Authenticated AODV Routing Protocol Using One-Time Signature and Transitive Signature Schemes
|
|
|
- Amos Rodgers
- 10 years ago
- Views:
Transcription
1 JOURNAL OF NETWORKS, VOL. 1, NO. 1, MAY Autentcated AODV Routng Protocol Usng One-Tme Sgnature and Transtve Sgnature Scemes Sd Xu Unversty of Wollongong, Wollongong, Australa Emal: Y Mu and Wlly Suslo Unversty of Wollongong, Wollongong, Australa Emal: { ymu, wsuslo }@uow.edu.au Abstract Moble ad oc network (MANET) as been generally regarded as an deal network model for group communcatons because of ts specalty of nstant establsment. However, te securty of MANET s stll a callenge ssue. Altoug tere are some exstng securty scemes suc as ARAN (Autentcated Routng for Ad oc Networks) protocol tat makes use of cryptograpc certfcate to provde end-to-end autentcaton durng routng pases, te overead of securty computaton s stll a serous urdle for real applcaton. In ts paper, we propose a comparatvely effcent sceme to perform ARAN protocol, based on AODV, by usng one-tme sgnature n place of conventonal sgnature, amng at acevng te same level of securty but mproved effcency. We also provde two approaces to andle te autentcaton of gratutous route reply usng delegaton token and transtve sgnature scemes. Index Terms MANET, Routng, AODV, Dgtal Sgnature, One-tme sgnature, Transtve sgnature. I. INTRODUCTION Te Moble Ad oc Networks (MANET) are a specfc type of network. Just as ts name mples, t s formed by moble nodes, suc as laptops and PDAs. Te constructon of te networks s generally mpromptu, terefore, networks can be formed wenever requred and topology s cangng from tme to tme. Ideally, any nodes satsfy general enterng condtons wll be accepted as a legtmate member of te network. Tese propertes make MANET very sutable for group communcatons, n wc, a number of people get togeter, formng a network to sare documents and excange conversatons. On te oter and, te wde-open envronment makes ts network super vulnerable to nsde and outsde attacks [1Error! Reference source not found.]. Especally n te case of routng [2], snce te absence of central control, t s extremely dffcult to prevent nodes from beavng mproperly. Altoug tere exst a large number of MANET routng protocols [3,4,5, 8,11], most of tem were desgned wtout any securty consderatons (generally t s assumed tat all nodes are frendly). Besdes, te resource constrants (bot computaton and bandwdt) of MANET put up great dffcultes over te deployment of securty. Two wdely known reactve routng protocols are AODV (Ad oc On- Demand Dstance Vector Routng) [8] and DSR (Dynamc Source Routng) [5], wc are bot very effcent but are subject to a varety of attacks. To renforce te securty of routng, ARAN [11] makes use of cryptograpc tecnques to offer securty n an open-manage envronment. Snce te securty s based on publc key cryptograpy, te effcency of ARAN s under suspcon. In ts paper, we pursue te advantages of one-tme sgnature, wc s more effcent n sgnng and verfcaton, to replace conventonal dgtal sgnature n protectng routng packets, toug, at te same tme, mantanng te same level autentcaton. In our prevous work [12], we made use of delegaton token to enable te autentcaton of te gratutous reply n route dscovery. In ts paper, we ntroduce anoter approac by usng transtve sgnature sceme ntroduced by Mcal and Rvest [6]. Te rest of te paper s organzed as below. Secton 2 brefly ntroduces te AODV routng protocol and ARAN routng sceme. Secton 3 descrbes te HORS one-tme sgnature sceme and ts key generaton process. Secton 4 explans our sceme used to secure AODV, called autentcated AODV. In secton 5, we ntroduce two approaces to be used to autentcate gratutous route reply. Secton 6 dscusses te securty of our proposal. Te last secton concludes te paper. II. BKGROUNDS In ts secton, we ntroduce te bascs of te AODV routng protocol and te ARAN autentcaton sceme. A. AODV Routng AODV s a smple and effcent on-demand ad oc routng protocol. Bascally, t uses RREQ (route request), RREP (route reply) and RRER (routsue error) messages to accompls route dscovery and mantenance
2 48 JOURNAL OF NETWORKS, VOL. 1, NO. 1, MAY 2006 operatons. It also utlzes sequence numbers to prevent routng loops. Routng decson makng s based on sequence numbers and routes mantaned n eac node s routng table. Te routng operatons of AODV generally consst of two pases: route dscovery and route mantenance. Route dscovery s performed troug broadcastng RREQ message. Wenever a node needs to send data packets to a destnaton, t frst cecks f t as an exstng route n te routng table. If not, te source node wll ntate a RREQ and broadcast ts request to all te negbours. Ten negbourng nodes wll update ter routng table accordng to te receved message. Wen RREQ reaces te destnaton, a RREP wll be generated by te destnaton node as a response to RREQ. Te RREP wll be transmtted back to te orgnator of RREQ n order to nform te route. If an ntermedate node as an actve route towards destnaton, t can reply te RREQ wt a RREP, wc s called Gratutous Route Reply. Te ntermedate node wll also send an RREP to destnaton node. Te RREP wll be sent n reverse route of RREQ f a bdrectonal lnk exsts. Route mantenance s performed wt two addtonal messages: Hello and RRER messages. Eac node broadcast Hello messages perodcally to nform negbours about ts connectvty. Te recevng of Hello message proves tat tere s an actve route towards te orgnator. Eac forwardng node sould keep track of ts contnued connectvty to ts actve next ops. If a lnk to te next op cannot be detected durng a perod of tmeout, a RRER message wll be broadcasted to nform te loss of connectvty. On recevng ts RRER, usually a local repar wll be performed just for mantenance. Te expred route wll be deleted after te confrmaton of ts unavalablty. From te securty pont of vew, AODV requres at least two securty attrbutes: sender autentcaton at eac recevng node and routng message ntegrty. Message ntegrty s of te most concern n AODV routng. In route request broadcastng pase, eac node as to ceck te orgnator sequence number n te RREQ packet wt te one recorded n ts routng table, and updates ts routng table to te newest one; n route reply pase, nstead of ceckng orgnator sequence number, eac node ceck te destnaton sequence number and keeps t up-to-date. Any explots of cangng sequence number wll result n routng loops. Besdes message alteraton, spoofng s also a serous attack. A node forward RREP mgt clam tself to be someone else, msleadng te recevng nodes