An RFID Distance Bounding Protocol

Size: px
Start display at page:

Download "An RFID Distance Bounding Protocol"

Transcription

1 An RFID Dstance Boundng Protocol Gerhard P. Hancke and Markus G. Kuhn May 22, 2006 An RFID Dstance Boundng Protocol p. 1

2 Dstance boundng Verfer d Prover Places an upper bound on physcal dstance Does not provde absolute locaton Operates on physcal characterstcs of the communcaton medum. Supplements exstng securty mechansms An RFID Dstance Boundng Protocol p. 2

3 RFID devces RFID Reader Power RFID Token Varous applcatons Clock Passve devces wth low resources Data Lmted range Used to lnk an tem or person to a locaton An RFID Dstance Boundng Protocol p. 3

4 Relay attack RFID Token Proxy Token Data Proxy Reader Smple, well known attack Crcumvents applcaton layer securty protocols RFID Reader An RFID Dstance Boundng Protocol p. 4

5 Relay attack demonstraton Proxy Token Proxy Reader A/B test card crcut Sgnal processng wth dscrete components Duplex RF lnk Commercal reader module Reprogrammed wth our frmware Prce $ 100 An RFID Dstance Boundng Protocol p. 5

6 Relay attack detecton Delay Could be reduced wth complex hardware Cannot be less than 3 ns/m Physcal layer Hgh-resoluton tmng Applcaton layer Tmng dfference between an actual token (top) and a Proxy token(bottom) response to a reader s REQA command. Tmng nformaton lost An RFID Dstance Boundng Protocol p. 6

7 Our Protocol Goals Suted to RFID envronment Verfer handles demandng processng functons Prover performs smple functons Provde same level of securty as other dstance boundng protocols Should not be worse because t has hardware constrants Implementaton Suggest practcal deas on how to mplement our protocol Protocol should supplement current RFID standards, not suggest wholesale changes An RFID Dstance Boundng Protocol p. 7

8 Protocol assumptons Securty target Places an upper bound on the dstance between Verfer and Prover Does not provde non-repudaton of locaton to a thrd party The Prover does not collude wth an attacker Crypto prmtves Shared secret key, K Shared pseudorandom functon, h Nonces N V,N P are of suffcent length and wll not be repeated An RFID Dstance Boundng Protocol p. 8

9 Protocol assumptons (2) Tme base Verfer s computatonally strong Perform accurate tmng operatons Prover s computatonally weak Cannot determne accurate tmng nformaton Uses external clock sgnal (receved carrer) Prover can detect large devatons n clock frequency Communcaton channels Low bandwdth error corrected channel Hgh bandwdth rapd bt exchange channel An RFID Dstance Boundng Protocol p. 9

10 Protocol descrpton Verfer (RFID reader) Generate nonce N V N V Prover (RFID token) An RFID Dstance Boundng Protocol p. 10

11 Protocol descrpton Verfer (RFID reader) Generate nonce N V Generate random bts C 1,...,C n C = N V Prover (RFID token) Calculate h(k,n V ) = R Splt R = R 0 R R R 1 An RFID Dstance Boundng Protocol p. 10

12 Protocol descrpton Verfer (RFID reader) N V Prover (RFID token) Generate nonce N V Generate random bts C 1,...,C n C = C 1 = 0 R C = 1 R C 1 1 = 1 Calculate h(k,n V ) = R Splt R = R 0 R R R An RFID Dstance Boundng Protocol p. 10

13 Protocol descrpton Verfer (RFID reader) N V Prover (RFID token) Generate nonce N V Generate random bts C 1,...,C n C = R C = 11 C 2 = 1 R C 2 2 = 1 Calculate h(k,n V ) = R Splt R = R 0 R R R An RFID Dstance Boundng Protocol p. 10

14 Protocol descrpton Verfer (RFID reader) N V Prover (RFID token) Generate nonce N V Generate random bts C 1,...,C n C = R C = 110 C 3 = 0 R C 3 3 = 0 Calculate h(k,n V ) = R Splt R = R 0 R R R An RFID Dstance Boundng Protocol p. 10

15 Protocol descrpton Verfer (RFID reader) N V Prover (RFID token) Generate nonce N V Generate random bts C 1,...,C n C = R C = 1101 C 4 = 0 R C 4 4 = 1 Calculate h(k,n V ) = R Splt R = R 0 R R R An RFID Dstance Boundng Protocol p. 10

16 Protocol descrpton Verfer (RFID reader) Generate nonce N V Generate random bts C 1,...,C n C = R C = N V C 5 = 1 R C 5 5 = 0 Prover (RFID token) Calculate h(k,n V ) = R Splt R = R 0 R R R An RFID Dstance Boundng Protocol p. 10

