CXCR4-SERINE339 Regulates Cellular Adhesion, Retention and Mobilization, and Is a Marker for Poor Prognosis in Acute Myeloid Leukemia

Total Page:16

File Type:pdf, Size:1020Kb

CXCR4-SERINE339 Regulates Cellular Adhesion, Retention and Mobilization, and Is a Marker for Poor Prognosis in Acute Myeloid Leukemia Leukemia (2014) 28, 566–576 & 2014 Macmillan Publishers Limited All rights reserved 0887-6924/14 www.nature.com/leu ORIGINAL ARTICLE CXCR4-SERINE339 regulates cellular adhesion, retention and mobilization, and is a marker for poor prognosis in acute myeloid leukemia L Brault1, A Rovo´ 2, S Decker3, C Dierks3, A Tzankov4,5 and J Schwaller1,5 The CXCR4 receptor is a major regulator of hematopoietic cell migration. Overexpression of CXCR4 has been associated with poor prognosis in acute myelogenous leukemia (AML). We have previously shown that ligand-mediated phosphorylation of the Serine339 (CXCR4-S339) residue of the intracellular domain by PIM1 is implicated in surface re-expression of this receptor. Here, we report that phosphorylation of CXCR4-S339 in bone marrow (BM) biopsies correlated with poor prognosis in a cohort of AML patients. To functionally address the impact of CXCR4-S339 phosphorylation, we generated cell lines-expressing CXCR4 mutants that mimic constitutive phosphorylation (S339E) or abrogate phosphorylation (S339A). Whereas the expression of CXCR4 significantly increased, both CXCR4-S339E and the CXCR4-S339A mutants significantly reduced the BM homing and engraftment of Kasumi-1 AML cells in immunodeficient mice. In contrast, only expression of the CXCR4-S339E mutant increased the BM retention of the cells and resistance to cytarabine treatment, and impaired detachment capacity and AMD3100-induced mobilization of engrafted leukemic cells. These observations suggest that the poor prognosis in AML patients displaying CXCR4-S339 phosphorylation can be the consequence of an increased retention to the BM associated with an enhanced chemoresistance of leukemic cells. Therefore, CXCR4-S339 phosphorylation could serve as a novel prognostic marker in human AML. Leukemia (2014) 28, 566–576; doi:10.1038/leu.2013.201 Keywords: CXCR4; serine339; AML; homing; retention; resistance INTRODUCTION receptor signaling, CXCR4 endocytosis seems to control down- The G protein-coupled receptor CXCR4 is activated by CXCL12 stream signaling pathways, including ERK cascade activation, 8,10 (stromal cell-derived factor 1) and is involved in the control of intracellular calcium flux and chemotaxis. Despite the wide migration and homing of cells notably for engraftment of normal range of factors that are known to be activated after CXCL12 and neoplastic hematopoietic cells in the bone marrow (BM).1,2 binding to CXCR4, there is limited information about the critical CXCR4 receptor activation enhances the proliferation and/or intracellular residues of CXCR4 and the associated activation of 11,12 metastasis formation (that is, to the BM) of many tumors and downstream signal transduction pathways. also functions as an entry receptor for HIV-1. All CXCR4 functions Although CXCR4 signaling was shown as being controlled by critically depend on its cell-surface expression, which is regulated G protein-regulated protein kinases targeting the C-terminal tail, at the transcriptional level and at the protein level by endocytosis, the intracellular signals specifically evoked by phosphorylation intracellular trafficking and recycling.3,4 of distinct residues and their functional consequences remain 13 The surface expression level of CXCR4 on acute myelogenous unclear. We previously identified ligand-mediated phosphorylation leukemia (AML) blasts has been previously associated with a poor of CXCR4-S339 to have a key role for in vitro migration and in vivo 14 prognosis, and analogous to normal hematopoietic cells, the level homing and engraftment of murine BM cells. Here we investigated of CXCR4 