Authenticated AODV Routing Protocol Using One-Time Signature and Transitive Signature Schemes

Size: px
Start display at page:

Download "Authenticated AODV Routing Protocol Using One-Time Signature and Transitive Signature Schemes"

Transcription

1 JOURNAL OF NETWORKS, VOL. 1, NO. 1, MAY Autentcated AODV Routng Protocol Usng One-Tme Sgnature and Transtve Sgnature Scemes Sd Xu Unversty of Wollongong, Wollongong, Australa Emal: Y Mu and Wlly Suslo Unversty of Wollongong, Wollongong, Australa Emal: { ymu, wsuslo }@uow.edu.au Abstract Moble ad oc network (MANET) as been generally regarded as an deal network model for group communcatons because of ts specalty of nstant establsment. However, te securty of MANET s stll a callenge ssue. Altoug tere are some exstng securty scemes suc as ARAN (Autentcated Routng for Ad oc Networks) protocol tat makes use of cryptograpc certfcate to provde end-to-end autentcaton durng routng pases, te overead of securty computaton s stll a serous urdle for real applcaton. In ts paper, we propose a comparatvely effcent sceme to perform ARAN protocol, based on AODV, by usng one-tme sgnature n place of conventonal sgnature, amng at acevng te same level of securty but mproved effcency. We also provde two approaces to andle te autentcaton of gratutous route reply usng delegaton token and transtve sgnature scemes. Index Terms MANET, Routng, AODV, Dgtal Sgnature, One-tme sgnature, Transtve sgnature. I. INTRODUCTION Te Moble Ad oc Networks (MANET) are a specfc type of network. Just as ts name mples, t s formed by moble nodes, suc as laptops and PDAs. Te constructon of te networks s generally mpromptu, terefore, networks can be formed wenever requred and topology s cangng from tme to tme. Ideally, any nodes satsfy general enterng condtons wll be accepted as a legtmate member of te network. Tese propertes make MANET very sutable for group communcatons, n wc, a number of people get togeter, formng a network to sare documents and excange conversatons. On te oter and, te wde-open envronment makes ts network super vulnerable to nsde and outsde attacks [1Error! Reference source not found.]. Especally n te case of routng [2], snce te absence of central control, t s extremely dffcult to prevent nodes from beavng mproperly. Altoug tere exst a large number of MANET routng protocols [3,4,5, 8,11], most of tem were desgned wtout any securty consderatons (generally t s assumed tat all nodes are frendly). Besdes, te resource constrants (bot computaton and bandwdt) of MANET put up great dffcultes over te deployment of securty. Two wdely known reactve routng protocols are AODV (Ad oc On- Demand Dstance Vector Routng) [8] and DSR (Dynamc Source Routng) [5], wc are bot very effcent but are subject to a varety of attacks. To renforce te securty of routng, ARAN [11] makes use of cryptograpc tecnques to offer securty n an open-manage envronment. Snce te securty s based on publc key cryptograpy, te effcency of ARAN s under suspcon. In ts paper, we pursue te advantages of one-tme sgnature, wc s more effcent n sgnng and verfcaton, to replace conventonal dgtal sgnature n protectng routng packets, toug, at te same tme, mantanng te same level autentcaton. In our prevous work [12], we made use of delegaton token to enable te autentcaton of te gratutous reply n route dscovery. In ts paper, we ntroduce anoter approac by usng transtve sgnature sceme ntroduced by Mcal and Rvest [6]. Te rest of te paper s organzed as below. Secton 2 brefly ntroduces te AODV routng protocol and ARAN routng sceme. Secton 3 descrbes te HORS one-tme sgnature sceme and ts key generaton process. Secton 4 explans our sceme used to secure AODV, called autentcated AODV. In secton 5, we ntroduce two approaces to be used to autentcate gratutous route reply. Secton 6 dscusses te securty of our proposal. Te last secton concludes te paper. II. BKGROUNDS In ts secton, we ntroduce te bascs of te AODV routng protocol and te ARAN autentcaton sceme. A. AODV Routng AODV s a smple and effcent on-demand ad oc routng protocol. Bascally, t uses RREQ (route request), RREP (route reply) and RRER (routsue error) messages to accompls route dscovery and mantenance

2 48 JOURNAL OF NETWORKS, VOL. 1, NO. 1, MAY 2006 operatons. It also utlzes sequence numbers to prevent routng loops. Routng decson makng s based on sequence numbers and routes mantaned n eac node s routng table. Te routng operatons of AODV generally consst of two pases: route dscovery and route mantenance. Route dscovery s performed troug broadcastng RREQ message. Wenever a node needs to send data packets to a destnaton, t frst cecks f t as an exstng route n te routng table. If not, te source node wll ntate a RREQ and broadcast ts request to all te negbours. Ten negbourng nodes wll update ter routng table accordng to te receved message. Wen RREQ reaces te destnaton, a RREP wll be generated by te destnaton node as a response to RREQ. Te RREP wll be transmtted back to te orgnator of RREQ n order to nform te route. If an ntermedate node as an actve route towards destnaton, t can reply te RREQ wt a RREP, wc s called Gratutous Route Reply. Te ntermedate node wll also send an RREP to destnaton node. Te RREP wll be sent n reverse route of RREQ f a bdrectonal lnk exsts. Route mantenance s performed wt two addtonal messages: Hello and RRER messages. Eac node broadcast Hello messages perodcally to nform negbours about ts connectvty. Te recevng of Hello message proves tat tere s an actve route towards te orgnator. Eac forwardng node sould keep track of ts contnued connectvty to ts actve next ops. If a lnk to te next op cannot be detected durng a perod of tmeout, a RRER message wll be broadcasted to nform te loss of connectvty. On recevng ts RRER, usually a local repar wll be performed just for mantenance. Te expred route wll be deleted after te confrmaton of ts unavalablty. From te securty pont of vew, AODV requres at least two securty attrbutes: sender autentcaton at eac recevng node and routng message ntegrty. Message ntegrty s of te most concern n AODV routng. In route request broadcastng pase, eac node as to ceck te orgnator sequence number n te RREQ packet wt te one recorded n ts routng table, and updates ts routng table to te newest one; n route reply pase, nstead of ceckng orgnator sequence number, eac node ceck te destnaton sequence number and keeps t up-to-date. Any explots of cangng sequence number wll result n routng loops. Besdes message alteraton, spoofng s also a serous attack. A node forward RREP mgt clam tself to be someone else, msleadng te recevng nodes falsely recordng te fake dentty as te next op towards destnaton. Ts s anoter way of dsruptng topology by creatng route loops. B. ARAN ARAN was proposed by Sanzgr et al n 2002, targetng to combat attacks ncludng unautorzed partcpaton, spoofed route sgnalng, alteraton of routng messages, replay attacks, etc. Smlar to oter secure routng protocols, ARAN s also a securty addson over on-demand routng protocols. It provdes autentcaton, message ntegrty and non-repudaton as part of mnmal securty polcy for ad oc envronment. ARAN stands for Autentcated Routng for Ad oc Networks. It s motvated to detect and protect aganst malcous actons by trd partes and peers n an ad oc envronment. ARAN s a securty sceme, wc can be appled to any on-demand routng protocols. It takes te advantages of PKI based dgtal sgnature sceme to provde securty features ncludng autentcaton, message ntegrty and non-repudaton. ARAN conssts of tree stages: a prelmnary certfcaton process, a mandatory end-to-end autentcaton stage and an optonal stage provdng secure sortest pat. To deploy tese tree stages, ARAN requres te use of a trusted certfcate server T and publc key cryptograpy. Eac node, before enterng te network, must request a certfcate from T, and wll receve exactly one certfcate after securely autentcatng ter denttes to T. Routng operatons of ARAN are performed usng tree data structures: route dscovery packet (RDP), reply packet (REP), and error packet (ERR). Eac of tem contans necessary routng nformaton as well as te publc key certfcate. Wen a node wants to ntate a route dscovery, t creates a sgned RDP and broadcasts t to te next op. Te next op node verfes te orgnator's sgnature. If t s autentc, t adds ts own certfcate and sgns te wole packet agan. Te followng op node performs te same operaton, owever, after te verfcaton of all te sgnatures of te receved RDP t replaces prevous op node's sgnature wt ts own. Operatons repeated untl te packet reaces te target. Wen te target node receves ts RDP, t reples wt a REP. Ts packet s n te same format of RDP, contanng destnaton's sgnature and certfcate. Eac forwardng node verfes te sgnature, removes prevous op node's sgnature, and ten adds ts own outsde te packet. If ts route reply reaces te orgnator, t s guaranteed tat te route found s autentc. Te autentcaton sceme provded by ARAN defends aganst explots usng modfcaton, fabrcaton and mpersonaton. However, te use of publc key cryptograpy s very costly. Te computatonal overead caused by sgnature generaton and verfcaton brngs tremendous burden for moble nodes. A group of malcous nodes may explot ts vulnerablty to launc a deny-of-servce attack by smply broadcastng large number of RDP packets. Te recevng nodes ave to exaust ter computatonal resources to verfy te sgnature and ten generate new ones. In addton, te extra bandwdt used to transmttng certfcate s also anoter burden. III. PRELIMINARIES In ts secton, we ntroduce te one-tme sgnature sceme to be used n te constructon of our autentcaton sceme.

