• Title/Summary/Keyword: Ubiquitous Protect

Search Result 81, Processing Time 0.024 seconds

Protective effect of resveratrol on arsenic trioxide-induced nephrotoxicity in rats

  • Zhang, Weiqian;Liu, Yan;Ge, Ming;Jing, Jiang;Chen, Yan;Jiang, Huijie;Yu, Hongxiang;Li, Ning;Zhang, Zhigang
    • Nutrition Research and Practice
    • /
    • v.8 no.2
    • /
    • pp.220-226
    • /
    • 2014
  • BACKGROUND/OBJECTIVES: Arsenic, which causes human carcinogenicity, is ubiquitous in the environment. This study was designed to evaluate modulation of arsenic induced cancer by resveratrol, a phytoalexin found in vegetal dietary sources that has antioxidant and chemopreventive properties, in arsenic trioxide ($As_2O_3$)-induced Male Wistar rats. MATERIALS/METHODS: Adult rats received 3 mg/kg $As_2O_3$ (intravenous injection, iv.) on alternate days for 4 days. Resveratrol (8 mg/kg) was administered (iv.) 1 h before $As_2O_3$ treatment. The plasma and homogenization enzymes associated with oxidative stress of rat kidneys were measured, the kidneys were examined histologically and trace element contents were assessed. RESULTS: Rats treated with $As_2O_3$ had significantly higher oxidative stress and kidney arsenic accumulation; however, pretreatment with resveratrol reversed these changes. In addition, prior to treatment with resveratrol resulted in lower blood urea nitrogen, creatinine and insignificant renal tubular epithelial cell necrosis. Furthermore, the presence of resveratrol preserved the selenium content ($0.805{\pm}0.059{\mu}g/g$) of kidneys in rats treated with $As_2O_3$. However, resveratrol had no effect on zinc level in the kidney relative to $As_2O_3$-treated groups. CONCLUSIONS: Our data show that supplementation with resveratrol alleviated nephrotoxicity by improving antioxidant capacity and arsenic efflux. These findings suggest that resveratrol has the potential to protect against kidney damage in populations exposed to arsenic.

A Study on Security Routing using MD5 in MANET Environments (MANET 환경에서 MD5를 이용한 보안 라우팅에 관한 연구)

  • Lee, Cheol-Seung;Jung, Sung-Ok;Lee, Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.728-731
    • /
    • 2008
  • Recently demands in construction of the stand-alone networks and interconnection between convergence devices have led an increase in research on IETF MANET working group, Bluetooth, and HomeRF working group and much attention has been paid to the application of MANET as a Ubiquitous network which is growing fast. With performance both as hosts and routers, easy network configuration, and fast response, mobile nodes participating in MANET are suitable for Embedded computing, but have vulnerable points, such as lack of network scalability and dynamic network topology due to mobility, passive attacks, active attacks, which make continuous security service impossible. For perfect MANET setting, routing is required which can guarantee security and efficiency through secure routing. In routing in this study, hashed AODV is used to protect from counterfeiting messages by malicious nodes in the course of path 'finding and setting, and disguising misrouted messages as different mobile nodes and inputting them into the network.

  • PDF

Asynchronous Key Management for Energy Efficiency over Wireless Sensor Network (유비쿼터스 센서네트워크에서 에너지효율을 고려하는 비동기적인 키관리 기법)

  • Yoon, Mi-Youn
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.10C
    • /
    • pp.1011-1022
    • /
    • 2006
  • WSN(Wireless Sensor Network) performs to detect and collect environmental information for one purpose. The WSN is composed of a sink node and several sensor nodes and has a constraint in an aspect of energy consumption caused by limited battery resource. So many required mechanisms in WSN should consider the remaining energy condition. To deploy WSN, tile collected information is required to protect from an adversary over the network in many cases. The security mechanism should be provided for collecting the information over the network. we propose asynchronized key management considering energy efficiency over WSN. The proposed key management is focused on independence and difference of the keys used to deliver the information over several routes over the network, so disclosure of any key does not results in exposure of total key information over the overall WSN. Also, we use hash function to update key information for energy efficiency Periodically. We define the insecurity for requested security Properties and Proof that the security properties are guaranteed. Also, we evaluate and analyze the energy efficiency for the proposed mechanism.

