78 research outputs found

    An Energy-driven Network Function Virtualization for Multi-domain Software Defined Networks

    Full text link
    Network Functions Virtualization (NFV) in Software Defined Networks (SDN) emerged as a new technology for creating virtual instances for smooth execution of multiple applications. Their amalgamation provides flexible and programmable platforms to utilize the network resources for providing Quality of Service (QoS) to various applications. In SDN-enabled NFV setups, the underlying network services can be viewed as a series of virtual network functions (VNFs) and their optimal deployment on physical/virtual nodes is considered a challenging task to perform. However, SDNs have evolved from single-domain to multi-domain setups in the recent era. Thus, the complexity of the underlying VNF deployment problem in multi-domain setups has increased manifold. Moreover, the energy utilization aspect is relatively unexplored with respect to an optimal mapping of VNFs across multiple SDN domains. Hence, in this work, the VNF deployment problem in multi-domain SDN setup has been addressed with a primary emphasis on reducing the overall energy consumption for deploying the maximum number of VNFs with guaranteed QoS. The problem in hand is initially formulated as a "Multi-objective Optimization Problem" based on Integer Linear Programming (ILP) to obtain an optimal solution. However, the formulated ILP becomes complex to solve with an increasing number of decision variables and constraints with an increase in the size of the network. Thus, we leverage the benefits of the popular evolutionary optimization algorithms to solve the problem under consideration. In order to deduce the most appropriate evolutionary optimization algorithm to solve the considered problem, it is subjected to different variants of evolutionary algorithms on the widely used MOEA framework (an open source java framework based on multi-objective evolutionary algorithms).Comment: Accepted for publication in IEEE INFOCOM 2019 Workshop on Intelligent Cloud Computing and Networking (ICCN 2019

    A Lightweight and Privacy-Preserving Authentication Protocol for Mobile Edge Computing

    Get PDF
    With the advent of the Internet-of-Things (IoT), vehicular networks and cyber-physical systems, the need for real-time data processing and analysis has emerged as an essential pre-requite for customers' satisfaction. In this direction, Mobile Edge Computing (MEC) provides seamless services with reduced latency, enhanced mobility, and improved location awareness. Since MEC has evolved from Cloud Computing, it inherited numerous security and privacy issues from the latter. Further, decentralized architectures and diversified deployment environments used in MEC platforms also aggravate the problem; causing great concerns for the research fraternity. Thus, in this paper, we propose an efficient and lightweight mutual authentication protocol for MEC environments; based on Elliptic Curve Cryptography (ECC), one-way hash functions and concatenation operations. The designed protocol also leverages the advantages of discrete logarithm problems, computational Diffie-Hellman, random numbers and time-stamps to resist various attacks namely-impersonation attacks, replay attacks, man-in-the-middle attacks, etc. The paper also presents a comparative assessment of the proposed scheme relative to the current state-of-the-art schemes. The obtained results demonstrate that the proposed scheme incurs relatively less communication and computational overheads, and is appropriate to be adopted in resource constraint MEC environments.Comment: To appear in IEEE GLOBECOM 201

    Evidence of Metasomatism in the Lowest Petrographic Types Inferred from A Na(-), K, Rich Rim Around A LEW 86018 (L3.1) Chondrule

    Get PDF
    Ordinary chondrites (OCs) represent the most abundant extraterrestrial materials and also record the widest range of alteration of primary, pristine minerals of early Solar system material available for study. Relatively few investigations, however, address: (1) the role of fluid alteration, and (2) the relationship between thermal metamorphism and metasomatism in OCs, issues that have been extensively studied in many other meteorite groups e.g., CV, CO, CR, and enstatite chondrites. Detailed elemental abundances profiles across individual chondrules, and mineralogical studies of Lewis Hills (LEW) 86018 (L3.1), an unequilibrated ordinary chondrite (UOC) of low petrographic type of 3.1 returned from Antarctica, provide evidence of extensive alteration of primary minerals. Some chondrules have Na(-), K(-), rich rims surrounded by nepheline, albite, and sodalite-like Na(-), Cl(-), Al-rich secondary minerals in the near vicinity within the matrices. Although, limited evidences of low temperature (approximately 250 C) fluid-assisted alteration of primary minerals to phyllosilicates, ferroanolivine, magnetite, and scapolite have been reported in the lowest grades (less than 3.2) Semarkona (LL3.00) and Bishunpur (LL3.10), alkali-rich secondary mineralization has previously only been seen in higher grade greater than 3.4 UOCs. This preliminary result suggests highly localized metamorphism in UOCs and widens the range of alteration in UOCs and complicates classification of petrographic type and extent of thermal metamorphism or metasomatism. The work in progress will document the micro-textures, geochemistry (Ba, Ca, REE), and isotopic composition (oxygen, Al(-)- 26 Mg-26) of mineral phases in chondrules and adjoining objects to help us understand the formation scenario and delineate possible modes of metamorphism in UOCs

