546 research outputs found
Diffusion-based clock synchronization for molecular communication under inverse Gaussian distribution
Nanonetworks are expected to expand the capabilities of individual nanomachines by allowing them to cooperate and share information by molecular communication. The information molecules are released by the transmitter nanomachine and diffuse across the aqueous channel as a Brownian motion holding the feature of a strong random movement with a large propagation delay. In order to ensure an effective real-time cooperation, it is necessary to keep the clock synchronized among the nanomachines in the nanonetwork. This paper proposes a model on a two-way message exchange mechanism with the molecular propagation delay based on the inverse Gaussian distribution. The clock offset and clock skew are estimated by the maximum likelihood estimation (MLE). Simulation results by MATLAB show that the mean square errors (MSE) of the estimated clock offsets and clock skews can be reduced and converge with a number of rounds of message exchanges. The comparison of the proposed scheme with a clock synchronization method based on symmetrical propagation delay demonstrates that our proposed scheme can achieve a better performance in terms of accuracy
Scalable rekeying algorithm in IEEE 802.16e
IEEE 802.16e standard provides wide coverage and high bandwidth for subscribers in a metropolitan area network. It introduces Multicast and Broadcast Rekeying Algorithm (MBRA) which is a multicasting scheme to communicate with many users concurrently. Although ELAPSE (for Efficient sub-Linear rekeying Algorithm with Perfect SEcrecy) improves on the deficiencies of MBRA, the algorithm poorly responds to scalability issue. This paper proposes a Scalable Rekeying Algorithm (SRA) based on a complete binary tree structure. SRA is introduced with linear linked list structure in order to make the system more scalable. Evaluation analysis shows that SRA manages to improve the scalability issue in MBRA for Mobile WiMAX
EAIA: An Efficient and Anonymous Identity Authentication Scheme in 5G-V2V
Vehicle Ad-hoc Networks (VANETs) have experienced significant development in
recent years, playing a crucial role in enhancing the driving experience by
enabling safer and more efficient inter-vehicle interactions through
information exchange. Vehicle-to-vehicle (V2V) communication is particularly
vital as it not only helps to prevent collisions and improve traffic efficiency
but also provides essential situational awareness to drivers or autonomous
driving systems. Communication is typically supported by Roadside Units (RSUs);
however, in practical applications, vehicles may exceed the communication range
of RSUs, thus exposing them to various malicious attacks. Additionally,
considering the limited computational resources of onboard units (OBUs) in
vehicles, there is a high demand for designing lightweight security protocols
that support V2V communication. To address this issue, this paper proposes an
efficient anonymous V2V identity authentication protocol tailored for scenarios
that lack RSU support. The proposed protocol has been formally assessed using
the Scyther tool, demonstrating its capability to withstand major typical
malicious attacks. Performance evaluations indicate that the proposed protocol
is efficient in terms of communication and computational overhead, making it a
viable solution for V2V vehicle communication
Analytical and Simulation Studies for Call Admission and Resource Allocation Schemes proposed for WiMAX system
Abstract-Quality communication over the wireless channel is now promised because of the advent of the broadband wireless. High speed data access is expected to be provided to subscribers through broadband wireless access. We propose a joint Call Admission Control (CAC) and Bandwidth Allocation (BA) for an IEEE 802.16 based WiMAX system. The presented schemes aim to provide QoS support along with a fair resource allocation algorithm for nrtPS traffic. Two strategies for CAC namely Conservative and Non-Conservative have been proposed. Conservative CAC guarantees the QoS requirements for all classes of traffic but is more restrictive and less efficient than the Non-Conservative CAC. The performance for proposed schemes has been studied through both analytical models and simulations
HSP60, a protein downregulated by IGFBP7 in colorectal carcinoma
<p>Abstract</p> <p>Background</p> <p>In our previous study, it was well defined that <it>IGFBP7 </it>was an important tumor suppressor gene in colorectal cancer (CRC). We aimed to uncover the downstream molecules responsible for <it>IGFBP7</it>'s behaviour in this study.</p> <p>Methods</p> <p>Differentially expressed protein profiles between PcDNA3.1(<it>IGFBP7</it>)-transfected RKO cells and the empty vector transfected controls were generated by two-dimensional gel electrophoresis (2-DE) and mass spectrometry (MS) identification. The selected differentially expressed protein induced by IGFBP7 was confirmed by western blot and ELISA. The biological behaviour of the protein was explored by cell growth assay and colony formation assay.</p> <p>Results</p> <p>Six unique proteins were found differentially expressed in PcDNA3.1(<it>IGFBP7</it>)-transfected RKO cells, including albumin (ALB), 60 kDa heat shock protein(HSP60), Actin cytoplasmic 1 or 2, pyruvate kinase muscle 2(PKM2), beta subunit of phenylalanyl-tRNA synthetase(FARSB) and hypothetical protein. The downregulation of HSP60 by IGFBP7 was confirmed by western blot and ELISA. Recombinant human HSP60 protein could increase the proliferation rate and the colony formation ability of PcDNA3.1(<it>IGFBP7</it>)-RKO cells.</p> <p>Conclusion</p> <p>HSP60 was an important downstream molecule of IGFBP7. The downregulation of HSP60 induced by IGFBP7 may be, at least in part, responsible for IGFBP7's tumor suppressive biological behaviour in CRC.</p