Challenge-Response Based Secure RFID Authentication Protocol for Distributed Database Environment (분산 데이터베이스 환경에 적합한 Challenge-Response 기반의 안전한 RFID 인증 프로토콜)

  • Rhee Keun-Woo;Oh Dong-Kyu;Kwak Jin;Oh Soo-Hyun;Kim Seung-Joo;Won Dong-Ho
    • The KIPS Transactions:PartC
    • /
    • v.12C no.3 s.99
    • /
    • pp.309-316
    • /
    • 2005
  • Recently, RFID system is a main technology to realize ubiquitous computing environments, but the feature of the RFID system may bring about various privacy problem. So, many kinds of protocols To resolve this problem are researched. In this paper, we analyse the privacy problem of the previous methods and propose more secure and effective authentication protocol to protect user's privacy. Then we prove that the proposed protocol is secure and effective as we compare the proposed protocol with previous methods. The proposed protocol is based on Challenge-Response using one-way hash function and random number. The proposed protocol is secure against replay attack, spoofing attack and so on. In addition, the proposed protocol is proper for distributed database environment.

Anonymous Remote User Authentication Scheme with Smart Card (익명성을 제공하는 스마트카드 사용자 인증 프로토콜)

  • Kim, Se-Il;Rhee, Hyun-Sook;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.2
    • /
    • pp.139-144
    • /
    • 2007
  • Due to the increasing use of Internet and spread of ubiquitous environment the security of private information became an important issue. For this reason, many suggestions have been made in order to protect the privacy of users. In the study of authentication system using a smart card which is one of the methods for protecting private information, the main idea is to offer user anonymity. In 2004, Das et al. suggested an authentication system that guarantees anonymity by using a dynamic ID for the first time. However, this scheme couldn't guarantee complete anonymity as the identity of the user became revealed at log-in phase. In 2005, Chien at al. suggested a authentication system that guarantees anonymity, but this was only safe to the outsider(attacker). In this paper, we propose a scheme that enables the mutual authentication between the user and the sewer by using a smart card. For the protection of the user privacy, we suggest an efficient user authentication system that guarantees perfect anonymity to both the outsider and remote server.

Tag Identification Time Reduction Scheme of Back-End Server for Secure RFID Privacy Protection Protocol (안전한 RFID 프라이버시 보호 프로토콜을 위한 백엔드 서버의 태그 판별 시간 절감 기법)

  • Yeo Sang-Soo;Kim Soon-Seok;Kim Sung-Kwon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.4
    • /
    • pp.13-26
    • /
    • 2006
  • RFID technology is evaluated as one of core technologies for ubiquitous environment, because of its various characteristics which barcode systems don't have. However, RFID systems have consumer's privacy infringement problems, such like information leakage and location tracing. We need RFID privacy protection protocols, that satisfy three essential security requirements; confidentiality, indistinguishability and forward security, in order to protect consumer's privacy perfectly. The most secure protocol, that satisfies all of the three essential security requirements, among existing protocols, is the hash-chain based protocol that Ohkubo proposed. Unfortunately this protocol has a big disadvantage that it takes very long time to identify a tag in the back-end server. In this paper, we propose a scheme to keep security just as it is and to reduce computation time for identifying a tag in back-end server. The proposed scheme shows the results that the identification time in back-end server is reduced considerably compared to the original scheme of Ohkubo protocol.

Working Mechanism of Peroxiredoxins (Prxs) and Sulphiredoxin1 (Srx1) in Arabidopsis thaliana (애기장대 peroxiredoxins (Prxs)과 sulphiredoxin1 (Srx1)의 작용기작)

  • Kim, Min-Gab;Su'udi, Mukhamad;Park, Sang-Ryeol;Hwang, Duk-Ju;Bae, Shin-Chul
    • Journal of Life Science
    • /
    • v.20 no.12
    • /
    • pp.1777-1783
    • /
    • 2010
  • Plants generate reactive oxygen species (ROS) as a by-product of normal aerobic metabolism or when exposed to a variety of stress conditions, which can cause widespread damage to biological macromolecules. To protect themselves from oxidative stress, plant cells are equipped with a wide range of antioxidant proteins. However, the detailed reaction mechanisms of these are still unknown. Peroxiredoxins (Prxs) are ubiquitous thiol-containing antioxidants that reduce hydrogen peroxide with an N-terminal cysteine. The active-site cysteine of peroxiredoxins is selectively oxidized to cysteine sulfinic acid during catalysis, which leads to inactivation of peroxidase activity. This oxidation was thought to be irreversible. Recently identified small protein sulphiredoxin (Srx1), which is conserved in higher eukaryotes, reduces cysteine.sulphinic acid in yeast peroxiredoxin. Srx1 is highly induced by $H_2O_2$-treatment and the deletion of its gene causes decreased yeast tolerance to $H_2O_2$, which suggest its involvement in the metabolism of oxidants. Moreover, Srx1 is required for heat shock and oxidative stress induced functional, as well as conformational switch of yeast cytosolic peroxiredoxins. This change enhances protein stability and peroxidase activity, indicating that Srx1 plays a crucial role in peroxiredoxin stability and its regulation mechanism. Thus, the understanding of the molecular basis of Srx1 and its regulation is critical for revealing the mechanism of peroxiredoxin action. We postulate here that Srx1 is involved in dealing with oxidative stress via controlling peroxiredoxin recycling in Arabidopsis. This review article thus will be describing the functions of Prxs and Srx in Arabidopsis thaliana. There will be a special focus on the possible role of Srx1 in interacting with and reducing hyperoxidized Cys-sulphenic acid of Prxs.

