95 research outputs found

    Generating biometric random cryptographic key based on unique fingerprint features

    Get PDF
    This paper uses the unique biometric features of fingerprints to generate random cryptographic keys. The main aspects of the security of the generated key include the privacy of the fingerprint and the randomness and complexity of the key generation algorithm. In the proposed method, first, the unique fingerprint features, which include Minutiae points, are extracted from the fingerprint image. Then, to increase the statistical properties and complexity of the algorithm, the Euclidean distance and the angle of all the points of Minutiae relative to each other are calculated and stored. In the next step, after normalizing to 8-bit numbers, these data are moved by permutation operations and combined. In the following, the proposed method is used to increase the level of security and the ability to be random from the non-linear operations of 8-bit S-boxes S0 and S1 used in the CLEFIA block cipher. Statistical analyzes performed on the generated keys show the acceptable random nature of the keys. Therefore, the proposed structure for generating a random key can be used in encrypting digital signals with large volumes of data such as image and sound

    Association of ultra-rare genetic variants with epilepsy

    Get PDF
    Epilepsy represents a wide spectrum of phenotypes with various etiologies and comorbidities. Genetic predisposition to epilepsy is conferred by rare variants and common risk alleles. Ultra-rare variants (URVs) – those not seen in healthy population controls – are thought to underlie a substantial part of the risk mediated by coding variants. In this dissertation, the role of URVs was studied in several cohorts of individuals with common epilepsy syndromes, aiming to identify new genetic etiologies underlying epileptogenesis. Multiple approaches based on whole exome sequencing were utilized, scaling from studies of single families to populations and from genes to gene sets. First, five closely consanguineous Sudanese families, in which multiple siblings (whose parents are cousins) were diagnosed with a genetic epilepsy, were examined to touch upon the role of rare bi-allelic coding variation in familial epilepsies. There was no evidence to support a key role for recessive inheritance in less severe epilepsies. However, the results expanded the phenotypic spectrum of biallelic ultra-rare PRRT2 variants, previously linked to movement disorders, to include mild self-limited epilepsy. Second, sequencing data from individuals diagnosed with genetic generalized epilepsy (GGE; n = 1,928 cases vs. 8,578 ancestry-matched controls of European descent) were analyzed using gene and gene set collapsing approaches to identify key URV associations. Separate analyses of familial GGE (n = 945 cases vs. 8,626 controls) or sporadic GGE (n = 1,005 cases vs. 8,621 controls) were also performed. URVs in GABRG2 showed an association with familial GGE (approaching study-wide significance) but not with sporadic GGE. Additionally, a higher enrichment of URVs affecting genes encoding GABAA receptors and GABAergic pathway genes was seen in familial vs. sporadic GGE. Third, the burden of URVs in a comprehensive range of gene sets was studied in the exomes of individuals diagnosed with GGE (n = 3,064), non-acquired focal epilepsy (NAFE; n = 3,522) or developmental and epileptic encephalopathy (DEE; n = 1,003), compared to 3,962 ancestry-matched controls. In GGE, the burden of URVs in constrained genic regions – those devoid of variations in the general population – was higher in gene sets important for inhibitory signaling vs. in gene sets representative of excitatory signaling. Conversely, there was a relatively higher burden in excitatory vs. inhibitory gene sets in NAFE. In summary, this dissertation presents novel findings pertaining to the role of ultra-rare coding variation in epileptic disorders, providing new insights into the spectrum of key genes and gene sets related to epileptogenesis

    Smart Biofeedback

    Get PDF
    Smart biofeedback is receiving attention because of the widespread availability of advanced technologies and smart devices that are used in effective collection, analysis, and feedback of physiologic data. Researchers and practitioners have been working on various aspects of smart biofeedback methodologies and applications by using wireless communications, the Internet of Things (IoT), wearables, biomedical sensors, artificial intelligence, big data analytics, clinical virtual reality, smartphones, and apps, among others. The current paradigm shift in information and communication technologies (ICT) has been propelling the rapid pace of innovation in smart biofeedback. This book addresses five important topics of the perspectives and applications in smart biofeedback: brain networks, neuromeditation, psychophysiological psychotherapy, physiotherapy, and privacy, security, and integrity of data

