156 research outputs found

    Quasi-stationary States of Two-Dimensional Electron Plasma Trapped in Magnetic Field

    Full text link
    We have performed numerical simulations on a pure electron plasma system under a strong magnetic field, in order to examine quasi-stationary states that the system eventually evolves into. We use ring states as the initial states, changing the width, and find that the system evolves into a vortex crystal state from a thinner-ring state while a state with a single-peaked density distribution is obtained from a thicker-ring initial state. For those quasi-stationary states, density distribution and macroscopic observables are defined on the basis of a coarse-grained density field. We compare our results with experiments and some statistical theories, which include the Gibbs-Boltzmann statistics, Tsallis statistics, the fluid entropy theory, and the minimum enstrophy state. From some of those initial states, we obtain the quasi-stationary states which are close to the minimum enstrophy state, but we also find that the quasi-stationary states depend upon initial states, even if the initial states have the same energy and angular momentum, which means the ergodicity does not hold.Comment: 9 pages, 7 figure

    Security and Privacy Issues in Wireless Mesh Networks: A Survey

    Full text link
    This book chapter identifies various security threats in wireless mesh network (WMN). Keeping in mind the critical requirement of security and user privacy in WMNs, this chapter provides a comprehensive overview of various possible attacks on different layers of the communication protocol stack for WMNs and their corresponding defense mechanisms. First, it identifies the security vulnerabilities in the physical, link, network, transport, application layers. Furthermore, various possible attacks on the key management protocols, user authentication and access control protocols, and user privacy preservation protocols are presented. After enumerating various possible attacks, the chapter provides a detailed discussion on various existing security mechanisms and protocols to defend against and wherever possible prevent the possible attacks. Comparative analyses are also presented on the security schemes with regards to the cryptographic schemes used, key management strategies deployed, use of any trusted third party, computation and communication overhead involved etc. The chapter then presents a brief discussion on various trust management approaches for WMNs since trust and reputation-based schemes are increasingly becoming popular for enforcing security in wireless networks. A number of open problems in security and privacy issues for WMNs are subsequently discussed before the chapter is finally concluded.Comment: 62 pages, 12 figures, 6 tables. This chapter is an extension of the author's previous submission in arXiv submission: arXiv:1102.1226. There are some text overlaps with the previous submissio

    Challenges of Misbehavior Detection in Industrial Wireless Networks

    Get PDF
    In recent years, wireless technologies are increasingly adopted in many application domains that were either unconnected before or exclusively used cable networks. This paradigm shift towards - often ad-hoc - wireless communication has led to significant benefits in terms of flexibility and mobility. Alongside with these benefits, however, arise new attack vectors, which cannot be mitigated by traditional security measures. Hence, mechanisms that are orthogonal to cryptographic security techniques are necessary in order to detect adversaries. In traditional networks, such mechanisms are subsumed under the term "intrusion detection system" and many proposals have been implemented for different application domains. More recently, the term "misbehavior detection" has been coined to encompass detection mechanisms especially for attacks in wireless networks. In this paper, we use industrial wireless networks as an exemplary application domain to discuss new directions and future challenges in detecting insider attacks. To that end, we review existing work on intrusion detection in mobile ad-hoc networks. We focus on physical-layer-based detection mechanisms as these are a particularly interesting research direction that had not been reasonable before widespread use of wireless technology.Peer Reviewe

    Slow relaxation in the two dimensional electron plasma under the strong magnetic field

    Full text link
    We study slow relaxation processes in the point vortex model for the two-dimensional pure electron plasma under the strong magnetic field. By numerical simulations, it is shown that, from an initial state, the system undergoes the fast relaxation to a quasi-stationary state, and then goes through the slow relaxation to reach a final state. From analysis of simulation data, we find (i) the time scale of the slow relaxation increases linearly to the number of electrons if it is measured by the unit of the bulk rotation time, (ii) during the slow relaxation process, each electron undergoes an superdiffusive motion, and (iii) the superdiffusive motion can be regarded as the Levy flight, whose step size distribution is of the power law. The time scale that each electron diffuses over the system size turns out to be much shorter than that of the slow relaxation, which suggests that the correlation among the superdiffusive trajectories is important in the slow relaxation process.Comment: 11pages, 19 figures. Submitted to J. Phys. Soc. Jp

    Decreased Cerebrovascular Brain-Derived Neurotrophic Factorā€“Mediated Neuroprotection in the Diabetic Brain

