Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (687)

Search Parameters:
Keywords = information leakage

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
18 pages, 959 KiB  
Article
Intelligent-Reflecting-Surface-Assisted Single-Input Single-Output Secure Transmission: A Joint Multiplicative Perturbation and Constructive Reflection Perspective
by Chaowen Liu, Anling Zeng, Fei Yu, Zhengmin Shi, Mingyang Liu and Boyang Liu
Entropy 2024, 26(10), 849; https://doi.org/10.3390/e26100849 - 8 Oct 2024
Abstract
Due to the inherent broadcasting nature and openness of wireless transmission channels, wireless communication systems are vulnerable to the eavesdropping of malicious attackers and usually encounter undesirable situations of information leakage. The problem may be more serious when a passive eavesdropping device is [...] Read more.
Due to the inherent broadcasting nature and openness of wireless transmission channels, wireless communication systems are vulnerable to the eavesdropping of malicious attackers and usually encounter undesirable situations of information leakage. The problem may be more serious when a passive eavesdropping device is directly connected to the transmitter of a single-input single-output (SISO) system. To deal with this urgent situation, a novel IRS-assisted physical-layer secure transmission scheme based on joint transmitter perturbation and IRS reflection (JPR) is proposed, such that the secrecy of wireless SISO systems can be comprehensively guaranteed regardless of whether the reflection-based jamming from the IRS to the eavesdropper is blocked or not. Moreover, to develop a trade-off between the achievable performance and implementation complexity, we propose both element-wise and group-wise reflected perturbation alignment (ERPA/GRPA)-based IRS reflection strategies, respectively. In order to evaluate the achievable performance, we analyze the ergodic secrecy rate (ESR) and secrecy outage probability (SOP) of the SISO secure systems with the ERPA/GRPA-based JPRs, respectively. Finally, by characterizing the simulated and numerical ESR and SOP performance results, our proposed scheme is compared with the benchmark scheme of random phase-based reflection, which strongly demonstrates the effectiveness of our proposed scheme. Full article
(This article belongs to the Section Multidisciplinary Applications)
Show Figures

Figure 1

4 pages, 712 KiB  
Proceeding Paper
Sensor Location for Hydraulic Transient Monitoring and Leakage Location
by Rui Gabriel Souza, Bruno Brentan and Gustavo Meirelles
Eng. Proc. 2024, 69(1), 182; https://doi.org/10.3390/engproc2024069182 - 8 Oct 2024
Abstract
Distribution Networks operate dynamically due to variable water consumption, but optimal operation is hindered by leakages, which increase treatment costs, energy consumption, and water shortage risks. Detecting and locating leaks, especially slow or low-flow ones, is challenging with steady-state data. However, during transient [...] Read more.
Distribution Networks operate dynamically due to variable water consumption, but optimal operation is hindered by leakages, which increase treatment costs, energy consumption, and water shortage risks. Detecting and locating leaks, especially slow or low-flow ones, is challenging with steady-state data. However, during transient events, pressure oscillations are influenced by leaks, providing valuable signal attenuation for leak location. This study evaluates the pressure signal during valve closures to identify optimal monitoring points and valve operation rules, aiming to maximize information collection during transients. The findings aim to enhance leak detection strategies and improve network efficiency. Full article
Show Figures

Figure 1

25 pages, 12156 KiB  
Article
Monthly Maximum Magnitude Prediction in the North–South Seismic Belt of China Based on Deep Learning
by Ning Mao, Ke Sun and Jingye Zhang
Appl. Sci. 2024, 14(19), 9001; https://doi.org/10.3390/app14199001 - 6 Oct 2024
Abstract
The North–South Seismic Belt is one of the major regions in China where strong earthquakes frequently occur. Predicting the monthly maximum magnitude is of significant importance for proactive seismic hazard defense. This paper uses seismic catalog data from the North–South Seismic Belt since [...] Read more.
The North–South Seismic Belt is one of the major regions in China where strong earthquakes frequently occur. Predicting the monthly maximum magnitude is of significant importance for proactive seismic hazard defense. This paper uses seismic catalog data from the North–South Seismic Belt since 1970 to calculate and extract multiple seismic parameters. The monthly maximum magnitude is processed using Variational Mode Decomposition (VMD) with sample segmentation to avoid information leakage. The decomposed multiple modal data and seismic parameters together form a new dataset. Based on these datasets, this paper employs four deep learning models and four time windows to predict the monthly maximum magnitude, using prediction accuracy (PA), False Alarm Rate (FAR), and Missed Alarm Rate (MR) as evaluation metrics. It is found that a time window of 12 generally yields better prediction results, with the PA for Ms 5.0–6.0 earthquakes reaching 77.27% and for earthquakes above Ms 6.0 reaching 12.5%. Compared to data not decomposed using VMD, traditional error metrics show only a slight improvement, but the model can better predict short-term trends in magnitude changes. Full article
(This article belongs to the Special Issue Advanced Research in Seismic Monitoring and Activity Analysis)
Show Figures

