9,592 research outputs found
Authentication of Satellite Navigation Signals by Wiretap Coding and Artificial Noise
In order to combat the spoofing of global navigation satellite system (GNSS)
signals we propose a novel approach for satellite signal authentication based
on information-theoretic security. In particular we superimpose to the
navigation signal an authentication signal containing a secret message
corrupted by artificial noise (AN), still transmitted by the satellite. We
impose the following properties: a) the authentication signal is synchronous
with the navigation signal, b) the authentication signal is orthogonal to the
navigation signal and c) the secret message is undecodable by the attacker due
to the presence of the AN. The legitimate receiver synchronizes with the
navigation signal and stores the samples of the authentication signal with the
same synchronization. After the transmission of the authentication signal,
through a separate public asynchronous authenticated channel (e.g., a secure
Internet connection) additional information is made public allowing the
receiver to a) decode the secret message, thus overcoming the effects of AN,
and b) verify the secret message. We assess the performance of the proposed
scheme by the analysis of both the secrecy capacity of the authentication
message and the attack success probability, under various attack scenarios. A
comparison with existing approaches shows the effectiveness of the proposed
scheme
Prevalence of haptic feedback in robot-mediated surgery : a systematic review of literature
© 2017 Springer-Verlag. This is a post-peer-review, pre-copyedit version of an article published in Journal of Robotic Surgery. The final authenticated version is available online at: https://doi.org/10.1007/s11701-017-0763-4With the successful uptake and inclusion of robotic systems in minimally invasive surgery and with the increasing application of robotic surgery (RS) in numerous surgical specialities worldwide, there is now a need to develop and enhance the technology further. One such improvement is the implementation and amalgamation of haptic feedback technology into RS which will permit the operating surgeon on the console to receive haptic information on the type of tissue being operated on. The main advantage of using this is to allow the operating surgeon to feel and control the amount of force applied to different tissues during surgery thus minimising the risk of tissue damage due to both the direct and indirect effects of excessive tissue force or tension being applied during RS. We performed a two-rater systematic review to identify the latest developments and potential avenues of improving technology in the application and implementation of haptic feedback technology to the operating surgeon on the console during RS. This review provides a summary of technological enhancements in RS, considering different stages of work, from proof of concept to cadaver tissue testing, surgery in animals, and finally real implementation in surgical practice. We identify that at the time of this review, while there is a unanimous agreement regarding need for haptic and tactile feedback, there are no solutions or products available that address this need. There is a scope and need for new developments in haptic augmentation for robot-mediated surgery with the aim of improving patient care and robotic surgical technology further.Peer reviewe
DoubleEcho: Mitigating Context-Manipulation Attacks in Copresence Verification
Copresence verification based on context can improve usability and strengthen
security of many authentication and access control systems. By sensing and
comparing their surroundings, two or more devices can tell whether they are
copresent and use this information to make access control decisions. To the
best of our knowledge, all context-based copresence verification mechanisms to
date are susceptible to context-manipulation attacks. In such attacks, a
distributed adversary replicates the same context at the (different) locations
of the victim devices, and induces them to believe that they are copresent. In
this paper we propose DoubleEcho, a context-based copresence verification
technique that leverages acoustic Room Impulse Response (RIR) to mitigate
context-manipulation attacks. In DoubleEcho, one device emits a wide-band
audible chirp and all participating devices record reflections of the chirp
from the surrounding environment. Since RIR is, by its very nature, dependent
on the physical surroundings, it constitutes a unique location signature that
is hard for an adversary to replicate. We evaluate DoubleEcho by collecting RIR
data with various mobile devices and in a range of different locations. We show
that DoubleEcho mitigates context-manipulation attacks whereas all other
approaches to date are entirely vulnerable to such attacks. DoubleEcho detects
copresence (or lack thereof) in roughly 2 seconds and works on commodity
devices
Prospective validation of an automated chemiluminescence-based assay of renin and aldosterone for the work-up of arterial hypertension
