Radio Frequency Identification Authentication Protocols (RFID APs) are an active research topic and many protocols have been proposed. In this paper, we consider a class of recently proposed lightweight RFID authentication protocols: CRAP, LCAP, OHLCAP, O-TRAP, YA-TRAP, and YA-TRAP+, which are claimed to be resistant to conventional attacks and suitable for low cost RFID device scenarios. We examine them using GNY logic to determine whether they can be proved to have achieved their protocol goals. We show that most of them meet their goals, though some do not. Furthermore this approach enables us to identify similarities and subtle differences among these protocols. Finally, we offer guidelines on when it is necessary to use encryption rather than hash functions in the design of RFID authentication protocols.
This paper presents a procedure to coordinated design of Power System Stabilizers (PSSs) and Static VAR Compensators (SVCs) in a multimachine power system. The aims of the proposed method are to find the best location and the optimal parameters of these compensators in order to improve the steady state and transient performances and also to increase the system damping over a wide range of operating conditions. The objective function of the Genetic Algorithm (GA) allows the selection of the PSSs and SVCs to shift critical closed loop eigenvalues to the left side in the complex s-plane. The multimachine power system considered in this study consists of nine buses, three generating units (steam, hydro and nuclear) and three static loads. Digital simulation studies show that the proposed design procedure provides good damping for the power system at different operating conditions, and moreover improves steady-state and transient performance of the system.
This paper presents penetration attacks and abduction drills conducted in a healthcare facility relying on RFID security system to prevent infant abduction and patient wander. The objective is to provide a better understanding to the limitations and weaknesses existing in the current used technology that is applied in different hospitals, and to provide guidelines for healthcare facility administration to change their policies in a way that cover vulnerabilities that exist in the current RFID security systems.
Hospital facilities use a collection of heterogeneous devices, produced by many different vendors, to monitor the state of patient vital signs. The limited interoperability of current devices makes it difficult to synthesize multivariate monitoring data into a unified array of real-time information regarding the patients state. Without an infrastructure for the integrated evaluation, display, and storage of vital sign data, one cannot adequately ensure that the assignment of caregivers to patients reflects the relative urgency of patient needs. This is an especially serious issue in critical care units (CCUs). We present a formal mathematical model of an operational critical care unit, together with metrics for evaluating the systematic impact of caregiver scheduling decisions on patient care. The model is rich enough to capture the essential features of device and patient diversity, and so enables us to test the hypothesis that integration of vital sign data could realistically yield a significant positive impact on the efficacy of critical care delivery outcome. To test the hypothesis, we employ the model within a computer simulation. The simulation enables us to compare the current scheduling processes in widespread use within CCUs, against a new scheduling algorithm that makes use of an integrated array of patient information collected by an (anticipated) vital sign data integration infrastructure. The simulation study provides clear evidence that such an infrastructure reduces risk to patients and lowers operational costs, and in so doing reveals the inherent costs of medical device non-interoperability.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.