Figure 1

30 pages, 1590 KiB  
Article
Enhancing Cybersecurity through Comprehensive Investigation of Data Flow-Based Attack Scenarios
by Sara Abbaspour Asadollah, Shamoona Imtiaz, Alireza Dehlaghi-Ghadim, Mikael Sjödin and Marjan Sirjani
J. Cybersecur. Priv. 2024, 4(4), 823-852; https://doi.org/10.3390/jcp4040039 - 4 Oct 2024
Abstract
Integration of the Internet of Things (IoT) in industrial settings necessitates robust cybersecurity measures to mitigate risks such as data leakage, vulnerability exploitation, and compromised information flows. Recent cyberattacks on critical industrial systems have highlighted the lack of threat analysis in software development [...] Read more.
Integration of the Internet of Things (IoT) in industrial settings necessitates robust cybersecurity measures to mitigate risks such as data leakage, vulnerability exploitation, and compromised information flows. Recent cyberattacks on critical industrial systems have highlighted the lack of threat analysis in software development processes. While existing threat modeling frameworks such as STRIDE enumerate potential security threats, they often lack detailed mapping of the sequences of threats that adversaries might exploit to apply cyberattacks. Our study proposes an enhanced approach to systematic threat modeling and data flow-based attack scenario analysis for integrating cybersecurity measures early in the development lifecycle. We enhance the STRIDE framework by extending it to include attack scenarios as sequences of threats exploited by adversaries. This extension allows us to illustrate various attack scenarios and demonstrate how these insights can aid system designers in strengthening their defenses. Our methodology prioritizes vulnerabilities based on their recurrence across various attack scenarios, offering actionable insights for enhancing system security. A case study in the automotive industry illustrates the practical application of our proposed methodology, demonstrating significant improvements in system security through proactive threat modeling and analysis of attack impacts. The results of our study provide actionable insights to improve system design and mitigate vulnerabilities. Full article
Show Figures

Figure 1

23 pages, 1740 KiB  
Review
PreSCAN: A Comprehensive Review of Pre-Silicon Physical Side-Channel Vulnerability Assessment Methodologies
by Md Kawser Bepary, Tao Zhang, Farimah Farahmandi and Mark Tehranipoor
Chips 2024, 3(4), 311-333; https://doi.org/10.3390/chips3040016 - 2 Oct 2024
Abstract
Physical side-channel attacks utilize power, electromagnetic (EM), or timing signatures from cryptographic implementations during operation to retrieve sensitive information from security-critical devices. This paper provides a comprehensive review of these potent attacks against cryptographic hardware implementations, with a particular emphasis on pre-silicon leakage [...] Read more.
Physical side-channel attacks utilize power, electromagnetic (EM), or timing signatures from cryptographic implementations during operation to retrieve sensitive information from security-critical devices. This paper provides a comprehensive review of these potent attacks against cryptographic hardware implementations, with a particular emphasis on pre-silicon leakage assessment methodologies. We explore the intricacies of cryptographic algorithms, various side-channel attacks, and the latest mitigation techniques. Although leakage assessment techniques are widely adopted in the post-silicon phase, pre-silicon leakage assessment is an emerging field that addresses the inherent limitations of its post-silicon counterpart. We scrutinize established post-silicon techniques and provide a detailed comparative analysis of pre-silicon leakage assessment across different abstraction levels in the hardware design and verification flow. Furthermore, we categorize and discuss existing pre-silicon power and electromagnetic modeling techniques for leakage detection and mitigation that can be integrated with electronic design automation (EDA) tools to automate security assessments. Lastly, we offer insights into the future trajectory of physical side-channel leakage assessment techniques in the pre-silicon stages, highlighting the need for further research and development in this critical area of cybersecurity. Full article
Show Figures

