9,592 research outputs found

    Authentication of Satellite Navigation Signals by Wiretap Coding and Artificial Noise

    Full text link
    In order to combat the spoofing of global navigation satellite system (GNSS) signals we propose a novel approach for satellite signal authentication based on information-theoretic security. In particular we superimpose to the navigation signal an authentication signal containing a secret message corrupted by artificial noise (AN), still transmitted by the satellite. We impose the following properties: a) the authentication signal is synchronous with the navigation signal, b) the authentication signal is orthogonal to the navigation signal and c) the secret message is undecodable by the attacker due to the presence of the AN. The legitimate receiver synchronizes with the navigation signal and stores the samples of the authentication signal with the same synchronization. After the transmission of the authentication signal, through a separate public asynchronous authenticated channel (e.g., a secure Internet connection) additional information is made public allowing the receiver to a) decode the secret message, thus overcoming the effects of AN, and b) verify the secret message. We assess the performance of the proposed scheme by the analysis of both the secrecy capacity of the authentication message and the attack success probability, under various attack scenarios. A comparison with existing approaches shows the effectiveness of the proposed scheme

    Prevalence of haptic feedback in robot-mediated surgery : a systematic review of literature

    Get PDF
    © 2017 Springer-Verlag. This is a post-peer-review, pre-copyedit version of an article published in Journal of Robotic Surgery. The final authenticated version is available online at: https://doi.org/10.1007/s11701-017-0763-4With the successful uptake and inclusion of robotic systems in minimally invasive surgery and with the increasing application of robotic surgery (RS) in numerous surgical specialities worldwide, there is now a need to develop and enhance the technology further. One such improvement is the implementation and amalgamation of haptic feedback technology into RS which will permit the operating surgeon on the console to receive haptic information on the type of tissue being operated on. The main advantage of using this is to allow the operating surgeon to feel and control the amount of force applied to different tissues during surgery thus minimising the risk of tissue damage due to both the direct and indirect effects of excessive tissue force or tension being applied during RS. We performed a two-rater systematic review to identify the latest developments and potential avenues of improving technology in the application and implementation of haptic feedback technology to the operating surgeon on the console during RS. This review provides a summary of technological enhancements in RS, considering different stages of work, from proof of concept to cadaver tissue testing, surgery in animals, and finally real implementation in surgical practice. We identify that at the time of this review, while there is a unanimous agreement regarding need for haptic and tactile feedback, there are no solutions or products available that address this need. There is a scope and need for new developments in haptic augmentation for robot-mediated surgery with the aim of improving patient care and robotic surgical technology further.Peer reviewe

    DoubleEcho: Mitigating Context-Manipulation Attacks in Copresence Verification

    Full text link
    Copresence verification based on context can improve usability and strengthen security of many authentication and access control systems. By sensing and comparing their surroundings, two or more devices can tell whether they are copresent and use this information to make access control decisions. To the best of our knowledge, all context-based copresence verification mechanisms to date are susceptible to context-manipulation attacks. In such attacks, a distributed adversary replicates the same context at the (different) locations of the victim devices, and induces them to believe that they are copresent. In this paper we propose DoubleEcho, a context-based copresence verification technique that leverages acoustic Room Impulse Response (RIR) to mitigate context-manipulation attacks. In DoubleEcho, one device emits a wide-band audible chirp and all participating devices record reflections of the chirp from the surrounding environment. Since RIR is, by its very nature, dependent on the physical surroundings, it constitutes a unique location signature that is hard for an adversary to replicate. We evaluate DoubleEcho by collecting RIR data with various mobile devices and in a range of different locations. We show that DoubleEcho mitigates context-manipulation attacks whereas all other approaches to date are entirely vulnerable to such attacks. DoubleEcho detects copresence (or lack thereof) in roughly 2 seconds and works on commodity devices

    Prospective validation of an automated chemiluminescence-based assay of renin and aldosterone for the work-up of arterial hypertension

