Relay Secrecy in Wireless Networks with Eavesdropper

Size: px
Start display at page:

Download "Relay Secrecy in Wireless Networks with Eavesdropper"

Transcription

1 Relay Secrecy n Wreless Networks wth Eavesdropper Parvathnathan Venktasubramanam, Tng He and Lang Tong School of Electrcal and Computer Engneerng Cornell Unversty, Ithaca, NY Emal : {pv45, th255, lt35}@cornell.edu Abstract Anonymous montorng of transmssons n a wreless network by eavesdroppers can provde crtcal nformaton about the data flows n the network. It s, therefore, necessary to desgn network protocols that mantan secrecy of routes from eavesdroppers. In ths work, we present a mathematcal formulaton of route secrecy when eavesdroppers observe transmsson epochs of nodes. We propose a schedulng technque to provde complete secrecy of routes, and based on that, characterze achevable rate regons for two hop source destnaton pars wth a common relay under two PHY models : transmtter drected and recever drected spread spectrum sgnalng. The results are also extended to the case when an addtonal constrant on packet loss s mposed. Index Terms - Network Securty, Secrecy, Multple Access, Packet Loss. I. INTRODUCTION Wreless networks are prone to anonymous montorng by eavesdroppers, who wsh to gan valuable network nformaton, namely source-destnaton pars and data flows. Equpped wth ths knowledge, t s possble for malcous adversares to then target specfc routes for ntruson or jammng. Actve ntruson attacks can be countered by sophstcated ntruson detecton mechansms. On the other hand, passve montorng does not affect the network operaton, and s not possble to detect. It s, therefore, necessary to modfy the network protocols, so that nformaton about data flows or source-destnaton pars are not traceable by eavesdroppers montorng node transmssons. The nference of routng nformaton from montored transmssons, known as traffc analyss attack, s done n a varety of ways. The eavesdropper can dentfy a flow of traffc by correlatng packet contents, packet lengths or transmsson epochs across multple nodes. Encryptng and random paddng of bts are some measures adopted to remove the correlaton of contents and lengths of packets across nodes. In Ths work s supported n part by TRUST (The Team for Research n Ubqutous Secure Technology), whch receves support from the Natonal Scence Foundaton (NSF award number CCF ) and the followng organzatons: Csco, ESCHER, HP, IBM, Intel, Mcrosoft, ORNL, Qualcomm, Prell, Sun and Symantec, and the U. S. Army Research Laboratory under the Collaboratve Technology Allance Program, Cooperatve Agreement DAAD The U. S. Government s authorzed to reproduce and dstrbute reprnts for Government purposes notwthstandng any copyrght notaton thereon. Informaton Flows Montored Nodes Fg. 1: Wreless Network wth Eavesdropper ths work, we are nterested n the desgn of secure transmsson schedules to prevent nference of routes by traffc analyss. In the absence of an eavesdropper, the transmsson schedule of relayng nodes are dependent on the arrval of packets, subject to the delay requrements. When transmssons are montored, however, t may be necessary to decouple the transmsson schedule of the nodes from the actual traffc flow to prevent flow correlaton. For delay senstve traffc, ths may not be possble wthout reducng network performance. In partcular, the desgn of such schedules would requre transmsson of dummy packets and could also result n packet drops. It s, therefore, necessary to characterze the achevable network performance under secrecy constrants. Sources Destnatons Fg. 2: m 1 Relay In ths work, we consder the problem of secrecy for a one-hop multplex relay as shown n Fgure 2. In partcular, we characterze the set of achevable relay rates, when packets are subjected to a strct delay crteron under two PHY models : transmtter drected and recever drected spread spectrum sgnalng. We provde transmsson schemes to prevent flow correlaton and show that as the delay ncreases, the achevable rate regon converges to the optmal regon. Furthermore, we also present achevable rate

2 regons when an addtonal constrant on packet loss s mposed. A. Related Work A countermeasure to traffc analyss attacks was frst provded through the noton of Mx-net by Chaum[1]. A Mx s an ntermedate node that reencrypts and reorders packets from multple sources to prevent matchng of source and destnaton streams. The dea has been used effectvely n provdng anonymous communcaton for nternet applcatons[2], [3], [4], [5]. For wreless networks wthout delay constrants, ndependent random transmsson schedules were used n[6] to prevent flow correlaton. The use of randomzed routes as a countermeasure to traffc analyss attacks has been consdered n [7], [8]. For low latency networks, t has been shown n [9] that smple mxng technques are not effectve to prevent correlaton of transmsson epochs. Ther proposed soluton utlzed the dea of transmttng dummy packets to make departure epochs dentcal rrespectve of the flows. The dea of havng fxed transmsson schedules ndependent of routes has also been consdered n [10], where the authors gve bounds on the performance loss ncurred due to the secrecy constrants. The theoretcal framework for secrecy n ths work s motvated by the noton of equvocaton developed by Shannon n [11]. The secrecy constrant we consder s a specal case of Shannon s equvocaton, known as maxmum secrecy[12], wheren the observatons provde zero nformaton about the source. A. Defntons II. PROBLEM SETUP Let the network be represented by a graph G = (V, E), where V s the set of nodes and E s the set of lnks between pars of nodes. A lnk (A, B) belongng to E denotes that node B can lsten to the transmssons from A and vce-versa. Let Y A = {Y A (1), Y A (2), } denote the tme nstants (known as departure epochs) at whch A transmts packets. The transmsson rate T A of a node A s defned as the average number of packets per unt tme transmtted by A. In other words, n T A = lm n Y A (n). Packets from source nodes are routed through ntermedate relays before they reach the destnaton. In general, the tasks carred out by a relay can be mult varous; t can choose to decode and re-encode blocks of packets, t can relay unaltered packets after a random delay or t can re-order the packets before transmsson. Re-encrypton and packet paddng occur at every node/relay to prevent any content based correlaton. We are concerned wth the knd of traffc, wheren each packet needs to be relayed wthn a fxed delay constrant. We restrct the tasks of a relay to packet-reorderng and tmng perturbaton. Dependng on ts transmsson schedule, a relay pcks departure epochs for the arrvng packets such that the delay constrant s satsfed. A packet that s not relayed wthn tme unts after arrval s dropped. A formal defnton of a relay functon s gven as follows. Let Y A = {Y A (1), Y A (2),, Y A (n)} represent the departure epochs of packets from A and Y B = {Y B (1), Y B (2),, Y B (n)} represent the departure epochs of packets from B. A 1 1 relay map s an algorthm that pcks a subsequence YA s of Y A and an equal length subsequence YB s of Y B such that, 0 YB s() Y A s (). If Y A = n and YA s = k(n), then the relay rate λ(m) of the 1 1 relay map M s gven by k(n) λ = lm n YA s(k(n)). The rate of a relay map s dependent on the transmsson rates of the nodes. A sngle node can serve as a relay to multple sources. An m 1 relay map s an algorthm that pcks subsequences YA s 1, YA s 2,, YA s m from departure epochs of m nodes A 1,, A m and a subsequence YB s from the departure epoch of the relay node B such that 1) YB s = m =1 Ys A. 2) Let Y s be the sequence formed by the concatenatng YA s 1,, YA s m and orderng the epochs n ascendng order. Then, Y s, 0 Y s B() Y s (). An m 1 relay map s assocated wth a relay rate vector λ(m) = (λ 1,, λ m ) whch s gven by where k (n) = Y s A. k (n) λ = lm n YA s (k (n)), B. Medum Access Constrants Nodes n a wreless network share a common channel and transmssons are susceptble to fadng and nterference. Dependng on the PHY model, the rates of transmsson are subjected to some medum access constrants specfed by a regon of rate vectors C. If the transmsson rates of the nodes belong to C, the packets are receved successfully at the recevng node. To ths extent, we consder two dfferent spread spectrum sgnalng models : transmtter drected and recever drected spreadng sequences. Transmtter Drected Spreadng Sequences : Each transmttng node n a shared channel uses an orthogonal spreadng code to transmt ts packets. The constrants on transmsson rates for the nodes are therefore ndependent. In other words, for a set of