3 JOURNAL OF NETWORKS, VOL. 1, NO. 1, MAY A. HORS As we observed, snce ARAN use publc key cryptograpy to protect routng process, te tme delay of sgnature generaton and verfcaton s sgnfcant. In general, sgnfcant tme delay at eac op causes unacceptable route acquston latency. Tus, we are lookng for some dgtal sgnature scemes tat mantan all te trats of conventonal DSS, but are effcent enoug n sgnature generaton and verfcaton. Te very frst one-tme sgnature sceme was ntroduced by Lamport n 1979 [7], to sgn just 1 bt nformaton. In 2002, Reyzn et al [10] proposed an onetme sgnature sceme, wc s bot effcent n sgnng and verfcaton, and generatng sort sgnatures. Ts resultng sceme s called HORS, wc stands for Has to Obtan Random Subset. Te major operaton n sgnature generaton s usng a ased message to obtan a random subset to form te sgnature. HORS stands for Has to Obtan Random Subset. It was proposed by Reyzn et al [10] n 2002, motvated to provde an effcent sgnng algortm. HORS conssts of tree algortms: key generaton, sgnng and verfcaton. HORS Key Generaton On constructng ts sceme, several securty parameters are predefned. To sgn b-bt messages, we frstly pck t and k suc tat t 2 b and ten coose a k securty parameter l, and a one-way as functon f tat operates on l-bt strngs. To generate publc key, randomly generate l-bt strng (s 1, s 2,, s t ). Let v = f(s ) for 1 t. Te resultng publc key s PK = (k, v 1, v 2,, v t ), prvate key s SK = (k, s 1, s 2,, s t ). HORS Sgnature Generaton To sgn a message m, wt secret key SK = (k, s 1, s 2,, s t ), frstly let = as(m); ten splt nto k substrngs 1, 2,, k, of lengt log 2 t bts eac; fnally, nterpret eac j as an nteger j for 1 j k. Te resultng sgnature s σ = (s 1, s 2,, s k ). HORS Sgnature Verfcaton Te verfcaton s te same as te sgnature generaton. Suppose te verfer as te message m, sgnature σ = (s 1, s 2,, s k ), and publc key PK = (k, v 1, v 2,, v t ). Frstly, let = as(m); ten splt nto k substrngs 1, 2,, k, of lengt log 2 t bts eac and nterpret eac j as an nteger j for 1 j k. If for eac j, 1 j k, f(s j ) == v j, accept te sgnature; oterwse, reject te sgnature. In HORS, te publc key component can be used multple tmes. Sgnature generaton requres only one call to as functon. Verfcaton requres k calls to as functon. One mpressve advantage of HORS s te sorter sgnature sze. For ter most effcent constructon, te sgnature sze can be reduced to bts. B. One-Tme Key Generaton for Routng Here, we descrbe te HORS one-tme key generaton process. Notatons: (),, () one way functon Sgn Kn conventonal dgtal sgnature generated by node n <>K n one-tme sgnature generated by node n Ancor: Secret key components P 2: Secret key components P 1 : Secret key components P 0: Generaton n (x 1 ) n (x 2 ) n (x 3 ) n (x t ) 2 (x 1) 2 (x 2) 2 (x 3) 2 (x t) 1 (x 1 ) 1 (x 2 ) 1 (x 3 ) 1 (x t ) 0 (x 1) 0 (x 2) 0 (x 3) 0 (x t) Fgure 1. Secret key components as can. Key Can generaton: Suppose tat te decson as been made regardng securty parameters l, k and t accordng to message lengt b. 1. Eac node cooses t secret key components x j (j=1,,t) at random. 2. Eac node creates a n as can of lengt t (see Fgure 1): 3. Publc key components are obtaned troug a one-way functon, namely v = (x ). We assume tat s a as functon for smplcty. 4. Publc key components are dsclosed perodcally. Generatng a set of one-tme keys to sgn routng messages as been dscussed by Zang n 1998 [15]. Two scemes called caned one-tme sgnature sceme (COSP) and ndependent one-tme sgnature sceme (IOSP) were proposed. Tese two scemes actvate us to generate our novel sceme. IV. AUTHENTICATED AODV ROUTING PROTOCOL Based on te one-tme sgnature sceme descrbed above, we propose a securty adds-on for AODV, wc contanng ARAN s autentcated routng features. Ts proposed protocol wll provde followng securty propertes: 1. Te target node can autentcate te orgnator; 2. Eac recevng node can autentcate ts prevous op from wc te routng message comng; 3. Eac ntermedate node can autentcate te sender for updatng ts routng table entry; 4. Te op count value s protected usng as can. It cannot be reduced by a malcous node, Usage

