134 research outputs found

    Containing denial-of-service attacks in broadcast authentication in sensor networks

    Get PDF
    Broadcast authentication is an important application in sensor networks. Public Key Cryptography (PKC) is desirable for this application, but due to the resource constraints on sensor nodes, these operations are expensive, which means sensor networks using PKC are susceptible to Denial of Service (DoS) attacks: attackers keep broadcasting bogus messages, which will incur extra costs, thus exhaust the energy of the honest nodes. In addition, the long time to verify each message using PKC increases the response time of the nodes; it is impractical for the nodes to validate each incoming message before forwarding it. In this paper we discuss this type of DoS attacks, in which the goal of the adversary is to exhaust the energy of the sensor nodes and to increase their response time to broadcast messages. We then present a dynamic window scheme, where sensor nodes determine whether first to verify a message or first to forward the message by themselves. This is made possible with the information such as how far this node is away from the malicious attacker, and how many hops the incoming message has passed. We compare the performance of the proposed scheme with other schemes, and show that it can contain the damage of DoS attacks to only a small portion of the sensor nodes

    STGC-GNNs: A GNN-based traffic prediction framework with a spatial-temporal Granger causality graph

    Full text link
    The key to traffic prediction is to accurately depict the temporal dynamics of traffic flow traveling in a road network, so it is important to model the spatial dependence of the road network. The essence of spatial dependence is to accurately describe how traffic information transmission is affected by other nodes in the road network, and the GNN-based traffic prediction model, as a benchmark for traffic prediction, has become the most common method for the ability to model spatial dependence by transmitting traffic information with the message passing mechanism. However, existing methods model a local and static spatial dependence, which cannot transmit the global-dynamic traffic information (GDTi) required for long-term prediction. The challenge is the difficulty of detecting the precise transmission of GDTi due to the uncertainty of individual transport, especially for long-term transmission. In this paper, we propose a new hypothesis\: GDTi behaves macroscopically as a transmitting causal relationship (TCR) underlying traffic flow, which remains stable under dynamic changing traffic flow. We further propose spatial-temporal Granger causality (STGC) to express TCR, which models global and dynamic spatial dependence. To model global transmission, we model the causal order and causal lag of TCRs global transmission by a spatial-temporal alignment algorithm. To capture dynamic spatial dependence, we approximate the stable TCR underlying dynamic traffic flow by a Granger causality test. The experimental results on three backbone models show that using STGC to model the spatial dependence has better results than the original model for 45 min and 1 h long-term prediction.Comment: 14 pages, 16 figures, 4 table

    Containing denial-of-service attacks in broadcast authentication in sensor networks

    Get PDF
    Broadcast authentication is an important application in sensor networks. Public Key Cryptography (PKC) is desirable for this application, but due to the resource constraints on sensor nodes, these operations are expensive, which means sensor networks using PKC are susceptible to Denial of Service (DoS) attacks: attackers keep broadcasting bogus messages, which will incur extra costs, thus exhaust the energy of the honest nodes. In addition, the long time to verify each message using PKC increases the response time of the nodes; it is impractical for the nodes to validate each incoming message before forwarding it. In this paper we discuss this type of DoS attacks, in which the goal of the adversary is to exhaust the energy of the sensor nodes and to increase their response time to broadcast messages. We then present a dynamic window scheme, where sensor nodes determine whether first to verify a message or first to forward the message by themselves. This is made possible with the information such as how far this node is away from the malicious attacker, and how many hops the incoming message has passed. We compare the performance of the proposed scheme with other schemes, and show that it can contain the damage of DoS attacks to only a small portion of the sensor nodes

    Containing denial-of-service attacks in broadcast authentication in sensor networks

