202 research outputs found

    Practical Secrecy at the Physical Layer: Key Extraction Methods with Applications in Cognitive Radio

    Get PDF
    The broadcast nature of wireless communication imposes the risk of information leakage to adversarial or unauthorized receivers. Therefore, information security between intended users remains a challenging issue. Currently, wireless security relies on cryptographic techniques and protocols that lie at the upper layers of the wireless network. One main drawback of these existing techniques is the necessity of a complex key management scheme in the case of symmetric ciphers and high computational complexity in the case of asymmetric ciphers. On the other hand, physical layer security has attracted significant interest from the research community due to its potential to generate information-theoretic secure keys. In addition, since the vast majority of physical layer security techniques exploit the inherent randomness of the communication channel, key exchange is no longer mandatory. However, additive white Gaussian noise, interference, channel estimation errors and the fact that communicating transceivers employ different radio frequency (RF) chains are among the reasons that limit utilization of secret key generation (SKG) algorithms to high signal to noise ratio levels. The scope of this dissertation is to design novel secret key generation algorithms to overcome this main drawback. In particular, we design a channel based SKG algorithm that increases the dynamic range of the key generation system. In addition, we design an algorithm that exploits angle of arrival (AoA) as a common source of randomness to generate the secret key. Existing AoA estimation systems either have high hardware and computation complexities or low performance, which hinder their incorporation within the context of SKG. To overcome this challenge, we design a novel high performance yet simple and efficient AoA estimation system that fits the objective of collecting sequences of AoAs for SKG. Cognitive radio networks (CRNs) are designed to increase spectrum usage efficiency by allowing secondary users (SUs) to exploit spectrum slots that are unused by the spectrum owners, i.e., primary users (PUs). Hence, spectrum sensing (SS) is essential in any CRN. CRNs can work both in opportunistic (interweaved) as well as overlay and/or underlay (limited interference) fashions. CRNs typically operate at low SNR levels, particularly, to support overlay/underlay operations. Similar to other wireless networks, CRNs are susceptible to various physical layer security attacks including spectrum sensing data falsification and eavesdropping. In addition to the generalized SKG methods provided in this thesis and due to the peculiarity of CRNs, we further provide a specific method of SKG for CRNs. After studying, developing and implementing several SS techniques, we design an SKG algorithm that exploits SS data. Our algorithm does not interrupt the SS operation and does not require additional time to generate the secret key. Therefore, it is suitable for CRNs

    A Simple Angle of Arrival Estimation System

    Get PDF
    We propose a practical, simple and hardware friendly, yet novel and very efficient, angle of arrival (AoA) estimation system. Our intuitive, two-phases cross-correlation based system requires a switched beam antenna array with a single radio frequency chain. Our system cross correlates a reference omni-directional signal with a set of received directed signals to determine the AoA. Practicality and high efficiency of our system are demonstrated through performance and complexity comparisons with multiple signal classification algorithm.Scopu

    Exploiting Spectrum Sensing Data for Key Management

    Get PDF
    In cognitive radio networks, secondary users (SUs) communicate on unused spectrum slots in the frequency bands assigned to primary users (PUs). Like any other wireless communication system, cognitive radio networks are ex- posed to physical layer attacks. In particular, we focus on two common at- tacks, namely, spectrum sensing data falsification and eavesdropping. Such attacks can be counteracted by using symmetric key algorithms, which how- ever require a complex key management scheme. In this paper we propose a novel algorithm that significantly reduces the complexity of the management of symmetric link keys by leveraging spectrum sensing data that is available to all nodes. In our algorithm, it is assumed that a primary secret key is pre-distributed to the legitimate SUs, which is needed every number of de- tection cycles. With the aid of the information provided in the primary key, our algorithm manipulates the collected samples so that a segment of the estimated sensing statistic at the two legitimate SUs can be used as a seed to generate a common symmetric link key. The link key is then employed to encrypt the transmitted data. Our algorithm exhibits very good performance in terms of bit mismatch rate (BMR) between two link keys generated at the two legitimate SUs. In addition, our solution is robust against the difference in the received signal to noise ratio between two legitimate SUs thus making it suitable for practical scenarios. Furthermore, our algorithm exploits the decision statistic that SUs use for spectrum sensing, hence, it does require neither extra processing nor extra time, allowing the SUs to quickly and securely tab into empty spectrum slots

    Toxicity assessment of certain insecticides on the red soft scale insect, Pulvinaria tenuivalvata (Newstead) infesting sugarcane plants

    Get PDF
    Pulvinaria tenuivalvata (Newstead) (Hemiptera: Coccidae) red soft scale insect is one of the most prevalent insect pests that attacks sugarcane plants. Insecticidal efficiency of six selected insecticides (Malatox, Sulfar, Admiral, Nomolt, Tafaban and Biover) was evaluated for their impact against nymphs and adult females of P. tenuivalvata on sugarcane leaves using leave dipping methods. This investigation was carried out for two successive seasons (July 2021-2022) at the laboratory of the Plant Protection Research Department at the El-Mattana Agricultural Research Station, Luxor Governorate, Egypt. Obtained results showed that the tested insecticides varied in efficacy on the different stages of pest (nymphs and adult females). Moreover, the nymphal stage of P.tenuivalvata was more susceptible to the tested pesticides compared to the adult stage. Admiral and nomolt were the most toxic against the nymphal and adult female stages of P. tenuivalvata on sugarcane leaves, sulfar, however, was the least successful in controlling this pest

