375 research outputs found

    A Multi-User, Single-Authentication Protocol for Smart Grid Architectures

    Get PDF
    open access articleIn a smart grid system, the utility server collects data from various smart grid devices. These data play an important role in the energy distribution and balancing between the energy providers and energy consumers. However, these data are prone to tampering attacks by an attacker, while traversing from the smart grid devices to the utility servers, which may result in energy disruption or imbalance. Thus, an authentication is mandatory to efficiently authenticate the devices and the utility servers and avoid tampering attacks. To this end, a group authentication algorithm is proposed for preserving demand–response security in a smart grid. The proposed mechanism also provides a fine-grained access control feature where the utility server can only access a limited number of smart grid devices. The initial authentication between the utility server and smart grid device in a group involves a single public key operation, while the subsequent authentications with the same device or other devices in the same group do not need a public key operation. This reduces the overall computation and communication overheads and takes less time to successfully establish a secret session key, which is used to exchange sensitive information over an unsecured wireless channel. The resilience of the proposed algorithm is tested against various attacks using formal and informal security analysis

    Data Confidentiality in Mobile Ad hoc Networks

    Full text link
    Mobile ad hoc networks (MANETs) are self-configuring infrastructure-less networks comprised of mobile nodes that communicate over wireless links without any central control on a peer-to-peer basis. These individual nodes act as routers to forward both their own data and also their neighbours' data by sending and receiving packets to and from other nodes in the network. The relatively easy configuration and the quick deployment make ad hoc networks suitable the emergency situations (such as human or natural disasters) and for military units in enemy territory. Securing data dissemination between these nodes in such networks, however, is a very challenging task. Exposing such information to anyone else other than the intended nodes could cause a privacy and confidentiality breach, particularly in military scenarios. In this paper we present a novel framework to enhance the privacy and data confidentiality in mobile ad hoc networks by attaching the originator policies to the messages as they are sent between nodes. We evaluate our framework using the Network Simulator (NS-2) to check whether the privacy and confidentiality of the originator are met. For this we implemented the Policy Enforcement Points (PEPs), as NS-2 agents that manage and enforce the policies attached to packets at every node in the MANET.Comment: 12 page

    Secure Communication Architecture for Dynamic Energy Management in Smart Grid

    Get PDF
    open access articleSmart grid takes advantage of communication technologies for efficient energy management and utilization. It entails sacrifice from consumers in terms of reducing load during peak hours by using a dynamic energy pricing model. To enable an active participation of consumers in load management, the concept of home energy gateway (HEG) has recently been proposed in the literature. However, the HEG concept is rather new, and the literature still lacks to address challenges related to data representation, seamless discovery, interoperability, security, and privacy. This paper presents the design of a communication framework that effectively copes with the interoperability and integration challenges between devices from different manufacturers. The proposed communication framework offers seamless auto-discovery and zero- con figuration-based networking between heterogeneous devices at consumer sites. It uses elliptic-curve-based security mechanism for protecting consumers' privacy and providing the best possible shield against different types of cyberattacks. Experiments in real networking environment validated that the proposed communication framework is lightweight, secure, portable with low-bandwidth requirement, and flexible to be adopted for dynamic energy management in smart grid

    Microbiological Examination of some ImportedCanned and Frozen Foods

    Get PDF
    A number of juices, jams, canned foods and frozen fishes available in local markets were inspected with respect to microbial contamination. We have determined the total viable bacterial cell counts in these samples and the number of g(-) lactose fermentors as a bacterial indicator of food spoilage. The results indicated that most of the food items inspected, were contaminated with large numbers of different species of g(-) ,g(+), yeast and fungi and some were contained more than the maximum permissible number of pathogenic g(-) enteric E-coli, which render these food items unsafe for human consumption

    Investigation of Factors Influencing the Efficiency of railways in Terms of safety at Level Crossings