Enhance Issues of the global competitiveness of Telemedicine Industry in Korea (우리나라 원격의료산업의 글로벌 경쟁력 강화를 위한 정책 과제)

  • Yoon, Young-Han
    • International Commerce and Information Review
    • /
    • v.13 no.3
    • /
    • pp.325-351
    • /
    • 2011
  • This paper is focused on problem in the law and system caused by the infringement of medical information and in the law and system indicate the solution. Interests in the medical service are increasing in internet environment as life quality of the people improves because of development in information and medical technology. The current main issues of the legislative system and the law improvement suggestion for telemedicine activation which is related to the ubiquitous health in which the medicine field and IT technology convergence appearance. In particular, South Korea in the privacy-related legislation should be amended. The reason, Medical information record contains a lot of patient's private secrets. Therefore, if privacy protection is not enough this could cause problem violate a patient's privacy. Thus we need consequently the maintenance of the health medical treatment field to suit a telemedicine environment of a law system. Specifically, this law enacted to protect medical treatment information and the technical security services with confidence and stability against security treats are necessary.

  • PDF

A Protection System of Medical Information using Multiple Authentication (다중 인증 기술을 이용한 의료정보 보호시스템)

  • Kim, Jin-Mook;Hong, Seong-Sik
    • Convergence Security Journal
    • /
    • v.14 no.7
    • /
    • pp.3-8
    • /
    • 2014
  • Recently, A utilization request of the U-Healthcare services are increasing rapidly. This is because the increase in smartphone users and ubiquitous computing technology was developed. Furthermore, the demand for access to and use of medical information systems is growing rapidly with a smartphone. This system have the advantage such as they can access from anywhere and anytime in the healthcare information system using their smartphone quickly and easily. But this system have various problems that are a privacy issue, the location disclosure issue, and the potential infringement of personal information. this problems are arise very explosive. Therefore, we propose a secure information security system that can solve the security problems in healthcare information systems for healthcare workers using smartphone. Our proposed system, doctors record, store, modify and manage patient medical information and this system would be safer than the existing healthcare information systems. The proposed system allows the doctor to perform further authentication by transmitting using SMS to GOTP message when they accessing medical information systems. So our proposed system can support to more secure system that can protect user individual information stealing and modify attack by two-factor authentication scheme. And this system can support confidentiality, integrity, location information blocking, personal information steal prevent using cryptography algorithm that is easy and fast.

Method of Detecting and Isolating an Attacker Node that Falsified AODV Routing Information in Ad-hoc Sensor Network (애드혹 센서 네트워크에서 AODV 라우팅 정보변조 공격노드 탐지 및 추출기법)

  • Lee, Jae-Hyun;Kim, Jin-Hee;Kwon, Kyung-Hee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.12
    • /
    • pp.2293-2300
    • /
    • 2008
  • In ad-hoc sensor network, AODV routing information is disclosed to other nodes because AODV protocol doesn't have any security mechanisms. The problem of AODV is that an attacker can falsify the routing information in RREQ packet. If an attacker broadcasts the falsified packet, other nodes will update routing table based on the falsified one so that the path passing through the attacker itself can be considered as a shortest path. In this paper, we design the routing-information-spoofing attack such as falsifying source sequence number and hop count fields in RREQ packet. And we suggest an efficient scheme for detecting the attackers and isolating those nodes from the network without extra security modules. The proposed scheme doesn't employ cryptographic algorithm and authentication to reduce network overhead. We used NS-2 simulation to evaluate the network performance. And we analyzed the simulation results on three cases such as an existing normal AODV, AODV under the attack and proposed AODV. Simulation results using NS2 show that the AODV using proposed scheme can protect the routing-information-spoofing attack and the total n umber of received packets for destination node is almost same as the existing norm at AODV.