17 Protocol descrpton Verfer (RFID reader) N V Prover (RFID token) Generate nonce N V Generate random bts C 1,...,C n C = R C = C 6 = 1 R C 6 6 = 1 Calculate h(k,n V ) = R Splt R = R 0 R R R An RFID Dstance Boundng Protocol p. 10

18 Protocol descrpton Verfer (RFID reader) N V Prover (RFID token) Generate nonce N V Generate random bts C 1,...,C n C = C 7 = 0 R C = R C 7 7 = 1 Calculate h(k,n V ) = R Splt R = R 0 R R R An RFID Dstance Boundng Protocol p. 10

19 Protocol descrpton Verfer (RFID reader) Generate nonce N V Generate random bts C 1,...,C n C = R C = N V C 8 = 0 R C 8 8 = 1 Prover (RFID token) Calculate h(k,n V ) = R Splt R = R 0 R R R 1 An RFID Dstance Boundng Protocol p. 10

20 Protocol descrpton Verfer Attacker N V C = C Expected R C Receved R C R C R R 1 Verfer Attacker 1 2 chance of guessng a response bt correctly An RFID Dstance Boundng Protocol p. 10

21 Protocol descrpton Verfer Malcous Prover N V C = Expected R C Receved R C R C C R R 1 Verfer Malcous Prover 1 2 chance of guessng a response bt correctly An RFID Dstance Boundng Protocol p. 10

22 Protocol descrpton Verfer C = Expected R C Receved R C N V C R C Attacker R R 1 Verfer Attacker Prover N V A C R A C Prover h(k,n V ) = R R R chance of guessng a response bt correctly An RFID Dstance Boundng Protocol p. 10

23 Protocol descrpton Verfer C = Expected R C Receved R C N V C R C Overclockng attack Attacker R R R 1 N V A C R A C N V A C R A C Prover h(k,n V ) = R R R 1 h(k,n V ) = R R R R 1 Prevented n hardware e.g. Bandpass flter An RFID Dstance Boundng Protocol p. 10

24 Protocol descrpton Verfer (RFID reader) N V Prover (RFID token) Generate nonce N V Generate random bts C 1,...,C n N P C = C 1 = 0 R C = 1 R C 1 1 = 1 Overclockng attack Alternatve to hardware solutons Generate nonce N P Calculate h(k,n V,N P ) = R Splt R = R 0 R R R An RFID Dstance Boundng Protocol p. 10

25 Nose Bt errors wll probably occur on the rapd exchange channel Accept f at least k bts out of n are correct False accept: p FA = n =k ( ) n ( ) 3 4 ( ) 1 n 4 False reject: p FR = k 1 =0 ( ) n (1 ǫ) ǫ n where ǫ s the bt-error probablty. An RFID Dstance Boundng Protocol p. 11

26 Nose (2) Example of parameter tradeoffs n the presence of nose EER 200 k ǫ =0.05 ǫ =0.10 ǫ = n An RFID Dstance Boundng Protocol p. 12

27 Related work t m = 2 t p + t d t m t p t d d v p d = v p tm t d 2 = round trp tme = one-way propagaton tme = processng delay = dstance = sgnal propagaton speed Dstance Boundng Protocols Beth and Desmedt (1991) Brands and Chaum (1993) An RFID Dstance Boundng Protocol p. 13

28 Brands and Chaum Verfer (RFID reader) Generate random bts C 1,...,C n commt(m) Prover (RFID token) Generate random bts m 1,...,m n Verfy commt Verfy sgn(m ) C R open commt sgn(m ) R = C m message M = C R... C n R n Tme round trp of sngle bt exchange Processng wth varable delay done beforehand Mnmal processng delay durng bt exchange An RFID Dstance Boundng Protocol p. 14

29 Brands and Chaum Verfer (RFID reader) Generate random bts C 1,...,C n commt(m) Prover (RFID token) Generate random bts m 1,...,m n Verfy commt Verfy sgn(m ) C R open commt sgn(m ),C,R R = C m message M = C R... C n R n Addtonal commt and sgn operatons Addtonal bts on slow channel In presence of nose C and R need to be transmtted An RFID Dstance Boundng Protocol p. 14

30 Performance vs Brands and Chaum For EER = 10 4 and ǫ = 0.1 Assume bt exchange rate = f carrer /4 Standard Tme (B and C) Tme (Our protocol) n = 70 n = fast ms ms 26.4 kbp/s, MHz long ms ms 6.62 kbp/s, MHz A/B ms ms 106 kbp/s, MHz An RFID Dstance Boundng Protocol p. 15

31 Performance vs Brands and Chaum (2) For EER = and ǫ = 0.05 Assume bt exchange rate = f carrer /4 Standard Tme (B and C) Tme (Our protocol) n = 125 n = fast ms ms 26.4 kbp/s, MHz long ms ms 6.62 kbp/s, MHz A/B ms ms 106 kbp/s, MHz An RFID Dstance Boundng Protocol p. 16