    Get PDF
    Broadcast authentication is an important application in sensor networks. Public Key Cryptography (PKC) is desirable for this application, but due to the resource constraints on sensor nodes, these operations are expensive, which means sensor networks using PKC are susceptible to Denial of Service (DoS) attacks: attackers keep broadcasting bogus messages, which will incur extra costs, thus exhaust the energy of the honest nodes. In addition, the long time to verify each message using PKC increases the response time of the nodes; it is impractical for the nodes to validate each incoming message before forwarding it. In this paper we discuss this type of DoS attacks, in which the goal of the adversary is to exhaust the energy of the sensor nodes and to increase their response time to broadcast messages. We then present a dynamic window scheme, where sensor nodes determine whether first to verify a message or first to forward the message by themselves. This is made possible with the information such as how far this node is away from the malicious attacker, and how many hops the incoming message has passed. We compare the performance of the proposed scheme with other schemes, and show that it can contain the damage of DoS attacks to only a small portion of the sensor nodes

    Effects of transplantation with bone marrow-derived mesenchymal stem cells modified by Survivin on experimental stroke in rats

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>This study was performed to determine whether injury induced by cerebral ischemia could be further improved by transplantation with bone marrow-derived mesenchymal stem cells (MSCs) modified by Survivin (SVV).</p> <p>Methods</p> <p>MSCs derived from bone marrow of male Sprague-Dawley rats were infected by the self-inactive lentiviral vector GCFU carrying green fluorescent protein (GFP) gene and SVV recombinant vector (GCFU-SVV). In vitro, vascular endothelial growth factor (VEGF) and basic fibroblast growth factor (bFGF) were detected in infected MSCs supernatants under hypoxic conditions by ELSIA. In vivo, experiments consisted of three groups, one receiving intravenous injection of 500 μl of phosphate-buffered saline (PBS) without cells (control group) and two groups administered the same volume solution with either three million GFP-MSCs (group GFP) or SVV/GFP-MSCs (group SVV). All animals were submitted to 2-hour middle cerebral artery occlusion (MCAO) and then reperfusion. Differentiation and survival of the transplanted MSCs were determined by confocal microscope. Western blot was used to detect the expression of VEGF and bFGF in ischemic tissue. A 2,3,5-triphenyltetrazolium chloride (TTC) staining was used to assess the infarct volume. Evaluation of neurological function was performed using a modified Neurological Severity Score (mNSS).</p> <p>Results</p> <p>In vitro, modification with SVV further increased secretion of VEGF and bFGF under hypoxic condition. In vivo, only very few transplantated cells co-expressed GFP and NeuN. The survival transplanted cells in the group SVV was 1.3-fold at 4 days after transplantation and 3.4-fold higher at 14 days after transplantation, respectively, when compared with group GFP. Expression of VEGF and bFGF in the ischemic tissue were further up-regulated by modification with SVV. Moreover, modification with SVV further reduced the cerebral infarct volume by 5.2% at 4 days after stroke and improved post-stroke neurological function at 14 days after transplantation.</p> <p>Conclusion</p> <p>Modification with SVV could further enhance the therapeutic effects of MSCs possibly through improving the MSCs survival capacity and up-regulating the expression of protective cytokines in the ischemic tissue.</p

    Maximizing spin-orbit torque efficiency of Ta(O)/Py via modulating oxygen-induced interface orbital hybridization

    Full text link
    Spin-orbit torques due to interfacial Rashba and spin Hall effects have been widely considered as a potentially more efficient approach than the conventional spin-transfer torque to control the magnetization of ferromagnets. We report a comprehensive study of spin-orbit torque efficiency in Ta(O)/Ni81Fe19 bilayers by tuning low-oxidation of \b{eta}-phase tantalum, and find that the spin Hall angle {\theta}DL increases from ~ -0.18 of the pure Ta/Py to the maximum value ~ -0.30 of Ta(O)/Py with 7.8% oxidation. Furthermore, we distinguish the efficiency of the spin-orbit torque generated by the bulk spin Hall effect and by interfacial Rashba effect, respectively, via a series of Py/Cu(0-2 nm)/Ta(O) control experiments. The latter has more than twofold enhancement, and even more significant than that of the former at the optimum oxidation level. Our results indicate that 65% enhancement of the efficiency should be related to the modulation of the interfacial Rashba-like spin-orbit torque due to oxygen-induced orbital hybridization cross the interface. Our results suggest that the modulation of interfacial coupling via oxygen-induced orbital hybridization can be an alternative method to boost the change-spin conversion rate.Comment: 15 pages, 4 figure

