Wireless Personal Communications - Major issue in marine environment imaging is the expulsion of hazy scenes caused by natural phenomena such as absorption and scattering in underwater images. The... 相似文献
The mobility and openness of wireless communication technologies make Mobile Healthcare Systems (mHealth) potentially exposed to a number of potential attacks, which significantly undermines their utility and impedes their widespread deployment. Attackers and criminals, even without knowing the context of the transmitted data, with simple eavesdropping on the wireless links, may benefit a lot from linking activities to the identities of patient’s sensors and medical staff members. These vulnerabilities apply to all tiers of the mHealth system. A new anonymous mutual authentication scheme for three-tier mobile healthcare systems with wearable sensors is proposed in this paper. Our scheme consists of three protocols: Protocol-1 allows the anonymous authentication nodes (mobile users and controller nodes) and the HSP medical server in the third tier, while Protocol-2 realizes the anonymous authentication between mobile users and controller nodes in the second tier, and Protocol-3 achieves the anonymous authentication between controller nodes and the wearable body sensors in the first tier. In the design of our protocols, the variation in the resource constraints of the different nodes in the mHealth system are taken into consideration so that our protocols make a better trade-off among security, efficiency and practicality. The security of our protocols are analyzed through rigorous formal proofs using BAN logic tool and informal discussions of security features, possible attacks and countermeasures. Besides, the efficiency of our protocols are concretely evaluated and compared with related schemes. The comparisons show that our scheme outperforms the previous schemes and provides more complete and integrated anonymous authentication services. Finally, the security of our protocols are evaluated by using the Automated Validation of Internet Security Protocols and Applications and the SPAN animator software. The simulation results show that our scheme is secure and satisfy all the specified privacy and authentication goals. 相似文献
Wireless Networks - Since the advent of 1G through 5G networks, telecommunication industry has gone through phenomenal transformation in the way we communicate, we work, and we socialize. In dense... 相似文献
Authentication schemes are widely used mechanisms to thwart unauthorized access of resources over insecure networks. Several smart card based password authentication schemes have been proposed in the literature. In this paper, we demonstrate the security limitations of a recently proposed password based authentication scheme, and show that their scheme is still vulnerable to forgery and offline password guessing attacks and it is also unable to provide user anonymity, forward secrecy and mutual authentication. With the intention of fixing the weaknesses of that scheme, we present a secure authentication scheme. We show that the proposed scheme is invulnerable to various attacks together with attacks observed in the analyzed scheme through both rigorous formal and informal security analysis. Furthermore, the security analysis using the widely-accepted Real-Or-Random (ROR) model ensures that the proposed scheme provides the session key (SK) security. Finally, we carry out the performance evaluation of the proposed scheme and other related schemes, and the result favors that the proposed scheme provides better trade-off among security and performance as compared to other existing related schemes.
Diatoms are single‐celled microalgae that produce a large variety of hierarchically porous, silica‐based microparticles as cell wall material. The presence of genetically encoded silica nanopatterns endows the biosilica with favorable properties for a wide range of applications including catalysis, chemical sensing, photonics, and drug delivery. Enhancing the performance of diatom biosilica requires i) a better understanding of the structure–property relationship in this material, and ii) methods that enable the manipulation of the biosilica structure and properties in a targeted manner. Here, genetic engineering of the diatom Thalassiosira pseudonana is employed to immobilize enzymes (glucose oxidase and horseradish peroxidase) into structurally distinct regions of the biosilica, which are termed valves and girdle bands. Remarkably, glucose oxidase in girdle bands exhibits >3‐fold higher catalytic activities compared to its location in valves. It is demonstrated through enzyme accessibility studies, protein engineering, and genetic engineering of biosilica morphology that the divergent enzyme activities are caused by the differences in the inherent silica nanopatterns of valves and girdle bands. This work highlights the importance of silica nanoscale architecture for the activity of immobilized enzymes and provides unprecedented tools for the biotechnological production of silica microparticles with tailored catalytic activities and anisotropic functionalities. 相似文献
A Fabry pérot antenna with a multilayer superstrate having nonuniform unit cells has been investigated as a receiving antenna for radio frequency (RF) energy harvesting applications. Here, the primary radiator is selected as a dual‐polarized aperture coupled microstrip antenna with a double‐layer superstrate. This antenna excites orthogonal polarizations, vertical (V) and horizontal (H) in the frequency band of 6.2 and 5.8 GHz, respectively, due to the presence of two orthogonal H‐shaped slots in its ground plane. The proposed antenna provides a gain enhancement of 9.8 and 10.1 dBi at the respective frequencies. The rectifying circuit is designed for a frequency of 5.8 GHz using a voltage doubler topology. The circuit provides a power conversion efficiency of 41% at 0 dBm input power. 相似文献
The incidence of degenerative diseases and the ageing population have added to the growing demand for bone grafts. Although autologous bone continues to be the gold standard, limited yield and potential morbidity of the donor site pose considerable challenges. Currently, clinically used synthetic grafts based on calcium phosphates are mechanically brittle and not compliant hence composite scaffolds are expected to be provide viable solutions. In this study we report composites of calcium meta phosphate-poly (vinyl alcohol) with tunable mechanical properties, low swelling and excellent biocompatibility. The elastomeric nature of the composites resist brittle fracture and the scaffolds can be easily shaped to the bone defect by the surgeon. Testing on bone plug shaped specimens of the scaffolds, exhibited superior mechanical properties compared to currently commercially available bone plugs with additional advantages being the ability to increase porosity without compromising properties in compression and degree of swelling, which make these composites promising synthetic alternatives for bone grafts and bone tissue engineering. 相似文献
Wireless Personal Communications - Secure data communication is the need of hour today specifically when the wireless communication channel is insecure. We are proposing a protocol which can be... 相似文献