Advanced metering infrastructure (AMI) plays a critical role in the smart grid. It enables intelligent applications such as load control switching, demand side management, and meter data management ...by creating a bidirectional communication network for smart meters and utility systems. Consequently, AMI should be strictly protected to ensure reliable and secure operations of smart grid. In this paper, we first show that a recently proposed key management scheme for AMI by Liu et al. suffers from the desynchronization attack, and, at the same time, it lacks scalability due to inefficient key management. Then, we propose a new scalable key management (SKM) scheme characterized by combining identity-based cryptosystem and efficient key tree technique. The scheme SKM possesses advantages of efficiency and flexibility in key management. In particular, the cost of SKM is O(log n) in either aspect of computation and communication (n is the number of smart meters), which is significantly reduced from the cost of O(n) in the scheme of Liu et al. We analyze security and performance of SKM in detail to show that SKM is efficient in computation and communication cost.
Genetic fusion of elastin‐like polypeptide (ELP) to the C‐terminus of interferon alpha (IFN) generates a well‐defined IFN‐ELP fusion protein with high yield and well‐retained bioactivity. The fusion ...protein significantly enhances pharmacokinetics, tumor accumulation, and antitumor efficacy of interferon alpha in a murine cancer model.
Authenticated key exchange (AKE) protocol allows a user and a server to authenticate each other and generate a session key for the subsequent communications. With the rapid development of low-power ...and highly-efficient networks, such as pervasive and mobile computing network in recent years, many efficient AKE protocols have been proposed to achieve user privacy and authentication in the communications. Besides secure session key establishment, those AKE protocols offer some other useful functionalities, such as two-factor user authentication and mutual authentication. However, most of them have one or more weaknesses, such as vulnerability against lost-smart-card attack, offline dictionary attack, de-synchronization attack, or the lack of forward secrecy, and user anonymity or untraceability. Furthermore, an AKE scheme under the public key infrastructure may not be suitable for light-weight computational devices, and the security model of AKE does not capture user anonymity and resist lost-smart-card attack. In this paper, we propose a novel dynamic ID-based anonymous two-factor AKE protocol, which addresses all the above issues. Our protocol also supports smart card revocation and password update without centralized storage. Further, we extend the security model of AKE to support user anonymity and resist lost-smart-card attack, and the proposed scheme is provably secure in extended security model. The low-computational and bandwidth cost indicates that our protocol can be deployed for pervasive computing applications and mobile communications in practice.
A fair contract-signing protocol allows two potentially mistrusted parities to exchange their commitments (i.e., digital signatures) to an agreed contract over the Internet in a fair way, so that ...either each of them obtains the other's signature, or neither party does. Based on the RSA signature scheme, a new digital contract-signing protocol is proposed in this paper. Like the existing RSA-based solutions for the same problem, our protocol is not only fair, but also optimistic, since the trusted third party is involved only in the situations where one party is cheating or the communication channel is interrupted. Furthermore, the proposed protocol satisfies a new property- abuse-freeness . That is, if the protocol is executed unsuccessfully, none of the two parties can show the validity of intermediate results to others. Technical details are provided to analyze the security and performance of the proposed protocol. In summary, we present the first abuse-free fair contract-signing protocol based on the RSA signature, and show that it is both secure and efficient.
Remote authentication has been widely studied and adapted in distributed systems. The security of remote authentication mechanisms mostly relies on one of or the combination of three factors: 1) ...something users know-password; 2) something users have-smart card; and 3) something users are-biometric characteristics. This paper introduces an efficient generic framework for three-factor authentication. The proposed generic framework enhances the security of existing two-factor authentication schemes by upgrading them to three-factor authentication schemes, without exposing user privacy. In addition, we present a case study by upgrading a secure two-factor authentication scheme to a secure three-factor authentication scheme. Furthermore, implementation analysis, formal proof, and privacy discussion are provided to show that the derived scheme is practical, secure, and privacy preserving.
There are currently limited Food and Drug Administration (FDA)-approved drugs and vaccines for the treatment or prevention of Coronavirus Disease 2019 (COVID-19). Enhanced understanding of Severe ...Acute Respiratory Syndrome Coronavirus 2 (SARS-CoV-2) infection and pathogenesis is critical for the development of therapeutics. To provide insight into viral replication, cell tropism, and host-viral interactions of SARS-CoV-2, we performed single-cell (sc) RNA sequencing (RNA-seq) of experimentally infected human bronchial epithelial cells (HBECs) in air-liquid interface (ALI) cultures over a time course. This revealed novel polyadenylated viral transcripts and highlighted ciliated cells as a major target at the onset of infection, which we confirmed by electron and immunofluorescence microscopy. Over the course of infection, the cell tropism of SARS-CoV-2 expands to other epithelial cell types including basal and club cells. Infection induces cell-intrinsic expression of type I and type III interferons (IFNs) and interleukin (IL)-6 but not IL-1. This results in expression of interferon-stimulated genes (ISGs) in both infected and bystander cells. This provides a detailed characterization of genes, cell types, and cell state changes associated with SARS-CoV-2 infection in the human airway.
