EPAS: Efficient Privacy-preserving Authentication Scheme for VANETs-based Emergency Communication

Size: px
Start display at page:

Download "EPAS: Efficient Privacy-preserving Authentication Scheme for VANETs-based Emergency Communication"

Transcription

1 94 JOURNAL OF SOFTWARE, VOL. 8, NO. 8, AUGUST 03 EPAS: Effcent Prvacy-preservng Authentcaton Scheme for VANETs-based Emergency Communcaton Xuedan Ja School of Computer Scence and Telecommuncaton Engneerng, Jangsu Unversty, Zhenjang, Chna Emal: Xaopeng Yuan, Lxa Meng 3, Langmn Wang, 3 School of Electronc Engneerng and Optoelectronc Technques, NUST, Nanjng, Chna 3 Key Laboratory of Intellgent Computng & Sgnal Processng, MOE, Anhu Unversty, Hefe, Chna Emal: (wanglm@ujs.edu.cn) Abstract Vehcular Ad Hoc Networks (VANETs) can provde partcpants wth securty servces and entertanment nformaton durng the drvng. To guarantee correct and smooth operatons of VANETs, t s necessary to acheve effcent authentcaton wth user prvacy preservng. Current solutons ether cannot satsfy prvacy requrements, or are not effcent n message verfcaton. Moreover, all the exstng schemes are RSU-based. We, for the frst tme, apply VANETs to emergency communcaton durng dsaster rescue, and effectve authentcaton scheme s proposed n accordance wth the actual envronment, where there s no fxed road-sde unt (RSU). In ths paper, we present an effcent dentty based sgnature scheme EPAS, whch satsfes condtonal prvacy requrements through software soluton. In aspect of effcency, both lghtweght sgnature and batch verfcaton are employed to provde effectve authentcaton. Extensve theoretcal and expermental analyses demonstrate the securty and effcency of EPAS n terms of prvacy-preservng and low authentcaton delay. Index Terms Vehcular Ad Hoc Networks; Emergency Communcaton; Condtonal Prvacy Preservng; Batch Verfcaton I. INTRODUCTION Vehcular ad hoc networks (VANETs) are a knd of specfc wreless sensor networks of vehcles, equpped wth wreless communcaton devces. The vehcles can communcate wth each other (VV) and wth the roadsde unts RSUs (VR) by means of the Dedcated Short- Range Communcaton protocol (DSRC) [] provdng drvers wth traffc nformaton for drvng safety [], and nfotanment nformaton to mprove the drvng experence [3]. Accordng to DSRC, vehcles broadcast traffc safety message every ms. In hgh traffc densty scenaro, verfyng every message wll brng great computaton overhead. In addton to computatonal effcency, prvacy requrements are also essental as the safety packet contans prvacy-related nformaton about user s geographcal locaton and personal predlecton. To make VANETs practcal n use, securty and prvacy requrements must be guaranteed frst of all other ssues. Lots of schemes [4-5] have been devoted to solve the above problems wth [4][5][0-3] dedcated to drvng safety assurance, and [4] for entertanment servces, respectvely. But all these schemes are based on the assumpton that RSUs cover the entre network, whch s unrealstc durng the ntal deployment of VANETs and napplcable to emergency communcaton n dsaster condtons. Recently, large-scale natural dsasters have occurred frequently over the world. Takng Wenchuan earthquake [6] as an example, the dsaster-affected area was an solated sland to some extent as nfrastructures ncludng communcaton, transportaton, and power facltes were destroyed. Wreless emergency communcaton system s mperatve to collect real-tme nformaton and gve feedbacks. There have been researches dedcated to routng [7] n ad hoc networks, and vehcle routng [8][9], but no emergency communcaton scheme based on VANETs has been proposed. We, for the frst tme, apply VANETs to emergency communcaton durng dsaster rescue. A specfc network model s proposed, as shown n Fg.. Durng Fgure. Network model do:0.4304/jsw

2 JOURNAL OF SOFTWARE, VOL. 8, NO. 8, AUGUST emergency communcaton, no fxed nfrastructure exstng, vehcles n the dsaster area need to regster tmely wth the authorty for subsequent communcaton. Therefore, secure and effcent scheme s needed for vehcle regstraton and communcaton n the absence of fxed RSU. In addton, prvacy requrements and authentcaton effcency should be guaranteed. Thus, an Effcent Prvacy-preservng Authentcaton Scheme (EPAS) s proposed based on the network model. We assume the dsaster relef authorty (DRA) and emergency communcaton cars (ambulances or fre trucks, AMBs for short) enter the dsaster-affected area. Vehcles n the area can regster themselves wth DRA va AMB for