3 nodes A 1,, A n, the medum access regon s gven by A 1 D 2 C = {(T A1,, T An : T A C A, = 1,, n}. A 2 B D 1 Recever Drected Spreadng Sequences : The nodes transmttng to a common node/relay use the same spreadng sequence. Each recevng node has an ndependent rate constrant. The sum-rate of nodes transmttng to a sngle recever s therefore bounded by a maxmum value. If nodes A 1,, A n transmt packets to node B, the regon C s gven by C. Secrecy C = {(T A1,, T An : T A C B }. As mentoned earler, by correlatng transmsson epochs from multple nodes, the eavesdropper can obtan nformaton about routes wthn the network. The goal s, therefore, to schedule transmssons so as to maxmze the secrecy of the routes wth respect to the eavesdropper. Secrecy can be formally defned as follows. Let A = {A 1, A 2,, A k } be a set of nodes and F 2 A denote the set of all ordered node-pars n A ( F = A ( A 1)). Snce transmssons from nodes not physcally connected can be correlated to nfer a flow, t s necessary to consder all possble node-pars. Durng a gven sesson, the set of node-pars n F that requre non-zero relay rate s denoted by the flow vector F 2 F. We defne A to have complete relay secrecy f the transmsson epochs of the nodes n A and F are ndependent. In other words, the condtonal dstrbuton p(y A1, Y A2,, Y Ak F ) = p(y A1, Y A2,, Y Ak ). (1) If for any flow vector F, the jont dstrbuton of transmsson epochs s unaltered, then t s mpossble to nfer the flow to any degree of accuracy. D. Achevable Rates A rate vector R = (R 1,, R m ) for a set of node-pars wth common relay {(A 1, B), (A 2, B),, (A m, B)} s an achevable rate vector, f there exsts a condtonal dstrbuton p(y A1, Y A2,, Y Am F ) and an m 1 relay map such that followng condtons are satsfed 1) The transmsson rate {T A1, T A2,, T Am, T B } satsfy the medum access constrants (4). 2) For every realzaton (Y A1,, Y Am ), λ (M) R, = 1,, m. 3) {A 1,, A m, B} have complete relay secrecy. In the followng secton, we present an achevable rate regon for the specal case of provdng relay secrecy for an m 1 multplex relay (Fg. 3), where a sngle node relays packets from m nodes. The results A m D m Fg. 3: m 1 Relay are presented for the two PHY models dscussed n Secton II-B. III. RATE REGION In the absence of an eavesdropper, the flow-rates achevable n a network can be obtaned purely from the topology and medum access restrctons. In the presence of eavesdropper, however, the secrecy condton mposes addtonal constrants whch can lower the achevable rates. The secrecy condton n (1) ndcates that the dstrbuton of transmsson epochs are ndependent of the flows. A specal case of ths condton s when, the transmsson schedule of each node s drawn from an ndependent dstrbuton and the margnal dstrbutons are not dependent on the flows. In other words, for a set of nodes A 1,, A k p(y A1,, Y Ak F ) = p(y A1 )p(y A2 ) p(y Ak ). Statstcal ndependence of departure epochs s a suffcent condton to ensure relay secrecy. In general, t may be possble to desgn schedules such that the transmsson epochs are not ndependent and yet guarantee relay secrecy. The noton of flow ndependent schedules has also been consdered n [10], [7], wheren the transmsson schedules were fxed apror rrespectve of the data flows. We assume that the sources generate packets at Posson tme ponts whch determne the schedules of the source nodes. In order to satsfy the secrecy condton, the relay nodes generate departure epochs from ndependent Posson processes. To an eavesdropper montorng the nodes, t s mpossble to decpher the actual flows by observng tme ponts, snce at all tmes, the schedules are statstcally ndependent. However, due to the delay constrant, the secrecy condton leads to a reduced rate regon, whch s characterzed n the followng sectons. A. Recever Drected Sgnalng As mentoned earler, n order to ensure complete relay secrecy for an m 1 multplex relay, all the nodes nvolved have statstcally ndependent transmsson schedules. The schedules for the source nodes s determned by the source packet generaton process, whle the relay generates an ndependent Posson pont process. When the spreadng sequences are recever

4 drected, the constrants on transmsson rates are ndependent for dfferent recevng nodes. When characterzng the achevable rates for an m 1 relay, we assume that the destnaton nodes for dfferent sources are dstnct. Therefore, the constrant on the rates of the relay node are ndependent for each destnaton node. A B D Fg. 4: 1 1 Relay To characterze the achevable rates for a 1 1 relay map, we use the BOUNDED-GREEDY-MATCH (BGM) algorthm proposed n [13] that optmally maps Pont processes wth the least packet drops. Snce epochs are generated accordng to ndependent Posson processes, the strct delay constrant makes t mpossble to relay all transmtted packets. The relay rate s, therefore, strctly less than the transmsson rates of the nodes. Let node A be the source node sendng packets to destnaton D through relay B (see Fg. 4). The algorthm s as follows; When a packet arrves at B, f there exsts a departure epoch wthn of the arrval nstant and has not been matched to any prevous arrval, t s assgned to the arrved packet. Otherwse, the packet s dropped. The transmsson schedule of A s obtaned from the generaton tmes of packets whle node B generates an ndependent Posson process of a fxed rate and uses the algorthm to map arrval epochs to the generated schedule. Theorem 1: If the maxmum transmsson rates allowed to nodes B and D are C B and C D respectvely, respectvely, the maxmum achevable relay rate R between (A, B), when Y A, Y B are ndependent Posson processes s obtaned when T A = C B, T B = C D and s gven by R = C B C D. (2) C 2 B 1+C B C B = C D C D(e C (C B C D ) 1) B C De (C B C D ) C B Proof: Refer to Appendx. As s evdent from the expresson n Theorem 1, as, the maxmum relay rate s gven by mn{c B, C D }. Smlarly as C B, the maxmum rate s C D for any fnte and vce-versa. Clearly, when s fnte, the transmsson rates T A, T B of the nodes are strctly greater than the achevable nformaton relay rate, thereby resultng n packet drops. Packet losses can, however, be countered f the source employs forward error correctng (FEC) schemes. Snce the PHY layer s a recever drected sgnalng scheme, for an m 1 relay, each outgong stream from the relay would be an ndependent Posson process whch depends on the transmsson rate allowed to the partcular destnaton node. If there s no delay constrant, =, then the achevable rate regon s dentcal to the rate regon wthout any secrecy constrant; the relay node can store ncomng packets and regenerate them ndependently usng a Posson scheduler [6]. The rate regon s then determned solely based on medum access constrants. The achevable relay rate regon when nodes A 1,, A m send packets through relay B to destnatons D 1,, D m respectvely s gven by R C B ; R C D. (3) We assume the relay node decodes the packet headers and can dstngush packets arrvng from multple sources. Hence, the relay can treat the ncomng packets from each source as a separate stream, although the streams have the same spreadng code. For each source-destnaton par, the relay node uses the BGM algorthm to map the packets n each arrval process to the correspondng outgong stream. The followng theorem characterzes the achevable rate regon of ths m 1 relay map. Theorem 2: Let C B be the maxmum Tx. rate allowed to the relay B and C D the maxmum allowed rate to destnaton node D. An achevable rate regon R r for the m 1 relay s gven as follows. (R 1,, R m ) R r f T A1,, T Am such that ( C D e (T A C D ) 1 ) R T A, T C D e (TA CD ) A C B T A Proof: Refer to Appendx. T A represents the transmsson rate from source node A to the relay. Snce the BGM algorthm has been proven to mnmze the packet loss[14], ths strategy provdes the best achevable rates, when the transmsson schedules are drawn from ndependent Posson processes. It s easly seen from the theorem, that as, all rates that satsfy the medum access constrants (3) are achevable by ths technque. The achevable rate regon for a 2 1 relay wth recever drected sgnalng s shown n Fgure 5. B. Transmtter Drected Sgnalng When the sgnalng s transmtter drected, the constrant on the transmsson rates are ndependent for each source node and the relay. Moreover, snce the transmsson rate constrant for the relay s ndependent of the number of destnatons, the followng results hold even f multple source nodes share a common destnaton. If there s no delay constrant, =, then the achevable rate regon s dentcal to the rate regon wthout any secrecy constrant; the rate regon s then determned solely based on medum access constrants,.e.,, R C A ; R C B. (4)

