Internet-of-Things (IoT) are everywhere in our daily life. They are used in our homes, in hospitals, deployed outside to control and report the changes in environment, prevent fires, and many more ...beneficial functionality. However, all those benefits can come of huge risks of privacy loss and security issues. To secure the IoT devices, many research works have been conducted to countermeasure those problems and find a better way to eliminate those risks, or at least minimize their effects on the user's privacy and security requirements. The survey consists of four segments. The first segment will explore the most relevant limitations of IoT devices and their solutions. The second one will present the classification of IoT attacks. The next segment will focus on the mechanisms and architectures for authentication and access control. The last segment will analyze the security issues in different layers.
Cloud-supported Internet of Things (Cloud-IoT) has been broadly deployed in smart grid systems. The IoT front-ends are responsible for data acquisition and status supervision, while the substantial ...amount of data is stored and managed in the cloud server. Achieving data security and system efficiency in the data acquisition and transmission process are of great significance and challenging, because the power grid-related data is sensitive and in huge amount. In this paper, we present an efficient and secure data acquisition scheme based on ciphertext policy attribute-based encryption. Data acquired from the terminals will be partitioned into blocks and encrypted with its corresponding access subtree in sequence, thereby the data encryption and data transmission can be processed in parallel. Furthermore, we protect the information about the access tree with threshold secret sharing method, which can preserve the data privacy and integrity from users with the unauthorized sets of attributes. The formal analysis demonstrates that the proposed scheme can fulfill the security requirements of the Cloud-IoT in smart grid. The numerical analysis and experimental results indicate that our scheme can effectively reduce the time cost compared with other popular approaches.
The emergence and rapid development of the Internet of Medical Things (IoMT), an application of the Internet of Things into the medical and healthcare systems, have brought many changes and ...challenges to modern medical and healthcare systems. Particularly, machine learning technology can be used to process the data involved in IoMT for medical analysis and disease diagnosis. However, in this process, the disclosure of personal privacy information must receive considerable attentions especially for sensitive medical data. Cluster analysis is an important technique for medical analysis and disease diagnosis. To enable privacy-preserving cluster analysis in IoMT, this paper proposed an Efficient Differentially Private Data Clustering scheme (EDPDCS) based on MapReduce framework. In EDPDCS, we optimize the allocation of privacy budgets and the selection of initial centroids to improve the accuracy of differentially private K-means clustering algorithm. Specifically, the number of iterations of the K-means algorithm is set to a fixed value according to the total privacy budget and the minimal privacy budget of each iteration. In addition, an improved initial centroids selection method is proposed to increase the accuracy and efficiency of the clustering algorithm. Finally, we prove that the proposed EDPDCS can improve the accuracy of the differentially private k-means algorithm by comparing the Normalized Intra-Cluster Variance (NICV) produced by our algorithm on two datasets with two other algorithms.
•An efficient differentially private data clustering scheme (EDPDCS) is proposed.•In EDPDCS, an improved initial centroids selection algorithm is deployed.•In EDPDCS, a method for selecting the initial centroid is developed.
In a Chinese trial, endovascular thrombectomy at 6 to 24 hours led to more good outcomes than standard care but also to more cerebral hemorrhages. Approximately 20% of patients received intravenous ...thrombolysis.
Ferroptosis is a recently recognized form of regulated cell death driven by lipid‐based reactive oxygen species (ROS) accumulation. However, the molecular mechanisms of ferroptosis regulation are ...still largely unknown. Here we identified a novel miRNA, miR‐9, as an important regulator of ferroptosis by directly targeting GOT1 in melanoma cells. Overexpression of miR‐9 suppressed GOT1 by directly binding to its 3′‐UTR, which subsequently reduced erastin‐ and RSL3‐induced ferroptosis. Conversely, suppression of miR‐9 increased the sensitivity of melanoma cells to erastin and RSL3. Importantly, anti‐miR‐9 mediated lipid ROS accumulation and ferroptotic cell death could be abrogated by inhibiting glutaminolysis process. Taken together, our findings demonstrate that miR‐9 regulates ferroptosis by targeting GOT1 in melanoma cells, illustrating the important role of miRNA in ferroptosis.
With the rapid growth of renewable energy resources, energy trading has been shifting from the centralized manner to distributed manner. Blockchain, as a distributed public ledger technology, has ...been widely adopted in the design of new energy trading schemes. However, there are many challenging issues in blockchain-based energy trading, e.g., low efficiency, high transaction cost, and security and privacy issues. To tackle these challenges, many solutions have been proposed. In this survey, the blockchain-based energy trading in the electrical power system is thoroughly investigated. Firstly, the challenges in blockchain-based energy trading are identified and summarized. Then, the existing energy trading schemes are studied and classified into three categories based on their main focuses: energy transaction, consensus mechanism, and system optimization. Blockchain-based energy trading has been a popular research topic, new blockchain architectures, models and products are continually emerging to overcome the limitations of existing solutions, forming a virtuous circle. The internal combination of different blockchain types and the combination of blockchain with other technologies improve the blockchain-based energy trading system to better satisfy the practical requirements of modern power systems. However, there are still some problems to be solved, for example, the lack of regulatory system, environmental challenges and so on. In the future, we will strive for a better optimized structure and establish a comprehensive security assessment model for blockchain-based energy trading system.
