Arabic Language Processing From Theory to Practice 6th


International Conference ICALP 2017 Fez Morocco October
11 12 2017 Proceedings 1st Edition Abdelmonaime Lachkar

https://textbookfull.com/product/arabic-language-processing-from-
theory-to-practice-6th-international-conference-icalp-2017-fez-
morocco-october-11-12-2017-proceedings-1st-edition-abdelmonaime-
lachkar/

Universal Access in Human Computer Interaction Human


and Technological Environments 11th International
Conference UAHCI 2017 Held as Part of HCI International
2017 Vancouver BC Canada July 9 14 2017 Proceedings
Part III 1st Edition Margherita Antona
https://textbookfull.com/product/universal-access-in-human-
computer-interaction-human-and-technological-environments-11th-
international-conference-uahci-2017-held-as-part-of-hci-
international-2017-vancouver-bc-canada-july-9-14-2017-p/

Software Business 8th International Conference ICSOB


2017 Essen Germany June 12 13 2017 Proceedings 1st
Edition Arto Ojala

https://textbookfull.com/product/software-business-8th-
international-conference-icsob-2017-essen-germany-
june-12-13-2017-proceedings-1st-edition-arto-ojala/

Ubiquitous Computing and Ambient Intelligence 11th


International Conference UCAmI 2017 Philadelphia PA USA
November 7 10 2017 Proceedings 1st Edition Sergio F.
Ochoa
https://textbookfull.com/product/ubiquitous-computing-and-
ambient-intelligence-11th-international-conference-
ucami-2017-philadelphia-pa-usa-
Octavian Fratu
Nicolae Militaru
Simona Halunga (Eds.)

241

Future Access Enablers


for Ubiquitous and
Intelligent Infrastructures
Third International Conference, FABULOUS 2017
Bucharest, Romania, October 12–14, 2017
Proceedings

123
Lecture Notes of the Institute
for Computer Sciences, Social Informatics
and Telecommunications Engineering 241

Editorial Board
Ozgur Akan
Middle East Technical University, Ankara, Turkey
Paolo Bellavista
University of Bologna, Bologna, Italy
Jiannong Cao
Hong Kong Polytechnic University, Hong Kong, Hong Kong
Geoffrey Coulson
Lancaster University, Lancaster, UK
Falko Dressler
University of Erlangen, Erlangen, Germany
Domenico Ferrari
Università Cattolica Piacenza, Piacenza, Italy
Mario Gerla
UCLA, Los Angeles, USA
Hisashi Kobayashi
Princeton University, Princeton, USA
Sergio Palazzo
University of Catania, Catania, Italy
Sartaj Sahni
University of Florida, Florida, USA
Xuemin Sherman Shen
University of Waterloo, Waterloo, Canada
Mircea Stan
University of Virginia, Charlottesville, USA
Jia Xiaohua
City University of Hong Kong, Kowloon, Hong Kong
Albert Y. Zomaya
University of Sydney, Sydney, Australia
More information about this series at http://www.springer.com/series/8197
Octavian Fratu Nicolae Militaru

Simona Halunga (Eds.)

Future Access Enablers


for Ubiquitous and
Intelligent Infrastructures
Third International Conference, FABULOUS 2017
Bucharest, Romania, October 12–14, 2017
Proceedings

123
Editors
Octavian Fratu Simona Halunga
Politehnica University of Bucharest University Polytechnica of Bucharest
Bucharest Bucharest
Romania Romania
Nicolae Militaru
University Polytechnica of Bucharest
Bucharest
Romania

ISSN 1867-8211 ISSN 1867-822X (electronic)


Lecture Notes of the Institute for Computer Sciences, Social Informatics
and Telecommunications Engineering
ISBN 978-3-319-92212-6 ISBN 978-3-319-92213-3 (eBook)
https://doi.org/10.1007/978-3-319-92213-3

Library of Congress Control Number: 2018944406

© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2018
This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the
material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation,
broadcasting, reproduction on microfilms or in any other physical way, and transmission or information
storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now
known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication
does not imply, even in the absence of a specific statement, that such names are exempt from the relevant
protective laws and regulations and therefore free for general use.
The publisher, the authors, and the editors are safe to assume that the advice and information in this book are
believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors
give a warranty, express or implied, with respect to the material contained herein or for any errors or
omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in
published maps and institutional affiliations.

Printed on acid-free paper

This Springer imprint is published by the registered company Springer International Publishing AG
part of Springer Nature
The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland
Preface

After the prestigious EAI scientific events in Ohrid, Republic of Macedonia, and in
Belgrade, Republic of Serbia, the Third EAI International Conference on Future Access
Enablers of Ubiquitous and Intelligent Infrastructures (Fabulous 2017) was held in
Bucharest, Romania, hosted by the Politehnica University of Bucharest. The confer-
ence succeeded in providing an excellent international platform for prominent
researchers from academia and industry, innovators and entrepreneurs, to share their
knowledge and their latest results in the broad areas of future wireless networks,
ambient and assisted living, and smart infrastructures.
The main topics of Fabulous 2017 included future access networks, the Internet of
Things and smart city/smart environment applications, communications and computing
infrastructures, security aspects in communications and data processing, and signal
processing and multimedia. Three special sessions – “Computational Modeling and
Invited Papers,” “Multimedia Security and Forensics,” and “Optoelectronic Devices
and Applications Thereof in the Communications Domain” – completed the technical
program. With two invited papers, six keynote speeches, and 39 regular papers, Fab-
ulous 2017 hosted high-quality technical presentations from young researchers and,
also, from well-known specialists from academia and industry who have shaped the
field of wireless communications.
The two invited papers were presented by two young female researchers, Elena
Diana Șandru and Ana Neacșu, PhD and MSc students, respectively, from the Poli-
tehnica University of Bucharest.
The six keynote speeches were presented by Prof. Ramjee Prasad (Aalborg
University, Denmark), Prof. Nenad Filipovic (University of Kragujevac, Serbia), Dr.
Marius Iordache (Orange, Romania), Prof. Hana Bogucka (Poznan University of
Technology, Poland), Dr. Onoriu Brădeanu (Vodafone, Romania), and Thomas Wrede
(SES, Luxembourg).
Fabulous 2017 was co-sponsored by Orange Romania and SES Luxembourg. The
latter company also sponsored the participation of young researchers in the conference,
based on the reviewers’ evaluation. The “Innovative Cybersecurity Public Private
Partnership” round table, chaired by Prof. Iulian Martin from the National Defense
University Carol I and sponsored by Safetech Innovation SRL and Beia Consult
International SRL, were received by participants with great interest. The Best Paper
Award of the conference was granted to the paper “Prediction of Coronary Plaque
Progression Using a Data-Driven the Approach” having as first author Bojana And-
jelkovic Cirkovic, a young researcher from University of Kragujevac, Serbia.
We would like to show our appreciation for the effort, constant support, and
guidance of the Fabulous 2017 conference manager, Katarina Antalova (EAI) and
of the Steering Committee members, Imrich Chlamtac, Liljana Gavrilovska, and
Alberto Leon-Garcia. Our thanks also go to the Organizing Committee, and especially
to the Technical Program Committee, led by Prof. Simona Halunga, whose effort
VI Preface

materialized in a high-quality technical program. We are also grateful to the local


Organizing Committee co-chairs, Dr. Carmen Voicu and Dr. Ioana Manuela Marcu, for
theirs sustained effort in organizing and supporting the conference.
Last but not least, the success of the Fabulous 2017 EAI conference is also due to
the high quality of the participants, researchers from academia and industry, whose
contributions – included in this volume – have proven to be very valuable. It is our
opinion that Fabulous 2017 provided opportunities for the delegates to exchanges their
ideas, to find mutual scientific interests, and thus, to foster future research relations.

May 2015 Octavian Fratu


Nicolae Militaru
Organization

Steering Committee
Imrich Chlamtac EAI/Create-Net and University of Trento, Italy
Liljana Gavrilovska Ss. Cyril and Methodius University in Skopje, Macedonia
Alberto Leon-Garcia University of Toronto, Canada

Organizing Committee
General Chairs
Octavian Fratu Politehnica University of Bucharest, Romania
Liljana Gavrilovska Ss. Cyril and Methodius University, Skopje, Macedonia

Technical Program Committee Chair


Simona Halunga Politehnica University of Bucharest, Romania

Web Chair
Alexandru Vulpe Politehnica University of Bucharest, Romania

Publicity and Social Media Chairs


Albena Mihovska Aalborg University, Denmark
Cristian Negrescu Politehnica University of Bucharest, Romania

Workshop Chairs
Corneliu Burileanu Politehnica University of Bucharest, Romania
Pavlos Lazaridis University of Huddersfield, UK

Sponsorship and Exhibits Chair


Eduard Cristian Popovici Politehnica University of Bucharest, Romania

Publications Chair
Nicolae Militaru Politehnica University of Bucharest, Romania

Posters and PhD Track Chairs


Răzvan Tamaș Constanta Maritime University, Romania
Alexandru Martian Politehnica University of Bucharest, Romania
VIII Organization

Local Chairs
Carmen Voicu Politehnica University of Bucharest, Romania
Ioana Manuela Marcu Politehnica University of Bucharest, Romania

Secretariat
Madalina Berceanu Politehnica University of Bucharest, Romania
Ana-Maria Claudia Politehnica University of Bucharest, Romania
Dragulinescu

Conference Manager
Katarina Antalova European Alliance for Innovation

Technical Program Committee


Anđelković-Ćirković University of Kragujevac, Serbia
Bojana
Atanasovski Vladimir Ss. Cyril and Methodius University in Skopje, Macedonia
Bota Vasile Technical University of Cluj, Romania
Boucouvalas Anthony University of the Peloponnese, Greece
Brădeanu Onoriu Vodafone, Romania
Burileanu Dragos University Politehnica of Bucharest, Romania
Chiper Doru Florin Gheorghe Asachi Technical University of Iaşi, Romania
Croitoru Victor University Politehnica of Bucharest, Romania
Enaki Nicolae Academy of Sciences of Moldova
Feieș Valentin University Politehnica of Bucharest, Romania
Filipović Nenad University of Kragujevac, Serbia
Halunga Simona University Politehnica of Bucharest, Romania
Marghescu Ion University Politehnica of Bucharest, Romania
Ionescu Bogdan University Politehnica of Bucharest, Romania
Isailović Velibor University of Kragujevac, Serbia
Khwandah Sinan Brunel University London, UK
Latkoski Pero Ss. Cyril and Methodius University in Skopje, Macedonia
Lazaridis Pavlos University of Huddersfield
Manea Adrian University Politehnica of Bucharest, Romania
Marcu Ioana University Politehnica of Bucharest, Romania
Mihovska Albena Aarhus University, Denmark
Militaru Nicolae University Politehnica of Bucharest, Romania
Nikolić Dalibor University of Kragujevac, Serbia
Paleologu Constantin University Politehnica of Bucharest, Romania
Pejanović-Đurišić Milica University of Montenegro
Petrescu Teodor University Politehnica of Bucharest, Romania
Popovici Eduard Cristian University Politehnica of Bucharest, Romania
Poulkov Vladimir Technical University of Sofia, Bulgaria
Preda Radu Ovidiu University Politehnica of Bucharest, Romania
Radusinović Igor University of Montenegro
Organization IX

