830 research outputs found

    Near-Instantaneously Adaptive HSDPA-Style OFDM Versus MC-CDMA Transceivers for WIFI, WIMAX, and Next-Generation Cellular Systems

    No full text
    Burts-by-burst (BbB) adaptive high-speed downlink packet access (HSDPA) style multicarrier systems are reviewed, identifying their most critical design aspects. These systems exhibit numerous attractive features, rendering them eminently eligible for employment in next-generation wireless systems. It is argued that BbB-adaptive or symbol-by-symbol adaptive orthogonal frequency division multiplex (OFDM) modems counteract the near instantaneous channel quality variations and hence attain an increased throughput or robustness in comparison to their fixed-mode counterparts. Although they act quite differently, various diversity techniques, such as Rake receivers and space-time block coding (STBC) are also capable of mitigating the channel quality variations in their effort to reduce the bit error ratio (BER), provided that the individual antenna elements experience independent fading. By contrast, in the presence of correlated fading imposed by shadowing or time-variant multiuser interference, the benefits of space-time coding erode and it is unrealistic to expect that a fixed-mode space-time coded system remains capable of maintaining a near-constant BER

    Authentication Scheme for Flexible Charging and Discharging of Mobile Vehicles in the V2G Networks

    Get PDF
    Navigating security and privacy challenges is one of the crucial requirements in the vehicle-to-grid (V2G) network. Since electric vehicles (EVs) need to provide their private information to aggregators/servers when charging/discharging at different charging stations, privacy of the vehicle owners can be compromised if the information is misused, traced, or revealed. In a wide V2G network, where vehicles can move outside of their home network to visiting networks, security and privacy become even more challenging due to untrusted entities in the visiting networks. Although some privacy-preserving solutions were proposed in the literature to tackle this problem, they do not protect against well-known security attacks and generate a huge overhead. Therefore, we propose a mutual authentication scheme to preserve privacy of the EV's information from aggregators/servers in the home as well as distributed visiting V2G networks. Our scheme, based on a bilinear pairing technique with an accumulator performing batch verification, yields higher system efficiency, defeats various security attacks, and maintains untraceability, forward privacy, and identity anonymity. A performance analysis shows that our scheme, in comparison with the existing solutions, significantly generates lower communication and computation overheads in the home and centralized V2G networks, and comparable overheads in the distributed visiting V2G networks

    Integrated Distributed Authentication Protocol for Smart Grid Communications

    Get PDF
    In the smart grid, an integrated distributed authen- tication protocol is needed to not only securely manage the system but also efficiently authenticate many different entities for the communications. In addition, a lightweight authentication protocol is required to handle frequent authentications among billions of devices. Unfortunately, in the literature, there is no such integrated protocol that provides mutual authentication among the home environment, energy provider, gateways, and advanced metering infrastructure network. Therefore, in this paper, we propose a lightweight cloud-trusted authorities-based integrated (centrally controlled) distributed authentication protocol that provides mutual authentications among communicated entities in a distributed manner. Based on certificateless cryptosystem, our protocol is lightweight and efficient even when there are invalid requests in a batch. Security and performance analysis show that the protocol provides privacy preservation, forward secrecy, semantic security,perfect key ambiguous, and protection against identity thefts while generating lower overheads in comparison with the existing protocols. Also, the protocol is secure against man-in-the-middle attacks, redirection attacks, impersonation attacks, and denial-of-service attacks. Moreover, our protocol provides a complete resistance against flood-based denial-of-service attacks

    Comment on "Ising model on a small world network"

    Full text link
    In the recent study of the Ising model on a small-world network by A. P\c{e}kalski [Phys. Rev. E {\bf 64}, 057104 (2001)], a surprisingly small value of the critical exponent β0.0001\beta \approx 0.0001 has been obtained for the temperature dependence of the magnetization. We perform extensive Monte Carlo simulations of the same model and conclude, via the standard finite-size scaling of various quantities,that the phase transition in the model is of the mean-field nature, in contrast to the work by A. P\c{e}kalski but in accord with other existing studies.Comment: to be published in PR

    Securing Restricted Publisher-Subscriber Communications in Smart Grid Substations

    Get PDF
    Smart Grid applications require accurate and correct data transmission from publisher to subscribers with critical communication latency requirements. Since the smart grid is being supported by distributed communication networks, deployed using various wired and wireless technologies, including IP-based networks, securing the communication infrastructure is both critically important and challenging. In this paper, we propose a secure and efficient data delivery scheme, based on a restricted yet dynamic publisher-subscriber architecture, for the published messages from a publisher to the subscribers distributed in the smart grid network. The scheme ensures that the published message is delivered from an authentic publisher to only those authorized subscribers by verifying publisher's signature and access structure of all subscribers. Operation overheads are reduced by performing only one encryption and decryption or hashing per subscriber location using a proxy node as a remote terminal unit. Our analysis shows that the scheme is resistant against replay, man-in-the-middle, and impersonation attacks. Performance evaluation shows that the scheme can support 600 subscribers given the communication latency requirement of 3 ms. We provide the performance of the scheme under different scenarios, and observe that the efficiency of our scheme increases as the ratio of the geographical locations within a substation to the number of subscribers increases

