23 research outputs found

    Energy Prediction Based Intrusion Detection In Wireless Sensor Networks

    Get PDF
    A challenge in designing wireless sensor networks is to maximize the lifetime of the network with respect to limited resources and energy. These limitations make the network particularly vulnerable to attacks from adversaries. Denial of Service (DOS) is considered a severely damaging attack in monitoring applications when intruders attack the network and force it to lose its power and die early. There are intrusion detection approaches, but they require communications and calculations which waste the network’s limited resources. In this paper, we propose a new intrusion detection model that is suitable for defending against DOS attacks. We use the idea of energy prediction to anticipate the energy consumption of the network in order to detect intruders based on the each individual node’s excessive usage of power. Our approach does not require a lot of communications or calculations between the nodes and the cluster head. It is energy efficient and accurate in detecting intruders. Simulations show that our energy aware intrusion detection approach can effectively detect intruders based on energy consumption rate

    Energy Prediction Based Intrusion Detection In Wireless Sensor Networks

    Get PDF
    A challenge in designing wireless sensor networks is to maximize the lifetime of the network with respect to limited resources and energy. These limitations make the network particularly vulnerable to attacks from adversaries. Denial of Service (DOS) is considered a severely damaging attack in monitoring applications when intruders attack the network and force it to lose its power and die early. There are intrusion detection approaches, but they require communications and calculations which waste the network’s limited resources. In this paper, we propose a new intrusion detection model that is suitable for defending against DOS attacks. We use the idea of energy prediction to anticipate the energy consumption of the network in order to detect intruders based on the each individual node’s excessive usage of power. Our approach does not require a lot of communications or calculations between the nodes and the cluster head. It is energy efficient and accurate in detecting intruders. Simulations show that our energy aware intrusion detection approach can effectively detect intruders based on energy consumption rate

    CMAPS: A Chess-Based Multi-Facet Password Scheme for Mobile Devices

    Get PDF
    It has long been recognized, by both security researchers and human-computer interaction researchers, that no silver bullet for authentication exists to achieve security, usability, and memorability. Aiming to achieve the goals, we propose a Multi-fAcet Password Scheme (MAPS) for mobile authentication. MAPS fuses information from multiple facets to form a password, allowing MAPS to enlarge the password space and improve memorability by reducing memory interference, which impairs memory performance according to psychology interference theory. The information fusion in MAPS can increase usability, as fewer input gestures are required for passwords of the same security strength. Based on the idea of MAPS, we implement a Chess-based MAPS (CMAPS) for Android systems. Only two and six gestures are required for CMAPS to generate passwords with better security strength than 4-digit PINs and 8-character alphanumeric passwords, respectively. Our user studies show that CMAPS can achieve high recall rates while exceeding the security strength of standard 8-character alphanumeric passwords used for secure applications

    CMAPS: A Chess-Based Multi-Facet Password Scheme for Mobile Devices

    Get PDF
    It has long been recognized, by both security researchers and human-computer interaction researchers, that no silver bullet for authentication exists to achieve security, usability, and memorability. Aiming to achieve the goals, we propose a Multi-fAcet Password Scheme (MAPS) for mobile authentication. MAPS fuses information from multiple facets to form a password, allowing MAPS to enlarge the password space and improve memorability by reducing memory interference, which impairs memory performance according to psychology interference theory. The information fusion in MAPS can increase usability, as fewer input gestures are required for passwords of the same security strength. Based on the idea of MAPS, we implement a Chess-based MAPS (CMAPS) for Android systems. Only two and six gestures are required for CMAPS to generate passwords with better security strength than 4-digit PINs and 8-character alphanumeric passwords, respectively. Our user studies show that CMAPS can achieve high recall rates while exceeding the security strength of standard 8-character alphanumeric passwords used for secure applications

    Circulating microRNAs in sera correlate with soluble biomarkers of immune activation but do not predict mortality in ART treated individuals with HIV-1 infection: A case control study

