SECURITY ISSUES IN THE OPTIMIZED LINK STATE ROUTING PROTOCOL VERSION 2 (OLSRV2)

Size: px
Start display at page:

Download "SECURITY ISSUES IN THE OPTIMIZED LINK STATE ROUTING PROTOCOL VERSION 2 (OLSRV2)"

Transcription

1 SECURITY ISSUES IN THE OPTIMIZED LINK STATE ROUTING PROTOCOL VERSION 2 (OLSRV2) Ulrih Hererg n Thoms Clusen Hiperom@LI, Eole Polytehnique, Frne ulrih@hererg.nme, thoms@thomslusen.org ABSTRACT Moile A ho NETworks (MANETs) re leving the onines o reserh lortories, to in ple in rel-worl eployments. Outsie speilize omins (militry, vehiulr, et.), ity-wie ommunitynetworks re emerging, onneting regulr Internet users with eh other, n with the Internet, vi MANETs. Growing to enompss more thn hnul o truste prtiipnts, the question o preserving the MANET network onnetivity, even when e with reless or mliious prtiipnts, rises, n must e resse. A irst step towrs proteting MANET is to nlyze the vulnerilities o the routing protool, mnging the onnetivity. By unerstning how the lgorithms o the routing protool operte, n how these n e exploite y those with ill intent, ountermesures n e evelope, reying MANETs or wier eployment n use. This pper tkes n strt look t the lgorithms tht onstitute the Optimize Link Stte Routing Protool version 2 (OLSRv2), n ientiies or eh protool element the possile vulnerilities n ttks in ertin wy, provies ookook or how to est ttk n opertionl OLSRv2 network, or or how to proee with eveloping protetive ountermesures ginst these ttks. KEYWORDS OLSRv2, MANET, Vulnerility Anlysis, Seurity 1. INTRODUCTION OLSRv2 (the Optimize Link Stte Routing Protool version 2) [1], [2], [3], [4], [5] is suessor to the wiely eploye OLSR [6] routing protool or MANETs (Moile A ho NETworks). OLSRv2 retins the sme si lgorithms s its preeessor, however oers vrious improvements, e.g. moulr n lexile rhiteture llowing extensions, suh s or seurity, to e evelope s -ons to the si protool. The evelopments relete in OLSRv2 hve een motivte y inrese rel-worl eployment experienes, e.g. rom networks suh s FunkFeuer [7], n the requirements presente or ontinue suessul opertion o these networks. With prtiiption in suh networks inresing (the FunkFeuer ommunity network hs, e.g., roughly 400 iniviul prtiipnts), operting with the ssumption, tht prtiipnts n e truste to ehve in non-estrutive wy, is utopi. Tking the Internet s n exmple, s prtiiption in the network inreses n eomes more iverse, more eorts re require to preserve the integrity n opertion o the network. Most SMTP-servers were, e.g., initilly ville or use y ll n sunry on the Internet with n inrese popule on the Internet, ttks n uses use the reommene prtie is toy to require uthentition n ounting or users o suh SMTP servers [8]. A irst step towrs hrening ginst ttks isrupting the onnetivity o network, is to unerstn the vulnerilities o routing protool, mnging the onnetivity. This pper thereore nlyzes OLSRv2, to unerstn its inherent vulnerilities n resilienes. The uthors o not lim ompleteness o the nlysis, ut hope tht the ientiie ttks, s presente, orm meningul strting-point or eveloping seure OLSRv2 networks.

2 1.1. OLSRv2 Overview OLSRv2 ontins three si proesses: Neighorhoo Disovery, MPR Flooing n Link Stte Avertisements, esrie in the elow with suiient etils or elorting the nlysis in ltter setions o this pper Neighorhoo Disovery Neighorhoo Disovery is the proess, wherey eh router isovers the routers whih re in iret ommunition rnge o itsel (1-hop neighors), n etets with whih o these it n estlish i-iretionl ommunition. Eh router sens HELLOs, listing the ientiiers o ll the routers rom whih it hs reently reeive HELLO, s well s the sttus o the link (her, veriie i-iretionl). A router reeiving HELLO rom neighor, in whih inites to hve reently reeive HELLO rom, onsiers the link - to e i-iretionl. As lists ientiiers o ll its neighors in its HELLO, lerns the neighors o its neighors (2-hop neighors) through this proess. HELLOs re sent perioilly, however ertin events my trigger non-perioi HELLOs MPR Flooing MPR Flooing is the proess wherey eh router is le to, eiiently, onut network-wie rosts. Eh router esigntes, rom mong its i-iretionl neighors, suset (MPR set) suh tht messge trnsmitte y the router n relye y the MPR set is reeive y ll its 2-hop neighors. MPR seletion is enoe in outgoing HELLOs. Routers my express, in their HELO messges, their willingness (integer etween 1 will never n 7 will lwys ) to e selete s MPR, whih is tken into onsiertion or the MPR lultion, n whih is useul or exmple when n OLSRv2 network is plnne. The set o routers hving selete given router s MPR is the MPR-seletor-set o tht router. A stuy o the MPR looing lgorithm n e oun in [9] Link Stte Avertisement Link Stte Avertisement is the proess wherey routers re etermining whih link stte inormtion to vertise through the network. Eh router must vertise, t lest, ll links etween itsel n its MPR-seletor-set, in orer to llow ll routers to lulte shortest pths. Suh link stte vertisements re rrie in TCs, rost through the network using the MPR looing proess esrie ove. As router selets MPRs only rom mong i-iretionl neighors, links vertise in TC re lso i-iretionl n routing pths lulte y OLSRv2 ontin only i-iretionl links. TCs re sent perioilly, however ertin events my trigger non-perioi TCs Link Stte Vulnerility Txonomy Proper untioning o OLSRv2 ssumes tht (i) eh router n quire n mintin topology mp, urtely releting the eetive network topology; n (ii) tht the network onverges, i.e. tht ll routers in the network will hve suiiently ientil topology mps. An OLSRv2 network n e isrupte y reking either o these ssumptions, speiilly () routers my e prevente rom quiring topology mp o the network; () routers my quire topology mp, whih oes not relet the eetive network topology; n () two or more routers my quire inonsistent topology mps OLSRv2 Attk Vetors Besies rio jmming, ttks on OLSRv2 onsist o mliious router injeting orretly looking, ut invli, ontrol tri (TCs, HELLOs) into the network. A mliious router n either () lie out itsel (its ID, its willingness to serve s MPR), heneorth Ientity Spooing or () lie out its reltionship to other routers (preten existene o links to other

3 routers), heneorth Link Spooing. Suh ttks will in-ine use isruption in the Link Stte Avertisement proess, through trgeting the MPR Flooing mehnism, or y using inorret link stte inormtion to e inlue in TCs, using routers to hve inomplete, inurte or inonsistent topology mps. In ierent lss o ttks, mliious router injets ontrol tri, tune to use n in-router resoure exhustion, e.g. y using the lgorithms lulting routing tles or MPR sets to e invoke ontinuously, preventing the internl stte o the router rom onverging Pper Outline The reminer o this pper is orgnize s ollows: setion 2, 3, n 4 eh represents lss o isruptive ttks ginst OLSRv2, etiling numer o ttks in eh lss. Setion?? summrizes the ientiie vulnerilities in n OLSRv2 network, n setion 6 summrizes inherent resiliene, s oserve in OLSRv2. The pper is onlue in setion TOPOLOGY MAP ACQUISITION Topology Mp Aquisition reltes to the ility or ny given router in the network to quire representtion o the network onnetivity. A router, unle to quire topology mp, is inple o lulting routing pths n prtiipting in orwring t. Topology mp quisition n e hinere y () TCs to not eing elivere to (ll) routers in the network, suh s wht hppens in se o Flooing Disruption, or () in se o jmming o the ommunition hnnel Flooing Disruption MPR seletion (setion 1.1.2) uses inormtion out router s 1-hop n 2-hop neighorhoo, ssuming tht (i) this inormtion is urte, n (ii) ll 1-hop neighors re eqully pt s MPR. Thus, mliious router seeking to ttk the MPR Flooing proess will seek to mnipulte the 1-hop n 2-hop neighorhoo inormtion in router suh s to use the MPR seletion to il Flooing Disruption ue to Ientity Spooing Figure 1() illustrtes network in whih the mliious router (gry irle) spoos the ientity o, i.e. reeives HELLOs rom two routers, oth pretening to e. As HELLOs re itive, n with the mliious router not vertising ny neighors, the topologil view o the 1-hop n 2-hop neighorhoo o is unete y the presene o : s MPR seletion will untion orretly y seleting (i using greey lgorithm). e e spoos () The gry mliious router spoos ress o spoos () The mliious router spoos ress o n vertises link to Figure 1. Ientity Spooing: looing ttk: 1-hop ress uplition. Figure 1() illustrtes network in whih the mliious router (gry irle) spoos the ientity o. In this exmple, link (the otte line) etween n is orretly etete n vertise y. Router will reeive HELLOs initing tht links exist rom to oth e n, therey renering nite MPR on pr with. I oes not orwr looe tri (i.e. oes not ept MPR seletion), its presene entils looing isruption: seleting over reners unrehle y looe tri. In orer to

4 spoos x x Figure 2. Ientity Spooing: looing ttk: 2-hop ress uplition. inrese the likelihoo tht the mliious is selete, it my set its willingess to 7 (mx), ensuring tht it is lwys selete n the routers so overe re not urther onsiere in the MPR seletion lgorithm. Figure 2 illustrtes network in whih the mliious router (gry irle) spoos the ientity o x, i.e. n oth reeive HELLOs rom router pretening to e x. From the point o view o, it ppers s i n hve the sme neighor set, hene either is suitle hoie s MPR. Assuming tht selets s MPR, will not rely looe tri n thus the legitimte (white) x (n routers to the right o x) will not reeive looe tri. In orer to mximize the impt o the isruption, the mliious router my simultneously spoo multiple ientities: y overhering ontrol tri or while, the mliious router my ttempt to lern the ientities o neighors o n spoo these n, in ition, ssume one itionl ientity (possily not otherwise present in the network). A wy o hieving this is to simply hve overher ll TCs, n spoo ll ientities o ll routers in the network (possily exluing ). Router will lern through the HELLOs o tht ll these ientities re 2-hop neighors o. As the set o ientities spooe y the mliious is superset o the neighors o, this will use seletion o s MPR, n onsequently tht is not selete. x spoos x Figure 3. Ientity Spooing: looing ttk: 1 n 2-hop ress uplition. Figure 3 illustrtes network in whih the mliious router (gry irle) spoos the ientity o x, i.e. n oth reeive HELLOs rom router pretening to e x. Router will thereore not selet s MPR s ll the 2-hop neighors rehle vi re lrey rehle iretly in one hop. As onsequene, the white x, n ny routers to the let o it, will not reeive looe ontrol tri rom or trnsite vi rom e.g Flooing Disruption ue to Link Spooing Figure 4() illustrtes network, in whih the mliious router spoos links to the non-existing, i.e. reeives HELLOs rom, pretening the existene o link etween n. This ores to selet s MPR wheres it otherwise woul not nee to selet ny MPRs. In this simple exmple, this oes no hrm s suh. Figure 4() illustrtes network, in whih the mliious spoos links to the existing, s well s to non-existing w. Router reeives HELLO rom reporting links to n w, n rom reporting link to only. Unless i hs vertise willingness o 7, this will use to selet s its only MPR, s presumly overs ll 2-hop neighors o (i.e. the rel neighors o s well s the imginry w). The onsequene is tht s will not selet s MPR, will not rely looe messges reeive rom. Thus, the network to the let o (strting with ) will not reeive ny looe messges rom or trnsiting, suh s messge originting rom s n trnsiting through.

