55 research outputs found

    Focusing on soil-foundation heterogeneity through high-resolution electrical and seismic tomography

    Get PDF
    The reconstruction of the current status of a historic building is essential for seismic safety assessment and for designing the retrofitting interventions since different safety and confidence factors have to be assumed, depending on the level of information about the subsoil structure. In this work, we present an investigation of the shallow subsurface below and around a historic building affected by differential settlements in order to define its geometry and to characterise its stiffness at low strain. To this end, we employed high-resolution electrical resistivity and seismic (both P-wave and S-wave) tomographies. A three-dimensional electrical resistivity tomography survey was performed to obtain more information about the type and the maximum depth of the building foundation. Electrical resistivity and seismic tomographies were carried out alongside the building, aimed at imaging the top soils and the near-surface geometry. The corresponding inverted models pointed out a remarkable heterogeneity of the shallow subsoil below the building, which is partly founded on a weathered layer and partly on a more rigid lithotype. This heterogeneity is probably a concurrent cause of the building's instability under both static and seismic loading. Our results demonstrate that the man-made fillings and the top soils have to be thoroughly investigated to fully understand the soil-structure behaviour. In this light, the integration of non-invasive high-resolution geophysical techniques, especially tomographic methods, has been proved to properly address the problem of imaging the shallow subsoil

    Time-lapse monitoring of an electrokinetic soil remediation process through frequency-domain electrical measurements

    Get PDF
    The electrokinetic (EK) method is an emerging technique for soil remediation, even though a monitoring system of the contaminant removal through geophysical methods has not been developed yet. In this paper, frequency-domain time-lapse measurements are used on heavy-metal contaminated sediments for monitoring an EK remediation process in a small-scale measuring cell. Our goal is to monitor the development of the electrokinetic process within the sediment and to evaluate the total time needed for the treatment. In fact, frequency-domain electrical monitoring provides complex resistivity spectra at different time steps that can be correlated to changes in the physical properties of the sediments. We perform laboratory spectral induced polarization (SIP) measurements on different samples before, during and after the EK treatment, using different electrolyte solutions (acids and tap water), commonly employed in EK remediation. Direct-current measurements (resistivity and chargeability) were also acquired on one sample for testing the reliability of the system by a comparison with a widespread commercial instrumentation for field measurements. Results indicate that resistivity is a diagnostic parameter as long as it is linked to changes in water saturation, pH and ionic concentration and not to the percentage of metal extraction. The resistivity exhibited well-defined signatures as a function of time that changes depending on the conditioning agent and the grain size distribution. These peculiarities were used to understand the physical processes occurring within the cell and consequently to assess the effectiveness of the electrokinetic treatment. Conversely, the polarization effect was negligible using acids as conditioning agents at the electrolyte chambers. Therefore, the SIP method is not effective under these conditions, being the polarization effect significant only when tap water was used at both ends of the measuring cell. In this case, we were able to correlate changes in water saturation with the time-shift observed on relaxation time distributions (RTDs) after inversion of SIP data and to observe, using normalized chargeability, that polarization is stronger at high pH values. On these basis, resistivity is suitable to monitor the development of the remediation, to optimise the energy levels required for treatment and to assess the end time of the EK process (time when metal mobilization ends). In fact, the end time of treatment can be associated with the time at which resistivity becomes stable. This time is highly dependent on the particular working conditions and sediment grain size as demonstrated by our experiments

    Focusing on Soil Foundation Heterogeneity through High-resolution Tomography

    Get PDF
    An historical building affected by differential settlements, which were triggered by an earthquake, is investigated by means of high-resolution tomography, both electrical and seismic. The objective is to image the geometric structure of the shallow soil below the building and to characterize its stiffness at low strain. A preliminary reconstruction of the geological units has been recovered through the combined use of electrical and seismic data, where the depth of the travertine bedrock varies significantly within the study site. The range of variation of the main geophysical parameters (resistivity, P- and S-wave velocities) inferred from these models has been set as reference point for tuning the results obtained from the geophysical survey performed near the building. The inverted tomographic models obtained from data acquired alongside the building exhibit heterogeneity of the shallow subsoil, which is partly founded on a weathered layer and partly on a more rigid lithotype, probably a fractured travertine or a gravel layer. Therefore the fill anthropic soils can play a relevant role for the structural stability in case of shallow foundations built on a heterogeneous subsoil

    AntibIoTic: Protecting IoT Devices Against DDoS Attacks

    Get PDF
    The 2016 is remembered as the year that showed to the world how dangerous Distributed Denial of Service attacks can be. Gauge of the disruptiveness of DDoS attacks is the number of bots involved: the bigger the botnet, the more powerful the attack. This character, along with the increasing availability of connected and insecure IoT devices, makes DDoS and IoT the perfect pair for the malware industry. In this paper we present the main idea behind AntibIoTic, a palliative solution to prevent DDoS attacks perpetrated through IoT devices

    DDoS-Capable IoT Malwares: comparative analysis and Mirai Investigation

    Get PDF
    The Internet of Things (IoT) revolution has not only carried the astonishing promise to interconnect a whole generation of traditionally “dumb” devices, but also brought to the Internet the menace of billions of badly protected and easily hackable objects. Not surprisingly, this sudden flooding of fresh and insecure devices fueled older threats, such as Distributed Denial of Service (DDoS) attacks. In this paper, we first propose an updated and comprehensive taxonomy of DDoS attacks, together with a number of examples on how this classification maps to real-world attacks. Then, we outline the current situation of DDoS-enabled malwares in IoT networks, highlighting how recent data support our concerns about the growing in popularity of these malwares. Finally, we give a detailed analysis of the general framework and the operating principles of Mirai, the most disruptive DDoS-capable IoT malware seen so far

