Your browser doesn't support javascript.
loading
Show: 20 | 50 | 100
Resultados 1 - 20 de 223
Filtrar
1.
Mol Cell ; 74(5): 966-981.e18, 2019 06 06.
Artículo en Inglés | MEDLINE | ID: mdl-31078383

RESUMEN

High-throughput methodologies have enabled routine generation of RNA target sets and sequence motifs for RNA-binding proteins (RBPs). Nevertheless, quantitative approaches are needed to capture the landscape of RNA-RBP interactions responsible for cellular regulation. We have used the RNA-MaP platform to directly measure equilibrium binding for thousands of designed RNAs and to construct a predictive model for RNA recognition by the human Pumilio proteins PUM1 and PUM2. Despite prior findings of linear sequence motifs, our measurements revealed widespread residue flipping and instances of positional coupling. Application of our thermodynamic model to published in vivo crosslinking data reveals quantitative agreement between predicted affinities and in vivo occupancies. Our analyses suggest a thermodynamically driven, continuous Pumilio-binding landscape that is negligibly affected by RNA structure or kinetic factors, such as displacement by ribosomes. This work provides a quantitative foundation for dissecting the cellular behavior of RBPs and cellular features that impact their occupancies.


Asunto(s)
Conformación de Ácido Nucleico , Proteínas de Unión al ARN/genética , Secuencia de Aminoácidos/genética , Humanos , Cinética , Unión Proteica/genética , ARN Mensajero/genética , Proteínas de Unión al ARN/química , Ribosomas/química , Ribosomas/genética
2.
Am J Med Genet A ; 194(6): e63550, 2024 06.
Artículo en Inglés | MEDLINE | ID: mdl-38297485

RESUMEN

Klippel-Feil syndrome (KFS) has a genetically heterogeneous phenotype with six known genes, exhibiting both autosomal dominant and autosomal recessive inheritance patterns. PUF60 is a nucleic acid-binding protein, which is involved in a number of nuclear processes, including pre-mRNA splicing, apoptosis, and transcription regulation. Pathogenic variants in this gene have been described in Verheij syndrome due to either 8q24.3 microdeletion or PUF60 single-nucleotide variants. PUF60-associated conditions usually include intellectual disability, among other findings, some overlapping KFS; however, PUF60 is not classically referred to as a KFS gene. Here, we describe a 6-year-old female patient with clinically diagnosed KFS and normal cognition, who harbors a heterozygous de novo variant in the PUF60 gene (c.1179del, p.Ile394Serfs*7). This is a novel frameshift variant, which is predicted to result in a premature stop codon. Clinically, our patient demonstrates a pattern of malformations that matches reported cases of PUF60 variants; however, unlike most others, she has no clear learning difficulties. In light of these findings, we propose that PUF60 should be considered in the differential diagnosis of KFS and that normal cognition should not exclude its testing.


Asunto(s)
Síndrome de Klippel-Feil , Factores de Empalme de ARN , Humanos , Femenino , Niño , Diagnóstico Diferencial , Factores de Empalme de ARN/genética , Síndrome de Klippel-Feil/genética , Síndrome de Klippel-Feil/diagnóstico , Síndrome de Klippel-Feil/fisiopatología , Síndrome de Klippel-Feil/patología , Fenotipo , Cognición , Proteínas Represoras/genética , Mutación con Pérdida de Función/genética , Discapacidad Intelectual/genética , Discapacidad Intelectual/diagnóstico , Discapacidad Intelectual/patología
3.
Am J Med Genet A ; 194(9): e63631, 2024 09.
Artículo en Inglés | MEDLINE | ID: mdl-38647383

