Vehicle-to-everything (V2X) communication is a powerful concept that not only ensures public safety (e.g., by avoiding road accidents) but also offers many economic benefits (e.g., by optimizing the ...macroscopic behavior of the traffic across an area). On the one hand, V2X communication brings new business opportunities for many stakeholders, such as vehicle manufacturers, retailers, Mobile Network Operators (MNOs), V2X service providers, and governments. On the other hand, the convergence of these stakeholders to a common platform possesses many technical and business challenges. In this article, we identify the issues and challenges faced by V2X communications, while focusing on the business models. We propose different solutions to potentially resolve the identified challenges in the framework of 5G networks and propose a high-level hierarchy of a potential business model for a 5G-based V2X ecosystem. Moreover, we provide a concise overview of the legislative status of V2X communications across different regions in the world.
Three‐dimensional bioactive, antioxidant, and porous nanocomposite scaffolds are inevitable to avoid dependency and disability in the life cycle. Herein, we develop a facile fabrication protocol of ...nano porous zinc doped hydroxyapatite (Zn‐HAp) scaffold enhanced by polysaccharide polymeric structure for bone tissue engineering applications. The bioactive nano scaffold exhibit opens porous assembly that sustains its flexible and robust nature and promotes efficient linking capability. Moreover, nano scaffold geometry and its porosity were controlled efficiently in various concentrations of zinc doped hydroxyapatite (Zn‐HAp) nanoparticles. Indeed, the composite scaffolds are retained in a dry shape with a suitable load‐bearing strength adjacent to the cancellous bone. The presence of zinc doped hydroxyapatite in the polymeric matrix of nano scaffold regulates its antibacterial response against different bacterial strains owing to its oxidative stress nature. The antioxidant and biocompatibility of nano‐scaffolds were investigated by DPPH (1,1‐diphenyl‐2‐picrylhydrazyl) scavenging behavior, the scavenging activity of ABTS (2,2‐azino‐bis‐3‐ethylbenzthiazoline‐ 6‐sulphonic acid) radical, and iron‐chelating potential. The observed results reveal that polysaccharide‐dependent porous geometry possesses adequate biocompatibility, radical scavenging behavior, and excellent antibacterial properties that validate it as a suitable candidate material for bone tissue implantation. The unprecedented radical scavenging and antioxidant bioactive nanocomposite scaffold are all set to reshape the future bone tissue implantation.
Three‐dimensional bioactive, antioxidant, stable, enhanced flexibility, and porous zinc doped hydroxyapatite nanocomposite scaffolds for bone tissue engineering applications. The unprecedented radical scavenging, iron‐chelating potential, increased affinity for cell growth of biocompatible nanocomposite scaffold is all set to reshape the future of bone tissue engineering.
In New Zealand, the demand for healthcare services has grown gradually in the last decade, and it is likely to increase further. This had led to issues such as increasing treatment costs and ...processing time for the patients. To address the growing pressure in the healthcare sector, and its fragmented IT landscape that compounds the problems further, the New Zealand Ministry of Health aims to establish a shared Electronic Health Record (EHR) system that integrates all the major healthcare organisations such as hospitals, medical centres, and specialists. Due to its characteristics, blockchain technology could be a potential platform for building such large‐scale health systems. Here, MedBloc, a blockchain‐based secure EHR system that enables patients and healthcare providers to access and share health records while providing usability, security, and privacy is presented. MedBloc captures a longitudinal view of the patients’ health story and empowers the patients to regulate their own data by allowing them to give or withdraw consent for healthcare providers to access their records. To preserve the patients’ privacy and protect their health data, MedBloc uses an encryption scheme to secure records and smart contracts to enforce access control to prevent unauthorised access.
Cyber resilience has become a major concern for both academia and industry due to the increasing number of data breaches caused by the expanding attack surface of existing IT infrastructure. Cyber ...resilience refers to an organisation’s ability to prepare for, absorb, recover from, and adapt to adverse effects typically caused by cyber-attacks that affect business operations. In this survey, we aim to identify the significant domains of cyber resilience and measure their effectiveness. We have selected these domains based on a literature review of frameworks, strategies, applications, tools, and technologies. We have outlined the cyber resilience requirements for each domain and explored solutions related to each requirement in detail. We have also compared and analysed different studies in each domain to find other ways of enhancing cyber resilience. Furthermore, we have compared cyber resilience frameworks and strategies based on technical requirements for various applications. We have also elaborated on techniques for improving cyber resilience. In the supplementary section, we have presented applications that have implemented cyber resilience. This survey comprehensively compares various popular cyber resilience tools to help researchers, practitioners, and organisations choose the best practices for enhancing cyber resilience. Finally, we have shared key findings, limitations, problems, and future directions.
