187 research outputs found

    A Complete Hierarchical Key Management Scheme for Heterogeneous Wireless Sensor Networks

    Get PDF
    Heterogeneous cluster-based wireless sensor networks (WSN) attracted increasing attention recently. Obviously, the clustering makes the entire networks hierarchical; thus, several kinds of keys are required for hierarchical network topology. However, most existing key management schemes for it place more emphasis on pairwise key management schemes or key predistribution schemes and neglect the property of hierarchy. In this paper, we propose a complete hierarchical key management scheme which only utilizes symmetric cryptographic algorithms and low cost operations for heterogeneous cluster-based WSN. Our scheme considers four kinds of keys, which are an individual key, a cluster key, a master key, and pairwise keys, for each sensor node. Finally, the analysis and experiments demonstrate that the proposed scheme is secure and efficient; thus, it is suitable for heterogeneous cluster-based WSN

    Study of Admission Control Methods for IPTV Services

    Get PDF
    The paper deals with admission control methods used in Internet Protocol (IP) Multimedia Subsystem. The purpose of implementing AC methods in IP Multimedia Subsystem (IMS) is to control the access of incoming connections to network resources. At the Institute of Telecommunications, we have built an experimental laboratory, which is used to test these methods. In this paper, we focus on Internet Protocol Television (IPTV) services; therefore, we have created a variable bit-rate IPTV traffic generator that is used as the input to the network, so we can test the behavior of selected AC methods. They are implemented in a simulated IPTV service provider access network, so we can examine the effects of variable bit-rate IPTV streams on the decisions made by those methods. To calculate the required bandwidth of an input stream, two simulation scenarios with different number of input packets were performed. One of these AC methods was modified where the peak input rate parameter of an IPTV stream was replaced by the average bit-rate of this stream. At the end of this paper, we discuss the achieved results

    A Provably Secure Revocable ID-Based Authenticated Group Key Exchange Protocol with Identifying Malicious Participants

    Get PDF
    The existence of malicious participants is a major threat for authenticated group key exchange (AGKE) protocols. Typically, there are two detecting ways (passive and active) to resist malicious participants in AGKE protocols. In 2012, the revocable identity- (ID-) based public key system (R-IDPKS) was proposed to solve the revocation problem in the ID-based public key system (IDPKS). Afterwards, based on the R-IDPKS, Wu et al. proposed a revocable ID-based AGKE (RID-AGKE) protocol, which adopted a passive detecting way to resist malicious participants. However, it needs three rounds and cannot identify malicious participants. In this paper, we fuse a noninteractive confirmed computation technique to propose the first two-round RID-AGKE protocol with identifying malicious participants, which is an active detecting way. We demonstrate that our protocol is a provably secure AGKE protocol with forward secrecy and can identify malicious participants. When compared with the recently proposed ID/RID-AGKE protocols, our protocol possesses better performance and more robust security properties

    High efficiency silicon nanodisk laser based on colloidal CdSe/ZnS QDs

    Get PDF
    Using colloidal CdSe/ZnS quantum dots in the submicron-sized silicon disk cavity, we have developed a visible wavelength nanodisk laser that operates under extremely low threshold power at room temperature. Time-resolved photoluminescence (PL) of QDs; nanodisk by e-beam lithography. Observation of lasing action at 594 nm wavelength for quantum dots on a nanodisk (750 nm in diameter) cavity and an ultra-low threshold of 2.8 µW. From QD concentration dependence studies we achieved nearly sevenfold increase in spontaneous emission (SE) rate. We have achieved high efficient and high SE coupling rate in such a QD nanodisk laser

    A brief review of revocable ID-based public key cryptosystem

    Get PDF
    SummaryThe design of ID-based cryptography has received much attention from researchers. However, how to revoke the misbehaviour/compromised user in ID-based public key cryptosystem becomes an important research issue. Recently, Tseng and Tsai proposed a novel public key cryptosystem called revocable ID-based public key cryptosystem (RIBE) to solve the revocation problem. Later on, numerous research papers based on the Tseng-Tsai key RIBE were proposed. In this paper, we brief review Tseng and Tsai's RIBE. We hope this review can help the readers to understand the Tseng and Tsai's revocable ID-based public key cryptosystem

    Simulation of 2D Free-surface Potential Flows Using a Robust Local Polynomial Collocation Method