RESUMEN

Craniofacial microsomia (CFM), also known as the oculo-auriculo-vertebral spectrum, is a congenital disorder characterized by hypoplasia of the mandible and external ear due to tissue malformations originating from the first and second branchial arches. However, distinguishing it from other syndromes of branchial arch abnormalities is difficult, and causal variants remain unidentified in many cases. In this report, we performed an exome sequencing analysis of a Brazilian family with CFM. The proband was a 12-month-old boy with clinical findings consistent with the diagnostic criteria for CFM, including unilateral mandibular hypoplasia, microtia, and external auditory canal abnormalities. A heterozygous de novo nonsense variant (c.713C>G, p.S238*) in PUF60 was identified, which was predicted to be pathogenic in silico. PUF60 has been reported as a causal gene in Verheij syndrome, but not in CFM. Although the boy showed craniofacial abnormalities and developmental delay that overlapped with Verheij syndrome, the facial asymmetry with unilateral hypoplasia of the mandible observed in this case did not match the previously reported phenotypes of PUF60 variants. Our findings expand the phenotypic range of PUF60 variants that cover CFM and Verheij syndrome.


Asunto(s)
Síndrome de Goldenhar , Fenotipo , Humanos , Masculino , Síndrome de Goldenhar/genética , Síndrome de Goldenhar/patología , Síndrome de Goldenhar/diagnóstico , Lactante , Factores de Empalme de ARN/genética , Proteínas Represoras/genética , Secuenciación del Exoma , Mandíbula/anomalías , Mandíbula/patología , Linaje , Codón sin Sentido/genética
4.
Sensors (Basel) ; 24(11)2024 Jun 01.
Artículo en Inglés | MEDLINE | ID: mdl-38894368

RESUMEN

Internet of Things (IoT) technology is evolving over the peak of smart infrastructure with the participation of IoT devices in a wide range of applications. Traditional IoT authentication methods are vulnerable to threats due to wireless data transmission. However, IoT devices are resource- and energy-constrained, so building lightweight security that provides stronger authentication is essential. This paper proposes a novel, two-layered multi-factor authentication (2L-MFA) framework using blockchain to enhance IoT devices and user security. The first level of authentication is for IoT devices, one that considers secret keys, geographical location, and physically unclonable function (PUF). Proof-of-authentication (PoAh) and elliptic curve Diffie-Hellman are followed for lightweight and low latency support. Second-level authentication for IoT users, which are sub-categorized into four levels, each defined by specific factors such as identity, password, and biometrics. The first level involves a matrix-based password; the second level utilizes the elliptic curve digital signature algorithm (ECDSA); and levels 3 and 4 are secured with iris and finger vein, providing comprehensive and robust authentication. We deployed fuzzy logic to validate the authentication and make the system more robust. The 2L-MFA model significantly improves performance, reducing registration, login, and authentication times by up to 25%, 50%, and 25%, respectively, facilitating quicker cloud access post-authentication and enhancing overall efficiency.

5.
Sensors (Basel) ; 24(3)2024 Jan 31.
Artículo en Inglés | MEDLINE | ID: mdl-38339656

RESUMEN

This article presents a novel hardware-assisted distributed ledger-based solution for simultaneous device and data security in smart healthcare. This article presents a novel architecture that integrates PUF, blockchain, and Tangle for Security-by-Design (SbD) of healthcare cyber-physical systems (H-CPSs). Healthcare systems around the world have undergone massive technological transformation and have seen growing adoption with the advancement of Internet-of-Medical Things (IoMT). The technological transformation of healthcare systems to telemedicine, e-health, connected health, and remote health is being made possible with the sophisticated integration of IoMT with machine learning, big data, artificial intelligence (AI), and other technologies. As healthcare systems are becoming more accessible and advanced, security and privacy have become pivotal for the smooth integration and functioning of various systems in H-CPSs. In this work, we present a novel approach that integrates PUF with IOTA Tangle and blockchain and works by storing the PUF keys of a patient's Body Area Network (BAN) inside blockchain to access, store, and share globally. Each patient has a network of smart wearables and a gateway to obtain the physiological sensor data securely. To facilitate communication among various stakeholders in healthcare systems, IOTA Tangle's Masked Authentication Messaging (MAM) communication protocol has been used, which securely enables patients to communicate, share, and store data on Tangle. The MAM channel works in the restricted mode in the proposed architecture, which can be accessed using the patient's gateway PUF key. Furthermore, the successful verification of PUF enables patients to securely send and share physiological sensor data from various wearable and implantable medical devices embedded with PUF. Finally, healthcare system entities like physicians, hospital admin networks, and remote monitoring systems can securely establish communication with patients using MAM and retrieve the patient's BAN PUF keys from the blockchain securely. Our experimental analysis shows that the proposed approach successfully integrates three security primitives, PUF, blockchain, and Tangle, providing decentralized access control and security in H-CPS with minimal energy requirements, data storage, and response time.