32 Postonng technology Postonng Technology used today Rado Frequency Secure but complex Ultrasound Appear closer by relayng data wth faster RF lnk Receved Sgnal Strength Amplfed sgnal appears closer An RFID Dstance Boundng Protocol p. 17

33 Resoluton Estmate r B c, where B s the channel bandwdth RFID communcaton nadequate e.g. for ISO at 106 kbp/s, r 3 km Ultra Wdeband Pulses Hgher bandwdth equals better resoluton RFID mplementaton ssues Error free operaton requres hgh resources e.g. synchronzaton, bt placement Crude mplementaton possble but would allow bt errors Suffcent for bt exchange channel Not to be used for normal communcaton An RFID Dstance Boundng Protocol p. 18

34 Proposed bt exchange channel Carrer wave Use carrer for loose synchronzaton e.g. Zero crossng An RFID Dstance Boundng Protocol p. 19

35 Proposed bt exchange channel Carrer wave Challenge pulse C t t t r t p Reader (Verfer) adjusts t t to match samplng delay t r n the token (Prover) An RFID Dstance Boundng Protocol p. 19

36 Proposed bt exchange channel Carrer wave Challenge pulse C Response pulse R C t t t r t p t d t d s a predctable hardware delay An RFID Dstance Boundng Protocol p. 19

37 Proposed bt exchange channel Carrer wave Challenge pulse C Response pulse R C t t t r t p t s t d t p d = c (t s t t t d )/2 An RFID Dstance Boundng Protocol p. 19

38 Concluson Few more bt exchanges to acheve same cryptographc securty Chance of attacker guessng correct response 3 4 vs 1 2 Faster operaton Extra bts transmtted on faster bt exchange channel Much less data transmtted on slow error corrected channel Practcal mplementaton suted for RFID Low power and processng requrements for Prover Tmng-senstve measurements and adjustments done by the Verfer Faster completon of protocol suted for RFID envronment An RFID Dstance Boundng Protocol p. 20

39 Future work Practcal mplementaton Pseudorandom functons suted for RFID devce Rapd bt exchange channel UWB antennas for card form factor Mutual dstance boundng protocol For applcatons where llegtmate readng attempts are more common e.g e-passports An RFID Dstance Boundng Protocol p. 21

Frequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters

Frequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters Frequency Selectve IQ Phase and IQ Ampltude Imbalance Adjustments for OFDM Drect Converson ransmtters Edmund Coersmeer, Ernst Zelnsk Noka, Meesmannstrasse 103, 44807 Bochum, Germany [email protected],

More information

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage Proactve Secret Sharng Or: How to Cope Wth Perpetual Leakage Paper by Amr Herzberg Stanslaw Jareck Hugo Krawczyk Mot Yung Presentaton by Davd Zage What s Secret Sharng Basc Idea ((2, 2)-threshold scheme):

More information

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT Toshhko Oda (1), Kochro Iwaoka (2) (1), (2) Infrastructure Systems Busness Unt, Panasonc System Networks Co., Ltd. Saedo-cho

More information

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS 21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS

More information

Mathematical Framework for A Novel Database Replication Algorithm

Mathematical Framework for A Novel Database Replication Algorithm I.J.Modern Educaton and Computer Scence, 203, 9, -0 Publshed Onlne October 203 n MECS (http://www.mecs-press.org/) DOI: 0.585/jmecs.203.09.0 Mathematcal Framework for A Novel Database Replcaton Algorthm

More information

Secure Network Coding Over the Integers

Secure Network Coding Over the Integers Secure Network Codng Over the Integers Rosaro Gennaro Jonathan Katz Hugo Krawczyk Tal Rabn Abstract Network codng has receved sgnfcant attenton n the networkng communty for ts potental to ncrease throughput

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika.

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika. VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

Secure Walking GPS: A Secure Localization and Key Distribution Scheme for Wireless Sensor Networks

Secure Walking GPS: A Secure Localization and Key Distribution Scheme for Wireless Sensor Networks Secure Walkng GPS: A Secure Localzaton and Key Dstrbuton Scheme for Wreless Sensor Networks Q M, John A. Stankovc, Radu Stoleru 2 Department of Computer Scence, Unversty of Vrgna, USA 2 Department of Computer

More information

Traffic State Estimation in the Traffic Management Center of Berlin

Traffic State Estimation in the Traffic Management Center of Berlin Traffc State Estmaton n the Traffc Management Center of Berln Authors: Peter Vortsch, PTV AG, Stumpfstrasse, D-763 Karlsruhe, Germany phone ++49/72/965/35, emal [email protected] Peter Möhl, PTV AG,

