560 research outputs found
Recommended from our members
Side channel attacks on smart home systems: A short overview
This paper provides an overview on side-channel attacks with emphasis on vulnerabilities in the smart home. Smart homes are enabled by the latest developments in sensors, communication technologies, internet protocols, and cloud services. The goal of a smart home is to have smart household devices collaborate without involvement of residents to deliver the variety of services needed for a higher quality of life. However, security and privacy challenges of smart homes have to be overcome in order to fully realize the smart home. Side channel attacks assume data is always leaking, and leakage of data from a smart home reveals sensitive information. This paper starts by reviewing side-channel attack categories, then it gives an overview on recent attack studies on different layers of a smart home and their malicious goals
Recommended from our members
A probability based hybrid energy-efficient privacy preserving scheme to encounter with wireless traffic snooping in smart home
Application of pervasive computing devices in smart homes are rising sharply and due to this matter, demands for efficient privacy protection are increasing urgently. Possibility of interference in wireless networks is proved by previous work. Adversaries can discover contextual information because of traffic monitoring and classifying transmitters based on their radio fingerprints while data packets are encrypted or content is not important for attackers. To conceal communication patterns various approaches have been investigated. They are mainly based on injection of dummy packets into the network traffic and adding delay to transmission time. In this paper, we introduce a hybrid energy-efficient privacy preserving scheme for generating and sending dummy packets through a decision-making algorithm which works based on probability to maximize confusion of attacker in clarifying the real pattern of network traffi
Blowtooth: a provocative pervasive game for smuggling virtual drugs through real airport security
In this paper we describe a pervasive game, Blowtooth, in which players use their mobile phones to hide virtual drugs on nearby airline passengers in real airport check-in queues. After passing through airport security, the player must find and recover their drugs from the innocent bystanders, without them ever realizing they were involved in the game. The game explores the nature of pervasive game playing in environments that are not, generally, regarded as playful or “fun”. This paper describes the game’s design and implementation as well as an evaluation conducted with participants in real airports. It explores the players’ reactions to the game through questionnaire responses and in-game activity. The technologies used in Blowtooth are, intentionally, simple in order for the enjoyment of the game to be reliant more on the physical environment rather than the enabling technologies. We conclude that situating pervasive games in unexpected and challenging environments, such as international airports, may provide interesting and unique gaming experiences for players. In addition, we argue that pervasive games benefit most from using the specific features and nature of interesting real-world environments rather than focusing on the enabling technologies
Recommended from our members
Magnetic Table Interface and Magnetic Foods
This poster paper discuss the concept of magnetic table interface and magnetic foods. This interface introduces new human-food interactions such as modifying weight, levitation, movement, and dynamic textures for our daily used food and utensils using a strong magnetic field formed by an array of Bitter electromagnets. To make foods and cutleries interactive, we add edible magnetic material on the food such as iron and iron oxides, and make cutleries with magnetic materials. We expect that this system will alter our food consumption behaviours and make the whole experience much more interactive and enjoyable
Recommended from our members
Magnetic table for levitating food for entertainment
In this paper, we discuss our work towards a new dining platform that uses magnetic levitating food and magnetic utensils in an initial prototype device. The ultimate goal of the project is a complete table with dynamic levitating food, but the current implementation is a set of levitating magnets that can be encased in food hovering over static locations. We investigated different weights and shapes of 3-D printed objects to mimic food and found that the levitating magnets are strong enough to support lightweight food. This magnetic levitating table can produce a playful and entertaining dining experience by moving and rotating to stay in place. The key novelties of this paper are the integration of food with a magnetic levitating table for playful interactions and novel dining experiences
A knowledge-based design advisory system for collaborative design for micromanufacturing
