Academic literature on the topic 'Secure device enrollment'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Secure device enrollment.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Secure device enrollment":

1

Ali-Pour, Amir, David Hely, Vincent Beroulle, and Giorgio Di Natale. "Strong PUF Enrollment with Machine Learning: A Methodical Approach." Electronics 11, no. 4 (February 19, 2022): 653. http://dx.doi.org/10.3390/electronics11040653.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Physically Unclonable Functions (PUFs) have become ubiquitous as part of the emerging cryptographic algorithms. Strong PUFs are also predominantly addressed as the suitable variant for lightweight device authentication and strong single-use key generation protocols. This variant of PUF can produce a very large number of device-specific unique identifiers (CRPs). Consequently, it is infeasible to store the entire CRP space of a strong PUF into a database. However, it is potential to use Machine Learning to provide an estimated model of strong PUF for enrollment. An estimated model of PUF is a compact solution for the designer’s community, which can provide access to the full CRP space of the PUF with some probability of erroneous behavior. To use this solution for enrollment, it is crucial on one hand to ensure that PUF is safe against a model-building attack. On the other hand, it is important to ensure that the ML-based enrollment will be performed efficiently. In this work, we discuss these factors, and we present a formalized procedure of ML-based modeling of PUF for enrollment. We first define a secure sketch which allows modelability of PUF only for a trusted party. We then highlight important parameters which constitute the cost of enrollment. We show how an ML-based enrollment procedure should use these parameters to evaluate the enrollment cost prior to enrolling a large group of PUF-enabled devices. We introduce several parameters as well to control ML-based modeling in favor of PUF enrollment with minimum cost. Our proposed ML-based enrollment procedure can be considered a starting point to develop enrollment solutions for protocols which use an estimated model of PUF instead of a CRP database. In the end, we present a use-case of our ML-based enrollment method to enroll 100 instances of 2-XOR Arbiter PUFs and discuss the evaluative outcomes.
2

Gómez-Marín, Ernesto, Luis Parrilla, Gianfranco Mauro, Antonio Escobar-Molero, Diego P. Morales, and Encarnación Castillo. "RESEKRA: Remote Enrollment Using SEaled Keys for Remote Attestation." Sensors 22, no. 13 (July 5, 2022): 5060. http://dx.doi.org/10.3390/s22135060.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
This paper presents and implements a novel remote attestation method to ensure the integrity of a device applicable to decentralized infrastructures, such as those found in common edge computing scenarios. Edge computing can be considered as a framework where multiple unsupervised devices communicate with each other with lack of hierarchy, requesting and offering services without a central server to orchestrate them. Because of these characteristics, there are many security threats, and detecting attacks is essential. Many remote attestation systems have been developed to alleviate this problem, but none of them can satisfy the requirements of edge computing: accepting dynamic enrollment and removal of devices to the system, respecting the interrupted activity of devices, and last but not least, providing a decentralized architecture for not trusting in just one Verifier. This security flaw has a negative impact on the development and implementation of edge computing-based technologies because of the impossibility of secure implementation. In this work, we propose a remote attestation system that, through using a Trusted Platform Module (TPM), enables the dynamic enrollment and an efficient and decentralized attestation. We demonstrate and evaluate our work in two use cases, attaining acceptance of intermittent activity by IoT devices, deletion of the dependency of centralized verifiers, and the probation of continuous integrity between unknown devices just by one signature verification.
3

Lalitha, V., and J. K. Periasamy. "Mobile based secured student online exam system." International Journal of Engineering & Technology 7, no. 1.7 (February 5, 2018): 118. http://dx.doi.org/10.14419/ijet.v7i1.7.9588.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Mobile learning is a technology which uses wireless networks and mobile for learning. It facilitates learners to unite their experiences in learning in a collaborative and shared environment. Due to the widespread adoption and use of handheld devices, the mobile application technologies in enhancing learning activities have attracted noteworthy research interest. A Secure Exam Management System (SEMS) is designed for mobile environment and to simplify the exam management system. The teachers will define a bank of exam questions and link them to his/her subject through an appropriate interface (Subject‘s Question Bank Interface). The students can enter the exam system at the pre-defined date and time through the Exam Enrollment Interface. The students scan the QR code in the electronic device (Mobile/tablet) and then view an exam question in the same interface. Asthe school Wi-Fi network is connected to the students mobile or tablet, turning the network down during exams canavoid malpractice. Multifactor authentication can be adopted for stronger security.
4

