Search results for: secure aggregation
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 999

Search results for: secure aggregation

879 Forensic Nursing Culture and Recovery-Oriented Practice: A Focused Ethnography

Authors: Monica Ginn

Abstract:

Providing recovery-oriented practice in forensic settings is often a contentious issue. This paper focuses on recovery with how it is influenced by the forensic population and how it is impacted by forensic nurses’ attitudes and practices. Understanding the culture of forensic nursing and how forensic nurses experience and perceive recovery for forensic patients provided insights into how forensic nurses use recovery-oriented practices to enhance nursing care in secure settings and facilitate successful reintegration back into community care and society. Interviews were completed with nurses who work with the Not Criminally Responsible patient population in an inpatient setting to discuss and explore how they use recovery-oriented practice in their practice in spite of their role in assessing and managing risk.

Keywords: forensic nursing culture, not criminally responsible, offender recovery, recovery-oriented practice, secure recovery

Procedia PDF Downloads 65
878 Secure Optical Communication System Using Quantum Cryptography

Authors: Ehab AbdulRazzaq Hussein

Abstract:

Quantum cryptography (QC) is an emerging technology for secure key distribution with single-photon transmissions. In contrast to classical cryptographic schemes, the security of QC schemes is guaranteed by the fundamental laws of nature. Their security stems from the impossibility to distinguish non-orthogonal quantum states with certainty. A potential eavesdropper introduces errors in the transmissions, which can later be discovered by the legitimate participants of the communication. In this paper, the modeling approach is proposed for QC protocol BB84 using polarization coding. The single-photon system is assumed to be used in the designed models. Thus, Eve cannot use beam-splitting strategy to eavesdrop on the quantum channel transmission. The only eavesdropping strategy possible to Eve is the intercept/resend strategy. After quantum transmission of the QC protocol, the quantum bit error rate (QBER) is estimated and compared with a threshold value. If it is above this value the procedure must be stopped and performed later again.

Keywords: security, key distribution, cryptography, quantum protocols, Quantum Cryptography (QC), Quantum Key Distribution (QKD).

Procedia PDF Downloads 373
877 Preferred Left-Handed Conformation of Glycyls at Pathogenic Sites

Authors: Purva Mishra, Rajesh Potlia, Kuljeet Singh Sandhu

Abstract:

The role of glycyl residues in the protein structure has lingered within the research community for the last several decades. Glycyl residue is the only amino acid that is achiral due to the lack of a side chain and can, therefore, exhibit Ramachandran conformations that are disallowed for L-amino acids. The structural and functional significance of glycyl residues with L-disallowed conformation, however, remains obscure. Through statistical analysis of various datasets, we found that the glycyls with L-disallowed conformations are over-represented at disease-associated sites and tend to be evolutionarily conserved. The mutations of L-disallowed glycyls tend to destabilize the native conformation, reduce protein solubility, and promote inter-molecular aggregations. We uncovered a structural motif referred to as “β-crescent” formed around the L-disallowed glycyl, which prevents β-sheet aggregation by disrupting the alternating pattern of β-pleats. The L-disallowed conformation of glycyls also holds predictive power to infer the pathogenic missense variants. Altogether, our observations highlight that the L-disallowed conformation of glycyls is selected to facilitate native folding and prevent inter-molecular aggregations. The findings may also have implications for designing more stable proteins and prioritizing the genetic lesions implicated in diseases.

Keywords: Ramachandran plot, β-sheet, protein stability, protein aggregation

Procedia PDF Downloads 32
876 Influence of Hydrogen Ion Concentration on the Production of Bio-Synthesized Nano-Silver

Authors: M.F. Elkady, Sahar Zaki, Desouky Abd-El-Haleem

Abstract:

Silver nanoparticles (AgNPs) are already widely prepared using different technologies. However, there are limited data on the effects of hydrogen ion concentration on nano-silver production. In this investigation, the impact of the pH reaction medium toward the particle size, agglomeration and the yield of the produced bio-synthesized silver were established. Quasi-spherical silver nanoparticles were synthesized through the biosynthesis green production process using the Egyptian E. coli bacterial strain 23N at different pH values. The formation of AgNPs has been confirmed with ultraviolet–visible spectra through identification of their characteristic peak at 410 nm. The quantitative production yield and the orientation planes of the produced nano-silver were examined using X-ray spectroscopy (EDS) and X-ray diffraction (XRD). Quantitative analyses indicated that the silver production yield was promoted at elevated pH regarded to increase the reduction rate of silver precursor through both chemical and biological processes. As a result, number of the nucleus and thus the size of the silver nanoparticles were tunable through changing pH of the reaction system. Accordingly, the morphological structure and size of the produced silver and its aggregates were determined using scanning electron microscopy (SEM) and transmission electron microscopy (TEM) images. It was considered that the increment in pH value of the reaction media progress the aggregation of silver clusters. However, the presence of stain 23N biomass decreases the possibility of silver aggregation at the pH 7.

