Towards an Iterated Game Model with Multiple Adversaries in Smart-World Systems.
He, Xiaofei; Yang, Xinyu; Yu, Wei; Lin, Jie; Yang, Qingyu
2018-02-24
Diverse and varied cyber-attacks challenge the operation of the smart-world system that is supported by Internet-of-Things (IoT) (smart cities, smart grid, smart transportation, etc.) and must be carefully and thoughtfully addressed before widespread adoption of the smart-world system can be fully realized. Although a number of research efforts have been devoted to defending against these threats, a majority of existing schemes focus on the development of a specific defensive strategy to deal with specific, often singular threats. In this paper, we address the issue of coalitional attacks, which can be launched by multiple adversaries cooperatively against the smart-world system such as smart cities. Particularly, we propose a game-theory based model to capture the interaction among multiple adversaries, and quantify the capacity of the defender based on the extended Iterated Public Goods Game (IPGG) model. In the formalized game model, in each round of the attack, a participant can either cooperate by participating in the coalitional attack, or defect by standing aside. In our work, we consider the generic defensive strategy that has a probability to detect the coalitional attack. When the coalitional attack is detected, all participating adversaries are penalized. The expected payoff of each participant is derived through the equalizer strategy that provides participants with competitive benefits. The multiple adversaries with the collusive strategy are also considered. Via a combination of theoretical analysis and experimentation, our results show that no matter which strategies the adversaries choose (random strategy, win-stay-lose-shift strategy, or even the adaptive equalizer strategy), our formalized game model is capable of enabling the defender to greatly reduce the maximum value of the expected average payoff to the adversaries via provisioning sufficient defensive resources, which is reflected by setting a proper penalty factor against the adversaries. In addition, we extend our game model and analyze the extortion strategy, which can enable one participant to obtain more payoff by extorting his/her opponents. The evaluation results show that the defender can combat this strategy by encouraging competition among the adversaries, and significantly suppress the total payoff of the adversaries via setting the proper penalty factor.
Towards an Iterated Game Model with Multiple Adversaries in Smart-World Systems †
Yang, Xinyu; Yu, Wei; Lin, Jie; Yang, Qingyu
2018-01-01
Diverse and varied cyber-attacks challenge the operation of the smart-world system that is supported by Internet-of-Things (IoT) (smart cities, smart grid, smart transportation, etc.) and must be carefully and thoughtfully addressed before widespread adoption of the smart-world system can be fully realized. Although a number of research efforts have been devoted to defending against these threats, a majority of existing schemes focus on the development of a specific defensive strategy to deal with specific, often singular threats. In this paper, we address the issue of coalitional attacks, which can be launched by multiple adversaries cooperatively against the smart-world system such as smart cities. Particularly, we propose a game-theory based model to capture the interaction among multiple adversaries, and quantify the capacity of the defender based on the extended Iterated Public Goods Game (IPGG) model. In the formalized game model, in each round of the attack, a participant can either cooperate by participating in the coalitional attack, or defect by standing aside. In our work, we consider the generic defensive strategy that has a probability to detect the coalitional attack. When the coalitional attack is detected, all participating adversaries are penalized. The expected payoff of each participant is derived through the equalizer strategy that provides participants with competitive benefits. The multiple adversaries with the collusive strategy are also considered. Via a combination of theoretical analysis and experimentation, our results show that no matter which strategies the adversaries choose (random strategy, win-stay-lose-shift strategy, or even the adaptive equalizer strategy), our formalized game model is capable of enabling the defender to greatly reduce the maximum value of the expected average payoff to the adversaries via provisioning sufficient defensive resources, which is reflected by setting a proper penalty factor against the adversaries. In addition, we extend our game model and analyze the extortion strategy, which can enable one participant to obtain more payoff by extorting his/her opponents. The evaluation results show that the defender can combat this strategy by encouraging competition among the adversaries, and significantly suppress the total payoff of the adversaries via setting the proper penalty factor. PMID:29495291
Cyber-physical security of Wide-Area Monitoring, Protection and Control in a smart grid environment
Ashok, Aditya; Hahn, Adam; Govindarasu, Manimaran
2013-01-01
Smart grid initiatives will produce a grid that is increasingly dependent on its cyber infrastructure in order to support the numerous power applications necessary to provide improved grid monitoring and control capabilities. However, recent findings documented in government reports and other literature, indicate the growing threat of cyber-based attacks in numbers and sophistication targeting the nation’s electric grid and other critical infrastructures. Specifically, this paper discusses cyber-physical security of Wide-Area Monitoring, Protection and Control (WAMPAC) from a coordinated cyber attack perspective and introduces a game-theoretic approach to address the issue. Finally, the paper briefly describes how cyber-physical testbeds can be used to evaluate the security research and perform realistic attack-defense studies for smart grid type environments. PMID:25685516
Cyber-physical security of Wide-Area Monitoring, Protection and Control in a smart grid environment.
Ashok, Aditya; Hahn, Adam; Govindarasu, Manimaran
2014-07-01
Smart grid initiatives will produce a grid that is increasingly dependent on its cyber infrastructure in order to support the numerous power applications necessary to provide improved grid monitoring and control capabilities. However, recent findings documented in government reports and other literature, indicate the growing threat of cyber-based attacks in numbers and sophistication targeting the nation's electric grid and other critical infrastructures. Specifically, this paper discusses cyber-physical security of Wide-Area Monitoring, Protection and Control (WAMPAC) from a coordinated cyber attack perspective and introduces a game-theoretic approach to address the issue. Finally, the paper briefly describes how cyber-physical testbeds can be used to evaluate the security research and perform realistic attack-defense studies for smart grid type environments.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Abercrombie, Robert K; Sheldon, Frederick T.
Cyber physical computing infrastructures typically consist of a number of sites are interconnected. Its operation critically depends both on cyber components and physical components. Both types of components are subject to attacks of different kinds and frequencies, which must be accounted for the initial provisioning and subsequent operation of the infrastructure via information security analysis. Information security analysis can be performed using game theory implemented in dynamic Agent Based Game Theoretic (ABGT) simulations. Such simulations can be verified with the results from game theory analysis and further used to explore larger scale, real world scenarios involving multiple attackers, defenders, andmore » information assets. We concentrated our analysis on the electric sector failure scenarios and impact analyses by the NESCOR Working Group Study, From the Section 5 electric sector representative failure scenarios; we extracted the four generic failure scenarios and grouped them into three specific threat categories (confidentiality, integrity, and availability) to the system. These specific failure scenarios serve as a demonstration of our simulation. The analysis using our ABGT simulation demonstrates how to model the electric sector functional domain using a set of rationalized game theoretic rules decomposed from the failure scenarios in terms of how those scenarios might impact the cyber physical infrastructure network with respect to CIA.« less
Amin, Ruhul; Islam, S K Hafizul; Biswas, G P; Khan, Muhammad Khurram; Obaidat, Mohammad S
2015-11-01
In order to access remote medical server, generally the patients utilize smart card to login to the server. It has been observed that most of the user (patient) authentication protocols suffer from smart card stolen attack that means the attacker can mount several common attacks after extracting smart card information. Recently, Lu et al.'s proposes a session key agreement protocol between the patient and remote medical server and claims that the same protocol is secure against relevant security attacks. However, this paper presents several security attacks on Lu et al.'s protocol such as identity trace attack, new smart card issue attack, patient impersonation attack and medical server impersonation attack. In order to fix the mentioned security pitfalls including smart card stolen attack, this paper proposes an efficient remote mutual authentication protocol using smart card. We have then simulated the proposed protocol using widely-accepted AVISPA simulation tool whose results make certain that the same protocol is secure against active and passive attacks including replay and man-in-the-middle attacks. Moreover, the rigorous security analysis proves that the proposed protocol provides strong security protection on the relevant security attacks including smart card stolen attack. We compare the proposed scheme with several related schemes in terms of computation cost and communication cost as well as security functionalities. It has been observed that the proposed scheme is comparatively better than related existing schemes.
Modeling Humans as Reinforcement Learners: How to Predict Human Behavior in Multi-Stage Games
NASA Technical Reports Server (NTRS)
Lee, Ritchie; Wolpert, David H.; Backhaus, Scott; Bent, Russell; Bono, James; Tracey, Brendan
2011-01-01
This paper introduces a novel framework for modeling interacting humans in a multi-stage game environment by combining concepts from game theory and reinforcement learning. The proposed model has the following desirable characteristics: (1) Bounded rational players, (2) strategic (i.e., players account for one anothers reward functions), and (3) is computationally feasible even on moderately large real-world systems. To do this we extend level-K reasoning to policy space to, for the first time, be able to handle multiple time steps. This allows us to decompose the problem into a series of smaller ones where we can apply standard reinforcement learning algorithms. We investigate these ideas in a cyber-battle scenario over a smart power grid and discuss the relationship between the behavior predicted by our model and what one might expect of real human defenders and attackers.
Assistive Awareness in Smart Grids
NASA Astrophysics Data System (ADS)
Bourazeri, Aikaterini; Almajano, Pablo; Rodriguez, Inmaculada; Lopez-Sanchez, Maite
The following sections are included: * Introduction * Background * The User-Infrastructure Interface * User Engagement through Assistive Awareness * Research Impact * Serious Games for Smart Grids * Serious Game Technology * Game scenario * Game mechanics * Related Work * Summary and Conclusions
Analyzing Resiliency of the Smart Grid Communication Architectures
DOE Office of Scientific and Technical Information (OSTI.GOV)
Anas AlMajali, Anas; Viswanathan, Arun; Neuman, Clifford
Smart grids are susceptible to cyber-attack as a result of new communication, control and computation techniques employed in the grid. In this paper, we characterize and analyze the resiliency of smart grid communication architecture, specifically an RF mesh based architecture, under cyber attacks. We analyze the resiliency of the communication architecture by studying the performance of high-level smart grid functions such as metering, and demand response which depend on communication. Disrupting the operation of these functions impacts the operational resiliency of the smart grid. Our analysis shows that it takes an attacker only a small fraction of meters to compromisemore » the communication resiliency of the smart grid. We discuss the implications of our result to critical smart grid functions and to the overall security of the smart grid.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
None, None
Smart grids are susceptible to cyber-attack as a result of new communication, control and computation techniques employed in the grid. In this paper, we characterize and analyze the resiliency of smart grid communication architecture, specifically an RF mesh based architecture, under cyber attacks. We analyze the resiliency of the communication architecture by studying the performance of high-level smart grid functions such as metering, and demand response which depend on communication. Disrupting the operation of these functions impacts the operational resiliency of the smart grid. Our analysis shows that it takes an attacker only a small fraction of meters to compromisemore » the communication resiliency of the smart grid. We discuss the implications of our result to critical smart grid functions and to the overall security of the smart grid.« less
An, Younghwa
2012-01-01
Recently, many biometrics-based user authentication schemes using smart cards have been proposed to improve the security weaknesses in user authentication system. In 2011, Das proposed an efficient biometric-based remote user authentication scheme using smart cards that can provide strong authentication and mutual authentication. In this paper, we analyze the security of Das's authentication scheme, and we have shown that Das's authentication scheme is still insecure against the various attacks. Also, we proposed the enhanced scheme to remove these security problems of Das's authentication scheme, even if the secret information stored in the smart card is revealed to an attacker. As a result of security analysis, we can see that the enhanced scheme is secure against the user impersonation attack, the server masquerading attack, the password guessing attack, and the insider attack and provides mutual authentication between the user and the server.
An, Younghwa
2012-01-01
Recently, many biometrics-based user authentication schemes using smart cards have been proposed to improve the security weaknesses in user authentication system. In 2011, Das proposed an efficient biometric-based remote user authentication scheme using smart cards that can provide strong authentication and mutual authentication. In this paper, we analyze the security of Das's authentication scheme, and we have shown that Das's authentication scheme is still insecure against the various attacks. Also, we proposed the enhanced scheme to remove these security problems of Das's authentication scheme, even if the secret information stored in the smart card is revealed to an attacker. As a result of security analysis, we can see that the enhanced scheme is secure against the user impersonation attack, the server masquerading attack, the password guessing attack, and the insider attack and provides mutual authentication between the user and the server. PMID:22899887
Attack Classification Schema for Smart City WSNs
Garcia-Font, Victor; Garrigues, Carles; Rifà-Pous, Helena
2017-01-01
Urban areas around the world are populating their streets with wireless sensor networks (WSNs) in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN. PMID:28379192
Attack Classification Schema for Smart City WSNs.
Garcia-Font, Victor; Garrigues, Carles; Rifà-Pous, Helena
2017-04-05
Urban areas around the world are populating their streets with wireless sensor networks (WSNs) in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN.
AVQS: attack route-based vulnerability quantification scheme for smart grid.
Ko, Jongbin; Lim, Hyunwoo; Lee, Seokjun; Shon, Taeshik
2014-01-01
A smart grid is a large, consolidated electrical grid system that includes heterogeneous networks and systems. Based on the data, a smart grid system has a potential security threat in its network connectivity. To solve this problem, we develop and apply a novel scheme to measure the vulnerability in a smart grid domain. Vulnerability quantification can be the first step in security analysis because it can help prioritize the security problems. However, existing vulnerability quantification schemes are not suitable for smart grid because they do not consider network vulnerabilities. We propose a novel attack route-based vulnerability quantification scheme using a network vulnerability score and an end-to-end security score, depending on the specific smart grid network environment to calculate the vulnerability score for a particular attack route. To evaluate the proposed approach, we derive several attack scenarios from the advanced metering infrastructure domain. The experimental results of the proposed approach and the existing common vulnerability scoring system clearly show that we need to consider network connectivity for more optimized vulnerability quantification.
On a simulation study for reliable and secured smart grid communications
NASA Astrophysics Data System (ADS)
Mallapuram, Sriharsha; Moulema, Paul; Yu, Wei
2015-05-01
Demand response is one of key smart grid applications that aims to reduce power generation at peak hours and maintain a balance between supply and demand. With the support of communication networks, energy consumers can become active actors in the energy management process by adjusting or rescheduling their electricity usage during peak hours based on utilities pricing incentives. Nonetheless, the integration of communication networks expose the smart grid to cyber-attacks. In this paper, we developed a smart grid simulation test-bed and designed evaluation scenarios. By leveraging the capabilities of Matlab and ns-3 simulation tools, we conducted a simulation study to evaluate the impact of cyber-attacks on demand response application. Our data shows that cyber-attacks could seriously disrupt smart grid operations, thus confirming the need of secure and resilient communication networks for supporting smart grid operations.
AVQS: Attack Route-Based Vulnerability Quantification Scheme for Smart Grid
Lim, Hyunwoo; Lee, Seokjun; Shon, Taeshik
2014-01-01
A smart grid is a large, consolidated electrical grid system that includes heterogeneous networks and systems. Based on the data, a smart grid system has a potential security threat in its network connectivity. To solve this problem, we develop and apply a novel scheme to measure the vulnerability in a smart grid domain. Vulnerability quantification can be the first step in security analysis because it can help prioritize the security problems. However, existing vulnerability quantification schemes are not suitable for smart grid because they do not consider network vulnerabilities. We propose a novel attack route-based vulnerability quantification scheme using a network vulnerability score and an end-to-end security score, depending on the specific smart grid network environment to calculate the vulnerability score for a particular attack route. To evaluate the proposed approach, we derive several attack scenarios from the advanced metering infrastructure domain. The experimental results of the proposed approach and the existing common vulnerability scoring system clearly show that we need to consider network connectivity for more optimized vulnerability quantification. PMID:25152923
A Smart Collaborative Routing Protocol for Reliable Data Diffusion in IoT Scenarios.
Ai, Zheng-Yang; Zhou, Yu-Tong; Song, Fei
2018-06-13
It is knotty for current routing protocols to meet the needs of reliable data diffusion during the Internet of Things (IoT) deployments. Due to the random placement, limited resources and unattended features of existing sensor nodes, the wireless transmissions are easily exposed to unauthorized users, which becomes a vulnerable area for various malicious attacks, such as wormhole and Sybil attacks. However, the scheme based on geographic location is a suitable candidate to defend against them. This paper is inspired to propose a smart collaborative routing protocol, Geographic energy aware routing and Inspecting Node (GIN), for guaranteeing the reliability of data exchanging. The proposed protocol integrates the directed diffusion routing, Greedy Perimeter Stateless Routing (GPSR), and the inspecting node mechanism. We first discuss current wireless routing protocols from three diverse perspectives (improving transmission rate, shortening transmission range and reducing transmission consumption). Then, the details of GIN, including the model establishment and implementation processes, are presented by means of the theoretical analysis. Through leveraging the game theory, the inspecting node is elected to monitor the network behaviors. Thirdly, we evaluate the network performances, in terms of transmission delay, packet loss ratio, and throughput, between GIN and three traditional schemes (i.e., Flooding, GPSR, and GEAR). The simulation results illustrate that the proposed protocol is able to outperform the others.
Game Theory Meets Wireless Sensor Networks Security Requirements and Threats Mitigation: A Survey.
Abdalzaher, Mohamed S; Seddik, Karim; Elsabrouty, Maha; Muta, Osamu; Furukawa, Hiroshi; Abdel-Rahman, Adel
2016-06-29
We present a study of using game theory for protecting wireless sensor networks (WSNs) from selfish behavior or malicious nodes. Due to scalability, low complexity and disseminated nature of WSNs, malicious attacks can be modeled effectively using game theory. In this study, we survey the different game-theoretic defense strategies for WSNs. We present a taxonomy of the game theory approaches based on the nature of the attack, whether it is caused by an external attacker or it is the result of an internal node acting selfishly or maliciously. We also present a general trust model using game theory for decision making. We, finally, identify the significant role of evolutionary games for WSNs security against intelligent attacks; then, we list several prospect applications of game theory to enhance the data trustworthiness and node cooperation in different WSNs.
Game Theory Meets Wireless Sensor Networks Security Requirements and Threats Mitigation: A Survey
Abdalzaher, Mohamed S.; Seddik, Karim; Elsabrouty, Maha; Muta, Osamu; Furukawa, Hiroshi; Abdel-Rahman, Adel
2016-01-01
We present a study of using game theory for protecting wireless sensor networks (WSNs) from selfish behavior or malicious nodes. Due to scalability, low complexity and disseminated nature of WSNs, malicious attacks can be modeled effectively using game theory. In this study, we survey the different game-theoretic defense strategies for WSNs. We present a taxonomy of the game theory approaches based on the nature of the attack, whether it is caused by an external attacker or it is the result of an internal node acting selfishly or maliciously. We also present a general trust model using game theory for decision making. We, finally, identify the significant role of evolutionary games for WSNs security against intelligent attacks; then, we list several prospect applications of game theory to enhance the data trustworthiness and node cooperation in different WSNs. PMID:27367700
The Effects of Denial-of-Service Attacks on Secure Time-Critical Communications in the Smart Grid
DOE Office of Scientific and Technical Information (OSTI.GOV)
Zhang, Fengli; Li, QInghua; Mantooth, Homer Alan
2016-04-02
According to IEC 61850, many smart grid communications require messages to be delivered in a very short time. –Trip messages and sample values applied to the transmission level: 3 ms –Interlocking messages applied to the distribution level: 10 ms •Time-critical communications are vulnerable to denial-of-service (DoS) attacks –Flooding attack: Attacker floods many messages to the target network/machine. We conducted systematic, experimental study about how DoS attacks affect message delivery delays.
Attacker-defender game from a network science perspective
NASA Astrophysics Data System (ADS)
Li, Ya-Peng; Tan, Suo-Yi; Deng, Ye; Wu, Jun
2018-05-01
Dealing with the protection of critical infrastructures, many game-theoretic methods have been developed to study the strategic interactions between defenders and attackers. However, most game models ignore the interrelationship between different components within a certain system. In this paper, we propose a simultaneous-move attacker-defender game model, which is a two-player zero-sum static game with complete information. The strategies and payoffs of this game are defined on the basis of the topology structure of the infrastructure system, which is represented by a complex network. Due to the complexity of strategies, the attack and defense strategies are confined by two typical strategies, namely, targeted strategy and random strategy. The simulation results indicate that in a scale-free network, the attacker virtually always attacks randomly in the Nash equilibrium. With a small cost-sensitive parameter, representing the degree to which costs increase with the importance of a target, the defender protects the hub targets with large degrees preferentially. When the cost-sensitive parameter exceeds a threshold, the defender switches to protecting nodes randomly. Our work provides a new theoretical framework to analyze the confrontations between the attacker and the defender on critical infrastructures and deserves further study.
A Distributed Middleware Architecture for Attack-Resilient Communications in Smart Grids
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hodge, Brian S; Wu, Yifu; Wei, Jin
Distributed Energy Resources (DERs) are being increasingly accepted as an excellent complement to traditional energy sources in smart grids. As most of these generators are geographically dispersed, dedicated communications investments for every generator are capital cost prohibitive. Real-time distributed communications middleware, which supervises, organizes and schedules tremendous amounts of data traffic in smart grids with high penetrations of DERs, allows for the use of existing network infrastructure. In this paper, we propose a distributed attack-resilient middleware architecture that detects and mitigates the congestion attacks by exploiting the Quality of Experience (QoE) measures to complement the conventional Quality of Service (QoS)more » information to detect and mitigate the congestion attacks effectively. The simulation results illustrate the efficiency of our proposed communications middleware architecture.« less
A Distributed Middleware Architecture for Attack-Resilient Communications in Smart Grids: Preprint
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wu, Yifu; Wei, Jin; Hodge, Bri-Mathias
Distributed energy resources (DERs) are being increasingly accepted as an excellent complement to traditional energy sources in smart grids. Because most of these generators are geographically dispersed, dedicated communications investments for every generator are capital-cost prohibitive. Real-time distributed communications middleware - which supervises, organizes, and schedules tremendous amounts of data traffic in smart grids with high penetrations of DERs - allows for the use of existing network infrastructure. In this paper, we propose a distributed attack-resilient middleware architecture that detects and mitigates the congestion attacks by exploiting the quality of experience measures to complement the conventional quality of service informationmore » to effectively detect and mitigate congestion attacks. The simulation results illustrate the efficiency of our proposed communications middleware architecture.« less
Armstrong, Amy E; Gillan, Eileen; DiMario, Francis Joseph
2014-03-01
SMART syndrome (stroke-like migraine attacks after radiation therapy) is a rare condition that involves complex migraines with focal neurologic findings in patients following cranial irradiation for central nervous system malignancies. Little is known about the mechanisms behind the disorder, making successful treatment challenging. We report 2 new cases of SMART syndrome in pediatric patients as well as review all documented cases of the syndrome. Each of our 2 pediatric patients suffered multiple episodes. Attacks were characterized by severe headache, visual disturbance, aphasia, and weakness. Recovery occurred over several days to weeks. The data from all documented reports of SMART syndrome indicate a greater prevalence for male gender. An age-dependent pattern of onset was also observed, with a greater variability of syndrome onset in patients who received cranial irradiation at a younger age. SMART appears to be a reversible, recurrent long-term complication of radiation therapy with possible age- and gender-related influences.
Moisan, Frédéric; Gonzalez, Cleotilde
2017-01-01
Game Theory is a common approach used to understand attacker and defender motives, strategies, and allocation of limited security resources. For example, many defense algorithms are based on game-theoretic solutions that conclude that randomization of defense actions assures unpredictability, creating difficulties for a human attacker. However, many game-theoretic solutions often rely on idealized assumptions of decision making that underplay the role of human cognition and information uncertainty. The consequence is that we know little about how effective these algorithms are against human players. Using a simplified security game, we study the type of attack strategy and the uncertainty about an attacker's strategy in a laboratory experiment where participants play the role of defenders against a simulated attacker. Our goal is to compare a human defender's behavior in three levels of uncertainty (Information Level: Certain, Risky, Uncertain) and three types of attacker's strategy (Attacker's strategy: Minimax, Random, Adaptive) in a between-subjects experimental design. Best defense performance is achieved when defenders play against a minimax and a random attack strategy compared to an adaptive strategy. Furthermore, when payoffs are certain, defenders are as efficient against random attack strategy as they are against an adaptive strategy, but when payoffs are uncertain, defenders have most difficulties defending against an adaptive attacker compared to a random attacker. We conclude that given conditions of uncertainty in many security problems, defense algorithms would be more efficient if they are adaptive to the attacker actions, taking advantage of the attacker's human inefficiencies. PMID:28690557
Decision and Game Theory for Security
NASA Astrophysics Data System (ADS)
Alpcan, Tansu; Buttyán, Levente; Baras, John S.
Attack--defense trees are used to describe security weaknesses of a system and possible countermeasures. In this paper, the connection between attack--defense trees and game theory is made explicit. We show that attack--defense trees and binary zero-sum two-player extensive form games have equivalent expressive power when considering satisfiability, in the sense that they can be converted into each other while preserving their outcome and their internal structure.
Machine Learning Methods for Attack Detection in the Smart Grid.
Ozay, Mete; Esnaola, Inaki; Yarman Vural, Fatos Tunay; Kulkarni, Sanjeev R; Poor, H Vincent
2016-08-01
Attack detection problems in the smart grid are posed as statistical learning problems for different attack scenarios in which the measurements are observed in batch or online settings. In this approach, machine learning algorithms are used to classify measurements as being either secure or attacked. An attack detection framework is provided to exploit any available prior knowledge about the system and surmount constraints arising from the sparse structure of the problem in the proposed approach. Well-known batch and online learning algorithms (supervised and semisupervised) are employed with decision- and feature-level fusion to model the attack detection problem. The relationships between statistical and geometric properties of attack vectors employed in the attack scenarios and learning algorithms are analyzed to detect unobservable attacks using statistical learning methods. The proposed algorithms are examined on various IEEE test systems. Experimental analyses show that machine learning algorithms can detect attacks with performances higher than attack detection algorithms that employ state vector estimation methods in the proposed attack detection framework.
Defending Against Advanced Persistent Threats Using Game-Theory.
Rass, Stefan; König, Sandra; Schauer, Stefan
2017-01-01
Advanced persistent threats (APT) combine a variety of different attack forms ranging from social engineering to technical exploits. The diversity and usual stealthiness of APT turns them into a central problem of contemporary practical system security, since information on attacks, the current system status or the attacker's incentives is often vague, uncertain and in many cases even unavailable. Game theory is a natural approach to model the conflict between the attacker and the defender, and this work investigates a generalized class of matrix games as a risk mitigation tool for an advanced persistent threat (APT) defense. Unlike standard game and decision theory, our model is tailored to capture and handle the full uncertainty that is immanent to APTs, such as disagreement among qualitative expert risk assessments, unknown adversarial incentives and uncertainty about the current system state (in terms of how deeply the attacker may have penetrated into the system's protective shells already). Practically, game-theoretic APT models can be derived straightforwardly from topological vulnerability analysis, together with risk assessments as they are done in common risk management standards like the ISO 31000 family. Theoretically, these models come with different properties than classical game theoretic models, whose technical solution presented in this work may be of independent interest.
Security Policies for Mitigating the Risk of Load Altering Attacks on Smart Grid Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ryutov, Tatyana; AlMajali, Anas; Neuman, Clifford
2015-04-01
While demand response programs implement energy efficiency and power quality objectives, they bring potential security threats to the Smart Grid. The ability to influence load in a system enables attackers to cause system failures and impacts the quality and integrity of power delivered to customers. This paper presents a security mechanism to monitor and control load according to a set of security policies during normal system operation. The mechanism monitors, detects, and responds to load altering attacks. We examined the security requirements of Smart Grid stakeholders and constructed a set of load control policies enforced by the mechanism. We implementedmore » a proof of concept prototype and tested it using the simulation environment. By enforcing the proposed policies in this prototype, the system is maintained in a safe state in the presence of load drop attacks.« less
Investigation on Covert Channel Attacks and Countermeasures in the Cloud
2017-03-29
ahead of the game and continue improving our security systems. Thus, investigating novel attack strategies and tactics is crucial to shaping the...step to stay ahead of the game and continue improving our security systems. Thus, investigating novel attack strategies and tactics is crucial to
... Vegetables Desserts Dining Decisions Mobile App – Dining Decisions Game Online Game – Dining Decisions Questions Answered Under the Microscope Xpert ... Test Your Smarts Feeling Frazzled…? Feeling Stressed Out? Game Grind Your Mind Game Kabam! Comic Creator Best ...
... Vegetables Desserts Dining Decisions Mobile App – Dining Decisions Game Online Game – Dining Decisions Questions Answered Under the Microscope Xpert ... Test Your Smarts Feeling Frazzled…? Feeling Stressed Out? Game Grind Your Mind Game Kabam! Comic Creator Best ...
... Vegetables Desserts Dining Decisions Mobile App – Dining Decisions Game Online Game – Dining Decisions Questions Answered Under the Microscope Xpert ... Test Your Smarts Feeling Frazzled…? Feeling Stressed Out? Game Grind Your Mind Game Kabam! Comic Creator Best ...
Cyber War Game in Temporal Networks
2016-02-09
Boston, Massachusetts 02115, United States of America * jianxi.gao@gmail.com Abstract In a cyber war game where a network is fully distributed and... game with minimum effort. Given the system goal states of attackers and defenders, we study what strategies attackers or defenders can take to reach
A Game-Theoretic Approach to Information-Flow Control via Protocol Composition
NASA Astrophysics Data System (ADS)
Alvim, Mário; Chatzikokolakis, Konstantinos; Kawamoto, Yusuke; Palamidessi, Catuscia
2018-05-01
In the inference attacks studied in Quantitative Information Flow (QIF), the attacker typically tries to interfere with the system in the attempt to increase its leakage of secret information. The defender, on the other hand, typically tries to decrease leakage by introducing some controlled noise. This noise introduction can be modeled as a type of protocol composition, i.e., a probabilistic choice among different protocols, and its effect on the amount of leakage depends heavily on whether or not this choice is visible to the attacker. In this work, we consider operators for modeling visible and hidden choice in protocol composition, and we study their algebraic properties. We then formalize the interplay between defender and attacker in a game-theoretic framework adapted to the specific issues of QIF, where the payoff is information leakage. We consider various kinds of leakage games, depending on whether players act simultaneously or sequentially, and on whether or not the choices of the defender are visible to the attacker. In the case of sequential games, the choice of the second player is generally a function of the choice of the first player, and his/her probabilistic choice can be either over the possible functions (mixed strategy) or it can be on the result of the function (behavioral strategy). We show that when the attacker moves first in a sequential game with a hidden choice, then behavioral strategies are more advantageous for the defender than mixed strategies. This contrasts with the standard game theory, where the two types of strategies are equivalent. Finally, we establish a hierarchy of these games in terms of their information leakage and provide methods for finding optimal strategies (at the points of equilibrium) for both attacker and defender in the various cases.
Randomized Prediction Games for Adversarial Machine Learning.
Rota Bulo, Samuel; Biggio, Battista; Pillai, Ignazio; Pelillo, Marcello; Roli, Fabio
In spam and malware detection, attackers exploit randomization to obfuscate malicious data and increase their chances of evading detection at test time, e.g., malware code is typically obfuscated using random strings or byte sequences to hide known exploits. Interestingly, randomization has also been proposed to improve security of learning algorithms against evasion attacks, as it results in hiding information about the classifier to the attacker. Recent work has proposed game-theoretical formulations to learn secure classifiers, by simulating different evasion attacks and modifying the classification function accordingly. However, both the classification function and the simulated data manipulations have been modeled in a deterministic manner, without accounting for any form of randomization. In this paper, we overcome this limitation by proposing a randomized prediction game, namely, a noncooperative game-theoretic formulation in which the classifier and the attacker make randomized strategy selections according to some probability distribution defined over the respective strategy set. We show that our approach allows one to improve the tradeoff between attack detection and false alarms with respect to the state-of-the-art secure classifiers, even against attacks that are different from those hypothesized during design, on application examples including handwritten digit recognition, spam, and malware detection.In spam and malware detection, attackers exploit randomization to obfuscate malicious data and increase their chances of evading detection at test time, e.g., malware code is typically obfuscated using random strings or byte sequences to hide known exploits. Interestingly, randomization has also been proposed to improve security of learning algorithms against evasion attacks, as it results in hiding information about the classifier to the attacker. Recent work has proposed game-theoretical formulations to learn secure classifiers, by simulating different evasion attacks and modifying the classification function accordingly. However, both the classification function and the simulated data manipulations have been modeled in a deterministic manner, without accounting for any form of randomization. In this paper, we overcome this limitation by proposing a randomized prediction game, namely, a noncooperative game-theoretic formulation in which the classifier and the attacker make randomized strategy selections according to some probability distribution defined over the respective strategy set. We show that our approach allows one to improve the tradeoff between attack detection and false alarms with respect to the state-of-the-art secure classifiers, even against attacks that are different from those hypothesized during design, on application examples including handwritten digit recognition, spam, and malware detection.
Predicting Factors of Zone 4 Attack in Volleyball.
Costa, Gustavo C; Castro, Henrique O; Evangelista, Breno F; Malheiros, Laura M; Greco, Pablo J; Ugrinowitsch, Herbert
2017-06-01
This study examined 142 volleyball games of the Men's Super League 2014/2015 seasons in Brazil from which we analyzed 24-26 games of each participating team, identifying 5,267 Zone 4 attacks for further analysis. Within these Zone 4 attacks, we analyzed the association between the effect of the attack carried out and the separate effects of serve reception, tempo and type of attack. We found that the reception, tempo of attack, second tempo of attack, and power of diagonal attack were predictors of the attack effect in Zone 4. Moreover, placed attacks showed a tendency to not yield a score. In conclusion, winning points in high-level men's volleyball requires excellent receptions, a fast attack tempo and powerfully executed of attacks.
... Vegetables Desserts Dining Decisions Mobile App – Dining Decisions Game Online Game – Dining Decisions Questions Answered Under the Microscope Xpert ... Test Your Smarts Feeling Frazzled…? Feeling Stressed Out? Game Grind Your Mind Game Kabam! Comic Creator Best ...
... Vegetables Desserts Dining Decisions Mobile App – Dining Decisions Game Online Game – Dining Decisions Questions Answered Under the Microscope Xpert ... Test Your Smarts Feeling Frazzled…? Feeling Stressed Out? Game Grind Your Mind Game Kabam! Comic Creator Best ...
... Vegetables Desserts Dining Decisions Mobile App – Dining Decisions Game Online Game – Dining Decisions Questions Answered Under the Microscope Xpert ... Test Your Smarts Feeling Frazzled…? Feeling Stressed Out? Game Grind Your Mind Game Kabam! Comic Creator Best ...
... Vegetables Desserts Dining Decisions Mobile App – Dining Decisions Game Online Game – Dining Decisions Questions Answered Under the Microscope Xpert ... Test Your Smarts Feeling Frazzled…? Feeling Stressed Out? Game Grind Your Mind Game Kabam! Comic Creator Best ...
Michael's Inside Scoop: Genetics
... Vegetables Desserts Dining Decisions Mobile App – Dining Decisions Game Online Game – Dining Decisions Questions Answered Under the Microscope Xpert ... Test Your Smarts Feeling Frazzled…? Feeling Stressed Out? Game Grind Your Mind Game Kabam! Comic Creator Best ...
Chess therapy: A new approach to curing panic attack.
Barzegar, Kazem; Barzegar, Somayeh
2017-12-01
To study the effect of playing cell phone chess game on treating panic attack. The chess game on an android cell phone was played by the researcher who was affected by panic attack as a post-traumatic disorder immediately after or before feeling of the start of symptoms. The right level of difficulty, i.e., levels 2-4, was selected for optimal results. Playing chess game on the android cell phone prevented the manifestation of panic attack and led to the cure of this traumatic condition. Chess therapy with the right level of difficulty can be recommended as a very effective non-pharmaceutical method for the successful treatment of panic attacks. Copyright © 2017 Elsevier B.V. All rights reserved.
NASA Astrophysics Data System (ADS)
Yuan, Yuan; Sun, Fuchun; Liu, Huaping
2016-07-01
This paper is concerned with the resilient control under denial-of-service attack launched by the intelligent attacker. The resilient control system is modelled as a multi-stage hierarchical game with a corresponding hierarchy of decisions made at cyber and physical layer, respectively. Specifically, the interaction in the cyber layer between different security agents is modelled as a static infinite Stackelberg game, while in the underlying physical layer the full-information H∞ minimax control with package drops is modelled as a different Stackelberg game. Both games are solved sequentially, which is consistent with the actual situations. Finally, the proposed method is applied to the load frequency control of the power system, which demonstrates its effectiveness.
A more secure anonymous user authentication scheme for the integrated EPR information system.
Wen, Fengtong
2014-05-01
Secure and efficient user mutual authentication is an essential task for integrated electronic patient record (EPR) information system. Recently, several authentication schemes have been proposed to meet this requirement. In a recent paper, Lee et al. proposed an efficient and secure password-based authentication scheme used smart cards for the integrated EPR information system. This scheme is believed to have many abilities to resist a range of network attacks. Especially, they claimed that their scheme could resist lost smart card attack. However, we reanalyze the security of Lee et al.'s scheme, and show that it fails to protect off-line password guessing attack if the secret information stored in the smart card is compromised. This also renders that their scheme is insecure against user impersonation attacks. Then, we propose a new user authentication scheme for integrated EPR information systems based on the quadratic residues. The new scheme not only resists a range of network attacks but also provides user anonymity. We show that our proposed scheme can provide stronger security.
A Game-Theoretic Response Strategy for Coordinator Attack in Wireless Sensor Networks
Liu, Jianhua; Yue, Guangxue; Shang, Huiliang; Li, Hongjie
2014-01-01
The coordinator is a specific node that controls the whole network and has a significant impact on the performance in cooperative multihop ZigBee wireless sensor networks (ZWSNs). However, the malicious node attacks coordinator nodes in an effort to waste the resources and disrupt the operation of the network. Attacking leads to a failure of one round of communication between the source nodes and destination nodes. Coordinator selection is a technique that can considerably defend against attack and reduce the data delivery delay, and increase network performance of cooperative communications. In this paper, we propose an adaptive coordinator selection algorithm using game and fuzzy logic aiming at both minimizing the average number of hops and maximizing network lifetime. The proposed game model consists of two interrelated formulations: a stochastic game for dynamic defense and a best response policy using evolutionary game formulation for coordinator selection. The stable equilibrium best policy to response defense is obtained from this game model. It is shown that the proposed scheme can improve reliability and save energy during the network lifetime with respect to security. PMID:25105171
A game-theoretic response strategy for coordinator attack in wireless sensor networks.
Liu, Jianhua; Yue, Guangxue; Shen, Shigen; Shang, Huiliang; Li, Hongjie
2014-01-01
The coordinator is a specific node that controls the whole network and has a significant impact on the performance in cooperative multihop ZigBee wireless sensor networks (ZWSNs). However, the malicious node attacks coordinator nodes in an effort to waste the resources and disrupt the operation of the network. Attacking leads to a failure of one round of communication between the source nodes and destination nodes. Coordinator selection is a technique that can considerably defend against attack and reduce the data delivery delay, and increase network performance of cooperative communications. In this paper, we propose an adaptive coordinator selection algorithm using game and fuzzy logic aiming at both minimizing the average number of hops and maximizing network lifetime. The proposed game model consists of two interrelated formulations: a stochastic game for dynamic defense and a best response policy using evolutionary game formulation for coordinator selection. The stable equilibrium best policy to response defense is obtained from this game model. It is shown that the proposed scheme can improve reliability and save energy during the network lifetime with respect to security.
NASA Astrophysics Data System (ADS)
JiWei, Tian; BuHong, Wang; FuTe, Shang; Shuaiqi, Liu
2017-05-01
Exact state estimation is vital important to maintain common operations of smart grids. Existing researches demonstrate that state estimation output could be compromised by malicious attacks. However, to construct the attack vectors, a usual presumption in most works is that the attacker has perfect information regarding the topology and so on even such information is difficult to acquire in practice. Recent research shows that Independent Component Analysis (ICA) can be used for inferring topology information which can be used to originate undetectable attacks and even to alter the price of electricity for the profits of attackers. However, we found that the above ICA-based blind attack tactics is merely feasible in the environment with Gaussian noises. If there are outliers (device malfunction and communication errors), the Bad Data Detector will easily detect the attack. Hence, we propose a robust ICA based blind attack strategy that one can use matrix recovery to circumvent the outlier problem and construct stealthy attack vectors. The proposed attack strategies are tested with IEEE representative 14-bus system. Simulations verify the feasibility of the proposed method.
Choi, Younsung; Nam, Junghyun; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Won, Dongho
2014-01-01
An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user's biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen's scheme.
Attacking of SmartCard-Based Banking Applications with JavaScript-Based Rootkits
NASA Astrophysics Data System (ADS)
Bußmeyer, Daniel; Gröbert, Felix; Schwenk, Jörg; Wegener, Christoph
Due to recent attacks on online banking systems and consequent soaring losses through fraud, different methods have been developed to ensure a secure connection between a bank and its customers. One method is the inclusion of smart card readers into these schemes, which come along with different benefits, e.g., convenience and costs, and endangerments, especially on the security side.
Thundercloud: Domain specific information security training for the smart grid
NASA Astrophysics Data System (ADS)
Stites, Joseph
In this paper, we describe a cloud-based virtual smart grid test bed: ThunderCloud, which is intended to be used for domain-specific security training applicable to the smart grid environment. The test bed consists of virtual machines connected using a virtual internal network. ThunderCloud is remotely accessible, allowing students to undergo educational exercises online. We also describe a series of practical exercises that we have developed for providing the domain-specific training using ThunderCloud. The training exercises and attacks are designed to be realistic and to reflect known vulnerabilities and attacks reported in the smart grid environment. We were able to use ThunderCloud to offer practical domain-specific security training for smart grid environment to computer science students at little or no cost to the department and no risk to any real networks or systems.
Reliability analysis in interdependent smart grid systems
NASA Astrophysics Data System (ADS)
Peng, Hao; Kan, Zhe; Zhao, Dandan; Han, Jianmin; Lu, Jianfeng; Hu, Zhaolong
2018-06-01
Complex network theory is a useful way to study many real complex systems. In this paper, a reliability analysis model based on complex network theory is introduced in interdependent smart grid systems. In this paper, we focus on understanding the structure of smart grid systems and studying the underlying network model, their interactions, and relationships and how cascading failures occur in the interdependent smart grid systems. We propose a practical model for interdependent smart grid systems using complex theory. Besides, based on percolation theory, we also study the effect of cascading failures effect and reveal detailed mathematical analysis of failure propagation in such systems. We analyze the reliability of our proposed model caused by random attacks or failures by calculating the size of giant functioning components in interdependent smart grid systems. Our simulation results also show that there exists a threshold for the proportion of faulty nodes, beyond which the smart grid systems collapse. Also we determine the critical values for different system parameters. In this way, the reliability analysis model based on complex network theory can be effectively utilized for anti-attack and protection purposes in interdependent smart grid systems.
A Comparative Study of Anomaly Detection Techniques for Smart City Wireless Sensor Networks.
Garcia-Font, Victor; Garrigues, Carles; Rifà-Pous, Helena
2016-06-13
In many countries around the world, smart cities are becoming a reality. These cities contribute to improving citizens' quality of life by providing services that are normally based on data extracted from wireless sensor networks (WSN) and other elements of the Internet of Things. Additionally, public administration uses these smart city data to increase its efficiency, to reduce costs and to provide additional services. However, the information received at smart city data centers is not always accurate, because WSNs are sometimes prone to error and are exposed to physical and computer attacks. In this article, we use real data from the smart city of Barcelona to simulate WSNs and implement typical attacks. Then, we compare frequently used anomaly detection techniques to disclose these attacks. We evaluate the algorithms under different requirements on the available network status information. As a result of this study, we conclude that one-class Support Vector Machines is the most appropriate technique. We achieve a true positive rate at least 56% higher than the rates achieved with the other compared techniques in a scenario with a maximum false positive rate of 5% and a 26% higher in a scenario with a false positive rate of 15%.
A Comparative Study of Anomaly Detection Techniques for Smart City Wireless Sensor Networks
Garcia-Font, Victor; Garrigues, Carles; Rifà-Pous, Helena
2016-01-01
In many countries around the world, smart cities are becoming a reality. These cities contribute to improving citizens’ quality of life by providing services that are normally based on data extracted from wireless sensor networks (WSN) and other elements of the Internet of Things. Additionally, public administration uses these smart city data to increase its efficiency, to reduce costs and to provide additional services. However, the information received at smart city data centers is not always accurate, because WSNs are sometimes prone to error and are exposed to physical and computer attacks. In this article, we use real data from the smart city of Barcelona to simulate WSNs and implement typical attacks. Then, we compare frequently used anomaly detection techniques to disclose these attacks. We evaluate the algorithms under different requirements on the available network status information. As a result of this study, we conclude that one-class Support Vector Machines is the most appropriate technique. We achieve a true positive rate at least 56% higher than the rates achieved with the other compared techniques in a scenario with a maximum false positive rate of 5% and a 26% higher in a scenario with a false positive rate of 15%. PMID:27304957
Uniqueness of Nash equilibrium in vaccination games.
Bai, Fan
2016-12-01
One crucial condition for the uniqueness of Nash equilibrium set in vaccination games is that the attack ratio monotonically decreases as the vaccine coverage level increasing. We consider several deterministic vaccination models in homogeneous mixing population and in heterogeneous mixing population. Based on the final size relations obtained from the deterministic epidemic models, we prove that the attack ratios can be expressed in terms of the vaccine coverage levels, and also prove that the attack ratios are decreasing functions of vaccine coverage levels. Some thresholds are presented, which depend on the vaccine efficacy. It is proved that for vaccination games in homogeneous mixing population, there is a unique Nash equilibrium for each game.
A Game Theoretical Approach to Hacktivism: Is Attack Likelihood a Product of Risks and Payoffs?
Bodford, Jessica E; Kwan, Virginia S Y
2018-02-01
The current study examines hacktivism (i.e., hacking to convey a moral, ethical, or social justice message) through a general game theoretic framework-that is, as a product of costs and benefits. Given the inherent risk of carrying out a hacktivist attack (e.g., legal action, imprisonment), it would be rational for the user to weigh these risks against perceived benefits of carrying out the attack. As such, we examined computer science students' estimations of risks, payoffs, and attack likelihood through a game theoretic design. Furthermore, this study aims at constructing a descriptive profile of potential hacktivists, exploring two predicted covariates of attack decision making, namely, peer prevalence of hacking and sex differences. Contrary to expectations, results suggest that participants' estimations of attack likelihood stemmed solely from expected payoffs, rather than subjective risks. Peer prevalence significantly predicted increased payoffs and attack likelihood, suggesting an underlying descriptive norm in social networks. Notably, we observed no sex differences in the decision to attack, nor in the factors predicting attack likelihood. Implications for policymakers and the understanding and prevention of hacktivism are discussed, as are the possible ramifications of widely communicated payoffs over potential risks in hacking communities.
UbiqBio: Adoptions and Outcomes of Mobile Biology Games in the Ecology of School
ERIC Educational Resources Information Center
Perry, Judy; Klopfer, Eric
2014-01-01
The integration of learning games into schools holds significant promise, yet faces numerous obstacles. Ubiquitous games (casual games for smart phones) attempt to motivate students to engage repeatedly with content beyond school, while enabling teachers to facilitate deeper reflection on game-related curricula during class. During a two-year…
Lee, Tian-Fu; Chang, I-Pin; Lin, Tsung-Hung; Wang, Ching-Cheng
2013-06-01
The integrated EPR information system supports convenient and rapid e-medicine services. A secure and efficient authentication scheme for the integrated EPR information system provides safeguarding patients' electronic patient records (EPRs) and helps health care workers and medical personnel to rapidly making correct clinical decisions. Recently, Wu et al. proposed an efficient password-based user authentication scheme using smart cards for the integrated EPR information system, and claimed that the proposed scheme could resist various malicious attacks. However, their scheme is still vulnerable to lost smart card and stolen verifier attacks. This investigation discusses these weaknesses and proposes a secure and efficient authentication scheme for the integrated EPR information system as alternative. Compared with related approaches, the proposed scheme not only retains a lower computational cost and does not require verifier tables for storing users' secrets, but also solves the security problems in previous schemes and withstands possible attacks.
ERIC Educational Resources Information Center
Cattik, Melih; Odluyurt, Serhat
2017-01-01
The objective of this study was to teach digital gaming skills to children with autism spectrum disorder (ASD) using a SMART board with a graduated guidance teaching method in a small-group instructional format, to determine the participants' levels of learning by observation, and to determine the views of their families on the conducted…
Choi, Younsung; Nam, Junghyun; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Won, Dongho
2014-01-01
An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user's biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen's scheme. PMID:25276847
Defending Against Advanced Persistent Threats Using Game-Theory
König, Sandra; Schauer, Stefan
2017-01-01
Advanced persistent threats (APT) combine a variety of different attack forms ranging from social engineering to technical exploits. The diversity and usual stealthiness of APT turns them into a central problem of contemporary practical system security, since information on attacks, the current system status or the attacker’s incentives is often vague, uncertain and in many cases even unavailable. Game theory is a natural approach to model the conflict between the attacker and the defender, and this work investigates a generalized class of matrix games as a risk mitigation tool for an advanced persistent threat (APT) defense. Unlike standard game and decision theory, our model is tailored to capture and handle the full uncertainty that is immanent to APTs, such as disagreement among qualitative expert risk assessments, unknown adversarial incentives and uncertainty about the current system state (in terms of how deeply the attacker may have penetrated into the system’s protective shells already). Practically, game-theoretic APT models can be derived straightforwardly from topological vulnerability analysis, together with risk assessments as they are done in common risk management standards like the ISO 31000 family. Theoretically, these models come with different properties than classical game theoretic models, whose technical solution presented in this work may be of independent interest. PMID:28045922
GPS Spoofing Attack Characterization and Detection in Smart Grids
DOE Office of Scientific and Technical Information (OSTI.GOV)
Blum, Rick S.; Pradhan, Parth; Nagananda, Kyatsandra
The problem of global positioning system (GPS) spoofing attacks on smart grids endowed with phasor measurement units (PMUs) is addressed, taking into account the dynamical behavior of the states of the system. First, it is shown how GPS spoofing introduces a timing synchronization error in the phasor readings recorded by the PMUs and alters the measurement matrix of the dynamical model. Then, a generalized likelihood ratio-based hypotheses testing procedure is devised to detect changes in the measurement matrix when the system is subjected to a spoofing attack. Monte Carlo simulations are performed on the 9-bus, 3-machine test grid to demonstratemore » the implication of the spoofing attack on dynamic state estimation and to analyze the performance of the proposed hypotheses test.« less
Biometrics based authentication scheme for session initiation protocol.
Xie, Qi; Tang, Zhixiong
2016-01-01
Many two-factor challenge-response based session initiation protocol (SIP) has been proposed, but most of them are vulnerable to smart card stolen attacks and password guessing attacks. In this paper, we propose a novel three-factor SIP authentication scheme using biometrics, password and smart card, and utilize the pi calculus-based formal verification tool ProVerif to prove that the proposed protocol achieves security and authentication. Furthermore, our protocol is highly efficient when compared to other related protocols.
Ranak, M S A Noman; Azad, Saiful; Nor, Nur Nadiah Hanim Binti Mohd; Zamli, Kamal Z
2017-01-01
Due to recent advancements and appealing applications, the purchase rate of smart devices is increasing at a higher rate. Parallely, the security related threats and attacks are also increasing at a greater ratio on these devices. As a result, a considerable number of attacks have been noted in the recent past. To resist these attacks, many password-based authentication schemes are proposed. However, most of these schemes are not screen size independent; whereas, smart devices come in different sizes. Specifically, they are not suitable for miniature smart devices due to the small screen size and/or lack of full sized keyboards. In this paper, we propose a new screen size independent password-based authentication scheme, which also offers an affordable defense against shoulder surfing, brute force, and smudge attacks. In the proposed scheme, the Press Touch (PT)-a.k.a., Force Touch in Apple's MacBook, Apple Watch, ZTE's Axon 7 phone; 3D Touch in iPhone 6 and 7; and so on-is transformed into a new type of code, named Press Touch Code (PTC). We design and implement three variants of it, namely mono-PTC, multi-PTC, and multi-PTC with Grid, on the Android Operating System. An in-lab experiment and a comprehensive survey have been conducted on 105 participants to demonstrate the effectiveness of the proposed scheme.
Ranak, M. S. A. Noman; Nor, Nur Nadiah Hanim Binti Mohd; Zamli, Kamal Z.
2017-01-01
Due to recent advancements and appealing applications, the purchase rate of smart devices is increasing at a higher rate. Parallely, the security related threats and attacks are also increasing at a greater ratio on these devices. As a result, a considerable number of attacks have been noted in the recent past. To resist these attacks, many password-based authentication schemes are proposed. However, most of these schemes are not screen size independent; whereas, smart devices come in different sizes. Specifically, they are not suitable for miniature smart devices due to the small screen size and/or lack of full sized keyboards. In this paper, we propose a new screen size independent password-based authentication scheme, which also offers an affordable defense against shoulder surfing, brute force, and smudge attacks. In the proposed scheme, the Press Touch (PT)—a.k.a., Force Touch in Apple’s MacBook, Apple Watch, ZTE’s Axon 7 phone; 3D Touch in iPhone 6 and 7; and so on—is transformed into a new type of code, named Press Touch Code (PTC). We design and implement three variants of it, namely mono-PTC, multi-PTC, and multi-PTC with Grid, on the Android Operating System. An in-lab experiment and a comprehensive survey have been conducted on 105 participants to demonstrate the effectiveness of the proposed scheme. PMID:29084262
Hypergame theory applied to cyber attack and defense
NASA Astrophysics Data System (ADS)
House, James Thomas; Cybenko, George
2010-04-01
This work concerns cyber attack and defense in the context of game theory--specifically hypergame theory. Hypergame theory extends classical game theory with the ability to deal with differences in players' expertise, differences in their understanding of game rules, misperceptions, and so forth. Each of these different sub-scenarios, or subgames, is associated with a probability--representing the likelihood that the given subgame is truly "in play" at a given moment. In order to form an optimal attack or defense policy, these probabilities must be learned if they're not known a-priori. We present hidden Markov model and maximum entropy approaches for accurately learning these probabilities through multiple iterations of both normal and modified game play. We also give a widely-applicable approach for the analysis of cases where an opponent is aware that he is being studied, and intentionally plays to spoil the process of learning and thereby obfuscate his attributes. These are considered in the context of a generic, abstract cyber attack example. We demonstrate that machine learning efficacy can be heavily dependent on the goals and styles of participant behavior. To this end detailed simulation results under various combinations of attacker and defender behaviors are presented and analyzed.
Games in Language Learning: Opportunities and Challenges
ERIC Educational Resources Information Center
Godwin-Jones, Robert
2014-01-01
There has been a substantial increase in recent years in the interest in using digital games for language learning. This coincides with the explosive growth in multiplayer online gaming and with the proliferation of mobile games for smart phones. It also reflects the growing recognition among educators of the importance of extramural, informal…
2012-12-01
across the internet, and terrorists have evolved to become more adept at covert communication. Web chat through on multiplayer online video games ...Tom Wells. “TERRORISTS are using online war games like Call of Duty to plot attacks, The Sun can reveal.” http://www.thesun.co.uk/sol/homepage/news...4205896/Terrorists-play- online - games -like-Call-of- Duty-to-plan-attacks.html#ixzz2E2lOCwjd 10 Daily News and Analysis. “Headley used ’electronic dead
The PASCO Wireless Smart Cart: A Game Changer in the Undergraduate Physics Laboratory
ERIC Educational Resources Information Center
Shakur, Asif; Connor, Rainor
2018-01-01
With the introduction of the Wireless Smart Cart by PASCO scientific in April 2016, we expect a paradigm shift in undergraduate physics laboratory instruction. We have evaluated the feasibility of using the smart cart by carrying out experiments that are usually performed using traditional PASCO equipment. The simplicity, convenience, and…
Campos, Fabio A D; Stanganélli, Luiz C R; Campos, Leandra C B; Pasquarelli, Bruno N; Gómez, Miguel-Angel
2014-04-01
This study was done to investigate the advantage of playing at home in elite women's volleyball leagues and the influence of performance indicators in the game score according to set number. The sample consisted of 240 games of the Brazilian Volleyball League (n = 132 games) and the Italian Volleyball League (n = 108 games) from the 2011-2012 season. The relationship of performance indicators (including serve, attack, block, and opponents' errors) with the game outcome (win or lose) was assessed. The results showed that there was a home advantage effect in women's volleyball leagues, with a higher prevalence of victory for the home teams in Brazilian and Italian leagues (58 and 56%, respectively). When related to the performance indicators and among the aspects that were most highly correlated with victory, the attack was the technical indicator that explained most of the results of volleyball games.
Attack Coverage in High-Level Men’s Volleyball: Organization on the Edge of Chaos?
Laporta, Lorenzo; Nikolaidis, Pantelis; Thomas, Luke; Afonso, José
2015-01-01
Change is pervasive, but emerging patterns are occasionally detectable through analysis of systemic behaviors. Match analysis uses these patterns in order to reduce the degree of improvisation and to optimize the training process. However, it is possible that certain game phases elude systematic patterning. In this vein, our aim was to analyze the case of attack coverage in men’s volleyball, as we suspected it would elude systematic patterning and has received negligible attention in scientific research. We analyzed the occurrence of attack coverage in 4544 plays of the 2011 Volleyball World League. A Chi-square test with residual adjusted values was applied to explore significant associations between variables. A Monte Carlo correction was applied, as some cells had n<5. Effect sizes were determined using Cramer’s V. Overall, attack coverage occurred in 3.89% of ball possessions, and 23 distinct structures emerged. These structures lacked significant associations with the game complex, setting zone, and effect of attack coverage. Conversely, attack coverage structures showed significant associations with the attack zone and tempo, with very strong effect sizes (V=0.472 and V=0.521, respectively). As certain attack zones are deeply associated with attack tempo, it is apparent that quicker attack plays affect attack coverage structuring, promoting the formation of less complex structures. Ultimately, attack coverage structures seem to depend on momentary constraints, thereby rendering rigid systematization impracticable. Still, we contended that a principle-based approach might be suitable. This invites researchers to rethink how to interpret game regularities. PMID:26557208
RISK DISCLOSURE AGAINST ATTACK ON CRITICAL INFRASTRUCTURES
NASA Astrophysics Data System (ADS)
Yoshida, Mamoru; Kobayashi, Kiyoshi
This paper analyzes the government's defensive and disclosure strategies to reduce the damage caused by terrorists that attack critical infrastructures using subjective game theory. The government recognizes a terrorist as a hidden opponent and the government's decision making about the policies against terror attacks depends on the belief about the existence of terrorist. In addition, it is not necessarily true that the government and the terrorist play the common game and make their decisions. Considering these points, the paper formulates the model in which the government and the terrorist formulate the subjective games respectively, and they induce the strategies using the equilibriums of their subjective games. The paper concluded that the government's disclosure about the implementation of the countermeasure, rather than the disclosure of warning level related with the belief about the existence of terrorist, brings about the higher increment of the subjective payoffs of the government.
Cybersecurity for distributed energy resources and smart inverters
Qi, Junjian; Hahn, Adam; Lu, Xiaonan; ...
2016-12-01
The increased penetration of distributed energy resources (DER) will significantly increase the number of devices that are owned and controlled by consumers and third parties. These devices have a significant dependency on digital communication and control, which presents a growing risk from cyber attacks. This paper proposes a holistic attack-resilient framework to protect the the integrated DER and the critical power grid infrastructure from malicious cyber attacks, helping ensure the secure integration of DER without harming the grid reliability and stability. Specifically, we discuss the architecture of the cyber-physical power system with a high penetration of DER and analyze themore » unique cybersecurity challenges introduced by DER integration. Next, we summarize important attack scenarios against DER, propose a systematic DER resilience analysis methodology, and develop effective and quantifiable resilience metrics and design principles. Lastly, we introduce attack prevention, detection, and response measures specifically designed for DER integration across cyber, physical device, and utility layers of the future smart grid.« less
Cybersecurity for distributed energy resources and smart inverters
DOE Office of Scientific and Technical Information (OSTI.GOV)
Qi, Junjian; Hahn, Adam; Lu, Xiaonan
The increased penetration of distributed energy resources (DER) will significantly increase the number of devices that are owned and controlled by consumers and third parties. These devices have a significant dependency on digital communication and control, which presents a growing risk from cyber attacks. This paper proposes a holistic attack-resilient framework to protect the the integrated DER and the critical power grid infrastructure from malicious cyber attacks, helping ensure the secure integration of DER without harming the grid reliability and stability. Specifically, we discuss the architecture of the cyber-physical power system with a high penetration of DER and analyze themore » unique cybersecurity challenges introduced by DER integration. Next, we summarize important attack scenarios against DER, propose a systematic DER resilience analysis methodology, and develop effective and quantifiable resilience metrics and design principles. Lastly, we introduce attack prevention, detection, and response measures specifically designed for DER integration across cyber, physical device, and utility layers of the future smart grid.« less
How Computer Games Help Children Learn
ERIC Educational Resources Information Center
Shaffer, David Williamson
2008-01-01
This book looks at how particular video and computer games--such as "Digital Zoo", "The Pandora Project", "SodaConstructor", and more--can help teach children and students to think like doctors, lawyers, engineers, urban planners, journalists, and other professionals. In the process, new "smart games" will give them the knowledge and skills they…
Learning Deductive Reasoning through Games of Logic
ERIC Educational Resources Information Center
McFeetors, P. Janelle; Mason, Ralph T.
2009-01-01
Pairs of students are looking at rows of pennies--laughing, talking, kidding one another about who is winning and who is making smart moves. The game, a simple game for two players, is One or Two?. The game begins with a player removing any one penny. Players then take turns, removing either a single penny or a pair of pennies from adjacent…
Energy Consumption Information Services for Smart Home Inhabitants
NASA Astrophysics Data System (ADS)
Schwanzer, Michael; Fensel, Anna
We investigate services giving users an adequate insight on his or her energy consumption habits in order to optimize it in the long run. The explored energy awareness services are addressed to inhabitants of smart homes, equipped with smart meters, advanced communication facilities, sensors and actuators. To analyze the potential of such services, a game at a social network Facebook has been designed and implemented, and the information about players' responses and interactions within the game environment has been collected and analyzed. The players have had their virtual home energy usage visualized in different ways, and had to optimize the energy consumption basing on their own perceptions of the consumption information. Evaluations reveal, in particular, that users are specifically responsive to information shown as a real-time graph and as costs in Euro, and are able to produce and share with each other policies for managing their smart home environments.
Wu, Fan; Xu, Lili
2013-08-01
Nowadays, patients can gain many kinds of medical service on line via Telecare Medical Information Systems(TMIS) due to the fast development of computer technology. So security of communication through network between the users and the server is very significant. Authentication plays an important part to protect information from being attacked by malicious attackers. Recently, Jiang et al. proposed a privacy enhanced scheme for TMIS using smart cards and claimed their scheme was better than Chen et al.'s. However, we have showed that Jiang et al.'s scheme has the weakness of ID uselessness and is vulnerable to off-line password guessing attack and user impersonation attack if an attacker compromises the legal user's smart card. Also, it can't resist DoS attack in two cases: after a successful impersonation attack and wrong password input in Password change phase. Then we propose an improved mutual authentication scheme used for a telecare medical information system. Remote monitoring, checking patients' past medical history record and medical consultant can be applied in the system where information transmits via Internet. Finally, our analysis indicates that the suggested scheme overcomes the disadvantages of Jiang et al.'s scheme and is practical for TMIS.
