3,059 research outputs found
Securing the Internet of Things Infrastructure - Standards and Techniques
The Internet of Things (IoT) infrastructure is a conglomerate of electronic devices interconnected through the Internet, with the purpose of providing prompt and effective service to end-users. Applications running on an IoT infrastructure generally handle sensitive information such as a patient’s healthcare record, the position of a logistic vehicle, or the temperature readings obtained through wireless sensor nodes deployed in a bushland. The protection of such information from unlawful disclosure, tampering or modification, as well as the unscathed presence of IoT devices, in adversarial environments, is of prime concern. In this paper, a descriptive analysis of the security of standards and technologies for protecting the IoT communication channel from adversarial threats is provided. In addition, two paradigms for securing the IoT infrastructure, namely, common key based and paired key based, are proposed
Recommended from our members
Genome sequence of the hyperinvasive Campylobacter jejuni strains
Campylobacter jejuni is the world’s major cause of gastroenteritis in humans. Although motility, toxin production, adhesion and invasion are some of the key factors associated with C. jejuni pathogenesis, their mechanism in the disease process remains unclear. The key aim of this project is to study the genetic basis of hyperinvasiveness in a group of six C. jejuni strains which have been reported as hyperinvasive into human intestinal cell lines. Here, genomotyping of the hyperinvasive C. jejuni was performed by comparative genomic hybridization (CGH) against four low invasive C. jejuni strains. A group of 67 genes were identified as being present or highly divergent/absent in the hyperinvasive versus low invasive C. jejuni strains. Of these, nine genes were present and six genes were highly divergent/absent in all hyperinvasive C. jejuni. The PCR screening of these 15 genes in nine additional low invasive C. jejuni strains showed a significant association with the hyperinvasive phenotype. The majority of identified genes encoded proteins with essential cellular and metabolic functions along with some genes with known virulence related roles. Thus, the hyperinvasive phenotype is characterised by different functional networks rather than a single gene or gene cluster. All strains showed an overall genetic variability and the capsule, lipooligosaccharide, flagellar biosynthesis and restriction modification regions were the most diverse. The hierarchical clustering based on comparative genomic hybridization (CGH) did not group together the hyperinvasive C. jejuni as a single group and these strains possessed different MLST profiles
Fixed boundary conditions analysis of the 3d Gonihedric Ising model with
The Gonihedric Ising model is a particular case of the class of models
defined by Savvidy and Wegner intended as discrete versions of string theories
on cubic lattices. In this paper we perform a high statistics analysis of the
phase transition exhibited by the 3d Gonihedric Ising model with in the
light of a set of recently stated scaling laws applicable to first order phase
transitions with fixed boundary conditions. Even though qualitative evidence
was presented in a previous paper to support the existence of a first order
phase transition at , only now are we capable of pinpointing the
transition inverse temperature at and of checking the
scaling of standard observables.Comment: 14 pages, 5 tables, 2 figures, uses elsart.cls packag
Numerical simulation of random paths with a curvature dependent action
We study an ensemble of closed random paths, embedded in R^3, with a
curvature dependent action. Previous analytical results indicate that there is
no crumpling transition for any finite value of the curvature coupling.
Nevertheless, in a high statistics numerical simulation, we observe two
different regimes for the specific heat separated by a rather smooth structure.
The analysis of this fact warns us about the difficulties in the interpretation
of numerical results obtained in cases where theoretical results are absent and
a high statistics simulation is unreachable. This may be the case of random
surfaces.Comment: 9 pages, LaTeX, 4 eps figures. Final version to appear in Mod. Phys.
Lett.
Introduction to Medical Genetics
Medical genetics is the key to modern biochemistry and underlying mechanisms of many diseases
Securing the internet of things infrastructure – standards and techniques
The Internet of Things (IoT) infrastructure is a conglomerate of electronic devices interconnected through the Internet, with the purpose of providing prompt and effective service to end-users. Applications running on an IoT infrastructure generally handle sensitive information such as a patient’s healthcare record, the position of a logistic vehicle, or the temperature readings obtained through wireless sensor nodes deployed in a bushland. The protection of such information from unlawful disclosure, tampering or modification, as well as the unscathed presence of IoT devices, in adversarial environments, is of prime concern. In this paper, a descriptive analysis of the security of standards and technologies for protecting the IoT communication channel from adversarial threats is provided. In addition, two paradigms for securing the IoT infrastructure, namely, common key based and paired key based, are proposed
Quality of life and thigh girth following anterior cruciate ligament reconstruction using hamstring autograft
Background: Arthroscopic anterior cruciate ligament reconstruction is commonly performed with intent to return earlier to normal activities, so graft selection becomes more important. The use of hamstring tendon autograft is supposed to have less postoperative morbidities. In this prospective study we assess the early post-operative complications.Methods: 25 patients were operated in Shadan Institute of Medical Sciences and Research Centre, Hyderabad, India, by the same surgeon and were assessed preoperatively, and 3 and 6 months after surgery. The hamstring and quadriceps strength were measured with PRIMUS RS machine. The patients were also assessed for their subjective complaints using International Knee Documentation Committee (IKDC) knee scoring system.Results: The peak power of flexion and extension of the knee joint significantly improved following the surgery which is essential for any athletic activities. Quadriceps and hamstring strengths were restored to 90%, which suggests that the grafting has been successful in restoring isometric strength. This is necessary to return to sporting activities. Power of hamstrings and quadriceps significantly improved following surgery. Quadriceps and hamstring endurance recovered and improved at the end of 6 months following surgery. Using IKDC scoring, nearly normal were 14, normal were 10 and abnormal 1. 3 patients (12%) presented with anterior knee pain. Sensory loss was noted in 6 patients (24%) at the end of 6 months following surgery. Swelling was noted in 5 patients (25%).Conclusions: Most morbidities are temporary in nature and do not significantly affect the patient’s activities
Monopole Percolation in the Compact Abelian Higgs Model
We have studied the monopole-percolation phenomenon in the four dimensional
Abelian theory that contains compact U(1) gauge fields coupled to unitary norm
Higgs fields. We have determined the location of the percolation transition
line in the plane . This line overlaps the confined-Coulomb
and the confined-Higgs phase transition lines, originated by a
monopole-condensation mechanism, but continues away from the end-point where
this phase transition line stops. In addition, we have determined the critical
exponents of the monopole percolation transition away from the phase transition
lines. We have performed the finite size scaling in terms of the monopole
density instead of the coupling, because the density seems to be the natural
parameter when dealing with percolation phenomena.Comment: 13 pages. REVTeX. 16 figs. included using eps
- …