The manufacture of microproducts differs from that of conventional products in many ways, not only in the sizes, but also in issues concerning the effects of material properties, tools, and manufacturing equipment. There was a need for a new design methodology and associated design tools to aid designers in assessing the design of their microproducts by considering new micromanufacturing capabilities and constraints. A knowledge-based design advisory system (DAS) was, therefore, developed in MASMICRO in which the knowledge-based system with dedicated assessment modules and knowledge representatives based on the ontology was created to implement the distributed design and manufacturing assessment for micromanufacturing. The modules address the assessment on geometrical features relating to manufacturability, manufacturing processes, selection of materials, tools, and machines, as well as manufacturing cost. The Microsoft C# programming language, ASP.NET web technology, Prolog, and Microsoft Access database were used to develop the DAS. The test on the DAS prototype system was found to provide an increase of design efficiency due to more efficient use of design and manufacturing knowledge and afforded a web-based collaborative design environment
Recommended from our members
Confucius computer: a philosophical digital agent for intergenerational philosophical play
Confucianism is commonly defined as “... a system of philosophical, ethical and political thought based on the teachings of Confucius,” which originated through the teachings of Confucius during the sixth-century BCE. It is a way of life or a philosophy of human nature that considers human relationships as the foundation of the society. Confucius teachings had highly influenced the development of several cultures in Asia, making Confucianism an intangible cultural heritage. In this paper, we are re-acquainting users with an intangible heritage that is part of their everyday, by developing a system that permits experiencing Confucius teachings virtually and interactively. The system can measure philosophical intent of the human and generate meaningful philosophical answers. It is also aimed for intergenerational sharing of Confucius heritage through a simple interactive process with the virtual sage making the experience enjoyable and entertaining. Previous research in natural language processing (NLP) mainly focused on the understanding and delivering of human natural language accurately. In this research, we explored how to apply NLP to model the knowledge and teachings of Confucius, through the natural conversation between human and computer. This virtual Confucius, a chat agent that generates outputs based on Confucius teachings, using a series of algorithms and techniques to improve the matching accuracy between user input and computer output, introduces a novel way of interacting with intangible cultures. Our user evaluation results revealed that there is a positive correlation between relevance and enjoyment, finding their experiences interacting with virtual Confucius very encouraging. Adults who participated in experiencing the virtual Confucius together with their children believed that this system has the potential to improve intergenerational interactions through shared play
The degradation of p53 and its major E3 ligase Mdm2 is differentially dependent on the proteasomal ubiquitin receptor S5a.
p53 and its major E3 ligase Mdm2 are both ubiquitinated and targeted to the proteasome for degradation. Despite the importance of this in regulating the p53 pathway, little is known about the mechanisms of proteasomal recognition of ubiquitinated p53 and Mdm2. In this study, we show that knockdown of the proteasomal ubiquitin receptor S5a/PSMD4/Rpn10 inhibits p53 protein degradation and results in the accumulation of ubiquitinated p53. Overexpression of a dominant-negative deletion of S5a lacking its ubiquitin-interacting motifs (UIM)s, but which can be incorporated into the proteasome, also causes the stabilization of p53. Furthermore, small-interferring RNA (siRNA) rescue experiments confirm that the UIMs of S5a are required for the maintenance of low p53 levels. These observations indicate that S5a participates in the recognition of ubiquitinated p53 by the proteasome. In contrast, targeting S5a has no effect on the rate of degradation of Mdm2, indicating that proteasomal recognition of Mdm2 can be mediated by an S5a-independent pathway. S5a knockdown results in an increase in the transcriptional activity of p53. The selective stabilization of p53 and not Mdm2 provides a mechanism for p53 activation. Depletion of S5a causes a p53-dependent decrease in cell proliferation, demonstrating that p53 can have a dominant role in the response to targeting S5a. This study provides evidence for alternative pathways of proteasomal recognition of p53 and Mdm2. Differences in recognition by the proteasome could provide a means to modulate the relative stability of p53 and Mdm2 in response to cellular signals. In addition, they could be exploited for p53-activating therapies. This work shows that the degradation of proteins by the proteasome can be selectively dependent on S5a in human cells, and that this selectivity can extend to an E3 ubiquitin ligase and its substrate
DNA resection in eukaryotes: deciding how to fix the break
DNA double-strand breaks are repaired by different mechanisms, including homologous
recombination and nonhomologous end-joining. DNA-end resection, the first step in
recombination, is a key step that contributes to the choice of DSB repair. Resection, an
evolutionarily conserved process that generates single-stranded DNA, is linked to checkpoint
activation and is critical for survival. Failure to regulate and execute this process results in
defective recombination and can contribute to human disease. Here, I review recent findings on
the mechanisms of resection in eukaryotes, from yeast to vertebrates, provide insights into the
regulatory strategies that control it, and highlight the consequences of both its impairment and its
deregulation
- …