Deterrence and Risk Preferences in Sequential Attacker-Defender Games with Continuous Efforts.
Payyappalli, Vineet M; Zhuang, Jun; Jose, Victor Richmond R
2017-11-01
Most attacker-defender games consider players as risk neutral, whereas in reality attackers and defenders may be risk seeking or risk averse. This article studies the impact of players' risk preferences on their equilibrium behavior and its effect on the notion of deterrence. In particular, we study the effects of risk preferences in a single-period, sequential game where a defender has a continuous range of investment levels that could be strategically chosen to potentially deter an attack. This article presents analytic results related to the effect of attacker and defender risk preferences on the optimal defense effort level and their impact on the deterrence level. Numerical illustrations and some discussion of the effect of risk preferences on deterrence and the utility of using such a model are provided, as well as sensitivity analysis of continuous attack investment levels and uncertainty in the defender's beliefs about the attacker's risk preference. A key contribution of this article is the identification of specific scenarios in which the defender using a model that takes into account risk preferences would be better off than a defender using a traditional risk-neutral model. This study provides insights that could be used by policy analysts and decisionmakers involved in investment decisions in security and safety. © 2017 Society for Risk Analysis.
Modeling Resources Allocation in Attacker-Defender Games with "Warm Up" CSF.
Guan, Peiqiu; Zhuang, Jun
2016-04-01
Like many other engineering investments, the attacker's and defender's investments may have limited impact without initial capital to "warm up" the systems. This article studies such "warm up" effects on both the attack and defense equilibrium strategies in a sequential-move game model by developing a class of novel and more realistic contest success functions. We first solve a single-target attacker-defender game analytically and provide numerical solutions to a multiple-target case. We compare the results of the models with and without consideration of the investment "warm up" effects, and find that the defender would suffer higher expected damage, and either underestimate the attacker effort or waste defense investment if the defender falsely believes that no investment "warm up" effects exist. We illustrate the model results with real data, and compare the results of the models with and without consideration of the correlation between the "warm up" threshold and the investment effectiveness. Interestingly, we find that the defender is suggested to give up defending all the targets when the attack or the defense "warm up" thresholds are sufficiently high. This article provides new insights and suggestions on policy implications for homeland security resource allocation. © 2015 Society for Risk Analysis.
NASA Astrophysics Data System (ADS)
Liu, Penghui; Liu, Jing
2017-08-01
Recently, coevolution between strategy and network structure has been established as a rule to resolve social dilemmas and reach optimal situations for cooperation. Many follow-up researches have focused on studying how coevolution helps networks reorganize to deter the defectors and many coevolution methods have been proposed. However, the robustness of the coevolution rules against attacks have not been studied much. Since attacks may directly influence the original evolutionary process of cooperation, the robustness should be an important index while evaluating the quality of a coevolution method. In this paper, we focus on investigating the robustness of an elementary coevolution method in resolving the prisoner's dilemma game upon the interdependent networks. Three different types of time-independent attacks, named as edge attacks, instigation attacks and node attacks have been employed to test its robustness. Through analyzing the simulation results obtained, we find this coevolution method is relatively robust against the edge attack and the node attack as it successfully maintains cooperation in the population over the entire attack range. However, when the instigation probability of the attacked individuals is large or the attack range of instigation attack is wide enough, coevolutionary rule finally fails in maintaining cooperation in the population.
A biotic video game smart phone kit for formal and informal biophysics education
NASA Astrophysics Data System (ADS)
Kim, Honesty; Lee, Seung Ah; Riedel-Kruse, Ingmar
2015-03-01
Novel ways for formal and informal biophysics education are important. We present a low-cost biotic game design kit that incorporates microbial organisms into an interactive gaming experience: A 3D-printable microscope containing four LEDs controlled by a joystick enable human players to provide directional light stimuli to the motile single-celled organism Euglena gracilis. These cellular behaviors are displayed on the integrated smart phone. Real time cell-tracking couples these cells into interactive biotic video game play, i.e., the human player steers Euglena to play soccer with virtual balls and goals. The player's learning curve in mastering this fun game is intrinsically coupled to develop a deeper knowledge about Euglena's cell morphology and the biophysics of its phototactic behavior. This kit is dual educational - via construction and via play - and it provides an engaging theme for a formal biophysics devices class as well as to be presented in informal outreach activities; its low cost and open soft- and hardware should enable wide adoption.
The PASCO Wireless Smart Cart: A Game Changer in the Undergraduate Physics Laboratory
NASA Astrophysics Data System (ADS)
Shakur, Asif; Connor, Rainor
2018-03-01
With the introduction of the Wireless Smart Cart by PASCO scientific in April 2016, we expect a paradigm shift in undergraduate physics laboratory instruction. We have evaluated the feasibility of using the smart cart by carrying out experiments that are usually performed using traditional PASCO equipment. The simplicity, convenience, and cost-saving achieved by replacing a plethora of traditional laboratory sensors, wires, and equipment clutter with the smart cart are reported here.
Nam, Junghyun; Choo, Kim-Kwang Raymond; Han, Sangchul; Kim, Moonseong; Paik, Juryon; Won, Dongho
2015-01-01
A smart-card-based user authentication scheme for wireless sensor networks (hereafter referred to as a SCA-WSN scheme) is designed to ensure that only users who possess both a smart card and the corresponding password are allowed to gain access to sensor data and their transmissions. Despite many research efforts in recent years, it remains a challenging task to design an efficient SCA-WSN scheme that achieves user anonymity. The majority of published SCA-WSN schemes use only lightweight cryptographic techniques (rather than public-key cryptographic techniques) for the sake of efficiency, and have been demonstrated to suffer from the inability to provide user anonymity. Some schemes employ elliptic curve cryptography for better security but require sensors with strict resource constraints to perform computationally expensive scalar-point multiplications; despite the increased computational requirements, these schemes do not provide user anonymity. In this paper, we present a new SCA-WSN scheme that not only achieves user anonymity but also is efficient in terms of the computation loads for sensors. Our scheme employs elliptic curve cryptography but restricts its use only to anonymous user-to-gateway authentication, thereby allowing sensors to perform only lightweight cryptographic operations. Our scheme also enjoys provable security in a formal model extended from the widely accepted Bellare-Pointcheval-Rogaway (2000) model to capture the user anonymity property and various SCA-WSN specific attacks (e.g., stolen smart card attacks, node capture attacks, privileged insider attacks, and stolen verifier attacks).
Nam, Junghyun; Choo, Kim-Kwang Raymond; Han, Sangchul; Kim, Moonseong; Paik, Juryon; Won, Dongho
2015-01-01
A smart-card-based user authentication scheme for wireless sensor networks (hereafter referred to as a SCA-WSN scheme) is designed to ensure that only users who possess both a smart card and the corresponding password are allowed to gain access to sensor data and their transmissions. Despite many research efforts in recent years, it remains a challenging task to design an efficient SCA-WSN scheme that achieves user anonymity. The majority of published SCA-WSN schemes use only lightweight cryptographic techniques (rather than public-key cryptographic techniques) for the sake of efficiency, and have been demonstrated to suffer from the inability to provide user anonymity. Some schemes employ elliptic curve cryptography for better security but require sensors with strict resource constraints to perform computationally expensive scalar-point multiplications; despite the increased computational requirements, these schemes do not provide user anonymity. In this paper, we present a new SCA-WSN scheme that not only achieves user anonymity but also is efficient in terms of the computation loads for sensors. Our scheme employs elliptic curve cryptography but restricts its use only to anonymous user-to-gateway authentication, thereby allowing sensors to perform only lightweight cryptographic operations. Our scheme also enjoys provable security in a formal model extended from the widely accepted Bellare-Pointcheval-Rogaway (2000) model to capture the user anonymity property and various SCA-WSN specific attacks (e.g., stolen smart card attacks, node capture attacks, privileged insider attacks, and stolen verifier attacks). PMID:25849359
Human Evolution, Movement, and Intelligence: Why Playing Games Counts as Smart
ERIC Educational Resources Information Center
Kretchmar, R. Scott
2018-01-01
The article investigates several ways in which creating, entering, and playing games requires uniquely human levels of intelligence. It examines an element of our evolutionary heritage and the possibility that games (particularly in the form of sport) were among the first elements of culture. It describes sport as a "way of knowing," a…
Introduction to Special Issue on Games + Learning + Society
ERIC Educational Resources Information Center
Squire, Kurt; Gaydos, Matthew; DeVane, Ben
2016-01-01
Digital games for learning have quickly transitioned from a theoretical possibility, to a hyped technology, to an idea that almost seems quaint compared to advances in Biochips, Smart Robots, and self-driving cars. As a field, it is now better understand what games are good for, what they are not, and in what kinds of situations they can be…
A Dynamic Game on Network Topology for Counterinsurgency Applications
2015-03-26
scenario. This study creates a dynamic game on network topology to provide insight into the effec- tiveness of offensive targeting strategies determined by...focused upon the diffusion of thoughts and innovations throughout complex social networks. Coleman et al. (1966) and Ryan & Gross (1950) investigated...free networks make them extremely resilient against errors but very vulnerable to attack. Most interest- ingly, a determined attacker can remove well
Kumar, Pardeep; Ylianttila, Mika; Gurtov, Andrei; Lee, Sang-Gon; Lee, Hoon-Jae
2014-01-01
Robust security is highly coveted in real wireless sensor network (WSN) applications since wireless sensors' sense critical data from the application environment. This article presents an efficient and adaptive mutual authentication framework that suits real heterogeneous WSN-based applications (such as smart homes, industrial environments, smart grids, and healthcare monitoring). The proposed framework offers: (i) key initialization; (ii) secure network (cluster) formation (i.e., mutual authentication and dynamic key establishment); (iii) key revocation; and (iv) new node addition into the network. The correctness of the proposed scheme is formally verified. An extensive analysis shows the proposed scheme coupled with message confidentiality, mutual authentication and dynamic session key establishment, node privacy, and message freshness. Moreover, the preliminary study also reveals the proposed framework is secure against popular types of attacks, such as impersonation attacks, man-in-the-middle attacks, replay attacks, and information-leakage attacks. As a result, we believe the proposed framework achieves efficiency at reasonable computation and communication costs and it can be a safeguard to real heterogeneous WSN applications. PMID:24521942
Kumar, Pardeep; Ylianttila, Mika; Gurtov, Andrei; Lee, Sang-Gon; Lee, Hoon-Jae
2014-02-11
Robust security is highly coveted in real wireless sensor network (WSN) applications since wireless sensors' sense critical data from the application environment. This article presents an efficient and adaptive mutual authentication framework that suits real heterogeneous WSN-based applications (such as smart homes, industrial environments, smart grids, and healthcare monitoring). The proposed framework offers: (i) key initialization; (ii) secure network (cluster) formation (i.e., mutual authentication and dynamic key establishment); (iii) key revocation; and (iv) new node addition into the network. The correctness of the proposed scheme is formally verified. An extensive analysis shows the proposed scheme coupled with message confidentiality, mutual authentication and dynamic session key establishment, node privacy, and message freshness. Moreover, the preliminary study also reveals the proposed framework is secure against popular types of attacks, such as impersonation attacks, man-in-the-middle attacks, replay attacks, and information-leakage attacks. As a result, we believe the proposed framework achieves efficiency at reasonable computation and communication costs and it can be a safeguard to real heterogeneous WSN applications.
Camouflage Traffic: Minimizing Message Delay for Smart Grid Applications under Jamming
2014-04-01
technologies. To facilitate efficient information exchange, wireless networks have been proposed to be widely used in the smart grid. However, the jamming...attack that constantly broadcasts radio interference is a primary security threat to prevent the deployment of wireless networks in the smart grid. Hence... wireless communications, while at the same time providing latency guarantee for control messages. An open question is how to minimize message delay for
Chu, Samuel Kai Wah; Kwan, Alvin C M; Reynolds, Rebecca; Mellecker, Robin R; Tam, Frankie; Lee, Grace; Hong, Athena; Leung, Ching Yin
2015-06-01
A game application, "Making Smart Choices", was developed to fill the gap of limited easy-to-access resources available on sex education in Hong Kong and to disseminate correct knowledge and positive attitudes toward sex to teenagers using popular platforms such as tablets, Facebook, and the Web. Three versions of the game (iPAD, Facebook, and Web-based) were developed using HTML5. A theoretical framework that involved game-based learning and participatory design approach was used to design, develop, modify, and optimize the game for use with secondary school students (n=1176) 12-16 years of age. Pre- and post-test scores of students' safer sex knowledge were compared to test the effectiveness of the game. Students' survey and interviews were analyzed to assess participant feelings and attitudes toward the game. The Wilcoxon Signed-Rank test indicated that students' sex knowledge (n=788) improved with a medium effect size (0.477) after playing the game. Increases in positive attitudes toward sex and relationship and in awareness of making smart sexual choices were reported from student surveys and interviews. Students described the game as "interesting," "interactive," "informative," and "real-to-life." We advocate that the participatory design approach, which supports collaborative efforts of different stakeholders, is an effective framework for developing game-based learning tools for sex education. Our work provides preliminary findings that suggest game-based learning, preferably delivered through popular interactive platforms, can be effective in promoting sex education to teenagers.
Home advantage in high-level volleyball varies according to set number.
Marcelino, Rui; Mesquita, Isabel; Palao Andrés, José Manuel; Sampaio, Jaime
2009-01-01
The aim of the present study was to identify the probability of winning each Volleyball set according to game location (home, away). Archival data was obtained from 275 sets in the 2005 Men's Senior World League and 65,949 actions were analysed. Set result (win, loss), game location (home, away), set number (first, second, third, fourth and fifth) and performance indicators (serve, reception, set, attack, dig and block) were the variables considered in this study. In a first moment, performance indicators were used in a logistic model of set result, by binary logistic regression analysis. After finding the adjusted logistic model, the log-odds of winning the set were analysed according to game location and set number. The results showed that winning a set is significantly related to performance indicators (Chisquare(18)=660.97, p<0.01). Analyses of log-odds of winning a set demonstrate that home teams always have more probability of winning the game than away teams, regardless of the set number. Home teams have more advantage at the beginning of the game (first set) and in the two last sets of the game (fourth and fifth sets), probably due to facilities familiarity and crowd effects. Different game actions explain these advantages and showed that to win the first set is more important to take risk, through a better performance in the attack and block, and to win the final set is important to manage the risk through a better performance on the reception. These results may suggest intra-game variation in home advantage and can be most useful to better prepare and direct the competition. Key pointsHome teams always have more probability of winning the game than away teams.Home teams have higher performance in reception, set and attack in the total of the sets.The advantage of home teams is more pronounced at the beginning of the game (first set) and in two last sets of the game (fourth and fifth sets) suggesting intra-game variation in home advantage.Analysis by sets showed that home teams have a better performance in the attack and block in the first set and in the reception in the third and fifth sets.
Co-Simulation Platform For Characterizing Cyber Attacks in Cyber Physical Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sadi, Mohammad A. H.; Ali, Mohammad Hassan; Dasgupta, Dipankar
Smart grid is a complex cyber physical system containing a numerous and variety of sources, devices, controllers and loads. Communication/Information infrastructure is the backbone of the smart grid system where different grid components are connected with each other through this structure. Therefore, the drawbacks of the information technology related issues are also becoming a part of the smart grid. Further, smart grid is also vulnerable to the grid related disturbances. For such a dynamic system, disturbance and intrusion detection is a paramount issue. This paper presents a Simulink and OPNET based co-simulated test bed to carry out a cyber-intrusion inmore » a cyber-network for modern power systems and smart grid. The effect of the cyber intrusion on the physical power system is also presented. The IEEE 30 bus power system model is used to demonstrate the effectiveness of the simulated testbed. The experiments were performed by disturbing the circuit breakers reclosing time through a cyber-attack in the cyber network. Different disturbance situations in the proposed test system are considered and the results indicate the effectiveness of the proposed co-simulated scheme.« less
Lu, Yanrong; Li, Lixiang; Yang, Xing; Yang, Yixian
2015-01-01
Biometrics authenticated schemes using smart cards have attracted much attention in multi-server environments. Several schemes of this type where proposed in the past. However, many of them were found to have some design flaws. This paper concentrates on the security weaknesses of the three-factor authentication scheme by Mishra et al. After careful analysis, we find their scheme does not really resist replay attack while failing to provide an efficient password change phase. We further propose an improvement of Mishra et al.'s scheme with the purpose of preventing the security threats of their scheme. We demonstrate the proposed scheme is given to strong authentication against several attacks including attacks shown in the original scheme. In addition, we compare the performance and functionality with other multi-server authenticated key schemes.
Lu, Yanrong; Li, Lixiang; Yang, Xing; Yang, Yixian
2015-01-01
Biometrics authenticated schemes using smart cards have attracted much attention in multi-server environments. Several schemes of this type where proposed in the past. However, many of them were found to have some design flaws. This paper concentrates on the security weaknesses of the three-factor authentication scheme by Mishra et al. After careful analysis, we find their scheme does not really resist replay attack while failing to provide an efficient password change phase. We further propose an improvement of Mishra et al.’s scheme with the purpose of preventing the security threats of their scheme. We demonstrate the proposed scheme is given to strong authentication against several attacks including attacks shown in the original scheme. In addition, we compare the performance and functionality with other multi-server authenticated key schemes. PMID:25978373
On the security of two remote user authentication schemes for telecare medical information systems.
Kim, Kee-Won; Lee, Jae-Dong
2014-05-01
The telecare medical information systems (TMISs) support convenient and rapid health-care services. A secure and efficient authentication scheme for TMIS provides safeguarding patients' electronic patient records (EPRs) and helps health care workers and medical personnel to rapidly making correct clinical decisions. Recently, Kumari et al. proposed a password based user authentication scheme using smart cards for TMIS, and claimed that the proposed scheme could resist various malicious attacks. However, we point out that their scheme is still vulnerable to lost smart card and cannot provide forward secrecy. Subsequently, Das and Goswami proposed a secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. They simulated their scheme for the formal security verification using the widely-accepted automated validation of Internet security protocols and applications (AVISPA) tool to ensure that their scheme is secure against passive and active attacks. However, we show that their scheme is still vulnerable to smart card loss attacks and cannot provide forward secrecy property. The proposed cryptanalysis discourages any use of the two schemes under investigation in practice and reveals some subtleties and challenges in designing this type of schemes.
Moon, Jongho; Choi, Younsung; Kim, Jiye; Won, Dongho
2016-03-01
Recently, numerous extended chaotic map-based password authentication schemes that employ smart card technology were proposed for Telecare Medical Information Systems (TMISs). In 2015, Lu et al. used Li et al.'s scheme as a basis to propose a password authentication scheme for TMISs that is based on biometrics and smart card technology and employs extended chaotic maps. Lu et al. demonstrated that Li et al.'s scheme comprises some weaknesses such as those regarding a violation of the session-key security, a vulnerability to the user impersonation attack, and a lack of local verification. In this paper, however, we show that Lu et al.'s scheme is still insecure with respect to issues such as a violation of the session-key security, and that it is vulnerable to both the outsider attack and the impersonation attack. To overcome these drawbacks, we retain the useful properties of Lu et al.'s scheme to propose a new password authentication scheme that is based on smart card technology and requires the use of chaotic maps. Then, we show that our proposed scheme is more secure and efficient and supports security properties.
Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Xie, Dong; Yang, Yixian
2015-06-01
The Telecare Medicine Information Systems (TMISs) provide an efficient communicating platform supporting the patients access health-care delivery services via internet or mobile networks. Authentication becomes an essential need when a remote patient logins into the telecare server. Recently, many extended chaotic maps based authentication schemes using smart cards for TMISs have been proposed. Li et al. proposed a secure smart cards based authentication scheme for TMISs using extended chaotic maps based on Lee's and Jiang et al.'s scheme. In this study, we show that Li et al.'s scheme has still some weaknesses such as violation the session key security, vulnerability to user impersonation attack and lack of local verification. To conquer these flaws, we propose a chaotic maps and smart cards based password authentication scheme by applying biometrics technique and hash function operations. Through the informal and formal security analyses, we demonstrate that our scheme is resilient possible known attacks including the attacks found in Li et al.'s scheme. As compared with the previous authentication schemes, the proposed scheme is more secure and efficient and hence more practical for telemedical environments.
Agent-Centric Approach for Cybersecurity Decision-Support with Partial Observability
DOE Office of Scientific and Technical Information (OSTI.GOV)
Tipireddy, Ramakrishna; Chatterjee, Samrat; Paulson, Patrick R.
Generating automated cyber resilience policies for real-world settings is a challenging research problem that must account for uncertainties in system state over time and dynamics between attackers and defenders. In addition to understanding attacker and defender motives and tools, and identifying “relevant” system and attack data, it is also critical to develop rigorous mathematical formulations representing the defender’s decision-support problem under uncertainty. Game-theoretic approaches involving cyber resource allocation optimization with Markov decision processes (MDP) have been previously proposed in the literature. Moreover, advancements in reinforcement learning approaches have motivated the development of partially observable stochastic games (POSGs) in various multi-agentmore » problem domains with partial information. Recent advances in cyber-system state space modeling have also generated interest in potential applicability of POSGs for cybersecurity. However, as is the case in strategic card games such as poker, research challenges using game-theoretic approaches for practical cyber defense applications include: 1) solving for equilibrium and designing efficient algorithms for large-scale, general problems; 2) establishing mathematical guarantees that equilibrium exists; 3) handling possible existence of multiple equilibria; and 4) exploitation of opponent weaknesses. Inspired by advances in solving strategic card games while acknowledging practical challenges associated with the use of game-theoretic approaches in cyber settings, this paper proposes an agent-centric approach for cybersecurity decision-support with partial system state observability.« less
Information Security Analysis Using Game Theory and Simulation
DOE Office of Scientific and Technical Information (OSTI.GOV)
Schlicher, Bob G; Abercrombie, Robert K
Information security analysis can be performed using game theory implemented in dynamic simulations of Agent Based Models (ABMs). Such simulations can be verified with the results from game theory analysis and further used to explore larger scale, real world scenarios involving multiple attackers, defenders, and information assets. Our approach addresses imperfect information and scalability that allows us to also address previous limitations of current stochastic game models. Such models only consider perfect information assuming that the defender is always able to detect attacks; assuming that the state transition probabilities are fixed before the game assuming that the players actions aremore » always synchronous; and that most models are not scalable with the size and complexity of systems under consideration. Our use of ABMs yields results of selected experiments that demonstrate our proposed approach and provides a quantitative measure for realistic information systems and their related security scenarios.« less
ID201202961, DOE S-124,539, Information Security Analysis Using Game Theory and Simulation
DOE Office of Scientific and Technical Information (OSTI.GOV)
Abercrombie, Robert K; Schlicher, Bob G
Information security analysis can be performed using game theory implemented in dynamic simulations of Agent Based Models (ABMs). Such simulations can be verified with the results from game theory analysis and further used to explore larger scale, real world scenarios involving multiple attackers, defenders, and information assets. Our approach addresses imperfect information and scalability that allows us to also address previous limitations of current stochastic game models. Such models only consider perfect information assuming that the defender is always able to detect attacks; assuming that the state transition probabilities are fixed before the game assuming that the players actions aremore » always synchronous; and that most models are not scalable with the size and complexity of systems under consideration. Our use of ABMs yields results of selected experiments that demonstrate our proposed approach and provides a quantitative measure for realistic information systems and their related security scenarios.« less
A two-dimensional air-to-air combat game - Toward an air-combat advisory system
NASA Technical Reports Server (NTRS)
Neuman, Frank
1987-01-01
Air-to-air combat is modeled as a discrete differential game, and by constraining the game to searching for the best guidance laws from the sets of those considered for each opponent, feedback and outcome charts are obtained which can be used to turn one of the automatic opponents into an intelligent opponent against a human pilot. A one-on-one two-dimensional fully automatic, or manned versus automatic, air-to-air combat game has been designed which includes both attack and evasion alternatives for both aircraft. Guidance law selection occurs by flooding the initial-condition space with four simulated fights for each initial condition, depicting the various attack/evasion strategies for the two opponents, and recording the outcomes. For each initial condition, the minimax method from differential games is employed to determine the best choice from the available strategies.
Robust allocation of a defensive budget considering an attacker's private information.
Nikoofal, Mohammad E; Zhuang, Jun
2012-05-01
Attackers' private information is one of the main issues in defensive resource allocation games in homeland security. The outcome of a defense resource allocation decision critically depends on the accuracy of estimations about the attacker's attributes. However, terrorists' goals may be unknown to the defender, necessitating robust decisions by the defender. This article develops a robust-optimization game-theoretical model for identifying optimal defense resource allocation strategies for a rational defender facing a strategic attacker while the attacker's valuation of targets, being the most critical attribute of the attacker, is unknown but belongs to bounded distribution-free intervals. To our best knowledge, no previous research has applied robust optimization in homeland security resource allocation when uncertainty is defined in bounded distribution-free intervals. The key features of our model include (1) modeling uncertainty in attackers' attributes, where uncertainty is characterized by bounded intervals; (2) finding the robust-optimization equilibrium for the defender using concepts dealing with budget of uncertainty and price of robustness; and (3) applying the proposed model to real data. © 2011 Society for Risk Analysis.
Wen, Fengtong
2013-12-01
User authentication plays an important role to protect resources or services from being accessed by unauthorized users. In a recent paper, Das et al. proposed a secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. This scheme uses three factors, e.g. biometrics, password, and smart card, to protect the security. It protects user privacy and is believed to have many abilities to resist a range of network attacks, even if the secret information stored in the smart card is compromised. In this paper, we analyze the security of Das et al.'s scheme, and show that the scheme is in fact insecure against the replay attack, user impersonation attacks and off-line guessing attacks. Then, we also propose a robust uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. Compared with the existing schemes, our protocol uses a different user authentication mechanism to resist replay attack. We show that our proposed scheme can provide stronger security than previous protocols. Furthermore, we demonstrate the validity of the proposed scheme through the BAN (Burrows, Abadi, and Needham) logic.
NASA Astrophysics Data System (ADS)
Tuna, G.; Örenbaş, H.; Daş, R.; Kogias, D.; Baykara, M.; K, K.
2016-03-01
Wireless Sensor Networks (WSNs) when combined with various energy harvesting solutions managing to prolong the overall lifetime of the system and enhanced capabilities of the communication protocols used by modern sensor nodes are efficiently used in are efficiently used in Smart Grid (SG), an evolutionary system for the modernization of existing power grids. However, wireless communication technology brings various types of security threats. In this study, firstly the use of WSNs for SG applications is presented. Second, the security related issues and challenges as well as the security threats are presented. In addition, proposed security mechanisms for WSN-based SG applications are discussed. Finally, an easy- to-implement and simple attack detection framework to prevent attacks directed to sink and gateway nodes with web interfaces is proposed and its efficiency is proved using a case study.
Protecting complex infrastructures against multiple strategic attackers
NASA Astrophysics Data System (ADS)
Hausken, Kjell
2011-01-01
Infrastructures are analysed subject to defence by a strategic defender and attack by multiple strategic attackers. A framework is developed where each agent determines how much to invest in defending versus attacking each of multiple targets. A target can have economic, human and symbolic values, which generally vary across agents. Investment expenditure functions for each agent can be linear in the investment effort, concave, convex, logistic, can increase incrementally, or can be subject to budget constraints. Contest success functions (e.g., ratio and difference forms) determine the probability of a successful attack on each target, dependent on the relative investments of the defender and attackers on each target, and on characteristics of the contest. Targets can be in parallel, in series, interlinked, interdependent or independent. The defender minimises the expected damage plus the defence expenditures. Each attacker maximises the expected damage minus the attack expenditures. The number of free choice variables equals the number of agents times the number of targets, or lower if there are budget constraints. Each agent is interested in how his investments vary across the targets, and the impact on his utilities. Alternative optimisation programmes are discussed, together with repeated games, dynamic games and incomplete information. An example is provided for illustration.
DOE Office of Scientific and Technical Information (OSTI.GOV)
He, Fulin; Cao, Yang; Zhang, Jun Jason
Ensuring flexible and reliable data routing is indispensable for the integration of Advanced Metering Infrastructure (AMI) networks, we propose a secure-oriented and load-balancing wireless data routing scheme. A novel utility function is designed based on security routing scheme. Then, we model the interactive security-oriented routing strategy among meter data concentrators or smart grid meters as a mixed-strategy network formation game. Finally, such problem results in a stable probabilistic routing scheme with proposed distributed learning algorithm. One contributions is that we studied that different types of applications affect the routing selection strategy and the strategy tendency. Another contributions is that themore » chosen strategy of our mixed routing can adaptively to converge to a new mixed strategy Nash equilibrium (MSNE) during the learning process in the smart grid.« less
Influence of Different Coupling Modes on the Robustness of Smart Grid under Targeted Attack.
Kang, WenJie; Hu, Gang; Zhu, PeiDong; Liu, Qiang; Hang, Zhi; Liu, Xin
2018-05-24
Many previous works only focused on the cascading failure of global coupling of one-to-one structures in interdependent networks, but the local coupling of dual coupling structures has rarely been studied due to its complex structure. This will result in a serious consequence that many conclusions of the one-to-one structure may be incorrect in the dual coupling network and do not apply to the smart grid. Therefore, it is very necessary to subdivide the dual coupling link into a top-down coupling link and a bottom-up coupling link in order to study their influence on network robustness by combining with different coupling modes. Additionally, the power flow of the power grid can cause the load of a failed node to be allocated to its neighboring nodes and trigger a new round of load distribution when the load of these nodes exceeds their capacity. This means that the robustness of smart grids may be affected by four factors, i.e., load redistribution, local coupling, dual coupling link and coupling mode; however, the research on the influence of those factors on the network robustness is missing. In this paper, firstly, we construct the smart grid as a two-layer network with a dual coupling link and divide the power grid and communication network into many subnets based on the geographical location of their nodes. Secondly, we define node importance ( N I ) as an evaluation index to access the impact of nodes on the cyber or physical network and propose three types of coupling modes based on N I of nodes in the cyber and physical subnets, i.e., Assortative Coupling in Subnets (ACIS), Disassortative Coupling in Subnets (DCIS), and Random Coupling in Subnets (RCIS). Thirdly, a cascading failure model is proposed for studying the effect of local coupling of dual coupling link in combination with ACIS, DCIS, and RCIS on the robustness of the smart grid against a targeted attack, and the survival rate of functional nodes is used to assess the robustness of the smart grid. Finally, we use the IEEE 118-Bus System and the Italian High-Voltage Electrical Transmission Network to verify our model and obtain the same conclusions: (I) DCIS applied to the top-down coupling link is better able to enhance the robustness of the smart grid against a targeted attack than RCIS or ACIS, (II) ACIS applied to a bottom-up coupling link is better able to enhance the robustness of the smart grid against a targeted attack than RCIS or DCIS, and (III) the robustness of the smart grid can be improved by increasing the tolerance α . This paper provides some guidelines for slowing down the speed of the cascading failures in the design of architecture and optimization of interdependent networks, such as a top-down link with DCIS, a bottom-up link with ACIS, and an increased tolerance α .
SURVIVABILITY THROUGH OPTIMIZING RESILIENT MECHANISMS (STORM)
2017-04-01
STATEMENT Approved for Public Release; Distribution Unlimited. PA# 88ABW-2017-0894 Date Cleared: 07 Mar 2017 13. SUPPLEMENTARY NOTES 14. ABSTRACT Game ...quantitatively about cyber-attacks. Game theory is the branch of applied mathematics that formalizes strategic interaction among intelligent rational agents...mechanism based on game theory. This work has applied game theory to numerous cyber security problems: cloud security, cyber threat information sharing
1977-06-01
defense missions in locations between the FEBA and the attackers’ targets; b) AAA can attack only aircraft attacking the guns them- selves or the targets...the guns are defending; c) SAM weapon systems can attack not only aircraft attack- ing them and the targets they defend but also, although possibly...Corporation), P.E. Louer (Department of the Army) and B.R. McEnany (Joint Chiefs of Staff/Studies, Analysis and Gaming Agency) for their help- ful
Prevention of Information Leakage by Photo-Coupling in Smart Card
NASA Astrophysics Data System (ADS)
Shen, Sung-Shiou; Chiu, Jung-Hui
Advances in smart card technology encourages smart card use in more sensitive applications, such as storing important information and securing application. Smart cards are however vulnerable to side channel attacks. Power consumption and electromagnetic radiation of the smart card can leak information about the secret data protected by the smart card. Our paper describes two possible hardware countermeasures that protect against side channel information leakage. We show that power analysis can be prevented by adopting photo-coupling techniques. This method involves the use of LED with photovoltaic cells and photo-couplers on the power, reset, I/O and clock lines of the smart card. This method reduces the risk of internal data bus leakage on the external data lines. Moreover, we also discuss the effectiveness of reducing electromagnetic radiation by using embedded metal plates.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Abercrombie, R. K.; Peters, Scott
The Department of Energy Office of Electricity Delivery and Energy Reliability (DOE-OE) Cyber Security for Energy Delivery Systems (CSEDS) industry led program (DE-FOA-0000359) entitled "Innovation for Increasing Cyber Security for Energy Delivery Systems (12CSEDS)," awarded a contract to Sypris Electronics LLC to develop a Cryptographic Key Management System for the smart grid (Scalable Key Management Solutions for Critical Infrastructure Protection). Oak Ridge National Laboratory (ORNL) and Sypris Electronics, LLC as a result of that award entered into a CRADA (NFE-11-03562) between ORNL and Sypris Electronics, LLC. ORNL provided its Cyber Security Econometrics System (CSES) as a tool to be modifiedmore » and used as a metric to address risks and vulnerabilities in the management of cryptographic keys within the Advanced Metering Infrastructure (AMI) domain of the electric sector. ORNL concentrated our analysis on the AMI domain of which the National Electric Sector Cyber security Organization Resource (NESCOR) Working Group 1 (WG1) has documented 29 failure scenarios. The computational infrastructure of this metric involves system stakeholders, security requirements, system components and security threats. To compute this metric, we estimated the stakes that each stakeholder associates with each security requirement, as well as stochastic matrices that represent the probability of a threat to cause a component failure and the probability of a component failure to cause a security requirement violation. We applied this model to estimate the security of the AMI, by leveraging the recently established National Institute of Standards and Technology Interagency Report (NISTIR) 7628 guidelines for smart grid security and the International Electrotechnical Commission (IEC) 63351, Part 9 to identify the life cycle for cryptographic key management, resulting in a vector that assigned to each stakeholder an estimate of their average loss in terms of dollars per day of system operation. To further address probabilities of threats, information security analysis can be performed using game theory implemented in dynamic Agent Based Game Theoretic (ABGT) simulations. Such simulations can be verified with the results from game theory analysis and further used to explore larger scale, real world scenarios involving multiple attackers, defenders, and information assets. The strategy for the game was developed by analyzing five electric sector representative failure scenarios contained in the AMI functional domain from NESCOR WG1. From these five selected scenarios, we characterized them into three specific threat categories affecting confidentiality, integrity and availability (CIA). The analysis using our ABGT simulation demonstrated how to model the AMI functional domain using a set of rationalized game theoretic rules decomposed from the failure scenarios in terms of how those scenarios might impact the AMI network with respect to CIA.« less
Cryptographic Key Management and Critical Risk Assessment
DOE Office of Scientific and Technical Information (OSTI.GOV)
Abercrombie, Robert K
The Department of Energy Office of Electricity Delivery and Energy Reliability (DOE-OE) CyberSecurity for Energy Delivery Systems (CSEDS) industry led program (DE-FOA-0000359) entitled "Innovation for Increasing CyberSecurity for Energy Delivery Systems (12CSEDS)," awarded a contract to Sypris Electronics LLC to develop a Cryptographic Key Management System for the smart grid (Scalable Key Management Solutions for Critical Infrastructure Protection). Oak Ridge National Laboratory (ORNL) and Sypris Electronics, LLC as a result of that award entered into a CRADA (NFE-11-03562) between ORNL and Sypris Electronics, LLC. ORNL provided its Cyber Security Econometrics System (CSES) as a tool to be modified and usedmore » as a metric to address risks and vulnerabilities in the management of cryptographic keys within the Advanced Metering Infrastructure (AMI) domain of the electric sector. ORNL concentrated our analysis on the AMI domain of which the National Electric Sector Cyber security Organization Resource (NESCOR) Working Group 1 (WG1) has documented 29 failure scenarios. The computational infrastructure of this metric involves system stakeholders, security requirements, system components and security threats. To compute this metric, we estimated the stakes that each stakeholder associates with each security requirement, as well as stochastic matrices that represent the probability of a threat to cause a component failure and the probability of a component failure to cause a security requirement violation. We applied this model to estimate the security of the AMI, by leveraging the recently established National Institute of Standards and Technology Interagency Report (NISTIR) 7628 guidelines for smart grid security and the International Electrotechnical Commission (IEC) 63351, Part 9 to identify the life cycle for cryptographic key management, resulting in a vector that assigned to each stakeholder an estimate of their average loss in terms of dollars per day of system operation. To further address probabilities of threats, information security analysis can be performed using game theory implemented in dynamic Agent Based Game Theoretic (ABGT) simulations. Such simulations can be verified with the results from game theory analysis and further used to explore larger scale, real world scenarios involving multiple attackers, defenders, and information assets. The strategy for the game was developed by analyzing five electric sector representative failure scenarios contained in the AMI functional domain from NESCOR WG1. From these five selected scenarios, we characterized them into three specific threat categories affecting confidentiality, integrity and availability (CIA). The analysis using our ABGT simulation demonstrated how to model the AMI functional domain using a set of rationalized game theoretic rules decomposed from the failure scenarios in terms of how those scenarios might impact the AMI network with respect to CIA.« less
Game Theory and Uncertainty Quantification for Cyber Defense Applications
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chatterjee, Samrat; Halappanavar, Mahantesh; Tipireddy, Ramakrishna
Cyber-system defenders face the challenging task of protecting critical assets and information continually against multiple types of malicious attackers. Defenders typically operate within resource constraints while attackers operate at relatively low costs. As a result, design and development of resilient cyber-systems that can support mission goals under attack while accounting for the dynamics between attackers and defenders is an important research problem.
Wireless Networks under a Backoff Attack: A Game Theoretical Perspective.
Parras, Juan; Zazo, Santiago
2018-01-30
We study a wireless sensor network using CSMA/CA in the MAC layer under a backoff attack: some of the sensors of the network are malicious and deviate from the defined contention mechanism. We use Bianchi's network model to study the impact of the malicious sensors on the total network throughput, showing that it causes the throughput to be unfairly distributed among sensors. We model this conflict using game theory tools, where each sensor is a player. We obtain analytical solutions and propose an algorithm, based on Regret Matching, to learn the equilibrium of the game with an arbitrary number of players. Our approach is validated via simulations, showing that our theoretical predictions adjust to reality.
HackAttack: Game-Theoretic Analysis of Realistic Cyber Conflicts
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ferragut, Erik M; Brady, Andrew C; Brady, Ethan J
Game theory is appropriate for studying cyber conflict because it allows for an intelligent and goal-driven adversary. Applications of game theory have led to a number of results regarding optimal attack and defense strategies. However, the overwhelming majority of applications explore overly simplistic games, often ones in which each participant s actions are visible to every other participant. These simplifications strip away the fundamental properties of real cyber conflicts: probabilistic alerting, hidden actions, unknown opponent capabilities. In this paper, we demonstrate that it is possible to analyze a more realistic game, one in which different resources have different weaknesses, playersmore » have different exploits, and moves occur in secrecy, but they can be detected. Certainly, more advanced and complex games are possible, but the game presented here is more realistic than any other game we know of in the scientific literature. While optimal strategies can be found for simpler games using calculus, case-by-case analysis, or, for stochastic games, Q-learning, our more complex game is more naturally analyzed using the same methods used to study other complex games, such as checkers and chess. We define a simple evaluation function and employ multi-step searches to create strategies. We show that such scenarios can be analyzed, and find that in cases of extreme uncertainty, it is often better to ignore one s opponent s possible moves. Furthermore, we show that a simple evaluation function in a complex game can lead to interesting and nuanced strategies.« less
Cyber War Game in Temporal Networks
Cho, Jin-Hee; Gao, Jianxi
2016-01-01
In a cyber war game where a network is fully distributed and characterized by resource constraints and high dynamics, attackers or defenders often face a situation that may require optimal strategies to win the game with minimum effort. Given the system goal states of attackers and defenders, we study what strategies attackers or defenders can take to reach their respective system goal state (i.e., winning system state) with minimum resource consumption. However, due to the dynamics of a network caused by a node’s mobility, failure or its resource depletion over time or action(s), this optimization problem becomes NP-complete. We propose two heuristic strategies in a greedy manner based on a node’s two characteristics: resource level and influence based on k-hop reachability. We analyze complexity and optimality of each algorithm compared to optimal solutions for a small-scale static network. Further, we conduct a comprehensive experimental study for a large-scale temporal network to investigate best strategies, given a different environmental setting of network temporality and density. We demonstrate the performance of each strategy under various scenarios of attacker/defender strategies in terms of win probability, resource consumption, and system vulnerability. PMID:26859840
NASA Astrophysics Data System (ADS)
Liu, Xuan
Power grid is one of the most critical infrastructures in a nation and could suffer a variety of cyber attacks. With the development of Smart Grid, false data injection attack has recently attracted wide research interest. This thesis proposes a false data attack model with incomplete network information and develops optimal attack strategies for attacking load measurements and the real-time topology of a power grid. The impacts of false data on the economic and reliable operations of power systems are quantitatively analyzed in this thesis. To mitigate the risk of cyber attacks, a distributed protection strategies are also developed. It has been shown that an attacker can design false data to avoid being detected by the control center if the network information of a power grid is known to the attacker. In practice, however, it is very hard or even impossible for an attacker to obtain all network information of a power grid. In this thesis, we propose a local load redistribution attacking model based on incomplete network information and show that an attacker only needs to obtain the network information of the local attacking region to inject false data into smart meters in the local region without being detected by the state estimator. A heuristic algorithm is developed to determine a feasible attacking region by obtaining reduced network information. This thesis investigates the impacts of false data on the operations of power systems. It has been shown that false data can be designed by an attacker to: 1) mask the real-time topology of a power grid; 2) overload a transmission line; 3) disturb the line outage detection based on PMU data. To mitigate the risk of cyber attacks, this thesis proposes a new protection strategy, which intends to mitigate the damage effects of false data injection attacks by protecting a small set of critical measurements. To further reduce the computation complexity, a mixed integer linear programming approach is also proposed to separate the power grid into several subnetworks, then distributed protection strategy is applied to each subnetwork.
A Robust and Effective Smart-Card-Based Remote User Authentication Mechanism Using Hash Function
Odelu, Vanga; Goswami, Adrijit
2014-01-01
In a remote user authentication scheme, a remote server verifies whether a login user is genuine and trustworthy, and also for mutual authentication purpose a login user validates whether the remote server is genuine and trustworthy. Several remote user authentication schemes using the password, the biometrics, and the smart card have been proposed in the literature. However, most schemes proposed in the literature are either computationally expensive or insecure against several known attacks. In this paper, we aim to propose a new robust and effective password-based remote user authentication scheme using smart card. Our scheme is efficient, because our scheme uses only efficient one-way hash function and bitwise XOR operations. Through the rigorous informal and formal security analysis, we show that our scheme is secure against possible known attacks. We perform the simulation for the formal security analysis using the widely accepted AVISPA (Automated Validation Internet Security Protocols and Applications) tool to ensure that our scheme is secure against passive and active attacks. Furthermore, our scheme supports efficiently the password change phase always locally without contacting the remote server and correctly. In addition, our scheme performs significantly better than other existing schemes in terms of communication, computational overheads, security, and features provided by our scheme. PMID:24892078
A robust and effective smart-card-based remote user authentication mechanism using hash function.
Das, Ashok Kumar; Odelu, Vanga; Goswami, Adrijit
2014-01-01
In a remote user authentication scheme, a remote server verifies whether a login user is genuine and trustworthy, and also for mutual authentication purpose a login user validates whether the remote server is genuine and trustworthy. Several remote user authentication schemes using the password, the biometrics, and the smart card have been proposed in the literature. However, most schemes proposed in the literature are either computationally expensive or insecure against several known attacks. In this paper, we aim to propose a new robust and effective password-based remote user authentication scheme using smart card. Our scheme is efficient, because our scheme uses only efficient one-way hash function and bitwise XOR operations. Through the rigorous informal and formal security analysis, we show that our scheme is secure against possible known attacks. We perform the simulation for the formal security analysis using the widely accepted AVISPA (Automated Validation Internet Security Protocols and Applications) tool to ensure that our scheme is secure against passive and active attacks. Furthermore, our scheme supports efficiently the password change phase always locally without contacting the remote server and correctly. In addition, our scheme performs significantly better than other existing schemes in terms of communication, computational overheads, security, and features provided by our scheme.
A Markov game theoretic data fusion approach for cyber situational awareness
NASA Astrophysics Data System (ADS)
Shen, Dan; Chen, Genshe; Cruz, Jose B., Jr.; Haynes, Leonard; Kruger, Martin; Blasch, Erik
2007-04-01
This paper proposes an innovative data-fusion/ data-mining game theoretic situation awareness and impact assessment approach for cyber network defense. Alerts generated by Intrusion Detection Sensors (IDSs) or Intrusion Prevention Sensors (IPSs) are fed into the data refinement (Level 0) and object assessment (L1) data fusion components. High-level situation/threat assessment (L2/L3) data fusion based on Markov game model and Hierarchical Entity Aggregation (HEA) are proposed to refine the primitive prediction generated by adaptive feature/pattern recognition and capture new unknown features. A Markov (Stochastic) game method is used to estimate the belief of each possible cyber attack pattern. Game theory captures the nature of cyber conflicts: determination of the attacking-force strategies is tightly coupled to determination of the defense-force strategies and vice versa. Also, Markov game theory deals with uncertainty and incompleteness of available information. A software tool is developed to demonstrate the performance of the high level information fusion for cyber network defense situation and a simulation example shows the enhanced understating of cyber-network defense.
Let’s get technical! Gaming and technology for weight control and health promotion in children
USDA-ARS?s Scientific Manuscript database
Most children, including lower socioeconomic status and ethnic minority children, play video games, use computers, and have cell phones, and growing numbers have smart phones and electronic tablets. They are comfortable with, even prefer, electronic media. Many expect to be entertained and have a lo...
A Critical Review of 13 Years of Mobile Game-Based Learning
ERIC Educational Resources Information Center
Giannakas, Filippos; Kambourakis, Georgios; Papasalouros, Andreas; Gritzalis, Stefanos
2018-01-01
With the increasing popularity of smartphones and tablets, game-based learning (GBL) is undergoing a rapid shift to mobile platforms. This transformation is driven by mobility, wireless interfaces, and built-in sensors that these smart devices offer in order to enable blended and context-sensitive mobile learning (m-Learning) activities. Thus,…
Reversible hemispheric hypoperfusion in two cases of SMART syndrome.
Wai, Karmen; Balabanski, Anna; Chia, Nicholas; Kleinig, Timothy
2017-09-01
Stroke-like migraine attacks after radiation therapy (SMART) syndrome manifests as prolonged episodes of cortical dysfunction, years after cranial irradiation. We present two cases demonstrating reversible hemispheric hypoperfusion. Case 1 presented with left hemispheric symptoms following previous similar episodes. CT perfusion (CTP) demonstrated reversible hemispheric hypoperfusion; subsequent investigations were consistent with SMART syndrome. Case 2 presented following the third episode of a hemispheric syndrome with near-identical CTP abnormalities. L-arginine was administered with rapid reversal of clinical and CTP abnormalities. We conclude that SMART syndrome may demonstrate significant hypoperfusion on hyperacute CTP without subsequent infarction. Impaired cerebrovascular autoregulation probably contributes to cortical dysfunction in SMART syndrome. L-arginine warrants investigation as a potential treatment. Copyright © 2017 Elsevier Ltd. All rights reserved.
Moon, Jongho; Lee, Donghoon; Lee, Youngsook; Won, Dongho
2017-04-25
User authentication in wireless sensor networks is more difficult than in traditional networks owing to sensor network characteristics such as unreliable communication, limited resources, and unattended operation. For these reasons, various authentication schemes have been proposed to provide secure and efficient communication. In 2016, Park et al. proposed a secure biometric-based authentication scheme with smart card revocation/reissue for wireless sensor networks. However, we found that their scheme was still insecure against impersonation attack, and had a problem in the smart card revocation/reissue phase. In this paper, we show how an adversary can impersonate a legitimate user or sensor node, illegal smart card revocation/reissue and prove that Park et al.'s scheme fails to provide revocation/reissue. In addition, we propose an enhanced scheme that provides efficiency, as well as anonymity and security. Finally, we provide security and performance analysis between previous schemes and the proposed scheme, and provide formal analysis based on the random oracle model. The results prove that the proposed scheme can solve the weaknesses of impersonation attack and other security flaws in the security analysis section. Furthermore, performance analysis shows that the computational cost is lower than the previous scheme.
Moon, Jongho; Lee, Donghoon; Lee, Youngsook; Won, Dongho
2017-01-01
User authentication in wireless sensor networks is more difficult than in traditional networks owing to sensor network characteristics such as unreliable communication, limited resources, and unattended operation. For these reasons, various authentication schemes have been proposed to provide secure and efficient communication. In 2016, Park et al. proposed a secure biometric-based authentication scheme with smart card revocation/reissue for wireless sensor networks. However, we found that their scheme was still insecure against impersonation attack, and had a problem in the smart card revocation/reissue phase. In this paper, we show how an adversary can impersonate a legitimate user or sensor node, illegal smart card revocation/reissue and prove that Park et al.’s scheme fails to provide revocation/reissue. In addition, we propose an enhanced scheme that provides efficiency, as well as anonymity and security. Finally, we provide security and performance analysis between previous schemes and the proposed scheme, and provide formal analysis based on the random oracle model. The results prove that the proposed scheme can solve the weaknesses of impersonation attack and other security flaws in the security analysis section. Furthermore, performance analysis shows that the computational cost is lower than the previous scheme. PMID:28441331
Zhu, Zhengqiu; Chen, Bin; Qiu, Sihang; Wang, Rongxiao; Chen, Feiran; Wang, Yiping; Qiu, Xiaogang
2018-03-27
Chemical production activities in industrial districts pose great threats to the surrounding atmospheric environment and human health. Therefore, developing appropriate and intelligent pollution controlling strategies for the management team to monitor chemical production processes is significantly essential in a chemical industrial district. The literature shows that playing a chemical plant environmental protection (CPEP) game can force the chemical plants to be more compliant with environmental protection authorities and reduce the potential risks of hazardous gas dispersion accidents. However, results of the current literature strictly rely on several perfect assumptions which rarely hold in real-world domains, especially when dealing with human adversaries. To address bounded rationality and limited observability in human cognition, the CPEP game is extended to generate robust schedules of inspection resources for inspection agencies. The present paper is innovative on the following contributions: (i) The CPEP model is extended by taking observation frequency and observation cost of adversaries into account, and thus better reflects the industrial reality; (ii) Uncertainties such as attackers with bounded rationality, attackers with limited observation and incomplete information (i.e., the attacker's parameters) are integrated into the extended CPEP model; (iii) Learning curve theory is employed to determine the attacker's observability in the game solver. Results in the case study imply that this work improves the decision-making process for environmental protection authorities in practical fields by bringing more rewards to the inspection agencies and by acquiring more compliance from chemical plants.
Increasing the resilience and security of the United States' power infrastructure
DOE Office of Scientific and Technical Information (OSTI.GOV)
Happenny, Sean F.
2015-08-01
The United States' power infrastructure is aging, underfunded, and vulnerable to cyber attack. Emerging smart grid technologies may take some of the burden off of existing systems and make the grid as a whole more efficient, reliable, and secure. The Pacific Northwest National Laboratory (PNNL) is funding research into several aspects of smart grid technology and grid security, creating a software simulation tool that will allow researchers to test power infrastructure control and distribution paradigms by utilizing different smart grid technologies to determine how the grid and these technologies react under different circumstances. Understanding how these systems behave in real-worldmore » conditions will lead to new ways to make our power infrastructure more resilient and secure. Demonstrating security in embedded systems is another research area PNNL is tackling. Many of the systems controlling the U.S. critical infrastructure, such as the power grid, lack integrated security and the aging networks protecting them are becoming easier to attack.« less
Strategic aspects of cyberattack, attribution, and blame.
Edwards, Benjamin; Furnas, Alexander; Forrest, Stephanie; Axelrod, Robert
2017-03-14
Cyber conflict is now a common and potentially dangerous occurrence. The target typically faces a strategic choice based on its ability to attribute the attack to a specific perpetrator and whether it has a viable punishment at its disposal. We present a game-theoretic model, in which the best strategic choice for the victim depends on the vulnerability of the attacker, the knowledge level of the victim, payoffs for different outcomes, and the beliefs of each player about their opponent. The resulting blame game allows analysis of four policy-relevant questions: the conditions under which peace (i.e., no attacks) is stable, when attacks should be tolerated, the consequences of asymmetric technical attribution capabilities, and when a mischievous third party or an accident can undermine peace. Numerous historical examples illustrate how the theory applies to cases of cyber or kinetic conflict involving the United States, Russia, China, Japan, North Korea, Estonia, Israel, Iran, and Syria.
Strategic aspects of cyberattack, attribution, and blame
Edwards, Benjamin; Furnas, Alexander; Forrest, Stephanie
2017-01-01
Cyber conflict is now a common and potentially dangerous occurrence. The target typically faces a strategic choice based on its ability to attribute the attack to a specific perpetrator and whether it has a viable punishment at its disposal. We present a game-theoretic model, in which the best strategic choice for the victim depends on the vulnerability of the attacker, the knowledge level of the victim, payoffs for different outcomes, and the beliefs of each player about their opponent. The resulting blame game allows analysis of four policy-relevant questions: the conditions under which peace (i.e., no attacks) is stable, when attacks should be tolerated, the consequences of asymmetric technical attribution capabilities, and when a mischievous third party or an accident can undermine peace. Numerous historical examples illustrate how the theory applies to cases of cyber or kinetic conflict involving the United States, Russia, China, Japan, North Korea, Estonia, Israel, Iran, and Syria. PMID:28242700
Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models
Rao, Nageswara S. V.; Poole, Stephen W.; Ma, Chris Y. T.; ...
2015-04-06
The operation of cyber infrastructures relies on both cyber and physical components, which are subject to incidental and intentional degradations of different kinds. Within the context of network and computing infrastructures, we study the strategic interactions between an attacker and a defender using game-theoretic models that take into account both cyber and physical components. The attacker and defender optimize their individual utilities expressed as sums of cost and system terms. First, we consider a Boolean attack-defense model, wherein the cyber and physical sub-infrastructures may be attacked and reinforced as individual units. Second, we consider a component attack-defense model wherein theirmore » components may be attacked and defended, and the infrastructure requires minimum numbers of both to function. We show that the Nash equilibrium under uniform costs in both cases is computable in polynomial time, and it provides high-level deterministic conditions for the infrastructure survival. When probabilities of successful attack and defense, and of incidental failures are incorporated into the models, the results favor the attacker but otherwise remain qualitatively similar. This approach has been motivated and validated by our experiences with UltraScience Net infrastructure, which was built to support high-performance network experiments. In conclusion, the analytical results, however, are more general, and we apply them to simplified models of cloud and high-performance computing infrastructures.« less
Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rao, Nageswara S. V.; Poole, Stephen W.; Ma, Chris Y. T.
The operation of cyber infrastructures relies on both cyber and physical components, which are subject to incidental and intentional degradations of different kinds. Within the context of network and computing infrastructures, we study the strategic interactions between an attacker and a defender using game-theoretic models that take into account both cyber and physical components. The attacker and defender optimize their individual utilities expressed as sums of cost and system terms. First, we consider a Boolean attack-defense model, wherein the cyber and physical sub-infrastructures may be attacked and reinforced as individual units. Second, we consider a component attack-defense model wherein theirmore » components may be attacked and defended, and the infrastructure requires minimum numbers of both to function. We show that the Nash equilibrium under uniform costs in both cases is computable in polynomial time, and it provides high-level deterministic conditions for the infrastructure survival. When probabilities of successful attack and defense, and of incidental failures are incorporated into the models, the results favor the attacker but otherwise remain qualitatively similar. This approach has been motivated and validated by our experiences with UltraScience Net infrastructure, which was built to support high-performance network experiments. In conclusion, the analytical results, however, are more general, and we apply them to simplified models of cloud and high-performance computing infrastructures.« less
Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models.
Rao, Nageswara S V; Poole, Stephen W; Ma, Chris Y T; He, Fei; Zhuang, Jun; Yau, David K Y
2016-04-01
The operation of cyber infrastructures relies on both cyber and physical components, which are subject to incidental and intentional degradations of different kinds. Within the context of network and computing infrastructures, we study the strategic interactions between an attacker and a defender using game-theoretic models that take into account both cyber and physical components. The attacker and defender optimize their individual utilities, expressed as sums of cost and system terms. First, we consider a Boolean attack-defense model, wherein the cyber and physical subinfrastructures may be attacked and reinforced as individual units. Second, we consider a component attack-defense model wherein their components may be attacked and defended, and the infrastructure requires minimum numbers of both to function. We show that the Nash equilibrium under uniform costs in both cases is computable in polynomial time, and it provides high-level deterministic conditions for the infrastructure survival. When probabilities of successful attack and defense, and of incidental failures, are incorporated into the models, the results favor the attacker but otherwise remain qualitatively similar. This approach has been motivated and validated by our experiences with UltraScience Net infrastructure, which was built to support high-performance network experiments. The analytical results, however, are more general, and we apply them to simplified models of cloud and high-performance computing infrastructures. © 2015 Society for Risk Analysis.
Wireless Networks under a Backoff Attack: A Game Theoretical Perspective
Zazo, Santiago
2018-01-01
We study a wireless sensor network using CSMA/CA in the MAC layer under a backoff attack: some of the sensors of the network are malicious and deviate from the defined contention mechanism. We use Bianchi’s network model to study the impact of the malicious sensors on the total network throughput, showing that it causes the throughput to be unfairly distributed among sensors. We model this conflict using game theory tools, where each sensor is a player. We obtain analytical solutions and propose an algorithm, based on Regret Matching, to learn the equilibrium of the game with an arbitrary number of players. Our approach is validated via simulations, showing that our theoretical predictions adjust to reality. PMID:29385752
An analytic approach to cyber adversarial dynamics
NASA Astrophysics Data System (ADS)
Sweeney, Patrick; Cybenko, George
2012-06-01
To date, cyber security investment by both the government and commercial sectors has been largely driven by the myopic best response of players to the actions of their adversaries and their perception of the adversarial environment. However, current work in applying traditional game theory to cyber operations typically assumes that games exist with prescribed moves, strategies, and payos. This paper presents an analytic approach to characterizing the more realistic cyber adversarial metagame that we believe is being played. Examples show that understanding the dynamic metagame provides opportunities to exploit an adversary's anticipated attack strategy. A dynamic version of a graph-based attack-defend game is introduced, and a simulation shows how an optimal strategy can be selected for success in the dynamic environment.
Gamification and Smart Feedback: Experiences with a Primary School Level Math App
ERIC Educational Resources Information Center
Kickmeier-Rust, Michael D.; Hillemann, Eva-C.; Albert, Dietrich
2014-01-01
Gamification is a recent trend in the field of game-based learning that accounts for development effort, costs, and effectiveness concerns of games. Another trend in educational technology is learning analytics and formative feedback. In the context of a European project the developed a light weight tool for learning and practicing divisions named…
Probabilistic assessment of smart composite structures
NASA Technical Reports Server (NTRS)
Chamis, Christos C.; Shiao, Michael C.
1994-01-01
A composite wing with spars and bulkheads is used to demonstrate the effectiveness of probabilistic assessment of smart composite structures to control uncertainties in distortions and stresses. Results show that a smart composite wing can be controlled to minimize distortions and to have specified stress levels in the presence of defects. Structural responses such as changes in angle of attack, vertical displacements, and stress in the control and controlled plies are probabilistically assessed to quantify their respective uncertainties. Sensitivity factors are evaluated to identify those parameters that have the greatest influence on a specific structural response. Results show that smart composite structures can be configured to control both distortions and ply stresses to satisfy specified design requirements.
Internet and Video Game Addictions: Diagnosis, Epidemiology, and Neurobiology.
Sussman, Clifford J; Harper, James M; Stahl, Jessica L; Weigle, Paul
2018-04-01
In the past 2 decades, there has been substantial increase in availability and use of digital technologies, including the Internet, computer games, smart phones, and social media. Behavioral addiction to use of technologies spawned a body of related research. The recent inclusion of Internet gaming disorder as a condition for further study in the DSM-V invigorated a new wave of researchers, thereby expanding our understanding of these conditions. This article reviews current research, theory, and practice regarding the diagnosis, epidemiology, and neurobiology of Internet and video game addictions. Copyright © 2017 Elsevier Inc. All rights reserved.
Knowledge discovery through games and game theory
NASA Astrophysics Data System (ADS)
Smith, James F., III; Rhyne, Robert D.
2001-03-01
A fuzzy logic based expert system has been developed that automatically allocates electronic attack (EA) resources in real-time over many dissimilar platforms. The platforms can be very general, e.g., ships, planes, robots, land based facilities, etc. Potential foes the platforms deal with can also be general. The initial version of the algorithm was optimized using a genetic algorithm employing fitness functions constructed based on expertise. A new approach is being explored that involves embedding the resource manager in a electronic game environment. The game allows a human expert to play against the resource manager in a simulated battlespace with each of the defending platforms being exclusively directed by the fuzzy resource manager and the attacking platforms being controlled by the human expert or operating autonomously under their own logic. This approach automates the data mining problem. The game automatically creates a database reflecting the domain expert's knowledge, it calls a data mining function, a genetic algorithm, for data mining of the database as required. The game allows easy evaluation of the information mined in the second step. The measure of effectiveness (MOE) for re-optimization is discussed. The mined information is extremely valuable as shown through demanding scenarios.
Jiménez-Naharro, Raúl; Gómez-Bravo, Fernando; Medina-García, Jonathan; Sánchez-Raya, Manuel; Gómez-Galán, Juan Antonio
2017-01-01
This paper presents a study about hardware attacking and clock signal vulnerability. It considers a particular type of attack on the clock signal in the I2C protocol, and proposes the design of a new sensor for detecting and defending against this type of perturbation. The analysis of the attack and the defense is validated by means of a configurable experimental platform that emulates a differential drive robot. A set of experimental results confirm the interest of the studied vulnerabilities and the efficiency of the proposed sensor in defending against this type of situation. PMID:28346337
Code of Federal Regulations, 2013 CFR
2013-04-01
.... Alternatively, it may be adequately secured (e.g., locked container to which only accounting personnel can gain... secured (e.g., locked container to which only accounting personnel can gain access) until retrieved by the...) Alternatively, a smart bucket system that electronically identifies and tracks the gaming machine number, and...