More information

sscada: securing SCADA infrastructure communications

sscada: securing SCADA infrastructure communications Int. J. Communcaton Networks and Dstrbuted Systems, Vol. 6, No. 1, 2011 59 sscada: securng SCADA nfrastructure communcatons Yongge Wang Department of SIS, UNC Charlotte, 9201 Unversty Cty Blvd, Charlotte,

More information

Implementation of Deutsch's Algorithm Using Mathcad

Implementation of Deutsch's Algorithm Using Mathcad Implementaton of Deutsch's Algorthm Usng Mathcad Frank Roux The followng s a Mathcad mplementaton of Davd Deutsch's quantum computer prototype as presented on pages - n "Machnes, Logc and Quantum Physcs"

More information

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

Analysis of Energy-Conserving Access Protocols for Wireless Identification Networks

Analysis of Energy-Conserving Access Protocols for Wireless Identification Networks From the Proceedngs of Internatonal Conference on Telecommuncaton Systems (ITC-97), March 2-23, 1997. 1 Analyss of Energy-Conservng Access Protocols for Wreless Identfcaton etworks Imrch Chlamtac a, Chara

More information

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..

More information

Quantization Effects in Digital Filters

Quantization Effects in Digital Filters Quantzaton Effects n Dgtal Flters Dstrbuton of Truncaton Errors In two's complement representaton an exact number would have nfntely many bts (n general). When we lmt the number of bts to some fnte value

More information

What is Candidate Sampling

What is Candidate Sampling What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble

More information

AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS

AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Internatonal Journal of Network Securty & Its Applcatons (IJNSA), Vol.5, No.3, May 2013 AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Len Harn 1 and Changlu Ln 2 1 Department of Computer Scence

More information

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng

More information

VOLUME 5 BLAGOEVGRAD, BULGARIA SCIENTIFIC. Research ELECTRONIC ISSUE ISSN 1312-7535

VOLUME 5 BLAGOEVGRAD, BULGARIA SCIENTIFIC. Research ELECTRONIC ISSUE ISSN 1312-7535 VOLUME 5 007 BLAGOEVGRAD, BULGARIA SCIENTIFIC Research ISSN 131-7535 ELECTRONIC ISSUE IMPROVING FAIRNESS IN CDMA-HDR NETWORKS Valentn Hrstov Abstract. Improvng throughput and farness n Cellular Data Networks

More information

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ). REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or

More information

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture A Desgn Method of Hgh-avalablty and Low-optcal-loss Optcal Aggregaton Network Archtecture Takehro Sato, Kuntaka Ashzawa, Kazumasa Tokuhash, Dasuke Ish, Satoru Okamoto and Naoak Yamanaka Dept. of Informaton

More information

An ILP Formulation for Task Mapping and Scheduling on Multi-core Architectures

An ILP Formulation for Task Mapping and Scheduling on Multi-core Architectures An ILP Formulaton for Task Mappng and Schedulng on Mult-core Archtectures Yng Y, We Han, Xn Zhao, Ahmet T. Erdogan and Tughrul Arslan Unversty of Ednburgh, The Kng's Buldngs, Mayfeld Road, Ednburgh, EH9

More information

An Alternative Way to Measure Private Equity Performance

An Alternative Way to Measure Private Equity Performance An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate

More information

Applied Research Laboratory. Decision Theory and Receiver Design

Applied Research Laboratory. Decision Theory and Receiver Design Decson Theor and Recever Desgn Sgnal Detecton and Performance Estmaton Sgnal Processor Decde Sgnal s resent or Sgnal s not resent Nose Nose Sgnal? Problem: How should receved sgnals be rocessed n order

More information

RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo.

RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo. ICSV4 Carns Australa 9- July, 007 RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL Yaoq FENG, Hanpng QIU Dynamc Test Laboratory, BISEE Chna Academy of Space Technology (CAST) [email protected] Abstract

More information

Efficient On-Demand Data Service Delivery to High-Speed Trains in Cellular/Infostation Integrated Networks

Efficient On-Demand Data Service Delivery to High-Speed Trains in Cellular/Infostation Integrated Networks IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. XX, NO. XX, MONTH 2XX 1 Effcent On-Demand Data Servce Delvery to Hgh-Speed Trans n Cellular/Infostaton Integrated Networks Hao Lang, Student Member,

More information

A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS

A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS Shanthy Menezes 1 and S. Venkatesan 2 1 Department of Computer Scence, Unversty of Texas at Dallas, Rchardson, TX, USA 1 [email protected]

More information

A Parallel Architecture for Stateful Intrusion Detection in High Traffic Networks

A Parallel Architecture for Stateful Intrusion Detection in High Traffic Networks A Parallel Archtecture for Stateful Intruson Detecton n Hgh Traffc Networks Mchele Colajann Mrco Marchett Dpartmento d Ingegnera dell Informazone Unversty of Modena {colajann, marchett.mrco}@unmore.t Abstract

More information

Course outline. Financial Time Series Analysis. Overview. Data analysis. Predictive signal. Trading strategy