5 Achevable Rate Regon : C D1 =3,C D2 =4,C B =5 R r = the packet from A s assgned that epoch. If Z = 0, then the packet that arrved earlest s assgned that epoch. By consderng all possble ndex assgnments and prorty values, the rate regon s obtaned. The algorthm for 2 nodes s formally stated n Table assumng A 1 has ndex 2 and prorty value α. 2.5 R R 1 Fg. 5: Achevable Regons for 2 1 relay wth Recever drected sgnalng : = 1 An achevable rate regon when s fnte can be obtaned through a drect extenson of the sngle source relay case consdered n the prevous secton. The relay node gnores the orgn of the packets and executes the BGM algorthm on the jont traffc from all the nodes. Ths strategy, whch we refer to as homogenous relay map results n an achevable rate regon R H gven by Theorem 3: (R 1,, R m ) belongs to R H ff T A [0, C A ], = 1,, m s.t C B (e ( j TA j CB) 1) R = T A C B e ( ( j TA j CB)) j T. A j Proof : Snce the relay gnores the source of the packets, t apples BGM algorthm on the jont arrval process of transmsson rate j T A j. The proof follows from Theorem 1. It s easly shown that as ncreases, the regon R H converges to the optmal rate regon gven by (3). Smlarly, as dscussed n the sngle relay case, as C B, t s possble to acheve all rate vectors satsfyng the medum access constrants. The regon n Theorem 2 can be sgnfcantly mproved f orgn of packets are taken nto consderaton. The algorthm we propose s the followng. The nodes transmttng to the relay are assgned unque ndces from 1 to m such that the node wth a hgher ndex s gven more prorty when n contenton. Every subset of nodes S 2 A s assgned a prorty value α(s) [0, 1]. As long as there s no contenton between packets from dfferent sources for a partcular departure epoch, the relay functons as a homogenous relay map. If packets from any subset of nodes S contend for the same departure epoch, the relay generates a Bernoull random varable Z B(α(S)). Let A be the node n S wth the hghest ndex. If Z = 1, then TABLE I: BOUNDED-PRIORITY-MATCH (α-bgm). BOUNDED-PRIORITY-MATCH(Y A1, Y A2, Y B, α, ): m 1 = m 2 = n = 1; whle (m 1 Y A1 or m 2 Y A1 ) and n Y B f Y B (n) Y A1 (m 1 ) < 0 and Y B (n) Y A2 (m 1 ) < 0 At Y B (n) Tx dummy packet; n = n + 1; else f Y B (n) Y A1 (m 1 ), Y B (n) Y A2 (m 2 ) > Y s A 1 = Y s A 1 Y A1 (m 1 ), Y s B = Ys B Y B(n) ; Drop Y A2 (m 2 ) ; Increment m 1, m 2, n by 1 ; else f Y B (n) Y A1 (m 1 ) >, Y B (n) Y A2 (m 2 ) Y s A 2 = Y s A 2 Y A2 (m 2 ), Y s B = Ys B Y B(n) ; Drop Y A1 (m 2 ) ; Increment m 1, m 2, n by 1 ; else f Y B (n) Y A1 (m 1 ), Y B (n) Y A2 (m 2 ) Generate random varable Z B(α) If Z = 0, = arg mn{y A1 (m 1 ), Y A2 (m 2 )} else = 1 Y s A = Y s A Y A (m ), Y s B = Ys B Y B(n) ; m = m + 1, n = n + 1 else Drop Y A1 (m 1 ), Y A2 (m 2 ); Increment m 1, m 2 by 1 ; end end end Let R P denote the set of all rate vectors achevable by usng the prorty relay map (all prorty assgnments). The followng theorem provdes bounds for R P. Theorem 4: Let R out = {(R 1, R 2 ) : R f(c A, C D ), R f( C A, C D )}, (5) where f(a, b) = a b(e (a b) 1) be ( (a b)) a. (6) Then, R H R P R out. Proof: Refer to Appendx The outer bound R out descrbed n the theorem s a tghter bound (than (3)) to the achevable rate regon when we restrct the epochs to be ndependent Posson transmssons. Fgure 6 plots an example of the dfferent regons for a 2 1 relay. As can be seen, the achevable rate regon of the prorty relay map R P nearly concdes wth the outer bound. As ncreases, the regons R H, R P and R out converge to the optmal regon gven by (4). C. Fxed Packet Loss As mentoned n Secton III-A, the fnte delay constrant mposed on the transmsson schedule results n packet loss. Hence, t s necessary for the source to use a forward error correcton scheme to ensure relable