    Get PDF
    ABSTRACT Road traffic accidents are in the top ten of all deaths worldwide. Regarding railways, in the EU there is one person killed or seriously injured every day in serious accidents involving level crossings (LCs). The number of accidents is almost unchanged in the last ten years despite the huge efforts that railways have made. There is a need to look at the factors that contributed to the occurrence of accidents at LCs beyond the drivers and pedestrian behavior or technical issues. The reported research investigates the efficiency of railways in terms of accident risk at LCs in 24 countries of the EU. It evaluates the efficiency of railways by applying the Data Envelopment Analysis (DEA) method and identifying the factors that influence the efficiency score of railways in terms of accident risk using the IBM SPSS. The results show that GDP per capita and density of population in the selected countries have a strong influence on the efficiency of railways. The expected outcome of this research may contribute to better understanding of the factors that influence the efficiency score of railways in term of accident risk at LCs and develop preventative measures. Keywords: level crossings, accidents, efficiency score and influencing factor

    Resource Efficient Authentication and Session Key Establishment Procedure for Low-Resource IoT Devices

    Get PDF
    open access journalThe Internet of Things (IoT) can includes many resource-constrained devices, with most usually needing to securely communicate with their network managers, which are more resource-rich devices in the IoT network. We propose a resource-efficient security scheme that includes authentication of devices with their network managers, authentication between devices on different networks, and an attack-resilient key establishment procedure. Using automated validation with internet security protocols and applications tool-set, we analyse several attack scenarios to determine the security soundness of the proposed solution, and then we evaluate its performance analytically and experimentally. The performance analysis shows that the proposed solution occupies little memory and consumes low energy during the authentication and key generation processes respectively. Moreover, it protects the network from well-known attacks (man-in-the-middle attacks, replay attacks, impersonation attacks, key compromission attacks and denial of service attacks)

    Quantifying materials waste in the Egyptian construction industry: a critical analysis of rates and factors

    Get PDF
    Abstract: Construction and demolition waste (CDW) is a critical challenge facing the construction industry. It leads to deterioration of the triple bottom line of sustainability. Unfortunately, the CDW management research in Egypt lacks studies investigating (1) the variations in CDW generation (CDWG) among different types of construction projects, and (2) the factors affecting CDW reduction (CDWR). Based on a benchmarking approach, this research (1) quantifies CDW in terms of generation rates and costs among different construction project types in Egypt, and (2) investigates the relationship between CDWG and different adopted CDWR factors. Using structured interviews, a comparative case study was conducted to investigate industrial, residential, commercial, and infrastructure projects. Analysis of results demonstrated that CDWG rates and costs differ from one project type to another due to the project's nature, size, and complexity on the one hand, and the applied CDWR factors such as waste-efficient practices, awareness, culture & behaviour, and legislation on the other hand. On average among the four project types, it was found that "timber", "sand", and "bricks/blocks" are the most wasteful materials. It was also found that "practices" and "legislation" are the least applied CDWR factors on average among the four project types, which need to be better applied for better CDWR results

    A Fuzzy-Logic Approach to Dynamic Bayesian Severity Level Classification of Driver Distraction Using Image Recognition

    Get PDF
    open access articleDetecting and classifying driver distractions is crucial in the prevention of road accidents. These distractions impact both driver behavior and vehicle dynamics. Knowing the degree of driver distraction can aid in accident prevention techniques, including transitioning of control to a level 4 semi- autonomous vehicle, when a high distraction severity level is reached. Thus, enhancement of Advanced Driving Assistance Systems (ADAS) is a critical component in the safety of vehicle drivers and other road users. In this paper, a new methodology is introduced, using an expert knowledge rule system to predict the severity of distraction in a contiguous set of video frames using the Naturalistic Driving American University of Cairo (AUC) Distraction Dataset. A multi-class distraction system comprises the face orientation, drivers’ activities, hands and previous driver distraction, a severity classification model is developed as a discrete dynamic Bayesian (DDB). Furthermore, a Mamdani-based fuzzy system was implemented to detect multi- class of distractions into a severity level of safe, careless or dangerous driving. Thus, if a high level of severity is reached the semi-autonomous vehicle will take control. The result further shows that some instances of driver’s distraction may quickly transition from a careless to dangerous driving in a multi-class distraction context
    • …
    corecore