IDR @ IIT Bhubaneswar

Permanent URI for this communityhttps://idr.iitbbs.ac.in/handle/2008/1

Browse

Search Results

Now showing 1 - 10 of 2563
  • Thumbnail Image
    Item
    Annual Report 2016-17
    (IIT Bhubaneswar, 2017) IIT Bhubaneswar
  • Thumbnail Image
    Item
    Annual Report 2015-16
    (IIT Bhubaneswar, 2016) IIT Bhubaneswar
  • Thumbnail Image
    Item
    Annual Report 2014-15
    (IIT Bhubaneswar, 2015) IIT Bhubaneswar
  • Thumbnail Image
    Item
    Annual Report 2013-14
    (IIT Bhubaneswar, 2014) IIT Bhubaneswar
  • Thumbnail Image
    Item
    Annual Report 2012-13
    (IIT Bhubaneswar, 2013) IIT Bhubaneswar
  • Thumbnail Image
    Item
    Annual Report 2011-12
    (IIT Bhubaneswar, 2012) IIT Bhubaneswar
  • Thumbnail Image
    Item
    Annual Report 2010-11
    (IIT Bhubaeswar, 2011) IIT Bhubaneswar
  • Thumbnail Image
    Item
    Annual Report 2009-10
    (IIT Bhubaneswar, 2010) IIT Bhubaneswar
  • Item
    Securing implantable medical devices with runtime enforcement hardware
    (2019) Pearce H.; Kuo M.M.Y.; Roop P.S.; Pinisetty S.
    In recent years we have seen numerous proof-of-concept attacks on implantable medical devices such as pacemakers. Attackers aim to breach the strict operational constraints that these devices operate within, with the end-goal of compromising patient safety and health. Most efforts to prevent these kinds of attacks are informal, and focus on application- and system-level security-for instance, using encrypted communications and digital certificates for program verification. However, these approaches will struggle to prevent all classes of attacks. Runtime verification has been proposed as a formal methodology for monitoring the status of implantable medical devices. Here, if an attack is detected a warning is generated. This leaves open the risk that the attack can succeed before intervention can occur. In this paper, we propose a runtime-enforcement based approach for ensuring patient security. Custom hardware is constructed for individual patients to ensure a safe minimum quality of service at all times. To ensure correctness we formally verify the hardware using a model-checker. We present our approach through a pacemaker case study and demonstrate that it incurs minimal overhead in terms of execution time and power consumption. � 2019 Association for Computing Machinery.
  • Item
    Modelling the major stream delay due to U-turns
    (2019) Mohanty M.; Dey P.P.
    This study assesses the delay faced by approaching through vehicles at uncontrolled median openings due to U-turning movement. Under limited priority situation, the U-turning vehicles accept smaller gaps which compel the through vehicles to reduce their speeds and experience delays. First, the slowdown section is identified and the delay faced by through vehicles from the starting of slowdown section to start of median opening is estimated. This is termed as approach delay. The approaching vehicles shift laterally as they approach toward the median opening. The concept of zone has been introduced to study this lateral movement. This study shows that the vehicles moving through the zone adjacent to curb face more delay as compared to the vehicles moving through the zone adjacent to median. Finally, a regression model is developed for estimating approach delay faced by any vehicle category traveling through a particular zone at a given U-turning traffic volume. � 2017, � 2017 Informa UK Limited, trading as Taylor & Francis Group.