Keywords: silver nanoparticles, biosynthesis, reaction media pH, nano-silver characterization

Procedia PDF Downloads 337
875 RSU Aggregated Message Delivery for VANET

Authors: Auxeeliya Jesudoss, Ashraph Sulaiman, Ratnakar Kotnana

Abstract:

V2V communication brings up several questions of scalability issues although message sharing in vehicular ad-hoc networks comprises of both Vehicle-to-Vehicle communications (V2V) and Vehicle to Infrastructure communication (V2I). It is not an easy task for a vehicle to verify all signatures of the messages sent by its neighboring vehicles in a timely manner, without resulting in message loss. Moreover, the communication overhead of a vehicle to authenticate another vehicle would increase together with the security of the system. Another issue to be addressed is the continuous mobility of vehicles which requires at least some information on the node’s own position to be revealed to the neighboring vehicles. This may facilitate the attacker to congregate information on a node’s position or its mobility patterns. In order to tackle these issues, this paper introduces a RSU aggregated message deliverance scheme called RAMeD. With RAMeD, roadside units (RSUs) are responsible for verifying the identity of the vehicles entering in its range, collect messages from genuine vehicles and to aggregate similar messages into groups before sending them to all the vehicles in its communication range. This aggregation will tremendously improve the rate of message delivery and reduce the message lose ratio by avoiding similar messages being sent to the vehicles redundantly. The proposed protocol is analyzed extensively to evaluate its merits and efficiency for vehicular communication.

Keywords: vehicular ad-hoc networks, V2V, V2I, VANET communication, scalability, message aggregation

Procedia PDF Downloads 375
874 Analysis of Network Performance Using Aspect of Quantum Cryptography

Authors: Nisarg A. Patel, Hiren B. Patel

Abstract:

Quantum cryptography is described as a point-to-point secure key generation technology that has emerged in recent times in providing absolute security. Researchers have started studying new innovative approaches to exploit the security of Quantum Key Distribution (QKD) for a large-scale communication system. A number of approaches and models for utilization of QKD for secure communication have been developed. The uncertainty principle in quantum mechanics created a new paradigm for QKD. One of the approaches for use of QKD involved network fashioned security. The main goal was point-to-point Quantum network that exploited QKD technology for end-to-end network security via high speed QKD. Other approaches and models equipped with QKD in network fashion are introduced in the literature as. A different approach that this paper deals with is using QKD in existing protocols, which are widely used on the Internet to enhance security with main objective of unconditional security. Our work is towards the analysis of the QKD in Mobile ad-hoc network (MANET).

Keywords: cryptography, networking, quantum, encryption and decryption

Procedia PDF Downloads 142
873 Interference Management in Long Term Evolution-Advanced System

Authors: Selma Sbit, Mohamed Bechir Dadi, Belgacem Chibani Rhaimi

Abstract:

Incorporating Home eNodeB (HeNB) in cellular networks, e.g. Long Term Evolution Advanced (LTE-A), is beneficial for extending coverage and enhancing capacity at low price especially within the non-line-of sight (NLOS) environments such as homes. HeNB or femtocell is a small low powered base station which provides radio coverage to the mobile users in an indoor environment. This deployment results in a heterogeneous network where the available spectrum becomes shared between two layers. Therefore, a problem of Inter Cell Interference (ICI) appears. This issue is the main challenge in LTE-A. To deal with this challenge, various techniques based on frequency, time and power control are proposed. This paper deals with the impact of carrier aggregation and higher order MIMO (Multiple Input Multiple Output) schemes on the LTE-Advanced performance. Simulation results show the advantages of these schemes on the system capacity (4.109 b/s/Hz when bandwidth B=100 MHz and when applying MIMO 8x8 for SINR=30 dB), maximum theoretical peak data rate (more than 4 Gbps for B=100 MHz and when MIMO 8x8 is used) and spectral efficiency (15 b/s/Hz and 30b/s/Hz when MIMO 4x4 and MIMO 8x8 are applying respectively for SINR=30 dB).

Keywords: capacity, carrier aggregation, LTE-Advanced, MIMO (Multiple Input Multiple Output), peak data rate, spectral efficiency

Procedia PDF Downloads 226
872 Green Catalytic Conversion of Some Aromatic Alcohols to Acids by NiO₂ Nanoparticles ‎‎(NPNPs) in Water

Authors: Abdel Ghany F. Shoair, Mai M. A. H. Shanab

Abstract:

The basic aqueous systems NiSO4.6H₂O / K₂S₂O₈ (PH= 14) or NiSO₄.6H₂O / KBrO₃ (PH = 11.5) were ‎investigated ‎for the ‎catalytic conversion benzyl alcohol and ‎some para-substituted benzyl ‎alcohols to their ‎corresponding ‎acids in 75-97 % yield at room ‎temperature. The active species ‎was isolated and characterized by scanning ‎electron ‎microscopy (SEM), ‎‎transmission electron microscopy (TEM), X-ray ‎powder diffraction, EDX and ‎‎FT-IR ‎techniques and identified as NiO₂ nanoparticles (NPNPs). The SEM and ‎TEM images of nickel peroxide samples show a fine spherical-like ‎aggregation of ‎NiO₂ molecules with a nearly homogeneous partial size and confirm the ‎aggregation's size ‎to ‎be in the range of 2-3 nm. The yields, turnover (TO) and turn ‎over frequencies (TOF) were calculated. ‎It was noticed ‎that the aromatic alcohols ‎containing para-substituted electron donation groups gave better ‎‎yields than ‎those having electron-withdrawing groups. The optimum conditions for this ‎‎catalytic reaction ‎were studied using benzyl alcohol as a model. The mechanism ‎of the ‎catalytic conversion reaction was ‎suggested, in which the produced ‎(NPNPs) convert alcohols ‎to acids in two steps through the formation of the ‎‎corresponding aldehyde. The produced ‎NiO, because of this conversion, is ‎converted again to (NPNPs) by ‎an excess of K₂S₂O₈ or KBrO₃. This ‎catalytic cycle continues ‎until all the substrate is oxidized.