Course outline. Financial Time Series Analysis. Overview. Data analysis. Predictive signal. Trading strategy Fnancal Tme Seres Analyss Patrck McSharry [email protected] www.mcsharry.net Trnty Term 2014 Mathematcal Insttute Unversty of Oxford Course outlne 1. Data analyss, probablty, correlatons, vsualsaton

More information

Daily O-D Matrix Estimation using Cellular Probe Data

Daily O-D Matrix Estimation using Cellular Probe Data Zhang, Qn, Dong and Ran Daly O-D Matrx Estmaton usng Cellular Probe Data 0 0 Y Zhang* Department of Cvl and Envronmental Engneerng, Unversty of Wsconsn-Madson, Madson, WI 0 Phone: -0-- E-mal: [email protected]

More information

Conferencing protocols and Petri net analysis

Conferencing protocols and Petri net analysis Conferencng protocols and Petr net analyss E. ANTONIDAKIS Department of Electroncs, Technologcal Educatonal Insttute of Crete, GREECE [email protected] Abstract: Durng a computer conference, users desre

More information

Abstract. 1. Introduction. 2. Measurement Methods

Abstract. 1. Introduction. 2. Measurement Methods Wdeband ped Delay Lne Channel Model at 3.5GHz for Broadband Fxed Wreless Access system as functon of Subscrber Antenna heght n Suburban Envronment Cha Leong Hong, Ian J. Wassell, Georga E. Athanasadou,

More information

On-Line Fault Detection in Wind Turbine Transmission System using Adaptive Filter and Robust Statistical Features

On-Line Fault Detection in Wind Turbine Transmission System using Adaptive Filter and Robust Statistical Features On-Lne Fault Detecton n Wnd Turbne Transmsson System usng Adaptve Flter and Robust Statstcal Features Ruoyu L Remote Dagnostcs Center SKF USA Inc. 3443 N. Sam Houston Pkwy., Houston TX 77086 Emal: [email protected]

More information

Detecting Leaks from Waste Storage Ponds using Electrical Tomographic Methods

Detecting Leaks from Waste Storage Ponds using Electrical Tomographic Methods Detectng Leas from Waste Storage Ponds usng Electrcal Tomographc Methods Andrew Bnley #, Wllam Daly ## & Abelardo Ramrez ## # Lancaster Unversty, Lancaster, LA1 4YQ, UK ## Lawrence Lvermore Natonal Laboratory,

More information

RequIn, a tool for fast web traffic inference

RequIn, a tool for fast web traffic inference RequIn, a tool for fast web traffc nference Olver aul, Jean Etenne Kba GET/INT, LOR Department 9 rue Charles Fourer 90 Evry, France [email protected], [email protected] Abstract As networked

More information

GR-303 Solution For Access Gateways

GR-303 Solution For Access Gateways GR-303 Soluton for Access Gateways GR-303 Soluton For Access Gateways Verson 1.0 October 2003 Page 1 of 18 GR-303 Soluton for Access Gateways COPYRIGHT Ths materal s the propretary property of and confdental

More information

Efficient Project Portfolio as a tool for Enterprise Risk Management

Efficient Project Portfolio as a tool for Enterprise Risk Management Effcent Proect Portfolo as a tool for Enterprse Rsk Management Valentn O. Nkonov Ural State Techncal Unversty Growth Traectory Consultng Company January 5, 27 Effcent Proect Portfolo as a tool for Enterprse

More information

Calculating the high frequency transmission line parameters of power cables

Calculating the high frequency transmission line parameters of power cables < ' Calculatng the hgh frequency transmsson lne parameters of power cables Authors: Dr. John Dcknson, Laboratory Servces Manager, N 0 RW E B Communcatons Mr. Peter J. Ncholson, Project Assgnment Manager,

More information

A Revised Received Signal Strength Based Localization for Healthcare

A Revised Received Signal Strength Based Localization for Healthcare , pp.273-282 http://dx.do.org/10.14257/mue.2015.10.10.27 A Revsed Receved Sgnal Strength Based Localzaton for Healthcare Wenhuan Ch 1, Yuan Tan 2, Mznah Al-Rodhaan 2, Abdullah Al-Dhelaan 2 and Yuanfeng

More information

Safety instructions VEGAVIB VB6*.GI*******

Safety instructions VEGAVIB VB6*.GI******* Safety nstructons VEGAVIB VB6*.GI******* Kosha 14-AV4BO-0107 Ex td A20, A20/21, A21 IP66 T** 0044 Document ID: 48578 Contents 1 Area of applcablty... 3 2 General nformaton... 3 3 Techncal data... 3 4 Applcaton

More information

Enterprise Applications Portfolio Management Utilizing COTS

Enterprise Applications Portfolio Management Utilizing COTS Issues n Informng Scence and Informaton Technology Enterprse pplcatons Portfolo Management Utlzng Masafum Kotan IM, Tokyo, Japan [email protected] bstract The software assets that an enterprse apples toward

