1,751 research outputs found

    Exploring placement of intrusion detection systems in rpl-based internet of things

    Full text link
    Intrusion detection is an indispensable part of RPL security due to its nature opening to attacks from insider attackers. While there are a good deal of studies that analyze different types of attack and propose intrusion detection systems based on various techniques that are proposed in the literature, how to place such intrusion detection systems on RPL topology is not investigated. This is the main contribution of this study, and three intrusion detection architectures based on central and distributed placement of intrusion detection nodes are analyzed rigorously against different types of attacks and attackers at various locations in the RPL topology and evaluated from different aspects including their effectiveness, cost, and security.Comment: 15 pages, 5 figures, research articl

    Assessing the Impact of Mobile Attackers on RPL-based Internet of Things

    Full text link
    The Internet of Things (IoT) is becoming ubiquitous in our daily life. IoT networks that are made up of devices low power, low memory, and low computing capability appears in many applications such as healthcare, home, agriculture. IPv6 Routing Protocol for Low Power and Lossy Network (RPL) has become a standardized routing protocol for such low-power and lossy networks in IoT. RPL establishes the best routes between devices according to the requirements of the application, which is achieved by the Objective Function (OF). Even though some security mechanisms are defined for external attackers in its RFC, RPL is vulnerable to attacks coming from inside. Moreover, the same attacks could has different impacts on networks with different OFs. Therefore, an analysis of such attacks becomes important in order to develop suitable security solutions for RPL. This study analyze RPL-specific attacks on networks using RPL's default OFs, namely Objective Function Zero (OF0) and the Minimum Rank with Hysteresis Objective Function (MRHOF). Moreover, mobile attackers could affect more nodes in a network due to their mobility. While the security solutions proposed in the literature assume that the network is static, this study takes into account mobile attackers.Comment: 11 pages,3 figures, Journa

    A Survey of Security in UAVs and FANETs: Issues, Threats, Analysis of Attacks, and Solutions

    Full text link
    Thanks to the rapidly developing technology, unmanned aerial vehicles (UAVs) are able to complete a number of tasks in cooperation with each other without need for human intervention. In recent years, UAVs, which are widely utilized in military missions, have begun to be deployed in civilian applications and mostly for commercial purposes. With their growing numbers and range of applications, UAVs are becoming more and more popular; on the other hand, they are also the target of various threats which can exploit various vulnerabilities of UAV systems in order to cause destructive effects. It is therefore critical that security is ensured for UAVs and the networks that provide communication between UAVs. In this survey, we aimed to present a comprehensive detailed approach to security by classifying possible attacks against UAVs and flying ad hoc networks (FANETs). We classified the security threats into four major categories that make up the basic structure of UAVs; hardware attacks, software attacks, sensor attacks, and communication attacks. In addition, countermeasures against these attacks are presented in separate groups as prevention and detection. In particular, we focus on the security of FANETs, which face significant security challenges due to their characteristics and are also vulnerable to insider attacks. Therefore, this survey presents a review of the security fundamentals for FANETs, and also four different routing attacks against FANETs are simulated with realistic parameters and then analyzed. Finally, limitations and open issues are also discussed to direct future wor

    Attention: there is an inconsistency between android permissions and application metadata!

    Get PDF
    This is an accepted manuscript of an article published by Springer in International Journal of Information Security on 07/01/2021, available online: https://doi.org/10.1007/s10207-020-00536-1 The accepted version of the publication may differ from the final published version.Since mobile applications make our lives easier, there is a large number of mobile applications customized for our needs in the application markets. While the application markets provide us a platform for downloading applications, it is also used by malware developers in order to distribute their malicious applications. In Android, permissions are used to prevent users from installing applications that might violate the users’ privacy by raising their awareness. From the privacy and security point of view, if the functionality of applications is given in sufficient detail in their descriptions, then the requirement of requested permissions could be well-understood. This is defined as description-to-permission fidelity in the literature. In this study, we propose two novel models that address the inconsistencies between the application descriptions and the requested permissions. The proposed models are based on the current state-of-art neural architectures called attention mechanisms. Here, we aim to find the permission statement words or sentences in app descriptions by using the attention mechanism along with recurrent neural networks. The lack of such permission statements in application descriptions creates a suspicion. Hence, the proposed approach could assist in static analysis techniques in order to find suspicious apps and to prioritize apps for more resource intensive analysis techniques. The experimental results show that the proposed approach achieves high accuracy.Published onlin