Keywords: Nickel, oxidation, catalysts, benzyl alcohol

Procedia PDF Downloads 44
871 People Experiencing Economic Disadvantages and Access to Justice System: The Case of Unemployed People in Australia

Authors: M. Shahadat Hossain

Abstract:

People experiencing economic disadvantages have limited access to justice system. Employment status is a key indicator of economic disadvantage. There is a link between employment status and vulnerability to legal problems. This paper addresses the obstacles unemployed people experience to secure justice in Australia. This paper further explores exiting services for economically disadvantaged people to secure justice where these unemployment people can get access. It reveals that unemployed people are vulnerable to multifaced crime and violence. Due to high cost of legal services, these unemployed people are unable to afford legal services to access justice. They are often found higher levels of nonactions in terms of access to justice also due to lack of their initiatives. This paper further reveals that legal aid commissions are state and territory statutory agencies in Australia which provide free legal information, advice, duty lawyers, and legal representation services. Community legal centres are independent, non-profit government organizations with a focus of early advice, problem solving, and working with other agencies to address connected, financial, and health problems. Moreover, the private profession helps people who cannot afford to pay for a lawyer in several ways. But there are problems of shortage of funding for these legal services and making available to economically disadvantaged people. However, this paper argues that people experiencing long-term unemployment face barriers to secure justice due to their economic disadvantages. It further argues that services available for them to access to justice is inadequate.

Keywords: economic disadvantages, unemployment, access to justice, Australia

Procedia PDF Downloads 106
870 Integrated Model for Enhancing Data Security Performance in Cloud Computing

Authors: Amani A. Saad, Ahmed A. El-Farag, El-Sayed A. Helali

Abstract:

Cloud computing is an important and promising field in the recent decade. Cloud computing allows sharing resources, services and information among the people of the whole world. Although the advantages of using clouds are great, but there are many risks in a cloud. The data security is the most important and critical problem of cloud computing. In this research a new security model for cloud computing is proposed for ensuring secure communication system, hiding information from other users and saving the user's times. In this proposed model Blowfish encryption algorithm is used for exchanging information or data, and SHA-2 cryptographic hash algorithm is used for data integrity. For user authentication process a user-name and password is used, the password uses SHA-2 for one way encryption. The proposed system shows an improvement of the processing time of uploading and downloading files on the cloud in secure form.

Keywords: cloud Ccomputing, data security, SAAS, PAAS, IAAS, Blowfish

Procedia PDF Downloads 450
869 Mass Pheromone Trapping on Red Palm Weevil, Rhynchophorus ferrugineus (Coleoptera: Curculionidae) in Oil Palm Plantations of Terengganu

Authors: Wahizatul Afzan Azmi, Nur Ain Farhah Ros Saidon Khudri, Mohamad Haris Hussain, Tse Seng Chuah

Abstract:

Malaysia houses a broad range of palm trees species and some of these palm trees are very crucial for the country’s social and economic development, especially the oil palm trees. However, the destructive pest of the various palms species, Rhynchophorus ferrugineus (Coleoptera: Curculionidae) or known as Red Palm Weevil (RPW) was first detected in Terengganu in 2007. Recently, the pattern of infestation has move from coastal lines toward inland areas. After the coconut plantations, it is presumed that the RPW will be a serious threat to the oil palm plantations in Malaysia. Thus, this study was carried out to detect the presence and distribution of Red Palm Weevil (RPW) in selected oil palm plantations of Terengganu. A total of 42 traps were installed in the three oil palm plantations in Terengganu and were inspected every week for two months. Oil palm plantation A collected significantly higher adults RPW compared to the other locations. Generally, females of RPW were significantly higher than male individuals. Females were collected more as the synthetic aggregation pheromone used, ferrugineol was synthesized from the male aggregation pheromone of adult RPW. Oil palm plantation A collected the highest number of RPW might be due to the abundance of soft part in the host plant as the oil palm trees age ranged between 6 to 10 years old. As a conclusion, RPW presence was detected in some oil palm plantations of Terengganu and immediate action is crucially needed before it is too late.

