132 research outputs found

    Access Authentication Via Blockchain in Space Information Network

    Get PDF
    These authors contributed equally to this work. Abstract Space Information Network (SIN) has significant benefits of providing communication anywhere at any time. This feature offers an innovative way for conventional wireless customers to access enhanced internet services by using SIN. However, SIN's characteristics, such as naked links and maximum signal latency, make it difficult to design efficient security and routing protocols, etc. Similarly, existing SIN authentication techniques can't satisfy all of the essentials for secure communication, such as privacy leaks or rising authentication latency. The article aims to develop a novel blockchain-based access authentication mechanism for SIN. The proposed scheme uses a blockchain application, which has offered anonymity to mobile users while considering the satellites' limited processing capacity. The proposed scheme uses a blockchain application, which offers anonymity to mobile users while considering the satellites' limited processing capacity. The SIN gains the likelihood of far greater computational capacity devices as technology evolves. Since authenticating in SIN, the technique comprises three entities: low Earth orbit, mobile user, and network control centre. The proposed mutual authentication mechanism avoids the requirement of a ground station, resulting in less latency and overhead during mobile user authentication. Finally, the new blockchain-based authentication approach is being evaluated with AVISPA, a formal security tool. The simulation and performance study results illustrate that the proposed technique delivers efficient security characteristics such as low authentication latency, minimal signal overhead and less computational cost with group authentication

    The Investigating of Photoplethysmogram Waveform Amplitude Changes: Aging and Atherosclerosis

    Get PDF
    This paper focuses on the analysis of PPG waveform amplitude changes. As PPG signal reflects blood volume changes, studying its (peaks and valleys) amplitudes changes is highly appreciated. The results showed a strong positive relationship between age and RI index (R square = 0.657) and a strongly negative relationship between age and systolic peak index (R square = -0.651). The obtained results underline the importance of studying PPG's (peaks and valleys) amplitude changes and their association with age and atherosclerosis. The association between aging, atherosclerosis, arterial stiffness and PPG's morphology can provide a fruitful tool towards disease prevention and early-risk prediction. The increment of systolic peak as we age might indicate the present of atherosclerosis and the start of arterial stiffness. In addition, the increment of RI index as we age, may contribute to the process of high-risk atherosclerosis prediction and therefore approaching risk prevention

    Countering Malicious URLs in Internet of Things Using a Knowledge-Based Approach and a Simulated Expert

    Get PDF
    © 2014 IEEE. This article proposes a novel methodology to detect malicious uniform resource locators (URLs) using simulated expert (SE) and knowledge-base system (KBS). The proposed study not only efficiently detects known malicious URLs but also adapts countermeasure against the newly generated malicious URLs. Moreover, this article also explored which lexical features are contributing more in final decision using a factor analysis method, and thus help in avoiding the involvement of human experts. Furthermore, we apply the following state-of-the-art machine learning (ML) algorithms, i.e., naïve Bayes (NB), decision tree (DT), gradient boosted trees (GBT), generalized linear model (GLM), logistic regression (LR), deep learning (DL), and random rest (RF), and evaluate the performance of these algorithms on a large-scale real data set of data-driven Web applications. The experimental results clearly demonstrate the efficiency of NB in the proposed model as NB outperforms when compared to the rest of the aforementioned algorithms in terms of average minimum execution time (i.e., 3 s) and is able to accurately classify the 107 586 URLs with 0.2% error rate and 99.8% accuracy rate

    Design and Performance Optimisation of the Hexaboards for CMS HGCAL On-Cassette Readout Electronics

    No full text
    A new high-granularity endcap calorimeter, HGCAL, is foreseen to be installed later this decade in the CMS experiment. We present the design and performance of the Hexaboard, a complex hexagonal multi-layer PCB equipped with multiple HGCROC ASICs to read out the signals from silicon pads with low noise and large dynamic range. The Hexaboards are glued to silicon sensors and connect to their pads via wire bonds through holes in the PCBs. The Hexaboard also connects to mezzanine boards for powering, trigger and data concentration and transfer. More than ten variants of the Hexa\-board are required to cover the circular fiducial area of the CMS endcaps. Detailed performance measurements, and comparative PCB simulations using Ansys SIwave, are presented

    Energy-efficient Harvested-Aware clustering and cooperative Routing Protocol for WBAN (E-HARP)

