991 resultados para Bi-modal authentication
Resumo:
We consider the problem of secure communication in mobile Wireless Sensor Networks (WSNs). Achieving security in WSNs requires robust encryption and authentication standards among the sensor nodes. Severe resources constraints in typical Wireless Sensor nodes hinder them in achieving key agreements. It is proved from past studies that many notable key management schemes do not work well in sensor networks due to their limited capacities. The idea of key predistribution is not feasible considering the fact that the network could scale to millions. We prove a novel algorithm that provides robust and secure communication channel in WSNs. Our Double Encryption with Validation Time (DEV) using Key Management Protocol algorithm works on the basis of timed sessions within which a secure secret key remains valid. A mobile node is used to bootstrap and exchange secure keys among communicating pairs of nodes. Analysis and simulation results show that the performance of the DEV using Key Management Protocol Algorithm is better than the SEV scheme and other related work.
Resumo:
The role of Bi layer (thickness similar to 7 nm) on As2S3 film was extensively studied for different optical applications in which Bi (top layer) as active and diffusing layer and As2S3 as barrier (matrix) layer. Bilayer thin films of Bi/As2S3 were prepared from Bi and As2S3 by thermal evaporation technique under high vacuum. The decrease of optical band gap with the addition of Bi to As2S3 has been explained on the basis of density of states and the increase in disorder in the system. It was found that the efficient changes of optical parameters (transmission, optical band gap, refraction) could be realized due to the photo induced diffusion activated by the focused 532 nm laser irradiation and formation of different bonds. The diffusion of Bi into As2S3 matrix increases the optical band gap producing photo bleaching effect. The changes were characterised by different experimental techniques. (C) 2012 Elsevier B.V. All rights reserved.
Resumo:
Void filling in (I) Bi-x-added Co4Sb12 or (II) Sb/Bi substitution of Co4Sb12-xBix has been investigated for structural and thermoelectric properties evaluation. X-ray powder data Rietveld refinements combined with electron probe microanalyses showed a polycrystalline and practically Bi-free CoSb3 skutterudite phase as the major constituent as well as a secondary Bi phase in the grain boundaries. For series I alloys, the electrical conductivity, Seebeck coefficient and thermal conductivity were measured as a function of temperature in the range from 450 to 750 K. The electrical conductivity of all the samples increased with increasing temperature, showing a semiconducting nature with smaller values of the Seebeck coefficient for higher Bi fractions. Conduction over the entire temperature range was found to arise from a single p-type carrier. Thermal conductivity showed a reduction with Bi added in all the samples, except for Bi0.75Co4Sb12, and the lowest lattice thermal conductivity was found for a Bi-added fraction of 0.5. The maximum zT value of 0.53 at 632 K is higher than that of Co4Sb12.
Resumo:
Classical control and one cycle control of current are popular methods used to modulate pulses in active rectifiers for ac-dc power conversion. One cycle control has lower control complexity and can be implemented using linear analog circuits when compared with the classical approach. However, it also suffers from problems such as instability and offsets in current that is severe at light load conditions. A control strategy for bidirectional boost rectifiers based on one cycle control of charge is proposed for that overcomes these limitations. The integral of sensed current, which represents charge, is compared with a non-linear carrier, which is modified for ac-dc power conversion. This generates the gating signals for the switching devices. The modifications required for the control law governing one cycle control of charge is derived in the paper. Detailed simulation studies are carried out to compare one cycle control of current with the proposed method for ac-dc power conversion, which are validated on a laboratory hardware prototype.
Resumo:
Automated security is one of the major concerns of modern times. Secure and reliable authentication systems are in great demand. A biometric trait like the finger knuckle print (FKP) of a person is unique and secure. Finger knuckle print is a novel biometric trait and is not explored much for real-time implementation. In this paper, three different algorithms have been proposed based on this trait. The first approach uses Radon transform for feature extraction. Two levels of security are provided here and are based on eigenvalues and the peak points of the Radon graph. In the second approach, Gabor wavelet transform is used for extracting the features. Again, two levels of security are provided based on magnitude values of Gabor wavelet and the peak points of Gabor wavelet graph. The third approach is intended to authenticate a person even if there is a damage in finger knuckle position due to injury. The FKP image is divided into modules and module-wise feature matching is done for authentication. Performance of these algorithms was found to be much better than very few existing works. Moreover, the algorithms are designed so as to implement in real-time system with minimal changes.