O’Brien, Daniel F., Lilah Fones, Victoria Stoj, Cory Edgar, Katherine Coyner, and Robert A. Arciero. "Confirming Proper Button Deployment of Suspensory Fixation During ACL Reconstruction." Orthopaedic Journal of Sports Medicine 9, no. 1 (January 1, 2021): 232596712097434. http://dx.doi.org/10.1177/2325967120974349.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Background: Suspensory fixation of anterior cruciate ligament (ACL) reconstruction (ACLR) grafts has emerged as a popular device for femoral graft fixation. However, improper deployment of the suspensory fixation can compromise proper graft tensioning, leading to failure and revision. Also, soft tissue interposition between the button and bone has been associated with graft migration and pain, occasionally requiring revision surgery. Many surgeons rely on manual testing and application of distal tension to the graft to confirm proper button deployment on the lateral cortex of the femur for ACL graft fixation. Purpose: To determine the reliability of the manual resistance maneuver when applying distal tension to deploy the suspensory device along the lateral cortex of the femur. Study Design: Case series; Level of evidence, 4. Methods: All patients undergoing ACLR with a suture button suspensory device for femoral fixation were eligible for enrollment in the study. The surgeries were performed by 3 board-certified, sports medicine fellowship–trained orthopaedic surgeons at a single outpatient surgical center between May 2018 and June 2019. All grafts were passed in a retrograde manner into the femoral tunnel, and a vigorous manual tensioning maneuver in a distal direction was placed on the graft to deploy and secure along the lateral cortex of the femur. Intraoperative mini c-arm fluoroscopy was obtained to demonstrate proper suture button positioning. If interposing tissue or an improperly flipped button was identified, rectifying steps were undertaken and recorded. Results: A total of 51 patients with a mean age of 33.3 years were included in the study. Of these patients, 74.5% had normal suture button positioning identified via intraoperative fluoroscopic imaging, while 15.7% had interposed soft tissue and 9.8% had an improperly flipped button. In all cases, the surgeon was able to rectify the malpositioning intraoperatively. Conclusion: Despite the manual sensation of proper suspensory button positioning, intraoperative fluoroscopy identified suture button deployment errors in ACLR 25% of the time. Correcting the malpositioning is not technically demanding. These findings advocate for routine intraoperative surveillance to confirm appropriate suture button seating during ACLR.
5

Soumpasis, Ilias, Samer Nashef, Joel Dunning, Paul Moran, and Mark Slack. "Safe implementation of surgical innovation: a prospective registry of the Versius Robotic Surgical System." BMJ Surgery, Interventions, & Health Technologies 5, no. 1 (February 2023): e000144. http://dx.doi.org/10.1136/bmjsit-2022-000144.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
ObjectivesTo describe a new, international, prospective surgical registry developed to accompany the clinical implementation of the Versius Robotic Surgical System by accumulating real-world evidence of its safety and effectiveness.InterventionsThis robotic surgical system was introduced in 2019 for its first live-human case. With its introduction, cumulative database enrollment was initiated across several surgical specialties, with systematic data collection via a secure online platform.Main outcome measuresPre-operative data include diagnosis, planned procedure(s), characteristics (age, sex, body mass index and disease status) and surgical history. Peri-operative data include operative time, intra-operative blood loss and use of blood transfusion products, intra-operative complications, conversion to an alternative technique, return to the operating room prior to discharge and length of hospital stay. Complications and mortality within 90 days of surgery are also recorded.ResultsThe data collected in the registry are analyzed as comparative performance metrics, by meta-analyses or by individual surgeon performance using control method analysis. Continual monitoring of key performance indicators, using various types of analyses and outputs within the registry, have provided meaningful insights that help institutions, teams and individual surgeons to perform most effectively and ensure optimal patient safety.ConclusionsHarnessing the power of large-scale, real-world registry data for routine surveillance of device performance in live-human surgery from first use will enhance the safety and efficacy outcomes of innovative surgical techniques. Data are crucial to driving the evolution of robot-assisted minimal access surgery while minimizing risk to patients.Trial registration numberCTRI/2019/02/017872.
6