Șchiopu Paul University Politehnica of Bucharest, Romania


Suciu George Beia Consult International, Romania
Tamaș Razvan Constanța Maritime University, Romania
Udrea Mihnea University Politehnica of Bucharest, Romania
Vlădescu Marian University Politehnica of Bucharest, Romania
Voicu Carmen University Politehnica of Bucharest, Romania
Vulović Aleksandra University of Kragujevac, Serbia
Vulpe Alexandru University Politehnica of Bucharest, Romania
Zaharis Zaharias Aristotle University of Thessaloniki, Greece
Zenkova Claudia Chernivtsi National University, Ukraine
Contents

Fabulous Main Track

A Hybrid Testbed for Secure Internet-of-Things . . . . . . . . . . . . . . . . . . . . . 3


Ștefan-Ciprian Arseni, Alexandru Vulpe, Simona Halunga,
and Octavian Fratu

Considerations on Estimating the Minimal Level of Attenuation


in TEMPEST Filtering for IT Equipments . . . . . . . . . . . . . . . . . . . . . . . . . 9
Mircea Popescu, Răzvan Bărtuşică, Alexandru Boitan, Ioana Marcu,
and Simona Halunga

Innovative Platform for Resource Allocation in 5G M2M Systems . . . . . . . . 16


Alexandru Vulpe, George Suciu, Simona Halunga,
and Octavian Fratu

Implications of Network Resources and Topologies Over


SDN System Performances. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Bojan Velevski, Valentin Rakovic, and Liljana Gavrilovska

A Preview on MIMO Systems in 5G New Radio . . . . . . . . . . . . . . . . . . . . 32


Razvan-Florentin Trifan, Andrei-Alexandru Enescu,
and Constantin Paleologu

Compromising Electromagnetic Emanations of Wired USB Keyboards . . . . . 39


Alexandru Boitan, Razvan Bărtușică, Simona Halunga,
Mircea Popescu, and Iulian Ionuță

Security Risk: Detection of Compromising Emanations Radiated


or Conducted by Display Units . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
Răzvan Bărtușică, Alexandru Boitan, Simona Halunga, Mircea Popescu,
and Valerică Bindar

LDPC Coding Used in Massive-MIMO Systems . . . . . . . . . . . . . . . . . . . . . 52


Cela-Roberta Stanciu and Carmen Voicu

Pesticide Telemetry Using Potentiostat. . . . . . . . . . . . . . . . . . . . . . . . . . . . 58


George Suciu, Alexandru Ganaside, Laurentiu Bezdedeanu,
Robert Coanca, Stefania Secu, Carmen Nădrag,
and Alexandru Marțian
XII Contents

5G Challenges, Requirements and Key Differentiating Characteristics


from the Perspective of a Mobile Operator . . . . . . . . . . . . . . . . . . . . . . . . . 64
Elena-Mădălina Oproiu, Catalin Costea, Marius Nicuşor Nedelcu,
Marius Iordache, and Ion Marghescu

Microwave Microstrip Antenna Bio-Inspired from Dendritic Tree . . . . . . . . . 71


Bogdan-Mihai Gavriloaia, Marian Novac,
and Dragos-Nicolae Vizireanu

Smart Pharma: Towards Efficient Healthcare Ecosystem . . . . . . . . . . . . . . . 77


Sadia Anwar, Bhawani S. Chowdhry, and Ramjee Prasad

Sign Language Translator System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83


Alin Florian Stoicescu, Razvan Craciunescu, and Octavian Fratu

Analysis of Relay Selection Game in a Cooperative


Communication Scenario . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
Razvan Craciunescu, Simona Halunga, and Albena Mihovska

Estimation Algorithm for Large MIMO System . . . . . . . . . . . . . . . . . . . . . 95


Carmen Voicu, Mădălina Berceanu, and Simona V. Halunga

Quantitative Theory of Signal Inversion in RFID . . . . . . . . . . . . . . . . . . . . 101


Dan Tudor Vuza, Reinhold Frosch, Helmut Koeberl, Idlir Rusi Shkupi,
and Marian Vlădescu

Architecture of a Wireless Transport Network Emulator for SDN


Applications Development . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
Alexandru Stancu, Alexandru Vulpe, Simona Halunga,
and Octavian Fratu

Neural Network Based Architecture for Fatigue Detection


Based on the Facial Action Coding System . . . . . . . . . . . . . . . . . . . . . . . . 113
Mihai Gavrilescu and Nicolae Vizireanu

Using Off-Line Handwriting to Predict Blood Pressure Level:


A Neural-Network-Based Approach. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124
Mihai Gavrilescu and Nicolae Vizireanu

SDWN for End-to-End QoS Path Selection in a Wireless Network


Ecosystem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134
Eugeniu Semenciuc, Andra Pastrav, Tudor Palade,
and Emanuel Puschita

Intelligent Low-Power Displaying and Alerting Infrastructure for Secure


Institutional Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141
Alexandru Vulpe, Marius Vochin, Laurentiu Boicescu,
and George Suciu
Contents XIII

On the Regularization of the Memory-Improved Proportionate Affine


Projection Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151
Roxana Mihăescu, Cristian Stanciu, and Constantin Paleologu

SmartGreeting: A New Smart Home System Which Enables


Context-Aware Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158
Ana-Maria Claudia Drăgulinescu, Andrei Drăgulinescu, Ioana Marcu,
Simona Halunga, and Octavian Fratu

Session on Multimedia Security and Forensics

A New Approach in Creating Decision Systems Used


for Speaker Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167
Vlad Andrei Cârstea, Robert Alexandru Dobre, Claudia Cristina Oprea,
and Radu Ovidiu Preda

Efficient Transform Coefficient Coding in HEVC . . . . . . . . . . . . . . . . . . . . 173


Claudia C. Oprea, Radu O. Preda, Ionut Pirnog, and Robert Al. Dobre

Investigation on a Multimedia Forensic Noise Reduction Method


Based on Proportionate Adaptive Algorithms . . . . . . . . . . . . . . . . . . . . . . . 179
Robert Alexandru Dobre, Constantin Paleologu, Cristian Negrescu,
and Dumitru Stanomir

Encrypting Multimedia Data Using Modified Baptista’s


Chaos-Based Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185
Octaviana Datcu, Radu Hobincu, Mihai Stanciu,
and Radu Alexandru Badea

Session on Optoelectronic Devices and Applications thereof


in Communications Domain

Real - Time Spatial Light Modulated Digital Holographic Interferometry


Applied in Art Structural Diagnosis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193
Adrian Sima, Paul Schiopu, Marian Vladescu,
Bogdan-Mihai Gavriloaia, Florin Garoi, and Victor Damian

Studies on the Transient, Continuous and Pulsed Regimes


of High Power LEDs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199
Dan Tudor Vuza and Marian Vlădescu

Performance Improvement of a Multi-head Optical Wireless


Communication System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206
Viorel Manea, Sorin Puşcoci, and Dan Alexandru Stoichescu
XIV Contents

Key Aspects of Infrastructure-to-Vehicle Signaling Using Visible


Light Communications. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 212
Alina Elena Marcu, Robert Alexandru Dobre, and Marian Vlădescu

Optoelectronic Method for Determining the Aluminium Involved


in Symptoms of Attention Deficit Hyperactivity Disorder Children . . . . . . . . 218
Elena Truţă, Ana Maria Daviţoiu, Ana Mihaela Mitu,
Alexandra Andrada Bojescu, Paul Şchiopu, Marian Vlădescu,
Genica Caragea, Luminiţa Horhotă, Maria Gabriela Neicu,
and Mihai Ionică

Session on Computational Modeling

Prediction of Coronary Plaque Progression Using Data Driven Approach . . . . 227


Bojana Andjelkovic Cirkovic, Velibor Isailovic, Dalibor Nikolic,
Igor Saveljic, Oberdan Parodi, and Nenad Filipovic

Optimization of Parameters for Electrochemical Detection: Computer


Simulation and Experimental Study . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234
Marko N. Živanović, Danijela M. Cvetković, and Nenad D. Filipović

Assessment of Machine Learning Algorithms for the Purpose


of Primary Sjögren’s Syndrome Grade Classification from Segmented
Ultrasonography Images. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239
Arso Vukicevic, Alen Zabotti, Salvatore de Vita, and Nenad Filipovic

Autonomous System for Performing Dexterous, Human-Level


Manipulation Tasks as Response to External Stimuli in Real Time . . . . . . . . 246
Ana Neacșu, Corneliu Burileanu, and Horia Cucu

Recent Experiments and Findings in Baby Cry Classification . . . . . . . . . . . . 253


Elena-Diana Șandru, Andi Buzo, Horia Cucu, and Corneliu Burileanu

Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261


Fabulous Main Track
A Hybrid Testbed for Secure
Internet-of-Things

Ștefan-Ciprian Arseni(&), Alexandru Vulpe(&), Simona Halunga,


and Octavian Fratu

Telecommunications Department, University Politehnica of Bucharest, 1-3 Iuliu


Maniu Blvd., 061071 Bucharest, Romania
{stefan.arseni,alex.vulpe}@radio.pub.ro, {shalunga,
ofratu}@elcom.pub.ro

Abstract. The need for insertion of technology in everyday tasks has brought
an increase in new methodologies and concepts used to accomplish such
objectives. By trying to make technology an enabler for an increasing number of
personal or work-related activities, we allow devices to collect data about our
way of being, that, if not properly protected and used, can prove a vulnerability
for our personal security. This is why new means of securing information, even
by the tiniest or low-resource devices, need to be implemented and, in many
cases, they take the form of cryptographic algorithms, classic or lightweight.
Assessing these algorithms can sometimes become difficult, depending on the
targeted system or on the environment where the device will be deployed. To
address this issue and help developers, in this paper we present a hybrid testbed,
comprised of three hardware architectures, that will ensure a general environ-
ment in which users can test their security solutions, in order to have an idea of
what changes need to be made to provide optimal performances.

