Your browser doesn't support javascript.
loading
Show: 20 | 50 | 100
Results 1 - 5 de 5
Filter
Add more filters










Database
Language
Publication year range
1.
Math Biosci Eng ; 20(7): 11957-11977, 2023 May 12.
Article in English | MEDLINE | ID: mdl-37501427

ABSTRACT

In view of the problems of inefficient data encryption, non-support of malicious user revocation and data integrity checking in current smart grid data sharing schemes, this paper proposes a blockchain-based multi-authority revocable data sharing scheme in the smart grid. Using online/offline encryption technology with hybrid encryption technology enhances the encryption performance for the data owner. The use of user binary tree technology enables the traceability and revocability of malicious users. The introduction of multiple attribute authorization authorities eliminates the threat of collusive attacks that exist in traditional data-sharing schemes. In addition, the semi-honest problem of third-party servers is solved by uploading data verification credentials to the blockchain. The security analysis results show that the scheme can resist selective plaintext attacks and collusion attacks. The performance analysis results show that the proposed scheme has lower computational overhead and better functionality than similar schemes, which is suitable for secure data sharing in smart grids.

2.
PLoS One ; 17(9): e0274695, 2022.
Article in English | MEDLINE | ID: mdl-36173984

ABSTRACT

Internet of Drones (IoD) is considered as a network and management architecture, which can enable unmanned aerial vehicles (UAVs) to collect data in controlled areas and conduct access control for UAVs. However, the current cloud-assisted IoD scheme cannot efficiently achieve secure communication between heterogeneous cryptosystems, and does not support multi-ciphertext equality tests. To improve the security and performance of traditional schemes, we propose a heterogeneous signcryption scheme (HSC-MET) that supports multi-ciphertext equality test. In this paper, we use a multi-ciphertext equality test technique to achieve multi-user simultaneous retrieval of multiple ciphertexts safely and efficiently. In addition, we adopt heterogeneous signcryption technology to realize secure data communication from public key infrastructure (PKI) to certificateless cryptography (CLC). At the same time, the proposed scheme based on the computation without bilinear pairing, which greatly reduces the computational cost. According to the security and performance analysis, under the random oracle model (ROM), the confidentiality, unforgeability and number security of HSC-MET are proved based on the computational Diffie-Hellman (CDH) problem.


Subject(s)
Internet , Unmanned Aerial Devices , Communication , Technology
3.
Front Neurosci ; 16: 807045, 2022.
Article in English | MEDLINE | ID: mdl-35185457

ABSTRACT

BACKGROUND: Mirror visual feedback (MVF) has been widely used in neurological rehabilitation. Due to the potential gain effect of the MVF combination therapy, the related mechanisms still need be further analyzed. METHODS: Our self-controlled study recruited 20 healthy subjects (age 22.150 ± 2.661 years) were asked to perform four different visual feedback tasks with simultaneous functional near infrared spectroscopy (fNIRS) monitoring. The right hand of the subjects was set as the active hand (performing active movement), and the left hand was set as the observation hand (static or performing passive movement under soft robotic bilateral hand rehabilitation system). The four VF tasks were designed as RVF Task (real visual feedback task), MVF task (mirror visual feedback task), BRM task (bilateral robotic movement task), and MVF + BRM task (Mirror visual feedback combined with bilateral robotic movement task). RESULTS: The beta value of the right pre-motor cortex (PMC) of MVF task was significantly higher than the RVF task (RVF task: -0.015 ± 0.029, MVF task: 0.011 ± 0.033, P = 0.033). The beta value right primary sensorimotor cortex (SM1) in MVF + BRM task was significantly higher than MVF task (MVF task: 0.006 ± 0.040, MVF + BRM task: 0.037 ± 0.036, P = 0.016). CONCLUSION: Our study used the synchronous fNIRS to compare the immediate hemodynamics cortical activation of four visual feedback tasks in healthy subjects. The results showed the synergistic gain effect on cortical activation from MVF combined with a soft robotic bilateral hand rehabilitation system for the first time, which could be used to guide the clinical application and the future studies.

4.
J Vis Exp ; (190)2022 12 16.
Article in English | MEDLINE | ID: mdl-36591989

ABSTRACT

General clinical cognitive assessment scales are not sensitive enough to cognitive impairment in high-functioning stroke patients. The dual-task assessment has advantages for identifying cognitive deficits in high-functioning stroke patients and has been gradually applied in clinical assessment and cognitive training. Moreover, the Stroop paradigm has higher sensitivity and specificity for attentional assessment than conventional clinical cognitive assessment scales. Therefore, this study presents the dual-task assessment based on the Stroop paradigm to identify cognitive deficits in high-functioning stroke patients. This study demonstrates a single- and dual-task evaluation based on the Stroop paradigm and confirms its feasibility through case experiments and synchronized functional near-infrared spectroscopy evaluation. The Stroop reaction time and correct rate are used as the main indicators to evaluate the cognitive level of the subjects. This study protocol aims to provide new ideas to figure out the ceiling effect in general clinical assessment failure for high-functioning stroke patients.


Subject(s)
Cognition Disorders , Cognitive Dysfunction , Stroke , Humans , Stroop Test , Cognitive Dysfunction/diagnosis , Cognitive Dysfunction/etiology , Stroke/complications , Stroke/diagnosis , Cognition
5.
PLoS One ; 16(9): e0258062, 2021.
Article in English | MEDLINE | ID: mdl-34591938

ABSTRACT

Environmental monitoring plays a vital role in environmental protection, especially for the management and conservation of natural resources. However, environmental monitoring data is usually difficult to resist malicious attacks because it is transmitted in an open and insecure channel. In our paper, a new data sharing scheme is proposed by using attribute-based encryption, identity-based signature and cloud computing technology to meet the requirements of confidentiality, integrity, verifiability, and unforgerability of environmental monitoring data. The monitoring equipment encrypts the monitored environmental data and uploads it to the environmental cloud server. Then, monitoring users can request access to the environmental cloud server. If the monitoring user meets the access policy, the plaintext is finally obtained through the fog node decryption. Our proposal mainly uses attribute-based encryption technology to realize the privacy protection and fine-grained access control of monitoring data. The integrity and unforgeability of the monitoring data are ensured by the digital signature. In addition, outsourcing computing technology saves the computing overhead of monitoring equipment and monitoring users. The security analysis illustrates that our proposal can achieve security purposes. Finally, the performance of our proposal and related schemes is evaluated from the aspects of communication overhead and computing overhead. The results indicate that our proposal is secure and efficient in environmental monitoring.


Subject(s)
Cloud Computing , Computer Security , Environmental Monitoring/methods , Information Dissemination , Information Technology
SELECTION OF CITATIONS
SEARCH DETAIL
...