78 research outputs found
An Energy-driven Network Function Virtualization for Multi-domain Software Defined Networks
Network Functions Virtualization (NFV) in Software Defined Networks (SDN)
emerged as a new technology for creating virtual instances for smooth execution
of multiple applications. Their amalgamation provides flexible and programmable
platforms to utilize the network resources for providing Quality of Service
(QoS) to various applications. In SDN-enabled NFV setups, the underlying
network services can be viewed as a series of virtual network functions (VNFs)
and their optimal deployment on physical/virtual nodes is considered a
challenging task to perform. However, SDNs have evolved from single-domain to
multi-domain setups in the recent era. Thus, the complexity of the underlying
VNF deployment problem in multi-domain setups has increased manifold. Moreover,
the energy utilization aspect is relatively unexplored with respect to an
optimal mapping of VNFs across multiple SDN domains. Hence, in this work, the
VNF deployment problem in multi-domain SDN setup has been addressed with a
primary emphasis on reducing the overall energy consumption for deploying the
maximum number of VNFs with guaranteed QoS. The problem in hand is initially
formulated as a "Multi-objective Optimization Problem" based on Integer Linear
Programming (ILP) to obtain an optimal solution. However, the formulated ILP
becomes complex to solve with an increasing number of decision variables and
constraints with an increase in the size of the network. Thus, we leverage the
benefits of the popular evolutionary optimization algorithms to solve the
problem under consideration. In order to deduce the most appropriate
evolutionary optimization algorithm to solve the considered problem, it is
subjected to different variants of evolutionary algorithms on the widely used
MOEA framework (an open source java framework based on multi-objective
evolutionary algorithms).Comment: Accepted for publication in IEEE INFOCOM 2019 Workshop on Intelligent
Cloud Computing and Networking (ICCN 2019
A Lightweight and Privacy-Preserving Authentication Protocol for Mobile Edge Computing
With the advent of the Internet-of-Things (IoT), vehicular networks and
cyber-physical systems, the need for real-time data processing and analysis has
emerged as an essential pre-requite for customers' satisfaction. In this
direction, Mobile Edge Computing (MEC) provides seamless services with reduced
latency, enhanced mobility, and improved location awareness. Since MEC has
evolved from Cloud Computing, it inherited numerous security and privacy issues
from the latter. Further, decentralized architectures and diversified
deployment environments used in MEC platforms also aggravate the problem;
causing great concerns for the research fraternity. Thus, in this paper, we
propose an efficient and lightweight mutual authentication protocol for MEC
environments; based on Elliptic Curve Cryptography (ECC), one-way hash
functions and concatenation operations. The designed protocol also leverages
the advantages of discrete logarithm problems, computational Diffie-Hellman,
random numbers and time-stamps to resist various attacks namely-impersonation
attacks, replay attacks, man-in-the-middle attacks, etc. The paper also
presents a comparative assessment of the proposed scheme relative to the
current state-of-the-art schemes. The obtained results demonstrate that the
proposed scheme incurs relatively less communication and computational
overheads, and is appropriate to be adopted in resource constraint MEC
environments.Comment: To appear in IEEE GLOBECOM 201
Evidence of Metasomatism in the Lowest Petrographic Types Inferred from A Na(-), K, Rich Rim Around A LEW 86018 (L3.1) Chondrule
Ordinary chondrites (OCs) represent the most abundant extraterrestrial materials and also record the widest range of alteration of primary, pristine minerals of early Solar system material available for study. Relatively few investigations, however, address: (1) the role of fluid alteration, and (2) the relationship between thermal metamorphism and metasomatism in OCs, issues that have been extensively studied in many other meteorite groups e.g., CV, CO, CR, and enstatite chondrites. Detailed elemental abundances profiles across individual chondrules, and mineralogical studies of Lewis Hills (LEW) 86018 (L3.1), an unequilibrated ordinary chondrite (UOC) of low petrographic type of 3.1 returned from Antarctica, provide evidence of extensive alteration of primary minerals. Some chondrules have Na(-), K(-), rich rims surrounded by nepheline, albite, and sodalite-like Na(-), Cl(-), Al-rich secondary minerals in the near vicinity within the matrices. Although, limited evidences of low temperature (approximately 250 C) fluid-assisted alteration of primary minerals to phyllosilicates, ferroanolivine, magnetite, and scapolite have been reported in the lowest grades (less than 3.2) Semarkona (LL3.00) and Bishunpur (LL3.10), alkali-rich secondary mineralization has previously only been seen in higher grade greater than 3.4 UOCs. This preliminary result suggests highly localized metamorphism in UOCs and widens the range of alteration in UOCs and complicates classification of petrographic type and extent of thermal metamorphism or metasomatism. The work in progress will document the micro-textures, geochemistry (Ba, Ca, REE), and isotopic composition (oxygen, Al(-)- 26 Mg-26) of mineral phases in chondrules and adjoining objects to help us understand the formation scenario and delineate possible modes of metamorphism in UOCs