Oldenburg, Johannes, María Teresa Alvarez Román, Giancarlo Castaman, Maissaa Janbain, Tadashi Matsushita, Karina Meijer, Sabine Friedl, Martin Sanabria, and Mark Reding. "Real-World Effectiveness and Safety of BAY 94-9027 (Damoctocog Alfa Pegol) in Previously Treated Patients with Hemophilia A (HEM-POWR): Online Patient Portal and LIFE-ACTIVE Sub-Study." Blood 134, Supplement_1 (November 13, 2019): 4943. http://dx.doi.org/10.1182/blood-2019-128140.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Background and Rationale: BAY 94-9027 (damoctocog alfa pegol) is a site-specifically PEGylated B-domain deleted recombinant factor VIII (FVIII) with an extended half-life, approved for prophylaxis or treatment of bleeds in previously treated patients (PTPs) aged ≥12 with hemophilia A. The efficacy and safety of BAY 94-9027 was demonstrated in two phase II/III clinical studies in PTPs with severe hemophilia A, however, real-world data are still being gathered. The aim of the HEM-POWR study is to assess the effectiveness and long-term safety of BAY 94-9027 in the real-world clinical setting. Patients will be introduced to an online patient portal that provides study information as well as access to eDiaries and electronic patient-reported outcomes (ePROs) to patients to facilitate retention over the duration of the study. Patients will also be given the opportunity to participate in LIFE-ACTIVE, a sub-study analyzing the relationship between the patients' regular daily activity and the efficacy parameters collected during HEM-POWR. Here we present the features of the patient portal and describe the LIFE-ACTIVE sub-study design. Study Design and Methods: HEM-POWR (NCT03932201) is a multinational, multicenter, non-interventional, open-label, prospective, phase IV, cohort study. It aims to enroll ≥200 PTPs with hemophilia A receiving BAY 94-9027 (on-demand, prophylaxis, or intermittent prophylaxis [as per local label]). Key exclusion criteria are presence or history of FVIII inhibitor (≥0.6 Bethesda units), diagnosis of any bleeding or coagulation disorder other than hemophilia A, or treatment with immune tolerance induction at enrollment. The primary objective of HEM-POWR is to assess the effectiveness of prophylaxis with BAY 94-9027 in the real-world setting through the collection of total bleeding events and analysis of annualized bleeding rate. Secondary objectives include long-term safety, joint health, location and number of target joints, hemostasis during surgery and PROs. Patient enrollment, adherence and retention can be difficult in observational hemophilia studies. The patient portal for this study aims to overcome these challenges by providing study- and product-related information. It also aims to lessen the burden for patients in the study by providing e-solutions to collect their study data, including the ability to complete the study diary, and PRO measures online. The portal also includes videos explaining the study and study procedures, and is country-customized with links to relevant websites. Patients participating in LIFE-ACTIVE will be asked to wear an ActiGraph CP Insight activity-tracking smart watch continually for four 30-day periods, at their initial visit and then at months 12, 24 and 36. Measurements recorded will include physical activity intensity and duration, general mobility, and sleep quality and duration. All data will be transferred to a secure, cloud-based system and patients will not be aware of the values measured by the device. Participating countries include, but may not be limited to Austria, Belgium/Luxemburg, Canada, Colombia, Finland, Germany, Greece, Italy, Japan, Netherlands, Portugal, Saudi Arabia, Denmark, Norway, Sweden, Slovenia, Spain, Switzerland, Taiwan, and USA. The study will run from 2019 until 2025, with an observation period of ≥60 months. Disclosures Oldenburg: Octapharma: Consultancy, Research Funding, Speakers Bureau; NovoNordisk: Consultancy, Honoraria, Research Funding; Bayer: Consultancy, Research Funding, Speakers Bureau; Grifols: Consultancy, Speakers Bureau; Pfizer: Consultancy, Speakers Bureau; Roche: Consultancy, Speakers Bureau; CSL Behring: Consultancy, Research Funding, Speakers Bureau; Takeda (Shire): Consultancy, Research Funding, Speakers Bureau; Chugai: Consultancy, Speakers Bureau; Biotest: Consultancy, Research Funding, Speakers Bureau; Swedish Orphan Biovitrum: Consultancy, Speakers Bureau. Alvarez Román:CSL Behring: Speakers Bureau; Amgen: Speakers Bureau; Novartis: Speakers Bureau; Sobi: Speakers Bureau; Bayer: Speakers Bureau; Novo Nordisk: Speakers Bureau; Roche: Speakers Bureau; Shire (Takeda): Research Funding, Speakers Bureau. Castaman:Shire: Speakers Bureau; Uniqure Kedrion: Speakers Bureau; Pfizer: Research Funding; CSL Behring: Research Funding, Speakers Bureau; Bayer: Speakers Bureau; Novo Nordisk: Speakers Bureau; Roche: Consultancy, Honoraria, Speakers Bureau; Sobi: Research Funding, Speakers Bureau. Janbain:Shire (Vonvendi): Speakers Bureau; Genentech: Consultancy, Honoraria; Bayer: Consultancy, Honoraria; CSL Behring: Consultancy, Honoraria; Shire: Consultancy, Honoraria; HTRS-MRA (Bioverativ Sanofi): Research Funding. Matsushita:uniQure: Consultancy, Honoraria; CSL: Consultancy, Honoraria; Bioverative: Research Funding; Pfizer: Consultancy, Honoraria; KM biologists: Consultancy, Honoraria, Research Funding; Novo Nordisk: Consultancy, Honoraria. Meijer:Sanquin: Research Funding; Pfizer, Sanquin, Uniqure: Research Funding; Uniqure, BMS, Aspen, Boehringer Ingelheim, Sanquin, Bayer: Consultancy, Honoraria; Bayer: Research Funding. Sanabria:Bayer: Employment. Reding:Novo Nordisk: Consultancy, Honoraria, Speakers Bureau; Bayer: Consultancy, Honoraria, Research Funding, Speakers Bureau; Sanofi Genzyme: Consultancy, Honoraria, Speakers Bureau; Biomarin: Research Funding; Takeda: Consultancy, Honoraria, Speakers Bureau.
7