BEHT: Blockchain-Based Efficient Highway Toll Paradigm for Opportunistic Autonomous Vehicle Platoon
Autonomous vehicle platoon is a promising paradigm towards traffic congestion problems in the intelligent transportation system. However, under certain circumstances, the advantage of the platoon cannot be fully developed. In this paper, we focus on the highway Electronic Toll Collection (ETC) charging problem. We try to let the opportunistic platoon pass the ETC as a whole. There are three main issues in this scenario. Firstly, the opportunistic platoon is temporarily composed; vehicles do not trust each other. Secondly, single vehicle may try to escape from the ETC charging by following the platoon. Finally, platoon members may collude with each other and try to underreport the number of vehicles in the platoon so as to evade payment. To solve these challenges, we propose a blockchain-based efficient highway toll paradigm for the opportunistic platoon. The driving history, credential information of every registered vehicle, is recorded and verified from the blockchain. A roadside unit (RSU) is adopted to distinguish the single vehicle from the platoon and in charge of lane allocation. Additionally, an aggregate signature is introduced to accelerate the authentication procedure in the RSU. We analyse the potential security threats in this scenario. The experimental result indicates that our scheme is efficient and practical.
Document type: Articl
Secure federated distillation GAN for CIDS in industrial CPS
Aiming at the data island problem caused by the imperativeness of confidentiality of sensitive information, a secure and collaborative intrusion detection system (CIDS) for industrial cyber physical systems (CPS) was proposed, called PFD-GAN.Specifically, a novel semi-supervised intrusion detection model was firstly developed by improving external classifier-generative adversarial network (EC-GAN) with Wasserstein distance and label condition, to strengthen the classification performance through the use of synthetic data.Furthermore, local differential privacy (LDP) technology was incorporated into the training process of developed EC-GAN to prevent sensitive information leakage and ensure privacy and security in collaboration.Moreover, a decentralized federated distillation (DFD)-based collaboration was designed, allowing multiple industrial CPS to collectively build a comprehensive intrusion detection system (IDS) to recognize the threats under the entire cyber systems without sharing a uniform template model.Experimental evaluation and theory analysis demonstrate that the proposed PFD-GAN is secure from the threats of privacy leaking and highly effective in detecting various types of attacks on industrial CPS
Edge intelligence-enabled cyber-physical systems
With the advent of the Internet of everything era, people's demand for intelligent Internet of Things (IoT) devices is steadily increasing. A more intelligent cyber-physical system (CPS) is needed to meet the diverse business requirements of users, such as ultra-reliable low-latency communication, high quality of services (QoS), and quality of experience (QoE). Edge intelligence (EI) is recognized by academia and industry as one of the key emerging technologies for the CPS, which provides the ability to analyze data at the edge rather than sending it to the cloud for analysis, and will be a key enabler to realize a world of a trillion hyperconnected smart sensing devices.As a distributed intelligent computing paradigm in which computation is largely or completely performed at distributed nodes, EI provides for the rapid development of artificial intelligence (AI) and edge computing resources to support real-time insight and analysis for applications in CPS, which brings memory, computing power and processing ability closer to the location where it is needed, reduces the volumes of data that must be moved, the consequent traffic, and the distance the data must travel. As an emerging intelligent computing paradigm, EI can accelerate content delivery and improve the QoS of applications, which is attracting more and more research attentions from academia and industry because of its advantages in throughput, delay, network scalability and intelligence in CPS.The guest editors would like to thank all the authors and the reviewers for their hard work and contributions in helping to organize this special issue. They also would like to express their heartfelt gratitude to the Editor-in-Chief, Prof. David W. Walker, for giving us this great opportunity, and the members of the Editorial Staff for their support during the process.Scopu
- …