LiSA: A Lightweight and Secure Authentication Mechanism for Smart Metering Infrastructure
Smart metering infrastructure (SMI) is the core component of the smart grid
(SG) which enables two-way communication between consumers and utility
companies to control, monitor, and manage the energy consumption data. Despite
their salient features, SMIs equipped with information and communication
technology are associated with new threats due to their dependency on public
communication networks. Therefore, the security of SMI communications raises
the need for robust authentication and key agreement primitives that can
satisfy the security requirements of the SG. Thus, in order to realize the
aforementioned issues, this paper introduces a lightweight and secure
authentication protocol, "LiSA", primarily to secure SMIs in SG setups. The
protocol employs Elliptic Curve Cryptography at its core to provide various
security features such as mutual authentication, anonymity, replay protection,
session key security, and resistance against various attacks. Precisely, LiSA
exploits the hardness of the Elliptic Curve Qu Vanstone (EVQV) certificate
mechanism along with Elliptic Curve Diffie Hellman Problem (ECDHP) and Elliptic
Curve Discrete Logarithm Problem (ECDLP). Additionally, LiSA is designed to
provide the highest level of security relative to the existing schemes with
least computational and communicational overheads. For instance, LiSA incurred
barely 11.826 ms and 0.992 ms for executing different passes across the smart
meter and the service providers. Further, it required a total of 544 bits for
message transmission during each session.Comment: To appear in IEEE Globecom 201
Conditional disruption of interactions between Gαi2 and regulator of G protein signaling (RGS) proteins protects the heart from ischemic injury
Abstract
Background
Regulator of G protein signaling (RGS) proteins suppress G protein coupled receptor signaling by catalyzing the hydrolysis of Gα-bound guanine nucleotide triphosphate. Transgenic mice in which RGS-mediated regulation of Gαi2 is lost (RGS insensitive Gαi2
G184S) exhibit beneficial (protection against ischemic injury) and detrimental (enhanced fibrosis) cardiac phenotypes. This mouse model has revealed the physiological significance of RGS/Gαi2 interactions. Previous studies of the Gαi2
G184S mutation used mice that express this mutant protein throughout their lives. Thus, it is unclear whether these phenotypes result from chronic or acute Gαi2
G184S expression. We addressed this issue by developing mice that conditionally express Gαi2
G184S.
Methods
Mice that conditionally express RGS insensitive Gαi2
G184S were generated using a floxed minigene strategy. Conditional expression of Gαi2
G184S was characterized by reverse transcription polymerase chain reaction and by enhancement of agonist-induced inhibition of cAMP production in isolated cardiac fibroblasts. The impact of conditional RGS insensitive Gαi2
G184S expression on ischemic injury was assessed by measuring contractile recovery and infarct sizes in isolated hearts subjected to 30 min ischemia and 2 hours reperfusion.
Results
We demonstrate tamoxifen-dependent expression of Gαi2
G184S, enhanced inhibition of cAMP production, and cardioprotection from ischemic injury in hearts conditionally expressing Gαi2
G184S. Thus the cardioprotective phenotype previously reported in mice expressing Gαi2
G184S does not require embryonic or chronic Gαi2
G184S expression. Rather, cardioprotection occurs following acute (days rather than months) expression of Gαi2
G184S.
Conclusions
These data suggest that RGS proteins might provide new therapeutic targets to protect the heart from ischemic injury. We anticipate that this model will be valuable for understanding the time course (chronic versus acute) and mechanisms of other phenotypic changes that occur following disruption of interactions between Gαi2 and RGS proteins.http://deepblue.lib.umich.edu/bitstream/2027.42/109553/1/40360_2014_Article_315.pd
Isolation and characterization of IgM from Bengal goat blood serum
ABSTRACT Isolation of IgM from Bengal goat blood serum was carried out by centrifugation of the collected serum to eliminate the blood corpuscles and purity of serum was affirmed by the absence of pellets. Purified serum was obtained by ammonium sulphate precipitation. The isolated IgM obtained through dialysis, was quantified through silica gel chromatography using phosphate buffer saline (PBS) as a solvent with varied pH and obtained different fractions (namely I, II, III, IV and V). Quantification of protein was carried out by Lowry method and the molecular weight was determined by SDS-PAGE with a standard marker. The presence of IgM was confirmed by Immunodiffusion and Immuno Dot Blot. The results of the experiment suggest that Fractions I, II and III contain more stressed protein which has some similarity with ovalbumin. The resulting colour intensity obtained on performing Immuno Dot Blot using IgM as primary antibody, demonstrates that Fraction II contains maximum concentration of stressed protein
- …