falsely recordng te fake dentty as te next op towards destnaton. Ts s anoter way of dsruptng topology by creatng route loops. B. ARAN ARAN was proposed by Sanzgr et al n 2002, targetng to combat attacks ncludng unautorzed partcpaton, spoofed route sgnalng, alteraton of routng messages, replay attacks, etc. Smlar to oter secure routng protocols, ARAN s also a securty addson over on-demand routng protocols. It provdes autentcaton, message ntegrty and non-repudaton as part of mnmal securty polcy for ad oc envronment. ARAN stands for Autentcated Routng for Ad oc Networks. It s motvated to detect and protect aganst malcous actons by trd partes and peers n an ad oc envronment. ARAN s a securty sceme, wc can be appled to any on-demand routng protocols. It takes te advantages of PKI based dgtal sgnature sceme to provde securty features ncludng autentcaton, message ntegrty and non-repudaton. ARAN conssts of tree stages: a prelmnary certfcaton process, a mandatory end-to-end autentcaton stage and an optonal stage provdng secure sortest pat. To deploy tese tree stages, ARAN requres te use of a trusted certfcate server T and publc key cryptograpy. Eac node, before enterng te network, must request a certfcate from T, and wll receve exactly one certfcate after securely autentcatng ter denttes to T. Routng operatons of ARAN are performed usng tree data structures: route dscovery packet (RDP), reply packet (REP), and error packet (ERR). Eac of tem contans necessary routng nformaton as well as te publc key certfcate. Wen a node wants to ntate a route dscovery, t creates a sgned RDP and broadcasts t to te next op. Te next op node verfes te orgnator's sgnature. If t s autentc, t adds ts own certfcate and sgns te wole packet agan. Te followng op node performs te same operaton, owever, after te verfcaton of all te sgnatures of te receved RDP t replaces prevous op node's sgnature wt ts own. Operatons repeated untl te packet reaces te target. Wen te target node receves ts RDP, t reples wt a REP. Ts packet s n te same format of RDP, contanng destnaton's sgnature and certfcate. Eac forwardng node verfes te sgnature, removes prevous op node's sgnature, and ten adds ts own outsde te packet. If ts route reply reaces te orgnator, t s guaranteed tat te route found s autentc. Te autentcaton sceme provded by ARAN defends aganst explots usng modfcaton, fabrcaton and mpersonaton. However, te use of publc key cryptograpy s very costly. Te computatonal overead caused by sgnature generaton and verfcaton brngs tremendous burden for moble nodes. A group of malcous nodes may explot ts vulnerablty to launc a deny-of-servce attack by smply broadcastng large number of RDP packets. Te recevng nodes ave to exaust ter computatonal resources to verfy te sgnature and ten generate new ones. In addton, te extra bandwdt used to transmttng certfcate s also anoter burden. III. PRELIMINARIES In ts secton, we ntroduce te one-tme sgnature sceme to be used n te constructon of our autentcaton sceme.
3 JOURNAL OF NETWORKS, VOL. 1, NO. 1, MAY A. HORS As we observed, snce ARAN use publc key cryptograpy to protect routng process, te tme delay of sgnature generaton and verfcaton s sgnfcant. In general, sgnfcant tme delay at eac op causes unacceptable route acquston latency. Tus, we are lookng for some dgtal sgnature scemes tat mantan all te trats of conventonal DSS, but are effcent enoug n sgnature generaton and verfcaton. Te very frst one-tme sgnature sceme was ntroduced by Lamport n 1979 [7], to sgn just 1 bt nformaton. In 2002, Reyzn et al [10] proposed an onetme sgnature sceme, wc s bot effcent n sgnng and verfcaton, and generatng sort sgnatures. Ts resultng sceme s called HORS, wc stands for Has to Obtan Random Subset. Te major operaton n sgnature generaton s usng a ased message to obtan a random subset to form te sgnature. HORS stands for Has to Obtan Random Subset. It was proposed by Reyzn et al [10] n 2002, motvated to provde an effcent sgnng algortm. HORS conssts of tree algortms: key generaton, sgnng and verfcaton. HORS Key Generaton On constructng ts sceme, several securty parameters are predefned. To sgn b-bt messages, we frstly pck t and k suc tat t 2 b and ten coose a k securty parameter l, and a one-way as functon f tat operates on l-bt strngs. To generate publc key, randomly generate l-bt strng (s 1, s 2,, s t ). Let v = f(s ) for 1 t. Te resultng publc key s PK = (k, v 1, v 2,, v t ), prvate key s SK = (k, s 1, s 2,, s t ). HORS Sgnature Generaton To sgn a message m, wt secret key SK = (k, s 1, s 2,, s t ), frstly let = as(m); ten splt nto k substrngs 1, 2,, k, of lengt log 2 t bts eac; fnally, nterpret eac j as an nteger j for 1 j k. Te resultng sgnature s σ = (s 1, s 2,, s k ). HORS Sgnature Verfcaton Te verfcaton s te same as te sgnature generaton. Suppose te verfer as te message m, sgnature σ = (s 1, s 2,, s k ), and publc key PK = (k, v 1, v 2,, v t ). Frstly, let = as(m); ten splt nto k substrngs 1, 2,, k, of lengt log 2 t bts eac and nterpret eac j as an nteger j for 1 j k. If for eac j, 1 j k, f(s j ) == v j, accept te sgnature; oterwse, reject te sgnature. In HORS, te publc key component can be used multple tmes. Sgnature generaton requres only one call to as functon. Verfcaton requres k calls to as functon. One mpressve advantage of HORS s te sorter sgnature sze. For ter most effcent constructon, te sgnature sze can be reduced to bts. B. One-Tme Key Generaton for Routng Here, we descrbe te HORS one-tme key generaton process. Notatons: (),, () one way functon Sgn Kn conventonal dgtal sgnature generated by node n <>K n one-tme sgnature generated by node n Ancor: Secret key components P 2: Secret key components P 1 : Secret key components P 0: Generaton n (x 1 ) n (x 2 ) n (x 3 ) n (x t ) 2 (x 1) 2 (x 2) 2 (x 3) 2 (x t) 1 (x 1 ) 1 (x 2 ) 1 (x 3 ) 1 (x t ) 0 (x 1) 0 (x 2) 0 (x 3) 0 (x t) Fgure 1. Secret key components as can. Key Can generaton: Suppose tat te decson as been made regardng securty parameters l, k and t accordng to message lengt b. 1. Eac node cooses t secret key components x j (j=1,,t) at random. 2. Eac node creates a n as can of lengt t (see Fgure 1): 3. Publc key components are obtaned troug a one-way functon, namely v = (x ). We assume tat s a as functon for smplcty. 4. Publc key components are dsclosed perodcally. Generatng a set of one-tme keys to sgn routng messages as been dscussed by Zang n 1998 [15]. Two scemes called caned one-tme sgnature sceme (COSP) and ndependent one-tme sgnature sceme (IOSP) were proposed. Tese two scemes actvate us to generate our novel sceme. IV. AUTHENTICATED AODV ROUTING PROTOCOL Based on te one-tme sgnature sceme descrbed above, we propose a securty adds-on for AODV, wc contanng ARAN s autentcated routng features. Ts proposed protocol wll provde followng securty propertes: 1. Te target node can autentcate te orgnator; 2. Eac recevng node can autentcate ts prevous op from wc te routng message comng; 3. Eac ntermedate node can autentcate te sender for updatng ts routng table entry; 4. Te op count value s protected usng as can. It cannot be reduced by a malcous node, Usage