6 R Achevable Rate Regon : C A1 =3, C A2 =4,C B = R 1 Fg. 6: Achevable Regons for 2 1 relay wth Transmtter drected sgnalng : = 1 R P R out R H = recovery of packets at the destnaton. In practce, t may be necessary to desgn strateges for a fxed packet drop fracton ɛ dependng on the nature of data and avalablty of good codes. The followng theorem characterzes an achevable rate regon for the m 1 relay, such that the packet drop fracton s less than a fxed ɛ. Theorem 5: 1. The achevable relay rate regon R ɛ for the m 1 relay wth packet loss constrant ɛ for transmtter drected sgnalng s gven by R R H S ɛ, where { } S (R 1,, R m ) : R x(1 ɛ) and x s the soluton of C B x C B exp( (x C B )) x. (7) 2. The achevable relay rate regon R r ɛ for the m 1 relay wth packet loss constrant ɛ for recever drected sgnalng s gven by R r R r S ɛ, where S {(R 1,, R m ) : R x (1 ɛ), = 1,, m}, and x s the soluton of C D x. (8) C D exp( (x C D )) x Proof: Refer to Appendx The rate regon n Theorem 5 s obtaned by usng the homogenous relay map scheme descrbed n SectonIII-B coupled wth the constrant on sumtransmsson rate due to the packet loss fracton ɛ. IV. CONCLUSIONS In ths work, we formally defned the problem of hdng data flows from eavesdroppers observng transmsson epochs. We proposed a possble soluton for provdng complete secrecy and characterzed, achevable rates for a multplex relay n Posson traffc. Allowng relays to perform re-encodng s a worthwhle extenson to pursue. Although we have consdered only a sngle relay system, the basc deas are extendable to longer routes also. REFERENCES [1] D. Chaum, Untraceable electronc mal, return addresses and dgtal pseudonyms, Communcatons of the ACM, vol. 24, pp , February [2] Q. Sun, D. R. Smon, Y. Wang, W. Russell, V. N. Padmanabhan, and L. Qu, Statstcal dentfcaton of encrypted web browsng traffc, n Proceedngs of the 2002 IEEE Symposum on Securty and Prvacy, (Berkeley, Calforna), p. 19, May [3] C. Gulcu and G. Tsudk, Mxng e-mal wth babel, n Proceedngs of the Symposum on Network and Dstrbuted System Securty, pp. 2 19, February [4] G. Danezs, R. Dngledne, and N. Mathewson, Mxmnon: desgn of a type anonymous remaler protocol, n Proceedngs of 2003 Symposum on Securty and Prvacy, pp. 2 15, May [5] M. K. Reter and A. D. Rubn, Crowds: anonymty for Web transactons, ACM Transactons on Informaton and System Securty, vol. 1, no. 1, pp , [6] X. Hong, P. Wang, J. Kong, Q. Zheng, and J. Lu, Effectve Probablstc Approach Protectng Sensor Traffc, n Mltary Communcatons Conference, 2005, (Atlantc Cty, NJ), pp. 1 7, Oct [7] S. Jang, N. H. Vadya, and W. Zhao, A mx route algorthm for mx-net n wreless moble ad hoc networks, n Proceedngs of IEEE Moble Sensor and Ad-hoc and Sensor Systems, pp , October [8] J. Kong and X. Hong, Anodr: Anonymous on demand routng wth untraceable routes for moble ad-hoc networks, n ACM lntematonal Symposum on Moble Ad Hoc Nefworkng and Computng, (Annapols, MD), June [9] Y. Zhu, X. Fu, B. Graham, R.Bettat, and W. Zhao, On flow correlaton attacks and countermeasures n mx networks, n Proceedngs of Prvacy Enhancng Technologes workshop, May [10] B.Radosavljevc and B. Hajek, Hdng traffc flow n communcaton networks, n Mltary Communcatons Conference, [11] C. E. Shannon, Communcaton theory of secrecy systems, Bell System Techncal Journal, [12] A. Wyner, The wretap channel, Bell Syst. Tech. J., vol. 54, pp , [13] A. Blum, D. Song, and S. Venkataraman, Detecton of Interactve Steppng Stones: Algorthms and Confdence Bounds, n Conference of Recent Advance n Intruson Detecton (RAID), (Sopha Antpols, French Rvera, France), September [14] T. He and L. Tong, Detectng Steppng-stone Traffc n Chaff: Fundamental Lmts and Robust Algorthms, Tech. Rep. ACSP-TR , Cornell Unversty, June [15] D. Cox and H. Mller, The Theory of Stochastc Processes. New York: John Wley & Sons Inc., Proof of Theorem 1 APPENDIX To prove the theorem, we adopt the technque used n [14]. Consder the two pont processes Y A, Y B. If a packet n Y A, say at tme t s desgnated as dummy packet by the BGM algorthm, we nsert a vrtual packet at the t + n Y B. Smlarly, f a packet at tme t n Y B s desgnated as dummy packet, we nsert a vrtual packet at tme t n Y A. Now we consder the dfference process Z = {Y B () Y A ()} between

7 the two processes. At every occurrence of a dummy packet, the dfference process hts a reflectng barrer, ether at 0 or at. The net probablty of chaff s, therefore, the probablty of httng ether barrer. If the transmsson rates of node A and B are T A and T B respectvely, from the analyss n [15], we know that the probablty of httng s gven by Pr{Z() = } = 1 TA T B T B. TA e (TA TB) TA T B It s easy to see that the fracton of chaff n Y A s ɛ A = T B Pr{Z() = } T A (1 Pr{Z() = }) = Snce the rate of relayed packets ncreases wth the transmsson rates of ether nodes, the achevablty of the theorem s proved. In [13], the authors have shown that the BGM algorthm nserts the least chaff fracton for any par of pont processes. Hence, for any (T A, T B ), t s mpossble to obtan a hgher nformaton relay rate than (2). Proof of Theorem 2 Snce the nodes use recever drected sgnalng, the relay node generates an ndependent outgong Posson process for each source. If the source transmsson rate s T A and the maxmum allowed rate to destnaton D s C D, we know from theorem 1 that R = T A C D (e (TA CD ) 1) C D e ( TA ) T A. (9) Snce the maxmum allowed transmsson rate to the relay s C B, the sum-rate must satsfy T A C B. (10) Combnng (9) and (10), the theorem s proved. transmssons are ndependent Posson processes) s gven by ( ( ) R ) max = f C A, C B. (12) The best rate for A s obtaned when T = 0, j s zero. By replacng j C A j by C A n (12), we can obtan the remanng condtons that specfy R out. Proof of Theorem 5 1. We consder the homogenous relay map. From T B T Theorem 1, we know that for a set of transmsson A. T B e (TA TB) rates of sources(t A1,, T Am ) the least fracton of T A chaff n the ncomng stream s gven by C B ( T A ) C B exp( (( T A ) C B )) T A, when the relay transmts at the hghest rate. It s easly shown that ɛ s an ncreasng functon of T A. Hence, an upper bound on ɛ corresponds to an upper bound on the sum transmsson rate T A. Therefore, for any rate vector that satsfes T A x where x s gven by 7, the homogenous relay map guarantees that relay rates satsfy the packet loss constrant. 2. In the case of recever drected sgnalng, the outgong streams to destnatons are ndependent. The packet loss for any stream s dependent only on the transmsson rate of the source node and the rate of that partcular outgong stream. If the maxmum allowed rate to the destnaton D s C D and ɛ s the allowed packet loss, then from Theorem 1, we know that the maxmum allowed source transmsson rate x satsfes C D x. C D exp( (x C D )) x Combnng the above equaton wth the achevable rate regon R r, we get the result. Proof of Theorem 4 The nner bound s trvally shown as the homogenous map s a specal case of the prorty map when α(s) = 0, S. The outer bound s obtaned usng the optmalty of BGM algorthm. Let node A transmt at rates T. Then, the sum nformaton relay rate obtaned by usng the homogenous map s gven by: ( ) R = f T, C B. (11) Snce BGM nserts the least fracton of dummy packets[13], ths s the maxmum sum-rate achevable for the gven transmsson rates. It s easy to see that R n (11) s an ncreasng functon of T. Therefore, the maxmum sum-rate possble (when The vews and conclusons contaned n ths document are those of the authors and should not be nterpreted as representng the offcal polces, ether expressed or mpled, of the Army Research Laboratory or the U.S. Government.

Luby s Alg. for Maximal Independent Sets using Pairwise Independence

Luby s Alg. for Maximal Independent Sets using Pairwise Independence Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent

More information

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ). REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or

More information

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..