Asunto(s)
Inteligencia Artificial , Cadena de Bloques , Humanos , Seguridad Computacional , Computadores , Atención a la Salud/métodos
6.
Nano Lett ; 23(11): 5171-5179, 2023 Jun 14.
Artículo en Inglés | MEDLINE | ID: mdl-37212254

RESUMEN

Physically unclonable functions (PUFs) are an integral part of modern-day hardware security. Various types of PUFs already exist, including optical, electronic, and magnetic PUFs. Here, we introduce a novel straintronic PUF (SPUF) by exploiting strain-induced reversible cracking in the contact microstructures of graphene field-effect transistors (GFETs). We found that strain cycling in GFETs with a piezoelectric gate stack and high-tensile-strength metal contacts can lead to an abrupt transition in some GFET transfer characteristics, whereas other GFETs remain resilient to strain cycling. Strain sensitive GFETs show colossal ON/OFF current ratios >107, whereas strain-resilient GFETs show ON/OFF current ratios <10. We fabricated a total of 25 SPUFs, each comprising 16 GFETs, and found near-ideal performance. SPUFs also demonstrated resilience to regression-based machine learning (ML) attacks in addition to supply voltage and temporal stability. Our findings highlight the opportunities for emerging straintronic devices in addressing some of the critical needs of the microelectronics industry.

7.
Int J Mol Sci ; 25(4)2024 Feb 08.
Artículo en Inglés | MEDLINE | ID: mdl-38396730

RESUMEN

Heterozygous variants in the Poly(U) Binding Splicing Factor 60kDa gene (PUF60) have been associated with Verheij syndrome, which has the key features of coloboma, short stature, skeletal abnormalities, developmental delay, palatal abnormalities, and congenital heart and kidney defects. Here, we report five novel patients from unrelated families with PUF60-related disorders exhibiting novel genetic and clinical findings with three truncating variants, one splice-site variant with likely reduced protein expression, and one missense variant. Protein modeling of the patient's missense variant in the PUF60 AlphaFold structure revealed a loss of polar bonds to the surrounding residues. Neurodevelopmental disorders were present in all patients, with variability in speech, motor, cognitive, social-emotional and behavioral features. Novel phenotypic expansions included movement disorders as well as immunological findings with recurrent respiratory, urinary and ear infections, atopic diseases, and skin abnormalities. We discuss the role of PUF60 in immunity with and without infection based on recent organismic and cellular studies. As our five patients showed less-severe phenotypes than classical Verheij syndrome, particularly with the absence of key features such as coloboma or palatal abnormalities, we propose a reclassification as PUF60-related neurodevelopmental disorders with multi-system involvement. These findings will aid in the genetic counseling of patients and families.


