151 research outputs found

    Trustee: A Trust Management System for Fog-enabled Cyber Physical Systems

    Get PDF
    In this paper, we propose a lightweight trust management system (TMS) for fog-enabled cyber physical systems (Fog-CPS). Trust computation is based on multi-factor and multi-dimensional parameters, and formulated as a statistical regression problem which is solved by employing random forest regression model. Additionally, as the Fog-CPS systems could be deployed in open and unprotected environments, the CPS devices and fog nodes are vulnerable to numerous attacks namely, collusion, self-promotion, badmouthing, ballot-stuffing, and opportunistic service. The compromised entities can impact the accuracy of trust computation model by increasing/decreasing the trust of other nodes. These challenges are addressed by designing a generic trust credibility model which can countermeasures the compromise of both CPS devices and fog nodes. The credibility of each newly computed trust value is evaluated and subsequently adjusted by correlating it with a standard deviation threshold. The standard deviation is quantified by computing the trust in two configurations of hostile environments and subsequently comparing it with the trust value in a legitimate/normal environment. Our results demonstrate that credibility model successfully countermeasures the malicious behaviour of all Fog-CPS entities i.e. CPS devices and fog nodes. The multi-factor trust assessment and credibility evaluation enable accurate and precise trust computation and guarantee a dependable Fog-CPS system

    A Lightweight Attribute-based Security Scheme for Fog-Enabled Cyber Physical Systems

    Get PDF
    In this paper, a lightweight attribute-based security scheme based on elliptic curve cryptography (ECC) is proposed for fog-enabled cyber physical systems (Fog-CPS). A novel aspect of the proposed scheme is that the communication between Fog-CPS entities is secure even when the certification authority (CA) is compromised. This is achieved by dividing the attributes into two sets, namely, secret and shared, and subsequently generating two key pairs, referred to as the partial and final key pairs, for each entity of the Fog-CPS system. Unlike existing attribute-based encryption (ABE) and identity-based encryption schemes, in the proposed scheme, each entity calculates the final public key of the communicating CPS devices without the need of generating and transmitting digital certificates. Moreover, the proposed security scheme considers an efficient and secure key pair update approach in which the calculation overhead is limited to one group element. To show the effectiveness of the proposed scheme, we have calculated and compared the memory and processing complexity with other bilinear and elliptic curve schemes. We have also implemented our scheme in a Raspberry Pi (3B+ model) for CPS simulations. The proposed scheme guarantees the confidentiality, integrity, privacy, and authenticity in Fog-CPS systems

    Outcome of monocular surgery for horizontal strabismus in Hyderabad

    Get PDF
    Sameen A Junejo, Munawar A AnsariLiaquat University of Medical and Health Sciences/Jamshoro, Hyderabad-Sindh, PakistanBackground and objective: Squint surgery is frequently performed successfully in Hyderabad. However, no study in any detail has been performed on the outcome of monocular surgery for horizontal squint in the region. This study aims to determine the results of monocular surgery for horizontal trabismus.Design: Retrospective/observational study.Subjects and methods: The study was conducted on patients aged under 45 years, presenting with horizontal strabismus and undergoing monocular squint surgery. Anterior segment slit lamp examination, and if possible, posterior segment examination with 90 diopter (D) and 78 D fundoscopes was performed. Angle of deviation was measured. Patients were divided into two groups (esotropia and exotropia). Investigations were performed. Surgery was done under general anesthesia. A second surgical procedure was performed after six months for any residual deviations.Results: After squint surgery, patients in group 1 (79%) and in group 2 (73.3%) had residual deviation of less than 15 prism diopters (PD). The preoperative deviations of 60 PD or less illustrated excellent domino effects with residual deviation of fewer than 15 PD. Three patients with successive deviation underwent a second surgery with excellent outcomes.Conclusion: Few extraocular muscles can be prevented due to monocular squint surgery when multiple surgeries are needed.Keywords: horizontal strabismus, monocular surgery, Hyderaba