More information

1 Example 1: Axis-aligned rectangles

1 Example 1: Axis-aligned rectangles COS 511: Theoretcal Machne Learnng Lecturer: Rob Schapre Lecture # 6 Scrbe: Aaron Schld February 21, 2013 Last class, we dscussed an analogue for Occam s Razor for nfnte hypothess spaces that, n conjuncton

More information

Priv-Code: Preserving Privacy Against Traffic Analysis through Network Coding for Multihop Wireless Networks

Priv-Code: Preserving Privacy Against Traffic Analysis through Network Coding for Multihop Wireless Networks Prv-Code: Preservng Prvacy Aganst Traffc Analyss through Networ Codng for Multhop Wreless Networs Zhguo Wan, Ka Xng, Yunhao Lu MOE Key Lab for Informaton System Securty, School of Software, Tsnghua Natonal

More information

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng

More information

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts Power-of-wo Polces for Sngle- Warehouse Mult-Retaler Inventory Systems wth Order Frequency Dscounts José A. Ventura Pennsylvana State Unversty (USA) Yale. Herer echnon Israel Insttute of echnology (Israel)

More information

DEFINING %COMPLETE IN MICROSOFT PROJECT

DEFINING %COMPLETE IN MICROSOFT PROJECT CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,

More information

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage Proactve Secret Sharng Or: How to Cope Wth Perpetual Leakage Paper by Amr Herzberg Stanslaw Jareck Hugo Krawczyk Mot Yung Presentaton by Davd Zage What s Secret Sharng Basc Idea ((2, 2)-threshold scheme):

More information

An Alternative Way to Measure Private Equity Performance

An Alternative Way to Measure Private Equity Performance An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate

More information

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure

More information

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12 14 The Ch-squared dstrbuton PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 1 If a normal varable X, havng mean µ and varance σ, s standardsed, the new varable Z has a mean 0 and varance 1. When ths standardsed

More information

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application Internatonal Journal of mart Grd and lean Energy Performance Analyss of Energy onsumpton of martphone Runnng Moble Hotspot Applcaton Yun on hung a chool of Electronc Engneerng, oongsl Unversty, 511 angdo-dong,

More information

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.

More information

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS 21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS

More information

MAC Layer Service Time Distribution of a Fixed Priority Real Time Scheduler over 802.11

MAC Layer Service Time Distribution of a Fixed Priority Real Time Scheduler over 802.11 Internatonal Journal of Software Engneerng and Its Applcatons Vol., No., Aprl, 008 MAC Layer Servce Tme Dstrbuton of a Fxed Prorty Real Tme Scheduler over 80. Inès El Korb Ecole Natonale des Scences de

More information

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP)

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP) 6.3 / -- Communcaton Networks II (Görg) SS20 -- www.comnets.un-bremen.de Communcaton Networks II Contents. Fundamentals of probablty theory 2. Emergence of communcaton traffc 3. Stochastc & Markovan Processes

More information

denote the location of a node, and suppose node X . This transmission causes a successful reception by node X for any other node

denote the location of a node, and suppose node X . This transmission causes a successful reception by node X for any other node Fnal Report of EE359 Class Proect Throughput and Delay n Wreless Ad Hoc Networs Changhua He changhua@stanford.edu Abstract: Networ throughput and pacet delay are the two most mportant parameters to evaluate

More information

A 2 -MAC: An Adaptive, Anycast MAC Protocol for Wireless Sensor Networks

A 2 -MAC: An Adaptive, Anycast MAC Protocol for Wireless Sensor Networks : An Adaptve, Anycast MAC Protocol for Wreless Sensor Networks Hwee-Xan Tan and Mun Choon Chan Department of Computer Scence, School of Computng, Natonal Unversty of Sngapore {hweexan, chanmc}@comp.nus.edu.sg

More information

Analysis of Energy-Conserving Access Protocols for Wireless Identification Networks

Analysis of Energy-Conserving Access Protocols for Wireless Identification Networks From the Proceedngs of Internatonal Conference on Telecommuncaton Systems (ITC-97), March 2-23, 1997. 1 Analyss of Energy-Conservng Access Protocols for Wreless Identfcaton etworks Imrch Chlamtac a, Chara

More information

Traffic State Estimation in the Traffic Management Center of Berlin

Traffic State Estimation in the Traffic Management Center of Berlin Traffc State Estmaton n the Traffc Management Center of Berln Authors: Peter Vortsch, PTV AG, Stumpfstrasse, D-763 Karlsruhe, Germany phone ++49/72/965/35, emal peter.vortsch@ptv.de Peter Möhl, PTV AG,

More information

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng

More information

Availability-Based Path Selection and Network Vulnerability Assessment

Availability-Based Path Selection and Network Vulnerability Assessment Avalablty-Based Path Selecton and Network Vulnerablty Assessment Song Yang, Stojan Trajanovsk and Fernando A. Kupers Delft Unversty of Technology, The Netherlands {S.Yang, S.Trajanovsk, F.A.Kupers}@tudelft.nl

More information

Ad-Hoc Games and Packet Forwardng Networks

Ad-Hoc Games and Packet Forwardng Networks On Desgnng Incentve-Compatble Routng and Forwardng Protocols n Wreless Ad-Hoc Networks An Integrated Approach Usng Game Theoretcal and Cryptographc Technques Sheng Zhong L (Erran) L Yanbn Grace Lu Yang

More information

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING Matthew J. Lberatore, Department of Management and Operatons, Vllanova Unversty, Vllanova, PA 19085, 610-519-4390,

More information

A Lyapunov Optimization Approach to Repeated Stochastic Games

A Lyapunov Optimization Approach to Repeated Stochastic Games PROC. ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING, OCT. 2013 1 A Lyapunov Optmzaton Approach to Repeated Stochastc Games Mchael J. Neely Unversty of Southern Calforna http://www-bcf.usc.edu/

More information

Energy Efficient Routing in Ad Hoc Disaster Recovery Networks

Energy Efficient Routing in Ad Hoc Disaster Recovery Networks Energy Effcent Routng n Ad Hoc Dsaster Recovery Networks Gl Zussman and Adran Segall Department of Electrcal Engneerng Technon Israel Insttute of Technology Hafa 32000, Israel {glz@tx, segall@ee}.technon.ac.l

More information

How Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence

How Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence 1 st Internatonal Symposum on Imprecse Probabltes and Ther Applcatons, Ghent, Belgum, 29 June 2 July 1999 How Sets of Coherent Probabltes May Serve as Models for Degrees of Incoherence Mar J. Schervsh

More information

A generalized hierarchical fair service curve algorithm for high network utilization and link-sharing

A generalized hierarchical fair service curve algorithm for high network utilization and link-sharing Computer Networks 43 (2003) 669 694 www.elsever.com/locate/comnet A generalzed herarchcal far servce curve algorthm for hgh network utlzaton and lnk-sharng Khyun Pyun *, Junehwa Song, Heung-Kyu Lee Department

More information

On File Delay Minimization for Content Uploading to Media Cloud via Collaborative Wireless Network

On File Delay Minimization for Content Uploading to Media Cloud via Collaborative Wireless Network On Fle Delay Mnmzaton for Content Uploadng to Meda Cloud va Collaboratve Wreless Network Ge Zhang and Yonggang Wen School of Computer Engneerng Nanyang Technologcal Unversty Sngapore Emal: {zh0001ge, ygwen}@ntu.edu.sg

More information

What is Candidate Sampling

What is Candidate Sampling What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble

More information

Efficient On-Demand Data Service Delivery to High-Speed Trains in Cellular/Infostation Integrated Networks

Efficient On-Demand Data Service Delivery to High-Speed Trains in Cellular/Infostation Integrated Networks IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. XX, NO. XX, MONTH 2XX 1 Effcent On-Demand Data Servce Delvery to Hgh-Speed Trans n Cellular/Infostaton Integrated Networks Hao Lang, Student Member,

More information

An Analysis of Central Processor Scheduling in Multiprogrammed Computer Systems

An Analysis of Central Processor Scheduling in Multiprogrammed Computer Systems STAN-CS-73-355 I SU-SE-73-013 An Analyss of Central Processor Schedulng n Multprogrammed Computer Systems (Dgest Edton) by Thomas G. Prce October 1972 Techncal Report No. 57 Reproducton n whole or n part

More information

Project Networks With Mixed-Time Constraints

Project Networks With Mixed-Time Constraints Project Networs Wth Mxed-Tme Constrants L Caccetta and B Wattananon Western Australan Centre of Excellence n Industral Optmsaton (WACEIO) Curtn Unversty of Technology GPO Box U1987 Perth Western Australa

More information

Joint Scheduling of Processing and Shuffle Phases in MapReduce Systems

Joint Scheduling of Processing and Shuffle Phases in MapReduce Systems Jont Schedulng of Processng and Shuffle Phases n MapReduce Systems Fangfe Chen, Mural Kodalam, T. V. Lakshman Department of Computer Scence and Engneerng, The Penn State Unversty Bell Laboratores, Alcatel-Lucent

More information

RequIn, a tool for fast web traffic inference

RequIn, a tool for fast web traffic inference RequIn, a tool for fast web traffc nference Olver aul, Jean Etenne Kba GET/INT, LOR Department 9 rue Charles Fourer 90 Evry, France Olver.aul@nt-evry.fr, Jean-Etenne.Kba@nt-evry.fr Abstract As networked

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika.