Asunto(s)
Coloboma , Trastornos del Neurodesarrollo , Humanos , Mutación Missense , Trastornos del Neurodesarrollo/genética , Fenotipo , Factores de Empalme de ARN/genética
8.
Development ; 147(22)2020 11 27.
Artículo en Inglés | MEDLINE | ID: mdl-33051256

RESUMEN

The germline genome is guarded against invading foreign genetic elements by small RNA-dependent gene-silencing pathways. Components of these pathways localize to, or form distinct aggregates in the vicinity of, germ granules. These components and their dynamics in and out of granules are currently being intensively studied. Here, we report the identification of PLP-1, a Caenorhabditiselegans protein related to the human single-stranded nucleic acid-binding protein Pur-alpha, as a component of germ granules in C. elegans We show that PLP-1 is essential for silencing different types of transgenes in the germ line and for suppressing the expression of several endogenous genes controlled by the germline gene-silencing pathways. Our results reveal that PLP-1 functions downstream of small RNA biogenesis during initiation of gene silencing. Based on these results and the earlier findings that Pur-alpha proteins interact with both RNA and protein, we propose that PLP-1 couples certain RNAs with their protein partners in the silencing complex. PLP-1 orthologs localized on RNA granules may similarly contribute to germline gene silencing in other organisms.


Asunto(s)
Proteínas de Caenorhabditis elegans/metabolismo , Caenorhabditis elegans/metabolismo , Proteínas de Unión al ADN/metabolismo , Silenciador del Gen , Células Germinativas/metabolismo , Animales , Animales Modificados Genéticamente/genética , Animales Modificados Genéticamente/metabolismo , Caenorhabditis elegans/citología , Caenorhabditis elegans/genética , Proteínas de Caenorhabditis elegans/genética , Proteínas de Unión al ADN/genética , Células Germinativas/citología , Masculino
9.
Am J Med Genet A ; 191(10): 2610-2622, 2023 10.
Artículo en Inglés | MEDLINE | ID: mdl-37303278

RESUMEN

PUF60-related developmental disorder (also referred to as Verheij syndrome), resulting from haploinsufficiency of PUF60, is associated with multiple congenital anomalies affecting a wide range of body systems. These anomalies include ophthalmic coloboma, and congenital anomalies of the heart, kidney, and musculoskeletal system. Behavioral and intellectual difficulties are also observed. While less common than other features associated with PUF60-related developmental disorder, for instance hearing impairment and short stature, identification of specific anomalies such as ophthalmic coloboma can aid with diagnostic identification given the limited spectrum of genes linked with this feature. We describe 10 patients with PUF60 gene variants, bringing the total number reported in the literature, to varying levels of details, to 56 patients. Patients were recruited both via locally based exome sequencing from international sites and from the DDD study in the United Kingdom. Eight of the variants reported were novel PUF60 variants. The addition of a further patient with a reported c449-457del variant to the existing literature highlights this as a recurrent variant. One variant was inherited from an affected parent. This is the first example in the literature of an inherited variant resulting in PUF60-related developmental disorder. Two patients (20%) were reported to have a renal anomaly consistent with 22% of cases in previously reported literature. Two patients received specialist endocrine treatment. More commonly observed were clinical features such as: cardiac anomalies (40%), ocular abnormalities (70%), intellectual disability (60%), and skeletal abnormalities (80%). Facial features did not demonstrate a recognizable gestalt. Of note, but remaining of unclear causality, we describe a single pediatric patient with pineoblastoma. We recommend that stature and pubertal progress should be monitored in PUF60-related developmental disorder with a low threshold for endocrine investigations as hormone therapy may be indicated. Our study reports an inherited case with PUF60-related developmental disorder which has important genetic counseling implications for families.


Asunto(s)
Anomalías Múltiples , Coloboma , Cardiopatías Congénitas , Discapacidad Intelectual , Niño , Humanos , Anomalías Múltiples/diagnóstico , Anomalías Múltiples/genética , Discapacidades del Desarrollo/genética , Cardiopatías Congénitas/genética , Discapacidad Intelectual/diagnóstico , Discapacidad Intelectual/genética
10.
Environ Sci Technol ; 57(39): 14661-14673, 2023 Oct 03.
Artículo en Inglés | MEDLINE | ID: mdl-37732724

