An RFID Distance Bounding Protocol
|
|
|
- Valerie Arnold
- 10 years ago
- Views:
Transcription
1 An RFID Dstance Boundng Protocol Gerhard P. Hancke and Markus G. Kuhn May 22, 2006 An RFID Dstance Boundng Protocol p. 1
2 Dstance boundng Verfer d Prover Places an upper bound on physcal dstance Does not provde absolute locaton Operates on physcal characterstcs of the communcaton medum. Supplements exstng securty mechansms An RFID Dstance Boundng Protocol p. 2
3 RFID devces RFID Reader Power RFID Token Varous applcatons Clock Passve devces wth low resources Data Lmted range Used to lnk an tem or person to a locaton An RFID Dstance Boundng Protocol p. 3
4 Relay attack RFID Token Proxy Token Data Proxy Reader Smple, well known attack Crcumvents applcaton layer securty protocols RFID Reader An RFID Dstance Boundng Protocol p. 4
5 Relay attack demonstraton Proxy Token Proxy Reader A/B test card crcut Sgnal processng wth dscrete components Duplex RF lnk Commercal reader module Reprogrammed wth our frmware Prce $ 100 An RFID Dstance Boundng Protocol p. 5
6 Relay attack detecton Delay Could be reduced wth complex hardware Cannot be less than 3 ns/m Physcal layer Hgh-resoluton tmng Applcaton layer Tmng dfference between an actual token (top) and a Proxy token(bottom) response to a reader s REQA command. Tmng nformaton lost An RFID Dstance Boundng Protocol p. 6
7 Our Protocol Goals Suted to RFID envronment Verfer handles demandng processng functons Prover performs smple functons Provde same level of securty as other dstance boundng protocols Should not be worse because t has hardware constrants Implementaton Suggest practcal deas on how to mplement our protocol Protocol should supplement current RFID standards, not suggest wholesale changes An RFID Dstance Boundng Protocol p. 7
8 Protocol assumptons Securty target Places an upper bound on the dstance between Verfer and Prover Does not provde non-repudaton of locaton to a thrd party The Prover does not collude wth an attacker Crypto prmtves Shared secret key, K Shared pseudorandom functon, h Nonces N V,N P are of suffcent length and wll not be repeated An RFID Dstance Boundng Protocol p. 8
9 Protocol assumptons (2) Tme base Verfer s computatonally strong Perform accurate tmng operatons Prover s computatonally weak Cannot determne accurate tmng nformaton Uses external clock sgnal (receved carrer) Prover can detect large devatons n clock frequency Communcaton channels Low bandwdth error corrected channel Hgh bandwdth rapd bt exchange channel An RFID Dstance Boundng Protocol p. 9
10 Protocol descrpton Verfer (RFID reader) Generate nonce N V N V Prover (RFID token) An RFID Dstance Boundng Protocol p. 10
11 Protocol descrpton Verfer (RFID reader) Generate nonce N V Generate random bts C 1,...,C n C = N V Prover (RFID token) Calculate h(k,n V ) = R Splt R = R 0 R R R 1 An RFID Dstance Boundng Protocol p. 10
12 Protocol descrpton Verfer (RFID reader) N V Prover (RFID token) Generate nonce N V Generate random bts C 1,...,C n C = C 1 = 0 R C = 1 R C 1 1 = 1 Calculate h(k,n V ) = R Splt R = R 0 R R R An RFID Dstance Boundng Protocol p. 10
13 Protocol descrpton Verfer (RFID reader) N V Prover (RFID token) Generate nonce N V Generate random bts C 1,...,C n C = R C = 11 C 2 = 1 R C 2 2 = 1 Calculate h(k,n V ) = R Splt R = R 0 R R R An RFID Dstance Boundng Protocol p. 10
14 Protocol descrpton Verfer (RFID reader) N V Prover (RFID token) Generate nonce N V Generate random bts C 1,...,C n C = R C = 110 C 3 = 0 R C 3 3 = 0 Calculate h(k,n V ) = R Splt R = R 0 R R R An RFID Dstance Boundng Protocol p. 10
15 Protocol descrpton Verfer (RFID reader) N V Prover (RFID token) Generate nonce N V Generate random bts C 1,...,C n C = R C = 1101 C 4 = 0 R C 4 4 = 1 Calculate h(k,n V ) = R Splt R = R 0 R R R An RFID Dstance Boundng Protocol p. 10
