1000 resultados para continuous authentication


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Supervisory Control and Data Acquisition (SCADA) systems are one of the key foundations of smart grids. The Distributed Network Protocol version 3 (DNP3) is a standard SCADA protocol designed to facilitate communications in substations and smart grid nodes. The protocol is embedded with a security mechanism called Secure Authentication (DNP3-SA). This mechanism ensures that end-to-end communication security is provided in substations. This paper presents a formal model for the behavioural analysis of DNP3-SA using Coloured Petri Nets (CPN). Our DNP3-SA CPN model is capable of testing and verifying various attack scenarios: modification, replay and spoofing, combined complex attack and mitigation strategies. Using the model has revealed a previously unidentified flaw in the DNP3-SA protocol that can be exploited by an attacker that has access to the network interconnecting DNP3 devices. An attacker can launch a successful attack on an outstation without possessing the pre-shared keys by replaying a previously authenticated command with arbitrary parameters. We propose an update to the DNP3-SA protocol that removes the flaw and prevents such attacks. The update is validated and verified using our CPN model proving the effectiveness of the model and importance of the formal protocol analysis.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Critical illness, acute renal failure and continuous renal replacement therapy (CRRT) are associated with changes in pharmacokinetics. Initial antibiotic dose should be based on published volume of distribution and generally be at least the standard dose, as volume of distribution is usually unchanged or increased. Subsequent doses should be based on total clearance. Total clearance varies with the CRRT clearance which mainly depends on effluent flow rate, sieving coefficient/saturation coefficient. As antibiotic clearance by healthy kidneys is usually higher than clearance by CRRT, except for colistin, subsequent doses should generally be lower than given to patients without renal dysfunction. In the future therapeutic drug monitoring, together with sophisticated pharmacokinetic models taking into account the pharmacokinetic variability, may enable more appropriate individualized dosing.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

RFID is an important technology that can be used to create the ubiquitous society. But an RFID system uses open radio frequency signal to transfer information and this leads to pose many serious threats to its privacy and security. In general, the computing and storage resources in an RFID tag are very limited and this makes it difficult to solve its secure and private problems, especially for low-cost RFID tags. In order to ensure the security and privacy of low-cost RFID systems we propose a lightweight authentication protocol based on Hash function. This protocol can ensure forward security and prevent information leakage, location tracing, eavesdropping, replay attack and spoofing. This protocol completes the strong authentication of the reader to the tag by twice authenticating and it only transfers part information of the encrypted tag’s identifier for each session so it is difficult for an adversary to intercept the whole identifier of a tag. This protocol is simple and it takes less computing and storage resources, it is very suitable to some low-cost RFID systems.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In continuum one-dimensional space, a coupled directed continuous time random walk model is proposed, where the random walker jumps toward one direction and the waiting time between jumps affects the subsequent jump. In the proposed model, the Laplace-Laplace transform of the probability density function P(x,t) of finding the walker at position at time is completely determined by the Laplace transform of the probability density function φ(t) of the waiting time. In terms of the probability density function of the waiting time in the Laplace domain, the limit distribution of the random process and the corresponding evolving equations are derived.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The work studies the extent of asymmetric flow in water models of continuous casting molds of two different configurations. In the molds where fluid is discharged through multiple holes at the bottom, the flow pattern in the lower portion depends on the size of the lower two recirculating domains. If they reach the mold bottom, the flow pattern in the lower portion is symmetrical about the central plane; otherwise, it is asymmetrical. On the other hand, in the molds where the fluid is discharged through the entire mold cross section, the flow pattern is always asymmetrical if the aspect ratio is 1:6.25 or more. The fluid jet swirls while emerging through the nozzle. The interaction of the swirling Jets with the wide sidewalls of the mold gives rise to asymmetrical flow inside the mold. In the molds with lower aspect ratios, where the jets do not touch the wide side walls, the flow pattern is symmetrical about the central plane.