RESUMEN

Trace metals, as constituents of ambient air, can have impacts on human and environmental health. The Global Atmospheric Passive Sampling (GAPS) and GAPS Megacities (GAPS-MC) networks investigated trace metals in the air at 51 global locations by deploying polyurethane foam disk passive air samplers (PUF-PAS) for periods of 3-12 months. Aluminum and iron exhibited the highest concentrations in air (x̅ = 3400 and 4630 ng/m3, respectively), with notably elevated values at a rural site in Argentina thought to be impacted by resuspended soil. Urban sites had the highest levels of toxic Pb and Cd, with enrichment factors suggesting primarily anthropogenic influences. High levels of As at rural sites were also observed. Elevated trace metal concentrations in cities are associated with local emissions and higher PM2.5 and PM10 concentrations. Brake and tire wear-associated metals Sb, Cu, and Zn are significantly correlated and elevated at urban locations relative to those at background sites. These data demonstrate the versatility of PUF-PAS for measuring trace metals and other particle-associated pollutants in ambient air in a cost-effective and simple manner. The data presented here will serve as a global baseline for assessing future changes in ambient air associated with industrialization, urbanization, and population growth.

11.
Environ Sci Technol ; 57(38): 14310-14318, 2023 09 26.
Artículo en Inglés | MEDLINE | ID: mdl-37713326

RESUMEN

We hypothesized that emissions of polychlorinated biphenyls (PCBs) from Aroclor mixtures present in building materials explain their concentrations in school air. Here, we report a study of airborne concentrations and gas-phase emissions in three elementary school rooms constructed in 1958. We collected airborne PCBs using polyurethane foam passive air samplers (PUF-PAS, n = 6) and PCB emissions from building materials using polyurethane foam passive emission samplers (PUF-PES, n = 17) placed over flat surfaces in school rooms, including vinyl tile floors, carpets, painted bricks, painted drywall, and glass-block windows. We analyzed all 209 congeners represented in 173 chromatographic separations and found that the congener distribution in PUF-PES strongly resembled the predicted diffusive release of gas-phase PCBs from a solid material containing Aroclor 1254. Concentrations of airborne total PCBs ranged from 38 to 180 ng m-3, a range confirmed by an independent laboratory in the same school. These levels exceed action levels for all aged children set by the State of Vermont and exceed guidance levels set by the U.S. EPA for children under age 3. Emissions of PCBs from the glass-block windows (30,000 ng m-2 d-1) greatly exceeded those of all other surfaces, which ranged from 35 to 2700 ng m-2 d-1. This study illustrates the benefit of the direct measurement of PCB emissions to identify the most important building remediation needed to reduce airborne PCB concentrations in schools.


Asunto(s)
Bifenilos Policlorados , Niño , Humanos , Anciano , Preescolar , Vermont , Arocloros , Instituciones Académicas
12.
Environ Sci Technol ; 57(6): 2274-2285, 2023 02 14.
Artículo en Inglés | MEDLINE | ID: mdl-36657182

RESUMEN

Biomass burning (BB) is an important source of atmospheric persistent organic pollutants (POPs) across the world. However, there are few field-based regional studies regarding the POPs released from BB. Due to the current limitations of emission factors and satellites, the contribution of BB to airborne POPs is still not well understood. In this study, with the simultaneous monitoring of BB biomarkers and POPs based on polyurethane foam-based passive air sampling technique, we mapped the contribution of BB to polychlorinated biphenyls (PCBs) and organochlorine pesticides (OCPs) in the Indo-China Peninsula. Spearman correlations between levoglucosan and 16 PCBs (rs = 0.264-0.767, p < 0.05) and 2 OCPs (rs = 0.250-0.328, p < 0.05) confirmed that BB may facilitate POP emissions. Source apportionment indicated that BB contributed 9.3% to the total PCB and OCP mass. The high contribution of positive matrix factorization-resolved BB to PCBs and OCPs was almost consistent with their concentration distributions in the open BB season but not completely consistent with those in the pre-monsoon and/or monsoon seasons. Their contribution distributions may reflect the use history and geographic distribution in secondary sources of POPs. The field-based contribution dataset of BB to POPs is significant in improving regional BB emission inventories and model prediction.