16 Protocol descrpton Verfer (RFID reader) Generate nonce N V Generate random bts C 1,...,C n C = R C = N V C 5 = 1 R C 5 5 = 0 Prover (RFID token) Calculate h(k,n V ) = R Splt R = R 0 R R R An RFID Dstance Boundng Protocol p. 10
17 Protocol descrpton Verfer (RFID reader) N V Prover (RFID token) Generate nonce N V Generate random bts C 1,...,C n C = R C = C 6 = 1 R C 6 6 = 1 Calculate h(k,n V ) = R Splt R = R 0 R R R An RFID Dstance Boundng Protocol p. 10
18 Protocol descrpton Verfer (RFID reader) N V Prover (RFID token) Generate nonce N V Generate random bts C 1,...,C n C = C 7 = 0 R C = R C 7 7 = 1 Calculate h(k,n V ) = R Splt R = R 0 R R R An RFID Dstance Boundng Protocol p. 10
19 Protocol descrpton Verfer (RFID reader) Generate nonce N V Generate random bts C 1,...,C n C = R C = N V C 8 = 0 R C 8 8 = 1 Prover (RFID token) Calculate h(k,n V ) = R Splt R = R 0 R R R 1 An RFID Dstance Boundng Protocol p. 10
20 Protocol descrpton Verfer Attacker N V C = C Expected R C Receved R C R C R R 1 Verfer Attacker 1 2 chance of guessng a response bt correctly An RFID Dstance Boundng Protocol p. 10
21 Protocol descrpton Verfer Malcous Prover N V C = Expected R C Receved R C R C C R R 1 Verfer Malcous Prover 1 2 chance of guessng a response bt correctly An RFID Dstance Boundng Protocol p. 10
22 Protocol descrpton Verfer C = Expected R C Receved R C N V C R C Attacker R R 1 Verfer Attacker Prover N V A C R A C Prover h(k,n V ) = R R R chance of guessng a response bt correctly An RFID Dstance Boundng Protocol p. 10
23 Protocol descrpton Verfer C = Expected R C Receved R C N V C R C Overclockng attack Attacker R R R 1 N V A C R A C N V A C R A C Prover h(k,n V ) = R R R 1 h(k,n V ) = R R R R 1 Prevented n hardware e.g. Bandpass flter An RFID Dstance Boundng Protocol p. 10
24 Protocol descrpton Verfer (RFID reader) N V Prover (RFID token) Generate nonce N V Generate random bts C 1,...,C n N P C = C 1 = 0 R C = 1 R C 1 1 = 1 Overclockng attack Alternatve to hardware solutons Generate nonce N P Calculate h(k,n V,N P ) = R Splt R = R 0 R R R An RFID Dstance Boundng Protocol p. 10
25 Nose Bt errors wll probably occur on the rapd exchange channel Accept f at least k bts out of n are correct False accept: p FA = n =k ( ) n ( ) 3 4 ( ) 1 n 4 False reject: p FR = k 1 =0 ( ) n (1 ǫ) ǫ n where ǫ s the bt-error probablty. An RFID Dstance Boundng Protocol p. 11
26 Nose (2) Example of parameter tradeoffs n the presence of nose EER 200 k ǫ =0.05 ǫ =0.10 ǫ = n An RFID Dstance Boundng Protocol p. 12
27 Related work t m = 2 t p + t d t m t p t d d v p d = v p tm t d 2 = round trp tme = one-way propagaton tme = processng delay = dstance = sgnal propagaton speed Dstance Boundng Protocols Beth and Desmedt (1991) Brands and Chaum (1993) An RFID Dstance Boundng Protocol p. 13
28 Brands and Chaum Verfer (RFID reader) Generate random bts C 1,...,C n commt(m) Prover (RFID token) Generate random bts m 1,...,m n Verfy commt Verfy sgn(m ) C R open commt sgn(m ) R = C m message M = C R... C n R n Tme round trp of sngle bt exchange Processng wth varable delay done beforehand Mnmal processng delay durng bt exchange An RFID Dstance Boundng Protocol p. 14
29 Brands and Chaum Verfer (RFID reader) Generate random bts C 1,...,C n commt(m) Prover (RFID token) Generate random bts m 1,...,m n Verfy commt Verfy sgn(m ) C R open commt sgn(m ),C,R R = C m message M = C R... C n R n Addtonal commt and sgn operatons Addtonal bts on slow channel In presence of nose C and R need to be transmtted An RFID Dstance Boundng Protocol p. 14
30 Performance vs Brands and Chaum For EER = 10 4 and ǫ = 0.1 Assume bt exchange rate = f carrer /4 Standard Tme (B and C) Tme (Our protocol) n = 70 n = fast ms ms 26.4 kbp/s, MHz long ms ms 6.62 kbp/s, MHz A/B ms ms 106 kbp/s, MHz An RFID Dstance Boundng Protocol p. 15
