Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Item TypeItem Type
-
SubjectSubject
-
YearFrom:-To:
-
More FiltersMore FiltersSourceLanguage
Done
Filters
Reset
12
result(s) for
"Wrona, Konrad"
Sort by:
Towards an Auditable Cryptographic Access Control to High-value Sensitive Data
2020
We discuss the challenge of achieving an auditable key management for cryptographic access control to high-value sensitive data. In such settings it is important to be able to audit the key management process - and in particular to be able to provide verifiable proofs of key generation. The auditable key management has several possible use cases in both civilian and military world. In particular, the new regulations for protection of sensitive personal data, such as GDPR, introduce strict requirements for handling of personal data and apply a very restrictive definition of what can be considered a personal data. Cryptographic access control for personal data has a potential to become extremely important for preserving industrial ability to innovate, while protecting subject’s privacy, especially in the context of widely deployed modern monitoring, tracking and profiling capabilities, that are used by both governmental institutions and high-tech companies. However, in general, an encrypted data is still considered as personal under GDPR and therefore cannot be, e.g., stored or processed in a public cloud or distributed ledger. In our work we propose an identity-based cryptographic framework that ensures confidentiality, availability, integrity of data while potentially remaining compliant with the GDPR framework.
Journal Article
Distributed Ledger-Based Authentication and Authorization of IoT Devices in Federated Environments
by
Zieliński, Zbigniew
,
Jarosz, Michał
,
Wrona, Konrad
in
Access control
,
Algorithms
,
Authentication
2024
One of the main security challenges when federating separate Internet of Things (IoT) administrative domains is effective Identity and Access Management, which is required to establish trust and secure communication between federated IoT devices. The primary goal of the work is to develop a “lightweight” protocol to enable authentication and authorization of IoT devices in federated environments and ensure the secure communication of IoT devices. We propose a novel Lightweight Authentication and Authorization Framework for Federated IoT (LAAFFI) which takes advantage of the unique fingerprint of IoT devices based on their configuration and additional hardware modules, such as Physical Unclonable Function, to provide flexible authentication and authorization based on Distributed Ledger technology. Moreover, LAAFFI supports IoT devices with limited computing resources and devices not equipped with secure storage space. We implemented a prototype of LAAFFI and evaluated its performance in the Hyperledger Fabric-based IoT framework. Three main metrics were evaluated: latency, throughput (number of operations or transactions per second), and network resource utilization rate (transmission overhead introduced by the LAAFFI protocol). The performance tests conducted confirmed the high efficiency and suitability of the protocol for federated IoT environments. Also, all LAAFFI components are scalable as confirmed by tests. We formally evaluated LAAFFI security using Verifpal as a formal verification tool. Based on the models developed for Verifpal, we validated their security properties, such as message secrecy, authenticity, and freshness. Our results show that the proposed solution can improve the security of federated IoT environments while providing zero-day interoperability and high scalability. Compared to existing solutions, LAAFFI is more efficient due to the use of symmetric cryptography and algorithms adapted for operations involving IoT devices. LAAFFI supports multiple authorization mechanisms, and since it also offers authentication and accountability, it meets the requirements of Authentication, Authorization and Accounting (AAA). It uses Distributed Ledger (DL) and smart contracts to ensure that the request complies with the policies agreed between the organizations. LAAFFI offers authentication of devices belonging to a single organization and different organizations, with the assurance that the encryption key will be shared with another device only if the appropriate security policy is met. The proposed protocol is particularly useful for ensuring the security of federated IoT environments created ad hoc for special missions, e.g., operations conducted by NATO countries and disaster relief operations Humanitarian Assistance and Disaster Relief (HADR) involving military forces and civilian services, where immediate interoperability is required.
Journal Article
Performance Modeling of Distributed Ledger-Based Authentication in Cyber–Physical Systems Using Colored Petri Nets
2025
Federated cyber–physical systems (CPSs) present unique security challenges due to their distributed nature and the need for secure communication between components from different administrative domains. Distributed ledger technology (DLT) offers a promising approach to implementing a resilient authentication and authorization mechanism and an immutable record of CPS identities and transactions in federated environments. However, using Distributed Ledger (DL) within a CPS raises some important questions regarding scalability, throughput, latency, and potential bottlenecks, which require effective modeling of DL performance. This paper proposes a novel approach to modeling distributed ledgers using Colored Timed Petri Nets (CPNs). We focus on the performance modeling of Hyperledger Fabric (HLF), a permissioned distributed ledger technology which provides a backbone for a Lightweight Authentication and Authorization Framework for Federated IoT (LAAFFI), a novel framework for secure communication between CPS devices. We implement our model using CPN Tools, a widely adopted CPN modeling software that provides advanced simulation, analysis, and performance monitoring features. Our model offers a robust framework for studying distributed ledger systems’ synchronization, throughput, and response time. It supports flexibility in modeling transaction validation and consensus algorithms, which provides an opportunity for adapting the model to future changes in HLF and modeling other DLs. We successfully validate our CPN model by comparing simulation results with experimental measurements obtained from a LAAFFI prototype.