    Towards end-to-end security in internet of things based healthcare

    Get PDF
    Healthcare IoT systems are distinguished in that they are designed to serve human beings, which primarily raises the requirements of security, privacy, and reliability. Such systems have to provide real-time notifications and responses concerning the status of patients. Physicians, patients, and other caregivers demand a reliable system in which the results are accurate and timely, and the service is reliable and secure. To guarantee these requirements, the smart components in the system require a secure and efficient end-to-end communication method between the end-points (e.g., patients, caregivers, and medical sensors) of a healthcare IoT system. The main challenge faced by the existing security solutions is a lack of secure end-to-end communication. This thesis addresses this challenge by presenting a novel end-to-end security solution enabling end-points to securely and efficiently communicate with each other. The proposed solution meets the security requirements of a wide range of healthcare IoT systems while minimizing the overall hardware overhead of end-to-end communication. End-to-end communication is enabled by the holistic integration of the following contributions. The first contribution is the implementation of two architectures for remote monitoring of bio-signals. The first architecture is based on a low power IEEE 802.15.4 protocol known as ZigBee. It consists of a set of sensor nodes to read data from various medical sensors, process the data, and send them wirelessly over ZigBee to a server node. The second architecture implements on an IP-based wireless sensor network, using IEEE 802.11 Wireless Local Area Network (WLAN). The system consists of a IEEE 802.11 based sensor module to access bio-signals from patients and send them over to a remote server. In both architectures, the server node collects the health data from several client nodes and updates a remote database. The remote webserver accesses the database and updates the webpage in real-time, which can be accessed remotely. The second contribution is a novel secure mutual authentication scheme for Radio Frequency Identification (RFID) implant systems. The proposed scheme relies on the elliptic curve cryptography and the D-Quark lightweight hash design. The scheme consists of three main phases: (1) reader authentication and verification, (2) tag identification, and (3) tag verification. We show that among the existing public-key crypto-systems, elliptic curve is the optimal choice due to its small key size as well as its efficiency in computations. The D-Quark lightweight hash design has been tailored for resource-constrained devices. The third contribution is proposing a low-latency and secure cryptographic keys generation approach based on Electrocardiogram (ECG) features. This is performed by taking advantage of the uniqueness and randomness properties of ECG's main features comprising of PR, RR, PP, QT, and ST intervals. This approach achieves low latency due to its reliance on reference-free ECG's main features that can be acquired in a short time. The approach is called Several ECG Features (SEF)-based cryptographic key generation. The fourth contribution is devising a novel secure and efficient end-to-end security scheme for mobility enabled healthcare IoT. The proposed scheme consists of: (1) a secure and efficient end-user authentication and authorization architecture based on the certificate based Datagram Transport Layer Security (DTLS) handshake protocol, (2) a secure end-to-end communication method based on DTLS session resumption, and (3) support for robust mobility based on interconnected smart gateways in the fog layer. Finally, the fifth and the last contribution is the analysis of the performance of the state-of-the-art end-to-end security solutions in healthcare IoT systems including our end-to-end security solution. In this regard, we first identify and present the essential requirements of robust security solutions for healthcare IoT systems. We then analyze the performance of the state-of-the-art end-to-end security solutions (including our scheme) by developing a prototype healthcare IoT system

    A Framework for Preserving Privacy and Cybersecurity in Brain-Computer Interfacing Applications

    Full text link
    Brain-Computer Interfaces (BCIs) comprise a rapidly evolving field of technology with the potential of far-reaching impact in domains ranging from medical over industrial to artistic, gaming, and military. Today, these emerging BCI applications are typically still at early technology readiness levels, but because BCIs create novel, technical communication channels for the human brain, they have raised privacy and security concerns. To mitigate such risks, a large body of countermeasures has been proposed in the literature, but a general framework is lacking which would describe how privacy and security of BCI applications can be protected by design, i.e., already as an integral part of the early BCI design process, in a systematic manner, and allowing suitable depth of analysis for different contexts such as commercial BCI product development vs. academic research and lab prototypes. Here we propose the adoption of recent systems-engineering methodologies for privacy threat modeling, risk assessment, and privacy engineering to the BCI field. These methodologies address privacy and security concerns in a more systematic and holistic way than previous approaches, and provide reusable patterns on how to move from principles to actions. We apply these methodologies to BCI and data flows and derive a generic, extensible, and actionable framework for brain-privacy-preserving cybersecurity in BCI applications. This framework is designed for flexible application to the wide range of current and future BCI applications. We also propose a range of novel privacy-by-design features for BCIs, with an emphasis on features promoting BCI transparency as a prerequisite for informational self-determination of BCI users, as well as design features for ensuring BCI user autonomy. We anticipate that our framework will contribute to the development of privacy-respecting, trustworthy BCI technologies