Keywords: Internet-of-Things  Security  Hybrid testbed


Software middleware  Hardware architectures

1 Introduction

Ever since the industrial revolution, humanity has been searching for methods of
creating better technologies that can improve the way humans not only interact with the
environment, but also how they make use of the resources provided. Recent years have
brought a new technological revolution, in terms of miniaturization of devices and their
embedment in all layers of society. Earlier proposed concepts, such as Internet of
Things [1, 2], Cloud Computing [3, 4] or Deep Learning [5, 6], have become today’s
trending technologies, being in a continuous process of development [7] and integra-
tion [8–10]. Yet, this fast pace that is characteristic to any recent offer-demand pair in
nowadays’ economy [11, 12] introduces also some vulnerabilities regarding mainly the
security aspects [13, 14]. Focusing on the Internet of Things (IoT) concept [15, 16], the
embedment of sensors or smart devices in the environment [17] surrounding us sets
new thresholds that need to be passed before any data is captured, processed and/or
transmitted to a sink device or to a Cloud service.

© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2018
O. Fratu et al. (Eds.): FABULOUS 2017, LNICST 241, pp. 3–8, 2018.
https://doi.org/10.1007/978-3-319-92213-3_1
4 Ș.-C. Arseni et al.

Addressing the need of security in transmitting information has been generally


made by using cryptographic algorithms to encrypt the data that needs to be sent. These
cryptographic algorithms have different key features that make them reliable under
certain conditions or in specific environments. The miniaturization of devices brought a
problem for security, given that classic cryptographic algorithms require a certain
amount of resources to function with an acceptable performance. The constraint
resources of a sensor or embedded device lead to the introduction of a new branch of
cryptographic algorithms, namely lightweight cryptographic algorithms that give a
reasonable degree of security, without requiring too many resources [18–20].
Being a relatively new study domain, when compared to classic cryptography,
lightweight cryptographic algorithms can, sometimes, prove to be difficult to imple-
ment or create, thus requiring a strict phase of testing in which any minor vulnerability
or performance drop can be resolved. The hybrid testbed presented in this article was
first introduced in [21] and it addresses the problem of testing the implementations of
lightweight cryptography, by giving developers a unified platform to conduct their tests
on. This testbed is comprised of three different types of hardware architectures, so that
the behavior of the implementation on specific environments can be observed. The
access to these hardware architectures is done through a middleware that acts as a
unique point-of-entrance, enabling developers to write their implementation once and
test it simultaneously or consecutively, on each one of the three base architectures. This
paper continues the testbed presentation initiated in the previously mentioned paper, by
adding information regarding the middleware layer of the testbed, on how it makes use
of the hardware architectures and how it enables users to interact with the testbed.
The present paper is organized as follows. Section 2 gives an overview of the
proposed testbed, while in Sect. 3 we focus on the software layer of the testbed and
give a description of the method of interfacing users with the middleware. In Sect. 4,
some conclusions are drawn.

2 Overview of the Testbed

In scientific literature, multiple papers, [22–26], have presented the benefits given by
the hardware implementations of cryptographic algorithms as compared to the software
counterparts. By integrating in our testbed an SDSoC (Software Defined
System-On-a-Chip) that contains also a number of logical gates that can be pro-
grammed, we enable users to test their implementation in this type of environment also.
The other two hardware architectures of the testbed allow only a software imple-
mentation of an algorithm.
In order for users to interact with these hardware architectures, they need to interact
with the middleware layer of the testbed. This layer is composed of two sub- layers:
one consisting of the drivers or APIs (Application Programming Interface), required to
communicate with the hardware layer, and one consisting of the integrator APIs which
developers will use and integrate in their implementations.
The main architecture of the testbed, with an emphasis on the hardware layer, was
presented in papers [21, 27] and Fig. 1 depicts its high-level design. The current paper
continues the description through an initial validation of the middleware layer,
A Hybrid Testbed for Secure Internet-of-Things 5

emphasizing on the connection of it with the hardware layer and the means that users
can access its functions.

Fig. 1. Main architecture of testbed

3 Middleware Layer of the Testbed

As described in [27], the main challenge is to create a unified access point for all three
hardware systems, while maintaining control over the operating characteristics that
represent criteria when assessing an algorithm. In order to achieve this point of inte-
gration the platforms were customized to support a self-contained operating environ-
ment, either under the form of an operating system or a scheduler-service, as will be
described in the remaining part of the section.
Each one of the hardware architectures presents its own methods of interaction that
are made available to a user or developer. Figure 2 presents an overview of forming
and receiving, by the corresponding architecture, the API and driver calls, shown in
Fig. 1. The UI (User Interface) is the component that sends calls to the middleware and
customizes the task sent to each one of the hardware elements, as follows:
• For the standard x64 processor that can run also x86 applications, a simple task
dispatcher is implemented as a service that waits for the user to send a task to be
executed. The task represents an algorithm implementation that is done by the user
and sent through the testbed UI. After the completion of the task, collected metrics
are parsed and sent to the UI to give the user a performance view of its imple-
mentation or algorithm.
• The SDSoC architecture is comprised of two hardware elements that can be used
either separately or as a whole. In our proposed testbed, these elements are used as
one, by establishing the required communication bridge between them. The FPGA
(Field Programmable Gate Array) element contains some defined cryptographic
functions, such as permutation, standard AES (Advanced Encryption Standard) S-
Boxes or substitutions, which can increase the performance of an algorithm. The
implementation in FPGA was taken into consideration given a few performance
tests made between a hardware and software implementation of the same algorithm,
6 Ș.-C. Arseni et al.

Fig. 2. Hardware layer customization

tests that were briefly presented in [27]. The second element, the processor, is the
point in which the dispatcher service resides and the task is mainly being executed.
After the successful completion of the task, results are parsed and transmitted to the
UI.
• The third hardware element takes advantage of the possibility of dynamically
writing an application into the Flash memory that can be executed afterwards.
Implemented as a bootloader, the scheduling-service waits for a task to be deployed
through the UI. After receiving a task, the service writes it into the Flash at a
separate address and launches it into execution. In this case, the service will return
in the waiting state, but will not have the functionality of parsing and sending the
results. This functionality will reside in the task itself and will be attached to the
user code at deployment.
After terminating all the deployed tasks, the UI will act also as a collector of data
from the underlying dispatcher-services, by formatting and grouping the data and
presenting it to the user as performance metrics.
A Hybrid Testbed for Secure Internet-of-Things 7

4 Conclusions

The paper introduces a part of the elements that the proposed hybrid testbed contains,
with a focus on the software layer and on method of interaction between users and it.
Given that this testbed will enable simultaneous testing on three different hardware
architectures, it can prove to be an important factor in the process of large-scale
integration of the IoT concept. An initial validation of the proposed testbed has been
made with high-level tests, through which observations were made on how the testbed
can be completely integrated and how multiple functionalities can be developed for
users.

Acknowledgments. This work was supported by University “Politehnica” of Bucharest,


through the “Excellence Research Grants” Program, UPB – GEX, Identifier: UPB–EXCE-
LENTA–2016, project “Platform for Studying Security in IoT”, contract number 96/2016
(PaSS-IoT) and by a grant of the Ministry of Innovation and Research, UEFISCDI, project
number 5 Sol/2017 within PNCDI III and partially funded by UEFISCDI Romania under grant
no. 60BG/2016 “Intelligent communications system based on integrated infrastructure, with
dynamic display and alerting - SICIAD”.

References
1. Wortmann, F., Flüchter, K.: Internet of Things - technology and value added. Bus. Inf. Syst.
Eng. 57(3), 221–224 (2015)
2. Gubbia, J., Buyyab, R., Marusica, S., Palaniswamihuang, M.: Internet of Things (IoT): a
vision, architectural elements, and future directions. Future Gener. Comput. Syst. 29(7),
1645–1660 (2013)
3. Qian, L., Luo, Z., Du, Y., Guo, L.: Cloud computing: an overview, cloud computing. In:
Proceedings of The First International Conference CloudCom 2009, Beijing, China, 1–4
December 2009, pp. 626–631 (2009)
4. Buyyaa, R., Yeoa, C.S., Venugopala, S., Broberga, J., Brandic, I.: Cloud computing and
emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility.
Future Gener. Comput. Syst. 25(6), 599–616 (2009)
5. Schmidhuber, J.: Deep learning in neural networks: an overview. Neural Netw. 61, 85–117
(2015)
6. LeCun, Y., Bengio, Y., Hinton, G.: Deep learning. Nature 521(7553), 436–444 (2015).
https://doi.org/10.1038/nature14539
7. Miorandia, D., Sicarib, S., De Pellegrinia, F., Chlamtaca, I.: Internet of Things: vision,
applications and research challenges. Ad Hoc Netw. 10(7), 1497–1516 (2012)
8. Botta, A., Donato, W., Persico, V., Pescapé, A.: Integration of cloud computing and Internet
of Things: a survey. Future Gener. Comput. Syst. 56, 684–700 (2016)
9. Lane, N.D., Bhattacharya, S., Georgiev, P., Forlivesi, C., Kawsar, F.: An early resource
characterization of deep learning on wearables, Smartphones and Internet-of-Things devices.
In: Proceedings of the 2015 International Workshop on Internet of Things Towards
Applications, 01 November 2015, Seoul, South Korea (2015). https://doi.org/10.1145/
2820975.2820980
8 Ș.-C. Arseni et al.