The adult intestinal homeostasis is tightly controlled by proper proliferation and differentiation of intestinal stem cells. The JAK/STAT (Janus Kinase/Signal Transducer and Activator of ...Transcription) signaling pathway is essential for the regulation of adult stem cell activities and maintenance of intestinal homeostasis. Currently, it remains largely unknown how JAK/STAT signaling activities are regulated in these processes. Here we have identified windpipe (wdp) as a novel component of the JAK/STAT pathway. We demonstrate that Wdp is positively regulated by JAK/STAT signaling in Drosophila adult intestines. Loss of wdp activity results in the disruption of midgut homeostasis under normal and regenerative conditions. Conversely, ectopic expression of Wdp inhibits JAK/STAT signaling activity. Importantly, we show that Wdp interacts with the receptor Domeless (Dome), and promotes its internalization for subsequent lysosomal degradation. Together, these data led us to propose that Wdp acts as a novel negative feedback regulator of the JAK/STAT pathway in regulating intestinal homeostasis.
Celotno besedilo
Dostopno za:
DOBA, IZUM, KILJ, NUK, PILJ, PNG, SAZU, SIK, UILJ, UKNU, UL, UM, UPUK
Internet of Things (IoT) technologies have been broadly applied in smart grid for monitoring physical or environmental conditions. Especially, state estimation is an important IoT-based application ...in smart grid, which is used in system monitoring to get the best estimate of the power grid state through an analysis of the meter measurements and power system topologies. However, false data injection attack (FDIA) is a severe threat to state estimation, which is known for the difficulty of detection. In this paper, we propose an efficient detection scheme against FDIA. First, two parameters that reflect the physical property of smart grid are investigated. One parameter is the control signal from the controller to the static Var compensator (CSSVC). A large CSSVC indicates there exists the intense voltage fluctuation. The other parameter is the quantitative node voltage stability index (NVSI). A larger NVSI indicates a higher vulnerability level. Second, according to the values of the CSSVC and NVSI, an optimized clustering algorithm is proposed to distribute the potential vulnerable nodes into several classes. Finally, based on these classes, a detection method is proposed for the real-time detection of the FDIA. The simulation results show that the proposed scheme can detect the FDIA effectively.
Au–Cu bimetallic thin films with controlled composition were fabricated by magnetron sputtering co-deposition, and their performance for the electrocatalytic reduction of CO2 was investigated. The ...uniform planar morphology served as a platform to evaluate the electronic effect isolated from morphological effects while minimizing geometric contributions. The catalytic selectivity and activity of Au–Cu alloys was found to be correlated with the variation of electronic structure that was varied with tunable composition. Notably, the d-band center gradually shifted away from the Fermi level with increasing Au atomic ratio, leading to a weakened binding energy of *CO, which is consistent with low CO coverage observed in CO stripping experiments. The decrease in the *CO binding strength results in the enhanced catalytic activity for CO formation with the increase in Au content. In addition, it was observed that copper oxide/hydroxide species are less stable on Au–Cu surfaces compared to those on the pure Cu surface, where the surface oxophilicity could be critical to tuning the binding strength of *OCHO. These results imply that the altered electronic structure could explain the decreased formation of HCOO– on the Au–Cu alloys. In general, the formation of CO and HCOO– as main CO2 reduction products on planar Au–Cu alloys followed the shift of the d-band center, which indicates that the electronic effect is the major governing factor for the electrocatalytic activity of CO2 reduction on Au–Cu bimetallic thin films.
Implantable medical devices (IMDs) are electronic devices implanted within human body for diagnostic, monitoring, and therapeutic purposes. It is imperative to guarantee that IMDs are completely ...secured since the patient's life is closely bound to the robustness and effectiveness of IMDs. Intuitively, we have to ensure that only the authorized medical personnel and IMD programmer can access the IMD. However, in recent years, several attacks have been reported which can successfully compromise a number of IMD products, e.g., stealing the sensitive health data and issuing fake commands. Up to now, there is no commonly agreed and well-recognized security standards and the protection of IMD is still an open problem. In this paper, we present a comprehensive survey of the existing literature on IMD security, with a focus on the access control schemes to prevent unauthorized access. Specifically, we first reviewed the security incidents, IMD threat model and the development of regulations for IMD security. Next, we classified existing IMD access control schemes based on architecture, type of keys used, access control channel, and logic. We also analyzed how different access control models can be adopted to secure IMD. Besides, we particularly discussed the viability of online authentication and low/zero power authentication in the IMD context.