Figure 1

20 pages, 2474 KiB  
Article
Privacy-Preserving Electric Vehicle Charging Recommendation by Incorporating Full Homomorphic Encryption and Secure Multi-Party Computing
by Yiqi Liu, Jiaxin Ju and Zhiyi Li
World Electr. Veh. J. 2024, 15(10), 446; https://doi.org/10.3390/wevj15100446 - 29 Sep 2024
Abstract
Electric vehicle (EV) charging recommendation can significantly improve global planning performance, corresponding to an increasing risk of privacy leakage. Based on this, this paper investigates the privacy data preservation strategy during the interaction between EVs and charging facilities. It proposes a privacy preservation [...] Read more.
Electric vehicle (EV) charging recommendation can significantly improve global planning performance, corresponding to an increasing risk of privacy leakage. Based on this, this paper investigates the privacy data preservation strategy during the interaction between EVs and charging facilities. It proposes a privacy preservation strategy that aims to ensure EV information security. In a cloud computing environment, users do not want other users and cloud providers to have access to their personal information, which is precisely the problem that secure multi-party computing (SMPC) can solve. At present, full homomorphic encryption (FHE) can solve the problem of user data privacy preservation in cloud computing and big data environments and can realize the whole encryption process. Therefore, a more reasonable charging station selection scheme is provided under the computation of privacy preservation strategies incorporating the FHE-SMPC method. The effectiveness and implementation feasibility of the designed privacy preservation strategy in practical applications is verified through testing and comparative analysis. The results show that the developed strategy can significantly reduce the risk of privacy leakage with limited communication resources and computation time consumption. The results provide new perspectives and methodologies for interactive privacy preservation between EVs and charging stations, with application potential. Full article
Show Figures

Graphical abstract

16 pages, 1844 KiB  
Article
A Transformer-Based Approach to Leakage Detection in Water Distribution Networks
by Juan Luo, Chongxiao Wang, Jielong Yang and Xionghu Zhong
Sensors 2024, 24(19), 6294; https://doi.org/10.3390/s24196294 - 28 Sep 2024
Abstract
The efficient detection of leakages in water distribution networks (WDNs) is crucial to ensuring municipal water supply safety and improving urban operations. Traditionally, machine learning methods such as Convolutional Neural Networks (CNNs) and Autoencoders (AEs) have been used for leakage detection. However, these [...] Read more.
The efficient detection of leakages in water distribution networks (WDNs) is crucial to ensuring municipal water supply safety and improving urban operations. Traditionally, machine learning methods such as Convolutional Neural Networks (CNNs) and Autoencoders (AEs) have been used for leakage detection. However, these methods heavily rely on local pressure information and often fail to capture long-term dependencies in pressure series. In this paper, we propose a transformer-based model for detecting leakages in WDNs. The transformer incorporates an attention mechanism to learn data distributions and account for correlations between historical pressure data and data from the same time on different days, thereby emphasizing long-term dependencies in pressure series. Additionally, we apply pressure data normalization across each leakage scenario and concatenate position embeddings with pressure data in the transformer model to avoid feature misleading. The performance of the proposed method is evaluated by using detection accuracy and F1-score. The experimental studies conducted on simulated pressure datasets from three different WDNs demonstrate that the transformer-based model significantly outperforms traditional CNN methods. Full article
(This article belongs to the Section Electronic Sensors)
Show Figures

Figure 1

13 pages, 5724 KiB  
Article
Comparative Approach to De-Noising TEMPEST Video Frames
by Alexandru Mădălin Vizitiu, Marius Alexandru Sandu, Lidia Dobrescu, Adrian Focșa and Cristian Constantin Molder
Sensors 2024, 24(19), 6292; https://doi.org/10.3390/s24196292 - 28 Sep 2024
Abstract
Analysis of unintended compromising emissions from Video Display Units (VDUs) is an important topic in research communities. This paper examines the feasibility of recovering the information displayed on the monitor from reconstructed video frames. The study holds particular significance for our understanding of [...] Read more.
Analysis of unintended compromising emissions from Video Display Units (VDUs) is an important topic in research communities. This paper examines the feasibility of recovering the information displayed on the monitor from reconstructed video frames. The study holds particular significance for our understanding of security vulnerabilities associated with the electromagnetic radiation of digital displays. Considering the amount of noise that reconstructed TEMPEST video frames have, the work in this paper focuses on two different approaches to de-noising images for efficient optical character recognition. First, an Adaptive Wiener Filter (AWF) with adaptive window size implemented in the spatial domain was tested, and then a Convolutional Neural Network (CNN) with an encoder–decoder structure that follows both classical auto-encoder model architecture and U-Net architecture (auto-encoder with skip connections). These two techniques resulted in an improvement of more than two times on the Structural Similarity Index Metric (SSIM) for AWF and up to four times for the SSIM for the Deep Learning (DL) approach. In addition, to validate the results, the possibility of text recovery from processed noisy frames was studied using a state-of-the-art Tesseract Optical Character Recognition (OCR) engine. The present work aims to bring to attention the security importance of this topic and the non-negligible character of VDU information leakages. Full article
(This article belongs to the Section Sensing and Imaging)
Show Figures