4 50 JOURNAL OF NETWORKS, VOL. 1, NO. 1, MAY 2006 but could be ncreased more tan one or retaned uncanged, as n SAODV [14]. To aceve securty features lsted above, we frstly assume te exstence of an offlne CA, wc ssues certfcate for eac node wen enterng te network. Tus, eac node possesses a publc key and prvate key par. Te conventonal dgtal sgnature wll stll be used to provde sender autentcaton, wereas te one-tme sgnature wll offer end-to-end autentcaton. A. Publc Key Handlng Te publc key n our proposed protocol s dssemnated n two dfferent ways. One ams at provdng keys for autentcaton among negbors. Anoter one tres to enable sender autentcaton durng message transmsson. End-to-end autentcaton s aceved troug negbor autentcaton. Eac node wll generate a set of one-tme keys as descrbed n secton 3.1. Te one-tme publc key components are dstrbuted locally among negbors. Snce one-tme keys can only be used once or lmted tmes, nodes need to update ter one-tme publc keys perodcally. To guarantee tat eac negborng node as an autentc copy of node s publc key, te very frst publc key, ancor, s dstrbuted safely durng system setup. Wen a node enters te network, t sgns ts ancor and broadcasts to ts negbors, along wt ts certfcate. Tus, successve one-tme publc keys can be dstrbuted n a more effcent manner by usng Hello message, wc s broadcasted perodcally. Te verfcaton of updates s stragtforward. For example, te frst secret key SK 1 s (k, n (x 1 ), n (x 2 ), n (x 3 ),, n (x t )). Te correspondng publc key PK 1 s (k, n+1 (x 1 ), n+1 (x 2 ), n+1 (x 3 ),, n+1 (x t )). Te second secret key SK 2 s (k, n (x 1 ), n (x 2 ), n (x 3 ),, n (x t )), tus te correspondng publc key PK 2 s (k, n (x 1 ), n (x 2 ), n (x 3 ),, n (x t )), wc can be verfed by asng once and comparng to PK 1. On te oter and, sender autentcaton s aceved troug conventonal dgtal sgnature. Te sender s publc key s contaned n ts certfcate wc s obtaned wen enterng te network. B. System Setup Ts pase s used for ntal key dstrbuton (see Fgure 2). Suppose wen a moble node enters te network, t s soon nformed about te securty parameters agreed n ts network. It ten cooses ts secret key components and generates a as can accordng to secton 3.1. Ten t performs as follows: C. Route Dscovery Route Dscovery s performed as n Fgure 3. Wen te orgnator (S) ntates a route dscovery to a certan destnaton, t smply generates a sgnature over te N: Coose secret key component SK Construct as can Te frst publc key component PK 1 s te Ancor Fgure 2. Intal key dstrbuton and autentcaton (n System Setup) RREQ, usng conventonal dgtal sgnature. RREQ: RREP: S A B C D S: So = SgnS<RREQ, top as, op count> S *: So, CertS A: op count = 1 A *: So, <(So)>KA, CertS B: op count = 2 B *: So, < 2 (So)>KB, CertS C: op count = 3 C *: So, < 3 (So)>KC, CertS D: ceck (MAX_HOP_COUNT HOP COUNT) (So ) = top as Sd = SgnS<RREP, top as, op count> D C: Sd, CertD C B: Sd, <(Sd)>KC, CertD B A: Sd, < (Sd)>KB, CertD A S: Sd, < (Sd)>KA, CertD Fgure 3. Route Request and Route Reply Upon te frst op node (A) receves te RREQ, t frstly verfes te sgnature of te orgnator. If te sgnature s fne, te negborng node ases te receved message S o agan and generates ts own sgnature over t. Ts tme, te sgnature s generated usng HORS one-tme sgnature sceme. Ten te wole message s re-transmtted to second op. From now on, tere are two sgnatures. One s over S o, anoter s over te as of S o. Once te second op node (B) receves ts double sgned RREQ, t frstly verfes te pervous op (A) usng publc key of A (wc mgt receve troug Hello messages). If te one-tme sgnature s fne, B ases S o one more tme and creates a sgnature over te as to replace te sgnature of A. Ten ts new message s broadcasted to next op negbors. Notce tat te verfcaton of conventonal sgnature could be delayed. Only f bot conventonal sgnature and one-tme sgnature are fne, does B update ts routng table entry accordng to RREQ. Tese operatons repeated untl RREQ reaces te destnaton. Wen RREQ reaces te destnaton, te destnaton node performs verfcatons te same as eac ntermedate node. Ten a RREP s generated and sgned te same as RREQ. Eac ntermedate node wll transmt t back to te orgnator troug te reverse route and same operatons are performed along te route. V. HANDLING GRATUITOUS ROUTE REPLY In AODV, gratutous route reply enables an ntermedate node to reply RREQs wc t as an actve route towards te destnaton. Ts feature s optonal n AODV, toug turnng on ts feature wll gly enance te effcency of routng dscovery. However, to enable ts feature, addtonal tecnque s needed. Te
5 JOURNAL OF NETWORKS, VOL. 1, NO. 1, MAY A B: <A, Token A > Token A = <A, B, Pr a, r a, t a >K a Fgure 4. Delegaton Token conceptual dea s tat snce we used dgtal sgnature to protect eac routng message at eac op, for an ntermedate node to reply RREQs nstead of te destnaton, te ntermedate node sould be able to sgn te RREQ properly on bealf of te destnaton. A. Delegaton Usng Token To solve ts problem, we borrow te dea from proxy sgnature proposed by Varadarajan et al. [14], n wc delegaton s enabled by usng a warrant. Te warrant appears as a delegaton token, contanng te denttes of prmary sgner and proxy sgner, te prvlege (Pr a ) gven to proxy sgner, an dentfer (r a ) used by prmary sgner, and a tmestamp (t a ). Ts delegaton token s sgned by te prmary sgner. We smplfy above delegaton token nto tree felds (See Fgure 4): te destnaton's dentty, an dentfer r a and a tmestamp t a. It s possble because te token does not need to be desgnated to certan nodes. Any node tat as receved te token from a target s automatcally proved to be avng an actve route towards te target. Oterwse, t would not be able to obtan ts token. Te token s sgned by te creator usng our IOS sgnature for our sceme. Te token enabled routng process s sown n Fgure 5. If te gratutous route reply opton s turned on, nodes broadcastng