Asunto(s)
Contaminantes Atmosféricos , Contaminantes Ambientales , Hidrocarburos Clorados , Plaguicidas , Bifenilos Policlorados , Bifenilos Policlorados/análisis , Contaminantes Orgánicos Persistentes , Biomasa , Contaminantes Atmosféricos/análisis , Hidrocarburos Clorados/análisis , Plaguicidas/análisis , China , Monitoreo del Ambiente/métodos
13.
Zygote ; 31(4): 359-365, 2023 Aug.
Artículo en Inglés | MEDLINE | ID: mdl-37194574

RESUMEN

Pumilio3 (Pum3), an evolutionarily distant homologue of the classical RNA-binding protein PUF (PUMILIO and FBF) family member, is also involved in the process of RNA metabolism through post-transcriptional regulation. However, the functions of Pum3 in mouse oocyte maturation and preimplantation embryonic development have not been elucidated. By comparing RNA levels in different tissues, we found that Pum3 was widely expressed in multiple tissues, but moderately predominant in the ovary. Histochemical staining suggested that the PUM3 protein exhibits positive signals in oocytes, granulosa cells and theca cells of different follicle stages. Oocyte immunofluorescence results showed a slightly higher level of PUM3 protein in metaphase II compared with the germinal vesicle (GV) stage. After knockdown of Pum3 in GV oocytes using siRNA injection (siPUM3), no obvious defect was observed in the processes of GV breakdown and polar body extrusion during in vitro maturation (IVM) for the siPum3 oocytes. Compared with the control group, the siPUM3 group displayed no significant abnormality in the cleavage and blastocyst formation rate of these fertilized oocytes. Therefore, we can conclude that depletion of Pum3 does not affect mouse oocyte maturation and early embryonic development in vitro.


Asunto(s)
Técnicas de Maduración In Vitro de los Oocitos , Oogénesis , Animales , Femenino , Ratones , Embarazo , Desarrollo Embrionario , Técnicas de Maduración In Vitro de los Oocitos/métodos , Oocitos/fisiología , Oogénesis/genética , ARN Interferente Pequeño/genética
14.
Sensors (Basel) ; 23(4)2023 Feb 10.
Artículo en Inglés | MEDLINE | ID: mdl-36850634

RESUMEN

Internet of Drones (IoD), designed to coordinate the access of unmanned aerial vehicles (UAVs), is a specific application of the Internet of Things (IoT). Drones are used to control airspace and offer services such as rescue, traffic surveillance, environmental monitoring, delivery and so on. However, IoD continues to suffer from privacy and security issues. Firstly, messages are transmitted over public channels in IoD environments, which compromises data security. Further, sensitive data can also be extracted from stolen mobile devices of remote users. Moreover, drones are susceptible to physical capture and manipulation by adversaries, which are called drone capture attacks. Thus, the development of a secure and lightweight authentication scheme is essential to overcoming these security vulnerabilities, even on resource-constrained drones. In 2021, Akram et al. proposed a secure and lightweight user-drone authentication scheme for drone networks. However, we discovered that Akram et al.'s scheme is susceptible to user and drone impersonation, verification table leakage, and denial of service (DoS) attacks. Furthermore, their scheme cannot provide perfect forward secrecy. To overcome the aforementioned security vulnerabilities, we propose a secure mutual authentication and key agreement scheme between user and drone pairs. The proposed scheme utilizes physical unclonable function (PUF) to give drones uniqueness and resistance against drone stolen attacks. Moreover, the proposed scheme uses a fuzzy extractor to utilize the biometrics of users as secret parameters. We analyze the security of the proposed scheme using informal security analysis, Burrows-Abadi-Needham (BAN) logic, a Real-or-Random (RoR) model, and Automated Verification of Internet Security Protocols and Applications (AVISPA) simulation. We also compared the security features and performance of the proposed scheme and the existing related schemes. Therefore, we demonstrate that the proposed scheme is suitable for IoD environments that can provide users with secure and convenient wireless communications.