    Sağlık profesyonellerinin gebelikte şiddet konusundaki farkındalıklarının belirlenmesi

    Get PDF
    Objective: To determine the awareness of medical professionals about violence during pregnancy.Methods: It was conducted in a Maternity Hospital, Izmir between 15th November 2007- 15th January 2008. 120 individuals participate in the research (midwives, nurses, doctors, N=160).Results: All of the participants defined the violence during pregnancy as a health problem and 66.7% of them find themselves adequate to diagnose the symptoms of violence. Answers for the physical and psychological findings of violence were; 72.5% think of abuse when they see a bruise, bump or wound on pregnant women's body, 50.8%  don't think of abuse in case of insomnia complaint. Answers for pregnancy complications of violence were: 61.7% "sometimes" think of abuse in pregnant women who applied for preterm birth and 59.2%  don't think of abuse when fetus growth retardation is determined. Answers for questions about affectless use of healthy life behaviors of violence were; 55.0% "sometimes" think of abuse in pregnant women who applied for abortion and 60.8% don't think of abuse in the presence of genital infections in pregnant women.Conclusion: Medical professionals have problems in diagnosing the violence during pregnancy and perceive violence as a health problem; insufficient action is taken against violence cases.Amaç: Sağlık profesyonellerinin gebelikte uygulanan şiddet konusundaki farkındalıklarını belirlemek amacıyla yapılmış bir araştırmadır.Yöntemler: Araştırma 15 Kasım 2007- 15 Ocak 2008 tarihleri arasında İzmir'deki bir Doğum Hastanesinde çalışan tüm ebe, hemşire ve hekimlere (N=160) uygulanmıştır. Araştırmaya katılmayı kabul eden toplam 120 kişiye ulaşılmıştır.Bulgular: Sağlık profesyonellerinin tamamı gebelikte şiddeti bir sağlık sorunu olarak tanımlamakta ve %66.7'si şiddet belirtilerini tanılamada kendilerini yeterli görmektedirler. Şiddetin fiziksel ve psikolojik bulgularına yönelik tanılama sorularından;  gebelerin vücudunda morluk, şişlik, çürük ve yara gördüğünde istismarı düşünenlerin oranı %72.5 iken, uykusuzluk şikâyeti olması durumunda istismarı düşünmeyenlerin oranı %50.8 dir. Şiddetin gebelik komplikasyonu bulgularına yönelik tanılama sorularından; erken doğum nedeniyle başvuran gebelerde "bazen" istismarı düşünenlerin oranı %61.7 iken, fetüste büyüme gelişme geriliği saptandığında istismarı düşünmeyenlerin oranı %59.2 dir. Şiddetin sağlıklı yaşam davranışlarının etkisiz kullanımına yönelik tanılama sorularından; küretaj nedeniyle başvuran gebelerde "bazen" istismarı düşünenlerin oranı %55.0 iken, genital enfeksiyon varlığında gebelerde istismarı düşünmeyenlerin oranı % 60.8  dir.Sonuç: Sağlık profesyonellerinin gebelikteki şiddeti tanılamada problemler yaşadıkları ve şiddeti sağlık problemi olarak görmelerine rağmen şiddet olgularına yeterli ölçüde müdahale edemedikleri saptanmıştır

    Total Aortic Arch Replacement: Superior Ventriculo-Arterial Coupling with Decellularized Allografts Compared with Conventional Prostheses.