Keywords: red palm weevil, pest, oil palm, pheromone

Procedia PDF Downloads 182
868 Assessing Effectiveness of Schema Mode Therapy and Emotionally Focused Couples Therapy in Attachment Styles among Couples with Marital Conflict

Authors: Reza Johari Fard, Najmeh Cheraghi, Parvin Ehtesham Zadeh, Parviz Asgari

Abstract:

The aim of this study was to investigate and comparison of the effectiveness of schema mode therapy and emotionally focused couples therapy in attachment styles (secure, avoidant, and anxious) in couples with marital conflict in a quasiexperimental method in a pretest, posttest, and follow up design with a control group. The statistical population of the study included all the couples with marital conflict who visited the Mehrana counseling center in 2019 in Ahvaz, Iran 45 couples were selected by voluntary sampling method and randomly divided into two experimental groups and one control group (15 pairs in each group). The participants completed the Adult Attachment Scale (Hazan and Shaver). The experimental groups underwent schema mode therapy and emotionally focused couples therapy for 12 sessions, but the control group did not receive any intervention. The data were analyzed by the statistical analysis of repeated measures in SPSS-19 software. The results showed that both schema mode therapy and emotionally focused couples therapy are effective in increasing the secure attachment style and reducing avoidant and ambivalent attachment styles in couples with marital conflict. There was no significant difference between the schema mode therapy group and the emotionally focused couple's therapy group in attachment styles. Therefore, it is recommended that therapists and family counselors use these therapies along with other therapeutic interventions to increase secure attachment styles and reduce marital conflicts.

Keywords: schema mode therapy, emotional focused couple therapy, attachment styles, marital conflict

Procedia PDF Downloads 76
867 Optical Coherence Tomography in Parkinson’s Disease: A Potential in-vivo Retinal α-Synuclein Biomarker in Parkinson’s Disease

Authors: Jessica Chorostecki, Aashka Shah, Fen Bao, Ginny Bao, Edwin George, Navid Seraji-Bozorgzad, Veronica Gorden, Christina Caon, Elliot Frohman

Abstract:

Background: Parkinson’s Disease (PD) is a neuro degenerative disorder associated with the loss of dopaminergic cells and the presence α-synuclein (AS) aggregation in of Lewy bodies. Both dopaminergic cells and AS are found in the retina. Optical coherence tomography (OCT) allows high-resolution in-vivo examination of retinal structure injury in neuro degenerative disorders including PD. Methods: We performed a cross-section OCT study in patients with definite PD and healthy controls (HC) using Spectral Domain SD-OCT platform to measure the peripapillary retinal nerve fiber layer (pRNFL) thickness and total macular volume (TMV). We performed intra-retinal segmentation with fully automated segmentation software to measure the volume of the RNFL, ganglion cell layer (GCL), inner plexiform layer (IPL), inner nuclear layer (INL), outer plexiform layer (OPL), and the outer nuclear layer (ONL). Segmentation was performed blinded to the clinical status of the study participants. Results: 101 eyes from 52 PD patients (mean age 65.8 years) and 46 eyes from 24 HC subjects (mean age 64.1 years) were included in the study. The mean pRNFL thickness was not significantly different (96.95 μm vs 94.42 μm, p=0.07) but the TMV was significantly lower in PD compared to HC (8.33 mm3 vs 8.58 mm3 p=0.0002). Intra-retinal segmentation showed no significant difference in the RNFL volume between the PD and HC groups (0.95 mm3 vs 0.92 mm3 p=0.454). However, GCL, IPL, INL, and ONL volumes were significantly reduced in PD compared to HC. In contrast, the volume of OPL was significantly increased in PD compared to HC. Conclusions: Our finding of the enlarged OPL corresponds with mRNA expression studies showing localization of AS in the OPL across vertebrate species and autopsy studies demonstrating AS aggregation in the deeper layers of retina in PD. We propose that the enlargement of the OPL may represent a potential biomarker of AS aggregation in PD. Longitudinal studies in larger cohorts are warranted to confirm our observations that may have significant implications in disease monitoring and therapeutic development.

Keywords: Optical Coherence Tomography, biomarker, Parkinson's disease, alpha-synuclein, retina

Procedia PDF Downloads 409
866 Secure Intelligent Information Management by Using a Framework of Virtual Phones-On Cloud Computation

Authors: Mohammad Hadi Khorashadi Zadeh

Abstract:

Many new applications and internet services have been emerged since the innovation of mobile networks and devices. However, these applications have problems of security, management, and performance in business environments. Cloud systems provide information transfer, management facilities, and security for virtual environments. Therefore, an innovative internet service and a business model are proposed in the present study for creating a secure and consolidated environment for managing the mobile information of organizations based on cloud virtual phones (CVP) infrastructures. Using this method, users can run Android and web applications in the cloud which enhance performance by connecting to other CVP users and increases privacy. It is possible to combine the CVP with distributed protocols and central control which mimics the behavior of human societies. This mix helps in dealing with sensitive data in mobile devices and facilitates data management with less application overhead.

Keywords: BYOD, mobile cloud computing, mobile security, information management

Procedia PDF Downloads 278
865 Secure Automatic Key SMS Encryption Scheme Using Hybrid Cryptosystem: An Approach for One Time Password Security Enhancement

Authors: Pratama R. Yunia, Firmansyah, I., Ariani, Ulfa R. Maharani, Fikri M. Al

Abstract:

Nowadays, notwithstanding that the role of SMS as a means of communication has been largely replaced by online applications such as WhatsApp, Telegram, and others, the fact that SMS is still used for certain and important communication needs is indisputable. Among them is for sending one time password (OTP) as an authentication media for various online applications ranging from chatting, shopping to online banking applications. However, the usage of SMS does not pretty much guarantee the security of transmitted messages. As a matter of fact, the transmitted messages between BTS is still in the form of plaintext, making it extremely vulnerable to eavesdropping, especially if the message is confidential, for instance, the OTP. One solution to overcome this problem is to use an SMS application which provides security services for each transmitted message. Responding to this problem, in this study, an automatic key SMS encryption scheme was designed as a means to secure SMS communication. The proposed scheme allows SMS sending, which is automatically encrypted with keys that are constantly changing (automatic key update), automatic key exchange, and automatic key generation. In terms of the security method, the proposed scheme applies cryptographic techniques with a hybrid cryptosystem mechanism. Proofing the proposed scheme, a client to client SMS encryption application was developed using Java platform with AES-256 as encryption algorithm, RSA-768 as public and private key generator and SHA-256 for message hashing function. The result of this study is a secure automatic key SMS encryption scheme using hybrid cryptosystem which can guarantee the security of every transmitted message, so as to become a reliable solution in sending confidential messages through SMS although it still has weaknesses in terms of processing time.

Keywords: encryption scheme, hybrid cryptosystem, one time password, SMS security

Procedia PDF Downloads 103
864 Molecular Interactions Driving RNA Binding to hnRNPA1 Implicated in Neurodegeneration

Authors: Sakina Fatima, Joseph-Patrick W. E. Clarke, Patricia A. Thibault, Subha Kalyaanamoorthy, Michael Levin, Aravindhan Ganesan

Abstract:

Heteronuclear ribonucleoprotein (hnRNPA1 or A1) is associated with the pathology of different diseases, including neurological disorders and cancers. In particular, the aggregation and dysfunction of A1 have been identified as a critical driver for neurodegeneration (NDG) in Multiple Sclerosis (MS). Structurally, A1 includes a low-complexity domain (LCD) and two RNA-recognition motifs (RRMs), and their interdomain coordination may play a crucial role in A1 aggregation. Previous studies propose that RNA-inhibitors or nucleoside analogs that bind to RRMs can potentially prevent A1 self-association. Therefore, molecular-level understanding of the structures, dynamics, and nucleotide interactions with A1 RRMs can be useful for developing therapeutics for NDG in MS. In this work, a combination of computational modelling and biochemical experiments were employed to analyze a set of RNA-A1 RRM complexes. Initially, the atomistic models of RNA-RRM complexes were constructed by modifying known crystal structures (e.g., PDBs: 4YOE and 5MPG), and through molecular docking calculations. The complexes were optimized using molecular dynamics simulations (200-400 ns), and their binding free energies were computed. The binding affinities of the selected complexes were validated using a thermal shift assay. Further, the most important molecular interactions that contributed to the overall stability of the RNA-A1 RRM complexes were deduced. The results highlight that adenine and guanine are the most suitable nucleotides for high-affinity binding with A1. These insights will be useful in the rational design of nucleotide-analogs for targeting A1 RRMs.

Keywords: hnRNPA1, molecular docking, molecular dynamics, RNA-binding proteins

Procedia PDF Downloads 84
863 Integrated Model for Enhancing Data Security Processing Time in Cloud Computing

Authors: Amani A. Saad, Ahmed A. El-Farag, El-Sayed A. Helali

Abstract:

Cloud computing is an important and promising field in the recent decade. Cloud computing allows sharing resources, services and information among the people of the whole world. Although the advantages of using clouds are great, but there are many risks in a cloud. The data security is the most important and critical problem of cloud computing. In this research a new security model for cloud computing is proposed for ensuring secure communication system, hiding information from other users and saving the user's times. In this proposed model Blowfish encryption algorithm is used for exchanging information or data, and SHA-2 cryptographic hash algorithm is used for data integrity. For user authentication process a simple user-name and password is used, the password uses SHA-2 for one way encryption. The proposed system shows an improvement of the processing time of uploading and downloading files on the cloud in secure form.

Keywords: cloud computing, data security, SAAS, PAAS, IAAS, Blowfish

Procedia PDF Downloads 323
862 Colour Change and melenophores response in ateleost: Balantiochilous melenopterus (Bleeker) with Certain Chemicals and Drugs

Authors: Trapti Pathak

Abstract:

Fishes can change their body colour according to their surroundings by. They do so by either aggregation or dispersion of melanosomes within the skin. These movements can regulate by means of sympathetic nerves with the help of cytoskeleton. Employing the melanophores on isolated scales of the fingerling of teleost fish, it is attempted to characterise the concerned nerves and the receptors located on melenocytes along with implication of microtubules a part of cytoskeleton in the pigmentary translocation in the fish. The scales from dorso-lateral trunk of the fish represented the sympathetic– neuromelanophore preparations which were stimulated by chemical means, such as adrenergic agonist, antagonist and the microtubule-disrupting drugs such as yuhombine, dopamine, colchicine etc. Adrenaline is an adrenergic agonist which is strongly induced the dorse-dependent concentration of pigment in innervated melanophores while Yohimbine is an adrenergic antagonist which is known to block effectively the α2-adrenoceptors inhibited the action of adrenaline. Colchicine effectively interferes with melanosome aggregating action of adrenaline. From these results it is concluded that the chromatic fibres of adrenergic nature innervate the melanophores and these cells do possess α2-adrenoceptors which mediate the melanosome aggregation and the movements of pigment granules through microtubules means of transport within the cell. These movements of pigment are linked to paling or darkening achieved of teleost fish respectively when they approach to their background.