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika. VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

An Interest-Oriented Network Evolution Mechanism for Online Communities

An Interest-Oriented Network Evolution Mechanism for Online Communities An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne

More information

Extending Probabilistic Dynamic Epistemic Logic

Extending Probabilistic Dynamic Epistemic Logic Extendng Probablstc Dynamc Epstemc Logc Joshua Sack May 29, 2008 Probablty Space Defnton A probablty space s a tuple (S, A, µ), where 1 S s a set called the sample space. 2 A P(S) s a σ-algebra: a set

More information

Efficient Project Portfolio as a tool for Enterprise Risk Management

Efficient Project Portfolio as a tool for Enterprise Risk Management Effcent Proect Portfolo as a tool for Enterprse Rsk Management Valentn O. Nkonov Ural State Techncal Unversty Growth Traectory Consultng Company January 5, 27 Effcent Proect Portfolo as a tool for Enterprse

More information

Blind Estimation of Transmit Power in Wireless Networks

Blind Estimation of Transmit Power in Wireless Networks Bln Estmaton of Transmt Power n Wreless Networks Murtaza Zafer (IBM Research), Bongjun Ko (IBM Research), Chatschk Bskan (IBM Research) an Ivan Ho (Imperal College, UK) Transmt-power Estmaton: Problem

More information

Real-Time Process Scheduling

Real-Time Process Scheduling Real-Tme Process Schedulng ktw@cse.ntu.edu.tw (Real-Tme and Embedded Systems Laboratory) Independent Process Schedulng Processes share nothng but CPU Papers for dscussons: C.L. Lu and James. W. Layland,

More information

Support Vector Machines

Support Vector Machines Support Vector Machnes Max Wellng Department of Computer Scence Unversty of Toronto 10 Kng s College Road Toronto, M5S 3G5 Canada wellng@cs.toronto.edu Abstract Ths s a note to explan support vector machnes.

More information

Distributed Optimal Contention Window Control for Elastic Traffic in Wireless LANs

Distributed Optimal Contention Window Control for Elastic Traffic in Wireless LANs Dstrbuted Optmal Contenton Wndow Control for Elastc Traffc n Wreless LANs Yalng Yang, Jun Wang and Robn Kravets Unversty of Illnos at Urbana-Champagn { yyang8, junwang3, rhk@cs.uuc.edu} Abstract Ths paper

More information

How To Improve Delay Throughput In Wireless Networks With Multipath Routing And Channel Codeing

How To Improve Delay Throughput In Wireless Networks With Multipath Routing And Channel Codeing Delay-Throughput Enhancement n Wreless Networs wth Mult-path Routng and Channel Codng Kevan Ronas, Student Member, IEEE, Amr-Hamed Mohsenan-Rad, Member, IEEE, Vncent W.S. Wong, Senor Member, IEEE, Sathsh

More information

Application of Multi-Agents for Fault Detection and Reconfiguration of Power Distribution Systems

Application of Multi-Agents for Fault Detection and Reconfiguration of Power Distribution Systems 1 Applcaton of Mult-Agents for Fault Detecton and Reconfguraton of Power Dstrbuton Systems K. Nareshkumar, Member, IEEE, M. A. Choudhry, Senor Member, IEEE, J. La, A. Felach, Senor Member, IEEE Abstract--The

More information

RELIABILITY, RISK AND AVAILABILITY ANLYSIS OF A CONTAINER GANTRY CRANE ABSTRACT

RELIABILITY, RISK AND AVAILABILITY ANLYSIS OF A CONTAINER GANTRY CRANE ABSTRACT Kolowrock Krzysztof Joanna oszynska MODELLING ENVIRONMENT AND INFRATRUCTURE INFLUENCE ON RELIABILITY AND OPERATION RT&A # () (Vol.) March RELIABILITY RIK AND AVAILABILITY ANLYI OF A CONTAINER GANTRY CRANE

More information

Can Auto Liability Insurance Purchases Signal Risk Attitude?

Can Auto Liability Insurance Purchases Signal Risk Attitude? Internatonal Journal of Busness and Economcs, 2011, Vol. 10, No. 2, 159-164 Can Auto Lablty Insurance Purchases Sgnal Rsk Atttude? Chu-Shu L Department of Internatonal Busness, Asa Unversty, Tawan Sheng-Chang

More information

Rate Monotonic (RM) Disadvantages of cyclic. TDDB47 Real Time Systems. Lecture 2: RM & EDF. Priority-based scheduling. States of a process

Rate Monotonic (RM) Disadvantages of cyclic. TDDB47 Real Time Systems. Lecture 2: RM & EDF. Priority-based scheduling. States of a process Dsadvantages of cyclc TDDB47 Real Tme Systems Manual scheduler constructon Cannot deal wth any runtme changes What happens f we add a task to the set? Real-Tme Systems Laboratory Department of Computer

More information

Optimal Pricing for Integrated-Services Networks. with Guaranteed Quality of Service &

Optimal Pricing for Integrated-Services Networks. with Guaranteed Quality of Service & Optmal Prcng for Integrated-Servces Networks wth Guaranteed Qualty of Servce & y Qong Wang * Jon M. Peha^ Marvn A. Sru # Carnege Mellon Unversty Chapter n Internet Economcs, edted y Joseph Baley and Lee

More information

Feasibility of Using Discriminate Pricing Schemes for Energy Trading in Smart Grid

Feasibility of Using Discriminate Pricing Schemes for Energy Trading in Smart Grid Feasblty of Usng Dscrmnate Prcng Schemes for Energy Tradng n Smart Grd Wayes Tushar, Chau Yuen, Bo Cha, Davd B. Smth, and H. Vncent Poor Sngapore Unversty of Technology and Desgn, Sngapore 138682. Emal:

More information

Effective Network Defense Strategies against Malicious Attacks with Various Defense Mechanisms under Quality of Service Constraints

Effective Network Defense Strategies against Malicious Attacks with Various Defense Mechanisms under Quality of Service Constraints Effectve Network Defense Strateges aganst Malcous Attacks wth Varous Defense Mechansms under Qualty of Servce Constrants Frank Yeong-Sung Ln Department of Informaton Natonal Tawan Unversty Tape, Tawan,

More information

The Greedy Method. Introduction. 0/1 Knapsack Problem

The Greedy Method. Introduction. 0/1 Knapsack Problem The Greedy Method Introducton We have completed data structures. We now are gong to look at algorthm desgn methods. Often we are lookng at optmzaton problems whose performance s exponental. For an optmzaton

More information

When Network Effect Meets Congestion Effect: Leveraging Social Services for Wireless Services

When Network Effect Meets Congestion Effect: Leveraging Social Services for Wireless Services When Network Effect Meets Congeston Effect: Leveragng Socal Servces for Wreless Servces aowen Gong School of Electrcal, Computer and Energy Engeerng Arzona State Unversty Tempe, AZ 8587, USA xgong9@asuedu

