421 research outputs found

    A privacy preserving framework for cyber-physical systems and its integration in real world applications

    Get PDF
    A cyber-physical system (CPS) comprises of a network of processing and communication capable sensors and actuators that are pervasively embedded in the physical world. These intelligent computing elements achieve the tight combination and coordination between the logic processing and physical resources. It is envisioned that CPS will have great economic and societal impact, and alter the qualify of life like what Internet has done. This dissertation focuses on the privacy issues in current and future CPS applications. as thousands of the intelligent devices are deeply embedded in human societies, the system operations may potentially disclose the sensitive information if no privacy preserving mechanism is designed. This dissertation identifies data privacy and location privacy as the representatives to investigate the privacy problems in CPS. The data content privacy infringement occurs if the adversary can determine or partially determine the meaning of the transmitted data or the data stored in the storage. The location privacy, on the other hand, is the secrecy that a certain sensed object is associated to a specific location, the disclosure of which may endanger the sensed object. The location privacy may be compromised by the adversary through hop-by-hop traceback along the reverse direction of the message routing path. This dissertation proposes a public key based access control scheme to protect the data content privacy. Recent advances in efficient public key schemes, such as ECC, have already shown the feasibility to use public key schemes on low power devices including sensor motes. In this dissertation, an efficient public key security primitives, WM-ECC, has been implemented for TelosB and MICAz, the two major hardware platform in current sensor networks. WM-ECC achieves the best performance among the academic implementations. Based on WM-ECC, this dissertation has designed various security schemes, including pairwise key establishment, user access control and false data filtering mechanism, to protect the data content privacy. The experiments presented in this dissertation have shown that the proposed schemes are practical for real world applications. to protect the location privacy, this dissertation has considered two adversary models. For the first model in which an adversary has limited radio detection capability, the privacy-aware routing schemes are designed to slow down the adversary\u27s traceback progress. Through theoretical analysis, this dissertation shows how to maximize the adversary\u27s traceback time given a power consumption budget for message routing. Based on the theoretical results, this dissertation also proposes a simple and practical weighted random stride (WRS) routing scheme. The second model assumes a more powerful adversary that is able to monitor all radio communications in the network. This dissertation proposes a random schedule scheme in which each node transmits at a certain time slot in a period so that the adversary would not be able to profile the difference in communication patterns among all the nodes. Finally, this dissertation integrates the proposed privacy preserving framework into Snoogle, a sensor nodes based search engine for the physical world. Snoogle allows people to search for the physical objects in their vicinity. The previously proposed privacy preserving schemes are applied in the application to achieve the flexible and resilient privacy preserving capabilities. In addition to security and privacy, Snoogle also incorporates a number of energy saving and communication compression techniques that are carefully designed for systems composed of low-cost, low-power embedded devices. The evaluation study comprises of the real world experiments on a prototype Snoogle system and the scalability simulations

    Universally-composable finite-key analysis for efficient four-intensity decoy-state quantum key distribution

    Full text link
    We propose an efficient four-intensity decoy-state BB84 protocol and derive concise security bounds for this protocol with the universally composable finite-key analysis method. Comparing with the efficient three-intensity protocol, we find that our efficient four-intensity protocol can increase the secret key rate by at least 30%30\%. Particularly, this increasing rate of secret key rate will be raised as the transmission distance increases. At a large transmission distance, our efficient four-intensity protocol can improve the performance of quantum key distribution profoundly.Comment: accepted by Eur. Phys. J.

    Surface relief grating near-eye display waveguide design

    Full text link
    A near-eye display device (NED) is a visual optical system that places a miniature display in front of the human eye to provide an immersive viewing experience. NEDs have been playing an irreplaceable role in both early military flight applications and today's civil and entertainment applications. In this paper, we propose an easy-to-machine design of a near-eye display based on surface relief grating waveguides, taking into account the experience of previous designs of near-eye displays, the superior performance of the design, and the accuracy level of existing grating processing. The design is designed to meet the requirements of large field of view and large outgoing pupil extension as much as possible. The design is insensitive to the incident angle and achieves a full-field field-of-view angle of 40{\deg}, an angular uniformity error of 20% for diffraction efficiency, and an average diffraction efficiency of 80% for the full field of view. Based on the design, the overall simulation of the optical path of the NED device is completed, and the illumination uniformity of the outgoing pupil expansion of the device is analyzed through simulation.Comment: 12 pages; 10 figures; 2 table

