Between June and September, 1986, an outbreak of measles occurred in Pilkhi Primary Health Centre area (population 56,000) in Tehri Garhwal district, Uttar Pradesh, India. Overall, 1092 cases were identified and 62 died; case-fatality ratio was 5.7%. Illness was restricted primarily to children below 15 years of age; 38% cases were in children under 5 and 58% between 5-14 years of age. To better characterize the outbreak, a survey was conducted in 13 affected villages. The age of the cases ranged from 5 months to 19 years (median = 7.0 years). The age-specific attack rates were 22.4%, 54.5%, 46.2% and 35.3% for children under 1, 1-4, 5-9, 10-14 years of age respectively. In as many as four villages, the attack rate in children below ten was 80% or more. Secondary attack rate among family members was 70%. Overall, 82% of children with measles developed complications which consisted mainly of pneumonia, diarrhoea and dysentery. The age-specific case-fatality ratios in infants and children 1-4 years of age were 23.1% and 11.5% respectively; thereafter the rates tended to decline with increasing age and was higher in females than in males (less than 0.05). Pneumonia which was a complication in 39% of measles cases contributed to 56% of deaths. Traditional beliefs and customs in the area were strong and did not encourage treatment of measles cases. Although a measles vaccination programme has been launched in India since 1985, only 30 districts could be covered during the first year and another 90 during 1986.(ABSTRACT TRUNCATED AT 250 WORDS)
In recent years, small computing devices like embedded devices, wireless sensors, RFID tags (Radio Frequency Identification), Internet of Things (IoT) devices are increasing rapidly. They are expected to generate massive amount of sensitive data for controlling and monitoring purposes. But their resources and capabilities are limited. Those also work with valuable private data thus making security of those devices of paramount importance. Therefore, a secure encryption algorithm should be there to protect those vulnerable devices. Conventional encryption ciphers like RSA or AES are computationally expensive; require large memory but hinder performances of those devices. Simple encryption techniques, on the other hand are easy to crack, compromising security. In this paper a secure and efficient lightweight cryptographic algorithm for small computing devices has been proposed. It is a symmetric key block cipher, employing custom substitution-permutation (SP) network and a modified Feistel architecture. Two basic concepts from Genetic algorithm are used. A Linux based benchmark tool, FELICS is used for the measurement and MATLAB for the purpose of encryption quality testing. An improvement over the existing algorithm, the proposed algorithm reduces the use of processing cycles but at the same time provides sufficient security.
Internet security has become a major concern with the growing use of the Internet of Things (IoT) and edge computing technologies. Even though data processing is handled by the edge server, sensitive data is generated and stored by the IoT devices, which are subject to attack. Since most IoT devices have limited resources, standard security algorithms such as AES, DES, and RSA hamper their ability to run properly. In this paper, a lightweight symmetric key cipher termed randomized butterfly architecture of fast Fourier transform for key (RBFK) cipher is proposed for resource-constrained IoT devices in the edge computing environment. The butterfly architecture is used in the key scheduling system to produce strong round keys for five rounds of the encryption method. The RBFK cipher has two key sizes: 64 and 128 bits, with a block size of 64 bits. The RBFK ciphers have a larger avalanche effect due to the butterfly architecture ensuring strong security. The proposed cipher satisfies the Shannon characteristics of confusion and diffusion. The memory usage and execution cycle of the RBFK cipher are assessed using the fair evaluation of the lightweight cryptographic systems (FELICS) tool. The proposed ciphers were also implemented using MATLAB 2021a to test key sensitivity by analyzing the histogram, correlation graph, and entropy of encrypted and decrypted images. Since the RBFK ciphers with minimal computational complexity provide better security than recently proposed competing ciphers, these are suitable for IoT devices in an edge computing environment.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.