Figure 1

20 pages, 2673 KiB  
Article
Research on a Metal Surface Defect Detection Algorithm Based on DSL-YOLO
by Zhiwen Wang, Lei Zhao, Heng Li, Xiaojun Xue and Hui Liu
Sensors 2024, 24(19), 6268; https://doi.org/10.3390/s24196268 - 27 Sep 2024
Abstract
In industrial manufacturing, metal surface defect detection often suffers from low detection accuracy, high leakage rates, and false detection rates. To address these issues, this paper proposes a novel model named DSL-YOLO for metal surface defect detection. First, we introduce the C2f_DWRB structure [...] Read more.
In industrial manufacturing, metal surface defect detection often suffers from low detection accuracy, high leakage rates, and false detection rates. To address these issues, this paper proposes a novel model named DSL-YOLO for metal surface defect detection. First, we introduce the C2f_DWRB structure by integrating the DWRB module with C2f, enhancing the model’s ability to detect small and occluded targets and effectively extract sparse spatial features. Second, we design the SADown module to improve feature extraction in challenging tasks involving blurred images or very small objects. Finally, to further enhance the model’s capacity to extract multi-scale features and capture critical image information (such as edges, textures, and shapes) without significantly increasing memory usage and computational cost, we propose the LASPPF structure. Experimental results demonstrate that the improved model achieves significant performance gains on both the GC10-DET and NEU-DET datasets, with a [email protected] increase of 4.2% and 2.6%, respectively. The improvements in detection accuracy highlight the model’s ability to address common challenges while maintaining efficiency and feasibility in metal surface defect detection, providing a valuable solution for industrial applications. Full article
(This article belongs to the Section Fault Diagnosis & Sensors)
Show Figures

Figure 1

28 pages, 12031 KiB  
Article
Key Synchronization Method Based on Negative Databases and Physical Channel State Characteristics of Wireless Sensor Network
by Haoyang Pu, Wen Chen, Hongchao Wang and Shenghong Bao
Sensors 2024, 24(19), 6217; https://doi.org/10.3390/s24196217 - 25 Sep 2024
Abstract
Due to their inherent openness, wireless sensor networks (WSNs) are vulnerable to eavesdropping attacks. Addressing the issue of secure Internet Key Exchange (IKE) in the absence of reliable third parties like CA/PKI (Certificate Authority/Public Key Infrastructure) in WSNs, a novel key synchronization method [...] Read more.
Due to their inherent openness, wireless sensor networks (WSNs) are vulnerable to eavesdropping attacks. Addressing the issue of secure Internet Key Exchange (IKE) in the absence of reliable third parties like CA/PKI (Certificate Authority/Public Key Infrastructure) in WSNs, a novel key synchronization method named NDPCS-KS is proposed in the paper. Firstly, through an initial negotiation process, both ends of the main channels generate the same initial key seeds using the Channel State Information (CSI). Subsequently, negotiation keys and a negative database (NDB) are synchronously generated at the two ends based on the initial key seeds. Then, in a second-negotiation process, the NDB is employed to filter the negotiation keys to obtain the keys for encryption. NDPCS-KS reduced the risk of information leakage, since the keys are not directly transmitted over the network, and the eavesdroppers cannot acquire the initial key seeds because of the physical isolation of their eavesdropping channels and the main channels. Furthermore, due to the NP-hard problem of reversing the NDB, even if an attacker obtains the NDB, deducing the initial key seeds is computationally infeasible. Therefore, it becomes exceedingly difficult for attackers to generate legitimate encryption keys without the NDB or initial key seeds. Moreover, a lightweight anti-replay and identity verification mechanism is designed to deal with replay attacks or forgery attacks. Experimental results show that NDPCS-KS has less time overhead and stronger randomness in key generation compared with other methods, and it can effectively counter replay, forgery, and tampering attacks. Full article
(This article belongs to the Section Sensor Networks)
Show Figures