Resumo:
Authentication protocols are very much essential for secure communication in mobile ad hoc networks (MANETs). A number of authentication protocols for MANETs have been proposed in the literature which provide the basic authentication service while trying to optimize their performance and resource consumption parameters. A problem with most of these protocols is that the underlying networking environment on which they are applicable have been left unspecified. As a result, lack of specifications about the networking environments applicable to an authentication protocol for MANETs can mislead about the performance and the applicability of the protocol. In this paper, we first characterize networking environment for a MANET as its 'Membership Model' which is defined as a set of specifications related to the 'Membership Granting Server' (MGS) and the 'Membership Set Pattern' (MSP) of the MANET. We then identify various types of possible membership models for a MANET. In order to illustrate that while designing an authentication protocol for a MANET, it is very much necessary to consider the underlying membership model of the MANET, we study a set of six representative authentication protocols, and analyze their applicability for the membership models as enumerated in this paper. The analysis shows that the same protocol may not perform equally well in all membership models. In addition, there may be membership models which are important from the point of view of users, but for which no authentication protocol is available.
Resumo:
In this paper, we have proposed a centralized multicast authentication protocol (MAP) for dynamic multicast groups in wireless networks. In our protocol, a multicast group is defined only at the time of the multicasting. The authentication server (AS) in the network generates a session key and authenticates it to each of the members of a multicast group using the computationally inexpensive least common multiple (LCM) method. In addition, a pseudo random function (PRF) is used to bind the secret keys of the network members with their identities. By doing this, the AS is relieved from storing per member secrets in its memory, making the scheme completely storage scalable. The protocol minimizes the load on the network members by shifting the computational tasks towards the AS node as far as possible. The protocol possesses a membership revocation mechanism and is protected against replay attack and brute force attack. Analytical and simulation results confirm the effectiveness of the proposed protocol.
Resumo:
The ferroelectric system (1-x)PbZrO3-(x)Bi(Mg1/2Ti1/2)O-3 has been investigated as a function of composition, temperature, and electric field by x-ray powder diffraction, dielectric, and ferroelectric measurements. Within the solubility limit (x similar to 0.25), the system evolves from an orthorhombic-antiferroelectric to rhombohedral-ferroelectric state through a phase coexistence region. The highest polarization was found not for the composition exhibiting a pure ferroelectric state, but for a composition x = 0.15 exhibiting ferroelectric + antiferroelectric phase coexistence close to the rhombohedral phase boundary. Electric poling of the equilibrium two-phase state led to irreversible enhancement in the rhombohedral phase fraction suggesting that the enhanced polarization is related to the enhanced polarizability of the lattice due to first order criticality as in ferroelectric-ferroelectric morphotropic phase boundary systems. (C) 2013 AIP Publishing LLC.
Resumo:
In this paper, we propose a novel authentication protocol for MANETs requiring stronger security. The protocol works on a two-tier network architecture with client nodes and authentication server nodes, and supports dynamic membership. We use an external membership granting server (MGS) to provide stronger security with dynamic membership. However, the external MGS in our protocol is semi-online instead of being online, i.e., the MGS cannot initiate a connection with a network node but any network node can communicate with the MGS whenever required. To ensure efficiency, the protocol uses symmetric key cryptography to implement the authentication service. However, to achieve storage scalability, the protocol uses a pseudo random function (PRF) to bind the secret key of a client to its identity using the secret key of its server. In addition, the protocol possesses an efficient server revocation mechanism along with an efficient server re-assignment mechanism, which makes the protocol robust against server node compromise.
Resumo:
The basic requirements for secure communication in a vehicular ad hoc network (VANET) are anonymous authentication with source non-repudiation and integrity. The existing security protocols in VANETs do not differentiate between the anonymity requirements of different vehicles and the level of anonymity provided by these protocols is the same for all the vehicles in a network. To provide high level of anonymity, the resource requirements of security protocol would also be high. Hence, in a resource constrained VANET, it is necessary to differentiate between the anonymity requirements of different vehicles and to provide the level of anonymity to a vehicle as per its requirement. In this paper, we have proposed a novel protocol for authentication which can provide multiple levels of anonymity in VANETs. The protocol makes use of identity based signature mechanism and pseudonyms to implement anonymous authentication with source non-repudiation and integrity. By controlling the number of pseudonyms issued to a vehicle and the lifetime of each pseudonym for a vehicle, the protocol is able to control the level of anonymity provided to a vehicle. In addition, the protocol includes a novel pseudonym issuance policy using which the protocol can ensure the uniqueness of a newly generated pseudonym by checking only a very small subset of the set of pseudonyms previously issued to all the vehicles. The protocol cryptographically binds an expiry date to each pseudonym, and in this way, enforces an implicit revocation for the pseudonyms. Analytical and simulation results confirm the effectiveness of the proposed protocol.