Code of Federal Regulations, 2014 CFR
2014-04-01
.... Alternatively, it may be adequately secured (e.g., locked container to which only accounting personnel can gain... secured (e.g., locked container to which only accounting personnel can gain access) until retrieved by the...) Alternatively, a smart bucket system that electronically identifies and tracks the gaming machine number, and...
Code of Federal Regulations, 2011 CFR
2011-04-01
.... Alternatively, it may be adequately secured (e.g., locked container to which only accounting personnel can gain... secured (e.g., locked container to which only accounting personnel can gain access) until retrieved by the...) Alternatively, a smart bucket system that electronically identifies and tracks the gaming machine number, and...
Code of Federal Regulations, 2012 CFR
2012-04-01
.... Alternatively, it may be adequately secured (e.g., locked container to which only accounting personnel can gain... secured (e.g., locked container to which only accounting personnel can gain access) until retrieved by the...) Alternatively, a smart bucket system that electronically identifies and tracks the gaming machine number, and...
Capacity and optimal collusion attack channels for Gaussian fingerprinting games
NASA Astrophysics Data System (ADS)
Wang, Ying; Moulin, Pierre
2007-02-01
In content fingerprinting, the same media covertext - image, video, audio, or text - is distributed to many users. A fingerprint, a mark unique to each user, is embedded into each copy of the distributed covertext. In a collusion attack, two or more users may combine their copies in an attempt to "remove" their fingerprints and forge a pirated copy. To trace the forgery back to members of the coalition, we need fingerprinting codes that can reliably identify the fingerprints of those members. Researchers have been focusing on designing or testing fingerprints for Gaussian host signals and the mean square error (MSE) distortion under some classes of collusion attacks, in terms of the detector's error probability in detecting collusion members. For example, under the assumptions of Gaussian fingerprints and Gaussian attacks (the fingerprinted signals are averaged and then the result is passed through a Gaussian test channel), Moulin and Briassouli1 derived optimal strategies in a game-theoretic framework that uses the detector's error probability as the performance measure for a binary decision problem (whether a user participates in the collusion attack or not); Stone2 and Zhao et al. 3 studied average and other non-linear collusion attacks for Gaussian-like fingerprints; Wang et al. 4 stated that the average collusion attack is the most efficient one for orthogonal fingerprints; Kiyavash and Moulin 5 derived a mathematical proof of the optimality of the average collusion attack under some assumptions. In this paper, we also consider Gaussian cover signals, the MSE distortion, and memoryless collusion attacks. We do not make any assumption about the fingerprinting codes used other than an embedding distortion constraint. Also, our only assumptions about the attack channel are an expected distortion constraint, a memoryless constraint, and a fairness constraint. That is, the colluders are allowed to use any arbitrary nonlinear strategy subject to the above constraints. Under those constraints on the fingerprint embedder and the colluders, fingerprinting capacity is obtained as the solution of a mutual-information game involving probability density functions (pdf's) designed by the embedder and the colluders. We show that the optimal fingerprinting strategy is a Gaussian test channel where the fingerprinted signal is the sum of an attenuated version of the cover signal plus a Gaussian information-bearing noise, and the optimal collusion strategy is to average fingerprinted signals possessed by all the colluders and pass the averaged copy through a Gaussian test channel. The capacity result and the optimal strategies are the same for both the private and public games. In the former scenario, the original covertext is available to the decoder, while in the latter setup, the original covertext is available to the encoder but not to the decoder.
Dynamic game balancing implementation using adaptive algorithm in mobile-based Safari Indonesia game
NASA Astrophysics Data System (ADS)
Yuniarti, Anny; Nata Wardanie, Novita; Kuswardayan, Imam
2018-03-01
In developing a game there is one method that should be applied to maintain the interest of players, namely dynamic game balancing. Dynamic game balancing is a process to match a player’s playing style with the behaviour, attributes, and game environment. This study applies dynamic game balancing using adaptive algorithm in scrolling shooter game type called Safari Indonesia which developed using Unity. The game of this type is portrayed by a fighter aircraft character trying to defend itself from insistent enemy attacks. This classic game is chosen to implement adaptive algorithms because it has quite complex attributes to be developed using dynamic game balancing. Tests conducted by distributing questionnaires to a number of players indicate that this method managed to reduce frustration and increase the pleasure factor in playing.
ERIC Educational Resources Information Center
Misfeldt, Morten
2015-01-01
In this paper I describe how students use a project management simulation game based on an attack-defense mechanism where two teams of players compete by challenging each other's projects. The project management simulation game is intended to be played by pre-service construction workers and engineers. The gameplay has two parts: a planning part,…
NASA Astrophysics Data System (ADS)
Hollander, Ari; Rose, Howard; Kollin, Joel; Moss, William
2011-03-01
Attack! of the S. Mutans is a multi-player game designed to harness the immersion and appeal possible with wide-fieldof- view stereoscopic 3D to combat the tooth decay epidemic. Tooth decay is one of the leading causes of school absences and costs more than $100B annually in the U.S. In 2008 the authors received a grant from the National Institutes of Health to build a science museum exhibit that included a suite of serious games involving the behaviors and bacteria that cause cavities. The centerpiece is an adventure game where five simultaneous players use modified Wii controllers to battle biofilms and bacteria while immersed in environments generated within a 11-foot stereoscopic WUXGA display. The authors describe the system and interface used in this prototype application and some of the ways they attempted to use the power of immersion and the appeal of S3D revolution to change health attitudes and self-care habits.
Mezher, Ahmad Mohamad; Igartua, Mónica Aguilar; de la Cruz Llopis, Luis J; Pallarès Segarra, Esteve; Tripp-Barba, Carolina; Urquiza-Aguiar, Luis; Forné, Jordi; Sanvicente Gargallo, Emilio
2015-04-17
The prevention of accidents is one of the most important goals of ad hoc networks in smart cities. When an accident happens, dynamic sensors (e.g., citizens with smart phones or tablets, smart vehicles and buses, etc.) could shoot a video clip of the accident and send it through the ad hoc network. With a video message, the level of seriousness of the accident could be much better evaluated by the authorities (e.g., health care units, police and ambulance drivers) rather than with just a simple text message. Besides, other citizens would be rapidly aware of the incident. In this way, smart dynamic sensors could participate in reporting a situation in the city using the ad hoc network so it would be possible to have a quick reaction warning citizens and emergency units. The deployment of an efficient routing protocol to manage video-warning messages in mobile Ad hoc Networks (MANETs) has important benefits by allowing a fast warning of the incident, which potentially can save lives. To contribute with this goal, we propose a multipath routing protocol to provide video-warning messages in MANETs using a novel game-theoretical approach. As a base for our work, we start from our previous work, where a 2-players game-theoretical routing protocol was proposed to provide video-streaming services over MANETs. In this article, we further generalize the analysis made for a general number of N players in the MANET. Simulations have been carried out to show the benefits of our proposal, taking into account the mobility of the nodes and the presence of interfering traffic. Finally, we also have tested our approach in a vehicular ad hoc network as an incipient start point to develop a novel proposal specifically designed for VANETs.
Olszewski, Robert; Pałka, Piotr; Turek, Agnieszka
2018-01-06
To reduce energy consumption and improve residents' quality of life, "smart cities" should use not only modern technologies, but also the social innovations of the "Internet of Things" (IoT) era. This article attempts to solve transport problems in a smart city's office district by utilizing gamification that incentivizes the carpooling system. The goal of the devised system is to significantly reduce the number of cars, and, consequently, to alleviate traffic jams, as well as to curb pollution and energy consumption. A representative sample of the statistical population of people working in one of the biggest office hubs in Poland (the so-called "Mordor of Warsaw") was surveyed. The collected data were processed using spatial data mining methods, and the results were a set of parameters for the multi-agent system. This approach made it possible to run a series of simulations on a set of 100,000 agents and to select an effective gamification methodology that supports the carpooling process. The implementation of the proposed solutions (a "serious game" variation of urban games) would help to reduce the number of cars by several dozen percent, significantly reduce energy consumption, eliminate traffic jams, and increase the activity of the smart city residents.
Elliptic Curve Cryptography-Based Authentication with Identity Protection for Smart Grids
Zhang, Liping; Tang, Shanyu; Luo, He
2016-01-01
In a smart grid, the power service provider enables the expected power generation amount to be measured according to current power consumption, thus stabilizing the power system. However, the data transmitted over smart grids are not protected, and then suffer from several types of security threats and attacks. Thus, a robust and efficient authentication protocol should be provided to strength the security of smart grid networks. As the Supervisory Control and Data Acquisition system provides the security protection between the control center and substations in most smart grid environments, we focus on how to secure the communications between the substations and smart appliances. Existing security approaches fail to address the performance-security balance. In this study, we suggest a mitigation authentication protocol based on Elliptic Curve Cryptography with privacy protection by using a tamper-resistant device at the smart appliance side to achieve a delicate balance between performance and security of smart grids. The proposed protocol provides some attractive features such as identity protection, mutual authentication and key agreement. Finally, we demonstrate the completeness of the proposed protocol using the Gong-Needham- Yahalom logic. PMID:27007951
Elliptic Curve Cryptography-Based Authentication with Identity Protection for Smart Grids.
Zhang, Liping; Tang, Shanyu; Luo, He
2016-01-01
In a smart grid, the power service provider enables the expected power generation amount to be measured according to current power consumption, thus stabilizing the power system. However, the data transmitted over smart grids are not protected, and then suffer from several types of security threats and attacks. Thus, a robust and efficient authentication protocol should be provided to strength the security of smart grid networks. As the Supervisory Control and Data Acquisition system provides the security protection between the control center and substations in most smart grid environments, we focus on how to secure the communications between the substations and smart appliances. Existing security approaches fail to address the performance-security balance. In this study, we suggest a mitigation authentication protocol based on Elliptic Curve Cryptography with privacy protection by using a tamper-resistant device at the smart appliance side to achieve a delicate balance between performance and security of smart grids. The proposed protocol provides some attractive features such as identity protection, mutual authentication and key agreement. Finally, we demonstrate the completeness of the proposed protocol using the Gong-Needham-Yahalom logic.
ERIC Educational Resources Information Center
Dennis, Bruce L.
1997-01-01
Since Spring 1995, a Bedford, New York superintendent and her district have been virulently attacked by two parents who initially accused them of promoting Satanism, exemplified in an after-school game called Magic: The Gathering. These parents are now attacking drug prevention programs, various homework assignments, and literature selections. The…
Modeling, Evaluation and Detection of Jamming Attacks in Time-Critical Wireless Applications
2014-08-01
computing, modeling and analysis of wireless networks , network topol- ogy, and architecture design. Dr. Wang has been a Member of the Association for...important, yet open research question is how to model and detect jamming attacks in such wireless networks , where communication traffic is more time...against time-critical wireless networks with applications to the smart grid. In contrast to communication networks where packets-oriented metrics
Qiu, Shuming; Xu, Guoai; Ahmad, Haseeb; Guo, Yanhui
2018-01-01
The Session Initiation Protocol (SIP) is an extensive and esteemed communication protocol employed to regulate signaling as well as for controlling multimedia communication sessions. Recently, Kumari et al. proposed an improved smart card based authentication scheme for SIP based on Farash's scheme. Farash claimed that his protocol is resistant against various known attacks. But, we observe some accountable flaws in Farash's protocol. We point out that Farash's protocol is prone to key-compromise impersonation attack and is unable to provide pre-verification in the smart card, efficient password change and perfect forward secrecy. To overcome these limitations, in this paper we present an enhanced authentication mechanism based on Kumari et al.'s scheme. We prove that the proposed protocol not only overcomes the issues in Farash's scheme, but it can also resist against all known attacks. We also provide the security analysis of the proposed scheme with the help of widespread AVISPA (Automated Validation of Internet Security Protocols and Applications) software. At last, comparing with the earlier proposals in terms of security and efficiency, we conclude that the proposed protocol is efficient and more secure.
On the Lulejian-I Combat Model
1976-08-01
possible initial massing of the attacking side’s resources, the model tries to represent in a game -theoretic context the adversary nature of the...sequential game , as outlined in [A]. In principle, it is necessary to run the combat simulation once for each possible set of sequentially chosen...sequential game , in which the evaluative portion of the model (i.e., the combat assessment) serves to compute intermediate and terminal payoffs for the
How players exploit variability and regularity of game actions in female volleyball teams.
Ramos, Ana; Coutinho, Patrícia; Silva, Pedro; Davids, Keith; Mesquita, Isabel
2017-05-01
Variability analysis has been used to understand how competitive constraints shape different behaviours in team sports. In this study, we analysed and compared variability of tactical performance indices in players within complex I at two different competitive levels in volleyball. We also examined whether variability was influenced by set type and period. Eight matches from the 2012 Olympics competition and from the Portuguese national league in the 2014-2015 season were analysed (1496 rallies). Variability of setting conditions, attack zone, attack tempo and block opposition was assessed using Shannon entropy measures. Magnitude-based inferences were used to analyse the practical significance of compared values of selected variables. Results showed differences between elite and national teams for all variables, which were co-adapted to the competitive constraints of set type and set periods. Elite teams exploited system stability in setting conditions and block opposition, but greater unpredictability in zone and tempo of attack. These findings suggest that uncertainty in attacking actions was a key factor that could only be achieved with greater performance stability in other game actions. Data suggested how coaches could help setters develop the capacity to play at faster tempos, diversifying attack zones, especially at critical moments in competition.
Preemptive Striking in Individual and Group Conflict.
Mifune, Nobuhiro; Hizen, Yoichi; Kamijo, Yoshio; Okano, Yoshitaka
2016-01-01
In this study, we conducted a laboratory experiment to assess preemptive striking by and towards individuals or groups. In the framework of a preemptive strike game, we set the following four conditions: one person faced another person, one person faced a three-person group, a three-person group faced an individual, and a three-person group faced another three-person group. Previous studies have revealed that greed is activated when participants belong to a group, while fear is activated when participants interact with a group, and further, that attacking behaviors in the preemptive strike game are driven by fear. These observations led to a hypothesis that high attack rates would be realized when participants interact with a group, regardless of whether the participants make decisions as individuals or a group. The results of our experiment, however, rejected this hypothesis. Among the four conditions, the attack rate was highest when a three-person group faced an individual. As possible reasons for our observation, we discuss the potential threat stemming from the imbalance in the effectiveness of attack between individuals and groups, and the (incorrect) belief by groups that single individuals would be more likely to attack out of fear.
Preemptive Striking in Individual and Group Conflict
Mifune, Nobuhiro; Hizen, Yoichi; Kamijo, Yoshio; Okano, Yoshitaka
2016-01-01
In this study, we conducted a laboratory experiment to assess preemptive striking by and towards individuals or groups. In the framework of a preemptive strike game, we set the following four conditions: one person faced another person, one person faced a three-person group, a three-person group faced an individual, and a three-person group faced another three-person group. Previous studies have revealed that greed is activated when participants belong to a group, while fear is activated when participants interact with a group, and further, that attacking behaviors in the preemptive strike game are driven by fear. These observations led to a hypothesis that high attack rates would be realized when participants interact with a group, regardless of whether the participants make decisions as individuals or a group. The results of our experiment, however, rejected this hypothesis. Among the four conditions, the attack rate was highest when a three-person group faced an individual. As possible reasons for our observation, we discuss the potential threat stemming from the imbalance in the effectiveness of attack between individuals and groups, and the (incorrect) belief by groups that single individuals would be more likely to attack out of fear. PMID:27148871
Lee, Tian-Fu; Liu, Chuan-Ming
2013-06-01
A smart-card based authentication scheme for telecare medicine information systems enables patients, doctors, nurses, health visitors and the medicine information systems to establish a secure communication platform through public networks. Zhu recently presented an improved authentication scheme in order to solve the weakness of the authentication scheme of Wei et al., where the off-line password guessing attacks cannot be resisted. This investigation indicates that the improved scheme of Zhu has some faults such that the authentication scheme cannot execute correctly and is vulnerable to the attack of parallel sessions. Additionally, an enhanced authentication scheme based on the scheme of Zhu is proposed. The enhanced scheme not only avoids the weakness in the original scheme, but also provides users' anonymity and authenticated key agreements for secure data communications.
Robust anonymous authentication scheme for telecare medical information systems.
Xie, Qi; Zhang, Jun; Dong, Na
2013-04-01
Patient can obtain sorts of health-care delivery services via Telecare Medical Information Systems (TMIS). Authentication, security, patient's privacy protection and data confidentiality are important for patient or doctor accessing to Electronic Medical Records (EMR). In 2012, Chen et al. showed that Khan et al.'s dynamic ID-based authentication scheme has some weaknesses and proposed an improved scheme, and they claimed that their scheme is more suitable for TMIS. However, we show that Chen et al.'s scheme also has some weaknesses. In particular, Chen et al.'s scheme does not provide user's privacy protection and perfect forward secrecy, is vulnerable to off-line password guessing attack and impersonation attack once user's smart card is compromised. Further, we propose a secure anonymity authentication scheme to overcome their weaknesses even an adversary can know all information stored in smart card.
Li, Chun-Ta; Lee, Cheng-Chi; Weng, Chi-Yao
2014-09-01
Telecare medicine information system (TMIS) is widely used for providing a convenient and efficient communicating platform between patients at home and physicians at medical centers or home health care (HHC) organizations. To ensure patient privacy, in 2013, Hao et al. proposed a chaotic map based authentication scheme with user anonymity for TMIS. Later, Lee showed that Hao et al.'s scheme is in no provision for providing fairness in session key establishment and gave an efficient user authentication and key agreement scheme using smart cards, in which only few hashing and Chebyshev chaotic map operations are required. In addition, Jiang et al. discussed that Hao et al.'s scheme can not resist stolen smart card attack and they further presented an improved scheme which attempts to repair the security pitfalls found in Hao et al.'s scheme. In this paper, we found that both Lee's and Jiang et al.'s authentication schemes have a serious security problem in that a registered user's secret parameters may be intentionally exposed to many non-registered users and this problem causing the service misuse attack. Therefore, we propose a slight modification on Lee's scheme to prevent the shortcomings. Compared with previous schemes, our improved scheme not only inherits the advantages of Lee's and Jiang et al.'s authentication schemes for TMIS but also remedies the serious security weakness of not being able to withstand service misuse attack.
Solving Multiple Isolated, Interleaved, and Blended Tasks through Modular Neuroevolution.
Schrum, Jacob; Miikkulainen, Risto
2016-01-01
Many challenging sequential decision-making problems require agents to master multiple tasks. For instance, game agents may need to gather resources, attack opponents, and defend against attacks. Learning algorithms can thus benefit from having separate policies for these tasks, and from knowing when each one is appropriate. How well this approach works depends on how tightly coupled the tasks are. Three cases are identified: Isolated tasks have distinct semantics and do not interact, interleaved tasks have distinct semantics but do interact, and blended tasks have regions where semantics from multiple tasks overlap. Learning across multiple tasks is studied in this article with Modular Multiobjective NEAT, a neuroevolution framework applied to three variants of the challenging Ms. Pac-Man video game. In the standard blended version of the game, a surprising, highly effective machine-discovered task division surpasses human-specified divisions, achieving the best scores to date in this game. In isolated and interleaved versions of the game, human-specified task divisions are also successful, though the best scores are surprisingly still achieved by machine discovery. Modular neuroevolution is thus shown to be capable of finding useful, unexpected task divisions better than those apparent to a human designer.
Diana, Barbara; Zurloni, Valentino; Elia, Massimiliano; Cavalera, Cesare M; Jonsson, Gudberg K; Anguera, M Teresa
2017-01-01
The influence of game location on performance has been widely examined in sport contexts. Concerning soccer, game-location affects positively the secondary and tertiary level of performance; however, there are fewer evidences about its effect on game structure (primary level of performance). This study aimed to detect the effect of game location on a primary level of performance in soccer. In particular, the objective was to reveal the hidden structures underlying the attack actions, in both home and away matches played by a top club (Serie A 2012/2013-First Leg). The methodological approach was based on systematic observation, supported by digital recordings and T-pattern analysis. Data were analyzed with THEME 6.0 software. A quantitative analysis, with nonparametric Mann-Whitney test and descriptive statistics, was carried out to test the hypotheses. A qualitative analysis on complex patterns was performed to get in-depth information on the game structure. This study showed that game tactics were significantly different, with home matches characterized by a more structured and varied game than away matches. In particular, a higher number of different patterns, with a higher level of complexity and including more unique behaviors was detected in home matches than in the away ones. No significant differences were found in the number of events coded per game between the two conditions. THEME software, and the corresponding T-pattern detection algorithm, enhance research opportunities by going further than frequency-based analyses, making this method an effective tool in supporting sport performance analysis and training.
Diana, Barbara; Zurloni, Valentino; Elia, Massimiliano; Cavalera, Cesare M.; Jonsson, Gudberg K.; Anguera, M. Teresa
2017-01-01
The influence of game location on performance has been widely examined in sport contexts. Concerning soccer, game-location affects positively the secondary and tertiary level of performance; however, there are fewer evidences about its effect on game structure (primary level of performance). This study aimed to detect the effect of game location on a primary level of performance in soccer. In particular, the objective was to reveal the hidden structures underlying the attack actions, in both home and away matches played by a top club (Serie A 2012/2013—First Leg). The methodological approach was based on systematic observation, supported by digital recordings and T-pattern analysis. Data were analyzed with THEME 6.0 software. A quantitative analysis, with nonparametric Mann–Whitney test and descriptive statistics, was carried out to test the hypotheses. A qualitative analysis on complex patterns was performed to get in-depth information on the game structure. This study showed that game tactics were significantly different, with home matches characterized by a more structured and varied game than away matches. In particular, a higher number of different patterns, with a higher level of complexity and including more unique behaviors was detected in home matches than in the away ones. No significant differences were found in the number of events coded per game between the two conditions. THEME software, and the corresponding T-pattern detection algorithm, enhance research opportunities by going further than frequency-based analyses, making this method an effective tool in supporting sport performance analysis and training. PMID:28878712
Embar, Keren; Mukherjee, Shomen; Kotler, Burt P
2014-02-01
In predator-prey foraging games, predators should respond to variations in prey state. The value of energy for the prey changes depending on season. Prey in a low energetic state and/or in a reproductive state should invest more in foraging and tolerate higher predation risk. This should make the prey more catchable, and thereby, more preferable to predators. We ask, can predators respond to prey state? How does season and state affect the foraging game from the predator's perspective? By letting owls choose between gerbils whose states we experimentally manipulated, we could demonstrate predator sensitivity to prey state and predator selectivity that otherwise may be obscured by the foraging game. During spring, owls invested more time and attacks in the patch with well-fed gerbils. During summer, owls attacked both patches equally, yet allocated more time to the patch with hungry gerbils. Energetic state per se does not seem to be the basis of owl choice. The owls strongly responded to these subtle differences. In summer, gerbils managed their behavior primarily for survival, and the owls equalized capture opportunities by attacking both patches equally.
Game Location and Team Quality Effects on Performance Profiles in Professional Soccer
Lago-Peñas, Carlos; Lago-Ballesteros, Joaquin
2011-01-01
Home advantage in team sports has an important role in determining the outcome of a game. The aim of the present study was to identify the soccer game- related statistics that best discriminate home and visiting teams according to the team quality. The sample included all 380 games of the Spanish professional men’s league. The independent variables were game location (home or away) and the team quality. Teams were classified into four groups according to their final ranking at the end of the league. The game-related statistics registered were divided into three groups: (i) variables related to goals scored; (ii) variables related to offense and (iii) variables related to defense. A univariate (t-test and Mann-Whitney U) and multivariate (discriminant analysis) analysis of data was done. Results showed that home teams have significantly higher means for goal scored, total shots, shots on goal, attacking moves, box moves, crosses, offsides committed, assists, passes made, successful passes, dribbles made, successful dribbles, ball possession, and gains of possession, while visiting teams presented higher means for losses of possession and yellow cards. In addition, the findings of the current study confirm that game location and team quality are important in determining technical and tactical performances in matches. Teams described as superior and those described as inferior did not experience the same home advantage. Future research should consider the influence of other confounding variables such as weather conditions, game status and team form. Key points Home teams have significantly higher figures for attack indicators probably due to facilities familiarity and crowd effects. The teams’ game-related statistics profile varied according to game location and team quality. Teams described as superior and those described as inferior did not experience the same home advantage. PMID:24150619
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chatterjee, Samrat; Tipireddy, Ramakrishna; Oster, Matthew R.
Securing cyber-systems on a continual basis against a multitude of adverse events is a challenging undertaking. Game-theoretic approaches, that model actions of strategic decision-makers, are increasingly being applied to address cybersecurity resource allocation challenges. Such game-based models account for multiple player actions and represent cyber attacker payoffs mostly as point utility estimates. Since a cyber-attacker’s payoff generation mechanism is largely unknown, appropriate representation and propagation of uncertainty is a critical task. In this paper we expand on prior work and focus on operationalizing the probabilistic uncertainty quantification framework, for a notional cyber system, through: 1) representation of uncertain attacker andmore » system-related modeling variables as probability distributions and mathematical intervals, and 2) exploration of uncertainty propagation techniques including two-phase Monte Carlo sampling and probability bounds analysis.« less
Recommendations for Model Driven Paradigms for Integrated Approaches to Cyber Defense
2017-03-06
analogy (e.g., Susceptible, Infected, Recovered [SIR]) • Abstract wargaming: game -theoretic model of cyber conflict without modeling the underlying...malware. 3.7 Abstract Wargaming Here, a game -theoretic process is modeled with moves and effects inspired by cyber conflict but without modeling the...underlying processes of cyber attack and defense. Examples in literature include the following: • Cho J-H, Gao J. Cyber war game in temporal networks
Vision-based navigation in a dynamic environment for virtual human
NASA Astrophysics Data System (ADS)
Liu, Yan; Sun, Ji-Zhou; Zhang, Jia-Wan; Li, Ming-Chu
2004-06-01
Intelligent virtual human is widely required in computer games, ergonomics software, virtual environment and so on. We present a vision-based behavior modeling method to realize smart navigation in a dynamic environment. This behavior model can be divided into three modules: vision, global planning and local planning. Vision is the only channel for smart virtual actor to get information from the outside world. Then, the global and local planning module use A* and D* algorithm to find a way for virtual human in a dynamic environment. Finally, the experiments on our test platform (Smart Human System) verify the feasibility of this behavior model.
Issues in training the female player
Kirkendall, Donald T
2007-01-01
On the surface, the women's game appears to be similar to the men's game. On closer examination, there are subtle differences in the nature of how each gender plays the game, which are evident in the disparity between skills, tactics and fitness. The technical weaknesses of women include the first touch, dribbling, long passing and goal keeping. These skill limitations have dictated specific tactical approaches towards both attack and defence. Specific biological limitations inherent in the female player affect the pace and total work output in the women's game. Although it is unrealistic to expect the women's game to approach the work output of the men's game, specific training of skills and fitness will influence the tactical approach to the game. PMID:17504787
Cyber security issues in online games
NASA Astrophysics Data System (ADS)
Zhao, Chen
2018-04-01
With the rapid development of the Internet, online gaming has become a way of entertainment for many young people in the modern era. However, in recent years, cyber security issues in online games have emerged in an endless stream, which have also caused great attention of many game operators. Common cyber security problems in the game include information disclosure and cyber-attacks. These problems will directly or indirectly cause economic losses to gamers. Many gaming companies are enhancing the stability and security of their network or gaming systems in order to enhance the gaming user experience. This article has carried out the research of the cyber security issues in online games by introducing the background and some common cyber security threats, and by proposing the latent solution. Finally, it speculates the future research direction of the cyber security issues of online games in the hope of providing feasible solution and useful information for game operators.
DOT National Transportation Integrated Search
2014-12-01
This study suggests an integrated framework to quantify cyber attack impacts on the U.S. airport security system. A cyber attack by terrorists on the U.S. involves complex : strategic behavior by the terrorists because they could plan to invade an ai...
Influential Aspects of the Smart City
DOE Office of Scientific and Technical Information (OSTI.GOV)
Marinovici, Maria C.; Kirkham, Harold; Widergren, Steven E.
2016-01-05
Using millions of sensors in everyday objects, smart cities will generate petabytes of data, and it will be delivered to multiple users via networks. Multi-disciplinary inter-operability is essential. We propose system engineering management, with multidisciplinary teams as an effective way to deliver real change. Their goal is to develop intelligent and integrated services through the use of digital technologies and open collaboration. We also caution that the process cannot be entirely planned ahead of time, it must be allowed to evolve. New technology will change the game (where does a 3-D printer fit into a smart city?). Municipal planning meansmore » central planning – not known for its sensitivity to reality. A successful smart city will include lots of feedback mechanisms for the citizenry.« less
Dynamic Training Environments of the Future
2008-03-13
for cyber attacks, espionage, & command and control MMORPG used to generate revenue through the sale of in-game items for real-world currency...The video game is the new media in cyberspace, it can be used by us and it will be used against us The MMORPG is the emergence of a new society Types
A Game-Theoretical Model to Improve Process Plant Protection from Terrorist Attacks.
Zhang, Laobing; Reniers, Genserik
2016-12-01
The New York City 9/11 terrorist attacks urged people from academia as well as from industry to pay more attention to operational security research. The required focus in this type of research is human intention. Unlike safety-related accidents, security-related accidents have a deliberate nature, and one has to face intelligent adversaries with characteristics that traditional probabilistic risk assessment techniques are not capable of dealing with. In recent years, the mathematical tool of game theory, being capable to handle intelligent players, has been used in a variety of ways in terrorism risk assessment. In this article, we analyze the general intrusion detection system in process plants, and propose a game-theoretical model for security management in such plants. Players in our model are assumed to be rational and they play the game with complete information. Both the pure strategy and the mixed strategy solutions are explored and explained. We illustrate our model by an illustrative case, and find that in our case, no pure strategy but, instead, a mixed strategy Nash equilibrium exists. © 2016 Society for Risk Analysis.
Game Analysis of Olympic, World and European Championships in Men's Handball.
Bilge, Murat
2012-12-01
The development of men's handball was analyzed using data from the Olympic, World and European Championships held within the last eight years. The most obvious change, especially within these last nine tournaments, was that men's handball was played more dynamically and rapidly, both in attack and defense, especially by European teams. The first aim of this study was to conduct a technical analysis of current handball and to determine factors related to success in this sport discipline. The second aim was to compare the data of European Championships with other tournaments, considering the success of European teams in Men's World Handball. The technical variables used to compare the tournaments included: the average number of attacks, the efficiency of attacks, the efficiency of goal throws, fast break goals per game, the efficiency of fast breaks, the efficiency of the goalkeeper, saves by the goalkeeper per game, number of turnovers per game, and the efficiency of position throws (wing, pivot, back court, break-through, fast break, and 7-meter). This technical analysis used cumulative statistics from the European Handball Federation and International Handball Federation. ANOVA revealed significant differences between the first eight teams in the European Championships and their counterparts in the other two tournaments (Olympics and World Championships) in terms of several technical variables. The results showed that the efficiency of fast break, pivot position and back court players affected the ranking in favor of the European teams in significant international tournaments.
2005 USSOCOM Chemical, Biological, Radiological Conference and Exhibition
2005-12-08
Cree, Inc. 22 Signal respose to releases 12:42 12:48 12:54 13:0 13:6 13:12 13:18 -2 0 2 4 6 8 10 12 x 10-3 Processed Data for AS-B2-009-09-03-05...acrid smell and onset of nerve agent symptoms Confidential USSOCOM Scenario 3: Chemical Agent Attack • First responders don their Self -Contained...Nuclear (CBRN) detectors Smart Threads is a dynamic, easily expandable, self - configuring platform Smart Threads Integrated Radiation Sensors (STIRS
Game Theory and U-Boats in the Bay of Biscay
2003-03-01
a necessary condition for optimality in this case. Baston and Bostock (1989) approach a one-dimensional helicopter versus submarine game, modeled as...given number of bombs with which to attack the submarine, and the payoff is whether or not the submarine is destroyed. Baston and Bostock solve the...323 (March-April 2002). Baston , V. J. and F. A. Bostock. “A One-Dimensional Helicopter-Submarine Game,” Naval Research Logistics, Vol. 36: 479-490
Jung, Jaewook; Kim, Jiye; Choi, Younsung; Won, Dongho
2016-08-16
In wireless sensor networks (WSNs), a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et al. proposed a secure user authentication scheme using symmetric key techniques for WSNs. They claim that their scheme assures high efficiency and security against different types of attacks. After careful analysis, however, we find that Chen et al.'s scheme is still vulnerable to smart card loss attack and is susceptible to denial of service attack, since it is invalid for verification to simply compare an entered ID and a stored ID in smart card. In addition, we also observe that their scheme cannot preserve user anonymity. Furthermore, their scheme cannot quickly detect an incorrect password during login phase, and this flaw wastes both communication and computational overheads. In this paper, we describe how these attacks work, and propose an enhanced anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in WSNs to address all of the aforementioned vulnerabilities in Chen et al.'s scheme. Our analysis shows that the proposed scheme improves the level of security, and is also more efficient relative to other related schemes.
Evaluating Moving Target Defense with PLADD
DOE Office of Scientific and Technical Information (OSTI.GOV)
Jones, Stephen T.; Outkin, Alexander V.; Gearhart, Jared Lee
This project evaluates the effectiveness of moving target defense (MTD) techniques using a new game we have designed, called PLADD, inspired by the game FlipIt [28]. PLADD extends FlipIt by incorporating what we believe are key MTD concepts. We have analyzed PLADD and proven the existence of a defender strategy that pushes a rational attacker out of the game, demonstrated how limited the strategies available to an attacker are in PLADD, and derived analytic expressions for the expected utility of the game’s players in multiple game variants. We have created an algorithm for finding a defender’s optimal PLADD strategy. Wemore » show that in the special case of achieving deterrence in PLADD, MTD is not always cost effective and that its optimal deployment may shift abruptly from not using MTD at all to using it as aggressively as possible. We believe our effort provides basic, fundamental insights into the use of MTD, but conclude that a truly practical analysis requires model selection and calibration based on real scenarios and empirical data. We propose several avenues for further inquiry, including (1) agents with adaptive capabilities more reflective of real world adversaries, (2) the presence of multiple, heterogeneous adversaries, (3) computational game theory-based approaches such as coevolution to allow scaling to the real world beyond the limitations of analytical analysis and classical game theory, (4) mapping the game to real-world scenarios, (5) taking player risk into account when designing a strategy (in addition to expected payoff), (6) improving our understanding of the dynamic nature of MTD-inspired games by using a martingale representation, defensive forecasting, and techniques from signal processing, and (7) using adversarial games to develop inherently resilient cyber systems.« less
A Learning-Based Approach to Reactive Security
NASA Astrophysics Data System (ADS)
Barth, Adam; Rubinstein, Benjamin I. P.; Sundararajan, Mukund; Mitchell, John C.; Song, Dawn; Bartlett, Peter L.
Despite the conventional wisdom that proactive security is superior to reactive security, we show that reactive security can be competitive with proactive security as long as the reactive defender learns from past attacks instead of myopically overreacting to the last attack. Our game-theoretic model follows common practice in the security literature by making worst-case assumptions about the attacker: we grant the attacker complete knowledge of the defender's strategy and do not require the attacker to act rationally. In this model, we bound the competitive ratio between a reactive defense algorithm (which is inspired by online learning theory) and the best fixed proactive defense. Additionally, we show that, unlike proactive defenses, this reactive strategy is robust to a lack of information about the attacker's incentives and knowledge.
A provably-secure ECC-based authentication scheme for wireless sensor networks.
Nam, Junghyun; Kim, Moonseong; Paik, Juryon; Lee, Youngsook; Won, Dongho
2014-11-06
A smart-card-based user authentication scheme for wireless sensor networks (in short, a SUA-WSN scheme) is designed to restrict access to the sensor data only to users who are in possession of both a smart card and the corresponding password. While a significant number of SUA-WSN schemes have been suggested in recent years, their intended security properties lack formal definitions and proofs in a widely-accepted model. One consequence is that SUA-WSN schemes insecure against various attacks have proliferated. In this paper, we devise a security model for the analysis of SUA-WSN schemes by extending the widely-accepted model of Bellare, Pointcheval and Rogaway (2000). Our model provides formal definitions of authenticated key exchange and user anonymity while capturing side-channel attacks, as well as other common attacks. We also propose a new SUA-WSN scheme based on elliptic curve cryptography (ECC), and prove its security properties in our extended model. To the best of our knowledge, our proposed scheme is the first SUA-WSN scheme that provably achieves both authenticated key exchange and user anonymity. Our scheme is also computationally competitive with other ECC-based (non-provably secure) schemes.
A Provably-Secure ECC-Based Authentication Scheme for Wireless Sensor Networks
Nam, Junghyun; Kim, Moonseong; Paik, Juryon; Lee, Youngsook; Won, Dongho
2014-01-01
A smart-card-based user authentication scheme for wireless sensor networks (in short, a SUA-WSN scheme) is designed to restrict access to the sensor data only to users who are in possession of both a smart card and the corresponding password. While a significant number of SUA-WSN schemes have been suggested in recent years, their intended security properties lack formal definitions and proofs in a widely-accepted model. One consequence is that SUA-WSN schemes insecure against various attacks have proliferated. In this paper, we devise a security model for the analysis of SUA-WSN schemes by extending the widely-accepted model of Bellare, Pointcheval and Rogaway (2000). Our model provides formal definitions of authenticated key exchange and user anonymity while capturing side-channel attacks, as well as other common attacks. We also propose a new SUA-WSN scheme based on elliptic curve cryptography (ECC), and prove its security properties in our extended model. To the best of our knowledge, our proposed scheme is the first SUA-WSN scheme that provably achieves both authenticated key exchange and user anonymity. Our scheme is also computationally competitive with other ECC-based (non-provably secure) schemes. PMID:25384009
2018-01-01
The Session Initiation Protocol (SIP) is an extensive and esteemed communication protocol employed to regulate signaling as well as for controlling multimedia communication sessions. Recently, Kumari et al. proposed an improved smart card based authentication scheme for SIP based on Farash’s scheme. Farash claimed that his protocol is resistant against various known attacks. But, we observe some accountable flaws in Farash’s protocol. We point out that Farash’s protocol is prone to key-compromise impersonation attack and is unable to provide pre-verification in the smart card, efficient password change and perfect forward secrecy. To overcome these limitations, in this paper we present an enhanced authentication mechanism based on Kumari et al.’s scheme. We prove that the proposed protocol not only overcomes the issues in Farash’s scheme, but it can also resist against all known attacks. We also provide the security analysis of the proposed scheme with the help of widespread AVISPA (Automated Validation of Internet Security Protocols and Applications) software. At last, comparing with the earlier proposals in terms of security and efficiency, we conclude that the proposed protocol is efficient and more secure. PMID:29547619
A Game Theoretic Model for the Optimal Disposition of Integrated Air Defense System Assets
2015-03-26
fellows of Miami Valley Philosophical and Lifting Society v Acknowledgements I want to thank LTC Brian J. Lunday and Lt Col Matthew J. Robbins for...on the defender’s valuation of tar- gets. However, if we assume that Hamas, the attacker, knows the layout of Israel’s defense, they may attack
A study of IEEE 802.15.4 security framework for wireless body area networks.
Saleem, Shahnaz; Ullah, Sana; Kwak, Kyung Sup
2011-01-01
A Wireless Body Area Network (WBAN) is a collection of low-power and lightweight wireless sensor nodes that are used to monitor the human body functions and the surrounding environment. It supports a number of innovative and interesting applications, including ubiquitous healthcare and Consumer Electronics (CE) applications. Since WBAN nodes are used to collect sensitive (life-critical) information and may operate in hostile environments, they require strict security mechanisms to prevent malicious interaction with the system. In this paper, we first highlight major security requirements and Denial of Service (DoS) attacks in WBAN at Physical, Medium Access Control (MAC), Network, and Transport layers. Then we discuss the IEEE 802.15.4 security framework and identify the security vulnerabilities and major attacks in the context of WBAN. Different types of attacks on the Contention Access Period (CAP) and Contention Free Period (CFP) parts of the superframe are analyzed and discussed. It is observed that a smart attacker can successfully corrupt an increasing number of GTS slots in the CFP period and can considerably affect the Quality of Service (QoS) in WBAN (since most of the data is carried in CFP period). As we increase the number of smart attackers the corrupted GTS slots are eventually increased, which prevents the legitimate nodes to utilize the bandwidth efficiently. This means that the direct adaptation of IEEE 802.15.4 security framework for WBAN is not totally secure for certain WBAN applications. New solutions are required to integrate high level security in WBAN.
A Study of IEEE 802.15.4 Security Framework for Wireless Body Area Networks
Saleem, Shahnaz; Ullah, Sana; Kwak, Kyung Sup
2011-01-01
A Wireless Body Area Network (WBAN) is a collection of low-power and lightweight wireless sensor nodes that are used to monitor the human body functions and the surrounding environment. It supports a number of innovative and interesting applications, including ubiquitous healthcare and Consumer Electronics (CE) applications. Since WBAN nodes are used to collect sensitive (life-critical) information and may operate in hostile environments, they require strict security mechanisms to prevent malicious interaction with the system. In this paper, we first highlight major security requirements and Denial of Service (DoS) attacks in WBAN at Physical, Medium Access Control (MAC), Network, and Transport layers. Then we discuss the IEEE 802.15.4 security framework and identify the security vulnerabilities and major attacks in the context of WBAN. Different types of attacks on the Contention Access Period (CAP) and Contention Free Period (CFP) parts of the superframe are analyzed and discussed. It is observed that a smart attacker can successfully corrupt an increasing number of GTS slots in the CFP period and can considerably affect the Quality of Service (QoS) in WBAN (since most of the data is carried in CFP period). As we increase the number of smart attackers the corrupted GTS slots are eventually increased, which prevents the legitimate nodes to utilize the bandwidth efficiently. This means that the direct adaptation of IEEE 802.15.4 security framework for WBAN is not totally secure for certain WBAN applications. New solutions are required to integrate high level security in WBAN. PMID:22319358
Sex differences in discriminative power of volleyball game-related statistics.
João, Paulo Vicente; Leite, Nuno; Mesquita, Isabel; Sampaio, Jaime
2010-12-01
To identify sex differences in volleyball game-related statistics, the game-related statistics of several World Championships in 2007 (N=132) were analyzed using the software VIS from the International Volleyball Federation. Discriminant analysis was used to identify the game-related statistics which better discriminated performances by sex. Analysis yielded an emphasis on fault serves (SC = -.40), shot spikes (SC = .40), and reception digs (SC = .31). Specific robust numbers represent that considerable variability was evident in the game-related statistics profile, as men's volleyball games were better associated with terminal actions (errors of service), and women's volleyball games were characterized by continuous actions (in defense and attack). These differences may be related to the anthropometric and physiological differences between women and men and their influence on performance profiles.
Watermarking textures in video games
NASA Astrophysics Data System (ADS)
Liu, Huajian; Berchtold, Waldemar; Schäfer, Marcel; Lieb, Patrick; Steinebach, Martin
2014-02-01
Digital watermarking is a promising solution to video game piracy. In this paper, based on the analysis of special challenges and requirements in terms of watermarking textures in video games, a novel watermarking scheme for DDS textures in video games is proposed. To meet the performance requirements in video game applications, the proposed algorithm embeds the watermark message directly in the compressed stream in DDS files and can be straightforwardly applied in watermark container technique for real-time embedding. Furthermore, the embedding approach achieves high watermark payload to handle collusion secure fingerprinting codes with extreme length. Hence, the scheme is resistant to collusion attacks, which is indispensable in video game applications. The proposed scheme is evaluated in aspects of transparency, robustness, security and performance. Especially, in addition to classical objective evaluation, the visual quality and playing experience of watermarked games is assessed subjectively in game playing.
A Game Theory Based Solution for Security Challenges in CRNs
NASA Astrophysics Data System (ADS)
Poonam; Nagpal, Chander Kumar
2018-03-01
Cognitive radio networks (CRNs) are being envisioned to drive the next generation Ad hoc wireless networks due to their ability to provide communications resilience in continuously changing environments through the use of dynamic spectrum access. Conventionally CRNs are dependent upon the information gathered by other secondary users to ensure the accuracy of spectrum sensing making them vulnerable to security attacks leading to the need of security mechanisms like cryptography and trust. However, a typical cryptography based solution is not a viable security solution for CRNs owing to their limited resources. Effectiveness of trust based approaches has always been, in question, due to credibility of secondary trust resources. Game theory with its ability to optimize in an environment of conflicting interests can be quite a suitable tool to manage an ad hoc network in the presence of autonomous selfish/malevolent/malicious and attacker nodes. The literature contains several theoretical proposals for augmenting game theory in the ad hoc networks without explicit/detailed implementation. This paper implements a game theory based solution in MATLAB-2015 to secure the CRN environment and compares the obtained results with the traditional approaches of trust and cryptography. The simulation result indicates that as the time progresses the game theory performs much better with higher throughput, lower jitter and better identification of selfish/malicious nodes.
Music as Active Information Resource for Players in Video Games
ERIC Educational Resources Information Center
Nagorsnick, Marian; Martens, Alke
2015-01-01
In modern video games, music can come in different shapes: it can be developed on a very high compositional level, with sophisticated sound elements like in professional film music; it can be developed on a very coarse level, underlying special situations (like danger or attack); it can also be automatically generated by sound engines. However, in…
DOE Office of Scientific and Technical Information (OSTI.GOV)
Abercrombie, Robert K; Schlicher, Bob G
Vulnerability in security of an information system is quantitatively predicted. The information system may receive malicious actions against its security and may receive corrective actions for restoring the security. A game oriented agent based model is constructed in a simulator application. The game ABM model represents security activity in the information system. The game ABM model has two opposing participants including an attacker and a defender, probabilistic game rules and allowable game states. A specified number of simulations are run and a probabilistic number of the plurality of allowable game states are reached in each simulation run. The probability ofmore » reaching a specified game state is unknown prior to running each simulation. Data generated during the game states is collected to determine a probability of one or more aspects of security in the information system.« less
Mezher, Ahmad Mohamad; Igartua, Mónica Aguilar; de la Cruz Llopis, Luis J.; Segarra, Esteve Pallarès; Tripp-Barba, Carolina; Urquiza-Aguiar, Luis; Forné, Jordi; Gargallo, Emilio Sanvicente
2015-01-01
The prevention of accidents is one of the most important goals of ad hoc networks in smart cities. When an accident happens, dynamic sensors (e.g., citizens with smart phones or tablets, smart vehicles and buses, etc.) could shoot a video clip of the accident and send it through the ad hoc network. With a video message, the level of seriousness of the accident could be much better evaluated by the authorities (e.g., health care units, police and ambulance drivers) rather than with just a simple text message. Besides, other citizens would be rapidly aware of the incident. In this way, smart dynamic sensors could participate in reporting a situation in the city using the ad hoc network so it would be possible to have a quick reaction warning citizens and emergency units. The deployment of an efficient routing protocol to manage video-warning messages in mobile Ad hoc Networks (MANETs) has important benefits by allowing a fast warning of the incident, which potentially can save lives. To contribute with this goal, we propose a multipath routing protocol to provide video-warning messages in MANETs using a novel game-theoretical approach. As a base for our work, we start from our previous work, where a 2-players game-theoretical routing protocol was proposed to provide video-streaming services over MANETs. In this article, we further generalize the analysis made for a general number of N players in the MANET. Simulations have been carried out to show the benefits of our proposal, taking into account the mobility of the nodes and the presence of interfering traffic.Finally, we also have tested our approach in a vehicular ad hoc network as an incipient start point to develop a novel proposal specifically designed for VANETs. PMID:25897496
Secoli, R; Zondervan, D; Reinkensmeyer, D
2012-01-01
For children with a severe disability, such as can arise from cerebral palsy, becoming independent in mobility is a critical goal. Currently, however, driver's training for powered wheelchair use is labor intensive, requiring hand-over-hand assistance from a skilled therapist to keep the trainee safe. This paper describes the design of a mixed reality environment for semi-autonomous training of wheelchair driving skills. In this system, the wheelchair is used as the gaming input device, and users train driving skills by maneuvering through floor-projected games created with a multi-projector system and a multi-camera tracking system. A force feedback joystick assists in steering and enhances safety.
Enhanced smartcard-based password-authenticated key agreement using extended chaotic maps.
Lee, Tian-Fu; Hsiao, Chia-Hung; Hwang, Shi-Han; Lin, Tsung-Hung
2017-01-01
A smartcard based password-authenticated key agreement scheme enables a legal user to log in to a remote authentication server and access remote services through public networks using a weak password and a smart card. Lin recently presented an improved chaotic maps-based password-authenticated key agreement scheme that used smartcards to eliminate the weaknesses of the scheme of Guo and Chang, which does not provide strong user anonymity and violates session key security. However, the improved scheme of Lin does not exhibit the freshness property and the validity of messages so it still fails to withstand denial-of-service and privileged-insider attacks. Additionally, a single malicious participant can predetermine the session key such that the improved scheme does not exhibit the contributory property of key agreements. This investigation discusses these weaknesses and proposes an enhanced smartcard-based password-authenticated key agreement scheme that utilizes extended chaotic maps. The session security of this enhanced scheme is based on the extended chaotic map-based Diffie-Hellman problem, and is proven in the real-or-random and the sequence of games models. Moreover, the enhanced scheme ensures the freshness of communicating messages by appending timestamps, and thereby avoids the weaknesses in previous schemes.
Enhanced smartcard-based password-authenticated key agreement using extended chaotic maps
Lee, Tian-Fu; Hsiao, Chia-Hung; Hwang, Shi-Han
2017-01-01
A smartcard based password-authenticated key agreement scheme enables a legal user to log in to a remote authentication server and access remote services through public networks using a weak password and a smart card. Lin recently presented an improved chaotic maps-based password-authenticated key agreement scheme that used smartcards to eliminate the weaknesses of the scheme of Guo and Chang, which does not provide strong user anonymity and violates session key security. However, the improved scheme of Lin does not exhibit the freshness property and the validity of messages so it still fails to withstand denial-of-service and privileged-insider attacks. Additionally, a single malicious participant can predetermine the session key such that the improved scheme does not exhibit the contributory property of key agreements. This investigation discusses these weaknesses and proposes an enhanced smartcard-based password-authenticated key agreement scheme that utilizes extended chaotic maps. The session security of this enhanced scheme is based on the extended chaotic map-based Diffie-Hellman problem, and is proven in the real-or-random and the sequence of games models. Moreover, the enhanced scheme ensures the freshness of communicating messages by appending timestamps, and thereby avoids the weaknesses in previous schemes. PMID:28759615
Enhancing robustness of interdependent network by adding connectivity and dependence links
NASA Astrophysics Data System (ADS)
Cui, Pengshuai; Zhu, Peidong; Wang, Ke; Xun, Peng; Xia, Zhuoqun
2018-05-01
Enhancing robustness of interdependent networks by adding connectivity links has been researched extensively, however, few of them are focusing on adding both connectivity and dependence links to enhance robustness. In this paper, we aim to study how to allocate the limited costs reasonably to add both connectivity and dependence links. Firstly, we divide the attackers into stubborn attackers and smart attackers according to whether would they change their attack modes with the changing of network structure; Then by simulations, link addition strategies are given separately according to different attackers, with which we can allocate the limited costs to add connectivity links and dependence links reasonably and achieve more robustness than only adding connectivity links or dependence links. The results show that compared to only adding connectivity links or dependence links, allocating the limited resources reasonably and adding both connectivity links and dependence links could bring more robustness to the interdependent networks.
Xie, Qi; Liu, Wenhao; Wang, Shengbao; Han, Lidong; Hu, Bin; Wu, Ting
2014-09-01
Patient's privacy-preserving, security and mutual authentication between patient and the medical server are the important mechanism in connected health care applications, such as telecare medical information systems and personally controlled health records systems. In 2013, Wen showed that Das et al.'s scheme is vulnerable to the replay attack, user impersonation attacks and off-line guessing attacks, and then proposed an improved scheme using biometrics, password and smart card to overcome these weaknesses. However, we show that Wen's scheme is still vulnerable to off-line password guessing attacks, does not provide user's anonymity and perfect forward secrecy. Further, we propose an improved scheme to fix these weaknesses, and use the applied pi calculus based formal verification tool ProVerif to prove the security and authentication.
Which skills and factors better predict winning and losing in high-level men's volleyball?
Peña, Javier; Rodríguez-Guerra, Jorge; Buscà, Bernat; Serra, Núria
2013-09-01
The aim of this study was to determine which skills and factors better predicted the outcomes of regular season volleyball matches in the Spanish "Superliga" and were significant for obtaining positive results in the game. The study sample consisted of 125 matches played during the 2010-11 Spanish men's first division volleyball championship. Matches were played by 12 teams composed of 148 players from 17 different nations from October 2010 to March 2011. The variables analyzed were the result of the game, team category, home/away court factors, points obtained in the break point phase, number of service errors, number of service aces, number of reception errors, percentage of positive receptions, percentage of perfect receptions, reception efficiency, number of attack errors, number of blocked attacks, attack points, percentage of attack points, attack efficiency, and number of blocks performed by both teams participating in the match. The results showed that the variables of team category, points obtained in the break point phase, number of reception errors, and number of blocked attacks by the opponent were significant predictors of winning or losing the matches. Odds ratios indicated that the odds of winning a volleyball match were 6.7 times greater for the teams belonging to higher rankings and that every additional point in Complex II increased the odds of winning a match by 1.5 times. Every reception and blocked ball error decreased the possibility of winning by 0.6 and 0.7 times, respectively.
Quantification and Analysis of Offensive Situations in Different Formats of Sided Games In Soccer
Garcia, Jorge Diaz-Cidoncha; Román, Ignacio Refoyo; Calleja-González, Julio; Dellal, Alexandre
2014-01-01
There has been a lot of research that enabled soccer to improve: its technique, tactics and strategy through analysis and training. Nevertheless, players’ need to interact with each other turns any defending or attacking situation into complex solutions with a wide range of variables to be considered, in which the player is never isolated and must make the move that has the most positive impact on play. Fifty-four sided games played in three different formats (5v5, 7v7 and 9v9) and with two age groups (U9 and U14) were filmed at three soccer clubs in Spain in order to identify the most relevant attacking moves, from a technical and tactical perspective. This study used the observational method; it is descriptive and is applied through well-prepared systematic quantitative observation in a natural environment. A key part of the method involved viewing the match recordings and logging moves that had been categorised beforehand. Cohen’s Kappa analysis showed that the results for the most representative variables presented a substantial degree of concordance (0.61–0.80). The results show that there were significant variations depending on the game format, and the following study will present a description and analysis of the aspects that had considerable influence on attacking moves in different formats of sided games (5v5, 7v7 and 9v9). The study also presents various practical applications for the area of training and analysing both youth and professional soccer. PMID:25713680
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sadi, Mohammad A. H.; Dasgupta, Dipankar; Ali, Mohammad Hassan
The important backbone of the smart grid is the cyber/information infrastructure, which is primarily used to communicate with different grid components. A smart grid is a complex cyber physical system containing a numerous and variety number of sources, devices, controllers and loads. Therefore, the smart grid is vulnerable to grid related disturbances. For such dynamic system, disturbance and intrusion detection is a paramount issue. This paper presents a Simulink and Opnet based co-simulated platform to carry out a cyber-intrusion in cyber network for modern power systems and the smart grid. The IEEE 30 bus power system model is used tomore » demonstrate the effectiveness of the simulated testbed. The experiments were performed by disturbing the circuit breakers reclosing time through a cyber-attack. Different disturbance situations in the considered test system are considered and the results indicate the effectiveness of the proposed co-simulated scheme.« less
DCT-based cyber defense techniques
NASA Astrophysics Data System (ADS)
Amsalem, Yaron; Puzanov, Anton; Bedinerman, Anton; Kutcher, Maxim; Hadar, Ofer
2015-09-01
With the increasing popularity of video streaming services and multimedia sharing via social networks, there is a need to protect the multimedia from malicious use. An attacker may use steganography and watermarking techniques to embed malicious content, in order to attack the end user. Most of the attack algorithms are robust to basic image processing techniques such as filtering, compression, noise addition, etc. Hence, in this article two novel, real-time, defense techniques are proposed: Smart threshold and anomaly correction. Both techniques operate at the DCT domain, and are applicable for JPEG images and H.264 I-Frames. The defense performance was evaluated against a highly robust attack, and the perceptual quality degradation was measured by the well-known PSNR and SSIM quality assessment metrics. A set of defense techniques is suggested for improving the defense efficiency. For the most aggressive attack configuration, the combination of all the defense techniques results in 80% protection against cyber-attacks with PSNR of 25.74 db.
Privacy-Preserving Authentication of Users with Smart Cards Using One-Time Credentials
NASA Astrophysics Data System (ADS)
Park, Jun-Cheol
User privacy preservation is critical to prevent many sophisticated attacks that are based on the user's server access patterns and ID-related information. We propose a password-based user authentication scheme that provides strong privacy protection using one-time credentials. It eliminates the possibility of tracing a user's authentication history and hides the user's ID and password even from servers. In addition, it is resistant against user impersonation even if both a server's verification database and a user's smart card storage are disclosed. We also provide a revocation scheme for a user to promptly invalidate the user's credentials on a server when the user's smart card is compromised. The schemes use lightweight operations only such as computing hashes and bitwise XORs.
Quantification of uncertainties in the performance of smart composite structures
NASA Technical Reports Server (NTRS)
Shiao, Michael C.; Chamis, Christos C.
1993-01-01
A composite wing with spars, bulkheads, and built-in control devices is evaluated using a method for the probabilistic assessment of smart composite structures. Structural responses (such as change in angle of attack, vertical displacements, and stresses in regular plies with traditional materials and in control plies with mixed traditional and actuation materials) are probabilistically assessed to quantify their respective scatter. Probabilistic sensitivity factors are computed to identify those parameters that have a significant influence on a specific structural response. Results show that the uncertainties in the responses of smart composite structures can be quantified. Responses such as structural deformation, ply stresses, frequencies, and buckling loads in the presence of defects can be reliably controlled to satisfy specified design requirements.
From Secure Memories to Smart Card Security
NASA Astrophysics Data System (ADS)
Handschuh, Helena; Trichina, Elena
Non-volatile memory is essential in most embedded security applications. It will store the key and other sensitive materials for cryptographic and security applications. In this chapter, first an overview is given of current flash memory architectures. Next the standard security features which form the basis of so-called secure memories are described in more detail. Smart cards are a typical embedded application that is very vulnerable to attacks and that at the same time has a high need for secure non-volatile memory. In the next part of this chapter, the secure memories of so-called flash-based high-density smart cards are described. It is followed by a detailed analysis of what the new security challenges for such objects are.
Evaluation of Game Performance in Elite Male Sitting Volleyball Players.
Molik, Bartosz; Morgulec-Adamowicz, Natalia; Marszałek, Jolanta; Kosmol, Andrzej; Rutkowska, Izabela; Jakubicka, Alicja; Kaliszewska, Ewelina; Kozłowski, Robert; Kurowska, Monika; Ploch, Elwira; Mustafins, Pavel; Gómez, Miguel-Ángel
2017-04-01
The aims of the current study were (a) to analyze the differences in game performances of sitting volleyball athletes representing the different types of disabilities and (b) to assess whether the seated position vertical reach is one of the crucial factors in the game performance level of sitting volleyball athletes. One hundred male athletes from various national teams participating in the European Championships in Sitting Volleyball (2009) took part in this study. The athletes were categorized according to type of disability and the results of the vertical reach in a seated position. Thirtysix games were analyzed using the Game Performance Sheet for Sitting Volleyball. Twenty-three game performance parameters were studied. In addition, the sum and effectiveness of attacks, blocks, block services, services, ball receiving, and defensive actions were calculated. The main results indicated significant differences between athletes with minimal disability and athletes with single amputations from above the knee in the level of defensive performances and the summation of defensive actions. There was also a significant difference between athletes in relation to their vertical reach during activity and attacking actions, blocks, and ball receiving. In addition, there were strong relationships between the players' vertical reach scores and their activity and effectiveness in sitting volleyball. In conclusion, the accuracy of the World Organization Volleyball for Disabled classification systems for sitting volleyball players was confirmed. There is a strong relationship between players' vertical reach and their effectiveness in sitting volleyball.
Smart Device Use and Perceived Physical and Psychosocial Outcomes among Hong Kong Adolescents
Kwok, Stephen Wai Hang; Lee, Paul Hong; Lee, Regina Lai Tong
2017-01-01
Excessive electronic screen-based activities have been found to be associated with negative outcomes. The aim of this study was to investigate the prevalences and patterns of smart device activities and the purposes and perceived outcomes related to smart device use, and the differences in patterns of smart device activities between adolescents who did and did not perceive these outcomes. The study was a cross-sectional survey of Hong Kong primary and secondary school students. Demographic characteristics, purpose and pattern of the activities, and frequencies of the outcomes were measured. Data from 960 adolescents aged 10–19 were analyzed. Nearly 86% of the sample use smart device daily. The one-week prevalence of perceived sleep deprivation, eye discomfort, musculoskeletal discomfort, family conflict and cyberbullying victimization related to smart device use were nearly 50%, 45%, 40%, 20% and 5% respectively. More than 25% of the respondents were at risk of negative outcomes related to smart device activities for more than 1 h per day, browsing and gaming on at least 4 days per week and watching TV/movies and posting on more than 2 days per week. Their patterns of smart device activities may put a significant number of them at risk of negative outcomes. PMID:28218719
Jung, Jaewook; Kim, Jiye; Choi, Younsung; Won, Dongho
2016-01-01
In wireless sensor networks (WSNs), a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et al. proposed a secure user authentication scheme using symmetric key techniques for WSNs. They claim that their scheme assures high efficiency and security against different types of attacks. After careful analysis, however, we find that Chen et al.’s scheme is still vulnerable to smart card loss attack and is susceptible to denial of service attack, since it is invalid for verification to simply compare an entered ID and a stored ID in smart card. In addition, we also observe that their scheme cannot preserve user anonymity. Furthermore, their scheme cannot quickly detect an incorrect password during login phase, and this flaw wastes both communication and computational overheads. In this paper, we describe how these attacks work, and propose an enhanced anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in WSNs to address all of the aforementioned vulnerabilities in Chen et al.’s scheme. Our analysis shows that the proposed scheme improves the level of security, and is also more efficient relative to other related schemes. PMID:27537890
DOE Office of Scientific and Technical Information (OSTI.GOV)
Almajali, Anas; Rice, Eric; Viswanathan, Arun
This paper presents a systems analysis approach to characterizing the risk of a Smart Grid to a load-drop attack. A characterization of the risk is necessary for the design of detection and remediation strategies to address the consequences of such attacks. Using concepts from systems health management and system engineering, this work (a) first identifies metrics that can be used to generate constraints for security features, and (b) lays out an end-to-end integrated methodology using separate network and power simulations to assess system risk. We demonstrate our approach by performing a systems-style analysis of a load-drop attack implemented over themore » AMI subsystem and targeted at destabilizing the underlying power grid.« less
Representation of Cultural Role-Play for Training
NASA Technical Reports Server (NTRS)
Santarelli, Thomas; Pepe, Aaron; Rosenzweiz, Larry; Paulus, John; Yi, Ahn Na
2010-01-01
The Department of Defense (000) has successfully applied a number of methods for cultural familiarization training ranging from stand-up classroom training, to face-to-face live role-play, to so-called smart-cards. Recent interest has turned to the use of single and mUlti-player gaming technologies to augment these traditional methods of cultural familiarization. One such system, termed CulturePad, has been designed as a game-based role-play environment suitable for use in training and experimentation involving cultural roleplay scenarios. This paper describes the initial CulturePad effort focused on a literature review regarding the use of role-play for cultural training and a feasibility assessment of using a game-mediated environment for role-play. A small-scale pilot involving cultural experts was conducted to collect qualitative behavioral data comparing live role-play to game-mediated role-play in a multiplayer gaming engine.