5 s w () Bsi Link Spooing eet on MPR Seletion Figure 4. () Flooing isruption ue to Link Spooing Link Spooing: Flooing Disruption 2.2. Rio Jmming Rio jmming is n ttk in whih legitimte ess to the ommunitions hnnel etween routers is oreully hinere y mliious evie. The lssi exmple hereo is where powerul trnsmitter is generting white noise over the ommunitions hnnel where the network interes o the routers woul otherwise operte, eetively preventing these router interes rom suessully reeiving trnsmissions rom eh other. While this n hppen on ll network intere n hnnel types, wireless networks re espeilly vulnerle to suh; ommeril WiFi jmmers re, or exmple, reily ville [10]. The onsequene o suh jmming is tht the router interes, whih re so jmme, re unle to reeive routing protool ontrol tri, n so re unle to prtiipte in the network. A router where ll its network interes re vitim to jmming is, eetively, unle to quire topology mp o the network n, so, is isonnete rom the network. It n e oserve tht router with multiple network interes essing ierent ommunitions hnnels, n where not ll ommunitions hnnels re jmme, my still e le to prtiipte in network vi links over these non-jmme interes. Figure 5. Rio Jmming: is jmming reeption within the grye-out re, thus is unle to orretly reeive trnsmission. It n lso e oserve tht while iret jmming ets reeption, it my (epening on whih lower lyers L1/L2 re employe) not et trnsmission. Thus, n s illustrte in igure 5,, my reeive trnsmissions rom, the ltter o whih is otherwise jmme y, whih prevents reeptions in the grye re. The Neighorhoo Disovery mehnism o OLSRv2 ientiies uni- n iiretionlity o links, n only i-iretionl links re vertise n use or routing pth lultions. OLSRv2 hs, thus, y virtue o this etetion n use o only i-iretionl links, some resiliene to jmming: while the jmme routers re unle to quire n mintin topology mp o the network, the jmme routers pper s simply isonnete to the un-jmme prt o the network whih is le to oth mintin urte n onsistent topology mps Attk on Jittering OLSRv2 inorportes jittering: rnom, ut oune, ely on outgoing ontrol tri. This my e neessry when link lyers (suh s [11]) re use, whih o not gurntee ollision-ree elivery o rmes, n where jitter n reue the proility o ollisions o rmes on lower lyers is [1].

6 In OLSRv2, TC orwring is jittere y vlue etween 0 n MA_JITTER. In igure 6, router reeives three pkets, eh ontining one TC to e orwre. For eh o these, the sheule retrnsmission time is lulte s now plus jitter, illustrte y the horizontl rrows. In orer to reue the numer o trnsmissions, when ontrol messge is ue or trnsmission, OLSRv2 piggygs ll queue messges into single trnsmission. Thus, i mliious router sens mny TCs within very short time intervl, the jitter time o the ttke router tens to 0. This reners jittering ineetive n n le to ollisions on L2. pket inoming eetive tx time o ll messges sheule tx time time Figure 6. Jittering: I severl messges re sheule to e trnsmitte, ll the messges re sent t the minimum o the sheule trnsmission times Hop-ount n Hop-limit Attks The hop-ount n hop-limit iels re the only prts o TC tht re moiie when orwring. A mliious router n moiy either o these when, when orwring TCs Moiying the Hop Limit A mliious router n erese the hop limit when orwring TC. This will reue the sope o orwring the messge, n my le to some routers in the network not reeiving tht TC. Note tht this is not neessrily the sme s not relying the messge (i.e. setting the hop limit to 0), s illustrte in igure 7. TC TC Figure 7. Hop limit ttk A TC rrives t n is orwre y, suh tht it is reeive y oth n the mliious. n orwr the TC without ny ely (inluing without jitter) suh tht its trnsmissions rrives eore tht o t. Beore orwring, it signiintly reues the hop limit o the messge. Router reeives the TC, proesses (n orwrs) it, n mrks it s lrey reeive - using it to isr urther opies reeive rom. Thus, i the TC is orwre y, it hs very low hop limit n will not reh the whole network Moiying the Hop Count A mliious router n moiy the hop ount when orwring TC. This my hve two onsequenes: (i) i the hop ount is set to the mximum vlue, then the TC will e orwre no urther y, or (ii) rtiiilly mnipulting the hop ount my et the vliity time s lulte y reipients, when using istne-epenent vliity times s eine in [3] (e.g. s prt o ish-eye extension to OLSR2 [12]).

7 TC v_time(3hops): 6s v_time(2hops): 4s v_time(1 hop): 2s Figure 8. Dierent vliity times se on the istne in hops In igure 8, sens TC with vliity time o two seons or neighors tht re one hop wy, our seons or routers in two-hop istne n six seons in three-hop istne. I is mliious router n moiies the hop ount (sy, y eresing it to 0), then will lulte the vliity time o reeive inormtion to two seons ter whih it expires unless rereshe. I TCs rom re sent less requently thn tht up to 3 hops, this uses links vertise in suh TCs to e only intermittently ville to. 3. EFFECTIVE TOPOLOGY Link-stte protools ssume tht eh router n quire n urte topology mp, releting the eetive network topology. This implies tht the routing protool, through its messge exhnge, ientiies pth rom soure to estintion, n this pth is vli or orwring t tri. I n ttker isturs the orret protool ehvior, the pereive topology mp o router n permnently ier rom the eetive topology. Consiering the exmple in igure 9(), whih illustrtes the topology mp s quire y s. This topology mp inites tht the routing protool hs ientiie tht or s, pth exists to vi, whih it thereore ssumes n e use or trnsmitting t. I, eetively, oes not orwr t tri rom s, then the topology mp in s oes not urtely relet the eetive network topology. Rther, the eetive network topology rom the point o view o s woul e s inite in igure 9(): is not prt o the network rehle rom router s. s s () Pereive topology y s Figure 9. Inorret Dt Tri Forwring () Eetive topology 3.1. Inorret Forwring OLSRv2 routers exhnge inormtion using link-lol trnsmissions (link-lol multist or limite rost) or their ontrol messges, with the routing proess in eh router retrnsmitting reeive messges estine or network-wie iusion. Thus, i the operting system in router is not onigure to enle orwring, this will not et the operting o the routing protool, or the topology mp quire y the routing protool. It will, however, use isrepny etween the eetive topology n the topology mp, s inite in igure 9() n igure 9(). This sitution is not hypothetil. A ommon error seen when eploying OLSRv2 se networks using Linux-se omputers s router is to neglet enling IP orwring Wormholes A wormhole, epite in the exmple in igure 10, my e estlishe etween two ollorting evies, onnete y n out-o-n hnnel; these evies sen tri through the tunnel to their lter-ego, whih replys the tri. Thus, n s pper s-i iret neighors n rehle rom eh other in 1 hop through the tunnel, with the pth through the MANET eing 100 hops long.

8 100 hop long pth s 1 hop long pth vi "wormhole" Figure 10. Wormholing etween two ollorting evies not prtiipting in the routing protool. The onsequenes o suh wormhole in the network epens on the etile ehvior o the wormhole. I the wormhole relys only ontrol tri, ut not t tri, the sme onsiertions s in setion 3.1 pplies. I, however, the wormhole relys ll tri, ontrol n t like, it is onnetivity-wise ientil to usle link n the routing protool will orretly generte topology mp releting the eetive network topology. The eiieny o the topology so otine epens on (i) the wormhole hrteristis, (ii) how the wormhole presents itsel n (iii) how pths re lulte. Assuming tht pths re lulte with unit-ost or ll links, inluing the link presente y the wormhole: i the rel hrteristis o the wormhole re s-i it ws pth o more thn 100 hops (e.g. with respet to ely, nwith,...), then the presene o the wormhole results in egrtion in perormne s ompre to using the non-wormhole pth. Conversely, i the link presente y the wormhole hs etter hrteristis, the wormhole results in improve perormne. I pths re lulte using non-unit-osts or ll links, n i the ost o the link presente y the wormhole orretly represents the tul ost (e.g. i the ost is estlishe through mesurements ross the wormhole), then the wormhole my in the worst se use no egrtion in perormne, in the est se improve perormne y oering etter pth. I the ost o the link presente y the wormhole is misrepresente, then the sme onsiertions s or unit-ost links pply. An itionl onsiertion with regrs to wormholes is, tht suh my present topologilly ttrtive pths or the network however it my e unesirle to hve t tri trnsit suh pth: n ttker oul, y virtue o introuing wormhole, quire the ility to reor n inspet trnsiting t tri Sequene Numer Attks OLSRv2 uses two ierent sequene numers in TCs, to (i) voi proessing n orwring the sme messge more thn one (Messge Sequene Numer), n (ii) to ensure tht ol inormtion, rriving lte ue to e.g. long pths or other elys, is not llowe to overwrite resher inormtion (Avertise Neighor Sequene Numer ANSN) Messge Sequene Numer An ttk my onsist o mliious router spooing the ientity o nother router in the network, n trnsmitting lrge numer o TCs, eh with ierent Messge Sequene Numers. Susequent TCs with the sme sequene numers, originting rom the router whose ientity ws spooe, woul thene e ignore, until eventully inormtion onerning these spooe TCs expires Avertise Neighor Sequene Numer (ANSN) An ttk my onsist o mliious router spooing the ientity o nother router in the network, n trnsmitting single TC, with n ANSN signiintly lrger thn tht whih ws lst use y the legitimte router. Routers will retin this lrger ANSN s the most resh inormtion n isr susequent TCs with lower sequene numers s eing ol.

9 3.4. Messge Timing Attks In OLSRv2, eh ontrol messge my ontin expliit vliity time n intervl time, ientiying the urtion or whih inormtion in tht ontrol messge shoul e onsiere vli until isre, n the time until the next ontrol messge o the sme type shoul e expete [3] Intervl Time Attk A use o the expete intervl etween two suessive HELLOs is or etermining the link qulity in Neighor Disovery proess, s esrie in [6]: i messges re not reeive with the expete intervls (e.g. ertin rtion o messges re missing), then this my e use to exlue link rom eing onsiere s useul, even i (some) i-iretionl ommunition hs een veriie. I mliious spoos the ientity o n existing, n sens HELLOs initing very low intervl time, reeiving this HELLO will expet the ollowing HELLO to rrive within the intervl time inite or otherwise, erese the link qulity or the link -. Thus, my use s estimte o the link qulity or the link - to ll elow the limit, where it is no longer onsiere s useul n, thus, not use Vliity Time Attk A similr ttk with respet to the intervl time ttk uses the vliity time inlue in HELLO n TCs. The vliity time eines how long the inormtion ontine in the messge shoul e onsiere s vli. Ater this time, the reeiving router must onsier the messge ontent to no longer e vli (unless repete in lter messge) [3]. A mliious router,, n spoo the ientity o n sen HELLO using very low vliity time (e.g. 1 ms)., reeiving this, will isr the inormtion upon expirtion o tht intervl, i.e. link - will e torn own y Iniret Jmming Iniret Jmming is n ttk in whih mliious router is, y its tions, using legitimte routers to generte inorinte mounts o ontrol tri, therey inresing oth hnnel ouption n the overhe inurre in eh router or proessing this ontrol tri. This ontrol tri will e originte rom legitimte routers, thus to the wier network, the mliious evie my remin unetete. The generl mehnism wherey mliious evie n use iniret jmming is or it to prtiipte in the protool y generting plusile ontrol tri, n to tune this ontrol tri to in turn trigger reeiving routers to generte itionl tri. For OLSRv2, suh n iniret ttk n e irete t, respetively, the Neighorhoo Disovery mehnism n the Link Stte Avertisement mehnism Iniret Jmming: Neighorhoo Disovery An iniret jmming ttk on the Neighorhoo Disovery proess is illustrte in igure 11. A mliious router,, vertises in HELLO tht it hs s link to, with sttus SYM (t 0 ). This will use, upon reeiving this HELLO, to onsier s 2-hop neighor, n relulte its MPR set seleting s MPR. This MPR seletion is signle y in susequent HELLO (t 1 ). Upon reeipt o this HELLO rom, vertises in HELLO tht the link to is LOST (t 2 ). This will use, upon reeiving this HELLO, to no longer onsier s 2-hop neighor, n relulte its MPR set oringly, i.e. to no longer ontin. This new MPR set in is signle in susequent HELLO (t 3 ). Upon hving reeive this HELLO rom, it my repet the yle, lternting vertising the link - s LOST n SYM. In orer to mximize the impt o the isruption use y this ttk, shoul ensure tht the router, to whih it lterntively vertises link s SYM or LOST, is not otherwise present