    Get PDF
    Abstract In this paper a mesh-free numerical model for simulating 2D free-surface potential flows is established. A Lagrangian time-marching scheme is chosen for the boundary conditions of the moving and deforming free surface while a local polynomial collocation method is applied for solving the Laplace equation at each time step. The collocation method is developed in a way that the governing equation is satisfied on boundaries as well as boundary conditions. At any free surface node, this gives accurate estimation of the derivatives of velocity potential, which represent components of the velocity vector at that specific node. Therefore, trajectories of the free surface nodes can be predicted precisely. The numerical model is applied to the simulation of free surface waves in the liquid sloshing of a swaying tank. Present model is verified by comparing the numerical results with experimental data. Fairly good agreements are observed

    Risk factors and outcomes of carbapenem-nonsusceptible Escherichia coli bacteremia: A matched case–control study

    Get PDF
    BackgroundInfections due to carbapenem-resistant Enterobacteriaceae have been the emerging problem worldwide. This primary object of this study was to understand the risk factors and clinical outcomes of carbapenem-nonsusceptible Escherichia coli (CNSEc) bacteremia.MethodsWe conducted a matched case–control study in a 3,715-bed tertiary care medical center in northern Taiwan. The controls were selected among patients with carbapenem-susceptible E coli and were matched with CNSEc for bacteremia.ResultsFifty-one patients were included in this study (17 cases and 34 controls). Bivariate analysis showed that prior exposure to carbapenems (p<0.001), stay in intensive care units (p=0.016), placement of central venous catheters (p=0.001), chronic liver diseases (p<0.001), uremia with regular dialysis (p=0.004), and mechanical ventilation (p=0.004) were associated with CNSEc bacteremia. Multivariate analysis revealed that prior exposure to carbapenems [odds ratio (OR), 29.17; 95% confidence interval (CI), 1.76–484.70; p=0.019], uremia with regular dialysis (OR, 98.58; 95% CI, 4.02–999; p=0.005) and chronic liver diseases (OR, 27.86; 95% CI, 2.31–335.83; p=0.009) were independent risk factors for CNSEc bacteremia. Compared with carbapenem-susceptible E coli group, CNSEc group had a longer hospital stay (68.4 days vs. 35.8 days; p=0.04) and a higher disease severity, as indicated by a Pittsburgh bacteremia score greater than or equal to 4 (5.6% vs. 2.5%; p=0.015). Patients with CNSEc bacteremia had a higher overall in-hospital mortality rate (94.12% vs. 50.00%; p=0.002), but there was no difference in the 28-day mortality between these two groups.ConclusionsCNSEc bacteremia would lead to a poor outcome among patients with prior exposure to carbapenems, chronic liver disease, and uremia with regular dialysis

    Relationship of teicoplanin MICs to treatment failure in teicoplanin-treated patients with methicillin-resistant Staphylococcus aureus pneumonia

    Get PDF
    Background/PurposeThe objective of this study was to determine the predictive value of teicoplanin minimal inhibitory concentrations (MICs) for treatment failure among patients with methicillin-resistant Staphylococcus aureus (MRSA) pneumonia.MethodsIn this study, all patients with ≥1 tracheal aspirates or sputum cultures positive for MRSA admitted to the hospital between April 2011 and September 2011 were reviewed. We enrolled patients who are ≥18 years of age, with a diagnosis of pneumonia, and with a receipt of teicoplanin therapy throughout the course. The relationship between teicoplanin Etest MICs and treatment outcomes of MRSA pneumonia was analyzed to identify the breakpoint of teicoplanin MICs influencing treatment outcomes.ResultsOf the 80 patients enrolled, 31 had a lower teicoplanin MIC level (<2.0 mg/L) and 49 had a higher MIC level (≥2.0 mg/L) for MRSA. The lower MIC group had a higher clinical resolution rate in 14 days [24 (77.4%) vs. 23 (46.9%), p = 0.007] and a lower treatment failure rate at the end of teicoplanin treatment [4 (12.9%) vs. 18 (36.7%), p = 0.020]. A comparison between the treatment success and failure groups showed that the former had a longer duration of teicoplanin use (18.76 ± 10.34vs.12.41 ± 5.65 days; p = 0.014). Results of a multivariate analysis showed that teicoplanin MICs ≥ 2.0 mg/Land shorter duration of teicoplanin therapy were independent risk factors for treatment failure.ConclusionA higher teicoplanin MIC value (≥2.0 mg/L) may predict the treatment failure among patients with teicoplanin-treated MRSA pneumonia
    corecore