31 Performance vs Brands and Chaum (2) For EER = and ǫ = 0.05 Assume bt exchange rate = f carrer /4 Standard Tme (B and C) Tme (Our protocol) n = 125 n = fast ms ms 26.4 kbp/s, MHz long ms ms 6.62 kbp/s, MHz A/B ms ms 106 kbp/s, MHz An RFID Dstance Boundng Protocol p. 16
32 Postonng technology Postonng Technology used today Rado Frequency Secure but complex Ultrasound Appear closer by relayng data wth faster RF lnk Receved Sgnal Strength Amplfed sgnal appears closer An RFID Dstance Boundng Protocol p. 17
33 Resoluton Estmate r B c, where B s the channel bandwdth RFID communcaton nadequate e.g. for ISO at 106 kbp/s, r 3 km Ultra Wdeband Pulses Hgher bandwdth equals better resoluton RFID mplementaton ssues Error free operaton requres hgh resources e.g. synchronzaton, bt placement Crude mplementaton possble but would allow bt errors Suffcent for bt exchange channel Not to be used for normal communcaton An RFID Dstance Boundng Protocol p. 18
34 Proposed bt exchange channel Carrer wave Use carrer for loose synchronzaton e.g. Zero crossng An RFID Dstance Boundng Protocol p. 19
35 Proposed bt exchange channel Carrer wave Challenge pulse C t t t r t p Reader (Verfer) adjusts t t to match samplng delay t r n the token (Prover) An RFID Dstance Boundng Protocol p. 19
36 Proposed bt exchange channel Carrer wave Challenge pulse C Response pulse R C t t t r t p t d t d s a predctable hardware delay An RFID Dstance Boundng Protocol p. 19
37 Proposed bt exchange channel Carrer wave Challenge pulse C Response pulse R C t t t r t p t s t d t p d = c (t s t t t d )/2 An RFID Dstance Boundng Protocol p. 19
38 Concluson Few more bt exchanges to acheve same cryptographc securty Chance of attacker guessng correct response 3 4 vs 1 2 Faster operaton Extra bts transmtted on faster bt exchange channel Much less data transmtted on slow error corrected channel Practcal mplementaton suted for RFID Low power and processng requrements for Prover Tmng-senstve measurements and adjustments done by the Verfer Faster completon of protocol suted for RFID envronment An RFID Dstance Boundng Protocol p. 20
39 Future work Practcal mplementaton Pseudorandom functons suted for RFID devce Rapd bt exchange channel UWB antennas for card form factor Mutual dstance boundng protocol For applcatons where llegtmate readng attempts are more common e.g e-passports An RFID Dstance Boundng Protocol p. 21
Frequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters
Frequency Selectve IQ Phase and IQ Ampltude Imbalance Adjustments for OFDM Drect Converson ransmtters Edmund Coersmeer, Ernst Zelnsk Noka, Meesmannstrasse 103, 44807 Bochum, Germany [email protected],
Proactive Secret Sharing Or: How to Cope With Perpetual Leakage
Proactve Secret Sharng Or: How to Cope Wth Perpetual Leakage Paper by Amr Herzberg Stanslaw Jareck Hugo Krawczyk Mot Yung Presentaton by Davd Zage What s Secret Sharng Basc Idea ((2, 2)-threshold scheme):
APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT
APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT Toshhko Oda (1), Kochro Iwaoka (2) (1), (2) Infrastructure Systems Busness Unt, Panasonc System Networks Co., Ltd. Saedo-cho
INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS
21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS
Mathematical Framework for A Novel Database Replication Algorithm
I.J.Modern Educaton and Computer Scence, 203, 9, -0 Publshed Onlne October 203 n MECS (http://www.mecs-press.org/) DOI: 0.585/jmecs.203.09.0 Mathematcal Framework for A Novel Database Replcaton Algorthm
Secure Network Coding Over the Integers
Secure Network Codng Over the Integers Rosaro Gennaro Jonathan Katz Hugo Krawczyk Tal Rabn Abstract Network codng has receved sgnfcant attenton n the networkng communty for ts potental to ncrease throughput
VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika.
VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual
Secure Walking GPS: A Secure Localization and Key Distribution Scheme for Wireless Sensor Networks
Secure Walkng GPS: A Secure Localzaton and Key Dstrbuton Scheme for Wreless Sensor Networks Q M, John A. Stankovc, Radu Stoleru 2 Department of Computer Scence, Unversty of Vrgna, USA 2 Department of Computer
Traffic State Estimation in the Traffic Management Center of Berlin
Traffc State Estmaton n the Traffc Management Center of Berln Authors: Peter Vortsch, PTV AG, Stumpfstrasse, D-763 Karlsruhe, Germany phone ++49/72/965/35, emal [email protected] Peter Möhl, PTV AG,
sscada: securing SCADA infrastructure communications
Int. J. Communcaton Networks and Dstrbuted Systems, Vol. 6, No. 1, 2011 59 sscada: securng SCADA nfrastructure communcatons Yongge Wang Department of SIS, UNC Charlotte, 9201 Unversty Cty Blvd, Charlotte,
Implementation of Deutsch's Algorithm Using Mathcad
Implementaton of Deutsch's Algorthm Usng Mathcad Frank Roux The followng s a Mathcad mplementaton of Davd Deutsch's quantum computer prototype as presented on pages - n "Machnes, Logc and Quantum Physcs"
A Secure Password-Authenticated Key Agreement Using Smart Cards
A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,
Analysis of Energy-Conserving Access Protocols for Wireless Identification Networks
From the Proceedngs of Internatonal Conference on Telecommuncaton Systems (ITC-97), March 2-23, 1997. 1 Analyss of Energy-Conservng Access Protocols for Wreless Identfcaton etworks Imrch Chlamtac a, Chara
Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur
Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..
Quantization Effects in Digital Filters
Quantzaton Effects n Dgtal Flters Dstrbuton of Truncaton Errors In two's complement representaton an exact number would have nfntely many bts (n general). When we lmt the number of bts to some fnte value
What is Candidate Sampling
What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble
AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS
Internatonal Journal of Network Securty & Its Applcatons (IJNSA), Vol.5, No.3, May 2013 AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Len Harn 1 and Changlu Ln 2 1 Department of Computer Scence
PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign
PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng
VOLUME 5 BLAGOEVGRAD, BULGARIA SCIENTIFIC. Research ELECTRONIC ISSUE ISSN 1312-7535
VOLUME 5 007 BLAGOEVGRAD, BULGARIA SCIENTIFIC Research ISSN 131-7535 ELECTRONIC ISSUE IMPROVING FAIRNESS IN CDMA-HDR NETWORKS Valentn Hrstov Abstract. Improvng throughput and farness n Cellular Data Networks
benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).
REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or
A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture
A Desgn Method of Hgh-avalablty and Low-optcal-loss Optcal Aggregaton Network Archtecture Takehro Sato, Kuntaka Ashzawa, Kazumasa Tokuhash, Dasuke Ish, Satoru Okamoto and Naoak Yamanaka Dept. of Informaton
An ILP Formulation for Task Mapping and Scheduling on Multi-core Architectures
An ILP Formulaton for Task Mappng and Schedulng on Mult-core Archtectures Yng Y, We Han, Xn Zhao, Ahmet T. Erdogan and Tughrul Arslan Unversty of Ednburgh, The Kng's Buldngs, Mayfeld Road, Ednburgh, EH9
An Alternative Way to Measure Private Equity Performance
An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate
Applied Research Laboratory. Decision Theory and Receiver Design
Decson Theor and Recever Desgn Sgnal Detecton and Performance Estmaton Sgnal Processor Decde Sgnal s resent or Sgnal s not resent Nose Nose Sgnal? Problem: How should receved sgnals be rocessed n order
RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo.