    Threat modeling for communication security of IoT-enabled digital logistics

    Get PDF
    The modernization of logistics through the use of Wireless Sensor Network (WSN) Internet of Things (IoT) devices promises great efficiencies. Sensor devices can provide real-time or near real-time condition monitoring and location tracking of assets during the shipping process, helping to detect delays, prevent loss, and stop fraud. However, the integration of low-cost WSN/IoT systems into a pre-existing industry should first consider security within the context of the application environment. In the case of logistics, the sensors are mobile, unreachable during the deployment, and accessible in potentially uncontrolled environments. The risks to the sensors include physical damage, either malicious/intentional or unintentional due to accident or the environment, or physical attack on a sensor, or remote communication attack. The easiest attack against any sensor is against its communication. The use of IoT sensors for logistics involves the deployment conditions of mobility, inaccesibility, and uncontrolled environments. Any threat analysis needs to take these factors into consideration. This paper presents a threat model focused on an IoT-enabled asset tracking/monitoring system for smart logistics. A review of the current literature shows that no current IoT threat model highlights logistics-specific IoT security threats for the shipping of critical assets. A general tracking/monitoring system architecture is presented that describes the roles of the components. A logistics-specific threat model that considers the operational challenges of sensors used in logistics, both malicious and non-malicious threats, is then given. The threat model categorizes each threat and suggests a potential countermeasure

    A Secure Integrated Framework for Fog-Assisted Internet of Things Systems

    Get PDF
    Fog-Assisted Internet of Things (Fog-IoT) systems are deployed in remote and unprotected environments, making them vulnerable to security, privacy, and trust challenges. Existing studies propose security schemes and trust models for these systems. However, mitigation of insider attacks, namely blackhole, sinkhole, sybil, collusion, self-promotion, and privilege escalation, has always been a challenge and mostly carried out by the legitimate nodes. Compared to other studies, this paper proposes a framework featuring attribute-based access control and trust-based behavioural monitoring to address the challenges mentioned above. The proposed framework consists of two components, the security component (SC) and the trust management component (TMC). SC ensures data confidentiality, integrity, authentication, and authorization. TMC evaluates Fog-IoT entities’ performance using a trust model based on a set of QoS and network communication features. Subsequently, trust is embedded as an attribute within SC’s access control policies, ensuring that only trusted entities are granted access to fog resources. Several attacking scenarios, namely DoS, DDoS, probing, and data theft are designed to elaborate on how the change in trust triggers the change in access rights and, therefore, validates the proposed integrated framework’s design principles. The framework is evaluated on a Raspberry Pi 3 Model B to benchmark its performance in terms of time and memory complexity. Our results show that both SC and TMC are lightweight and suitable for resource-constrained devices

    Selective subtraction for handheld cameras

    Get PDF
    © 2013 IEEE. Background subtraction techniques model the background of the scene using the stationarity property and classify the scene into two classes namely foreground and background. In doing so, most moving objects become foreground indiscriminately, except in dynamic scenes (such as those with some waving tree leaves, water ripples, or a water fountain), which are typically \u27learned\u27 as part of the background using a large training set of video data. We introduce a novel concept of background as the objects other than the foreground, which may include moving objects in the scene that cannot be learned from a training set because they occur only irregularly and sporadically, e.g. a walking person. We propose a \u27selective subtraction\u27 method as an alternative to standard background subtraction, and show that a reference plane in a scene viewed by two cameras can be used as the decision boundary between foreground and background. In our definition, the foreground may actually occur behind a moving object. Furthermore, the reference plane can be selected in a very flexible manner, using for example the actual moving objects in the scene, if needed. We extend this idea to allow multiple reference planes resulting in multiple foregrounds or backgrounds. We present diverse set of examples to show that: 1) the technique performs better than standard background subtraction techniques without the need for training, camera calibration, disparity map estimation, or special camera configurations; 2) it is potentially more powerful than standard methods because of its flexibility of making it possible to select in real-time what to filter out as background, regardless of whether the object is moving or not, or whether it is a rare event or a frequent one. Furthermore, we show that this technique is relatively immune to camera motion and performs well for hand-held cameras