Chen, Yanjiao, Meng Xue, Jian Zhang, Qianyun Guan, Zhiyuan Wang, Qian Zhang, and Wei Wang. "ChestLive." Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 5, no. 4 (December 27, 2021): 1–25. http://dx.doi.org/10.1145/3494962.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Voice-based authentication is prevalent on smart devices to verify the legitimacy of users, but is vulnerable to replay attacks. In this paper, we propose to leverage the distinctive chest motions during speaking to establish a secure multi-factor authentication system, named ChestLive. Compared with other biometric-based authentication systems, ChestLive does not require users to remember any complicated information (e.g., hand gestures, doodles) and the working distance is much longer (30cm). We use acoustic sensing to monitor chest motions with a built-in speaker and microphone on smartphones. To obtain fine-grained chest motion signals during speaking for reliable user authentication, we derive Channel Energy (CE) of acoustic signals to capture the chest movement, and then remove the static and non-static interference from the aggregated CE signals. Representative features are extracted from the correlation between voice signal and corresponding chest motion signal. Unlike learning-based image or speech recognition models with millions of available training samples, our system needs to deal with a limited number of samples from legitimate users during enrollment. To address this problem, we resort to meta-learning, which initializes a general model with good generalization property that can be quickly fine-tuned to identify a new user. We implement ChestLive as an application and evaluate its performance in the wild with 61 volunteers using their smartphones. Experiment results show that ChestLive achieves an authentication accuracy of 98.31% and less than 2% of false accept rate against replay attacks and impersonation attacks. We also validate that ChestLive is robust to various factors, including training set size, distance, angle, posture, phone models, and environment noises.
8

