Novel species of fungi described in this study include those from various countries as follows: Australia, Chaetopsina eucalypti on Eucalyptus leaf litter, Colletotrichum cobbittiense from Cordyline stricta × C. australis hybrid, Cyanodermella banksiae on Banksia ericifolia subsp. macrantha, Discosia macrozamiae on Macrozamia miquelii, Elsinoë banksiigena on Banksia marginata, Elsinoë elaeocarpi on Elaeocarpus sp., Elsinoë leucopogonis on Leucopogon sp., Helminthosporium livistonae on Livistona australis, Idriellomyces eucalypti (incl. Idriellomyces gen. nov.) on Eucalyptus obliqua, Lareunionomyces eucalypti on Eucalyptus sp., Myrotheciomyces corymbiae (incl. Myrotheciomyces gen. nov., Myrotheciomycetaceae fam. nov.), Neolauriomyces eucalypti (incl. Neolauriomyces gen. nov., Neolauriomycetaceae fam. nov.) on Eucalyptus sp., Nullicamyces eucalypti (incl. Nullicamyces gen. nov.) on Eucalyptus leaf litter, Oidiodendron eucalypti on Eucalyptus maidenii, Paracladophialophora cyperacearum (incl. Paracladophialophoraceae fam. nov.) and Periconia cyperacearum on leaves of Cyperaceae, Porodiplodia livistonae (incl. Porodiplodia gen. nov., Porodiplodiaceae fam. nov.) on Livistona australis, Sporidesmium melaleucae (incl. Sporidesmiales ord. nov.) on Melaleuca sp., Teratosphaeria sieberi on Eucalyptus sieberi, Thecaphora australiensis in capsules of a variant of Oxalis exilis. Brazil, Aspergillus serratalhadensis from soil, Diaporthe pseudoinconspicua from Poincianella pyramidalis, Fomitiporella pertenuis on dead wood, Geastrum magnosporum on soil, Marquesius aquaticus (incl. Marquesius gen. nov.) from submerged decaying twig and leaves of unidentified plant, Mastigosporella pigmentata from leaves of Qualea parviflorae, Mucor souzae from soil, Mycocalia aquaphila on decaying wood from tidal detritus, Preussia citrullina as endophyte from leaves of Citrullus lanatus, Queiroziella brasiliensis (incl. Queiroziella gen. nov.) as epiphytic yeast on leaves of Portea leptantha, Quixadomyces cearensis (incl. Quixadomyces gen. nov.) on decaying bark, Xylophallus clavatus on rotten wood. Canada, Didymella cari on Carum carvi and Coriandrum sativum. Chile, Araucasphaeria foliorum (incl. Araucasphaeria gen. nov.) on Araucaria araucana, Aspergillus tumidus from soil, Lomentospora valparaisensis from soil. Colombia, Corynespora pseudocassiicola on Byrsonima sp., Eucalyptostroma eucalyptorum on Eucalyptus pellita, Neometulocladosporiella eucalypti (incl. Neometulocladosporiella gen. nov.) on Eucalyptus grandis × urophylla, Tracylla eucalypti (incl. Tracyllaceae fam. nov., Tracyllalales ord. nov.) on Eucalyptus urophylla. Cyprus, Gyromitra anthracobia (incl. Gyromitra subg. Pseudoverpa) on burned soil. Czech Republic, Lecanicillium restrictum from the surface of the wooden barrel, Lecanicillium testudineum from scales of Trachemys scripta elegans. Ecuador, Entoloma yanacolor and Saproamanita quitensis on soil. France, Lentithecium carbonneanum from submerged decorticated Populus branch. Hungary, Pleuromyces hungaricus (incl. Pleuromyces ge...
Named Data Networking (NDN) is one of the future envisioned networking paradigm used to provide fast and efficient content dissemination with interest-based content retrieval, name-based routing and in-network content caching. On the one hand, this new breed of future Internet architecture is becoming a key technology for data dissemination in the IoT networks; on the other hand, NDN suffers from new challenges in terms of data security. Among them, a content poisoning attack is the most common data security challenge. The aim of this attack is to inject poisoned content with an invalid signature to the network. Therefore, to prevent NDN against possible content poisoning attack, a signature of the contents is appended to each data packet for verifications. In this paper, we propose an identity-based signature scheme for IoT-based NDN networks, with a special emphasis on content integrity and authenticity. The proposed scheme is based on the concept of the Hyperelliptic curves, which provide the same level of security as Rivest-Shamir-Adleman (RSA), Bilinear pairing and Elliptic Curve Cryptosystems (ECC) with lower-key size. The proposed scheme is subject to both formal and informal security analysis in order to show the feasibility of our scheme. Finally, the performance of the proposed scheme is analyzed via comparison with the relevant existing schemes that authenticates the superiority of our scheme in terms of security and efficiency. INDEX TERMS Content poisoning attack, named data networking (NDN), Internet of Things, identity-based signature.