4 50 JOURNAL OF NETWORKS, VOL. 1, NO. 1, MAY 2006 but could be ncreased more tan one or retaned uncanged, as n SAODV [14]. To aceve securty features lsted above, we frstly assume te exstence of an offlne CA, wc ssues certfcate for eac node wen enterng te network. Tus, eac node possesses a publc key and prvate key par. Te conventonal dgtal sgnature wll stll be used to provde sender autentcaton, wereas te one-tme sgnature wll offer end-to-end autentcaton. A. Publc Key Handlng Te publc key n our proposed protocol s dssemnated n two dfferent ways. One ams at provdng keys for autentcaton among negbors. Anoter one tres to enable sender autentcaton durng message transmsson. End-to-end autentcaton s aceved troug negbor autentcaton. Eac node wll generate a set of one-tme keys as descrbed n secton 3.1. Te one-tme publc key components are dstrbuted locally among negbors. Snce one-tme keys can only be used once or lmted tmes, nodes need to update ter one-tme publc keys perodcally. To guarantee tat eac negborng node as an autentc copy of node s publc key, te very frst publc key, ancor, s dstrbuted safely durng system setup. Wen a node enters te network, t sgns ts ancor and broadcasts to ts negbors, along wt ts certfcate. Tus, successve one-tme publc keys can be dstrbuted n a more effcent manner by usng Hello message, wc s broadcasted perodcally. Te verfcaton of updates s stragtforward. For example, te frst secret key SK 1 s (k, n (x 1 ), n (x 2 ), n (x 3 ),, n (x t )). Te correspondng publc key PK 1 s (k, n+1 (x 1 ), n+1 (x 2 ), n+1 (x 3 ),, n+1 (x t )). Te second secret key SK 2 s (k, n (x 1 ), n (x 2 ), n (x 3 ),, n (x t )), tus te correspondng publc key PK 2 s (k, n (x 1 ), n (x 2 ), n (x 3 ),, n (x t )), wc can be verfed by asng once and comparng to PK 1. On te oter and, sender autentcaton s aceved troug conventonal dgtal sgnature. Te sender s publc key s contaned n ts certfcate wc s obtaned wen enterng te network. B. System Setup Ts pase s used for ntal key dstrbuton (see Fgure 2). Suppose wen a moble node enters te network, t s soon nformed about te securty parameters agreed n ts network. It ten cooses ts secret key components and generates a as can accordng to secton 3.1. Ten t performs as follows: C. Route Dscovery Route Dscovery s performed as n Fgure 3. Wen te orgnator (S) ntates a route dscovery to a certan destnaton, t smply generates a sgnature over te N: Coose secret key component SK Construct as can Te frst publc key component PK 1 s te Ancor Fgure 2. Intal key dstrbuton and autentcaton (n System Setup) RREQ, usng conventonal dgtal sgnature. RREQ: RREP: S A B C D S: So = SgnS<RREQ, top as, op count> S *: So, CertS A: op count = 1 A *: So, <(So)>KA, CertS B: op count = 2 B *: So, < 2 (So)>KB, CertS C: op count = 3 C *: So, < 3 (So)>KC, CertS D: ceck (MAX_HOP_COUNT HOP COUNT) (So ) = top as Sd = SgnS<RREP, top as, op count> D C: Sd, CertD C B: Sd, <(Sd)>KC, CertD B A: Sd, < (Sd)>KB, CertD A S: Sd, < (Sd)>KA, CertD Fgure 3. Route Request and Route Reply Upon te frst op node (A) receves te RREQ, t frstly verfes te sgnature of te orgnator. If te sgnature s fne, te negborng node ases te receved message S o agan and generates ts own sgnature over t. Ts tme, te sgnature s generated usng HORS one-tme sgnature sceme. Ten te wole message s re-transmtted to second op. From now on, tere are two sgnatures. One s over S o, anoter s over te as of S o. Once te second op node (B) receves ts double sgned RREQ, t frstly verfes te pervous op (A) usng publc key of A (wc mgt receve troug Hello messages). If te one-tme sgnature s fne, B ases S o one more tme and creates a sgnature over te as to replace te sgnature of A. Ten ts new message s broadcasted to next op negbors. Notce tat te verfcaton of conventonal sgnature could be delayed. Only f bot conventonal sgnature and one-tme sgnature are fne, does B update ts routng table entry accordng to RREQ. Tese operatons repeated untl RREQ reaces te destnaton. Wen RREQ reaces te destnaton, te destnaton node performs verfcatons te same as eac ntermedate node. Ten a RREP s generated and sgned te same as RREQ. Eac ntermedate node wll transmt t back to te orgnator troug te reverse route and same operatons are performed along te route. V. HANDLING GRATUITOUS ROUTE REPLY In AODV, gratutous route reply enables an ntermedate node to reply RREQs wc t as an actve route towards te destnaton. Ts feature s optonal n AODV, toug turnng on ts feature wll gly enance te effcency of routng dscovery. However, to enable ts feature, addtonal tecnque s needed. Te

5 JOURNAL OF NETWORKS, VOL. 1, NO. 1, MAY A B: <A, Token A > Token A = <A, B, Pr a, r a, t a >K a Fgure 4. Delegaton Token conceptual dea s tat snce we used dgtal sgnature to protect eac routng message at eac op, for an ntermedate node to reply RREQs nstead of te destnaton, te ntermedate node sould be able to sgn te RREQ properly on bealf of te destnaton. A. Delegaton Usng Token To solve ts problem, we borrow te dea from proxy sgnature proposed by Varadarajan et al. [14], n wc delegaton s enabled by usng a warrant. Te warrant appears as a delegaton token, contanng te denttes of prmary sgner and proxy sgner, te prvlege (Pr a ) gven to proxy sgner, an dentfer (r a ) used by prmary sgner, and a tmestamp (t a ). Ts delegaton token s sgned by te prmary sgner. We smplfy above delegaton token nto tree felds (See Fgure 4): te destnaton's dentty, an dentfer r a and a tmestamp t a. It s possble because te token does not need to be desgnated to certan nodes. Any node tat as receved te token from a target s automatcally proved to be avng an actve route towards te target. Oterwse, t would not be able to obtan ts token. Te token s sgned by te creator usng our IOS sgnature for our sceme. Te token enabled routng process s sown n Fgure 5. If te gratutous route reply opton s turned on, nodes broadcastng RREQs must create tokens for gratutous route reply delegaton. Te wole message ncludng te token wll be sgned agan, usng te same publc key as sgnng te token. Ten, te orgnator broadcast te RREQ as usual. Upon recevng te RREQ, node processes te autentcaton as normal. Ten t cecks te tmestamp to see f te token as expred. If te token s vald, te nodes wll store te token for future use. Te orgnator frstly cecks f ts RREP was created by destnaton or by ntermedate node. If t s a gratutous route reply, te orgnator cecks te tmestamp to determne f te route s stll actve. Ten te token and te RREP wll be autentcated as descrbed before. B. Delegaton Usng Transtve Sgnature Scemes References In ts secton, we ntroduce anoter approac for enablng delegaton by usng transtve sgnature sceme. Transtve sgnature sceme was frstly envsoned by Mcal and Rvest [6] n It was orgnally used to dynamcally buld an autentcated grap, edge by edge. Te sgner, avng secret key sk and publc key pk, can at any tme pck a par, j of nodes and create a sgnature of {, j}, tereby addng edge {, j} to te grap. In addton, gven a sgnature of an edge {, j} and a sgnature of an S A B C D RREQ: S: S o = <RREQ, op count, PK S, Token S>K S Token S = < S, PK S, r S, t S>K S S *: So A: op count = 1 A *: S o, (S o), <(S o)>k A B: op count = 2 B *: S o, 2 (S o), < 2 (S o)>k B C: op count = 3 C *: S o, 3 (S o), < 3 (S o)>k C RREP: C: ceck (MAX_HOP_COUNT-Hop_Count) ( S o)=top_ Has S C = <RREP, Top_ Has, Hop_Count, PK C, Token D>K D Token T = < D, PK D, r D, t D>K D C B: S C B A: S C, 2 (S C), < 2 (S C)>K B A S: S C, 3 (S C), < 3 (S C)>K A Fgure 5. Token enabled route Request and Gratutous Route Reply. edge {j, k}, anyone n possesson of te publc key can create a sgnature of te edge {, k}. We make use of te transtve sgnature sceme proposed by Mcal and Rvest [6] to construct our desgn. Setup Eac node n te network agrees wt te followng parameters: - large prme p and q suc tat q dvdes p - two generates g and of subgroup G q of order q Z * p suc tat te base-g logartm of modular p s nfeasble for oters to compute. Ten eac node n does te followed: 1. randomly coose two values x and y from Z * p ; 2. compute α = xmod q and β = ymod q ; 3. x y compute v = g mod p; 4. broadcast α and β to node s negbors. 5. upon te recept of α j and β j from eac negbor, node compute: α = x x j j β = y y and j j 6. node records n ts memory te quadruple: ( v, vj, αj, β j ) Sgn To sgn te pat between node A and node B, node B must ave receved α A, β A, and v A from node A. Ten node B computes te sgnature as: α AB = xa xb and β = y y AB A B Node B publses te quadruple as te sgnature:

6 52 JOURNAL OF NETWORKS, VOL. 1, NO. 1, MAY 2006 ( va, vb, α AB, β AB) Verfy Any node can verfy te prevous sgnature by ceckng: αab βab va = vbg Pat Composng Wen te next op node C receves te sgnature between node A and node B, t frstly verfes te valdty of te sgnature n order to ensure tat node B does ave an actve route towards node A. Ten node C can generate a transtve sgnature over te receved one so as to ncorporate tself nto te pat. Gven sgnature ( va, vb, α AB, β AB), node C retreves te quadruple ( vb, vc, αbc, β BC) and computes te new transtve sgnature ( va, vc, α, β ) as: α = αab αbc and = xa xc β = βab βbc = ya yc Te sgnature for te pat from node A to node C s: ( va, vc, α, β ) Te use of te transtve sgnature sceme to enable te route aggregaton as one bg beneft. It enables te autentcaton of bot orgnator and gratutous repler n one sgnature. In delegaton by warrant, te token s sgned wt te routng packet by te gratutous repler. Tus, te autentcaton of te gratutous repler as to be done by verfyng te conventonal sgnature, and te token wc s sgned usng conventonal sgnature sceme as to be verfed at te same cost. By usng transtve sgnatures, te orgnator and repler can be autentcated at te same tme. However, te use of te transtve sgnature sceme to enable gratutous reply autentcaton requres te cost of excangng publc key quadruples and computng te pat sgnatures between negborng nodes. It s consdered to be te major drawback of ts applcaton. VI. DISCUSSION AND IMPROVEMENT Te most outstandng pont of ts sceme s te effcency of one-tme sgnature generaton and verfcaton at eac op. Te same as HORS [10], eac tme, key generaton requres t evaluaton of one-way functon. Te secret key sze s lt bts, and te publc key sze s f l t bts, were f l s te lengt of te one-way functon output on nput of lengt l. Te sgnature s kl bts long. Tere s a tradeoff between t and k, snce te publc key sze wll be lnear n t, and te sgnature sze and verfcaton tme wll be lnear n k. Te securty of ts sceme stems from te system setup pase. In ts pase, a conventonal dgtal sgnature s used to guarantee te autentcty of te frst publc key component. Ts can be aceved troug usng publc key certfcate ssued by an offlne CA, namely, eac node must present a credtable dentty wen enterng te network. Te sgnature verfcaton and generaton may be neffcent, but snce ts message s broadcasted locally, t sould be practcal for eac node. Te update of publc key component s done along wt Hello message, wc s broadcasted perodcally. Snce te publc key component comes from a as can, te verfcaton s stragtforward te prevous publc key component s used to autentcate te new one. Te trustwortness of te new publc component depends totally on te securty of one-way as functon and te dgtal sgnature over ancor. Te ancor s used only once. It s replaced by newly comng publc key component after te frst Hello message s broadcasted. In ts way, nodes only need to do one as to autentcate new publc key component eac tme, wc s muc more effcent tan asng repeatedly back to ancor. Sender autentcaton s performed wt some compromse of effcency, usng conventonal DSS. Ts metod s muc more secure tan n SAODV, because n SAODV, te orgnator smply sgns on ts own publc key wtout te support of PKI. Attackers can easly forge RREQ and RREP packets durng transmsson. On te oter and, te effcency can be enanced to some degree troug te way tat eac node verfes conventonal dgtal sgnature after broadcastng routng packets. Terefore, tese wll be no verfcaton delay. Only bot conventonal sgnature and one-tme sgnature s fne, wll te routng table entry be updated. Double sgnng over te receved message does not provde more securty tan sngle sgnature from cryptograpc pont of vew. Neverteless, t provdes non-repudaton op-by-op, wc can be sued as an evdence for future ntruson detecton. Ts tougt comes from ARAN. It s consdered as mpractcal because te use of conventonal sgnature scemes. If tere s a tecnque to produce even sorter sgnature n more effcent manner, ts sceme can be extended to allow eac node to sgn on te receved messages. One sgnfcant drawback of one-tme sgnature s tat t can sgn only predefned number of messages, wc, n our sceme, s lmted by te sze of as can n. We generally consder t s not a serous problem, because nodes n MANET are moble devces wc are leavng and enterng te network frequently. Consequently, te as can wll be refresed. In ts sense, we can set n to a proper value accordng to network scale and average actve tme of nodes. VII. CONCLUSION Ts paper presented a novel sceme to mplement ARAN protocol based on AODV routng protocol. However, t s more effcent tan orgnal ARAN n sgnature generaton and verfcaton by usng HORS one-tme sgnature n place of conventonal dgtal sgnatures. We enable te protectons for gratutous route reply feature, under te concept of proxy sgnature s