Offodile, Anaeze C., Sandra R. DiBrito, Janice P. Finder, Sanjay Shete, Sanchita Jain, Domenica A. Delgado, Christopher J. Miller, Elenita Davidson, Michael J. Overman, and Susan K. Peterson. "Active surveillance of chemotherapy-related symptom burden in ambulatory cancer patients via the implementation of electronic patient-reported outcomes and sensor-enabled vital signs capture: protocol for a decentralised feasibility pilot study." BMJ Open 12, no. 4 (April 2022): e057693. http://dx.doi.org/10.1136/bmjopen-2021-057693.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
IntroductionRemote patient monitoring (RPM) has emerged as a potential avenue for optimising the management of symptoms in patients undergoing chemotherapy. However, RPM is a complex, multilevel intervention with technology, workflow, contextual and patient experience components. The purpose of this pilot study is to determine the feasibility of RPM protocol implementation with respect to decentralised recruitment, patient retention, adherence to reporting recommendations, RPM platform usability and patient experience in ambulatory cancer patients at high risk for chemotherapy-related symptoms.Methods and analysisThis protocol describes a single-arm decentralised feasibility pilot study of technology-enhanced outpatient symptom management system in patients with gastrointestinal and thoracic cancer receiving chemotherapy and cancer care at a single site (MD Anderson Cancer Center, Houston Texas). An anticipated total of 25 patients will be recruited prior to the initiation of chemotherapy and provided with a set of validated questionnaires at enrollment and after our 1-month feasibility pilot trial period. Our intervention entails the self-reporting of symptoms and vital signs via a HIPAA-compliant, secure tablet interface that also enables (1) the provision of self-care materials to patients, (2) generation of threshold alerts to a dedicated call-centre and (3) videoconferencing. Vital sign information (heart rate, blood pressure, pulse, oxygen saturation, weight and temperature) will be captured via Bluetooth-enabled biometric monitoring devices which are integrated with the tablet interface. Protocolised triage and management of symptoms will occur in response to the alerts. Feasibility and acceptability metrics will characterise our recruitment process, protocol adherence, patient retention and usability of the RPM platform. We will also document the perceived effectiveness of our intervention by patients.Ethics and disseminationThis study has been granted approval by the institutional review board of MD Anderson Cancer Center. We anticipate dissemination of our pilot and subsequent effectiveness trial results via presentations at national conferences and peer-reviewed publications in the relevant medical journals. Our results will also be made available to cancer survivors, their caregivers and hospital administration.Trial registration numberNCI202107464.
9

Munoz, Tomas, Palakkumar Patel, Shilpa Viswanath, and Bharati Prasad. "657 Patient Perspectives on Telesleep Care in COVID Times: An Urban Teaching Hospital Survey." Sleep 44, Supplement_2 (May 1, 2021): A257. http://dx.doi.org/10.1093/sleep/zsab072.655.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Abstract Introduction Telehealth is a relatively new tool for patient care, and to reach underserved areas where certain specialties are available. With the advent of the COVID19 pandemic, Telehealth has become a universal way to provide safe and quality patient care. However, Telehealth is a new experience for many providers and patients. We surveyed patients who received telehealth visits in sleep medicine between March and June 2020 to determine patient satisfaction and common technology-related barriers. The goal was to formulate actionable steps for improving patient’s experiences and determine the feasibility of long-term telehealth services for sleep medicine. Methods We interviewed 63 patients by phone, utilizing IRB approved surveys for telehealth satisfaction and technology. Responses were de-identified, tabulated, and analyzed in aggregate using Excel®. Results 85% of respondents had a high-school diploma or a higher level of education (9.6% students, 39.7% employed, 15.9% unemployed, and 19% retirees). 62% of participants participated in Telehealth for the first time. 89% preferred Telehealth, and 76% rated telehealth experience as good or better than in-person visits. 92% did not require technical assistance during the visit. Long-term telehealth care was acceptable to 63% of participants. Approximately 33% had technology-related barriers (no computer or webcam), and 12% did not have email. However, 89% had smartphones (70% connected to personal internet). Other barriers cited were lack of private space (13%) and taking time off work (9%). No clear preference for phone versus video Telehealth was noted (approximately 40% each), but 7% expressed concern about bi-directional video communication. This may be related to the privacy and security concerns expressed by 20% of respondents. However, only 5% reported using the electronic health record (EHR) based secure communication portal. Conclusion Sleep care via Telehealth is preferred by most patients during the COVID pandemic and is acceptable to two-thirds of patients for the long-term. In addition to access to personal devices or the internet, privacy concerns were a barrier to Telehealth. We plan to increase patient enrollment in the EHR-based portal to deliver telehealth services and communication securely to mitigate these barriers. Support (if any):
10