    Get PDF
    Objective: Diabetes is an independent risk factor for stroke. However, the underlying mechanism of how diabetes confers that this risk is not fully understood. We hypothesize that secretion of neurotrophic factors by the cerebral endothelium, such as brain-derived neurotrophic factor (BDNF), is suppressed in diabetes. Consequently, such accrued neuroprotective deficits make neurons more vulnerable to injury. Research Design and Methods: We examined BDNF protein levels in a streptozotocin-induced rat model of diabetes by Western blotting and immunohistochemistry. Levels of total and secreted BDNF protein were quantified in human brain microvascular endothelial cells after exposure to advanced glycation end product (AGE)-BSA by enzyme-linked immunosorbent assay and immunocytochemistry. In media transfer experiments, the neuroprotective efficacy of conditioned media from normal healthy endothelial cells was compared with AGE-treated endothelial cells in an in vitro hypoxic injury model. Results: Cerebrovascular BDNF protein was reduced in the cortical endothelium in 6-month diabetic rats. Immunohistochemical analysis of 6-week diabetic brain sections showed that the reduction of BDNF occurs early after induction of diabetes. Treatment of brain microvascular endothelial cells with AGE caused a similar reduction in BDNF protein and secretion in an extracellular signalā€“related kinase-dependent manner. In media transfer experiments, conditioned media from AGE-treated endothelial cells were less neuroprotective against hypoxic injury because of a decrease in secreted BDNF. Conclusions: Taken together, our findings suggest that a progressive depletion of microvascular neuroprotection in diabetes elevates the risk of neuronal injury for a variety of central nervous system diseases, including stroke and neurodegeneration

    Disruptions of anaerobic gut bacteria are associated with stroke and post-stroke infection: a prospective case-control study

    Get PDF
    In recent years, preclinical studies have illustrated the potential role of intestinal bacterial composition in the risk of stroke and post-stroke infections. The results of these studies suggest that bacteria capable of producing volatile metabolites, including trimethylamine-N-oxide (TMAO) and butyrate, play opposing, yet important roles in the cascade of events leading to stroke. However, no large-scale studies have been undertaken to determine the abundance of these bacterial communities in stroke patients and to assess the impact of disrupted compositions of the intestinal microbiota on patient outcomes. In this prospective case-control study, rectal swabs from 349 ischemic and hemorrhagic stroke patients (median age, 71 years; IQR: 67-75) were collected within 24 h of hospital admission. Samples were subjected to 16S rRNA amplicon sequencing and subsequently compared with samples obtained from 51 outpatient age- and sex-matched controls (median age, 72 years; IQR, 62-80) with similar cardiovascular risk profiles but without active signs of stroke. Plasma protein biomarkers were analyzed using a combination of nuclear magnetic resonance (NMR) spectroscopy and liquid chromatography-mass spectrometry (LC-MS). Alpha and beta diversity analyses revealed higher disruption of intestinal communities during ischemic and hemorrhagic stroke compared with non-stroke matched control subjects. Additionally, we observed an enrichment of bacteria implicated in TMAO production and a loss of butyrate-producing bacteria. Stroke patients displayed two-fold lower plasma levels of TMAO than controls (median 1.97 vs 4.03 mu M, Wilcoxonp < 0.0001). Finally, lower abundance of butyrate-producing bacteria within 24 h of hospital admission was an independent predictor of enhanced risk of post-stroke infection (odds ratio 0.77,p = 0.005), but not of mortality or functional patient outcome. In conclusion, aberrations in trimethylamine- and butyrate-producing gut bacteria are associated with stroke and stroke-associated infections.Proteomic

    Lateral Spin Injection in Germanium Nanowires

    Full text link
    Electrical injection of spin-polarized electrons into a semiconductor, large spin diffusion length, and an integration friendly platform are desirable ingredients for spin-based devices. Here we demonstrate lateral spin injection and detection in germanium nanowires, by using ferromagnetic metal contacts and tunnel barriers for contact resistance engineering. Using data measured from over 80 samples, we map out the contact resistance window for which lateral spin transport is observed, manifestly showing the conductivity matching required for spin injection. Our analysis, based on the spin diffusion theory, indicates that the spin diffusion length is larger than 100 {\mu}m in germanium nanowires at 4.2 K

    Breaking and Fixing Anonymous Credentials for the Cloud

    Get PDF
    In an attribute-based credential (ABC) system, users obtain a digital certificate on their personal attributes, and can later prove possession of such a certificate in an unlinkable way, thereby selectively disclosing chosen attributes to the service provider. Recently, the concept of encrypted ABCs (EABCs) was introduced by Krenn et al. at CANS 2017, where virtually all computation is outsourced to a semi-trusted cloud-provider called wallet, thereby overcoming existing efficiency limitations on the userā€™s side, and for the first time enabling ā€œprivacy-preserving identity management as a serviceā€. While their approach is highly relevant for bringing ABCs into the real world, we present a simple attack allowing the wallet to learn a user\u27s attributes when colluding with another user -- a scenario which is not covered by their modeling but which needs to be considered in practice. We then revise the model and construction of Krenn et al. in various ways, such that the above attack is no longer possible. Furthermore, we also remove existing non-collusion assumptions between wallet and service provider or issuer from their construction. Our protocols are still highly efficient in the sense that the computational effort on the end user side consists of a single exponentiation only, and otherwise efficiency is comparable to the original work of Krenn et al
    • ā€¦
    corecore