10 MPRs: () MPRs: () Inite s SYM Inite s LOST t 0 t 1 t 2 t 3 Figure 11. Iniret Jmming in Neighorhoo Disovery: the mliious spoos link to, lipping etween link sttus SYM n LOST. in the 2-hop neighorhoo or exmple y vertising router not otherwise present in the network. Tht wy, ll neighors reeiving HELLO rom will selet s MPR. A wy o omplishing this is to hve lern ll ientities in the network y overhering ll TCs n seleting (spooing) n ientity not lrey present. will inite its willingness to e nonzero (thus, epting eing selete s MPR) n prtiipte in the Neighorhoo Disovery proeure n my ignore ll other protool opertions, while still remining eetive s n ttker. An esier version o this ttk is to hve simply e present in the network, n prtiipte in the Neighorhoo Disovery proeure. Without spooing link to nother router, lterntes its willingness s vertise in suessive HELLO trnsmissions etween zero (will never e selete s MPR) n 7 (will lwys e selete s MPR). The impt o this version o the ttk is s ove: MPR set relultion n vertisement y neighors o the. The si Neighorhoo Disovery proess o OLSRv2 employs perioi messge emissions, n y this ttk it n e ensure tht or eh messge exhnge etween n, the MPR set in is relulte. As lultion o n optiml MPR set is known to e NP-hr [13], this lone my use internl resoure exhustion in. I the routers in the network hve triggere HELLOs enle, n tht suh re triggere y MPR set uptes (s suggeste in setion 9 in [5]) this ttk my lso use n inrese HELLO requeny. A minimum messge intervl (typilly muh smller thn the regulr perioi messge intervl) is impose, to rte-limit worst-se messge emissions. This ttk n use the HELLO intervl to, permnently, eome equl to the minimum messge intervl. [5] proposes tht eult tht the minimum HELLO intervl e 1 4 HELLO intervl. Iniret Jmming o the Neighorhoo Disovery proess y mliious router n thus hve two eets: to use inrese requeny o HELLO genertion n trnsmission y neighors o the mliious router, i.e. up to two hops wy rom the mliious router, n to use itionl MPR set lultion in the routers whih re neighors o mliious router Iniret Jmming: Link Stte Avertisement The most eiient Iniret Jmming ttk in OLSRv2 is to trget ontrol tri, estine or network-wie iusion. This is illustrte in igure 12. The mliious selets the s MPR (t 0 ) in HELLO. This uses to pper s MPR seletor or n, onsequently, sets to e vertise in its Neighor Set n inrements the ssoite Avertise Neighor Sequene Numer (ANSN). must, then, vertise the link etween itsel n in susequent outgoing TCs (t 1 ), lso inluing the ANSN in suh TCs. Upon hving reeive this TC, it elres the link etween itsel n s no longer vli (t 2 ) in HELLO (initing the link to s LOST). Sine only symmetri links re

11 ANS={} ANSN++ TC: (-) ANSN ANS={} ANSN++ TC: () ANSN Selet s MPR Inite s LOST t 0 t 1 t 2 t 3 Figure 12. LOST. Iniret Jmming in Link Stte Avertisement: the mliious lips etween link sttus MPR n vertise y OLSRv2 routers, will upon reeipt hereo remove rom the set o vertise neighors n inrement the ANSN. will then in susequent TCs vertise the remining set o vertise neighors (i.e. with remove) n the orresponing ANSN (t 3 ). Upon hving reeive this inormtion in nother TC rom, it my repet this yle, lternting vertising the link - s LOST n s MPR. Routers reeiving TC will prse n proess this messge, speiilly upting their topology mp s onsequene o suessul reeipt. I the ANSN etween two suessive TCs rom the sme router hs inremente, then the topology hs hnge n routing tles re to e relulte. This is potentilly omputtionlly ostly opertion [14]. A mliious router my hose to onut this ttk ginst ll its neighors, thus ttining mximum isruptive impt on the network with reltively little overhe o its own: other thn prtiipting in the Neighorhoo Disovery proeure, the mliious router will monitor TCs generte y its neighors n lternte the vertise sttus or eh suh neighor, etween MPR n LOST. The mliious router will inite its willingness to e zero (thus, voi eing selete s MPR) n my ignore ll other protool opertions, while still remining eetive s n ttker. The si opertion o OLSRv2 employs perioi messge emissions, n y this ttk it n e ensure tht eh suh perioi messge will entil routing tle relultion in ll routers in the network. I the routers in the network hve triggere TCs enle, this ttk my lso use n inrese TC requeny. Triggere TCs re intene to llow (stle) network to hve reltively low TC emission requenies, yet still llow link rekge or link emergene to e vertise through the network rpily. A minimum messge intervl (typilly muh smller thn the regulr perioi messge intervl) is impose, to rte-limit worst-se messge emissions. This ttk n use the TC intervl to, permnently, eome equl to the minimum messge intervl. [5] proposes s eult tht the minimum TC intervl e 4 1 TC intervl. Iniret Jmming y mliious router n thus hve two eets: it my use inrese requeny o TC genertion n trnsmission, n it will use itionl routing tle relultion in ll routers in the network. 4. INCONSISTENT TOPOLOGY Inonsistent topology mps n our y mliious router employing either o ientity spooing or link spooing or onuting n ttk ginst n OLSRv2 network Ientity spooing Ientity spooing n e employe y mliious router vi the Neighorhoo Disovery proess n vi the Link Stte Avertisement proess; either o whih using inonsistent topology mps in routers in the network.

12 Inonsistent Topology Mps ue to Neighorhoo Disovery Consiering the network in igure 13, two routers in r ens o the network oth present themselves uner the sme ientity s x. The routers jent to these two routers ( n w in igure 13) oth pereive x s iret neighor, whih will e relete in the neighor tles n routing tles o these two routers. Thus, the irst onsequene is, tht tri estine or x rom n w, respetively, will e elivere to ierent routers. As the Neighorhoo Disovery proeure lso provies topologil inormtion up to two hops wy, this is lso true or tri estine or x rom n v, respetively. x v w spoos x Figure 13. Ientity Spooing: router (gry irle) ssumes the ientity o router x, lote r wy in the network. Assuming unit-ost links, the istne to x rom n w, s proue y the Neighorhoo Disovery proeure, is 1 hop. The istne to x rom n v, s proue y the Neighorhoo Disovery proeure, is 2 hops. As these istnes re shorter thn (or equl to) the pth lengths otine vi the Link Stte Avertisement proeure, they will thereore e preerre y,, v n w, over those quire vi the Link Stte Avertisement proeure or when lulting routing tles. Thus, i the gry router in igure 13 is the one spooing the ientity o the white router x, then ny tri rom or trnsiting through w n estine or x will e elivere to the gry router inste o to the white x. This hs s impt tht router spooing the ientity o nother router, n y simply prtiipting in the Neighorhoo Disovery proeure, will e le to lter the topology mps in routers up to 2 hops wy, n therey (i) ttrt the tri rom or trnsiting through routers up to two hops wy, whih is otherwise estine or the router whose ientity is eing spooe; n (ii) prevent tri rom or trnsiting through routers up to two hops wy, whih is otherwise estine or the router whose ientity is eing spooe, rom rehing the intene estintion. Strtegi plement o mliious router spooing the ientity o nother router (or other routers) in the network, n simply prtiipting only in the Neighorhoo Disovery proess, n therey eiiently isrupt network onnetivity. First, overhering TCs will llow the router to lern suiient inormtion esriing the network topology to evelop n ttk strtegy whih hs mximum isruptive impt. Seon, y prtiipting only in the Neighorhoo Disovery proeure (i.e. y vertising its willingness s zero, n y not seleting MPRs), n y reully seleting the ientities to spoo, the mliious router n remin iiult to etet. e g spoos:,,, g Figure 14. Ientity Spooing: mximizing isruptive impt while minimizing risk o etetion. Consier the exmple in igure 14: overhers n lerns the network topology. In orer to minimize the risk o etetion, it elets to not selet ny MPRs (therey no Link Stte Avertisements re sent, vertising its presene in the network) n vertises its willingness s zero (therey it is not selete s MPR n thus not require to sen Link Stte Avertisements). lso elets to spoo the ientity o,, n g only. As oes not prtiipte in the Link Stte Avertisement proess, its presene is known only to, n e, i.e. the routers whose ientity it spoos will not reeive ontrol messges llowing them to etet tht these ientities re lso vertise elsewhere in the network. Tri trnsiting, rom either sie, to estintions,, n g will, rther thn eing orwre to the intene estintion, e elivere to.

13 Tri trnsiting n with s estintion will e elivere to the intene router. Tri trnsiting n with s estintion my e elivere to the intene router vi or to vi s the pths will e o equl length. In igure 14, is the only router whih will reeive ontrol tri initing two topologi lotions o the ientities,. However, espeilly in wireless environment, this is not in n y itsel unusul: vli link might inee exist etween n s well s etween n, e.g. through nother wireless hnnel. Thus, the topology s pereive y n e oes not pper improle. I the network grows to the let o or to the right or g, ll hs to o to ontinue isrupting the network is to lern the ientities o the routers eyon n g n lso spoo the ientities o these. In generl, or mximum isruptive impt n minimum visiility, the mliious router woul selet to spoo the ientities o ll routers whih re topologilly 3 hops or more wy rom itsel. Ientity spooing y mliious router, stritly prtiipting only in the Neighorhoo Disovery proess, thus, retes sitution wherein two or more routers hve sustntilly inonsistent topology mps: tri or n ientiie estintion is, epening on where in the network it ppers, elivere to ierent routers Inonsistent Topology Mps ue to Link Stte Avertisements An inonsistent topology mp my lso our when the mliious router tkes prt in the Link Stte Avertisement (LSA) proeure, y seleting neighor s MPR, whih in turn vertises the spooe ientities o the mliious router. This ttk will lter the topology mps ll routers o the network. spoos e Figure 15. Ientity Spooing: mliious router spoos the ientity o, leing to wrongly pereive topology. In igure 15, spoos the ress o. I selets s MPR, ll routers in the network will e inorme out the link - y the TCs originting rom. Assuming tht (the rel) selets s MPR, the link - will lso e vertise in the network, resulting in pereive topology s epite in igure 16. e Figure 16. Ientity Spooing: the gry mliious router spoos the ientity o router. When lulting pths, n will lulte pths to vi, s illustrte in igure 17(); or these routers, the shortest pth to is vi. e n will lulte pths to vi, s illustrte in igure 17(); or these routers, the shortest pth to is vi the mliious router, n these re thus isonnete rom the rel. will hve hoie: the pth lulte to vi is o the sme length s the pth vi the mliious router, s illustrte in igure 17(). In generl, the ollowing oservtions n e me: The network will e split in two, with those routers loser to thn to rehing, wheres those routers loser to thn to will e unle to reh. Routers eyon, i.e. routers eyon one hop wy rom will e unle to etet this ientity spooing. The ientity spooing ttk vi the Link Stte Avertisement proeure hs higher impt thn the ttk esrie in setion 4.1.1, sine it lters the topology mps o ll routers in the network, n not only in the 2-hop neighorhoo. However, the ttk is esier to etet