expression also correlated with the CXCL12-induced the clinical impact and the functional consequence of the CXCR4- chemotaxis.5–7 In addition, interference with the CXCL12/CXCR4 S339 status in AML. Our results suggest that CXCR4-S339 axis through treatment with granulocyte colony-stimulating factor phosphorylation might be a novel prognostic marker in AML and/or CXCR4 antagonist like AMD3100 (Plerixafor) increased the patients and a critical regulator of migration, homing and retention cellular mobilization from the BM.8 CXCR4 inhibition is a novel of leukemic cells. strategy to not only mobilize hematopoietic stem cells for autologous transplantation but also tumor cells in order to increase the effectiveness of chemotherapy notably in AML.9 MATERIALS AND METHODS Several studies have demonstrated that internalization of the Patients and immunohistochemistry CXCR4 receptor involves endocytosis provoked by phospho- Patient’s characteristics are summarized in Table 1. All patients had given rylation of the CXCR4 C-terminal domain. Beside its role for general informed consent for studies to be performed using tissue receptor internalization leading to desensitization that terminates materials that remained after diagnostic procedures. Tissue biopsies were 1Department of Biomedicine, University Children’s Hospital (UKBB), University of Basel, Basel, Switzerland; 2Department of Hematology, University Hospital Basel, Basel, Switzerland; 3Department of Hematology/Oncology, University Medical Center Freiburg, Freiburg, Germany and 4Institute for Pathology, University Hospital Basel, Basel, Switzerland. Correspondence: Dr J Schwaller, Department of Biomedicine, University Children’s Hospital (UKBB), University of Basel, Hebelstrasse 20, Basel 4031, Switzerland. E-mail: [email protected] 5Shared senior authorship. Received 8 November 2012; revised 21 June 2013; accepted 24 June 2013; accepted article preview online 2 July 2013; advance online publication, 26 July 2013 Role of CXCR4-S339 in AML L Brault et al 567 were killed 24 h, 7 and 46 days post-transplantation. Single-cell suspen- Table 1. Patient characteristics sions of indicated tissue samples were prepared by passing the tissue through 100-mm nylon mesh strainers (Falcon, Becton-Dickinson, Heidel- pCXCR4-S339 pCXCR4-S339 P- berg, Germany). Red blood cells of peripheral blood (PB) were lysed before positive negative value the analysis. Dead cells were excluded using 4’,6-diamidino-2-phenylindole staining, and the percentage of GFP-positive cells was monitored using N 39 36 flow cytometry and expressed as the percentage of all gated mononuclear Age median (range) 65 (26–95) 55 (19–83) 0.032 cells of the indicated tissue. Tissue samples were fixed in 4% phosphate- Male/female 20/19 14/22 buffered saline-formaldehyde, paraffin-embedded and 4-mm sections were Risk group 0.416 stained with hematoxylin-eosin or anti-human CD34 (Dako, Glostrup, Low 6 5 Denmark, M7165). A ratio between PB and BM (PB/BM) is determined as Intermediate 14 15 (PB GFP þ cells (%) Â WBC Â body weight (g) Â 0.08)/(BM GFP þ cells 18 High 17 10 (%) Â BM cellularity/0.056). Not evaluated 2 6 To test the ability of AMD3100 to mobilize leukemic cells, a 5 mg/kg dose was administrated subcutaneously 5 weeks after transplantation. FLT3-ITD mutated 22 14 0.051 Three hours after the treatment, the mice were killed and analyzed. Curative therapy yes/no 26/13 31/5 To test the in vivo resistance to cytarabine (Ara-C), a dose (75 mg/kg) per CR after induction 17 19 0.113 day for 5 consecutive days was administrated subcutaneously 5 weeks chemotherapy after transplantation. On the day after the last treatment, the mice were Post induction failure 7 7 killed and analyzed.19 Early relapse 6 7 0.139 Abbreviations: CR, complete remission; ITD, internal tandem duplication. Cellular detachment assay Kasumi-1 cells were added to confluent human umbilical vein endothelial cell (HUVEC) cells