A Testbed Environment for Buildings-to-Grid Cyber Resilience Research and Development
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sridhar, Siddharth; Ashok, Aditya; Mylrea, Michael E.
The Smart Grid is characterized by the proliferation of advanced digital controllers at all levels of its operational hierarchy from generation to end consumption. Such controllers within modern residential and commercial buildings enable grid operators to exercise fine-grained control over energy consumption through several emerging Buildings-to-Grid (B2G) applications. Though this capability promises significant benefits in terms of operational economics and improved reliability, cybersecurity weaknesses in the supporting infrastructure could be exploited to cause a detrimental effect and this necessitates focused research efforts on two fronts. First, the understanding of how cyber attacks in the B2G space could impact grid reliabilitymore » and to what extent. Second, the development and validation of cyber-physical application-specific countermeasures that are complementary to traditional infrastructure cybersecurity mechanisms for enhanced cyber attack detection and mitigation. The PNNL B2G testbed is currently being developed to address these core research needs. Specifically, the B2G testbed combines high-fidelity buildings+grid simulators, industry-grade building automation and Supervisory Control and Data Acquisition (SCADA) systems in an integrated, realistic, and reconfigurable environment capable of supporting attack-impact-detection-mitigation experimentation. In this paper, we articulate the need for research testbeds to model various B2G applications broadly by looking at the end-to-end operational hierarchy of the Smart Grid. Finally, the paper not only describes the architecture of the B2G testbed in detail, but also addresses the broad spectrum of B2G resilience research it is capable of supporting based on the smart grid operational hierarchy identified earlier.« less
Game Theory for Proactive Dynamic Defense and Attack Mitigation in Cyber-Physical Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Letchford, Joshua
While there has been a great deal of security research focused on preventing attacks, there has been less work on how one should balance security and resilience investments. In this work we developed and evaluated models that captured both explicit defenses and other mitigations that reduce the impact of attacks. We examined these issues both in more broadly applicable general Stackelberg models and in more specific network and power grid settings. Finally, we compared these solutions to existing work in terms of both solution quality and computational overhead.
NASA Astrophysics Data System (ADS)
Loginov, E. L.; Raikov, A. N.
2015-04-01
The most large-scale accidents occurred as a consequence of network information attacks on the control systems of power facilities belonging to the United States' critical infrastructure are analyzed in the context of possibilities available in modern decision support systems. Trends in the development of technologies for inflicting damage to smart grids are formulated. A volume matrix of parameters characterizing attacks on facilities is constructed. A model describing the performance of a critical infrastructure's control system after an attack is developed. The recently adopted measures and legislation acts aimed at achieving more efficient protection of critical infrastructure are considered. Approaches to cognitive modeling and networked expertise of intricate situations for supporting the decision-making process, and to setting up a system of indicators for anticipatory monitoring of critical infrastructure are proposed.
Assessing the Use of Game-Based Exercises in the Staff Attack-the-Network Course
2015-06-01
B-1 vi CONTENTS (continued) Page LIST OF FIGURES FIGURE 1. EDGE PLAYER AVATAR ...players to control an in-game avatar (see Figure 1), navigate terrain, and use vehicles, 3 equipment, and tools for a variety of social-cultural task... Avatar . Figure 2. EDGE Operational Environment. Method The basic methodology consisted of collecting pre-test and post-test knowledge
Power systems and requirements for the integration of smart structures into aircraft
NASA Astrophysics Data System (ADS)
Lockyer, Allen J.; Martin, Christopher A.; Lindner, Douglas K.; Walia, Paramjit S.
2002-07-01
Electrical power distribution for recently developed smart actuators becomes an important air-vehicle challenge if projected smart actuation benefits are to be met. Among the items under development are variable shape inlets and control surfaces that utilize shape memory alloys (SMA); full span, chord-wise and span-wise contouring trailing control surfaces that use SMA or piezoelectric materials for actuation; and other strain-based actuators for buffet load alleviation, flutter suppression and flow control. At first glance, such technologies afford overall vehicle performance improvement, however, integration system impacts have yet to be determined or quantified. Power systems to support smart structures initiatives are the focus of the current paper. The paper has been organized into five main topics for further discussion: (1) air-vehicle power system architectures - standard and advanced distribution concepts for actuators, (2) smart wing actuator power requirements and results - highlighting wind tunnel power measurements from shape memory alloy and piezoelectric ultrasonic motor actuated control surfaces and different dynamic pressure and angle of attack; (3) vehicle electromagnetic effects (EME) issues, (4) power supply design considerations for smart actuators - featuring the aircraft power and actuator interface, and (5) summary and conclusions.
Schwarz, Ayla; DeSmet, Ann; Cardon, Greet; Chastin, Sebastien; Costa, Ruben; Grilo, António; Ferri, Josue; Domenech, Jorge; Stragier, Jeroen
2018-04-24
Exergames, more specifically console-based exergames, are generally enjoyed by adolescents and known to increase physical activity. Nevertheless, they have a reduced usage over time and demonstrate little effectiveness over the long term. In order to increase playing time, mobile exergames may increase potential playing time, but need to be engaging and integrated in everyday life. The goal of the present study was to examine the context of gameplay for mobile exergaming in adolescents’ everyday life to inform game design and the integration of gameplay into everyday life. Eight focus groups were conducted with 49 Flemish adolescents (11 to 17 years of age). The focus groups were audiotaped, transcribed, and analyzed by means of thematic analysis via Nvivo 11 software (QSR International Pty Ltd., Victoria, Australia). The adolescents indicated leisure time and travel time to and from school as suitable timeframes for playing a mobile exergame. Outdoor gameplay should be restricted to the personal living environment of adolescents. Besides outdoor locations, the game should also be adaptable to at-home activities. Activities could vary from running outside to fitness exercises inside. Furthermore, the social context of the game was important, e.g., playing in teams or meeting at (virtual) meeting points. Physical activity tracking via smart clothing was identified as a motivator for gameplay. By means of this study, game developers may be better equipped to develop mobile exergames that embed gameplay in adolescents’ everyday life.
Chastin, Sebastien; Costa, Ruben; Grilo, António; Ferri, Josue; Domenech, Jorge; Stragier, Jeroen
2018-01-01
Exergames, more specifically console-based exergames, are generally enjoyed by adolescents and known to increase physical activity. Nevertheless, they have a reduced usage over time and demonstrate little effectiveness over the long term. In order to increase playing time, mobile exergames may increase potential playing time, but need to be engaging and integrated in everyday life. The goal of the present study was to examine the context of gameplay for mobile exergaming in adolescents’ everyday life to inform game design and the integration of gameplay into everyday life. Eight focus groups were conducted with 49 Flemish adolescents (11 to 17 years of age). The focus groups were audiotaped, transcribed, and analyzed by means of thematic analysis via Nvivo 11 software (QSR International Pty Ltd., Victoria, Australia). The adolescents indicated leisure time and travel time to and from school as suitable timeframes for playing a mobile exergame. Outdoor gameplay should be restricted to the personal living environment of adolescents. Besides outdoor locations, the game should also be adaptable to at-home activities. Activities could vary from running outside to fitness exercises inside. Furthermore, the social context of the game was important, e.g., playing in teams or meeting at (virtual) meeting points. Physical activity tracking via smart clothing was identified as a motivator for gameplay. By means of this study, game developers may be better equipped to develop mobile exergames that embed gameplay in adolescents’ everyday life. PMID:29695069
A game-theoretic method for cross-layer stochastic resilient control design in CPS
NASA Astrophysics Data System (ADS)
Shen, Jiajun; Feng, Dongqin
2018-03-01
In this paper, the cross-layer security problem of cyber-physical system (CPS) is investigated from the game-theoretic perspective. Physical dynamics of plant is captured by stochastic differential game with cyber-physical influence being considered. The sufficient and necessary condition for the existence of state-feedback equilibrium strategies is given. The attack-defence cyber interactions are formulated by a Stackelberg game intertwined with stochastic differential game in physical layer. The condition such that the Stackelberg equilibrium being unique and the corresponding analytical solutions are both provided. An algorithm is proposed for obtaining hierarchical security strategy by solving coupled games, which ensures the operational normalcy and cyber security of CPS subject to uncertain disturbance and unexpected cyberattacks. Simulation results are given to show the effectiveness and performance of the proposed algorithm.
Castellano, Julen; Silva, Pedro; Usabiaga, Oidui; Barreira, Daniel
2016-06-01
The effect of altered game formats on team performances during soccer practice can be harnessed by coaches to stimulate specific tactical behaviours. The aim of the present study was to analyse the influence of using (i) small goals [SG], (ii) goalkeepers [7G] and (iii) floaters [7GF] on the dispersion, shape and available space of teams during small-sided games (SSGs). Twenty-four male soccer players were distributed into four teams composed of five players, two goalkeepers and two floaters that performed six SSG bouts of 6 min, interspersed with 6 min of passive recovery. Offensive and defensive phases were also analysed separately in order to verify the preservation of basic principles of attacking (teams more stretched to create free space) and defending (teams more compact to tie-up space) during SSGs. The variables used to characterize the collective behaviour were: length [L], width [W], team shape [Sh], and team separateness [TS]. Results revealed that the teams showed different collective behaviours depending on SSG format and a playing phase: a) L and W were higher in attack than in defence in all SSGs; b) team shapes were more elongated in defence in all SSGs except SG; c) the space separating players from their closest opponents (TS) was shorter in 7G; and d) SG and 7GF elicited greater defensive openness due to increased team width. The results suggest that manipulating task constraints, such as goal size, presence or absence of goalkeepers and floaters can be harnessed by coaches to shape distinct team tactical behaviours in SSGs while preserving the basic principles of attacking and defending.
Silva, Pedro; Usabiaga, Oidui; Barreira, Daniel
2016-01-01
Abstract The effect of altered game formats on team performances during soccer practice can be harnessed by coaches to stimulate specific tactical behaviours. The aim of the present study was to analyse the influence of using (i) small goals [SG], (ii) goalkeepers [7G] and (iii) floaters [7GF] on the dispersion, shape and available space of teams during small-sided games (SSGs). Twenty-four male soccer players were distributed into four teams composed of five players, two goalkeepers and two floaters that performed six SSG bouts of 6 min, interspersed with 6 min of passive recovery. Offensive and defensive phases were also analysed separately in order to verify the preservation of basic principles of attacking (teams more stretched to create free space) and defending (teams more compact to tie-up space) during SSGs. The variables used to characterize the collective behaviour were: length [L], width [W], team shape [Sh], and team separateness [TS]. Results revealed that the teams showed different collective behaviours depending on SSG format and a playing phase: a) L and W were higher in attack than in defence in all SSGs; b) team shapes were more elongated in defence in all SSGs except SG; c) the space separating players from their closest opponents (TS) was shorter in 7G; and d) SG and 7GF elicited greater defensive openness due to increased team width. The results suggest that manipulating task constraints, such as goal size, presence or absence of goalkeepers and floaters can be harnessed by coaches to shape distinct team tactical behaviours in SSGs while preserving the basic principles of attacking and defending. PMID:28149378
An Optimal Method for Detecting Internal and External Intrusion in MANET
NASA Astrophysics Data System (ADS)
Rafsanjani, Marjan Kuchaki; Aliahmadipour, Laya; Javidi, Mohammad M.
Mobile Ad hoc Network (MANET) is formed by a set of mobile hosts which communicate among themselves through radio waves. The hosts establish infrastructure and cooperate to forward data in a multi-hop fashion without a central administration. Due to their communication type and resources constraint, MANETs are vulnerable to diverse types of attacks and intrusions. In this paper, we proposed a method for prevention internal intruder and detection external intruder by using game theory in mobile ad hoc network. One optimal solution for reducing the resource consumption of detection external intruder is to elect a leader for each cluster to provide intrusion service to other nodes in the its cluster, we call this mode moderate mode. Moderate mode is only suitable when the probability of attack is low. Once the probability of attack is high, victim nodes should launch their own IDS to detect and thwart intrusions and we call robust mode. In this paper leader should not be malicious or selfish node and must detect external intrusion in its cluster with minimum cost. Our proposed method has three steps: the first step building trust relationship between nodes and estimation trust value for each node to prevent internal intrusion. In the second step we propose an optimal method for leader election by using trust value; and in the third step, finding the threshold value for notifying the victim node to launch its IDS once the probability of attack exceeds that value. In first and third step we apply Bayesian game theory. Our method due to using game theory, trust value and honest leader can effectively improve the network security, performance and reduce resource consumption.
DARPA/AFRL/NASA Smart Wing Second Wind Tunnel Test Results
NASA Technical Reports Server (NTRS)
Scherer, L. B.; Martin, C. A.; West, M.; Florance, J. P.; Wieseman, C. D.; Burner, A. W.; Fleming, G. A.
2001-01-01
To quantify the benefits of smart materials and structures adaptive wing technology, Northrop Grumman Corp. (NGC) built and tested two 16% scale wind tunnel models (a conventional and a "smart" model) of a fighter/attack aircraft under the DARPA/AFRL/NASA Smart Materials and Structures Development - Smart Wing Phase 1. Performance gains quantified included increased pitching moment (C(sub M)), increased rolling moment (C(subl)) and improved pressure distribution. The benefits were obtained for hingeless, contoured trailing edge control surfaces with embedded shape memory alloy (SMA) wires and spanwise wing twist effected by SMA torque tube mechanisms, compared to conventional hinged control surfaces. This paper presents an overview of the results from the second wind tunnel test performed at the NASA Langley Research Center s (LaRC) 16ft Transonic Dynamic Tunnel (TDT) in June 1998. Successful results obtained were: 1) 5 degrees of spanwise twist and 8-12% increase in rolling moment utilizing a single SMA torque tube, 2) 12 degrees of deflection, and 10% increase in rolling moment due to hingeless, contoured aileron, and 3) demonstration of optical techniques for measuring spanwise twist and deflected shape.
Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes
2018-01-01
The Internet of Things (IoT) is an emerging paradigm focusing on the connection of devices, objects, or “things” to each other, to the Internet, and to users. IoT technology is anticipated to become an essential requirement in the development of smart homes, as it offers convenience and efficiency to home residents so that they can achieve better quality of life. Application of the IoT model to smart homes, by connecting objects to the Internet, poses new security and privacy challenges in terms of the confidentiality, authenticity, and integrity of the data sensed, collected, and exchanged by the IoT objects. These challenges make smart homes extremely vulnerable to different types of security attacks, resulting in IoT-based smart homes being insecure. Therefore, it is necessary to identify the possible security risks to develop a complete picture of the security status of smart homes. This article applies the operationally critical threat, asset, and vulnerability evaluation (OCTAVE) methodology, known as OCTAVE Allegro, to assess the security risks of smart homes. The OCTAVE Allegro method focuses on information assets and considers different information containers such as databases, physical papers, and humans. The key goals of this study are to highlight the various security vulnerabilities of IoT-based smart homes, to present the risks on home inhabitants, and to propose approaches to mitigating the identified risks. The research findings can be used as a foundation for improving the security requirements of IoT-based smart homes. PMID:29518023
Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes.
Ali, Bako; Awad, Ali Ismail
2018-03-08
The Internet of Things (IoT) is an emerging paradigm focusing on the connection of devices, objects, or "things" to each other, to the Internet, and to users. IoT technology is anticipated to become an essential requirement in the development of smart homes, as it offers convenience and efficiency to home residents so that they can achieve better quality of life. Application of the IoT model to smart homes, by connecting objects to the Internet, poses new security and privacy challenges in terms of the confidentiality, authenticity, and integrity of the data sensed, collected, and exchanged by the IoT objects. These challenges make smart homes extremely vulnerable to different types of security attacks, resulting in IoT-based smart homes being insecure. Therefore, it is necessary to identify the possible security risks to develop a complete picture of the security status of smart homes. This article applies the operationally critical threat, asset, and vulnerability evaluation (OCTAVE) methodology, known as OCTAVE Allegro, to assess the security risks of smart homes. The OCTAVE Allegro method focuses on information assets and considers different information containers such as databases, physical papers, and humans. The key goals of this study are to highlight the various security vulnerabilities of IoT-based smart homes, to present the risks on home inhabitants, and to propose approaches to mitigating the identified risks. The research findings can be used as a foundation for improving the security requirements of IoT-based smart homes.
The contribution of collective attack tactics in differentiating handball score efficiency.
Rogulj, Nenad; Srhoj, Vatromir; Srhoj, Ljerka
2004-12-01
The prevalence of 19 elements of collective tactics in score efficient and score inefficient teams was analyzed in 90 First Croatian Handball League--Men games during the 1998-1999 season. Prediction variables were used to describe duration, continuity, system, organization and spatial direction of attacks. Analysis of the basic descriptive and distribution statistical parameters revealed normal distribution of all variables and possibility to use multivariate methods. Canonic discrimination analysis and analysis of variance showed the use of collective tactics elements on attacks to differ statistically significantly between the winning and losing teams. Counter-attacks and uninterrupted attacks predominate in winning teams. Other types of attacks such as long position attack, multiply interrupted attack, attack with one circle runner attack player/pivot, attack based on basic principles, attack based on group cooperation, attack based on independent action, attack based on group maneuvering, rightward directed attack and leftward directed attack predominate in losing teams. Winning teams were found to be clearly characterized by quick attacks against unorganized defense, whereas prolonged, interrupted position attacks against organized defense along with frequent and diverse tactical actions were characteristic of losing teams. The choice and frequency of using a particular tactical activity in position attack do not warrant score efficiency but usually are consequential to the limited anthropologic potential and low level of individual technical-tactical skills of the players in low-quality teams.
A robust anonymous biometric-based authenticated key agreement scheme for multi-server environments
Huang, Yuanfei; Ma, Fangchao
2017-01-01
In order to improve the security in remote authentication systems, numerous biometric-based authentication schemes using smart cards have been proposed. Recently, Moon et al. presented an authentication scheme to remedy the flaws of Lu et al.’s scheme, and claimed that their improved protocol supports the required security properties. Unfortunately, we found that Moon et al.’s scheme still has weaknesses. In this paper, we show that Moon et al.’s scheme is vulnerable to insider attack, server spoofing attack, user impersonation attack and guessing attack. Furthermore, we propose a robust anonymous multi-server authentication scheme using public key encryption to remove the aforementioned problems. From the subsequent formal and informal security analysis, we demonstrate that our proposed scheme provides strong mutual authentication and satisfies the desirable security requirements. The functional and performance analysis shows that the improved scheme has the best secure functionality and is computational efficient. PMID:29121050
A robust anonymous biometric-based authenticated key agreement scheme for multi-server environments.
Guo, Hua; Wang, Pei; Zhang, Xiyong; Huang, Yuanfei; Ma, Fangchao
2017-01-01
In order to improve the security in remote authentication systems, numerous biometric-based authentication schemes using smart cards have been proposed. Recently, Moon et al. presented an authentication scheme to remedy the flaws of Lu et al.'s scheme, and claimed that their improved protocol supports the required security properties. Unfortunately, we found that Moon et al.'s scheme still has weaknesses. In this paper, we show that Moon et al.'s scheme is vulnerable to insider attack, server spoofing attack, user impersonation attack and guessing attack. Furthermore, we propose a robust anonymous multi-server authentication scheme using public key encryption to remove the aforementioned problems. From the subsequent formal and informal security analysis, we demonstrate that our proposed scheme provides strong mutual authentication and satisfies the desirable security requirements. The functional and performance analysis shows that the improved scheme has the best secure functionality and is computational efficient.
A Combat Gaming Method for Tank Platoon Leader Training: TRAX 1
1985-09-01
COVERED A COMBAT GAMING METHOD FOR TANK PLATOON LEADER October 1983-October 1984 TRAINING: TRAX I T PERFORMING ORG. REPORT NUMBER 7. AUTHOR(o) S. CONTRACT ...AirLand Battle. Armor, July-August, 5-6. Furlong, M.D. (1984). Fighting smart at the National Training Center. Armor, May-June, 26-32. Henricksen, K...13. Qross H+9 f57372 *1TP Task p 6-2 &coke drifts oer rute MIK . Cnical 1. 1emain in M)pp-4 Inst/Ctlr denies bypass. Cards Contaminated 2. qest bypass
Vulnerability of water supply systems to cyber-physical attacks
NASA Astrophysics Data System (ADS)
Galelli, Stefano; Taormina, Riccardo; Tippenhauer, Nils; Salomons, Elad; Ostfeld, Avi
2016-04-01
The adoption of smart meters, distributed sensor networks and industrial control systems has largely improved the level of service provided by modern water supply systems. Yet, the progressive computerization exposes these critical infrastructures to cyber-physical attacks, which are generally aimed at stealing critical information (cyber-espionage) or causing service disruption (denial-of-service). Recent statistics show that water and power utilities are undergoing frequent attacks - such as the December power outage in Ukraine - , attracting the interest of operators and security agencies. Taking the security of Water Distribution Networks (WDNs) as domain of study, our work seeks to characterize the vulnerability of WDNs to cyber-physical attacks, so as to conceive adequate defense mechanisms. We extend the functionality of EPANET, which models hydraulic and water quality processes in pressurized pipe networks, to include a cyber layer vulnerable to repeated attacks. Simulation results on a medium-scale network show that several hydraulic actuators (valves and pumps, for example) can be easily attacked, causing both service disruption - i.e., water spillage and loss of pressure - and structural damages - e.g., pipes burst. Our work highlights the need for adequate countermeasures, such as attacks detection and reactive control systems.
The effects of extinction-aroused attention on context conditioning.
Nelson, James Byron; Fabiano, Andrew M; Lamoureux, Jeffrey A
2018-04-01
Two experiments assessed the effects of extinguishing a conditioned cue on subsequent context conditioning. Each experiment used a different video-game method where sensors predicted attacking spaceships and participants responded to the sensor in a way that prepared them for the upcoming attack. In Experiment 1 extinction of a cue which signaled a spaceship-attack outcome facilitated subsequent learning when the attack occurred unsignaled. In Experiment 2 extinction of a cue facilitated subsequent learning, regardless of whether the spaceship outcome was the same or different as used in the earlier training. In neither experiment did the extinction context become inhibitory. Results are discussed in terms of current associative theories of attention and conditioning. © 2018 Nelson et al.; Published by Cold Spring Harbor Laboratory Press.
Cyber-Physical System Security of Smart Grids
DOE Office of Scientific and Technical Information (OSTI.GOV)
Dagle, Jeffery E.
2012-01-31
Abstract—This panel presentation will provide perspectives of cyber-physical system security of smart grids. As smart grid technologies are deployed, the interconnected nature of these systems is becoming more prevalent and more complex, and the cyber component of this cyber-physical system is increasing in importance. Studying system behavior in the face of failures (e.g., cyber attacks) allows a characterization of the systems’ response to failure scenarios, loss of communications, and other changes in system environment (such as the need for emergent updates and rapid reconfiguration). The impact of such failures on the availability of the system can be assessed and mitigationmore » strategies considered. Scenarios associated with confidentiality, integrity, and availability are considered. The cyber security implications associated with the American Recovery and Reinvestment Act of 2009 in the United States are discussed.« less
USDA-ARS?s Scientific Manuscript database
Higher levels of vegetable intake have been associated with decreased risks of heart disease, diabetes, stroke, several cancers, and possibly obesity, but vegetable intake is generally low. Preference is an important determinant of vegetable intake, and food preferences are initiated early in life, ...
Teaching Management System with Applications of RFID and IoT Technology
ERIC Educational Resources Information Center
Tan, Ping; Wu, Han; Li, Peng; Xu, He
2018-01-01
Currently, Internet of Things (IoT) technologies are used in many areas, such as intelligent transportation, smart city, hospital, games, education. Earlier interactive response system uses infrared or radio frequency (RF) wireless communication technologies to transmit the students' answer to teachers' management system, where there exists high…
A serious game for learning ultrasound-guided needle placement skills.
Chan, Wing-Yin; Qin, Jing; Chui, Yim-Pan; Heng, Pheng-Ann
2012-11-01
Ultrasound-guided needle placement is a key step in a lot of radiological intervention procedures such as biopsy, local anesthesia and fluid drainage. To help training future intervention radiologists, we develop a serious game to teach the skills involved. We introduce novel techniques for realistic simulation and integrate game elements for active and effective learning. This game is designed in the context of needle placement training based on the some essential characteristics of serious games. Training scenarios are interactively generated via a block-based construction scheme. A novel example-based texture synthesis technique is proposed to simulate corresponding ultrasound images. Game levels are defined based on the difficulties of the generated scenarios. Interactive recommendation of desirable insertion paths is provided during the training as an adaptation mechanism. We also develop a fast physics-based approach to reproduce the shadowing effect of needles in ultrasound images. Game elements such as time-attack tasks, hints and performance evaluation tools are also integrated in our system. Extensive experiments are performed to validate its feasibility for training.
Security-Enhanced Push Button Configuration for Home Smart Control.
Han, Junghee; Park, Taejoon
2017-06-08
With the emergence of smart and converged home services, the need for the secure and easy interplay of various devices has been increased. Push Button Configuration (PBC) is one of the technologies proposed for easy set-up of a secure session between IT and consumer devices. Although the Wi-Fi Direct specification explicitly states that all devices must support the PBC method, its applicability is very limited. This is because the security vulnerability of PBC can be maliciously exploited so that attackers can make illegitimate sessions with consumer devices. To address this problem, this paper proposes a novel Security-enhanced PBC (SePBC) scheme with which we can uncover suspicious or malicious devices. The proposed mechanism has several unique features. First, we develop a secure handshake distance measurement protocol by preventing an adversary sitting outside the region from maliciously manipulating its distance to be fake. Second, it is compatible with the original Wi-Fi PBC without introducing a brand-new methodology. Finally, SePBC uses lightweight operations without CPU-intensive cryptography computation and employs inexpensive H/W. Moreover, it needs to incur little overhead when there is no attack. This paper also designs and implements the proposed SePBC in the real world. Our experimental results and analysis show that the proposed SePBC scheme effectively defeats attacks on PBC while minimizing the modification of the original PBC equipment.
Security-Enhanced Push Button Configuration for Home Smart Control †
Han, Junghee; Park, Taejoon
2017-01-01
With the emergence of smart and converged home services, the need for the secure and easy interplay of various devices has been increased. Push Button Configuration (PBC) is one of the technologies proposed for easy set-up of a secure session between IT and consumer devices. Although the Wi-Fi Direct specification explicitly states that all devices must support the PBC method, its applicability is very limited. This is because the security vulnerability of PBC can be maliciously exploited so that attackers can make illegitimate sessions with consumer devices. To address this problem, this paper proposes a novel Security-enhanced PBC (SePBC) scheme with which we can uncover suspicious or malicious devices. The proposed mechanism has several unique features. First, we develop a secure handshake distance measurement protocol by preventing an adversary sitting outside the region from maliciously manipulating its distance to be fake. Second, it is compatible with the original Wi-Fi PBC without introducing a brand-new methodology. Finally, SePBC uses lightweight operations without CPU-intensive cryptography computation and employs inexpensive H/W. Moreover, it needs to incur little overhead when there is no attack. This paper also designs and implements the proposed SePBC in the real world. Our experimental results and analysis show that the proposed SePBC scheme effectively defeats attacks on PBC while minimizing the modification of the original PBC equipment. PMID:28594370
Heat Shield Cavity Parametric Experimental Aeroheating for a Proposed Mars Smart Lander Aeroshell
NASA Technical Reports Server (NTRS)
Liechty, Derek S.; Hollis, Brian R.
2002-01-01
The proposed Mars Smart Lander is to be attached through its aeroshell to the main spacecraft bus, thereby producing cavities in the heat shield. To study the effects these cavities will have on the heating levels experienced by the heat shield, an experimental aeroheating investigation was performed at the NASA Langley Research Center in the 20-Inch Mach 6 Air Tunnel. The effects of Reynolds number, angle-of-attack, and cavity size and location on aero-heating levels and distributions were determined and are presented. To aid the discussion on the effects of the cavities, laminar, thin-layer Navier-Stokes flow field solutions were post-processed to calculate relevant boundary layer properties such as boundary layer height and momentum thickness, edge Mach number, and streamwise pressure gradient. It was found that the effect of the cavities varies with angle-of-attack, freestream Reynolds number, and cavity size and location. The presence of a cavity raised the downstream heating rates by as much as 325% as a result of boundary layer transition.
Das, Ashok Kumar; Bruhadeshwar, Bezawada
2013-10-01
Recently Lee and Liu proposed an efficient password based authentication and key agreement scheme using smart card for the telecare medicine information system [J. Med. Syst. (2013) 37:9933]. In this paper, we show that though their scheme is efficient, their scheme still has two security weaknesses such as (1) it has design flaws in authentication phase and (2) it has design flaws in password change phase. In order to withstand these flaws found in Lee-Liu's scheme, we propose an improvement of their scheme. Our improved scheme keeps also the original merits of Lee-Liu's scheme. We show that our scheme is efficient as compared to Lee-Liu's scheme. Further, through the security analysis, we show that our scheme is secure against possible known attacks. In addition, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our scheme is secure against passive and active attacks.
Comparative advantage between traditional and smart navigation systems
NASA Astrophysics Data System (ADS)
Shin, Jeongkyu; Kim, Pan-Jun; Kim, Seunghwan
2013-03-01
The smart navigation system that refers to real-time traffic data is believed to be superior to traditional navigation systems. To verify this belief, we created an agent-based traffic model and examined the effect of changing market share of the traditional shortest-travel-time algorithm based navigation and the smart navigation system. We tested our model on the grid and actual metropolitan road network structures. The result reveals that the traditional navigation system have better performance than the smart one as the market share of the smart navigation system exceeds a critical value, which is contrary to conventional expectation. We suggest that the superiority inversion between agent groups is strongly related to the traffic weight function form, and is general. We also found that the relationship of market share, traffic flow density and travel time is determined by the combination of congestion avoidance behavior of the smartly navigated agents and the inefficiency of shortest-travel-time based navigated agents. Our results can be interpreted with the minority game and extended to the diverse topics of opinion dynamics. This work was supported by the Original Technology Research Program for Brain Science through the National Research Foundation of Korea funded by the Ministry of Education, Science and Technology(No. 2010-0018847).
Wang, Soon Joo; Choi, Jin Tae; Arnold, Jeffrey
2003-01-01
South Korea has experienced > 30 suspected terrorism-related events since 1958, including attacks against South Korean citizens in foreign countries. The most common types of terrorism used have included bombings, shootings, hijackings, and kidnappings. Prior to 1990, North Korea was responsible for almost all terrorism-related events inside of South Korea, including multiple assassination attempts on its presidents, regular kidnappings of South Korean fisherman, and several high-profile bombings. Since 1990, most of the terrorist attacks against South Korean citizens have occurred abroad and have been related to the emerging worldwide pattern of terrorism by international terrorist organizations or deranged individuals. The 1988 Seoul Olympic Games provided a major stimulus for South Korea to develop a national emergency response system for terrorism-related events based on the participation of multiple ministries. The 11 September 2001 World Trade Center and Pentagon attacks and the 2001 United States of America (US) anthrax letter attacks prompted South Korea to organize a new national system of emergency response for terrorism-related events. The system is based on five divisions for the response to specific types of terrorist events, involving conventional terrorism, bioterrorism, chemical terrorism, radiological terrorism, and cyber-terrorism. No terrorism-related events occurred during the 2002 World Cup and Asian Games held in South Korea. The emergency management of terrorism-related events in South Korea is adapting to the changing risk of terrorism in the new century.
What are the Most Widely used and Effective Attack Coverage Systems in Men’s Volleyball?
Hileno, Raúl; García-de-Alcaraz, Antonio; Buscà, Bernat; Salas, Cristòfol; Camerino, Oleguer
2018-01-01
Abstract In volleyball, attack coverage is one of the play actions most neglected in coaching and research. The purpose of this study was to find out which attack coverage systems are used by high-level men’s teams in different game situations and the characteristics of the most effective systems. We analysed 15 matches from the 2010 Men’s Pan-American Volleyball Cup, with a total of 1,415 coverage actions. Chi-square tests for independence, adjusted residuals analysis and calculations of standardised mean difference were performed. The results show that high-level men’s volleyball uses many coverage systems other than the traditional 3-2-0 and 2-3-0. At this level of play, the most frequent systems were 1-3-1 and 1-2-2, which occurred significantly often at the culmination of a third-tempo attack at the wing. The most effective systems consisted of three coverage lines, with fewer than five players covering the spiker and at least one player in the first coverage line, in both the attack and counterattack phases. Given the large number of coverage systems identified in different game situations, we recommend flexible, loosely structured training in these systems, based on a set of guiding principles that all players on a team must internalise for the specific position they are playing. Regarding the systems’ efficacy, the main watchword is that on each coverage line there should always be at least one player, but the first line should not be exposed. PMID:29922383
Das, Ashok Kumar
2015-03-01
An integrated EPR (Electronic Patient Record) information system of all the patients provides the medical institutions and the academia with most of the patients' information in details for them to make corrective decisions and clinical decisions in order to maintain and analyze patients' health. In such system, the illegal access must be restricted and the information from theft during transmission over the insecure Internet must be prevented. Lee et al. proposed an efficient password-based remote user authentication scheme using smart card for the integrated EPR information system. Their scheme is very efficient due to usage of one-way hash function and bitwise exclusive-or (XOR) operations. However, in this paper, we show that though their scheme is very efficient, their scheme has three security weaknesses such as (1) it has design flaws in password change phase, (2) it fails to protect privileged insider attack and (3) it lacks the formal security verification. We also find that another recently proposed Wen's scheme has the same security drawbacks as in Lee at al.'s scheme. In order to remedy these security weaknesses found in Lee et al.'s scheme and Wen's scheme, we propose a secure and efficient password-based remote user authentication scheme using smart cards for the integrated EPR information system. We show that our scheme is also efficient as compared to Lee et al.'s scheme and Wen's scheme as our scheme only uses one-way hash function and bitwise exclusive-or (XOR) operations. Through the security analysis, we show that our scheme is secure against possible known attacks. Furthermore, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool and show that our scheme is secure against passive and active attacks.
Air-to-air combat analysis - Review of differential-gaming approaches
NASA Technical Reports Server (NTRS)
Ardema, M. D.
1981-01-01
The problem of evaluating the combat performance of fighter/attack aircraft is discussed, and the mathematical nature of the problem is examined. The following approaches to air combat analysis are reviewed: (1) differential-turning differential game and (2) coplanar differential game. Selected numerical examples of these approaches are presented. The relative advantages and disadvantages of each are analyzed, and it is concluded that air combat analysis is an extremely difficult mathematical problem and that no one method of approach is best for all purposes. The paper concludes with a discussion of how the two approaches might be used in a complementary manner.
Enhancing the cyber-security of smart grids with applications to synchrophasor data
NASA Astrophysics Data System (ADS)
Pal, Seemita
In the power grids, Supervisory Control and Data Acquisition (SCADA) systems are used as part of the Energy Management System (EMS) for enabling grid monitoring, control and protection. In recent times, with the ongoing installation of thousands of Phasor Measurement Units (PMUs), system operators are becoming increasingly reliant on PMU-generated synchrophasor measurements for executing wide-area monitoring and real-time control. The availability of PMU data facilitates dynamic state estimation of the system, thus improving the efficiency and resiliency of the grid. Since the SCADA and PMU data are used to make critical control decisions including actuation of physical systems, the timely availability and integrity of this networked data is of paramount importance. Absence or wrong control actions can potentially lead to disruption of operations, monetary loss, damage to equipments or surroundings or even blackout. This has posed new challenges to information security especially in this age of ever-increasing cyber-attacks. In this thesis, potential cyber-attacks on smart grids are presented and effective and implementable schemes are proposed for detecting them. The focus is mainly on three kinds of cyber-attacks and their detection: (i) gray-hole attacks on synchrophasor systems, (ii) PMU data manipulation attacks and (iii) data integrity attacks on SCADA systems. In the case of gray-hole attacks, also known as packet-drop attacks, the adversary may arbitrarily drop PMU data packets as they traverse the network, resulting in unavailability of time-sensitive data for the various critical power system applications. The fundamental challenge is to distinguish packets dropped by the adversary from those that occur naturally due to network congestion.The proposed gray-hole attack detection technique is based on exploiting the inherent timing information in the GPS time-stamped PMU data packets and using the temporal trends of the latencies to classify the cause of packet-drops and finally detect attacks, if any. In the case of PMU data manipulation attacks, the attacker may modify the data in the PMU packets in order to bias the system states and influence the control center into taking wrong decisions. The proposed detection technique is based on evaluating the equivalent impedances of the transmission lines and classifying the observed anomalies to determine the presence of attack and its location. The scheme for detecting data integrity attacks on SCADA systems is based on utilizing synchrophasor measurements from available PMUs in the grid. The proposed method uses a difference measure, developed in this thesis, to determine the relative divergence and mis-correlation between the datasets. Based on the estimated difference measure, tampered and genuine data can be distinguished. The proposed detection mechanisms have demonstrated high accuracy in real-time detection of attacks of various magnitudes, simulated on real PMU data obtained from the NY grid. By performing alarm clustering, the occurrence of false alarms has been reduced to almost zero. The solutions are computationally inexpensive, low on cost, do not add any overhead, and do not require any feedback from the network.
Proactive Alleviation Procedure to Handle Black Hole Attack and Its Version
Babu, M. Rajesh; Dian, S. Moses; Chelladurai, Siva; Palaniappan, Mathiyalagan
2015-01-01
The world is moving towards a new realm of computing such as Internet of Things. The Internet of Things, however, envisions connecting almost all objects within the world to the Internet by recognizing them as smart objects. In doing so, the existing networks which include wired, wireless, and ad hoc networks should be utilized. Moreover, apart from other networks, the ad hoc network is full of security challenges. For instance, the MANET (mobile ad hoc network) is susceptible to various attacks in which the black hole attacks and its versions do serious damage to the entire MANET infrastructure. The severity of this attack increases, when the compromised MANET nodes work in cooperation with each other to make a cooperative black hole attack. Therefore this paper proposes an alleviation procedure which consists of timely mandate procedure, hole detection algorithm, and sensitive guard procedure to detect the maliciously behaving nodes. It has been observed that the proposed procedure is cost-effective and ensures QoS guarantee by assuring resource availability thus making the MANET appropriate for Internet of Things. PMID:26495430
Yau, Wei-Chuen; Phan, Raphael C-W
2013-12-01
Many authentication schemes have been proposed for telecare medicine information systems (TMIS) to ensure the privacy, integrity, and availability of patient records. These schemes are crucial for TMIS systems because otherwise patients' medical records become susceptible to tampering thus hampering diagnosis or private medical conditions of patients could be disclosed to parties who do not have a right to access such information. Very recently, Hao et al. proposed a chaotic map-based authentication scheme for telecare medicine information systems in a recent issue of Journal of Medical Systems. They claimed that the authentication scheme can withstand various attacks and it is secure to be used in TMIS. In this paper, we show that this authentication scheme is vulnerable to key-compromise impersonation attacks, off-line password guessing attacks upon compromising of a smart card, and parallel session attacks. We also exploit weaknesses in the password change phase of the scheme to mount a denial-of-service attack. Our results show that this scheme cannot be used to provide security in a telecare medicine information system.
Proactive Alleviation Procedure to Handle Black Hole Attack and Its Version.
Babu, M Rajesh; Dian, S Moses; Chelladurai, Siva; Palaniappan, Mathiyalagan
2015-01-01
The world is moving towards a new realm of computing such as Internet of Things. The Internet of Things, however, envisions connecting almost all objects within the world to the Internet by recognizing them as smart objects. In doing so, the existing networks which include wired, wireless, and ad hoc networks should be utilized. Moreover, apart from other networks, the ad hoc network is full of security challenges. For instance, the MANET (mobile ad hoc network) is susceptible to various attacks in which the black hole attacks and its versions do serious damage to the entire MANET infrastructure. The severity of this attack increases, when the compromised MANET nodes work in cooperation with each other to make a cooperative black hole attack. Therefore this paper proposes an alleviation procedure which consists of timely mandate procedure, hole detection algorithm, and sensitive guard procedure to detect the maliciously behaving nodes. It has been observed that the proposed procedure is cost-effective and ensures QoS guarantee by assuring resource availability thus making the MANET appropriate for Internet of Things.
Digital Devices Invade Campus, and Networks Feel the Strain
ERIC Educational Resources Information Center
New, Jake
2013-01-01
Inside campus libraries and dormitory rooms, thousands of students connect to the Internet not only to study with online systems like Blackboard but also to watch movies and TV shows on Netflix. Computers, smartphones, wireless printers, tablets, iPods, Xboxes, handheld gaming systems, e-readers, smart TVs, Blu-ray players--students now bring an…
Application of Game Theory to Improve the Defense of the Smart Grid
2012-03-01
Computer Systems and Networks ...............................................22 2.4.2 Trust Models ...systems. In this environment, developers assumed deterministic communications mediums rather than the “best effort” models provided in most modern... models or computational models to validate the SPSs design. Finally, the study reveals concerns about the performance of load rejection schemes
Competition, Games, Technology--Boys Are Loving English
ERIC Educational Resources Information Center
Gresham, Peta
2012-01-01
This paper reflects one cycle of an action research project that investigated how integrating activity, competition, and visual learning strategies through IWB/ Smart Response technology could engage a lower level Year 12 Advanced English class in NSW--a group of boys who felt disconnected from the course of study. After my initial reconnaissance…
Cyber-Physical Correlations for Infrastructure Resilience: A Game-Theoretic Approach
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rao, Nageswara S; He, Fei; Ma, Chris Y. T.
In several critical infrastructures, the cyber and physical parts are correlated so that disruptions to one affect the other and hence the whole system. These correlations may be exploited to strategically launch components attacks, and hence must be accounted for ensuring the infrastructure resilience, specified by its survival probability. We characterize the cyber-physical interactions at two levels: (i) the failure correlation function specifies the conditional survival probability of cyber sub-infrastructure given the physical sub-infrastructure as a function of their marginal probabilities, and (ii) the individual survival probabilities of both sub-infrastructures are characterized by first-order differential conditions. We formulate a resiliencemore » problem for infrastructures composed of discrete components as a game between the provider and attacker, wherein their utility functions consist of an infrastructure survival probability term and a cost term expressed in terms of the number of components attacked and reinforced. We derive Nash Equilibrium conditions and sensitivity functions that highlight the dependence of infrastructure resilience on the cost term, correlation function and sub-infrastructure survival probabilities. These results generalize earlier ones based on linear failure correlation functions and independent component failures. We apply the results to models of cloud computing infrastructures and energy grids.« less
Data mining for multiagent rules, strategies, and fuzzy decision tree structure
NASA Astrophysics Data System (ADS)
Smith, James F., III; Rhyne, Robert D., II; Fisher, Kristin
2002-03-01
A fuzzy logic based resource manager (RM) has been developed that automatically allocates electronic attack resources in real-time over many dissimilar platforms. Two different data mining algorithms have been developed to determine rules, strategies, and fuzzy decision tree structure. The first data mining algorithm uses a genetic algorithm as a data mining function and is called from an electronic game. The game allows a human expert to play against the resource manager in a simulated battlespace with each of the defending platforms being exclusively directed by the fuzzy resource manager and the attacking platforms being controlled by the human expert or operating autonomously under their own logic. This approach automates the data mining problem. The game automatically creates a database reflecting the domain expert's knowledge. It calls a data mining function, a genetic algorithm, for data mining of the database as required and allows easy evaluation of the information mined in the second step. The criterion for re- optimization is discussed as well as experimental results. Then a second data mining algorithm that uses a genetic program as a data mining function is introduced to automatically discover fuzzy decision tree structures. Finally, a fuzzy decision tree generated through this process is discussed.
Security Analysis of Selected AMI Failure Scenarios Using Agent Based Game Theoretic Simulation
DOE Office of Scientific and Technical Information (OSTI.GOV)
Abercrombie, Robert K; Schlicher, Bob G; Sheldon, Frederick T
Information security analysis can be performed using game theory implemented in dynamic Agent Based Game Theoretic (ABGT) simulations. Such simulations can be verified with the results from game theory analysis and further used to explore larger scale, real world scenarios involving multiple attackers, defenders, and information assets. We concentrated our analysis on the Advanced Metering Infrastructure (AMI) functional domain which the National Electric Sector Cyber security Organization Resource (NESCOR) working group has currently documented 29 failure scenarios. The strategy for the game was developed by analyzing five electric sector representative failure scenarios contained in the AMI functional domain. From thesemore » five selected scenarios, we characterize them into three specific threat categories affecting confidentiality, integrity and availability (CIA). The analysis using our ABGT simulation demonstrates how to model the AMI functional domain using a set of rationalized game theoretic rules decomposed from the failure scenarios in terms of how those scenarios might impact the AMI network with respect to CIA.« less
Attack of the Teenage Brain! Understanding and Supporting the Weird and Wonderful Adolescent Learner
ERIC Educational Resources Information Center
Medina, John
2018-01-01
"Marvel" at the neuroscientific reasons why smart teens make dumb decisions! "Behold" the mind-controlling power of executive function! "Thrill" to a vision of a better school for the teenage brain! Whether you're a parent interacting with one adolescent or a teacher interacting with many, you know teens can be hard…
2010-05-17
System), or American company with factory in Malaysia (Smart Modular) Technology Is A Focal Point Of Attacks Who is behind data breaches ? 74% resulted...military style community of hackers learning from each other. 8 8 * Source – 2009 Verizon Data Breach Investigations Report 38% 32% There are also 100,000
An Active Smart Material Control System for F/A-18 Buffet Alleviation
NASA Technical Reports Server (NTRS)
Sheta, Essam F.; Moses, Robert W.; Huttsell, Lawrence J.; Harrand, Vincent J.
2003-01-01
The vertical tail buffet problem of fighter aircraft occurs at high angles of attack when the vortical flow breaks down ahead of the vertical tails resulting in unsteady and unbalanced pressure loads on the vertical tails. The buffet loads imposed upon the vertical tails resulted in a premature fatigue failure of the tails, and consequently limits the performance and super maneuverability of twin-tail fighter aircraft. An active smart material control system using distributed piezoelectric actuators has been developed for buffet alleviation and is presented. The inboard and outboard surfaces of the vertical tail are equipped with piezoelectric actuators to control the buffet responses in the first bending and torsion modes. The electrodynamics of the piezoelectric actuators are expressed with a three-dimensional finite-element model. A single-input-single-output controller is designed to drive the active piezoelectric actuators. High-fidelity multidisciplinary analysis modules for the fluid dynamics, structure dynamics, electrodynamics of the piezoelectric actuators, control law, fluid structure interfacing, and grid motion are integrated into a multidisciplinary computing environment that controls the temporal synchronization of the analysis modules. At 30 degree angle of attack, RMS values of tip acceleration are reduced by as much as 12%. The peak values of the power spectral density of tail-tip acceleration are reduced by as much as 22% in the first bending mode and by as much as 82% in the first torsion mode. The actively controlled piezoelectric actuators were also effective in adding damping at wide range of angles of attack.
Adversarial risk analysis with incomplete information: a level-k approach.
Rothschild, Casey; McLay, Laura; Guikema, Seth
2012-07-01
This article proposes, develops, and illustrates the application of level-k game theory to adversarial risk analysis. Level-k reasoning, which assumes that players play strategically but have bounded rationality, is useful for operationalizing a Bayesian approach to adversarial risk analysis. It can be applied in a broad class of settings, including settings with asynchronous play and partial but incomplete revelation of early moves. Its computational and elicitation requirements are modest. We illustrate the approach with an application to a simple defend-attack model in which the defender's countermeasures are revealed with a probability less than one to the attacker before he decides on how or whether to attack. © 2011 Society for Risk Analysis.
Towards Reliable Evaluation of Anomaly-Based Intrusion Detection Performance
NASA Technical Reports Server (NTRS)
Viswanathan, Arun
2012-01-01
This report describes the results of research into the effects of environment-induced noise on the evaluation process for anomaly detectors in the cyber security domain. This research was conducted during a 10-week summer internship program from the 19th of August, 2012 to the 23rd of August, 2012 at the Jet Propulsion Laboratory in Pasadena, California. The research performed lies within the larger context of the Los Angeles Department of Water and Power (LADWP) Smart Grid cyber security project, a Department of Energy (DoE) funded effort involving the Jet Propulsion Laboratory, California Institute of Technology and the University of Southern California/ Information Sciences Institute. The results of the present effort constitute an important contribution towards building more rigorous evaluation paradigms for anomaly-based intrusion detectors in complex cyber physical systems such as the Smart Grid. Anomaly detection is a key strategy for cyber intrusion detection and operates by identifying deviations from profiles of nominal behavior and are thus conceptually appealing for detecting "novel" attacks. Evaluating the performance of such a detector requires assessing: (a) how well it captures the model of nominal behavior, and (b) how well it detects attacks (deviations from normality). Current evaluation methods produce results that give insufficient insight into the operation of a detector, inevitably resulting in a significantly poor characterization of a detectors performance. In this work, we first describe a preliminary taxonomy of key evaluation constructs that are necessary for establishing rigor in the evaluation regime of an anomaly detector. We then focus on clarifying the impact of the operational environment on the manifestation of attacks in monitored data. We show how dynamic and evolving environments can introduce high variability into the data stream perturbing detector performance. Prior research has focused on understanding the impact of this variability in training data for anomaly detectors, but has ignored variability in the attack signal that will necessarily affect the evaluation results for such detectors. We posit that current evaluation strategies implicitly assume that attacks always manifest in a stable manner; we show that this assumption is wrong. We describe a simple experiment to demonstrate the effects of environmental noise on the manifestation of attacks in data and introduce the notion of attack manifestation stability. Finally, we argue that conclusions about detector performance will be unreliable and incomplete if the stability of attack manifestation is not accounted for in the evaluation strategy.
Socially grounded game strategy enhances bonding and perceived smartness of a humanoid robot
NASA Astrophysics Data System (ADS)
Barakova, E. I.; De Haas, M.; Kuijpers, W.; Irigoyen, N.; Betancourt, A.
2018-01-01
In search for better technological solutions for education, we adapted a principle from economic game theory, namely that giving a help will promote collaboration and eventually long-term relations between a robot and a child. This principle has been shown to be effective in games between humans and between humans and computer agents. We compared the social and cognitive engagement of children when playing checkers game combined with a social strategy against a robot or against a computer. We found that by combining the social and game strategy the children (average age of 8.3 years) had more empathy and social engagement with the robot since the children did not want to necessarily win against it. This finding is promising for using social strategies for the creation of long-term relations between robots and children and making educational tasks more engaging. An additional outcome of the study was the significant difference in the perception of the children about the difficulty of the game - the game with the robot was seen as more challenging and the robot - as a smarter opponent. This finding might be due to the higher perceived or expected intelligence from the robot, or because of the higher complexity of seeing patterns in three-dimensional world.
Li, Yuancheng; Qiu, Rixuan; Jing, Sitong
2018-01-01
Advanced Metering Infrastructure (AMI) realizes a two-way communication of electricity data through by interconnecting with a computer network as the core component of the smart grid. Meanwhile, it brings many new security threats and the traditional intrusion detection method can't satisfy the security requirements of AMI. In this paper, an intrusion detection system based on Online Sequence Extreme Learning Machine (OS-ELM) is established, which is used to detecting the attack in AMI and carrying out the comparative analysis with other algorithms. Simulation results show that, compared with other intrusion detection methods, intrusion detection method based on OS-ELM is more superior in detection speed and accuracy.
Quantifying Mixed Uncertainties in Cyber Attacker Payoffs
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chatterjee, Samrat; Halappanavar, Mahantesh; Tipireddy, Ramakrishna
Representation and propagation of uncertainty in cyber attacker payoffs is a key aspect of security games. Past research has primarily focused on representing the defender’s beliefs about attacker payoffs as point utility estimates. More recently, within the physical security domain, attacker payoff uncertainties have been represented as Uniform and Gaussian probability distributions, and intervals. Within cyber-settings, continuous probability distributions may still be appropriate for addressing statistical (aleatory) uncertainties where the defender may assume that the attacker’s payoffs differ over time. However, systematic (epistemic) uncertainties may exist, where the defender may not have sufficient knowledge or there is insufficient information aboutmore » the attacker’s payoff generation mechanism. Such epistemic uncertainties are more suitably represented as probability boxes with intervals. In this study, we explore the mathematical treatment of such mixed payoff uncertainties.« less
Making Mobile Learning Work: Student Perceptions and Implementation Factors
ERIC Educational Resources Information Center
Tabor, Sharon W.
2016-01-01
Mobile devices are the constant companions of technology users of all ages. Studies show, how-ever, that making calls is a minimal part of our engagement with today's smart phones and that even texting has fallen off, leaving web browsing, gaming, and social media as top uses. A cross-disciplinary group of faculty at our university came together…
Making Smart Choices: A Serious Game for Sex Education for Young Adolescents
ERIC Educational Resources Information Center
Kwan, Alvin C. M.; Chu, Samuel K. W.; Hong, Athena W. L.; Tam, Frankie; Lee, Grace M. Y.; Mellecker, Robin
2015-01-01
Current educational resources for sex education in Hong Kong are mainly designed to be used in classroom. They are mostly text-based and are unattractive to the most vulnerable adolescent group. As discussion on sex is still taboo in Chinese society, self-learning resources can supplement classroom teaching. This paper describes an interactive…
The Relationship between Use of Technology and Parent-Adolescents Social Relationship
ERIC Educational Resources Information Center
Moawad, Gehan EL Nabawy Ahmed; Ebrahem, Gawhara Gad Soliman
2016-01-01
Today's adolescents have unprecedented access to modern technology and use them in expected and unexpected ways. Adolescents spend many hours a day using the technology, and the vast majority of them have access to Internet, cell phones, smart phone, video games and many other forms of modern technology. With the increased role of modern…
Validating the Heirarchy of the iStartSmart® Academic Content
ERIC Educational Resources Information Center
McManis, Perry, W.; McManis, Mark, H.
2016-01-01
The purpose of this analysis was to investigate the validity of skill groupings in an instructional technology learning system designed for use by children in early childhood education classrooms. A Principal Component Analysis was performed to measure the fit of 18 skill games to their 5 assigned groupings in the system, covering a range of…
Getting Serious with iPads: The Intersection of Game Design and Teaching Principals
ERIC Educational Resources Information Center
Masek, Martin; Murcia, Karen; Morrison, Jason
2012-01-01
Mobile devices, such as tablets and smart phones, are increasingly being utilised as tools for education, with tablets such as the Apple iPad being introduced into many classrooms. These devices are seen as enablers of learning through a fun, interactive interface; however the process of producing a pedagogically valid, yet entertaining…
Wang, Rongxiao; Chen, Feiran; Wang, Yiping; Qiu, Xiaogang
2018-01-01
Chemical production activities in industrial districts pose great threats to the surrounding atmospheric environment and human health. Therefore, developing appropriate and intelligent pollution controlling strategies for the management team to monitor chemical production processes is significantly essential in a chemical industrial district. The literature shows that playing a chemical plant environmental protection (CPEP) game can force the chemical plants to be more compliant with environmental protection authorities and reduce the potential risks of hazardous gas dispersion accidents. However, results of the current literature strictly rely on several perfect assumptions which rarely hold in real-world domains, especially when dealing with human adversaries. To address bounded rationality and limited observability in human cognition, the CPEP game is extended to generate robust schedules of inspection resources for inspection agencies. The present paper is innovative on the following contributions: (i) The CPEP model is extended by taking observation frequency and observation cost of adversaries into account, and thus better reflects the industrial reality; (ii) Uncertainties such as attackers with bounded rationality, attackers with limited observation and incomplete information (i.e., the attacker’s parameters) are integrated into the extended CPEP model; (iii) Learning curve theory is employed to determine the attacker’s observability in the game solver. Results in the case study imply that this work improves the decision-making process for environmental protection authorities in practical fields by bringing more rewards to the inspection agencies and by acquiring more compliance from chemical plants. PMID:29584679
Skills Associated with Line Breaks in Elite Rugby Union
den Hollander, Steve; Brown, James; Lambert, Michael; Treu, Paul; Hendricks, Sharief
2016-01-01
The ability of the attacking team to break through the defensive line is a key indicator of success as it creates opportunities to score tries. The aim of this study was to analyse line breaks and identify the associated skills and playing characteristics. The 2013 Super Rugby season (125 games) was analysed, in which 362 line breaks were identified and coded using variables that assessed team patterns and non-contact attacking skills in the phases preceding the line break. There was an average of 3 line breaks per game, with 39% of line breaks resulting in a try. Line breaks occurred when the ball-carrier was running fast [61%, x2(4) = 25.784, p = 0.000, Cramer’s v = 0.1922, weak]. At a moderate distance, short lateral passes (19%) and skip passes (15%) attributed to the highest percentage of line breaks [x2(26) = 50.899, p = 0.036, Cramer’s v = 0.2484, moderate]. Faster defensive line speeds resulted in more line breaks [x2(12) = 61.703, p < 0.001, Cramer’s v = 0.3026, moderate]. Line breaks are associated with overall team success and try scoring opportunities. Awareness of the defenders line speed and depth, fast running speed when receiving the ball and quick passing between attackers to the outside backs creates line break opportunities. During training, coaches should emphasise the movement speed of the ball between attackers and manipulate the speed and distance of the defenders. Key points Line breaks are associated with overall team success and try scoring opportunities. Awareness of the defenders line speed and depth, fast running speed when receiving the ball and quick passing between attackers to the outside backs creates line break opportunities During training, coaches should emphasise the movement speed of the ball between attackers and manipulate the speed and distance of the defenders. PMID:27803629
An Integrated Rare Earth Elements Supply Chain Strategy
2011-02-24
iron boron magnets in Joint Direct Attack Munitions (JDAM) smart bombs; neodymium-yttrium- aluminum - garnet lasers and range finders in multiple weapon...components Europium 63 computer screens, fluorescent lights Gadolinium 64 magnetic applications, phosphors Terbium 65 phosphors, projection TV’s...Defense Stockpile report advised several production delays of weapons systems were caused by lanthanum, cerium, europium and gadolinium supply
Visual Fatigue Induced by Viewing a Tablet Computer with a High-resolution Display.
Kim, Dong Ju; Lim, Chi Yeon; Gu, Namyi; Park, Choul Yong
2017-10-01
In the present study, the visual discomfort induced by smart mobile devices was assessed in normal and healthy adults. Fifty-nine volunteers (age, 38.16 ± 10.23 years; male : female = 19 : 40) were exposed to tablet computer screen stimuli (iPad Air, Apple Inc.) for 1 hour. Participants watched a movie or played a computer game on the tablet computer. Visual fatigue and discomfort were assessed using an asthenopia questionnaire, tear film break-up time, and total ocular wavefront aberration before and after viewing smart mobile devices. Based on the questionnaire, viewing smart mobile devices for 1 hour significantly increased mean total asthenopia score from 19.59 ± 8.58 to 22.68 ± 9.39 (p < 0.001). Specifically, the scores for five items (tired eyes, sore/aching eyes, irritated eyes, watery eyes, and hot/burning eye) were significantly increased by viewing smart mobile devices. Tear film break-up time significantly decreased from 5.09 ± 1.52 seconds to 4.63 ± 1.34 seconds (p = 0.003). However, total ocular wavefront aberration was unchanged. Visual fatigue and discomfort were significantly induced by viewing smart mobile devices, even though the devices were equipped with state-of-the-art display technology. © 2017 The Korean Ophthalmological Society
Visual Fatigue Induced by Viewing a Tablet Computer with a High-resolution Display
Kim, Dong Ju; Lim, Chi-Yeon; Gu, Namyi
2017-01-01
Purpose In the present study, the visual discomfort induced by smart mobile devices was assessed in normal and healthy adults. Methods Fifty-nine volunteers (age, 38.16 ± 10.23 years; male : female = 19 : 40) were exposed to tablet computer screen stimuli (iPad Air, Apple Inc.) for 1 hour. Participants watched a movie or played a computer game on the tablet computer. Visual fatigue and discomfort were assessed using an asthenopia questionnaire, tear film break-up time, and total ocular wavefront aberration before and after viewing smart mobile devices. Results Based on the questionnaire, viewing smart mobile devices for 1 hour significantly increased mean total asthenopia score from 19.59 ± 8.58 to 22.68 ± 9.39 (p < 0.001). Specifically, the scores for five items (tired eyes, sore/aching eyes, irritated eyes, watery eyes, and hot/burning eye) were significantly increased by viewing smart mobile devices. Tear film break-up time significantly decreased from 5.09 ± 1.52 seconds to 4.63 ± 1.34 seconds (p = 0.003). However, total ocular wavefront aberration was unchanged. Conclusions Visual fatigue and discomfort were significantly induced by viewing smart mobile devices, even though the devices were equipped with state-of-the-art display technology. PMID:28914003
Smart Grid Integrity Attacks: Characterizations and Countermeasures
DOE Office of Scientific and Technical Information (OSTI.GOV)
Annarita Giani; Eilyan Bitar; Miles McQueen
2011-10-01
Real power injections at loads and generators, and real power flows on selected lines in a transmission network are monitored, transmitted over a SCADA network to the system operator, and used in state estimation algorithms to make dispatch, re-balance and other energy management system [EMS] decisions. Coordinated cyber attacks of power meter readings can be arranged to be undetectable by any bad data detection algorithm. These unobservable attacks present a serious threat to grid operations. Of particular interest are sparse attacks that involve the compromise of a modest number of meter readings. An efficient algorithm to find all unobservable attacksmore » [under standard DC load flow approximations] involving the compromise of exactly two power injection meters and an arbitrary number of power meters on lines is presented. This requires O(n2m) flops for a power system with n buses and m line meters. If all lines are metered, there exist canonical forms that characterize all 3, 4, and 5-sparse unobservable attacks. These can be quickly detected in power systems using standard graph algorithms. Known secure phase measurement units [PMUs] can be used as countermeasures against an arbitrary collection of cyber attacks. Finding the minimum number of necessary PMUs is NP-hard. It is shown that p + 1 PMUs at carefully chosen buses are sufficient to neutralize a collection of p cyber attacks.« less
Security enhanced multi-factor biometric authentication scheme using bio-hash function.