Dysregulated immune responses against the SARS-CoV-2 virus are instrumental in severe COVID-19. However, the immune signatures associated with immunopathology are poorly understood. Here we use ...multi-omics single-cell analysis to probe the dynamic immune responses in hospitalized patients with stable or progressive course of COVID-19, explore V(D)J repertoires, and assess the cellular effects of tocilizumab. Coordinated profiling of gene expression and cell lineage protein markers shows that S100A
/HLA-DR
classical monocytes and activated LAG-3
T cells are hallmarks of progressive disease and highlights the abnormal MHC-II/LAG-3 interaction on myeloid and T cells, respectively. We also find skewed T cell receptor repertories in expanded effector CD8
clones, unmutated IGHG
B cell clones, and mutated B cell clones with stable somatic hypermutation frequency over time. In conclusion, our in-depth immune profiling reveals dyssynchrony of the innate and adaptive immune interaction in progressive COVID-19.
The material point method (MPM) combines the advantages of both mesh-free and grid-based methods for simulating complex cracking problems without the limitations of the grid. However, the ...conventional MPM cannot deal with cracks directly because of the continuous nodal velocity field. Therefore, in this study, the conventional MPM is improved using three new algorithms to simulate the propagation of multiple branched cracks. The first proposed algorithm is the phantom node method using a particle cutting technique, which allows discontinuity of the velocity field around arbitrary cracks, and the second one is the multi-crack contact algorithm to deal with the contact problem between multiple objects cut by multiple cracks, avoiding crack penetration. The last one is particle interaction integral method based on classical fracture mechanics to get the dynamic stress intensity factors (DSIF) and realize the crack propagation. And all algorithms are validated by comparing with the extended finite element method. Subsequently, uniaxial compression tests of three rock samples with different pre-existing cracks are simulated using the extended MPM. Three types of crack coalescence are found, and the simulated results agree with the previous experimental results, which demonstrate the feasibility and flexibility of the proposed extended MPM for simulating the propagation of multiple branched cracks.
Designing efficient ORR/OER bifunctional electrocatalysts is very significant for reducing energy consumption and environmental protection. Hence, we studied the ORR/OER bifunctional catalytic ...activity of iron polyphthalocyanine (FePPc) coordinated by a series of axial ligands which has different electronegative coordination atom (FePPc-L) (L = -CN, -SH, -SCH
, -SC
H
, -I, -Br, -NH
, -Cl, -OCH
, -OH, and -F) in alkaline medium by DFT calculations. Among all FePPc-L, FePPc-CN, FePPc-SH, FePPc-SCH
, and FePPc-SC
H
exhibit excellent ORR/OER bifunctional catalytic activities. Their ORR/OER overpotential is 0.256 V/0.234 V, 0.278 V/0.256 V, 0.280 V/0.329 V, and 0.290 V/0.316 V, respectively, which are much lower than that of the FePPc (0.483 V/0.834 V). The analysis of the electronic structure of the above catalysts shows that the electronegativity of the coordination atoms in the axial ligand is small, resulting in less distribution of dz
, dyz, and dxz orbitals near E
, weak orbital polarization, small charge and magnetic moment of the central Fe atom, and weak adsorption strength for *OH. All these prove that the introduction of axial ligands with appropriate electronegativity coordinating atoms can adjust the adsorption of catalyst to intermediates and modify the ORR/OER bifunctional catalytic activities. This is an effective strategy for designing efficient ORR/OER bifunctional electrocatalysts.
DNA methylation is an important epigenetic mechanism for phenotypic diversification in all forms of life. We previously described remarkable cell-to-cell heterogeneity in epigenetic pattern within a ...clonal population of Streptococcus pneumoniae, a leading human pathogen. We here report that the epigenetic diversity is caused by extensive DNA inversions among hsdSA, hsdSB, and hsdSC, three methyltransferase hsdS genes in the Spn556II type-I restriction modification (R-M) locus. Because hsdSA encodes the sequence recognition subunit of this type-I R-M DNA methyltransferase, these site-specific recombinations generate pneumococcal cells with variable HsdSA alleles and thereby diverse genome methylation patterns. Most importantly, the DNA methylation pattern specified by the HsdSA1 allele leads to the formation of opaque colonies, whereas the pneumococci lacking HsdSA1 produce transparent colonies. Furthermore, this HsdSA1-dependent phase variation requires intact DNA methylase activity encoded by hsdM in the Spn556II (renamed colony opacity determinant or cod) locus. Thus, the DNA inversion-driven ON/OFF switch of the hsdSA1 allele in the cod locus and resulting epigenetic switch dictate the phase variation between the opaque and transparent phenotypes. Phase variation has been well documented for its importance in pneumococcal carriage and invasive infection, but its molecular basis remains unclear. Our work has discovered a novel epigenetic cause for this significant pathobiology phenomenon in S. pneumoniae. Lastly, our findings broadly represents a significant advancement in our understanding of bacterial R-M systems and their potential in shaping epigenetic and phenotypic diversity of the prokaryotic organisms because similar site-specific recombination systems widely exist in many archaeal and bacterial species.