Wireless Sensor Network is a network of large number of nodes with limited power and computational capabilities. It has the potential of event monitoring in unattended locations where there is a chance of unauthorized access. The work that is presented here identifies and addresses the problem of eavesdropping in the exposed environment of the sensor network, which makes it easy for the adversary to trace the packets to find the originator source node, hence compromising the contextual privacy. Our scheme provides an enhanced three-level security system for source location privacy. The base station is at the center of square grid of four quadrants and it is surrounded by a ring of flooding nodes, which act as a first step in confusing the adversary. The fake node is deployed in the opposite quadrant of actual source and start reporting base station. The selection of phantom node using our algorithm in another quadrant provides the third level of confusion. The results show that Dissemination in Wireless Sensor Networks (DeLP) has reduced the energy utilization by 50% percent, increased the safety period by 26%, while providing a six times more packet delivery ratio along with a further 15% decrease in the packet delivery delay as compared to the tree-based scheme. It also provides 334% more safety period than the phantom routing, while it lags behind in other parameters due to the simplicity of phantom scheme. This work illustrates the privacy protection of the source node and the designed procedure may be useful in designing more robust algorithms for location privacy.
Patient: Female, 22-year-old Final Diagnosis: GATA2 deficiency • hemophagocytic lymphohistiocytosis Symptoms: Chest pain • cough • fever • malaise • shortness of breath Medication: — Clinical Procedure: Bone marrow biopsy • bronchoscopy Specialty: Immunology Objective: Rare disease Background: Hemophagocytic lymphohistiocytosis (HLH) is a life-threatening disease characterized by an intense immunologic response that results in multiorgan dysfunction. It typically manifests as a result of a familial genetic immunodeficiency disorder or secondary to a trigger such as an infection, malignancy, or autoimmune disease. The major factors involved in the development of the disease are an individual’s genetic propensity to develop HLH, such as rare associated mutations, or inflammatory processes that trigger the immune system to go haywire. Case Report: Before the COVID-19 pandemic, a 22-year-old woman with a history of congenital absence of the right kidney, right-sided hearing loss, and leukopenia presented with a 3-week history of generalized malaise, fever, chest pain, cough, and shortness of breath. She developed an acute systemic cytomegalovirus infection further complicated by HLH. Based on her history and clinical course, an underlying primary immunodeficiency was suspected. An immunodeficiency gene panel revealed a monoallelic mutation in GATA2 , a gene that encodes zinc-transcription factors responsible for the regulation of hematopoiesis. Conclusions: GATA2 deficiency encompasses a large variety of mutations in the GATA2 gene and leads to disorders associated with hematologic and immunologic manifestations of monocytopenia and B-, and natural killer-cell deficiency. Over time, affected individuals are at high risk of developing life-threatening infections and serious hematologic complications, such as myelodysplastic syndromes and/or leukemias. We aimed to illustrate the importance of identifying an underlying genetic disorder associated with secondary HLH to help guide acute and long-term management.
Source location privacy (SLP) is a serious issue in wireless sensor networks (WSN) since Eavesdroppers tries to determine the source location. Hunting Animals in Forest is considered as an example for SLP. Many conventional schemes have been proposed for SLP in WSN, namely, Random Walk Routing, and Fake Messages Transmission, which cause critical issues (less safety period, packet delivery latency, and high energy consumption). Furthermore, the security analysis is not properly investigated in any previous work. In this paper, we propose a new model called the circular chessboard-based secure source location privacy model (C2S2-LOOP) with the following tasks: key generation, network topology management (clustering), intercluster routing (travel plan), and data packets encryption. All sensor nodes are deployed in a circular chessboard (Circular Field) and the key generation ( P U K , S E K ) is invoked using elliptic curve cryptography (ECC) with Ant Lion Optimization algorithm, which mitigate the issues of conventional ECC. Then, the network topology is managed using clustering where residual energy of the nodes is used for Cluster Head (CH) selection. Intercluster routing is implemented using packet traversing using clockwise and anticlockwise directions, which are mainly concerned with establishing a secure route between the source to the destination node. To ensure data security, we present the Chaotic Artificial Neural Network (C-ANN) in which encryption is executed. Assume that CH near to the source node has a high trust value, then it traverses (clock-wise) real packets towards sink node and similarly in the left side region (anticlockwise), fake packets are transmitted. Network simulations (OMNeT++) are evaluated and compared with the previous approaches, and finally, our proposed scheme concludes that it maintains not only source node location privacy (large safety period) and also reduces energy consumption by more than 40% and latency by more than 35%.
This study aims to investigate the influence of psychological biases on the investment decision of Chinese individual investors after the pandemic of COVID-19 with a moderating role of information availability. A cross-sectional method with a quantitative research approach was employed to investigate the hypothesized relationships among variables. The snowball sampling technique was applied to collect the data through a survey questionnaire from individual investors investing in the Chinese stock market. Smart-PLS statistical software was used to analyze the data and for the estimation of hypotheses. Results indicated that overconfidence, representative bias, and anchoring bias have a significant and positive influence on investment decisions during the post-Covid-19 pandemic; however, the availability bias has insignificant and negative effects on the investment decision during the post-COVID-19 pandemic. Moreover, findings indicated that information availability has a significant moderating role in the relationship of psychological biases with the investment decision during the post-COVID-19 pandemic. This study contributes to the body of knowledge regarding behavior finance, psychological biases, and investment decision in emerging stock markets. The findings of the present study improve the understanding that how investors’ psychology affects their investment decisions.
Wireless sensor networks can be deployed in harsh environments for monitoring purposes. In such environments where there is a lack of human presence, the network may face severe security and privacy issues due to unauthorized access of a powerful attacker. The attacker may exploit the contextual information to locate the position of the asset. We propose a scheme for protecting the location of the source node, which consumes less energy hence maximizing network lifetime. The proposed scheme has the inspiration of black and white regions of the chessboard, which represent sleep and active regions in the wireless sensor network. This alternation plays its role in reducing the total energy consumption along misguiding the eavesdropper from finding the source node location. Our scheme uses dynamic cluster head selection to further add to location privacy. The results show that we have improved the safety period by a maximum of 131% and a minimum of 17% than that of the compared techniques. Similarly, a maximum of 60% reduction in energy consumption and a 20% reduction in latency is recorded by our proposed scheme. These results make our scheme suitable for application requiring high‐safety period along maximizing network lifetime.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.