in six-well plates with or without activation by tumor necrosis factora (20 ng/ml). After 1 h, non-adherent Kasumi-1 cells were processed using an automated immunostainer (Nexes, Ventana Medical carefully removed and each well was monitored (12 microscopic fields) for Systems, Tucson, AZ, USA). The immunohistochemical staining of pCXCR4- GFP-positive cells. Then, CXCL12 (50 nM) was added to the medium for S339 (Abcam, Cambridge, UK, no.74012) was performed in all specimens 30 min and the detached cells were carefully removed and each well taken at diagnosis as previously described.15 The immunohistochemical (12 microscopic fields) was monitored using a live cell imaging microscope staining of CXCR4 was performed following the same procedure with a (IX81, Olympus, Tokyo, Japan). The surface area coverage of GFP was primary rabbit polyclonal antibody (Abcam, no. 2074). Sections were analyzed by ImageJ (National Institutes of Health). incubated 30 min with anti-CXCR4 at dilution of 1:50. At least 200 cells were assessed in each trephine biopsy, and the percentage of positive cells Viability assay (that is, cells with distinct staining) was calculated. Cases were considered Kasumi-1 cells were plated at 3 Â 104cells/well with or without the as pCXCR4-S339 positive when the percentage of stained cells per case support of MS-5 cells. Stromal cells (3.6 Â 105) were plated in six-well was above 15%, on the basis of the prognostically relevant cutoff score as plates in a-minimum essential medium with 10% fetal calf serum determined by receiver operating characteristic, see Supplementary the previous day. After 1 day of coculture, Ara-C was added for 48 h. Methods (area under the receiver operating characteristic curve, Cells were harvested, washed and stained with the PO-PRO-1 dye AUROC ¼ 0.641, 95% confidence interval 0.512–0.768, P ¼ 0.037). Cases (Invitrogen, Carlsbad, CA, USA) and 7-aminoactinomycin D before the were considered as CXCR4 positive when the percentage of stained blasts analysis
Recommended publications
  • Models and Algorithms for Physical Cryptanalysis
    MODELS AND ALGORITHMS FOR PHYSICAL CRYPTANALYSIS Dissertation zur Erlangung des Grades eines Doktor-Ingenieurs der Fakult¨at fur¨ Elektrotechnik und Informationstechnik an der Ruhr-Universit¨at Bochum von Kerstin Lemke-Rust Bochum, Januar 2007 ii Thesis Advisor: Prof. Dr.-Ing. Christof Paar, Ruhr University Bochum, Germany External Referee: Prof. Dr. David Naccache, Ecole´ Normale Sup´erieure, Paris, France Author contact information: [email protected] iii Abstract This thesis is dedicated to models and algorithms for the use in physical cryptanalysis which is a new evolving discipline in implementation se- curity of information systems. It is based on physically observable and manipulable properties of a cryptographic implementation. Physical observables, such as the power consumption or electromag- netic emanation of a cryptographic device are so-called `side channels'. They contain exploitable information about internal states of an imple- mentation at runtime. Physical effects can also be used for the injec- tion of faults. Fault injection is successful if it recovers internal states by examining the effects of an erroneous state propagating through the computation. This thesis provides a unified framework for side channel and fault cryptanalysis. Its objective is to improve the understanding of physi- cally enabled cryptanalysis and to provide new models and algorithms. A major motivation for this work is that methodical improvements for physical cryptanalysis can also help in developing efficient countermea- sures for securing cryptographic implementations. This work examines differential side channel analysis of boolean and arithmetic operations which are typical primitives in cryptographic algo- rithms. Different characteristics of these operations can support a side channel analysis, even of unknown ciphers.