More information

A DATA MINING APPLICATION IN A STUDENT DATABASE

A DATA MINING APPLICATION IN A STUDENT DATABASE JOURNAL OF AERONAUTICS AND SPACE TECHNOLOGIES JULY 005 VOLUME NUMBER (53-57) A DATA MINING APPLICATION IN A STUDENT DATABASE Şenol Zafer ERDOĞAN Maltepe Ünversty Faculty of Engneerng Büyükbakkalköy-Istanbul

More information

Cooperative Load Balancing in IEEE 802.11 Networks with Cell Breathing

Cooperative Load Balancing in IEEE 802.11 Networks with Cell Breathing Cooperatve Load Balancng n IEEE 82.11 Networks wth Cell Breathng Eduard Garca Rafael Vdal Josep Paradells Wreless Networks Group - Techncal Unversty of Catalona (UPC) {eduardg, rvdal, teljpa}@entel.upc.edu;

More information

Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing

Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing Effcent Bandwdth Management n Broadband Wreless Access Systems Usng CAC-based Dynamc Prcng Bader Al-Manthar, Ndal Nasser 2, Najah Abu Al 3, Hossam Hassanen Telecommuncatons Research Laboratory School of

More information

A Crossplatform ECG Compression Library for Mobile HealthCare Services

A Crossplatform ECG Compression Library for Mobile HealthCare Services A Crossplatform ECG Compresson Lbrary for Moble HealthCare Servces Alexander Borodn, Yulya Zavyalova Department of Computer Scence Petrozavodsk State Unversty Petrozavodsk, Russa {aborod, yzavyalo}@cs.petrsu.ru

More information

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application Internatonal Journal of mart Grd and lean Energy Performance Analyss of Energy onsumpton of martphone Runnng Moble Hotspot Applcaton Yun on hung a chool of Electronc Engneerng, oongsl Unversty, 511 angdo-dong,

More information

End-to-end measurements of GPRS-EDGE networks have

End-to-end measurements of GPRS-EDGE networks have End-to-end measurements over GPRS-EDGE networks Juan Andrés Negrera Facultad de Ingenería, Unversdad de la Repúblca Montevdeo, Uruguay Javer Perera Facultad de Ingenería, Unversdad de la Repúblca Montevdeo,

More information

How To Understand The Results Of The German Meris Cloud And Water Vapour Product

How To Understand The Results Of The German Meris Cloud And Water Vapour Product Ttel: Project: Doc. No.: MERIS level 3 cloud and water vapour products MAPP MAPP-ATBD-ClWVL3 Issue: 1 Revson: 0 Date: 9.12.1998 Functon Name Organsaton Sgnature Date Author: Bennartz FUB Preusker FUB Schüller

More information

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng

More information

Riposte: An Anonymous Messaging System Handling Millions of Users

Riposte: An Anonymous Messaging System Handling Millions of Users Rposte: An Anonymous Messagng System Handlng Mllons of Users Henry Corrgan-Gbbs, Dan Boneh, and Davd Mazères Stanford Unversty Abstract Ths paper presents Rposte, a new system for anonymous broadcast messagng.

More information

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna [email protected] Abstract.

More information

Practical PIR for Electronic Commerce

Practical PIR for Electronic Commerce Practcal PIR for Electronc Commerce Ryan Henry Cherton School of Computer Scence Unversty of Waterloo Waterloo ON Canada N2L 3G1 [email protected] Fem Olumofn Cherton School of Computer Scence Unversty

More information

Open Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1

Open Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1 Send Orders for Reprnts to [email protected] The Open Cybernetcs & Systemcs Journal, 2014, 8, 115-121 115 Open Access A Load Balancng Strategy wth Bandwdth Constrant n Cloud Computng Jng Deng 1,*,

More information

Checkng and Testng in Nokia RMS Process

Checkng and Testng in Nokia RMS Process An Integrated Schedulng Mechansm for Fault-Tolerant Modular Avoncs Systems Yann-Hang Lee Mohamed Youns Jeff Zhou CISE Department Unversty of Florda Ganesvlle, FL 326 [email protected] Advanced System Technology

More information

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure

More information

Performance Analysis and Comparison of QoS Provisioning Mechanisms for CBR Traffic in Noisy IEEE 802.11e WLANs Environments

Performance Analysis and Comparison of QoS Provisioning Mechanisms for CBR Traffic in Noisy IEEE 802.11e WLANs Environments Tamkang Journal of Scence and Engneerng, Vol. 12, No. 2, pp. 143149 (2008) 143 Performance Analyss and Comparson of QoS Provsonng Mechansms for CBR Traffc n Nosy IEEE 802.11e WLANs Envronments Der-Junn