ICSV4 Carns Australa 9- July, 007 RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL Yaoq FENG, Hanpng QIU Dynamc Test Laboratory, BISEE Chna Academy of Space Technology (CAST) [email protected] Abstract
Efficient On-Demand Data Service Delivery to High-Speed Trains in Cellular/Infostation Integrated Networks
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. XX, NO. XX, MONTH 2XX 1 Effcent On-Demand Data Servce Delvery to Hgh-Speed Trans n Cellular/Infostaton Integrated Networks Hao Lang, Student Member,
A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS
A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS Shanthy Menezes 1 and S. Venkatesan 2 1 Department of Computer Scence, Unversty of Texas at Dallas, Rchardson, TX, USA 1 [email protected]
A Parallel Architecture for Stateful Intrusion Detection in High Traffic Networks
A Parallel Archtecture for Stateful Intruson Detecton n Hgh Traffc Networks Mchele Colajann Mrco Marchett Dpartmento d Ingegnera dell Informazone Unversty of Modena {colajann, marchett.mrco}@unmore.t Abstract
Course outline. Financial Time Series Analysis. Overview. Data analysis. Predictive signal. Trading strategy
Fnancal Tme Seres Analyss Patrck McSharry [email protected] www.mcsharry.net Trnty Term 2014 Mathematcal Insttute Unversty of Oxford Course outlne 1. Data analyss, probablty, correlatons, vsualsaton
Daily O-D Matrix Estimation using Cellular Probe Data
Zhang, Qn, Dong and Ran Daly O-D Matrx Estmaton usng Cellular Probe Data 0 0 Y Zhang* Department of Cvl and Envronmental Engneerng, Unversty of Wsconsn-Madson, Madson, WI 0 Phone: -0-- E-mal: [email protected]
Conferencing protocols and Petri net analysis
Conferencng protocols and Petr net analyss E. ANTONIDAKIS Department of Electroncs, Technologcal Educatonal Insttute of Crete, GREECE [email protected] Abstract: Durng a computer conference, users desre
Abstract. 1. Introduction. 2. Measurement Methods
Wdeband ped Delay Lne Channel Model at 3.5GHz for Broadband Fxed Wreless Access system as functon of Subscrber Antenna heght n Suburban Envronment Cha Leong Hong, Ian J. Wassell, Georga E. Athanasadou,
On-Line Fault Detection in Wind Turbine Transmission System using Adaptive Filter and Robust Statistical Features
On-Lne Fault Detecton n Wnd Turbne Transmsson System usng Adaptve Flter and Robust Statstcal Features Ruoyu L Remote Dagnostcs Center SKF USA Inc. 3443 N. Sam Houston Pkwy., Houston TX 77086 Emal: [email protected]
Detecting Leaks from Waste Storage Ponds using Electrical Tomographic Methods
Detectng Leas from Waste Storage Ponds usng Electrcal Tomographc Methods Andrew Bnley #, Wllam Daly ## & Abelardo Ramrez ## # Lancaster Unversty, Lancaster, LA1 4YQ, UK ## Lawrence Lvermore Natonal Laboratory,
RequIn, a tool for fast web traffic inference
RequIn, a tool for fast web traffc nference Olver aul, Jean Etenne Kba GET/INT, LOR Department 9 rue Charles Fourer 90 Evry, France [email protected], [email protected] Abstract As networked
GR-303 Solution For Access Gateways
GR-303 Soluton for Access Gateways GR-303 Soluton For Access Gateways Verson 1.0 October 2003 Page 1 of 18 GR-303 Soluton for Access Gateways COPYRIGHT Ths materal s the propretary property of and confdental
Efficient Project Portfolio as a tool for Enterprise Risk Management
Effcent Proect Portfolo as a tool for Enterprse Rsk Management Valentn O. Nkonov Ural State Techncal Unversty Growth Traectory Consultng Company January 5, 27 Effcent Proect Portfolo as a tool for Enterprse