15.
Sensors (Basel) ; 23(12)2023 Jun 20.
Artículo en Inglés | MEDLINE | ID: mdl-37420912

RESUMEN

Wearable computing has garnered a lot of attention due to its various advantages, including automatic recognition and categorization of human actions from sensor data. However, wearable computing environments can be fragile to cyber security attacks since adversaries attempt to block, delete, or intercept the exchanged information via insecure communication channels. In addition to cyber security attacks, wearable sensor devices cannot resist physical threats since they are batched in unattended circumstances. Furthermore, existing schemes are not suited for resource-constrained wearable sensor devices with regard to communication and computational costs and are inefficient regarding the verification of multiple sensor devices simultaneously. Thus, we designed an efficient and robust authentication and group-proof scheme using physical unclonable functions (PUFs) for wearable computing, denoted as AGPS-PUFs, to provide high-security and cost-effective efficiency compared to the previous schemes. We evaluated the security of the AGPS-PUF using a formal security analysis, including the ROR Oracle model and AVISPA. We carried out the testbed experiments using MIRACL on Raspberry PI4 and then presented a comparative analysis of the performance between the AGPS-PUF scheme and the previous schemes. Consequently, the AGPS-PUF offers superior security and efficiency than existing schemes and can be applied to practical wearable computing environments.


Asunto(s)
Telemedicina , Dispositivos Electrónicos Vestibles , Humanos , Seguridad Computacional , Comunicación , Costos y Análisis de Costo
16.
Sensors (Basel) ; 23(14)2023 Jul 11.
Artículo en Inglés | MEDLINE | ID: mdl-37514605

RESUMEN

The security of web applications in an enterprise is of paramount importance. To strengthen the security of applications, the identification and mitigation of vulnerabilities through appropriate countermeasures becomes imperative. The Open Web Application Security Project (OWASP) Top 10 API Security Risks, 2023 Edition, indicates the prominent vulnerabilities of API security risks. Broken authentication, however, is placed in second position with level-3 exploitability, level-2 prevalence, level-3 detectability, and level-3 technical impact. To mitigate this vulnerability, many mitigation strategies have been proposed by using the cryptographic primitives wherein two techniques, namely hashing and PUF, are used. Some of the proposals have integrated the concepts of hashing and PUF. However, the unnecessarily lengthy and complex mathematics used in these proposals makes them unsuitable for current API-based application scenarios. Therefore, in this paper, the authors propose a privacy-preserving authentication protocol that incorporates the capability of both mechanisms in an easy and low-complexity manner. In addition to overcoming existing limitations, the proposed protocol is tested to provide more security properties over existing schemes. Analysis of their performance has demonstrated that the proposed solutions are secure, efficient, practical, and effective for API-based web applications in an enterprise environment.

17.
Sensors (Basel) ; 23(10)2023 May 12.
Artículo en Inglés | MEDLINE | ID: mdl-37430626

RESUMEN

Modern cryptography attributes the security of a cryptographic system to the security of the key. How to securely distribute the key has always been a bottleneck in key management. This paper proposes a secure group key agreement scheme for multiple parties using a multiple twinning superlattice physical unclonable function (PUF) that can be synchronized. By sharing the challenge and helper data among multiple twinning superlattice PUF holders, the scheme employs a reusable fuzzy extractor to obtain the key locally. Moreover, adopting public-key encryption encrypts public data for establishing the subgroup key, which provides independent communication for the subgroup. At the same time, when the subgroup membership changes, the public key encrypts new public data to update the subgroup key, forming scalable group communication. This paper also presents a cost and formal security analysis, which shows that the proposed scheme can achieve computational security by applying the key obtained by the computationally secure reusable fuzzy extractor to the EAV-secure symmetric-key encryption, which has indistinguishable encryption in the presence of an eavesdropper. Additionally, the scheme is secure against physical attacks, man-in-the-middle attacks, and machine learning modeling attacks.

