15,188 research outputs found

    Distribuirani obrambeni mehanizmi za clone napade temeljeni na algoritmu za istraživanje gravitacije (GSA) u WSN

    Get PDF
    Wireless Sensor Networks (WSN) are often deployed in hostile environment and are vulnerable to attacks because of the resource constrained nature of the sensors. Clone attack in WSN is one of the major issues where the messages are eavesdropped, the captured node is cloned, and multiple nodes with same identity are produced by attacker. In order to overcome these issues, in this paper, a Distributed Defense Mechanism for Clone Attacks based on Gravitational Search Algorithm (GSA) in WSN is proposed. For efficiently detecting the suspect nodes, the nodes in the channel can be divided into witness node and the claimer node. The witness nodes are responsible for the suspect nodes detection, whereas the claimer nodes should provide their identities for the detection process. For the witness nodes selection, we utilize the GSA to pick out the best witness nodes set. After selecting the witness nodes, clone attack detection is performed by observing the behavior of the neighbor nodes. On detecting the clone attack, revocation procedure is triggered to revoke the clone attack in the witness nodes. By simulation results, it can be concluded that the proposed algorithm provides better protection to clone attacks by reducing the packet drop and increasing the packet delivery ratio.Bežične senzorske mreže (WSN) često su raspoređene u neprijateljskom okruženju i ranjive su na napade zbog prirode senzora koji su tehnološki ograničeni. Clone napad u WSN jedan je od glavnih problema gdje se poruke prisluškuju, zarobljeni čvor se klonira te napadač proizvede višestruke čvorove istog identiteta. Kako bi nadvladali te probleme, ovaj rad predlaže distribuirani obrambeni mehanizam za clone napade temeljen na algoritmu za istraživanje gravitacije (GSA) u WSN. Kako bi se sumnjivi čvorovi efikasno detektirali, čvorovi u kanalu mogu se podijeliti u čvorove svjedoke i tražene čvorove. Čvorovi svjedoci odgovorni su za otkrivanje sumnjivih čvorova, dok traženi čvorovi trebaju za potrebe procesa detekcije navesti svoj identitet. Za izbor čvorova svjedoka, koristi se GSA kako bi se izabrala grupa čvorova koji su najprikladniji. Nakon izbora čvorova svjedoka, otkivanje clone napada vrši se promatranjem ponašanja susjednih čvorova. Otkrivanjem clone napada aktivira se proces opoziva kako bi se opozvao clone napad u čvorovima svjedocima. Prema rezultatima dobivenim iz simulacije može se zaključiti kako predloženi algoritam pruža bolju zaštitu od clone napada smanjivanjem odbacivanja paketa i povećavanjem omjera isporuke paketa

    Tuning of antigen sensitivity by T cell receptor-dependent negative feedback controls T cell effector function inflammed tissues

    No full text
    Activated T cells must mediate effector responses sufficient to clear pathogens while avoiding excessive tissue damage. Here we have combined dynamic intravital microscopy with ex vivo assessments of T cell cytokine responses to generate a detailed spatiotemporal picture of CD4+ T cell effector regulation in the skin. In response to antigen, effector T cells arrested transiently on antigen presenting cells, briefly producing cytokine and then resuming migration. Antigen recognition led to PD-1 upregulation of the programmed death-1 (PD-1) glycoprotein by T cells and blocking its canonical ligand, programmed death-ligand 1 (PD-L1), lengthened the duration of migration arrest and cytokine production, showing that PD-1 interaction with PD-L1 is a major negative feedback regulator of antigen responsiveness. We speculate that the immune system employs a mechanism involving T cell recruitment, transient activation, and rapid desensitization, allowing the T cell response to rapidly adjust to changes in antigen presentation and minimize collateral injury to the host

    The Challenges in SDN/ML Based Network Security : A Survey

    Full text link
    Machine Learning is gaining popularity in the network security domain as many more network-enabled devices get connected, as malicious activities become stealthier, and as new technologies like Software Defined Networking (SDN) emerge. Sitting at the application layer and communicating with the control layer, machine learning based SDN security models exercise a huge influence on the routing/switching of the entire SDN. Compromising the models is consequently a very desirable goal. Previous surveys have been done on either adversarial machine learning or the general vulnerabilities of SDNs but not both. Through examination of the latest ML-based SDN security applications and a good look at ML/SDN specific vulnerabilities accompanied by common attack methods on ML, this paper serves as a unique survey, making a case for more secure development processes of ML-based SDN security applications.Comment: 8 pages. arXiv admin note: substantial text overlap with arXiv:1705.0056