RREQs must create tokens for gratutous route reply delegaton. Te wole message ncludng te token wll be sgned agan, usng te same publc key as sgnng te token. Ten, te orgnator broadcast te RREQ as usual. Upon recevng te RREQ, node processes te autentcaton as normal. Ten t cecks te tmestamp to see f te token as expred. If te token s vald, te nodes wll store te token for future use. Te orgnator frstly cecks f ts RREP was created by destnaton or by ntermedate node. If t s a gratutous route reply, te orgnator cecks te tmestamp to determne f te route s stll actve. Ten te token and te RREP wll be autentcated as descrbed before. B. Delegaton Usng Transtve Sgnature Scemes References In ts secton, we ntroduce anoter approac for enablng delegaton by usng transtve sgnature sceme. Transtve sgnature sceme was frstly envsoned by Mcal and Rvest [6] n It was orgnally used to dynamcally buld an autentcated grap, edge by edge. Te sgner, avng secret key sk and publc key pk, can at any tme pck a par, j of nodes and create a sgnature of {, j}, tereby addng edge {, j} to te grap. In addton, gven a sgnature of an edge {, j} and a sgnature of an S A B C D RREQ: S: S o = <RREQ, op count, PK S, Token S>K S Token S = < S, PK S, r S, t S>K S S *: So A: op count = 1 A *: S o, (S o), <(S o)>k A B: op count = 2 B *: S o, 2 (S o), < 2 (S o)>k B C: op count = 3 C *: S o, 3 (S o), < 3 (S o)>k C RREP: C: ceck (MAX_HOP_COUNT-Hop_Count) ( S o)=top_ Has S C = <RREP, Top_ Has, Hop_Count, PK C, Token D>K D Token T = < D, PK D, r D, t D>K D C B: S C B A: S C, 2 (S C), < 2 (S C)>K B A S: S C, 3 (S C), < 3 (S C)>K A Fgure 5. Token enabled route Request and Gratutous Route Reply. edge {j, k}, anyone n possesson of te publc key can create a sgnature of te edge {, k}. We make use of te transtve sgnature sceme proposed by Mcal and Rvest [6] to construct our desgn. Setup Eac node n te network agrees wt te followng parameters: - large prme p and q suc tat q dvdes p - two generates g and of subgroup G q of order q Z * p suc tat te base-g logartm of modular p s nfeasble for oters to compute. Ten eac node n does te followed: 1. randomly coose two values x and y from Z * p ; 2. compute α = xmod q and β = ymod q ; 3. x y compute v = g mod p; 4. broadcast α and β to node s negbors. 5. upon te recept of α j and β j from eac negbor, node compute: α = x x j j β = y y and j j 6. node records n ts memory te quadruple: ( v, vj, αj, β j ) Sgn To sgn te pat between node A and node B, node B must ave receved α A, β A, and v A from node A. Ten node B computes te sgnature as: α AB = xa xb and β = y y AB A B Node B publses te quadruple as te sgnature:
6 52 JOURNAL OF NETWORKS, VOL. 1, NO. 1, MAY 2006 ( va, vb, α AB, β AB) Verfy Any node can verfy te prevous sgnature by ceckng: αab βab va = vbg Pat Composng Wen te next op node C receves te sgnature between node A and node B, t frstly verfes te valdty of te sgnature n order to ensure tat node B does ave an actve route towards node A. Ten node C can generate a transtve sgnature over te receved one so as to ncorporate tself nto te pat. Gven sgnature ( va, vb, α AB, β AB), node C retreves te quadruple ( vb, vc, αbc, β BC) and computes te new transtve sgnature ( va, vc, α, β ) as: α = αab αbc and = xa xc β = βab βbc = ya yc Te sgnature for te pat from node A to node C s: ( va, vc, α, β ) Te use of te transtve sgnature sceme to enable te route aggregaton as one bg beneft. It enables te autentcaton of bot orgnator and gratutous repler n one sgnature. In delegaton by warrant, te token s sgned wt te routng packet by te gratutous repler. Tus, te autentcaton of te gratutous repler as to be done by verfyng te conventonal sgnature, and te token wc s sgned usng conventonal sgnature sceme as to be verfed at te same cost. By usng transtve sgnatures, te orgnator and repler can be autentcated at te same tme. However, te use of te transtve sgnature sceme to enable gratutous reply autentcaton requres te cost of excangng publc key quadruples and computng te pat sgnatures between negborng nodes. It s consdered to be te major drawback of ts applcaton. VI. DISCUSSION AND IMPROVEMENT Te most outstandng pont of ts sceme s te effcency of one-tme sgnature generaton and verfcaton at eac op. Te same as HORS [10], eac tme, key generaton requres t evaluaton of one-way functon. Te secret key sze s lt bts, and te publc key sze s f l t bts, were f l s te lengt of te one-way functon output on nput of lengt l. Te sgnature s kl bts long. Tere s a tradeoff between t and k, snce te publc key sze wll be lnear n t, and te sgnature sze and verfcaton tme wll be lnear n k. Te securty of ts sceme stems from te system setup pase. In ts pase, a conventonal dgtal sgnature s used to guarantee te autentcty of te frst publc key component. Ts can be aceved troug usng publc key certfcate ssued by an offlne CA, namely, eac node must present a credtable dentty wen enterng te network. Te sgnature verfcaton and generaton may be neffcent, but snce ts message s broadcasted locally, t sould be practcal for eac node. Te update of publc key component s done along wt Hello message, wc s broadcasted perodcally. Snce te publc key component comes from a as can, te verfcaton s stragtforward te prevous publc key component s used to autentcate te new one. Te trustwortness of te new publc component depends totally on te securty of one-way as functon and te dgtal sgnature over ancor. Te ancor s used only once. It s replaced by newly comng publc key component after te frst Hello message s broadcasted. In ts way, nodes only need to do one as to autentcate new publc key component eac tme, wc s muc more effcent tan asng repeatedly back to ancor. Sender autentcaton s performed wt some compromse of effcency, usng conventonal DSS. Ts metod s muc more secure tan n SAODV, because n SAODV, te orgnator smply sgns on ts own publc key wtout te support of PKI. Attackers can easly forge RREQ and RREP packets durng transmsson. On te oter and, te effcency can be enanced to some degree troug te way tat eac node verfes conventonal dgtal sgnature after broadcastng routng packets. Terefore, tese wll be no verfcaton delay. Only bot conventonal sgnature and one-tme sgnature s fne, wll te routng table entry be updated. Double sgnng over te receved message does not provde more securty tan sngle sgnature from cryptograpc pont of vew. Neverteless, t provdes non-repudaton op-by-op, wc can be sued as an evdence for future ntruson detecton. Ts tougt comes from ARAN. It s consdered as mpractcal because te use of conventonal sgnature scemes. If tere s a tecnque to produce even sorter sgnature n more effcent manner, ts sceme can be extended to allow eac node to sgn on te receved messages. One sgnfcant drawback of one-tme sgnature s tat t can sgn only predefned number of messages, wc, n our sceme, s lmted by te sze of as can n. We generally consder t s not a serous problem, because nodes n MANET are moble devces wc are leavng and enterng te network frequently. Consequently, te as can wll be refresed. In ts sense, we can set n to a proper value accordng to network scale and average actve tme of nodes. VII. CONCLUSION Ts paper presented a novel sceme to mplement ARAN protocol based on AODV routng protocol. However, t s more effcent tan orgnal ARAN n sgnature generaton and verfcaton by usng HORS one-tme sgnature n place of conventonal dgtal sgnatures. We enable te protectons for gratutous route reply feature, under te concept of proxy sgnature s