Figure 1

26 pages, 10499 KiB  
Article
Novel Adaptive Hidden Markov Model Utilizing Expectation–Maximization Algorithm for Advanced Pipeline Leak Detection
by Omid Zadehbagheri, Mohammad Reza Salehizadeh, Seyed Vahid Naghavi, Mazda Moattari and Behzad Moshiri
Modelling 2024, 5(4), 1339-1364; https://doi.org/10.3390/modelling5040069 - 24 Sep 2024
Abstract
In the oil industry, the leakage of pipelines containing hydrocarbon fluids causes significant environmental and economic damage. Recently, there has been a growing trend in employing data mining techniques for detecting leaks. Among these methods is the Hidden Markov Model, which, despite good [...] Read more.
In the oil industry, the leakage of pipelines containing hydrocarbon fluids causes significant environmental and economic damage. Recently, there has been a growing trend in employing data mining techniques for detecting leaks. Among these methods is the Hidden Markov Model, which, despite good results with stationary data, becomes inefficient when a leak causes a drop in the pressure or flow, reducing its accuracy. This paper presents an adaptive Hidden Markov method. Previous methods had low accuracy due to insufficient information for accurate leak detection. They often classified the size and location of leaks broadly. In contrast, the proposed model extracts hidden features to accurately identify the location and size of leaks, even in noisy conditions. Simulating a leak in a section of an oil pipeline in the Iranian Oil Export Corridor demonstrates the proposed method’s superiority over common methods like K-NN, SVM, Naive Bayes, and logistic regression. Full article
(This article belongs to the Topic Oil and Gas Pipeline Network for Industrial Applications)
Show Figures

Figure 1

23 pages, 14688 KiB  
Article
Research on Signal Noise Reduction and Leakage Localization in Urban Water Supply Pipelines Based on Northern Goshawk Optimization
by Xin Chen, Zhu Jiang, Jiale Li, Zhendong Zhao and Yunyun Cao
Sensors 2024, 24(18), 6091; https://doi.org/10.3390/s24186091 - 20 Sep 2024
Abstract
In order to enhance the accuracy and adaptability of urban water supply pipeline leak localization, based on the Northern Goshawk Optimization, a novel joint denoising method is proposed in this paper to reduce noise in negative pressure wave signals caused by leaks. Firstly, [...] Read more.
In order to enhance the accuracy and adaptability of urban water supply pipeline leak localization, based on the Northern Goshawk Optimization, a novel joint denoising method is proposed in this paper to reduce noise in negative pressure wave signals caused by leaks. Firstly, the Northern Goshawk Optimization optimizes the decomposition levels and penalty factors of Variational Mode Decomposition, and obtains their optimal combination. Subsequently, the optimized parameters are used to decompose the pressure signals into modal components, and the effective components and noise components are distinguished according to the correlation coefficients. Then, an optimized wavelet thresholding method is applied to the selected effective components for secondary denoising. Finally, the signal components that have been denoised twice are reconstructed with the effective signal components, and the denoised negative pressure wave signals are obtained. Simulation experiments demonstrate that compared to wavelet transforms and Empirical Mode Decomposition, our method achieves the highest signal-to-noise ratio improvement of 12.23 dB and normalized cross correlation of 0.991. It effectively preserves useful leak information in the signal while suppressing noise, laying a solid foundation for improving leak localization accuracy. After several leak simulation tests on the leakage simulation test platform, the test results verify the effectiveness of the proposed method. The minimum relative error of the leakage localization is 0.29%, and an average relative error is 1.64%, achieving accurate leakage localization. Full article
(This article belongs to the Section Navigation and Positioning)
Show Figures

