This paper presents the design of a wireless sensor network particularly designed for remote monitoring and control of industrial parameters. The article describes the network components, protocol ...and sensor deployment, aimed to accomplish industrial constraint and to assure reliability and low power consumption. A particular case of study is presented. The system consists of a base station, gas sensing nodes, a tree-based routing scheme for the wireless sensor nodes and a real-time monitoring application that operates from a remote computer and a mobile phone. The system assures that the industrial safety quality and the measurement and monitoring system achieves an efficient industrial monitoring operations. The robustness of the developed system and the security in the communications have been guaranteed both in hardware and software level. The system is flexible and can be adapted to different environments. The testing of the system confirms the feasibility of the proposed implementation and validates the functional requirements of the developed devices, the networking solution and the power consumption management.
Most e-voting schemes make use of central servers. Users are obliged to trust these servers, which represent a vulnerability of the scheme. In the last few years, a very small group of schemes has ...been published that overcomes this handicap by using a peer-to-peer (P2P) approach. These are known as boardroom e-voting schemes, whereby users take the role of the servers. They act as managers of the process: they cast votes, keep a record of them, and verify the cryptographic operations made by others. Nevertheless, ballots must fulfill certain constraints which conflict with the possibilities of recent debate tools. These tools allow users to decide what to vote on, thus enabling the ballot frame to remain unknown before the voting process. The scheme presented here is a new boardroom voting protocol. It provides privacy, eligibility, and verifiability among other relevant features. The key advantage of this system is its high degree of flexibility, due to the absence of a need to impose any constraint on the ballots. This paper includes experimental results with two debate groups.
Mixnets are an instrument to achieve anonymity. They are generally a sequence of servers that apply a cryptographic process and a permutation to a batch of user messages. Most use asymmetric ...cryptography, with the high computational cost that this entails. The main objective of this study is to reduce delay in mixnet nodes. In this sense, this paper presents a new scheme that is based only on symmetric cryptography. The novelty of this scheme is the use of binary graphs built by mixnet nodes. The root node collects user keys and labels without knowing their owners. After feeding each node by its graph, they can establish a random permutation and relate their keys to the incoming batch positions through labels. The differences with previous symmetric schemes are that users do not need long headers and nodes avoid the searching process. The outcomes are security and efficiency improvements. As far as we know, it is the fastest mixnet system. Therefore, it is appropriate for high-throughput applications like national polls (many users) or debates (many messages).
This paper presents a study about hardware attacking and clock signal vulnerability. It considers a particular type of attack on the clock signal in the I2C protocol, and proposes the design of a new ...sensor for detecting and defending against this type of perturbation. The analysis of the attack and the defense is validated by means of a configurable experimental platform that emulates a differential drive robot. A set of experimental results confirm the interest of the studied vulnerabilities and the efficiency of the proposed sensor in defending against this type of situation.
For the monitoring of bone regeneration processes, the instrumentation of the fixation is an increasingly common technique to indirectly measure the evolution of bone formation instead of ex vivo ...measurements or traditional in vivo techniques, such as X-ray or visual review. A versatile instrumented external fixator capable of adapting to multiple bone regeneration processes was designed, as well as a wireless acquisition system for the data collection. The design and implementation of the overall architecture of such a system is described in this work, including the hardware, firmware, and mechanical components. The measurements are conditioned and subsequently sent to a PC via wireless communication to be in vivo displayed and analyzed using a developed real-time monitoring application. Moreover, a model for the in vivo estimation of the bone callus stiffness from collected data was defined. This model was validated in vitro using elastic springs, reporting promising results with respect to previous equipment, with average errors and uncertainties below 6.7% and 14.04%. The devices were also validated in vivo performing a bone lengthening treatment on a sheep metatarsus. The resulting system allowed the in vivo mechanical characterization of the bone callus during experimentation, providing a low-cost, simple, and highly reliable solution.