subsequent rescue communcaton. II. RELATED WORKS Researches n secure authentcaton and prvacy protecton have been qute actve n recent years. Numbers of schemes have been proposed. Accordng to the pattern n whch messages are verfed, these exstng authentcaton schemes can be classfed nto two categores,.e., one-by-one message verfcaton [9]-[] and batch verfcaton [3]-[5] schemes. In addton, there are many schemes dedcated to prvacy problem [4]-[8]. For prvacy protecton n VANETs, there are two knds of commonly used technque, group sgnature and Mx-zone pseudonym-changng pseudonym wthn specfed regon. TACK [4] and TARI [5] both adopted [6], a group sgnature mechansm whch supported trackng and revocaton of anonymous sgnature, to obtan short-term anonymous certfcates. For exstence of group managers, a rng sgnature scheme [7] was proposed to meet prvacy protecton wthout group manager. Reference [8] amed to establsh Mx-zones at socal ponts to acheve prvacy protecton. However, Mx-zone pseudonym scheme s vulnerable to terran-based montorng technologes, whle both group sgnature and rng sgnature are tme consumng n verfcaton. The one-by-one verfcaton schemes are characterzed by smple to use and large verfcaton delay. In 007, Raya, etc. proposed [9] to realze authentcty and prvacy. However, publc key nfrastructure (PKI) based scheme has the problem of certfcates transmsson and management. Subsequently, Ln et al. proposed a group sgnature scheme GSIS [0], elmnatng the publc key certfcates. RAISE [] was a RSU-asssted verfcaton scheme. Secret key shared between vehcle and RSU was used to generate message authentcaton code (MAC). Nevertheless, RSU authentcated message one by one and broadcasted 8B hash value for each vald message, whch brought heavy communcaton burden. CMAP [] embraced cooperaton verfcaton dea to mprove effcency. Verfers were chosen based on locaton, and non-verfers wated for the verfer s results. Due to the uncertanty of the vehcle speed and road condtons, the scalablty and practcalty of CMAP are facng questonng. All the above schemes are not effcent as the number of messages can be very large n VANETs. IBV [3] devsed dentty based (ID-based) sgnature to realze batch verfcaton. IBV s major flaw s that any malcous vehcle V j can easly forge the sgnature of V. In addton, t can t detect nvald sgnatures. If the verfcaton fals, all messages wll be dscarded. ABAKA [4] was merely devsed to entertanment servce. CPAS [5], adopted pseudonyms to protect prvacy and realze batch verfcaton between the vehcle and the RSU. But the Prvate Key Generator (PKG) s essental to generate user prvate key,.e. key escrow. In addton, sgnature verfcaton s based on blnear parng operaton whch s of large computatonal overhead. The comparson of the aforementoned programs s shown as Table Ⅰ, from whch we can see they are all not applcable to emergency communcaton, as roadsde nfrastructures are assumed to cover the entre network n all the schemes. To apply VANETs to emergency communcaton, we present an Effcent Prvacy-preservng Authentcaton Scheme (EPAS) n ths paper. In alluson to the condtonal prvacy problem, an exclusve secret key s establshed between the vehcle and DRA, only allowng DRA to track malcous vehcles from the pseudonyms. In addton, lghtweght sgnature and batch verfcaton are combned to reduce computaton and communcaton cost, provdng fast and effcent authentcaton. In addton, for vehcle group communcaton, a group formaton scheme s presented to allow vehcles to effcently authentcate each other n the same group. Schemes Communcaton patterns TABLE I. COMPARISON OF RELATED WORKS Cryptographc bass Condtonal prvacy preservng Batch verfcaton Emergency communcaton No Vehcle group RSU communcaton TACK[4] VR Group Sgnature GSIS[0] VV & VR Group & ID-based Sgnature RAISE[] RSU-based VV PKI Sgnature & MAC Code CMAP[] VV Group Sgnature IBV[3] VR ID-based Sgnature CPAS[5] VR ID-based Sgnature wth PKG