    [Show full text]
  • Non-Interactive Key Establishment in Wireless Mesh Networks
    Chapter 1 Non-Interactive Key Establishment in Wireless Mesh Networks Zhenjiang Li†, J.J. Garcia-Luna-Aceves †∗ zhjli,jj @soe.ucsc.edu { } †Computer Engineering, University of California, Santa Cruz 1156 high street, Santa Cruz, CA 95064, USA Phone:1-831-4595436, Fax: 1-831-4594829 ∗Palo Alto Research Center (PARC) 3333 Coyote Hill Road, Palo Alto, CA 94304, USA Symmetric cryptographic primitives are preferable in designing security protocols for wireless mesh networks (WMNs) because they are computationally affordable for resource- constrained mobile devices forming a WMN. Most proposed key-establishment schemes for symmetric cryptosystem assume services from a centralized authority (either on-line or off- line), or involve the interaction between communicating parties. However, requiring access 1 c Springer, 2005. This is a revision of the work published in the proceedings of AdhocNow’05, LNCS 3738, pp. 164-177, Cancun," Mexico, Oct. 2005. 2This work was supported in part by the Baskin Chair of Computer Engineering at UCSC, the National Science Foundation under Grant CNS-0435522, the U.S. Army Research Office under grant No. W911NF-05-1-0246. Any opinions, findings, and conclusions are those of the authors and do not necessarily reflect the views of the funding agencies. 1 2CHAPTER 1. NON-INTERACTIVE KEY ESTABLISHMENT IN WIRELESS MESH NETWORKS to a centralized authority, or ensuring that correct routing be established before the key agreement is done, is difficult to attain in wireless networks. We present a new non-interactive key agreement and progression (NIKAP) scheme for wireless networks, which does not require an on-line centralized authority, can establish and update pairwise shared keys between any two nodes in a non-interactive manner, is configurable to operate synchronously (S-NIKAP) or asynchronously (A-NIKAP), and has the ability to provide differentiated security services w.r.t.
    [Show full text]
  • Mesh Segmentation Guided by Seed Points
    Bulletin of the JSME Vol.9, No.4, 2015 Journal of Advanced Mechanical Design, Systems, and Manufacturing Mesh segmentation guided by seed points Xue JIAO*, Huixin ZHANG* and Tieru WU* *Institute of Mathematics, Jilin University Changchun, Jilin130012, China E-mail: [email protected] Received 3 January 2015 Abstract Segmenting 3D models into meaningful parts is a fundamental problem in computer graphics. In this paper, we present an algorithm which is guided by the mesh vertices for segmenting a mesh into meaningful sub-meshes. First, a candidate set of feature points is selected to highlight the most significant features of the model. After that, a diversity measure is calculated by using Hausdorff distance. The collection of seed points we defined is a subset of the candidate set. The collection of seed points consists of two parts, namely, the basic point and lucky points. By maximizing the diversity measure between the seed set and candidate set, an appropriate seed point is selected. Based on the collection of seed points, the segmentation process can be guided by these seeds. Because humans generally perceive desirable segmentations at concave regions, and the geodesic distance and curvature are well-known noise sensitive. Considering the above factors, in order to partition the target into meaningful parts, we define a distance function between each pair of mesh vertices. This function is formed by arc length, angular distance and curvature-related correction term. We have tested the method developed in this paper with 3D meshes from the Princeton segmentation benchmark. Moreover, our segmentation method also has been compared with other methods.
    [Show full text]
  • Differential and Linear Attacks on the Full WIDEA-N Block Ciphers (Under
    Differential and Linear Attacks on the full WIDEA-n block ciphers (under weak keys) Jorge Nakahara Jr Universit´eLibre de Bruxelles (ULB), Dept. of Computer Science, Belgium [email protected] Abstract. We report on differential and linear analysis of the full 8.5- round WIDEA-n ciphers for n 2 f4; 8g, under weak-key assumptions. The novelty in our attacks include the use of differential and linear rela- tion patterns that allow to bypass the diffusion provided by MDS codes altogether. Therefore, we can attack only a single IDEA instance out of n copies, effectively using a narrow trail for the propagation of differ- ences and masks across WIDEA-n. In fact, the higher the value of n, the better the attacks become. Our analyses apply both to particular MDS matrices, such as the one used in AES, as well as general MDS matrices. Our attacks exploit fixed points of MDS matrices. We also observed a curious interaction between certain differential/linear patterns and the coefficients of MDS matrices for non-trivial fixed points. This interac- tion may serve as an instructive design criterion for block cipher designs such as WIDEA-n. The authors of WIDEA-n suggested a compression function construction using WIDEA-8 in Davies-Meyer mode. In this setting, the weaknesses identified in this paper can lead to free-start col- lisions and even actual collisions depending on the output transformation of the hash function. Keywords: wide-block cipher, cryptanalysis, WIDEA-n, free-start collisions. 1 Introduction In [6], Junod and Macchetti presented a Wide-block version of IDEA cipher [7] called WIDEA-n, combining n instances of the 8.5-round IDEA cipher joined by an n×n matrix derived from a Maximum Distance Separable (MDS) code.