Calculating the high frequency transmission line parameters of power cables
< ' Calculatng the hgh frequency transmsson lne parameters of power cables Authors: Dr. John Dcknson, Laboratory Servces Manager, N 0 RW E B Communcatons Mr. Peter J. Ncholson, Project Assgnment Manager,
A Revised Received Signal Strength Based Localization for Healthcare
, pp.273-282 http://dx.do.org/10.14257/mue.2015.10.10.27 A Revsed Receved Sgnal Strength Based Localzaton for Healthcare Wenhuan Ch 1, Yuan Tan 2, Mznah Al-Rodhaan 2, Abdullah Al-Dhelaan 2 and Yuanfeng
Safety instructions VEGAVIB VB6*.GI*******
Safety nstructons VEGAVIB VB6*.GI******* Kosha 14-AV4BO-0107 Ex td A20, A20/21, A21 IP66 T** 0044 Document ID: 48578 Contents 1 Area of applcablty... 3 2 General nformaton... 3 3 Techncal data... 3 4 Applcaton
Enterprise Applications Portfolio Management Utilizing COTS
Issues n Informng Scence and Informaton Technology Enterprse pplcatons Portfolo Management Utlzng Masafum Kotan IM, Tokyo, Japan [email protected] bstract The software assets that an enterprse apples toward
A DATA MINING APPLICATION IN A STUDENT DATABASE
JOURNAL OF AERONAUTICS AND SPACE TECHNOLOGIES JULY 005 VOLUME NUMBER (53-57) A DATA MINING APPLICATION IN A STUDENT DATABASE Şenol Zafer ERDOĞAN Maltepe Ünversty Faculty of Engneerng Büyükbakkalköy-Istanbul
Cooperative Load Balancing in IEEE 802.11 Networks with Cell Breathing
Cooperatve Load Balancng n IEEE 82.11 Networks wth Cell Breathng Eduard Garca Rafael Vdal Josep Paradells Wreless Networks Group - Techncal Unversty of Catalona (UPC) {eduardg, rvdal, teljpa}@entel.upc.edu;
Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing
Effcent Bandwdth Management n Broadband Wreless Access Systems Usng CAC-based Dynamc Prcng Bader Al-Manthar, Ndal Nasser 2, Najah Abu Al 3, Hossam Hassanen Telecommuncatons Research Laboratory School of
A Crossplatform ECG Compression Library for Mobile HealthCare Services
A Crossplatform ECG Compresson Lbrary for Moble HealthCare Servces Alexander Borodn, Yulya Zavyalova Department of Computer Scence Petrozavodsk State Unversty Petrozavodsk, Russa {aborod, yzavyalo}@cs.petrsu.ru
Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application
Internatonal Journal of mart Grd and lean Energy Performance Analyss of Energy onsumpton of martphone Runnng Moble Hotspot Applcaton Yun on hung a chool of Electronc Engneerng, oongsl Unversty, 511 angdo-dong,
End-to-end measurements of GPRS-EDGE networks have
End-to-end measurements over GPRS-EDGE networks Juan Andrés Negrera Facultad de Ingenería, Unversdad de la Repúblca Montevdeo, Uruguay Javer Perera Facultad de Ingenería, Unversdad de la Repúblca Montevdeo,
How To Understand The Results Of The German Meris Cloud And Water Vapour Product
Ttel: Project: Doc. No.: MERIS level 3 cloud and water vapour products MAPP MAPP-ATBD-ClWVL3 Issue: 1 Revson: 0 Date: 9.12.1998 Functon Name Organsaton Sgnature Date Author: Bennartz FUB Preusker FUB Schüller
Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures
Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng
Riposte: An Anonymous Messaging System Handling Millions of Users
Rposte: An Anonymous Messagng System Handlng Mllons of Users Henry Corrgan-Gbbs, Dan Boneh, and Davd Mazères Stanford Unversty Abstract Ths paper presents Rposte, a new system for anonymous broadcast messagng.
The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis
The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna [email protected] Abstract.