10. Ma, X., Yu, H., Wang, Y., Wang, Y.: Large-scale transportation network congestion
evolution prediction using deep learning theory. PLoS ONE 10(3), e0119044 (2015). https://
doi.org/10.1371/journal.pone.0119044
11. Porter, M.E., Heppelmann, J.E.: How smart, connected products are transforming
competition. Harvard Bus. Rev. 92(11), 64–88 (2014)
12. Weber, R.H.: Internet of Things – new security and privacy challenges. Comput. Law Secur.
Rev. 26(1), 23–30 (2010)
13. Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud
computing. J. Netw. Comput. Appl. 34(1), 1–11 (2011)
14. Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Future Gener. Comput.
Syst. 28(3), 583–592 (2012)
15. Sicaria, S., Rizzardia, A., Griecob, L.A., Coen-Porisini, A.: Security, privacy and trust in
Internet of Things: the road ahead. Comput. Netw. 76, 146–164 (2015)
16. Yana, Z., Zhangc, P., Vasilakos, A.V.: A survey on trust management for Internet of Things.
J. Netw. Comput. Appl. 42, 120–134 (2014)
17. Romana, R., Zhoua, J., Lopezb, J.: On the features and challenges of security and privacy in
distributed Internet of Things. Comput. Netw. 57(10), 2266–2279 (2013)
18. Poschmann, A.Y.: Lightweight cryptography: cryptographic engineering for a pervasive
world. Ph.D. thesis (2009)
19. Masanobu, K., Moriai, S.: Lightweight cryptography for the Internet of Things. Sony
Corporation (2008). https://pdfs.semanticscholar.org/9595/b5b8db9777d5795625886418d3
8864f78bb3.pdf
20. Manifavas, C., Hatzivasilis, G., Fysarakis, K., Rantos, K.: Lightweight cryptography for
embedded systems – a comparative analysis. In: Garcia-Alfaro, J., Lioudakis, G.,
Cuppens-Boulahia, N., Foley, S., Fitzgerald, William M. (eds.) DPM/SETOP -2013. LNCS,
vol. 8247, pp. 333–349. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-642-
54568-9_21
21. Arseni, S., Mițoi, M., Vulpe, A.: PASS-IoT: a platform for studying security, privacy and
trust in IoT. In: 11th International Conference on Communications (COMM 2016),
Bucharest, Romania, 9–11 June 2016 (2016). ISBN: 978-1-4673-8196-3
22. Eisenbarth, T., Sandeep, K.: A survey of lightweight-cryptography implementations. IEEE
Des. Test Comput. 24(6), 222–533 (2007)
23. Panasayya, Y., Kaps, J.-P.: Lightweight cryptography for FPGAs. In: 2009 Proceedings of
International Conference on Reconfigurable Computing and FPGAs, ReConFig 2009,
pp. 225–230. IEEE (2009)
24. Cédric, H., Kamel, D., Regazzoni, F., Legat, J.-D., Flandre, D., Bol, D., Standaert, F.-X.:
Harvesting the potential of nano-CMOS for lightweight cryptography: an ultra-low- voltage
65 nm AES coprocessor for passive RFID tags. J. Cryptograph. Eng. 1(1), 79–86 (2011)
25. Aydin, A., Gulcan, E., Schaumont, P.: SIMON says: break area records of block ciphers on
FPGAs. IEEE Embed. Syst. Lett. 6(2), 37–40 (2014)
26. Vivek, V., Shila, D.M.: High throughput implementations of cryptography algorithms on
GPU and FPGA. In: 2013 IEEE International Instrumentation and Measurement Technology
Conference (I2MTC), pp. 723–727. IEEE (2013)
27. Vulpe, A., Arseni, Ş.-C., Marcu, I., Voicu, C., Fratu, O.: Building a unified middleware
architecture for security in IoT. In: Rocha, Á., Correia, A.M., Adeli, H., Reis, L.P.,
Costanzo, S. (eds.) WorldCIST 2017. AISC, vol. 570, pp. 105–114. Springer, Cham (2017).
https://doi.org/10.1007/978-3-319-56538-5_11
Considerations on Estimating the Minimal
Level of Attenuation in TEMPEST Filtering
for IT Equipments

Mircea Popescu1(&), Răzvan Bărtuşică1, Alexandru Boitan1,


Ioana Marcu2, and Simona Halunga2
1
The Special Telecommunications Service, Bucharest, Romania
mpopescu@sts.ro
2
University Politehnica of Bucharest, Bucharest, Romania
imarcu@radio.pub.ro

Abstract. The main purpose of this research is to improve the security of


critical computer systems with minimal costs. One of the main problems in such
cases is the secondary emissions generated by electronic equipment that,
sometimes, might contain confidential information stored inside a secured
computer network. The implementation of a set of measures necessary to pre-
vent information leakage through compromising emissions is generally expen-
sive. This paper analyzes some minimal requirements that have to be fulfilled by
the filtering devices in order to protect the existing commercial IT equipment
against compromising emissions.

Keywords: Compromising emissions  TEMPEST  Electrical filter

1 Introduction

Protection against electromagnetic disturbances is becoming an increasingly important


issue for all researchers that have to deal with critical information, such as banks,
commerce and security, given that our daily activity becomes more dependent on
computers and telecommunications. As they become more and more sophisticated, they
tend to become less resistant to electromagnetic interferences.
Both filtering and shielding are designed to reduce the electromagnetic radiation, so
these two operations can be seen as a synergy, each complementing the other. Thus it is
important to understand that inappropriate filtering can easily increase the risk of
radiated coupling and inappropriate shielding can lead to conductive coupling.
A proper design of the filters may prevent interferences from electrical wires inside
or outside the protected area through metallic interfaces, reducing the conductive
coupling, as well as the radial coupling to and from the cables. In TEMPEST protection
[1] filters are used to prevent these interferences generated in computer equipment to
propagate outward as compromising emissions transmitted through the power supply
network.
A large number of research and studies in the area of compromising emissions in
the interconnection lines of electrical equipment are under development, underlining

© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2018
O. Fratu et al. (Eds.): FABULOUS 2017, LNICST 241, pp. 9–15, 2018.
https://doi.org/10.1007/978-3-319-92213-3_2
10 M. Popescu et al.

the importance of the domain. In [1–3] the authors concentrated on evaluating and
reducing the compromising radiations of LCD/TV sets, while in [4] a number of
TEMPEST security testing models and countermeasures are illustrated. In [5] the
authors presented the results obtained in reconstruction of laser printer information
based on the leakages in the media of electromagnetic radiation, power and signal lines.
A model and testing procedures for critical systems to severe electro-magnetic threats
are given in [6] while in [7] the authors show a number of results related to efficiency of
shielding for communication equipment under TEMPEST evaluation.
In this paper we estimate a minimum level of attenuation of an electrical filter
installed on the supply line of commercial computer equipment, so that at the exit of the
controllable zone the compromising signals generated by the equipment cannot be
detected and intercepted by a hostile receiver. Based on the developed testbed the
estimated value is then verified under worst case scenario.
The paper is organized as follows: Sect. 2 sets the theoretical basis for estimating
the minimum attenuation value of an electric filter for TEMPEST protection of com-
mercial computer; Sect. 3 illustrates by relevant laboratory tests the theoretical con-
siderations presented in Sects. 2 and 4 contains the main conclusions drawn from tests
in Sect. 3.

2 Estimation of the Minimum Attenuation Level for an


Electrical Filter in TEMPEST Protection

To establish the minimum level of attenuation of the filter installed on the power line to
ensure TEMPEST protection of an IT system, we assume the following: the target
computer equipment is commercial type (COTS) and meets the electromagnetic dis-
turbance requirements specified in European Standard EN 55022 [8]; the signal-to-
noise ratio (SNR) received on the power line in the controllable space is limited to 1 (or
0 dB) to reduce the probability of detecting compromising emissions generated by
computer equipment; the attacker has the ability to connect sensitive receivers directly
to the building’s power supply, communication cables or other metal structures near the
target device as well as to receive and process compromising signals with low levels
comparable to electrical noise; the electrical noise received by the interceptor on the
power line is specific to the residential environment; the interceptor searches for
broadband pulses in a quiet zone of the spectrum, with as little external interference as
possible; it uses “notch” filters to suppress strong emissions from narrowband radio
stations as well as strong signal processing techniques to extract the information carrier
from the unwanted background noise.
The minimum filter attenuation level installed on the power line to reduce the
probability of detecting and intercepting compromising emissions by a hostile receiver
at the limit of controllable space can be determined by [1]

UB  Gp
AF : ð1Þ
Un;B  Ac  fr  SNR
Considerations on Estimating the Minimal Level 11

where UB is the maximum voltage of the conducted disturbances allowed by EN 55022


[8] received with equipment with the IF bandwidth B; Gp is the processing gain
obtained by specific techniques (e.g. periodic mediation, correlations) for recovering
the information from the compromising signal; Un,B is the root mean square of the
background noise noticed by the IF receiver with the bandwidth B; AF is the attenu-
ation of the electrical filter installed on the power line between the target equipment and
the hostile receiver; Ac is the attenuation of the signal through the conductor network
between the target equipment and the hostile receiver; fr is the noise figure of the
interceptor receiver.
Rewriting (1) on a logarithmic scale

½AF  ¼ ½UB  þ ½Gp   ½Un;B   ½Ac   ½fr   ½SNR; ð2Þ

where [x] = 20lg (x) is the value of parameter x expressed in dB.


The noise and cable attenuation values in the above equations are random variables,
which, in the absence of standardized data, might be modeled as a normal distribution
with mean and variance evaluated statistically based on a large number of measure-
ments in different environments. For other parameters, reasonable estimates must be
made, based on the values used in most practical applications, such that the [SNR]
should be below an acceptable level with a sufficient detection probability.
Different types of target signals are received on different frequency ranges and
allow different processing gains. Thus all parameters must be estimated separately for
the different types of signal of interest. In this paper we assume that the signals have the
data rate equal to 5 MHz (e.g. the signal generated by the video card).
The EN 55022 EMC standard imposes that the maximum allowed voltage distur-
bances measured across a 50 X impedance in parallel with 50 lH should not exceed
46 dBlV in the frequency range 0.5  5 MHz, respectively 50 dBlV in the frequency
range 5  30 MHz measured with a average detector having a resolution bandwidth of
9 kHz [8]. The compromising emissions of modern digital signals contains wideband
impulses so the receiver passband has to be extended from 9 kHz (specified in EN
55022 standard) to 2 or 5 MHz. Hence, the received signal strength increases by 20lg
(2 MHz/9 kHz) = 47 dB for signal with the bandwidth of 2 MHz, and 20lg
(5 MHz/9 kHz) = 55 dB for signal with the bandwidth 5 MHz.
To determine the value of the electrical filter attenuation, [AF], the worst case
scenario has been taken into consideration corresponding to the case in which the
electronic equipment generates secondary emissions on the power line to the maximum
allowed level. Applying this correction (i.e. for 5 MHz resolution bandwidth) we
obtain the limits for the conducted emissions: [UB] = (46 + 55) = 101 dBµV, for
RBW@5 MHz, in the frequency range 0.5  5 MHz and [UB ] = (50 + 55) =
105 dBµV for RBW@5 MHz in the frequency range 5  30 MHz.
The eavesdropping receiver used for tests is a Rohde& Schwarz FSET 7 with IF
bandwidths of 2 or 5 MHz and noise figure [fr] = 7 dB [7]. Using time domain
averaging to increase the signal-to-noise ratio of a periodic signal [1] with N repetitions
of a properly in phase aligned signal the processing gain can be calculated by
12 M. Popescu et al.

pffiffiffiffi
Gp ¼ N or ½Gp  ¼ 10  lgN ðdBÞ: ð3Þ

Assuming that the attacker applies signal processing techniques by mediating the
received signal on N = 10 frames, the resulting processing gain is approximately
10 dB. The noise on the power supply is expected to be at least 30 dB above the
thermal noise level [1, 9] which is 0 dBlV at B = 5 MHz. Therefore [Un,5] = 30
dBlV might be a plausible value of the electrical noise received on the power line at
B = 5 MHz. From experimental measurements the attenuation between two outlets in a
building for the frequency range 1  60 MHz can be, on average, around 10 dB if the
sockets are in the same circuit, and 40 dB if they are located in different circuits [1, 9].
From (3) there can be determined the minimum attenuation value, [AF], for a low- pass
filter in the HF/VHF frequency range installed on the power supply line of the com-
puter system, so, at the building boundary, the compromising signals accidentally
emissions transmitted on the power circuit from a COTS computer system cannot be
detected by an attacker, is given by

½AF  ¼ 105 þ 10  30  10  7  0 ¼ 68 dB ð4Þ

Thus we can conclude that a low-pass electrical filter with attenuation equal to
70 dB, evaluated for HF/VHF frequency range, provides adequate TEMPEST pro-
tections if all the COTS informatics equipment operated indoor comply with EN55022
limits.