    Get PDF
    Introduction: The use of anti-retroviral therapy (ART) has dramatically reduced HIV-1 associated morbidity and mortality. However, HIV-1 infected individuals have increased rates of morbidity and mortality compared to the non-HIV-1 infected population and this appears to be related to end-organ diseases collectively referred to as Serious Non-AIDS Events (SNAEs). Circulating miRNAs are reported as promising biomarkers for a number of human disease conditions including those that constitute SNAEs. Our study sought to investigate the potential of selected miRNAs in predicting mortality in HIV-1 infected ART treated individuals. Materials and Methods: A set of miRNAs was chosen based on published associations with human disease conditions that constitute SNAEs. This case: control study compared 126 cases (individuals who died whilst on therapy), and 247 matched controls (individuals who remained alive). Cases and controls were ART treated participants of two pivotal HIV-1 trials. The relative abundance of each miRNA in serum was measured, by RTqPCR. Associations with mortality (all-cause, cardiovascular and malignancy) were assessed by logistic regression analysis. Correlations between miRNAs and CD4+ T cell count, hs-CRP, IL-6 and D-dimer were also assessed. Results: None of the selected miRNAs was associated with all-cause, cardiovascular or malignancy mortality. The levels of three miRNAs (miRs -21, -122 and -200a) correlated with IL-6 while miR-21 also correlated with D-dimer. Additionally, the abundance of miRs -31, -150 and -223, correlated with baseline CD4+ T cell count while the same three miRNAs plus miR- 145 correlated with nadir CD4+ T cell count. Discussion: No associations with mortality were found with any circulating miRNA studied. These results cast doubt onto the effectiveness of circulating miRNA as early predictors of mortality or the major underlying diseases that contribute to mortality in participants treated for HIV-1 infection

    Development and Validation of a Risk Score for Chronic Kidney Disease in HIV Infection Using Prospective Cohort Data from the D:A:D Study

    Get PDF
    Ristola M. on työryhmien DAD Study Grp ; Royal Free Hosp Clin Cohort ; INSIGHT Study Grp ; SMART Study Grp ; ESPRIT Study Grp jäsen.Background Chronic kidney disease (CKD) is a major health issue for HIV-positive individuals, associated with increased morbidity and mortality. Development and implementation of a risk score model for CKD would allow comparison of the risks and benefits of adding potentially nephrotoxic antiretrovirals to a treatment regimen and would identify those at greatest risk of CKD. The aims of this study were to develop a simple, externally validated, and widely applicable long-term risk score model for CKD in HIV-positive individuals that can guide decision making in clinical practice. Methods and Findings A total of 17,954 HIV-positive individuals from the Data Collection on Adverse Events of Anti-HIV Drugs (D:A:D) study with >= 3 estimated glomerular filtration rate (eGFR) values after 1 January 2004 were included. Baseline was defined as the first eGFR > 60 ml/min/1.73 m2 after 1 January 2004; individuals with exposure to tenofovir, atazanavir, atazanavir/ritonavir, lopinavir/ritonavir, other boosted protease inhibitors before baseline were excluded. CKD was defined as confirmed (>3 mo apart) eGFR In the D:A:D study, 641 individuals developed CKD during 103,185 person-years of follow-up (PYFU; incidence 6.2/1,000 PYFU, 95% CI 5.7-6.7; median follow-up 6.1 y, range 0.3-9.1 y). Older age, intravenous drug use, hepatitis C coinfection, lower baseline eGFR, female gender, lower CD4 count nadir, hypertension, diabetes, and cardiovascular disease (CVD) predicted CKD. The adjusted incidence rate ratios of these nine categorical variables were scaled and summed to create the risk score. The median risk score at baseline was -2 (interquartile range -4 to 2). There was a 1: 393 chance of developing CKD in the next 5 y in the low risk group (risk score = 5, 505 events), respectively. Number needed to harm (NNTH) at 5 y when starting unboosted atazanavir or lopinavir/ritonavir among those with a low risk score was 1,702 (95% CI 1,166-3,367); NNTH was 202 (95% CI 159-278) and 21 (95% CI 19-23), respectively, for those with a medium and high risk score. NNTH was 739 (95% CI 506-1462), 88 (95% CI 69-121), and 9 (95% CI 8-10) for those with a low, medium, and high risk score, respectively, starting tenofovir, atazanavir/ritonavir, or another boosted protease inhibitor. The Royal Free Hospital Clinic Cohort included 2,548 individuals, of whom 94 individuals developed CKD (3.7%) during 18,376 PYFU (median follow-up 7.4 y, range 0.3-12.7 y). Of 2,013 individuals included from the SMART/ESPRIT control arms, 32 individuals developed CKD (1.6%) during 8,452 PYFU (median follow-up 4.1 y, range 0.6-8.1 y). External validation showed that the risk score predicted well in these cohorts. Limitations of this study included limited data on race and no information on proteinuria. Conclusions Both traditional and HIV-related risk factors were predictive of CKD. These factors were used to develop a risk score for CKD in HIV infection, externally validated, that has direct clinical relevance for patients and clinicians to weigh the benefits of certain antiretrovirals against the risk of CKD and to identify those at greatest risk of CKD.Peer reviewe