    Retrieving Infinite Numbers of Patterns in a Spin-Glass Model of Immune Networks

    Get PDF
    The similarity between neural and immune networks has been known for decades, but so far we did not understand the mechanism that allows the immune system, unlike associative neural networks, to recall and execute a large number of memorized defense strategies {\em in parallel}. The explanation turns out to lie in the network topology. Neurons interact typically with a large number of other neurons, whereas interactions among lymphocytes in immune networks are very specific, and described by graphs with finite connectivity. In this paper we use replica techniques to solve a statistical mechanical immune network model with `coordinator branches' (T-cells) and `effector branches' (B-cells), and show how the finite connectivity enables the system to manage an extensive number of immune clones simultaneously, even above the percolation threshold. The system exhibits only weak ergodicity breaking, so that both multiple antigen defense and homeostasis can be accomplished.Comment: Editor's Choice 201

    An Early Reduction in Treg Cells Correlates with Enhanced Local Inflammation in Cutaneous Leishmaniasis in CCR6-Deficient Mice

    Get PDF
    Resistance to Leishmania major infection is dependent on the development of a cell-mediated Th1 immune response in resistant C57BL/6 mice whereas Th2-prone BALB/c mice develop non-healing lesions after infection. The chemokine receptor CCR6 is shared by anti-inflammatory regulatory T cells and pro-inflammatory Th17 cells. In a recent study we showed that C57BL/6 mice deficient in CCR6 exhibited enhanced footpad swelling and impaired T helper cell migration indicated by reduced recruitment of total T helper cells into the skin after infection and a reduced delayed type hypersensitivity reaction. Based on these findings we tested whether the lack of CCR6 alters Treg or Th17 cell responses during the course of Leishmania major infection. When we analyzed T cell subsets in the lymph nodes of CCR6-deficient mice, Th17 cell numbers were not different. However, reduced numbers of Treg cells paralleled with a stronger IFNγ response. Furthermore, the early increase in IFNγ-producing cells correlated with increased local tissue inflammation at later time points. Our data indicate an important role of CCR6 for Treg cells and a redundant role for Th17 cells in a Th1 cell-driven anti-parasitic immune response against Leishmania major parasites in resistant C57BL/6 mice

    Interleukin-17 is required for control of chronic lung infection caused by Pseudomonas aeruginosa

    Get PDF
    Chronic pulmonary infection with Pseudomonas aeruginosa is a feature of cystic fibrosis (CF) and other chronic lung diseases. Cytokines of the IL-17 family have been proposed as important in the host response to P. aeruginosa infection through augmenting antibacterial immune responses, although their pro-inflammatory effect may contribute to lung damage that occurs as a result of chronic infection. We set out to explore the role of IL-17 in the host response to chronic P. aeruginosa infection. We used a murine model of chronic pulmonary infection with CF-related strains of P. aeruginosa. We demonstrate that IL-17 cytokine signaling is essential for survival and prevention of chronic infection at 2 weeks post-inoculation using two different P. aeruginosa strains. Following infection, there was a marked expansion of cells within mediastinal lymph nodes, comprised mainly of innate lymphoid cells (ILCs); ∼90% of IL-17 producing cells had markers consistent with Group 3 ILCs. A smaller percentage of IL-17+ cells had markers consistent with a B1 phenotype. In lung homogenates 14 days following infection, there was a significant expansion of IL-17+ cells – about 50% of these were CD3+, split equally between CD4+ Th17 cells and γδ T cells, while the CD3- IL-17+ cells were almost exclusively Group 3 ILCs. Further experiments with B cell deficient mice showed that B cell production of IL-17 or natural antibodies did not provide any defence against chronic P. aeruginosa infection. Thus, IL-17 rather than antibody is a key element in host defence against chronic pulmonary infection with P. aeruginosa
    corecore