7 JOURNAL OF NETWORKS, VOL. 1, NO. 1, MAY delegaton by warrant, as well as te route aggregaton usng transtve sgnature scemes. Te warrant ere s represented as a token, wc contans creator s dentty and publc key, and s sgned by te creator. Te securty of our sceme needs to be enforced by performng conventonal dgtal sgnature. Wt te elp of asymmetrc cryptograpy or publc key certfcate, we can ensure te autentcty of moble nodes and te secure dstrbuton of ntal keys. Hence, te securty of sub-sequental keys can be guaranteed by one way as can. [13] V. Varadarajan, P. Allen, and S. Black. An Analyss of te Proxy Problem n Dstrbuted Systems (pdf). In Proceedngs of te IEEE Symposum on Securty and Prvacy, 1991, pages , May [14] M. G. Zapata. Secure Ad oc On-Demand Dstance Vector (SAODV) Routng. IETF INTERNET DRAFT, MANET workng group, Nov draft-guerrero-manet-saodv- 02.txt. [15] K. Zang. Effcent Protocols for Sgnng Routng Messages (pdf). In Symposum on Network and Dstrbuted Systems Securty (NDSS '98), REFERENCES [1] A. Burg. Ad Hoc Network Specfc Attacks (pdf). In Semnar. Ad oc networkng: concepts, applcatons, and securty, Tecnsce Unverstät Müncen, Nov [2] Y. C. Hu, D. Jonson, and A. Perrg. SEAD: Secure Effcent Dstance Vector Routng for Moble Wreless Ad Hoc Networks (pdf). In 4 t IEEE Worksop on Moble Computng Systems and Applcatons (WMCSA 02), June 2002, pages 33, June [3] Y. C. Hu, A. Perrg, and D. Jonson. Aradne: A Secure On-demand Routng Protocol for Ad Hoc Networks (pdf). In Proc. M MOBICOM, Sep, [4] Y. C. Hu, A. Perrg and D. B. Jonson. Rusng Attacks and Defense n Wreless Ad Hoc Network Routng Protocols (pdf). In Proc. te 2003 M worksop on Wreless, Sep [5] D. B. Jonson, D. A. Maltz and Y. C. Hu. Te Dynamc Source Routng Protocol for Moble Ad Hoc Networks (DSR). IETF INTERNET DRAFT, MANET workng group, July draft-etf-manet-dsr0.txt. [6] S. Mcal and R. Rvest. Transtve Sgnature Scemes. In B. Prneel, edtor, Topcs n Cryptology CT-RSA 2002, volume 2271 of Lecture Notes n Computer Scence, pages Sprnger-Verlag, [7] L. Lamport. Constructng dgtal sgnature from a one way functon. Tecncal Report CSL-98, SRI Internatonal, October [8] C. E. Perkns, E. M. Royer, and S. R. Das. Ad Hoc On- Demand Dstance Vector (AODV) Routng. IETF INTERNET DRAFT, MANET workng group. Feb Draft-etf-manet-aodv3.txt. [9] A. Perrg. Te BBa one-tme sgnature and broadcast autentcaton protocol. In 8 t M Conference on Computer and Communcaton Securty, page M, November 508, [10] L. Reyzn and N. Reyzn. Better Tan BIBA: Sort One- Tme Sgnatures Wt Fast Sgnng and Verfyng. In Proc. 7 t Australasan Conference on Informaton Securty and Prvacy, LNCS 2384, Apr [11] K. Sanzgr, B. Dall, B. N. Levne, C. Selds, and E. M. Royer. A Secure Routng Protocol for Ad Hoc Networks (pdf). Tecncal Report: UM-CS , [12] S. Xu, Y. Mu, and W. Suslo. Secure AODV Routng Protocol Usng One-Tme Sgnature. In Proc. 1 st Internatonal Conference on Moble Ad-oc and Sensor Networks (MSN 2005). Sprnger, LNCS Dec Sd Xu was born Cengdu, Cna on November 1, Se receved B.S. (Bacelor of Engneerng) from te Unversty of Electronc Scence and Tecnology of Cna n 2001 and M. S. (Master of Informaton Systems) from te Unversty of Wollongong n Se s currently a canddate of Master of Computer Scence by researc n te Unversty of Wollongong. Y Mu receved s PD from te Australan Natonal Unversty n He was prevously wt te Scool of Computng and IT at te Unversty of Western Sydney as a lecturer and te Department of Computng at Macquare Unversty as a senor lecturer. He as been wt te Unversty of Wollongong snce Hs current researc nterests nclude network securty, electronc commerce securty, wreless securty, access control, computer securty, and cryptograpy. He also prevously worked at quantum cryptograpy, quantum computers, atomc computatons, and quantum optcs. Hs nterest n oter felds ncludes Internet computng, clent/server software and web tecnology. Y Mu as served n program commttees of a number of nternatonal conferences and edtoral boards of several nternatonal Journals. He s a senor member of te IEEE and a member of te IR. Wlly Suslo receved a P.D. n Computer Scence from Unversty of Wollongong, Australa. He s currently a assocate professor at te Scool of Informaton Tecnology and Computer Scence of te Unversty of Wollongong. He s te coordnator of Network Securty Researc Laboratory at te Unversty of Wollongong. Hs researc nterests nclude cryptograpy, nformaton securty, computer securty and network securty. Hs man contrbuton s n te area of dgtal sgnature scemes, n partcular fal-stop sgnature scemes and sort sgnature scemes. He as served as a program commttee member n a number of nternatonal conferences. He was te general car of ISP He s a member of te IR.
A Secure Password-Authenticated Key Agreement Using Smart Cards
A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,
AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS
Internatonal Journal of Network Securty & Its Applcatons (IJNSA), Vol.5, No.3, May 2013 AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Len Harn 1 and Changlu Ln 2 1 Department of Computer Scence
Proactive Secret Sharing Or: How to Cope With Perpetual Leakage
Proactve Secret Sharng Or: How to Cope Wth Perpetual Leakage Paper by Amr Herzberg Stanslaw Jareck Hugo Krawczyk Mot Yung Presentaton by Davd Zage What s Secret Sharng Basc Idea ((2, 2)-threshold scheme):
The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis
The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna [email protected] Abstract.