    Thickness-dependent magnetic properties in Pt[CoNi]n multilayers with perpendicular magnetic anisotropy

    Full text link
    We systematically investigated the Ni and Co thickness-dependent perpendicular magnetic anisotropy (PMA) coefficient, magnetic domain structures, and magnetization dynamics of Pt(5 nm)/[Co(t_Co nm)/Ni(t_Ni nm)]5/Pt(1 nm) multilayers by combining the four standard magnetic characterization techniques. The magnetic-related hysteresis loops obtained from the field-dependent magnetization M and anomalous Hall resistivity (AHR) \r{ho}_xy found that the two serial multilayers with t_Co = 0.2 and 0.3 nm have the optimum PMA coefficient K_U well as the highest coercivity H_C at the Ni thickness t_Ni = 0.6 nm. Additionally, the magnetic domain structures obtained by Magneto-optic Kerr effect (MOKE) microscopy also significantly depend on the thickness and K_U of the films. Furthermore, the thickness-dependent linewidth of ferromagnetic resonance is inversely proportional to K_U and H_C, indicating that inhomogeneous magnetic properties dominate the linewidth. However, the intrinsic Gilbert damping constant determined by a linear fitting of frequency-dependent linewidth does not depend on Ni thickness and K_U. Our results could help promote the PMA [Co/Ni] multilayer applications in various spintronic and spin-orbitronic devices.Comment: 17 pages, 4 figure

    Total Cerebral Small Vessel Disease Score and Cerebral Bleeding Risk in Patients With Acute Stroke Treated With Intravenous Thrombolysis

    Get PDF
    OBJECTIVE: The aim of this study was to investigate the association of total cerebral small vessel disease (cSVD) score with the risk of intracerebral hemorrhage (ICH) in patients with acute ischemic stroke who received intravenous thrombolysis (IVT) using recombinant tissue-plasminogen activator (rt-PA). METHODS: We retrospectively reviewed clinical data from two stroke registries of patients with acute ischemic stroke treated with IVT. We assessed the baseline magnetic resonance (MR) visible cSVD markers and total cSVD score (ranging from 0 to 4) between patients with and without ICH after IVT. Logistic regression analysis was used to determine the association of total cSVD score with the risk of ICH after IVT, adjusted for cofounders selected by least absolute shrinkage and selection operator (LASSO). We additionally performed an E-value analysis to fully explain away a specific exposure-outcome association. Receiver operating characteristic (ROC) curve analysis was used to quantify the predictive potential of the total cSVD score for any ICH after IVT. RESULTS: Among 271 eligible patients, 55 (20.3%) patients experienced any ICH, 16 (5.9%) patients experienced a symptomatic ICH (sICH), and 5 (1.85%) patients had remote intracranial parenchymal hemorrhage (rPH). Logistic regression analysis showed that the risk of any ICH increased with increasing cSVD score [per unit increase, adjusted odds ratio (OR) 2.03, 95% CI 1.22–3.41, P = 0.007]. Sensitivity analyses using E-value revealed that it would need moderately robust unobserved confounding to render the exposure-outcome (cSVD-any ICH) association null. ROC analysis showed that compared with the National Institutes of Health Stroke Scale (NIHSS) score alone, a combination of cSVD and NIHSS score had a larger area under the curve for any ICH (0.811, 95% CI 0.756–0.866 vs. 0.784, 95% CI 0.723–0.846, P = 0.0004). CONCLUSION: The total cSVD score is associated with an increased risk of any ICH after IVT and improves prediction for any ICH compared with NIHSS alone
    corecore