14 spoos g () Routers n. () Routers e n. spoos e () Router. Figure 17. Routing pths towrs, s lulte y the ierent routers in the network in presene o mliious router, spooing the ress o. y other routers in the network. Sine the mliious router is vertise in the whole network, routers whose ientities re spooe y the mliious router n etet the ttk. For exmple, when reeives TC rom vertising the link -, it n eue tht some entity is injeting inorret Link Stte inormtion s it oes not hve s one o its iret neighors. As the mliious router oes not itsel sen the TCs, ut rther, y virtue o MPR seletion, ensures tht the resses it spoos re vertise in TCs rom its MPR seletor, the ttk my e iiult to ounter: simply ignoring TCs tht originte rom my lso suppress the link stte inormtion or other, legitimte, MPR seletors o. Ientity spooing y mliious router, prtiipting in the Link Stte Avertisement proess y seleting MPRs only, thus, retes sitution wherein two or more routers hve sustntilly inonsistent topology mps: tri or n ientiie estintion is, epening on where in the network it ppers, elivere to ierent routers Link Spooing Link Spooing is sitution in whih router vertises non-existing links to nother router (possily not present in the network). Essentilly, TCs n HELLOs oth vertise links to iret neighor routers, with the ierene eing the sope o the vertisement. Thus, link spooing onsists o mliious router, reporting tht it hs s s neighors routers whih re, either, not present in the network, or whih re eetively not neighors o the mliious router. It n e note tht sitution similr to Link Spooing my our temporrily in n OLSR or OLSRv2 network without mliious routers: i ws, ut is no more, neighor o, then my still e vertising link to or the urtion o the time it tkes or the the Neighorhoo Disovery proess to etermine this hnge neighorhoo. In the ontext o this pper, Link Spooing reers to persistent sitution where mliious router intentionlly vertises links to other routers, or whih it is not iret neighor Inonsistent Topology Mps ue to Neighorhoo Disovery Returning to igure 4(), MPR seletion serves to ientiy whih routers re to vertise whih links in the network s prt o the Link Stte Avertisement proess.olsrv2 stipultes tht router must, s minimum, vertise links etween itsel n its MPR seletors, i.e. links etween itsel n the routers whih hve selete it s MPR. A router is not require to vertise other links. Thus, in the exmple network in igure 4() with seleting the mliious router s its sole MPR, only is expete to vertise links to. s selets s its MPR, thus is expete to vertise the link -S. s, then, expets to hve selete suitle MPRs or the MPR looing proess to suee in network-wie iusion o the vertisement o the link -s. The topology mps quire y the vrious other routers in this exmple re: Routers n will, ue to the Neighorhoo Disovery proess proviing topologil inormtion up to 2 hops wy, quire n urte Topology Mp. For this is extly

15 orresponing to the network in igure 4(). For this my or my not ontin the otte routers n w, epening on whether genertes Link Stte Avertisements (see setion 4.2.2). Router will pereive topology mp s illustrte in igure 18(): the link stte vertisements rom re not orwre y, hene the existene o s n the link -s is not known eyon ; the sme is true or link stte vertisement rom, shoul it prtiipte in the link stte vertisement proess. The link -, n the existene o is known to only through the Neighorhoo Disovery proess. Routers n eyon will reeive Topology Mp s illustrte in igure 18(). Router s will quire n urte Topology Mp orresponing to the network in igure 4(). This my or my not ontin the otte routers n w, epening on i router genertes Link Stte Avertisements (see setion 4.2.2). () Inonsistent Topology Mp in. () Inonsistent Topology Mp in n eyon. Figure 18. Pereive Topology Mps with perorming Link Spooing in the Neighorhoo Disovery Proess: In orer to mximize the impt o the isruption o Link Spooing in the Neighorhoo Disovery proess, the mliious router my simultneously spoo links to multiple routers: y overhering ontrol tri or while, my ttempt to lern the ientities o 2-hop neighors o n spoo these n, in ition, ssume t lest one itionl ientity (possily not otherwise present in the network). A wy o hieving this is to simply hve the mliious overher ll TCs, n spoo links to ll ientities o ll routers in the network, plus one ientity not otherwise present in the network. As the set o links spooe y is thus superset o the 2-hop links s seen rom, will selet s its sole MPR. e g h i g h i Figure 19. Link Spooing: Mliious router spoos links to ll routers in the network exept router e. By only prtiipting in the Neighorhoo Disovery n not the LSA proess, it is more iiult to etet the spooing, while in the sme time isturing the topology o the whole network. Symmetri to igure 14, igure 19 illustrtes network with is positione in the mile. I vertises links to,,,,, g, h n i in the Neighorhoo Disovery proess, these ientities s spooe y re visile only to e s 2-hop neighors. e my etet tht no link to is vertise y its own 1-hop neighor routers n. Thus, to voi suh etetion y e, shoul voi spooing links to routers vertise s 1-hop neighors y e, i.e. vertise in its HELLOs only spooe links to,,, g, h n i, s illustrte in igure 20. The impt o this this ttk is tht: will pper s the most ttrtive nite MPR or e, y virtue o spooing links to ll other 2-hop neighors o e n then some. Thus, sent or initing willingness o 7, will e selete s the sole MPR o e. No routers, other thn, will e requeste to sen Link Stte Avertisements, vertising links to the. No routers, other thn, will e requeste to orwr looe tri originting in or trnsiting through.

16 e g h i g h i Figure 20. Link Spooing: remins more iiult to e etete when it oes not vertise spooe links to routers t most 2 hops wy Inonsistent Topology Mps ue to Link Stte Avertisements Figure 21 illustrtes network, in whih the mliious router spoos links to the existing router y prtiipting in the Link Stte Avertisement proess n inluing this non-existing link in its vertisements. e g Figure 21. Link Spooing: The mliious router vertises spooe link to in its TCs, thus ll routers will reor oth o the links - n -. As TCs re looe through the network, ll routers will reeive n reor inormtion esriing link - in this link stte inormtion. I hs selete router s MPR, will likewise loo this link stte inormtion through the network, thus ll routers will reeive n reor inormtion esriing link -. When lulting routing pths,, n will lulte pths to vi, s illustrte in igure 22(); or these routers, the shortest pth to is vi. n g will lulte pths to vi, s illustrte in igure 22(); or these routers, the shortest pth to is vi, n these re thus isonnete rom the rel router. e will hve hoie: the pth lulte to vi is o the sme length s the pth vi, s illustrte in igure 22(). g () Routers, n. () Routers n g. e g () Router e. Figure 22. Routing pths towrs router, s lulte y the ierent routers in the network in presene o mliious router, spooing link to router. In generl, the ollowing oservtions n e me: The network will e seprte in two, with those routers loser to thn to rehing, wheres those routers loser to thn to unle to reh. Routers eyon, i.e. routers eyon one hop wy rom will e unle to etet this link spooing. Returning to igure 19, i vertises spooe links to,,,,, g, h n i in Link Stte Avertisements, the risk o etetion y e is ientil to i these were vertise in the Neighorhoo Disovery proess: e my etet tht is vertising links to n, while is not reore s 2-hop neighor vi neither nor. Suppressing links to n rom eing vertise y the woul prevent e rom eteting tht is mliious. However, upon reeiving Link Stte Avertisement, router is le to etet i it itsel is eing spooe the vertising router is not neighor o the router eing

17 spooe. Furthermore, or the resons elorte ove, routers up to one hop wy rom the spooe estintion my etet the spooing. In the se o igure 20 woul e le to etet spooing o links to (s woul e le to etet spooe links to et.) possily leing to signiint rtion o routers eing le to etet tht is onuting isruptive ttk n, thereore, engging pproprite ountermesures. e woul, in this se, e the only router unle to etet the spooing. While this might suie to isrupt the network, it is no ierent rom the ientity spooing ttk illustrte in igure 14, whih rries less risk o etetion o the mliious router. The impt o this ttk is similr to tht presente in setion 4.1.2, however, is esier to etet s the mliious router is generting ontrol tri rehing the entire network Creting Loops Consier the exmple in igure 23(). The mliious router,, spoos the ientity o g, n prtiiptes (with this spooe ientity) in oth the Neighorhoo Disovery proess n the Link Stte Avertisement proess. In orer to over ll its 2-hop neighors, must selet oth n s MPRs. Hene, the link - is vertise y, n the link g- is vertise y the mliious router. Spoos g Spoos g Dt to g h g h e e () Rel network topology, with mliious router spooing the ientity o g. () Topology Mp in. Spoos g Dt to g h e () Topology Mp in g. Figure 23. Pereive Topology Mps with mliious router perorming Ientity Spooing in the Link Stte Avertisement proess The topology pereive y is s inite in igure 23(): pths to the estintion exist vi g (2 hops) or vi e (3 hops). The topology pereive y g is s inite in igure 23(): s g oes not proess TCs originting rom itsel, the only pth reognize y g towrs is vi. Thereore, i t pket estine or rrives t, it will e orwre through g. g will orwr the t pket through, therey reting loop in the network. Consier the exmple in igure 24(). The mliious router,, spoos the ientity o g, n selets s MPR. Hene, the link -g is vertise y is trike into vertising non-existing link. The topology pereive y is s inite in igure 24(): pths to the estintion exists is vi g (2 hops) or vi (3 hops). The topology pereive y g is s inite in igure 24(): s g oes not proess TCs originting rom itsel, the only pth reognize y g towrs is vi. Thereore, i t pket estine or rrives t, it will e orwre through g. g will orwr the t pket through, therey reting loop in the network.

