scholarly journals Proof-of-PUF Enabled Blockchain: Concurrent Data and Device Security for Internet-of-Energy

Sensors ◽  
2020 ◽  
Vol 21 (1) ◽  
pp. 28
Author(s):  
Rameez Asif ◽  
Kinan Ghanem ◽  
James Irvine

A detailed review on the technological aspects of Blockchain and Physical Unclonable Functions (PUFs) is presented in this article. It stipulates an emerging concept of Blockchain that integrates hardware security primitives via PUFs to solve bandwidth, integration, scalability, latency, and energy requirements for the Internet-of-Energy (IoE) systems. This hybrid approach, hereinafter termed as PUFChain, provides device and data provenance which records data origins, history of data generation and processing, and clone-proof device identification and authentication, thus possible to track the sources and reasons of any cyber attack. In addition to this, we review the key areas of design, development, and implementation, which will give us the insight on seamless integration with legacy IoE systems, reliability, cyber resilience, and future research challenges.

2019 ◽  
Vol 23 (2) ◽  
pp. 1441-1463 ◽  
Author(s):  
Rui Hu ◽  
Zheng Yan ◽  
Wenxiu Ding ◽  
Laurence T. Yang

AbstractInternet of Things (IoT), as a typical representation of cyberization, enables the interconnection of physical things and the Internet, which provides intelligent and advanced services for industrial production and human lives. However, it also brings new challenges to IoT applications due to heterogeneity, complexity and dynamic nature of IoT. Especially, it is difficult to determine the sources of specified data, which is vulnerable to inserted attacks raised by different parties during data transmission and processing. In order to solve these issues, data provenance is introduced, which records data origins and the history of data generation and processing, thus possible to track the sources and reasons of any problems. Though some related researches have been proposed, the literature still lacks a comprehensive survey on data provenance in IoT. In this paper, we first propose a number of design requirements of data provenance in IoT by analyzing the features of IoT data and applications. Then, we provide a deep-insight review on existing schemes of IoT data provenance and employ the requirements to discuss their pros and cons. Finally, we summarize a number of open issues to direct future research.


2017 ◽  
Author(s):  
Darren Rhodes

Time is a fundamental dimension of human perception, cognition and action, as the perception and cognition of temporal information is essential for everyday activities and survival. Innumerable studies have investigated the perception of time over the last 100 years, but the neural and computational bases for the processing of time remains unknown. First, we present a brief history of research and the methods used in time perception and then discuss the psychophysical approach to time, extant models of time perception, and advancing inconsistencies between each account that this review aims to bridge the gap between. Recent work has advocated a Bayesian approach to time perception. This framework has been applied to both duration and perceived timing, where prior expectations about when a stimulus might occur in the future (prior distribution) are combined with current sensory evidence (likelihood function) in order to generate the perception of temporal properties (posterior distribution). In general, these models predict that the brain uses temporal expectations to bias perception in a way that stimuli are ‘regularized’ i.e. stimuli look more like what has been seen before. Evidence for this framework has been found using human psychophysical testing (experimental methods to quantify behaviour in the perceptual system). Finally, an outlook for how these models can advance future research in temporal perception is discussed.


Public Voices ◽  
2016 ◽  
Vol 13 (2) ◽  
pp. 1
Author(s):  
John R Phillips

The cover photograph for this issue of Public Voices was taken sometime in the summer of 1929 (probably June) somewhere in Sunflower County, Mississippi. Very probably the photo was taken in Indianola but, perhaps, it was Ruleville. It is one of three such photos, one of which does have the annotation on the reverse “Ruleville Midwives Club 1929.” The young woman wearing a tie in this and in one of the other photos was Ann Reid Brown, R.N., then a single woman having only arrived in the United States from Scotland a few years before, in 1923. Full disclosure: This commentary on the photo combines professional research interests in public administration and public policy with personal interests—family interests—for that young nurse later married and became the author’s mother. From the scholarly perspective, such photographs have been seen as “instrumental in establishing midwives’ credentials and cultural identity at a key transitional moment in the history of the midwife and of public health” (Keith, Brennan, & Reynolds 2012). There is also deep irony if we see these photographs as being a fragment of the American dream, of a recent immigrant’s hope for and success at achieving that dream; but that fragment of the vision is understood quite differently when we see that she began a hopeful career working with a Black population forcibly segregated by law under the incongruously named “separate but equal” legal doctrine. That doctrine, derived from the United States Supreme Court’s 1896 decision, Plessy v. Ferguson, would remain the foundation for legally enforced segregation throughout the South for another quarter century. The options open to the young, white, immigrant nurse were almost entirely closed off for the population with which she then worked. The remaining parts of this overview are meant to provide the following: (1) some biographical information on the nurse; (2) a description, in so far as we know it, of why she was in Mississippi; and (3) some indication of areas for future research on this and related topics.


Author(s):  
Richard Joseph Martin

BDSM encompasses a range of practices—bondage and discipline (BD), dominance and submission (DS), sadism and masochism (SM)—involving the consensual exchange of power in erotic contexts. This chapter provides an overview of scholarship on BDSM, drawing on the history of academic studies of the phenomenon, ranging from the psychology of perversion, the sociology of deviance, and the feminist “sex wars” to more recent ethnographic and phenomenological turns. The chapter focuses on the importance of discourse and affect for making sense of BDSM, both for those who seek to analyze the phenomenon and for practitioners themselves. Drawing on ethnographic research and other data, the chapter shows how language and discourse are key to answering interconnected questions about the semiotics and phenomenology of BDSM (what these practices mean and how practitioners experience these practices affectively). Thus, a potential “linguistic turn” in BDSM studies is essential for future research on this erotic minority.


