12 research outputs found

    Quantum geometric bound and ideal condition for Euler band topology

    Full text link
    Understanding the relationship between quantum geometry and topological invariants is a central problem in the study of topological states. In this work, we establish the relationship between the quantum metric and the Euler curvature in two-dimensional systems with space-time inversion ISTI_{ST} symmetry satisfying IST2=+1I^2_{ST}=+1. As ISTI_{ST} symmetry imposes the reality of the wave function with vanishing Berry curvature, the well-known inequality between the quantum metric and the Berry curvature is not meaningful in this class of systems. We find that the non-abelian quantum geometric tensor of two real bands exhibits an intriguing inequality between the off-diagonal Berry curvature and the quantum metric, which in turn gives the inequality between the quantum volume and the Euler invariant. Moreover, we show that the saturation condition of the inequality is deeply related to the ideal condition for Euler bands, which provides a criterion for the stability of fractional topological phases in interacting Euler bands. Our findings demonstrate the potential of the quantum geometry as a powerful tool for characterizing symmetry-protected topological states and their interaction effect.Comment: 24 pages, 7 figure

    A framework for mitigating zero-day attacks in IoT

    Full text link
    Internet of Things (IoT) aims at providing connectivity between every computing entity. However, this facilitation is also leading to more cyber threats which may exploit the presence of a vulnerability of a period of time. One such vulnerability is the zero-day threat that may lead to zero-day attacks which are detrimental to an enterprise as well as the network security. In this article, a study is presented on the zero-day threats for IoT networks and a context graph-based framework is presented to provide a strategy for mitigating these attacks. The proposed approach uses a distributed diagnosis system for classifying the context at the central service provider as well as at the local user site. Once a potential zero-day attack is identified, a critical data sharing protocol is used to transmit alert messages and reestablish the trust between the network entities and the IoT devices. The results show that the distributed approach is capable of mitigating the zero-day threats efficiently with 33% and 21% improvements in terms of cost of operation and communication overheads, respectively, in comparison with the centralized diagnosis system.Comment: 6 Pages, 6 Figures, Conference on Information Security and Cryptography (CISC-S'17

    An Enhanced LoRaWAN Security Protocol for Privacy Preservation in IoT with a Case Study on a Smart Factory-Enabled Parking System

    No full text
    The Internet of Things (IoT) utilizes algorithms to facilitate intelligent applications across cities in the form of smart-urban projects. As the majority of devices in IoT are battery operated, their applications should be facilitated with a low-power communication setup. Such facility is possible through the Low-Power Wide-Area Network (LPWAN), but at a constrained bit rate. For long-range communication over LPWAN, several approaches and protocols are adopted. One such protocol is the Long-Range Wide Area Network (LoRaWAN), which is a media access layer protocol for long-range communication between the devices and the application servers via LPWAN gateways. However, LoRaWAN comes with fewer security features as a much-secured protocol consumes more battery because of the exorbitant computational overheads. The standard protocol fails to support end-to-end security and perfect forward secrecy while being vulnerable to the replay attack that makes LoRaWAN limited in supporting applications where security (especially end-to-end security) is important. Motivated by this, an enhanced LoRaWAN security protocol is proposed, which not only provides the basic functions of connectivity between the application server and the end device, but additionally averts these listed security issues. The proposed protocol is developed with two options, the Default Option (DO) and the Security-Enhanced Option (SEO). The protocol is validated through Burrows–Abadi–Needham (BAN) logic and the Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. The proposed protocol is also analyzed for overheads through system-based and low-power device-based evaluations. Further, a case study on a smart factory-enabled parking system is considered for its practical application. The results, in terms of network latency with reliability fitting and signaling overheads, show paramount improvements and better performance for the proposed protocol compared with the two handshake options, Pre-Shared Key (PSK) and Elliptic Curve Cryptography (ECC), of Datagram Transport Layer Security (DTLS)

    Double-Layered Polymer Microcapsule Containing Non-Flammable Agent for Initial Fire Suppression

    No full text
    Fire in energy storage systems, such as lithium-ion batteries, has been raised as a serious concern due to the difficulty of suppressing it. Fluorine-based non-flammable agents used as internal substances leaked through the fine pores of the polymer outer shell, leading to a degradation of fire extinguishing performance. To improve the durability of the fire suppression microcapsules and the stability of the ouster shell, a complex coacervation was used, which could be microencapsulated at a lower temperature, and the polymer shell was coated with urea-formaldehyde (UF) resin. The outermost UF resin formed elaborate bonds with the gelatin-based shell, and thus, the structure of the outer shell became denser, thereby improving the loss resistance of the inner substance and thermal stability. The double-layered microcapsules had an average particle diameter of about 309 ÎŒm, and a stable outer shell formed with a mass loss of 0.005% during long-term storage for 100 days. This study confirmed that the double-layered microcapsules significantly improved thermal stability, resistance to core material loss, core material content and fire suppression performance compared to single wall microcapsules. These results indicated that the double-layered structure was suitable for the production of microcapsules for initial fire suppression, including highly volatile non-flammable agents with a low boiling point

    MIH-SPFP: MIH-based secure cross-layer handover protocol for Fast Proxy Mobile IPv6-IoT networks