Fraiwan, Arwa, Muhammad Noman Hasan, Ran An, Amy J. Rezac, Nicholas J. Kocmich, Tolulope Oginni, Grace Mfon Olanipekun, et al. "Advancing Healthcare Outcomes for Sickle Cell Disease in Nigeria Using Mobile Health Tools." Blood 134, Supplement_1 (November 13, 2019): 2173. http://dx.doi.org/10.1182/blood-2019-131344.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Nigeria leads the world in the number of cases of sickle cell disease (SCD). An estimated 150,000 babies are born annually in Nigeria with SCD, a heredity disorder, and 70-90% die before age 5. Only a small portion of affected infants and children in sub Saharan Africa (SSA) reach adolescence. Over 650 children die per day in sub-Saharan Africa from SCD. These dismal statistics are in sharp contrast to outcomes in high-income countries (HICs) where more than 90% of SCD patients reach adulthood. The World Health Organization (WHO) estimates that 70% of deaths could be prevented with a low cost diagnostic and treatment plan. Meaningful preventive care and treatment cannot be implemented without a structured plan for early diagnosis and patient tracking.Early diagnosis requires improved access to parents and guardians of children with SCD, and gaining this access remains a challenge in most of SSA. In 2015, Nigeria's Kano state government, with support from foreign partners, established a community-based program for newborn registration. This platform provides unique access to newborn babies in one of Nigeria's most populous cities, but still lacks a functioning patient testing, tracking, and monitoring system, which we plan to address in our ongoing study. This study will introduce mobile health in a low-income country with low literacy rate and hopefully accustom that segment of the population to more varied mobile health applications that will ultimately improve their health in the long run. Our current operational platform in Kano, Nigeria provides access to a large population with a high prevalence of SCD. We have previously completed pilot testing of 315 subjects for SCD using our microchip electrophoresis test. We are planning to test up to 4,500 additional subjects less than 5 years of age at Murtala Muhammed Specialist Hospital. The hospital staff includes 97 physicians and 415 nurses and outpatient clinics serve about 30,000 patients monthly. The maternity department has a 200-bed capacity and the antenatal clinic performs about 1,000 deliveries and serves an average of 3,000 mothers monthly. Enrollment is planned to start on September 15, 2019 and medical staff are currently being trained to run the tests. Our study is registered in the United States National Library of Medicine's ClinicalTrials.gov (Identifier: NCT03948516). Our technology is uniquely paired with an automatic reader and an Electronic Medical Record (EMR) and patient management solution to record POC test results, register new cases, and track patients for follow-up (Fig. 1). The reader enables automated interpretation of test results, local and remote test data storage, and includes geolocation (Global Positioning System) (Fig. 2). The system will generate reports for all cases of SCD, track hospital visits, appointments, lab tests, and will have mobile and dashboard applications for tracking patients and samples. The application will be installed on mobile devices provided to users. The proposed system will be compliant with the existing privacy standards to handle medical data (e.g., HIPAA in the US and GDPR in the EU). All communications between the parties will be secured via end-to-end encryption as a safeguard. We anticipate that our project will increase the rates of screening, diagnosis and timely treatment of SCD in Kano State of Nigeria. The project's broader impact will likely be the ability to track and monitor screening, disease detection, diagnosis and treatment, which can be scaled up to the whole nation of Nigeria, then to sub-Saharan Africa. The data obtained and analyzed will be the first of their kind and will be used to inform the design of programs to improve access to, and availability of, effective care for this underserved populations. The importance of increased access to diagnosis and treatment should not be underestimated - it is crucial for realizing effective management of people with SCD. The impact can be enhanced by complementing diagnosis and patient tracking with education for the families so they can provide or seek the necessary preventative treatment. Identification of the location of the patients in need would help identify the areas where family, parent, caregiver education should be provided. Disclosures Fraiwan: Hemex Health, Inc.: Equity Ownership, Patents & Royalties. Hasan:Hemex Health, Inc.: Equity Ownership, Patents & Royalties. An:Hemex Health, Inc.: Patents & Royalties. Thota:Hemex Health, Inc.: Employment. Gurkan:Hemex Health, Inc.: Consultancy, Employment, Equity Ownership, Patents & Royalties, Research Funding.