Choi, Younsung; Lee, Youngsook; Moon, Jongho; Won, Dongho
2017-01-01
With the rapid development of personal information and wireless communication technology, user authentication schemes have been crucial to ensure that wireless communications are secure. As such, various authentication schemes with multi-factor authentication have been proposed to improve the security of electronic communications. Multi-factor authentication involves the use of passwords, smart cards, and various biometrics to provide users with the utmost privacy and data protection. Cao and Ge analyzed various authentication schemes and found that Younghwa An's scheme was susceptible to a replay attack where an adversary masquerades as a legal server and a user masquerading attack where user anonymity is not provided, allowing an adversary to execute a password change process by intercepting the user's ID during login. Cao and Ge improved upon Younghwa An's scheme, but various security problems remained. This study demonstrates that Cao and Ge's scheme is susceptible to a biometric recognition error, slow wrong password detection, off-line password attack, user impersonation attack, ID guessing attack, a DoS attack, and that their scheme cannot provide session key agreement. Then, to address all weaknesses identified in Cao and Ge's scheme, this study proposes a security enhanced multi-factor biometric authentication scheme and provides a security analysis and formal analysis using Burrows-Abadi-Needham logic. Finally, the efficiency analysis reveals that the proposed scheme can protect against several possible types of attacks with only a slightly high computational cost.
Cyber security challenges in Smart Cities: Safety, security and privacy.
Elmaghraby, Adel S; Losavio, Michael M
2014-07-01
The world is experiencing an evolution of Smart Cities. These emerge from innovations in information technology that, while they create new economic and social opportunities, pose challenges to our security and expectations of privacy. Humans are already interconnected via smart phones and gadgets. Smart energy meters, security devices and smart appliances are being used in many cities. Homes, cars, public venues and other social systems are now on their path to the full connectivity known as the "Internet of Things." Standards are evolving for all of these potentially connected systems. They will lead to unprecedented improvements in the quality of life. To benefit from them, city infrastructures and services are changing with new interconnected systems for monitoring, control and automation. Intelligent transportation, public and private, will access a web of interconnected data from GPS location to weather and traffic updates. Integrated systems will aid public safety, emergency responders and in disaster recovery. We examine two important and entangled challenges: security and privacy. Security includes illegal access to information and attacks causing physical disruptions in service availability. As digital citizens are more and more instrumented with data available about their location and activities, privacy seems to disappear. Privacy protecting systems that gather data and trigger emergency response when needed are technological challenges that go hand-in-hand with the continuous security challenges. Their implementation is essential for a Smart City in which we would wish to live. We also present a model representing the interactions between person, servers and things. Those are the major element in the Smart City and their interactions are what we need to protect.
Práxedes, Alba; Moreno, Alberto; Gil-Arias, Alexander; Claver, Fernando; Del Villar, Fernando
2018-01-01
To optimize players' tactical abilities, coaches need to design training sessions with representative learning tasks, such as, small-sided games. Moreover, it is necessary to adapt the complexity of the tasks to the skill level of the athletes to maximally improve their perceptual, visual and attentive abilities. The objective of this study was to analyze the effect of two teaching programs, each utilizing modified games with varied levels of opposition, on decision-making and action execution in young players with different levels of sports expertise. 19 football players (U12), separated into two ability groups (Average versus Low skill-level), participated in a series of training sessions that were spread over 4 phases: Pre-intervention 1, Intervention 1 (teaching program based on modified games with numerical superiority in attack), Pre-intervention 2 and Intervention 2 (teaching program based on modified games with numerical equality). Each intervention phase lasted 14 sessions. Decision-making and the execution of pass action during league matches over the same period were evaluated using the Game Performance Evaluation Tool (GPET). The Average skill-level group showed significant differences after the first intervention in decision-making and execution of the pass action (decision-making, p = .015; execution, p = .031), but not after the second intervention (decision-making, p = 1.000; execution, p = 1.000). For the Low skill-level group, significant differences were only observed in the execution of passing between the first and last phases (p = .014). These findings seem to indicate that for groups with an average level of expertise, training with numerical superiority in attack provides players with more time to make better decisions and to better execute actions. However, for lower-level groups programs may take longer to facilitate improvement. Nevertheless, numerical equality did not result in improvement for either group.
Security Attacks and Solutions in Electronic Health (E-health) Systems.
Zeadally, Sherali; Isaac, Jesús Téllez; Baig, Zubair
2016-12-01
For centuries, healthcare has been a basic service provided by many governments to their citizens. Over the past few decades, we have witnessed a significant transformation in the quality of healthcare services provided by healthcare organizations and professionals. Recent advances have led to the emergence of Electronic Health (E-health), largely made possible by the massive deployment and adoption of information and communication technologies (ICTs). However, cybercriminals and attackers are exploiting vulnerabilities associated primarily with ICTs, causing data breaches of patients' confidential digital health information records. Here, we review recent security attacks reported for E-healthcare and discuss the solutions proposed to mitigate them. We also identify security challenges that must be addressed by E-health system designers and implementers in the future, to respond to threats that could arise as E-health systems become integrated with technologies such as cloud computing, the Internet of Things, and smart cities.
Physical Watermarking for Securing Cyber-Physical Systems via Packet Drop Injections
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ozel, Omur; Weekrakkody, Sean; Sinopoli, Bruno
Physical watermarking is a well known solution for detecting integrity attacks on Cyber-Physical Systems (CPSs) such as the smart grid. Here, a random control input is injected into the system in order to authenticate physical dynamics and sensors which may have been corrupted by adversaries. Packet drops may naturally occur in a CPS due to network imperfections. To our knowledge, previous work has not considered the role of packet drops in detecting integrity attacks. In this paper, we investigate the merit of injecting Bernoulli packet drops into the control inputs sent to actuators as a new physical watermarking scheme. Withmore » the classical linear quadratic objective function and an independent and identically distributed packet drop injection sequence, we study the effect of packet drops on meeting security and control objectives. Our results indicate that the packet drops could act as a potential physical watermark for attack detection in CPSs.« less
Defense on the Move: Ant-Based Cyber Defense
DOE Office of Scientific and Technical Information (OSTI.GOV)
Fink, Glenn A.; Haack, Jereme N.; McKinnon, Archibald D.
Many common cyber defenses (like firewalls and IDS) are as static as trench warfare allowing the attacker freedom to probe them at will. The concept of Moving Target Defense (MTD) adds dynamism to the defender side, but puts the systems to be defended themselves in motion, potentially at great cost to the defender. An alternative approach is a mobile resilient defense that removes attackers’ ability to rely on prior experience without requiring motion in the protected infrastructure itself. The defensive technology absorbs most of the cost of motion, is resilient to attack, and is unpredictable to attackers. The Ant-Based Cybermore » Defense (ABCD) is a mobile resilient defense providing a set of roaming, bio-inspired, digital-ant agents working with stationary agents in a hierarchy headed by a human supervisor. The ABCD approach provides a resilient, extensible, and flexible defense that can scale to large, multi-enterprise infrastructures like the smart electric grid.« less
Metrics for Assessment of Smart Grid Data Integrity Attacks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Annarita Giani; Miles McQueen; Russell Bent
2012-07-01
There is an emerging consensus that the nation’s electricity grid is vulnerable to cyber attacks. This vulnerability arises from the increasing reliance on using remote measurements, transmitting them over legacy data networks to system operators who make critical decisions based on available data. Data integrity attacks are a class of cyber attacks that involve a compromise of information that is processed by the grid operator. This information can include meter readings of injected power at remote generators, power flows on transmission lines, and relay states. These data integrity attacks have consequences only when the system operator responds to compromised datamore » by redispatching generation under normal or contingency protocols. These consequences include (a) financial losses from sub-optimal economic dispatch to service loads, (b) robustness/resiliency losses from placing the grid at operating points that are at greater risk from contingencies, and (c) systemic losses resulting from cascading failures induced by poor operational choices. This paper is focused on understanding the connections between grid operational procedures and cyber attacks. We first offer two examples to illustrate how data integrity attacks can cause economic and physical damage by misleading operators into taking inappropriate decisions. We then focus on unobservable data integrity attacks involving power meter data. These are coordinated attacks where the compromised data are consistent with the physics of power flow, and are therefore passed by any bad data detection algorithm. We develop metrics to assess the economic impact of these attacks under re-dispatch decisions using optimal power flow methods. These metrics can be use to prioritize the adoption of appropriate countermeasures including PMU placement, encryption, hardware upgrades, and advance attack detection algorithms.« less
Cooperation stimulation strategies for peer-to-peer wireless live video-sharing social networks.
Lin, W Sabrina; Zhao, H Vicky; Liu, K J Ray
2010-07-01
Human behavior analysis in video sharing social networks is an emerging research area, which analyzes the behavior of users who share multimedia content and investigates the impact of human dynamics on video sharing systems. Users watching live streaming in the same wireless network share the same limited bandwidth of backbone connection to the Internet, thus, they might want to cooperate with each other to obtain better video quality. These users form a wireless live-streaming social network. Every user wishes to watch video with high quality while paying as little as possible cost to help others. This paper focuses on providing incentives for user cooperation. We propose a game-theoretic framework to model user behavior and to analyze the optimal strategies for user cooperation simulation in wireless live streaming. We first analyze the Pareto optimality and the time-sensitive bargaining equilibrium of the two-person game. We then extend the solution to the multiuser scenario. We also consider potential selfish users' cheating behavior and malicious users' attacking behavior and analyze the performance of the proposed strategies with the existence of cheating users and malicious attackers. Both our analytical and simulation results show that the proposed strategies can effectively stimulate user cooperation, achieve cheat free and attack resistance, and help provide reliable services for wireless live streaming applications.
2014-11-01
SV © Her Majesty the Queen in Right of Canada, as represented by the Minister of National Defence, 2014 © Sa Majesté la Reine (en droit du Canada... dragged over to fire hydrants to be attached to the steamer caps. Bolt cutters can be used to cut holes in fences allowing better access to the train...derailment fire. Ground monitors (for blitz fire) can be positioned for fire attack. 65mm attack lines can be dragged from fire engines and
Cyber Security Research Frameworks For Coevolutionary Network Defense
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rush, George D.; Tauritz, Daniel Remy
Several architectures have been created for developing and testing systems used in network security, but most are meant to provide a platform for running cyber security experiments as opposed to automating experiment processes. In the first paper, we propose a framework termed Distributed Cyber Security Automation Framework for Experiments (DCAFE) that enables experiment automation and control in a distributed environment. Predictive analysis of adversaries is another thorny issue in cyber security. Game theory can be used to mathematically analyze adversary models, but its scalability limitations restrict its use. Computational game theory allows us to scale classical game theory to larger,more » more complex systems. In the second paper, we propose a framework termed Coevolutionary Agent-based Network Defense Lightweight Event System (CANDLES) that can coevolve attacker and defender agent strategies and capabilities and evaluate potential solutions with a custom network defense simulation. The third paper is a continuation of the CANDLES project in which we rewrote key parts of the framework. Attackers and defenders have been redesigned to evolve pure strategy, and a new network security simulation is devised which specifies network architecture and adds a temporal aspect. We also add a hill climber algorithm to evaluate the search space and justify the use of a coevolutionary algorithm.« less
When Teaching Gets Tough: Smart Ways to Reclaim Your Game
ERIC Educational Resources Information Center
Mendler, Allen
2012-01-01
Every survey of teachers that's ever been conducted has shown that the number one reason for them staying or quitting their jobs is related to the quality of their work environment. Here's a book with practical strategies for how to make the job of teaching easier and more rewarding by overcoming day-to-day frustrations. Veteran educator Allen…
Leasing Retirees: Smart Business or Gaming the System?
ERIC Educational Resources Information Center
Lawton, Stephen B.
2009-01-01
In April 2009, a high school principal in a large Arizona school district met individually with 18 of his most senior teachers to inform them that they would not have a job the following year. Why didn't tenure protect them from wholesale dismissal? The answer is they all had one thing in common: they were retirees who had been leased or hired…
[Developing touch through rugby].
Becas, Didier; Luksenberg, Marion; Denis, Sandrine
2013-01-01
Rugby subjects the body to a tough test. Attack, defence, contact, touching are all elements which form part of this physical activity. It is very structured and safe from a psychological perspective. Taking pleasure in the game, with its rules, helps patients to develop interpersonal and relationship skills.
Another Discussion about Academic Corruption
ERIC Educational Resources Information Center
Changgeng, Li
2007-01-01
Academic corruption is a commonplace matter about which all people are clearly aware. However, people often overlook many hidden or latent manifestations of academic corruption. This article discusses eight of these manifestations: indiscriminate use of the academic team spirit, the proliferation of "word games," deliberate attacks on…
Under multilevel selection: "when shall you be neither spiteful nor envious?".
Garay, József; Csiszár, Villő; Móri, Tamás F
2014-01-07
In this paper, we study the egalitarianism-game in multilevel selection situation. The individuals form reproductive groups. In each group, an egalitarianism-game determines the number of juveniles of different phenotypes (spiteful, envious, neutral and donator). Before the juveniles form the next reproductive group, they have to survive either predators' attacks or a fight between two groups. We adopt the ESS definition of Maynard Smith to multilevel selection. Based on the "group size advantage" assumption (which claims that each juvenile's survival rate depends on the size of his own group, supposing that either the survival rate under predators' attacks is higher in larger groups, or in inter-group aggression usually the larger group wins) we found that when the survival probability has a massive effect on the average fitness, then "group fitness maximizing behavior" (in our case, either neutral or donator) has evolutionary advantage over "competitive behavior" (in our case, either spiteful or envious). © 2013 Elsevier Ltd. All rights reserved.
Energy-efficient privacy protection for smart home environments using behavioral semantics.
Park, Homin; Basaran, Can; Park, Taejoon; Son, Sang Hyuk
2014-09-02
Research on smart environments saturated with ubiquitous computing devices is rapidly advancing while raising serious privacy issues. According to recent studies, privacy concerns significantly hinder widespread adoption of smart home technologies. Previous work has shown that it is possible to infer the activities of daily living within environments equipped with wireless sensors by monitoring radio fingerprints and traffic patterns. Since data encryption cannot prevent privacy invasions exploiting transmission pattern analysis and statistical inference, various methods based on fake data generation for concealing traffic patterns have been studied. In this paper, we describe an energy-efficient, light-weight, low-latency algorithm for creating dummy activities that are semantically similar to the observed phenomena. By using these cloaking activities, the amount of fake data transmissions can be flexibly controlled to support a trade-off between energy efficiency and privacy protection. According to the experiments using real data collected from a smart home environment, our proposed method can extend the lifetime of the network by more than 2× compared to the previous methods in the literature. Furthermore, the activity cloaking method supports low latency transmission of real data while also significantly reducing the accuracy of the wireless snooping attacks.
Energy-Efficient Privacy Protection for Smart Home Environments Using Behavioral Semantics
Park, Homin; Basaran, Can; Park, Taejoon; Son, Sang Hyuk
2014-01-01
Research on smart environments saturated with ubiquitous computing devices is rapidly advancing while raising serious privacy issues. According to recent studies, privacy concerns significantly hinder widespread adoption of smart home technologies. Previous work has shown that it is possible to infer the activities of daily living within environments equipped with wireless sensors by monitoring radio fingerprints and traffic patterns. Since data encryption cannot prevent privacy invasions exploiting transmission pattern analysis and statistical inference, various methods based on fake data generation for concealing traffic patterns have been studied. In this paper, we describe an energy-efficient, light-weight, low-latency algorithm for creating dummy activities that are semantically similar to the observed phenomena. By using these cloaking activities, the amount of fake data transmissions can be flexibly controlled to support a trade-off between energy efficiency and privacy protection. According to the experiments using real data collected from a smart home environment, our proposed method can extend the lifetime of the network by more than 2× compared to the previous methods in the literature. Furthermore, the activity cloaking method supports low latency transmission of real data while also significantly reducing the accuracy of the wireless snooping attacks. PMID:25184489
Boeing Smart Rotor Full-scale Wind Tunnel Test Data Report
NASA Technical Reports Server (NTRS)
Kottapalli, Sesi; Hagerty, Brandon; Salazar, Denise
2016-01-01
A full-scale helicopter smart material actuated rotor technology (SMART) rotor test was conducted in the USAF National Full-Scale Aerodynamics Complex 40- by 80-Foot Wind Tunnel at NASA Ames. The SMART rotor system is a five-bladed MD 902 bearingless rotor with active trailing-edge flaps. The flaps are actuated using piezoelectric actuators. Rotor performance, structural loads, and acoustic data were obtained over a wide range of rotor shaft angles of attack, thrust, and airspeeds. The primary test objective was to acquire unique validation data for the high-performance computing analyses developed under the Defense Advanced Research Project Agency (DARPA) Helicopter Quieting Program (HQP). Other research objectives included quantifying the ability of the on-blade flaps to achieve vibration reduction, rotor smoothing, and performance improvements. This data set of rotor performance and structural loads can be used for analytical and experimental comparison studies with other full-scale rotor systems and for analytical validation of computer simulation models. The purpose of this final data report is to document a comprehensive, highquality data set that includes only data points where the flap was actively controlled and each of the five flaps behaved in a similar manner.
Game theoretic analysis of physical protection system design
DOE Office of Scientific and Technical Information (OSTI.GOV)
Canion, B.; Schneider, E.; Bickel, E.
The physical protection system (PPS) of a fictional small modular reactor (SMR) facility have been modeled as a platform for a game theoretic approach to security decision analysis. To demonstrate the game theoretic approach, a rational adversary with complete knowledge of the facility has been modeled attempting a sabotage attack. The adversary adjusts his decisions in response to investments made by the defender to enhance the security measures. This can lead to a conservative physical protection system design. Since defender upgrades were limited by a budget, cost benefit analysis may be conducted upon security upgrades. One approach to cost benefitmore » analysis is the efficient frontier, which depicts the reduction in expected consequence per incremental increase in the security budget.« less
Mean-Field-Game Model for Botnet Defense in Cyber-Security
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kolokoltsov, V. N., E-mail: v.kolokoltsov@warwick.ac.uk; Bensoussan, A.
We initiate the analysis of the response of computer owners to various offers of defence systems against a cyber-hacker (for instance, a botnet attack), as a stochastic game of a large number of interacting agents. We introduce a simple mean-field game that models their behavior. It takes into account both the random process of the propagation of the infection (controlled by the botner herder) and the decision making process of customers. Its stationary version turns out to be exactly solvable (but not at all trivial) under an additional natural assumption that the execution time of the decisions of the customersmore » (say, switch on or out the defence system) is much faster that the infection rates.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Happenny, Sean F.
The United States’ power infrastructure is aging, underfunded, and vulnerable to cyber attack. Emerging smart grid technologies may take some of the burden off of existing systems and make the grid as a whole more efficient, reliable, and secure. The Pacific Northwest National Laboratory (PNNL) is funding research into several aspects of smart grid technology and grid security, creating a software simulation tool that will allow researchers to test power distribution networks utilizing different smart grid technologies to determine how the grid and these technologies react under different circumstances. Demonstrating security in embedded systems is another research area PNNL ismore » tackling. Many of the systems controlling the U.S. critical infrastructure, such as the power grid, lack integrated security and the networks protecting them are becoming easier to breach. Providing a virtual power substation network to each student team at the National Collegiate Cyber Defense Competition, thereby supporting the education of future cyber security professionals, is another way PNNL is helping to strengthen the security of the nation’s power infrastructure.« less
Energy Theft in the Advanced Metering Infrastructure
NASA Astrophysics Data System (ADS)
McLaughlin, Stephen; Podkuiko, Dmitry; McDaniel, Patrick
Global energy generation and delivery systems are transitioning to a new computerized "smart grid". One of the principle components of the smart grid is an advanced metering infrastructure (AMI). AMI replaces the analog meters with computerized systems that report usage over digital communication interfaces, e.g., phone lines. However, with this infrastructure comes new risk. In this paper, we consider adversary means of defrauding the electrical grid by manipulating AMI systems. We document the methods adversaries will use to attempt to manipulate energy usage data, and validate the viability of these attacks by performing penetration testing on commodity devices. Through these activities, we demonstrate that not only is theft still possible in AMI systems, but that current AMI devices introduce a myriad of new vectors for achieving it.
Li, Yuancheng; Jing, Sitong
2018-01-01
Advanced Metering Infrastructure (AMI) realizes a two-way communication of electricity data through by interconnecting with a computer network as the core component of the smart grid. Meanwhile, it brings many new security threats and the traditional intrusion detection method can’t satisfy the security requirements of AMI. In this paper, an intrusion detection system based on Online Sequence Extreme Learning Machine (OS-ELM) is established, which is used to detecting the attack in AMI and carrying out the comparative analysis with other algorithms. Simulation results show that, compared with other intrusion detection methods, intrusion detection method based on OS-ELM is more superior in detection speed and accuracy. PMID:29485990
Active Control Technology at NASA Langley Research Center
NASA Technical Reports Server (NTRS)
Antcliff, Richard R.; McGowan, Anna-Marie R.
2000-01-01
NASA Langley has a long history of attacking important technical Opportunities from a broad base of supporting disciplines. The research and development at Langley in this subject area range from the test tube to the test flight, The information covered here will range from the development of innovative new materials, sensors and actuators, to the incorporation of smart sensors and actuators in practical devices, to the optimization of the location of these devices, to, finally, a wide variety of applications of these devices utilizing Langley's facilities and expertise. Advanced materials are being developed for sensors and actuators, as well as polymers for integrating smart devices into composite structures. Contributions reside in three key areas: computational materials; advanced piezoelectric materials; and integrated composite structures.
Football APP based on smart phone with FES in drop foot rehabilitation.
Ciou, Shih-Hsiang; Hwang, Yuh-Shyan; Chen, Chih-Chen; Luh, Jer-Junn; Chen, Shih-Ching; Chen, Yu-Luen
2017-01-01
Long-term, sustained progress is necessary in drop foot rehabilitation. The necessary inconvenient body training movements, the return trips to the hospital and repetitive boring training using functional electrical stimulation (FES) often results in the patient suspending their training. The patient's drop foot rehabilitation will not progress if training is suspended. A fast spread, highly portable drop foot rehabilitation training device based on the smart phone is presented. This device is combined with a self-made football APP and feedback controlled FES. The drop foot patient can easily engage in long term rehabilitation training that is more convenient and interesting. An interactive game is established on the smart phone with the Android system using the originally built-in wireless communications. The ankle angle information is detected by an external portable device as the game input signal. The electrical stimulation command to the external device is supplemented with FES stimulation for inadequate ankle efforts. After six-weeks training using six cases, the results indicated that this training device showed significant performance improvement (p< 0.05) in the patient's ankle dorsiflexion strength, ankle dorsiflexion angle, control timing and Timed Up and Go. Preliminary results show that this training device provides significant positive help to drop foot patients. Moreover, this device is based on existing and universally popular mobile processing, which can be rapidly promoted. The responses of clinical cases also show this system is easy to operate, convenient and entertaining. All of these features can improve the patient's willingness to engage in long term rehabilitation.
Serious games for screening pre-dementia conditions: from virtuality to reality? A pilot project.
Zucchella, Chiara; Sinforiani, Elena; Tassorelli, Cristina; Cavallini, Elena; Tost-Pardell, Daniela; Grau, Sergi; Pazzi, Stefania; Puricelli, Stefano; Bernini, Sara; Bottiroli, Sara; Vecchi, Tomaso; Sandrini, Giorgio; Nappi, Giuseppe
2014-01-01
Conventional cognitive assessment is based on a pencil-and-paper neuropsychological evaluation, which is time consuming, expensive and requires the involvement of several professionals. Information and communication technology could be exploited to allow the development of tools that are easy to use, reduce the amount of data processing, and provide controllable test conditions. Serious games (SGs) have the potential to be new and effective tools in the management and treatment of cognitive impairments Serious games for screening pre-dementia conditions: from virtuality to reality? A pilot project in the elderly. Moreover, by adopting SGs in 3D virtual reality settings, cognitive functions might be evaluated using tasks that simulate daily activities, increasing the "ecological validity" of the assessment. In this commentary we report our experience in the creation of the Smart Aging platform, a 3D SGand virtual environment-based platform for the early identification and characterization of mild cognitive impairment.
Sensor Systems for Biological Agent Attacks: Protecting Buildings and Military Bases
2004-01-01
simple aerosol detectors, to those that identify an agent based on its genetic, structural, or chemical properties , to so- called "functional...Cytometry, 122 Target Binding That Changes Detectable Properties of Smart Sensor Surfaces, 124 Colorimetric Detection, 124 Fluorescence Detection, 125 One...microscopy. In addition to particles directly derived from living organisms, other particles in air may also share properties with the bioaerosols
Let's get technical! Gaming and technology for weight control and health promotion in children.
Baranowski, Tom; Frankel, Leslie
2012-02-01
Most children, including lower socioeconomic status and ethnic minority children, play video games, use computers, and have cell phones, and growing numbers have smart phones and electronic tablets. They are comfortable with, even prefer, electronic media. Many expect to be entertained and have a low tolerance for didactic methods. Thus, health promotion with children needs to incorporate more interactive media. Interactive media for weight control and health promotion among children can be broadly classified into web-based educational/therapeutic programs, tailored motivational messaging systems, data monitoring and feedback systems, active video games, and diverse forms of interactive multimedia experiences involving games. This article describes the primary characteristics of these different technological methods; presents the strengths and weaknesses of each in meeting the needs of children of different ages; emphasizes that we are in the earliest stages of knowing how best to design these systems, including selecting the optimal requisite behavioral change theories; and identifies high-priority research issues. Gaming and technology offer many exciting, innovative opportunities for engaging children and promoting diet and physical activity changes that can contribute to obesity prevention and weight loss maintenance. Research needs to clarify optimal procedures for effectively promoting change with each change procedure.
Effectiveness of the call in beach volleyball attacking play.
Künzell, Stefan; Schweikart, Florian; Köhn, Daniel; Schläppi-Lienhard, Olivia
2014-12-09
In beach volleyball the setter has the opportunity to give her or his hitter a "call". The call intends that the setter suggests to her or his partner where to place the attack in the opponent's court. The effectiveness of a call is still unknown. We investigated the women's and men's Swiss National Beach Volleyball Championships in 2011 and analyzed 2185 attacks. We found large differences between female and male players. While men called in only 38.4% of attacks, women used calls in 85.5% of attacks. If the male players followed a given call, 63% of the attacks were successful. The success rate of attacks without any call was 55.8% and 47.6% when the call was ignored. These differences were not significant (χ(2)(2) = 4.55, p = 0.103). In women's beach volleyball, the rate of successful attacks was 61.5% when a call was followed, 35% for attacks without a call, and 42.6% when a call was ignored. The differences were highly significant (χ(2)(2) = 23.42, p < 0.0005). Taking into account the findings of the present study, we suggested that the call was effective in women's beach volleyball, while its effect in men's game was unclear. Considering the quality of calls we indicate that there is a significant potential to increase the effectiveness of a call.
Defender-Attacker Decision Tree Analysis to Combat Terrorism.
Garcia, Ryan J B; von Winterfeldt, Detlof
2016-12-01
We propose a methodology, called defender-attacker decision tree analysis, to evaluate defensive actions against terrorist attacks in a dynamic and hostile environment. Like most game-theoretic formulations of this problem, we assume that the defenders act rationally by maximizing their expected utility or minimizing their expected costs. However, we do not assume that attackers maximize their expected utilities. Instead, we encode the defender's limited knowledge about the attacker's motivations and capabilities as a conditional probability distribution over the attacker's decisions. We apply this methodology to the problem of defending against possible terrorist attacks on commercial airplanes, using one of three weapons: infrared-guided MANPADS (man-portable air defense systems), laser-guided MANPADS, or visually targeted RPGs (rocket propelled grenades). We also evaluate three countermeasures against these weapons: DIRCMs (directional infrared countermeasures), perimeter control around the airport, and hardening airplanes. The model includes deterrence effects, the effectiveness of the countermeasures, and the substitution of weapons and targets once a specific countermeasure is selected. It also includes a second stage of defensive decisions after an attack occurs. Key findings are: (1) due to the high cost of the countermeasures, not implementing countermeasures is the preferred defensive alternative for a large range of parameters; (2) if the probability of an attack and the associated consequences are large, a combination of DIRCMs and ground perimeter control are preferred over any single countermeasure. © 2016 Society for Risk Analysis.
Cyber security challenges in Smart Cities: Safety, security and privacy
Elmaghraby, Adel S.; Losavio, Michael M.
2014-01-01
The world is experiencing an evolution of Smart Cities. These emerge from innovations in information technology that, while they create new economic and social opportunities, pose challenges to our security and expectations of privacy. Humans are already interconnected via smart phones and gadgets. Smart energy meters, security devices and smart appliances are being used in many cities. Homes, cars, public venues and other social systems are now on their path to the full connectivity known as the “Internet of Things.” Standards are evolving for all of these potentially connected systems. They will lead to unprecedented improvements in the quality of life. To benefit from them, city infrastructures and services are changing with new interconnected systems for monitoring, control and automation. Intelligent transportation, public and private, will access a web of interconnected data from GPS location to weather and traffic updates. Integrated systems will aid public safety, emergency responders and in disaster recovery. We examine two important and entangled challenges: security and privacy. Security includes illegal access to information and attacks causing physical disruptions in service availability. As digital citizens are more and more instrumented with data available about their location and activities, privacy seems to disappear. Privacy protecting systems that gather data and trigger emergency response when needed are technological challenges that go hand-in-hand with the continuous security challenges. Their implementation is essential for a Smart City in which we would wish to live. We also present a model representing the interactions between person, servers and things. Those are the major element in the Smart City and their interactions are what we need to protect. PMID:25685517
Security enhanced multi-factor biometric authentication scheme using bio-hash function
Lee, Youngsook; Moon, Jongho
2017-01-01
With the rapid development of personal information and wireless communication technology, user authentication schemes have been crucial to ensure that wireless communications are secure. As such, various authentication schemes with multi-factor authentication have been proposed to improve the security of electronic communications. Multi-factor authentication involves the use of passwords, smart cards, and various biometrics to provide users with the utmost privacy and data protection. Cao and Ge analyzed various authentication schemes and found that Younghwa An’s scheme was susceptible to a replay attack where an adversary masquerades as a legal server and a user masquerading attack where user anonymity is not provided, allowing an adversary to execute a password change process by intercepting the user’s ID during login. Cao and Ge improved upon Younghwa An’s scheme, but various security problems remained. This study demonstrates that Cao and Ge’s scheme is susceptible to a biometric recognition error, slow wrong password detection, off-line password attack, user impersonation attack, ID guessing attack, a DoS attack, and that their scheme cannot provide session key agreement. Then, to address all weaknesses identified in Cao and Ge’s scheme, this study proposes a security enhanced multi-factor biometric authentication scheme and provides a security analysis and formal analysis using Burrows-Abadi-Needham logic. Finally, the efficiency analysis reveals that the proposed scheme can protect against several possible types of attacks with only a slightly high computational cost. PMID:28459867
Amin, Ruhul; Islam, S K Hafizul; Biswas, G P; Khan, Muhammad Khurram; Li, Xiong
2015-11-01
The E-health care systems employ IT infrastructure for maximizing health care resources utilization as well as providing flexible opportunities to the remote patient. Therefore, transmission of medical data over any public networks is necessary in health care system. Note that patient authentication including secure data transmission in e-health care system is critical issue. Although several user authentication schemes for accessing remote services are available, their security analysis show that none of them are free from relevant security attacks. We reviewed Das et al.'s scheme and demonstrated their scheme lacks proper protection against several security attacks such as user anonymity, off-line password guessing attack, smart card theft attack, user impersonation attack, server impersonation attack, session key discloser attack. In order to overcome the mentioned security pitfalls, this paper proposes an anonymity preserving remote patient authentication scheme usable in E-health care systems. We then validated the security of the proposed scheme using BAN logic that ensures secure mutual authentication and session key agreement. We also presented the experimental results of the proposed scheme using AVISPA software and the results ensure that our scheme is secure under OFMC and CL-AtSe models. Moreover, resilience of relevant security attacks has been proved through both formal and informal security analysis. The performance analysis and comparison with other schemes are also made, and it has been found that the proposed scheme overcomes the security drawbacks of the Das et al.'s scheme and additionally achieves extra security requirements.
NASA Astrophysics Data System (ADS)
Yu, Yan; Zhou, Yaping; Zhao, Xuefeng; Li, Dongsheng; Ou, Jinping
2016-04-01
As an important part of new information technology, the Internet of Things(IoT) is based on intelligent perception, recognition technology, ubiquitous computing, ubiquitous network integration, and it is known as the third wave of the development of information industry in the world after the computer and the Internet. And Smart Phones are the general term for a class of mobile phones with a separate operating system and operational memory, in which the third-party service programs including software, games, navigation, et.al, can be installed. Smart Phones, with not only sensors but also actuators, are widely used in the IoT world. As the current hot issues in the engineering area, Structural health monitoring (SHM) is also facing new problems about design ideas in the IoT environment. The development of IoT, wireless sensor network and mobile communication technology, provides a good technical platform for SHM. Based on these facts, this paper introduces a kind of new idea for Structural Health Monitoring using Smart Phones Technique. The system is described in detail, and the external sensor board based on Bluetooth interface is designed, the test based on Smart Phones is finished to validate the implementation and feasibility. The research is preliminary and more tests need to be carried out before it can be of practical use.
Heterogeneous Air Defense Battery Location: A Game Theoretic Approach
In the air defense context of a missile-and-interceptor engagement, a challenge for the defender is that surface to air interceptor missile batteries ...often must be located to protect high-value targets dispersed over a vast area, subject to an attacker observing the disposition of batteries prior
Teaching Game Theory to Improve Adversarial Thinking in Cybersecurity Students
ERIC Educational Resources Information Center
Hamman, Seth T.; Hopkinson, Kenneth M.; Markham, Ruth L.; Chaplik, Andrew M.; Metzler, Gabrielle E.
2017-01-01
The ability to anticipate the strategic actions of hackers, including where, when, and how they might attack, and their tactics for evading detection, is a valuable skill for cybersecurity. Therefore, developing the strategic reasoning abilities of cybersecurity students is an important cybersecurity education learning objective. This paper…
Gamification of Medication Adherence in Epilepsy.
Abdul Rahim, Mohammad Izzat; Thomas, Rhys Huw
2017-11-01
Adherence to medication regimens is a crucial factor in seizure-freedom and well-being for people with epilepsy. In contrast, taking medication inconsistently increases the risk of not only seizures and their adverse effects, but drug side-effects and unnecessary modifications to treatment plans. Epilepsy is prevalent across all age groups and we have been slow to utilise both the technologies and psychologies derived from computer gaming. Gaming has broken through to the mainstream and is no longer the preserve of younger males, mirroring the adoption of smart-phones. 'Gamification' motivates users into engaging in an activity with a higher intensity and duration. Introducing gaming elements into a non-gaming context has the potential to transform routine tasks into more enjoyable and motivating experiences. This has been exploited by marketing executives, but also has clear uses in a healthcare setting too. We discuss how previously published frameworks could be employed to help people with epilepsy adhere to medication regimens to create a patient-focussed, modifiable and fun experience. Copyright © 2017 British Epilepsy Association. Published by Elsevier Ltd. All rights reserved.
Mishra, Dheerendra
2015-03-01
Smart card based authentication and key agreement schemes for telecare medicine information systems (TMIS) enable doctors, nurses, patients and health visitors to use smart cards for secure login to medical information systems. In recent years, several authentication and key agreement schemes have been proposed to present secure and efficient solution for TMIS. Most of the existing authentication schemes for TMIS have either higher computation overhead or are vulnerable to attacks. To reduce the computational overhead and enhance the security, Lee recently proposed an authentication and key agreement scheme using chaotic maps for TMIS. Xu et al. also proposed a password based authentication and key agreement scheme for TMIS using elliptic curve cryptography. Both the schemes provide better efficiency from the conventional public key cryptography based schemes. These schemes are important as they present an efficient solution for TMIS. We analyze the security of both Lee's scheme and Xu et al.'s schemes. Unfortunately, we identify that both the schemes are vulnerable to denial of service attack. To understand the security failures of these cryptographic schemes which are the key of patching existing schemes and designing future schemes, we demonstrate the security loopholes of Lee's scheme and Xu et al.'s scheme in this paper.
Gestion de stockage d'energie thermique d'un parc de chauffe-eaux par une commande a champ moyen
NASA Astrophysics Data System (ADS)
Bourdel, Benoit
In today's energy transition, smart grids and electrical load control are very active research fields. This master's thesis is an offshoot of the SmartDesc project which aims at using energy storage capability of electric household appliances, such as water heaters and electric heaters to mitigate the fluctuations of system loads and renewable generation. The smartDESC project aims at demonstrating that the mean field game theory (MFG), as new mathematical theory, can be used to convert and control water heaters (and possibly space heater) into smart thermal capacities. Thus, a set of "modules" has been developed. These modules are used to generate the optimal control and locally interpret it, to simulate the water-heater thermophysics or water draw event, or to virtualize a telecommunication mesh network. The different aspects of the project have been first studied and developed separately. During the course of this master's research, the modules have been integrated, tested, interfaced and tuned in a common simulator. This simulator is designed to make complete electrical network simulations with a multi-scale approach (from individual water heater to global electric load and production). Firstly, the modules are precisely described theoretically and practically. Then, different types of control are applied to an uniform population of houses fitted with water heaters and controllers. The results of these controls are analysed and compared in order to understand their strengths and weaknesses. Finally, a study was conducted to analyse the resilience of a mean field control. This report demonstrates that mean field game theory in coordination with a system level aggregate model based optimization program, is able to effectively control a large population of water heaters to smooth the overall electrical load. This control offers good resilience to unforeseen circumstances that can disrupt the network. It is also demonstrated that a mean field control is able to absorb fluctuations due to wind power production. Thus, by reducing the variability of the residential sector's electrical charge, the mean field control plays a role in increasing power system stability in the face of high levels of renewable energy penetration. The next stage of smartDESC project is now to set up an intelligent electric water heater prototype. This prototype, in progress since January 2016 at Ecole Polytechnique in Montreal, is aimed at proving concretely the theories developed in the project.
Kim, Jiye; Lee, Donghoon; Jeon, Woongryul; Lee, Youngsook; Won, Dongho
2014-04-09
User authentication and key management are two important security issues in WSNs (Wireless Sensor Networks). In WSNs, for some applications, the user needs to obtain real-time data directly from sensors and several user authentication schemes have been recently proposed for this case. We found that a two-factor mutual authentication scheme with key agreement in WSNs is vulnerable to gateway node bypassing attacks and user impersonation attacks using secret data stored in sensor nodes or an attacker's own smart card. In this paper, we propose an improved scheme to overcome these security weaknesses by storing secret data in unique ciphertext form in each node. In addition, our proposed scheme should provide not only security, but also efficiency since sensors in a WSN operate with resource constraints such as limited power, computation, and storage space. Therefore, we also analyze the performance of the proposed scheme by comparing its computation and communication costs with those of other schemes.
Kim, Jiye; Lee, Donghoon; Jeon, Woongryul; Lee, Youngsook; Won, Dongho
2014-01-01
User authentication and key management are two important security issues in WSNs (Wireless Sensor Networks). In WSNs, for some applications, the user needs to obtain real-time data directly from sensors and several user authentication schemes have been recently proposed for this case. We found that a two-factor mutual authentication scheme with key agreement in WSNs is vulnerable to gateway node bypassing attacks and user impersonation attacks using secret data stored in sensor nodes or an attacker's own smart card. In this paper, we propose an improved scheme to overcome these security weaknesses by storing secret data in unique ciphertext form in each node. In addition, our proposed scheme should provide not only security, but also efficiency since sensors in a WSN operate with resource constraints such as limited power, computation, and storage space. Therefore, we also analyze the performance of the proposed scheme by comparing its computation and communication costs with those of other schemes. PMID:24721764
Hiding Critical Targets in Smart Grid Networks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bao, Wei; Li, Qinghua
With the integration of advanced communication technologies, the power grid is expected to greatly enhance efficiency and reliability of future power systems. However, since most electrical devices in power grid substations are connected via communication networks, cyber security of these communication networks becomes a critical issue. Real-World incidents such as Stuxnet have shown the feasibility of compromising a device in the power grid network to further launch more sophisticated attacks. To deal with security attacks of this spirit, this paper aims to hide critical targets from compromised internal nodes and hence protect them from further attacks launched by those compromisedmore » nodes. In particular, we consider substation networks and propose to add carefully-controlled dummy traffic to a substation network to make critical target nodes indistinguishable from other nodes in network traffic patterns. This paper describes the design and evaluation of such a scheme. Evaluations show that the scheme can effectively protect critical nodes with acceptable communication cost.« less
Game Performance Evaluation in Male Goalball Players
Molik, Bartosz; Morgulec-Adamowicz, Natalia; Kosmol, Andrzej; Perkowski, Krzysztof; Bednarczuk, Grzegorz; Skowroński, Waldemar; Gomez, Miguel Angel; Koc, Krzysztof; Rutkowska, Izabela; Szyman, Robert J
2015-01-01
Goalball is a Paralympic sport exclusively for athletes who are visually impaired and blind. The aims of this study were twofold: to describe game performance of elite male goalball players based upon the degree of visual impairment, and to determine if game performance was related to anthropometric characteristics of elite male goalball players. The study sample consisted of 44 male goalball athletes. A total of 38 games were recorded during the Summer Paralympic Games in London 2012. Observations were reported using the Game Efficiency Sheet for Goalball. Additional anthropometric measurements included body mass (kg), body height (cm), the arm span (cm) and length of the body in the defensive position (cm). The results differentiating both groups showed that the players with total blindness obtained higher means than the players with visual impairment for game indicators such as the sum of defense (p = 0.03) and the sum of good defense (p = 0.04). The players with visual impairment obtained higher results than those with total blindness for attack efficiency (p = 0.04), the sum of penalty defenses (p = 0.01), and fouls (p = 0.01). The study showed that athletes with blindness demonstrated higher game performance in defence. However, athletes with visual impairment presented higher efficiency in offensive actions. The analyses confirmed that body mass, body height, the arm span and length of the body in the defensive position did not differentiate players’ performance at the elite level. PMID:26834872
DOE Office of Scientific and Technical Information (OSTI.GOV)
McKinnon, Archibald D.; Thompson, Seth R.; Doroshchuk, Ruslan A.
mart grid technologies are transforming the electric power grid into a grid with bi-directional flows of both power and information. Operating millions of new smart meters and smart appliances will significantly impact electric distribution systems resulting in greater efficiency. However, the scale of the grid and the new types of information transmitted will potentially introduce several security risks that cannot be addressed by traditional, centralized security techniques. We propose a new bio-inspired cyber security approach. Social insects, such as ants and bees, have developed complex-adaptive systems that emerge from the collective application of simple, light-weight behaviors. The Digital Ants frameworkmore » is a bio-inspired framework that uses mobile light-weight agents. Sensors within the framework use digital pheromones to communicate with each other and to alert each other of possible cyber security issues. All communication and coordination is both localized and decentralized thereby allowing the framework to scale across the large numbers of devices that will exist in the smart grid. Furthermore, the sensors are light-weight and therefore suitable for implementation on devices with limited computational resources. This paper will provide a brief overview of the Digital Ants framework and then present results from test bed-based demonstrations that show that Digital Ants can identify a cyber attack scenario against smart meter deployments.« less
Security in Intelligent Transport Systems for Smart Cities: From Theory to Practice.
Javed, Muhammad Awais; Ben Hamida, Elyes; Znaidi, Wassim
2016-06-15
Connecting vehicles securely and reliably is pivotal to the implementation of next generation ITS applications of smart cities. With continuously growing security threats, vehicles could be exposed to a number of service attacks that could put their safety at stake. To address this concern, both US and European ITS standards have selected Elliptic Curve Cryptography (ECC) algorithms to secure vehicular communications. However, there is still a lack of benchmarking studies on existing security standards in real-world settings. In this paper, we first analyze the security architecture of the ETSI ITS standard. We then implement the ECC based digital signature and encryption procedures using an experimental test-bed and conduct an extensive benchmark study to assess their performance which depends on factors such as payload size, processor speed and security levels. Using network simulation models, we further evaluate the impact of standard compliant security procedures in dense and realistic smart cities scenarios. Obtained results suggest that existing security solutions directly impact the achieved quality of service (QoS) and safety awareness of vehicular applications, in terms of increased packet inter-arrival delays, packet and cryptographic losses, and reduced safety awareness in safety applications. Finally, we summarize the insights gained from the simulation results and discuss open research challenges for efficient working of security in ITS applications of smart cities.
Interpersonal distance regulates functional grouping tendencies of agents in team sports.
Passos, Pedro; Milho, João; Fonseca, Sofia; Borges, João; Araújo, Duarte; Davids, Keith
2011-01-01
The authors examined whether, similar to collective agent behaviors in complex, biological systems (e.g., schools of fish and colonies of ants), performers in team sports displayed functional coordination tendencies, based on local interaction rules during performance. To investigate this issue, they used videogrammetry and digitizing procedures to observe interpersonal interactions in common 4 versus 2 + 2 subphases of the team sport of rugby union, involving 16 participants aged between 16 and 17 years of age. They observed pattern-forming dynamics in attacking subunits (n = 4 players) attempting to penetrate 2 defensive lines (n = 2 players in each). Data showed that within each attacking subunit, the 4 players displayed emergent functional grouping tendencies that differed between the 2 defensive lines. Results confirmed that grouping tendencies in attacking subunits of team games are sensitive to different task constraints, such as relative positioning to nearest defenders. It was concluded that running correlations were particularly useful for measuring the level of interpersonal coordination in functional grouping tendencies within attacking subunits.
Smart Building. Volume 2: System Description
2006-05-01
demonstrated.this technology at the 2002 Winter Olympic Games in Salt Lake City, Utah. The system was installed on a building known as Social Hall Plaza...select the detailed engineering contractors. 3.1.3.8 Sealing the Protective Envelope Due to the type of roof construction on the building there was ...in time to support the Olympics . Prototype testing was completed following the Olympics and additional testing may be performed to better
Mei, Haibo; Poslad, Stefan; Du, Shuang
2017-12-11
Intelligent Transportation Systems (ITSs) can be applied to inform and incentivize travellers to help them make cognizant choices concerning their trip routes and transport modality use for their daily travel whilst achieving more sustainable societal and transport authority goals. However, in practice, it is challenging for an ITS to enable incentive generation that is context-driven and personalized, whilst supporting multi-dimensional travel goals. This is because an ITS has to address the situation where different travellers have different travel preferences and constraints for route and modality, in the face of dynamically-varying traffic conditions. Furthermore, personalized incentive generation also needs to dynamically achieve different travel goals from multiple travellers, in the face of their conducts being a mix of both competitive and cooperative behaviours. To address this challenge, a Rule-based Incentive Framework (RIF) is proposed in this paper that utilizes both decision tree and evolutionary game theory to process travel information and intelligently generate personalized incentives for travellers. The travel information processed includes travellers' mobile patterns, travellers' modality preferences and route traffic volume information. A series of MATLAB simulations of RIF was undertaken to validate RIF to show that it is potentially an effective way to incentivize travellers to change travel routes and modalities as an essential smart city service.
Technical and physical analysis of the 2014 FIFA World Cup Brazil: winners vs. losers.
Rumpf, Michael C; Silva, Joao R; Hertzog, Maxime; Farooq, Abdulaziz; Nassis, George
2017-10-01
The purpose of the present study was to investigate the technical and physical performance parameters that distinguish between teams winning and losing matches in the 2014 FIFA World Cup Brazil. Data were derived from the FIFA website and from live-statistics provided during each game of the world cup. Twelve physical (such as total distance covered in meters (TD), TD in distinct locomotor categories: low-intensity running (LIR; <11 km/h), moderate-intensity running (MIR; 11 to 14 km/h) and high-intensity-running (HIR; >14 km/h)) and 21 technical parameters (total passes, short-, medium- and long-distance passes, total pass completion rate, dangerous attacks, attacking attempts, delivery in penalty area, ball possession, goals, goals from set-pieces, goals per shot on goal, defending saves, shots, shots on goal, shot accuracy, set-pieces, crosses, corners, clearances, yellow cards) were analyzed. Forty-two games in which a winner and consequently a loser were presented after 90 minutes of game time were investigated with independent t-tests. A binary-logistic regression was utilized to investigate whether the significant variables predicted success of the winning teams. The winning teams scored significantly (P<0.05) greater amount of goals, goals per set-pieces, goals per shots on goals, shots on goal and shot accuracy and received significantly lower yellow cards. The binary-logistic regression utilized showed that shot accuracy was the best predictor for success. The physical parameters did not differ between teams winning and losing a match. Technical performance related to goal scoring parameters play a decisive role in World Cup games. Furthermore, scoring efficacy from open-play as well as from set-pieces are crucial to win matches in a World Cup tournament. At this level, physical performance was not the factor to discriminate between winners and losers.
Torrents, Carlota; Ric, Angel; Hristovski, Robert; Torres-Ronda, Lorena; Vicente, Emili; Sampaio, Jaime
2016-01-01
The effects that different constraints have on the exploratory behavior, measured by the variety and quantity of different responses within a game situation, is of the utmost importance for successful performance in team sports. The aim of this study was to determine how the number of teammates and opponents affects the exploratory behavior of both professional and amateur players in small-sided soccer games. Twenty-two professional (age 25.6 ± 4.9 years) and 22 amateur (age 23.1 ± 0.7 years) male soccer players played three small-sided game formats (4 vs. 3, 4 vs. 5, and 4 vs. 7). These trials were video-recorded and a systematic observation instrument was used to notate the actions, which were subsequently analyzed by means of a principal component analysis and the dynamic overlap order parameter (measure to identify the rate and breadth of exploratory behavior on different time scales). Results revealed that a higher the number of opponents required for more frequent ball controls. Moreover, with a higher number of teammates, there were more defensive actions focused on protecting the goal, with more players balancing. In relation to attack, an increase in the number of opponents produced a decrease in passing, driving and controlling actions, while an increase in the number of teammates led to more time being spent in attacking situations. A numerical advantage led to less exploratory behavior, an effect that was especially clear when playing within a team of seven players against four opponents. All teams showed strong effects of the number of teammates on the exploratory behavior when comparing 5 vs 7 or 3 vs 7 teammates. These results seem to be independent of the players' level.
Tactical Wheeled Vehicle Fleet Requirements. Volume 3. Appendixes
1980-10-01
57 PUMPING CENTRAL (WATER A POL) £19 DATA PROCESSING STATION £56 RADAR STATION £20 DEMORALIZATION EQUIPMENT E59 REPAIR PARTS £31 DOUGH MIIINC- AND...resolution games played in support of the study. Detailed aasessments are made for four 24-hour periods with US forces in attack, defend, delay and
Effectiveness of Using Red-Teams to Identify Maritime Security Vulnerabilities to Terrorist Attack
2004-09-01
designs and performs field tests to assess technological concepts. The Army Red Franchise , similarly to the SAFE games of the 1960s, is responsible for...communication than ever before. Of course, when it is necessary to meet in person, colleges, bars and cafes , libraries, and hotels all offer publicly
Game-Theoretic strategies for systems of components using product-form utilities
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rao, Nageswara S; Ma, Cheng-Yu; Hausken, K.
Many critical infrastructures are composed of multiple systems of components which are correlated so that disruptions to one may propagate to others. We consider such infrastructures with correlations characterized in two ways: (i) an aggregate failure correlation function specifies the conditional failure probability of the infrastructure given the failure of an individual system, and (ii) a pairwise correlation function between two systems specifies the failure probability of one system given the failure of the other. We formulate a game for ensuring the resilience of the infrastructure, wherein the utility functions of the provider and attacker are products of an infrastructuremore » survival probability term and a cost term, both expressed in terms of the numbers of system components attacked and reinforced. The survival probabilities of individual systems satisfy first-order differential conditions that lead to simple Nash Equilibrium conditions. We then derive sensitivity functions that highlight the dependence of infrastructure resilience on the cost terms, correlation functions, and individual system survival probabilities. We apply these results to simplified models of distributed cloud computing and energy grid infrastructures.« less
Characterizing Verified Head Impacts in High School Girls' Lacrosse.
Caswell, Shane V; Lincoln, Andrew E; Stone, Hannah; Kelshaw, Patricia; Putukian, Margot; Hepburn, Lisa; Higgins, Michael; Cortes, Nelson
2017-12-01
Girls' high school lacrosse players have higher rates of head and facial injuries than boys. Research indicates that these injuries are caused by stick, player, and ball contacts. Yet, no studies have characterized head impacts in girls' high school lacrosse. To characterize girls' high school lacrosse game-related impacts by frequency, magnitude, mechanism, player position, and game situation. Descriptive epidemiology study. Thirty-five female participants (mean age, 16.2 ± 1.2 years; mean height, 1.66 ± 0.05 m; mean weight, 61.2 ± 6.4 kg) volunteered during 28 games in the 2014 and 2015 lacrosse seasons. Participants wore impact sensors affixed to the right mastoid process before each game. All game-related impacts recorded by the sensors were verified using game video. Data were summarized for all verified impacts in terms of frequency, peak linear acceleration (PLA), and peak rotational acceleration (PRA). Descriptive statistics and impact rates were calculated. Fifty-eight verified game-related impacts ≥20 g were recorded (median PLA, 33.8 g; median PRA, 6151.1 rad/s 2 ) during 467 player-games. The impact rate for all game-related verified impacts was 0.12 per athlete-exposure (AE) (95% CI, 0.09-0.16), equivalent to 2.1 impacts per team game, indicating that each athlete suffered fewer than 2 head impacts per season ≥20 g. Of these impacts, 28 (48.3%) were confirmed to directly strike the head, corresponding with an impact rate of 0.05 per AE (95% CI, 0.00-0.10). Overall, midfielders (n = 28, 48.3%) sustained the most impacts, followed by defenders (n = 12, 20.7%), attackers (n = 11, 19.0%), and goalies (n = 7, 12.1%). Goalies demonstrated the highest median PLA and PRA (38.8 g and 8535.0 rad/s 2 , respectively). The most common impact mechanisms were contact with a stick (n = 25, 43.1%) and a player (n = 17, 29.3%), followed by the ball (n = 7, 12.1%) and the ground (n = 7, 12.1%). One hundred percent of ball impacts occurred to goalies. Most impacts occurred to field players within the attack area of the field (n = 32, 55.2%) or the midfield (n = 18, 31.0%). Most (95%) impacts did not result in a penalty. The incidence of verified head impacts in girls' high school lacrosse was quite low. Ball to head impacts were associated with the highest impact magnitudes. While stick and body contacts are illegal in girls' high school lacrosse, rarely did such impacts to the head result in a penalty. The verification of impact mechanisms using video review is critical to collect impact sensor data.
Game Design and Analysis for Price-Based Demand Response: An Aggregate Game Approach.
Ye, Maojiao; Hu, Guoqiang
2016-02-18
In this paper, an aggregate game is adopted for the modeling and analysis of energy consumption control in smart grid. Since the electricity users' cost functions depend on the aggregate energy consumption, which is unknown to the end users, an average consensus protocol is employed to estimate it. By neighboring communication among the users about their estimations on the aggregate energy consumption, Nash seeking strategies are developed. Convergence properties are explored for the proposed Nash seeking strategies. For energy consumption game that may have multiple isolated Nash equilibria, a local convergence result is derived. The convergence is established by utilizing singular perturbation analysis and Lyapunov stability analysis. Energy consumption control for a network of heating, ventilation, and air conditioning systems is investigated. Based on the uniqueness of the Nash equilibrium, it is shown that the players' actions converge to a neighborhood of the unique Nash equilibrium nonlocally. More specially, if the unique Nash equilibrium is an inner Nash equilibrium, an exponential convergence result is obtained. Energy consumption game with stubborn players is studied. In this case, the actions of the rational players can be driven to a neighborhood of their best response strategies by using the proposed method. Numerical examples are presented to verify the effectiveness of the proposed methods.
Reddy, Alavalapati Goutham; Das, Ashok Kumar; Odelu, Vanga; Yoo, Kee-Young
2016-01-01
Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.'s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN) logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.'s protocol and existing similar protocols.
Red gaming in support of the war on terrorism : Sandia Red Game report.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Moore, Judy Hennessey; Whitley, John B.; Craft, Richard Layne, II
2004-02-01
The Advanced Concepts Group (ACG) at Sandia National Laboratories is exploring the use of Red Teaming to help intelligence analysts with two key processes: determining what a piece or pieces of information might imply and deciding what other pieces of information need to be found to support or refute hypotheses about what actions a suspected terrorist organization might be pursuing. In support of this effort, the ACG hosted a terrorism red gaming event in Albuquerque on July 22-24, 2003. The game involved two 'red teams' playing the roles of two terrorist cells - one focused on implementing an RDD attackmore » on the DC subway system and one focused on a bio attack against the same target - and two 'black teams' playing the role of the intelligence collection system and of intelligence analysts trying to decide what plans the red teams might be pursuing. This exercise successfully engaged human experts to seed a proposed compute engine with detailed operational plans for hypothetical terrorist scenarios.« less
Supersonic Aerodynamic Characteristics of Proposed Mars '07 Smart Lander Configurations
NASA Technical Reports Server (NTRS)
Murphy, Kelly J.; Horvath, Thomas J.; Erickson, Gary E.; Green, Joseph M.
2002-01-01
Supersonic aerodynamic data were obtained for proposed Mars '07 Smart Lander configurations in NASA Langley Research Center's Unitary Plan Wind Tunnel. The primary objective of this test program was to assess the supersonic aerodynamic characteristics of the baseline Smart Lander configuration with and without fixed shelf/tab control surfaces. Data were obtained over a Mach number range of 2.3 to 4.5, at a free stream Reynolds Number of 1 x 10(exp 6) based on body diameter. All configurations were run at angles of attack from -5 to 20 degrees and angles of sideslip of -5 to 5 degrees. These results were complemented with computational fluid dynamic (CFD) predictions to enhance the understanding of experimentally observed aerodynamic trends. Inviscid and viscous full model CFD solutions compared well with experimental results for the baseline and 3 shelf/tab configurations. Over the range tested, Mach number effects were shown to be small on vehicle aerodynamic characteristics. Based on the results from 3 different shelf/tab configurations, a fixed control surface appears to be a feasible concept for meeting aerodynamic performance metrics necessary to satisfy mission requirements.
Smart Cities and the Idea of Smartness in Urban Development - A Critical Review
NASA Astrophysics Data System (ADS)
Husár, Milan; Ondrejička, Vladimír; Ceren Varış, Sıla
2017-10-01
The concept of smart cities is becoming another mantra for both developing and developed cities. For instance, Indian government in 2015 announced its objective to build one hundred smart cities all over the country. They clearly stated that they are choosing smart development as the underlying concept for their future growth as a way to foster economic development in smart way to avoid the paths of rapid industrialization and pollution of cities as it took place in Europe and United States. The first of these smart cities, Dholera, is already under construction and it attracts journalists and urban planners from all over the world. The aim of this paper is to critically discuss the theoretical backgrounds and the practices of smart cities and examine the ways the concept is implemented. The paper is based on thorough study of literature and examining the two case studies of Dholera (India) and Songdo (South Korea). Smart city is a contested concept without a unified definition. It stems from the idea of digital and information city promoted using information and communication technologies (ICT) to develop cities. By installation of ICT municipalities obtain large sets of data which are then transformed into effective urban policies. One of the pilot projects of this kind was Rio de Janeiro and building the Center of Operations by IBM Company. City made a great investment into the smart information system before two huge events took place - FIFA World Cup in 2014 and Olympic Games in 2016. The project raised many questions including whether and how it improved the life of its citizens and in what way it made the city smart. The other definition of smart city is the idea of smartness in city development in broader sense. It focuses on smart use of resources, smart and effective management and smart social inclusion. Within this view, the ICTs are one component of the concept, by no means its bread and butter. Technologies can be used in a variety of ways. Problem occurs when smart city is viewed as means to make investments from city budgets by any price, by promoting use of smart technologies as the only way forward, as necessity. Many companies, including technological giants IBM and CISCO already participate on many smart city projects supplying technologies for smart city projects. In this study, we are looking into two case studies, the city of Dholera in India and city of Songdo in South Korea, both pompous large scale projects. Smart City technologies are growing market which is projected to be annually worth 20 billion dollars by 2020 [19], with IBM participating in 2000 projects accounting for 3 billion dollars [19]. There are many concerns about these developments, among them the issue of equity, whose purposes the projects are serving, how these initiatives are developing cities and the general idea of smartness in urban context. The research concludes that the ambiguity of smart city definition allowing multiple interpretations is frequently bent and used to promote the lobbying of strong players in cities and in private sector.
2014-03-01
Humanitarian Assistance and Disaster Relief HTML HyperText Markup Language IA Information Assurance IAI Israel Aerospace Industries IASA Information ...decision maker at the Command and Control “mini cloud” was of upmost interest . This discussion not only confirmed the need to have information ...2) monitoring for specific cyber attacks on a specified system, (3) alerting information of interest to an operator, and finally (4) allowing the
Network Security Validation Using Game Theory
NASA Astrophysics Data System (ADS)
Papadopoulou, Vicky; Gregoriades, Andreas
Non-functional requirements (NFR) such as network security recently gained widespread attention in distributed information systems. Despite their importance however, there is no systematic approach to validate these requirements given the complexity and uncertainty characterizing modern networks. Traditionally, network security requirements specification has been the results of a reactive process. This however, limited the immunity property of the distributed systems that depended on these networks. Security requirements specification need a proactive approach. Networks' infrastructure is constantly under attack by hackers and malicious software that aim to break into computers. To combat these threats, network designers need sophisticated security validation techniques that will guarantee the minimum level of security for their future networks. This paper presents a game-theoretic approach to security requirements validation. An introduction to game theory is presented along with an example that demonstrates the application of the approach.
Quantum gambling using two nonorthogonal states
NASA Astrophysics Data System (ADS)
Hwang, Won Young; Ahn, Doyeol; Hwang, Sung Woo
2001-12-01
We give a (remote) quantum-gambling scheme that makes use of the fact that quantum nonorthogonal states cannot be distinguished with certainty. In the proposed scheme, two participants Alice and Bob can be regarded as playing a game of making guesses on identities of quantum states that are in one of two given nonorthogonal states: if Bob makes a correct (an incorrect) guess on the identity of a quantum state that Alice has sent, he wins (loses). It is shown that the proposed scheme is secure against the nonentanglement attack. It can also be shown heuristically that the scheme is secure in the case of the entanglement attack.
Esteves, Pedro T; Araújo, Duarte; Vilar, Luís; Travassos, Bruno; Davids, Keith; Esteves, Carlos
2015-04-01
This study examined the continuous interpersonal interactions of performers in dyadic systems in team sports, as a function of changing information constraints. As a task vehicle, we investigated how attackers attained success in 1v1 sub-phases of basketball by exploring angular relations with immediate opponents and the basket. We hypothesized that angular relations would convey information for the attackers to dribble past defenders. Four basketball players performed as an attacker and defender in 1v1 sub-phases of basketball, in which the co-positioning and orientation of participants relative to the basket was manipulated. After video recording performance behaviors, we digitized participant movement displacement trajectories and categorized trials as successful or unsuccessful (from the attackers' viewpoint). Results revealed that, to successfully dribble past a defender, attackers tended to explore the left hand side of the space by defenders by increasing their angular velocity and decreasing their angular variability, especially in the center of the court. Interpersonal interactions and goal-achievement in attacker-defender dyads appear to have been constrained by the angular relations sustained between participants relative to the scoring target. Results revealed the functionality of exploratory behaviors of participants attempting re-align spatial relations with an opponent in 1v1 sub-phases of team games. Copyright © 2015 Elsevier B.V. All rights reserved.
