1,609 research outputs found

    ZigBee/ZigBee PRO security assessment based on compromised cryptographic keys

    Get PDF
    Sensor networks have many applications in monitoring and controlling of environmental properties such as sound, acceleration, vibration and temperature. Due to limited resources in computation capability, memory and energy, they are vulnerable to many kinds of attacks. The ZigBee specification based on the 802.15.4 standard, defines a set of layers specifically suited to sensor networks. These layers support secure messaging using symmetric cryptographic. This paper presents two different ways for grabbing the cryptographic key in ZigBee: remote attack and physical attack. It also surveys and categorizes some additional attacks which can be performed on ZigBee networks: eavesdropping, spoofing, replay and DoS attacks at different layers. From this analysis, it is shown that some vulnerabilities still in the existing security schema in ZigBee technology.Les xarxes de sensors tenen moltes aplicacions en el control i la monitorització de les propietats del medi ambient, com ara el so, l¿acceleració, la vibració i la temperatura. A causa dels limitats recursos en la capacitat de càlcul, la memòria i l'energia són vulnerables a molts tipus d'atacs. L'especificació ZigBee basada en l'estàndard 802.15.4, defineix un conjunt de capes, adaptada específicament per a xarxes de sensors. Aquestes capes suporten missatgeria segura mitjançant criptografia simètrica. Aquest article presenta dues formes diferents per agafar la clau de xifrat en ZigBee: atac a distància i atacs físics. També les enquesta i classifica alguns atacs addicionals que es poden realitzar en les xarxes ZigBee: espionatge, falsificació, reproducció i atacs DoS en les diferents capes. A partir d'aquesta anàlisi, es demostren algunes vulnerabilitats existents en l'esquema de seguretat en tecnologia ZigBee.Las redes de sensores tienen muchas aplicaciones en el control y la monitorización de las propiedades del medio ambiente, como el sonido, la aceleración, la vibración y la temperatura. Debido a los limitados recursos en la capacidad de cálculo, la memoria y la energía son vulnerables a muchos tipos de ataques. La especificación ZigBee basada en el estándar 802.15.4, define un conjunto de capas, adaptada específicamente para redes de sensores. Estas capas soportan mensajería segura mediante criptografía simétrica. Este artículo presenta dos formas diferentes para coger la clave de cifrado en ZigBee: ataque a distancia y ataques físicos. También las encuesta y clasifica algunos ataques adicionales que se pueden realizar en las redes ZigBee: espionaje, falsificación, reproducción y ataques DoS en las diferentes capas. A partir de este análisis, se demuestran algunas vulnerabilidades existentes en el esquema de seguridad en tecnología ZigBee

    Dual-Mode and Label-Free Detection of Exosomes from Plasma Using an Electrochemical Quartz Crystal Microbalance with Dissipation Monitoring

    Get PDF
    The biomolecular contents of extracellular vesicles, such as exosomes, have been shown to be crucial in intercellular communication and disease propagation. As a result, there has been a recent surge in the exploration of novel biosensing platforms that can sensitively and specifically detect exosomal content such as proteins and nucleic acids, with a view toward application in diagnostic assays. Here, we demonstrate dual-mode and label-free detection of plasma exosomes using an electrochemical quartz crystal microbalance with dissipation monitoring (EQCM-D). The platform adopts a direct immunosensing approach to effectively capture exosomes via their surface protein expression of CD63. By combining QCM-D with a tandem in situ electrochemical impedance spectroscopy measurement, we are able to demonstrate relationships between mass, viscoelasticity and impedance inducing properties of each functional layer and analyte. In addition to lowering the limit of detection (by a factor of 2-4) to 6.71 × 107 exosome-sized particles (ESP) per mL in 25% v/v serum, the synergy between dissipation and impedance response introduces improved sensing specificity by offering further distinction between soft and rigid analytes, thereby promoting EQCM-D as an important technique for exosome analysis

    The ALMA Early Science View of FUor/EXor Objects - V. Continuum Disc Masses and Sizes

    Full text link
    Low-mass stars build a significant fraction of their total mass during short outbursts of enhanced accretion known as FUor and EXor outbursts. FUor objects are characterized by a sudden brightening of ∼5 mag at visible wavelengths within 1 yr and remain bright for decades. EXor objects have lower amplitude outbursts on shorter time-scales. Here we discuss a 1.3 mm Atacama Large Millimeter/submillimeter Array (ALMA) mini-survey of eight outbursting sources (three FUors, four EXors, and the borderline object V1647 Ori) in the Orion Molecular Cloud. While previous papers in this series discuss the remarkable molecular outflows observed in the three FUor objects and V1647 Ori, here we focus on the continuum data and the differences and similarities between the FUor and EXor populations. We find that FUor discs are significantly more massive (∼80–600 MJup) than the EXor objects (∼0.5–40 MJup). We also report that the EXor sources lack the prominent outflows seen in the FUor population. Even though our sample is small, the large differences in disc masses and outflow activity suggest that the two types of objects represent different evolutionary stages. The FUor sources seem to be rather compact (Rc \u3c 20–40 au) and to have a smaller characteristic radius for a given disc mass when compared to T Tauri stars. V1118 Ori, the only known close binary system in our sample, is shown to host a disc around each one of the stellar components. The disc around HBC 494 is asymmetric, hinting at a structure in the outer disc or the presence of a second disc

    Avoiding Object Misconceptions

    Get PDF
    This paper identifies and describes a number of misconceptions observed in students learning about object technology, It identifies simple, concrete, measures course designers and teachers can take to avoid these misconceptions arising. The context for this work centres on an introductory undergraduate course and a postgraduate course, Both these courses are taught by distance education. These courses both use Smalltalk as an introduction to object technology. More particularly, the undergraduate course uses Smalltalk as a first programming language. Distance education can limit the amount and speed of individual feedback that can be given in the early stages of learning. For this reason, particular attention has been paid to characterizing measures for avoiding elementary misconceptions seen in beginning learners. At the same time we also address some misconceptions observed in postgraduate students. The pedagogical issues discussed are of particular importance when devising an extended series of examples for teaching or assessment, or when designing a visual microworld to be used for teaching purposes
    corecore