2,455 research outputs found
Recommended from our members
MobileTrust: Secure Knowledge Integration in VANETs
Vehicular Ad hoc NETworks (VANET) are becoming popular due to the emergence of the Internet of Things and ambient intelligence applications. In such networks, secure resource sharing functionality is accomplished by incorporating trust schemes. Current solutions adopt peer-to-peer technologies that can cover the large operational area. However, these systems fail to capture some inherent properties of VANETs, such as fast and ephemeral interaction, making robust trust evaluation of crowdsourcing challenging. In this article, we propose MobileTrustâa hybrid trust-based system for secure resource sharing in VANETs. The proposal is a breakthrough in centralized trust computing that utilizes cloud and upcoming 5G technologies to provide robust trust establishment with global scalability. The ad hoc communication is energy-efficient and protects the system against threats that are not countered by the current settings. To evaluate its performance and effectiveness, MobileTrust is modelled in the SUMO simulator and tested on the traffic features of the small-size German city of Eichstatt. Similar schemes are implemented in the same platform to provide a fair comparison. Moreover, MobileTrust is deployed on a typical embedded system platform and applied on a real smart car installation for monitoring traffic and road-state parameters of an urban application. The proposed system is developed under the EU-founded THREAT-ARREST project, to provide security, privacy, and trust in an intelligent and energy-aware transportation scenario, bringing closer the vision of sustainable circular economy
xPF: Packet Filtering for Low-Cost Network Monitoring
The ever-increasing complexity in network infrastructures is making critical the demand for network monitoring tools. While the majority of network operators rely on low-cost open-source tools based on commodity hardware and operating systems, the increasing link speeds and complexity of network monitoring applications have revealed inefficiencies in the existing software organization, which may prohibit the use of such tools in high-speed networks. Although several new architectures have been proposed to address these problems, they require significant effort in re-engineering the existing body of applications. We present an alternative approach that addresses the primary sources of inefficiency without significantly altering the software structure. Specifically, we enhance the computational model of the Berkeley packet filter (BPF) to move much of the processing associated with monitoring into the kernel, thereby removing the overhead associated with context switching between kernel and applications. The resulting packet filter, called xPF, allows new tools to be more efficiently implemented and existing tools to be easily optimized for high-speed networks. We present the design and implementation of xPF as well as several example applications that demonstrate the efficiency of our approach
Recommended from our members
Pattern-driven security, privacy, dependability and interoperability management of iot environments
Achieving Security, Privacy, Dependability and Interoperability (SPDI) is of paramount importance for the ubiquitous deployment and impact maximization of Internet of Things (IoT) applications. Nevertheless, said requirements are not only difficult to achieve at system initialization, but also hard to prove and maintain at run-time. This paper highlights an approach to tackling the above challenges, through the definition of pattern language and a framework that can guarantee SPDI in IoT orchestrations. By integrating pattern reasoning engines at the various layers of the IoT infrastructure, and a machine-processable representation of said pattern through Drools rules, the proposed framework can provide ways to fulfill SPDI requirements at design time, and also provide the means to guarantee those SPDI properties and manage the orchestrations accordingly. Moreover, an application example of the framework is presented in an Industrial IoT monitoring environment
Recommended from our members
Cyber insurance of information systems: Security and privacy cyber insurance contracts for ICT and helathcare organizations
Nowadays, more-and-more aspects of our daily activities are digitalized. Data and assets in the cyber-space, both for individuals and organizations, must be safeguarded. Thus, the insurance sector must face the challenge of digital transformation in the 5G era with the right set of tools. In this paper, we present CyberSure-an insurance framework for information systems. CyberSure investigates the interplay between certification, risk management, and insurance of cyber processes. It promotes continuous monitoring as the new building block for cyber insurance in order to overcome the current obstacles of identifying in real-time contractual violations by the insured party and receiving early warning notifications prior the violation. Lightweight monitoring modules capture the status of the operating components and send data to the CyberSure backend system which performs the core decision making. Therefore, an insured system is certified dynamically, with the risk and insurance perspectives being evaluated at runtime as the system operation evolves. As new data become available, the risk management and the insurance policies are adjusted and fine-tuned. When an incident occurs, the insurance company possesses adequate information to assess the situation fast, estimate accurately the level of a potential loss, and decrease the required period for compensating the insured customer. The framework is applied in the ICT and healthcare domains, assessing the system of medium-size organizations. GDPR implications are also considered with the overall setting being effective and scalable
An accessory middle scalene muscle causing thoracic outlet syndrome
The aim of our study is to present a very rare accessory middle scalene muscle, leading to thoracic outlet syndrome. In particular, a muscular bundle was discovered on a male cadaver connecting the middle portion of the middle scalene muscle with the anterior scalene muscle insertion to Lisfranc`s tubercle. This triangular accessory muscle and, especially, its sharp medial border compressed the middle and lower trunk of the brachial plexus and the subclavian artery. This anomaly is of great importance because it emphasises the fact that it is not
primarily the anterior scalene muscle that produces symptoms of thoracic outlet syndrome but the anterior displacement of the middle scalene muscle or its accessory muscular bands. We also present the relative international literature and the clinical significance of our finding
Investigating the value of radiomics stemming from DSC quantitative biomarkers in IDH mutation prediction in gliomas
Objective: This study aims to assess the value of biomarker based radiomics to predict IDH mutation in gliomas. The patient cohort consists of 160 patients histopathologicaly proven of primary glioma (WHO grades 2â4) from 3 different centers.