Author(s):  
Travis D. Stimeling

This chapter offers a historiographic survey of country music scholarship from the publication of Bill C. Malone’s “A History of Commercial Country Music in the United States, 1920–1964” (1965) to the leading publications of the today. Very little of substance has been written on country music recorded since the 1970s, especially when compared to the wealth of available literature on early country recording artists. Ethnographic studies of country music and country music culture are rare, and including ethnographic methods in country music studies offers new insights into the rich variety of ways in which people make, consume, and engage with country music as a genre. The chapter traces the influence of folklore studies, sociology, cultural studies, and musicology on the development of country music studies and proposes some directions for future research in the field.


Author(s):  
Rebecca S. Bigler ◽  
Lynn S. Liben

Morality and gender are intersecting realms of human thought and behavior. Reasoning and action at their intersection (e.g., views of women’s rights legislation) carry important consequences for societies, communities, and individual lives. In this chapter, the authors argue that children’s developing views of morality and gender reciprocally shape one another in important and underexplored ways. The chapter begins with a brief history of psychological theory and research at the intersection of morality and gender and suggests reasons for the historical failure to view gender attitudes through moral lenses. The authors then describe reasons for expecting morality to play an important role in shaping children’s developing gender attitudes and, reciprocally, for gender attitudes to play an important role in shaping children’s developing moral values. The authors next illustrate the importance and relevance of these ideas by discussing two topics at the center of contentious debate in the United States concerning ethical policy and practice: treatment of gender nonconformity and gender-segregated schooling. The chapter concludes with suggestions for future research.


Electronics ◽  
2021 ◽  
Vol 10 (14) ◽  
pp. 1611
Author(s):  
María Cora Urdaneta-Ponte ◽  
Amaia Mendez-Zorrilla ◽  
Ibon Oleagordia-Ruiz

Recommendation systems have emerged as a response to overload in terms of increased amounts of information online, which has become a problem for users regarding the time spent on their search and the amount of information retrieved by it. In the field of recommendation systems in education, the relevance of recommended educational resources will improve the student’s learning process, and hence the importance of being able to suitably and reliably ensure relevant, useful information. The purpose of this systematic review is to analyze the work undertaken on recommendation systems that support educational practices with a view to acquiring information related to the type of education and areas dealt with, the developmental approach used, and the elements recommended, as well as being able to detect any gaps in this area for future research work. A systematic review was carried out that included 98 articles from a total of 2937 found in main databases (IEEE, ACM, Scopus and WoS), about which it was able to be established that most are geared towards recommending educational resources for users of formal education, in which the main approaches used in recommendation systems are the collaborative approach, the content-based approach, and the hybrid approach, with a tendency to use machine learning in the last two years. Finally, possible future areas of research and development in this field are presented.


2021 ◽  
Vol 60 (2) ◽  
pp. 362-374
Author(s):  
David Kennerley

AbstractMusic has been steadily rising up the historical agenda, a product of the emergence of sound studies, the history of the senses, and a mood of interdisciplinary curiosity. This introductory article offers a critical review of how the relationship between music and politics has featured in extant historical writing, from classic works of political history to the most recent scholarship. It begins by evaluating different approaches that historians have taken to music, summarizes the important shifts in method that have recently taken place, and advocates for a performance-centered, contextualized framework that is attentive to the distinctive features of music as a medium. The second half examines avenues for future research into the historical connections between music and politics, focusing on four thematic areas—the body, emotions, space, and memory—and closes with some overarching reflections on music's use as a tool of power, as well as a challenge to it. Although for reasons of cohesion, this short article focuses primarily on scholarship on Britain and Ireland in the eighteenth and nineteenth centuries, its discussion of theory and methods is intended to be applicable to the study of music and political culture across a broad range of periods and geographies.


Sensors ◽  
2021 ◽  
Vol 21 (6) ◽  
pp. 2009
Author(s):  
Fatemeh Najafi ◽  
Masoud Kaveh ◽  
Diego Martín ◽  
Mohammad Reza Mosavi

Traditional authentication techniques, such as cryptographic solutions, are vulnerable to various attacks occurring on session keys and data. Physical unclonable functions (PUFs) such as dynamic random access memory (DRAM)-based PUFs are introduced as promising security blocks to enable cryptography and authentication services. However, PUFs are often sensitive to internal and external noises, which cause reliability issues. The requirement of additional robustness and reliability leads to the involvement of error-reduction methods such as error correction codes (ECCs) and pre-selection schemes that cause considerable extra overheads. In this paper, we propose deep PUF: a deep convolutional neural network (CNN)-based scheme using the latency-based DRAM PUFs without the need for any additional error correction technique. The proposed framework provides a higher number of challenge-response pairs (CRPs) by eliminating the pre-selection and filtering mechanisms. The entire complexity of device identification is moved to the server side that enables the authentication of resource-constrained nodes. The experimental results from a 1Gb DDR3 show that the responses under varying conditions can be classified with at least a 94.9% accuracy rate by using CNN. After applying the proposed authentication steps to the classification results, we show that the probability of identification error can be drastically reduced, which leads to a highly reliable authentication.


Sign in / Sign up

Export Citation Format

Share Document