    FPC: A New Approach to Firewall Policies Compression

    Get PDF
    Firewalls are crucial elements that enhance network security by examining the field values of every packet and deciding whether to accept or discard a packet according to the firewall policies. With the development of networks, the number of rules in firewalls has rapidly increased, consequently degrading network performance. In addition, because most real-life firewalls have been plagued with policy conflicts, malicious traffics can be allowed or legitimate traffics can be blocked. Moreover, because of the complexity of the firewall policies, it is very important to reduce the number of rules in a firewall while keeping the rule semantics unchanged and the target firewall rules conflict-free. In this study, we make three major contributions. First, we present a new approach in which a geometric model, multidimensional rectilinear polygon, is constructed for the firewall rules compression problem. Second, we propose a new scheme, Firewall Policies Compression (FPC), to compress the multidimensional firewall rules based on this geometric model. Third, we conducted extensive experiments to evaluate the performance of the proposed method. The experimental results demonstrate that the FPC method outperforms the existing approaches, in terms of compression ratio and efficiency while maintaining conflict-free firewall rules

    FPC: A New Approach to Firewall Policies Compression

    Get PDF
    Firewalls are crucial elements that enhance network security by examining the field values of every packet and deciding whether to accept or discard a packet according to the firewall policies. With the development of networks, the number of rules in firewalls has rapidly increased, consequently degrading network performance. In addition, because most real-life firewalls have been plagued with policy conflicts, malicious traffics can be allowed or legitimate traffics can be blocked. Moreover, because of the complexity of the firewall policies, it is very important to reduce the number of rules in a firewall while keeping the rule semantics unchanged and the target firewall rules conflict-free. In this study, we make three major contributions. First, we present a new approach in which a geometric model, multidimensional rectilinear polygon, is constructed for the firewall rules compression problem. Second, we propose a new scheme, Firewall Policies Compression (FPC), to compress the multidimensional firewall rules based on this geometric model. Third, we conducted extensive experiments to evaluate the performance of the proposed method. The experimental results demonstrate that the FPC method outperforms the existing approaches, in terms of compression ratio and efficiency while maintaining conflict-free firewall rules

    An Autonomous Robotic Indoor Environment Surveillance System

    Get PDF
    We developed an autonomous mobile robot platform capable of following a path and gather environmental data, including temperature, humidity, light intensity, etc. The robot is capable of detecting the path using its camera and correct most navigational errors, while the sensors support a limited set of instructions regarding which sensor data to collect and how often. Our experiment consisted of having the robot follow a looped path we set up in BU004 Lab. The robot was able to complete the loop and gather sensor data for light intensity, humidity and temperature at a frequency of once per second, and also positional data provided by the robot at around the same frequency.https://engagedscholarship.csuohio.edu/u_poster_2014/1014/thumbnail.jp

    Janus Droplet Formation via Thermally Induced Phase Separation: A Numerical Model with Diffusion and Convection

    Get PDF
    [Image: see text] Microscale Janus particles have versatile potential applications in many physical and biomedical fields, such as microsensor, micromotor, and drug delivery. Here, we present a phase-field approach of multicomponent and multiphase to investigate the Janus droplet formation via thermally induced phase separation. The crucial kinetics for the formation of Janus droplets consisting of two polymer species and a solvent component via an interplay of both diffusion and convection is considered in the Cahn–Hilliard–Navier–Stokes equation. The simulation results of the phase-field model show that unequal interfacial tensions between the two polymer species and the solvent result in asymmetric phase separation in the formation process of Janus droplets. This asymmetric phase separation plays a vital role in the establishment of the so-called core–shell structure that has been observed in previous experiments. By varying the droplet size, the surface tension, and the molecular interaction between the polymer species, several novel droplet morphologies are predicted in the development process of Janus droplets. Moreover, we stress that the hydrodynamics should be reckoned as a non-negligible mechanism that not only accelerates the Janus droplet evolution but also has great impacts on the coarsening and coalescence of the Janus droplets
    • …
    corecore