    Securing location privacy in vehicular applications and communications

    No full text
    Vehicular communications systems may one day save lives, reduce fuel consumption, and advance connectivity, but they may also transmit information which could be deanonymized to obtain personal information. Vehicle location data are of special concern because they could be used maliciously. This dissertation presents a systematic study resulting in novel definitions, metrics and methods for evaluating and applying location privacy preserving protocols specifically in vehicular settings. Previous work in vehicular network privacy has not thoroughly considered vehicular mobility patterns. Previous work in vehicular network privacy has not solved the problem of collusion between MAC layer and application layer attackers. As defenses against location privacy attacks, previous work has favored the privacy methods of anonymization and obfuscation, but these methods have weaknesses. Spatial-temporal cloaking, for example, requires overhead of trusted third parties, and provides little protection in low vehicle densities especially when applications require frequent precise location data. Little published work has addressed the "location" part of location privacy, the geographical distance of location privacy, focusing instead on the size of the anonymity set. The need for new metrics is indicated. The present research addresses these issues. In addition to new definitions and metrics, this study develops privacy methods which would (1) accommodate vehicular mobility patterns, (2) defend against collusion by MAC and application layer attackers, (3) produce privacy solutions which depend on cooperation neither by large numbers of other motorists nor by trusted third parties, and (4) function in low vehicle densities, notably during the transition period between system initialization and full saturation, (5) provide protection even when applications require frequent and precise location queries, and (6) provide protection over a geographical range beyond a vehicle's wireless communications range and provide protection over measurable and lengthy spans of time. Finally, it presents a new metric for measuring privacy (KDT), an equation to estimate the safety impact of privacy protocols (SSTE), and three new privacy models, Endpoint Protection Zones (EPZ), Privacy by Decoy (PBD) and Random Rotation of Vehicular Trajectory (RRVT)

    Protecting Vehicle Privacy Using Dummy Events

    No full text
    VANETs (Vehicular Ad Hoc Networks) can improve safety and enable a wide range of internet services, such as location based services. The problem is VANETs can also be used for tracking vehicles, raising privacy concerns. To confuse potential eavesdroppers some researchers have approached the problem by having network nodes transmit dummy data along with true data. Few such proposals consider vehicular applications where network nodes, vehicles, often travel along predictable paths, roadways. In this paper our approach is to examine one generic dummy-based scheme which we applied in a vehicular context. The results we found were that, with modifications, the scheme may be useful in certain vehicular situations

    Protecting Vehicle Privacy Using Dummy Events

    No full text
    VANETs (Vehicular Ad Hoc Networks) can improve safety and enable a wide range of internet services, such as location based services. The problem is VANETs can also be used for tracking vehicles, raising privacy concerns. To confuse potential eavesdroppers some researchers have approached the problem by having network nodes transmit dummy data along with true data. Few such proposals consider vehicular applications where network nodes, vehicles, often travel along predictable paths, roadways. In this paper our approach is to examine one generic dummy-based scheme which we applied in a vehicular context. The results we found were that, with modifications, the scheme may be useful in certain vehicular situations
    corecore