3 Experimental Validations of the Results

In order to validate the theoretical aspects presented in Sect. 2, a series of tests


and measurements were carried out in Special Telecommunications Service (STS)
TEMPEST lab.
The first test aimed to detect compromising emissions generated by a commercial
computer on the power line and recover the information contained in the received
emissions. To achieve this, a test receiver Rohde& Schwarz FSET 7 with IF band-
widths of 5 MHz was used and a line impedance stabilization network (LISN) was
installed on the supply line of the test equipment. The results, presented in Fig. 1a,
show the level of the secondary emissions through the power line from a computer with
an image displayed on the monitor (red trace) and without an image displayed on the
monitor (green trace). From the spectral analysis a compromise emission around
25 MHz has been determined, which in this case contains the video signal from the
video card. Using a dedicated software package for TEMPEST evaluation, the signals
received at the 25.37 MHz frequency were filtered, correlated and the image displayed
by the test computer monitor was restored, as shown in Fig. 1b.
The second test has been developed to validate the estimated value for the atten-
uation of the electrical filter obtained in Sect. 2. For this, the test configuration in
Fig. 2a has been used, where PG is the pulse generator, RFG is the radiofrequency
signal generator Rohde & Schwarz SMP04, ATT is the variable attenuator, REC is the
TEMPEST test receiver, Rohde & Schwarz FSET7 and AQ&PC are the data
Considerations on Estimating the Minimal Level 13

Compromising emissions

(1)

(2)

(a) (b)

Fig. 1. (a) The comparative spectral analysis of the secondary emissions in power line by a
computer using an image displayed on the monitor (trace 1) and no image displayed on the
monitor (trace 2), and (b) recovered image processed from secondary emissions by a computer,
from power line. (Color figure online)

acquisition board and processing computer. To simulate the compromising signal


generated by an electronic device, we use a periodic radio pulse as reference signal,
with the carrier frequency of 25 MHz, the modulating frequency of 5 MHz and the
modulation index of 50%. The RF generator has been set for a signal level of
105 dBlV, which is the level corresponding to the EMC limit of the EN 55022
converted for the 5 MHz band. This reference emission obtained with the RF generator
was injected into the power line of a computer using an absorbing clamp Rohde &
Schwarz MDS21. The computer power cable with the length of 10 m was inserted into
the LISN. The RF output from LISN was connected to a variable attenuator, used to
simulate the attenuation introduced by an electrical filter interposed between the
computer equipment and the hostile receiver. In the reception chain a test receiver
(Rohde & Schwarz FSET 7) set on 5 MHz IF bandwidth was connected. The receiver
video output was connected to the acquisition board and a computer for spectral
analysis and data processing. The reference electrical signal injected onto the computer
power line is shown in Fig. 2b.
Next, the variable attenuator was incrementally increased until the reference signal
was covered by the power line radio frequency, so [SNR] = 0 dB was obtained. Thus, it
has been concluded that for 65 dB attenuation, the electrical signal from the power line
cannot be restored. From the comparative analysis between theoretical and practical
results, it has been concluded that a 70 dB attenuation of the electrical filter installed on
a computer’s power line ensures the TEMPEST protection of the information system
against leakage through secondary emissions.
14 M. Popescu et al.

Fig. 2. (a) Test setup for validation of evaluation the minimum level of filter attenuation (b) the
waveform of reference electrical signal

4 Conclusions

Based on the evaluations and tests performed we can conclude that, for commercial
computer system installed in a residential environment, an electrical filter with an
attenuation of 70 dB in the HF/VHF frequency range for conducted emissions, provide
adequate TEMPEST protection against leakage of compromising emissions if the
electrical equipment it complies to the EN 55022 limits. This value was achieved in the
worst case scenario in which the IT equipment is of a commercial type, without
TEMPEST protection measures (shielding, interconnection filtering, etc.), the distance
between the source of the compromising emission and the hostile receiver was only
10 m, the electrical noise on the power line was only generated by the computer
equipment because the entire test system was isolated by LISN from the power supply
and the tests were carried out in the shielded room.
Whereas the technical measures to prevent information leakage through compro-
mising emissions are generally expensive, this study is applicable in practice by the fact
that recommends minimum technical requirements for security of emissions that can be
implemented at low cost and with commercial resources.
Open issues that can be addressed in the future are oriented towards the study of the
minimum attenuation for the electrical filters installed on the interconnection circuits of
the information systems (data network, voice communications, etc.), as well as ana-
lyzing the compromising emissions conducted in the grounding circuit of a computer.

Acknowledgments. This work was supported by a grant of the Ministry of Innovation and
Research, UEFISCDI, project number 5 Sol/2017 within PNCDI III.
Considerations on Estimating the Minimal Level 15

References
1. Kuhn, M.G.: Compromising emanations: eavesdropping risks of computer displays.
University of Cambridge Computer Laboratory, Technical report (2003)
2. Sekiguchi, H., Seto, S.: Measurement of computer RGB signals in conducted emission on
power leads. Prog. Electromagnet. Res. C 7, 51–64 (2009)
3. Kuhn, M.G.: Compromising emanations of LCD TV sets. In: Proceedings of the IEEE
International Symposium on Electromagnetic Compatibility, pp. 931–936 (2011)
4. Jinming, L., Mao, J., Zhang, J.: The designing of TEMPEST security testing model.
TELKOMNIKA Indonesian J. Electr. Eng. 2, 866–871 (2014)
5. Ulaş, C., Aşık, U., Karadeniz, C.: Analysis and reconstruction of laser printer information
leakages in the media of electromagnetic radiation, power, and signal lines. Comput. Secur.
58, 250–267 (2016)
6. Christopoulos, C.: Electromagnetic Compatibility (EMC) in Challenging environments. In:
Daras, N.J., Rassias, T.M. (eds.) Operations Research, Engineering, and Cyber Security.
SOIA, vol. 113, pp. 95–115. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-
51500-7_5
7. Popescu, M., Bîndar, V., Crăciunescu, R., Fratu, O.: Estimate of minimum attenuation level
for a TEMPEST shielded enclosure. In: Proceedings of COMM 2016, Bucharest (2016)
8. EN 55022 Standard: Information technology equipment - Radio disturbance characteristics-
Limits and methods of measurement. European Committee for Standardization (1998)
9. Recommendation ITU-T K.84: Test methods and guide against information leaks through
unintentional electromagnetic emissions. International Telecommunication Union (2011)
Innovative Platform for Resource
Allocation in 5G M2M Systems

Alexandru Vulpe(B) , George Suciu, Simona Halunga, and Octavian Fratu

Telecommunications Department, University Politehnica of Bucharest,


Bucharest, Romania
{alex.vulpe,george.suciu}@radio.pub.ro, {shalunga,ofratu}@elcom.pub.ro

Abstract. One of the major drivers of cellular network evolution


towards 5G systems is the communication between devices, also known
as Machine-to-Machine (M2M) communications. M2M mobile connec-
tions will reach an estimated 3.2 billion devices and connections by 2020,
which will pose a challenge as the state-of-the-art cellular and wireless
networks were designed keeping in mind Human-to-Human (H2H) com-
munication. A massive amount of M2M devices create overload problems
with a significant impact on the radio access and core network of the
cellular system leading to what are known as the problems of RAN over-
load and CN overload. The paper presents a proof-of-concept hardware
implementation of novel resource allocation algorithms in 4G cellular
communication systems. The proof-of-concept thus, will enable lab-scale
analytical and experimental studies for validating theoretically developed
algorithms with the focus being on validating the scheduling and admis-
sion control algorithms for M2M scenarios. The platform will be based
on an LTE-A eNodeB implemented using a software defined radio (SDR)
platform and a UE simulator that enables simulating a large number of
UEs sharing the same spectrum. The platform will be complemented
by field-programmable gate array (FPGA) devices that enable the hard-
ware implementation of the analytically developed resource allocation
algorithms.

Keywords: Wireless networks · Machine-to-Machine · 5G


Resource allocation

1 Introduction

Scheduling and resource allocation are essential components of wireless data


systems and they tend to be a very complex problem [1,2]. This is because
different variables have to be taken into account like the user radio conditions,
the user’s traffic pattern or the user Quality of Service (QoS) and the allocation
of radio resources has to be optimized from the whole system point of view.
Essentially, one has to decide when and how the available resources in a cell are
assigned to each of the users, where the resources depend on the access method.
c ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2018
O. Fratu et al. (Eds.): FABULOUS 2017, LNICST 241, pp. 16–24, 2018.
https://doi.org/10.1007/978-3-319-92213-3_3
Another random document with
no related content on Scribd:
CHAPTER V.
CAMPAIGN OF KHALID AGAINST THE FALSE PROPHET
TOLEIHA.

A.H. XI. Nov. A.D. 632.