    LiSA: A Lightweight and Secure Authentication Mechanism for Smart Metering Infrastructure

    Full text link
    Smart metering infrastructure (SMI) is the core component of the smart grid (SG) which enables two-way communication between consumers and utility companies to control, monitor, and manage the energy consumption data. Despite their salient features, SMIs equipped with information and communication technology are associated with new threats due to their dependency on public communication networks. Therefore, the security of SMI communications raises the need for robust authentication and key agreement primitives that can satisfy the security requirements of the SG. Thus, in order to realize the aforementioned issues, this paper introduces a lightweight and secure authentication protocol, "LiSA", primarily to secure SMIs in SG setups. The protocol employs Elliptic Curve Cryptography at its core to provide various security features such as mutual authentication, anonymity, replay protection, session key security, and resistance against various attacks. Precisely, LiSA exploits the hardness of the Elliptic Curve Qu Vanstone (EVQV) certificate mechanism along with Elliptic Curve Diffie Hellman Problem (ECDHP) and Elliptic Curve Discrete Logarithm Problem (ECDLP). Additionally, LiSA is designed to provide the highest level of security relative to the existing schemes with least computational and communicational overheads. For instance, LiSA incurred barely 11.826 ms and 0.992 ms for executing different passes across the smart meter and the service providers. Further, it required a total of 544 bits for message transmission during each session.Comment: To appear in IEEE Globecom 201

    Conditional disruption of interactions between Gαi2 and regulator of G protein signaling (RGS) proteins protects the heart from ischemic injury

    Get PDF
    Abstract Background Regulator of G protein signaling (RGS) proteins suppress G protein coupled receptor signaling by catalyzing the hydrolysis of Gα-bound guanine nucleotide triphosphate. Transgenic mice in which RGS-mediated regulation of Gαi2 is lost (RGS insensitive Gαi2 G184S) exhibit beneficial (protection against ischemic injury) and detrimental (enhanced fibrosis) cardiac phenotypes. This mouse model has revealed the physiological significance of RGS/Gαi2 interactions. Previous studies of the Gαi2 G184S mutation used mice that express this mutant protein throughout their lives. Thus, it is unclear whether these phenotypes result from chronic or acute Gαi2 G184S expression. We addressed this issue by developing mice that conditionally express Gαi2 G184S. Methods Mice that conditionally express RGS insensitive Gαi2 G184S were generated using a floxed minigene strategy. Conditional expression of Gαi2 G184S was characterized by reverse transcription polymerase chain reaction and by enhancement of agonist-induced inhibition of cAMP production in isolated cardiac fibroblasts. The impact of conditional RGS insensitive Gαi2 G184S expression on ischemic injury was assessed by measuring contractile recovery and infarct sizes in isolated hearts subjected to 30 min ischemia and 2 hours reperfusion. Results We demonstrate tamoxifen-dependent expression of Gαi2 G184S, enhanced inhibition of cAMP production, and cardioprotection from ischemic injury in hearts conditionally expressing Gαi2 G184S. Thus the cardioprotective phenotype previously reported in mice expressing Gαi2 G184S does not require embryonic or chronic Gαi2 G184S expression. Rather, cardioprotection occurs following acute (days rather than months) expression of Gαi2 G184S. Conclusions These data suggest that RGS proteins might provide new therapeutic targets to protect the heart from ischemic injury. We anticipate that this model will be valuable for understanding the time course (chronic versus acute) and mechanisms of other phenotypic changes that occur following disruption of interactions between Gαi2 and RGS proteins.http://deepblue.lib.umich.edu/bitstream/2027.42/109553/1/40360_2014_Article_315.pd

    Isolation and characterization of IgM from Bengal goat blood serum

    Get PDF
    ABSTRACT Isolation of IgM from Bengal goat blood serum was carried out by centrifugation of the collected serum to eliminate the blood corpuscles and purity of serum was affirmed by the absence of pellets. Purified serum was obtained by ammonium sulphate precipitation. The isolated IgM obtained through dialysis, was quantified through silica gel chromatography using phosphate buffer saline (PBS) as a solvent with varied pH and obtained different fractions (namely I, II, III, IV and V). Quantification of protein was carried out by Lowry method and the molecular weight was determined by SDS-PAGE with a standard marker. The presence of IgM was confirmed by Immunodiffusion and Immuno Dot Blot. The results of the experiment suggest that Fractions I, II and III contain more stressed protein which has some similarity with ovalbumin. The resulting colour intensity obtained on performing Immuno Dot Blot using IgM as primary antibody, demonstrates that Fraction II contains maximum concentration of stressed protein
    • …
    corecore