17 resultados para Cross crypto cipher encryptation scheme

em Instituto Politécnico do Porto, Portugal


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Critical Infrastructures became more vulnerable to attacks from adversaries as SCADA systems become connected to the Internet. The open standards for SCADA Communications make it very easy for attackers to gain in-depth knowledge about the working and operations of SCADA networks. A number of Intenrnet SCADA security issues were raised that have compromised the authenticity, confidentiality, integrity and non-repudiation of information transfer between SCADA Components. This paper presents an integration of the Cross Crypto Scheme Cipher to secure communications for SCADA components. The proposed scheme integrates both the best features of symmetric and asymmetric encryptiontechniques. It also utilizes the MD5 hashing algorithm to ensure the integrity of information being transmitted.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

A vital role is being played by SCADA Communication for Supervisory Control and Data acquisition (SCADA) Monitoring Ststems. Devices that are designed to operate in safety-critical environments are usually designed to failsafe, but security vulnerabilities could be exploited by an attacker to disable the fail-safe mechanisms. Thus these devices must not onlybe designed for safety but also for security. This paper presents a study of the comparison of different Encryption schemes for securing SCADA Component Communication. The encryption schemes such as Symetric Key Encrypton in Wireless SCADA Environment, Assymmetric-key Encryption to Internet SCADA, and the Cross Crypto Scheme Cipher to secure communication for SCADA are analysed and the outcome is evaluated.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

On this paper we present a modified regularization scheme for Mathematical Programs with Complementarity Constraints. In the regularized formulations the complementarity condition is replaced by a constraint involving a positive parameter that can be decreased to zero. In our approach both the complementarity condition and the nonnegativity constraints are relaxed. An iterative algorithm is implemented in MATLAB language and a set of AMPL problems from MacMPEC database were tested.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Secure group communication is a paradigm that primarily designates one-to-many communication security. The proposed works relevant to secure group communication have predominantly considered the whole network as being a single group managed by a central powerful node capable of supporting heavy communication, computation and storage cost. However, a typical Wireless Sensor Network (WSN) may contain several groups, and each one is maintained by a sensor node (the group controller) with constrained resources. Moreover, the previously proposed schemes require a multicast routing support to deliver the rekeying messages. Nevertheless, multicast routing can incur heavy storage and communication overheads in the case of a wireless sensor network. Due to these two major limitations, we have reckoned it necessary to propose a new secure group communication with a lightweight rekeying process. Our proposal overcomes the two limitations mentioned above, and can be applied to a homogeneous WSN with resource-constrained nodes with no need for a multicast routing support. Actually, the analysis and simulation results have clearly demonstrated that our scheme outperforms the previous well-known solutions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