Keywords: melenophores, agonists, antagonist, colour change

Procedia PDF Downloads 45
861 Tag Impersonation Attack on Ultra-lightweight Radio Frequency Identification Authentication Scheme (ESRAS)

Authors: Reham Al-Zahrani, Noura Aleisa

Abstract:

The proliferation of Radio Frequency Identification (RFID) technology has raised concerns about system security, particularly regarding tag impersonation attacks. Regarding RFID systems, an appropriate authentication protocol must resist active and passive attacks. A tag impersonation occurs when an adversary's tag is used to fool an authenticating reader into believing it is a legitimate tag. This paper analyzed the security of the efficient, secure, and practical ultra-lightweight RFID Authentication Scheme (ESRAS). Then, the paper presents a comprehensive analysis of the Efficient, Secure, and Practical Ultra-Lightweight RFID Authentication Scheme (ESRAS) in the context of radio frequency identification (RFID) systems that employed the Scyther tool to examine the protocol's security against a tag impersonation attack.

Keywords: RFID, impersonation attack, authentication, ultra-lightweight protocols

Procedia PDF Downloads 33
860 Extending the AOP Joinpoint Model for Memory and Type Safety

Authors: Amjad Nusayr

Abstract:

Software security is a general term used to any type of software architecture or model in which security aspects are incorporated in this architecture. These aspects are not part of the main logic of the underlying program. Software security can be achieved using a combination of approaches, including but not limited to secure software designs, third part component validation, and secure coding practices. Memory safety is one feature in software security where we ensure that any object in memory has a valid pointer or a reference with a valid type. Aspect-Oriented Programming (AOP) is a paradigm that is concerned with capturing the cross-cutting concerns in code development. AOP is generally used for common cross-cutting concerns like logging and DB transaction managing. In this paper, we introduce the concepts that enable AOP to be used for the purpose of memory and type safety. We also present ideas for extending AOP in software security practices.

Keywords: aspect oriented programming, programming languages, software security, memory and type safety

Procedia PDF Downloads 99
859 Globalisation and Diplomacy: How Can Small States Improve the Practice of Diplomacy to Secure Their Foreign Policy Objectives?

Authors: H. M. Ross-McAlpine

Abstract:

Much of what is written on diplomacy, globalization and the global economy addresses the changing nature of relationships between major powers. While the most dramatic and influential changes have resulted from these developing relationships the world is not, on deeper inspection, governed neatly by major powers. Due to advances in technology, the shifting balance of power and a changing geopolitical order, small states have the ability to exercise a greater influence than ever before. Increasingly interdependent and ever complex, our world is too delicate to be handled by a mighty few. The pressure of global change requires small states to adapt their diplomatic practices and diversify their strategic alliances and relationships. The nature and practice of diplomacy must be re-evaluated in light of the pressures resulting from globalization. This research examines: how small states can best secure their foreign policy objectives? Small state theory is used as a foundation for exploring the case study of New Zealand. The research draws on secondary sources to evaluate the existing theory in relation to modern practices of diplomacy. As New Zealand lacks the required economic and military power to play an active, influential role in international affairs what strategies are used to exert influence? Furthermore, New Zealand lies in a remote corner of the Pacific and is geographically isolated from its nearest neighbors how does this affect security and trade priorities? The findings note a significant shift since the 1970’s in New Zealand’s diplomatic relations. This shift is arguably a direct result of globalization, regionalism and a growing independence from the traditional bi-lateral relationships. The need to source predictable trade, investment and technology are an essential driving force for New Zealand’s diplomatic relations. A lack of hard power aligns New Zealand’s prosperity with a secure, rules-based international system that increases the likelihood of a stable and secure global order. New Zealand’s diplomacy and prosperity has been intrinsically reliant on its reputation. A vital component of New Zealand’s diplomacy is preserving a reputation for integrity and global responsibility. It is the use of this soft power that facilitates the influence that New Zealand enjoys on the world stage. To weave a comprehensive network of successful diplomatic relationships, New Zealand must maintain a reputation of international credibility. Globalization has substantially influenced the practice of diplomacy for New Zealand. The current world order places economic and military might in the hands of a few, subsequently requiring smaller states to use other means for securing their interests. There are clear strategies evident in New Zealand’s diplomacy practice that draw attention to how other smaller states might best secure their foreign policy objectives. While these findings are limited, as with all case study research, there is value in applying the findings to other small states struggling to secure their interests in the wake of rapid globalization.