More information

A New Task Scheduling Algorithm Based on Improved Genetic Algorithm

A New Task Scheduling Algorithm Based on Improved Genetic Algorithm A New Task Schedulng Algorthm Based on Improved Genetc Algorthm n Cloud Computng Envronment Congcong Xong, Long Feng, Lxan Chen A New Task Schedulng Algorthm Based on Improved Genetc Algorthm n Cloud Computng

More information

Tracker: Security and Privacy for RFID-based Supply Chains

Tracker: Security and Privacy for RFID-based Supply Chains Tracker: Securty and Prvacy for RFID-based Supply Chans Erk-Olver Blass Kaoutar Elkhyaou Refk Molva EURECOM Sopha Antpols, France {blass elkhyao molva}@eurecom.fr Abstract The counterfetng of pharmaceutcs

More information

The OC Curve of Attribute Acceptance Plans

The OC Curve of Attribute Acceptance Plans The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4

More information

An Efficient Recovery Algorithm for Coverage Hole in WSNs

An Efficient Recovery Algorithm for Coverage Hole in WSNs An Effcent Recover Algorthm for Coverage Hole n WSNs Song Ja 1,*, Wang Balng 1, Peng Xuan 1 School of Informaton an Electrcal Engneerng Harbn Insttute of Technolog at Weha, Shanong, Chna Automatc Test

More information

Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars

Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Aurélien Francillon, Boris Danev, Srdjan Čapkun 1 Modern Cars Evolution Increasing amount of electronics in cars For convenience

More information

Genetic Algorithm Based Optimization Model for Reliable Data Storage in Cloud Environment

Genetic Algorithm Based Optimization Model for Reliable Data Storage in Cloud Environment Advanced Scence and Technology Letters, pp.74-79 http://dx.do.org/10.14257/astl.2014.50.12 Genetc Algorthm Based Optmzaton Model for Relable Data Storage n Cloud Envronment Feng Lu 1,2,3, Hatao Wu 1,3,

More information

V. Chandrasekhar. National Instruments, Austin, TX, USA E-mail: [email protected]

V. Chandrasekhar. National Instruments, Austin, TX, USA E-mail: Vikram.Chandrasekhar@ni.com 28 Int. J. Embedded Systems, Vol. 3, No. 3, 2008 Reducng dynamc power consumpton n next generaton DS-CDMA moble communcaton recevers V. Chandrasekhar Natonal Instruments, Austn, TX, USA E-mal: [email protected]

More information

Reinforcement Learning for Quality of Service in Mobile Ad Hoc Network (MANET)

Reinforcement Learning for Quality of Service in Mobile Ad Hoc Network (MANET) Renforcement Learnng for Qualty of Servce n Moble Ad Hoc Network (MANET) *T.KUMANAN AND **K.DURAISWAMY *Meenaksh College of Engneerng West K.K Nagar, Cheena-78 **Dean/academc,K.S.R College of Technology,Truchengode

More information

SMART: Scalable, Bandwidth-Aware Monitoring of Continuous Aggregation Queries

SMART: Scalable, Bandwidth-Aware Monitoring of Continuous Aggregation Queries : Scalable, Bandwdth-Aware Montorng of Contnuous Aggregaton Queres Navendu Jan, Praveen Yalagandula, Mke Dahln, and Yn Zhang Unversty of Texas at Austn HP Labs ABSTRACT We present, a scalable, bandwdth-aware

More information

M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS

M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS Bogdan Cubotaru, Gabrel-Mro Muntean Performance Engneerng Laboratory, RINCE School of Electronc Engneerng Dubln Cty

More information

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic Lagrange Multplers as Quanttatve Indcators n Economcs Ivan Mezník Insttute of Informatcs, Faculty of Busness and Management, Brno Unversty of TechnologCzech Republc Abstract The quanttatve role of Lagrange

More information

Application of Multi-Agents for Fault Detection and Reconfiguration of Power Distribution Systems

Application of Multi-Agents for Fault Detection and Reconfiguration of Power Distribution Systems 1 Applcaton of Mult-Agents for Fault Detecton and Reconfguraton of Power Dstrbuton Systems K. Nareshkumar, Member, IEEE, M. A. Choudhry, Senor Member, IEEE, J. La, A. Felach, Senor Member, IEEE Abstract--The

More information

Hosted Voice Self Service Installation Guide

Hosted Voice Self Service Installation Guide Hosted Voce Self Servce Installaton Gude Contact us at 1-877-355-1501 [email protected] www.earthlnk.com 2015 EarthLnk. Trademarks are property of ther respectve owners. All rghts reserved. 1071-07629

More information

Optimization Model of Reliable Data Storage in Cloud Environment Using Genetic Algorithm