    Get PDF
    BACKGROUND: To date, no experimental or clinical study provides detailed analysis of vascular impedance changes after total aortic arch replacement. This study investigated ventriculoarterial coupling and vascular impedance after replacement of the aortic arch with conventional prostheses vs. decellularized allografts. METHODS: After preparing decellularized aortic arch allografts, their mechanical, histological and biochemical properties were evaluated and compared to native aortic arches and conventional prostheses in vitro. In open-chest dogs, total aortic arch replacement was performed with conventional prostheses and compared to decellularized allografts (n = 5/group). Aortic flow and pressure were recorded continuously, left ventricular pressure-volume relations were measured by using a pressure-conductance catheter. From the hemodynamic variables end-systolic elastance (Ees), arterial elastance (Ea) and ventriculoarterial coupling were calculated. Characteristic impedance (Z) was assessed by Fourier analysis. RESULTS: While Ees did not differ between the groups and over time (4.1+/-1.19 vs. 4.58+/-1.39 mmHg/mL and 3.21+/-0.97 vs. 3.96+/-1.16 mmHg/mL), Ea showed a higher increase in the prosthesis group (4.01+/-0.67 vs. 6.18+/-0.20 mmHg/mL, P<0.05) in comparison to decellularized allografts (5.03+/-0.35 vs. 5.99+/-1.09 mmHg/mL). This led to impaired ventriculoarterial coupling in the prosthesis group, while it remained unchanged in the allograft group (62.5+/-50.9 vs. 3.9+/-23.4%). Z showed a strong increasing tendency in the prosthesis group and it was markedly higher after replacement when compared to decellularized allografts (44.6+/-8.3dyn.sec.cm-5 vs. 32.4+/-2.0dyn.sec.cm-5, P<0.05). CONCLUSIONS: Total aortic arch replacement leads to contractility-afterload mismatch by means of increased impedance and invert ventriculoarterial coupling ratio after implantation of conventional prostheses. Implantation of decellularized allografts preserves vascular impedance thereby improving ventriculoarterial mechanoenergetics after aortic arch replacement

    Juxtaposing BTE and ATE – on the role of the European insurance industry in funding civil litigation

    Get PDF
    One of the ways in which legal services are financed, and indeed shaped, is through private insurance arrangement. Two contrasting types of legal expenses insurance contracts (LEI) seem to dominate in Europe: before the event (BTE) and after the event (ATE) legal expenses insurance. Notwithstanding institutional differences between different legal systems, BTE and ATE insurance arrangements may be instrumental if government policy is geared towards strengthening a market-oriented system of financing access to justice for individuals and business. At the same time, emphasizing the role of a private industry as a keeper of the gates to justice raises issues of accountability and transparency, not readily reconcilable with demands of competition. Moreover, multiple actors (clients, lawyers, courts, insurers) are involved, causing behavioural dynamics which are not easily predicted or influenced. Against this background, this paper looks into BTE and ATE arrangements by analysing the particularities of BTE and ATE arrangements currently available in some European jurisdictions and by painting a picture of their respective markets and legal contexts. This allows for some reflection on the performance of BTE and ATE providers as both financiers and keepers. Two issues emerge from the analysis that are worthy of some further reflection. Firstly, there is the problematic long-term sustainability of some ATE products. Secondly, the challenges faced by policymakers that would like to nudge consumers into voluntarily taking out BTE LEI

    Penilaian Kinerja Keuangan Koperasi di Kabupaten Pelalawan

    Full text link
    This paper describe development and financial performance of cooperative in District Pelalawan among 2007 - 2008. Studies on primary and secondary cooperative in 12 sub-districts. Method in this stady use performance measuring of productivity, efficiency, growth, liquidity, and solvability of cooperative. Productivity of cooperative in Pelalawan was highly but efficiency still low. Profit and income were highly, even liquidity of cooperative very high, and solvability was good

    Differential cross section measurements for the production of a W boson in association with jets in proton–proton collisions at √s = 7 TeV

    Get PDF
    Measurements are reported of differential cross sections for the production of a W boson, which decays into a muon and a neutrino, in association with jets, as a function of several variables, including the transverse momenta (pT) and pseudorapidities of the four leading jets, the scalar sum of jet transverse momenta (HT), and the difference in azimuthal angle between the directions of each jet and the muon. The data sample of pp collisions at a centre-of-mass energy of 7 TeV was collected with the CMS detector at the LHC and corresponds to an integrated luminosity of 5.0 fb[superscript −1]. The measured cross sections are compared to predictions from Monte Carlo generators, MadGraph + pythia and sherpa, and to next-to-leading-order calculations from BlackHat + sherpa. The differential cross sections are found to be in agreement with the predictions, apart from the pT distributions of the leading jets at high pT values, the distributions of the HT at high-HT and low jet multiplicity, and the distribution of the difference in azimuthal angle between the leading jet and the muon at low values.United States. Dept. of EnergyNational Science Foundation (U.S.)Alfred P. Sloan Foundatio
    corecore