9 research outputs found

    EVALUATION OF MACROSCOPIC STOOL EXAMINATION IN AYURVEDA THROUGH MODERN PARAMETER

    Get PDF
    The body is consisting of Dosha, Dhatu and Mala. Mala in terms of Mutra, Purish and Sweda are the waste products of Anna rasa. In any pathological condition the characters of Dosha, Dhatu and Mala gets altered. Among these factors, clinical examinations of Mutra and Purish have been described in Ayurveda. The methods of examination of stool have not been elaborately mentioned in ancient text of Ayurveda. In modern era, there is an urgent need to evolve a comprehensive method of stool examination as per modern parameters in accordance with principles of Ayurveda, so that this can be followed by the bedside of patients on clinical practice as well as in pathological laboratory. This is consisting collection of stool sample, examination and interpretation of the findings. Stool can be examined macroscopically on the basis of following parameters: colour, odour, consistency, presence of mucus, presence of blood, and presence of any special characters. Each of the parameters can be further interpreted on the basis of different clinical features of stool mentioned under Purvarupa, Rupa, Asadhyalaksna of different disease. This comprehensive approach towards stool examination will not only validate Ayurvedic principles on the basis of modern knowledge, this will also help in diagnosis, prognosis and treatment of diseases as well as will be very useful to make differential diagnosis of a disease

    On Pre-deployment Assessment and Security Bootstrapping of Industrial Communication Networks

    No full text
    The severity of cyber threats towards existing and future industrial systems has resulted in an increase of security awareness in the industrial automation domain. Compared to traditional information systems, industrial communication systems have different performance and reliability requirements. The safety and availability requirements can also sometimes conflict with the system security design of plants. For instance, it is not acceptable to create a secure system that may take up additional time to establish security and as a consequence disrupt the production in plants. Similarly, a system that requires authentication and authorization procedures before an emergency action may not be suitable in industrial plants. On the other hand, lack of security can hamper safety of a plant. Therefore, there is a need for improvement of the security workflow in industrial plants, so that the practical realization of security can be achieved. This includes secure device deployment and secure data communication inside the industrial plants. Furthermore, the industrial plant networks are heterogeneous in terms of hardware, software, and protocols. This complicates security assessment of industrial networks.   In this thesis, the focus is on achieving a secured communication infrastructure for heterogeneous industrial networks. The initial trust establishment is the starting point for enabling a secure communication infrastructure. A framework for the initial trust establishment for industrial devices that can support key management using the existing trust of employees in a plant is proposed. With the help of a proof-of-concept implementation and security analysis, it is shown that the proposed framework is feasible to implement and satisfies the security objectives. After establishing initial trust within industrial devices, assessing heterogeneous security properties based on the network architecture is another focus of this thesis. A model to estimate the security assurance of nodes in a heterogeneous network, where all devices are not having the same level of security mechanisms, is given. Along with cyber security requirements of industrial plants, it is also necessary to consider other important requirements of plants in terms of network performance. In this thesis, identification of an optimized path between two systems in a heterogeneous network in terms of the network performance and the network security is explored. The applicability of this balancing approach has been demonstrated in a specific case of smart grid application where security, network capacity and reachability need to be optimal for successful network operation

    PLANNING AND ANALYSIS TOOL FOR LARGE SCALE DEPLOYMENT OF WIRELESS SENSOR NETWORK

    No full text
    In this paper the importance of tool-suite for large scale Wireless Sensor Network (WSN) deployment scenario has been investigated. This tool-suite is classified depending on the required feature for WSN deployment. Here both pre-deployment and post deployment has been considered for classification. Planning tool is used in pre-deployment phase and diagnostic tool is used in post-deployment phase. To enable a good planning for WSN, a proper model of WSN and the number and position of sensor nodes are required. In post deployment phase, the diagnostic tool will monitor the health of the deployed network status. In this paper, a direction of development of this type of tool has been presented and the challenges of building this type of tool are also discussed

