996 research outputs found

    Mandatory Enforcement of Privacy Policies using Trusted Computing Principles

    Get PDF
    Modern communication systems and information technology create significant new threats to information privacy. In this paper, we discuss the need for proper privacy protection in cooperative intelligent transportation systems (cITS), one instance of such systems. We outline general principles for data protection and their legal basis and argue why pure legal protection is insufficient. Strong privacy-enhancing technologies need to be deployed in cITS to protect user data while it is generated and processed. As data minimization cannot always prevent the need for disclosing relevant personal information, we introduce the new concept of mandatory enforcement of privacy policies. This concept empowers users and data subjects to tightly couple their data with privacy policies and rely on the system to impose such policies onto any data processors. We also describe the PRECIOSA Privacy-enforcing Runtime Architecture that exemplifies our approach. Moreover, we show how an application can utilize this architecture by applying it to a pay as you drive (PAYD) car insurance scenario

    On the Potential of Generic Modeling for VANET Data Aggregation Protocols

    Get PDF
    In-network data aggregation is a promising communication mechanism to reduce bandwidth requirements of applications in vehicular ad-hoc networks (VANETs). Many aggregation schemes have been proposed, often with varying features. Most aggregation schemes are tailored to specific application scenarios and for specific aggregation operations. Comparative evaluation of different aggregation schemes is therefore difficult. An application centric view of aggregation does also not tap into the potential of cross application aggregation. Generic modeling may help to unlock this potential. We outline a generic modeling approach to enable improved comparability of aggregation schemes and facilitate joint optimization for different applications of aggregation schemes for VANETs. This work outlines the requirements and general concept of a generic modeling approach and identifies open challenges

    Privacy in Inter-Vehicular Networks: Why simple pseudonym change is not enough

    Get PDF
    Inter-vehicle communication (IVC) systems disclose rich location information about vehicles. State-of-the-art security architectures are aware of the problem and provide privacy enhancing mechanisms, notably pseudonymous authentication. However, the granularity and the amount of location information IVC protocols divulge, enable an adversary that eavesdrops all traffic throughout an area, to reconstruct long traces of the whereabouts of the majority of vehicles within the same area. Our analysis in this paper confirms the existence of this kind of threat. As a result, it is questionable if strong location privacy is achievable in IVC systems against a powerful adversary.\u

    Conditioned Medium from Dysfunctional Endothelial Cells Negatively Regulates Satellite Cell Expansion and Differentiation

    Get PDF
    Dysfunction of the endothelial lining of the cardiovascular system is a hallmark symptom of both cardiovascular disease (CVD) and type II diabetes mellitus (T2DM). The dysfunctional endothelial cell phenotype is characterized by an increase in production and release of inflammatory cytokines and reactive oxygen species (ROS) and a decrease in nitric oxide (NO) and growth factor secretion. Evidence has emerged showing a close relationship between endothelial cells and skeletal muscle satellite/progenitor cells. Skeletal muscle cell growth and differentiation are impaired in oxidative environments and many endothelial dysfunction-related diseases. The purpose of the current study is to determine the impact that high glucose induced endothelial cell dysfunction has on the growth and differentiation of skeletal muscle satellite cells (SkMSC). Human Umbilical Vein Endothelial Cells (HUVEC) were grown in normoglycemic, 5 mM glucose (CON) media or hyperglycemic, 30 mM glucose (DYS) media for 48 hours to induce dysfunction, after which the media was collected to be used as conditioned media (CM). Primary human SkMSCs were isolated from the vastus lateralis of eight lean subjects and subsequently treated with CON or DYS CM for 2, 4, or 6 days. Satellite cells not collected at day 6 were directed toward differentiation in CON or DYS CM. SkMSC growth, ROS production and differentiation were analyzed via cell counting, MTT assay, DHE assay, qPCR, immune blotting, and immunocytochemistry. After 6 days of treatment, SkMSC counts and the number of viable cells were decreased in DYS CM treatment. SkMSC cyclin D1 was downregulated and caspase-9 was upregulated in the DYS treatment group. Myogenesis and myotube fusion were impaired in DYS CM treated SkMSC. Abnormal inhibition of p38 phosphorylation and a non-significant increase in NF-κB activity occurred in late stage DYS CM treated satellite cells. This study provides evidence that dysfunctional endothelial cells impair skeletal muscle satellite cell expansion through possible dysregulation of apoptotic and proliferative pathways. CM from DYS ECs also clearly inhibited muscle satellite cell differentiation and myotube fusion via abnormal intracellular signaling. Future studies should focus on expanding current knowledge on the relationship between endothelial cells and muscle satellite cells in endothelial dysfunction-related pathologies

    Analyzing Attacks on Cooperative Adaptive Cruise Control (CACC)

    Full text link
    Cooperative Adaptive Cruise Control (CACC) is one of the driving applications of vehicular ad-hoc networks (VANETs) and promises to bring more efficient and faster transportation through cooperative behavior between vehicles. In CACC, vehicles exchange information, which is relied on to partially automate driving; however, this reliance on cooperation requires resilience against attacks and other forms of misbehavior. In this paper, we propose a rigorous attacker model and an evaluation framework for this resilience by quantifying the attack impact, providing the necessary tools to compare controller resilience and attack effectiveness simultaneously. Although there are significant differences between the resilience of the three analyzed controllers, we show that each can be attacked effectively and easily through either jamming or data injection. Our results suggest a combination of misbehavior detection and resilient control algorithms with graceful degradation are necessary ingredients for secure and safe platoons.Comment: 8 pages (author version), 5 Figures, Accepted at 2017 IEEE Vehicular Networking Conference (VNC

    A Flexible Network Approach to Privacy of Blockchain Transactions

    Full text link
    For preserving privacy, blockchains can be equipped with dedicated mechanisms to anonymize participants. However, these mechanism often take only the abstraction layer of blockchains into account whereas observations of the underlying network traffic can reveal the originator of a transaction request. Previous solutions either provide topological privacy that can be broken by attackers controlling a large number of nodes, or offer strong and cryptographic privacy but are inefficient up to practical unusability. Further, there is no flexible way to trade privacy against efficiency to adjust to practical needs. We propose a novel approach that combines existing mechanisms to have quantifiable and adjustable cryptographic privacy which is further improved by augmented statistical measures that prevent frequent attacks with lower resources. This approach achieves flexibility for privacy and efficency requirements of different blockchain use cases.Comment: 6 pages, 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS
    corecore