Discover the most talked about and latest scientific content & concepts.

Concept: Physical security


This paper presents an innovative access control system, based on human detection and path analysis, to reduce false automatic door system actions while increasing the added values for security applications. The proposed system can first identify a person from the scene, and track his trajectory to predict his intention for accessing the entrance, and finally activate the door accordingly. The experimental results show that the proposed system has the advantages of high precision, safety, reliability, and can be responsive to demands, while preserving the benefits of being low cost and high added value.

Concepts: Scientific method, Value added, Access control, Physical security, Door, Door security, Safe, Security companies


Recently, Chen et al. have proposed a novel tamper resistant prescription RFID access control system, published in the Journal of Medical Systems. In this paper we consider the security of the proposed protocol and identify some existing weaknesses. The main attack is a reader impersonation attack which allows an active adversary to impersonate a legitimate doctor, e.g. the patient’s doctor, to access the patient’s tag and change the patient prescription. The presented attack is quite efficient. To impersonate a doctor, the adversary should eavesdrop one session between the doctor and the patient’s tag and then she can impersonate the doctor with the success probability of ‘1’. In addition, we present efficient reader-tag to back-end database impersonation, de-synchronization and traceability attacks against the protocol. Finally, we propose an improved version of protocol which is more efficient compared to the original protocol while provides the desired security against the presented attacks.

Concepts: English-language films, Security, Authentication, Access control, Physical security, Smart card, Authorization, Burglar alarm


With the development of Internet, patients could enjoy health-care delivery services through telecare medicine information systems (TMIS) in their home. To control the access to remote medical servers' resources, many authentication schemes using smart cards have been proposed. However, the performance of these schemes is not satisfactory since modular exponential operations are used in these schemes. In the paper, we propose a chaotic map-based authentication scheme for telecare medicine information systems. The security and performance analysis shows our scheme is more suitable for TMIS.

Concepts: Medicine, Health, Physician, Illness, Health science, Access control, Physical security, Computer security


Computer keyboard is one of the most common, reliable, accessible and effective approaches used for human-machine interfacing and information exchange. Although keyboard has been used for hundreds of years for advancing human civilization, studying human behavior by keystroke dynamics using smart keyboard remains a great challenge. Here we report a self-powered, non-mechanical-punching keyboard enabled by contact electrification between human fingers and keys, which converts mechanical stimuli applied onto the keyboard into local electronic signals without applying an external power. The intelligent keyboard (IKB) can not only sensitively trigger a wireless alarm system once gentle finger tapping occurs but also be capable of tracing and recording typing contents by detecting both the dynamic time intervals between and during inputting letters and the force used for each typing action. Such features promise its use as a smart security system that can realize detection, alert, recording, and identification. Moreover, the IKB is able to identify personal characteristics from different individuals if assisted by behavioral biometric of keystroke dynamics. Furthermore, the IKB can effectively harness typing motions for electricity to charge commercial electronics at arbitrary typing speed larger than 100 characters per min. Given the above features, the IKB can be potentially applied not only to self-powered electronics but also to artificial intelligence, cyber security, and computer or network access control.

Concepts: Psychology, Artificial intelligence, Computer, Behavior, Human behavior, Finger, Access control, Physical security


BACKGROUND: Fear of crime is associated with negative health and wellbeing outcomes, and may mediate some impacts of the built environment on public health. A range of environmental interventions have been hypothesized to reduce the fear of crime. METHODS: This review aimed to synthesize the literature on the effectiveness of interventions in the built environment to reduce the fear of crime. Systematic review methodology, following Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) guidance, was used. Studies of environmental interventions which reported a fear of crime outcome and used any prospective evaluation design (randomized controlled trial (RCT), trial or uncontrolled before-and-after study) were included. Eighteen databases were searched. The Hamilton tool was used to assess quality. A narrative synthesis of findings was undertaken. RESULTS: A total of 47 studies were included, 22 controlled and 25 uncontrolled, with total sample sizes ranging from n = 52 to approximately n = 23,000. Thirty-six studies were conducted in the UK, ten studies in the USA and one study in the Netherlands. The quality of the evidence overall is low. There are some indications that home security improvements and non-crime-related environmental improvements may be effective for some fear of crime outcomes. There is little evidence that the following reduce fear of crime: street lighting improvements, closed-circuit television (CCTV), multi-component environmental crime prevention programs or regeneration programs. CONCLUSIONS: There is some evidence for the effectiveness of specific environmental interventions in reducing some indicators of fear of crime, but more attention on the context and possible confounders is needed in future evaluations of complex social interventions such as these.