18 Dt to Spoos g g h g h () Rel network topology, with mliious router spooing the ientity o g. () Topology Mp in router. Dt to g h () Topology Mp in router g. Figure 24. Pereive Topology Mps with mliious router perorming Ientity Spooing in the Neighorhoo Disovery proess 5. WHY THIS PAPER DOES NOT CONSIDER REPLAY ATTACKS A ommonly onsiere ttk type is or mliious router to reor ontrol tri rom legitimte routers, n reply this possily somewhere else in the network, n possily t some lter point in time. While suh inee is possile, it shoul not e onsiere s lss o ttks on OLSRv2 in n y itsel: in-ine, the mliious router replying messges is perorming omintion o ientityspooing, spooing the ientity o the router rom whih it reore the messges, n link-spooing, spooing links to the (originl) neighors o tht router. Thus, the impt o suh reply ttk is no ierent rom the impt esrie or ientity-spooing n link-spooing. 6. INHERENT OLSRV2 RESILIENCE While OLSRv2 oes not speiilly inlue seurity etures (suh s enryption), the protool n its lgorithms present some inherent resiliene ginst prt o the ttks esrie in this pper. In prtiulr, it provies the ollowing resiliene: Sequene numers: OLSRv2 employs messge sequene numers, speii per router ientity n messge type. Routers keep n inormtion reshness numer (ANSN), inremente eh time the ontent o Link Stte Avertisement rom router hnges. This llows rejeting ol inormtion n uplite messges, n provies some protetion ginst messge reply. This, however, lso presents n ttk vetor (setion 3.3). Ignoring uni-iretionl links: The Neighorhoo Disovery proess etets n mits only i-iretionl links or use in MPR seletion n Link Stte Avertisement. Jmming ttks (setion 2.2) my et only reeption o ontrol tri, however OLSRv2 will orretly reognize, n ignore, suh link s not i-iretionl. Messge intervl ouns: The requeny o ontrol messges, with minimum intervls impose or HELLO n TCs. This my limit the impt rom n iniret jmming ttk (setion 3.5). Aitionl resons or rejeting ontrol messges: The OLSRv2 speiition inlues list o resons, or whih n inoming ontrol messge shoul e rejete s mlorme n llows tht protool extension my reognize itionl resons or OLSRv2 to onsier messge mlorme. This llows together with the lexile messge ormt [2] ition o seurity mehnisms, suh s igitl signtures, while remining omplint with the OLSRv2 stnr speiition. 7. CONCLUSION This pper hs presente etile nlysis o seurity threts to the Optimize Link Stte Routing Protool version 2 (OLSRv2), y tking n strt look t the lgorithms n messge

19 exhnges tht onstitute the protool, n or eh protool element ientiying the possile vulnerilities n how these n e exploite. In prtiulr, s link-stte protool, OLSRv2 ssumes tht (i) eh router n quire n mintin topology mp, urtely releting the eetive network topology; n (ii) tht the network onverges, i.e. tht ll routers in the network will hve suiiently ientil (onsistent) topology mps. An OLSRv2 network n e eetively isrupte y reking either o these ssumptions, speiilly () routers my e prevente rom quiring topology mp o the network; () routers my quire topology mp, whih oes not relet the eetive network topology; n () two or more routers my quire sustntilly inonsistent topology mps. The isruptive ttks to OLSRv2, presente in this pper, re lssiie in either o these tegories. For eh, it is emonstrte, whether OLSRv2 hs n inherent protetion ginst the ttk. REFERENCES [1] T. Clusen, C. Derlove, B. Amson, RFC5148: Jitter Consiertions in Moile A Ho Networks (MANETs), Inormtionl, [2] T. Clusen, C. Derlove, J. Den, C. Ajih, RFC5444: Generlize Moile A Ho Network (MANET) Pket/Messge Formt, St. Trk, [3] T. Clusen, C. Derlove, RFC5497: Representing Multi-Vlue Time in Moile A Ho Networks (MANETs), St. Trk, [4] T. Clusen, C. Derlove, J. Den, I-D: MANET Neighorhoo Disovery Protool (NHDP), Work In Progress, [5] T. Clusen, C. Derlove, P. Jquet, I-D: The Optimize Link Stte Routing Protool version 2 (OLSRv2), Work In Progress, [6] T. Clusen, P. Jquet, RFC3626: Optimize Link Stte Routing Protool (OLSR), Experimentl, [7] [8] C. Hutzler, D. Croker, P. Resnik, E. Allmn, T. Finh Emil Sumission Opertions: Aess n Aountility Requirements, Best Current Prtie, [9] A. Qyyum, L. Viennot, A. Louiti, Multipoint relying: An eiient tehnique or looing in moile wireless networks, 35th Annul Hwii Interntionl Conerene on System Sienes (HICSS 2001) [10] Y. Li, C. Wng, W, Zho,. You, The Jmming prolem in IEEE se moile ho networks with hien terminls: Perormne nlysis n enhnement, Interntionl Journl o Communition Systems, Volume 22 Issue 8, Pges , April 2009 [11] IEEE : Wireless LAN Meium Aess Control (MAC) n Physil Lyer (PHY) Spe., June 2007 [12] C. Ajih, E. Belli, T. Clusen, P. Jquet, G. Roolkis, Fish eye OLSR sling properties, IEEE Journl o Communition n Networks (JCN), Speil Issue on Moile A Ho Wireless Networks, 2004 [13] L. Viennot, Complexity results on eletion o multipoint relys in wireless networks, INRIA, Teh. Rep. RR-3584, 2007 [14] U. Hererg, Perormne Evlution o using Dynmi Shortest Pth Algorithm in OLSRv2, (To Apper) Proeeings o the 8th Eighth Annul Conerene on Communition Networks n Servies Reserh, My 2010, Montrel, Cn [15] T. Clusen, G. Hnsen, L. Christensen, G. Behrmnn, The Optimize Link Stte Routing Protool, Evlution through Experiments n Simultion, Proeeings o the IEEE onerene on Wireless Personl Multimei Communitions (WPMC), Otoer 2001, Alorg, Denmrk [16] Ntionl Institute o Stnrs & Tehnology, Reommention or Key Mngement Prt 1: Generl, NIST, Speil Pulition , Mrh 2007 [17] D. Estlke, P. Jones, US Seure Hsh Algorithm 1 (SHA1), Inormtionl, [18] B. Kliski, J. Ston, PKCS 1: RSA Cryptogrphy Speiitions Version 2.0, Inormtionl, [19] Ntionl Institute o Stnrs & Tehnology, Digitl Signture Stnr, NIST, FIPS PUB 186-3, June 2009 [20] D. Johnson, A. Menezes, S. Vnstone, The Ellipti Curve Digitl Signture Algorithm (ECDSA), Interntionl Journl o Inormtion Seurity, Volume 1, Numer 1 / August, pges 36-63, 2001

20 [21] H. Krwzyk, M. Bellre, R. Cnetti, HMAC: Keye-Hshing or Messge Authentition, Inormtionl, txt [22] U. Hererg, JOLSRv2 An OLSRv2 implementtion in Jv, Proeeings o the 4th OLSR Interop workshop, Otoer 2008 [23] U. Hererg, Integrting Jv Support or Routing Protools in Ns2, INRIA reserh report 7075, Ot [24] G. J. Pottie, W. J. Kiser, Wireless integrte network sensors, Communitions o the ACM, volume 43, numer 5, pge 51-58, Ulrih Hererg grute in omputer siene rom TU Munih in 2007, n then joine Eole Polytehnique (Frne), where he is urrently PhD stuent. His reserh interests over routing n seurity issues in MANETs, uto-onigurtion, n ely-tolernt networks. Thoms Clusen is grute o Alorg University, Denmrk (M.S., PhD - ivilingeniør, n. polyt), Thoms spent numer o yers t INRIA where he, mong other things, spent his time eveloping n stnrising OLSR. In 2004 he joine ulty t Eole Polytehnique, Frne s premiere tehnil university. Thoms hs prtiulr inity or pplile reserh, n enjoys working with inustril prtners n stnristion oies. He is, thus o-hir o the MANET AUTOCONF working group within the IETF, s well s the uthor n eitor o severl stnr trk n other ouments within the IETF.

GENERAL OPERATING PRINCIPLES

GENERAL OPERATING PRINCIPLES KEYSECUREPC USER MANUAL N.B.: PRIOR TO READING THIS MANUAL, YOU ARE ADVISED TO READ THE FOLLOWING MANUAL: GENERAL OPERATING PRINCIPLES Der Customer, KeySeurePC is n innovtive prout tht uses ptente tehnology:

More information

1 Fractions from an advanced point of view

1 Fractions from an advanced point of view 1 Frtions from n vne point of view We re going to stuy frtions from the viewpoint of moern lger, or strt lger. Our gol is to evelop eeper unerstning of wht n men. One onsequene of our eeper unerstning

More information

Maximum area of polygon

Maximum area of polygon Mimum re of polygon Suppose I give you n stiks. They might e of ifferent lengths, or the sme length, or some the sme s others, et. Now there re lots of polygons you n form with those stiks. Your jo is

More information

Quick Guide to Lisp Implementation

Quick Guide to Lisp Implementation isp Implementtion Hndout Pge 1 o 10 Quik Guide to isp Implementtion Representtion o si dt strutures isp dt strutures re lled S-epressions. The representtion o n S-epression n e roken into two piees, the

More information

2. Use of Internet attacks in terrorist activities is termed as a. Internet-attack b. National attack c. Cyberterrorism d.

2. Use of Internet attacks in terrorist activities is termed as a. Internet-attack b. National attack c. Cyberterrorism d. Moule2.txt 1. Choose the right ourse of tion one you feel your mil ount is ompromise?. Delete the ount b. Logout n never open gin. Do nothing, sine no importnt messge is there. Chnge psswor immeitely n

More information

Angles 2.1. Exercise 2.1... Find the size of the lettered angles. Give reasons for your answers. a) b) c) Example

Angles 2.1. Exercise 2.1... Find the size of the lettered angles. Give reasons for your answers. a) b) c) Example 2.1 Angles Reognise lternte n orresponing ngles Key wors prllel lternte orresponing vertilly opposite Rememer, prllel lines re stright lines whih never meet or ross. The rrows show tht the lines re prllel

More information

On Equivalence Between Network Topologies

On Equivalence Between Network Topologies On Equivlene Between Network Topologies Tre Ho Deprtment of Eletril Engineering Cliforni Institute of Tehnolog tho@lteh.eu; Mihelle Effros Deprtments of Eletril Engineering Cliforni Institute of Tehnolog

More information

MATH PLACEMENT REVIEW GUIDE

MATH PLACEMENT REVIEW GUIDE MATH PLACEMENT REVIEW GUIDE This guie is intene s fous for your review efore tking the plement test. The questions presente here my not e on the plement test. Although si skills lultor is provie for your

More information

JCM TRAINING OVERVIEW Multi-Download Module 2

JCM TRAINING OVERVIEW Multi-Download Module 2 Multi-Downlo Moule 2 JCM Trining Overview Mrh, 2012 Mrh, 2012 CLOSING THE MDM2 APPLICATION To lose the MDM2 Applition proee s follows: 1. Mouse-lik on the 'File' pullown Menu (See Figure 35 ) on the MDM2

More information

UNIVERSITY AND WORK-STUDY EMPLOYERS WEBSITE USER S GUIDE

UNIVERSITY AND WORK-STUDY EMPLOYERS WEBSITE USER S GUIDE UNIVERSITY AND WORK-STUDY EMPLOYERS WEBSITE USER S GUIDE Tble of Contents 1 Home Pge 1 2 Pge 2 3 Your Control Pnel 3 4 Add New Job (Three-Step Form) 4-6 5 Mnging Job Postings (Mnge Job Pge) 7-8 6 Additionl

More information

Fluent Merging: A General Technique to Improve Reachability Heuristics and Factored Planning

Fluent Merging: A General Technique to Improve Reachability Heuristics and Factored Planning Fluent Merging: A Generl Tehnique to Improve Rehility Heuristis n Ftore Plnning Menkes vn en Briel Deprtment of Inustril Engineering Arizon Stte University Tempe AZ, 85287-8809 menkes@su.eu Suro Kmhmpti

More information

The art of Paperarchitecture (PA). MANUAL

The art of Paperarchitecture (PA). MANUAL The rt of Pperrhiteture (PA). MANUAL Introution Pperrhiteture (PA) is the rt of reting three-imensionl (3D) ojets out of plin piee of pper or ror. At first, esign is rwn (mnully or printe (using grphil

More information

ORGANIZER QUICK START GUIDE

ORGANIZER QUICK START GUIDE NOTES ON USING GOTOWEBINAR GoToWeinr orgnizers my hol Weinrs for up to 1,000 ttenees. The Weinr proess n e roken into three stges: Weinr Plnning, Weinr Presenttion n Weinr Follow-up. Orgnizers nee to first

More information

Data Quality Certification Program Administrator In-Person Session Homework Workbook 2015-2016

Data Quality Certification Program Administrator In-Person Session Homework Workbook 2015-2016 Dt Qulity Certifition Progrm Aministrtor In-Person Session Homework Workook 2015-2016 Plese Note: Version 1.00: Pulishe 9-1-2015 Any exerises tht my e upte fter this printing n e foun online in the DQC

More information

Revised products from the Medicare Learning Network (MLN) ICD-10-CM/PCS Myths and Facts, Fact Sheet, ICN 902143, downloadable.