The materials for our story at this point


are few, obscure, and disconnected. The Materials for the first epoch
scene of confusion that reigned throughout imperfect.
Arabia is presented to our view in but dim and hazy outline. With the
Prophet’s life, Tradition proper ends. The prodigious stores of oral
testimony, which light up in minutest detail the career of Mahomet,
suddenly stop. The grand object of tradition was, from the oral
teaching and example of the Prophet, to supplement by authoritative
rulings what was wanting in the Corân. That motive ceased with the
death of Mahomet, and with it tradition, as such, ceases also.[24]
What history we have for the period immediately succeeding is in the
form of loose fragments—the statements, it may be, of
eyewitnesses, or gathered as hearsay from the memory of Arab
tribes, or from legends in the neighbouring conquered lands. Hence
it is that, after the death of Mahomet, we are left for a time to grope
our way by evidence always scanty and often discrepant. The further
back we go, the obscurity is the greater; and it is most so while, in
the first year of Abu Bekr’s Caliphate, Islam was struggling for
existence. There was little room then for thought beyond the safety
of the moment; and when at length the struggle was over, nothing
was left but the sense of relief from a terrible danger, and the
roughest outline of the way in which it had been achieved. No date is
given for any one of the many battles fought throughout the year.
Here and there we may be guided by the apparent sequence of
events; but as the various expeditions were for the most part
independent of one another, and proceeding simultaneously all over
the peninsula, even this indication too often fails.[25]
Such being the case, the thread of our
narrative here must run an arbitrary Arrangement of narrative of
course. Taking Tabari as our guide, we campaigns
tribes.
against apostate

begin with the campaign of Khâlid against


Toleiha in the north-east, and follow him thence southward to
Yemâma. We shall then take up the provinces assigned to other
leaders, as they lie geographically around the coasts—Bahrein,
Omân, Hadhramaut and Yemen.
After Abu Bekr and Omar, the most
prominent figure in the story of the early Khâlid ibn Welîd.
Caliphate is without doubt that of Khâlid,
son of Welîd. More to him than to any other is it due that Islam
spread with such marvellous rapidity. A dashing soldier, and brave
even to rashness, his courage was tempered by a cool and ever-
ready judgment. His conduct on the battle-fields which decided the
fate of the Persian empire and of the Byzantine rule in Syria, must
rank him as one of the greatest generals of the world. Over and
again he cast the die in crises where loss would have been
destruction to Islam, but always with consummate skill and heroism
which won the victory. The carnage following his arms gained for him
the title of The Sword of God; and so little regard had he for loss of
life even amongst his own followers, that he could wed the freshly-
made widow of his enemy on the field yet moistened by his people’s
blood. He had already distinguished himself in the annals of Islam.
Fighting, at the first, on the side of the Coreish, the defeat of the
Prophet at Ohod was due mainly to his prowess. At the capture of
Mecca, now in the ranks of the faithful, his was the only column
which shed blood; and shortly after, the cruel massacre of an
unoffending tribe brought down upon him the stern reproof of
Mahomet.[26] At the battle of Mûta, three years before, he had given
a signal proof of his generalship, when, the Moslem army having
been routed by Roman legions, and its leaders one after another
slain, he saved the shattered remnants by skilful and intrepid tactics
from destruction.[27] It was this Khâlid whom Abu Bekr now sent forth
against the rebel prophets Toleiha and Moseilama.
His column, by far the strongest of the
eleven, was composed of the flower of the Khâlid marches towards the
Refugees from Mecca, as well as of the Beni Tay.
men of Medîna, which latter marched under their own officer, Thâbit
son of Cays.[28] To divert the enemy’s attention, Abu Bekr gave out
that the destination was Kheibar, and (to strike the greater terror into
the insurgents) that he intended himself to join it there with a fresh
contingent. Khâlid, however, was not long in quitting the northern
route. Striking off to the right, he made direct for the mountain range
of Ajâ and Salmâ, the seat of the Beni Tay, and not distant from the
scene of Toleiha’s revolt among the Beni Asad.
Of the doctrines of Toleiha, as of the
other pretenders to the prophetic office, we Toleiha, the false prophet.
know little, nor indeed anything at all to
show wherein the secret of influence lay. A few doggrel verses and
dark or childish sayings are all that the contemptuous voice of
tradition has transmitted of their teaching, if such it can be called. So
far as appears, it was a mere travesty of Islam. Toleiha forbad
prostration during worship. ‘The Lord,’ he said, ‘hath not commanded
that ye should soil your foreheads in the dust, neither that ye should
double up your backs in prayer.’ Similarly Moseilama and Sajâh
remitted two of the five daily times of prayer. That four pretenders
(for Sajâh the prophetess was also such) should have arisen in
different parts of Arabia, and, even before the death of Mahomet,
drawn multitudes after them, would seem to imply something in their
doctrine deeper than senseless rhymes and more specious than
petty variations of the Moslem rite.[29] So much is clear, that the
spiritual sense of Arabia had been quickened by the preaching of
Mahomet, and that his example had not only suggested the claims of
others, but also contributed to their success. Jealousy of Mecca and
Medîna, moreover, and impatience of the trammels of Islam, were
powerful incentives for Bedouins to cast in their lot with these
pretenders. Thus the Beni Ghatafân, who before their submission to
Mahomet were in league with the Tay and Asad tribes, had recently
fallen out with them and lost some of their pasture-lands. Oyeina,[30]
chief of the Ghatafân, now counselled a return to their old relations
with the Beni Asad. ‘Let us go back,’ he said, ‘to our ancient alliance
which we had before Islam with them, for never since we gave it up
have I known the boundaries of our pasture-lands. A prophet of our
own is better than a prophet of the Coreish. Besides, Mahomet is
dead, but Toleiha is alive.’ So saying, Oyeina, followed by 700
warriors of his tribe, joined the false prophet at Bozâkha.
When first he heard of the heresy,
Mahomet had deputed Dhirâr to the Beni Khâlid reclaims the Beni Tay.
Asad, with instructions to rally the faithful
amongst them, and with their aid to crush Toleiha. The two
encountered one another, and the sword of Dhirâr, we are told,
glanced off from the person of his adversary. On this, a rumour
spread abroad that Toleiha led a charmed life, and thenceforward his
cause prospered. After their defeat at Abrac, the insurgents, as we
have seen, flocked to Toleiha at Bozâkha, and he was further
strengthened by the adhesion of two influential branches of the Beni
Tay.[31] Dhirâr found his position at last so insecure that he fled to
Medîna. The great family of the Beni Tay, however, was not wholly
disloyal, for Adî (as above mentioned) had already presented the
legal dues to Abu Bekr on behalf of some part of it. Adî therefore
was now sent forward by Khâlid to his people, in the hope of
detaching them from Toleiha’s cause. He found them in no friendly
humour. ‘The Father of the Foal!’ they cried (for such was the
sobriquet contemptuously used for Abu Bekr[32]); ‘thou shalt not
persuade us to do homage to him.’ ‘Think better of it,’ replied Adi; ‘an
army approacheth which ye cannot withstand. Ye shall know full
soon that he is no foal, but a lusty stallion. Wherefore see ye to it.’
Alarmed at his words, they begged for time that they might recall the
two branches which had joined Toleiha, ‘For,’ said they, ‘he will
surely hold them hostages, or else put them to death.’ So Khâlid
halted three days, and in the end they not only tendered submission,
but joined him with 1,000 horse, ‘the flower of the land of Tay, and
the bravest of them.’
Thus reinforced, Khâlid advanced
against Toleiha. On the march his army Battle of Bozâkha.
was exasperated by finding the bodies of
two of their scouts—one a warrior of note named Okkâsha—who
had been slain, and left by Toleiha to be trampled on the road.[33]
The armies met at Bozâkha, and the combat is said to have been hot
and long. At last (so we are told) the tide of battle was turned by
certain utterances of Toleiha, who was on the field in his prophetic
garb of hair. Oyeina fought bravely with his 700 of the Beni Fezâra.
[34] The situation becoming critical, he turned to Toleiha, saying,
‘Hath any message come to thee from Gabriel?’ ‘Not yet,’ answered
the prophet. A second time he asked, and received the same reply.
‘Yes,’ said Toleiha, a little after, ‘a message now hath come.’ ‘And
what is it?’ inquired Oyeina eagerly. ‘Thus saith Gabriel to me, Thou
shalt have a millstone like unto his, and an affair shalt happen that
thou wilt not forget.’ ‘Away with thee!’ cried Oyeina scornfully; ‘no
doubt the Lord knoweth that an affair will happen that thou shall not
forget! Ho, ye Beni Fezâra, every man to his tent!’ So they turned to
go; and thereupon the army fled. Toleiha escaped with his wife to
Syria. His subsequent history proved him a brave warrior; but he had
a poor cause, and the combat could hardly have been very severe,
as no mention is made of loss on either side.
His sequel is curious. At the first,
Toleiha took refuge with the Beni Kelb on Toleiha’s sequel.
the Syrian frontier; then when the Beni
Asad were pardoned, he returned to them and again embraced
Islam. Passing Medîna soon after on pilgrimage, he was seized and
carried to Abu Bekr, who set him at liberty, saying, ‘Let him alone.
What have I to do with him? The Lord hath now verily guided him
into the right path.’ When Omar succeeded to the Caliphate, he
presented himself to take the oath of allegiance. At first Omar spoke
roughly to him: ‘Thou art he that killed Okkâsha and his comrade. I
love thee not.’ ‘Was it not better,’ answered Toleiha, ‘that they by my
hand should obtain the crown of martyrdom, rather than that I by
theirs should have perished in hell-fire?’ When he had sworn
allegiance, the Caliph asked him concerning his oracular gift,[35] and
whether anything yet remained of it. ‘Ah,’ he replied, ‘it was but a puff
or two, as from a pair of bellows.’ So he returned to his tribe, and
went forth with them to the wars in Irâc, where, in the great struggle
with Persia, he became a hero of renown.
After the battle of Bozâkha, the Beni
Asad, fearing lest their families should fall Beni Asad and other tribes
received back into Islam.
into the conqueror’s hand, tendered their
submission. The Beni Aámir, Suleim, and Hawâzin, tribes which had
stood aloof watching the event, now came in, and received from
Khâlid the same terms as the Beni Asad. They resumed the
profession of Islam with all its obligations, and in proof thereof
brought in the tithe. A full amnesty was then accorded, on condition
only that those who during the apostasy had taken the life of any
Moslem should be delivered up. These were now (to carry out the
Caliph’s vow) put to the like death as that which they had inflicted. If
they had speared their victims, cast them over precipices, drowned
them in wells, or burned them in the fire, the persecutors were now
subjected to the same barbarous and cruel fate.
Khâlid stayed at Bozâkha for a month,
receiving the submission of the people in A body of malcontents under
the vicinity and their tithes. Troops of horse Omm Siml discomfited.
scoured the country, and struck terror into the vacillating tribes
around. In only one direction was serious opposition met. Certain
malcontents from amongst the penitent and returning people, unable
to brook submission, gathered themselves together in a defiant
attitude. They had yet to learn that the grip of Islam was stern and
crushing. Their restless and marauding spirit preferred, perhaps,
even as a forlorn hope, to hold their enemy at bay; or they had
sinned beyond the hope of grace. Thus they assembled in a great
multitude around Omm Siml, daughter of a famous chieftain of the
Ghatafân. This lady’s mother, Omm Kirfa, had been captured and
put to a cruel death by Mahomet. She herself had waited upon
Ayesha as a captive maid in the Prophet’s household; but the
haughty spirit of her race survived the servitude. Mounted on her
mother’s war-camel, she led the force herself, and incited the
insurgents to a bold resistance. Khâlid proclaimed the reward of one
hundred camels to him who should maim her camel. It was soon
disabled; and, Omm Siml slain, the rout was easy.[36]
In this campaign the only persons taken
captive were those who had deeply Oyeina, Corra, and Alcama
compromised themselves as leaders in released by Abu Bekr.
rebellion. They were sent by Khâlid to Abu Bekr. The chief were
Oyeina, Corra, and Alcama. The story of this last, a chief of the Beni
Aámir, is curious. After the surrender of Tâyif he had fled to Syria.
On the death of Mahomet he returned, and incited his people to
rebellion. An expedition sent in pursuit of him had seized his family,
and carried them off captive to Medîna. He fled; but as all the
country-side had now submitted, there was no longer any way of
escape, and he was seized and delivered up to Khâlid. Corra, of the
same tribe, was one of those whom Amru, on his journey from
Oman, had found vacillating, and of whom he brought an evil report
to Abu Bekr. Oyeina, the marauding chieftain of the Fezâra, had
often been the terror of Medîna. When the city was besieged by the
Coreish, he offered his assistance on certain humiliating terms,
which the Prophet was near accepting; and he was one of the many
influential leaders ‘whose hearts,’ after the battle of Honein and
siege of Tâyif, ‘had been reconciled’ by the Prophet’s largesses. He
was now led into Medîna with the rest in chains, his hands tied up
behind his back. The citizens crowded round to gaze at the fallen
chief, and the very children smote him with their hands, crying out,
‘Enemy of the Lord, and apostate!’ ‘Not so,’ said Oyeina bravely; ‘I
am no apostate; I never was a believer until now.’[37] The Caliph
listened patiently to the appeal of the captives. He forgave them, and
commanded their immediate release.
Abu Bekr, as a rule, was mild in his
judgments, and even generous to the Fujâa, a freebooter, burned
alive.
fallen foe. But on one occasion the
treachery of a rebel chief irritated him to an act of barbarous cruelty.
Fujâa, a leader of some note amongst the Beni Suleim, under
pretence of fighting against the insurgents in his neighbourhood,
obtained from the Caliph arms and accoutrements for his band. Thus
equipped, he abused the trust, and, becoming a freebooter, attacked
and plundered Moslem and Apostate indiscriminately. Abu Bekr
thereupon wrote letters to a loyal chief in that quarter to raise a force
and go against the brigand. Hard pressed, Fujâa challenged his
adversary to a parley, and asserted that he held a commission from
the Caliph not inferior to his. ‘If thou speakest true,’ answered the
other, ‘then lay aside thy weapons and accompany me to Abu Bekr.’
He did so, and followed, without further resistance, to Medîna. No
sooner did he appear than the Caliph, enraged at his treachery, cried
aloud: ‘Go forth with this traitor to the burial-ground, and there burn
him with fire.’ So, hard by in Backî, the graveyard of the city, they
gathered wood, and heaping it together at the Mosalla, or place of
prayer, kindled the pile, and cast Fujâa on it.
If the charges were well founded, which
we have no ground for doubting, Fujâa Abu Bekr regrets the act.
deserved the fate of a bandit; but to cast
him alive into the flames was a savage act, for which Abu Bekr was
sorry afterwards. ‘It is one of the three things,’ he used to say, ‘which
I would I had not done.’[38]
CHAPTER VI.
STORY OF MALIK IBN NOWEIRA.