Dissertations / Theses on the topic "Secure device enrollment":

1

Khalfaoui, Sameh. "Security bootstrapping for Internet of Things." Electronic Thesis or Diss., Institut polytechnique de Paris, 2022. http://www.theses.fr/2022IPPAT023.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
La demande de services qui se basent sur l'Internet des objets (IoT) augmente de manière exponentielle, ce qui entraîne le déploiement d'un grand nombre de dispositifs. Cependant, ces dispositifs peuvent représenter une menace pour la sécurité du réseau de déploiement et un point d'entrée potentiel pour des adversaires. Il existe donc un besoin imminent de réaliser une approche d'association sécurisée des objets connectés avant qu'ils ne soient rendus opérationnels sur le réseau de l'utilisateur. Cette procédure, appelée "amorçage de la sécurité", garantit en premier lieu la confidentialité et l'intégrité des échanges de données entre l'utilisateur et les dispositifs. Ensuite, ce processus fournit une assurance sur l'identité et l'origine de ces objets. La première phase d'appairage assure l'établissement d'un canal de communication sécurisé entre l'utilisation et l'objet. La phase d'appairage utilise un protocole d'accord de clé symétrique qui est adapté à la nature de ces dispositifs à ressources limitées. L'utilisation de canaux auxiliaires a été proposée comme moyen d'authentifier l'échange de clés, mais elle nécessite un temps relativement long et une participation importante de l'utilisateur pour transférer les bits d'authentification. Cependant, les systèmes basés sur le contexte utilisent l'environnement ambiant pour extraire un secret commun sans intervention importante de l'utilisateur, à condition d'avoir un périmètre sécurisé pendant la phase d'extraction, ce qui est considéré comme une hypothèse de sécurité forte. La deuxième phase du processus d'amorçage est appelée "enrôlement sécurisé" et vise à éviter l'association d'un objet IoT malveillant en authentifiant son identité et son origine. L'utilisation d'éléments de sécurité matériels, tels que les fonctions physiques non clonables (PUF), a été présentée comme une solution prometteuse adaptée à la nature limitée des ressources de ces dispositifs. Un nombre croissant d'architectures PUF ont été démontrées mathématiquement clonables grâce à des techniques de modélisation par apprentissage automatique. L'utilisation de modèles de PUF a été récemment proposée pour authentifier les objets IoT. Néanmoins, le scénario de fuite du modèle PUF vers un adversaire en raison d'une menace interne au sein de l'organisation n'est pas pris en charge par les solutions existantes. Par conséquent, la sécurité de ces propositions d'inscription basées sur le modèle PUF peut être compromise. Dans cette thèse, nous étudions le processus d'amorçage de la sécurité des dispositifs à ressources limitées et nous introduisons deux protocole: - Un protocole hybride d'appairage, appelé COOB, qui combine d'une manière efficace un schéma d'appairage contextuel avec l'utilisation d'un canal auxiliaire. Ce protocole exploite une technique d'exponentiation spécifique des clés publiques Diffie-Hellman en utilisant des nonces pour atteindre l'objectif de secret temporaire nécessaire à l'accord de clé. Notre méthode assure la sécurité même contre un attaquant qui peut contrôler la zone de sécurité (un environnement hostile), ce qui n'est pas pris en charge par les schémas contextuels existants. Cette amélioration de la sécurité a été formellement validée dans le modèle symbolique en utilisant l'outil de vérification formelle TAMARIN. - Une solution d'enrôlement qui exploite un modèle de PUF dans le processus d'authentification, appelé Water-PUF. Notre protocole est basé sur une technique de tatouage numérique spécialement conçue pour les modèles PUF. Cette procédure empêche un adversaire de s'appuyer sur le modèle tatoué ou sur un autre modèle dérivé pour contourner l'authentification. Par conséquent, toute fuite du modèle PUF filigrané utilisé pour l'enrôlement n'affecte pas l'exactitude du protocole. La conception du Water-PUF est validée par un certain nombre de simulations contre de nombreuses attaques de suppression de tatouage numérique afin d'évaluer la robustesse de notre proposition