    [Show full text]
  • Ipsec VPN Solutions Using Next Generation Encryption
    IPSec VPN Solutions Using Next Generation Encryption Deployment Guide Version 1.5 Authored by: Ben Rosenblum – CCIE #21084 (R&S, SP) IPSec VPN Solutions Using Deployment Guide Next Generation Encryption THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The following information is for FCC compliance of Class A devices: This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to part 15 of the FCC rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. This equipment generates, uses, and can radiate radio-frequency energy and, if not installed and used in accordance with the instruction manual, may cause harmful interference to radio communications. Operation of this equipment in a residential area is likely to cause harmful interference, in which case users will be required to correct the interference at their own expense. The following information is for FCC compliance of Class B devices: The equipment described in this manual generates and may radiate radio- frequency energy.
    [Show full text]
  • The Celeblain of Celeborn and Galadriel
    Volume 9 Number 2 Article 5 6-15-1982 The Celeblain of Celeborn and Galadriel Janice Johnson Southern Illinois University Follow this and additional works at: https://dc.swosu.edu/mythlore Part of the Children's and Young Adult Literature Commons Recommended Citation Johnson, Janice (1982) "The Celeblain of Celeborn and Galadriel," Mythlore: A Journal of J.R.R. Tolkien, C.S. Lewis, Charles Williams, and Mythopoeic Literature: Vol. 9 : No. 2 , Article 5. Available at: https://dc.swosu.edu/mythlore/vol9/iss2/5 This Article is brought to you for free and open access by the Mythopoeic Society at SWOSU Digital Commons. It has been accepted for inclusion in Mythlore: A Journal of J.R.R. Tolkien, C.S. Lewis, Charles Williams, and Mythopoeic Literature by an authorized editor of SWOSU Digital Commons. An ADA compliant document is available upon request. For more information, please contact [email protected]. To join the Mythopoeic Society go to: http://www.mythsoc.org/join.htm Mythcon 51: A VIRTUAL “HALFLING” MYTHCON July 31 - August 1, 2021 (Saturday and Sunday) http://www.mythsoc.org/mythcon/mythcon-51.htm Mythcon 52: The Mythic, the Fantastic, and the Alien Albuquerque, New Mexico; July 29 - August 1, 2022 http://www.mythsoc.org/mythcon/mythcon-52.htm Abstract Reviews the history of Galadriel and Celeborn as revealed in unpublished materials as well as The Lord of the Rings, The Silmarillion, Tolkien’s Letters, and Unfinished alesT , and examines variations and inconsistencies. Additional Keywords Tolkien, J.R.R.—Characters—Celeborn; Tolkien, J.R.R.—Characters—Galadriel; Patrick Wynne This article is available in Mythlore: A Journal of J.R.R.
    [Show full text]
  • A Lightweight Iot Security Protocol Mohamed Hammi, Erwan Livolant, Patrick Bellot, Ahmed Serhrouchni, Pascale Minet
    A Lightweight IoT Security Protocol Mohamed Hammi, Erwan Livolant, Patrick Bellot, Ahmed Serhrouchni, Pascale Minet To cite this version: Mohamed Hammi, Erwan Livolant, Patrick Bellot, Ahmed Serhrouchni, Pascale Minet. A Lightweight IoT Security Protocol. 1st Cyber Security in Networking Conference (CSNet2017), Oct 2017, Rio de Janeiro, Brazil. hal-01640510 HAL Id: hal-01640510 https://hal.archives-ouvertes.fr/hal-01640510 Submitted on 20 Nov 2017 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. A Lightweight IoT Security Protocol Mohamed Tahar Hammi∗, Erwan Livolanty, Patrick Bellot∗, Ahmed Serhrouchni∗, Pascale Minetz ∗ LTCI, Télécom ParisTech, Université Paris-Saclay, 75013, Paris, France ∗{hammi,bellot,serhrouchni}@telecom-paristech.fr yAFNeT, Boost-Conseil, 75008 Paris, France [email protected] zInria-Paris, EVA team, 2 rue Simone Iff, 75589 Paris Cedex 12, France [email protected] Abstract—The IoT is a technology that enables the inter- in October 2015. Hackers managed to get many customers connection of smart physical and virtual objects and provides records, that contain important informations like logins and advanced services. Objects or things are generally constrained passwords, secret codes, confidential and personal data, etc. devices which are limited by their energy, computing and storage capacity.