3 96 JOURNAL OF SOFTWARE, VOL. 8, NO. 8, AUGUST 03 III. SYSTEM MODEL AND PRELIMINARIES VANETs for emergency rescue are dfferent from the ordnary network model, as the RSUs are serously damaged. We propose an approprate network model and an effcent authentcaton scheme sutable for ths model. To facltate the specfcaton of our scheme, we frst brefly descrbe the system model, the desgn objectves and the basc presuppostons. A. System Model The actual crcumstance we consder s emergency communcaton n dsasters relef. Accordng to the accurate envronment, a two-layer network model s proposed, as shown n Fg.. The upper layer comprses the Trust Authorty (TA) and the dsaster relef authorty DRA, whle the lower layer s composed of vehcles and AMBs. TA s responsble for ssung real dentfcaton RID to vehcles and prvate/publc key pars to all partes. Most mportantly, TA s always trusted and can never be compromsed. So s DRA, who has made contract and can communcate securely wth TA. AMBs are equpped wth powerful devces of stronger computaton and communcaton capablty than regular vehcles. The communcaton range of AMB can be larger than that of ordnary vehcles. Wthn ts communcaton range, AMB s responsble for forwardng n-tme regstraton messages from vehcles to the DRA and assstng group formaton. AMBs communcate securely wth DRA. In Fg., the dotted lne ndcates the communcaton range of a group, n whch vehcles communcate wth each other based on the wreless communcaton standard IEEE 80.p. There are two types of communcaton n our model: the vehcle to DRA communcaton (VD) and the vehcle group communcaton (VV). DRA verfes vehcle messages n batch to save the computatonal overhead, and takes comprehensve data analyss for reasonable rescue plans. B. Desgn Objectves In vehcular ad hoc networks for emergency communcaton, an effcent authentcaton scheme needs to satsfy the followng sx goals: regstraton wthout RSU, sender authentcaton and message ntegrty, condtonal prvacy, revocablty, low communcaton overhead and fast verfcaton, and nternal attacks preventon, whch are further dscussed as below. Regstraton wthout RSU: There s no RSU n the emergency communcaton. Effcent vehcle regstraton scheme s needed for vehcles wthout RSUs, as they can authentcate each other only after regstraton. Sender authentcaton and message ntegrty: The recevers need to authentcate that the messages are ndeed sent by legtmate enttes and are not tampered durng the transmsson. Ths s enforced by sgnatures. Condtonal prvacy: A secure scheme must prevent eavesdroppers from gettng the prvate key of vehcles or lnkng to the vehcle s real dentty from the messages. On the other hand, when the malcous vehcles are found or vehcles are n dspute for an emergency accdent, t s necessary to allow the TA to trace back to the vehcle s real dentty. Revocablty: When vehcles are n dspute or the content of a message s bogus, the authorty should be able to retreve the real dentty and revoke t from the network. The authorty notfes the network of llegal vehcles n tme, preventng the revoked vehcle from partcpatng n the communcatons. Low communcaton overhead and fast verfcaton: Due to the urgent tme requrement of message authentcaton and lmted bandwdth, safety verfcaton program should also consder the effcency requrements n terms of low communcaton overhead and fast authentcaton. Internal attacks preventon: Legtmate vehcles cannot get the key nformaton of other vehcle, or forge a legal sgnature of the other vehcle. Even f some vehcles are captured by the attacker, the attacker can t obtan other legtmate vehcle s prvate key wth the captured vehcles. C. Basc Presuppostons An ellptc curve s a cubc equaton of the form y +axy+by=x 3 +cx +dx+e, where a, b, c, d, and e are all real numbers. In an ellptc curve cryptography (ECC) system, the ellptc curve equaton s defned as the form of Eq(a, b): y =x 3 +ax+b (mod q), over a prme fnte feld F q, where a, b F q, q>3, and 4a 3 +7b 0(mod q) [0]. In general, the securty of ECC depends on the dffcultes of the followng problems [][]. Defnton. Ellptc Curve Dscrete Logarthm Problem (ECDLP) Gven two ponts P and Q over Eq(a, b), the ellptc curve dscrete logarthm problem (ECDLP) fnds an nteger x Fq such that x P=Q. Defnton. Computatonal Dffe-Hellman Problem (CDHP) Gven three ponts P, sp and tp over Eq(a, b) for s, t F q, the computatonal Dffe-Hellman problem fnds the pont (st)p over Eq(a, b). IV. EPAS The proposed Effcent Prvacy-preservng Authentcaton Scheme (EPAS) employs dentty based cryptography. Thus, there s no delvery and management of certfcates. In consderaton of computatonal overhead, pont multplcatons nstead of blnear operatons are used to generate lghtweght sgnature. Thus the computaton overhead and communcaton overhead are largely saved. Specfc to the prvacy destructon problem caused by key preload, sesson key agreement protocol s proposed to establsh an ndvdual sesson key between vehcle and the credble authorty DRA durng vehcle regstraton. Ths sncerely guarantees the condtonal prvacy protecton requrements. The Effectve Prvacy-preservng Authentcaton Scheme (EPAS) s composed of two sub-schemes: Scheme and Scheme, for vehcle to DRA communcaton and vehcle group communcaton respectvely. The