7 JOURNAL OF NETWORKS, VOL. 1, NO. 1, MAY delegaton by warrant, as well as te route aggregaton usng transtve sgnature scemes. Te warrant ere s represented as a token, wc contans creator s dentty and publc key, and s sgned by te creator. Te securty of our sceme needs to be enforced by performng conventonal dgtal sgnature. Wt te elp of asymmetrc cryptograpy or publc key certfcate, we can ensure te autentcty of moble nodes and te secure dstrbuton of ntal keys. Hence, te securty of sub-sequental keys can be guaranteed by one way as can. [13] V. Varadarajan, P. Allen, and S. Black. An Analyss of te Proxy Problem n Dstrbuted Systems (pdf). In Proceedngs of te IEEE Symposum on Securty and Prvacy, 1991, pages , May [14] M. G. Zapata. Secure Ad oc On-Demand Dstance Vector (SAODV) Routng. IETF INTERNET DRAFT, MANET workng group, Nov draft-guerrero-manet-saodv- 02.txt. [15] K. Zang. Effcent Protocols for Sgnng Routng Messages (pdf). In Symposum on Network and Dstrbuted Systems Securty (NDSS '98), REFERENCES [1] A. Burg. Ad Hoc Network Specfc Attacks (pdf). In Semnar. Ad oc networkng: concepts, applcatons, and securty, Tecnsce Unverstät Müncen, Nov [2] Y. C. Hu, D. Jonson, and A. Perrg. SEAD: Secure Effcent Dstance Vector Routng for Moble Wreless Ad Hoc Networks (pdf). In 4 t IEEE Worksop on Moble Computng Systems and Applcatons (WMCSA 02), June 2002, pages 33, June [3] Y. C. Hu, A. Perrg, and D. Jonson. Aradne: A Secure On-demand Routng Protocol for Ad Hoc Networks (pdf). In Proc. M MOBICOM, Sep, [4] Y. C. Hu, A. Perrg and D. B. Jonson. Rusng Attacks and Defense n Wreless Ad Hoc Network Routng Protocols (pdf). In Proc. te 2003 M worksop on Wreless, Sep [5] D. B. Jonson, D. A. Maltz and Y. C. Hu. Te Dynamc Source Routng Protocol for Moble Ad Hoc Networks (DSR). IETF INTERNET DRAFT, MANET workng group, July draft-etf-manet-dsr0.txt. [6] S. Mcal and R. Rvest. Transtve Sgnature Scemes. In B. Prneel, edtor, Topcs n Cryptology CT-RSA 2002, volume 2271 of Lecture Notes n Computer Scence, pages Sprnger-Verlag, [7] L. Lamport. Constructng dgtal sgnature from a one way functon. Tecncal Report CSL-98, SRI Internatonal, October [8] C. E. Perkns, E. M. Royer, and S. R. Das. Ad Hoc On- Demand Dstance Vector (AODV) Routng. IETF INTERNET DRAFT, MANET workng group. Feb Draft-etf-manet-aodv3.txt. [9] A. Perrg. Te BBa one-tme sgnature and broadcast autentcaton protocol. In 8 t M Conference on Computer and Communcaton Securty, page M, November 508, [10] L. Reyzn and N. Reyzn. Better Tan BIBA: Sort One- Tme Sgnatures Wt Fast Sgnng and Verfyng. In Proc. 7 t Australasan Conference on Informaton Securty and Prvacy, LNCS 2384, Apr [11] K. Sanzgr, B. Dall, B. N. Levne, C. Selds, and E. M. Royer. A Secure Routng Protocol for Ad Hoc Networks (pdf). Tecncal Report: UM-CS , [12] S. Xu, Y. Mu, and W. Suslo. Secure AODV Routng Protocol Usng One-Tme Sgnature. In Proc. 1 st Internatonal Conference on Moble Ad-oc and Sensor Networks (MSN 2005). Sprnger, LNCS Dec Sd Xu was born Cengdu, Cna on November 1, Se receved B.S. (Bacelor of Engneerng) from te Unversty of Electronc Scence and Tecnology of Cna n 2001 and M. S. (Master of Informaton Systems) from te Unversty of Wollongong n Se s currently a canddate of Master of Computer Scence by researc n te Unversty of Wollongong. Y Mu receved s PD from te Australan Natonal Unversty n He was prevously wt te Scool of Computng and IT at te Unversty of Western Sydney as a lecturer and te Department of Computng at Macquare Unversty as a senor lecturer. He as been wt te Unversty of Wollongong snce Hs current researc nterests nclude network securty, electronc commerce securty, wreless securty, access control, computer securty, and cryptograpy. He also prevously worked at quantum cryptograpy, quantum computers, atomc computatons, and quantum optcs. Hs nterest n oter felds ncludes Internet computng, clent/server software and web tecnology. Y Mu as served n program commttees of a number of nternatonal conferences and edtoral boards of several nternatonal Journals. He s a senor member of te IEEE and a member of te IR. Wlly Suslo receved a P.D. n Computer Scence from Unversty of Wollongong, Australa. He s currently a assocate professor at te Scool of Informaton Tecnology and Computer Scence of te Unversty of Wollongong. He s te coordnator of Network Securty Researc Laboratory at te Unversty of Wollongong. Hs researc nterests nclude cryptograpy, nformaton securty, computer securty and network securty. Hs man contrbuton s n te area of dgtal sgnature scemes, n partcular fal-stop sgnature scemes and sort sgnature scemes. He as served as a program commttee member n a number of nternatonal conferences. He was te general car of ISP He s a member of te IR.

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS

AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Internatonal Journal of Network Securty & Its Applcatons (IJNSA), Vol.5, No.3, May 2013 AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Len Harn 1 and Changlu Ln 2 1 Department of Computer Scence

More information

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage Proactve Secret Sharng Or: How to Cope Wth Perpetual Leakage Paper by Amr Herzberg Stanslaw Jareck Hugo Krawczyk Mot Yung Presentaton by Davd Zage What s Secret Sharng Basc Idea ((2, 2)-threshold scheme):

More information

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna [email protected] Abstract.

More information

An RFID Distance Bounding Protocol

An RFID Distance Bounding Protocol An RFID Dstance Boundng Protocol Gerhard P. Hancke and Markus G. Kuhn May 22, 2006 An RFID Dstance Boundng Protocol p. 1 Dstance boundng Verfer d Prover Places an upper bound on physcal dstance Does not

More information

The Cox-Ross-Rubinstein Option Pricing Model

The Cox-Ross-Rubinstein Option Pricing Model Fnance 400 A. Penat - G. Pennacc Te Cox-Ross-Rubnsten Opton Prcng Model Te prevous notes sowed tat te absence o arbtrage restrcts te prce o an opton n terms o ts underlyng asset. However, te no-arbtrage

More information

A SECURE BILLING SERVICE WITH TWO-FACTOR USER AUTHENTICATION IN WIRELESS SENSOR NETWORKS. Received March 2010; revised July 2010

A SECURE BILLING SERVICE WITH TWO-FACTOR USER AUTHENTICATION IN WIRELESS SENSOR NETWORKS. Received March 2010; revised July 2010 Internatonal Journal of Innovatve Computng, Informaton and Control ICIC Internatonal c 2011 ISSN 1349-4198 Volume 7, Number 8, August 2011 pp. 4821 4831 A SECURE BILLING SERVICE WITH TWO-FACTOR USER AUTHENTICATION

More information

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng

More information

Certificate Revocation using Fine Grained Certificate Space Partitioning

Certificate Revocation using Fine Grained Certificate Space Partitioning Certfcate Revocaton usng Fne Graned Certfcate Space Parttonng Vpul Goyal Department of Computer Scence Unversty of Calforna, Los Angeles [email protected] Abstract A new certfcate revocaton system s presented.

More information

Reinforcement Learning for Quality of Service in Mobile Ad Hoc Network (MANET)

Reinforcement Learning for Quality of Service in Mobile Ad Hoc Network (MANET) Renforcement Learnng for Qualty of Servce n Moble Ad Hoc Network (MANET) *T.KUMANAN AND **K.DURAISWAMY *Meenaksh College of Engneerng West K.K Nagar, Cheena-78 **Dean/academc,K.S.R College of Technology,Truchengode

More information

A Novel Adaptive Load Balancing Routing Algorithm in Ad hoc Networks

A Novel Adaptive Load Balancing Routing Algorithm in Ad hoc Networks Journal of Convergence Informaton Technology A Novel Adaptve Load Balancng Routng Algorthm n Ad hoc Networks Zhu Bn, Zeng Xao-png, Xong Xan-sheng, Chen Qan, Fan Wen-yan, We Geng College of Communcaton

More information

A Performance Analysis of View Maintenance Techniques for Data Warehouses

A Performance Analysis of View Maintenance Techniques for Data Warehouses A Performance Analyss of Vew Mantenance Technques for Data Warehouses Xng Wang Dell Computer Corporaton Round Roc, Texas Le Gruenwald The nversty of Olahoma School of Computer Scence orman, OK 739 Guangtao

More information

Secure Network Coding Over the Integers

Secure Network Coding Over the Integers Secure Network Codng Over the Integers Rosaro Gennaro Jonathan Katz Hugo Krawczyk Tal Rabn Abstract Network codng has receved sgnfcant attenton n the networkng communty for ts potental to ncrease throughput

More information

A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers

A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers INFORMATICA, 2000, Vol. 11, No. 2, 137 144 137 2000 Insttute of Mathematcs and Informatcs, Vlnus A Secure Nonrepudable Threshold Proxy Sgnature Scheme wth Known Sgners Mn-Shang HWANG, Iuon-Chang LIN, Erc

More information

Watermark-based Provable Data Possession for Multimedia File in Cloud Storage

Watermark-based Provable Data Possession for Multimedia File in Cloud Storage Vol.48 (CIA 014), pp.103-107 http://dx.do.org/10.1457/astl.014.48.18 Watermar-based Provable Data Possesson for Multmeda Fle n Cloud Storage Yongjun Ren 1,, Jang Xu 1,, Jn Wang 1,, Lmng Fang 3, Jeong-U

More information

RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo.

RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo. ICSV4 Carns Australa 9- July, 007 RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL Yaoq FENG, Hanpng QIU Dynamc Test Laboratory, BISEE Chna Academy of Space Technology (CAST) [email protected] Abstract

More information

A Cryptographic Key Assignment Scheme for Access Control in Poset Ordered Hierarchies with Enhanced Security

A Cryptographic Key Assignment Scheme for Access Control in Poset Ordered Hierarchies with Enhanced Security Internatonal Journal of Network Securty, Vol.7, No., PP.3 34, Sept. 8 3 A ryptographc Key Assgnment Scheme for Access ontrol n Poset Ordered Herarches wth Enhanced Securty Debass Gr and P. D. Srvastava

More information

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng

More information

Ad-Hoc Games and Packet Forwardng Networks

Ad-Hoc Games and Packet Forwardng Networks On Desgnng Incentve-Compatble Routng and Forwardng Protocols n Wreless Ad-Hoc Networks An Integrated Approach Usng Game Theoretcal and Cryptographc Technques Sheng Zhong L (Erran) L Yanbn Grace Lu Yang

More information

Recurrence. 1 Definitions and main statements

Recurrence. 1 Definitions and main statements Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.

More information

PKIS: practical keyword index search on cloud datacenter

PKIS: practical keyword index search on cloud datacenter Park et al. EURASIP Journal on Wreless Communcatons and Networkng 20, 20:64 http://jwcn.euraspjournals.com/content/20//64 RESEARCH Open Access PKIS: practcal keyword ndex search on cloud datacenter Hyun-A

More information

An Interest-Oriented Network Evolution Mechanism for Online Communities

An Interest-Oriented Network Evolution Mechanism for Online Communities An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne

More information

"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *

Research Note APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES * Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC

More information

The OC Curve of Attribute Acceptance Plans

The OC Curve of Attribute Acceptance Plans The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4

More information

What is Candidate Sampling

What is Candidate Sampling What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble

More information

E-learning Vendor Management Checklist

E-learning Vendor Management Checklist E-learning Vendor Management Checklist June 2008 Permission is granted to print freely, unmodified, this document from www.doingelearning.com or to copy it in electronic form. If linked to from the net

More information

Luby s Alg. for Maximal Independent Sets using Pairwise Independence

Luby s Alg. for Maximal Independent Sets using Pairwise Independence Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika.

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika. VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ). REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or

More information

Yixin Jiang and Chuang Lin. Minghui Shi and Xuemin Sherman Shen*

Yixin Jiang and Chuang Lin. Minghui Shi and Xuemin Sherman Shen* 198 Int J Securty Networks Vol 1 Nos 3/4 2006 A self-encrypton authentcaton protocol for teleconference servces Yxn Jang huang Ln Departent of oputer Scence Technology Tsnghua Unversty Beng hna E-al: yxang@csnet1cstsnghuaeducn

More information

Trivial lump sum R5.0

Trivial lump sum R5.0 Optons form Once you have flled n ths form, please return t wth your orgnal brth certfcate to: Premer PO Box 2067 Croydon CR90 9ND. Fll n ths form usng BLOCK CAPITALS and black nk. Mark all answers wth

More information

Canon NTSC Help Desk Documentation

Canon NTSC Help Desk Documentation Canon NTSC Help Desk Documentaton READ THIS BEFORE PROCEEDING Before revewng ths documentaton, Canon Busness Solutons, Inc. ( CBS ) hereby refers you, the customer or customer s representatve or agent

More information

Provably Secure Single Sign-on Scheme in Distributed Systems and Networks

Provably Secure Single Sign-on Scheme in Distributed Systems and Networks 0 IEEE th Internatonal Conference on Trust, Securty and Prvacy n Computng and Communcatons Provably Secure Sngle Sgn-on Scheme n Dstrbuted Systems and Networks Jangshan Yu, Guln Wang, and Y Mu Center for

More information

Project Networks With Mixed-Time Constraints

Project Networks With Mixed-Time Constraints Project Networs Wth Mxed-Tme Constrants L Caccetta and B Wattananon Western Australan Centre of Excellence n Industral Optmsaton (WACEIO) Curtn Unversty of Technology GPO Box U1987 Perth Western Australa

More information

DISCLOSURES I. ELECTRONIC FUND TRANSFER DISCLOSURE (REGULATION E)... 2 ELECTRONIC DISCLOSURE AND ELECTRONIC SIGNATURE CONSENT... 7

DISCLOSURES I. ELECTRONIC FUND TRANSFER DISCLOSURE (REGULATION E)... 2 ELECTRONIC DISCLOSURE AND ELECTRONIC SIGNATURE CONSENT... 7 DISCLOSURES The Dsclosures set forth below may affect the accounts you have selected wth Bank Leum USA. Read these dsclosures carefully as they descrbe your rghts and oblgatons for the accounts and/or

More information

A DISTRIBUTED REPUTATION MANAGEMENT SCHEME FOR MOBILE AGENT- BASED APPLICATIONS

A DISTRIBUTED REPUTATION MANAGEMENT SCHEME FOR MOBILE AGENT- BASED APPLICATIONS Bamasak & Zhang: A Dstrbuted Reputaton Management Scheme for Moble Agent-Based Applcatons A DISTRIBUTED REPUTATION MANAGEMENT SCHEME FOR MOBILE AGENT- BASED APPLICATIONS Omama Bamasak School of Computer

More information

On the Optimal Control of a Cascade of Hydro-Electric Power Stations

On the Optimal Control of a Cascade of Hydro-Electric Power Stations On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;

More information

An Alternative Way to Measure Private Equity Performance

An Alternative Way to Measure Private Equity Performance An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate

More information

Calculating the high frequency transmission line parameters of power cables

Calculating the high frequency transmission line parameters of power cables < ' Calculatng the hgh frequency transmsson lne parameters of power cables Authors: Dr. John Dcknson, Laboratory Servces Manager, N 0 RW E B Communcatons Mr. Peter J. Ncholson, Project Assgnment Manager,

More information

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS 21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS

More information

A role based access in a hierarchical sensor network architecture to provide multilevel security

A role based access in a hierarchical sensor network architecture to provide multilevel security 1 A role based access n a herarchcal sensor network archtecture to provde multlevel securty Bswajt Panja a Sanjay Kumar Madra b and Bharat Bhargava c a Department of Computer Scenc Morehead State Unversty

More information

RequIn, a tool for fast web traffic inference

RequIn, a tool for fast web traffic inference RequIn, a tool for fast web traffc nference Olver aul, Jean Etenne Kba GET/INT, LOR Department 9 rue Charles Fourer 90 Evry, France [email protected], [email protected] Abstract As networked

More information

Relay Secrecy in Wireless Networks with Eavesdropper

Relay Secrecy in Wireless Networks with Eavesdropper Relay Secrecy n Wreless Networks wth Eavesdropper Parvathnathan Venktasubramanam, Tng He and Lang Tong School of Electrcal and Computer Engneerng Cornell Unversty, Ithaca, NY 14853 Emal : {pv45, th255,

