3,531 research outputs found

    Mobile Device Background Sensors: Authentication vs Privacy

    Get PDF
    The increasing number of mobile devices in recent years has caused the collection of a large amount of personal information that needs to be protected. To this aim, behavioural biometrics has become very popular. But, what is the discriminative power of mobile behavioural biometrics in real scenarios? With the success of Deep Learning (DL), architectures based on Convolutional Neural Networks (CNNs) and Recurrent Neural Networks (RNNs), such as Long Short-Term Memory (LSTM), have shown improvements compared to traditional machine learning methods. However, these DL architectures still have limitations that need to be addressed. In response, new DL architectures like Transformers have emerged. The question is, can these new Transformers outperform previous biometric approaches? To answers to these questions, this thesis focuses on behavioural biometric authentication with data acquired from mobile background sensors (i.e., accelerometers and gyroscopes). In addition, to the best of our knowledge, this is the first thesis that explores and proposes novel behavioural biometric systems based on Transformers, achieving state-of-the-art results in gait, swipe, and keystroke biometrics. The adoption of biometrics requires a balance between security and privacy. Biometric modalities provide a unique and inherently personal approach for authentication. Nevertheless, biometrics also give rise to concerns regarding the invasion of personal privacy. According to the General Data Protection Regulation (GDPR) introduced by the European Union, personal data such as biometric data are sensitive and must be used and protected properly. This thesis analyses the impact of sensitive data in the performance of biometric systems and proposes a novel unsupervised privacy-preserving approach. The research conducted in this thesis makes significant contributions, including: i) a comprehensive review of the privacy vulnerabilities of mobile device sensors, covering metrics for quantifying privacy in relation to sensitive data, along with protection methods for safeguarding sensitive information; ii) an analysis of authentication systems for behavioural biometrics on mobile devices (i.e., gait, swipe, and keystroke), being the first thesis that explores the potential of Transformers for behavioural biometrics, introducing novel architectures that outperform the state of the art; and iii) a novel privacy-preserving approach for mobile biometric gait verification using unsupervised learning techniques, ensuring the protection of sensitive data during the verification process

    Authentication enhancement in command and control networks: (a study in Vehicular Ad-Hoc Networks)