Cryptanalysis of SFLASH with Slightly Modified Parameters
NASA Astrophysics Data System (ADS)
Dubois, Vivien; Fouque, Pierre-Alain; Stern, Jacques
SFLASH is a signature scheme which belongs to a family of multivariate schemes proposed by Patarin et al. in 1998 [9]. The SFLASH scheme itself has been designed in 2001 [8] and has been selected in 2003 by the NESSIE European Consortium [6] as the best known solution for implementation on low cost smart cards. In this paper, we show that slight modifications of the parameters of SFLASH within the general family initially proposed renders the scheme insecure. The attack uses simple linear algebra, and allows to forge a signature for an arbitrary message in a question of minutes for practical parameters, using only the public key. Although SFLASH itself is not amenable to our attack, it is worrying to observe that no rationale was ever offered for this "lucky" choice of parameters.
A Probabilistic Framework for Quantifying Mixed Uncertainties in Cyber Attacker Payoffs
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chatterjee, Samrat; Tipireddy, Ramakrishna; Oster, Matthew R.
Quantification and propagation of uncertainties in cyber attacker payoffs is a key aspect within multiplayer, stochastic security games. These payoffs may represent penalties or rewards associated with player actions and are subject to various sources of uncertainty, including: (1) cyber-system state, (2) attacker type, (3) choice of player actions, and (4) cyber-system state transitions over time. Past research has primarily focused on representing defender beliefs about attacker payoffs as point utility estimates. More recently, within the physical security domain, attacker payoff uncertainties have been represented as Uniform and Gaussian probability distributions, and mathematical intervals. For cyber-systems, probability distributions may helpmore » address statistical (aleatory) uncertainties where the defender may assume inherent variability or randomness in the factors contributing to the attacker payoffs. However, systematic (epistemic) uncertainties may exist, where the defender may not have sufficient knowledge or there is insufficient information about the attacker’s payoff generation mechanism. Such epistemic uncertainties are more suitably represented as generalizations of probability boxes. This paper explores the mathematical treatment of such mixed payoff uncertainties. A conditional probabilistic reasoning approach is adopted to organize the dependencies between a cyber-system’s state, attacker type, player actions, and state transitions. This also enables the application of probabilistic theories to propagate various uncertainties in the attacker payoffs. An example implementation of this probabilistic framework and resulting attacker payoff distributions are discussed. A goal of this paper is also to highlight this uncertainty quantification problem space to the cyber security research community and encourage further advancements in this area.« less
AR.Drone: security threat analysis and exemplary attack to track persons
NASA Astrophysics Data System (ADS)
Samland, Fred; Fruth, Jana; Hildebrandt, Mario; Hoppe, Tobias; Dittmann, Jana
2012-01-01
In this article we illustrate an approach of a security threat analysis of the quadrocopter AR.Drone, a toy for augmented reality (AR) games. The technical properties of the drone can be misused for attacks, which may relate security and/or privacy aspects. Our aim is to sensitize for the possibility of misuses and the motivation for an implementation of improved security mechanisms of the quadrocopter. We focus primarily on obvious security vulnerabilities (e.g. communication over unencrypted WLAN, usage of UDP, live video streaming via unencrypted WLAN to the control device) of this quadrocopter. We could practically verify in three exemplary scenarios that this can be misused by unauthorized persons for several attacks: high-jacking of the drone, eavesdropping of the AR.Drones unprotected video streams, and the tracking of persons. Amongst other aspects, our current research focuses on the realization of the attack of tracking persons and objects with the drone. Besides the realization of attacks, we want to evaluate the potential of this particular drone for a "safe-landing" function, as well as potential security enhancements. Additionally, in future we plan to investigate an automatic tracking of persons or objects without the need of human interactions.
Using Machine Learning in Adversarial Environments.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Warren Leon Davis
Intrusion/anomaly detection systems are among the first lines of cyber defense. Commonly, they either use signatures or machine learning (ML) to identify threats, but fail to account for sophisticated attackers trying to circumvent them. We propose to embed machine learning within a game theoretic framework that performs adversarial modeling, develops methods for optimizing operational response based on ML, and integrates the resulting optimization codebase into the existing ML infrastructure developed by the Hybrid LDRD. Our approach addresses three key shortcomings of ML in adversarial settings: 1) resulting classifiers are typically deterministic and, therefore, easy to reverse engineer; 2) ML approachesmore » only address the prediction problem, but do not prescribe how one should operationalize predictions, nor account for operational costs and constraints; and 3) ML approaches do not model attackers’ response and can be circumvented by sophisticated adversaries. The principal novelty of our approach is to construct an optimization framework that blends ML, operational considerations, and a model predicting attackers reaction, with the goal of computing optimal moving target defense. One important challenge is to construct a realistic model of an adversary that is tractable, yet realistic. We aim to advance the science of attacker modeling by considering game-theoretic methods, and by engaging experimental subjects with red teaming experience in trying to actively circumvent an intrusion detection system, and learning a predictive model of such circumvention activities. In addition, we will generate metrics to test that a particular model of an adversary is consistent with available data.« less
Olthof, Sigrid B H; Frencken, Wouter G P; Lemmink, Koen A P M
2015-06-01
Young soccer players need excellent tactical skills to reach the top. Tactical behavior emerges through interactions between opposing teams. However, few studies have focused on on-field tactical behavior of teams with talented soccer players. Therefore, this study aimed to determine teams' tactical behavior during small-sided games in two age categories, Under-17 and Under-19. Positional data of thirty-nine elite-standard soccer players were collected during twenty-four small-sided games to calculate longitudinal and lateral inter-team distances, stretch indices and length per width ratios. Corresponding interaction patterns and game-to-game variability were also determined. Under-19 showed a significantly larger lateral stretch index and a significantly lower length per width ratio compared with Under-17. Furthermore, teams of both age groups showed similar large proportions of in-phase behavior. Variability of tactical performance measures within and between games was similar for Under-17 and Under-19. Variability within games seems to be functional for attacking teams for creating goal-scoring opportunities. In conclusion, the main difference was that Under-19 adopted a wider pitch dispersion than Under-17, represented by a larger lateral stretch index and smaller length per width ratio. Coach instructions and training exercises should be directed at exploiting pitch width to increase the pursuit of goal-scoring. Copyright © 2015 Elsevier B.V. All rights reserved.
ERIC Educational Resources Information Center
Rosas, Juan M.; Paredes-Olay, Maria C.; Garcia-Gutierrez, Ana; Espinosa, Juan J.; Abad, Maria J. F.
2010-01-01
Three experiments were conducted to explore the effects of different interference treatments upon outcome-specific transfer from predictive learning to instrumental responding. A computer game was designed in which participants had to defend Andalusia from navy and air-force attacks. Participants learned the relationship between two instrumental…
ERIC Educational Resources Information Center
Yates, Dan; Ward, Chris
2014-01-01
This study represents an extension of longitudinal studies regarding personal financial literacy. Graduating college students must have a financial plan in place as they enter the workforce along with a "game plan" on how to attack their college debt. A college personal finance course can help each student develop their personalized…
Pramana, Gede; Parmanto, Bambang; Lomas, James; Lindhiem, Oliver; Kendall, Philip C; Silk, Jennifer
2018-05-10
Cognitive behavioral therapy is an efficacious treatment for child anxiety disorders. Although efficacious, many children (40%-50%) do not show a significant reduction in symptoms or full recovery from primary anxiety diagnoses. One possibility is that they are unwilling to learn and practice cognitive behavioral therapy skills beyond therapy sessions. This can occur for a variety of reasons, including a lack of motivation, forgetfulness, and a lack of cognitive behavioral therapy skills understanding. Mobile health (mHealth) gamification provides a potential solution to improve cognitive behavioral therapy efficacy by delivering more engaging and interactive strategies to facilitate cognitive behavioral therapy skills practice in everyday lives (in vivo). The goal of this project was to redesign an existing mHealth system called SmartCAT (Smartphone-enhanced Child Anxiety Treatment) so as to increase user engagement, retention, and learning facilitation by integrating gamification techniques and interactive features. Furthermore, this project assessed the effectiveness of gamification in improving user engagement and retention throughout posttreatment. We redesigned and implemented the SmartCAT system consisting of a smartphone app for children and an integrated clinician portal. The gamified app contains (1) a series of interactive games and activities to reinforce skill understanding, (2) an in vivo skills coach that cues the participant to use cognitive behavioral therapy skills during real-world emotional experiences, (3) a home challenge module to encourage home-based exposure tasks, (4) a digital reward system that contains digital points and trophies, and (5) a therapist-patient messaging interface. Therapists used a secure Web-based portal connected to the app to set up required activities for each session, receive or send messages, manage participant rewards and challenges, and view data and figures summarizing the app usage. The system was implemented as an adjunctive component to brief cognitive behavioral therapy in an open clinical trial. To evaluate the effectiveness of gamification, we compared the app usage data at posttreatment with the earlier version of SmartCAT without gamification. Gamified SmartCAT was used frequently throughout treatment. On average, patients spent 35.59 min on the app (SD 64.18) completing 13.00 activities between each therapy session (SD 12.61). At the 0.10 significance level, the app usage of the gamified system (median 68.00) was higher than that of the earlier, nongamified SmartCAT version (median 37.00, U=76.00, P<.01). The amount of time spent on the gamified system (median 173.15) was significantly different from that of the earlier version (median 120.73, U=173.00, P=.06). The gamified system showed good acceptability, usefulness, and engagement among anxious children receiving brief cognitive behavioral therapy treatment. Integrating an mHealth gamification platform within treatment for anxious children seems to increase involvement in shorter treatment. Further study is needed to evaluate increase in involvement in full-length treatment. ©Gede Pramana, Bambang Parmanto, James Lomas, Oliver Lindhiem, Philip C Kendall, Jennifer Silk. Originally published in JMIR Serious Games (http://games.jmir.org), 10.05.2018.
Security in Intelligent Transport Systems for Smart Cities: From Theory to Practice
Javed, Muhammad Awais; Ben Hamida, Elyes; Znaidi, Wassim
2016-01-01
Connecting vehicles securely and reliably is pivotal to the implementation of next generation ITS applications of smart cities. With continuously growing security threats, vehicles could be exposed to a number of service attacks that could put their safety at stake. To address this concern, both US and European ITS standards have selected Elliptic Curve Cryptography (ECC) algorithms to secure vehicular communications. However, there is still a lack of benchmarking studies on existing security standards in real-world settings. In this paper, we first analyze the security architecture of the ETSI ITS standard. We then implement the ECC based digital signature and encryption procedures using an experimental test-bed and conduct an extensive benchmark study to assess their performance which depends on factors such as payload size, processor speed and security levels. Using network simulation models, we further evaluate the impact of standard compliant security procedures in dense and realistic smart cities scenarios. Obtained results suggest that existing security solutions directly impact the achieved quality of service (QoS) and safety awareness of vehicular applications, in terms of increased packet inter-arrival delays, packet and cryptographic losses, and reduced safety awareness in safety applications. Finally, we summarize the insights gained from the simulation results and discuss open research challenges for efficient working of security in ITS applications of smart cities. PMID:27314358
Farias, Cláudio; Valério, Carla; Mesquita, Isabel
2018-01-01
The teaching and learning of games and sport-based activities has historically been the dominant form of the physical education curricula. With an interest in providing to students meaningful and culturally situated sporting experiences, Sport Education is probably the most implemented and researched pedagogical model worldwide. However, although there is considerable evidence that the model as a curriculum approach can benefit the development of social goals and healthy sport behaviors, not a single study as to date examined students’ game-play development beyond participation in single and isolated teaching units. Therefore, the purpose of this study was to examine students’ development of Game Performance and Game Involvement during participation in three consecutive Sport Education seasons of invasion games. The participants were an experienced physical education teacher and one seventh-grade class totaling 26 students (10 girls and 16 boys). Using the Game Performance Assessment Instrument (Oslin et al., 1998), pre-test to post-tests measures of students’ Game Performance and Game Involvement were collected during their participation in basketball (20 lessons), handball (16 lessons), and football (18 lessons) units. Inter-group differences and pre-test to post-test improvements within each season were analyzed through 2 (time) x group (sport) repeated measures ANOVA tests. There were found significant pre-test to post-test improvements in Game Performance and Game Involvement in the second (handball) and third (football) seasons, but not in the first season (basketball). Students’ Game Performance and Involvement scores of handball and football were significantly higher than their scores while playing basketball. The opportunity for an extended engagement in game-play activities and prolonged membership of students in the same teams throughout three consecutive seasons of Sport Education were key to the outcomes found. The specific configurations of the game forms played by students either inhibited or enabled their game-play development. Key points The effect of time fostered by the extended participation of students in consecutive seasons of the model was paramount to promote effective gains in Game Performance and Game Involvement. Specific modifications imposed on the game, such as asymmetric attack-defense game configurations had a positive effect on the development of the learning outcomes. The persistent membership that was extended across sequential units of invasion games helped players build more sophisticated game-play routines and problem-solving. PMID:29535578
Modeling Adversaries in Counterterrorism Decisions Using Prospect Theory.
Merrick, Jason R W; Leclerc, Philip
2016-04-01
Counterterrorism decisions have been an intense area of research in recent years. Both decision analysis and game theory have been used to model such decisions, and more recently approaches have been developed that combine the techniques of the two disciplines. However, each of these approaches assumes that the attacker is maximizing its utility. Experimental research shows that human beings do not make decisions by maximizing expected utility without aid, but instead deviate in specific ways such as loss aversion or likelihood insensitivity. In this article, we modify existing methods for counterterrorism decisions. We keep expected utility as the defender's paradigm to seek for the rational decision, but we use prospect theory to solve for the attacker's decision to descriptively model the attacker's loss aversion and likelihood insensitivity. We study the effects of this approach in a critical decision, whether to screen containers entering the United States for radioactive materials. We find that the defender's optimal decision is sensitive to the attacker's levels of loss aversion and likelihood insensitivity, meaning that understanding such descriptive decision effects is important in making such decisions. © 2014 Society for Risk Analysis.
Mei, Haibo; Poslad, Stefan; Du, Shuang
2017-01-01
Intelligent Transportation Systems (ITSs) can be applied to inform and incentivize travellers to help them make cognizant choices concerning their trip routes and transport modality use for their daily travel whilst achieving more sustainable societal and transport authority goals. However, in practice, it is challenging for an ITS to enable incentive generation that is context-driven and personalized, whilst supporting multi-dimensional travel goals. This is because an ITS has to address the situation where different travellers have different travel preferences and constraints for route and modality, in the face of dynamically-varying traffic conditions. Furthermore, personalized incentive generation also needs to dynamically achieve different travel goals from multiple travellers, in the face of their conducts being a mix of both competitive and cooperative behaviours. To address this challenge, a Rule-based Incentive Framework (RIF) is proposed in this paper that utilizes both decision tree and evolutionary game theory to process travel information and intelligently generate personalized incentives for travellers. The travel information processed includes travellers’ mobile patterns, travellers’ modality preferences and route traffic volume information. A series of MATLAB simulations of RIF was undertaken to validate RIF to show that it is potentially an effective way to incentivize travellers to change travel routes and modalities as an essential smart city service. PMID:29232907
Long Island Smart Energy Corridor
DOE Office of Scientific and Technical Information (OSTI.GOV)
Mui, Ming
The Long Island Power Authority (LIPA) has teamed with Stony Brook University (Stony Brook or SBU) and Farmingdale State College (Farmingdale or FSC), two branches of the State University of New York (SUNY), to create a “Smart Energy Corridor.” The project, located along the Route 110 business corridor on Long Island, New York, demonstrated the integration of a suite of Smart Grid technologies from substations to end-use loads. The Smart Energy Corridor Project included the following key features: -TECHNOLOGY: Demonstrated a full range of smart energy technologies, including substations and distribution feeder automation, fiber and radio communications backbone, advanced meteringmore » infrastructure (AM”), meter data management (MDM) system (which LIPA implemented outside of this project), field tools automation, customer-level energy management including automated energy management systems, and integration with distributed generation and plug-in hybrid electric vehicles. -MARKETING: A rigorous market test that identified customer response to an alternative time-of-use pricing plan and varying levels of information and analytical support. -CYBER SECURITY: Tested cyber security vulnerabilities in Smart Grid hardware, network, and application layers. Developed recommendations for policies, procedures, and technical controls to prevent or foil cyber-attacks and to harden the Smart Grid infrastructure. -RELIABILITY: Leveraged new Smart Grid-enabled data to increase system efficiency and reliability. Developed enhanced load forecasting, phase balancing, and voltage control techniques designed to work hand-in-hand with the Smart Grid technologies. -OUTREACH: Implemented public outreach and educational initiatives that were linked directly to the demonstration of Smart Grid technologies, tools, techniques, and system configurations. This included creation of full-scale operating models demonstrating application of Smart Grid technologies in business and residential settings. Farmingdale State College held three international conferences on energy and sustainability and Smart Grid related technologies and policies. These conferences, in addition to public seminars increased understanding and acceptance of Smart Grid transformation by the general public, business, industry, and municipalities in the Long Island and greater New York region. - JOB CREATION: Provided training for the Smart Grid and clean energy jobs of the future at both Farmingdale and Stony Brook. Stony Brook focused its “Cradle to Fortune 500” suite of economic development resources on the opportunities emerging from the project, helping to create new technologies, new businesses, and new jobs. To achieve these features, LIPA and its sub-recipients, FSC and SBU, each have separate but complementary objectives. At LIPA, the Smart Energy Corridor (1) meant validating Smart Grid technologies; (2) quantifying Smart Grid costs and benefits; and (3) providing insights into how Smart Grid applications can be better implemented, readily adapted, and replicated in individual homes and businesses. LIPA installed 2,550 AMI meters (exceeding the 500 AMI meters in the original plan), created three “smart” substations serving the Corridor, and installed additional distribution automation elements including two-way communications and digital controls over various feeders and capacitor banks. It gathered and analyzed customer behavior information on how they responded to a new “smart” TOU rate and to various levels of information and analytical tools.« less
Security enhanced BioEncoding for protecting iris codes
NASA Astrophysics Data System (ADS)
Ouda, Osama; Tsumura, Norimichi; Nakaguchi, Toshiya
2011-06-01
Improving the security of biometric template protection techniques is a key prerequisite for the widespread deployment of biometric technologies. BioEncoding is a recently proposed template protection scheme, based on the concept of cancelable biometrics, for protecting biometric templates represented as binary strings such as iris codes. The main advantage of BioEncoding over other template protection schemes is that it does not require user-specific keys and/or tokens during verification. Besides, it satisfies all the requirements of the cancelable biometrics construct without deteriorating the matching accuracy. However, although it has been shown that BioEncoding is secure enough against simple brute-force search attacks, the security of BioEncoded templates against more smart attacks, such as record multiplicity attacks, has not been sufficiently investigated. In this paper, a rigorous security analysis of BioEncoding is presented. Firstly, resistance of BioEncoded templates against brute-force attacks is revisited thoroughly. Secondly, we show that although the cancelable transformation employed in BioEncoding might be non-invertible for a single protected template, the original iris code could be inverted by correlating several templates used in different applications but created from the same iris. Accordingly, we propose an important modification to the BioEncoding transformation process in order to hinder attackers from exploiting this type of attacks. The effectiveness of adopting the suggested modification is validated and its impact on the matching accuracy is investigated empirically using CASIA-IrisV3-Interval dataset. Experimental results confirm the efficacy of the proposed approach and show that it preserves the matching accuracy of the unprotected iris recognition system.
Comparison of Angle of Attack Measurements for Wind Tunnel Testing
NASA Technical Reports Server (NTRS)
Jones, Thomas, W.; Hoppe, John C.
2001-01-01
Two optical systems capable of measuring model attitude and deformation were compared to inertial devices employed to acquire wind tunnel model angle of attack measurements during the sting mounted full span 30% geometric scale flexible configuration of the Northrop Grumman Unmanned Combat Air Vehicle (UCAV) installed in the NASA Langley Transonic Dynamics Tunnel (TDT). The overall purpose of the test at TDT was to evaluate smart materials and structures adaptive wing technology. The optical techniques that were compared to inertial devices employed to measure angle of attack for this test were: (1) an Optotrak (registered) system, an optical system consisting of two sensors, each containing a pair of orthogonally oriented linear arrays to compute spatial positions of a set of active markers; and (2) Video Model Deformation (VMD) system, providing a single view of passive targets using a constrained photogrammetric solution whose primary function was to measure wing and control surface deformations. The Optotrak system was installed for this test for the first time at TDT in order to assess the usefulness of the system for future static and dynamic deformation measurements.
Choi, Younsung; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Nam, Junghyun; Won, Dongho
2014-01-01
Wireless sensor networks (WSNs) consist of sensors, gateways and users. Sensors are widely distributed to monitor various conditions, such as temperature, sound, speed and pressure but they have limited computational ability and energy. To reduce the resource use of sensors and enhance the security of WSNs, various user authentication protocols have been proposed. In 2011, Yeh et al. first proposed a user authentication protocol based on elliptic curve cryptography (ECC) for WSNs. However, it turned out that Yeh et al.'s protocol does not provide mutual authentication, perfect forward secrecy, and key agreement between the user and sensor. Later in 2013, Shi et al. proposed a new user authentication protocol that improves both security and efficiency of Yeh et al.'s protocol. However, Shi et al.'s improvement introduces other security weaknesses. In this paper, we show that Shi et al.'s improved protocol is vulnerable to session key attack, stolen smart card attack, and sensor energy exhausting attack. In addition, we propose a new, security-enhanced user authentication protocol using ECC for WSNs. PMID:24919012
Choi, Younsung; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Nam, Junghyun; Won, Dongho
2014-06-10
Wireless sensor networks (WSNs) consist of sensors, gateways and users. Sensors are widely distributed to monitor various conditions, such as temperature, sound, speed and pressure but they have limited computational ability and energy. To reduce the resource use of sensors and enhance the security of WSNs, various user authentication protocols have been proposed. In 2011, Yeh et al. first proposed a user authentication protocol based on elliptic curve cryptography (ECC) for WSNs. However, it turned out that Yeh et al.'s protocol does not provide mutual authentication, perfect forward secrecy, and key agreement between the user and sensor. Later in 2013, Shi et al. proposed a new user authentication protocol that improves both security and efficiency of Yeh et al.'s protocol. However, Shi et al.'s improvement introduces other security weaknesses. In this paper, we show that Shi et al.'s improved protocol is vulnerable to session key attack, stolen smart card attack, and sensor energy exhausting attack. In addition, we propose a new, security-enhanced user authentication protocol using ECC for WSNs.
Li, Chun-Ta; Weng, Chi-Yao; Lee, Cheng-Chi; Wang, Chun-Cheng
2015-11-01
To protect patient privacy and ensure authorized access to remote medical services, many remote user authentication schemes for the integrated electronic patient record (EPR) information system have been proposed in the literature. In a recent paper, Das proposed a hash based remote user authentication scheme using passwords and smart cards for the integrated EPR information system, and claimed that the proposed scheme could resist various passive and active attacks. However, in this paper, we found that Das's authentication scheme is still vulnerable to modification and user duplication attacks. Thereafter we propose a secure and efficient authentication scheme for the integrated EPR information system based on lightweight hash function and bitwise exclusive-or (XOR) operations. The security proof and performance analysis show our new scheme is well-suited to adoption in remote medical healthcare services.
Lin, Han-Yu
2013-04-01
Telecare medical information systems (TMISs) are increasingly popular technologies for healthcare applications. Using TMISs, physicians and caregivers can monitor the vital signs of patients remotely. Since the database of TMISs stores patients' electronic medical records (EMRs), only authorized users should be granted the access to this information for the privacy concern. To keep the user anonymity, recently, Chen et al. proposed a dynamic ID-based authentication scheme for telecare medical information system. They claimed that their scheme is more secure and robust for use in a TMIS. However, we will demonstrate that their scheme fails to satisfy the user anonymity due to the dictionary attacks. It is also possible to derive a user password in case of smart card loss attacks. Additionally, an improved scheme eliminating these weaknesses is also presented.
Cybersecurity Awareness in the Power Grid
DOE Office of Scientific and Technical Information (OSTI.GOV)
Scholtz, Jean; Franklin, Lyndsey; Le Blanc, Katya L.
2016-07-10
We report on a series of interviews and observations conducted with control room dispatchers in a bulk electrical system. These dispatchers must react quickly to incidents as they happen in order to ensure the reliability and safe operation of the power grid. They do not have the time to evaluate incidents for signs of cyber-attack as part of their initial response. Cyber-attack detection involves multiple personnel from a variety of roles at both local and regional levels. Smart grid technology will improve detection and defense capabilities of the future grid, however, the current infrastructure remains a mixture of old andmore » new equipment which will continue to operate for some time. Thus, research still needs to focus on strategies for the detection of malicious activity on current infrastructure as well as protection and remediation.« less
A Secure Three-Factor User Authentication and Key Agreement Protocol for TMIS With User Anonymity.
Amin, Ruhul; Biswas, G P
2015-08-01
Telecare medical information system (TMIS) makes an efficient and convenient connection between patient(s)/user(s) and doctor(s) over the insecure internet. Therefore, data security, privacy and user authentication are enormously important for accessing important medical data over insecure communication. Recently, many user authentication protocols for TMIS have been proposed in the literature and it has been observed that most of the protocols cannot achieve complete security requirements. In this paper, we have scrutinized two (Mishra et al., Xu et al.) remote user authentication protocols using smart card and explained that both the protocols are suffering against several security weaknesses. We have then presented three-factor user authentication and key agreement protocol usable for TMIS, which fix the security pitfalls of the above mentioned schemes. The informal cryptanalysis makes certain that the proposed protocol provides well security protection on the relevant security attacks. Furthermore, the simulator AVISPA tool confirms that the protocol is secure against active and passive attacks including replay and man-in-the-middle attacks. The security functionalities and performance comparison analysis confirm that our protocol not only provide strong protection on security attacks, but it also achieves better complexities along with efficient login and password change phase as well as session key verification property.
Reddy, Alavalapati Goutham; Das, Ashok Kumar; Odelu, Vanga; Yoo, Kee-Young
2016-01-01
Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.’s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN) logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.’s protocol and existing similar protocols. PMID:27163786
Xiong, Ling; Peng, Daiyuan; Peng, Tu; Liang, Hongbin; Liu, Zhicai
2017-11-21
Due to their frequent use in unattended and hostile deployment environments, the security in wireless sensor networks (WSNs) has attracted much interest in the past two decades. However, it remains a challenge to design a lightweight authentication protocol for WSNs because the designers are confronted with a series of desirable security requirements, e.g., user anonymity, perfect forward secrecy, resistance to de-synchronization attack. Recently, the authors presented two authentication schemes that attempt to provide user anonymity and to resist various known attacks. Unfortunately, in this work we shall show that user anonymity of the two schemes is achieved at the price of an impractical search operation-the gateway node may search for every possible value. Besides this defect, they are also prone to smart card loss attacks and have no provision for perfect forward secrecy. As our main contribution, a lightweight anonymous authentication scheme with perfect forward secrecy is designed, and what we believe the most interesting feature is that user anonymity, perfect forward secrecy, and resistance to de-synchronization attack can be achieved at the same time. As far as we know, it is extremely difficult to meet these security features simultaneously only using the lightweight operations, such as symmetric encryption/decryption and hash functions.
NASA Astrophysics Data System (ADS)
Guilley, Sylvain; Chaudhuri, Sumanta; Sauvage, Laurent; Graba, Tarik; Danger, Jean-Luc; Hoogvorst, Philippe; Vong, Vinh-Nga; Nassar, Maxime; Flament, Florent
Security is not only a matter of cryptographic algorithms robustness but becomes also a question of securing their implementation. P. Kocher’s differential power analysis (DPA) is one of the many side-channel attacks that are more and more studied by the security community. Indeed, side-channel attacks (SCA) have proved to be very powerful on cryptographic algorithms such as DES and AES, customarily implemented in a wide variety of devices, ranging from smart-cards or ASICs to FPGAs. Among the proposed countermeasures, the “dual-rail with precharge logic” (DPL) aims at hiding information leaked by the circuit by making the power consumption independent of the calculation. However DPL logic could be subject to second order attacks exploiting timing difference between dual nets. In this article, we characterize by simulation, the vulnerability due to timing unbalance in the eight DES substitution boxes implemented in DPL WDDL style. The characterization results in a classification of the nodes according to their timing unbalance. Our results show that the timing unbalance is a major weakness of the WDDL logic, and that it could be used to retrieve the key using a DPA attack. This vulnerability has been experimentally observed on a full DES implementation using WDDL style for Altera Stratix EP1S25 FPGA.
Peng, Daiyuan; Peng, Tu; Liang, Hongbin; Liu, Zhicai
2017-01-01
Due to their frequent use in unattended and hostile deployment environments, the security in wireless sensor networks (WSNs) has attracted much interest in the past two decades. However, it remains a challenge to design a lightweight authentication protocol for WSNs because the designers are confronted with a series of desirable security requirements, e.g., user anonymity, perfect forward secrecy, resistance to de-synchronization attack. Recently, the authors presented two authentication schemes that attempt to provide user anonymity and to resist various known attacks. Unfortunately, in this work we shall show that user anonymity of the two schemes is achieved at the price of an impractical search operation—the gateway node may search for every possible value. Besides this defect, they are also prone to smart card loss attacks and have no provision for perfect forward secrecy. As our main contribution, a lightweight anonymous authentication scheme with perfect forward secrecy is designed, and what we believe the most interesting feature is that user anonymity, perfect forward secrecy, and resistance to de-synchronization attack can be achieved at the same time. As far as we know, it is extremely difficult to meet these security features simultaneously only using the lightweight operations, such as symmetric encryption/decryption and hash functions. PMID:29160861
Tierney, P; Tobin, D P; Blake, C; Delahunt, E
2017-12-01
Global Positioning System (GPS) technology is commonly utilized in team sports, including rugby union. It has been used to describe the average running demands of rugby union. This has afforded an enhanced understanding of the physical fitness requirements for players. However, research in team sports has suggested that training players relative to average demands may underprepare them for certain scenarios within the game. To date, no research has investigated the running demands of attacking 22 entries in rugby union. Additionally, no research has been undertaken to determine whether differences exist in the running intensity of successful and unsuccessful attacking 22 entries in rugby union. The first aim of this study was to describe the running intensity of attacking 22 entries. The second aim of this study was to investigate whether differences exist in the running intensity of successful and unsuccessful attacking 22 entries. Running intensity was measured using meters per minute (m min -1 ) for (a) total distance, (b) running distance, (c) high-speed running distance, and (d) very high-speed running distance. This study provides normative data for the running intensity of attacking 22 entries in rugby union. Forwards achieved greater high-speed running intensity in successful (3.6 m min -1 ) compared to unsuccessful (1.8 m min -1 ) attacking 22 entries. Forwards should try and achieve greater high-speed running intensity in attacking 22 entries to increase the likelihood of successful outcomes during this period of gameplay. © 2016 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.
Turek, Agnieszka
2018-01-01
To reduce energy consumption and improve residents’ quality of life, “smart cities” should use not only modern technologies, but also the social innovations of the “Internet of Things” (IoT) era. This article attempts to solve transport problems in a smart city’s office district by utilizing gamification that incentivizes the carpooling system. The goal of the devised system is to significantly reduce the number of cars, and, consequently, to alleviate traffic jams, as well as to curb pollution and energy consumption. A representative sample of the statistical population of people working in one of the biggest office hubs in Poland (the so-called “Mordor of Warsaw”) was surveyed. The collected data were processed using spatial data mining methods, and the results were a set of parameters for the multi-agent system. This approach made it possible to run a series of simulations on a set of 100,000 agents and to select an effective gamification methodology that supports the carpooling process. The implementation of the proposed solutions (a “serious game” variation of urban games) would help to reduce the number of cars by several dozen percent, significantly reduce energy consumption, eliminate traffic jams, and increase the activity of the smart city residents. PMID:29316643
A Real-World Network Modeling Project
2014-02-12
about the project, which accounts for a third of their class grade. As can be expected, giving substantial weight to the project increases active student...analysis, humanitarian aid warehouses, Israeli traffic analysis, London Olympic Games transport, medical evacuation, Monterey fire department...responsiveness, Monterey Peninsula evacuation, natural gas pipeline transport, rail transport of new cars, ski lifts for Keystone Colorado, small boat attack
Fiber Optic Rate Sensors For High-G Environment Applications
NASA Astrophysics Data System (ADS)
Moore, Emery L.; Hertzberg, Alex
1990-02-01
Advances in modern warfare require the development of artillery munitions that travel beyond the visual horizon. It is not unusual, particularly in undulating terrain, for the direct line of sight from the forward edge of the battle area (FEBA) to the attacking forces to be limited to 2,000 meters. In addition to terrain, influences of clouds, fog, rain and smoke combine to limit the direct line of sight. Mobile targets also decrease probability of kill. What is called for and what has been developed are "smart munitions" that allow the artilleryman to "fire and forget." The technique which accommodates this fire and forget philosophy utilizes a projectile having a radiation detector (or seeker) to sense the target and inertial rate sensors supported by a computer or processor. However, even though we have smart shells today room for improvement exists in weight, power, shelf life, environmental ruggedness and cost.
Vilar, Luís; Araújo, Duarte; Davids, Keith; Travassos, Bruno; Duarte, Ricardo; Parreira, João
2014-01-01
Research on 1vs1 sub-phases in team sports has shown how one player coordinates his/her actions with his/her opponent and the location of a target/goal to attain performance objectives. In this study, we extended this approach to analysis of 5vs5 competitive performance in the team sport of futsal to provide a performance analysis framework that explains how players coordinate their actions to create/prevent opportunities to score goals. For this purpose, we recorded all 10 futsal matches of the 2009 Lusophony Games held in Lisbon. We analysed the displacement trajectories of a shooting attacker and marking defender in plays ending in a goal, a goalkeeper's save, and a defender's interception, at four specific moments during performance: (1) assisting attacker's ball reception and (2) moment of passing, (3) shooter's ball reception, and (4), shot on goal. Statistical analysis showed that when a goal was scored, the defender's angle to the goal and to the attacker tended to decrease, the attacker was able to move to the same distance to the goal alongside the defender, and the attacker was closer to the defender and moving at the same velocity (at least) as the defender. This study identified emergent patterns of coordination between attackers and defenders under key competitive task constraints, such as the location of the goal, which supported successful performance in futsal.
2002-03-22
may be derived from detailed inspection of the IC itself or from illicit appropriation of design information. Counterfeit smart cards can be mass...Infrastructure (PKI) as the Internet to securely and privately exchange data and money through the use of a public and a private cryptographic key pair...interference devices (SQDIS), electrical testing, and electron beam testing. • Other attacks, such as UV or X-rays or high temperatures, could cause erasure
Towards a Low-Cost Remote Memory Attestation for the Smart Grid
Yang, Xinyu; He, Xiaofei; Yu, Wei; Lin, Jie; Li, Rui; Yang, Qingyu; Song, Houbing
2015-01-01
In the smart grid, measurement devices may be compromised by adversaries, and their operations could be disrupted by attacks. A number of schemes to efficiently and accurately detect these compromised devices remotely have been proposed. Nonetheless, most of the existing schemes detecting compromised devices depend on the incremental response time in the attestation process, which are sensitive to data transmission delay and lead to high computation and network overhead. To address the issue, in this paper, we propose a low-cost remote memory attestation scheme (LRMA), which can efficiently and accurately detect compromised smart meters considering real-time network delay and achieve low computation and network overhead. In LRMA, the impact of real-time network delay on detecting compromised nodes can be eliminated via investigating the time differences reported from relay nodes. Furthermore, the attestation frequency in LRMA is dynamically adjusted with the compromised probability of each node, and then, the total number of attestations could be reduced while low computation and network overhead can be achieved. Through a combination of extensive theoretical analysis and evaluations, our data demonstrate that our proposed scheme can achieve better detection capacity and lower computation and network overhead in comparison to existing schemes. PMID:26307998
Towards a Low-Cost Remote Memory Attestation for the Smart Grid.
Yang, Xinyu; He, Xiaofei; Yu, Wei; Lin, Jie; Li, Rui; Yang, Qingyu; Song, Houbing
2015-08-21
In the smart grid, measurement devices may be compromised by adversaries, and their operations could be disrupted by attacks. A number of schemes to efficiently and accurately detect these compromised devices remotely have been proposed. Nonetheless, most of the existing schemes detecting compromised devices depend on the incremental response time in the attestation process, which are sensitive to data transmission delay and lead to high computation and network overhead. To address the issue, in this paper, we propose a low-cost remote memory attestation scheme (LRMA), which can efficiently and accurately detect compromised smart meters considering real-time network delay and achieve low computation and network overhead. In LRMA, the impact of real-time network delay on detecting compromised nodes can be eliminated via investigating the time differences reported from relay nodes. Furthermore, the attestation frequency in LRMA is dynamically adjusted with the compromised probability of each node, and then, the total number of attestations could be reduced while low computation and network overhead can be achieved. Through a combination of extensive theoretical analysis and evaluations, our data demonstrate that our proposed scheme can achieve better detection capacity and lower computation and network overhead in comparison to existing schemes.
Mishra, Raghavendra; Barnwal, Amit Kumar
2015-05-01
The Telecare medical information system (TMIS) presents effective healthcare delivery services by employing information and communication technologies. The emerging privacy and security are always a matter of great concern in TMIS. Recently, Chen at al. presented a password based authentication schemes to address the privacy and security. Later on, it is proved insecure against various active and passive attacks. To erase the drawbacks of Chen et al.'s anonymous authentication scheme, several password based authentication schemes have been proposed using public key cryptosystem. However, most of them do not present pre-smart card authentication which leads to inefficient login and password change phases. To present an authentication scheme with pre-smart card authentication, we present an improved anonymous smart card based authentication scheme for TMIS. The proposed scheme protects user anonymity and satisfies all the desirable security attributes. Moreover, the proposed scheme presents efficient login and password change phases where incorrect input can be quickly detected and a user can freely change his password without server assistance. Moreover, we demonstrate the validity of the proposed scheme by utilizing the widely-accepted BAN (Burrows, Abadi, and Needham) logic. The proposed scheme is also comparable in terms of computational overheads with relevant schemes.
Bottiroli, Sara; Tassorelli, Cristina; Lamonica, Marialisa; Zucchella, Chiara; Cavallini, Elena; Bernini, Sara; Sinforiani, Elena; Pazzi, Stefania; Cristiani, Paolo; Vecchi, Tomaso; Tost, Daniela; Sandrini, Giorgio
2017-01-01
Background: Smart Aging is a Serious games (SGs) platform in a 3D virtual environment in which users perform a set of screening tests that address various cognitive skills. The tests are structured as 5 tasks of activities of daily life in a familiar environment. The main goal of the present study is to compare a cognitive evaluation made with Smart Aging with those of a classic standardized screening test, the Montreal Cognitive Assessment (MoCA). Methods: One thousand one-hundred thirty-one healthy adults aged between 50 and 80 (M = 64.3 ± 8.3) were enrolled in the study. They received a cognitive evaluation with the MoCA and the Smart Aging platform. Participants were grouped according to their MoCA global and specific cognitive domain (i.e., memory, executive functions, working memory, visual spatial elaboration, language, and orientation) scores and we explored differences among these groups in the Smart Aging indices. Results: One thousand eighty-six older adults (M = 64.0 ± 8.0) successfully completed the study and were stratified according to their MoCA score: Group 1 with MoCA < 27 (n = 360); Group 2 with 27 ≥ MoCA < 29 (n = 453); and Group 3 with MoCA ≥ 29 (n = 273). MoCA groups significantly differed in most of the Smart Aging indices considered, in particular as concerns accuracy (ps < 0.001) and time (ps < 0.001) for completing most of the platform tasks. Group 1 was outperformed by the other two Groups and was slower than them in these tasks, which were those supposed to assess memory and executive functions. In addition, significant differences across groups also emerged when considering the single cognitive domains of the MoCA and the corresponding performances in each Smart Aging task. In particular, this platform seems to be a good proxy for assessing memory, executive functions, working memory, and visual spatial processes. Conclusion: These findings demonstrate the validity of Smart Aging for assessing cognitive functions in normal aging. Future studies will validate this platform also in the clinical aging populations. PMID:29209200
NASA Astrophysics Data System (ADS)
Feng, Steve; Woo, Minjae; Chandramouli, Krithika; Ozcan, Aydogan
2015-03-01
Over the past decade, crowd-sourcing complex image analysis tasks to a human crowd has emerged as an alternative to energy-inefficient and difficult-to-implement computational approaches. Following this trend, we have developed a mathematical framework for statistically combining human crowd-sourcing of biomedical image analysis and diagnosis through games. Using a web-based smart game (BioGames), we demonstrated this platform's effectiveness for telediagnosis of malaria from microscopic images of individual red blood cells (RBCs). After public release in early 2012 (http://biogames.ee.ucla.edu), more than 3000 gamers (experts and non-experts) used this BioGames platform to diagnose over 2800 distinct RBC images, marking them as positive (infected) or negative (non-infected). Furthermore, we asked expert diagnosticians to tag the same set of cells with labels of positive, negative, or questionable (insufficient information for a reliable diagnosis) and statistically combined their decisions to generate a gold standard malaria image library. Our framework utilized minimally trained gamers' diagnoses to generate a set of statistical labels with an accuracy that is within 98% of our gold standard image library, demonstrating the "wisdom of the crowd". Using the same image library, we have recently launched a web-based malaria training and educational game allowing diagnosticians to compare their performance with their peers. After diagnosing a set of ~500 cells per game, diagnosticians can compare their quantified scores against a leaderboard and view their misdiagnosed cells. Using this platform, we aim to expand our gold standard library with new RBC images and provide a quantified digital tool for measuring and improving diagnostician training globally.
Motion Rehab AVE 3D: A VR-based exergame for post-stroke rehabilitation.
Trombetta, Mateus; Bazzanello Henrique, Patrícia Paula; Brum, Manoela Rogofski; Colussi, Eliane Lucia; De Marchi, Ana Carolina Bertoletti; Rieder, Rafael
2017-11-01
Recent researches about games for post-stroke rehabilitation have been increasing, focusing in upper limb, lower limb and balance situations, and showing good experiences and results. With this in mind, this paper presents Motion Rehab AVE 3D, a serious game for post-stroke rehabilitation of patients with mild stroke. The aim is offer a new technology in order to assist the traditional therapy and motivate the patient to execute his/her rehabilitation program, under health professional supervision. The game was developed with Unity game engine, supporting Kinect motion sensing input device and display devices like Smart TV 3D and Oculus Rift. It contemplates six activities considering exercises in a tridimensional space: flexion, abduction, shoulder adduction, horizontal shoulder adduction and abduction, elbow extension, wrist extension, knee flexion, and hip flexion and abduction. Motion Rehab AVE 3D also report about hits and errors to the physiotherapist evaluate the patient's progress. A pilot study with 10 healthy participants (61-75 years old) tested one of the game levels. They experienced the 3D user interface in third-person. Our initial goal was to map a basic and comfortable setup of equipment in order to adopt later. All the participants (100%) classified the interaction process as interesting and amazing for the age, presenting a good acceptance. Our evaluation showed that the game could be used as a useful tool to motivate the patients during rehabilitation sessions. Next step is to evaluate its effectiveness for stroke patients, in order to verify if the interface and game exercises contribute into the motor rehabilitation treatment progress. Copyright © 2017 Elsevier B.V. All rights reserved.
IPhone or Kindle: Competition of Electronic Books Sales
NASA Astrophysics Data System (ADS)
Chen, Li
With the technical development of the reading equipment, e-books have witnessed a gradual and steady increase in sales in recent years. Last year, smart phones announced to be able to perform additional functions as e-book reading devices, making it possible for retailers selling e-books for smart phones (SPR) such as iPhone to differentiate with those selling e-books for specific reading equipment (SER) such as Amazon Kindle. We develop a game theory model to examine the competition between SER and SPR retailers. We derive the equilibrium price and analyze the factors that affect equilibrium outcomes under both scenarios of complete and incomplete information. Our results suggest that reduced cost due to inconvenience of reading e-books over iPhone lowers equilibrium prices, and reduced cost of specific reading equipment leads to more intense price competition. Under information asymmetry, we show that SER retailers will increase the price at equilibrium.
Serious games for elderly continuous monitoring.
Lemus-Zúñiga, Lenin-G; Navarro-Pardo, Esperanza; Moret-Tatay, Carmen; Pocinho, Ricardo
2015-01-01
Information technology (IT) and serious games allow older population to remain independent for longer. Hence, when designing technology for this population, developmental changes, such as attention and/or perception, should be considered. For instance, a crucial developmental change has been related to cognitive speed in terms of reaction time (RT). However, this variable presents a skewed distribution that difficult data analysis. An alternative strategy is to characterize the data to an ex-Gaussian function. Furthermore, this procedure provides different parameters that have been related to underlying cognitive processes in the literature. Another issue to be considered is the optimal data recording, storing and processing. For that purpose mobile devices (smart phones and tablets) are a good option for targeting serious games where valuable information can be stored (time spent in the application, reaction time, frequency of use, and a long etcetera). The data stored inside the smartphones and tablets can be sent to a central computer (cloud storage) in order to store the data collected to not only fill the distribution of reaction times to mathematical functions, but also to estimate parameters which may reflect cognitive processes underlying language, aging, and decisional process.
Thurner, Stefan; Fuchs, Benedikt
2015-01-01
Physical interactions between particles are the result of the exchange of gauge bosons. Human interactions are mediated by the exchange of messages, goods, money, promises, hostilities, etc. While in the physical world interactions and their associated forces have immediate dynamical consequences (Newton’s laws) the situation is not clear for human interactions. Here we quantify the relative acceleration between humans who interact through the exchange of messages, goods and hostilities in a massive multiplayer online game. For this game we have complete information about all interactions (exchange events) between about 430,000 players, and about their trajectories (movements) in the metric space of the game universe at any point in time. We use this information to derive “interaction potentials" for communication, trade and attacks and show that they are harmonic in nature. Individuals who exchange messages and trade goods generally attract each other and start to separate immediately after exchange events end. The form of the interaction potential for attacks mirrors the usual “hit-and-run" tactics of aggressive players. By measuring interaction intensities as a function of distance, velocity and acceleration, we show that “forces" between players are directly related to the number of exchange events. We find an approximate power-law decay of the likelihood for interactions as a function of distance, which is in accordance with previous real world empirical work. We show that the obtained potentials can be understood with a simple model assuming an exchange-driven force in combination with a distance-dependent exchange rate. PMID:26196505
Thurner, Stefan; Fuchs, Benedikt
2015-01-01
Physical interactions between particles are the result of the exchange of gauge bosons. Human interactions are mediated by the exchange of messages, goods, money, promises, hostilities, etc. While in the physical world interactions and their associated forces have immediate dynamical consequences (Newton's laws) the situation is not clear for human interactions. Here we quantify the relative acceleration between humans who interact through the exchange of messages, goods and hostilities in a massive multiplayer online game. For this game we have complete information about all interactions (exchange events) between about 430,000 players, and about their trajectories (movements) in the metric space of the game universe at any point in time. We use this information to derive "interaction potentials" for communication, trade and attacks and show that they are harmonic in nature. Individuals who exchange messages and trade goods generally attract each other and start to separate immediately after exchange events end. The form of the interaction potential for attacks mirrors the usual "hit-and-run" tactics of aggressive players. By measuring interaction intensities as a function of distance, velocity and acceleration, we show that "forces" between players are directly related to the number of exchange events. We find an approximate power-law decay of the likelihood for interactions as a function of distance, which is in accordance with previous real world empirical work. We show that the obtained potentials can be understood with a simple model assuming an exchange-driven force in combination with a distance-dependent exchange rate.
Souglis, Athanasios; Bogdanis, Gregory C; Chryssanthopoulos, Costas; Apostolidis, Nikolaos; Geladas, Nikos D
2018-01-03
This study examined the influence of sex and playing position on the time-course of selected oxidative stress, inflammation and muscle damage markers following an official soccer match. Sixty professional soccer players (30 male and 30 female) were divided into three groups, according to their playing position: defenders, midfielders and attackers. Each group consisted of 10 male and 10 female players. Sixty healthy volunteers (30 males and 30 females) served as control. Blood samples were taken before and after the match and daily for five days after the match. Analysis of variance revealed different responses over time between sex and playing positions, as shown by the 3-way interaction, for creatine kinase (CK), protein carbonyls (PC), catalase, fibrinogen (FIB), uric acid (UA), lactate dehydrogenase (LDH), reduced glutathione, C-reactive protein and interleukin-6 (IL-6) (p < 0.01).Male players had higher values compared with females of the same playing position, for all oxidative, inflammatory and muscle damage indices (p<0.01). Also, in both sexes, midfielders had higher peaks in all indices compared with defenders (p < 0.05). Five days after the game CK and UA concentrations had not returned to pre-game levels in any exercise group, whereas PC were still elevated in male midfielders and attackers (p < 0.05).These results show that sex and playing position influence the time-course of selected oxidative stress, inflammation and muscle damage markers following an official soccer game. This information should be taken into account by practitioners for the design of training programs following match play.
To dare or not to dare? Risk management by owls in a predator-prey foraging game.
Embar, Keren; Raveh, Ashael; Burns, Darren; Kotler, Burt P
2014-07-01
In a foraging game, predators must catch elusive prey while avoiding injury. Predators manage their hunting success with behavioral tools such as habitat selection, time allocation, and perhaps daring-the willingness to risk injury to increase hunting success. A predator's level of daring should be state dependent: the hungrier it is, the more it should be willing to risk injury to better capture prey. We ask, in a foraging game, will a hungry predator be more willing to risk injury while hunting? We performed an experiment in an outdoor vivarium in which barn owls (Tyto alba) were allowed to hunt Allenby's gerbils (Gerbillus andersoni allenbyi) from a choice of safe and risky patches. Owls were either well fed or hungry, representing the high and low state, respectively. We quantified the owls' patch use behavior. We predicted that hungry owls would be more daring and allocate more time to the risky patches. Owls preferred to hunt in the safe patches. This indicates that owls manage risk of injury by avoiding the risky patches. Hungry owls doubled their attacks on gerbils, but directed the added effort mostly toward the safe patch and the safer, open areas in the risky patch. Thus, owls dared by performing a risky action-the attack maneuver-more times, but only in the safest places-the open areas. We conclude that daring can be used to manage risk of injury and owls implement it strategically, in ways we did not foresee, to minimize risk of injury while maximizing hunting success.
An evidence-driven approach to scrum law modifications in amateur rugby played in South Africa.
Hendricks, Sharief; Lambert, Mike I; Brown, James C; Readhead, Clint; Viljoen, Wayne
2014-07-01
In 2012, the South African Rugby Union (SARU) approved a new set of scrum laws for amateur rugby played in the country, to be implemented at the start of the 2013 rugby season. These law changes were primarily based on the relatively high proportion of scrum-related catastrophic injury data collected as part of the BokSmart National Rugby Safety Programme (BokSmart) over the preceding 4 years (2008-2011). To describe the scrum-related catastrophic injury data in South Africa over the past 5 years (2008-2012), and to discuss how this evidence justifies the change in the Amateur Scrum Laws to make this aspect of the game safer in South Africa. Catastrophic injury data were collected through BokSmart at amateur and professional levels, during training and matches over 5 years (2008-2012). The scrum phase accounted for 33% (n=20 of 60) of all catastrophic injuries between 2008 and 2012. Eighteen of the 20 scrum injuries (90%) were confirmed as acute spinal cord injuries, with 13 of these being permanent injuries. For the scrum injury mechanisms that were provided (n=19), 'impact on the engagement' was the most frequently reported (n=11 of 19, 58%), followed by 'collapsed scrum' (n=7 of 19, 37%) and 'popping out' (n=1 of 19, 5%). Based on these scrum-related catastrophic injury data, a change in the Amateur Scrum Laws of South African Rugby was justified. The main purpose of these scrum law changes is to reduce the number of scrum-related catastrophic injuries in the country, by minimising the opportunity for impact injury and subsequent scrum collapse in amateur rugby in South Africa, thereby making this aspect of the game of rugby safer. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.
Intelligent cognitive radio jamming - a game-theoretical approach
NASA Astrophysics Data System (ADS)
Dabcevic, Kresimir; Betancourt, Alejandro; Marcenaro, Lucio; Regazzoni, Carlo S.
2014-12-01
Cognitive radio (CR) promises to be a solution for the spectrum underutilization problems. However, security issues pertaining to cognitive radio technology are still an understudied topic. One of the prevailing such issues are intelligent radio frequency (RF) jamming attacks, where adversaries are able to exploit on-the-fly reconfigurability potentials and learning mechanisms of cognitive radios in order to devise and deploy advanced jamming tactics. In this paper, we use a game-theoretical approach to analyze jamming/anti-jamming behavior between cognitive radio systems. A non-zero-sum game with incomplete information on an opponent's strategy and payoff is modelled as an extension of Markov decision process (MDP). Learning algorithms based on adaptive payoff play and fictitious play are considered. A combination of frequency hopping and power alteration is deployed as an anti-jamming scheme. A real-life software-defined radio (SDR) platform is used in order to perform measurements useful for quantifying the jamming impacts, as well as to infer relevant hardware-related properties. Results of these measurements are then used as parameters for the modelled jamming/anti-jamming game and are compared to the Nash equilibrium of the game. Simulation results indicate, among other, the benefit provided to the jammer when it is employed with the spectrum sensing algorithm in proactive frequency hopping and power alteration schemes.
Robust Satellite Communications Under Hostile Interference
2015-01-08
this analysis , was included in the simulations. Figure 17. STK Simulation Showing SNR Measured During the Uplink Attack (at the Jammer) 4.3...in Decision and Game Theory for Security, pp. 34–43, 2011. 8. Wertz, J. R., and Larson, W. J., Space Mission Analysis and Design, Microcosm, 1999...15 3.2 Analysis of Reactive Jamming Against Satellite Communications ............................... 15 3.2.1
Li, Muqun; Carrell, David; Aberdeen, John; Hirschman, Lynette; Kirby, Jacqueline; Li, Bo; Vorobeychik, Yevgeniy; Malin, Bradley A
2016-06-01
Electronic medical records (EMRs) are increasingly repurposed for activities beyond clinical care, such as to support translational research and public policy analysis. To mitigate privacy risks, healthcare organizations (HCOs) aim to remove potentially identifying patient information. A substantial quantity of EMR data is in natural language form and there are concerns that automated tools for detecting identifiers are imperfect and leak information that can be exploited by ill-intentioned data recipients. Thus, HCOs have been encouraged to invest as much effort as possible to find and detect potential identifiers, but such a strategy assumes the recipients are sufficiently incentivized and capable of exploiting leaked identifiers. In practice, such an assumption may not hold true and HCOs may overinvest in de-identification technology. The goal of this study is to design a natural language de-identification framework, rooted in game theory, which enables an HCO to optimize their investments given the expected capabilities of an adversarial recipient. We introduce a Stackelberg game to balance risk and utility in natural language de-identification. This game represents a cost-benefit model that enables an HCO with a fixed budget to minimize their investment in the de-identification process. We evaluate this model by assessing the overall payoff to the HCO and the adversary using 2100 clinical notes from Vanderbilt University Medical Center. We simulate several policy alternatives using a range of parameters, including the cost of training a de-identification model and the loss in data utility due to the removal of terms that are not identifiers. In addition, we compare policy options where, when an attacker is fined for misuse, a monetary penalty is paid to the publishing HCO as opposed to a third party (e.g., a federal regulator). Our results show that when an HCO is forced to exhaust a limited budget (set to $2000 in the study), the precision and recall of the de-identification of the HCO are 0.86 and 0.8, respectively. A game-based approach enables a more refined cost-benefit tradeoff, improving both privacy and utility for the HCO. For example, our investigation shows that it is possible for an HCO to release the data without spending all their budget on de-identification and still deter the attacker, with a precision of 0.77 and a recall of 0.61 for the de-identification. There also exist scenarios in which the model indicates an HCO should not release any data because the risk is too great. In addition, we find that the practice of paying fines back to a HCO (an artifact of suing for breach of contract), as opposed to a third party such as a federal regulator, can induce an elevated level of data sharing risk, where the HCO is incentivized to bait the attacker to elicit compensation. A game theoretic framework can be applied in leading HCO's to optimized decision making in natural language de-identification investments before sharing EMR data. Copyright © 2016 Elsevier Inc. All rights reserved.
Active Control Technology at NASA Langley Research Center
NASA Technical Reports Server (NTRS)
Antcliff, Richard R.; McGowan, Anna-Marie R.
2000-01-01
NASA Langley has a long history of attacking important technical opportunities from a broad base of supporting disciplines. The research and development at Langley in this subject area range from the test tube to the test flight. The information covered here will range from the development of innovative new materials, sensors and actuators, to the incorporation of smart sensors and actuators in practical devices, to the optimization of the location of these devices, to, finally, a wide variety of applications of these devices utilizing Langley's facilities and expertise. Advanced materials are being developed for sensors and actuators, as well as polymers for integrating smart devices into composite structures. Contributions reside in three key areas: computational materials; advanced piezoelectric materials; and integrated composite structures. The computational materials effort is focused on developing predictive tools for the efficient design of new materials with the appropriate combination of properties for next generation smart airframe systems. Research in the area of advanced piezoelectrics includes optimizing the efficiency, force output, use temperature, and energy transfer between the structure and device for both ceramic and polymeric materials. For structural health monitoring, advanced non-destructive techniques including fiber optics are being developed for detection of delaminations, cracks and environmental deterioration in aircraft structures. The computational materials effort is focused on developing predictive tools for the efficient design of new materials with the appropriate combination of properties for next generation smart airframe system. Innovative fabrication techniques processing structural composites with sensor and actuator integration are being developed.
Li, Chun-Ta; Weng, Chi-Yao; Lee, Cheng-Chi
2013-07-24
Wireless sensor networks (WSNs) can be quickly and randomly deployed in any harsh and unattended environment and only authorized users are allowed to access reliable sensor nodes in WSNs with the aid of gateways (GWNs). Secure authentication models among the users, the sensor nodes and GWN are important research issues for ensuring communication security and data privacy in WSNs. In 2013, Xue et al. proposed a temporal-credential-based mutual authentication and key agreement scheme for WSNs. However, in this paper, we point out that Xue et al.'s scheme cannot resist stolen-verifier, insider, off-line password guessing, smart card lost problem and many logged-in users' attacks and these security weaknesses make the scheme inapplicable to practical WSN applications. To tackle these problems, we suggest a simple countermeasure to prevent proposed attacks while the other merits of Xue et al.'s authentication scheme are left unchanged.
Li, Chun-Ta; Weng, Chi-Yao; Lee, Cheng-Chi
2013-01-01
Wireless sensor networks (WSNs) can be quickly and randomly deployed in any harsh and unattended environment and only authorized users are allowed to access reliable sensor nodes in WSNs with the aid of gateways (GWNs). Secure authentication models among the users, the sensor nodes and GWN are important research issues for ensuring communication security and data privacy in WSNs. In 2013, Xue et al. proposed a temporal-credential-based mutual authentication and key agreement scheme for WSNs. However, in this paper, we point out that Xue et al.'s scheme cannot resist stolen-verifier, insider, off-line password guessing, smart card lost problem and many logged-in users' attacks and these security weaknesses make the scheme inapplicable to practical WSN applications. To tackle these problems, we suggest a simple countermeasure to prevent proposed attacks while the other merits of Xue et al.'s authentication scheme are left unchanged. PMID:23887085
A security mechanism based on evolutionary game in fog computing.
Sun, Yan; Lin, Fuhong; Zhang, Nan
2018-02-01
Fog computing is a distributed computing paradigm at the edge of the network and requires cooperation of users and sharing of resources. When users in fog computing open their resources, their devices are easily intercepted and attacked because they are accessed through wireless network and present an extensive geographical distribution. In this study, a credible third party was introduced to supervise the behavior of users and protect the security of user cooperation. A fog computing security mechanism based on human nervous system is proposed, and the strategy for a stable system evolution is calculated. The MATLAB simulation results show that the proposed mechanism can reduce the number of attack behaviors effectively and stimulate users to cooperate in application tasks positively.
Adjustment of trendy, gaming and less assimilated tweens in the United States
Comulada, W. Scott; Rotheram-Borus, Mary Jane; Carey, George; Poris, Michelle; Lord, Lynwood R.; Mayfield Arnold, Elizabeth
2014-01-01
Youth transitioning from childhood to adolescence (tweens) are exposed to increasing amounts of media and advertisement. Tweens have also emerged as a major marketing segment for corporate America with increasing buying power.We examine how tweens relate to popular culture messages and the association of different orientations to popular culture on adjustment. A secondary data analysis was conducted on a marketing survey of 3527 tweens, aged 10–14 years, obtained from 49 schools using stratified sampling methods. A sample of children nationwide described their preferences on popular culture and measures of psychosocial adjustment. Using cluster analysis, we identified three main clusters or adaptation styles of tweens: (1) those who enjoyed gaming, (2) trendy youth and (3) youth less assimilated into popular culture. There were differences in clusters based on adjustment indices. Gaming and trendy tweens reported higher self-perceptions of being smart, caring and confident compared to less assimilated tweens. However, gaming and trendy tweens worried more about fitting in than less assimilated tweens. Gaming and trendy tweens also endorsed future goals and traditional values more strongly than less assimilated tweens. Trendy tweens reported the strongest positive feelings about substance use. Results suggest that for each method of adaptation (gamer, trendy and less assimilated), there are unique differences in adjustment that can impact the child’s future. Parents and service providers must recognize the complexity of these decisions and be sensitive to the unique needs of youth as they move from childhood to adolescence. PMID:25580153
Adjustment of trendy, gaming and less assimilated tweens in the United States.
Comulada, W Scott; Rotheram-Borus, Mary Jane; Carey, George; Poris, Michelle; Lord, Lynwood R; Mayfield Arnold, Elizabeth
2011-09-01
Youth transitioning from childhood to adolescence (tweens) are exposed to increasing amounts of media and advertisement. Tweens have also emerged as a major marketing segment for corporate America with increasing buying power.We examine how tweens relate to popular culture messages and the association of different orientations to popular culture on adjustment. A secondary data analysis was conducted on a marketing survey of 3527 tweens, aged 10-14 years, obtained from 49 schools using stratified sampling methods. A sample of children nationwide described their preferences on popular culture and measures of psychosocial adjustment. Using cluster analysis, we identified three main clusters or adaptation styles of tweens: (1) those who enjoyed gaming, (2) trendy youth and (3) youth less assimilated into popular culture. There were differences in clusters based on adjustment indices. Gaming and trendy tweens reported higher self-perceptions of being smart, caring and confident compared to less assimilated tweens. However, gaming and trendy tweens worried more about fitting in than less assimilated tweens. Gaming and trendy tweens also endorsed future goals and traditional values more strongly than less assimilated tweens. Trendy tweens reported the strongest positive feelings about substance use. Results suggest that for each method of adaptation (gamer, trendy and less assimilated), there are unique differences in adjustment that can impact the child's future. Parents and service providers must recognize the complexity of these decisions and be sensitive to the unique needs of youth as they move from childhood to adolescence.