Figure 1

15 pages, 836 KiB  
Article
Regional Load Forecasting Scheme for Security Outsourcing Computation
by Qizhan Chen, Ruifeng Zhao, Bin Li, Zewei Liu, Huijun Zhuang and Chunqiang Hu
Electronics 2024, 13(18), 3712; https://doi.org/10.3390/electronics13183712 - 19 Sep 2024
Abstract
Smart grids generate an immense volume of load data. When analyzed using intelligent technologies, these data can significantly improve power load management, optimize energy distribution, and support green energy conservation and emissions reduction goals. However, in the process of data utilization, a pertinent [...] Read more.
Smart grids generate an immense volume of load data. When analyzed using intelligent technologies, these data can significantly improve power load management, optimize energy distribution, and support green energy conservation and emissions reduction goals. However, in the process of data utilization, a pertinent issue arises regarding potential privacy leakage concerning both regional and individual user power load data. This paper addresses the scenario of outsourcing computational tasks for regional power load forecasting in smart grids, proposing a regional-level load forecasting solution based on secure outsourcing computation. Initially, the scheme designs a secure outsourcing training protocol to carry out model training tasks while ensuring data security. This protocol guarantees that sensitive information, including but not limited to individual power consumption data, remains comprehensively safeguarded throughout the entirety of the training process, effectively mitigating any potential risks of privacy infringements. Subsequently, a secure outsourcing online prediction protocol is devised, enabling efficient execution of prediction tasks while safeguarding data privacy. This protocol ensures that predictions can be made without compromising the privacy of individual or regional power load data. Ultimately, experimental analysis demonstrates that the proposed scheme meets the requirements of privacy, accuracy, and timeliness for outsourcing computational tasks of load forecasting in smart grids. Full article
Show Figures

Figure 1

12 pages, 1966 KiB  
Project Report
The Impact of an Automation System Built with Jenkins on the Efficiency of Container-Based System Deployment
by Giwoo Hyun, Jiwon Oak, Donghoon Kim and Kunwoo Kim
Sensors 2024, 24(18), 6002; https://doi.org/10.3390/s24186002 - 16 Sep 2024
Abstract
This paper evaluated deployment efficiency by comparing manual deployment with automated deployment through a CI/CD pipeline using Jenkins. This study involved moving from a manual deployment process to an automated system using Jenkins and experimenting with both deployment methods in a real-world environment. [...] Read more.
This paper evaluated deployment efficiency by comparing manual deployment with automated deployment through a CI/CD pipeline using Jenkins. This study involved moving from a manual deployment process to an automated system using Jenkins and experimenting with both deployment methods in a real-world environment. The results showed that the automated deployment system significantly reduced the deployment time compared to manual deployment and significantly reduced the error rate. Manual deployment required human intervention at each step, making it time-consuming and prone to mistakes, while automated deployment using Jenkins automated each step to ensure consistency and maximized time efficiency through parallel processing. Automated testing verified the stability of the code before deployment, minimizing errors. This study demonstrates the effectiveness of adopting a CI/CD pipeline and shows that automated systems can provide high efficiency in real-world production environments. It also highlights the importance of security measures to prevent sensitive information leakage during CI/CD, suggesting the use of secrecy management tools and environment variables and limiting access rights. This research will contribute to exploring the applicability of CI/CD pipelines in different environments and, in doing so, validate the universality of automated systems. Full article
(This article belongs to the Section Intelligent Sensors)
Show Figures

Figure 1

19 pages, 322 KiB  
Article
Supporting Women after Obstetric Fistula Surgery to Enhance Their Social Participation and Inclusion
by Tibeb Debele, Heather M. Aldersey, Danielle Macdonald, Zelalem Mengistu, Dawit Gebeyehu Mekonnen and Beata Batorowicz
Int. J. Environ. Res. Public Health 2024, 21(9), 1201; https://doi.org/10.3390/ijerph21091201 - 10 Sep 2024
Abstract
Obstetric fistula is a childbirth complication causing abnormal openings between the urinary, bowel, and genital tracts, leading to involuntary leakage and potential long-term disability. Even after surgical repair, women continue to face psychological and social challenges that affect their social inclusion and participation. [...] Read more.
Obstetric fistula is a childbirth complication causing abnormal openings between the urinary, bowel, and genital tracts, leading to involuntary leakage and potential long-term disability. Even after surgical repair, women continue to face psychological and social challenges that affect their social inclusion and participation. This study explored family and service provider perspectives on current support systems and identified gaps affecting women’s inclusion and participation post-fistula surgery. Building on a prior study of women who underwent obstetric fistula surgical repair, we qualitatively examined available formal and informal post-surgical supports in Ethiopia. We conducted 20 interviews with family members and service providers and analyzed them using Charmaz’s grounded theory inductive analysis approach. We identified four themes that indicated the available formal support in fistula care, the impact of formal support on women’s social participation and inclusion, the gaps in formal support systems, and post-surgery informal supports and their challenges. Both groups believed support needs for women after surgery remain unmet, highlighting the need to strengthen holistic support services to improve women’s social inclusion and participation. This study contributes to limited research on formal and informal support for women, emphasizing the need for enhanced economic, psychological, and sexual health-related support post-obstetric fistula surgery. Full article
Back to TopTop