The demand for internet of Things (IoT) services is increasing exponentially, and a large number of devices are being deployed. However, these devices can represent a serious threat to the security of the deployment network and a potential entry-point when exploited by the adversaries. Thus, there is an imminent need to perform a secure association approach of the IoT objects before being rendered operational on the network of the user. This procedure is referred to as secure bootstrapping, and it primarily guarantees the confidentiality and the integrity of the data exchanges between the user and the devices. Secondly, this process provides an assurance on the identity and the origin of these objects.Due to scalability limitations, the first phase of the bootstrapping process cannot be efficiently conducted using pre-shared security knowledge such as digital certificates. This step is referred to as secure device pairing, and it ensures the establishment of a secure communication channel between the use and the object. The pairing phase uses a symmetric key agreement protocol that is suitable to the resource-constrained nature of these devices. The use of auxiliary channels has been proposed as a way to authenticate the key exchange, but they require a relatively long time and an extensive user involvement to transfer the authentication bits. However, the context-based schemes use the ambient environment to extract a common secret without an extensive user intervention under the requirement of having a secure perimeter during the extraction phase, which is considered a strong security assumption. The second phase of the bootstrapping process is referred to as secure device enrollment, and it aims at avoiding the associating of a malicious IoT object by authenticating its identity. The use of hardware security elements, such as the Physical Unclonable Function (PUF), has been introduced as a promising solution that is suitable for the resource-constraint nature of these devices. A growing number of PUF architectures has been demonstrated mathematically clonable through Machine Learning (ML) modeling techniques. The use of PUF ML models has been recently proposed to authenticate the IoT objects. Nonetheless, the leakage scenario of the PUF model to an adversary due to an insider threat within the organization is not supported by the existing solutions. Hence, the security of these PUF model-based enrollment proposals can be compromised.In this thesis, we study the secure bootstrapping process of resource-constrained devices and we introduce two security schemes:- A hybrid ad-hoc pairing protocol, called COOB, that efficiently combines a state-of-the-art fast context-based scheme with the use of an auxiliary channel. This protocol exploits a nonce exponentiation of the Diffie-Hellman public keys to achieve the temporary secrecy goal needed for the key agreement. Our method provides security even against an attacker that can violate the safe zone requirement, which is not supported by the existing contextual schemes. This security improvement has been formally validated in the symbolic model using the TAMARIN prover.- An enrollment solution that exploits a ML PUF model in the authentication process, called Water-PUF. Our enrollment scheme is based on a specifically designed black-box watermarking technique for PUF models with a binary output response. This procedure prevents an adversary from relying on the watermarked model in question or another derivative model to bypass the authentication. Therefore, any leakage of the watermarked PUF model that is used for the enrollment does not affect the correctness of the protocol. The Water-PUF design is validated by a number of simulations against numerous watermark suppression attacks to assess the robustness of our proposal

Conference papers on the topic "Secure device enrollment":

1

Mini, TT. "Secure Device Identifiers and Device Enrollment in Industrial Control System." In 2019 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS). IEEE, 2019. http://dx.doi.org/10.1109/ants47819.2019.9118131.

Full text
APA, Harvard, Vancouver, ISO, and other styles

To the bibliography