Revised products from the Medicare Learning Network (MLN) ICD-10-CM/PCS Myths and Facts, Fact Sheet, ICN 902143, downloadable. DEPARTMENT OF HEALTH AND HUMAN SERVICES Centers for Meire & Meii Servies Revise prouts from the Meire Lerning Network (MLN) ICD-10-CM/PCS Myths n Fts, Ft Sheet, ICN 902143, ownlole. MLN Mtters Numer: SE1325

More information

DiaGen: A Generator for Diagram Editors Based on a Hypergraph Model

DiaGen: A Generator for Diagram Editors Based on a Hypergraph Model DiGen: A Genertor for Digrm Eitors Bse on Hypergrph Moel G. Viehstet M. Mins Lehrstuhl für Progrmmiersprhen Universität Erlngen-Nürnerg Mrtensstr. 3, 91058 Erlngen, Germny Emil: fviehste,minsg@informtik.uni-erlngen.e

More information

National Firefighter Ability Tests And the National Firefighter Questionnaire

National Firefighter Ability Tests And the National Firefighter Questionnaire Ntionl Firefighter Aility Tests An the Ntionl Firefighter Questionnire PREPARATION AND PRACTICE BOOKLET Setion One: Introution There re three tests n questionnire tht mke up the NFA Tests session, these

More information

OxCORT v4 Quick Guide Revision Class Reports

OxCORT v4 Quick Guide Revision Class Reports OxCORT v4 Quik Guie Revision Clss Reports This quik guie is suitble for the following roles: Tutor This quik guie reltes to the following menu options: Crete Revision Clss Reports pg 1 Crete Revision Clss

More information

S-Scrum: a Secure Methodology for Agile Development of Web Services

S-Scrum: a Secure Methodology for Agile Development of Web Services Worl of Computer Siene n Informtion Tehnology Journl (WCSIT) ISSN: 2221-0741 Vol. 3, No. 1, 15-19, 2013 S-Srum: Seure Methoology for Agile Development of We Servies Dvou Mougouei, Nor Fzli Moh Sni, Mohmm

More information

Word Wisdom Correlations to the Common Core State Standards, Grade 6

Word Wisdom Correlations to the Common Core State Standards, Grade 6 Reing Stnrs for Informtionl Text Key Ies n Detils 1 Cite textul eviene to support nlysis of wht the text sys expliitly s well s inferenes rwn from the text. 6, 7, 12, 13, 18, 19, 28, 29, 34, 35, 40, 41,

More information

Inter-domain Routing

Inter-domain Routing COMP 631: COMPUTER NETWORKS Inter-domin Routing Jsleen Kur Fll 2014 1 Internet-sle Routing: Approhes DV nd link-stte protools do not sle to glol Internet How to mke routing slle? Exploit the notion of

More information

Reasoning to Solve Equations and Inequalities

Reasoning to Solve Equations and Inequalities Lesson4 Resoning to Solve Equtions nd Inequlities In erlier work in this unit, you modeled situtions with severl vriles nd equtions. For exmple, suppose you were given usiness plns for concert showing

More information

Return of Organization Exempt From Income Tax

Return of Organization Exempt From Income Tax PUBLIC DISCLOSURE COPY Form 99 Return of Orgniztion Exempt From Inome Tx Uner setion 51, 527, or 4947(1) of the Internl Revenue Coe (exept privte fountions) OMB 1545-47 Do not enter Soil Seurity numers

More information

- DAY 1 - Website Design and Project Planning

- DAY 1 - Website Design and Project Planning Wesite Design nd Projet Plnning Ojetive This module provides n overview of the onepts of wesite design nd liner workflow for produing wesite. Prtiipnts will outline the sope of wesite projet, inluding

More information

SE3BB4: Software Design III Concurrent System Design. Sample Solutions to Assignment 1

SE3BB4: Software Design III Concurrent System Design. Sample Solutions to Assignment 1 SE3BB4: Softwre Design III Conurrent System Design Winter 2011 Smple Solutions to Assignment 1 Eh question is worth 10pts. Totl of this ssignment is 70pts. Eh ssignment is worth 9%. If you think your solution

More information

Orthopoles and the Pappus Theorem

Orthopoles and the Pappus Theorem Forum Geometriorum Volume 4 (2004) 53 59. FORUM GEOM ISSN 1534-1178 Orthopoles n the Pppus Theorem tul Dixit n Drij Grinerg strt. If the verties of tringle re projete onto given line, the perpeniulrs from

More information

Return of Organization Exempt From Income Tax

Return of Organization Exempt From Income Tax Form 990 Deprtment of the Tresury Internl Revenue Servie Return of Orgniztion Exempt From Inome Tx Uner setion 501(), 527, or 4947()(1) of the Interni Revenue Coe (exept lk lung enefit trust or privte

More information

OUTLINE SYSTEM-ON-CHIP DESIGN. GETTING STARTED WITH VHDL August 31, 2015 GAJSKI S Y-CHART (1983) TOP-DOWN DESIGN (1)

OUTLINE SYSTEM-ON-CHIP DESIGN. GETTING STARTED WITH VHDL August 31, 2015 GAJSKI S Y-CHART (1983) TOP-DOWN DESIGN (1) August 31, 2015 GETTING STARTED WITH VHDL 2 Top-down design VHDL history Min elements of VHDL Entities nd rhitetures Signls nd proesses Dt types Configurtions Simultor sis The testenh onept OUTLINE 3 GAJSKI

More information

Lesson 1: Getting started

Lesson 1: Getting started Answer key 0 Lesson 1: Getting strte 1 List the three min wys you enter t in QuikBooks. Forms, lists, registers 2 List three wys to ess fetures in QuikBooks. Menu r, Ion Br, Centers, Home pge 3 Wht ookkeeping

More information

Guidance Document: Selecting a Commercial Records Storage Provider

Guidance Document: Selecting a Commercial Records Storage Provider G C P R e o r s M n g e r s A s s o i t i o n Guine Doument: Seleting Commeril Reors Storge Provier 1 Seleting Commeril Reors Storge Provier 1.1 Generl Remrks 1.1.1 The following is heklist to ssist in

More information

1. Definition, Basic concepts, Types 2. Addition and Subtraction of Matrices 3. Scalar Multiplication 4. Assignment and answer key 5.

1. Definition, Basic concepts, Types 2. Addition and Subtraction of Matrices 3. Scalar Multiplication 4. Assignment and answer key 5. . Definition, Bsi onepts, Types. Addition nd Sutrtion of Mtries. Slr Multiplition. Assignment nd nswer key. Mtrix Multiplition. Assignment nd nswer key. Determinnt x x (digonl, minors, properties) summry

More information

European Convention on Products Liability in regard to Personal Injury and Death

European Convention on Products Liability in regard to Personal Injury and Death Europen Trety Series - No. 91 Europen Convention on Produts Liility in regrd to Personl Injury nd Deth Strsourg, 27.I.1977 The memer Sttes of the Counil of Europe, signtory hereto, Considering tht the

More information

Application Note Configuring Integrated Windows Authentication as a McAfee Firewall Enterprise Authenticator. Firewall Enterprise

Application Note Configuring Integrated Windows Authentication as a McAfee Firewall Enterprise Authenticator. Firewall Enterprise Applition Note Configuring Integrte Winows Authentition s MAfee Firewll Enterprise Authentitor MAfee version 7.x n 8.x Firewll Enterprise Use this Applition Note to implement trnsprent rowser uthentition

More information

CHAPTER 31 CAPACITOR

CHAPTER 31 CAPACITOR . Given tht Numer of eletron HPTER PITOR Net hrge Q.6 9.6 7 The net potentil ifferene L..6 pitne v 7.6 8 F.. r 5 m. m 8.854 5.4 6.95 5 F... Let the rius of the is R re R D mm m 8.85 r r 8.85 4. 5 m.5 m

More information

Boğaziçi University Department of Economics Spring 2016 EC 102 PRINCIPLES of MACROECONOMICS Problem Set 5 Answer Key

Boğaziçi University Department of Economics Spring 2016 EC 102 PRINCIPLES of MACROECONOMICS Problem Set 5 Answer Key Boğziçi University Deprtment of Eonomis Spring 2016 EC 102 PRINCIPLES of MACROECONOMICS Prolem Set 5 Answer Key 1. One yer ountry hs negtive net exports. The next yer it still hs negtive net exports n

More information

Architecture and Data Flows Reference Guide

Architecture and Data Flows Reference Guide Arhiteture nd Dt Flows Referene Guide BES12 Version 12.3 Pulished: 2015-10-14 SWD-20151014125318579 Contents Aout this guide... 5 Arhiteture: BES12 EMM solution... 6 Components used to mnge BlkBerry 10,

More information

On the Utilization of Spatial Structures for Cognitively Plausible and Efficient Reasoning

On the Utilization of Spatial Structures for Cognitively Plausible and Efficient Reasoning To pper in: Proeeings of the IEEE Interntionl Conferene on Systems, Mn, n Cyernetis. Chigo, 18-21 Otoer 1992. On the Utiliztion of Sptil Strutures for Cognitively Plusile n Effiient Resoning Christin Freks

More information

Active Directory Service

Active Directory Service In order to lern whih questions hve een nswered orretly: 1. Print these pges. 2. Answer the questions. 3. Send this ssessment with the nswers vi:. FAX to (212) 967-3498. Or. Mil the nswers to the following

More information

1 GSW IPv4 Addressing

1 GSW IPv4 Addressing 1 For s long s I ve een working with the Internet protools, people hve een sying tht IPv6 will e repling IPv4 in ouple of yers time. While this remins true, it s worth knowing out IPv4 ddresses. Even when

More information

Unit 5 Section 1. Mortgage Payment Methods & Products (20%)

Unit 5 Section 1. Mortgage Payment Methods & Products (20%) Unit 5 Setion 1 Mortgge Pyment Methos & Prouts (20%) There re tully only 2 mortgge repyment methos ville CAPITAL REPAYMENT n INTEREST ONLY. Cpitl Repyment Mortgge Also lle Cpitl & Interest mortgge or repyment

More information

Student Access to Virtual Desktops from personally owned Windows computers

Student Access to Virtual Desktops from personally owned Windows computers Student Aess to Virtul Desktops from personlly owned Windows omputers Mdison College is plesed to nnoune the ility for students to ess nd use virtul desktops, vi Mdison College wireless, from personlly

More information

Chapter. Contents: A Constructing decimal numbers

Chapter. Contents: A Constructing decimal numbers Chpter 9 Deimls Contents: A Construting deiml numers B Representing deiml numers C Deiml urreny D Using numer line E Ordering deimls F Rounding deiml numers G Converting deimls to frtions H Converting

More information

SECTION 7-2 Law of Cosines

SECTION 7-2 Law of Cosines 516 7 Additionl Topis in Trigonometry h d sin s () tn h h d 50. Surveying. The lyout in the figure t right is used to determine n inessile height h when seline d in plne perpendiulr to h n e estlished