A.H. XI. A.D. 632.

Having subdued the Beni Asad, and


other tribes inhabiting the hills and desert Khâlid advances south. a.h.
to the north-west of Medîna, Khâlid now XI. November (?) a.d. 632.
bent his steps southward, against the Beni Temîm who occupied the
plateau towards the Persian Gulf.
This great tribe had from time
immemorial spread itself with multitudinous The Beni Temîm.
branches over the pasture-lands and
settlements lying between Yemâma and the delta of the Euphrates.
Some of its clans professed Christianity, but the greater portion were
heathen. They used in past times to have frequent passages, often
of a hostile character, with Persia.[39] Most part of this people had
submitted to the claims of Mahomet, and the oratorical contest
between their embassy and the poets of Medîna forms a curious
episode in the Prophet’s life.[40] His death had produced amongst
them the same unsettlement and apostasy as elsewhere. Abu Bekr’s
first early success resulted, as we have seen, in bringing some of
their chiefs to Medîna with the tithes. Meanwhile a strange
complication had arisen which embroiled the Beni Yerbóa, one of
their clans, commanded by the famous Mâlik ibn Noweira, and
eventually brought Khâlid on the scene.
It was no less than the advent of Sajâh, a prophetess, at the
head of a great host from Mesopotamia. She was descended from
the Beni Yerbóa, but her family had migrated north, and joined the
Beni Taghlib, among whom in Mesopotamia she had been brought
up as a Christian. How long and by what steps she had assumed the
prophetic office, and what (if any) were her peculiar tenets, we do
not know; for nothing of hers excepting
some childish verses has been preserved. Sajâh the prophetess gains
At the head of the Taghlib and other over Mâlik ibn Noweira, chief
of Beni Yerbóa.
Christian tribes,[41] each led by its own
captain, she had crossed into Arabia, hoping to profit by the
confusion that followed on the death of Mahomet, and was now on
her way to attack Medîna. Reaching the seats of the Beni Temîm,
she summoned to her presence the Beni Yerbóa, her own clan, and
promised them the kingdom, should victory crown her arms. They
joined her standard, with Mâlik ibn Noweira at their head. The other
clans of the Beni Temîm refused to acknowledge the prophetess;
and so, diverted from her design upon Medîna, she turned her arms
against them. In a series of combats, though supported by Mâlik, she
was worsted. Then, having made terms and exchanged prisoners,
she bethought her of attacking the rival prophet, Moseilama of
Yemâma, whose story I must here in some part anticipate.
Moseilama was strongly supported by
his own people, the Beni Hanîfa, in his Sajâh, having married
Moseilama, retires to
claim to be their prophet and ruler; but he Mesopotamia.
now felt that the meshes of Abu Bekr were
closing round him. The Caliph’s officers were rallying the yet loyal or
vacillating chiefs in Hejer; and Khâlid, whom Moseilama dreaded
most of all, was behind. Tidings of the approach of a new enemy at
this crisis added to his perplexity; and he therefore sent a friendly
message to the prophetess to come and meet him. She came, and
they found their sentiments so much in unison that they cemented
the alliance by marriage. Moseilama conceded to her one half-share
of the revenues of Yemâma—the share, he said, which belonged to
the Coreish, but which, by their tyranny and violence, they had
forfeited. After a few days she departed again to her own country,
leaving a party with three of her officers to collect the stipulated
tribute. Like a meteor, this strange personage disappeared as soon
almost as she had startled Arabia by her advent; and we hear no
more of her.[42]
Khâlid, flushed with victory, was now drawing near, and most of
the branches of the Temîm were forward in tendering their
submission to him. At this critical juncture,
the withdrawal of Sajâh, and his own Mâlik ibn Noweira and the
previous doubtful attitude, left Mâlik ibn Beni Yerbóa attacked by
Khâlid.
Noweira at the head of the Beni Yerbóa in
a position of some perplexity, and he was undecided how to act.[43]
On the other hand, conflicting news divided the Moslem camp. For
some reason Khâlid was bent on attacking the Beni Yerbóa. The
men of Medîna[44] were equally opposed to the design, for which
they alleged that Khâlid had from the Caliph no authority. It would
have been better for him had he listened to the remonstrance. But he
replied haughtily, ‘I am commander. In the absence of orders, it is for
me to decide. I will march against Mâlik ibn Noweira with the men of
Mecca, and with such others as choose to follow me. I compel no
man.’ So he went forward and left the malcontents behind. These,
however, thought better of it, and rejoined the army. Khâlid marched
straight upon Bitâh, the head-quarters of Mâlik, but he found not a
soul upon the spot. It was utterly deserted.
In fact, Mâlik had resolved on
submission, though his proud spirit Mâlik brought a prisoner into
Khâlid’s camp;
rebelled against presenting himself before
Khâlid. He knew the ordinance of Abu Bekr, that none but they who
resisted his arms, and refused the call to prayer, should be molested.
So he told his people that there was no longer use in opposing this
new way, but that, bowing down, they should suffer the wave to pass
over them: ‘Break up your camp,’ he said, ‘and depart every one to
his house.’ Khâlid finding things thus, was not content, but, treating
the neighbourhood as enemy’s land, sent forth bands everywhere to
slay and plunder, and take captive all that offered opposition or failed
to respond to the call for prayer. Amongst others, Mâlik was brought
in with his wife and a party of his people. When challenged, they had
replied that they too were Moslems. ‘Why, then, these weapons?’ it
was asked. So they laid aside their arms and were led as captives to
the camp. As they passed by Khâlid, Mâlik cried aloud to him, ‘Thy
master never gave command for this.’ ‘“Thy master,” sayest thou?’
was the scornful reply of Khâlid; ‘then, rebel, by thine own
admission, he is not thine!’
The captors differed in their evidence.
Some averred that the prisoners had and, with other prisoners put
offered resistance. Others, with Abu to death.
Catâda, a citizen of Medîna, at their head, deposed that they had
declared themselves Moslems, and at once complied with the call to
prayer. So they were remanded till morning under an armed guard.
The night set in cold and stormy, and Khâlid (such is his
explanation), with the view of protecting them from its inclemency,
gave the guard command ‘to wrap their prisoners.’ The word was
ambiguous, signifying in another dialect[45] not ‘to wrap,’ but ‘to slay,’
and Dbirâr, commandant of the guard, taking it in that sense, put the
prisoners, and with them Mâlik, forthwith to the sword. Khâlid,
hearing the uproar, hurried forth; but all was over, and he retired,
exclaiming, ‘When the Lord hath determined a thing, the same
cometh verily to pass.’ But the fate of Mâlik was not thus easily to be
set at rest. He was a chief of name and influence, and a poet of
some celebrity. The men of Medina who had opposed the advance
were shocked at his cruel fate. Abu Catâda roundly asserted the
responsibility of Khâlid. ‘This is thy work!’ he said; and, though
chided for it, he persisted in the charge. He declared that never
again would he serve under Khâlid’s banner. In company with
Motammim, Mâlik’s brother, he set out at once for Medina, and there
laid a formal complaint before the Caliph. Omar, with his native
impetuosity, took up the cause of the Yerbóa chief. Khâlid had given
point to the allegations of his enemies by marrying Leila, the
beautiful widow of his victim, on the spot. From this scandalous act,
Omar drew the worst conclusion. ‘He hath conspired to slay a
believer,’ he said, ‘and hath gone in unto his wife.’ He was instant
with Abu Bekr that the offender should be degraded and put in
bonds, saying, ‘The sword of Khâlid, dipped thus in violence and
outrage, must be sheathed.’ ‘Not so,’ replied the Caliph (of whom it is
said that he never degraded one of his commanders); ‘the sword
which the Lord hath made bare against the heathen, shall I sheathe
the same? That be far from me.’ Nevertheless, he summoned Khâlid
to answer for the charge.
Khâlid lost no time in repairing to
Medina. He went up straightway to the Khâlid exonerated by Abu
Great Mosque, and entered it in his rough Bekr;
field costume, his clothes rubbed rusty with his girded armour, and
his turban coiled rudely about the head with arrows stuck in it. As he
passed along the courtyard towards the Caliph’s place, Omar could
not restrain himself, but seizing the arrows from his turban, broke
them over his shoulders, and abused him as hypocrite, murderer,
and adulterer. Khâlid, not knowing but that Abu Bekr might be of the
same mind, answered not a word, but passed into the Caliph’s
presence. There he told his story, and the explanation was accepted
by Abu Bekr;—only he chided him roughly for having thus
incontinently wedded his victim’s widow, and run counter to the
custom and feelings of the Arabs in celebrating his nuptials on the
field. As Khâlid again passed Omar, he lightly rallied him in words
which showed that he had been exonerated. Motammim then
pressed the claim, as one of honour, for payment of his brother’s
blood-money, and release of the prisoners that remained. For the
release Abu Bekr gave command, but the payment he declined.
Omar remained unconvinced of the
innocence of Khâlid, and still was of but held guilty by Omar.
opinion that he should be withdrawn from
his command. He persevered in pressing this view upon Abu Bekr,
who would reply, ‘Omar, hold thy peace! Refrain thy tongue from
Khâlid. He gave an order, and the order was misunderstood.’ But
Omar heeded not. He neither forgave nor forgot, as in the sequel we
shall see.
The scandal was the greater, because
Mâlik ibn Noweira was a chief renowned Mâlik’s death
for his generosity and princely virtues, as commemorated
his brother.
in verse by

