BackgroundIn Bangladesh, the 2013 Amendment of the Tobacco Control Act made graphic health warnings (GHWs) on theupper50% of all tobacco packs obligatory. However, at the time of writing (May 2022), GHWs are still being printed on thelower50% of packs. This paper seeks to explore how the tobacco industry undermined the development and implementation of GHWs in Bangladesh, a country known for a high level of tobacco industry interference (TII) that has rarely been examined in the peer-reviewed literature.MethodsAnalysis of print and electronic media articles and documents.ResultsCigarette companies actively opposed GHWs, while bidi companies did not. The primary strategy used to influence the formulation and delay the implementation of GHWs was direct lobbying by the Bangladesh Cigarette Manufacturers’ Association and British American Tobacco Bangladesh. Their arguments stressed the economic benefits of tobacco to Bangladesh and sought to create confusion about the impact of GHWs, for example, claiming that GHWs would obscure tax banderols, thus threatening revenue collection. They also claimed technical barriers to implementation—that new machinery would be needed—leading to delays. Tensions between government bodies were identified, one of which (National Board of Revenue)—seemingly close to cigarette companies and representing their arguments—sought to influence others to adopt industry-preferred positions. Finally, although tobacco control advocates were partially successful in counteracting TII, one self-proclaimed tobacco control group, whose nature remains unclear, threatened the otherwise united approach.ConclusionsThe strategies cigarette companies used closely resemble key techniques from the well-evidenced tobacco industry playbook. The study underlines the importance of continuing monitoring and investigations into industry conduct and suspicious actors. Prioritising the implementation of WHO Framework Convention on Tobacco Control Article 5.3 is crucial for advancing tobacco control, particularly in places like Bangladesh, where close government–industry links exist.
Integration of information communication technology via the Internet of Things devices and sensors can enable an efficient power service for utility providers to consumers in advanced metering infrastructure. Authentication and cryptographic mechanisms protect identity, data security and privacy from unauthorised interception for smart meters to servers. In the last couple of years, many key agreement protocols have been prescribed and deployed to fix those issues. Unfortunately, the deployed protocols did not work inside the same protocols, specifically parameter detection and recognition for session key generation, as they entail high computation time and communication bits overheads. Furthermore, the absence of forward secrecy and user anonymity affects the authentication. Therefore, we have proposed a lightweight identity-based key agreement (LIKA) utilising the Diffie–Hellman cryptography with a trusted authority. It seeks to cover both the security and performance criteria with equal weight. The protocol is evaluated by the Canetti and Krawczyk adversarial model, Avispa and cryptographic analysis released the session keys that were not considered as an adversary during mutual authentication. Moreover, as compared to related work, the proposed protocol took the least amount of time (5.319 ms and 1056 bits) for the entire process of session key generation. Furthermore, comparative analysis has shown that the LIKA adequately encompasses computation, communication, and security assessments. Consequently, it is more convenient for practical implementation for a smart grid.
The continuous development of information communication technology facilitates the conventional grid in transforming into an automated modern system. Internet-of-Things solutions are used along with the evolving services of end-users to the electricity service provider for smart grid applications. In terms of various devices and machine integration, adequate authentication is the key to an accurate source and destination in advanced metering infrastructure (AMI). Various protocols are deployed to lead the identification between two parties, which require high computation time and communicational bit operations for system development. Therefore, Kerberos-based authentication protocols were designed in this study with the assistance of elliptic curve cryptography to manage the mutual authentication between two parties and reduce the time and bit operations. The protocols were evaluated in a widely adopted tool, AVISPA, which builds an understanding of the proposed protocol and ensures mutual authentication without unauthorized knowledge. In addition, upon comparing security and performance assessments to the current schemes, it was found that the protocol in this study required less time and bits to transmit information. Consequently, it effectively provides multiple security features making it suitable for resource constraint smart meters in AMI.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.