    Get PDF
    AbstractBackground:The availability of simple and accurate assays of plasma active renin (DRC) and aldosterone concentration (PAC) can improve the detection of secondary forms of arterial hypertension. Thus, we investigated the performance of an automated chemiluminescent assay for DRC and PAC in referred hypertensive patients.Methods:We prospectively recruited 260 consecutive hypertensive patients referred to an ESH Center for Hypertension. After exclusion of six protocol violations, 254 patients were analyzed: 67.3% had primary hypertension, 17.3% an aldosterone producing adenoma (APA), 11.4% idiopathic hyperaldosteronism (IHA), 2.4% renovascular hypertension (RVH), 0.8% familial hyperaldosteronism type 1 (FH-1), 0.4% apparent mineralocorticoid excess (AME), 0.4% a renin-producing tumor, and 3.9% were adrenalectomized APA patients. Bland-Altman plots and Deming regression were used to analyze results. The diagnostic accuracy (area under the curve, AUC of the ROC) of the DRC-based aldosterone-renin ratio (ARRCL) was compared with that of the PRA-based ARR (ARRRIA) using as reference the conclusive diagnosis of APA.Results:At Bland-Altman plot, the DRC and PAC assay showed no bias as compared to the PRA and PAC assay. A tight relation was found between the DRC and the PRA values (concordance correlation coefficient=0.92, p&lt;0.0001) and the PAC values measured with radioimmunoassay and chemiluminescence (concordance correlation coefficient=0.93, p&lt;0.001). For APA identification the AUC of the ARRCLwas higher than that of the ARRRIA[0.974 (95% CI 0.940–0.991) vs. 0.894 (95% CI 0.841–0.933), p=0.02].Conclusions:This rapid automated chemiluminescent DRC/PAC assay performed better than validated PRA/PAC radioimmunoassays for the identification of APA in referred hypertensive patients.</jats:sec

    Emerging from out of the shadows? Service user and carer involvement in systematic reviews

    Get PDF
    The systematic review methodology literature refers to the importance of involving stakeholders, including service users and carers, in the research. However, compared with other aspects of the methodology, this aspect of conducting systematic reviews is under-developed and the practice of involvement appears highly variable. This article draws on the experience of working with service users and carers in one systematic review to review the barriers to participation and the components of effective involvement. It suggests that quality standards can be identified for service user and carer involvement in systematic reviews, which will benefit policy and practice development

    Satellite Navigation for the Age of Autonomy

    Full text link
    Global Navigation Satellite Systems (GNSS) brought navigation to the masses. Coupled with smartphones, the blue dot in the palm of our hands has forever changed the way we interact with the world. Looking forward, cyber-physical systems such as self-driving cars and aerial mobility are pushing the limits of what localization technologies including GNSS can provide. This autonomous revolution requires a solution that supports safety-critical operation, centimeter positioning, and cyber-security for millions of users. To meet these demands, we propose a navigation service from Low Earth Orbiting (LEO) satellites which deliver precision in-part through faster motion, higher power signals for added robustness to interference, constellation autonomous integrity monitoring for integrity, and encryption / authentication for resistance to spoofing attacks. This paradigm is enabled by the 'New Space' movement, where highly capable satellites and components are now built on assembly lines and launch costs have decreased by more than tenfold. Such a ubiquitous positioning service enables a consistent and secure standard where trustworthy information can be validated and shared, extending the electronic horizon from sensor line of sight to an entire city. This enables the situational awareness needed for true safe operation to support autonomy at scale.Comment: 11 pages, 8 figures, 2020 IEEE/ION Position, Location and Navigation Symposium (PLANS

    Key Generation in Wireless Sensor Networks Based on Frequency-selective Channels - Design, Implementation, and Analysis

    Full text link
    Key management in wireless sensor networks faces several new challenges. The scale, resource limitations, and new threats such as node capture necessitate the use of an on-line key generation by the nodes themselves. However, the cost of such schemes is high since their secrecy is based on computational complexity. Recently, several research contributions justified that the wireless channel itself can be used to generate information-theoretic secure keys. By exchanging sampling messages during movement, a bit string can be derived that is only known to the involved entities. Yet, movement is not the only possibility to generate randomness. The channel response is also strongly dependent on the frequency of the transmitted signal. In our work, we introduce a protocol for key generation based on the frequency-selectivity of channel fading. The practical advantage of this approach is that we do not require node movement. Thus, the frequent case of a sensor network with static motes is supported. Furthermore, the error correction property of the protocol mitigates the effects of measurement errors and other temporal effects, giving rise to an agreement rate of over 97%. We show the applicability of our protocol by implementing it on MICAz motes, and evaluate its robustness and secrecy through experiments and analysis.Comment: Submitted to IEEE Transactions on Dependable and Secure Computin
    corecore