Optimization Model of Reliable Data Storage in Cloud Environment Using Genetic Algorithm Internatonal Journal of Grd Dstrbuton Computng, pp.175-190 http://dx.do.org/10.14257/gdc.2014.7.6.14 Optmzaton odel of Relable Data Storage n Cloud Envronment Usng Genetc Algorthm Feng Lu 1,2,3, Hatao

More information

Audio coding: 3-dimensional stereo and presence

Audio coding: 3-dimensional stereo and presence Audo codng: 3-dmensonal stereo and presence Audo codng cheme: CIN / TI / M.Eng. Verson: 1.0 Last update: January 2002 Date: January 2002 Lecturer: Davd Robnson Unversty of Essex 2002-15 - Audo Codng, 3-D

More information

Adaptive Fractal Image Coding in the Frequency Domain

Adaptive Fractal Image Coding in the Frequency Domain PROCEEDINGS OF INTERNATIONAL WORKSHOP ON IMAGE PROCESSING: THEORY, METHODOLOGY, SYSTEMS AND APPLICATIONS 2-22 JUNE,1994 BUDAPEST,HUNGARY Adaptve Fractal Image Codng n the Frequency Doman K AI UWE BARTHEL

More information

Credit Limit Optimization (CLO) for Credit Cards

Credit Limit Optimization (CLO) for Credit Cards Credt Lmt Optmzaton (CLO) for Credt Cards Vay S. Desa CSCC IX, Ednburgh September 8, 2005 Copyrght 2003, SAS Insttute Inc. All rghts reserved. SAS Propretary Agenda Background Tradtonal approaches to credt

More information

Comparative Analysis of FBMC and OFDM Multicarrier Techniques for Wireless Communication Networks

Comparative Analysis of FBMC and OFDM Multicarrier Techniques for Wireless Communication Networks Comparatve Analyss of FBMC and OFDM Multcarrer Technques for Wreless Communcaton Networks Bdyalaxm Dev Tensubam ost Graduate cholar Nongmathem Lallema Chanu ost Graduate cholar onka ngh, h.d Assocate rofessor

More information

An Introduction to 3G Monte-Carlo simulations within ProMan

An Introduction to 3G Monte-Carlo simulations within ProMan An Introducton to 3G Monte-Carlo smulatons wthn ProMan responsble edtor: Hermann Buddendck AWE Communcatons GmbH Otto-Llenthal-Str. 36 D-71034 Böblngen Phone: +49 70 31 71 49 7-16 Fax: +49 70 31 71 49

More information

Fair Virtual Bandwidth Allocation Model in Virtual Data Centers

Fair Virtual Bandwidth Allocation Model in Virtual Data Centers Far Vrtual Bandwdth Allocaton Model n Vrtual Data Centers Yng Yuan, Cu-rong Wang, Cong Wang School of Informaton Scence and Engneerng ortheastern Unversty Shenyang, Chna School of Computer and Communcaton

More information

VIP X1600 M4S Encoder module. Installation and Operating Manual

VIP X1600 M4S Encoder module. Installation and Operating Manual VIP X1600 M4S Encoder module en Installaton and Operatng Manual VIP X1600 XFM4 VIP X1600 Table of Contents en 3 Table of Contents 1 Preface 7 1.1 About ths Manual 7 1.2 Conventons n ths Manual 7 1.3 Intended

More information

VoIP Playout Buffer Adjustment using Adaptive Estimation of Network Delays

VoIP Playout Buffer Adjustment using Adaptive Estimation of Network Delays VoIP Playout Buffer Adjustment usng Adaptve Estmaton of Network Delays Mroslaw Narbutt and Lam Murphy* Department of Computer Scence Unversty College Dubln, Belfeld, Dubln, IRELAND Abstract The poor qualty

More information

Design and Development of a Security Evaluation Platform Based on International Standards

Design and Development of a Security Evaluation Platform Based on International Standards Internatonal Journal of Informatcs Socety, VOL.5, NO.2 (203) 7-80 7 Desgn and Development of a Securty Evaluaton Platform Based on Internatonal Standards Yuj Takahash and Yoshm Teshgawara Graduate School

More information

A Performance Analysis of View Maintenance Techniques for Data Warehouses

A Performance Analysis of View Maintenance Techniques for Data Warehouses A Performance Analyss of Vew Mantenance Technques for Data Warehouses Xng Wang Dell Computer Corporaton Round Roc, Texas Le Gruenwald The nversty of Olahoma School of Computer Scence orman, OK 739 Guangtao

More information

Towards a Light-weight Bag-of-tasks Grid Architecture

Towards a Light-weight Bag-of-tasks Grid Architecture Telfor Journal, Vol. 7, No. 1, 215. 49 Towards a Lght-weght Bag-of-tasks Grd Archtecture Ila Baščevć, Member, IEEE, Nenad Četć, Mroslav Popovć, Member, IEEE, and Momčlo Krunć 1 Abstract The paper presents

More information