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The extended recruitment season for short-lived species such as prawns biases the estimation of growth parameters from length-frequency data when conventional methods are used. We propose a simple method for overcoming this bias given a time series of length-frequency data. The difficulties arising from extended recruitment are eliminated by predicting the growth of the succeeding samples and the length increments of the recruits in previous samples. This method requires that some maximum size at recruitment can be specified. The advantages of this multiple length-frequency method are: it is simple to use; it requires only three parameters; no specific distributions need to be assumed; and the actual seasonal recruitment pattern does not have to be specified. We illustrate the new method with length-frequency data on the tiger prawn Penaeus esculentus from the north-western Gulf of Carpentaria, Australia.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Continuous odour monitoring technologies are necessary to understand the complex odour-generating mechanisms within poultry housing as well as to identify strategies to reduce the impact of odour emissions on local communities. To evaluate electronic nose (EN) technologies for continuously assessing odour concentration in poultry housing, a mobile laboratory containing an electronic nose and an associated sample delivery system was deployed to a commercial poultry farm and tested over a broiler production cycle. The results demonstrated that it was possible to develop a model to allow an electronic nose to provide a semi-continuous measurement of odour concentrations. The electronic nose was also able to demonstrate the influence of shed conditions on odour emissions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The tomato I-3 gene introgressed from the Lycopersicon pennellii accession LA716 confers resistance to race 3 of the fusarium wilt pathogen Fusarium oxysporum f. sp. lycopersici. We have improved the high-resolution map of the I-3 region of tomato chromosome 7 with the development and mapping of 31 new PCR-based markers. Recombinants recovered from L. esculentum cv. M82 × IL7-2 F2 and (IL7-2 × IL7-4) × M82 TC1F2 mapping populations, together with recombinants recovered from a previous M82 × IL7-3 F2 mapping population, were used to position these markers. A significantly higher recombination frequency was observed in the (IL7-2 × IL7-4) × M82 TC1F2 mapping population based on a reconstituted L. pennellii chromosome 7 compared to the other two mapping populations based on smaller segments of L. pennellii chromosome 7. A BAC contig consisting of L. esculentum cv. Heinz 1706 BACs covering the I-3 region has also been established. The new high-resolution map places the I-3 gene within a 0.38 cM interval between the molecular markers RGA332 and bP23/gPT with an estimated physical size of 50-60 kb. The I-3 region was found to display almost continuous microsynteny with grape chromosome 12 but interspersed microsynteny with Arabidopsis thaliana chromosomes 1, 2 and 3. An S-receptor-like kinase gene family present in the I-3 region of tomato chromosome 7 was found to be present in the microsyntenous region of grape chromosome 12 but was absent altogether from the A. thaliana genome.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Security models for two-party authenticated key exchange (AKE) protocols have developed over time to capture the security of AKE protocols even when the adversary learns certain secret values. Increased granularity of security can be modelled by considering partial leakage of secrets in the manner of models for leakage-resilient cryptography, designed to capture side-channel attacks. In this work, we use the strongest known partial-leakage-based security model for key exchange protocols, namely continuous after-the-fact leakage eCK (CAFL-eCK) model. We resolve an open problem by constructing the first concrete two-pass leakage-resilient key exchange protocol that is secure in the CAFL-eCK model.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Cultivation and cropping of soils results in a decline in soil organic carbon and soil nitrogen, and can lead to reduced crop yields. The CENTURY model was used to simulate the effects of continuous cultivation and cereal cropping on total soil organic matter (C and N), carbon pools, nitrogen mineralisation, and crop yield from 6 locations in southern Queensland. The model was calibrated for each replicate from the original datasets, allowing comparisons for each replicate rather than site averages. The CENTURY model was able to satisfactorily predict the impact of long-term cultivation and cereal cropping on total organic carbon, but was less successful in simulating the different fractions and nitrogen mineralisation. The model firstly over-predicted the initial (pre-cropping) soil carbon and nitrogen concentration of the sites. To account for the unique shrinking and swelling characteristics of the Vertosol soils, the default annual decomposition rates of the slow and passive carbon pools were doubled, and then the model accurately predicted initial conditions. The ability of the model to predict carbon pool fractions varied, demonstrating the difficulty inherent in predicting the size of these conceptual pools. The strength of the model lies in the ability to closely predict the starting soil organic matter conditions, and the ability to predict the impact of clearing, cultivation, fertiliser application, and continuous cropping on total soil carbon and nitrogen.