An RFID Distance Bounding Protocol
An RFID Dstance Boundng Protocol Gerhard P. Hancke and Markus G. Kuhn May 22, 2006 An RFID Dstance Boundng Protocol p. 1 Dstance boundng Verfer d Prover Places an upper bound on physcal dstance Does not
The Cox-Ross-Rubinstein Option Pricing Model
Fnance 400 A. Penat - G. Pennacc Te Cox-Ross-Rubnsten Opton Prcng Model Te prevous notes sowed tat te absence o arbtrage restrcts te prce o an opton n terms o ts underlyng asset. However, te no-arbtrage
A SECURE BILLING SERVICE WITH TWO-FACTOR USER AUTHENTICATION IN WIRELESS SENSOR NETWORKS. Received March 2010; revised July 2010
Internatonal Journal of Innovatve Computng, Informaton and Control ICIC Internatonal c 2011 ISSN 1349-4198 Volume 7, Number 8, August 2011 pp. 4821 4831 A SECURE BILLING SERVICE WITH TWO-FACTOR USER AUTHENTICATION
Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures
Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng
Certificate Revocation using Fine Grained Certificate Space Partitioning
Certfcate Revocaton usng Fne Graned Certfcate Space Parttonng Vpul Goyal Department of Computer Scence Unversty of Calforna, Los Angeles [email protected] Abstract A new certfcate revocaton system s presented.
Reinforcement Learning for Quality of Service in Mobile Ad Hoc Network (MANET)
Renforcement Learnng for Qualty of Servce n Moble Ad Hoc Network (MANET) *T.KUMANAN AND **K.DURAISWAMY *Meenaksh College of Engneerng West K.K Nagar, Cheena-78 **Dean/academc,K.S.R College of Technology,Truchengode
A Novel Adaptive Load Balancing Routing Algorithm in Ad hoc Networks
Journal of Convergence Informaton Technology A Novel Adaptve Load Balancng Routng Algorthm n Ad hoc Networks Zhu Bn, Zeng Xao-png, Xong Xan-sheng, Chen Qan, Fan Wen-yan, We Geng College of Communcaton
A Performance Analysis of View Maintenance Techniques for Data Warehouses
A Performance Analyss of Vew Mantenance Technques for Data Warehouses Xng Wang Dell Computer Corporaton Round Roc, Texas Le Gruenwald The nversty of Olahoma School of Computer Scence orman, OK 739 Guangtao
Secure Network Coding Over the Integers
Secure Network Codng Over the Integers Rosaro Gennaro Jonathan Katz Hugo Krawczyk Tal Rabn Abstract Network codng has receved sgnfcant attenton n the networkng communty for ts potental to ncrease throughput
A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers
INFORMATICA, 2000, Vol. 11, No. 2, 137 144 137 2000 Insttute of Mathematcs and Informatcs, Vlnus A Secure Nonrepudable Threshold Proxy Sgnature Scheme wth Known Sgners Mn-Shang HWANG, Iuon-Chang LIN, Erc
Watermark-based Provable Data Possession for Multimedia File in Cloud Storage
Vol.48 (CIA 014), pp.103-107 http://dx.do.org/10.1457/astl.014.48.18 Watermar-based Provable Data Possesson for Multmeda Fle n Cloud Storage Yongjun Ren 1,, Jang Xu 1,, Jn Wang 1,, Lmng Fang 3, Jeong-U
RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo.
ICSV4 Carns Australa 9- July, 007 RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL Yaoq FENG, Hanpng QIU Dynamc Test Laboratory, BISEE Chna Academy of Space Technology (CAST) [email protected] Abstract
A Cryptographic Key Assignment Scheme for Access Control in Poset Ordered Hierarchies with Enhanced Security
Internatonal Journal of Network Securty, Vol.7, No., PP.3 34, Sept. 8 3 A ryptographc Key Assgnment Scheme for Access ontrol n Poset Ordered Herarches wth Enhanced Securty Debass Gr and P. D. Srvastava
PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign
PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng
Ad-Hoc Games and Packet Forwardng Networks
On Desgnng Incentve-Compatble Routng and Forwardng Protocols n Wreless Ad-Hoc Networks An Integrated Approach Usng Game Theoretcal and Cryptographc Technques Sheng Zhong L (Erran) L Yanbn Grace Lu Yang
Recurrence. 1 Definitions and main statements
Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.
PKIS: practical keyword index search on cloud datacenter
Park et al. EURASIP Journal on Wreless Communcatons and Networkng 20, 20:64 http://jwcn.euraspjournals.com/content/20//64 RESEARCH Open Access PKIS: practcal keyword ndex search on cloud datacenter Hyun-A
An Interest-Oriented Network Evolution Mechanism for Online Communities
An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne
"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *
Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC
The OC Curve of Attribute Acceptance Plans
The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4
What is Candidate Sampling
What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble
E-learning Vendor Management Checklist
E-learning Vendor Management Checklist June 2008 Permission is granted to print freely, unmodified, this document from www.doingelearning.com or to copy it in electronic form. If linked to from the net
Luby s Alg. for Maximal Independent Sets using Pairwise Independence
Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent
VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika.
VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual
benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).
REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or
Yixin Jiang and Chuang Lin. Minghui Shi and Xuemin Sherman Shen*
198 Int J Securty Networks Vol 1 Nos 3/4 2006 A self-encrypton authentcaton protocol for teleconference servces Yxn Jang huang Ln Departent of oputer Scence Technology Tsnghua Unversty Beng hna E-al: yxang@csnet1cstsnghuaeducn
Trivial lump sum R5.0
Optons form Once you have flled n ths form, please return t wth your orgnal brth certfcate to: Premer PO Box 2067 Croydon CR90 9ND. Fll n ths form usng BLOCK CAPITALS and black nk. Mark all answers wth
Canon NTSC Help Desk Documentation
Canon NTSC Help Desk Documentaton READ THIS BEFORE PROCEEDING Before revewng ths documentaton, Canon Busness Solutons, Inc. ( CBS ) hereby refers you, the customer or customer s representatve or agent
Provably Secure Single Sign-on Scheme in Distributed Systems and Networks
0 IEEE th Internatonal Conference on Trust, Securty and Prvacy n Computng and Communcatons Provably Secure Sngle Sgn-on Scheme n Dstrbuted Systems and Networks Jangshan Yu, Guln Wang, and Y Mu Center for
Project Networks With Mixed-Time Constraints
Project Networs Wth Mxed-Tme Constrants L Caccetta and B Wattananon Western Australan Centre of Excellence n Industral Optmsaton (WACEIO) Curtn Unversty of Technology GPO Box U1987 Perth Western Australa
DISCLOSURES I. ELECTRONIC FUND TRANSFER DISCLOSURE (REGULATION E)... 2 ELECTRONIC DISCLOSURE AND ELECTRONIC SIGNATURE CONSENT... 7
DISCLOSURES The Dsclosures set forth below may affect the accounts you have selected wth Bank Leum USA. Read these dsclosures carefully as they descrbe your rghts and oblgatons for the accounts and/or
A DISTRIBUTED REPUTATION MANAGEMENT SCHEME FOR MOBILE AGENT- BASED APPLICATIONS
Bamasak & Zhang: A Dstrbuted Reputaton Management Scheme for Moble Agent-Based Applcatons A DISTRIBUTED REPUTATION MANAGEMENT SCHEME FOR MOBILE AGENT- BASED APPLICATIONS Omama Bamasak School of Computer