A Novel Topology Link-Controlling Approach for Active Defense of a Node in a Network.
Li, Jun; Hu, HanPing; Ke, Qiao; Xiong, Naixue
2017-03-09
With the rapid development of virtual machine technology and cloud computing, distributed denial of service (DDoS) attacks, or some peak traffic, poses a great threat to the security of the network. In this paper, a novel topology link control technique and mitigation attacks in real-time environments is proposed. Firstly, a non-invasive method of deploying virtual sensors in the nodes is built, which uses the resource manager of each monitored node as a sensor. Secondly, a general topology-controlling approach of resisting the tolerant invasion is proposed. In the proposed approach, a prediction model is constructed by using copula functions for predicting the peak of a resource through another resource. The result of prediction determines whether or not to initiate the active defense. Finally, a minority game with incomplete strategy is employed to suppress attack flows and improve the permeability of the normal flows. The simulation results show that the proposed approach is very effective in protecting nodes.
On defense strategies for system of systems using aggregated correlations
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rao, Nageswara S.; Imam, Neena; Ma, Chris Y. T.
2017-04-01
We consider a System of Systems (SoS) wherein each system Si, i = 1; 2; ... ;N, is composed of discrete cyber and physical components which can be attacked and reinforced. We characterize the disruptions using aggregate failure correlation functions given by the conditional failure probability of SoS given the failure of an individual system. We formulate the problem of ensuring the survival of SoS as a game between an attacker and a provider, each with a utility function composed of asurvival probability term and a cost term, both expressed in terms of the number of components attacked and reinforced.more » The survival probabilities of systems satisfy simple product-form, first-order differential conditions, which simplify the Nash Equilibrium (NE) conditions. We derive the sensitivity functions that highlight the dependence of SoS survival probability at NE on cost terms, correlation functions, and individual system survival probabilities.We apply these results to a simplified model of distributed cloud computing infrastructure.« less
A Novel Topology Link-Controlling Approach for Active Defense of Nodes in Networks
Li, Jun; Hu, HanPing; Ke, Qiao; Xiong, Naixue
2017-01-01
With the rapid development of virtual machine technology and cloud computing, distributed denial of service (DDoS) attacks, or some peak traffic, poses a great threat to the security of the network. In this paper, a novel topology link control technique and mitigation attacks in real-time environments is proposed. Firstly, a non-invasive method of deploying virtual sensors in the nodes is built, which uses the resource manager of each monitored node as a sensor. Secondly, a general topology-controlling approach of resisting the tolerant invasion is proposed. In the proposed approach, a prediction model is constructed by using copula functions for predicting the peak of a resource through another resource. The result of prediction determines whether or not to initiate the active defense. Finally, a minority game with incomplete strategy is employed to suppress attack flows and improve the permeability of the normal flows. The simulation results show that the proposed approach is very effective in protecting nodes. PMID:28282962
Defense strategies for asymmetric networked systems under composite utilities
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rao, Nageswara S.; Ma, Chris Y. T.; Hausken, Kjell
We consider an infrastructure of networked systems with discrete components that can be reinforced at certain costs to guard against attacks. The communications network plays a critical, asymmetric role of providing the vital connectivity between the systems. We characterize the correlations within this infrastructure at two levels using (a) aggregate failure correlation function that specifies the infrastructure failure probability giventhe failure of an individual system or network, and (b) first order differential conditions on system survival probabilities that characterize component-level correlations. We formulate an infrastructure survival game between an attacker and a provider, who attacks and reinforces individual components, respectively.more » They use the composite utility functions composed of a survival probability term and a cost term, and the previously studiedsum-form and product-form utility functions are their special cases. At Nash Equilibrium, we derive expressions for individual system survival probabilities and the expected total number of operational components. We apply and discuss these estimates for a simplified model of distributed cloud computing infrastructure« less
Attacking cancer dormacy using game theory
NASA Astrophysics Data System (ADS)
Austin, Robert
Here is the problem: Cancer kills primarily by re-emergence from a period of dormancy after initial treatment. The presence of driver mutations and subsequent clonal expansion by Darwinian evolution does not explain dormancy and re-emergence of cancer from a community of cancer and host cells (including stromal and immune cells), nor does it explain our inability to predict the emergence of metastasis, by far the real killer in cancer. Dormancy appears to be a slow-driven, multi-cell interaction-dominated, threshold system with a poor prognosis once the cancer emerges from dormancy. The mission here is to try and model the phenomena of dormancy using game theory ideas, and in an in vitro complex ecology designed to emulate the true complexity of an in vivo tumor.
Communication scheme based on evolutionary spatial 2×2 games
NASA Astrophysics Data System (ADS)
Ziaukas, Pranas; Ragulskis, Tautvydas; Ragulskis, Minvydas
2014-06-01
A visual communication scheme based on evolutionary spatial 2×2 games is proposed in this paper. Self-organizing patterns induced by complex interactions between competing individuals are exploited for hiding and transmitting secret visual information. Properties of the proposed communication scheme are discussed in details. It is shown that the hiding capacity of the system (the minimum size of the detectable primitives and the minimum distance between two primitives) is sufficient for the effective transmission of digital dichotomous images. Also, it is demonstrated that the proposed communication scheme is resilient to time backwards, plain image attacks and is highly sensitive to perturbations of private and public keys. Several computational experiments are used to demonstrate the effectiveness of the proposed communication scheme.
NASA Astrophysics Data System (ADS)
Bassuoni, Mohamed Tamer F.
The growing use of self-consolidating concrete (SCC) in various infrastructure applications exposed to sulfate-rich environments necessitates conducting comprehensive research to evaluate its durability to external sulfate attack. Since the reliability and adequacy of standard sulfate immersion tests have been questioned, the current thesis introduced an integrated testing approach for assessing the durability of a wide scope of SCC mixtures to external sulfate attack. This testing approach involved progressive levels of complexity from single to multiple damage processes. A new series of sulfate attack tests involving multiple field-like parameters and combined damage mechanisms (various cations, controlled pH, wetting-drying, partial immersion, freezing-thawing, and cyclic cold-hot conditions with or without sustained flexural loading) were designed to evaluate the performance (suitability) of the SCC mixtures under various sulfate attack exposure scenarios. The main mixture design variables of SCC included the type of binder (single, binary, ternary and quaternary), air-entrainment, sand-to-aggregate mass ratio and hybrid fibre reinforcement. The comprehensive database and knowledge obtained from this research were used to develop smart models (fuzzy and neuro-fuzzy inference systems) based on artificial-intelligence to evaluate and predict the performance of the SCC mixtures under various sulfate attack exposure regimes implemented in this study. In full immersion tests involving high concentration sodium and magnesium sulfate solutions with controlled pH, the low penetrability of SCC was responsible for the high durability of specimens. Ternary and quaternary cementitious systems with or without limestone materials provided a passivating layer, with or without acid neutralization capacity, which protected SCC from severe damage in the aggressive sulfuric acid and ammonium sulfate solutions. In contrast to conclusions drawn from the sodium sulfate immersion tests, the combined sulfate attack tests captured performance risks and complex damage mechanisms associated with the SCC pore structure and constituent materials. Sodium sulfate attack with wetting-drying cycles and/or partial immersion under temperate-hot conditions synergistically caused significant damage to specimens, especially to quaternary cementitious systems having very fine pore structure, due to the build-up of salt crystals and sulfate reaction products. The deleterious effects of sulfate reaction products and salt crystallization on all cementitious systems were more severe under the combined sodium sulfate and freezing-thawing exposure, with a potential of sudden brittle failure. Laboratory experiments in the current work documented evidence for the occurrence of thaumasite sulfate attack (TSA) in cementitious systems containing limestone filler, not only under cold but also under temperate-hot conditions, which made specimens more vulnerable to damage in the combined sulfate attack tests. The field-like combined exposure of sodium sulfate, cyclic environments and flexural loading had synergistic effects on SCC specimens and caused the coexistence of multiple-complex degradation mechanisms (sulfate attack, TSA, stress-corrosion, salt crystallization, surface scaling and corrosion of surface steel fibres) depending on the mixture design variables. The current thesis demonstrates that relying only on sulfate immersion tests to evaluate the performance of cement-based materials can be risky. It also shows that linear and deterministic modeling of the performance of concrete structures under external sulfate attack is unrealistic. Fuzzy and adaptive-neuro fuzzy inference systems developed in the current thesis accurately and rationally predicted the serviceability, deterioration in engineering properties and time to failure of the SCC mixtures under the various sulfate attack exposure regimes adopted in the integrated testing approach. A durability evaluation factor from multiple performance criteria was created for the ammonium sulfate exposure. Environmental charts were developed to determine the level of aggression associated with sodium sulfate attack from temperature, RH and degree of wetting-drying expected in service. This novel modeling approach showed promising success in handling complex durability topics such as the sulfate attack of concrete, which involves non-linearity, ambiguity and interface with operator approximation. The current thesis provides needed fundamental knowledge on the durability of a wide scope of SCC mixtures to various sulfate attack exposure scenarios. It elucidates complex deterioration mechanisms and failure modes of cement-based materials under multi-mechanistic aging processes. It also proposes carefully engineered integrated sulfate attack tests that replicate various sulfate attack exposure regimes, which could be refined and standardized in the future. In addition, the current work introduced original knowledge-based smart models capable of handling uncertainty and providing reliable predictions for the behaviour of concrete under external sulfate attack. The models do not require conducting exhaustive laboratory experiments and/or making assumptions, thus facilitating the selection of optimum concrete mixtures for a specified exposure. Overall, this research should effectively contribute to the development of performance-based standards and specifications for, and improvement of durability-based design and life-cycle analysis of concrete structures subjected to external sulfate attack. Keywords. Sulfate attack, self-consolidating concrete, integrated testing, composite cements, air-entrainment, hybrid fibres, full immersion, cations, pH, wetting-drying, partial immersion, freezing-thawing, cyclic cold-hot conditions, flexural loading, thaumasite, salt crystallization, fuzzy, neuro-fuzzy, systems.
Emerging Subsea Networks: SMART Cable Systems for Science and Society
NASA Astrophysics Data System (ADS)
Howe, B. M.; Butler, R.; Joint Task Force, U.
2016-02-01
The subsea telecommunications cable industry is approaching a prospective new era: deploying SMART subsea cable systems (SMART = Science Monitoring And Reliable Telecommunication). The current global, commercial cable infrastructure consists of 1 Gm of cable, being refreshed now and expanding in the future. The SMART concept is to add a small external sensor package along the cable system at its optical repeaters to transmit important real-time environmental data via a dedicated wavelength or overhead channel in the transmission system, avoiding any impact on the commercial traffic. These small, reliable, existing sensors would precisely measure temperature, pressure and three-axis acceleration across the world's ocean floor over an extended period of time, being deployed using standard cable-laying procedures on new or refurbished cables, but not requiring maintenance through the 2-3 decade life of the cable systems. The game-changing factor is the urgent international need for ocean environmental data related to mitigating climate and sea-level change and improving tsunami and slope failure hazard warnings. Societal costs incurred by these are reaching billions of dollars and hundreds of thousands of deaths. Pressures for new and urgent public policies are evident from the 5th IPCC Assessment, USA-China agreement on limiting greenhouse gas emissions, clear evidence for rapid global warming, 21st Session of the Conference of the Parties to the UNFCCC (December 2015, Paris), and the scale of the costs of inaction. To support revised public policies and actions, decision-makers, industry leaders, and the public are seeking key scientific data, which will necessitate new sources of funding. Hence, the emergence of new SMART cable systems offered by the subsea telecommunications industry will provide new market opportunities, engage additional non-traditional users, and make profound societal contributions. The Joint Task Force (JTF) on SMART Subsea Cable Systems established by three UN agencies (ITU, WMO, and UNESCO IOC) is helping facilitate this transformation. http://www.itu.int/en/ITU-T/climatechange/task-force-sc/Pages/default.aspx or google 'jtf cable'
Arbogast, Helen; Burke, Rita V; Muller, Valerie; Ruiz, Pearl; Knudson, M Margaret; Knudson, Margaret M; Upperman, Jeffrey S
2014-05-01
Injury is the number one cause of death and disability in children in the United States and an increasingly important public health problem globally. While prevention of injuries is an important goal, prevention efforts are currently fragmented, poorly funded, and rarely studied. Among school-aged children, pedestrian crashes are a major mechanism of injury. We hypothesized that we could develop a game-based educational tool that would be effective in teaching elementary school children the principles of pedestrian safety. Between November 2011 and June 2013, second- and third-grade children in Los Angeles Unified School District were randomly assigned to play a unique interactive video game (Ace's Adventure) about pedestrian safety or to a traditional didactic session about pedestrian safety. A pretest and posttest were administered to the study participants. Afterward, study participants were observed for appropriate pedestrian behavior on a simulated street set called Street Smarts. All statistical analyses were performed using SAS version 9.2. A total of 348 study participants took the pretest and posttest. There were 180 who were randomized to the didactic and 168 who were randomized to the video game. The didactic group demonstrated a higher mean score increase (1.01, p < 0.0001) as compared with the video game group (0.44, p < 0.0001). However, observation of study participants revealed that participants who played the video game, as compared with the didactic group, more frequently exhibited appropriate behavior during the following: exiting a parked car (p = 0.01), signaling to a car that was backing up (p = 0.01), signaling to a stopped car (p = 0.0002), and crossing the street (p = 0.01). Students who played the educational video game about pedestrian safety performed similarly to those who attended a more traditional and labor-intensive didactic learning. Innovative educational methods, such as game playing, could significantly change our approach to injury prevention and have the potential to decrease the burden of injury among children worldwide.
Veksler, Vladislav D; Buchler, Norbou; Hoffman, Blaine E; Cassenti, Daniel N; Sample, Char; Sugrim, Shridat
2018-01-01
Computational models of cognitive processes may be employed in cyber-security tools, experiments, and simulations to address human agency and effective decision-making in keeping computational networks secure. Cognitive modeling can addresses multi-disciplinary cyber-security challenges requiring cross-cutting approaches over the human and computational sciences such as the following: (a) adversarial reasoning and behavioral game theory to predict attacker subjective utilities and decision likelihood distributions, (b) human factors of cyber tools to address human system integration challenges, estimation of defender cognitive states, and opportunities for automation, (c) dynamic simulations involving attacker, defender, and user models to enhance studies of cyber epidemiology and cyber hygiene, and (d) training effectiveness research and training scenarios to address human cyber-security performance, maturation of cyber-security skill sets, and effective decision-making. Models may be initially constructed at the group-level based on mean tendencies of each subject's subgroup, based on known statistics such as specific skill proficiencies, demographic characteristics, and cultural factors. For more precise and accurate predictions, cognitive models may be fine-tuned to each individual attacker, defender, or user profile, and updated over time (based on recorded behavior) via techniques such as model tracing and dynamic parameter fitting.
Quantum attack-resistent certificateless multi-receiver signcryption scheme.
Li, Huixian; Chen, Xubao; Pang, Liaojun; Shi, Weisong
2013-01-01
The existing certificateless signcryption schemes were designed mainly based on the traditional public key cryptography, in which the security relies on the hard problems, such as factor decomposition and discrete logarithm. However, these problems will be easily solved by the quantum computing. So the existing certificateless signcryption schemes are vulnerable to the quantum attack. Multivariate public key cryptography (MPKC), which can resist the quantum attack, is one of the alternative solutions to guarantee the security of communications in the post-quantum age. Motivated by these concerns, we proposed a new construction of the certificateless multi-receiver signcryption scheme (CLMSC) based on MPKC. The new scheme inherits the security of MPKC, which can withstand the quantum attack. Multivariate quadratic polynomial operations, which have lower computation complexity than bilinear pairing operations, are employed in signcrypting a message for a certain number of receivers in our scheme. Security analysis shows that our scheme is a secure MPKC-based scheme. We proved its security under the hardness of the Multivariate Quadratic (MQ) problem and its unforgeability under the Isomorphism of Polynomials (IP) assumption in the random oracle model. The analysis results show that our scheme also has the security properties of non-repudiation, perfect forward secrecy, perfect backward secrecy and public verifiability. Compared with the existing schemes in terms of computation complexity and ciphertext length, our scheme is more efficient, which makes it suitable for terminals with low computation capacity like smart cards.
Cyber War Game in Temporal Networks
2016-02-09
a node’s mobility, failure or its resource depletion over time or action(s), this optimization problem becomes NP-com- plete. We propose two heuristic ... representing the interactions between nodes [1, 2]. One of the most important property of a network is robustness against random failures and target attacks...authors and should not be interpreted as representing the official policies, either expressed or implied, of the Army Research Laboratory or the U.S
Attacking Software Crisis: A Macro Approach.
1985-03-01
Advisor X0774R.. Dyns, Second Reader W.R. Greer r. armn, Department of AAministrative Sciences Kneale rf. mrh- Dean of Information and Policy siences ...was at least originally intended to have practical value, that is, to satisfy some real need. Even the recent wave of game software for microcomputer...Comparing Online an" Offline Programming Performance, Communications of the ACM, January, 1968. 31. Schwartz, ,J. "Analyzing Large-Scale System
Applied Hypergame Theory for Network Defense
2013-06-01
information technology infrastructure as they are perhaps the most wired country on the planet . Government websites, banking systems, and even media...a long way from the simple lone youth down in the basement causing mischief. Organized swaths of intelligent computer savvy attackers now exist and...out of the five hypergames choose the hyperstrategy that is the same as the full game MSNE, with the Mid-Level defender being the lone difference. Thus
Assessing and Improving Operational Resilience of Critical Infrastructures and Other Systems
2014-01-01
Fukushima Daiichi nuclear disaster in 2011, along with the devastation caused by Hurricane “Superstorm” Sandy in 2012, have reinforced the need for...2006. In the years following HSPD-7, there were a number of unprecedented natural disasters , including the Indonesian tsunami in December 2004...Stakelberg game; optimization; operational model; attacker model; defender model 1. Introduction In the last 15 years, a number of disasters , some deliberately
A CyberCIEGE Traffic Analysis Extension for Teaching Network Security
2011-12-01
Information Technology LAN Local Area Network MAADNET Military Academy Attack/Defense Network MAC Media Access Control MMORPG Massively...ready to launch its latest massively multiplayer online role-playing game ( MMORPG ) “SyberSIEGE”! The product is currently in the final stages of...achieve his goal, this approach will still allow Tina to meet her goals and avoid disruptions to existing operations, which is also what would have
2017-06-01
students in a war- gaming class , and working in tandem with a NPS distance...surface mode ability provides a threat suppression method against small craft attacks and boarding attempts. b. Vulnerability As a sea-going surface...Design Architecture With a proposed CONOPS established, the physical architecture can proceed to a more detailed design. For the purpose of
A Trusted Portable Computing Device
NASA Astrophysics Data System (ADS)
Ming-wei, Fang; Jun-jun, Wu; Peng-fei, Yu; Xin-fang, Zhang
A trusted portable computing device and its security mechanism were presented to solve the security issues, such as the attack of virus and Trojan horse, the lost and stolen of storage device, in mobile office. It used smart card to build a trusted portable security base, virtualization to create a secure virtual execution environment, two-factor authentication mechanism to identify legitimate users, and dynamic encryption to protect data privacy. The security environment described in this paper is characteristic of portability, security and reliability. It can meet the security requirement of mobile office.
Tactical Determinants of Setting Zone in Elite Men'S Volleyball
Afonso, Jose; Esteves, Francisca; Araújo, Rui; Thomas, Luke; Mesquita, Isabel
2012-01-01
The interactions between two opposing teams lead to the emergence of unique game patterns. In volleyball, attack efficacy emerges as the strongest predictor of the final result and thus it becomes of foremost importance to understand which game patterns afford the attaining of higher attack efficacies. These rely on the quality of the setting action. In turn, the serve and the serve reception constrain the setter's actions and the attacker's efficacy. Therefore, the purpose of this study was to examine predictors of the setting zone in elite-level men's volleyball. Thirty-one matches of the 2007 World Cup were analyzed, in total 5117 rallies. The dependent variable was the setting zone, and the independent variables were the server player, serve type, serve direction, serve depth, reception zone, receiver player and reception type. Multinomial logistic regression was applied, in order to obtain the estimated likelihood of occurrence of the dependent variable, based on the values of the independent variables (p < 0.05). Only the serve direction showed not to be predictive of the setting zone. Concerning the remaining variables, the tennis jump serve, serves from the middle-player, deep serves, reception near the endline or sidelines, reception by the zone 4 attackers when in defensive zone, and low reception all proved to impair the quality of reception, demanding the setter to play more often in the not acceptable setting zone. Results suggest that, at this level, practice of serve-reception should preferably cover the deep tennis jump serve, and attempt to afford the libero more opportunities to receive. By focusing on the variables with the most predictive power, performers may better allocate their attention towards the most pertinent cues at each moment. Knowledge of these interactive models provides valuable insights into the dynamics of the action sequences, affording coaches important information and guidance. Key pointsA set of key variables interact and allow predicting the setting zone, an important variable in determining attack efficacy in high-level men's volleyball.The tennis jump serve, deep serves, receptions near the endline or sidelines, serves from the middle-players, receptions by the zone 4 attackers when in defensive zone, and low reception enhance the utilization of non-ideal setting zones.By focusing on the variables with the most predictive power, performers may better allocate their attention towards the most pertinent cues at each moment.Knowledge of these interactive models provides valuable insights into the dynamics of the action sequences, affording coaches important information and guidance. PMID:24149123
Mishra, Dheerendra
2015-01-01
Telecare medical information systems (TMIS) enable healthcare delivery services. However, access of these services via public channel raises security and privacy issues. In recent years, several smart card based authentication schemes have been introduced to ensure secure and authorized communication between remote entities over the public channel for the (TMIS). We analyze the security of some of the recently proposed authentication schemes of Lin, Xie et al., Cao and Zhai, and Wu and Xu's for TMIS. Unfortunately, we identify that these schemes failed to satisfy desirable security attributes. In this article we briefly discuss four dynamic ID-based authentication schemes and demonstrate their failure to satisfy desirable security attributes. The study is aimed to demonstrate how inefficient password change phase can lead to denial of server scenario for an authorized user, and how an inefficient login phase causes the communication and computational overhead and decrease the performance of the system. Moreover, we show the vulnerability of Cao and Zhai's scheme to known session specific temporary information attack, vulnerability of Wu and Xu's scheme to off-line password guessing attack, and vulnerability of Xie et al.'s scheme to untraceable on-line password guessing attack.
Ranger, Christopher M; Reding, Michael E; Oliver, Jason B; Schultz, Peter B; Moyseenko, James J; Youssef, Nadeer
2011-10-01
Ambrosia beetles (Coleoptera: Curculionidae: Scolytinae) pose a significant challenge to producers of ornamental nursery stock. Conventional insecticides are commonly used for management purposes, but plant-derived essential oils also may discourage ambrosia beetles from initiating attacks. To identify promising commercially available products, field-based efficacy trials were conducted in Ohio in 2009 and 2010 with the following products: Armorex (Soil Technologies), Cinnacure (Proguard, Inc.), EcoTrol (EcoSMART Technologies, Inc.), and Veggie Pharm (Pharm Solutions, Inc.). Potted Magnolia virginiana L. were first injected with 75 ml of 5% ethanol to ensure ambrosia beetle pressure on experimental trees. Mixtures of each product (10% in water) and a water control were applied until runoff and attacks occurring under field conditions were quantified at 1, 4, 7, and 14 d after treatment (DAT). Ambrosia beetle attacks generally increased over time but at differing rates depending on the particular treatment. In 2009, Armorex and Veggie Pharm were associated with the lowest cumulative attacks 14 DAT. In 2010, Armorex and Cinnacure were associated with the fewest attacks 14 DAT. Solid phase microextraction-gas chromatography-mass spectrometry was used to characterize the volatile compounds associated with each product. Allyl isothiocyanate, a compound with known repellent and insecticidal properties, was unique and predominant in Armorex. These experiments identified commercially available botanicals containing plant essential oils with activity against ambrosia beetles, along with demonstrating the usefulness of ethanol-injection to ensure ambrosia beetle pressure under field conditions. Characterizing the constituents of efficacious botanically based products could also lead to the development of improved botanical insecticides.
Defense Strategies for Asymmetric Networked Systems with Discrete Components.
Rao, Nageswara S V; Ma, Chris Y T; Hausken, Kjell; He, Fei; Yau, David K Y; Zhuang, Jun
2018-05-03
We consider infrastructures consisting of a network of systems, each composed of discrete components. The network provides the vital connectivity between the systems and hence plays a critical, asymmetric role in the infrastructure operations. The individual components of the systems can be attacked by cyber and physical means and can be appropriately reinforced to withstand these attacks. We formulate the problem of ensuring the infrastructure performance as a game between an attacker and a provider, who choose the numbers of the components of the systems and network to attack and reinforce, respectively. The costs and benefits of attacks and reinforcements are characterized using the sum-form, product-form and composite utility functions, each composed of a survival probability term and a component cost term. We present a two-level characterization of the correlations within the infrastructure: (i) the aggregate failure correlation function specifies the infrastructure failure probability given the failure of an individual system or network, and (ii) the survival probabilities of the systems and network satisfy first-order differential conditions that capture the component-level correlations using multiplier functions. We derive Nash equilibrium conditions that provide expressions for individual system survival probabilities and also the expected infrastructure capacity specified by the total number of operational components. We apply these results to derive and analyze defense strategies for distributed cloud computing infrastructures using cyber-physical models.
Defense Strategies for Asymmetric Networked Systems with Discrete Components
Rao, Nageswara S. V.; Ma, Chris Y. T.; Hausken, Kjell; He, Fei; Yau, David K. Y.
2018-01-01
We consider infrastructures consisting of a network of systems, each composed of discrete components. The network provides the vital connectivity between the systems and hence plays a critical, asymmetric role in the infrastructure operations. The individual components of the systems can be attacked by cyber and physical means and can be appropriately reinforced to withstand these attacks. We formulate the problem of ensuring the infrastructure performance as a game between an attacker and a provider, who choose the numbers of the components of the systems and network to attack and reinforce, respectively. The costs and benefits of attacks and reinforcements are characterized using the sum-form, product-form and composite utility functions, each composed of a survival probability term and a component cost term. We present a two-level characterization of the correlations within the infrastructure: (i) the aggregate failure correlation function specifies the infrastructure failure probability given the failure of an individual system or network, and (ii) the survival probabilities of the systems and network satisfy first-order differential conditions that capture the component-level correlations using multiplier functions. We derive Nash equilibrium conditions that provide expressions for individual system survival probabilities and also the expected infrastructure capacity specified by the total number of operational components. We apply these results to derive and analyze defense strategies for distributed cloud computing infrastructures using cyber-physical models. PMID:29751588
Improving Cyber-Security of Smart Grid Systems via Anomaly Detection and Linguistic Domain Knowledge
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ondrej Linda; Todd Vollmer; Milos Manic
The planned large scale deployment of smart grid network devices will generate a large amount of information exchanged over various types of communication networks. The implementation of these critical systems will require appropriate cyber-security measures. A network anomaly detection solution is considered in this work. In common network architectures multiple communications streams are simultaneously present, making it difficult to build an anomaly detection solution for the entire system. In addition, common anomaly detection algorithms require specification of a sensitivity threshold, which inevitably leads to a tradeoff between false positives and false negatives rates. In order to alleviate these issues, thismore » paper proposes a novel anomaly detection architecture. The designed system applies the previously developed network security cyber-sensor method to individual selected communication streams allowing for learning accurate normal network behavior models. Furthermore, the developed system dynamically adjusts the sensitivity threshold of each anomaly detection algorithm based on domain knowledge about the specific network system. It is proposed to model this domain knowledge using Interval Type-2 Fuzzy Logic rules, which linguistically describe the relationship between various features of the network communication and the possibility of a cyber attack. The proposed method was tested on experimental smart grid system demonstrating enhanced cyber-security.« less
NASA Langley Research Center's Contributions to International Active Buffeting Alleviation Programs
NASA Technical Reports Server (NTRS)
Moses, Robert W.
2000-01-01
Buffeting is an aeroelastic phenomenon which plagues high performance aircraft, especially those with twin vertical tails like the F/A-18, at high angles of attack. This buffeting is a concern from fatigue and inspection points of view. By means of wind-tunnel and flight tests, this phenomenon is well studied to the point that buffet loads can be estimated and fatigue life can be increased by structural enhancements to the airframe. In more recent years, buffeting alleviation through active control of smart materials has been highly researched in wind-tunnel proof-of-concept demonstrations and full-scale ground tests using the F/A-18 as a test bed. Because the F/A-18 resides in fleets outside as well as inside the United States, these tests have evolved into international collaborative research activities with Australia and Canada, coordinated by the Air Force Research Laboratory (AFRL) and conducted under the auspices of The Technical Cooperation Program (TTCP). With the recent successes and advances in smart materials, the main focus of these buffeting alleviation tests has also evolved to a new level: utilize the F/A-18 as a prototype to mature smart materials for suppressing vibrations of aerospace structures. The role of the NASA Langley Research Center (LaRC) in these programs is presented.
Contributions to Active Buffeting Alleviation Programs by the NASA Langley Research Center
NASA Technical Reports Server (NTRS)
Moses, Robert W.
1999-01-01
Buffeting is an aeroelastic phenomenon which plagues high performance aircraft, especially those with twin vertical tails like the F/A-18, at high angles of attack. This buffeting is a concern from fatigue and inspection points of view. By means of wind-tunnel and flight tests, this phenomenon is well studied to the point that buffet loads can be estimated and fatigue life can be increased by structural enhancements to the airframe. In more recent years, buffeting alleviation through active control of smart materials has been highly researched in wind-tunnel proof-of-concept demonstrations and full-scale ground tests using the F/A-18 as a test bed. Because the F/A-18 resides in fleets outside as well as inside the United States, these tests have evolved into international collaborative research activities with Australia and Canada, coordinated by the Air Force Research Laboratory (AFRL) and conducted under the auspices of The Technical Cooperation Program (TTCP). With the recent successes and advances in smart materials, the main focus of these buffeting alleviation tests has also evolved to a new level: utilize the F/A-18 as a prototype to mature smart materials for suppressing vibrations of aerospace structures. The role of the NASA Langley Research Center (LaRC) in these programs is presented.
Chess Evolution Visualization.
Lu, Wei-Li; Wang, Yu-Shuen; Lin, Wen-Chieh
2014-05-01
We present a chess visualization to convey the changes in a game over successive generations. It contains a score chart, an evolution graph and a chess board, such that users can understand a game from global to local viewpoints. Unlike current graphical chess tools, which focus only on highlighting pieces that are under attack and require sequential investigation, our visualization shows potential outcomes after a piece is moved and indicates how much tactical advantage the player can have over the opponent. Users can first glance at the score chart to roughly obtain the growth and decline of advantages from both sides, and then examine the position relations and the piece placements, to know how the pieces are controlled and how the strategy works. To achieve this visualization, we compute the decision tree using artificial intelligence to analyze a game, in which each node represents a chess position and each edge connects two positions that are one-move different. We then merge nodes representing the same chess position, and shorten branches where nodes on them contain only two neighbors, in order to achieve readability. During the graph rendering, the nodes containing events such as draws, effective checks and checkmates, are highlighted because they show how a game is ended. As a result, our visualization helps players understand a chess game so that they can efficiently learn strategies and tactics. The presented results, evaluations, and the conducted user studies demonstrate the feasibility of our visualization design.
Aerodynamic Database Development for Mars Smart Lander Vehicle Configurations
NASA Technical Reports Server (NTRS)
Bobskill, Glenn J.; Parikh, Paresh C.; Prabhu, Ramadas K.; Tyler, Erik D.
2002-01-01
An aerodynamic database has been generated for the Mars Smart Lander Shelf-All configuration using computational fluid dynamics (CFD) simulations. Three different CFD codes, USM3D and FELISA, based on unstructured grid technology and LAURA, an established and validated structured CFD code, were used. As part of this database development, the results for the Mars continuum were validated with experimental data and comparisons made where applicable. The validation of USM3D and LAURA with the Unitary experimental data, the use of intermediate LAURA check analyses, as well as the validation of FELISA with the Mach 6 CF(sub 4) experimental data provided a higher confidence in the ability for CFD to provide aerodynamic data in order to determine the static trim characteristics for longitudinal stability. The analyses of the noncontinuum regime showed the existence of multiple trim angles of attack that can be unstable or stable trim points. This information is needed to design guidance controller throughout the trajectory.
Boundary Layer Transition Correlations and Aeroheating Predictions for Mars Smart Lander
NASA Technical Reports Server (NTRS)
Hollis, Brian R.; Liechty, Derek S.
2002-01-01
Laminar and turbulent perfect-gas air, Navier-Stokes computations have been performed for a proposed Mars Smart Lander entry vehicle at Mach 6 over a free stream Reynolds number range of 6.9 x 10(exp 6)/m to 2.4 x 10(exp 7)/m (2.1 x 10(exp 6)/ft to 7.3 x 10(exp 6)/ft) for angles-of-attack of 0-deg, 11-deg, 16-deg, and 20-deg, and comparisons were made to wind tunnel heating data obtained a t the same conditions. Boundary layer edge properties were extracted from the solutions and used to correlate experimental data on the effects of heat-shield penetrations (bolt-holes where the entry vehicle would be attached to the propulsion module during transit to Mars) on boundary-layer transition. A non-equilibrium Martian-atmosphere computation was performed for the peak heating point on the entry trajectory in order to determine if the penetrations would produce boundary-layer transition by using this correlation.
Boundary Layer Transition Correlations and Aeroheating Predictions for Mars Smart Lander
NASA Technical Reports Server (NTRS)
Hollis, Brian R.; Liechty, Derek S.
2002-01-01
Laminar and turbulent perfect-gas air, Navier-Stokes computations have been performed for a proposed Mars Smart Lander entry vehicle at Mach 6 over a free stream Reynolds number range of 6.9 x 10(exp 6/m to 2.4 x 10(exp 7)m(2.1 x 10(exp 6)/ft to 7.3 x 10(exp 6)ft) for angles-of-attack of 0-deg, 11-deg, 16-deg, and 20-deg, and comparisons were made to wind tunnel heating data obtained at the same conditions. Boundary layer edge properties were extracted from the solutions and used to correlate experimental data on the effects of heat-shield penetrations (bolt-holes where the entry vehicle would be attached to the propulsion module during transit to Mars) on boundary-layer transition. A non-equilibrium Martian-atmosphere computation was performed for the peak heating point on the entry trajectory in order to determine if the penetrations would produce boundary-layer transition by using this correlation.
A Real-Time Cardiac Arrhythmia Classification System with Wearable Sensor Networks
Hu, Sheng; Wei, Hongxing; Chen, Youdong; Tan, Jindong
2012-01-01
Long term continuous monitoring of electrocardiogram (ECG) in a free living environment provides valuable information for prevention on the heart attack and other high risk diseases. This paper presents the design of a real-time wearable ECG monitoring system with associated cardiac arrhythmia classification algorithms. One of the striking advantages is that ECG analog front-end and on-node digital processing are designed to remove most of the noise and bias. In addition, the wearable sensor node is able to monitor the patient's ECG and motion signal in an unobstructive way. To realize the real-time medical analysis, the ECG is digitalized and transmitted to a smart phone via Bluetooth. On the smart phone, the ECG waveform is visualized and a novel layered hidden Markov model is seamlessly integrated to classify multiple cardiac arrhythmias in real time. Experimental results demonstrate that the clean and reliable ECG waveform can be captured in multiple stressed conditions and the real-time classification on cardiac arrhythmia is competent to other workbenches. PMID:23112746
Privacy-Preserving Authentication Using a Double Pseudonym for Internet of Vehicles
Xu, Wenyu; Zhang, Jing; Xu, Yan; Liu, Lu
2018-01-01
The Internet of Vehicles (IoV) plays an important role in smart transportation to reduce the drivers’s risk of having an accident and help them manage small emergencies. Therefore, security and privacy issues of the message in the tamper proof device (TPD) broadcasted to other vehicles and roadside units (RSUs) have become an important research subject in the field of smart transportation. Many authentication schemes are proposed to tackle the challenges above and most of them are heavy in computation and communication. In this paper, we propose a novel authentication scheme that utilizes the double pseudonym method to hide the real identity of vehicles and adopts the dynamic update technology to periodically update the information (such as member secret, authentication key, internal pseudo-identity) stored in the tamper-proof device to prevent the side-channel attack. Because of not using bilinear pairing, our scheme yields a better performance in terms of computation overhead and communication overhead, and is more suitable to be applied in the Internet of Vehicles. PMID:29735941
Privacy-Preserving Authentication Using a Double Pseudonym for Internet of Vehicles.
Cui, Jie; Xu, Wenyu; Zhong, Hong; Zhang, Jing; Xu, Yan; Liu, Lu
2018-05-07
The Internet of Vehicles (IoV) plays an important role in smart transportation to reduce the drivers’s risk of having an accident and help them manage small emergencies. Therefore, security and privacy issues of the message in the tamper proof device (TPD) broadcasted to other vehicles and roadside units (RSUs) have become an important research subject in the field of smart transportation. Many authentication schemes are proposed to tackle the challenges above and most of them are heavy in computation and communication. In this paper, we propose a novel authentication scheme that utilizes the double pseudonym method to hide the real identity of vehicles and adopts the dynamic update technology to periodically update the information (such as member secret, authentication key, internal pseudo-identity) stored in the tamper-proof device to prevent the side-channel attack. Because of not using bilinear pairing, our scheme yields a better performance in terms of computation overhead and communication overhead, and is more suitable to be applied in the Internet of Vehicles.
Learning consensus in adversarial environments
NASA Astrophysics Data System (ADS)
Vamvoudakis, Kyriakos G.; García Carrillo, Luis R.; Hespanha, João. P.
2013-05-01
This work presents a game theory-based consensus problem for leaderless multi-agent systems in the presence of adversarial inputs that are introducing disturbance to the dynamics. Given the presence of enemy components and the possibility of malicious cyber attacks compromising the security of networked teams, a position agreement must be reached by the networked mobile team based on environmental changes. The problem is addressed under a distributed decision making framework that is robust to possible cyber attacks, which has an advantage over centralized decision making in the sense that a decision maker is not required to access information from all the other decision makers. The proposed framework derives three tuning laws for every agent; one associated with the cost, one associated with the controller, and one with the adversarial input.
Mobile Delivery of Treatment for Alcohol Use Disorders
Quanbeck, Andrew; Chih, Ming-Yuan; Isham, Andrew; Johnson, Roberta; Gustafson, David
2014-01-01
Several systems for treating alcohol-use disorders (AUDs) exist that operate on mobile phones. These systems are categorized into four groups: text-messaging monitoring and reminder systems, text-messaging intervention systems, comprehensive recovery management systems, and game-based systems. Text-messaging monitoring and reminder systems deliver reminders and prompt reporting of alcohol consumption, enabling continuous monitoring of alcohol use. Text-messaging intervention systems additionally deliver text messages designed to promote abstinence and recovery. Comprehensive recovery management systems use the capabilities of smart-phones to provide a variety of tools and services that can be tailored to individuals, including in-the-moment assessments and access to peer discussion groups. Game-based systems engage the user using video games. Although many commercial applications for treatment of AUDs exist, few (if any) have empirical evidence of effectiveness. The available evidence suggests that although texting-based applications may have beneficial effects, they are probably insufficient as interventions for AUDs. Comprehensive recovery management systems have the strongest theoretical base and have yielded the strongest and longest-lasting effects, but challenges remain, including cost, understanding which features account for effects, and keeping up with technological advances. PMID:26259005
Feedback Control for a Smart Wheelchair Trainer Based on the Kinect Sensor
NASA Astrophysics Data System (ADS)
Darling, Aurelia McLaughlin
This thesis describes a Microsoft Kinect-based feedback controller for a robot-assisted powered wheelchair trainer for children with a severe motor and/or cognitive disability. In one training mode, "computer gaming" mode, the wheelchair is allowed to rotate left and right while the children use a joystick to play video games shown on a screen in front of them. This enables them to learn the use of the joystick in a motivating environment, while experiencing the sensation and dynamics of turning in a safe setting. During initial pilot testing of the device, it was found that the wheelchair would creep forward while children were playing the games. This thesis presents a mathematical model of the wheelchair dynamics that explains the origin of the creep as a center of gravity offset from the wheel axis or a mismatch of the torques applied to the chair. Given these possible random perturbations, a feedback controller was developed to cancel these effects, correcting the system creep. The controller uses a Microsoft Kinect sensor to detect the distance to the screen displaying the computer game, as well as the left-right position (parallel parking concept) with respect to the screen, and then adjusts the wheel torque commands based on this measurement. We show through experimental testing that this controller effectively stops the creep. An added benefit of the feedback controller is that it approximates a washout filter, such as those used in aircraft simulators, to convey a more realistic sense of forward/backward motion during game play.
2008-04-01
Initiative acknowledges the dearth of published research on Massively Multiplayer Online Games ((MMOGs), which are based on MMP technology) for...wanting help during the emergency, protesting insufficient aid being delivered in time, escalating to violence , including sniper attacks and attempted... multiplayer environment. The movement control systems were rated "moderately easy" to learn, and ease of movement after learning to use the controls was rated
Effects of Motivation: Rewarding Hackers for Undetected Attacks Cause Analysts to Perform Poorly.
Maqbool, Zahid; Makhijani, Nidhi; Pammi, V S Chandrasekhar; Dutt, Varun
2017-05-01
The aim of this study was to determine how monetary motivations influence decision making of humans performing as security analysts and hackers in a cybersecurity game. Cyberattacks are increasing at an alarming rate. As cyberattacks often cause damage to existing cyber infrastructures, it is important to understand how monetary rewards may influence decision making of hackers and analysts in the cyber world. Currently, only limited attention has been given to this area. In an experiment, participants were randomly assigned to three between-subjects conditions ( n = 26 for each condition): equal payoff, where the magnitude of monetary rewards for hackers and defenders was the same; rewarding hacker, where the magnitude of monetary reward for hacker's successful attack was 10 times the reward for analyst's successful defense; and rewarding analyst, where the magnitude of monetary reward for analyst's successful defense was 10 times the reward for hacker's successful attack. In all conditions, half of the participants were human hackers playing against Nash analysts and half were human analysts playing against Nash hackers. Results revealed that monetary rewards for human hackers and analysts caused a decrease in attack and defend actions compared with the baseline. Furthermore, rewarding human hackers for undetected attacks made analysts deviate significantly from their optimal behavior. If hackers are rewarded for their undetected attack actions, then this causes analysts to deviate from optimal defend proportions. Thus, analysts need to be trained not become overenthusiastic in defending networks. Applications of our results are to networks where the influence of monetary rewards may cause information theft and system damage.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sintov, Nicole; Orosz, Michael; Schultz, P. Wesley
2015-01-01
The mission of the Personalized Energy Reduction Cyber-physical System (PERCS) is to create new possibilities for improving building operating efficiency, enhancing grid reliability, avoiding costly power interruptions, and mitigating greenhouse gas emissions. PERCS proposes to achieve these outcomes by engaging building occupants as partners in a user-centered smart service platform. Using a non-intrusive load monitoring approach, PERCS uses a single sensing point in each home to capture smart electric meter data in real time. The household energy signal is disaggregated into individual load signatures of common appliances (e.g., air conditioners), yielding near real-time appliance-level energy information. Users interact with PERCSmore » via a mobile phone platform that provides household- and appliance-level energy feedback, tailored recommendations, and a competitive game tied to energy use and behavioral changes. PERCS challenges traditional energy management approaches by directly engaging occupant as key elements in a technological system.« less
Space occupation near the basket shapes collective behaviours in youth basketball.
Esteves, Pedro T; Silva, Pedro; Vilar, Luís; Travassos, Bruno; Duarte, Ricardo; Arede, Jorge; Sampaio, Jaime
2016-08-01
This study aimed to analyse how youth basketball players explored numerical overloads during shot attempts by measuring their space occupation across specific court areas. Four process-tracing variables measured how the number of attackers (NA), number of defenders (ND), interpersonal distance between attacker and the closest defender (ID) and distance between attacker and the basket (DBkt) impacted on the performance outcome (converted shot; missed shot; ball possession lost). Ten competitive games involving 13 U14 teams were video recorded and players' displacements were digitised. The associations between performance outcomes and the process-tracing measures were assessed using standardised mean differences and a cross-correlation function. A multinomial logistic regression was used to calculate the odds ratio (OR) for each of the three possible outcomes. Results revealed that when shot attempts occurred at larger ID and at smaller DBkt, the possibilities to obtain a converted shot increased. The numerical overload of defenders near the scoring target was predominantly associated with offensive success. Also, the possibility of attackers to lead the spatial relation of movements with the defenders, near the scoring target, appeared as a prominent strategy to succeed. In sum, basketball teams that exhibit potential to adapt their collective behaviours to local changes in the environment might be closer to achieving successful outcomes.
Veksler, Vladislav D.; Buchler, Norbou; Hoffman, Blaine E.; Cassenti, Daniel N.; Sample, Char; Sugrim, Shridat
2018-01-01
Computational models of cognitive processes may be employed in cyber-security tools, experiments, and simulations to address human agency and effective decision-making in keeping computational networks secure. Cognitive modeling can addresses multi-disciplinary cyber-security challenges requiring cross-cutting approaches over the human and computational sciences such as the following: (a) adversarial reasoning and behavioral game theory to predict attacker subjective utilities and decision likelihood distributions, (b) human factors of cyber tools to address human system integration challenges, estimation of defender cognitive states, and opportunities for automation, (c) dynamic simulations involving attacker, defender, and user models to enhance studies of cyber epidemiology and cyber hygiene, and (d) training effectiveness research and training scenarios to address human cyber-security performance, maturation of cyber-security skill sets, and effective decision-making. Models may be initially constructed at the group-level based on mean tendencies of each subject's subgroup, based on known statistics such as specific skill proficiencies, demographic characteristics, and cultural factors. For more precise and accurate predictions, cognitive models may be fine-tuned to each individual attacker, defender, or user profile, and updated over time (based on recorded behavior) via techniques such as model tracing and dynamic parameter fitting. PMID:29867661
Quantum Attack-Resistent Certificateless Multi-Receiver Signcryption Scheme
Li, Huixian; Chen, Xubao; Pang, Liaojun; Shi, Weisong
2013-01-01
The existing certificateless signcryption schemes were designed mainly based on the traditional public key cryptography, in which the security relies on the hard problems, such as factor decomposition and discrete logarithm. However, these problems will be easily solved by the quantum computing. So the existing certificateless signcryption schemes are vulnerable to the quantum attack. Multivariate public key cryptography (MPKC), which can resist the quantum attack, is one of the alternative solutions to guarantee the security of communications in the post-quantum age. Motivated by these concerns, we proposed a new construction of the certificateless multi-receiver signcryption scheme (CLMSC) based on MPKC. The new scheme inherits the security of MPKC, which can withstand the quantum attack. Multivariate quadratic polynomial operations, which have lower computation complexity than bilinear pairing operations, are employed in signcrypting a message for a certain number of receivers in our scheme. Security analysis shows that our scheme is a secure MPKC-based scheme. We proved its security under the hardness of the Multivariate Quadratic (MQ) problem and its unforgeability under the Isomorphism of Polynomials (IP) assumption in the random oracle model. The analysis results show that our scheme also has the security properties of non-repudiation, perfect forward secrecy, perfect backward secrecy and public verifiability. Compared with the existing schemes in terms of computation complexity and ciphertext length, our scheme is more efficient, which makes it suitable for terminals with low computation capacity like smart cards. PMID:23967037
NASA Astrophysics Data System (ADS)
Chahrazed, Yahiaoui; Jean-Louis, Lanet; Mohamed, Mezghiche; Karim, Tamine
2018-01-01
Fault attack represents one of the serious threats against Java Card security. It consists of physical perturbation of chip components to introduce faults in the code execution. A fault may be induced using a laser beam to impact opcodes and operands of instructions. This could lead to a mutation of the application code in such a way that it becomes hostile. Any successful attack may reveal a secret information stored in the card or grant an undesired authorisation. We propose a methodology to recognise, during the development step, the sensitive patterns to the fault attack in the Java Card applications. It is based on the concepts from text categorisation and machine learning. In fact, in this method, we represented the patterns using opcodes n-grams as features, and we evaluated different machine learning classifiers. The results show that the classifiers performed poorly when classifying dangerous sensitive patterns, due to the imbalance of our data-set. The number of dangerous sensitive patterns is much lower than the number of not dangerous patterns. We used resampling techniques to balance the class distribution in our data-set. The experimental results indicated that the resampling techniques improved the accuracy of the classifiers. In addition, our proposed method reduces the execution time of sensitive patterns classification in comparison to the SmartCM tool. This tool is used in our study to evaluate the effect of faults on Java Card applications.
Salvini, G; Ligtenberg, A; van Paassen, A; Bregt, A K; Avitabile, V; Herold, M
2016-05-01
Finding land use strategies that merge land-based climate change mitigation measures and adaptation strategies is still an open issue in climate discourse. This article explores synergies and trade-offs between REDD+, a scheme that focuses mainly on mitigation through forest conservation, with "Climate Smart Agriculture", an approach that emphasizes adaptive agriculture. We introduce a framework for ex-ante assessment of the impact of land management policies and interventions and for quantifying their impacts on land-based mitigation and adaptation goals. The framework includes a companion modelling (ComMod) process informed by interviews with policymakers, local experts and local farmers. The ComMod process consists of a Role-Playing Game with local farmers and an Agent Based Model. The game provided a participatory means to develop policy and climate change scenarios. These scenarios were then used as inputs to the Agent Based Model, a spatially explicit model to simulate landscape dynamics and the associated carbon emissions over decades. We applied the framework using as case study a community in central Vietnam, characterized by deforestation for subsistence agriculture and cultivation of acacias as a cash crop. The main findings show that the framework is useful in guiding consideration of local stakeholders' goals, needs and constraints. Additionally the framework provided beneficial information to policymakers, pointing to ways that policies might be re-designed to make them better tailored to local circumstances and therefore more effective in addressing synergistically climate change mitigation and adaptation objectives. Copyright © 2015 Elsevier Ltd. All rights reserved.
Risk to tourists posed by wild mammals in South Africa.
Durrheim, D N; Leggat, P A
1999-09-01
One of South Africa's principal tourist attractions is the opportunity to encounter Africa's large mammals in the wild. Attacks by these mammals can be exceptionally newsworthy with potentially deleterious effects on tourism. Little is known about the risk of injury and death caused by wild mammals to visitors to South Africa's nature reserves. The aim of this study was to determine the incidence of fatal and nonfatal attacks on tourists by wild mammals in South Africa and to ascertain avoidable factors, if any. Commercial press records covering all South African Newspapers archived at the Independent Newspapers' central library were systematically reviewed for a 10-year period, January 1988 to December 1997 inclusive, to identify all deaths and injuries to domestic and international tourists resulting from encounters with wild mammals in South Africa. All of these incidents were analyzed to ascertain avoidable factors. During the review period seven tourists, including two students from Thailand and a German traveler, were killed by wild mammals in South Africa. Three of the four deaths ascribed to lions resulted from tourists carelessly approaching prides on foot in lion reserves. A judicial inquiry found that the management of a KwaZulu-Natal Reserve was culpable for the remaining death. Tourist ignorance of animal behavior and flagrant disregard of rules contributed to the two fatalities involving hippopotami. The unusual behavior manifested by the bull elephant responsible for the final death, resulted from discomfort caused by a dental problem to this pachyderm. During the same period there were 14 nonfatal attacks on tourists, including five by hippo, three by buffalo, two by rhino, and one each by a lion, leopard, zebra and musth elephant. Only the latter occurred while the visitor was in a motor vehicle. Tourist ethological naivete and failure to determine the experience of trail guides prior to travel, resulted in inadvertent agonistic behavior, unnecessary risk-taking and avoidable injury. This retrospective study has shown that attacks on tourists by wild mammals in South Africa are an uncommon cause of injury and death. Sensible precautions to minimize this risk include remaining in a secure motor vehicle or adequately fenced precincts while in the vicinity of large mammals, rigidly observing nature reserve instructions, never approaching animals that appear ill, malnourished, displaying aggressive behavior traits or female wild mammals with young, and demanding adequately trained and experienced game rangers when embarking on walking trails. Any behavior that might be construed as antagonistic and which could provoke an attack by large mammals should be avoided (e.g., driving directly at a lion). Visitors need to be informed of classic signs of aggression, in particular in elephants, which will allow timely avoidance measures to be taken. The risk-enhancing effect of excessive alcohol intake is undesirable in the game reserve setting, as is driving at high speed after dusk in areas where hippos graze. Local advice on personal safety in wildlife reserves and the credentials of trail guides should be obtained from lodge or reserve management, tourism authorities or the travel industry prior to travel to game reserves.
ImmuneQuest: Assessment of a Video Game as a Supplement to an Undergraduate Immunology Course.
Raimondi, Stacey L
2016-05-01
The study of immunology, particularly in this day and age, is an integral aspect of the training of future biologists, especially health professionals. Unfortunately, many students lose interest in or lack true comprehension of immunology due to the jargon of the field, preventing them from gaining a true conceptual understanding that is essential to all biological learning. To that end, a new video game, ImmuneQuest, has been developed that allows undergraduate students to "be" cells in the immune system, finding and attacking pathogens, while answering questions to earn additional abilities. The ultimate goal of ImmuneQuest is to allow students to understand how the major cells in the immune system work together to fight disease, rather than focusing on them as separate entities as is more commonly done in lecture material. This work provides the first assessment of ImmuneQuest in an upper-level immunology course. Students had significant gains in learning of information presented in ImmuneQuest compared with information discussed in lecture only. Furthermore, while students found the game "frustrating" at times, they agreed that the game aided their learning and recommended it for future courses. Taken together, these results suggest that ImmuneQuest appears to be a useful tool to supplement lecture material and increase student learning and comprehension.
A Multiserver Biometric Authentication Scheme for TMIS using Elliptic Curve Cryptography.
Chaudhry, Shehzad Ashraf; Khan, Muhammad Tawab; Khan, Muhammad Khurram; Shon, Taeshik
2016-11-01
Recently several authentication schemes are proposed for telecare medicine information system (TMIS). Many of such schemes are proved to have weaknesses against known attacks. Furthermore, numerous such schemes cannot be used in real time scenarios. Because they assume a single server for authentication across the globe. Very recently, Amin et al. (J. Med. Syst. 39(11):180, 2015) designed an authentication scheme for secure communication between a patient and a medical practitioner using a trusted central medical server. They claimed their scheme to extend all security requirements and emphasized the efficiency of their scheme. However, the analysis in this article proves that the scheme designed by Amin et al. is vulnerable to stolen smart card and stolen verifier attacks. Furthermore, their scheme is having scalability issues along with inefficient password change and password recovery phases. Then we propose an improved scheme. The proposed scheme is more practical, secure and lightweight than Amin et al.'s scheme. The security of proposed scheme is proved using the popular automated tool ProVerif.
Moon, Jongho; Choi, Younsung; Jung, Jaewook; Won, Dongho
2015-01-01
In multi-server environments, user authentication is a very important issue because it provides the authorization that enables users to access their data and services; furthermore, remote user authentication schemes for multi-server environments have solved the problem that has arisen from user's management of different identities and passwords. For this reason, numerous user authentication schemes that are designed for multi-server environments have been proposed over recent years. In 2015, Lu et al. improved upon Mishra et al.'s scheme, claiming that their remote user authentication scheme is more secure and practical; however, we found that Lu et al.'s scheme is still insecure and incorrect. In this paper, we demonstrate that Lu et al.'s scheme is vulnerable to outsider attack and user impersonation attack, and we propose a new biometrics-based scheme for authentication and key agreement that can be used in multi-server environments; then, we show that our proposed scheme is more secure and supports the required security properties.
Clemente, Filipe Manuel; González-Víllora, Sixto; Delextrat, Anne; Martins, Fernando Manuel Lourenço; Vicedo, Juan Carlos Pastor
2017-01-01
Abstract The aim of this study was to analyze the effect of different small-sided and conditioning games (SSCG) with different tactical contents on heart rate responses, technical performance and collective organization of youth basketball players of different performance levels. Twenty male basketball players from U14 (13.7 ± 0.8 years old; 4.2 ± 1.4 years of practice) and U16 (15.3 ± 1.1 years old; 6.4 ± 2.1 years of practice) participated in this research study. The two-way MANOVA revealed that the sports level (p = 0.009; ηp2 = 0.151), format (p = 0.001; ηp2 = 0.246) and task condition (p = 0.023; ηp2 = 0.104; small effect size) had significant main effects on heart rate responses. It was also found that the format (p = 0.001; ηp2 = 0.182) had significant main effects on technical performance. A smaller format significantly increased the heart rate, volume of play, efficiency index and collective density during attacking plays. The SSCG with attacking content statistically increased the heart rate, efficiency index and performance score. Therefore, this study revealed that different SSCGs with tactical content influenced the physiological responses of youth players. PMID:28828085
Das, Ashok Kumar
2015-03-01
Recent advanced technology enables the telecare medicine information system (TMIS) for the patients to gain the health monitoring facility at home and also to access medical services over the Internet of mobile networks. Several remote user authentication schemes have been proposed in the literature for TMIS. However, most of them are either insecure against various known attacks or they are inefficient. Recently, Tan proposed an efficient user anonymity preserving three-factor authentication scheme for TMIS. In this paper, we show that though Tan's scheme is efficient, it has several security drawbacks such as (1) it fails to provide proper authentication during the login phase, (2) it fails to provide correct updation of password and biometric of a user during the password and biometric update phase, and (3) it fails to protect against replay attack. In addition, Tan's scheme lacks the formal security analysis and verification. Later, Arshad and Nikooghadam also pointed out some security flaws in Tan's scheme and then presented an improvement on Tan's s scheme. However, we show that Arshad and Nikooghadam's scheme is still insecure against the privileged-insider attack through the stolen smart-card attack, and it also lacks the formal security analysis and verification. In order to withstand those security loopholes found in both Tan's scheme, and Arshad and Nikooghadam's scheme, we aim to propose an effective and more secure three-factor remote user authentication scheme for TMIS. Our scheme provides the user anonymity property. Through the rigorous informal and formal security analysis using random oracle models and the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool, we show that our scheme is secure against various known attacks, including the replay and man-in-the-middle attacks. Furthermore, our scheme is also efficient as compared to other related schemes.
Cyber Risk Management for Critical Infrastructure: A Risk Analysis Model and Three Case Studies.
Paté-Cornell, M-Elisabeth; Kuypers, Marshall; Smith, Matthew; Keller, Philip
2018-02-01
Managing cyber security in an organization involves allocating the protection budget across a spectrum of possible options. This requires assessing the benefits and the costs of these options. The risk analyses presented here are statistical when relevant data are available, and system-based for high-consequence events that have not happened yet. This article presents, first, a general probabilistic risk analysis framework for cyber security in an organization to be specified. It then describes three examples of forward-looking analyses motivated by recent cyber attacks. The first one is the statistical analysis of an actual database, extended at the upper end of the loss distribution by a Bayesian analysis of possible, high-consequence attack scenarios that may happen in the future. The second is a systems analysis of cyber risks for a smart, connected electric grid, showing that there is an optimal level of connectivity. The third is an analysis of sequential decisions to upgrade the software of an existing cyber security system or to adopt a new one to stay ahead of adversaries trying to find their way in. The results are distributions of losses to cyber attacks, with and without some considered countermeasures in support of risk management decisions based both on past data and anticipated incidents. © 2017 Society for Risk Analysis.
Targeted gene flow and rapid adaptation in an endangered marsupial.
Kelly, Ella; Phillips, Ben L
2018-06-13
Targeted gene flow is an emerging conservation strategy. It involves translocating individuals with favorable genes to areas where they will have a conservation benefit. The applications for targeted gene flow are wide-ranging, but include pre-adapting natives to the arrival of invasive species. The endangered carnivorous marsupial, the northern quoll, has declined rapidly since the introduction of the cane toad, which fatally poisons quolls that attack them. There are, however, a few remaining toad-invaded quoll populations in which the quolls survive because they know not to eat cane toads. It is this "toad-smart" behavior that we hope to promote through targeted gene flow. For targeted gene flow to be feasible, however, toad-smarts must have a genetic basis. To assess this, we used a common garden experiment and found offspring from toad-exposed populations were substantially less likely to eat toads than those with toad-naïve parents. Hybrid offspring showed similar responses to quolls with two toad-exposed parents, indicating the trait may be dominant. Together, these results suggest a heritable trait and rapid adaptive response in small number of toad-impacted populations. Although questions remain about outbreeding depression, our results are encouraging for targeted gene flow: suggesting it should be possible to introduce toad-smart behavior into soon to be impacted quoll populations. This article is protected by copyright. All rights reserved. This article is protected by copyright. All rights reserved.
Industrial ecology Prosperity Game{trademark}
DOE Office of Scientific and Technical Information (OSTI.GOV)
Beck, D.; Boyack, K.; Berman, M.
1998-03-01
Industrial ecology (IE) is an emerging scientific field that views industrial activities and the environment as an interactive whole. The IE approach simultaneously optimizes activities with respect to cost, performance, and environmental impact. Industrial Ecology provides a dynamic systems-based framework that enables management of human activity on a sustainable basis by: minimizing energy and materials usage; insuring acceptable quality of life for people; minimizing the ecological impact of human activity to levels that natural systems can sustain; and maintaining the economic viability of systems for industry, trade and commerce. Industrial ecology applies systems science to industrial systems, defining the systemmore » boundary to incorporate the natural world. Its overall goal is to optimize industrial activities within the constraints imposed by ecological viability, globally and locally. In this context, Industrial systems applies not just to private sector manufacturing and services but also to government operations, including provision of infrastructure. Sandia conducted its seventeenth Prosperity Game{trademark} on May 23--25, 1997, at the Hyatt Dulles Hotel in Herndon, Virginia. The primary sponsors of the event were Sandia National Laboratories and Los Alamos National Laboratory, who were interested in using the format of a Prosperity Game to address some of the issues surrounding Industrial Ecology. Honorary game sponsors were: The National Science Foundation; the Committee on Environmental Improvement, American Chemical Society; the Industrial and Engineering Chemistry Division, American Chemical Society; the US EPA--The Smart Growth Network, Office of Policy Development; and the US DOE-Center of Excellence for Sustainable Development.« less
NASA Technical Reports Server (NTRS)
Florance, Jennifer P.; Burner, Alpheus W.; Fleming, Gary A.; Martin, Christopher A.