    [Show full text]
  • RAGHAV a New Low Power S-P Network Encryption Design for Resource Constrained Environment
    RAGHAV A new low power S-P network encryption design for resource constrained environment Gaurav Bansod Associate Professor [email protected] Pune Institute of Computer Technology(PICT), Pune India Abstract— This paper proposes a new ultra lightweight cipher considered to be the workhorse in the cryptographic RAGHAV. RAGHAV is a Substitution-Permutation (SP) environment. The most ignored metric in design of a network, which operates on 64 bit plaintext and supports a lightweight cipher is power dissipation which is a very crucial 128/80 bit key scheduling. It needs only 994.25 GEs by using in the environments like IoT and Wireless Sensor Networks 0.13µm ASIC technology for a 128 bit key scheduling. It also (WSN). In Wireless Sensor Network, most of the nodes are needs less memory i.e. 2204 bytes of FLASH memory , which is less as compared to all existing S-P network lightweight ciphers. battery powered and there is a need to protect these nodes This paper presents a complete security analysis of RAGHAV, against external attacks. The versatile cipher like AES, Triple which includes basic attacks like linear cryptanalysis and DES fails in such kind of environment as they need huge differential cryptanalysis. This paper also covers advanced attack memory space as well as they dissipated more power. There is like zero correlation attack, Biclique attack, Algebraic attack, urgent need to secure these nodes without incurring more Avalanche effect, key collision attack and key schedule attack. In power to make the technologies like IoT feasible. This paper this cipher,use of block permutation helps the design to improve presents a cipher RAGHAV which has less GE’s, needs less the throughput.
    [Show full text]
  • SC4000 Series Mesh Radio Non-Proprietary FIPS 140-2
    SC4000 Series Mesh Radio Non‐Proprietary FIPS 140‐2 Security Policy Version: 1.2 Date: 12 December 2018 SC4000 FIPS 140‐2 Cryptographic Module Security Policy Table of Contents 1 Introduction .................................................................................................................... 4 1.1 Module Cryptographic Boundary .................................................................................................4 1.2 Modes of Operation .....................................................................................................................6 2 Cryptographic Functionality ............................................................................................. 8 2.1 Critical Security Parameters ...................................................................................................... 11 2.2 Public Keys ................................................................................................................................. 11 3 Roles, Authentication and Services ................................................................................ 12 3.1 Assumption of Roles .................................................................................................................. 12 3.2 Interfaces that Authenticate ..................................................................................................... 12 3.3 Authentication Strength ............................................................................................................ 13 3.4 Services .....................................................................................................................................
    [Show full text]
  • Secure and Privacy-Preserving Authentication Protocols for Wireless Mesh Networks
    1 Secure and Privacy-Preserving Authentication Protocols for Wireless Mesh Networks Jaydip Sen Innovation Lab, Tata Consultancy Services Ltd. India 1. Introduction Wireless mesh networks (WMNs) have emerged as a promising concept to meet the challenges in next-generation wireless networks such as providing flexible, adaptive, and reconfigurable architecture while offering cost-effective solutions to service providers (Akyildiz et al., 2005). WMNs are multi-hop networks consisting of mesh routers (MRs), which form wireless mesh backbones and mesh clients (MCs). The mesh routers provide a rich radio mesh connectivity which significantly reduces the up-front deployment cost of the network. Mesh routers are typically stationary and do not have power constraints. However, the clients are mobile and energy-constrained. Some mesh routers are designated as gateway routers which are connected to the Internet through a wired backbone. A gateway router provides access to conventional clients and interconnects ad hoc, sensor, cellular, and other networks to the Internet. The gateway routers are also referred to as the Internet gateways (IGWs). A mesh network can provide multi-hop communication paths between wireless clients, thereby serving as a community network, or can provide multi-hop paths between the client and the gateway router, thereby providing broadband Internet access to the clients. As WMNs become an increasingly popular replacement technology for last-mile connectivity to the home networking, community and neighborhood networking, it is imperative to design efficient and secure communication protocols for these networks. However, several vulnerabilities exist in the current protocols of WMNs. These security loopholes can be exploited by potential attackers to launch attack on WMNs.