More information

Corrigendum-II Dated:19.05.2011

Corrigendum-II Dated:19.05.2011 10(21)/2010-NICSI NATIONAL INFORMATICS CENTRE SERVICES In. (NICSI) (A Government of Ini Enterprise uner NIC) Ministry of Communition & Informtion Tehnology Hll 2 & 3, 6 th Floor, NBCC Tower 15, Bhikiji

More information

Polynomial Functions. Polynomial functions in one variable can be written in expanded form as ( )

Polynomial Functions. Polynomial functions in one variable can be written in expanded form as ( ) Polynomil Functions Polynomil functions in one vrible cn be written in expnded form s n n 1 n 2 2 f x = x + x + x + + x + x+ n n 1 n 2 2 1 0 Exmples of polynomils in expnded form re nd 3 8 7 4 = 5 4 +

More information

Computing the 3D Voronoi Diagram Robustly: An Easy Explanation

Computing the 3D Voronoi Diagram Robustly: An Easy Explanation Computing the 3D Voronoi Digrm Roustly: An Esy Explntion Hugo Leoux Delft University of Tehnology (OTB setion GIS Tehnology) Jffln 9, 2628BX Delft, the Netherlns h.leoux@tuelft.nl Astrt Mny lgorithms exist

More information

p-q Theory Power Components Calculations

p-q Theory Power Components Calculations ISIE 23 - IEEE Interntionl Symposium on Industril Eletronis Rio de Jneiro, Brsil, 9-11 Junho de 23, ISBN: -783-7912-8 p-q Theory Power Components Clultions João L. Afonso, Memer, IEEE, M. J. Sepúlved Freits,

More information

c b 5.00 10 5 N/m 2 (0.120 m 3 0.200 m 3 ), = 4.00 10 4 J. W total = W a b + W b c 2.00

c b 5.00 10 5 N/m 2 (0.120 m 3 0.200 m 3 ), = 4.00 10 4 J. W total = W a b + W b c 2.00 Chter 19, exmle rolems: (19.06) A gs undergoes two roesses. First: onstnt volume @ 0.200 m 3, isohori. Pressure inreses from 2.00 10 5 P to 5.00 10 5 P. Seond: Constnt ressure @ 5.00 10 5 P, isori. olume

More information

Appendix D: Completing the Square and the Quadratic Formula. In Appendix A, two special cases of expanding brackets were considered:

Appendix D: Completing the Square and the Quadratic Formula. In Appendix A, two special cases of expanding brackets were considered: Appendi D: Completing the Squre nd the Qudrtic Formul Fctoring qudrtic epressions such s: + 6 + 8 ws one of the topics introduced in Appendi C. Fctoring qudrtic epressions is useful skill tht cn help you

More information

How To Organize A Meeting On Gotomeeting

How To Organize A Meeting On Gotomeeting NOTES ON ORGANIZING AND SCHEDULING MEETINGS Individul GoToMeeting orgnizers my hold meetings for up to 15 ttendees. GoToMeeting Corporte orgnizers my hold meetings for up to 25 ttendees. GoToMeeting orgnizers

More information

Formal concept analysis-based class hierarchy design in object-oriented software development

Formal concept analysis-based class hierarchy design in object-oriented software development Forml onept nlysis-se lss hierrhy esign in ojet-oriente softwre evelopment Roert Goin 1, Petko Vlthev 2 1 Déprtement informtique, UQAM, C.P. 8888, su. Centre Ville, Montrél (Q), Cn, H3C 3P8 2 DIRO, Université

More information

Calculating Principal Strains using a Rectangular Strain Gage Rosette

Calculating Principal Strains using a Rectangular Strain Gage Rosette Clulting Prinipl Strins using Retngulr Strin Gge Rosette Strin gge rosettes re used often in engineering prtie to determine strin sttes t speifi points on struture. Figure illustrtes three ommonly used

More information

Data Security 1. 1 What is the function of the Jump instruction? 2 What are the main parts of the virus code? 3 What is the last act of the virus?

Data Security 1. 1 What is the function of the Jump instruction? 2 What are the main parts of the virus code? 3 What is the last act of the virus? UNIT 18 Dt Seurity 1 STARTER Wht stories do you think followed these hedlines? Compre nswers within your group. 1 Love ug retes worldwide hos. 2 Hkers rk Mirosoft softwre odes. 3 We phone sm. Wht other

More information

ORGANIZER QUICK REFERENCE GUIDE

ORGANIZER QUICK REFERENCE GUIDE NOTES ON ORGANIZING AND SCHEDULING MEETINGS Individul GoToMeeting orgnizers my hold meetings for up to 15 ttendees. GoToMeeting Corporte orgnizers my hold meetings for up to 25 ttendees. GoToMeeting orgnizers

More information

European Convention on Social and Medical Assistance

European Convention on Social and Medical Assistance Europen Convention on Soil nd Medil Assistne Pris, 11.XII.1953 Europen Trety Series - No. 14 The governments signtory hereto, eing memers of the Counil of Europe, Considering tht the im of the Counil of

More information

GUIDELINES. under THE PRIVATE HOSPITALS AND MEDICAL CLINICS ACT (1980) AND REGULATIONS (1991) MINISTRY OF HEALTH SINGAPORE

GUIDELINES. under THE PRIVATE HOSPITALS AND MEDICAL CLINICS ACT (1980) AND REGULATIONS (1991) MINISTRY OF HEALTH SINGAPORE GUIDELINES uner THE PRIVATE HOSPITALS AND MEDICAL CLINICS ACT (1980) AND REGULATIONS (1991) MINISTRY OF HEALTH SINGAPORE GUIDELINES FOR PRIVATE HOSPITALS, MEDICAL CLINICS AND CLINICAL LABORATORIES uner

More information

Euler Hermes Services Ireland Ltd. Terms & Conditions of Business for your Debt Collection Services

Euler Hermes Services Ireland Ltd. Terms & Conditions of Business for your Debt Collection Services Euler Hermes Servies Ireln Lt Terms & Conitions of Business for your Det Colletion Servies Contents Terms n Conitions of Business 1 The Servies 1 EHCI s Oligtions 1 Client s Oligtions 1 Soliitors 2 Fees

More information

Condominium Project Questionnaire Full Form

Condominium Project Questionnaire Full Form Conominium Projet Questionnaire Full Form Instrutions Lener: Complete the irst table below an enter the ate on whih the orm shoul be returne to you. Homeowners' Assoiation (HOA) or Management Company:

More information

Ratio and Proportion

Ratio and Proportion Rtio nd Proportion Rtio: The onept of rtio ours frequently nd in wide vriety of wys For exmple: A newspper reports tht the rtio of Repulins to Demorts on ertin Congressionl ommittee is 3 to The student/fulty

More information

control policies to be declared over by associating security

control policies to be declared over by associating security Seure XML Querying with Seurity Views Wenfei Fn University of Edinurgh & Bell Lortories wenfei@infeduk Chee-Yong Chn Ntionl University of Singpore hny@ompnusedusg Minos Groflkis Bell Lortories minos@reserhell-lsom

More information

Clause Trees: a Tool for Understanding and Implementing Resolution in Automated Reasoning

Clause Trees: a Tool for Understanding and Implementing Resolution in Automated Reasoning Cluse Trees: Tool for Understnding nd Implementing Resolution in Automted Resoning J. D. Horton nd Brue Spener University of New Brunswik, Frederiton, New Brunswik, Cnd E3B 5A3 emil : jdh@un. nd spener@un.

More information

MODAL VARIATIONS WITHIN GRANITIC OUTCROPS D. O. EruBnsoN, Department of Geology, Uni'ttersity of C alif ornia, Dattis, C ali'f orni,a'

MODAL VARIATIONS WITHIN GRANITIC OUTCROPS D. O. EruBnsoN, Department of Geology, Uni'ttersity of C alif ornia, Dattis, C ali'f orni,a' THE AMERICAN MINERALOGIST, VOL. 49, SEPTEMBER-OCTOBER' 1964 MODAL VARIATIONS WITHIN GRANITIC OUTCROPS D. O. EruBnsoN, Deprtment of Geology, Uni'ttersity of C lif orni, Dttis, C li'f orni,' Aestnr The soure

More information

KEY SKILLS INFORMATION TECHNOLOGY Level 3. Question Paper. 29 January 9 February 2001

KEY SKILLS INFORMATION TECHNOLOGY Level 3. Question Paper. 29 January 9 February 2001 KEY SKILLS INFORMATION TECHNOLOGY Level 3 Question Pper 29 Jnury 9 Ferury 2001 WHAT YOU NEED This Question Pper An Answer Booklet Aess to omputer, softwre nd printer You my use ilingul ditionry Do NOT

More information

WHAT HAPPENS WHEN YOU MIX COMPLEX NUMBERS WITH PRIME NUMBERS?

WHAT HAPPENS WHEN YOU MIX COMPLEX NUMBERS WITH PRIME NUMBERS? WHAT HAPPES WHE YOU MIX COMPLEX UMBERS WITH PRIME UMBERS? There s n ol syng, you n t pples n ornges. Mthemtns hte n t; they love to throw pples n ornges nto foo proessor n see wht hppens. Sometmes they

More information

The remaining two sides of the right triangle are called the legs of the right triangle.

The remaining two sides of the right triangle are called the legs of the right triangle. 10 MODULE 6. RADICAL EXPRESSIONS 6 Pythgoren Theorem The Pythgoren Theorem An ngle tht mesures 90 degrees is lled right ngle. If one of the ngles of tringle is right ngle, then the tringle is lled right

More information

PLWAP Sequential Mining: Open Source Code

PLWAP Sequential Mining: Open Source Code PL Sequentil Mining: Open Soure Code C.I. Ezeife Shool of Computer Siene University of Windsor Windsor, Ontrio N9B 3P4 ezeife@uwindsor. Yi Lu Deprtment of Computer Siene Wyne Stte University Detroit, Mihign

More information

BUSINESS PROCESS MODEL TRANSFORMATION ISSUES The top 7 adversaries encountered at defining model transformations

BUSINESS PROCESS MODEL TRANSFORMATION ISSUES The top 7 adversaries encountered at defining model transformations USINESS PROCESS MODEL TRANSFORMATION ISSUES The top 7 dversries enountered t defining model trnsformtions Mrion Murzek Women s Postgrdute College for Internet Tehnologies (WIT), Institute of Softwre Tehnology

More information

Volumes by Cylindrical Shells: the Shell Method

Volumes by Cylindrical Shells: the Shell Method olumes Clinril Shells: the Shell Metho Another metho of fin the volumes of solis of revolution is the shell metho. It n usull fin volumes tht re otherwise iffiult to evlute using the Dis / Wsher metho.

More information

Module 5. Three-phase AC Circuits. Version 2 EE IIT, Kharagpur

Module 5. Three-phase AC Circuits. Version 2 EE IIT, Kharagpur Module 5 Three-hse A iruits Version EE IIT, Khrgur esson 8 Three-hse Blned Suly Version EE IIT, Khrgur In the module, ontining six lessons (-7), the study of iruits, onsisting of the liner elements resistne,

More information

Start Here. Quick Setup Guide. the machine and check the components. NOTE Not all models are available in all countries.