Practical PIR for Electronic Commerce
Practcal PIR for Electronc Commerce Ryan Henry Cherton School of Computer Scence Unversty of Waterloo Waterloo ON Canada N2L 3G1 [email protected] Fem Olumofn Cherton School of Computer Scence Unversty
Open Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1
Send Orders for Reprnts to [email protected] The Open Cybernetcs & Systemcs Journal, 2014, 8, 115-121 115 Open Access A Load Balancng Strategy wth Bandwdth Constrant n Cloud Computng Jng Deng 1,*,
Checkng and Testng in Nokia RMS Process
An Integrated Schedulng Mechansm for Fault-Tolerant Modular Avoncs Systems Yann-Hang Lee Mohamed Youns Jeff Zhou CISE Department Unversty of Florda Ganesvlle, FL 326 [email protected] Advanced System Technology
Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College
Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure
Performance Analysis and Comparison of QoS Provisioning Mechanisms for CBR Traffic in Noisy IEEE 802.11e WLANs Environments
Tamkang Journal of Scence and Engneerng, Vol. 12, No. 2, pp. 143149 (2008) 143 Performance Analyss and Comparson of QoS Provsonng Mechansms for CBR Traffc n Nosy IEEE 802.11e WLANs Envronments Der-Junn
A New Task Scheduling Algorithm Based on Improved Genetic Algorithm
A New Task Schedulng Algorthm Based on Improved Genetc Algorthm n Cloud Computng Envronment Congcong Xong, Long Feng, Lxan Chen A New Task Schedulng Algorthm Based on Improved Genetc Algorthm n Cloud Computng
Tracker: Security and Privacy for RFID-based Supply Chains
Tracker: Securty and Prvacy for RFID-based Supply Chans Erk-Olver Blass Kaoutar Elkhyaou Refk Molva EURECOM Sopha Antpols, France {blass elkhyao molva}@eurecom.fr Abstract The counterfetng of pharmaceutcs
The OC Curve of Attribute Acceptance Plans
The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4
An Efficient Recovery Algorithm for Coverage Hole in WSNs
An Effcent Recover Algorthm for Coverage Hole n WSNs Song Ja 1,*, Wang Balng 1, Peng Xuan 1 School of Informaton an Electrcal Engneerng Harbn Insttute of Technolog at Weha, Shanong, Chna Automatc Test
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Aurélien Francillon, Boris Danev, Srdjan Čapkun 1 Modern Cars Evolution Increasing amount of electronics in cars For convenience
Genetic Algorithm Based Optimization Model for Reliable Data Storage in Cloud Environment
Advanced Scence and Technology Letters, pp.74-79 http://dx.do.org/10.14257/astl.2014.50.12 Genetc Algorthm Based Optmzaton Model for Relable Data Storage n Cloud Envronment Feng Lu 1,2,3, Hatao Wu 1,3,
V. Chandrasekhar. National Instruments, Austin, TX, USA E-mail: [email protected]
28 Int. J. Embedded Systems, Vol. 3, No. 3, 2008 Reducng dynamc power consumpton n next generaton DS-CDMA moble communcaton recevers V. Chandrasekhar Natonal Instruments, Austn, TX, USA E-mal: [email protected]
Reinforcement Learning for Quality of Service in Mobile Ad Hoc Network (MANET)
Renforcement Learnng for Qualty of Servce n Moble Ad Hoc Network (MANET) *T.KUMANAN AND **K.DURAISWAMY *Meenaksh College of Engneerng West K.K Nagar, Cheena-78 **Dean/academc,K.S.R College of Technology,Truchengode
SMART: Scalable, Bandwidth-Aware Monitoring of Continuous Aggregation Queries
: Scalable, Bandwdth-Aware Montorng of Contnuous Aggregaton Queres Navendu Jan, Praveen Yalagandula, Mke Dahln, and Yn Zhang Unversty of Texas at Austn HP Labs ABSTRACT We present, a scalable, bandwdth-aware
M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS
M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS Bogdan Cubotaru, Gabrel-Mro Muntean Performance Engneerng Laboratory, RINCE School of Electronc Engneerng Dubln Cty
Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic
Lagrange Multplers as Quanttatve Indcators n Economcs Ivan Mezník Insttute of Informatcs, Faculty of Busness and Management, Brno Unversty of TechnologCzech Republc Abstract The quanttatve role of Lagrange
