230 research outputs found

    In Reply to Antiplatelet Therapy Prior to Temporary Stent-Assisted Coiling

    Full text link

    Seamless key agreement framework for mobile-sink in IoT based cloud-centric secured public safety sensor networks

    Get PDF
    Recently, the Internet of Things (IoT) has emerged as a significant advancement for Internet and mobile networks with various public safety network applications. An important use of IoT-based solutions is its application in post-disaster management, where the traditional telecommunication systems may be either completely or partially damaged. Since enabling technologies have restricted authentication privileges for mobile users, in this paper, a strategy of mobile-sink is introduced for the extension of user authentication over cloud-based environments. A seamless secure authentication and key agreement (S-SAKA) approach using bilinear pairing and elliptic-curve cryptosystems is presented. It is shown that the proposed S-SAKA approach satisfies the security properties, and as well as being resilient to nodecapture attacks, it also resists significant numbers of other well-known potential attacks related with data confidentiality, mutual authentication, session-key agreement, user anonymity, password guessing, and key impersonation. Moreover, the proposed approach can provide a seamless connectivity through authentication over wireless sensor networks to alleviate the computation and communication cost constraints in the system. In addition, using Burrows–Abadi–Needham logic, it is demonstrated that the proposed S-SAKA framework offers proper mutual authentication and session key agreement between the mobile-sink and the base statio

    Path loss modelling at 60 GHz mmWave based on cognitive 3D ray tracing algorithm in 5G

    Get PDF
    The objective of the study is to consider the foremost high-tech issue of mobile radio propagation i.e. path loss for an outdoor and indoor environment for mmWave in a densely populated area.60 [GHz] mmWave is a win-win for the 5th Generation radio network. Several measurements and simulations are performed using the simulator “Smart Cognitive 3D Ray Tracer” build in MATLAB. Two of the main parameters (pathloss and received signal strength (RSS)) of the radio propagation are obtained in this study. To compute the pathloss and RSS, 5G 3GPP mobile propagation model is selected due to its flexibility of scenario and conditions beyond 6 GHz frequency. For indoor simulations, we again chose 5G 3GPP mobile propagation model. It is evident from the recent previous studies that there is still not enough findings in the ray tracing specially cognitive 3D ray tracing. The suggested alternative cognitive algorithm here deals with less iterations and effective use of resources. The conclusions of this work also comprise that the path loss is reliant on separation distance of base station and receiver. The above mentioned frequency and interconnected distance reported here provide better knowledge of mobile radio channel attributes and can be also used to design and estimate the performance of the future generation (5G) mobile networks

    Internet of Things for Sustainable Community Development: Introduction and Overview

    Get PDF
    The two-third of the city-dwelling world population by 2050 poses numerous global challenges in the infrastructure and natural resource management domains (e.g., water and food scarcity, increasing global temperatures, and energy issues). The IoT with integrated sensing and communication capabilities has the strong potential for the robust, sustainable, and informed resource management in the urban and rural communities. In this chapter, the vital concepts of sustainable community development are discussed. The IoT and sustainability interactions are explained with emphasis on Sustainable Development Goals (SDGs) and communication technologies. Moreover, IoT opportunities and challenges are discussed in the context of sustainable community development

    Dynamic Scheduling Algorithm in Cyber Mimic Defense Architecture of Volunteer Computing

    Get PDF
    Volunteer computing uses computers volunteered by the general public to do distributed scientific computing. Volunteer computing is being used in high-energy physics, molecular biology, medicine, astrophysics, climate study, and other areas. These projects have attained unprecedented computing power. However, with the development of information technology, the traditional defense system cannot deal with the unknown security problems of volunteer computing. At the same time, Cyber Mimic Defense (CMD) can defend the unknown attack behavior through its three characteristics: dynamic, heterogeneous, and redundant. As an important part of the CMD, the dynamic scheduling algorithm realizes the dynamic change of the service centralized executor, which can enusre the security and reliability of CMD of volunteer computing. Aiming at the problems of passive scheduling and large scheduling granularity existing in the existing scheduling algorithms, this article first proposes a scheduling algorithm based on time threshold and task threshold and realizes the dynamic randomness of mimic defense from two different dimensions; finally, combining time threshold and random threshold, a dynamic scheduling algorithm based on multi-level queue is proposed. The experiment shows that the dynamic scheduling algorithm based on multi-level queue can take both security and reliability into account, has better dynamic heterogeneous redundancy characteristics, and can effectively prevent the transformation rule of heterogeneous executors from being mastered by attackers
    • …
    corecore