    Preface

    Get PDF
    DAMSS-2018 is the jubilee 10th international workshop on data analysis methods for software systems, organized in Druskininkai, Lithuania, at the end of the year. The same place and the same time every year. Ten years passed from the first workshop. History of the workshop starts from 2009 with 16 presentations. The idea of such workshop came up at the Institute of Mathematics and Informatics. Lithuanian Academy of Sciences and the Lithuanian Computer Society supported this idea. This idea got approval both in the Lithuanian research community and abroad. The number of this year presentations is 81. The number of registered participants is 113 from 13 countries. In 2010, the Institute of Mathematics and Informatics became a member of Vilnius University, the largest university of Lithuania. In 2017, the institute changes its name into the Institute of Data Science and Digital Technologies. This name reflects recent activities of the institute. The renewed institute has eight research groups: Cognitive Computing, Image and Signal Analysis, Cyber-Social Systems Engineering, Statistics and Probability, Global Optimization, Intelligent Technologies, Education Systems, Blockchain Technologies. The main goal of the workshop is to introduce the research undertaken at Lithuanian and foreign universities in the fields of data science and software engineering. Annual organization of the workshop allows the fast interchanging of new ideas among the research community. Even 11 companies supported the workshop this year. This means that the topics of the workshop are actual for business, too. Topics of the workshop cover big data, bioinformatics, data science, blockchain technologies, deep learning, digital technologies, high-performance computing, visualization methods for multidimensional data, machine learning, medical informatics, ontological engineering, optimization in data science, business rules, and software engineering. Seeking to facilitate relations between science and business, a special session and panel discussion is organized this year about topical business problems that may be solved together with the research community. This book gives an overview of all presentations of DAMSS-2018.DAMSS-2018 is the jubilee 10th international workshop on data analysis methods for software systems, organized in Druskininkai, Lithuania, at the end of the year. The same place and the same time every year. Ten years passed from the first workshop. History of the workshop starts from 2009 with 16 presentations. The idea of such workshop came up at the Institute of Mathematics and Informatics. Lithuanian Academy of Sciences and the Lithuanian Computer Society supported this idea. This idea got approval both in the Lithuanian research community and abroad. The number of this year presentations is 81. The number of registered participants is 113 from 13 countries. In 2010, the Institute of Mathematics and Informatics became a member of Vilnius University, the largest university of Lithuania. In 2017, the institute changes its name into the Institute of Data Science and Digital Technologies. This name reflects recent activities of the institute. The renewed institute has eight research groups: Cognitive Computing, Image and Signal Analysis, Cyber-Social Systems Engineering, Statistics and Probability, Global Optimization, Intelligent Technologies, Education Systems, Blockchain Technologies. The main goal of the workshop is to introduce the research undertaken at Lithuanian and foreign universities in the fields of data science and software engineering. Annual organization of the workshop allows the fast interchanging of new ideas among the research community. Even 11 companies supported the workshop this year. This means that the topics of the workshop are actual for business, too. Topics of the workshop cover big data, bioinformatics, data science, blockchain technologies, deep learning, digital technologies, high-performance computing, visualization methods for multidimensional data, machine learning, medical informatics, ontological engineering, optimization in data science, business rules, and software engineering. Seeking to facilitate relations between science and business, a special session and panel discussion is organized this year about topical business problems that may be solved together with the research community. This book gives an overview of all presentations of DAMSS-2018

    Neuroadaptive incentivization in healthcare using Blockchain and IoT

    Get PDF
    Financially incentivizing health-related behaviors can improve health record outcomes and reduce healthcare costs. Blockchain and IoT technologies can be used to develop safe and transparent incentive schemes in healthcare. IoT devices, such as body sensor networks and wearable sensors, etc. connect the physical and digital world making it easier to collect useful health-related data for further analysis. There are, however, many security and privacy issues with the use of IoT. Some of these IoT security issues can be alleviated using Blockchain technology. Incorporating neuroadaptive technology can result in more personalized and effective therapies using machine learning algorithms and real-time feedback. The research investigates the possibilities of neuroadaptive incentivization in healthcare using Blockchain and IoT on patient health records. The core idea is to incentivize patients to keep their health parameters within standard range thereby reducing the load on healthcare system. In summary, we have presented a proof of concept for neuroadaptive incentivization in healthcare using Blockchain and IoT and discuss various applications and implementation challenges

    Sok: Security and privacy in implantable medical devices and body area networks.

    Get PDF
    Abstract-Balancing security, privacy, safety, and utility is a necessity in the health care domain, in which implantable medical devices (IMDs) and body area networks (BANs) have made it possible to continuously and automatically manage and treat a number of health conditions. In this work, we survey publications aimed at improving security and privacy in IMDs and health-related BANs, providing clear definitions and a comprehensive overview of the problem space. We analyze common themes, categorize relevant results, and identify trends and directions for future research. We present a visual illustration of this analysis that shows the progression of IMD/BAN research and highlights emerging threats. We identify three broad research categories aimed at ensuring the security and privacy of the telemetry interface, software, and sensor interface layers and discuss challenges researchers face with respect to ensuring reproducibility of results. We find that while the security of the telemetry interface has received much attention in academia, the threat of software exploitation and the sensor interface layer deserve further attention. In addition, we observe that while the use of physiological values as a source of entropy for cryptographic keys holds some promise, a more rigorous assessment of the security and practicality of these schemes is required

    Summer 2008 Research Symposium Abstract Book

    Get PDF
    Summer 2008 volume of abstracts for science research projects conducted by Trinity College students
    • …
    corecore