Resumo:
An attempt to study the fluid dynamic behavior of two phase flow comprising of solid and liquid with nearly equal density in a geometrical case that has an industrial significance in theareas like processing of polymers, food, pharma ceutical, paints. In this work,crystalline silica is considered as the dispersed medium in glycerin. In the CFD analysis carried out,the two phase components are considered to be premixed homogeneously at the initial state. The flow in a cylinder that has an axially driven bi-lobe rotor, a typical blender used in polymer industry for mixing or kneading to render the multi-component mixture to homogeneous condition is considered. A viscous, incompressible, isothermal flow is considered with an assumption that the components do not undergo any physical change and the solids are rigid and mix in fully wetting conditions. Silica with a particle diameter of 0.4 mm is considered and flow is analyzed for different mixing fractions. An industry standard CFD code is used for solving 3D-RANS equations. As the outcome of the study the torque demand by the bi-lobe rotor for different mixture fractions which are estimated show a behavioral consistency to the expected physical phenomena occurring in the domain considered.
Resumo:
This paper explains the algorithm of Modified Roaming Optimization (MRO) for capturing the multiple optima for multimodal functions. There are some similarities between the Roaming Optimization (RO) and MRO algorithms, but the MRO algorithm is created to overcome the problems facing while applying the RO to the problems possessing large number of solutions. The MRO mainly uses the concept of density to overcome the challenges posed by RO. The algorithm is tested with standard test functions and also discussions are made to improve the efficacy of the MRO algorithm. This paper also gives the results of MRO applied for solving Inverse Kinematics (IK) problem for SCARA and PUMA robots.
Resumo:
This paper presents experimental and analytical studies on fatigue crack propagation in concrete-concrete cold jointed interface specimens. Beams of different sizes having jointed interface between two concretes with different elastic properties are tested under fatigue loading. The acoustic emission technique is used for monitoring the fatigue crack growth. It is observed that the interface having a higher moduli mismatch tends to behave in a brittle manner. The CMOD compliances at different loading cycles are measured and the equivalent crack lengths are determined from a finite element analysis. An analytical model for crack growth rate is proposed using the concepts of the dimensional analysis. (C) 2014 Elsevier Ltd. All rights reserved.
Resumo:
Significance: The bi-domain protein tyrosine phosphatases (PTPs) exemplify functional evolution in signaling proteins for optimal spatiotemporal signal transduction. Bi-domain PTPs are products of gene duplication. The catalytic activity, however, is often localized to one PTP domain. The inactive PTP domain adopts multiple functional roles. These include modulation of catalytic activity, substrate specificity, and stability of the bi-domain enzyme. In some cases, the inactive PTP domain is a receptor for redox stimuli. Since multiple bi-domain PTPs are concurrently active in related cellular pathways, a stringent regulatory mechanism and selective cross-talk is essential to ensure fidelity in signal transduction. Recent Advances: The inactive PTP domain is an activator for the catalytic PTP domain in some cases, whereas it reduces catalytic activity in other bi-domain PTPs. The relative orientation of the two domains provides a conformational rationale for this regulatory mechanism. Recent structural and biochemical data reveal that these PTP domains participate in substrate recruitment. The inactive PTP domain has also been demonstrated to undergo substantial conformational rearrangement and oligomerization under oxidative stress. Critical Issues and Future Directions: The role of the inactive PTP domain in coupling environmental stimuli with catalytic activity needs to be further examined. Another aspect that merits attention is the role of this domain in substrate recruitment. These aspects have been poorly characterized in vivo. These lacunae currently restrict our understanding of neo-functionalization of the inactive PTP domain in the bi-domain enzyme. It appears likely that more data from these research themes could form the basis for understanding the fidelity in intracellular signal transduction.
Resumo:
Innovative bi-electrolyte solid-state cells incorporating single crystal CaF2 and composition-graded solid electrolyte (LaF3) y (CaF2) 1-y (y = 0 to 0.32) were used for measurement of the standard Gibbs energy of formation of hexagonal La0.885Al11.782O19 and cubic LaAlO3 from component binary oxides La2O3 and alpha-Al2O3 in the temperature range from 875 to 1175 K. The cells were designed based on experimentally verified relevant phase relations in the systems La2O3-Al2O3LaF3 and CaF2-LaF3. The results can be summarized as: 5.891 alpha-Al2O3 + 0.4425 La2O3 (A-rare earth)-> La0.885Al11.782O19 (hex), Delta G(f(ox))(degrees)(+/- 2005)/Jmol(-1) = -80982 + 7.313(T/K); 1/2 La2O3 (A-rare earth) + 1/2 a-Al2O3 -> LaAlO3 (cubic), Delta G(f(ox))(degrees)(+/- 2100)/Jmol(-1) = -59810 + 4.51(T/K). Electron probe microanalysis was used to ascertain the non-stoichiometric range of the hexaaluminate phase. The results are critically analyzed in the light of earlier electrochemical measurements. Several imperfections in the electrochemical cells used by former investigators are identified. Data obtained in the study for LaAlO3 are consistent with calorimetric enthalpy of formation and entropy derived from heat capacity data. Estimated are the standard entropy and the standard enthalpy of formation from elements of hexagonal La0.885Al11.782O19 and rhombohedral LaAlO3 at 298.15 K. c 2014 The Electrochemical Society. All rights reserved.