1,150 research outputs found

    A hierarchical key pre-distribution scheme for fog networks

    Get PDF
    Security in fog computing is multi-faceted, and one particular challenge is establishing a secure communication channel between fog nodes and end devices. This emphasizes the importance of designing efficient and secret key distribution scheme to facilitate fog nodes and end devices to establish secure communication channels. Existing secure key distribution schemes designed for hierarchical networks may be deployable in fog computing, but they incur high computational and communication overheads and thus consume significant memory. In this paper, we propose a novel hierarchical key pre-distribution scheme based on “Residual Design” for fog networks. The proposed key distribution scheme is designed to minimize storage overhead and memory consumption, while increasing network scalability. The scheme is also designed to be secure against node capture attacks. We demonstrate that in an equal-size network, our scheme achieves around 84% improvement in terms of node storage overhead, and around 96% improvement in terms of network scalability. Our research paves the way for building an efficient key management framework for secure communication within the hierarchical network of fog nodes and end devices. KEYWORDS: Fog Computing, Key distribution, Hierarchical Networks

    A cyber-kill-chain based taxonomy of crypto-ransomware features

    Get PDF
    In spite of being just a few years old, ransomware is quickly becoming a serious threat to our digital infrastructures, data and services. Majority of ransomware families are requesting for a ransom payment to restore a custodian access or decrypt data which were encrypted by the ransomware earlier. Although the ransomware attack strategy seems to be simple, security specialists ranked ransomware as a sophisticated attack vector with many variations and families. Wide range of features which are available in different families and versions of ransomware further complicates their detection and analysis. Though the existing body of research provides significant discussions about ransomware details and capabilities, the all research body is fragmented. Therefore, a ransomware feature taxonomy would advance cyber defenders’ understanding of associated risks of ransomware. In this paper we provide, to the best of our knowledge, the first scientific taxonomy of ransomware features, aligned with Lockheed Martin Cyber Kill Chain (CKC) model. CKC is a well-established model in industry that describes stages of cyber intrusion attempts. To ease the challenge of applying our taxonomy in real world, we also provide the corresponding ransomware defence taxonomy aligned with Courses of Action matrix (an intelligence-driven defence model). We believe that this research study is of high value for the cyber security research community, as it provides the researchers with a means of assessing the vulnerabilities and attack vectors towards the intended victims

    Passive smoking is associated with cognitive and emotional impairment in adolescent girls

    Get PDF
    It is well established that smoking is associated with impaired mental health and sleep problems. However, the possible effects of passive smoking on cognitive and emotional characteristics have not previously been evaluated in adolescents. We investigated the association between passive smoking and cognitive and emotional function, and sleep patterns in 940 adolescent girls. The girls were divided into 2 groups [305 exposed subjects and 635 non-exposed subjects (the controls)]. The passive smokers had a significantly lower cognitive function and higher depression, aggression, and insomnia scores compared to the control group (P <0.05). No significant difference was detected with respect to day-time sleepiness and sleep apnea. Logistic regression analyses showed that the passive smokers were more likely than the controls to have cognitive impairments, depressive mood, aggressive behavior and insomnia. Adolescent passive smokers had significant differences in their cognitive abilities and emotional function

    5G network slicing with QKD and quantum-safe security

    Get PDF
    We demonstrate how the 5G network slicing model can be extended to address data security requirements. In this work we demonstrate two different slice configurations, with different encryption requirements, representing two diverse use-cases for 5G networking: namely, an enterprise application hosted at a metro network site, and a content delivery network. We create a modified software-defined networking (SDN) orchestrator which calculates and provisions network slices according to the requirements, including encryption backed by quantum key distribution (QKD), or other methods. Slices are automatically provisioned by SDN orchestration of network resources, allowing selection of encrypted links as appropriate, including those which use standard Diffie-Hellman key exchange, QKD and quantum-resistant algorithms (QRAs), as well as no encryption at all. We show that the set-up and tear-down times of the network slices takes of the order of 1-2 minutes, which is an order of magnitude improvement over manually provisioning a link today

    Assessment of noise induced psychological stresses on printery workers

    Get PDF
    The purpose of this study was to assess the relationship between psychological stresses and noise stresses on printery workers in Tehran, Iran. Hence, 267 workers were randomly selected. The Leq and Lmax were measured and the psychological stresses such as depression, anxiety, aggression and job satisfaction were also studied by the relevant questionnaires. The data were statistically analyzed by Pearson correlation test. The results demonstrated that there was no significant statistical relationship between noise and psychological stresses. In addition, by using Spearman regression method, the influence of variables such as age, gender and job history on psychological stresses caused by Leq and Lmax was studied and the results only revealed that the aggression caused by Leq increased in young personnel (P=0.02) as well as, anxiety caused by Lmax increased accompanied by increasing the job history and age of the workers (P=0.002 and P=0.007). Therefore, more variables must be taken into consideration to judge about noise induced psychological stresses in workplaces. © IRSEN, CEERS, IAU

    Neuroblastoma Formation Requires Unconventional CD4 T Cells and Arginase-1-Dependent Myeloid Cells

    Get PDF
    Immune cells regulate tumor growth by mirroring their function as tissue repair organizers in normal tissues. To understand the different facets of immune-tumor collaboration through genetics, spatial transcriptomics, and immunologic manipulation with noninvasive, longitudinal imaging, we generated a penetrant double oncogene-driven autochthonous model of neuroblastoma. Spatial transcriptomic analysis showed that CD4(+) and myeloid populations colocalized within the tumor parenchyma, while CD8(+) T cells and B cells were peripherally dispersed. Depletion of CD4(+) T cells or CCR2(+) macrophages, but not B cells, CD8(+) T cells, or natural killer (NK) cells, prevented tumor formation. Tumor CD4(+) T cells displayed unconventional phenotypes and were clonotypically diverse and antigen independent. Within the myeloid fraction, tumor growth required myeloid cells expressing arginase-1. Overall, these results demonstrate how arginine-metabolizing myeloid cells conspire with pathogenic CD4(+) T cells to create permissive conditions for tumor formation, suggesting that these protumorigenic pathways could be disabled by targeting myeloid arginine metabolism. Significance: A new model of human neuroblastoma provides ways to track tumor formation and expansion in living animals, allowing identification of CD4(+) T-cell and macrophage functions required for oncogenesis. [GRAPHICS
    corecore