    Get PDF
    Wireless Body Area Network (WBAN) is an interconnection of small bio-sensor nodes that are deployed in/on different parts of human body. It is used to sense health-related data such as rate of heart beat, blood pressure, blood glucose level, Electro-cardiogram (ECG), Electro-myography (EMG) etc. of human body and pass these readings to real-time health monitoring systems. WBANs is an important research area and is used in different applications such as medical field, sports, entertainment, social welfare etc. Bio-Sensor Nodes (BSNs) or simply called as Sensor Nodes (SNs) are the main backbone of WBANs. SNs normally have very limited resources due to its smaller size. Therefore, minimum consumption of energy is an essential design requirement of WBAN schemes. In the proposed work, Energy-efficient Harvested-Aware clustering and cooperative Routing Protocol for WBAN (E-HARP) are presented. The presented protocol mainly proposes a novel multi-attribute-based technique for dynamic Cluster Head (CH) selection and cooperative routing. In the first phase of this two-phased technique, optimum CH is selected among the cluster members, based on calculated Cost Factor (CF). The parameters used for calculation of CF are; residual energy of SN, required transmission power, communication link Signal-to-Noise-Ratio (SNR) and total network energy loss. In order to distribute load on one CH, E-HARP selects new CH in each data transmission round. In the second phase of E-HARP, data is routed with cooperative effort of the SN, which saves the node energy by prohibiting the transmission of redundant data packets. To evaluate the performance of the proposed technique, comprehensive experimentations using NS-2 simulation tool has been conducted. The results are compared with some latest techniques named as EH-RCB, ELR-W, Co-LAEEBA, and EECBSR. The acquired results show a significant enhancement of E-HARP in terms of network stability, network life time, throughput, end-to-end delay and packet delivery ratio

    Access authentication via blockchain in space information network.

    No full text
    Space Information Network (SIN) has significant benefits of providing communication anywhere at any time. This feature offers an innovative way for conventional wireless customers to access enhanced internet services by using SIN. However, SIN's characteristics, such as naked links and maximum signal latency, make it difficult to design efficient security and routing protocols, etc. Similarly, existing SIN authentication techniques can't satisfy all of the essentials for secure communication, such as privacy leaks or rising authentication latency. The article aims to develop a novel blockchain-based access authentication mechanism for SIN. The proposed scheme uses a blockchain application, which has offered anonymity to mobile users while considering the satellites' limited processing capacity. The proposed scheme uses a blockchain application, which offers anonymity to mobile users while considering the satellites' limited processing capacity. The SIN gains the likelihood of far greater computational capacity devices as technology evolves. Since authenticating in SIN, the technique comprises three entities: low Earth orbit, mobile user, and network control centre. The proposed mutual authentication mechanism avoids the requirement of a ground station, resulting in less latency and overhead during mobile user authentication. Finally, the new blockchain-based authentication approach is being evaluated with AVISPA, a formal security tool. The simulation and performance study results illustrate that the proposed technique delivers efficient security characteristics such as low authentication latency, minimal signal overhead and less computational cost with group authentication

    Privacy by Architecture Pseudonym Framework for Delay Tolerant Network

    No full text
    Delay Tolerant Network (DTN) enables communication in opportunistic networks where disruptive links result into intermittent connectivity. Routing protocols in such opportunistic environments mainly rely on broadcast/multicast communication in order to maximize the chances of packet delivery to destination node. Lack of end-to-end path and the essential requirement of store-carry-forward decision of packets by intermediate nodes, pose a serious threat to security and privacy concerns in DTNs. This article proposes a novel approach for secure and private communication in DTNs by hiding the identity of nodes using pseudonyms. The approach is based on Privacy by Architecture (PbA) where minimal identifying information of a user is sent to a certificate authority (CA) while requesting for a certificate. The novel PbA based scheme is composed of a set of protocols to address the aforementioned challenges; the Pseudonym Credential and Pseudonym Identity/Certificate Issuance protocols. The proposed approach is validated using formal modeling in CasperFDR which is the state-of-the art compiler for performance analysis of security protocols. To strengthen our claim, an information theoretic quantification method is employed to measure the Degree of Anonymity (DoA) of the approach. The approach performs efficiently and requires no end-to-end connectivity for messages exchange between the user and the certificate authority, thus making it an ideal choice for ensuring security and privacy in DTNs. Results show that the proposed approach guards against privacy attacks and delivers a high degree of anonymity even in the presence of compromised nodes in the network
    corecore