    Authentication and Authorization Scheme for Various User-Roles and Devices in Smart Grid

    Get PDF
    The smart grid, as the next generation of the power grid, is characterized by employing many different types of intelligent devices, such as intelligent electronic devices located at substations, smart meters positioned in the home area network, and outdoor field equipment deployed in the fields. Also, there are various users in the smart grid network, including customers, operators, maintenance personnel, and etc., who use these devices for various purposes. Therefore, a secure and efficient mutual authentication and authorization scheme is needed in the smart grid to prevent various insider and outsider attacks on many different devices. In this paper, we propose an authentication and authorization scheme for mitigating outsider and insider threats in the smart grid by verifying the user authorization and performing the user authentication together whenever a user accesses the devices. The proposed scheme computes each user-role dynamically using an attribute-based access control and verifies the identity of user together with the device. Security and performance analysis show that the proposed scheme resists various insider as well as outsider attacks, and is more efficient in terms of communication and computation costs in comparison with the existing schemes. The correctness of the proposed scheme is also proved using BAN-Logic and Proverif

    Topological quantization and degeneracy in Josephson-junction arrays

    Full text link
    We consider the conductivity quantization in two-dimensional arrays of mesoscopic Josephson junctions, and examine the associated degeneracy in various regimes of the system. The filling factor of the system may be controlled by the gate voltage as well as the magnetic field, and its appropriate values for quantization is obtained by employing the Jain hierarchy scheme both in the charge description and in the vortex description. The duality between the two descriptions then suggests the possibility that the system undergoes a change in degeneracy while the quantized conductivity remains fixed.Comment: To appear in Phys. Rev.

    Lattice effects on the current-voltage characteristics of superconducting arrays

    Full text link
    The lattice effects on the current-voltage characteristics of two-dimensional arrays of resistively shunted Josephson junctions are investigated. The lattice potential energies due to the discrete lattice structure are calculated for several geometries and directions of current injection. We compare the energy barrier for vortex-pair unbinding with the lattice pinning potential, which shows that lattice effects are negligible in the low-current limit as well as in the high-current limit. At intermediate currents, on the other hand, the lattice potential becomes comparable to the barrier height and the lattice effects may be observed in the current-voltage characteristics.Comment: 5 pages including 5 figures in two columns, to appear in Phys. Rev.

    Quantum phase transitions in superconducting arrays under external magnetic fields

    Full text link
    We study the zero-temperature phase transitions of two-dimensional superconducting arrays with both the self- and the junction capacitances in the presence of external magnetic fields. We consider two kinds of excitations from the Mott insulating phase: charge-dipole excitations and single-charge excitations, and apply the second-order perturbation theory to find their energies. The resulting phase boundaries are found to depend strongly on the magnetic frustration, which measures the commensurate-incommensurate effects. Comparison of the obtained values with those in recent experiment suggests the possibility that the superconductor-insulator transition observed in experiment may not be of the Berezinskii-Kosterlitz-Thouless type. The system is also transformed to a classical three-dimensional XY model with the magnetic field in the time-direction; this allows the analogy to bulk superconductors, revealing the nature of the phase transitions.Comment: 9 pages including 7 figures, to appear in Phys. Rev.

    Helicobacter pylori-derived extracellular vesicles increased in the gastric juices of gastric adenocarcinoma patients and induced inflammation mainly via specific targeting of gastric epithelial cells

    Get PDF
    Evidence indicates that Helicobacter pylori is the causative agent of chronic gastritis and perhaps gastric malignancy. Extracellular vesicles (EVs) play an important role in the evolutional process of malignancy due to their genetic material cargo. We aimed to evaluate the clinical significance and biological mechanism of H. pylori EVs on the pathogenesis of gastric malignancy. We performed 16S rDNA-based metagenomic analysis of gastric juices either from endoscopic or surgical patients. From each sample of gastric juices, the bacteria and EVs were isolated. We evaluated the role of H. pylori EVs on the development of gastric inflammation in vitro and in vivo. IVIS spectrum and confocal microscopy were used to examine the distribution of EVs. The metagenomic analyses of the bacteria and EVs showed that Helicobacter and Streptococcus are the two major bacterial genera, and they were significantly increased in abundance in gastric cancer (GC) patients. H. pylori EVs are spherical and contain CagA and VacA. They can induce the production of tumor necrosis factor-��, interleukin (IL)-6 and IL-1�� by macrophages, and IL-8 by gastric epithelial cells. Also, EVs induce the expression of interferon gamma, IL-17 and EV-specific immunoglobulin Gs in vivo in mice. EVs were shown to infiltrate and remain in the mouse stomach for an extended time. H. pylori EVs, which are abundant in the gastric juices of GC patients, can induce inflammation and possibly cancer in the stomach, mainly via the production of inflammatory mediators from gastric epithelial cells after selective uptake by the cells. ? 2017 KSBMB. All rights reserved.115Ysciescopuskc
    corecore