    Get PDF
    Intelligent transportation systems contribute to improved traffic safety by facilitating real time communication between vehicles. By using wireless channels for communication, vehicular networks are susceptible to a wide range of attacks, such as impersonation, modification, and replay. In this context, securing data exchange between intercommunicating terminals, e.g., vehicle-to-everything (V2X) communication, constitutes a technological challenge that needs to be addressed. Hence, message authentication is crucial to safeguard vehicular ad-hoc networks (VANETs) from malicious attacks. The current state-of-the-art for authentication in VANETs relies on conventional cryptographic primitives, introducing significant computation and communication overheads. In this challenging scenario, physical (PHY)-layer authentication has gained popularity, which involves leveraging the inherent characteristics of wireless channels and the hardware imperfections to discriminate between wireless devices. However, PHY-layerbased authentication cannot be an alternative to crypto-based methods as the initial legitimacy detection must be conducted using cryptographic methods to extract the communicating terminal secret features. Nevertheless, it can be a promising complementary solution for the reauthentication problem in VANETs, introducing what is known as “cross-layer authentication.” This thesis focuses on designing efficient cross-layer authentication schemes for VANETs, reducing the communication and computation overheads associated with transmitting and verifying a crypto-based signature for each transmission. The following provides an overview of the proposed methodologies employed in various contributions presented in this thesis. 1. The first cross-layer authentication scheme: A four-step process represents this approach: initial crypto-based authentication, shared key extraction, re-authentication via a PHY challenge-response algorithm, and adaptive adjustments based on channel conditions. Simulation results validate its efficacy, especially in low signal-to-noise ratio (SNR) scenarios while proving its resilience against active and passive attacks. 2. The second cross-layer authentication scheme: Leveraging the spatially and temporally correlated wireless channel features, this scheme extracts high entropy shared keys that can be used to create dynamic PHY-layer signatures for authentication. A 3-Dimensional (3D) scattering Doppler emulator is designed to investigate the scheme’s performance at different speeds of a moving vehicle and SNRs. Theoretical and hardware implementation analyses prove the scheme’s capability to support high detection probability for an acceptable false alarm value ≤ 0.1 at SNR ≥ 0 dB and speed ≤ 45 m/s. 3. The third proposal: Reconfigurable intelligent surfaces (RIS) integration for improved authentication: Focusing on enhancing PHY-layer re-authentication, this proposal explores integrating RIS technology to improve SNR directed at designated vehicles. Theoretical analysis and practical implementation of the proposed scheme are conducted using a 1-bit RIS, consisting of 64 × 64 reflective units. Experimental results show a significant improvement in the Pd, increasing from 0.82 to 0.96 at SNR = − 6 dB for multicarrier communications. 4. The fourth proposal: RIS-enhanced vehicular communication security: Tailored for challenging SNR in non-line-of-sight (NLoS) scenarios, this proposal optimises key extraction and defends against denial-of-service (DoS) attacks through selective signal strengthening. Hardware implementation studies prove its effectiveness, showcasing improved key extraction performance and resilience against potential threats. 5. The fifth cross-layer authentication scheme: Integrating PKI-based initial legitimacy detection and blockchain-based reconciliation techniques, this scheme ensures secure data exchange. Rigorous security analyses and performance evaluations using network simulators and computation metrics showcase its effectiveness, ensuring its resistance against common attacks and time efficiency in message verification. 6. The final proposal: Group key distribution: Employing smart contract-based blockchain technology alongside PKI-based authentication, this proposal distributes group session keys securely. Its lightweight symmetric key cryptography-based method maintains privacy in VANETs, validated via Ethereum’s main network (MainNet) and comprehensive computation and communication evaluations. The analysis shows that the proposed methods yield a noteworthy reduction, approximately ranging from 70% to 99%, in both computation and communication overheads, as compared to the conventional approaches. This reduction pertains to the verification and transmission of 1000 messages in total

    Displacement and the Humanities: Manifestos from the Ancient to the Present

    Get PDF
    This is the final version. Available on open access from MDPI via the DOI in this recordThis is a reprint of articles from the Special Issue published online in the open access journal Humanities (ISSN 2076-0787) (available at: https://www.mdpi.com/journal/humanities/special_issues/Manifestos Ancient Present)This volume brings together the work of practitioners, communities, artists and other researchers from multiple disciplines. Seeking to provoke a discourse around displacement within and beyond the field of Humanities, it positions historical cases and debates, some reaching into the ancient past, within diverse geo-chronological contexts and current world urgencies. In adopting an innovative dialogic structure, between practitioners on the ground - from architects and urban planners to artists - and academics working across subject areas, the volume is a proposition to: remap priorities for current research agendas; open up disciplines, critically analysing their approaches; address the socio-political responsibilities that we have as scholars and practitioners; and provide an alternative site of discourse for contemporary concerns about displacement. Ultimately, this volume aims to provoke future work and collaborations - hence, manifestos - not only in the historical and literary fields, but wider research concerned with human mobility and the challenges confronting people who are out of place of rights, protection and belonging

    Multidisciplinary perspectives on Artificial Intelligence and the law

    Get PDF
    This open access book presents an interdisciplinary, multi-authored, edited collection of chapters on Artificial Intelligence (‘AI’) and the Law. AI technology has come to play a central role in the modern data economy. Through a combination of increased computing power, the growing availability of data and the advancement of algorithms, AI has now become an umbrella term for some of the most transformational technological breakthroughs of this age. The importance of AI stems from both the opportunities that it offers and the challenges that it entails. While AI applications hold the promise of economic growth and efficiency gains, they also create significant risks and uncertainty. The potential and perils of AI have thus come to dominate modern discussions of technology and ethics – and although AI was initially allowed to largely develop without guidelines or rules, few would deny that the law is set to play a fundamental role in shaping the future of AI. As the debate over AI is far from over, the need for rigorous analysis has never been greater. This book thus brings together contributors from different fields and backgrounds to explore how the law might provide answers to some of the most pressing questions raised by AI. An outcome of the Católica Research Centre for the Future of Law and its interdisciplinary working group on Law and Artificial Intelligence, it includes contributions by leading scholars in the fields of technology, ethics and the law.info:eu-repo/semantics/publishedVersio