On the Optimal Control of a Cascade of Hydro-Electric Power Stations
On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;
An Alternative Way to Measure Private Equity Performance
An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate
Calculating the high frequency transmission line parameters of power cables
< ' Calculatng the hgh frequency transmsson lne parameters of power cables Authors: Dr. John Dcknson, Laboratory Servces Manager, N 0 RW E B Communcatons Mr. Peter J. Ncholson, Project Assgnment Manager,
INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS
21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS
A role based access in a hierarchical sensor network architecture to provide multilevel security
1 A role based access n a herarchcal sensor network archtecture to provde multlevel securty Bswajt Panja a Sanjay Kumar Madra b and Bharat Bhargava c a Department of Computer Scenc Morehead State Unversty
RequIn, a tool for fast web traffic inference
RequIn, a tool for fast web traffc nference Olver aul, Jean Etenne Kba GET/INT, LOR Department 9 rue Charles Fourer 90 Evry, France [email protected], [email protected] Abstract As networked
Relay Secrecy in Wireless Networks with Eavesdropper
Relay Secrecy n Wreless Networks wth Eavesdropper Parvathnathan Venktasubramanam, Tng He and Lang Tong School of Electrcal and Computer Engneerng Cornell Unversty, Ithaca, NY 14853 Emal : {pv45, th255,
Conversion between the vector and raster data structures using Fuzzy Geographical Entities
Converson between the vector and raster data structures usng Fuzzy Geographcal Enttes Cdála Fonte Department of Mathematcs Faculty of Scences and Technology Unversty of Combra, Apartado 38, 3 454 Combra,
A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture
A Desgn Method of Hgh-avalablty and Low-optcal-loss Optcal Aggregaton Network Archtecture Takehro Sato, Kuntaka Ashzawa, Kazumasa Tokuhash, Dasuke Ish, Satoru Okamoto and Naoak Yamanaka Dept. of Informaton
Conferencing protocols and Petri net analysis
Conferencng protocols and Petr net analyss E. ANTONIDAKIS Department of Electroncs, Technologcal Educatonal Insttute of Crete, GREECE [email protected] Abstract: Durng a computer conference, users desre
Multiple-Period Attribution: Residuals and Compounding
Multple-Perod Attrbuton: Resduals and Compoundng Our revewer gave these authors full marks for dealng wth an ssue that performance measurers and vendors often regard as propretary nformaton. In 1994, Dens
CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol
CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK Sample Stablty Protocol Background The Cholesterol Reference Method Laboratory Network (CRMLN) developed certfcaton protocols for total cholesterol, HDL
Traffic State Estimation in the Traffic Management Center of Berlin
Traffc State Estmaton n the Traffc Management Center of Berln Authors: Peter Vortsch, PTV AG, Stumpfstrasse, D-763 Karlsruhe, Germany phone ++49/72/965/35, emal [email protected] Peter Möhl, PTV AG,
JCS&T Vol. 11 No. 1 April 2011
Reversble Data Hdng Explotng Varance n Wavelet Coeffcents Xu-Ren Luo Department of Electrcal and Electronc Engneerng, Cung Ceng Insttute of Tecnology, Natonal Defense Unversty, Tas, Taoyuan 33509, Tawan,
MATHCAD'S PROGRAM FUNCTION and APPLICATION IN TEACHING OF MATH
. About Matcad MATHCAD'S PROGRAM FUNCTION and APPLICATION IN TEACHING OF MATH DE TING WU Depart of Mat Moreouse College Atlanta, GA.33, USA [email protected]. Introducton Matcad s one of popular computer
Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application
Internatonal Journal of mart Grd and lean Energy Performance Analyss of Energy onsumpton of martphone Runnng Moble Hotspot Applcaton Yun on hung a chool of Electronc Engneerng, oongsl Unversty, 511 angdo-dong,
IT09 - Identity Management Policy
IT09 - Identty Management Polcy Introducton 1 The Unersty needs to manage dentty accounts for all users of the Unersty s electronc systems and ensure that users hae an approprate leel of access to these
A Programming Model for the Cloud Platform
Internatonal Journal of Advanced Scence and Technology A Programmng Model for the Cloud Platform Xaodong Lu School of Computer Engneerng and Scence Shangha Unversty, Shangha 200072, Chna [email protected]
Scalable and Secure Architecture for Digital Content Distribution
Valer Bocan Scalable and Secure Archtecture for Dgtal Content Dstrbuton Mha Fagadar-Cosma Department of Computer Scence and Engneerng Informaton Technology Department Poltehnca Unversty of Tmsoara Alcatel
SUPPLIER FINANCING AND STOCK MANAGEMENT. A JOINT VIEW.
SUPPLIER FINANCING AND STOCK MANAGEMENT. A JOINT VIEW. Lucía Isabel García Cebrán Departamento de Economía y Dreccón de Empresas Unversdad de Zaragoza Gran Vía, 2 50.005 Zaragoza (Span) Phone: 976-76-10-00
Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,
A Crossplatform ECG Compression Library for Mobile HealthCare Services
A Crossplatform ECG Compresson Lbrary for Moble HealthCare Servces Alexander Borodn, Yulya Zavyalova Department of Computer Scence Petrozavodsk State Unversty Petrozavodsk, Russa {aborod, yzavyalo}@cs.petrsu.ru
Simple Interest Loans (Section 5.1) :
Chapter 5 Fnance The frst part of ths revew wll explan the dfferent nterest and nvestment equatons you learned n secton 5.1 through 5.4 of your textbook and go through several examples. The second part
FREQUENCY OF OCCURRENCE OF CERTAIN CHEMICAL CLASSES OF GSR FROM VARIOUS AMMUNITION TYPES
FREQUENCY OF OCCURRENCE OF CERTAIN CHEMICAL CLASSES OF GSR FROM VARIOUS AMMUNITION TYPES Zuzanna BRO EK-MUCHA, Grzegorz ZADORA, 2 Insttute of Forensc Research, Cracow, Poland 2 Faculty of Chemstry, Jagellonan
Identity-Based Encryption Gone Wild
An extended abstract of ths paper appeared n Mchele Bugles, Bart Preneel, Vladmro Sassone, and Ingo Wegener, edtors, 33rd Internatonal Colloquum on Automata, Languages and Programmng ICALP 2006, volume
sscada: securing SCADA infrastructure communications
Int. J. Communcaton Networks and Dstrbuted Systems, Vol. 6, No. 1, 2011 59 sscada: securng SCADA nfrastructure communcatons Yongge Wang Department of SIS, UNC Charlotte, 9201 Unversty Cty Blvd, Charlotte,
Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing
Effcent Bandwdth Management n Broadband Wreless Access Systems Usng CAC-based Dynamc Prcng Bader Al-Manthar, Ndal Nasser 2, Najah Abu Al 3, Hossam Hassanen Telecommuncatons Research Laboratory School of
Practical PIR for Electronic Commerce
Practcal PIR for Electronc Commerce Ryan Henry Cherton School of Computer Scence Unversty of Waterloo Waterloo ON Canada N2L 3G1 [email protected] Fem Olumofn Cherton School of Computer Scence Unversty
Negative Selection and Niching by an Artificial Immune System for Network Intrusion Detection
Negatve Selecton and Nchng by an Artfcal Immune System for Network Intruson Detecton Jungwon Km and Peter Bentley Department of omputer Scence, Unversty ollege London, Gower Street, London, W1E 6BT, U.K.