A new digital countermeasure against attacks related to the clock frequency is presented. This countermeasure, known as frequency sensor, consists of a local oscillator, a transition detector, a ...measurement element and an output block. The countermeasure has been designed using a full-custom technique implemented in an Application-Specific Integrated Circuit (ASIC), and the implementation has been verified and characterized with an integrated design using a 0.35 mm standard Complementary Metal Oxide Semiconductor (CMOS) technology (Very Large Scale Implementation-VLSI implementation). The proposed solution is configurable in resolution time and allowed range of period, achieving a minimum resolution time of only 1.91 ns and an initialization time of 5.84 ns. The proposed VLSI implementation shows better results than other solutions, such as digital ones based on semi-custom techniques and analog ones based on band pass filters, all design parameters considered. Finally, a counter has been used to verify the good performance of the countermeasure in avoiding the success of an attack.
To describe the epidemiological, clinical and laboratory characteristics and clinical progress of patients hospitalized with heart failure (HF) who started treatment with empagliflozin before ...discharge.
We performed a retrospective observational study of patients aged ≥18 years admitted to the Internal Medicine Department of University Hospital Jaen, Jaen, Spain with acute HF between 1 May 2022 and 31 May 2023. Patients had to have a life expectancy of ≥1 year and have started treatment with empagliflozin during admission.
We included 112 patients (mean age, 85.2 ± 6.5 years; 67.9% women; 35.7 and 31.3% in NYHA functional classes III and IV; 73.2% with HF and preserved ejection fraction). Before admission, 80.4% were taking loop diuretics, 70.6% renin-angiotensin-aldosterone system inhibitors, 49.1% betablockers and 25% mineralocorticoid receptor antagonists. At admission, 94.6% were taking furosemide (15.2% at high doses, 36.6% at intermediate doses). The dose of furosemide was reduced at initiation of empagliflozin. At the end of follow-up, 13.4% of patients had died, 93.8% of the survivors continued treatment with empagliflozin and 26.8% had attended the emergency department with signs and symptoms of HF.
Introduction of empagliflozin before discharge from hospital in patients admitted with HF made it possible to reduce the dose of diuretics during admission. The frequency of complications was as expected, and treatment was largely maintained.
ABSTRACT The metallicity of the progenitor system producing a type Ia supernova (SN Ia) could play a role in its maximum luminosity, as suggested by theoretical predictions. We present an ...observational study to investigate if such a relationship exists. Using the 4.2 m William Herschel Telescope (WHT) we have obtained intermediate-resolution spectroscopy data of a sample of 28 local galaxies hosting SNe Ia, for which distances have been derived using methods independent of those based on SN Ia parameters. From the emission lines observed in their optical spectra, we derived the gas-phase oxygen abundance in the region where each SN Ia exploded. Our data show a trend, with an 80% of chance not being due to random fluctuation, between SNe Ia absolute magnitudes and the oxygen abundances of the host galaxies, in the sense that luminosities tend to be higher for galaxies with lower metallicities. This result seems likely to be in agreement with both the theoretically expected behavior and with other observational results. This dependence MB-Z might induce systematic errors when it is not considered when deriving SNe Ia luminosities and then using them to derive cosmological distances.
A third-order G m -C Chebyshev low-pass filter based on a novel gain-boosted tunable transconductor is presented. The transconductor employs local negative feedback for linearization controlling the ...drain voltage of the input transistors biased in the triode region. The gain boosted feedback amplifier is based on quasi-floating gate MOS transistors and its adjustable biasing current allows tuning the cutoff frequency of the filter. The filter is intended to be used in the baseband section of a zero-IF bluetooth low energy receiver and it has been fabricated in a standard 0.13-μm CMOS technology with a nominal cutoff frequency of 500 kHz. The power consumption of the overall filter is 450 μW with a supply voltage of 1.2 V. The measurement results show a third-order intermodulation distortion of -46.4 dB for two input tones located at the passband of the filter. The filter occupies a silicon area of 0.08 mm 2 .
Defending electronic systems against hardware attack Naharro, Raul Jimenez; Bravo, Fernando Gomez; Gomez Galan, Juan Antonio ...
2016 Technologies Applied to Electronics Teaching (TAEE),
06/2016
Conference Proceeding
Hardware attack is becoming an important scenario in the system design. Pupils who study design of electronic and computer systems must know this scenario and possible solutions against this kind of ...attacks. This work is a set of exercises to know some vulnerabilities in electronic and computer systems depending on the behavioral implementation. Two cases of study will be considered: timing analysis and differential fault analysis (DFA). The study of each attack will be divided into three stages: the use of the vulnerability as attack; the study of the vulnerability; and the elimination or reduction of it.