Methods: To quantify the DSC perfusion signal two different mathematical modeling methods were used (Gamma fitting, leakage correction algorithms) considering the assumptions about the compartments contributing in the blood flow between the extra- and intra vascular space.
Results: The Mean slope of increase (MSI) and the K1 parameter of the bidirectional exchange model exhibited the highest performance with (ACC 74.3% AUROC 74.2%) and (ACC 75% AUROC 70.5%) respectively.
Conclusion: The proposed framework on DSC-MRI radiogenomics in gliomas has the potential of becoming a reliable diagnostic support tool exploiting the mathematical modeling of the DSC signal to characterize IDH mutation status through a more reproducible and standardized signal analysis scheme for facilitating clinical translation
Recommended from our members
Pairing a Circular Economy and the 5G-Enabled Internet of Things: Creating a Class of âLooping Smart Assetsâ
The increase in the worldâs population has led to a
massive rise in human consumption of the planetâs natural
resources, well beyond their replacement rate. Traditional
recycling concepts and methods are not enough to counter such
effects. In this context, a circular economy (CE), that is, a
restorative and regenerative by-design economy, can reform
todayâs âtakeâmakeâdisposeâ economic model. On the other hand,
the Internet of Things (IoT) continues to gradually transform our
everyday lives, allowing for the introduction of novel types of
services while enhancing legacy ones. Taking this as our
motivation, in this article we analyze the CE/IoT interplay,
indicating innovative ways in which this interaction can drastically
affect products and services, their underlying business models,
and the associated ecosystems. Moreover, we present an IoT
architecture that enables smart object integration into the IoT
ecosystem. The presented architecture integrates circularityenabling
features by maximizing the exploitation of assets toward
a new type of IoT ecosystem that is circular by design (CbD).
Finally, we provide a proof-of-concept implementation and an
application study of the proposed architecture and results
regarding the applicability of the proposed approach for the
telecommunications (telecom) sector
WARDOG: Awareness detection watchbog for Botnet infection on the host device
Botnets constitute nowadays one of the most dangerous security threats worldwide. High volumes of infected
machines are controlled by a malicious entity and perform coordinated cyber-attacks. The problem will become even worse in
the era of the Internet of Things (IoT) as the number of insecure devices is going to be exponentially increased. This paper
presents WARDOG â an awareness and digital forensic system that informs the end-user of the botnetâs infection, exposes the
botnet infrastructure, and captures verifiable data that can be utilized in a court of law. The responsible authority gathers all
information and automatically generates a unitary documentation for the case. The document contains undisputed forensic
information, tracking all involved parties and their role in the attack. The deployed security mechanisms and the overall
administration setting ensures non-repudiation of performed actions and enforces accountability. The provided properties are
verified through theoretic analysis. In simulated environment, the effectiveness of the proposed solution, in mitigating the botnet
operations, is also tested against real attack strategies that have been captured by the FORTHcert honeypots, overcoming
state-of-the-art solutions. Moreover, a preliminary version is implemented in real computers and IoT devices, highlighting the
low computational/communicational overheads of WARDOG in the field
- âŚ