More information

Conversion between the vector and raster data structures using Fuzzy Geographical Entities

Conversion between the vector and raster data structures using Fuzzy Geographical Entities Converson between the vector and raster data structures usng Fuzzy Geographcal Enttes Cdála Fonte Department of Mathematcs Faculty of Scences and Technology Unversty of Combra, Apartado 38, 3 454 Combra,

More information

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture A Desgn Method of Hgh-avalablty and Low-optcal-loss Optcal Aggregaton Network Archtecture Takehro Sato, Kuntaka Ashzawa, Kazumasa Tokuhash, Dasuke Ish, Satoru Okamoto and Naoak Yamanaka Dept. of Informaton

More information

Conferencing protocols and Petri net analysis

Conferencing protocols and Petri net analysis Conferencng protocols and Petr net analyss E. ANTONIDAKIS Department of Electroncs, Technologcal Educatonal Insttute of Crete, GREECE [email protected] Abstract: Durng a computer conference, users desre

More information

Multiple-Period Attribution: Residuals and Compounding

Multiple-Period Attribution: Residuals and Compounding Multple-Perod Attrbuton: Resduals and Compoundng Our revewer gave these authors full marks for dealng wth an ssue that performance measurers and vendors often regard as propretary nformaton. In 1994, Dens

More information

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK Sample Stablty Protocol Background The Cholesterol Reference Method Laboratory Network (CRMLN) developed certfcaton protocols for total cholesterol, HDL

More information

Traffic State Estimation in the Traffic Management Center of Berlin

Traffic State Estimation in the Traffic Management Center of Berlin Traffc State Estmaton n the Traffc Management Center of Berln Authors: Peter Vortsch, PTV AG, Stumpfstrasse, D-763 Karlsruhe, Germany phone ++49/72/965/35, emal [email protected] Peter Möhl, PTV AG,

More information

JCS&T Vol. 11 No. 1 April 2011

JCS&T Vol. 11 No. 1 April 2011 Reversble Data Hdng Explotng Varance n Wavelet Coeffcents Xu-Ren Luo Department of Electrcal and Electronc Engneerng, Cung Ceng Insttute of Tecnology, Natonal Defense Unversty, Tas, Taoyuan 33509, Tawan,

More information

MATHCAD'S PROGRAM FUNCTION and APPLICATION IN TEACHING OF MATH

MATHCAD'S PROGRAM FUNCTION and APPLICATION IN TEACHING OF MATH . About Matcad MATHCAD'S PROGRAM FUNCTION and APPLICATION IN TEACHING OF MATH DE TING WU Depart of Mat Moreouse College Atlanta, GA.33, USA [email protected]. Introducton Matcad s one of popular computer

More information

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application Internatonal Journal of mart Grd and lean Energy Performance Analyss of Energy onsumpton of martphone Runnng Moble Hotspot Applcaton Yun on hung a chool of Electronc Engneerng, oongsl Unversty, 511 angdo-dong,

More information

IT09 - Identity Management Policy

IT09 - Identity Management Policy IT09 - Identty Management Polcy Introducton 1 The Unersty needs to manage dentty accounts for all users of the Unersty s electronc systems and ensure that users hae an approprate leel of access to these

More information

A Programming Model for the Cloud Platform

A Programming Model for the Cloud Platform Internatonal Journal of Advanced Scence and Technology A Programmng Model for the Cloud Platform Xaodong Lu School of Computer Engneerng and Scence Shangha Unversty, Shangha 200072, Chna [email protected]

More information

Scalable and Secure Architecture for Digital Content Distribution

Scalable and Secure Architecture for Digital Content Distribution Valer Bocan Scalable and Secure Archtecture for Dgtal Content Dstrbuton Mha Fagadar-Cosma Department of Computer Scence and Engneerng Informaton Technology Department Poltehnca Unversty of Tmsoara Alcatel

More information

SUPPLIER FINANCING AND STOCK MANAGEMENT. A JOINT VIEW.

SUPPLIER FINANCING AND STOCK MANAGEMENT. A JOINT VIEW. SUPPLIER FINANCING AND STOCK MANAGEMENT. A JOINT VIEW. Lucía Isabel García Cebrán Departamento de Economía y Dreccón de Empresas Unversdad de Zaragoza Gran Vía, 2 50.005 Zaragoza (Span) Phone: 976-76-10-00

More information

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,

More information

A Crossplatform ECG Compression Library for Mobile HealthCare Services

A Crossplatform ECG Compression Library for Mobile HealthCare Services A Crossplatform ECG Compresson Lbrary for Moble HealthCare Servces Alexander Borodn, Yulya Zavyalova Department of Computer Scence Petrozavodsk State Unversty Petrozavodsk, Russa {aborod, yzavyalo}@cs.petrsu.ru

More information

Simple Interest Loans (Section 5.1) :

Simple Interest Loans (Section 5.1) : Chapter 5 Fnance The frst part of ths revew wll explan the dfferent nterest and nvestment equatons you learned n secton 5.1 through 5.4 of your textbook and go through several examples. The second part

More information

FREQUENCY OF OCCURRENCE OF CERTAIN CHEMICAL CLASSES OF GSR FROM VARIOUS AMMUNITION TYPES

FREQUENCY OF OCCURRENCE OF CERTAIN CHEMICAL CLASSES OF GSR FROM VARIOUS AMMUNITION TYPES FREQUENCY OF OCCURRENCE OF CERTAIN CHEMICAL CLASSES OF GSR FROM VARIOUS AMMUNITION TYPES Zuzanna BRO EK-MUCHA, Grzegorz ZADORA, 2 Insttute of Forensc Research, Cracow, Poland 2 Faculty of Chemstry, Jagellonan

More information

Identity-Based Encryption Gone Wild

Identity-Based Encryption Gone Wild An extended abstract of ths paper appeared n Mchele Bugles, Bart Preneel, Vladmro Sassone, and Ingo Wegener, edtors, 33rd Internatonal Colloquum on Automata, Languages and Programmng ICALP 2006, volume

More information

sscada: securing SCADA infrastructure communications

sscada: securing SCADA infrastructure communications Int. J. Communcaton Networks and Dstrbuted Systems, Vol. 6, No. 1, 2011 59 sscada: securng SCADA nfrastructure communcatons Yongge Wang Department of SIS, UNC Charlotte, 9201 Unversty Cty Blvd, Charlotte,

More information

Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing

Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing Effcent Bandwdth Management n Broadband Wreless Access Systems Usng CAC-based Dynamc Prcng Bader Al-Manthar, Ndal Nasser 2, Najah Abu Al 3, Hossam Hassanen Telecommuncatons Research Laboratory School of

More information

Practical PIR for Electronic Commerce

Practical PIR for Electronic Commerce Practcal PIR for Electronc Commerce Ryan Henry Cherton School of Computer Scence Unversty of Waterloo Waterloo ON Canada N2L 3G1 [email protected] Fem Olumofn Cherton School of Computer Scence Unversty

More information

Negative Selection and Niching by an Artificial Immune System for Network Intrusion Detection

Negative Selection and Niching by an Artificial Immune System for Network Intrusion Detection Negatve Selecton and Nchng by an Artfcal Immune System for Network Intruson Detecton Jungwon Km and Peter Bentley Department of omputer Scence, Unversty ollege London, Gower Street, London, W1E 6BT, U.K.