Concepts: Evidence-based medicine, Systematic review, Randomized controlled trial, Crime, Meta-analysis, Physical security, Closed-circuit television, Crime prevention


Closed Circuit Television (CCTV) operators are responsible for maintaining security in various applied settings. However, research has largely ignored human factors that may contribute to CCTV operator error. One important source of error is inattentional blindness - the failure to detect unexpected but clearly visible stimuli when attending to a scene. We compared inattentional blindness rates for experienced (84 infantry personnel) and naïve (87 civilians) operators in a CCTV monitoring task. The task-relevance of the unexpected stimulus and the length of the monitoring period were manipulated between participants. Inattentional blindness rates were measured using typical post-event questionnaires, and participants' real-time descriptions of the monitored event. Based on the post-event measure, 66% of the participants failed to detect salient, ongoing stimuli appearing in the spatial field of their attentional focus. The unexpected task-irrelevant stimulus was significantly more likely to go undetected (79%) than the unexpected task-relevant stimulus (55%). Prior task experience did not inoculate operators against inattentional blindness effects. Participants' real-time descriptions revealed similar patterns, ruling out inattentional amnesia accounts.

Concepts: Time, Attention, Measurement, Error, Usability, Inattentional blindness, Physical security, Closed-circuit television


The problem of securing biological research data is a difficult and complicated one. Our ability to secure data on computers is not robust enough to ensure the security of existing data sets. Lessons from cryptography illustrate that neither secrecy measures, such as deleting technical details, nor national solutions, such as export controls, will work.

Concepts: Computer, Security, Cryptography, Physical security, Computer security, Information security, National security, Security engineering


The demand for safe and secure journeys over roads and highways has been growing at a tremendous pace over recent decades. At the same time, the smart city paradigm has emerged to improve citizens' quality of life by developing the smart mobility concept. Vehicular Ad hoc NETworks (VANETs) are widely recognized to be instrumental in realizing such concept, by enabling appealing safety and infotainment services. Such networks come with their own set of challenges, which range from managing high node mobility to securing data and user privacy. The Software Defined Networking (SDN) paradigm has been identified as a suitable solution for dealing with the dynamic network environment, the increased number of connected devices, and the heterogeneity of applications. While some preliminary investigations have been already conducted to check the applicability of the SDN paradigm to VANETs, and its presumed benefits for managing resources and mobility, it is still unclear what impact SDN will have on security and privacy. Security is a relevant issue in VANETs, because of the impact that threats can have on drivers' behavior and quality of life. This paper opens a discussion on the security threats that future SDN-enabled VANETs will have to face, and investigates how SDN could be beneficial in building new countermeasures. The analysis is conducted in real use cases (smart parking, smart grid of electric vehicles, platooning, and emergency services), which are expected to be among the vehicular applications that will most benefit from introducing an SDN architecture.

Concepts: Life, Transport, Safety, Road, Security, Vehicle, Surveillance, Physical security


Although there are powerful incentives for creating alarm management programmes to reduce ‘alarm fatigue’, they do not provide guidance on how to reduce the likelihood that clinicians will disregard critical alarms. The literature cites numerous phenomena that contribute to alarm fatigue, although many of these, including total rate of alarms, are not supported in the literature as factors that directly impact alarm response. The contributor that is most frequently associated with alarm response is informativeness, which is defined as the proportion of total alarms that successfully conveys a specific event, and the extent to which it is a hazard. Informativeness is low across all healthcare applications, consistently ranging from 1% to 20%. Because of its likelihood and strong evidential support, informativeness should be evaluated before other contributors are considered. Methods for measuring informativeness and alarm response are discussed. Design directions for potential interventions, as well as design alternatives to traditional alarms, are also discussed. With the increased attention and investment in alarm system management that alarm interventions are currently receiving, initiatives that focus on informativeness and the other evidence-based measures identified will allow us to more effectively, efficiently and reliably redirect clinician attention, ultimately improving alarm response.

Concepts: Measurement, Clinic, Alarm, False alarm, Alarms, Physical security, Alarm management, The Contributor


The Session Initiation Protocol (SIP) is an extensive and esteemed communication protocol employed to regulate signaling as well as for controlling multimedia communication sessions. Recently, Kumari et al. proposed an improved smart card based authentication scheme for SIP based on Farash’s scheme. Farash claimed that his protocol is resistant against various known attacks. But, we observe some accountable flaws in Farash’s protocol. We point out that Farash’s protocol is prone to key-compromise impersonation attack and is unable to provide pre-verification in the smart card, efficient password change and perfect forward secrecy. To overcome these limitations, in this paper we present an enhanced authentication mechanism based on Kumari et al.’s scheme. We prove that the proposed protocol not only overcomes the issues in Farash’s scheme, but it can also resist against all known attacks. We also provide the security analysis of the proposed scheme with the help of widespread AVISPA (Automated Validation of Internet Security Protocols and Applications) software. At last, comparing with the earlier proposals in terms of security and efficiency, we conclude that the proposed protocol is efficient and more secure.

Concepts: Protocol, Internet, Session Initiation Protocol, Authentication, Cryptography, Physical security, Computer security, Password