scholarly journals SPARROW: A Novel Covert Communication Scheme Exploiting Broadcast Signals in LTE, 5G & Beyond

Author(s):  
Reza Soosahabi

This work proposes a novel framework to identify and exploit vulnerable MAC layer procedures in commercial wireless technologies for covert communication. Examples of covert communication include data exfiltration, remote command-and-control (CnC) and espionage. In this framework, the SPARROW schemes use the broadcast power of incumbent wireless networks to covertly relay messages across a long distance without connecting to them. This enables the SPARROW schemes to bypass all security and lawful-intercept systems and gain ample advantage over existing covert techniques in terms of maximum anonymity, more miles per Watts and less hardware. The SPARROW schemes can also serve as an efficient solution for long-range M2M applications. This paper details one recently disclosed vulnerability (CVD-2021-0045 in GSMA coordinated vulnerability disclosure program) in the common random-access procedure in the LTE and 5G standards This work also proposes a rigorous remediation for similar access procedures in current and future standards that disrupts the most sophisticated SPARROW schemes with minimal impact on other users. [This pre-print is also available at https://arxiv.org/abs/2108.12161]

2021 ◽  
Author(s):  
Reza Soosahabi

This work proposes a novel framework to identify and exploit vulnerable MAC layer procedures in commercial wireless technologies for covert communication. Examples of covert communication include data exfiltration, remote command-and-control (CnC) and espionage. In this framework, the SPARROW schemes use the broadcast power of incumbent wireless networks to covertly relay messages across a long distance without connecting to them. This enables the SPARROW schemes to bypass all security and lawful-intercept systems and gain ample advantage over existing covert techniques in terms of maximum anonymity, more miles per Watts and less hardware. The SPARROW schemes can also serve as an efficient solution for long-range M2M applications. This paper details one recently disclosed vulnerability (CVD-2021-0045 in GSMA coordinated vulnerability disclosure program) in the common random-access procedure in the LTE and 5G standards This work also proposes a rigorous remediation for similar access procedures in current and future standards that disrupts the most sophisticated SPARROW schemes with minimal impact on other users. [This pre-print is also available at https://arxiv.org/abs/2108.12161]


2013 ◽  
Vol 321-324 ◽  
pp. 1609-1613 ◽  
Author(s):  
Guang Ling Zhang ◽  
Zhao Qin Lv

By analyzing the current situations of the common car transport live fish, the paper designs a monitoring control system of refrigeration and oxygenation for live fish transportation, which uses dissolved oxygen sensors and temperature sensors to achieve real-time monitoring of dissolved oxygen and temperature of the water in the tank during transport, analyze and study the conditions, and take timely measures to eliminate the adverse effects. The system also has an independent diesel engine driving force which separates with the power of the truck, and the system is truly free from the impact of traffic and a variety of emergencies, which maintains the living environment for live fish. Thereby, it enhanced the survival rate of live fish, which thoroughly solved the problems in the long distance transportation for live fish transportation clients and greatly increased the economic interest and social benefits.


2018 ◽  
Vol 28 (6) ◽  
pp. 1887-1891
Author(s):  
Todor Kalinov

Management and Command253 are two different words and terms, but military structures use them as synonyms. Military commanders’ authorities are almost equal in meaning to civilian managers’ privileges and power. Comparison between military command and the civilian management system structure, organization, and way of work shows almost full identity and overlapping. The highest in scale and size military systems are national ministries of defense and multinational military alliances and coalitions. Military systems at this level combine military command structures with civilian political leadership and support elements. Therefore, they incorporate both military command and civilian management organizations without any complications, because their nature originated from same source and have similar framework and content. Management of organizations requires communication in order to plan, coordinate, lead, control, and conduct all routine or extraordinary activities. Immediate long-distance communications originated from telegraphy, which was firstly applied in 19th century. Later, long-distance communications included telephony, aerial transmitting, satellite, and last but not least internet data exchange. They allowed immediate exchange of letters, voice and images, bringing to new capabilities of the managers. Their sophisticated technical base brought to new area of the military command and civilian management structures. These area covered technical and operational parts of communications, and created engineer sub-field of science, that has become one of the most popular educations, worldwide. Communications were excluded from the military command and moved to separate field, named Computers and Communications. A historic overview and analysis of the command and management structures and requirements shows their relationships, common origin, and mission. They have significant differences: management and control are based on humanities, natural and social sciences, while communications are mainly based on engineering and technology. These differences do not create enough conditions for defragmentation of communications from the management structures. They exist together in symbiosis and management structures need communications in order to exist and multiply their effectiveness and efficiency. Future defragmentation between military command and communications will bring risks of worse coordination, need for more human resources, and worse end states. These risks are extremely negative for nations and should be avoided by wide appliance of the education and science among nowadays and future leaders, managers, and commanders.