A smart grid is a new ecosystem, which is made by combining a number of smart Internet of Things (IoT) devices that manage wide energy sources by increasing the efficiency and reliability of the smart energy systems. As the IoT devices in the smart grid ecosystem generate a gigantic amount of data that needs to be stored and managed in the cloud server. On the other hand, the stored data in the cloud server can be accessible to a number of data users, therefore the data need authenticity and secrecy. Here, to fulfill the security requirements of such type of communication, signcryption with proxy re-encryption technique is the most suitable option where a semi-trusted third party can alter a ciphertext that has been encrypted for one user into another ciphertext without seeing the original content of the message. However, the existing signcryption with proxy re-encryption schemes for the smart grid environment is suffering from more bandwidth space and greater computational time requirements. Thus, in this paper, we propose a lightweight certificate-based signcryption with a proxy re-encryption (CBSRE) scheme for smart grid based-IoT devices with the intention of reducing the computational and communicational costs. For the security and efficiency of the proposed CBSRE scheme, we used a hyperelliptic curve cryptosystem that uses small parameters with a key size of 80-bits. Furthermore, the proposed scheme provides the security requirements of confidentiality (IND-CBSRE-CCA2-I and IND-CBSRE-CCA2-II), unforgeability (EUF-CBSRE-CMA-I and EUF-CBSRE-CMA-II) and forward secrecy. Additionally, we compared our proposed CBSRE scheme with the existing proxy signcryption with re-encryption schemes and the final results show that the new scheme provides strong security with the expanse of minimal computational and communications resources.
Data analytics, machine intelligence, and other cognitive algorithms have been employed in predicting various types of diseases in health care. The revolution of artificial neural networks (ANNs) in the medical discipline emerged for data-driven applications, particularly in the healthcare domain. It ranges from diagnosis of various diseases, medical image processing, decision support system (DSS), and disease prediction. The intention of conducting the research is to ascertain the impact of parameters on diabetes data to predict whether a particular patient has a disease or not. This paper develops an improved ANN model trained using an artificial backpropagation scaled conjugate gradient neural network (ABP-SCGNN) algorithm to predict diabetes effectively. For validating the performance of the proposed model, we conduct a large set of experiments on a Pima Indian Diabetes (PID) dataset using accuracy and mean squared error (MSE) as evaluation metrics. We use different number of neurons in the hidden layer, ranging from 5 to 50, to train the ANN models. The experimental results show that the ABP-SCGNN model, containing 20 neurons, attains 93% accuracy on the validation set, which is higher than using the other ANNs models. This result confirms the model’s effectiveness and efficiency in predicting diabetes disease from the required data attributes.
Recently, Named Data Networking (NDN) has emerged as a popular and active Internet architecture that addresses the issues of current host-centric communication. NDN is well suited for Internet of Things (IoT) which possesses massive applications that dominate the Internet today. It intends to provide named-based routing, in-networking caching, built-in mobility and multicast support as part of its design which leads to a substantial improvement in content delivery/retrieval. Though, this new architecture aches from some new challenges in terms of security. In this article, we seek our attention towards Content Poisoning Attack (CPA). The purpose of CPA is to inject poisoned content with an invalid signature into the NDN-based IoT networks. Unfortunately, none of the existing proposals work effectively when malicious attackers compromise the caches of NDN routers. To prevent this, we proposed a certificateless signature scheme for the preservation of CPA in NDN-based IoT networks. The proposed scheme is formally secure under the security hardness of Hyperelliptic Curve Discrete Logarithm Problem (HCDLP) with a security simulation/validation in "Automated Validation of Internet Security Protocols and Applications (AVISPA)". Besides, the formal proof we also compared the designed scheme with some existing solutions to show the cost-efficiency in terms of communication overhead and computation cost. To conclude, a robust deployment on NDN-based IoT networks is shown.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.