More information

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by 6 CHAPTER 8 COMPLEX VECTOR SPACES 5. Fnd the kernel of the lnear transformaton gven n Exercse 5. In Exercses 55 and 56, fnd the mage of v, for the ndcated composton, where and are gven by the followng

More information

Stochastic Protocol Modeling for Anomaly Based Network Intrusion Detection

Stochastic Protocol Modeling for Anomaly Based Network Intrusion Detection Stochastc Protocol Modelng for Anomaly Based Network Intruson Detecton Juan M. Estevez-Tapador, Pedro Garca-Teodoro, and Jesus E. Daz-Verdejo Department of Electroncs and Computer Technology Unversty of

More information

VoIP Playout Buffer Adjustment using Adaptive Estimation of Network Delays

VoIP Playout Buffer Adjustment using Adaptive Estimation of Network Delays VoIP Playout Buffer Adjustment usng Adaptve Estmaton of Network Delays Mroslaw Narbutt and Lam Murphy* Department of Computer Scence Unversty College Dubln, Belfeld, Dubln, IRELAND Abstract The poor qualty

More information

NPAR TESTS. One-Sample Chi-Square Test. Cell Specification. Observed Frequencies 1O i 6. Expected Frequencies 1EXP i 6

NPAR TESTS. One-Sample Chi-Square Test. Cell Specification. Observed Frequencies 1O i 6. Expected Frequencies 1EXP i 6 PAR TESTS If a WEIGHT varable s specfed, t s used to replcate a case as many tmes as ndcated by the weght value rounded to the nearest nteger. If the workspace requrements are exceeded and samplng has

More information

Frequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters

Frequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters Frequency Selectve IQ Phase and IQ Ampltude Imbalance Adjustments for OFDM Drect Converson ransmtters Edmund Coersmeer, Ernst Zelnsk Noka, Meesmannstrasse 103, 44807 Bochum, Germany edmund.coersmeer@noka.com,

More information

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic Lagrange Multplers as Quanttatve Indcators n Economcs Ivan Mezník Insttute of Informatcs, Faculty of Busness and Management, Brno Unversty of TechnologCzech Republc Abstract The quanttatve role of Lagrange

More information

On Secrecy Capacity Scaling in Wireless Networks

On Secrecy Capacity Scaling in Wireless Networks On Secrecy Capacty Scalng n Wreless Networks O. Ozan Koyluoglu, Student Member, IEEE, C. Emre Koksal, Member, IEEE, and esham El Gamal, Fellow, IEEE arxv:0908.0898v [cs.it] 0 Apr 00 Abstract Ths work studes

More information

Survey on Virtual Machine Placement Techniques in Cloud Computing Environment

Survey on Virtual Machine Placement Techniques in Cloud Computing Environment Survey on Vrtual Machne Placement Technques n Cloud Computng Envronment Rajeev Kumar Gupta and R. K. Paterya Department of Computer Scence & Engneerng, MANIT, Bhopal, Inda ABSTRACT In tradtonal data center

More information

Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing

Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing Effcent Bandwdth Management n Broadband Wreless Access Systems Usng CAC-based Dynamc Prcng Bader Al-Manthar, Ndal Nasser 2, Najah Abu Al 3, Hossam Hassanen Telecommuncatons Research Laboratory School of

More information

Calculation of Sampling Weights

Calculation of Sampling Weights Perre Foy Statstcs Canada 4 Calculaton of Samplng Weghts 4.1 OVERVIEW The basc sample desgn used n TIMSS Populatons 1 and 2 was a two-stage stratfed cluster desgn. 1 The frst stage conssted of a sample

More information

Stochastic Games on a Multiple Access Channel

Stochastic Games on a Multiple Access Channel Stochastc Games on a Multple Access Channel Prashant N and Vnod Sharma Department of Electrcal Communcaton Engneerng Indan Insttute of Scence, Bangalore 560012, Inda Emal: prashant2406@gmal.com, vnod@ece.sc.ernet.n

More information

Fault tolerance in cloud technologies presented as a service

Fault tolerance in cloud technologies presented as a service Internatonal Scentfc Conference Computer Scence 2015 Pavel Dzhunev, PhD student Fault tolerance n cloud technologes presented as a servce INTRODUCTION Improvements n technques for vrtualzaton and performance

More information

BERNSTEIN POLYNOMIALS

BERNSTEIN POLYNOMIALS On-Lne Geometrc Modelng Notes BERNSTEIN POLYNOMIALS Kenneth I. Joy Vsualzaton and Graphcs Research Group Department of Computer Scence Unversty of Calforna, Davs Overvew Polynomals are ncredbly useful

More information

A Distributed Algorithm for Least Constraining Slot Allocation in MPLS Optical TDM Networks

A Distributed Algorithm for Least Constraining Slot Allocation in MPLS Optical TDM Networks A Dstrbuted Algorthm for Least Constranng Slot Allocaton n MPLS Optcal TDM Networks Hassan Zeneddne and Gregor V. Bochmann, Unversty of Ottawa, Ottawa, ON-K1N 6N5 Abstract - In ths paper, we propose a

More information

On the Interaction between Load Balancing and Speed Scaling

On the Interaction between Load Balancing and Speed Scaling On the Interacton between Load Balancng and Speed Scalng Ljun Chen and Na L Abstract Speed scalng has been wdely adopted n computer and communcaton systems, n partcular, to reduce energy consumpton. An

More information

Coordinated Denial-of-Service Attacks in IEEE 802.22 Networks

Coordinated Denial-of-Service Attacks in IEEE 802.22 Networks Coordnated Denal-of-Servce Attacks n IEEE 82.22 Networks Y Tan Department of ECE Stevens Insttute of Technology Hoboken, NJ Emal: ytan@stevens.edu Shamk Sengupta Department of Math. & Comp. Sc. John Jay

More information

Performance Analysis and Comparison of QoS Provisioning Mechanisms for CBR Traffic in Noisy IEEE 802.11e WLANs Environments

Performance Analysis and Comparison of QoS Provisioning Mechanisms for CBR Traffic in Noisy IEEE 802.11e WLANs Environments Tamkang Journal of Scence and Engneerng, Vol. 12, No. 2, pp. 143149 (2008) 143 Performance Analyss and Comparson of QoS Provsonng Mechansms for CBR Traffc n Nosy IEEE 802.11e WLANs Envronments Der-Junn

More information

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,

More information

CALL ADMISSION CONTROL IN WIRELESS MULTIMEDIA NETWORKS

CALL ADMISSION CONTROL IN WIRELESS MULTIMEDIA NETWORKS CALL ADMISSION CONTROL IN WIRELESS MULTIMEDIA NETWORKS Novella Bartoln 1, Imrch Chlamtac 2 1 Dpartmento d Informatca, Unverstà d Roma La Sapenza, Roma, Italy novella@ds.unroma1.t 2 Center for Advanced

More information

On the Optimal Control of a Cascade of Hydro-Electric Power Stations

On the Optimal Control of a Cascade of Hydro-Electric Power Stations On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;

More information

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT Toshhko Oda (1), Kochro Iwaoka (2) (1), (2) Infrastructure Systems Busness Unt, Panasonc System Networks Co., Ltd. Saedo-cho

More information

How To Understand The Results Of The German Meris Cloud And Water Vapour Product

How To Understand The Results Of The German Meris Cloud And Water Vapour Product Ttel: Project: Doc. No.: MERIS level 3 cloud and water vapour products MAPP MAPP-ATBD-ClWVL3 Issue: 1 Revson: 0 Date: 9.12.1998 Functon Name Organsaton Sgnature Date Author: Bennartz FUB Preusker FUB Schüller