Application of Multi-Agents for Fault Detection and Reconfiguration of Power Distribution Systems
1 Applcaton of Mult-Agents for Fault Detecton and Reconfguraton of Power Dstrbuton Systems K. Nareshkumar, Member, IEEE, M. A. Choudhry, Senor Member, IEEE, J. La, A. Felach, Senor Member, IEEE Abstract--The
Hosted Voice Self Service Installation Guide
Hosted Voce Self Servce Installaton Gude Contact us at 1-877-355-1501 [email protected] www.earthlnk.com 2015 EarthLnk. Trademarks are property of ther respectve owners. All rghts reserved. 1071-07629
Optimization Model of Reliable Data Storage in Cloud Environment Using Genetic Algorithm
Internatonal Journal of Grd Dstrbuton Computng, pp.175-190 http://dx.do.org/10.14257/gdc.2014.7.6.14 Optmzaton odel of Relable Data Storage n Cloud Envronment Usng Genetc Algorthm Feng Lu 1,2,3, Hatao
Audio coding: 3-dimensional stereo and presence
Audo codng: 3-dmensonal stereo and presence Audo codng cheme: CIN / TI / M.Eng. Verson: 1.0 Last update: January 2002 Date: January 2002 Lecturer: Davd Robnson Unversty of Essex 2002-15 - Audo Codng, 3-D
Adaptive Fractal Image Coding in the Frequency Domain
PROCEEDINGS OF INTERNATIONAL WORKSHOP ON IMAGE PROCESSING: THEORY, METHODOLOGY, SYSTEMS AND APPLICATIONS 2-22 JUNE,1994 BUDAPEST,HUNGARY Adaptve Fractal Image Codng n the Frequency Doman K AI UWE BARTHEL
Credit Limit Optimization (CLO) for Credit Cards
Credt Lmt Optmzaton (CLO) for Credt Cards Vay S. Desa CSCC IX, Ednburgh September 8, 2005 Copyrght 2003, SAS Insttute Inc. All rghts reserved. SAS Propretary Agenda Background Tradtonal approaches to credt
Comparative Analysis of FBMC and OFDM Multicarrier Techniques for Wireless Communication Networks
Comparatve Analyss of FBMC and OFDM Multcarrer Technques for Wreless Communcaton Networks Bdyalaxm Dev Tensubam ost Graduate cholar Nongmathem Lallema Chanu ost Graduate cholar onka ngh, h.d Assocate rofessor
An Introduction to 3G Monte-Carlo simulations within ProMan
An Introducton to 3G Monte-Carlo smulatons wthn ProMan responsble edtor: Hermann Buddendck AWE Communcatons GmbH Otto-Llenthal-Str. 36 D-71034 Böblngen Phone: +49 70 31 71 49 7-16 Fax: +49 70 31 71 49
Fair Virtual Bandwidth Allocation Model in Virtual Data Centers
Far Vrtual Bandwdth Allocaton Model n Vrtual Data Centers Yng Yuan, Cu-rong Wang, Cong Wang School of Informaton Scence and Engneerng ortheastern Unversty Shenyang, Chna School of Computer and Communcaton
VIP X1600 M4S Encoder module. Installation and Operating Manual
VIP X1600 M4S Encoder module en Installaton and Operatng Manual VIP X1600 XFM4 VIP X1600 Table of Contents en 3 Table of Contents 1 Preface 7 1.1 About ths Manual 7 1.2 Conventons n ths Manual 7 1.3 Intended
VoIP Playout Buffer Adjustment using Adaptive Estimation of Network Delays
VoIP Playout Buffer Adjustment usng Adaptve Estmaton of Network Delays Mroslaw Narbutt and Lam Murphy* Department of Computer Scence Unversty College Dubln, Belfeld, Dubln, IRELAND Abstract The poor qualty
Design and Development of a Security Evaluation Platform Based on International Standards
Internatonal Journal of Informatcs Socety, VOL.5, NO.2 (203) 7-80 7 Desgn and Development of a Securty Evaluaton Platform Based on Internatonal Standards Yuj Takahash and Yoshm Teshgawara Graduate School
A Performance Analysis of View Maintenance Techniques for Data Warehouses
A Performance Analyss of Vew Mantenance Technques for Data Warehouses Xng Wang Dell Computer Corporaton Round Roc, Texas Le Gruenwald The nversty of Olahoma School of Computer Scence orman, OK 739 Guangtao
Towards a Light-weight Bag-of-tasks Grid Architecture
Telfor Journal, Vol. 7, No. 1, 215. 49 Towards a Lght-weght Bag-of-tasks Grd Archtecture Ila Baščevć, Member, IEEE, Nenad Četć, Mroslav Popovć, Member, IEEE, and Momčlo Krunć 1 Abstract The paper presents