    Initial Trust Establishment for Heterogeneous Industrial Communication Networks

    No full text
    The severity of cyber threats towards existing and future industrial systems has resulted in an increase of security awareness in the industrial automation domain. Compared to traditional information security, industrial communication systems have different performance and reliability requirements. The safety and availability requirements can also sometimes conflict with the system security design of plants. For instance, it is not acceptable to create a secure system which may take up additional time to establish security and as a consequence disrupt the production in plants. Similarly, a system which requires authentication and authorization procedures before any emergency action may not be suitable in industrial plants. Therefore, there is a need for improvement of the security workflow in industrial plants, so that the security can be realized in practice. This also leads to the requirement of secure device deployment and secure data communication inside the industrial plants. In this thesis, the focus is on the initial trust establishment in industrial devices. The initial trust establishment is the starting point for enabling a secure communication infrastructure. Reusability analysis with financial sectors has been considered as the reuse of security solutions from this adjacent application domain can be a simple and an effective way to achieve the desired system security. Through this analysis, the reusability features have been identified and workflows have been proposed which can be used to bootstrap initial trust in the industrial process control devices and manage security workflow. A proof-of-concept implementation to prove the feasibility of the device deployment workflow has also been provided

    Initial Trust Establishment for Heterogeneous Industrial Communication Networks

    No full text
    The severity of cyber threats towards existing and future industrial systems has resulted in an increase of security awareness in the industrial automation domain. Compared to traditional information security, industrial communication systems have different performance and reliability requirements. The safety and availability requirements can also sometimes conflict with the system security design of plants. For instance, it is not acceptable to create a secure system which may take up additional time to establish security and as a consequence disrupt the production in plants. Similarly, a system which requires authentication and authorization procedures before any emergency action may not be suitable in industrial plants. Therefore, there is a need for improvement of the security workflow in industrial plants, so that the security can be realized in practice. This also leads to the requirement of secure device deployment and secure data communication inside the industrial plants. In this thesis, the focus is on the initial trust establishment in industrial devices. The initial trust establishment is the starting point for enabling a secure communication infrastructure. Reusability analysis with financial sectors has been considered as the reuse of security solutions from this adjacent application domain can be a simple and an effective way to achieve the desired system security. Through this analysis, the reusability features have been identified and workflows have been proposed which can be used to bootstrap initial trust in the industrial process control devices and manage security workflow. A proof-of-concept implementation to prove the feasibility of the device deployment workflow has also been provided

    Employee Trust Based Industrial Device Deployment and Initial Key Establishment

    No full text
    An efficient key management system is required to support cryptography. Most key management systems use either pre-installed shared keys or install initial security parameters using out-of-band channels. These methods create an additional burden for engineers who manage the devices in industrial plants. Hence, device deployment in industrial plants becomes a challenging task in order to achieve security. In this work, we present a device deployment framework that can support key management using the existing trust towards employees in a plant. This approach reduces the access to initial security parameters by employees; rather it helps to bind the trust of the employee with device commissioning. Thus, this approach presents a unique solution to the device deployment problem. Further, through a proof-of-concept implementation and security analysis using the AVISPA tool, we present that our framework is feasible to implement and satisfies our security objectives.M2M Communicatio

    Assessing Security, Capacity and Reachability of a Heterogeneous Industrial Network during Planning Phase

    No full text
    In an industrial plant, there is usually a mix of devices with different levels of security features and computation capabilities. If a mix of devices with various degrees of security features and capabilities communicate, the overall network dynamics with respect to security and network performance will be complex. A secure communication path with high latency and low bandwidth may not satisfy the operational requirements in a plant. Therefore, there is a need to assess the relation of security and network performance for overall plant operation. In this work we focus on identifying an optimal flow path between two devices in a multi-hop heterogeneous network. We propose a model and an algorithm to estimate and generate a network path identified by flow performance indicators of a heterogeneous communication network. Through an example, we show how the flow performance metrics change with security, capacity and reachability of the devices in the network.M2M Communication

    Applicability of LTE Public Key Infrastructure Based Device Authentication in Industrial Plants

    Get PDF
    The security in industrial automation domain using cryptography mechanisms is being discussed in both industry and academia. An efficient key management system is required to support cryptography for both symmetric key and public/private key encryption. The key management should ensure that the device is verified before distributing the initial key parameters to devices. The software/firmware used in the device comes from manufacturers, therefore the initial authenticity of the device can be easily verified with the help of manufacturers. Mobile telecommunication is an industrial segment where wireless devices are being used for a long time and the security of the wireless device management has been considered through a standard driven approach. Therefore, it is interesting to analyse the security authentication mechanisms used in mobile communication, specified in Long-Term-Evolution (LTE) standard. This paper analyses the initial device authentication using public key infrastructure in LTE standard, and discusses if, where and how the studied solutions can be tailored for device authenticity verification in industrial plant automation systems.PSCI
    corecore