4 JOURNAL OF SOFTWARE, VOL. 8, NO. 8, AUGUST prme symbols used n the paper are defned as the followng Table Ⅱ. TABLE II. NOTATION Notaton Descrpton TA Trust Authorty DRA Dsaster Relef Authorty AMB Emergency Communcaton Car V Vehcle RID Real Identty of Vehcle PK DRA / SK DRA Publc/Prvate Key of DRA PK / SK Publc/Prvate Key of V h One-way Hash Functon h:{0,} * Z * q H Map to Pont Functon H: {0,} * G k Shared Secret between V and DRA ID Pseudonym of V CSK Correspondng Prvate Key of ID GPK Group Publc Key of V GSK Group Secret Key Concatenaton Operaton A. System Intalzaton and Vehcle Regstraton. System ntalzaton Accordng to the standard IEEE609. [3], there exsts PKI to provde key management. The DRA and vehcles have a par of publc/prvate keys and the publc key certfcate sgned by TA. System ntalzaton s completed by TA to establsh the publc parameters of the system. Let G be a cyclc addtve group generated by the P wth the order q; TA pcks h, H, and establshes the publc parameters {G, q, P, h, H}; DRA, AMBs, and vehcles download the system parameters {G, q, P, h, H} from TA; The DRA randomly chooses s Z * q as ts prvate secret key used to generate group secret key.. Vehcle regstraton Durng the regstraton process, a sesson key agreement scheme s proposed to establsh a shared secret between vehcle and DRA va AMB, as shown n Fg.. The secret s just known to the vehcle tself and the DRA, thus ensurng only the DRA can trace to the real dentty of a vehcle, and revoke malcous vehcle from the network. Ths can be acheved by the modfed Dffe- Hellman sesson key agreement scheme secured wth sgnature. The processes of mutual authentcaton and key agreement are shown as follows. Fgure. Vehcle regstraton Step: Frst, vehcle V randomly selects a Z * q, and concatenates the random element P a and ts real dentty. Next, V encrypts the concatenaton wth the DRA s publc key. Then V encrypts the concatenaton of the encrypton and the tme stamp and gets RM as a RM = (T ( P RID) ) () PKDRA PKAMB Fnally, V sends RM to the AMB. Step: Recevng the frst message RM from vehcle V, AMB decrypts and verfes the tme stamp. If the message s new, t delvers the rest part of the message,.e., RM, to DRA securely. Otherwse, t dscards the message and wats for new regstraton messages. a RM = ( P RID) PK () DRA Step3: DRA decrypts the message and verfes the real dentty RID. If RID s n the revoke lst (RL), the message s abandoned. Otherwse, DRA randomly chooses b Z * q, gets k =P ab. Next, DRA sgns the concatenaton of P a and P b and then encrypts the sgnature and P b by V s publc key. Then the encrypted message b a b RM 3 = ( P ( P P ) ) (3) SKDRA s sent to AMB securely. Step4: AMB passes the message to vehcle V. RM4= RM3 (4) Step5: The vehcle verfes the DRA s sgnature, and f vald, sends ts own sgnature on P a and P b to the DRA va AMB. PK a b RM 5 = ( P P ) (5) Step6: DRA authentcates the sgnature. If t s vald, a shared secret between V and DRA has been establshed through the above steps. RM6= RM5 (6) The shared secret s k =P ab, whch s employed to generate pseudonyms by the vehcle V. The actual dentty of the vehcle can only be traced by DRA to ensure the condtonal prvacy protecton. B. Pseudonym Generaton In the dentty based cryptography, the entty s publc key can be generated based on ts dentty. Compared to tradtonal PKI based scheme, there s no certfcates management and transportaton. Thereby computaton and communcaton overhead are greatly economzed. Dfferent pseudonyms are used to sgn messages durng the communcaton process, to protect the vehcle s locaton prvacy from beng tracked or assocated. The pseudonym ID conssts of three parts: ID, ID, LT, where ID and ID are the pseudonym materal and LT s the pre-defned lfe perod of the pseudonym. Frst of all, the vehcle selects a random number r Z * q to establsh pont R G, so that R =(x, y )=r P. The vertcal SK