Journal Article
Real-time automated risk assessment in protected core networking
2010
Protected Core Networking (PCN) is an approach to creating a secure and flexible network and communications infrastructure that supports network enabled capability (NEC) operations. The real-time automated risk assessment (R-TARA) provides a theoretically and practically sound method for risk assessment in the Protected Core. The purpose of the R-TARA is multifold. On the one hand it provides a global metric, which could be used by the network operator to assess the overall security level of the network and its evolution over time. On the other hand, the results of R-TARA can be used in order to achieve dynamic accreditation. Finally, R-TARA local risk metrics, e.g. susceptibility to DoS attacks, can be used for dynamic routing decisions. We propose use of Bayesian networks, known from operational risk assessment, for PCN risk assessment and we provide analytical and simulative evaluation of R-TARA mechanisms.
Journal Article
CYBERSECURITY INNOVATION IN NATO: LESSONS LEARNED AND RECOMMENDATIONS
by
Moye, Tamsin
,
Lagadec, Philippe
,
Wrona, Konrad
in
Adoption of innovations
,
Biometrics
,
Built environment
2017
In the ever-increasing pace of technological development and the emergence of new stateless adversaries and threat vectors, the traditional NATO approach to the technical capability development struggles to address the emerging security challenges in cyberspace. In order to mitigate this situation, we describe an incubator framework, which provides a physical and virtual environment enabling industry, in particular small and medium sized enterprises, science and technology organizations, academia, and national defence labs, to collaborate on innovation projects on the basis of either voluntary, nationally funded, or NATO commonly funded contributions. The proposed incubator framework has been practically validated and technical results have confirmed the feasibility as well as the benefits of setting up a cyber incubator within NATO. This disruptive approach to capability development requires the updating of several internal processes and procedures and the adoption of a new innovation-friendly and risk-tolerant organizational culture within the Organization. We describe the main lessons learned from our experiment and the recommendations regarding required changes to the internal and external NATO processes and procedures.
Journal Article
Analytical Model of Cooperation in Ad Hoc Networks
2004
The problem of cooperation among selfish nodes in ad hoc networks has gained recently a considerable attention. In this paper we propose a dynamic game theoretical model of cooperation in ad hoc networks, based on evolutionary game theory. Our model enables us to make predictions about possible equilibrium points of the network composed of the selfish and learning nodes, which can dynamically adjust their strategy in order to maximize their own payoff. In particular, we show that if an ad hoc network implements a reputation mechanism, all long term equilibrium points of the system will include cooperating nodes. In fact, in most of the equilibrium points, the cooperators will constitute a majority of the nodes. We believe that this new approach, borrowing from biological research, can have broader applications for studying dynamics of distributed communication systems. [PUBLICATION ABSTRACT]
Journal Article
Biopolymers and Biomaterials for Special Applications within the Context of the Circular Economy
by
Sulak, Konrad
,
Dziuba, Radosław
,
Madej-Kiełbik, Longina
in
Biodegradable materials
,
Biomedical materials
,
Biopolymers
2021
The main challenge of the economy is counteracting the adverse effects of progressive industrialisation on the environment around the world. Economic development that accompanies this trend correlates to production increase in not only consumer articles but also special application articles that are difficult to remanufacture, such as medical supplies. For many researchers, discovering innovative materials for special applications that could become an essential element of circular economy production is important. Measures to reduce the production of industrial materials whose waste is difficult to recycle are more and more apparent to manufacturers, especially when faced with the new financial situation in European Union, as one of its priorities is to implement the principles of circular economy. The purpose of the article is to analyse the current state of research on special-application biomaterials within the context of the circular economy. Empirical analysis is conducted for Poland compared to the rest of the European Union (EU) within the time-frame of 2014–2020, which is the most recent financial timeframe of the EU. The submitted studies are based on secondary data obtained mainly from European databases, as well as primary data resulting from the research works at Łukasiewicz Research Network—Institute of Biopolymers and Chemical Fibres.