2003-01-01
An overview of the contributions of the NASA Langley Research Center (LaRC) to the DARPA/AFRL/NASA/ Northrop Grumman Corporation (NGC) Smart Wing program is presented. The overall objective of the Smart Wing program was to develop smart** technologies and demonstrate near-flight-scale actuation systems to improve the aerodynamic performance of military aircraft. NASA LaRC s roles were to provide technical guidance, wind-tunnel testing time and support, and Computational Fluid Dynamics (CFD) analyses. The program was divided into two phases, with each phase having two wind-tunnel entries in the Langley Transonic Dynamics Tunnel (TDT). This paper focuses on the fourth and final wind-tunnel test: Phase 2, Test 2. During this test, a model based on the NGC Unmanned Combat Air Vehicle (UCAV) concept was tested at Mach numbers up to 0.8 and dynamic pressures up to 150 psf to determine the aerodynamic performance benefits that could be achieved using hingeless, smoothly-contoured control surfaces actuated with smart materials technologies. The UCAV-based model was a 30% geometric scale, full-span, sting-mounted model with the smart control surfaces on the starboard wing and conventional, hinged control surfaces on the port wing. Two LaRC-developed instrumentation systems were used during the test to externally measure the shapes of the smart control surface and quantify the effects of aerodynamic loading on the deflections: Videogrammetric Model Deformation (VMD) and Projection Moire Interferometry (PMI). VMD is an optical technique that uses single-camera photogrammetric tracking of discrete targets to determine deflections at specific points. PMI provides spatially continuous measurements of model deformation by computationally analyzing images of a grid projected onto the model surface. Both the VMD and PMI measurements served well to validate the use of on-board (internal) rotary potentiometers to measure the smart control surface deflection angles. Prior to the final entry, NASA LaRC also performed three-dimensional unstructured Navier Stokes CFD analyses in an attempt to predict the potential aerodynamic impact of the smart control surface on overall model forces and moments. Eight different control surface shapes were selected for study at Mach = 0.6, Reynolds number = 3.25 x 10(exp 6), and + 2 deg., 3 deg., 8 deg., and 10 deg.model angles-of-attack. For the baseline, undeflected control surface geometry, the CFD predictions and wind-tunnel results matched well. The agreement was not as good for the more complex aero-loaded control surface shapes, though, because of the inability to accurately predict those shapes. Despite these results, the NASA CFD study served as an important step in studying advanced control effectors.
Damage Detection and Verification System (DDVS) for In-Situ Health Monitoring
NASA Technical Reports Server (NTRS)
Williams, Martha K.; Lewis, Mark; Szafran, J.; Shelton, C.; Ludwig, L.; Gibson, T.; Lane, J.; Trautwein, T.
2015-01-01
Project presentation for Game Changing Program Smart Book Release. Detection and Verification System (DDVS) expands the Flat Surface Damage Detection System (FSDDS) sensory panels damage detection capabilities and includes an autonomous inspection capability utilizing cameras and dynamic computer vision algorithms to verify system health. Objectives of this formulation task are to establish the concept of operations, formulate the system requirements for a potential ISS flight experiment, and develop a preliminary design of an autonomous inspection capability system that will be demonstrated as a proof-of-concept ground based damage detection and inspection system.
A game theory approach to target tracking in sensor networks.
Gu, Dongbing
2011-02-01
In this paper, we investigate a moving-target tracking problem with sensor networks. Each sensor node has a sensor to observe the target and a processor to estimate the target position. It also has wireless communication capability but with limited range and can only communicate with neighbors. The moving target is assumed to be an intelligent agent, which is "smart" enough to escape from the detection by maximizing the estimation error. This adversary behavior makes the target tracking problem more difficult. We formulate this target estimation problem as a zero-sum game in this paper and use a minimax filter to estimate the target position. The minimax filter is a robust filter that minimizes the estimation error by considering the worst case noise. Furthermore, we develop a distributed version of the minimax filter for multiple sensor nodes. The distributed computation is implemented via modeling the information received from neighbors as measurements in the minimax filter. The simulation results show that the target tracking algorithm proposed in this paper provides a satisfactory result.
Air Land Sea Bulletin, Issue No. 2013-2, Joint Close Air Support
2013-05-01
game plan between his aircraft or element and the coor- dinated attack aircraft or element (s) for a specific JTAC/FAC(A) designated target. However...5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME...Service Department of Defense field agency sponsored by the US Army Train - ing and Doctrine Command (TRADOC), Marine Corps Combat Development Command
2004-04-17
Israel’s Blood group and the 1995 use of sarin on the Tokyo subway by the Japanese Aum Shinrikyo cult. However, in the former case, the number of...Center Ft. Irwin, CA Civilian information: (760) 380-3369 http://www.irwin.army.mil/default.htm U.S. Army Red Franchise Organization TRADOC...examination of the 1995 Aum Shinrikyo sarin attack in the Tokyo subway system. From there, Ataxia inventories the various federal response assets and
SARS and population health technology.
Eysenbach, Gunther
2003-01-01
The recent global outbreak of SARS (severe acute respiratory syndrome) provides an opportunity to study the use and impact of public health informatics and population health technology to detect and fight a global epidemic. Population health technology is the umbrella term for technology applications that have a population focus and the potential to improve public health. This includes the Internet, but also other technologies such as wireless devices, mobile phones, smart appliances, or smart homes. In the context of an outbreak or bioterrorism attack, such technologies may help to gather intelligence and detect diseases early, and communicate and exchange information electronically worldwide. Some of the technologies brought forward during the SARS epidemic may have been primarily motivated by marketing efforts, or were more directed towards reassuring people that "something is being done," ie, fighting an "epidemic of fear." To understand "fear epidemiology" is important because early warning systems monitoring data from a large number of people may not be able to discriminate between a biological epidemic and an epidemic of fear. The need for critical evaluation of all of these technologies is stressed.
Multicast Delayed Authentication For Streaming Synchrophasor Data in the Smart Grid
Câmara, Sérgio; Anand, Dhananjay; Pillitteri, Victoria; Carmo, Luiz
2017-01-01
Multicast authentication of synchrophasor data is challenging due to the design requirements of Smart Grid monitoring systems such as low security overhead, tolerance of lossy networks, time-criticality and high data rates. In this work, we propose inf -TESLA, Infinite Timed Efficient Stream Loss-tolerant Authentication, a multicast delayed authentication protocol for communication links used to stream synchrophasor data for wide area control of electric power networks. Our approach is based on the authentication protocol TESLA but is augmented to accommodate high frequency transmissions of unbounded length. inf TESLA protocol utilizes the Dual Offset Key Chains mechanism to reduce authentication delay and computational cost associated with key chain commitment. We provide a description of the mechanism using two different modes for disclosing keys and demonstrate its security against a man-in-the-middle attack attempt. We compare our approach against the TESLA protocol in a 2-day simulation scenario, showing a reduction of 15.82% and 47.29% in computational cost, sender and receiver respectively, and a cumulative reduction in the communication overhead. PMID:28736582
Multicast Delayed Authentication For Streaming Synchrophasor Data in the Smart Grid.
Câmara, Sérgio; Anand, Dhananjay; Pillitteri, Victoria; Carmo, Luiz
2016-01-01
Multicast authentication of synchrophasor data is challenging due to the design requirements of Smart Grid monitoring systems such as low security overhead, tolerance of lossy networks, time-criticality and high data rates. In this work, we propose inf -TESLA, Infinite Timed Efficient Stream Loss-tolerant Authentication, a multicast delayed authentication protocol for communication links used to stream synchrophasor data for wide area control of electric power networks. Our approach is based on the authentication protocol TESLA but is augmented to accommodate high frequency transmissions of unbounded length. inf TESLA protocol utilizes the Dual Offset Key Chains mechanism to reduce authentication delay and computational cost associated with key chain commitment. We provide a description of the mechanism using two different modes for disclosing keys and demonstrate its security against a man-in-the-middle attack attempt. We compare our approach against the TESLA protocol in a 2-day simulation scenario, showing a reduction of 15.82% and 47.29% in computational cost, sender and receiver respectively, and a cumulative reduction in the communication overhead.
A context-specific latent inhibition effect in a human conditioned suppression task.
Byron Nelson, James; del Carmen Sanjuan, Maria
2006-06-01
Three studies used a computer video game preparation to demonstrate latent inhibition in adult humans. In all studies participants fired torpedoes at a target spaceship by clicking the mouse. Conditioned stimuli (CSs) were presented in the form of coloured "sensors" at the bottom of the screen. Conditioning was conducted by pairing a sensor with an attack from the target spaceship. Participants learned to suppress their rate of mouse clicking in preparation for an attack. In Experiment 1 a total of 10 preexposures to the sensor CS, prior to conditioning, retarded acquisition of suppression. In Experiment 2 the effect of preexposure was shown to be context specific. Experiment 3 showed little generalization of the preexposure effect from one sensor CS to another. Experiment 3 also showed that preexposure did not make the sensor CS inhibitory. Comparisons with conditioned suppression procedures with animals and negative-priming procedures are briefly discussed.
Moreno, M Perla; Moreno, Alberto; García-González, Luis; Ureña, Aurelio; Hernández, César; Del Villar, Fernando
2016-06-01
This study applied an intervention program, based on video feedback and questioning, to expert female volleyball players to improve their tactical knowledge. The sample consisted of eight female attackers (26 ± 2.6 years old) from the Spanish National Volleyball Team, who were divided into an experimental group (n = 4) and a control group (n = 4). The video feedback and questioning program applied in the study was developed over eight reflective sessions and consisted of three phases: viewing of the selected actions, self-analysis and reflection by the attacker, and joint player-coach analysis. The attackers were videotaped in an actual game and four clips (situations) of each of the attackers were chosen for each reflective session. Two of the clips showed a correct action by the attacker, and two showed an incorrect decision. Tactical knowledge was measured by problem representation with a verbal protocol. The members of the experimental group showed adaptations in long-term memory, significantly improving their tactical knowledge. With respect to conceptual content, there was an increase in the total number of conditions verbalized by the players; with respect to conceptual sophistication, there was an increase in the indication of appropriate conditions with two or more details; and finally, with respect to conceptual structure, there was an increase in the use of double or triple conceptual structures. The intervention program, based on video feedback and questioning, in addition to on-court training sessions of expert volleyball players, appears to improve the athletes' tactical knowledge. © The Author(s) 2016.
van Staaden, Moira J; Searcy, William A; Hanlon, Roger T
2011-01-01
From psychological and sociological standpoints, aggression is regarded as intentional behavior aimed at inflicting pain and manifested by hostility and attacking behaviors. In contrast, biologists define aggression as behavior associated with attack or escalation toward attack, omitting any stipulation about intentions and goals. Certain animal signals are strongly associated with escalation toward attack and have the same function as physical attack in intimidating opponents and winning contests, and ethologists therefore consider them an integral part of aggressive behavior. Aggressive signals have been molded by evolution to make them ever more effective in mediating interactions between the contestants. Early theoretical analyses of aggressive signaling suggested that signals could never be honest about fighting ability or aggressive intentions because weak individuals would exaggerate such signals whenever they were effective in influencing the behavior of opponents. More recent game theory models, however, demonstrate that given the right costs and constraints, aggressive signals are both reliable about strength and intentions and effective in influencing contest outcomes. Here, we review the role of signaling in lieu of physical violence, considering threat displays from an ethological perspective as an adaptive outcome of evolutionary selection pressures. Fighting prowess is conveyed by performance signals whose production is constrained by physical ability and thus limited to just some individuals, whereas aggressive intent is encoded in strategic signals that all signalers are able to produce. We illustrate recent advances in the study of aggressive signaling with case studies of charismatic taxa that employ a range of sensory modalities, viz. visual and chemical signaling in cephalopod behavior, and indicators of aggressive intent in the territorial calls of songbirds. Copyright © 2011 Elsevier Inc. All rights reserved.
A game-theoretic approach for calibration of low-cost magnetometers under noise uncertainty
NASA Astrophysics Data System (ADS)
Siddharth, S.; Ali, A. S.; El-Sheimy, N.; Goodall, C. L.; Syed, Z. F.
2012-02-01
Pedestrian heading estimation is a fundamental challenge in Global Navigation Satellite System (GNSS)-denied environments. Additionally, the heading observability considerably degrades in low-speed mode of operation (e.g. walking), making this problem even more challenging. The goal of this work is to improve the heading solution when hand-held personal/portable devices, such as cell phones, are used for positioning and to improve the heading estimation in GNSS-denied signal environments. Most smart phones are now equipped with self-contained, low cost, small size and power-efficient sensors, such as magnetometers, gyroscopes and accelerometers. A magnetometer needs calibration before it can be properly employed for navigation purposes. Magnetometers play an important role in absolute heading estimation and are embedded in many smart phones. Before the users navigate with the phone, a calibration is invoked to ensure an improved signal quality. This signal is used later in the heading estimation. In most of the magnetometer-calibration approaches, the motion modes are seldom described to achieve a robust calibration. Also, suitable calibration approaches fail to discuss the stopping criteria for calibration. In this paper, the following three topics are discussed in detail that are important to achieve proper magnetometer-calibration results and in turn the most robust heading solution for the user while taking care of the device misalignment with respect to the user: (a) game-theoretic concepts to attain better filter parameter tuning and robustness in noise uncertainty, (b) best maneuvers with focus on 3D and 2D motion modes and related challenges and (c) investigation of the calibration termination criteria leveraging the calibration robustness and efficiency.
Wang, Xuwen; Nie, Sen; Wang, Binghong
2015-01-01
Networks with dependency links are more vulnerable when facing the attacks. Recent research also has demonstrated that the interdependent groups support the spreading of cooperation. We study the prisoner's dilemma games on spatial networks with dependency links, in which a fraction of individual pairs is selected to depend on each other. The dependency individuals can gain an extra payoff whose value is between the payoff of mutual cooperation and the value of temptation to defect. Thus, this mechanism reflects that the dependency relation is stronger than the relation of ordinary mutual cooperation, but it is not large enough to cause the defection of the dependency pair. We show that the dependence of individuals hinders, promotes and never affects the cooperation on regular ring networks, square lattice, random and scale-free networks, respectively. The results for the square lattice and regular ring networks are demonstrated by the pair approximation.
Learning Ultrasound-Guided Needle Insertion Skills through an Edutainment Game
NASA Astrophysics Data System (ADS)
Chan, Wing-Yin; Ni, Dong; Pang, Wai-Man; Qin, Jing; Chui, Yim-Pan; Yu, Simon Chun-Ho; Heng, Pheng-Ann
Ultrasound-guided needle insertion is essential in many of minimally invasive surgeries or procedures, such as biopsy, drug delivery, spinal anaesthesia, etc. Accurate and safe needle insertion is a difficult task due to the high requirement of hand-eye coordination skills. Many proposed virtual reality (VR) based training systems put their emphasis on realistic simulation instead of pedagogical efficiency. The lack of schematic training scenario leads to boredom of repetitive operations. To solve this, we present our novel training system with the integration of game elements in order to retain the trainees' enthusiasm. Task-oriented scenarios, time attack scenarios and performance evaluation are introduced. Besides, some state-of-art technologies are also presented, including ultrasound simulation, needle haptic rendering as well as a mass-spring-based needle-tissue interaction simulation. These works are shown to be effective to keep the trainees up with learning.
"Which pass is better?" Novel approaches to assess passing effectiveness in elite soccer.
Rein, Robert; Raabe, Dominik; Memmert, Daniel
2017-10-01
Passing behaviour is a key property of successful performance in team sports. Previous investigations however have mainly focused on notational measurements like total passing frequencies which provide little information about what actually constitutes successful passing behaviour. Consequently, this has hampered the transfer of research findings into applied settings. Here we present two novel approaches to assess passing effectiveness in elite soccer by evaluating their effects on majority situations and space control in front of the goal. Majority situations are assessed by calculating the number of defenders between the ball carrier and the goal. Control of space is estimated using Voronoi-diagrams based on the player's positions on the pitch. Both methods were applied to position data from 103 German First division games from the 2011/2012, 2012/2013 and 2014/2015 seasons using a big data approach. The results show that both measures are significantly related to successful game play with respect to the number of goals scored and to the probability of winning a game. The results further show that on average passes from the mid-field into the attacking area are most effective. The presented passing efficiency measures thereby offer new opportunities for future applications in soccer and other sports disciplines whilst maintaining practical relevance with respect to tactical training regimes or game performances analysis. Copyright © 2017 Elsevier B.V. All rights reserved.
Dühring, Sybille; Ewald, Jan; Germerodt, Sebastian; Kaleta, Christoph; Dandekar, Thomas; Schuster, Stefan
2017-07-01
The release of fungal cells following macrophage phagocytosis, called non-lytic expulsion, is reported for several fungal pathogens. On one hand, non-lytic expulsion may benefit the fungus in escaping the microbicidal environment of the phagosome. On the other hand, the macrophage could profit in terms of avoiding its own lysis and being able to undergo proliferation. To analyse the causes of non-lytic expulsion and the relevance of macrophage proliferation in the macrophage- Candida albicans interaction, we employ Evolutionary Game Theory and dynamic optimization in a sequential manner. We establish a game-theoretical model describing the different strategies of the two players after phagocytosis. Depending on the parameter values, we find four different Nash equilibria and determine the influence of the systems state of the host upon the game. As our Nash equilibria are a direct consequence of the model parameterization, we can depict several biological scenarios. A parameter region, where the host response is robust against the fungal infection, is determined. We further apply dynamic optimization to analyse whether macrophage mitosis is relevant in the host-pathogen interaction of macrophages and C. albicans For this, we study the population dynamics of the macrophage- C. albicans interactions and the corresponding optimal controls for the macrophages, indicating the best macrophage strategy of switching from proliferation to attacking fungal cells. © 2017 The Author(s).
Benis, Arriel; Notea, Amos; Barkan, Refael
2018-01-01
"Disaster" means some surprising and misfortunate event. Its definition is broad and relates to complex environments. Medical Informatics approaches, methodologies and systems are used as a part of Disaster and Emergency Management systems. At the Holon Institute of Technology - HIT, Israel, in 2016 a National R&D Center: AFRAN was established to study the disaster's reduction aspects. The Center's designation is to investigate and produce new approaches, methodologies and to offer recommendations in the fields of disaster mitigation, preparedness, response and recovery and to disseminate disaster's knowledge. Adjoint to the Center a "Smart, Intelligent, and Adaptive Systems" laboratory (SIAS) was established with the goal to study the applications of Information and Communication Technologies (ICT) and Artificial Intelligence (AI) to Risk and Disaster Management (RDM). In this paper, we are redefining the concept of Disaster, pointing-out how ICT, AI, in the Big Data era, are central players in the RDM game. In addition we show the merit of the Center and lab combination to the benefit of the performed research projects.
Jing, Yiming; Gries, Peter H; Li, Yang; Stivers, Adam W; Mifune, Nobuhiro; Kuhlman, D M; Bai, Liying
2017-01-01
Why do great powers with benign intentions end up fighting each other in wars they do not seek? We utilize an incentivized, two-person "Preemptive Strike Game" (PSG) to explore how the subjective perception of great power interdependence shapes defensive aggression against persons from rival great powers. In Study 1, college students from the United States ( N = 115), China ( N = 106), and Japan ( N = 99) made PSG decisions facing each other. This natural experiment revealed that Chinese and Japanese participants (a) made more preemptive attacks against each other and Americans than against their compatriots, and that (b) greater preexisting perceptions of bilateral competition increased intergroup attack rates. In Study 2, adult Americans ( N = 127) watched real CNN expert interviews portraying United States-China economic interdependence as more positive or negative. This randomized experiment revealed that the more positive portrayal reduced preemptive American strikes against Chinese (but not Japanese), while the more negative portrayal amplified American anger about China's rise, increasing preemptive attacks against Chinese. We also found, however, that preemptive strikes were primarily defensive and not offensive. Interventions to reduce defensive aggression and promote great power peace are discussed.
Kotler, Burt P.; Brown, Joel; Mukherjee, Shomen; Berger-Tal, Oded; Bouskila, Amos
2010-01-01
Foraging animals have several tools for managing the risk of predation, and the foraging games between them and their predators. Among these, time allocation is foremost, followed by vigilance and apprehension. Together, their use influences a forager's time allocation and giving-up density (GUD) in depletable resource patches. We examined Allenby's gerbils (Gerbilus andersoni allenbyi) exploiting seed resource patches in a large vivarium under varying moon phases in the presence of a red fox (Vulpes vulpes). We measured time allocated to foraging patches electronically and GUDs from seeds left behind in resource patches. From these, we estimated handling times, attack rates and quitting harvest rates (QHRs). Gerbils displayed greater vigilance (lower attack rates) at brighter moon phases (full < wane < wax < new). Similarly, they displayed higher GUDs at brighter moon phases (wax > full > new > wane). Finally, gerbils displayed higher QHRs at new and waxing moon phases. Differences across moon phases not only reflect changing time allocation and vigilance, but changes in the state of the foragers and their marginal value of energy. Early in the lunar cycle, gerbils rely on vigilance and sacrifice state to avoid risk; later they defend state at the cost of increased time allocation; finally their state can recover as safe opportunities expand. In the predator–prey foraging game, foxes may contribute to these patterns of behaviours by modulating their own activity in response to the opportunities presented in each moon phase. PMID:20053649
Kotler, Burt P; Brown, Joel; Mukherjee, Shomen; Berger-Tal, Oded; Bouskila, Amos
2010-05-22
Foraging animals have several tools for managing the risk of predation, and the foraging games between them and their predators. Among these, time allocation is foremost, followed by vigilance and apprehension. Together, their use influences a forager's time allocation and giving-up density (GUD) in depletable resource patches. We examined Allenby's gerbils (Gerbilus andersoni allenbyi) exploiting seed resource patches in a large vivarium under varying moon phases in the presence of a red fox (Vulpes vulpes). We measured time allocated to foraging patches electronically and GUDs from seeds left behind in resource patches. From these, we estimated handling times, attack rates and quitting harvest rates (QHRs). Gerbils displayed greater vigilance (lower attack rates) at brighter moon phases (full < wane < wax < new). Similarly, they displayed higher GUDs at brighter moon phases (wax > full > new > wane). Finally, gerbils displayed higher QHRs at new and waxing moon phases. Differences across moon phases not only reflect changing time allocation and vigilance, but changes in the state of the foragers and their marginal value of energy. Early in the lunar cycle, gerbils rely on vigilance and sacrifice state to avoid risk; later they defend state at the cost of increased time allocation; finally their state can recover as safe opportunities expand. In the predator-prey foraging game, foxes may contribute to these patterns of behaviours by modulating their own activity in response to the opportunities presented in each moon phase.
RoadPlex: A Mobile VGI Game to Collect and Validate Data for POIs
NASA Astrophysics Data System (ADS)
Kashian, A.; Rajabifard, A.; Richter, K. F.
2014-11-01
By increasing the popularity of smart phones equipped with GPS sensors, more volunteers are expected to join VGI (Volunteered Geographic Information) activities and therefore more positional data will be collected in shorter time. Current statistics from open databases such OpenStreetMap reveals that although there have been exponential growth in the number of contributed POIs (Points of Interest), the lack of detailed attribute information is immediately visible. The process of adding attribute information to VGI databases is usually considered as a boring task and it is believed that contributors do not experience a similar level of satisfaction when they add such detailed information compared to tasks like adding new roads or copying building boundaries from satellite imageries. In other crowdsourcing projects, different approaches are taken for engaging contributors in problem solving by embedding the tasks inside a game. In the literature, this concept is known as "gamification" or "games with purpose" which encapsulate the idea of entertaining contributors while they are completing a particular defined task. Same concept is used to design a mobile application called "RoadPlex" which aims to collect general or specific attribute information for POIs The increased number of contributions in the past few months confirms that the design characteristics and the methodology of the game are appealing to players. Such growth enables us to evaluate the quality of the generated data through mining the database of answered questions. This paper reflects the some contribution results and emphasises the importance of using gamification concept in the domain of VGI.
Cha, Shi-Cho; Chen, Jyun-Fu
2017-01-01
Bluetooth Low Energy (BLE) has emerged as one of the most promising technologies to enable the Internet-of-Things (IoT) paradigm. In BLE-based IoT applications, e.g., wearables-oriented service applications, the Bluetooth MAC addresses of devices will be swapped for device pairings. The random address technique is adopted to prevent malicious users from tracking the victim’s devices with stationary Bluetooth MAC addresses and accordingly the device privacy can be preserved. However, there exists a tradeoff between privacy and security in the random address technique. That is, when device pairing is launched and one device cannot actually identify another one with addresses, it provides an opportunity for malicious users to break the system security via impersonation attacks. Hence, using random addresses may lead to higher security risks. In this study, we point out the potential risk of using random address technique and then present critical security requirements for BLE-based IoT applications. To fulfill the claimed requirements, we present a privacy-aware mechanism, which is based on elliptic curve cryptography, for secure communication and access-control among BLE-based IoT objects. Moreover, to ensure the security of smartphone application associated with BLE-based IoT objects, we construct a Smart Contract-based Investigation Report Management framework (SCIRM) which enables smartphone application users to obtain security inspection reports of BLE-based applications of interest with smart contracts. PMID:29036900
Cha, Shi-Cho; Yeh, Kuo-Hui; Chen, Jyun-Fu
2017-10-14
Bluetooth Low Energy (BLE) has emerged as one of the most promising technologies to enable the Internet-of-Things (IoT) paradigm. In BLE-based IoT applications, e.g., wearables-oriented service applications, the Bluetooth MAC addresses of devices will be swapped for device pairings. The random address technique is adopted to prevent malicious users from tracking the victim's devices with stationary Bluetooth MAC addresses and accordingly the device privacy can be preserved. However, there exists a tradeoff between privacy and security in the random address technique. That is, when device pairing is launched and one device cannot actually identify another one with addresses, it provides an opportunity for malicious users to break the system security via impersonation attacks. Hence, using random addresses may lead to higher security risks. In this study, we point out the potential risk of using random address technique and then present critical security requirements for BLE-based IoT applications. To fulfill the claimed requirements, we present a privacy-aware mechanism, which is based on elliptic curve cryptography, for secure communication and access-control among BLE-based IoT objects. Moreover, to ensure the security of smartphone application associated with BLE-based IoT objects, we construct a Smart Contract-based Investigation Report Management framework (SCIRM) which enables smartphone application users to obtain security inspection reports of BLE-based applications of interest with smart contracts.
An Identity-Based Anti-Quantum Privacy-Preserving Blind Authentication in Wireless Sensor Networks.
Zhu, Hongfei; Tan, Yu-An; Zhu, Liehuang; Wang, Xianmin; Zhang, Quanxin; Li, Yuanzhang
2018-05-22
With the development of wireless sensor networks, IoT devices are crucial for the Smart City; these devices change people's lives such as e-payment and e-voting systems. However, in these two systems, the state-of-art authentication protocols based on traditional number theory cannot defeat a quantum computer attack. In order to protect user privacy and guarantee trustworthy of big data, we propose a new identity-based blind signature scheme based on number theorem research unit lattice, this scheme mainly uses a rejection sampling theorem instead of constructing a trapdoor. Meanwhile, this scheme does not depend on complex public key infrastructure and can resist quantum computer attack. Then we design an e-payment protocol using the proposed scheme. Furthermore, we prove our scheme is secure in the random oracle, and satisfies confidentiality, integrity, and non-repudiation. Finally, we demonstrate that the proposed scheme outperforms the other traditional existing identity-based blind signature schemes in signing speed and verification speed, outperforms the other lattice-based blind signature in signing speed, verification speed, and signing secret key size.
DOE Office of Scientific and Technical Information (OSTI.GOV)
El Hariri, Mohamad; Faddel, Samy; Mohammed, Osama
Decentralized and hierarchical microgrid control strategies have lain the groundwork for shaping the future smart grid. Such control approaches require the cooperation between microgrid operators in control centers, intelligent microcontrollers, and remote terminal units via secure and reliable communication networks. In order to enhance the security and complement the work of network intrusion detection systems, this paper presents an artificially intelligent physical model-checking that detects tampered-with circuit breaker switching control commands whether, due to a cyber-attack or human error. In this technique, distributed agents, which are monitoring sectionalized areas of a given microgrid, will be trained and continuously adapted tomore » verify that incoming control commands do not violate the physical system operational standards and do not put the microgrid in an insecure state. The potential of this approach has been tested by deploying agents that monitor circuit breakers status commands on a 14-bus IEEE benchmark system. The results showed the accuracy of the proposed framework in characterizing the power system and successfully detecting malicious and/or erroneous control commands.« less
An Identity-Based Anti-Quantum Privacy-Preserving Blind Authentication in Wireless Sensor Networks
Zhu, Hongfei; Tan, Yu-an; Zhu, Liehuang; Wang, Xianmin; Zhang, Quanxin; Li, Yuanzhang
2018-01-01
With the development of wireless sensor networks, IoT devices are crucial for the Smart City; these devices change people’s lives such as e-payment and e-voting systems. However, in these two systems, the state-of-art authentication protocols based on traditional number theory cannot defeat a quantum computer attack. In order to protect user privacy and guarantee trustworthy of big data, we propose a new identity-based blind signature scheme based on number theorem research unit lattice, this scheme mainly uses a rejection sampling theorem instead of constructing a trapdoor. Meanwhile, this scheme does not depend on complex public key infrastructure and can resist quantum computer attack. Then we design an e-payment protocol using the proposed scheme. Furthermore, we prove our scheme is secure in the random oracle, and satisfies confidentiality, integrity, and non-repudiation. Finally, we demonstrate that the proposed scheme outperforms the other traditional existing identity-based blind signature schemes in signing speed and verification speed, outperforms the other lattice-based blind signature in signing speed, verification speed, and signing secret key size. PMID:29789475
Islam, S K Hafizul; Khan, Muhammad Khurram; Li, Xiong
2015-01-01
Over the past few years, secure and privacy-preserving user authentication scheme has become an integral part of the applications of the healthcare systems. Recently, Wen has designed an improved user authentication system over the Lee et al.'s scheme for integrated electronic patient record (EPR) information system, which has been analyzed in this study. We have found that Wen's scheme still has the following inefficiencies: (1) the correctness of identity and password are not verified during the login and password change phases; (2) it is vulnerable to impersonation attack and privileged-insider attack; (3) it is designed without the revocation of lost/stolen smart card; (4) the explicit key confirmation and the no key control properties are absent, and (5) user cannot update his/her password without the help of server and secure channel. Then we aimed to propose an enhanced two-factor user authentication system based on the intractable assumption of the quadratic residue problem (QRP) in the multiplicative group. Our scheme bears more securities and functionalities than other schemes found in the literature.
Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Yang, Yixian
2016-06-08
WSNs (Wireless sensor networks) are nowadays viewed as a vital portion of the IoTs (Internet of Things). Security is a significant issue in WSNs, especially in resource-constrained environments. AKA (Authentication and key agreement) enhances the security of WSNs against adversaries attempting to get sensitive sensor data. Various AKA schemes have been developed for verifying the legitimate users of a WSN. Firstly, we scrutinize Amin-Biswas's currently scheme and demonstrate the major security loopholes in their works. Next, we propose a lightweight AKA scheme, using symmetric key cryptography based on smart card, which is resilient against all well known security attacks. Furthermore, we prove the scheme accomplishes mutual handshake and session key agreement property securely between the participates involved under BAN (Burrows, Abadi and Needham) logic. Moreover, formal security analysis and simulations are also conducted using AVISPA(Automated Validation of Internet Security Protocols and Applications) to show that our scheme is secure against active and passive attacks. Additionally, performance analysis shows that our proposed scheme is secure and efficient to apply for resource-constrained WSNs.
Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Yang, Yixian
2016-01-01
WSNs (Wireless sensor networks) are nowadays viewed as a vital portion of the IoTs (Internet of Things). Security is a significant issue in WSNs, especially in resource-constrained environments. AKA (Authentication and key agreement) enhances the security of WSNs against adversaries attempting to get sensitive sensor data. Various AKA schemes have been developed for verifying the legitimate users of a WSN. Firstly, we scrutinize Amin-Biswas’s currently scheme and demonstrate the major security loopholes in their works. Next, we propose a lightweight AKA scheme, using symmetric key cryptography based on smart card, which is resilient against all well known security attacks. Furthermore, we prove the scheme accomplishes mutual handshake and session key agreement property securely between the participates involved under BAN (Burrows, Abadi and Needham) logic. Moreover, formal security analysis and simulations are also conducted using AVISPA(Automated Validation of Internet Security Protocols and Applications) to show that our scheme is secure against active and passive attacks. Additionally, performance analysis shows that our proposed scheme is secure and efficient to apply for resource-constrained WSNs. PMID:27338382
Moon, Jongho; Choi, Younsung; Jung, Jaewook; Won, Dongho
2015-01-01
In multi-server environments, user authentication is a very important issue because it provides the authorization that enables users to access their data and services; furthermore, remote user authentication schemes for multi-server environments have solved the problem that has arisen from user’s management of different identities and passwords. For this reason, numerous user authentication schemes that are designed for multi-server environments have been proposed over recent years. In 2015, Lu et al. improved upon Mishra et al.’s scheme, claiming that their remote user authentication scheme is more secure and practical; however, we found that Lu et al.’s scheme is still insecure and incorrect. In this paper, we demonstrate that Lu et al.’s scheme is vulnerable to outsider attack and user impersonation attack, and we propose a new biometrics-based scheme for authentication and key agreement that can be used in multi-server environments; then, we show that our proposed scheme is more secure and supports the required security properties. PMID:26709702
A Network Access Control Framework for 6LoWPAN Networks
Oliveira, Luís M. L.; Rodrigues, Joel J. P. C.; de Sousa, Amaro F.; Lloret, Jaime
2013-01-01
Low power over wireless personal area networks (LoWPAN), in particular wireless sensor networks, represent an emerging technology with high potential to be employed in critical situations like security surveillance, battlefields, smart-grids, and in e-health applications. The support of security services in LoWPAN is considered a challenge. First, this type of networks is usually deployed in unattended environments, making them vulnerable to security attacks. Second, the constraints inherent to LoWPAN, such as scarce resources and limited battery capacity, impose a careful planning on how and where the security services should be deployed. Besides protecting the network from some well-known threats, it is important that security mechanisms be able to withstand attacks that have not been identified before. One way of reaching this goal is to control, at the network access level, which nodes can be attached to the network and to enforce their security compliance. This paper presents a network access security framework that can be used to control the nodes that have access to the network, based on administrative approval, and to enforce security compliance to the authorized nodes. PMID:23334610
Islam, SK Hafizul; Khan, Muhammad Khurram; Li, Xiong
2015-01-01
Over the past few years, secure and privacy-preserving user authentication scheme has become an integral part of the applications of the healthcare systems. Recently, Wen has designed an improved user authentication system over the Lee et al.’s scheme for integrated electronic patient record (EPR) information system, which has been analyzed in this study. We have found that Wen’s scheme still has the following inefficiencies: (1) the correctness of identity and password are not verified during the login and password change phases; (2) it is vulnerable to impersonation attack and privileged-insider attack; (3) it is designed without the revocation of lost/stolen smart card; (4) the explicit key confirmation and the no key control properties are absent, and (5) user cannot update his/her password without the help of server and secure channel. Then we aimed to propose an enhanced two-factor user authentication system based on the intractable assumption of the quadratic residue problem (QRP) in the multiplicative group. Our scheme bears more securities and functionalities than other schemes found in the literature. PMID:26263401
RUASN: a robust user authentication framework for wireless sensor networks.
Kumar, Pardeep; Choudhury, Amlan Jyoti; Sain, Mangal; Lee, Sang-Gon; Lee, Hoon-Jae
2011-01-01
In recent years, wireless sensor networks (WSNs) have been considered as a potential solution for real-time monitoring applications and these WSNs have potential practical impact on next generation technology too. However, WSNs could become a threat if suitable security is not considered before the deployment and if there are any loopholes in their security, which might open the door for an attacker and hence, endanger the application. User authentication is one of the most important security services to protect WSN data access from unauthorized users; it should provide both mutual authentication and session key establishment services. This paper proposes a robust user authentication framework for wireless sensor networks, based on a two-factor (password and smart card) concept. This scheme facilitates many services to the users such as user anonymity, mutual authentication, secure session key establishment and it allows users to choose/update their password regularly, whenever needed. Furthermore, we have provided the formal verification using Rubin logic and compare RUASN with many existing schemes. As a result, we found that the proposed scheme possesses many advantages against popular attacks, and achieves better efficiency at low computation cost.
2006-05-01
harassment, it was not until the Allied ground forces over- ran the launch areas that the threat truly came to an end.21 By becoming mobile, the Germans had...SS-6 “ Sapwood .”28 Korolev’s RD-105/RD-106 propulsion concept for this missile involved a total of five engines—a simple design based on German...to-air missiles mobile because we had a big area to de- fend. Our stationary surface-to-air missile sites were primarily around Moscow and others
Cyber-intrusion Auto-response and Policy Management System (CAPMS)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lusk, Steve; Lawrence, David; Suvana, Prakash
The Cyber-intrusion Auto-response and Policy Management System (CAPMS) project was funded by a grant from the US Department of Energy (DOE) Cybersecurity for Energy Delivery Systems (CEDS) program with contributions from two partner electric utilities: Southern California Edison (SCE) and Duke Energy. The goal of the project was to demonstrate protecting smart grid assets from a cyber attack in a way that “does not impede critical energy delivery functions.” This report summarizes project goals and activities for the CAPMS project and explores what did and did not work as expected. It concludes with an assessment of possible benefits and valuemore » of the system for the future.« less
Information spread in networks: Games, optimal control, and stabilization
NASA Astrophysics Data System (ADS)
Khanafer, Ali
This thesis focuses on designing efficient mechanisms for controlling information spread in networks. We consider two models for information spread. The first one is the well-known distributed averaging dynamics. The second model is a nonlinear one that describes virus spread in computer and biological networks. We seek to design optimal, robust, and stabilizing controllers under practical constraints. For distributed averaging networks, we study the interaction between a network designer and an adversary. We consider two types of attacks on the network. In Attack-I, the adversary strategically disconnects a set of links to prevent the nodes from reaching consensus. Meanwhile, the network designer assists the nodes in reaching consensus by changing the weights of a limited number of links in the network. We formulate two problems to describe this competition where the order in which the players act is reversed in the two problems. Although the canonical equations provided by the Pontryagin's Maximum Principle (MP) seem to be intractable, we provide an alternative characterization for the optimal strategies that makes connection to potential theory. Further, we provide a sufficient condition for the existence of a saddle-point equilibrium (SPE) for the underlying zero-sum game. In Attack-II, the designer and the adversary are both capable of altering the measurements of all nodes in the network by injecting global signals. We impose two constraints on both players: a power constraint and an energy constraint. We assume that the available energy to each player is not sufficient to operate at maximum power throughout the horizon of the game. We show the existence of an SPE and derive the optimal strategies in closed form for this attack scenario. As an alternative to the "network designer vs. adversary" framework, we investigate the possibility of stabilizing unknown network diffusion processes using a distributed mechanism, where the uncertainty is due to an attack on the network. To this end, we propose a distributed version of the classical logic-based supervisory control scheme. Given a network of agents whose dynamics contain unknown parameters, the distributed supervisory control scheme is used to assist the agents to converge to a certain set-point without requiring them to have explicit knowledge of that set-point. Unlike the classical supervisory control scheme where a centralized supervisor makes switching decisions among the candidate controllers, in our scheme, each agent is equipped with a local supervisor that switches among the available controllers. The switching decisions made at a certain agent depend only on the information from its neighboring agents. We provide sufficient conditions for stabilization and apply our framework to the distributed averaging problem in the presence of large modeling uncertainty. For infected networks, we study the stability properties of a susceptible-infected-susceptible (SIS) diffusion model, so-called the n-intertwined Markov model, over arbitrary network topologies. Similar to the majority of infection spread dynamics, this model exhibits a threshold phenomenon. When the curing rates in the network are high, the all-healthy state is the unique equilibrium over the network. Otherwise, an endemic equilibrium state emerges, where some infection remains within the network. Using notions from positive systems theory, we provide conditions for the global asymptotic stability of the equilibrium points in both cases over strongly and weakly connected directed networks based on the value of the basic reproduction number, a fundamental quantity in the study of epidemics. Furthermore, we demonstrate that the n-intertwined Markov model can be viewed as a best-response dynamical system of a concave game among the nodes. This characterization allows us to cast new infection spread dynamics; additionally, we provide a sufficient condition, for the global convergence to the all-healthy state, that can be checked in a distributed fashion. Moreover, we investigate the problem of stabilizing the network when the curing rates of a limited number of nodes can be controlled. In particular, we characterize the number of controllers required for a class of undirected graphs. We also design optimal controllers capable of minimizing the total infection in the network at minimum cost. Finally, we outline a set of open problems in the area of information spread control.
Defense strategies for cloud computing multi-site server infrastructures
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rao, Nageswara S.; Ma, Chris Y. T.; He, Fei
We consider cloud computing server infrastructures for big data applications, which consist of multiple server sites connected over a wide-area network. The sites house a number of servers, network elements and local-area connections, and the wide-area network plays a critical, asymmetric role of providing vital connectivity between them. We model this infrastructure as a system of systems, wherein the sites and wide-area network are represented by their cyber and physical components. These components can be disabled by cyber and physical attacks, and also can be protected against them using component reinforcements. The effects of attacks propagate within the systems, andmore » also beyond them via the wide-area network.We characterize these effects using correlations at two levels using: (a) aggregate failure correlation function that specifies the infrastructure failure probability given the failure of an individual site or network, and (b) first-order differential conditions on system survival probabilities that characterize the component-level correlations within individual systems. We formulate a game between an attacker and a provider using utility functions composed of survival probability and cost terms. At Nash Equilibrium, we derive expressions for the expected capacity of the infrastructure given by the number of operational servers connected to the network for sum-form, product-form and composite utility functions.« less
The importance of ecological studies in the control of tsetse flies*
Glover, P. E.
1967-01-01
The author reviews recent ecological research on tsetse flies in East Africa and Northern Nigeria, particularly in connexion with the flies' sensory reactions, and stresses the importance of an accurate knowledge of their daytime and night-time resting-sites and of identifying the sources of their blood meals in order to elucidate the reservoirs of trypanosomiasis. The epidemiology of the disease is considered in the light of studies of trypanosome infections in host and fly. The control of tsetse flies must be based on the practical application of ecological knowledge by methods involving either a direct attack upon the fly (such as trapping or the use of insecticides) or an indirect attack (such as bush clearing or game destruction to eliminate the fly's habitat or food supply); these methods are dealt with in some detail. The author concludes with a discussion of modern trends in research, and a number of lines of research are suggested. PMID:4874781
High tech cognitive and acoustic enrichment for captive elephants.
French, Fiona; Mancini, Clara; Sharp, Helen
2018-04-15
This paper investigates the potential for using technology to support the development of sensory and cognitive enrichment activities for captive elephants. It explores the usefulness of applying conceptual frameworks from interaction design and game design to the problem of developing species-specific smart toys that promote natural behaviours and provide stimulation. We adopted a Research through Design approach, and describe how scientific inquiry supported our design process, while the creation of artefacts guided our investigations into possible future solutions. Our fieldwork resulted in the development of an interactive prototype of an acoustic toy that elephants are able to control using interface elements constructed from a range of natural materials. Copyright © 2017 Elsevier B.V. All rights reserved.
An Examination of Application of Artificial Neural Network in Cognitive Radios
NASA Astrophysics Data System (ADS)
Bello Salau, H.; Onwuka, E. N.; Aibinu, A. M.
2013-12-01
Recent advancement in software radio technology has led to the development of smart device known as cognitive radio. This type of radio fuses powerful techniques taken from artificial intelligence, game theory, wideband/multiple antenna techniques, information theory and statistical signal processing to create an outstanding dynamic behavior. This cognitive radio is utilized in achieving diverse set of applications such as spectrum sensing, radio parameter adaptation and signal classification. This paper contributes by reviewing different cognitive radio implementation that uses artificial intelligence such as the hidden markov models, metaheuristic algorithm and artificial neural networks (ANNs). Furthermore, different areas of application of ANNs and their performance metrics based approach are also examined.
Amin, Ruhul; Islam, S K Hafizul; Biswas, G P; Khan, Muhammad Khurram; Kumar, Neeraj
2015-11-01
In the last few years, numerous remote user authentication and session key agreement schemes have been put forwarded for Telecare Medical Information System, where the patient and medical server exchange medical information using Internet. We have found that most of the schemes are not usable for practical applications due to known security weaknesses. It is also worth to note that unrestricted number of patients login to the single medical server across the globe. Therefore, the computation and maintenance overhead would be high and the server may fail to provide services. In this article, we have designed a medical system architecture and a standard mutual authentication scheme for single medical server, where the patient can securely exchange medical data with the doctor(s) via trusted central medical server over any insecure network. We then explored the security of the scheme with its resilience to attacks. Moreover, we formally validated the proposed scheme through the simulation using Automated Validation of Internet Security Schemes and Applications software whose outcomes confirm that the scheme is protected against active and passive attacks. The performance comparison demonstrated that the proposed scheme has lower communication cost than the existing schemes in literature. In addition, the computation cost of the proposed scheme is nearly equal to the exiting schemes. The proposed scheme not only efficient in terms of different security attacks, but it also provides an efficient login, mutual authentication, session key agreement and verification and password update phases along with password recovery.
Reasoning and Action: Implementation of a Decision-Making Program in Sport.
Gil-Arias, Alexander; Moreno, M Perla; García-Mas, Alex; Moreno, Alberto; García-González, Luíz; Del Villar, Fernando
2016-09-20
The objective of this study was to apply a decision training programme, based on the use of video-feedback and questioning, in real game time, in order to improve decision-making in volleyball attack actions. A three-phase quasi-experimental design was implemented: Phase A (pre-test), Phase B (Intervention) and Phase C (Retention). The sample was made up of 8 female Under-16 volleyball players, who were divided into two groups: experimental group (n = 4) and control group (n = 4). The independent variable was the decision training program, which was applied for 11 weeks in a training context, more specifically in a 6x6 game situation. The player had to analyze the reasons and causes of the decision taken. The dependent variable was decision-making, which was assessed based on systematic observation, using the "Game Performance Assessment Instrument" (GPAI) (Oslin, Mitchell, & Griffin, 1998). Results showed that, after applying the decision training program, the experimental group showed a significantly higher average percentage of successful decisions than the control group F(1, 6) = 11.26; p = .015; η2 p = .652; 95% CI [056, 360]. These results highlight the need to complement the training process with cognitive tools such as video-feedback and questioning in order to improve athletes' decision-making.
Prey should hide more randomly when a predator attacks more persistently.
Gal, Shmuel; Alpern, Steve; Casas, Jérôme
2015-12-06
When being searched for and then (if found) pursued by a predator, a prey animal has a choice between choosing very randomly among hiding locations so as to be hard to find or alternatively choosing a location from which it is more likely to successfully flee if found. That is, the prey can choose to be hard to find or hard to catch, if found. In our model, capture of prey requires both finding it and successfully pursuing it. We model this dilemma as a zero-sum repeated game between predator and prey, with the eventual capture probability as the pay-off to the predator. We find that the more random hiding strategy is better when the chances of repeated pursuit, which are known to be related to area topography, are high. Our results extend earlier results of Gal and Casas, where there was at most only a single pursuit. In that model, hiding randomly was preferred by the prey when the predator has only a few looks. Thus, our new multistage model shows that the effect of more potential looks is opposite. Our results can be viewed as a generalization of search games to the repeated game context and are in accordance with observed escape behaviour of different animals. © 2015 The Author(s).
Prey should hide more randomly when a predator attacks more persistently
Gal, Shmuel; Alpern, Steve; Casas, Jérôme
2015-01-01
When being searched for and then (if found) pursued by a predator, a prey animal has a choice between choosing very randomly among hiding locations so as to be hard to find or alternatively choosing a location from which it is more likely to successfully flee if found. That is, the prey can choose to be hard to find or hard to catch, if found. In our model, capture of prey requires both finding it and successfully pursuing it. We model this dilemma as a zero-sum repeated game between predator and prey, with the eventual capture probability as the pay-off to the predator. We find that the more random hiding strategy is better when the chances of repeated pursuit, which are known to be related to area topography, are high. Our results extend earlier results of Gal and Casas, where there was at most only a single pursuit. In that model, hiding randomly was preferred by the prey when the predator has only a few looks. Thus, our new multistage model shows that the effect of more potential looks is opposite. Our results can be viewed as a generalization of search games to the repeated game context and are in accordance with observed escape behaviour of different animals. PMID:26631332
Wang, Xuwen; Nie, Sen; Wang, Binghong
2015-01-01
Networks with dependency links are more vulnerable when facing the attacks. Recent research also has demonstrated that the interdependent groups support the spreading of cooperation. We study the prisoner’s dilemma games on spatial networks with dependency links, in which a fraction of individual pairs is selected to depend on each other. The dependency individuals can gain an extra payoff whose value is between the payoff of mutual cooperation and the value of temptation to defect. Thus, this mechanism reflects that the dependency relation is stronger than the relation of ordinary mutual cooperation, but it is not large enough to cause the defection of the dependency pair. We show that the dependence of individuals hinders, promotes and never affects the cooperation on regular ring networks, square lattice, random and scale-free networks, respectively. The results for the square lattice and regular ring networks are demonstrated by the pair approximation. PMID:25798579
Study on the intelligent decision making of soccer robot side-wall behavior
NASA Astrophysics Data System (ADS)
Zhang, Xiaochuan; Shao, Guifang; Tan, Zhi; Li, Zushu
2007-12-01
Side-wall is the static obstacle in soccer robot game, reasonably making use of the Side-wall can improve soccer robot competitive ability. As a kind of artificial life, the Side-wall processing strategy of soccer robot is influenced by many factors, such as game state, field region, attacking and defending situation and so on, each factor also has different influence degree, so, the Side-wall behavior selection is an intelligent selecting process. From the view point of human simulated, based on the idea of Side-wall processing priority[1], this paper builds the priority function for Side-wall processing, constructs the action predicative model for Side-wall obstacle, puts forward the Side-wall processing strategy, and forms the Side-wall behavior selection mechanism. Through the contrasting experiment between the strategy applied and none, proves that this strategy can improve the soccer robot capacity, it is feasible and effective, and has positive meaning for soccer robot stepped study.
Time Pattern Locking Scheme for Secure Multimedia Contents in Human-Centric Device
Kim, Hyun-Woo; Kim, Jun-Ho; Park, Jong Hyuk; Jeong, Young-Sik
2014-01-01
Among the various smart multimedia devices, multimedia smartphones have become the most widespread due to their convenient portability and real-time information sharing, as well as various other built-in features. Accordingly, since personal and business activities can be carried out using multimedia smartphones without restrictions based on time and location, people have more leisure time and convenience than ever. However, problems such as loss, theft, and information leakage because of convenient portability have also increased proportionally. As a result, most multimedia smartphones are equipped with various built-in locking features. Pattern lock, personal identification numbers, and passwords are the most used locking features on current smartphones, but these are vulnerable to shoulder surfing and smudge attacks, allowing malicious users to bypass the security feature easily. In particular, the smudge attack technique is a convenient way to unlock multimedia smartphones after they have been stolen. In this paper, we propose the secure locking screen using time pattern (SLSTP) focusing on improved security and convenience for users to support human-centric multimedia device completely. The SLSTP can provide a simple interface to users and reduce the risk factors pertaining to security leakage to malicious third parties. PMID:25202737
Time pattern locking scheme for secure multimedia contents in human-centric device.
Kim, Hyun-Woo; Kim, Jun-Ho; Park, Jong Hyuk; Jeong, Young-Sik
2014-01-01
Among the various smart multimedia devices, multimedia smartphones have become the most widespread due to their convenient portability and real-time information sharing, as well as various other built-in features. Accordingly, since personal and business activities can be carried out using multimedia smartphones without restrictions based on time and location, people have more leisure time and convenience than ever. However, problems such as loss, theft, and information leakage because of convenient portability have also increased proportionally. As a result, most multimedia smartphones are equipped with various built-in locking features. Pattern lock, personal identification numbers, and passwords are the most used locking features on current smartphones, but these are vulnerable to shoulder surfing and smudge attacks, allowing malicious users to bypass the security feature easily. In particular, the smudge attack technique is a convenient way to unlock multimedia smartphones after they have been stolen. In this paper, we propose the secure locking screen using time pattern (SLSTP) focusing on improved security and convenience for users to support human-centric multimedia device completely. The SLSTP can provide a simple interface to users and reduce the risk factors pertaining to security leakage to malicious third parties.
RUASN: A Robust User Authentication Framework for Wireless Sensor Networks
Kumar, Pardeep; Choudhury, Amlan Jyoti; Sain, Mangal; Lee, Sang-Gon; Lee, Hoon-Jae
2011-01-01
In recent years, wireless sensor networks (WSNs) have been considered as a potential solution for real-time monitoring applications and these WSNs have potential practical impact on next generation technology too. However, WSNs could become a threat if suitable security is not considered before the deployment and if there are any loopholes in their security, which might open the door for an attacker and hence, endanger the application. User authentication is one of the most important security services to protect WSN data access from unauthorized users; it should provide both mutual authentication and session key establishment services. This paper proposes a robust user authentication framework for wireless sensor networks, based on a two-factor (password and smart card) concept. This scheme facilitates many services to the users such as user anonymity, mutual authentication, secure session key establishment and it allows users to choose/update their password regularly, whenever needed. Furthermore, we have provided the formal verification using Rubin logic and compare RUASN with many existing schemes. As a result, we found that the proposed scheme possesses many advantages against popular attacks, and achieves better efficiency at low computation cost. PMID:22163888
Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Yang, Yixian
2015-03-01
The telecare medical information systems (TMISs) enable patients to conveniently enjoy telecare services at home. The protection of patient's privacy is a key issue due to the openness of communication environment. Authentication as a typical approach is adopted to guarantee confidential and authorized interaction between the patient and remote server. In order to achieve the goals, numerous remote authentication schemes based on cryptography have been presented. Recently, Arshad et al. (J Med Syst 38(12): 2014) presented a secure and efficient three-factor authenticated key exchange scheme to remedy the weaknesses of Tan et al.'s scheme (J Med Syst 38(3): 2014). In this paper, we found that once a successful off-line password attack that results in an adversary could impersonate any user of the system in Arshad et al.'s scheme. In order to thwart these security attacks, an enhanced biometric and smart card based remote authentication scheme for TMISs is proposed. In addition, the BAN logic is applied to demonstrate the completeness of the enhanced scheme. Security and performance analyses show that our enhanced scheme satisfies more security properties and less computational cost compared with previously proposed schemes.
Match statistics related to winning in the group stage of 2014 Brazil FIFA World Cup.
Liu, Hongyou; Gomez, Miguel-Ángel; Lago-Peñas, Carlos; Sampaio, Jaime
2015-01-01
Identifying match statistics that strongly contribute to winning in football matches is a very important step towards a more predictive and prescriptive performance analysis. The current study aimed to determine relationships between 24 match statistics and the match outcome (win, loss and draw) in all games and close games of the group stage of FIFA World Cup (2014, Brazil) by employing the generalised linear model. The cumulative logistic regression was run in the model taking the value of each match statistic as independent variable to predict the logarithm of the odds of winning. Relationships were assessed as effects of a two-standard-deviation increase in the value of each variable on the change in the probability of a team winning a match. Non-clinical magnitude-based inferences were employed and were evaluated by using the smallest worthwhile change. Results showed that for all the games, nine match statistics had clearly positive effects on the probability of winning (Shot, Shot on Target, Shot from Counter Attack, Shot from Inside Area, Ball Possession, Short Pass, Average Pass Streak, Aerial Advantage and Tackle), four had clearly negative effects (Shot Blocked, Cross, Dribble and Red Card), other 12 statistics had either trivial or unclear effects. While for the close games, the effects of Aerial Advantage and Yellow Card turned to trivial and clearly negative, respectively. Information from the tactical modelling can provide a more thorough and objective match understanding to coaches and performance analysts for evaluating post-match performances and for scouting upcoming oppositions.
Cyber Threat and Vulnerability Analysis of the U.S. Electric Sector
DOE Office of Scientific and Technical Information (OSTI.GOV)
Glenn, Colleen; Sterbentz, Dane; Wright, Aaron
With utilities in the U.S. and around the world increasingly moving toward smart grid technology and other upgrades with inherent cyber vulnerabilities, correlative threats from malicious cyber attacks on the North American electric grid continue to grow in frequency and sophistication. The potential for malicious actors to access and adversely affect physical electricity assets of U.S. electricity generation, transmission, or distribution systems via cyber means is a primary concern for utilities contributing to the bulk electric system. This paper seeks to illustrate the current cyber-physical landscape of the U.S. electric sector in the context of its vulnerabilities to cyber attacks,more » the likelihood of cyber attacks, and the impacts cyber events and threat actors can achieve on the power grid. In addition, this paper highlights utility perspectives, perceived challenges, and requests for assistance in addressing cyber threats to the electric sector. There have been no reported targeted cyber attacks carried out against utilities in the U.S. that have resulted in permanent or long term damage to power system operations thus far, yet electric utilities throughout the U.S. have seen a steady rise in cyber and physical security related events that continue to raise concern. Asset owners and operators understand that the effects of a coordinated cyber and physical attack on a utility’s operations would threaten electric system reliability–and potentially result in large scale power outages. Utilities are routinely faced with new challenges for dealing with these cyber threats to the grid and consequently maintain a set of best practices to keep systems secure and up to date. Among the greatest challenges is a lack of knowledge or strategy to mitigate new risks that emerge as a result of an exponential rise in complexity of modern control systems. This paper compiles an open-source analysis of cyber threats and risks to the electric grid, utility best practices for prevention and response to cyber threats, and utility suggestions about how the federal government can aid utilities in combating and mitigating risks.« less
Das, Ashok Kumar; Odelu, Vanga; Goswami, Adrijit
2015-09-01
The telecare medicine information system (TMIS) helps the patients to gain the health monitoring facility at home and access medical services over the Internet of mobile networks. Recently, Amin and Biswas presented a smart card based user authentication and key agreement security protocol usable for TMIS system using the cryptographic one-way hash function and biohashing function, and claimed that their scheme is secure against all possible attacks. Though their scheme is efficient due to usage of one-way hash function, we show that their scheme has several security pitfalls and design flaws, such as (1) it fails to protect privileged-insider attack, (2) it fails to protect strong replay attack, (3) it fails to protect strong man-in-the-middle attack, (4) it has design flaw in user registration phase, (5) it has design flaw in login phase, (6) it has design flaw in password change phase, (7) it lacks of supporting biometric update phase, and (8) it has flaws in formal security analysis. In order to withstand these security pitfalls and design flaws, we aim to propose a secure and robust user authenticated key agreement scheme for the hierarchical multi-server environment suitable in TMIS using the cryptographic one-way hash function and fuzzy extractor. Through the rigorous security analysis including the formal security analysis using the widely-accepted Burrows-Abadi-Needham (BAN) logic, the formal security analysis under the random oracle model and the informal security analysis, we show that our scheme is secure against possible known attacks. Furthermore, we simulate our scheme using the most-widely accepted and used Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. The simulation results show that our scheme is also secure. Our scheme is more efficient in computation and communication as compared to Amin-Biswas's scheme and other related schemes. In addition, our scheme supports extra functionality features as compared to other related schemes. As a result, our scheme is very appropriate for practical applications in TMIS.
Carling, Christopher; Le Gall, Franck; McCall, Alan; Nédélec, Mathieu; Dupont, Gregory
2015-01-01
Squad management, injury and physical, tactical and technical match performance were investigated in a professional soccer team across five consecutive league seasons (2008-2013, 190 league games) with specific focus on a championship-winning season (2010/11). For each player, match participation and time-loss injuries were recorded, the latter prospectively diagnosed by the team's physician. Defending and attacking tactical and technical performance indicators investigated included ball possession and possession in opponents' half, passes, forward passes, completed passes and forward passes, crosses and completed crosses, goal attempts and goal attempts on target, successful final third entries, free-kicks and 50/50 duels won/lost. Physical performance measures included total distance and distance covered at high-speeds (≥19.1 km/h). Results showed that during the 2010/11 season, squad utilisation was lowest potentially owing to the observed lower match injury occurrence and working days lost to injury thereby increasing player availability. In 2010/11, the team won both its highest number of points and conceded its lowest number of goals especially over the second half of this season. The team also won its highest number of games directly via a goal from a substitute and scored and conceded a goal first on the highest and lowest number of occasions, respectively. While multivariate analysis of variance (MANOVA) detected a significant difference in some attacking and defensive performance indicators across the five seasons, these were generally not distinguishing factors in 2010/11. Similarly, univariate ANOVAs showed a significant difference in running distances covered across seasons, but the trend was for less activity in 2010/11.
Variability of activity profile during medium-sided games in professional soccer.
Rago, Vincenzo; Silva, João R; Mohr, Magni; Barreira, Daniel; Krustrup, Peter; Rebelo, António N
2018-04-24
In Southern European countries it is very frequent to perform medium-sized games (MSG) as last training drill. We analyzed the individual variability and changes in activity patterns during MSG throughout the preseason. Activity profile during MSGs (10v10+goalkeepers, duration: 10-min, field length: 50 m, width: 90 m, area per player: 204.5 m2) was quantified using a GPS in 14 professional male players (6 defenders, 5 midfielders 5 and attackers). Inter-individual variability was higher for high-intensity (HIR), very-high speed (VHS), maximum acceleration (Accmax) and maximum deceleration (Decmax) distance (CV=25.2 to 43.3%), compared to total distance (TD), total acceleration (Acctot) and total deceleration (Dectot) distance (CV= 8.3 to 18.3 %). Defenders showed higher variability in TD, HIR, VHS, Acctot and Dectot (ES= 1.30 to 11.28) compared to the other field positions, whereas attackers showed higher variability in HIR, VHS Accmax and Decmax (ES=-4.92 to 2.07) than other the field positions. Variability in TD regularly increased (ES= -2.13 to -0.91) towards the end of the preseason, while HIR and VHS variability tended to increase over the 3rd and the 4th preseason week (ES=-0.94 to -3.05). However, the behavior of variability across the preseason period was more unpredictable for Acctot and Dectot, both decreasing in the 3rd week (ES= 0.70 to 1.20), while Decmax increased in the 4th week (ES=-0.91±0.59). During MSGs, individual variability of activity differs among field positions, and tends to increase with either speed or acceleration intensity, underlining the need of an individualized approach for training load monitoring.
NASA Astrophysics Data System (ADS)
Riedel-Kruse, Ingmar
Modern biotechnology gets increasingly powerful to manipulate and measure microscopic biophysical processes. Nevertheless, no platform exists to truly interact with these processes, certainly not with the convenience that we are accustomed to from our electronic smart devices. In my talk I will provide the rational for such Interactive Biotechnology and conceptualize its core component, the BPU (biotic processing unit), which is then connected to an according user interface. The biophysical phenomena currently featured on these platforms utilize the phototactic response of motile microorganisms, e.g., Euglena gracilis, resulting in spatio-temporal dynamics from the single cell to the self-organized multi-cellular scale. I will demonstrate multiple platforms, such as scalable biology cloud experimentation labs, tangible museum exhibits, biotic video games, low-cost interactive DIY kits using smartphones, and programming languages for swarm robotics. I will discuss applications for education as well as for professional and citizen science. Hence, we turn traditionally observational microscopy into an interactive experience. I was told that presenting in the educational section does not count against the ''one author - one talk policy'' - so I submit two abstracts. In case of conflict - please contact me: ingmar@stanford.edu.