5 98 JOURNAL OF SOFTWARE, VOL. 8, NO. 8, AUGUST 03 and horzontal coordnates of each pont of are ntegers wthn F q. Then, the vehcle generates pseudonym as ID= h( R ), ID = RID H ( k ID LT), whch only allows the DRA to reveal the real dentty of malcous vehcles. Because only the vehcle and the DRA know the secret generatng the pseudonym, the thrd party s unable to obtan the true dentty of the vehcle. The correspondng prvate key CSK s CSK= h( ID k) P. So the vehcle V generates ts own pseudonym as ID = ( ID, ID, LT) ID= h( R) ID = RID H ( k ID LT) and the correspondng prvate key as (7) CSK= h( ID k) P (8) In the end, the vehcle V stores a lst of the pseudonyms ID wth ts correspondng prvate key CSK and the random ponts R. Notce that, ) t s essental to nsert lfe perod LT nto every pseudonym to prevent attackers from abusng obsolete pseudonyms; ) the pseudonyms and the prvate keys can be completed pror to jonng the network communcaton. Thus, the delay of sgnng a message does not nclude the tme generatng a pseudonym and the prvate key. C. EPAS When facng a mass of VANETs messages, vehcles may be not able to verfy every message before ts deadlne as the large computatonal overhead, resultng n hgh packet loss rate. Whle packet loss may serously mpact the securty applcatons, savng computatonal overhead s a major consderaton for vehcles lmted resources. Pont multplcatons are adopted nstead of blnear operatons to sgn and verfy message, as one parng operaton costs 4.5ms whle the pont multplcaton only 0.6ms [4]. In addton, batch verfcaton allows verfer to authentcate messages n batch to provde hgh effcency.. Scheme:VD communcaton The vehcle V s sgnature σ on message M conssts of two parts, σ =( S, S ) as S = R + h( M ID) CSK S = xp where x s the horzontal coordnate of the pont R. Then V sends the message packet <ID, M, σ, T > to the DRA va AMB. AMBs can just forward vehcles messages to the DRA n ths knd of communcaton, but could not verfy the messages, because the secret key k s only known to the vehcle and the DRA. In order to acheve the communcaton between vehcles, a group communcaton scheme s descrbed n the next secton. The vehcle s message can be verfed one by one or n batch by DRA. Batch verfcaton can acheve verfyng a number of messages at once, to save computatonal (9) overhead and verfcaton tme. The batch verfcaton can also make the DRA react tmely to the dsaster stuaton and dspatch the nearby ambulance. Next, the processes of batch verfcaton are ntroduced n detal. Gven n dstnct sgnatures σ, σ, σ 3,, σ n receved from V, V, V 3,, V n respectvely, the DRA frst checks the tmestamp n the message, verfes the freshness of the message, and deletes outdated ones. Then DRA calculates the vehcle s prvate key and the pont R wth k. Untl now, t s the same as sngle message authentcaton. Fnally, DRA verfes all the sgnatures n one operaton. The specfc verfcaton steps are as follows: For freshness, DRA frst checks the transmsson delay. Assumng the tme DRA recevng the message s T n, DRA checks whether ΔT T n -T s vald, where ΔT s the preset maxmum transmsson delay. If the nequalty holds, then contnue the verfcaton; otherwse, the DRA dscards the outdated message. Ths step s done for every message. DRA calculates the vehcle s correspondng prvate key accordng to (8) CSK =h(id k )P. Calculate the pont R = S -h(m ID )CSK. Authentcate all the sgnatures by verfyng f (9) n holds: S? ( ) x P. = The DRA needs to fnd out the shared secret k wth V, V, V 3,, V n respectvely, by checkng whch of the stored pars (RID, k ) satsfy (7) ID = RID H( k ID LT). Durng the verfyng process, the prvate key CSK and the random pont R need to be calculated to acheve authentcaton. However, the securty of our scheme s not destroyed. The DRA s completely trustable, and the prvate key can not reveal the vehcle s real dentty. In addton, vehcles change the pseudonym perodcally.. Scheme: vehcle group communcaton The above verfcaton processes are only sutable for communcaton between the vehcle and the DRA. Durng the rescue process, vehcles also need to communcate wth each other to tmely exchange nformaton. Therefore, we desgned a vehcle group communcaton scheme, whch s based on the aforementoned pseudonym sgnature. Sgnng and verfcaton only requre pont multplcatons to ensure fast verfcaton and reduce the computatonal overhead. ) Group formaton Ths sub-secton shows how a group of known vehcles form a communcaton group, and how they securely communcate wth each other. The establshment of the group s dvded nto four stages: applcaton stage, agreed stage, valdaton stage, and key establshment stage. AMB launches the message M ={GR, ID, ID, ID 3,, ID n } to start the group establshment, where GR ndcates t s the group request message. Vehcle recevng the message checks for ts own pseudonym ID j. If found, t sgns the agreed message M j ={GA, ID j } and sends t to DRA va AMB.