well as for poetic talent. His brother,


Motammim, a poet likewise of no mean fame, commemorated his
tragic end in many touching verses. Omar loved to listen to his
elegies; and he used to tell Motammim that if he had himself
possessed the poetic gift, he would have had no higher ambition
than to mourn in such verse over the fate of his own brother Zeid,
who shortly after fell at Yemâma.[46]
The materials are too meagre to judge
conclusively whether the right in this grave The affair leaves a stain on
matter is on the side of Omar or of the Khâlid’s fame.
Caliph, Abu Bekr. Although the hostile bias of Khâlid against Mâlik
led undoubtedly to the raid upon his tribe and the harsh treatment
which followed thereupon, still, with the conflicting evidence, we may
hold the deeper charge unproven. But in wedding the widow of his
enemy while his blood (shed as we are to believe in misconception
of his order) was fresh upon the ground, Khâlid, if he gave no colour
to darker suspicions, yet transgressed the proprieties even of Arab
life, and justified the indictment of unbridled passion and cold-
blooded self-indulgence.[47]
CHAPTER VII.
BATTLE OF YEMAMA.

End of A.H. XI. Beginning of 633 A.D.

But sterner work was in reserve for


Khâlid. In the centre of Arabia, and right in Campaign of Khâlid against
front of his army, some marches east, lay Moseilama.
January, a.d.
633.[48]
Yemâma. There resided the Beni Hanîfa, a
powerful branch of the great tribe Bekr ibn Wâil. Partly Christian and
partly heathen, the Beni Hanîfa had submitted to Mahomet; but they
were now in rebellion, 40,000 strong, around their prophet
Moseilama. It was against these that Khâlid next directed his steps.
The beginning of Moseilama’s story
belongs to the life of Mahomet.[49] Small in Moseilama’s previous story.
stature, and of a mean countenance, he had yet qualities which fitted
him for command. He visited Medîna with a deputation from his
people, and it was pretended that words had then fallen from
Mahomet signifying that he would yet be a sharer with him in the
prophetic office. Building thereon, Moseilama advanced his claim,
and was accepted by his people as their prophet. When summoned
by Mahomet to abandon his impious pretensions, he sent an insolent
answer claiming to divide the land. Mahomet replied in anger, and
drove the ambassadors from his presence. To counteract his
teaching, he deputed Rajjâl, a convert from the same tribe, who had
visited Medîna, and there been instructed in the Corân.[50] On
returning to his people, however, this man also was gained over by
the pretender to espouse his claims as founded on the alleged
admission of Mahomet himself. Moseilama, we are told, deceived
the people by tricks and miracles; aped, in childish terms, the
language of the Corân; and established a system of prayers similar
to those of Mahomet. In short, his religion, so far as we can tell, was
but a wretched imitation of Islam.[51] At the period we have now
reached, he had just rid himself of Sajâh, the rival prophetess, by the
singular expedient of taking her to wife, and then bribing her by half
the revenues of Yemâma to return from whence she came. Parties of
Mesopotamian horse were still about the country collecting her dues,
when Khâlid’s approach changed the scene; and Moseilama,
marching out with a great army to meet him, pitched his camp at
Acraba.
Ikrima and Shorahbîl were the
commanders originally despatched by Abu Ikrima suffers a reverse.
Bekr to quell the rising at Yemâma,[52] and
both suffered at the hands of Moseilama from a hasty and
unguarded advance. Ikrima, anxious to anticipate his fellow, hurried
forward, and was driven back with loss. The details (as generally the
case when tradition deals with a defeat) are wanting; but the reverse
was so serious that Abu Bekr, in reply to the despatch reporting it,
wrote angrily to Ikrima. ‘I will not see thy face,’ he said, ‘nor shalt
thou see mine, as now thou art. Thou shalt not return hither to
dishearten the people. Depart unto the uttermost coasts, and there
join the armies in the east of the land, and then in the south.’ So,
skirting Yemâma, he went forward to Omân, there to retrieve his
tarnished reputation. Shorahbîl, meanwhile, was directed to halt and
await the approach of Khâlid.[53]
It was after the reverse of Ikrima that
Khâlid, on being summoned to Medîna on Khâlid sets out for Yemâma.
the affair of Mâlik ibn Noweira, received the
commission to attack Moseilama. In anticipation of serious
opposition, the Caliph promised to strengthen his army by a fresh
column composed of veterans from amongst the men of Mecca and
Medîna. So Khâlid returned to his camp at Bitâh, and when these
reinforcements came up, he marched in strength to meet the enemy.
It was now that Shorahbîl, whose troop formed the vanguard,
hastening forward like Ikrima, met with a like reverse, and was
severely handled by Khâlid for his temerity.
While yet a march from Acraba, Khâlid
surprised a mounted body of the Beni Mojâa, a chief of the Beni
Hanîfa, taken prisoner.
Hanîfa under command of the chief Mojâa. They were returning from
a raid against a neighbouring tribe, unaware of the approach of the
Mussulman army. But they belonged to the enemy, and as such were
all put to the sword, excepting Mojâa, whom Khâlid spared, as he
said he promised to be useful on the coming eventful day, and kept
chained in his tent under charge of Leila, his lately espoused wife.
On the morrow, the two armies met
upon the sandy plain of Acraba. The Battle of Acraba or Yemâma.
enemy rushed on with desperate bravery.
‘Fight for your loved ones!’ cried the son of Moseilama; ‘it is the day
of jealousy and vengeance; if ye be worsted, your maidens will be
ravished by the conqueror, and your wives dragged to his foul
embrace!’ So fierce was the shock that the Moslems were driven
back, and their camp uncovered. The tent of Khâlid was entered by
the wild Bedouins; and, but for the chivalry of her captive, who
conjured his countrymen to spare a lady of such noble birth, Leila
would have perished by their swords. ‘Go, fight against men,’ Mojâa
cried, ‘and leave this woman;’ so they cut the tent-ropes and
departed. There was danger for Islam at the moment. Defeat would
have been disastrous; indeed, the Faith could hardly have survived
it. But now the spirit of the Moslems was aroused. Khâlid, knowing
the rivalry between the Bedouin and the city Arabs, separated them
to fight apart. On this they rallied one the other; and the sons of the
desert cried: ‘Now we shall see the carnage wax hot amongst the
raw levies of the town. We will teach them how to fight!’ Prodigies of
valour were fought all round. The heroic words and deeds of the
leaders, as one after another fell in the thick of battle, are dwelt on
by the historian with enthusiasm. Zeid, the favourite brother of Omar,
who led the men of Mecca, singled out Rajjâl, and, reproaching his
apostasy, despatched him forthwith. A furious south wind, charged
with the desert sand, blew into the faces of the Moslems, and,
blinding them, caused a momentary pause. Upbraiding them for their
slackness, Zeid cried out: ‘I shall follow them that have gone before;
not a word will I utter more, till we beat the apostates back, or I
appear to clear myself before my Lord. Close your eyes and clench
your teeth. Forward like men!’ So saying, he led the charge and fell.
Abu Hodzeifa, another Companion of note, calling out ‘Fight for the
Corân, ye Moslems, and adorn it by your deeds!’ followed his
example and shared his fate. Seeing this, Abu Hodzeifa’s freedman,
Sâlim, seized the banner from his dying master, and exclaiming, ‘I
were a craven bearer of the Corân if I feared for my life,’ plunged into
the battle and was slain.[54] Nor were the citizens of Medîna behind
their fellows. Their commander, Thâbit ibn Cays, reproached them
indignantly: ‘Woe be to you,’ he said, ‘because of this backsliding.
Verily, I am clear of ye, even as I am clear of these,’ and he pointed
to the enemy as he flung himself and perished in their midst.
Animated thus, the rank and file charged furiously. Backwards and
forwards swayed the line, and heavy was the carnage. But urged by
Khâlid’s valiant arm,[55] and raising the grand battle-cry ‘Yâ
Mohammedâ!’ the Moslem arms at length prevailed. The enemy
broke and began to give. ‘To the garden!’ cried Mohakkem, a brave
leader of the Beni Hanîfa; ‘to the garden, and close the gate!’ Taking
his stand, he guarded their retreat as they fled into an orchard
surrounded by a strong wall, and Moseilama with them. The Moslem
troops, following close, soon swarmed all round the wall, but found
no entrance anywhere. At last Berâa, one
of the Twelve,[56] cried, ‘Lift me aloft upon The Garden of Death.
the wall.’ So they lifted him up. For a moment, as he looked on the
surging mass below, the hero hesitated; then, boldly leaping down,
he beat right and left, until he reached the gate, and threw it open.
Like waters pent up, his comrades rushed in; and, as beasts of the
forest snared in a trap, so wildly struggled the brave Beni Hanîfa in
the Garden of Death. Hemmed in by the narrow space, and
hampered by the trees, their arms useless from their very numbers,
they were hewn down, and perished to a man. The carnage was
fearful, for besides the slain within the walls, an equal number were
killed on the field, and again an equal number in the flight.[57] The
Moslems, too, despite their splendid
victory, had cause to remember the The Beni Hanîfa discomfited,
Garden Death and the battle of Yemâma, with great slaughter on both
sides.
for their loss was beyond all previous
experience. Besides those killed hand to hand in the garden, great
numbers fell in the battle when their ranks wavered and gave way.

You might also like