Journal Article
The Role of Cellular Senescence and SASP in the Pathogenesis of Atherosclerosis and the Therapeutic Potential of Senolytic Strategies in Cardiovascular Diseases
2026
Cellular senescence is a permanent cell cycle arrest that plays a critical role in the development and pathogenesis of age-related diseases. This paper aims to present the biological mechanisms of cellular senescence and the role of the senescence-associated secretory phenotype (SASP) in the pathogenesis of atherosclerosis, as well as to discuss therapeutic strategies targeting senescent cells in cardiovascular diseases. Different types of cellular senescence are described, including replicative, stress-induced, and oncogene-induced senescence, along with the composition and regulation of SASP and its impact on chronic inflammation, endothelial dysfunction, vascular remodeling, and plaque destabilization. The involvement of senescent endothelial cells, vascular smooth muscle cells, and macrophages in the initiation and progression of atherosclerosis is also discussed. The paper reviews current research on senolytic and senomorphic therapies and highlights emerging approaches such as immunosenolytic and epigenetic interventions. The therapeutic potential of these strategies in reducing chronic vascular inflammation and improving plaque stability, as well as their limitations and challenges in clinical application, is emphasized.
Journal Article
Functional tricuspid regurgitation and efficacy of electrical cardioversion in patients with atrial fibrillation and atrial functional mitral regurgitation
by
Mizia-Stec, Katarzyna
,
Klimek, Katarzyna
,
Dołęga, Julia
in
Aged
,
atrial fibrillation
,
Atrial Fibrillation - diagnosis
2024
Atrial functional mitral regurgitation (afMR) is common in patients with atrial fibrillation (AF). The presence of functional tricuspid regurgitation (fTR), which arises as a secondary effect of afMR, has the potential to impact the effectiveness of procedures aimed at restoring normal heart rhythm. In this study, we sought to evaluate the efficacy of electrical cardioversion (CVE) in AF regarding the presence and degree of fTR in patients with afMR.
Retrospective analysis included 521 patients with persistent AF on optimal medical therapy undergoing CVE. 157 (30.1%) patients had afMR (characterized by left ventricle ejection fraction ≥ 50% and LA dilatation) and were divided into 2 groups: the group with fTR (107, 68.2%) and the group without fTR (50, 31.9%).
Patients with afMR and fTR had a higher prevalence of metabolic syndrome (p = 0.02) and greater right atrial area (p < 0.01) compared to patients without fTR. The efficacy of CVE was lower in the group with fTR in comparison to patients with isolated afMR (82.2% vs. 94%; p = 0.048) and it was unrelated to the degree of fTR (p = 0.15) and RVSP (p = 0.56). The energy required for successful CVE was comparable regardless of the presence (p = 0.26) or severity of fTR (p = 0.94).
The fTR frequently coexists with afMR and it significantly diminishes the effectiveness of CVE for treating AF. The degree of fTR does not appear to influence the efficacy of CVE.
Journal Article
Long-term outcomes of mechanical thrombectomy in acute ischaemic stroke patients with concomitant malignancy
by
Homa, Tomasz
,
Włodarczyk, Ewa
,
Wrona, Paweł
in
acute ischaemic stroke
,
cancer
,
cancer-related stroke
2024
Patients with cancer (CP) need a different approach to acute ischaemic stroke (AIS) treatment as intravenous thrombolysis (IVT) may be contraindicated. Mechanical thrombectomy (MT) is a treatment of choice for otherwise eligible patients, although the literature on its long-term outcomes in CP is limited.
Assessing outcomes of MT-treated AIS patients with concomitant malignancy in a year-long follow-up.
The study included 593 MT-treated AIS patients admitted in 2019-2021. The group was divided into CP (defined as a diagnosis of malignancy and undergoing/qualified for cancer treatment within previous 5 years) and a control group. The profile of cardiovascular risk factors, stroke severity and discharge, 90-day and 365-day outcomes were compared between the groups.
CP and controls had a similar profile of cardiovascular risk factors and comparable stroke severity. CP were less frequently treated with IVT (25.7% vs. 59.1%,
< 0.001). There were no differences between the groups in the successful reperfusion rate and occurrence of haemorrhagic complications. Discharge and 90-day outcomes were similar. CP had higher 365-day mortality (48.6% vs. 29.9%,
= 0.024) but the percentage of patients achieving good functional outcome in a year-long observation was comparable.
Treatment with MT seems beneficial for AIS patients with concomitant malignancy both in short- and long-term observation.
Journal Article