8 resultados para Immune passive transfer

em Deakin Research Online - Australia


Relevância:

40.00% 40.00%

Publicador:

Resumo:

In this paper we propose a secure ownership transfer protocol for a multi-tag and multi-owner RFID environment. Most of the existing work in this area do not comply with the EPC Global Class-1 Gen-2 (C1G2) standard since they use expensive hash operations or sophisticated encryption schemes that cannot be implemented on low-cost passive tags that are highly resource constrained. Our work aims to fill this gap by proposing a protocol based on simple XOR and 128-bit Pseudo Random Number Generators (PRNG), operations that can be easily implemented on low-cost passive RFID tags. The protocol thus achieves EPC C1G2 compliance while meeting the security requirements. Also, our protocol provides additional protection using a blind-factor to prevent tracking attacks.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

In this paper we propose a secure ownership transfer protocol for a multi-tag multi-owner RFID environment that provides individual-owner-privacy. To our knowledge, the existing schemes do not provide individual-owner-privacy and most of the existing schemes do not comply with the EPC Global Class-1 Gen-2 (C1G2) standard since the protocols use expensive hash operations or sophisticated encryption schemes that cannot be implemented on low-cost passive tags that are highly resource constrained. Our work aims to fill these gaps by proposing a protocol that provides individual-owner-privacy, based on simple XOR and 128-bit pseudo-random number generators (PRNG), operations that are easily implemented on low-cost RFID tags while meeting the necessary security requirements thus making it a viable option for large scale implementations. Our protocol also provides additional protection by hiding the pseudo-random numbers during all transmissions using a blind-factor to prevent tracking attacks.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The promise of cancer immunotherapy is that it will not only eradicate primary tumors but will generate systemic antitumor immunity capable of destroying distant metastases. A major problem that must first be surmounted relates to the immune resistance of large tumors. Here we reveal that immune resistance can be overcome by combining immunotherapy with a concerted attack on the tumor vasculature. The functionally related antitumor drugs 5,6-dimethylxanthenone-4-acetic acid (DMXAA) and flavone acetic acid (FAA), which cause tumor vasculature collapse and tumor necrosis, were used to attack the tumor vasculature, whereas the T-cell costimulator B7.1 (CD80), which costimulates T-cell proliferation via the CD28 pathway, was used to stimulate antitumor immunity. The injection of cDNA (60–180 µg) encoding B7.1 into large EL-4 tumors (0.8 cm in diameter) established in C57BL/6 mice, followed 24 h later by i.p. administration of either DMXAA (25 mg/kg) or FAA (300 mg/kg), resulted in complete tumor eradication within 2–6 weeks. In contrast, monotherapies were ineffective. Both vascular attack and B7.1 immunotherapy led to up-regulation of heat shock protein 70 on stressed and dying tumor cells, potentially augmenting immunotherapy. Remarkably, large tumors took on the appearance of a wound that rapidly ameliorated, leaving perfectly healed skin. Combined therapy was mediated by CD8+ T cells and natural killer cells, accompanied by heightened and prolonged antitumor cytolytic activity (P < 0.001), and by a marked increase in tumor cell apoptosis. Cured animals completely rejected a challenge of 1 x 107 parental EL-4 tumor cells but not a challenge of 1 x 104 Lewis lung carcinoma cells, demonstrating that antitumor immunity was tumor specific. Adoptive transfer of 2 x 108 splenocytes from treated mice into recipients bearing established (0.8 cm in diameter) tumors resulted in rapid and complete tumor rejection within 3 weeks. Although DMXAA and B7.1 monotherapies are complicated by a narrow range of effective doses, combined therapy was less dosage dependent. Thus, a broad range of amounts of B7.1 cDNA were effective in combination with 25 mg/kg DMXAA. In contrast, DMXAA, which has a very narrow range of high active doses, was effective at a low dose (18 mg/kg) when administered with a large amount (180 µg) of B7.1 cDNA. Importantly, combinational therapy generated heightened antitumor immunity, such that gene transfer of B7.1 into one tumor, followed by systemic DMXAA treatment, led to the complete rejection of multiple untreated tumor nodules established in the opposing flank. These findings have important implications for the future direction and utility of cancer immunotherapies aimed at harnessing patients’ immune responses to their own tumors.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In this paper we propose a novel secure tag ownership transfer scheme for closed loop RFID systems. An important property of our method is that the ownership transfer is guaranteed to be atomic and the scheme is protected against desynchronisation leading to permanent DoS. Further, it is suited to the computational constraints of EPC Class-1 Gen-2 passive RFID tags as they only use the CRC and PRNG functions that passive RFID tags are capable of. We provide a detailed security analysis to show that our scheme satisfies the required security properties of tag anonymity, tag location privacy, forward secrecy, forward untraceability while being resistant to replay, desynchronisation and server impersonation attacks. Performance comparisons show that our scheme is practical and can be implemented on passive low-cost RFID tags.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Existing business models require RFID tag to transfer its ownership during its life cycle. As a result, a RFID tags might have many owners during its life cycle. However, the transfer of ownership should ensure that previous owners have no information about current owner's data. Physical ownership does not ensure digital ownership transfer given the wireless nature of communication with RFID tags. Most of the proposed protocol in this nature is implacable to address aU existing RFID tag ownership transfer scenarios. Moreover, they have many security concerns and vulnerabilities. In this paper, we have investigated and discussed all existing business cases and their transfer scenarios. To cover all ownership transfer scenarios, we have presented an ownership transfer protocol. The proposed protocol has used modified DiffieHellman algorithm to perform ownership request validation and authentication of involved parties. Performance comparison shows that our protocol is practical to implement passive low-cost RFID tags, securely performs tag ownership transfer and can be used for all existing ownership transfer scenarios.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In this paper, we propose a novel approach to secure ownership transfer in RFID systems based on the quadratic residue property. We present two secure ownership transfer schemes-the closed loop and open loop schemes. An important property of our schemes is that ownership transfer is guaranteed to be atomic. Further, both our schemes are suited to the computational constraints of EPC Class-1 Gen-2 passive RFID tags as they only use operations that such passive RFID tags are capable of. We provide a detailed security analysis to show that our schemes achieve strong privacy and satisfy the required security properties of tag anonymity, tag location privacy, forward secrecy, and forward untraceability. We also show that the schemes are resistant to replay (both passive and algebraic), desynchronization, and server impersonation attacks. Performance comparisons demonstrate that our schemes are practical and can be implemented on low-cost passive RFID tags.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In the RFID system a tag is attached to an object which might own by a number of people during its life cycle. As a result, the RFID system requires to transfer ownership of the tag. The ownership transfer has to protect privacy of current and new owner. There are number of ownership transfer protocol proposed to achieve secure ownership transfer. However, most of them are impractical or insecure to implement on current passive RFID tags. We are presenting an ownership transfer protocol using timer based shared secret for closed loop RFID systems. The protocol will ensure security and privacy of involved parties in the idle circumstances. Our comparison shows that the proposed protocol is more secure and practical than existing similar ones.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In RFID system a tag is attached to an object which might own by a number of owners during its life time. This requires the RFID system to transfer ownership of the tag to its new owner. The ownership transfer has to protect privacy of current and new owner. Many ownership tag ownership transfer exists in the literature, however, most of them are impractical or insecure to implement on current passive RFID tags. We are proposing a timer based ownership transfer protocol for closed loop RFID systems. The proposal in this paper includes two implement scenario to cover diverse tags type. The protocol will ensure security and privacy of involved parties in the idle circumstances. Our comparison shows that the proposed protocol is more secure and practical than existing similar ones.