758 resultados para Wireless sensing
Resumo:
Conselho Nacional de Desenvolvimento Científico e Tecnológico (CNPq)
Resumo:
Bacterial quorum sensing (QS) is a density dependent communication system that regulates the expression of certain genes including production of virulence factors in many pathogens. Bioactive plant extract/compounds inhibiting QS regulated gene expression may be a potential candidate as antipathogenic drug. In this study anti-QS activity of peppermint (Menthe piperita) oil was first tested using the Chromobacterium violaceum CVO26 biosensor. Further, the findings of the present investigation revealed that peppermint oil (PMO) at sub-Minimum Inhibitory Concentrations (sub-MICs) strongly interfered with acyl homoserine lactone (AHL) regulated virulence factors and biofilm formation in Pseudomonas aeruginosa and Aeromonas hydrophila. The result of molecular docking analysis attributed the QS inhibitory activity exhibited by PMO to menthol. Assessment of ability of menthol to interfere with QS systems of various Gram-negative pathogens comprising diverse AHL molecules revealed that it reduced the AHL dependent production of violacein, virulence factors, and biofilm formation indicating broad-spectrum anti-QS activity. Using two Escherichia colt biosensors, MG4/pKDT17 and pEAL08-2, we also confirmed that menthol inhibited both the las and pqs QS systems. Further, findings of the in vivo studies with menthol on nematode model Caenorhabditis elegans showed significantly enhanced survival of the nematode. Our data identified menthol as a novel broad spectrum QS inhibitor.
Resumo:
Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP)
Resumo:
Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP)
Resumo:
Synthacaine is a New Psychoactive Substance which is, due to its inherent psychoactive properties, reported to imitate the effects of cocaine and is therefore consequently branded as legal cocaine. The only analytical approach reported to date for the sensing of Synthacaine is mass spectrometry. In this paper, we explore and evaluate a range of potential analytical techniques for its quantification and potential use in the field screening Synthacaine using Raman spectroscopy, presumptive (colour) testing, High Performance Liquid Chromatography (HPLC) and electrochemistry. HPLC analysis of street samples reveals that Synthacaine comprises a mixture of methiopropamine (MPA) and 2-aminoindane (2-AI). Raman spectroscopy and presumptive (colour) tests, the Marquis, Mandelin, Simon's and Robadope test, are evaluated towards a potential in-the-field screening approach but are found to not be able to discriminate between the two when they are both present in the same sample, as is the case in the real street samples. We report for the first time a novel indirect electrochemical protocol for the sensing of MPA and 2-AI which is independently validated in street samples with HPLC. This novel electrochemical approach based upon one-shot disposable cost effective screen-printed graphite macroelectrodes holds potential for in-the-field screening for Synthacaine.
Resumo:
Pós-graduação em Engenharia Elétrica - FEIS
Resumo:
Pós-graduação em Engenharia Elétrica - FEIS
Resumo:
Conselho Nacional de Desenvolvimento Científico e Tecnológico (CNPq)
Resumo:
Networked control systems (NCSs) are distributed control system in which sensors, actuators and controllers are physically separated and connected through communication networks. NCS represent the evolution of networked control architectures providing greater modularity and control decentralization, ease maintenance and diagnosis and lower cost of implementation. A recent trend in this research topic is the development of NCS using wireless networks(WNCS)which enable interoperability between existing wiredand wireless systems. This paper presents the feasibility analysis of using serial to wireless converter as a wireless sensor link in NCS. In order to support this investigation, relevant performance metrics for wireless control applications such as jitter, time delay and messages lost are highlighted and calculated to evaluate the wireless converter capabilities. In addition the control performance of an implemented motor control system using the converter is analyzed. Experimental results led to the conclusion that serial ZigBee device isrecommended against the Bluetooth as it provided better metrics for control applications. However, bothdevices can be used to implement WNCS providing transmission rates and closed control loop times which are acceptable for NCS applications.Moreoverthe use of thewireless device delay in the PID controller discretization can improve the control performance of the system.