Start Here. Quick Setup Guide. the machine and check the components. NOTE Not all models are available in all countries. Quik Setup Guie Strt Here MFC-9130CW / MFC-9330CDW MFC-9340CDW Thnk you for hoosing Brother, your support is importnt to us n we vlue your usiness. Your Brother prout is engineere n mnufture to the highest

More information

Cell Breathing Techniques for Load Balancing in Wireless LANs

Cell Breathing Techniques for Load Balancing in Wireless LANs 1 Cell rething Tehniques for Lod lning in Wireless LANs Yigl ejerno nd Seung-Je Hn ell Lortories, Luent Tehnologies Astrt: Mximizing the network throughput while providing firness is one of the key hllenges

More information

Visualization of characteristics of the contact network between spheres in 3D assembly

Visualization of characteristics of the contact network between spheres in 3D assembly Int. Agrophys., 2013, 27, 275-281 oi: 10.2478/v10247-012-0095-6 INTERNATIONAL Agrophysis www.interntionl-grophysis.org Visuliztion of hrteristis of the ontt network etween spheres in 3D ssemly R. Koy³k*

More information

Arc-Consistency for Non-Binary Dynamic CSPs

Arc-Consistency for Non-Binary Dynamic CSPs Ar-Consisteny for Non-Binry Dynmi CSPs Christin Bessière LIRMM (UMR C 9928 CNRS / Université Montpellier II) 860, rue de Sint Priest 34090 Montpellier, Frne Emil: essiere@rim.fr Astrt. Constrint stisftion

More information

T H E S E C U R E T R A N S M I S S I O N P R O T O C O L O F S E N S O R A D H O C N E T W O R K

T H E S E C U R E T R A N S M I S S I O N P R O T O C O L O F S E N S O R A D H O C N E T W O R K Z E S Z Y T Y N A U K O W E A K A D E M I I M A R Y N A R K I W O J E N N E J S C I E N T I F I C J O U R N A L O F P O L I S H N A V A L A C A D E M Y 2015 (LVI) 4 (203) A n d r z e j M r c z k DOI: 10.5604/0860889X.1187607

More information

Enterprise Digital Signage Create a New Sign

Enterprise Digital Signage Create a New Sign Enterprise Digitl Signge Crete New Sign Intended Audiene: Content dministrtors of Enterprise Digitl Signge inluding stff with remote ess to sign.pitt.edu nd the Content Mnger softwre pplition for their

More information

McAfee Network Security Platform

McAfee Network Security Platform XC-240 Lod Blner Appline Quik Strt Guide Revision D MAfee Network Seurity Pltform This quik strt guide explins how to quikly set up nd tivte your MAfee Network Seurity Pltform XC-240 Lod Blner. The SFP+

More information

The Principle of No Punishment Without a Law for It LEARNING OBJECTIVES: CRLA.GAAN:15.01.07-01.07

The Principle of No Punishment Without a Law for It LEARNING OBJECTIVES: CRLA.GAAN:15.01.07-01.07 True / Flse 1. An ex post fcto lw is lw which hs retroctive effect.. True b. Flse True 2. An lcoholic cnnot be convicte for the offense of being runk in public plce bse upon the Eighth n Fourteenth Amenments..

More information

Good practice in prescribing and managing medicines and devices

Good practice in prescribing and managing medicines and devices You n fin the ltest version of this guine on our wesite t www.gm-uk.org/guine. Referenes to Goo meil prtie upte in Mrh 2013 Goo prtie in presriing n mnging meiines n evies 1 In Goo meil prtie (2013) 1

More information

Vectors Summary. Projection vector AC = ( Shortest distance from B to line A C D [OR = where m1. and m

Vectors Summary. Projection vector AC = ( Shortest distance from B to line A C D [OR = where m1. and m . Slr prout (ot prout): = osθ Vetors Summry Lws of ot prout: (i) = (ii) ( ) = = (iii) = (ngle etween two ientil vetors is egrees) (iv) = n re perpeniulr Applitions: (i) Projetion vetor: B Length of projetion

More information

Review. Scan Conversion. Rasterizing Polygons. Rasterizing Polygons. Triangularization. Convex Shapes. Utah School of Computing Spring 2013

Review. Scan Conversion. Rasterizing Polygons. Rasterizing Polygons. Triangularization. Convex Shapes. Utah School of Computing Spring 2013 Uth Shool of Computing Spring 2013 Review Leture Set 4 Sn Conversion CS5600 Computer Grphis Spring 2013 Line rsteriztion Bsi Inrementl Algorithm Digitl Differentil Anlzer Rther thn solve line eqution t

More information

Forensic Engineering Techniques for VLSI CAD Tools

Forensic Engineering Techniques for VLSI CAD Tools Forensi Engineering Tehniques for VLSI CAD Tools Jennifer L. Wong, Drko Kirovski, Dvi Liu, Miorg Potkonjk UCLA Computer Siene Deprtment University of Cliforni, Los Angeles June 8, 2000 Computtionl Forensi

More information

VMware Horizon FLEX Administration Guide

VMware Horizon FLEX Administration Guide VMwre Horizon FLEX Administrtion Guide Horizon FLEX 1.0 This doument supports the version of eh produt listed nd supports ll susequent versions until the doument is repled y new edition. To hek for more

More information

VMware Horizon FLEX Administration Guide

VMware Horizon FLEX Administration Guide VMwre Horizon FLEX Administrtion Guide Horizon FLEX 1.1 This doument supports the version of eh produt listed nd supports ll susequent versions until the doument is repled y new edition. To hek for more

More information

REMO: Resource-Aware Application State Monitoring for Large-Scale Distributed Systems

REMO: Resource-Aware Application State Monitoring for Large-Scale Distributed Systems : Resoure-Awre Applition Stte Monitoring for Lrge-Sle Distriuted Systems Shiong Meng Srinivs R. Kshyp Chitr Venktrmni Ling Liu College of Computing, Georgi Institute of Tehnology, Atlnt, GA 332, USA {smeng,

More information

Practice Test 2. a. 12 kn b. 17 kn c. 13 kn d. 5.0 kn e. 49 kn

Practice Test 2. a. 12 kn b. 17 kn c. 13 kn d. 5.0 kn e. 49 kn Prtie Test 2 1. A highwy urve hs rdius of 0.14 km nd is unnked. A r weighing 12 kn goes round the urve t speed of 24 m/s without slipping. Wht is the mgnitude of the horizontl fore of the rod on the r?

More information

Words Symbols Diagram. abcde. a + b + c + d + e

Words Symbols Diagram. abcde. a + b + c + d + e Logi Gtes nd Properties We will e using logil opertions to uild mhines tht n do rithmeti lultions. It s useful to think of these opertions s si omponents tht n e hooked together into omplex networks. To

More information

A Network Management System for Power-Line Communications and its Verification by Simulation

A Network Management System for Power-Line Communications and its Verification by Simulation A Network Mngement System for Power-Line Communictions nd its Verifiction y Simultion Mrkus Seeck, Gerd Bumiller GmH Unterschluerscher-Huptstr. 10, D-90613 Großhersdorf, Germny Phone: +49 9105 9960-51,

More information

Section 5-4 Trigonometric Functions

Section 5-4 Trigonometric Functions 5- Trigonometric Functions Section 5- Trigonometric Functions Definition of the Trigonometric Functions Clcultor Evlution of Trigonometric Functions Definition of the Trigonometric Functions Alternte Form

More information

A System Context-Aware Approach for Battery Lifetime Prediction in Smart Phones

A System Context-Aware Approach for Battery Lifetime Prediction in Smart Phones A System Context-Awre Approh for Bttery Lifetime Predition in Smrt Phones Xi Zho, Yo Guo, Qing Feng, nd Xingqun Chen Key Lbortory of High Confidene Softwre Tehnologies (Ministry of Edution) Shool of Eletronis

More information

50 MATHCOUNTS LECTURES (10) RATIOS, RATES, AND PROPORTIONS

50 MATHCOUNTS LECTURES (10) RATIOS, RATES, AND PROPORTIONS 0 MATHCOUNTS LECTURES (0) RATIOS, RATES, AND PROPORTIONS BASIC KNOWLEDGE () RATIOS: Rtios re use to ompre two or more numers For n two numers n ( 0), the rtio is written s : = / Emple : If 4 stuents in

More information

5 a LAN 6 a gateway 7 a modem

5 a LAN 6 a gateway 7 a modem STARTER With the help of this digrm, try to descrie the function of these components of typicl network system: 1 file server 2 ridge 3 router 4 ckone 5 LAN 6 gtewy 7 modem Another Novell LAN Router Internet

More information

How To Balance Power In A Distribution System

How To Balance Power In A Distribution System NTERNATONA JOURNA OF ENERG, ssue 3, ol., 7 A dynmilly S bsed ompt ontrol lgorithm for lod blning in distribution systems A. Kzemi, A. Mordi Koohi nd R. Rezeipour Abstrt An lgorithm for pplying fixed pitor-thyristorontrolled

More information

the machine and check the components Black Yellow Cyan Magenta Product Registration Sheet (USA only)

the machine and check the components Black Yellow Cyan Magenta Product Registration Sheet (USA only) Quik Setup Guie Strt Here MFC-J825DW MFC-J835DW Thnk you for hoosing Brother, your support is importnt to us n we vlue your usiness. Your Brother prout is engineere n mnufture to the highest stnrs to eliver

More information

Chapter. Fractions. Contents: A Representing fractions

Chapter. Fractions. Contents: A Representing fractions Chpter Frtions Contents: A Representing rtions B Frtions o regulr shpes C Equl rtions D Simpliying rtions E Frtions o quntities F Compring rtion sizes G Improper rtions nd mixed numers 08 FRACTIONS (Chpter

More information

Experiment 6: Friction

Experiment 6: Friction Experiment 6: Friction In previous lbs we studied Newton s lws in n idel setting, tht is, one where friction nd ir resistnce were ignored. However, from our everydy experience with motion, we know tht

More information

Equivalence Checking. Sean Weaver

Equivalence Checking. Sean Weaver Equivlene Cheking Sen Wever Equivlene Cheking Given two Boolen funtions, prove whether or not two they re funtionlly equivlent This tlk fouses speifilly on the mehnis of heking the equivlene of pirs of

More information

ERmet ZD Application Note Version 1.1

ERmet ZD Application Note Version 1.1 ERmet ZD Applition Note Version. Generl The ERmet ZD is speiilly esigne or high spee ierentil signling in teleom pplitions t t rtes o up to 5 Git/s. This roust, high perormne, moulr onnetor system is lso

More information

PUBLIC-TRANSIT VEHICLE SCHEDULES USING A MINIMUM CREW-COST APPROACH

PUBLIC-TRANSIT VEHICLE SCHEDULES USING A MINIMUM CREW-COST APPROACH TOTAL LOGISTIC MANAGEMENT No. PP. Avishi CEDER PUBLIC-TRANSIT VEHICLE SCHEDULES USING A MINIMUM CREW-COST APPROACH Astrt: Commonly, puli trnsit genies, with view towrd effiieny, im t minimizing the numer

More information

AntiSpyware Enterprise Module 8.5

AntiSpyware Enterprise Module 8.5 AntiSpywre Enterprise Module 8.5 Product Guide Aout the AntiSpywre Enterprise Module The McAfee AntiSpywre Enterprise Module 8.5 is n dd-on to the VirusScn Enterprise 8.5i product tht extends its ility

More information

Concept Formation Using Graph Grammars

Concept Formation Using Graph Grammars Concept Formtion Using Grph Grmmrs Istvn Jonyer, Lwrence B. Holder nd Dine J. Cook Deprtment of Computer Science nd Engineering University of Texs t Arlington Box 19015 (416 Ytes St.), Arlington, TX 76019-0015

More information