Modern cars have become quite complex and heavily connected. Today, diverse services offer infotainment services, electric power-assisted steering, assisted driving, automated toll payment and ...traffic-sharing information. Thanks to recent technologies, which made it possible to enable these services. Unfortunately, these technologies also enlarge the attack surface. This survey covers the main security and privacy issues and reviews recent research on these issues. It summarizes requirements of modern cars and classifies threats and solutions based on the underlying technologies. To the best of our knowledge, this is the first survey offering such an overall view.
Cyber resilience quantification is the process of evaluating and measuring an organisation’s ability to withstand, adapt to, and recover from cyber-attacks. It involves estimating IT systems, ...networks, and response strategies to ensure robust defence and effective recovery mechanisms in the event of a cyber-attack. Quantifying cyber resilience can be difficult due to the constantly changing components of IT infrastructure. Traditional methods like vulnerability assessments and penetration testing may not be effective. Measuring cyber resilience is essential to evaluate and strengthen an organisation’s preparedness against evolving cyber-attacks. It helps identify weaknesses, allocate resources, and ensure the uninterrupted operation of critical systems and information. There are various methods for measuring cyber resilience, such as evaluating, teaming and testing, and creating simulated models. This article proposes a cyber resilience quantification framework for IT infrastructure that utilises a simulation approach. This approach enables organisations to simulate different attack scenarios, identify vulnerabilities, and improve their cyber resilience. The comparative analysis of cyber resilience factors highlights pre-configuration’s robust planning and adaptation (61.44%), buffering supported’s initial readiness (44.53%), and network topologies’ robust planning but weak recovery and adaptation (60.04% to 77.86%), underscoring the need for comprehensive enhancements across all phases. The utilisation of the proposed factors is crucial in conducting a comprehensive evaluation of IT infrastructure in the event of a cyber-attack.
The Internet has undergone dramatic changes in the past 2 decades and now forms a global communication platform that billions of users rely on for their daily activities. While this transformation ...has brought tremendous benefits to society, it has also created new threats to online privacy, such as omnipotent governmental surveillance. As a result, public interest in systems for anonymous communication has drastically increased. In this work, we survey previous research on designing, developing, and deploying systems for anonymous communication. Our taxonomy and comparative assessment provide important insights about the differences between the existing classes of anonymous communication protocols.
Information-Centric Networking (ICN) has emerged as a paradigm to cope with the increasing demand for content delivery on the Internet. In contrast to the Internet Protocol (IP), the underlying ...architecture of ICN enables users to request contents based on their name rather than their hosting location (IP address). On the one hand, this preserves users’ anonymity since packet routing does not require source and destination addresses of the communication parties. On the other hand, semantically-rich names reveal information about users’ interests, which poses serious threats to their privacy. A curious ICN node can monitor the traffic to profile users’ or censor specific contents for instance. In this paper, we present PrivICN: a system that enhances users privacy in ICN by protecting the confidentiality of content names and content data. PrivICN relies on a proxy encryption scheme and has several features that distinguish it from existing solutions: it preserves full in-network caching benefits, it does not require end-to-end communication between consumers and providers and it provides flexible user management (addition/removal of users). We evaluate PrivICN in a real ICN network (CCNx implementation) showing that it introduces an acceptable overhead and little delay. PrivICN is publicly available as an open-source library.
Herbicide resistance is an innate characteristic of crop plants. It enables them to survive and propagate even in the presence of lethal doses of herbicides in the surroundings. Genetic tolerance in ...crops towards herbicides may have several benefits. It may increases safety margins between weed and crop sensitivity and also expands applicability of a particular herbicide. Besides, it can also lower the operating cost for weed control as compared to manual weeding and crop rotation which is normally prohibited by herbicide persistence. Herbicide resistant crops are developed through transformation of a plant with either native or mutant resistant genes, seed mutagenesis, plant cell or tissue culture and through other traditional plant breeding techniques. Seed mutagenesis is a non-transgenic approach, which is found to be most economical and perfect approach. Moreover, all commercial herbicide tolerant crops were derived from single nucleotide substitution of genes and trait can be incorporated into elite varieties because of incomplete dominance and non-pleiotropic effect of the alleles of all commercial herbicide tolerant mutations.