Keywords: diplomacy, foreign policy, globalisation, small state

Procedia PDF Downloads 361
858 Security Issues on Smart Grid and Blockchain-Based Secure Smart Energy Management Systems

Authors: Surah Aldakhl, Dafer Alali, Mohamed Zohdy

Abstract:

The next generation of electricity grid infrastructure, known as the "smart grid," integrates smart ICT (information and communication technology) into existing grids in order to alleviate the drawbacks of existing one-way grid systems. Future power systems' efficiency and dependability are anticipated to significantly increase thanks to the Smart Grid, especially given the desire for renewable energy sources. The security of the Smart Grid's cyber infrastructure is a growing concern, though, as a result of the interconnection of significant power plants through communication networks. Since cyber-attacks can destroy energy data, beginning with personal information leaking from grid members, they can result in serious incidents like huge outages and the destruction of power network infrastructure. We shall thus propose a secure smart energy management system based on the Blockchain as a remedy for this problem. The power transmission and distribution system may undergo a transformation as a result of the inclusion of optical fiber sensors and blockchain technology in smart grids. While optical fiber sensors allow real-time monitoring and management of electrical energy flow, Blockchain offers a secure platform to safeguard the smart grid against cyberattacks and unauthorized access. Additionally, this integration makes it possible to see how energy is produced, distributed, and used in real time, increasing transparency. This strategy has advantages in terms of improved security, efficiency, dependability, and flexibility in energy management. An in-depth analysis of the advantages and drawbacks of combining blockchain technology with optical fiber is provided in this paper.

Keywords: smart grids, blockchain, fiber optic sensor, security

Procedia PDF Downloads 71
857 A New Block Cipher for Resource-Constrained Internet of Things Devices

Authors: Muhammad Rana, Quazi Mamun, Rafiqul Islam

Abstract:

In the Internet of Things (IoT), many devices are connected and accumulate a sheer amount of data. These Internet-driven raw data need to be transferred securely to the end-users via dependable networks. Consequently, the challenges of IoT security in various IoT domains are paramount. Cryptography is being applied to secure the networks for authentication, confidentiality, data integrity and access control. However, due to the resource constraint properties of IoT devices, the conventional cipher may not be suitable in all IoT networks. This paper designs a robust and effective lightweight cipher to secure the IoT environment and meet the resource-constrained nature of IoT devices. We also propose a symmetric and block-cipher based lightweight cryptographic algorithm. The proposed algorithm increases the complexity of the block cipher, maintaining the lowest computational requirements possible. The proposed algorithm efficiently constructs the key register updating technique, reduces the number of encryption rounds, and adds a new layer between the encryption and decryption processes.

Keywords: internet of things, cryptography block cipher, S-box, key management, security, network

Procedia PDF Downloads 70
856 Unauthorized License Verifier and Secure Access to Vehicle

Authors: G. Prakash, L. Mohamed Aasiq, N. Dhivya, M. Jothi Mani, R. Mounika, B. Gomathi

Abstract:

In our day to day life, many people met with an accident due to various reasons like over speed, overload in the vehicle, violation of the traffic rules, etc. Driving license system is difficult task for the government to monitor. To prevent non-licensees from driving who are causing most of the accidents, a new system is proposed. The proposed system consists of a smart card capable of storing the license details of a particular person. Vehicles such as cars, bikes etc., should have a card reader capable of reading the particular license. A person, who wishes to drive the vehicle, should insert the card (license) in the vehicle and then enter the password in the keypad. If the license data stored in the card and database about the entire license holders in the microcontroller matches, he/she can proceed for ignition after the automated opening of the fuel tank valve, otherwise the user is restricted to use the vehicle. Moreover, overload detector in our proposed system verifies and then prompts the user to avoid overload before driving. This increases the security of vehicles and also ensures safe driving by preventing accidents.

Keywords: license, verifier, EEPROM, secure, overload detection

Procedia PDF Downloads 218
855 Tourism Qualification and Academics' Opinions about the Influence of Employability Skills on Graduates' Ability to Secure Jobs in the Tourism Industry

Authors: Nicola Wakelin-Theron

Abstract:

This study focuses on higher education institutions in South Africa, with the view to understanding how tourism as a study discipline has evolved over the years, as well as the influence of employability skills on graduates’ ability to secure jobs in the tourism industry. Indeed, the employability landscape is becoming more complex; hence, it is imperative for higher education institutions to equip students with employability skills while going through their academic programmes and during their transition from higher education to the world of work. Employability – which is regarded as an empowerment mechanism and a key to job security – is a set of achievements which increases the probability for graduates to find and maintain employment. A quantitative research method was used to obtain the necessary information. Data were collected through a web-based, online survey questionnaire directed to academics from various public higher education institutions in South Africa that offer tourism as a qualification. The key findings revealed that academics are of the opinion that there are 5 skills that are influential in obtaining a position within the tourism industry.

Keywords: employability, industry skills, tourism industry, tourism qualification

Procedia PDF Downloads 377
854 A Hybrid Model for Secure Protocol Independent Multicast Sparse Mode and Dense Mode Protocols in a Group Network

Authors: M. S. Jimah, A. C. Achuenu, M. Momodu

Abstract:

Group communications over public infrastructure are prone to a lot of security issues. Existing network protocols like Protocol Independent Multicast Sparse Mode (PIM SM) and Protocol Independent Multicast Dense Mode (PIM DM) do not have inbuilt security features. Therefore, any user or node can easily access the group communication as long as the user can send join message to the source nodes, the source node then adds the user to the network group. In this research, a hybrid method of salting and hashing to encrypt information in the source and stub node was designed, and when stub nodes need to connect, they must have the appropriate key to join the group network. Object oriented analysis design (OOAD) was the methodology used, and the result shows that no extra controlled bandwidth overhead cost was added by encrypting and the hybrid model was more securing than the existing PIM SM, PIM DM and Zhang secure PIM SM.