6 JOURNAL OF SOFTWARE, VOL. 8, NO. 8, AUGUST Recevng the request message and all the agreed messages, the DRA batch-verfes all the sgnatures. Only f the verfcaton succeeds, the DRA carres on to the group key generaton phase. Otherwse, the DRA suspends the protocol and wats for new request. If all the sgnatures are vald, the DRA establshes the group key for the group members. It selects a random number ran, and sets the group prvate key as GSK=s ranp, whle the group publc key for each member s set GPK =k P. The DRA encrypts the shared group prvate key wth each k respectvely, and broadcasts the message M={ID, ID,, ID n, E ( ) k GSK, E ( ) k GSK,, E ( ) k n GSK } wth ts sgnature SIGSK DRA ( M ). The group members frst verfy DRA s sgnature and then conduct decrypton wth the k to get the group prvate key GSK. ) Group communcaton Vehcles can authentcate each other wthn the group to realze real-tme communcaton. Note that DRA s stll able to verfy the group messages. Wth the pre-generated pseudonym (7), and the group prvate key GSK, a vehcle generates the group message sgnature σ as S= R+ h( M ID) GSK S = xp (0) The GSK s employed to generate sgnatures of group message. The group message s broadcasted n the format <ID, M, σ, T >, where two bts can be added to dstngush the group message and vehcle-to-dra message. But these two bts are not counted n the communcaton overhead. Recevng the message, the verfer V j frst checks the tme valdty. If the aforementoned step s vald, t comes to the sgnature verfcaton. Frstly, V j calculates the pont R= S- h( M) GSK wth the group prvate key GSK. Then, V j verfes the sgnature by checkng whether S = xp holds. Note that batch verfcaton s also applcable to the group communcaton, provdng a much smaller computng overhead and verfcaton delay. Vehcles and the DRA can both carry out batch verfcaton to acheve effcency. In Scheme, (n+) pont multplcatons are needed when the DRA verfes n message, whle n Scheme, only (n+) pont multplcatons. D. Dscusson Traceablty: Gven the pseudonym ID, only the trust authorty DRA, havng the shared secret k, can trace the actual dentty RID. Therefore, once vehcles are n dspute about a sgnature or are found to abuse the VANETs, the DRA has the ablty to trace the vehcle from the dsputed message sgnature, by whch the traceablty can be well satsfed. The trackng process s as follows: ID H ( k ID LT ) = RID RID H k ID LT H k ID LT RID ( ) ( ) = () Invald sgnature detecton: If there s one nvald sgnature n the batch, t wll lead to falure of the entre batch verfcaton. In VANETs, nvald sgnature may be caused by many cases, lke malcous vehcles or the hardware malfuncton of legtmate vehcles. Therefore, nvald sgnature detecton mechansm s necessary. We adopt the bnary search method to check for nvald sgnatures, as ABAKA [4]. When the batch verfcaton fals, the batch s bsected, and verfed respectvely untl only one message left or vald. Revocaton check: Before jonng the network, new vehcles need to complete regstraton wth the DRA va AMB. When DRA receves V s request, t must check f the requestng vehcle s n the sorted revocaton lst (RL) by runnng Algorthm. If the returned value of Algorthm s, the revocaton s detected. Then DRA rejects the regstraton request. Otherwse, DRA contnues the regstraton process. Algorthm Revocaton Detecton. RDetAlg(RL, l, r, RID ):. begn 3. md= l+ r ; 4. f RL[md]=RID then return Found=; 5. else f RL[md]>RID then r=md-; RDetAlg(RL, l, r, RID ) 6. else l=md+; RDetAlg(RL, l, r, RID ); 7. end f 8. end V. SECURITY ANALYSIS We analyze of the securty performance of the proposed scheme n ths chapter. Accordng to the securty objectves aforementoned, we manly focus on the followng four aspects: sender authentcaton and message ntegrty, nternal attacks preventon, condtonal prvacy protecton and revocablty, effcency. ) Sender authentcaton and message ntegrty: The proposed scheme EPAS securely acheves sesson key establshment, mutual authentcaton between vehcles, and DRA batch-verfyng vehcles messages. The adopted Dffe-Hellman sesson key agreement scheme secured wth sgnature has been proven secure. The vehcle generates pseudonym and correspondng prvate key wth the unque secret key, whch guarantees no one else can forge ts pseudonym and sgnature. Once the message content s dstorted durng the transportaton, the sgnature verfcaton can t be vald. Ths ensures that only the unmodfed messages from legtmate senders are accepted. ) Internal attacks preventon: An mportant securty property of our EPAS s the ablty to prevent nternal attacks. Even f an attacker has captured some legtmate vehcles and ther prvate secrets, the attacker stll can t use the nformaton to forge other legtmate vehcle s sgnature. In addton, the damage caused by the captured