More information

A Statistical Model for Detecting Abnormality in Static-Priority Scheduling Networks with Differentiated Services

A Statistical Model for Detecting Abnormality in Static-Priority Scheduling Networks with Differentiated Services A Statstcal odel for Detectng Abnoralty n Statc-Prorty Schedulng Networks wth Dfferentated Servces ng L 1 and We Zhao 1 School of Inforaton Scence & Technology, East Chna Noral Unversty, Shangha 0006,

More information

An Intelligent Policy System for Channel Allocation of Information Appliance

An Intelligent Policy System for Channel Allocation of Information Appliance Tamkang Journal of Scence and Engneerng, Vol. 5, No., pp. 63-68 (2002) 63 An Intellgent Polcy System for Channel Allocaton of Informaton Applance Cheng-Yuan Ku, Chang-Jnn Tsao 2 and Davd Yen 3 Department

More information

An RFID Distance Bounding Protocol

An RFID Distance Bounding Protocol An RFID Dstance Boundng Protocol Gerhard P. Hancke and Markus G. Kuhn May 22, 2006 An RFID Dstance Boundng Protocol p. 1 Dstance boundng Verfer d Prover Places an upper bound on physcal dstance Does not

More information

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture A Desgn Method of Hgh-avalablty and Low-optcal-loss Optcal Aggregaton Network Archtecture Takehro Sato, Kuntaka Ashzawa, Kazumasa Tokuhash, Dasuke Ish, Satoru Okamoto and Naoak Yamanaka Dept. of Informaton

More information

Recurrence. 1 Definitions and main statements

Recurrence. 1 Definitions and main statements Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.

More information

Chapter 4 ECONOMIC DISPATCH AND UNIT COMMITMENT

Chapter 4 ECONOMIC DISPATCH AND UNIT COMMITMENT Chapter 4 ECOOMIC DISATCH AD UIT COMMITMET ITRODUCTIO A power system has several power plants. Each power plant has several generatng unts. At any pont of tme, the total load n the system s met by the

More information

AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS

AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Internatonal Journal of Network Securty & Its Applcatons (IJNSA), Vol.5, No.3, May 2013 AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Len Harn 1 and Changlu Ln 2 1 Department of Computer Scence

More information

VoIP over Multiple IEEE 802.11 Wireless LANs

VoIP over Multiple IEEE 802.11 Wireless LANs SUBMITTED TO IEEE TRANSACTIONS ON MOBILE COMPUTING 1 VoIP over Multple IEEE 80.11 Wreless LANs An Chan, Graduate Student Member, IEEE, Soung Chang Lew, Senor Member, IEEE Abstract IEEE 80.11 WLAN has hgh

More information

v a 1 b 1 i, a 2 b 2 i,..., a n b n i.

v a 1 b 1 i, a 2 b 2 i,..., a n b n i. SECTION 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS 455 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS All the vector spaces we have studed thus far n the text are real vector spaces snce the scalars are

More information

Sngle Snk Buy at Bulk Problem and the Access Network

Sngle Snk Buy at Bulk Problem and the Access Network A Constant Factor Approxmaton for the Sngle Snk Edge Installaton Problem Sudpto Guha Adam Meyerson Kamesh Munagala Abstract We present the frst constant approxmaton to the sngle snk buy-at-bulk network

More information

Enabling P2P One-view Multi-party Video Conferencing

Enabling P2P One-view Multi-party Video Conferencing Enablng P2P One-vew Mult-party Vdeo Conferencng Yongxang Zhao, Yong Lu, Changja Chen, and JanYn Zhang Abstract Mult-Party Vdeo Conferencng (MPVC) facltates realtme group nteracton between users. Whle P2P

More information

The Power of Slightly More than One Sample in Randomized Load Balancing

The Power of Slightly More than One Sample in Randomized Load Balancing The Power of Slghtly More than One Sample n Randomzed oad Balancng e Yng, R. Srkant and Xaohan Kang Abstract In many computng and networkng applcatons, arrvng tasks have to be routed to one of many servers,

More information

Slow Fading Channel Selection: A Restless Multi-Armed Bandit Formulation

Slow Fading Channel Selection: A Restless Multi-Armed Bandit Formulation Slow Fadng Channel Selecton: A Restless Mult-Armed Bandt Formulaton Konstantn Avrachenkov INRIA, Maestro Team BP95, 06902 Sopha Antpols, France Emal: k.avrachenkov@sopha.nra.fr Laura Cottatellucc, Lorenzo

More information

The OC Curve of Attribute Acceptance Plans

The OC Curve of Attribute Acceptance Plans The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4

More information

Value Driven Load Balancing

Value Driven Load Balancing Value Drven Load Balancng Sherwn Doroud a, Esa Hyytä b,1, Mor Harchol-Balter c,2 a Tepper School of Busness, Carnege Mellon Unversty, 5000 Forbes Ave., Pttsburgh, PA 15213 b Department of Communcatons

More information

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel

More information

Cooperative Load Balancing in IEEE 802.11 Networks with Cell Breathing

Cooperative Load Balancing in IEEE 802.11 Networks with Cell Breathing Cooperatve Load Balancng n IEEE 82.11 Networks wth Cell Breathng Eduard Garca Rafael Vdal Josep Paradells Wreless Networks Group - Techncal Unversty of Catalona (UPC) {eduardg, rvdal, teljpa}@entel.upc.edu;

More information

An MILP model for planning of batch plants operating in a campaign-mode

An MILP model for planning of batch plants operating in a campaign-mode An MILP model for plannng of batch plants operatng n a campagn-mode Yanna Fumero Insttuto de Desarrollo y Dseño CONICET UTN yfumero@santafe-concet.gov.ar Gabrela Corsano Insttuto de Desarrollo y Dseño

More information

Causal, Explanatory Forecasting. Analysis. Regression Analysis. Simple Linear Regression. Which is Independent? Forecasting

Causal, Explanatory Forecasting. Analysis. Regression Analysis. Simple Linear Regression. Which is Independent? Forecasting Causal, Explanatory Forecastng Assumes cause-and-effect relatonshp between system nputs and ts output Forecastng wth Regresson Analyss Rchard S. Barr Inputs System Cause + Effect Relatonshp The job of

More information

A role based access in a hierarchical sensor network architecture to provide multilevel security

A role based access in a hierarchical sensor network architecture to provide multilevel security 1 A role based access n a herarchcal sensor network archtecture to provde multlevel securty Bswajt Panja a Sanjay Kumar Madra b and Bharat Bhargava c a Department of Computer Scenc Morehead State Unversty

More information

Research Article Enhanced Two-Step Method via Relaxed Order of α-satisfactory Degrees for Fuzzy Multiobjective Optimization

Research Article Enhanced Two-Step Method via Relaxed Order of α-satisfactory Degrees for Fuzzy Multiobjective Optimization Hndaw Publshng Corporaton Mathematcal Problems n Engneerng Artcle ID 867836 pages http://dxdoorg/055/204/867836 Research Artcle Enhanced Two-Step Method va Relaxed Order of α-satsfactory Degrees for Fuzzy

More information

Calculating the high frequency transmission line parameters of power cables

Calculating the high frequency transmission line parameters of power cables < ' Calculatng the hgh frequency transmsson lne parameters of power cables Authors: Dr. John Dcknson, Laboratory Servces Manager, N 0 RW E B Communcatons Mr. Peter J. Ncholson, Project Assgnment Manager,

More information

Generalizing the degree sequence problem

Generalizing the degree sequence problem Mddlebury College March 2009 Arzona State Unversty Dscrete Mathematcs Semnar The degree sequence problem Problem: Gven an nteger sequence d = (d 1,...,d n ) determne f there exsts a graph G wth d as ts

More information