    Evolutionary ecology of obligate fungal and microsporidian invertebrate pathogens

    Get PDF
    The interactions between hosts and their parasites and pathogens are omnipresent in the natural world. These symbioses are not only key players in ecosystem functioning, but also drive genetic diversity through co-evolutionary adaptations. Within the speciose invertebrates, a plethora of interactions with obligate fungal and microsporidian pathogens exist, however the known interactions is likely only a fraction of the true diversity. Obligate invertebrate fungal and microsporidian pathogen require a host to continue their life cycle, some of which have specialised in certain host species and require host death to transmit to new hosts. Due to their requirement to kill a host to spread to a new one, obligate fungal and microsporidian pathogens regulate invertebrate host populations. Pathogen specialisation to a single or very few hosts has led to some fungi evolving the ability to manipulate their host’s behaviour to maximise transmission. The entomopathogenic fungus, Entomophthora muscae, infects houseflies (Musca domestica) over a week-long proliferation cycle, resulting in flies climbing to elevated positions, gluing their mouthparts to the substrate surface, and raising their wings to allow for a clear exit from fungal conidia through the host abdomen. These sequential behaviours are all timed to occur within a few hours of sunset. The E. muscae mechanisms used in controlling the mind of the fly remain relatively unknown, and whether other fitness costs ensue from an infection are understudied.European Commissio

    The Pragmatic Development of a Carbon Management Framework for UK SMEs

    Get PDF
    The UK's commitment to net-zero emissions by 2050 is challenged by critics citing current government strategies as inadequate, marked by a lack of concrete action and aspirational guidelines. Notably, businesses, including small and medium-sized enterprises (SMEs) which constitute about half of all business emissions, are pivotal to this goal. Yet, existing policies and standards often neglect the significant role of SMEs, who face barriers such as limited knowledge and resources in implementing carbon management practices. This thesis explores the development of a novel carbon management framework specifically designed for medium-sized organisations in the UK to address these problems. The research adopts a practical approach through collaboration with an industry partner, facilitating a case study for real-world application. Adopting a mixed-methods research design grounded in pragmatism, the study commenced with a qualitative study in the form of a focus group. This exploratory phase, critical for understanding SME challenges, yielded rich data revealing key management themes in strategy, energy, and data. The framework design was supported by a materiality assessment and input from key stakeholders on three major iterations. The final framework comprises three phases: establishing a baseline carbon footprint, creating a carbon reduction plan, and strategically implementing this plan. The validation process, conducted at Knowsley Safari, successfully tested the initial two phases but faced constraints in fully assessing the third phase due to time limitations. While the research achieved its primary aim of developing a novel carbon management framework for SMEs, it encountered limitations, notably in time and the generalisability of findings due to reliance on a single case study. Future research could test the framework across diverse SME settings to establish its broader applicability and effectiveness in aiding the UK's net-zero emission goals

    Digitalization and Development

    Get PDF
    This book examines the diffusion of digitalization and Industry 4.0 technologies in Malaysia by focusing on the ecosystem critical for its expansion. The chapters examine the digital proliferation in major sectors of agriculture, manufacturing, e-commerce and services, as well as the intermediary organizations essential for the orderly performance of socioeconomic agents. The book incisively reviews policy instruments critical for the effective and orderly development of the embedding organizations, and the regulatory framework needed to quicken the appropriation of socioeconomic synergies from digitalization and Industry 4.0 technologies. It highlights the importance of collaboration between government, academic and industry partners, as well as makes key recommendations on how to encourage adoption of IR4.0 technologies in the short- and long-term. This book bridges the concepts and applications of digitalization and Industry 4.0 and will be a must-read for policy makers seeking to quicken the adoption of its technologies

    LIPIcs, Volume 251, ITCS 2023, Complete Volume

    Get PDF
    LIPIcs, Volume 251, ITCS 2023, Complete Volum

    A Critical Review Of Post-Secondary Education Writing During A 21st Century Education Revolution

