25 research outputs found
Analyzing, quantifying, and detecting the blackhole attack in infrastructure-less networks
The blackhole attack is one of the simplest yet effective attacks that target the AODV protocol. Blackhole attackers exploit AODV parameters in order to win route requests, and thus, attract traffic, which they subsequently capture and drop. However, the first part of the attack is often neglected in present literature, while the majority of attempts in detection focus only on the second part of the attack (i.e., packet drop). This paper provides a comprehensive analysis of the blackhole attack, focusing not only on the effects of the attack, but also on the exploitation of the route discovery process. As a result, a new critical attack parameter is identified (i.e., blackhole intensity), which quantifies the relation between AODV's sequence number parameter and the performance of blackhole attacks. In addition, a novel blackhole detection mechanism is also proposed. This mechanism utilizes a dynamic threshold cumulative sum (CUSUM) test in order to detect abrupt changes in the normal behavior of AODV's sequence number parameter. A key advantage of the proposed mechanism is its ability to accurately detect blackhole attacks with a minimal rate of false positives, even if the malicious node selectively drops packets. © 2016 Elsevier B.V
A security evaluation of FIDO’s UAF protocol in mobile and embedded devices
The FIDO (Fast Identity Online) Universal Authentication Framework is a new authentication mechanism that replaces passwords, simplifying the process of user authentication. To this end, FIDO transfers user verification tasks from the authentication server to the user’s personal device. Therefore, the overall assurance level of user authentication is highly dependent on the security and integrity of the user’s device involved. This paper analyses the functionality of FIDO’s UAF protocol and identifies a list of critical vulnerabilities that may compromise the authenticity, privacy, availability, and integrity of the UAF protocol, allowing an attacker to launch a number of attacks, such as, capturing the data exchanged between a user and an online service, impersonating a user at any UAF compatible online service, impersonating online services to the user, and presenting fake information to the user’s screen during a transaction. © Springer International Publishing AG 2017
Effect of austenite stability on fatigue performance of TRIP 700 steel
The role of austenite stability on fatigue performance of low-alloy TRIP steel 700 has been experimentally investigated. Heat treatment process was used to produce varying microstructures, characterized by different initial retained austenite volume fraction and austenite stability. Fatigue tests were carried out to determine the S-N fatigue curve of the materials. The austenite stability was measured with implementation of the Mσ s temperature detemination method. The effect of austenite stability on fatigue behavior was assessed by measurements of austenite volume fraction before and after fatigue testing. The experimental results showed that austenite stability impacts fatigue performance of TRIP steel in the high cycle regime
On the effect of austenite stability on high cycle fatigue of TRIP 700 steel
The high cycle fatigue behavior and the role of austenite stability on fatigue performance of low-alloy TRIP steel 700 have been experimentally investigated. The material was subjected to heat treatment in order to produce microstructures with different initial retained austenite volume fraction and austenite stability. High cycle fatigue tests were carried out to determine the S-N fatigue curve while austenite stability was measured by implementing a special technique for determination of M-s(sigma) temperature. The effect of austenite stability on fatigue behavior was assessed by measurements of volume fraction austenite before and after fatigue testing. The fatigue results indicated that austenite stability influences fatigue performance of TRIP steel in the high cycle regime, especially at high cyclic stresses. (C) 2013 Elsevier B.V. All rights reserved
ISCOMATRIX (TM) adjuvant: An adjuvant suitable for use in anticancer vaccines
Human Papillomavirus type 16 (HPV16) E6 and E7 oncoproteins are associated with cervical cancer development and progression and can therefore be used as target antigens for cancer immunotherapy. In this study we evaluated the immunogenicity in mice, of different vaccine formulations using recombinant HPV16 derived E6E7 or E7GST fusion proteins. When co-administered with ISCOMATRIX(TM) adjuvant, these E6E7 proteins consistently induced E7 specific CTL, in vivo tumor protection, antibody and DTH responses. ISCOMATRIX(TM) adjuvant has been developed for use in the formulation of novel human vaccines and has been evaluated for safety and toxicity in human trials. A formulation containing aluminum hydroxide (Al(OH)(3)) gave a lesser degree of E7 specific antibody, and no local E7 specific CTL response but similar DTH and tumor protection. These findings demonstrate the potential of ISCOMATRIX(TM) adjuvant to stimulate both cellular and humoral immune responses to endogenously processed target antigens, and hence is the preferred adjuvant when CTL responses are desirable. (C) 2004 Elsevier Ltd. All rights reserved