7 90 JOURNAL OF SOFTWARE, VOL. 8, NO. 8, AUGUST 03 vehcles s also lmted, because the trackng mechansm can quckly determne the real dentty of these vehcles, and TA can promptly revoke the malcous vehcles from the network. 3) Condtonal prvacy protecton and revocablty: The actual dentty of a vehcle s concealed by the pseudonym. On the other hand, the authorty DRA, and only the DRA can reveal the real dentty. For example, once V s found msbehavng, the ID s reported to DRA. The DRA traces the real dentty RID through () and sends t to TA, who determnes whether to revoke V or not. The specfc revocaton mechansm s out of the scope of our paper. 4) Effcency: Pseudonym mechansm s adopted n order to save communcaton overhead. To acheve fast authentcaton and save the computatonal overhead, we employ the dea of batch valdaton. In addton, the sgnature s generated through pont multplcatons, whose computatonal overhead s just 0.6ms much smaller than 4.5ms of blnear parng. The message verfcaton procedure only needs two pont multplcatons n the group communcaton scheme, whch can sgnfcantly mprove the effcency. VI. PERFORMANCE EVALUATION In ths secton, we evaluate the performance of the proposed scheme EPAS n terms of verfcaton delay and transmsson overhead. In the smulaton, our scheme EPAS s compared wth three related typcal schemes IBV [3], ABAKA [4], and ECDSA [3]. IBV and ABAKA are typcal batch verfcaton schemes, whle ECDSA sgnature scheme s adopted by the current standard IEEE 609. and some other schemes such as RAISE []. A. Verfcaton Delay Let T mtp denotes the tme of a MapToPont hash operaton, T mul the tme of performng one pont multplcaton over an ellptc curve, and T par the tme of a blnear parng operaton. Accordng to [4], T mul s 0.6 ms, T mtp s 0.6 ms and T par s 4.5ms. So the operaton tme of T mul and T mtp s much smaller than T par. The computaton cost manly focus on the above three parameters. Our EPAS doesn t need the parng operaton. We don t consder the cost of one-way hash functon, whch s only mcroseconds. The computatonal overhead of the schemes s gven n Table Ⅲ. TABLE III. COMPUTATIONAL OVERHEAD Schemes Authentcate a sngle Authentcate n message messages IBV 3T par +T mtp +T mul 3T par +nt mtp +nt mul ECDSA 4T mul 4nT mul ABAKA 7T mul (n+5)t mul EPAS: Scheme 3T mul (n+)t mul EPAS: Scheme T mul (n+)t mul From the comparson, we can see the proposed scheme EPAS Scheme acheves the least verfcaton overhead for both one-by-one message authentcaton and batch verfcaton. To verfy n dstnct sgnatures, IBV needs 3T par +nt mtp +nt mul, ECDSA 4nT mul and ABAKA (n+5)t mul, whle our scheme EPAS only (n+)t mul and (n+)t mul. The ECDSA verfes n dstnct sgnatures one by one, so the n-messages verfcaton s not effcent. In addton, snce ECDSA s not dentty based, addtonal operatons are needed to verfy the certfcate of publc key. Although IBV s a batch verfcaton scheme, the basc parng operaton s computatonal costly. The verfcaton cost of ABAKA s close to that of our Scheme, but much hgher than the Scheme. Verfcaton delay (ms) IBV ECDSA ABAKA SCHEME SCHEME Traffc densty (#) Fgure 3. Verfcaton delay wth dfferent traffc densty The verfcaton delay of all the fve schemes s obvously presented n Fg. 3. We can see from the fgure apparently that the computatonal overhead and the verfcaton delay ncrease lnearly wth the number of messages for all these schemes. Our EPAS s superor to all the other typcal schemes, especally Scheme. Ths s because our EPAS adopts lghtweght pont multplcatons to sgn and verfy messages. The rato of the message verfcaton delay of these schemes s shown n Fg. 4, wth (a) for Scheme and (b) for Scheme respectvely. It s obvous that the delay rato between EPAS Scheme and IBV s always less than 0.50 no matter the number of messages; the delay rato between EPAS Scheme and ECDSA s approxmately 0.5 when the number of messages s larger than 60. In other words, the verfcaton speed of EPAS s twce of IBV s, and s almost 70% faster than the current standard ECDSA. Verfcaton delay rato Scheme/IBV Scheme/ECDSA Scheme/ABAKA Traffc densty (#) (a)