    Fractional flow reserve vs. angiography in guiding management to optimize outcomes in non-ST-segment elevation myocardial infarction: the British Heart Foundation FAMOUS-NSTEMI randomized trial

    Get PDF
    Aim: We assessed the management and outcomes of non-ST segment elevation myocardial infarction (NSTEMI) patients randomly assigned to fractional flow reserve (FFR)-guided management or angiography-guided standard care. Methods and results: We conducted a prospective, multicentre, parallel group, 1 : 1 randomized, controlled trial in 350 NSTEMI patients with ≥ coronary stenosis ≥30% of the lumen diameter assessed visually (threshold for FFR measurement) (NCT01764334). Enrolment took place in six UK hospitals from October 2011 to May 2013. Fractional flow reserve was disclosed to the operator in the FFR-guided group (n = 176). Fractional flow reserve was measured but not disclosed in the angiography-guided group (n = 174). Fractional flow reserve ≤0.80 was an indication for revascularization by percutaneous coronary intervention (PCI) or coronary artery bypass surgery (CABG). The median (IQR) time from the index episode of myocardial ischaemia to angiography was 3 (2, 5) days. For the primary outcome, the proportion of patients treated initially by medical therapy was higher in the FFR-guided group than in the angiography-guided group [40 (22.7%) vs. 23 (13.2%), difference 95% (95% CI: 1.4%, 17.7%), P = 0.022]. Fractional flow reserve disclosure resulted in a change in treatment between medical therapy, PCI or CABG in 38 (21.6%) patients. At 12 months, revascularization remained lower in the FFR-guided group [79.0 vs. 86.8%, difference 7.8% (−0.2%, 15.8%), P = 0.054]. There were no statistically significant differences in health outcomes and quality of life between the groups. Conclusion: In NSTEMI patients, angiography-guided management was associated with higher rates of coronary revascularization compared with FFR-guided management. A larger trial is necessary to assess health outcomes and cost-effectiveness

    Evaluation of cadmium bioaccumulation and translocation by Hopea odorata grown in a contaminated soil

    Get PDF
    Cadmium (Cd) contamination has an adverse effect on soil productivity and crop production. Phytoremediation is a long term and environmental friendly technology to remediate Cadmium polluted areas. This study was conducted to evaluate the potential of Hopea adorata for remediation of soils contaminated with Cd. Plant seedlings were planted in a clayey soil spiked contaminated with Cd in the amount of 0, 25, 50, 75, 100 and 150 mg kg-1 named as; Cd0, Cd1, Cd2, Cd3, Cd4 and Cd5 for a period of five months. The highest growth performance was recorded in the control (Cd0). Cd concentrations among plant parts were in the following trend: roots>stems>leaves. In order to evaluate the potential of species selected as phytoremediator, three indicators were used namely, bioconcentration factor (BCF, the metal concentration ratio of plant roots to soil), translocation factor (TF, the metal concentration ratio of plant shoots to roots) and removal efficiency (RE, total concentrations of metal and dry biomass of plants to total loaded metal in growth media). The highest total Cd concentration (290.23 ± 13.38 mg kg-1) and Cd removal efficiency (0.81± 0.06%) were found in Cd5 and Cd1, respectively. Cd2 exhibited the maximum total dry biomass (60.88 ± 1.78 g). H. odorata showed high BCFs (>1) and low TFs (<1). It can be concluded that this species is suitable to be used in phytoremediation of Cd-contaminated. For further confirmation, an evaluation under field condition will be needed.Keywords: Phytoremediation, Hopea odorata, heavy metals, soil pollution, removal efficiencyAfrican Journal of Biotechnology Vol. 11(29), pp. 7472-7482, 10 April, 201
    • …
    corecore