An experimental and Finite Element study was performed on the bending behaviour of wood beams of the Pinus Pinaster species repaired with adhesively-bonded carbon–epoxy patches, after sustaining damage by cross-grain failure. This damage is characterized by crack growth at a small angle to the beams longitudinal axis, due to misalignment between the wood fibres and the beam axis. Cross-grain failure can occur in large-scale in a wood member when trees that have grown spirally or with a pronounced taper are cut for lumber. Three patch lengths were tested. The simulations include the possibility of cohesive fracture of the adhesive layer, failure within the wood beam in two propagation planes and patch interlaminar failure, by the use of cohesive zone modelling. The respective cohesive properties were estimated either by an inverse method or from the literature. The comparison with the tests allowed the validation of the proposed methodology, opening a good perspective for the reduction of costs in the design stages of these repairs due to extensive experimentation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The English article system is actually so complex that it presents many challenges for most non-native learners of English. The main difficulty of Portuguese learners, despite the numerous similarities between the two article systems, is noticeable in a marked tendency to produce the definite article where native speakers of English would not use it. This article reports the results of a cross-sectional study which examined the English definite article overproduction by a group of 12 Portuguese EFL learners with at least seven years of English instruction. The prediction is that these learners will exhibit evidence of transferring L1 features to their interlanguage when they overuse the definite article. The data were collected by means of a gap-filling task and a composition. The results found, as predicted, that these learners overused the in generic contexts. It is argued that this overuse is directly tied to and can be explained by transfer to somewhere and conceptual transfer principles.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Objective Patient-centredness has become an important aspect of health service delivery; however, there are a limited number of studies that focus on this concept in the domain of hearing healthcare. The objective of this study was to examine and compare audiologists’ preferences for patient-centredness in Portugal, India and Iran. Design The study used a cross-sectional survey design with audiologists recruited from three different countries. Participants A total of 191 fully-completed responses were included in the analysis (55 from Portugal, 78 from India and 58 from Iran). Main outcome measure The Patient–Practitioner Orientation Scale (PPOS). Results PPOS mean scores suggest that audiologists have a preference for patient-centredness (ie, mean of 3.6 in a 5-point scale). However, marked differences were observed between specific PPOS items suggesting these preferences vary across clinical situations. A significant level of difference (p<0.001) was found between audiologists’ preferences for patient-centredness in three countries. Audiologists in Portugal had a greater preference for patient-centredness when compared to audiologists in India and Iran, although no significant differences were found in terms of age and duration of experience among these sample populations. Conclusions There are differences and similarities in audiologists’ preferences for patient-centredness among countries. These findings may have implications for the training of professionals and also for clinical practice in terms of optimising hearing healthcare across countries.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Objective The aim of this study was to determine tympanometric values of children who attend Oporto daycare centers and further analyze any relations with host and environmental factors. Methods Cross sectional study in a randomly selected sample of 117 daycare children up-to 3-years old from Oporto. Tympanometric measures were collected. Results Children presented in left ear (LE) a mean peak pressure (PP) of −156.53 daPa and a mean compliance of 0.16 cm3. Right ear (RE) revealed a PP of −145.61 daPa and a compliance of 0.19 cm3. Normal tympanograms (type A) had a lower frequency than abnormal tympanograms (type B and type C). There was a positive association between age and compliance (LE: p = 0.016; RE: p = 0.013) and between the presence of rhinorrhea and PP (LE: p = 0.002; RE: p < 0.05). Abnormal tympanograms were more frequent in Spring (RE: p = 0.009), in younger children (LE: p = 0.03) and in children that had rhinorrhea (LE: p = 0.002; RE: p = 0.044). Healthy children had a mean PP of −125.19 daPa and a mean compliance of 0.21 cm3 in LE and a mean PP of −144.27 daPa and a mean compliance of 0.22 cm3 in RE. Conclusion Tympanometric measures presented in this paper may be applicable to Oporto daycare children up-to 3 years-old. Most of daycare children revealed abnormal tympanograms. Age, rhinorrhea and season influenced children's middle-ear condition.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The increasing and intensive integration of distributed energy resources into distribution systems requires adequate methodologies to ensure a secure operation according to the smart grid paradigm. In this context, SCADA (Supervisory Control and Data Acquisition) systems are an essential infrastructure. This paper presents a conceptual design of a communication and resources management scheme based on an intelligent SCADA with a decentralized, flexible, and intelligent approach, adaptive to the context (context awareness). The methodology is used to support the energy resource management considering all the involved costs, power flows, and electricity prices leading to the network reconfiguration. The methodology also addresses the definition of the information access permissions of each player to each resource. The paper includes a 33-bus network used in a case study that considers an intensive use of distributed energy resources in five distinct implemented operation contexts.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The European Union Emissions Trading Scheme (EU ETS) is a cornerstone of the European Union's policy to combat climate change and its key tool for reducing industrial greenhouse gas emissions cost-effectively. The purpose of the present work is to evaluate the influence of CO2 opportunity cost on the Spanish wholesale electricity price. Our sample includes all Phase II of the EU ETS and the first year of Phase III implementation, from January 2008 to December 2013. A vector error correction model (VECM) is applied to estimate not only long-run equilibrium relations, but also short-run interactions between the electricity price and the fuel (natural gas and coal) and carbon prices. The four commodities prices are modeled as joint endogenous variables with air temperature and renewable energy as exogenous variables. We found a long-run relationship (cointegration) between electricity price, carbon price, and fuel prices. By estimating the dynamic pass-through of carbon price into electricity price for different periods of our sample, it is possible to observe the weakening of the link between carbon and electricity prices as a result from the collapse on CO2 prices, therefore compromising the efficacy of the system to reach proposed environmental goals. This conclusion is in line with the need to shape new policies within the framework of the EU ETS that prevent excessive low prices for carbon over extended periods of time.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In recent years, vehicular cloud computing (VCC) has emerged as a new technology which is being used in wide range of applications in the area of multimedia-based healthcare applications. In VCC, vehicles act as the intelligent machines which can be used to collect and transfer the healthcare data to the local, or global sites for storage, and computation purposes, as vehicles are having comparatively limited storage and computation power for handling the multimedia files. However, due to the dynamic changes in topology, and lack of centralized monitoring points, this information can be altered, or misused. These security breaches can result in disastrous consequences such as-loss of life or financial frauds. Therefore, to address these issues, a learning automata-assisted distributive intrusion detection system is designed based on clustering. Although there exist a number of applications where the proposed scheme can be applied but, we have taken multimedia-based healthcare application for illustration of the proposed scheme. In the proposed scheme, learning automata (LA) are assumed to be stationed on the vehicles which take clustering decisions intelligently and select one of the members of the group as a cluster-head. The cluster-heads then assist in efficient storage and dissemination of information through a cloud-based infrastructure. To secure the proposed scheme from malicious activities, standard cryptographic technique is used in which the auotmaton learns from the environment and takes adaptive decisions for identification of any malicious activity in the network. A reward and penalty is given by the stochastic environment where an automaton performs its actions so that it updates its action probability vector after getting the reinforcement signal from the environment. The proposed scheme was evaluated using extensive simulations on ns-2 with SUMO. The results obtained indicate that the proposed scheme yields an improvement of 10 % in detection rate of malicious nodes when compared with the existing schemes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

8th International Workshop on Multiple Access Communications (MACOM2015), Helsinki, Finland.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The shifted Legendre orthogonal polynomials are used for the numerical solution of a new formulation for the multi-dimensional fractional optimal control problem (M-DFOCP) with a quadratic performance index. The fractional derivatives are described in the Caputo sense. The Lagrange multiplier method for the constrained extremum and the operational matrix of fractional integrals are used together with the help of the properties of the shifted Legendre orthonormal polynomials. The method reduces the M-DFOCP to a simpler problem that consists of solving a system of algebraic equations. For confirming the efficiency and accuracy of the proposed scheme, some test problems are implemented with their approximate solutions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper analyzes the signals captured during impacts and vibrations of a mechanical manipulator. The Fourier Transform of eighteen different signals are calculated and approximated by trendlines based on a power law formula. A sensor classification scheme based on the frequency spectrum behavior is presented.