    [Show full text]
  • Department of Defense (DOD) Zero Trust Reference Architecture
    Department of Defense (DOD) Zero Trust Reference Architecture Version 1.0 February 2021 Prepared by the Joint Defense Information Systems Agency (DISA) and National Security Agency (NSA) Zero Trust Engineering Team DISTRIBUTION STATEMENT A. Approved for public release: distribution unlimited. Refer to the Department Chief Information Officer Cybersecurity (DCIO-CS) for other requests that pertain to this document. UNCLASSIFIED UNCLASSIFIED February 2021 Document Approval Document Approved By Date Approved Name: Joseph Brinker FEB 2021 DISA Portfolio Manager, Security Enablers Portfolio (ID2) ii UNCLASSIFIED February 2021 Revision History VERSION DATE PRIMARY AUTHOR(S) REVISION/CHANGE PAGES AFFECTED Added Vocabulary & Updated Joint DISA/NSA Zero Trust 0.8 27 Aug 2020 Template- submitted for internal All Engineering Team DISA/NSA/USCC review Joint DISA/NSA Zero Trust Adjudication of internal feedback and 0.9 04 Nov 2020 All Engineering Team submission to EAEP for review Joint DISA/NSA Zero Trust 0.95 24 Dec 2020 Adjudication of feedback from EAEP All Engineering Team Joint DISA/NSA Zero Trust Final review and classification header 0.96 30 Dec 2020 All Engineering Team update Prepared for DMI EXCOM Approval – Joint DISA/NSA Zero Trust Removed CS RA location description. 1.0 04 Feb 2021 All Engineering Team Removal of CV-3, SvcV8, and SvcV-9 for classification purposes. iii UNCLASSIFIED February 2021 Table of Contents 1 STRATEGIC PURPOSE (AV-1, CV-1, CV-2, OV-1) ................................................... 1 1.1 Introduction ......................................................................................................
    [Show full text]
  • Edges of Interpolating Tetrahedron Based Encryption Algorithm for 3D Printing Model
    Journal of Advances in Information Technology Vol. 11, No. 2, May 2020 Edges of Interpolating Tetrahedron Based Encryption Algorithm for 3D Printing Model Giao N. Pham1,2, Son T. Ngo1, Anh N. Bui1, Ban Q. Tran1, Dinh V. Tran3, and Suk-Hwan Lee4 1 Dept. of Computing Fundamentals, FPT University, Hanoi, Vietnam 2 Advanced Analytics Center, FPT Software Co., Ltd., Hanoi, Vietnam 3 Dept. of Computer, University of Freiburg, Freiburg, Germany 4 Dept. of Information Security, Tongmyong University, Busan, South Korea Email: {giaopn, sonnt69, anhbn5, bantq3}@fe.edu.vn, [email protected], [email protected] Abstract—With the increase of 3D printing applications in process. Moreover, 3D printing uses some different many areas of life, a large amount of 3D printing models is formats, thus the encryption techniques must be attacked and stolen by hackers. Moreover, some special responsive to the various formats of 3D printing model. models and anti-weapon models in 3D printing must be For meeting to above requirements, we would like to secured from un-authorized users. Therefore, 3D printing propose an encryption algorithm for 3D printing models in models should be encrypted before being stored and transmitted in order to prevent illegal copying. This paper this paper. The data format of 3D printing is the 3D presents an encryption algorithm for 3D printing models triangle mesh. Facet is the main component of a 3D based on the edges of the interpolating tetrahedron. The triangle mesh. The facets of a 3D tri-angle mesh will be proposed algorithm is based on encrypting the normal vector extracted to interpolate tetrahedrons, and the edges of the of facet and the edges of the interpolating tetrahedron by a interpolating tetrahedrons are then encrypted by a secret secret key after the tetrahedron interpolation process.
    [Show full text]