More information

How To Get A Tax Refund On A Retirement Account

How To Get A Tax Refund On A Retirement Account CED0105200808 Amerprse Fnancal Servces, Inc. 70400 Amerprse Fnancal Center Mnneapols, MN 55474 Incomng Account Transfer/Exchange/ Drect Rollover (Qualfed Plans Only) for Amerprse certfcates, Columba mutual

More information

Schedulability Analysis under Graph Routing in WirelessHART Networks

Schedulability Analysis under Graph Routing in WirelessHART Networks Scedulability Analysis under Grap Routing in WirelessHART Networks Abusayeed Saifulla, Dolvara Gunatilaka, Paras Tiwari, Mo Sa, Cenyang Lu, Bo Li Cengjie Wu, and Yixin Cen Department of Computer Science,

More information

A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression

A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression Novel Methodology of Workng Captal Management for Large Publc Constructons by Usng Fuzzy S-curve Regresson Cheng-Wu Chen, Morrs H. L. Wang and Tng-Ya Hseh Department of Cvl Engneerng, Natonal Central Unversty,

More information

Fast Variants of RSA

Fast Variants of RSA Fast Varants of RSA Dan Boneh [email protected] Hovav Shacham [email protected] Abstract We survey three varants of RSA desgned to speed up RSA decrypton. These varants are backwards compatble n

More information

An Evaluation of the Extended Logistic, Simple Logistic, and Gompertz Models for Forecasting Short Lifecycle Products and Services

An Evaluation of the Extended Logistic, Simple Logistic, and Gompertz Models for Forecasting Short Lifecycle Products and Services An Evaluaton of the Extended Logstc, Smple Logstc, and Gompertz Models for Forecastng Short Lfecycle Products and Servces Charles V. Trappey a,1, Hsn-yng Wu b a Professor (Management Scence), Natonal Chao

More information

On the Use of Bayesian Networks to Analyze Survey Data

On the Use of Bayesian Networks to Analyze Survey Data On te Use of Bayesan Networks to Analyze Survey Data P. Sebastan 1 (1 and. Ramon ( (1 Department of atematcs and Statstcs, Unversty of assacusetts. ( Cldren's Hosptal Informatcs Program, Harvard Unversty

More information

Figure 1. Time-based operation of AIDP.

Figure 1. Time-based operation of AIDP. Adaptve Intruson Detecton & Preventon of Denal of Servce attacs n MANETs Adnan Nadeem Centre for Communcaton Systems Research Unversty of Surrey, UK [email protected] ABSTRACT Moble ad-hoc networs (MANETs)

More information

Analysis of Energy-Conserving Access Protocols for Wireless Identification Networks

Analysis of Energy-Conserving Access Protocols for Wireless Identification Networks From the Proceedngs of Internatonal Conference on Telecommuncaton Systems (ITC-97), March 2-23, 1997. 1 Analyss of Energy-Conservng Access Protocols for Wreless Identfcaton etworks Imrch Chlamtac a, Chara

More information

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel

More information

Effective Network Defense Strategies against Malicious Attacks with Various Defense Mechanisms under Quality of Service Constraints

Effective Network Defense Strategies against Malicious Attacks with Various Defense Mechanisms under Quality of Service Constraints Effectve Network Defense Strateges aganst Malcous Attacks wth Varous Defense Mechansms under Qualty of Servce Constrants Frank Yeong-Sung Ln Department of Informaton Natonal Tawan Unversty Tape, Tawan,

More information

Data Mining from the Information Systems: Performance Indicators at Masaryk University in Brno

Data Mining from the Information Systems: Performance Indicators at Masaryk University in Brno Data Mnng from the Informaton Systems: Performance Indcators at Masaryk Unversty n Brno Mkuláš Bek EUA Workshop Strasbourg, 1-2 December 2006 1 Locaton of Brno Brno EUA Workshop Strasbourg, 1-2 December

More information

Cooperative Load Balancing in IEEE 802.11 Networks with Cell Breathing

Cooperative Load Balancing in IEEE 802.11 Networks with Cell Breathing Cooperatve Load Balancng n IEEE 82.11 Networks wth Cell Breathng Eduard Garca Rafael Vdal Josep Paradells Wreless Networks Group - Techncal Unversty of Catalona (UPC) {eduardg, rvdal, teljpa}@entel.upc.edu;

More information

Secure and Efficient Proof of Storage with Deduplication

Secure and Efficient Proof of Storage with Deduplication Secure and Effcent Proof of Storage wth Deduplcaton Qng Zheng Department of Computer Scence Unversty of Texas at San Antono [email protected] Shouhua Xu Department of Computer Scence Unversty of Texas

More information

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT Toshhko Oda (1), Kochro Iwaoka (2) (1), (2) Infrastructure Systems Busness Unt, Panasonc System Networks Co., Ltd. Saedo-cho

More information

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts Power-of-wo Polces for Sngle- Warehouse Mult-Retaler Inventory Systems wth Order Frequency Dscounts José A. Ventura Pennsylvana State Unversty (USA) Yale. Herer echnon Israel Insttute of echnology (Israel)

More information

Research Article QoS and Energy Aware Cooperative Routing Protocol for Wildfire Monitoring Wireless Sensor Networks

Research Article QoS and Energy Aware Cooperative Routing Protocol for Wildfire Monitoring Wireless Sensor Networks The Scentfc World Journal Volume 3, Artcle ID 43796, pages http://dx.do.org/.55/3/43796 Research Artcle QoS and Energy Aware Cooperatve Routng Protocol for Wldfre Montorng Wreless Sensor Networks Mohamed

More information

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP)

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP) 6.3 / -- Communcaton Networks II (Görg) SS20 -- www.comnets.un-bremen.de Communcaton Networks II Contents. Fundamentals of probablty theory 2. Emergence of communcaton traffc 3. Stochastc & Markovan Processes

More information

DEFINING %COMPLETE IN MICROSOFT PROJECT

DEFINING %COMPLETE IN MICROSOFT PROJECT CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,

More information

= (2) T a,2 a,2. T a,3 a,3. T a,1 a,1

= (2) T a,2 a,2. T a,3 a,3. T a,1 a,1 A set of tools for buldng PostgreSQL dstrbuted databases n bomedcal envronment. M. Cavaller, R. Prudentno, U. Pozzol, G. Ren IRCCS E. Medea, Bosso Parn (LC), Italy. E-mal: [email protected] Abstract PostgreSQL

More information

An Adaptive and Distributed Clustering Scheme for Wireless Sensor Networks

An Adaptive and Distributed Clustering Scheme for Wireless Sensor Networks 2007 Internatonal Conference on Convergence Informaton Technology An Adaptve and Dstrbuted Clusterng Scheme for Wreless Sensor Networs Xnguo Wang, Xnmng Zhang, Guolang Chen, Shuang Tan Department of Computer

More information

Energy Conserving Routing in Wireless Ad-hoc Networks

Energy Conserving Routing in Wireless Ad-hoc Networks Energy Conservng Routng n Wreless Ad-hoc Networks Jae-Hwan Chang and Leandros Tassulas Department of Electrcal and Computer Engneerng & Insttute for Systems Research Unversty of Maryland at College ark

More information

Secure Walking GPS: A Secure Localization and Key Distribution Scheme for Wireless Sensor Networks

Secure Walking GPS: A Secure Localization and Key Distribution Scheme for Wireless Sensor Networks Secure Walkng GPS: A Secure Localzaton and Key Dstrbuton Scheme for Wreless Sensor Networks Q M, John A. Stankovc, Radu Stoleru 2 Department of Computer Scence, Unversty of Vrgna, USA 2 Department of Computer

More information