Keywords: group communications, multicast, PIM SM, PIM DM, encryption

Procedia PDF Downloads 136
853 Double Encrypted Data Communication Using Cryptography and Steganography

Authors: Adine Barett, Jermel Watson, Anteneh Girma, Kacem Thabet

Abstract:

In information security, secure communication of data across networks has always been a problem at the forefront. Transfer of information across networks is susceptible to being exploited by attackers engaging in malicious activity. In this paper, we leverage steganography and cryptography to create a layered security solution to protect the information being transmitted. The first layer of security leverages crypto- graphic techniques to scramble the information so that it cannot be deciphered even if the steganography-based layer is compromised. The second layer of security relies on steganography to disguise the encrypted in- formation so that it cannot be seen. We consider three cryptographic cipher methods in the cryptography layer, namely, Playfair cipher, Blowfish cipher, and Hills cipher. Then, the encrypted message is passed through the least significant bit (LSB) to the steganography algorithm for further encryption. Both encryption approaches are combined efficiently to help secure information in transit over a network. This multi-layered encryption is a solution that will benefit cloud platforms, social media platforms and networks that regularly transfer private information such as banks and insurance companies.

Keywords: cryptography, steganography, layered security, Cipher, encryption

Procedia PDF Downloads 52
852 Secure Network Coding against Content Pollution Attacks in Named Data Network

Authors: Tao Feng, Xiaomei Ma, Xian Guo, Jing Wang

Abstract:

Named Data Network (NDN) is one of the future Internet architecture, all nodes (i.e., hosts, routers) are allowed to have a local cache, used to satisfy incoming requests for content. However, depending on caching allows an adversary to perform attacks that are very effective and relatively easy to implement, such as content pollution attack. In this paper, we use a method of secure network coding based on homomorphic signature system to solve this problem. Firstly ,we use a dynamic public key technique, our scheme for each generation authentication without updating the initial secret key used. Secondly, employing the homomorphism of hash function, intermediate node and destination node verify the signature of the received message. In addition, when the network topology of NDN is simple and fixed, the code coefficients in our scheme are generated in a pseudorandom number generator in each node, so the distribution of the coefficients is also avoided. In short, our scheme not only can efficiently prevent against Intra/Inter-GPAs, but also can against the content poisoning attack in NDN.

Keywords: named data networking, content polloution attack, network coding signature, internet architecture

Procedia PDF Downloads 303
851 An Authentication Protocol for Quantum Enabled Mobile Devices

Authors: Natarajan Venkatachalam, Subrahmanya V. R. K. Rao, Vijay Karthikeyan Dhandapani, Swaminathan Saravanavel

Abstract:

The quantum communication technology is an evolving design which connects multiple quantum enabled devices to internet for secret communication or sensitive information exchange. In future, the number of these compact quantum enabled devices will increase immensely making them an integral part of present communication systems. Therefore, safety and security of such devices is also a major concern for us. To ensure the customer sensitive information will not be eavesdropped or deciphered, we need a strong authentications and encryption mechanism. In this paper, we propose a mutual authentication scheme between these smart quantum devices and server based on the secure exchange of information through quantum channel which gives better solutions for symmetric key exchange issues. An important part of this work is to propose a secure mutual authentication protocol over the quantum channel. We show that our approach offers robust authentication protocol and further our solution is lightweight, scalable, cost-effective with optimized computational processing overheads.

Keywords: quantum cryptography, quantum key distribution, wireless quantum communication, authentication protocol, quantum enabled device, trusted third party

Procedia PDF Downloads 142
850 The Relationship among Attachment Styles, Humor Styles and Communication Patterns in Female Married Students

Authors: Elham Fathi, Seyed Mohammad Kalantarkousheh, Abolfazl Hatami Varzane

Abstract:

The present study aimed to determine predict capacity of the relationship among attachment styles, humor styles and communication patterns in female married students. Statistical population consisted of female married students from Allameh Tabataba’i University. The research sample consisted of 104 married students selected through convenience sampling. They responded to study instruments that consisted of attachment styles, humor styles and Communication patterns questionnaires. Data was analyzed by means of correlation method. The results indicated significant positive relationship between secure attachment styles with adaptive humor styles, and anxious attachment styles with maladaptive humor styles. Also a negative relationship between avoidant attachment with affiliative humor, and anxious attachment with self-enhancing humor was found. Furthermore, a negative relationship between self- enhancing humor styles with demand – withdraw communication pattern, and between affiliative humor with mutual avoidant communication pattern and a positive relationship between affiliative humor with mutual constructive communication pattern was observed. The relationship between secure attachment with mutual constructive communication pattern was positive, while relationship between avoidant attachment to mutual constructive communication pattern was negative and significant and its relation with mutual avoidant communication pattern was significantly positive. The result of regression analysis indicated that affliative humor style and secure attachment style, positively predicted mutual constructive communication pattern. Avoidant attachment style positively and affliative humor style negatively predicted the mutual avoidant communication pattern. And self-enhancing humor style negatively predicted the demand – withdraw communication pattern style.

Keywords: attachment styles, communication patterns, humor styles, female married students

Procedia PDF Downloads 349