    Get PDF
    Educational materials are effective instruments which provide information and report new discoveries uncovered by researchers in specific areas of academia. Higher education, like other education institutions, rely on instructional materials to inform its practice of educating adult learners. In post-secondary education, developmental English programs are tasked with meeting the needs of dynamic populations, thus there is a continuous need for research in this area to support its changing landscape. However, the majority of scholarly thought in this area centers on K-12 reading and writing. This paucity presents a phenomenon to the post-secondary community. This research study uses a qualitative content analysis to examine peer-reviewed journals from 2003-2017, developmental online websites, and a government issued document directed toward reforming post-secondary developmental education programs. These highly relevant sources aid educators in discovering informational support to apply best practices for student success. Developmental education serves the purpose of addressing literacy gaps for students transitioning to college-level work. The findings here illuminate the dearth of material offered to developmental educators. This study suggests the field of literacy research is fragmented and highlights an apparent blind spot in scholarly literature with regard to English writing instruction. This poses a quandary for post-secondary literacy researchers in the 21st century and establishes the necessity for the literacy research community to commit future scholarship toward equipping college educators teaching writing instruction to underprepared adult learners

    Evaluating the sustainability and resiliency of local food systems

    Get PDF
    With an ever-rising global population and looming environmental challenges such as climate change and soil degradation, it is imperative to increase the sustainability of food production. The drastic rise in food insecurity during the COVID-19 pandemic has further shown a pressing need to increase the resiliency of food systems. One strategy to reduce the dependence on complex, vulnerable global supply chains is to strengthen local food systems, such as by producing more food in cities. This thesis uses an interdisciplinary, food systems approach to explore aspects of sustainability and resiliency within local food systems. Lifecycle assessment (LCA) was used to evaluate how farm scale, distance to consumer, and management practices influence environmental impacts for different local agriculture models in two case study locations: Georgia, USA and England, UK. Farms were grouped based on urbanisation level and management practices, including: urban organic, peri-urban organic, rural organic, and rural conventional. A total of 25 farms and 40 crop lifecycles were evaluated, focusing on two crops (kale and tomatoes) and including impacts from seedling production through final distribution to the point of sale. Results were extremely sensitive to the allocation of composting burdens (decomposition emissions), with impact variation between organic farms driven mainly by levels of compost use. When composting burdens were attributed to compost inputs, the rural conventional category in the U.S. and the rural organic category in the UK had the lowest average impacts per kg sellable crop produced, including the lowest global warming potential (GWP). However, when subtracting avoided burdens from the municipal waste stream from compost inputs, trends reversed entirely, with urban or peri-urban farm categories having the lowest impacts (often negative) for GWP and marine eutrophication. Overall, farm management practices were the most important factor driving environmental impacts from local food supply chains. A soil health assessment was then performed on a subset of the UK farms to provide insight to ecosystem services that are not captured within LCA frameworks. Better soil health was observed in organically-farmed and uncultivated soils compared to conventionally farmed soils, suggesting higher ecosystem service provisioning as related to improved soil structure, flood mitigation, erosion control, and carbon storage. However, relatively high heavy metal concentrations were seen on urban and peri-urban farms, as well as those located in areas with previous mining activity. This implies that there are important services and disservices on farms that are not captured by LCAs. Zooming out from a focus on food production, a qualitative methodology was used to explore experiences of food insecurity and related health and social challenges during the COVID-19 pandemic. Fourteen individuals receiving emergency food parcels from a community food project in Sheffield, UK were interviewed. Results showed that maintaining food security in times of crisis requires a diverse set of individual, household, social, and place-based resources, which were largely diminished or strained during the pandemic. Drawing upon social capital and community support was essential to cope with a multiplicity of hardship, highlighting a need to develop community food infrastructure that supports ideals of mutual aid and builds connections throughout the food supply chain. Overall, this thesis shows that a range of context-specific solutions are required to build sustainable and resilient food systems. This can be supported by increasing local control of food systems and designing strategies to meet specific community needs, whilst still acknowledging a shared global responsibility to protect ecosystem, human, and planetary health
    corecore