Research on Computer Radiation Security

Article Preview

Abstract:

In view of the electromagnetic information leakage of information security implication, the time-frequency characteristics of radiation signal from LCD display with a resolution of 1280×1024 through simulation is analyzed in this paper. The design and measurement of the shielding box is given. A USA military standard testing is made, which shows that the designed shielding box is less than the overall emission of radiation 35 dBμV/m and with a proper increase In protection radius, the amount of its radiation emission can be reduced to 20 dBμV/m or less, lower than the 20 dBμV/m of the ambient noise thus meeting the information security requirements.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1187-1192

Citation:

Online since:

October 2011

Keywords:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Qi Zhang, Guo-xuan Zhang, Chong-hua Fang, Ding-e Wen, "Analysis and Validation of Cavity Electromagnetic Effect", ISSSE 2010 proceedings, pp.831-833, September, 2010.

DOI: 10.1109/issse.2010.5607027

Google Scholar

[2] Victorat Mirs, "Computer Electromagnetic Leakage Analysis and Protection ", Computer Security, pp.23-25, 2005.4.

Google Scholar

[3] Hu Bo, Zhang Hongxin, Gao Guangzhen, "Computer Video Electromagnetic Leakage of Information on Reproduction", Bin Zhou College, Vol.24.No.3, June, 2008.

Google Scholar

[4] Han Fang, "Computer Information and Protection of Electromagnetic Leakage", Beijing Science Press, 1993.

Google Scholar

[5] Wvan Eck, "Electromagnetic Radiation form Video Display Units: An Eavesdropping Risk ",Computers & Security, pp.269-286, April, 1985.

DOI: 10.1016/0167-4048(85)90046-x

Google Scholar

[6] Tan Xuesong, Zhang Qing, Ting-Chi, "Pro/ENGINEER Wildfire Advanced Applications", Posts & Telecom Press, 2007.

Google Scholar

[7] Durak, "Hidden Data Transmission by Controlling Electromagnetic Emanations of Computers" , August, 2000.

Google Scholar