How To Get A Tax Refund On A Retirement Account
CED0105200808 Amerprse Fnancal Servces, Inc. 70400 Amerprse Fnancal Center Mnneapols, MN 55474 Incomng Account Transfer/Exchange/ Drect Rollover (Qualfed Plans Only) for Amerprse certfcates, Columba mutual
Schedulability Analysis under Graph Routing in WirelessHART Networks
Scedulability Analysis under Grap Routing in WirelessHART Networks Abusayeed Saifulla, Dolvara Gunatilaka, Paras Tiwari, Mo Sa, Cenyang Lu, Bo Li Cengjie Wu, and Yixin Cen Department of Computer Science,
A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression
Novel Methodology of Workng Captal Management for Large Publc Constructons by Usng Fuzzy S-curve Regresson Cheng-Wu Chen, Morrs H. L. Wang and Tng-Ya Hseh Department of Cvl Engneerng, Natonal Central Unversty,
Fast Variants of RSA
Fast Varants of RSA Dan Boneh [email protected] Hovav Shacham [email protected] Abstract We survey three varants of RSA desgned to speed up RSA decrypton. These varants are backwards compatble n
An Evaluation of the Extended Logistic, Simple Logistic, and Gompertz Models for Forecasting Short Lifecycle Products and Services
An Evaluaton of the Extended Logstc, Smple Logstc, and Gompertz Models for Forecastng Short Lfecycle Products and Servces Charles V. Trappey a,1, Hsn-yng Wu b a Professor (Management Scence), Natonal Chao
On the Use of Bayesian Networks to Analyze Survey Data
On te Use of Bayesan Networks to Analyze Survey Data P. Sebastan 1 (1 and. Ramon ( (1 Department of atematcs and Statstcs, Unversty of assacusetts. ( Cldren's Hosptal Informatcs Program, Harvard Unversty
Figure 1. Time-based operation of AIDP.
Adaptve Intruson Detecton & Preventon of Denal of Servce attacs n MANETs Adnan Nadeem Centre for Communcaton Systems Research Unversty of Surrey, UK [email protected] ABSTRACT Moble ad-hoc networs (MANETs)
Analysis of Energy-Conserving Access Protocols for Wireless Identification Networks
From the Proceedngs of Internatonal Conference on Telecommuncaton Systems (ITC-97), March 2-23, 1997. 1 Analyss of Energy-Conservng Access Protocols for Wreless Identfcaton etworks Imrch Chlamtac a, Chara
A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm
Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel
Effective Network Defense Strategies against Malicious Attacks with Various Defense Mechanisms under Quality of Service Constraints
Effectve Network Defense Strateges aganst Malcous Attacks wth Varous Defense Mechansms under Qualty of Servce Constrants Frank Yeong-Sung Ln Department of Informaton Natonal Tawan Unversty Tape, Tawan,
Data Mining from the Information Systems: Performance Indicators at Masaryk University in Brno
Data Mnng from the Informaton Systems: Performance Indcators at Masaryk Unversty n Brno Mkuláš Bek EUA Workshop Strasbourg, 1-2 December 2006 1 Locaton of Brno Brno EUA Workshop Strasbourg, 1-2 December
Cooperative Load Balancing in IEEE 802.11 Networks with Cell Breathing
Cooperatve Load Balancng n IEEE 82.11 Networks wth Cell Breathng Eduard Garca Rafael Vdal Josep Paradells Wreless Networks Group - Techncal Unversty of Catalona (UPC) {eduardg, rvdal, teljpa}@entel.upc.edu;
Secure and Efficient Proof of Storage with Deduplication
Secure and Effcent Proof of Storage wth Deduplcaton Qng Zheng Department of Computer Scence Unversty of Texas at San Antono [email protected] Shouhua Xu Department of Computer Scence Unversty of Texas
APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT
APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT Toshhko Oda (1), Kochro Iwaoka (2) (1), (2) Infrastructure Systems Busness Unt, Panasonc System Networks Co., Ltd. Saedo-cho
Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts
Power-of-wo Polces for Sngle- Warehouse Mult-Retaler Inventory Systems wth Order Frequency Dscounts José A. Ventura Pennsylvana State Unversty (USA) Yale. Herer echnon Israel Insttute of echnology (Israel)
Research Article QoS and Energy Aware Cooperative Routing Protocol for Wildfire Monitoring Wireless Sensor Networks
The Scentfc World Journal Volume 3, Artcle ID 43796, pages http://dx.do.org/.55/3/43796 Research Artcle QoS and Energy Aware Cooperatve Routng Protocol for Wldfre Montorng Wreless Sensor Networks Mohamed
1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP)
6.3 / -- Communcaton Networks II (Görg) SS20 -- www.comnets.un-bremen.de Communcaton Networks II Contents. Fundamentals of probablty theory 2. Emergence of communcaton traffc 3. Stochastc & Markovan Processes
DEFINING %COMPLETE IN MICROSOFT PROJECT
CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,
= (2) T a,2 a,2. T a,3 a,3. T a,1 a,1
A set of tools for buldng PostgreSQL dstrbuted databases n bomedcal envronment. M. Cavaller, R. Prudentno, U. Pozzol, G. Ren IRCCS E. Medea, Bosso Parn (LC), Italy. E-mal: [email protected] Abstract PostgreSQL
An Adaptive and Distributed Clustering Scheme for Wireless Sensor Networks
2007 Internatonal Conference on Convergence Informaton Technology An Adaptve and Dstrbuted Clusterng Scheme for Wreless Sensor Networs Xnguo Wang, Xnmng Zhang, Guolang Chen, Shuang Tan Department of Computer
Energy Conserving Routing in Wireless Ad-hoc Networks
Energy Conservng Routng n Wreless Ad-hoc Networks Jae-Hwan Chang and Leandros Tassulas Department of Electrcal and Computer Engneerng & Insttute for Systems Research Unversty of Maryland at College ark
Secure Walking GPS: A Secure Localization and Key Distribution Scheme for Wireless Sensor Networks
Secure Walkng GPS: A Secure Localzaton and Key Dstrbuton Scheme for Wreless Sensor Networks Q M, John A. Stankovc, Radu Stoleru 2 Department of Computer Scence, Unversty of Vrgna, USA 2 Department of Computer