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Digital signatures are often used by trusted authorities to make unique bindings between a subject and a digital object; for example, certificate authorities certify a public key belongs to a domain name, and time-stamping authorities certify that a certain piece of information existed at a certain time. Traditional digital signature schemes however impose no uniqueness conditions, so a trusted authority could make multiple certifications for the same subject but different objects, be it intentionally, by accident, or following a (legal or illegal) coercion. We propose the notion of a double-authentication-preventing signature, in which a value to be signed is split into two parts: a subject and a message. If a signer ever signs two different messages for the same subject, enough information is revealed to allow anyone to compute valid signatures on behalf of the signer. This double-signature forgeability property discourages signers from misbehaving—a form of self-enforcement—and would give binding authorities like CAs some cryptographic arguments to resist legal coercion. We give a generic construction using a new type of trapdoor functions with extractability properties, which we show can be instantiated using the group of sign-agnostic quadratic residues modulo a Blum integer; we show an additional application of these new extractable trapdoor functions to standard digital signatures.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

New algorithms for the continuous wavelet transform are developed that are easy to apply, each consisting of a single-pass finite impulse response (FIR) filter, and several times faster than the fastest existing algorithms. The single-pass filter, named WT-FIR-1, is made possible by applying constraint equations to least-squares estimation of filter coefficients, which removes the need for separate low-pass and high-pass filters. Non-dyadic two-scale relations are developed and it is shown that filters based on them can work more efficiently than dyadic ones. Example applications to the Mexican hat wavelet are presented.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Apples at 24 ± 2 °C were heated in a pilot scale hot air assisted (40 °C) continuous pentagonal microwave system, to evaluate the effectiveness of this treatment on insect mortality (variety Mutsu) and fruit quality (variety Granny Smith). An average temperature of 53.4 ± 1.3 °C at core, bottom and flesh of the apple was recorded at the end of the treatment. One hundred percent mortality of the most tolerant stage of Queensland fruit fly (Bactrocera tryoni, Froggatt) and Jarvis's fruit fly (Bactrocera jarvisi, Tryon), were observed when the Mortality value (M52, equivalent time of isothermal treatment at 52 °C) at the slowest heating point applicable for each experiment was ≥ 50 min and ≥ 37 min, respectively. Results showed that microwave heat treatment is effective for insect disinfestation without any adverse impact on total soluble solids, flesh or peel firmness of the treated apples. The treated apples recorded a significantly higher pH and lower ion leakage than the untreated apples after 3 or 4 weeks. Therefore, the microwave heat treatment has the potential to be developed as an alternative chemical free quarantine treatment against economically significant insect pests. Industrial relevance Hot air assisted microwave heating of fruits and vegetables, is more cost effective compared to vapour heat treatment and ionising radiation for disinfestation of insects. Microwave treatment is environmentally friendly compared to fumigation and chemical treatments. Hot air assisted microwave disinfestation can be performed at farms or centralised pack houses since the capital cost would be comparatively lower than vapour heat or ionising radiation treatments.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis examines whether the rules for of evidence, which were developed around paper over centuries, are adequate for the authentication of electronic evidence. The history of documentary evidence is examined, and the nature of electronic evidence is explored, particularly recent types of electronic evidence such as social media and 'the Cloud'. The old rules are then critically applied to the varied types of electronic evidence to determine whether or not these old rules are indeed adequate.