Wireless body area network (WBAN) has witnessed significant attentions in the healthcare domain using biomedical sensor-based monitoring of heterogeneous nature of vital signs of a patient’s body. The design of frequency band, MAC superframe structure, and slots allocation to the heterogeneous nature of the patient’s packets have become the challenging problems in WBAN due to the diverse QoS requirements. In this context, this paper proposes an Energy Efficient Traffic Prioritization for Medium Access Control (EETP-MAC) protocol, which provides sufficient slots with higher bandwidth and guard bands to avoid channels interference causing longer delay. Specifically, the design of EETP-MAC is broadly divided in to four folds. Firstly, patient data traffic prioritization is presented with broad categorization including Non-Constrained Data (NCD), Delay-Constrained Data (DCD), Reliability-Constrained Data (RCD) and Critical Data (CD). Secondly, a modified superframe structure design is proposed for effectively handling the traffic prioritization. Thirdly, threshold based slot allocation technique is developed to reduce contention by effectively quantifying criticality on patient data. Forth, an energy efficient frame design is presented focusing on beacon interval, superframe duration, and packet size and inactive period. Simulations are performed to comparatively evaluate the performance of the proposed EETP-MAC with the state-of-the-art MAC protocols. The comparative evaluation attests the benefit of EETP-MAC in terms of efficient slot allocation resulting in lower delay and energy consumption.
Wireless Personal Communications - Current research in wireless communication undoubtedly points towards the tremendous advantages of using visible light as a spectrum for significantly boosting... 相似文献
Base station's location privacy in a wireless sensor network (WSN) is critical for information security and operational availability of the network. A key part of securing the base station from potential compromise is to secure the information about its physical location. This paper proposes a technique called base station location privacy via software-defined networking (SDN) in wireless sensor networks (BSLPSDN). The inspiration comes from the architecture of SDN, where the control plane is separated from the data plane, and where control plane decides the policy for the data plane. BSLPSDN uses three categories of nodes, namely, a main controller to instruct the overall operations, a dedicated node to buffer and forward data, and lastly, a common node to sense and forward the packet. We employ three kinds of nodes to collaborate and achieve stealth for the base station and thus protecting it against the traffic-analysis attacks. Different traits of the WSN including energy status and traffic density can actively be monitored by BSLPSDN, which positively affects the energy goals, expected life of the network, load on common nodes, and the possibility of creating diversion in the wake of an attack on the base station. We incorporated multiple experiments to analyze and evaluate the performance of our proposed algorithm. We use single controller with multiple sensor nodes and multiple controllers with multiple sensor nodes to show the level of anonymity of BS. Experiments show that providing BS anonymity via multiple controllers is the best method both in terms of energy and privacy. 相似文献
In classical public‐key infrastructure (PKI), the certificate authorities (CAs) are fully trusted, and the security of the PKI relies on the trustworthiness of the CAs. However, recent failures and compromises of CAs showed that if a CA is corrupted, fake certificates may be issued, and the security of clients will be at risk. As emerging solutions, blockchain‐ and log‐based PKI proposals potentially solved the shortcomings of the PKI, in particular, eliminating the weakest link security and providing a rapid remedy to CAs' problems. Nevertheless, log‐based PKIs are still exposed to split‐world attacks if the attacker is capable of presenting two distinct signed versions of the log to the targeted victim(s), while the blockchain‐based PKIs have scaling and high‐cost issues to be overcome. To address these problems, this paper presents a secure and accountable transport layer security (TLS) certificate management (SCM), which is a next‐generation PKI framework. It combines the two emerging architectures, introducing novel mechanisms, and makes CAs and log servers accountable to domain owners. In SCM, CA‐signed domain certificates are stored in log servers, while the management of CAs and log servers is handed over to a group of domain owners, which is conducted on the blockchain platform. Different from existing blockchain‐based PKI proposals, SCM decreases the storage cost of blockchain from several hundreds of GB to only hundreds of megabytes. Finally, we analyze the security and performance of SCM and compare SCM with previous blockchain‐ and log‐based PKI schemes. 相似文献
The application of a low temperature ashing method for estimating total residual organic matter (toluene insolubles) in oil sands is described. A linear correlation exists between organic carbon content and loss on ignition at 400 ± 10 °C of solvent extracted oil sands. The ratio between total organic carbon and the weight loss on ignition (CT/LOl) owing to the removal of residual organic matter is much lower than that obtained for toluene soluble bitumen fractions, indicating very different chemical composition for the residual organic matter. The measured carbon content of the residual organic matter in oil sands suggests that this material could be a mixture of various fractions contained in resins, asphaltenes, asphaltic acids and humic acids. 相似文献
The volatile components of dalieb fruit have been investigated by capillary column gas chromatography/mass spectrometry. The main components were C1 to C4 aliphatic alcohols and the corresponding acids together with esters derived from them. Acetic acid and ethanol were particularly abundant, the fruit pulp containing approximately 0.1% of each compound. Other volatiles present included the unsaturated ketone 6-methyl-5-heptene-2-one, the corresponding alcohol and the terpene, geranyl acetone. 相似文献
A modified steam distillation method was developed to extract furfural from crude palm oil (CPO). The collected distillates were analysed using high performance liquid chromatography (HPLC) coupled with an ultraviolet diode detector at 284 nm. The HPLC method allowed identification and quantification of furfural in CPO. The unique thermal extraction of CPO whereby the fresh fruit bunches (FFB) are first subjected to steam treatment, distinguishes itself from other solvent-extracted or cold-pressed vegetable oils. The presence of furfural was also determined in the fresh palm oil from FFB (without undergoing the normal extraction process), palm olein, palm stearin, olive oil, coconut oil, sunflower oil, soya oil and corn oil. The chromatograms of the extracts were compared to that of standard furfural. Furfural was only detected in CPO. The CPO consignments obtained from four mills were shown to contain 7.54 to 20.60 mg/kg furfural. 相似文献
Thirty randomly selected Aeromonas isolates from food and the environment in Abu Dhabi, United Arab Emirates, were characterized for putative virulence determinants, such as production of cytotoxin, cytotonic toxin, and hemolysin and their capacity to adhere to and invade Henle 407 cells in vitro. Seventy percent of the tested isolates were cytotoxin producers, and 80% were hemolytic. Cytotoxin was produced by 6 of 7 A. hydrophila strains, 6 of 13 A. caviae strains, and 6 of 7 A. veronii bv. sobria strains, mostly from food sources. A. schubertii, A. jandaei, and A. trota also produced both cytotoxin and hemolysin. All of the 30 isolates tested adhered to Henle 407 cells, but none were able to invade the cells, as determined with the in vitro assay. However, no significant correlation of the presence of these putative virulence factors was found among these aeromonad food isolates. 相似文献