Resumo:
Wireless LAN technology, despite the numerous advantages it has over competing technologies, has not seen widespread deployment. A primary reason for markets not adopting this technology is its failure to provide adequate security. Data that is sent over wireless links can be compromised with utmost ease. In this project, we propose a distributed agent based intrusion detection and response system for wireless LANs that can detect unauthorized wireless elements like access points, wireless clients that are in promiscuous mode etc. The system reacts to intrusions by either notifying the concerned personnel, in case of rogue access points and promiscuous nodes, or by blocking unauthorized users from accessing the network resources.
Resumo:
Key management is a core mechanism to ensure the security of applications and network services in wireless sensor networks. It includes two aspects: key distribution and key revocation. Many key management protocols have been specifically designed for wireless sensor networks. However, most of the key management protocols focus on the establishment of the required keys or the removal of the compromised keys. The design of these key management protocols does not consider the support of higher level security applications. When the applications are integrated later in sensor networks, new mechanisms must be designed. In this paper, we propose a security framework, uKeying, for wireless sensor networks. This framework can be easily extended to support many security applications. It includes three components: a security mechanism to provide secrecy for communications in sensor networks, an efficient session key distribution scheme, and a centralized key revocation scheme. The proposed framework does not depend on a specific key distribution scheme and can be used to support many security applications, such as secure group communications. Our analysis shows that the framework is secure, efficient, and extensible. The simulation and results also reveal for the first time that a centralized key revocation scheme can also attain a high efficiency.
Resumo:
In this paper, we propose a Layered Clustering Hierarchy (LCH) communication protocol for Wireless Sensor Networks (WSNs). The design of LCH has two goals: scalability and energy-efficiency. In LCH, the sensor nodes are organized as a layered clustering structure. Each layer runs a distributed clustering protocol. By randomizing the rotation of cluster heads in each layer, the energy load is distributed evenly across sensors in the network. Our simulations show that LCH is effective in densely deployed sensor networks. On average, 70% of live sensor nodes are involved directly in the clustering communication hierarchy. Moreover, the simulations also show that the energy load and dead nodes are distributed evenly over the network. As studies prove that the performance of LCH depends mainly on the distributed clustering protocol, the location of cluster heads and cluster size are two critical factors in the design of LCH.
Resumo:
Key management is a core mechanism to ensure the security of applications and network services in wireless sensor networks. It includes two aspects: key distribution and key revocation. Key distribution has been extensively studied in the context of sensor networks. However, key revocation has received relatively little attention. Existing key revocation schemes can be divided into two categories: centralized key revocation scheme and distributed key revocation scheme. In this paper, we first summarize the current key revocation schemes for sensor networks. Then, we propose an efficient centralized key revocation scheme, KeyRev, for wireless sensor networks. Unlike most proposed key revocation schemes focusing on removing the compromised keys, we propose to use key updating techniques to obsolesce the keys owned by the compromised sensor nodes and thus remove the nodes from the network. Our analyses show that the KeyRev scheme is secure inspite of not removing the pre-distributed key materials at compromised sensor nodes. Simulation results also indicate that the KeyRev scheme is scalable and performs very well in wireless sensor networks.
Resumo:
Wireless sensor networks are promising solutions for many applications. However, wireless sensor nodes suffer from many constraints such as low computation capability, small memory, limited energy resources, and so on. Grouping is an important technique to localize computation and reduce communication overhead in wireless sensor networks. In this paper, we use grouping to refer to the process of combining a set of sensor nodes with similar properties. We propose two centralized group rekeying (CGK) schemes for secure group communication in sensor networks. The lifetime of a group is divided into three phases, i.e., group formation, group maintenance, and group dissolution. We demonstrate how to set up the group and establish the group key in each phase. Our analysis shows that the proposed two schemes are computationally efficient and secure.
Resumo:
Most of the proposed key management protocols for wireless sensor networks (WSNs) in the literature assume that a single base station is used and that the base station is trustworthy. However, there are applications in which multiple base stations are used and the security of the base stations must be considered. This paper investigates a key management protocol in wireless sensor networks which include multiple base stations. We consider the situations in which both the base stations and the sensor nodes can be compromised. The proposed key management protocol, mKeying, includes two schemes, a key distribution scheme, mKeyDist, supporting multiple base stations in the network, and a key revocation scheme, mKeyRev, used to efficiently remove the compromised nodes from the network. Our analyses show that the proposed protocol is efficient and secure against the compromise of the base stations and the sensor nodes.