18.
Entropy (Basel) ; 25(5)2023 May 06.
Artículo en Inglés | MEDLINE | ID: mdl-37238513

RESUMEN

The Space-Air-Ground Integrated Network (SAGIN) expands cyberspace greatly. Dynamic network architecture, complex communication links, limited resources, and diverse environments make SAGIN's authentication and key distribution much more difficult. Public key cryptography is a better choice for terminals to access SAGIN dynamically, but it is time-consuming. The semiconductor superlattice (SSL) is a strong Physical Unclonable Function (PUF) to be the hardware root of security, and the matched SSL pairs can achieve full entropy key distribution through an insecure public channel. Thus, an access authentication and key distribution scheme is proposed. The inherent security of SSL makes the authentication and key distribution spontaneously achieved without a key management burden and solves the assumption that excellent performance is based on pre-shared symmetric keys. The proposed scheme achieves the intended authentication, confidentiality, integrity, and forward security, which can defend against masquerade attacks, replay attacks, and man-in-the-middle attacks. The formal security analysis substantiates the security goal. The performance evaluation results confirm that the proposed protocols have an obvious advantage over the elliptic curve or bilinear pairings-based protocols. Compared with the protocols based on the pre-distributed symmetric key, our scheme shows unconditional security and dynamic key management with the same level performance.

19.
Entropy (Basel) ; 25(8)2023 Aug 21.
Artículo en Inglés | MEDLINE | ID: mdl-37628272

RESUMEN

Unique digital circuit outputs, considered as physical unclonable function (PUF) circuit outputs, can facilitate a secure and reliable secret key agreement. To tackle noise and high correlations between the PUF circuit outputs, transform coding methods combined with scalar quantizers are typically applied to extract the uncorrelated bit sequences reliably. In this paper, we create realistic models for these transformed outputs by fitting truncated distributions to them. We also show that the state-of-the-art models are inadequate to guarantee a target reliability level for all PUF outputs, which also means that secrecy cannot be guaranteed. Therefore, we introduce a quality of security parameter to control the percentage of the PUF circuit outputs for which a target security level can be guaranteed. By applying the finite-length information theory results to a public ring oscillator output dataset, we illustrate that security guarantees can be provided for each bit extracted from any PUF device by eliminating only a small subset of PUF circuit outputs. Furthermore, we conversely show that it is not possible to provide reliability or security guarantees without eliminating any PUF circuit output. Our holistic methods and analyses can be applied to any PUF type, as well as any biometric secrecy system, with continuous-valued outputs to extract secret keys with low hardware complexity.

20.
Int J Inf Secur ; 22(2): 333-345, 2023.
Artículo en Inglés | MEDLINE | ID: mdl-36471814

RESUMEN

Distributed Denial of Service (DDoS) attacks have emerged as the top security threat with the rise of e-commerce in recent years. Volumetric attacks are the most common DDoS attacks that aim to overwhelm the victim's bandwidth. The current mitigation methods use reactive filtering techniques that are not magical and straightforward solutions. In this paper, we propose a network architecture based on the capability to address the threat of DDoS attacks. Physically Unclonable Functions (PUFs) have emerged as a promising solution in security. Motivated by the capability approach, we put forward a network architecture where the routers use Transient Effect Ring Oscillator PUF to generate and verify capabilities. This novel hardware-based solution, to address the problem, has reduced the computational overhead of capability generation. Additionally, the destination has complete control over the incoming traffic in the proposed architecture, resulting in uninterrupted communication with the legitimate clients regardless of the attacker traffic. The large-scale simulation on an open-source Network Simulator (NS-3) has shown that the proposed architecture efficiently mitigates DDoS attacks to a large extend. With our proposed architecture, the throughput was hardly affected when attacker traffic was varied from 10 to 80%.

SELECCIÓN DE REFERENCIAS
Detalles de la búsqueda