    No full text
    With the proliferation of mobile devices characterizing modern cyber-physical systems, service switching and handoff over large coverage areas become key aspects of the Internet of Things (IoT), mainly when remotely controlling and interacting with mission-critical autonomous vehicles that potentially may cover quite large distances such as driverless cars and Unmanned Aerial Vehicles (UAVs). These requirements can now be fully satisfied by the widespread Fast handover for Proxy Mobile IPv6 (F-PMIPv6) technology, that can be yet considered as a cornerstone in emerging 5G communications, but, unfortunately, such an approach only supports homogeneous handover, that may result in a nontrivial problem due to the heterogeneity in mobile communications technologies characterizing the available cyber-physical solutions and IoT network access devices. Recently, many researchers developed efficient solutions for the integration of F-PMIPv6 and Media Independent Handover (MIH) to allow fast handover in a highly heterogeneous mobile network. However, these models lack the security features which are necessary to protect IoT devices during handoffs. In this paper, a new security protocol, MIH-based secure cross-layer handover protocol for Fast Proxy Mobile IPv6 networks (MIH-SPFP), is proposed, incorporating the features of Secure Protocol for Fast-PMIPv6 (SPFP) into F-PMIPv6-MIH and reducing the security risks during the handover. The proposed solution also provides low latency by reducing the re-authentication path during the inter-Mobile Access Gateway (MAG) handovers. The security of the proposed protocol has been analyzed by using Burrows–Abadi–Needham (BAN) logic and Automated Validation of Internet Security Protocols and Applications (AVISPA) tool and its performance has been evaluated through numerical simulation by selecting “Marathon Broadcasting” as a case study. Results show that the proposed protocol not only effectively secures the handover process but is also more efficient compared with the standard MIH handover solution

    A Consensus Framework for Reliability and Mitigation of Zero-Day Attacks in IoT

    No full text
    “Internet of Things” (IoT) bridges the communication barrier between the computing entities by forming a network between them. With a common solution for control and management of IoT devices, these networks are prone to all types of computing threats. Such networks may experience threats which are launched by exploitation of vulnerabilities that are left unhandled during the testing phases. These are often termed as “zero-day” vulnerabilities, and their conversion into a network attack is named as “zero-day” attack. These attacks can affect the IoT devices by exploiting the defense perimeter of the network. The existing solutions are capable of detecting such attacks but do not facilitate communication, which affects the performance of the network. In this paper, a consensus framework is proposed for mitigation of zero-day attacks in IoT networks. The proposed approach uses context behavior of IoT devices as a detection mechanism followed by alert message protocol and critical data sharing protocol for reliable communication during attack mitigation. The numerical analysis suggests that the proposed approach can serve the purpose of detection and elimination of zero-day attacks in IoT network without compromising its performance

    Metal nanoparticles decorated PET/PET-TiO2 bi-component filaments by photocatalytic deposition

    No full text
    Gold, silver, and platinum nanoparticles were immobilized on the surface of TiO2 in the sheath part of bi-component filaments. The processes involved include the spinning process used to prepare polyethylene terephthalate (PET)/PET-TiO2 bi-component filaments and the photocatalytic deposition process of gold, silver and platinum nanoparticles. The core part and the sheath part consist of virgin PET and 4 wt.% of TiO2 compounded PET, respectively. The sheath: core ratio of the filament was 50:50. For the photo-deposition of metal nanoparticles, adsorption of the metal ions on the surface of the fabrics was performed by immersing them in AgNO3, HAuCl4, and H2PtCl6 aqueous solutions, with simultaneous addition of methanol as a sacrificial agent. Photo-deposition was then carried out under UV light with an irradiation time of 60 seconds. The structural and antibacterial properties of the bi-component filaments were characterized. The nano-sized noble metal particles in a polka dot form were observed around the surface of the TiO2 particles in sheath region of bi-component filaments after photocatalytic deposition. Ag, Au, and Pt metal photo-deposited fabrics showed excellent antimicrobial effect against the two types of bacteria Staphylococcus aureus and Klebsiella pneumoniae under dark conditions. © The Author(s) 2012 Reprints and permissions: sagepub.co.uk/journalsPermissions.nav.

    Surface Conduction in a Microchannel

    No full text
    Ionic current through a microchannel has drawn significant attention not only for fundamental electrokinetic research but also for the development of novel micro/nanofluidic applications. Among various ion transport mechanisms, surface conduction, which is a predominant mechanism in micro/nanofluidic devices, has been theoretically characterized based on two-dimensional analysis. However, its infinite axis assumption has become a barrier for direct application in practical micro/nanochannel networks. In this work, we conducted rigorous experiments to include all of the three-dimensional length scales. There, <i>L</i>/<i>A</i>, the perimeter to area ratio of the microchannel cross-section, came up as a single parameter to quantitatively interpret the surface conductive ion transportation. Overlimiting conductance of microchannel devices increased with larger perimeter, which is equivalent to specific surface area, even with the same cross sectional area. Finally, a micro/nanofluidic diode with a different <i>L</i>/<i>A</i> value on its forward and reverse channel was demonstrated as a simple application. The analysis presented could provide a practical guideline to design a micro/nanofluidic application
    corecore