150 research outputs found

    A control theoretic approach for security of cyber-physical systems

    Get PDF
    In this dissertation, several novel defense methodologies for cyber-physical systems have been proposed. First, a special type of cyber-physical system, the RFID system, is considered for which a lightweight mutual authentication and ownership management protocol is proposed in order to protect the data confidentiality and integrity. Then considering the fact that the protection of the data confidentiality and integrity is insufficient to guarantee the security in cyber-physical systems, we turn to the development of a general framework for developing security schemes for cyber-physical systems wherein the cyber system states affect the physical system and vice versa. After that, we apply this general framework by selecting the traffic flow as the cyber system state and a novel attack detection scheme that is capable of capturing the abnormality in the traffic flow in those communication links due to a class of attacks has been proposed. On the other hand, an attack detection scheme that is capable of detecting both sensor and actuator attacks is proposed for the physical system in the presence of network induced delays and packet losses. Next, an attack detection scheme is proposed when the network parameters are unknown by using an optimal Q-learning approach. Finally, this attack detection and accommodation scheme has been further extended to the case where the network is modeled as a nonlinear system with unknown system dynamics --Abstract, page iv

    Tag Ownership Transfer in Radio Frequency Identification Systems: A Survey of Existing Protocols and Open Challenges

    Get PDF
    Radio frequency identification (RFID) is a modern approach to identify and track several assets at once in a supply chain environment. In many RFID applications, tagged items are frequently transferred from one owner to another. Thus, there is a need for secure ownership transfer (OT) protocols that can perform the transfer while, at the same time, protect the privacy of owners. Several protocols have been proposed in an attempt to fulfill this requirement. In this paper, we provide a comprehensive and systematic review of the RFID OT protocols that appeared over the years of 2005-2018. In addition, we compare these protocols based on the security goals which involve their support of OT properties and their resistance to attacks. From the presented comparison, we draw attention to the open issues in this field and provide suggestions for the direction that future research should follow. Furthermore, we suggest a set of guidelines to be considered in the design of new protocols. To the best of our knowledge, this is the first comprehensive survey that reviews the available OT protocols from the early start up to the current state of the art

    Comparative Analysis on Elastic-plastic Analytical Methods for Tunnel Surrounding Rocks

    Get PDF
    Elastic-plastic analysis is an important way to obtain the mechanical characteristics of surrounding rocks. However, selecting a reasonable analytical method is difficult. To explore the differences between the surrounding rocks constitutive relation and yield criterion analytical methods, the stress distribution and deformation characteristics of tunnel surrounding rocks at the −817 m firefighting material chamber of the Wangfenggang Well, Xieyi Mine, Huainan Coal Industry Group (China) were analyzed by using the bilinear constitutive relation and unified strength criterion analytical methods. Calculated results of the two analytical methods were compared. The radius and displacement evolution laws of the plastic region on tunnel surrounding rocks with in situ rock stress and supporting resistance were discussed. Results demonstrate that compared with the unified strength criterion analytical method, the bilinear constitutive relation analytical method avoids the influences of intermediate principal stress coefficient on results and the tangential stress distribution curve is smooth. The calculated radius of the plastic region and periphery displacement of the tunnel are 4,365 m and 87,373 mm, which are higher than those of the unified strength criterion analytical method. Stress difference is a major factor that influences the mechanical characteristics of tunnel surrounding rocks. As the stress difference decreases from 20,4 MPa to 16,4 MPa, the radius of the plastic region and periphery displacement of the tunnel decrease by 0,697 m and 26,73 mm, respectively. This study provides theoretical references for the practical selection of elastic-plastic analytical method for tunnel surrounding rocks

    Influence of Fe 3

    Get PDF
    The magnetic electrospinning (MES) method has been applied to generate aligned nanofibers. But researchers have different viewpoints on the usage of magnetic particles in the polymeric solutions. In order to investigate the effect of magnetic particles in forming the ordered fibers, the poly(lactic-co-glycolic acid) solutions with or without Fe3O4 nanoparticles were electrospun via MES. The fibers were compared at different voltages (13.5, 15.5, 17.5, and 19.5 kV) and flow rates (0.6, 0.9, 1.2, and 1.8 mL/h). It is shown that the well-aligned fibers can be fabricated by both magnetic and nonmagnetic solutions. The doping of Fe3O4 nanoparticles can increase the aligned fibers in some degree, especially at high applied voltage and flow rate. The diameters of fibers electrospun by MES were smaller than those by conventional electrospinning, and the diameter of fibers by MES without magnet particles was the smallest

    High affinity binding of H3K14ac through collaboration of bromodomains 2, 4 and 5 is critical for the molecular and tumor suppressor functions of PBRM1.

    Get PDF
    Polybromo-1 (PBRM1) is an important tumor suppressor in kidney cancer. It contains six tandem bromodomains (BDs), which are specialized structures that recognize acetyl-lysine residues. While BD2 has been found to bind acetylated histone H3 lysine 14 (H3K14ac), it is not known whether other BDs collaborate with BD2 to generate strong binding to H3K14ac, and the importance of H3K14ac recognition for the molecular and tumor suppressor function of PBRM1 is also unknown. We discovered that full-length PBRM1, but not its individual BDs, strongly binds H3K14ac. BDs 2, 4, and 5 were found to collaborate to facilitate strong binding to H3K14ac. Quantitative measurement of the interactions between purified BD proteins and H3K14ac or nonacetylated peptides confirmed the tight and specific association of the former. Interestingly, while the structural integrity of BD4 was found to be required for H3K14ac recognition, the conserved acetyl-lysine binding site of BD4 was not. Furthermore, simultaneous point mutations in BDs 2, 4, and 5 prevented recognition of H3K14ac, altered promoter binding and gene expression, and caused PBRM1 to relocalize to the cytoplasm. In contrast, tumor-derived point mutations in BD2 alone lowered PBRM1\u27s affinity to H3K14ac and also disrupted promoter binding and gene expression without altering cellular localization. Finally, overexpression of PBRM1 variants containing point mutations in BDs 2, 4, and 5 or BD2 alone failed to suppress tumor growth in a xenograft model. Taken together, our study demonstrates that BDs 2, 4, and 5 of PBRM1 collaborate to generate high affinity to H3K14ac and tether PBRM1 to chromatin. Mutations in BD2 alone weaken these interactions, and this is sufficient to abolish its molecular and tumor suppressor functions
    corecore