    Biological and molecular characterization of fEg-Eco19, a lytic bacteriophage active against an antibiotic-resistant clinical Escherichia coli isolate

    Get PDF
    Characterization of bacteriophages facilitates better understanding of their biology, host specificity, genomic diversity, and adaptation to their bacterial hosts. This, in turn, is important for the exploitation of phages for therapeutic purposes, as the use of uncharacterized phages may lead to treatment failure. The present study describes the isolation and characterization of a bacteriophage effective against the important clinical pathogen Escherichia coli, which shows increasing accumulation of antibiotic resistance. Phage fEg-Eco19, which is specific for a clinical E. coli strain, was isolated from an Egyptian sewage sample. Phage fEg-Eco19 formed clear, sharp-edged, round plaques. Electron microscopy showed that the isolated phage is tailed and therefore belongs to the order Caudovirales, and morphologically, it resembles siphoviruses. The diameter of the icosahedral head of fEg-Eco19 is 68 +/- 2 nm, and the non-contractile tail length and diameter are 118 +/- 0.2 and 13 +/- 0.6 nm, respectively. The host range of the phage was found to be narrow, as it infected only two out of 137 clinical E. coli strains tested. The phage genome is 45,805 bp in length with a GC content of 50.3% and contains 76 predicted genes. Comparison of predicted and experimental restriction digestion patterns allowed rough mapping of the physical ends of the phage genome, which was confirmed using the PhageTerm tool. Annotation of the predicted genes revealed gene products belonging to several functional groups, including regulatory proteins, DNA packaging and phage structural proteins, host lysis proteins, and proteins involved in DNA/RNA metabolism and replication.Peer reviewe

    Right mini-thoracotomy versus median sternotomy for mitral valve replacement

    Get PDF
    Background: The advantages of minimally invasive mitral valve surgery over the conventional approach is still debated. This study aimed to evaluate early outcomes after mitral valve replacement (MVR) using the right mini-thoracotomy (RMT) versus median sternotomy (MS). Methods: We prospectively included 60 patients who had MVR from May 2015 to June 2017. We classified patients into two groups; Group A (n= 30) had RMT, and Group B (n= 30) had MS. Postoperative pain score, wound satisfaction, and clinical and echocardiographic outcomes were compared between both groups. Results: The mean age was 39.90 ± 12.34 years in Group A and 45.75 ± 13.10 years in Group B (p= 0.08). Preoperative and echocardiographic data showed no statistical significance difference between the groups. Group A had longer aortic cross-clamp (118.85 ± 40.56 vs. 70.75 ± 24.81 minutes, p<0.001) and cardiopulmonary bypass times (186.70 ± 67.44 vs. 104.65 ± 42.60 minutes, p<0.001).  Group B had more blood loss (565 ± 344.3 vs. 241.5 ±89.16 ml/24 hours, p<0.001). The median pain score was 1 (range: 1- 3) in Group A and 4 (2- 8) in Group B (p<0.001), and the median wound satisfaction was 1.5 (1- 4) in Group A and 4 (1- 7) in Group B (p<0.001).  Wound infection occurred in 1 (3.3%) patient in Group A and 6 (20%) patients in Group B (p=0.04). Conclusion: Mitral valve replacement through the right mini-thoracotomy could be a safe alternative to median sternotomy. The right mini-thoracotomy was associated with longer operative times but better pain and wound satisfaction scores and lower wound infection

    Novel Sequence Variants in the NPC1 Gene in Egyptian Patients with Niemann-Pick Type C

    Get PDF
    BACKGROUND: Niemann-Pick disease type C (NPC) is a rare, autosomal recessive, progressive neuro-visceraldisease caused by biallelic mutations in either NPC1gene (95% of cases) or NPC2 gene. AIM: This caseseries study aimed at the molecular analysis of certain hot spots of NPC1 genein NPC Egyptian patients. METHODS: The study included 15 unrelated NPC patients and selected parents,as well as20 healthy controls of matched sex and age. Clinical investigations were performed according to well established clinical criteria. Assessment of the chitotriosidase level, as an initial screening tool for NPC, was done in all cases. Polymerase chain reaction amplification of NPC1 exons (17–25) encountering the hotspot residues (855–1098 and1038–1253) was carried out followed by direct sequencingfor mutational analysis. RESULTS: All includedpatients with mainly neurovisceral involvement were characterized. The onset of the disease varied from early-infantile (58.3%) to late-infantile (26.7%) and juvenile-onset (6.7%). Ahigh chitotriosidase level wasobservedin all patients. Molecular analysis of NPC1 (exons 17–25) confirmed 15 mutant alleles out of 30 studied ones. They included two novel homozygous missense variants (p.Ser1169Arg and p.Ser1197Phe) and previously reportedfour mutations (p.Arg958*, p.Gly910Ser, p.Ala927Glyfs*38, and andp.Cys1011*). CONCLUSION: The two studied amino acid residues (855–1098 and 1038–1253) could beconsidered aspotential hotspot regions in NPC1 Egyptian patients
    • …
    corecore