2018 ◽  
Vol 28 (1) ◽  
pp. 137-141
Author(s):  
Petya Yordanova – Dinova

This paper explores the comparative analysis of the financial controlling, who is a result from the common controlling concept and the financial management. In the specialized literature, financial controlling is seen as an innovative approach to financial management. It is often presented as the most promising instrument of financial diagnostics. Generally speaking, financial controlling is seen as a process of managing the company`s assets which are valued in monetary measures. The difference between the financial management and the financial controlling is that the second covers all functions of management, analysis and control of finances, aiming at maximizing their effective use and increasing the value of the enterprise. Financial controlling is often seen as a function of the common practice of financial management. Its objective is to preserve the financial stability and financial sustainability of enterprises operating in a highly aggressive business environment.


2020 ◽  
pp. 120347542098255
Author(s):  
Kayadri Ratnarajah ◽  
Michelle Le ◽  
Anastasiya Muntyanu ◽  
Steve Mathieu ◽  
Simon Nigen ◽  
...  

Dupilumab, a monoclonal antibody against the common receptor of interleukin (IL)-4 and IL-13, was the first biologic therapy approved in Canada for treatment of moderate-to-severe atopic dermatitis (AD). While it is considered safe and effective, dupilumab is not universally effective and 8%-38% of patients develop conjunctivitis, while some patients develop head and neck dermatitis. Thus, new therapeutic options are warranted. While both IL-4 and IL-13 play important roles in the pathogenesis of AD, it has been recently demonstrated that IL-13 is the primary upregulated cytokine in AD skin biopsy samples. A placebo-controlled phase 2b clinical trial evaluating the efficacy and safety of lebrikizumab, an IL-13 inhibitor, in AD demonstrated that, at 16 weeks, Eczema Area and Severity Index (EASI) 75 and Investigator’s Global Assessment (IGA) 0/1 were achieved by 60.6% and 44.6% of patients taking lebrikizumab at its highest dose (vs 24.3% and 15.3% of patients taking placebo, respectively). Moreover, treatment with lebrikizumab was associated with rapid improvement of pruritus and low rates of conjunctivitis (1.4%-3.8%). Another IL-13 monoclonal antibody, tralokinumab, was evaluated for safety and efficacy in moderate-to-severe AD. By week 12, among adults receiving 300 mg tralokinumab, 42.5% achieved EASI-75 and 26.7% achieved IGA 0/1 score (vs 15.5% and 11.8% in the placebo group, respectively). Both lebrikizumab and tralokinumab demonstrated acceptable safety profiles in AD (and non-AD) trials with adverse events often being comparable between treatment and control groups. Thus, IL-13 inhibitors may provide a safe and effective treatment alternative for patients with moderate-to-severe AD.


ICT Express ◽  
2021 ◽  
Vol 7 (1) ◽  
pp. 41-48
Author(s):  
Eunkyung Kim ◽  
Heesoo Lee

2020 ◽  
Vol 26 (3) ◽  
pp. 169-183
Author(s):  
Phudit Ampririt ◽  
Yi Liu ◽  
Makoto Ikeda ◽  
Keita Matsuo ◽  
Leonard Barolli ◽  
...  

The Fifth Generation (5G) networks are expected to be flexible to satisfy demands of high-quality services such as high speed, low latencies and enhanced reliability from customers. Also, the rapidly increasing amount of user devices and high user’s requests becomes a problem. Thus, the Software-Defined Network (SDN) will be the key function for efficient management and control. To deal with these problems, we propose a Fuzzy-based SDN approach. This paper presents and compares two Fuzzy-based Systems for Admission Control (FBSAC) in 5G wireless networks: FBSAC1 and FBSAC2. The FBSAC1 considers for admission control decision three parameters: Grade of Service (GS), User Request Delay Time (URDT) and Network Slice Size (NSS). In FBSAC2, we consider as an additional parameter the Slice Priority (SP). So, FBSAC2 has four input parameters. The simulation results show that the FBSAC2 is more complex than FBSAC1, but it has a better performance for admission control.


2019 ◽  
Vol 24 ◽  
pp. 121-128
Author(s):  
Sigal Ben-Zaken ◽  
Yoav Meckel ◽  
Dan Nemet ◽  
Alon Eliakim

The ACSL A/G polymorphism is associated with endurance trainability. Previous studies have demonstrated that homozygotes of the minor AA allele had a reduced maximal oxygen consumption response to training compared to the common GG allele homozygotes, and that the ACSL A/G single nucleotide polymorphism explained 6.1% of the variance in the VO2max response to endurance training. The contribution of ACSL single nucleotide polymorphism to endurance trainability was shown in nonathletes, however, its potential role in professional athletes is not clear. Moreover, the genetic basis to anaerobic trainability is even less studied. Therefore, the aim of the present study was to examine the prevalence of ACSL single nucleotide polymorphism among professional Israeli long distance runners (n=59), middle distance runners (n=31), sprinters and jumpers (n=48) and non-athletic controls (n=60). The main finding of the present study was that the ACSL1 AA genotype, previously shown to be associated with reduced endurance trainability, was not higher among sprinters and jumpers (15%) compared to middle- (16%) and long-distance runners (15%). This suggests that in contrast to previous studies indicating that the ACSL1 single nucleotide polymorphism may influence endurance trainability among non-athletic individuals, the role of this polymorphism among professional athletes is still not clear.


Sign in / Sign up

Export Citation Format

Share Document