AbstractBackground:The availability of simple and accurate assays of plasma active renin (DRC) and aldosterone concentration (PAC) can improve the detection of secondary forms of arterial hypertension. Thus, we investigated the performance of an automated chemiluminescent assay for DRC and PAC in referred hypertensive patients.Methods:We prospectively recruited 260 consecutive hypertensive patients referred to an ESH Center for Hypertension. After exclusion of six protocol violations, 254 patients were analyzed: 67.3% had primary hypertension, 17.3% an aldosterone producing adenoma (APA), 11.4% idiopathic hyperaldosteronism (IHA), 2.4% renovascular hypertension (RVH), 0.8% familial hyperaldosteronism type 1 (FH-1), 0.4% apparent mineralocorticoid excess (AME), 0.4% a renin-producing tumor, and 3.9% were adrenalectomized APA patients. Bland-Altman plots and Deming regression were used to analyze results. The diagnostic accuracy (area under the curve, AUC of the ROC) of the DRC-based aldosterone-renin ratio (ARRCL) was compared with that of the PRA-based ARR (ARRRIA) using as reference the conclusive diagnosis of APA.Results:At Bland-Altman plot, the DRC and PAC assay showed no bias as compared to the PRA and PAC assay. A tight relation was found between the DRC and the PRA values (concordance correlation coefficient=0.92, p<0.0001) and the PAC values measured with radioimmunoassay and chemiluminescence (concordance correlation coefficient=0.93, p<0.001). For APA identification the AUC of the ARRCLwas higher than that of the ARRRIA[0.974 (95% CI 0.940–0.991) vs. 0.894 (95% CI 0.841–0.933), p=0.02].Conclusions:This rapid automated chemiluminescent DRC/PAC assay performed better than validated PRA/PAC radioimmunoassays for the identification of APA in referred hypertensive patients.</jats:sec
Emerging from out of the shadows? Service user and carer involvement in systematic reviews
The systematic review methodology literature refers to the importance of involving stakeholders, including service users and carers, in the research. However, compared with other aspects of the methodology, this aspect of conducting systematic reviews is under-developed and the practice of involvement appears highly variable. This article draws on the experience of working with service users and carers in one systematic review to review the barriers to participation and the components of effective involvement. It suggests that quality standards can be identified for service user and carer involvement in systematic reviews, which will benefit policy and practice development
Satellite Navigation for the Age of Autonomy
Global Navigation Satellite Systems (GNSS) brought navigation to the masses.
Coupled with smartphones, the blue dot in the palm of our hands has forever
changed the way we interact with the world. Looking forward, cyber-physical
systems such as self-driving cars and aerial mobility are pushing the limits of
what localization technologies including GNSS can provide. This autonomous
revolution requires a solution that supports safety-critical operation,
centimeter positioning, and cyber-security for millions of users. To meet these
demands, we propose a navigation service from Low Earth Orbiting (LEO)
satellites which deliver precision in-part through faster motion, higher power
signals for added robustness to interference, constellation autonomous
integrity monitoring for integrity, and encryption / authentication for
resistance to spoofing attacks. This paradigm is enabled by the 'New Space'
movement, where highly capable satellites and components are now built on
assembly lines and launch costs have decreased by more than tenfold. Such a
ubiquitous positioning service enables a consistent and secure standard where
trustworthy information can be validated and shared, extending the electronic
horizon from sensor line of sight to an entire city. This enables the
situational awareness needed for true safe operation to support autonomy at
scale.Comment: 11 pages, 8 figures, 2020 IEEE/ION Position, Location and Navigation
Symposium (PLANS
Key Generation in Wireless Sensor Networks Based on Frequency-selective Channels - Design, Implementation, and Analysis
Key management in wireless sensor networks faces several new challenges. The
scale, resource limitations, and new threats such as node capture necessitate
the use of an on-line key generation by the nodes themselves. However, the cost
of such schemes is high since their secrecy is based on computational
complexity. Recently, several research contributions justified that the
wireless channel itself can be used to generate information-theoretic secure
keys. By exchanging sampling messages during movement, a bit string can be
derived that is only known to the involved entities. Yet, movement is not the
only possibility to generate randomness. The channel response is also strongly
dependent on the frequency of the transmitted signal. In our work, we introduce
a protocol for key generation based on the frequency-selectivity of channel
fading. The practical advantage of this approach is that we do not require node
movement. Thus, the frequent case of a sensor network with static motes is
supported. Furthermore, the error correction property of the protocol mitigates
the effects of measurement errors and other temporal effects, giving rise to an
agreement rate of over 97%. We show the applicability of our protocol by
implementing it on MICAz motes, and evaluate its robustness and secrecy through
experiments and analysis.Comment: Submitted to IEEE Transactions on Dependable and Secure Computin
- …