    Resistivity and full‐decay IP inversion for imaging a coastal aquifer prone to saline intrusion. The Pontina Plain case study (Central Italy)

    Get PDF
    Many coastal areas are affected by groundwater salinization due to the unsustainable use of groundwater resources. For a cost-effective quantitative assessment of groundwater resources, electrical resistivity (ER) tomography is often used as a standalone geophysical technique. In this paper, we present an application of the integration of direct-current ER and full-decay-induced polarization (IP) method at the Pontina Plain (Central Italy). The case study is a coastal area in Central Italy prone to salinization due to both geological and anthropogenic factors. To achieve these goals, we inverted full-decay time-domain electrical data for Cole–Cole parameters. The resulting multi-parameter model provides a first approximation prediction of the permeability, employing well-established empirical relationships with the electrical parameters. We demonstrated that our approach: (i) can locate highly conductive zones directly related to saline intrusion inland using the resistivity as a fast proxy; (ii) can remove the ambiguity in the detection of clay/silt layers in the near-surface; and (iii) permit a prediction of the permeability, employing full-decay inversion of time-domain electrical data. However, the extremely conductive environment prevents the use of IP data for the reconstruction of deep layers or detection of the salt wedge front. Therefore, this approach can be used for hydro-geophysical screening and monitoring of salinization-prone sites, where strong limitations to direct inspection exist due to external constraints (e.g., protected lands)

    Pavement testing by integrated geophysical methods: Feasibility, resolution and diagnostic potential

    Get PDF
    This work is focused on the assessment of the diagnostic potential of several geophysical methods when applied to the investigation of a rigid airport pavement. The potential and limit of each technique are evaluated as well as the added value deriving from their integration. Firstly, we reconstruct a high-resolution image of the pavement by a large electromagnetic and georadar screening. An advanced processing of georadar data, implemented through the picking of the arrival times of reflections for each profile, provides a quantitative estimation of the deviation between the design and the as-built thickness of layers. Additionally, electrical tomography has been applied to unequivocally identify the anomalous zones, where higher values of resistivity would be associated to porous zones that are prone to degradation and failure. The seismic tomographic survey had the additional purpose to recover the mechanical properties of the pavement in terms of both P- and S-waves and consequently of elastic constants (Poisson's ratio), whose values were consistent with those recovered in literature. The anomalies detected by each technique are consistent in their indications and they can be correlated to failure phenomena occurring at layer interfaces within the pavement structure or to unexpected variations of the layer thicknesses. The cost-effective geophysical campaign has validated the four-layered system deduced from the original design and has been used to reconstruct a high-resolution map of the pavement in order to discriminate fractures, crack-prone areas or areas where the as-built differs from the original design

    Cyber-Storms Come from Clouds: Security of Cloud Computing in the IoT Era

    Get PDF
    The Internet of Things (IoT) is rapidly changing our society to a world where every "thing" is connected to the Internet, making computing pervasive like never before. This tsunami of connectivity and data collection relies more and more on the Cloud, where data analytics and intelligence actually reside. Cloud computing has indeed revolutionized the way computational resources and services can be used and accessed, implementing the concept of utility computing whose advantages are undeniable for every business. However, despite the benefits in terms of flexibility, economic savings, and support of new services, its widespread adoption is hindered by the security issues arising with its usage. From a security perspective, the technological revolution introduced by IoT and Cloud computing can represent a disaster, as each object might become inherently remotely hackable and, as a consequence, controllable by malicious actors. While the literature mostly focuses on security of IoT and Cloud computing as separate entities, in this article we provide an up-to-date and well-structured survey of the security issues of Cloud computing in the IoT era. We give a clear picture of where security issues occur and what their potential impact is. As a result, we claim that it is not enough to secure IoT devices, as cyber-storms come from Clouds

    Adding Salt to Pepper: A Structured Security Assessment over a Humanoid Robot

    Get PDF
    The rise of connectivity, digitalization, robotics, and artificial intelligence (AI) is rapidly changing our society and shaping its future development. During this technological and societal revolution, security has been persistently neglected, yet a hacked robot can act as an insider threat in organizations, industries, public spaces, and private homes. In this paper, we perform a structured security assessment of Pepper, a commercial humanoid robot. Our analysis, composed by an automated and a manual part, points out a relevant number of security flaws that can be used to take over and command the robot. Furthermore, we suggest how these issues could be fixed, thus, avoided in the future. The very final aim of this work is to push the rise of the security level of IoT products before they are sold on the public market.Comment: 8 pages, 3 figures, 4 table

    Cyber-storms come from clouds:Security of cloud computing in the IoT era

    Get PDF
    The Internet of Things (IoT) is rapidly changing our society to a world where every “thing” is connected to the Internet, making computing pervasive like never before. This tsunami of connectivity and data collection relies more and more on the Cloud, where data analytics and intelligence actually reside. Cloud computing has indeed revolutionized the way computational resources and services can be used and accessed, implementing the concept of utility computing whose advantages are undeniable for every business. However, despite the benefits in terms of flexibility, economic savings, and support of new services, its widespread adoption is hindered by the security issues arising with its usage. From a security perspective, the technological revolution introduced by IoT and Cloud computing can represent a disaster, as each object might become inherently remotely hackable and, as a consequence, controllable by malicious actors. While the literature mostly focuses on the security of IoT and Cloud computing as separate entities, in this article we provide an up-to-date and well-structured survey of the security issues of cloud computing in the IoT era. We give a clear picture of where security issues occur and what their potential impact is. As a result, we claim that it is not enough to secure IoT devices, as cyber-storms come from Clouds
    • 

    corecore