71 research outputs found

    Retrieval of displaced dental implant in maxillary sinus by modified Caldwell Luc technique

    Get PDF
    Displacement of dental implants into the maxillary sinus is an uncommon complication during implant placement. Here we present a case report of retrieval of dental implant displaced in the maxillary sinus with modification of Caldwell-Luc technique. A 35-year-old man presented to our institution for replacement of the maxillary right first molar using dental implant. At the point of final tightening of the implant, it suddenly got displaced into the maxillary sinus. The displaced dental implant was retrieved by performing a modification of the Caldwell-Luc technique which utilises gravitational force, saline as a vehicle and a tight-fitting suction tip in the surgically created lateral window. He was also instructed in coughing and sneezing techniques. Medical and dental professionals can utilise this technique effectively when advanced equipment such as endoscopes are not available to retrieve dental implants displaced in the maxillary sinus and it also preserves significant amount of alveolar bone in comparison to the traditional Caldwell Luc techniqu

    A Distributed Approach to Security in Sensornets

    Get PDF
    Abstract ā€” Secure communication is an important aspect of any network and it has largely remained unexplored in wireless sensor networks (WSN). Security becomes a major challenge because of ad-hoc and resource constrained nature of sensor networks. In this paper we present a scalable and distributed security protocol, DSPS, for WSN that fits in between the network and the transport layers. DSPS satisfies the essential requirements of secure communication such as Data Confidentiality, Data Authentication, Data Integrity and Data Freshness. Basic building blocks of our security protocol are Key Generation-Distribution and Signatures. The key is a 56-bit random number generated initially by a key server, which is then securely distributed to all the nodes in the cluster. This key is used for encryption. DSPS also supports security critical transactions by dynamically generating a key, which can be shared between two nodes. The simplicity of DSPS allows compatibility with most of the routing protocols. Keywords-component; wireless sensor networks (WSN); security protocols; I

    An Empirical Study to Investigate the Effect of Air Density Changes on the DSRC Performance

    Get PDF
    The primary role of Intelligent Transportation Systems (ITS) system is to implement Advanced Driver Assistance Services (ADAS) such as pedestrian detection, fog detection and collisions avoidance. These services rely on detecting and communicating the environment conditions such as heavy rain or snow with nearby vehicles to improve the driver\u27s visibility. ITS systems rely on DSRC to communicate this information via a Vehicle-to-Vehicle (V2V) or Vehicle-to-Infrastructure (V2I) communications architectures. DSCR performance may be susceptible to environmental changes such as air density, gravitation (gravitational acceleration), air temperature, atmospheric pressure, humidity, and precipitation. The goal of this research is to investigate whether the DSRC performance persist with respect to air density changes in a foggy environment. Simulation experiments are setup using PreScan to study the influence of changing the air density on the DSRC performance in a foggy environment using V2V communications. The PreScan simulation experiments are carried out over a wide range of air density levels that start from an extremely low value of (0.05 kg/m3), a normal air density level of 1.28 kg/m3 to a high altitude with air density level of (50 kg/m3). The study uses this wide range of air density levels to allow us to determine the influence of the air density on the DSRC performance and explore any performance inconsistency if there is any. The research findings proved that the DSRC performance can persist through air density changes, which helps to make up for lost human visibility on roads during foggy times. This finding aims to promote safe highway operations in foggy conditions

    DSCR Based Sensor-Pooling Protocol for Connected Vehicles in Future Smart Cities

    Get PDF
    Smart cities are racing to create a more connected Intelligent Transportation Systems (ITS) that rely on collecting data from every possible sensor such as a smart utility meter or a smart parking meter. The use of more sensors resulted in generating a lot of information that maps the smart city environment conditions to more real time data points that needed to be shared and analyzed among smart city nodes. One possibility, to carry and share the collected data, is in autonomous vehicles systems, which use the Dedicated Short Range Communications (DSRC) technology. For example, in a Car-to-Parking-Meter or a Vehicle-to-Vehicle (V2V) communications, short-range embedded sensors such as Bluetooth, Cameras, Lidar send the collected data to the vehicleā€™s Electronic Control Unit (ECU) or to a road side gateway for making collaborative decisions and react to the environmentā€™s surrounding conditions. The goal of this research is to develop and test a DSRC based sensor-pooling protocol for vehicles to cooperatively communicate inclement weather or environment conditions. Five simulation experiments are setup using PreScan and Simulink to validate and study the scalability of the proposed solution. PreScan is an automotive simulation platform that is used for developing and testing Advanced Driver Assistance System (ADAS). The research findings proved that the DSRC can be used to effectively stream the short range sensorsā€™ collected data over a long distance communications link

    The Minimum Scheduling Time for Convergecast in Wireless Sensor Networks

    Get PDF
    We study the scheduling problem for data collection from sensor nodes to the sink node in wireless sensor networks, also referred to as the convergecast problem. The convergecast problem in general network topology has been proven to be NP-hard. In this paper, we propose our heuristic algorithm (finding the minimum scheduling time for convergecast (FMSTC)) for general network topology and evaluate the performance by simulation. The results of the simulation showed that the number of time slots to reach the sink node decreased with an increase in the power. We compared the performance of the proposed algorithm to the optimal time slots in a linear network topology. The proposed algorithm for convergecast in a general network topology has 2.27 times more time slots than that of a linear network topology. To the best of our knowledge, the proposed method is the first attempt to apply the optimal algorithm in a linear network topology to a general network topology

    Next-Generation Internet and Communication

    Get PDF

    Applied Mathematics and Algorithms for Cloud Computing and Iot

    Get PDF

    Intrusion-aware Alert Validation Algorithm for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks

    Get PDF
    Existing anomaly and intrusion detection schemes of wireless sensor networks have mainly focused on the detection of intrusions. Once the intrusion is detected, an alerts or claims will be generated. However, any unidentified malicious nodes in the network could send faulty anomaly and intrusion claims about the legitimate nodes to the other nodes. Verifying the validity of such claims is a critical and challenging issue that is not considered in the existing cooperative-based distributed anomaly and intrusion detection schemes of wireless sensor networks. In this paper, we propose a validation algorithm that addresses this problem. This algorithm utilizes the concept of intrusion-aware reliability that helps to provide adequate reliability at a modest communication cost. In this paper, we also provide a security resiliency analysis of the proposed intrusion-aware alert validation algorithm.Comment: 19 pages, 7 figure

    Challenges of Misbehavior Detection in Industrial Wireless Networks

    Get PDF
    In recent years, wireless technologies are increasingly adopted in many application domains that were either unconnected before or exclusively used cable networks. This paradigm shift towards - often ad-hoc - wireless communication has led to significant benefits in terms of flexibility and mobility. Alongside with these benefits, however, arise new attack vectors, which cannot be mitigated by traditional security measures. Hence, mechanisms that are orthogonal to cryptographic security techniques are necessary in order to detect adversaries. In traditional networks, such mechanisms are subsumed under the term "intrusion detection system" and many proposals have been implemented for different application domains. More recently, the term "misbehavior detection" has been coined to encompass detection mechanisms especially for attacks in wireless networks. In this paper, we use industrial wireless networks as an exemplary application domain to discuss new directions and future challenges in detecting insider attacks. To that end, we review existing work on intrusion detection in mobile ad-hoc networks. We focus on physical-layer-based detection mechanisms as these are a particularly interesting research direction that had not been reasonable before widespread use of wireless technology.Peer Reviewe
    • ā€¦
    corecore