8 JOURNAL OF SOFTWARE, VOL. 8, NO. 8, AUGUST 03 9 Verfcaton delay rato Scheme/IBV Scheme/ECDSA Scheme/ABAKA Traffc densty (#) (b) Fgure 4. Verfcaton delay rato wth dfferent traffc densty B. Transmsson Overhead In ths sub-secton, we compare the transmsson overhead of the fve schemes. The comparson s n terms of the sgnature and the certfcate appended to the orgnal message, whle the message tself s not counted. As shown n Table Ⅳ, for IBV, the length of sgnature s bytes, and 4 bytes for pseudonym. ABAKA s authentcaton materals consst of 0 bytes verfcaton message and 0 bytes materal message, resultng n a sgnature of 40 bytes. ECDSA sgnature s 4 bytes, but a certfcate of 5 bytes must be transmtted along wth the message. And the total transmsson overhead of the ECDSA scheme s 67 bytes. Besdes, as the number of messages ncreases, the transmsson overhead ncreases lnearly for all the schemes. TABLE IV. TRANSMISSION OVERHEAD Schemes One message n messages IBV 63B 63nB ECDSA 67B 67nB ABAKA 80B 80nB EPAS: Scheme 8B 8nB EPAS: Scheme 8B 8nB Snce the IBV scheme adopts blnear parng cryptographc operatons for sgnature, whch s short n length but costly n verfcaton, the total transmsson overhead of IBV s 63 bytes as the shortest. The transmsson overhead of ECDSA s the largest because of certfcate overhead. Our two proposals have the same transmsson cost, whch s a bt larger than ABAKA as bytes lfe perod LT s added to the pseudonym n our scheme to prevent expred pseudonyms abuse. Although the transmsson overhead of IBV s much smaller than the other four schemes, t has a serous flaw of sgnature forgng, whch makes IBV napplcable to safety applcatons. VII. CONCLUSION In ths paper, we have proposed an Effcent Prvacypreservng Authentcaton Scheme (EPAS) for VANETsbased emergency communcaton, whch contans two effcent communcaton patterns: vehcle-to-dra communcaton and vehcle group communcaton. The EPAS adopts pseudonym based sgnature, effectvely preventng the leak and track of vehcle s prvacy nformaton. On the other hand, the authorty can trace the malcous vehcle to protect the securty of VANETs. From the experment results, the proposed scheme releves the bottleneck problem of one-by-one message verfcaton, and reduces the computatonal overhead and the transmsson overhead n VANETs. But the performance analyses of the proposed scheme are not very comprehensve and we have not explored the specfc revocaton mechansm. REFERENCES [] Dedcated Short Range Communcatons (DSRC), Avalable: src. [] USA Department of Transportaton, Natonal Hghway Traffc Safety Admnstraton, Vehcle Safety Communcatons Project, Fnal Repot, 006. [3] S Lee, G Pan, J Park, M Gerla, S Lu, Secure ncentves for commercal ad dssemnaton n vehcular networks, In Proceedngs of the ACM Internatonal Symposum on Moble Ad Hoc Networkng and Computng (MobHoc 07), pp.50-59, 007. [4] A Studer, E Sh, F Ba, and A Perrg, TACKng Together Effcent Authentcaton, Revocaton, and Prvacy n VANETs, In Proceedngs of the IEEE Communcatons Socety Conference on Sensor, Mesh and Ad Hoc Communcatons and Networks (SECON), pp.-6, June 009. [5] R Chen, D Ma, A Regan, TARI: Meetng Delay Requrements n VANETs wth Effcent Authentcaton and Revocaton, In Proceedngs of WAVE, 009. [6] D Boneh, H Shacham, Group sgnatures wth verferlocal revocaton, In Proceedngs of the ACM conference on Computer and communcatons securty(ccs), pp.68-77, 004. [7] B-K Chaurasua, S Verma, Condtonal prvacy through rng sgnature n vehcular ad-hoc networks, Transactons on Computatonal Scence, Sprnger, vol. 6750, pp.47-56, 0. [8] R-X Lu, X-D Ln, T-H Luan, Pseudonym changng at socal spots: an effectve strategy for locaton prvacy n VANET, IEEE Transacton on Vehcular Technology, vol. 6, no., pp.86-96, Jan, 0,. [9] M Raya, J-P Hubaux, Securng vehcular ad hoc networks, Computer Securty, IOS, vol. 5, no., pp , Jan [0] X Ln, X Sun, P-H Ho, X Shen, GSIS: A Secure and Prvacy-Preservng Protocol for Vehcular Communcatons, IEEE Transactons on Vehcular Technology. vol. 56, no. 6, pp , Nov [] C Zhang, X Ln, R Lu, P-H Ho, X. Shen, An effcent message authentcaton scheme for vehcular communcatons, IEEE Transacton Vehcular Technology, vol. 57, no. 6, pp , Nov [] Y Hao, Y Cheng, CH Zhou, W Song, A Dstrbuted Key Management Framework wth Cooperatve Message Authentcaton n VANETs, IEEE Journal on selected areas n communcatons, vol. 9, no. 3, pp.66-69, Mar. 0.

9 9 JOURNAL OF SOFTWARE, VOL. 8, NO. 8, AUGUST 03 [3] C Zhang, R Lu, X Ln, P-H Ho, X. Shen, An Effcent Identty-based Bath Verfcaton Scheme for Vehcular Sensor Networks, INFOCOM, pp.46-50, 008. [4] J-L Huang, L-Y Yeh, H-Y Chen, ABAKA: An Anonymous Batch Authentcated and Key Agreement Scheme for Value-Added Servces n Vehcular, IEEE Transacton On Vehcular Technology, vol. 60, no., pp. 48-6, Jan. 0. [5] K-A Shm, CPAS: An Effcent Condtonal Prvacy- Preservng Authentcaton Scheme for Vehcular Sensor Networks. IEEE Transactons on Vehcular Technology, vol.6, no.4, pp , May 0. [6] 008 Schuan Earthquake. Avalable: org/wk/008_schuan_earthquake. [7] X Guo, T Feng, ZH Yuan, Multple Node-dsjont Paths Dstance Vector Routng for Ad hoc Networks, Computer Scence, vol. 38, no., pp. 86-9,0. [8] C Ren, Solvng Mn-Max Vehcle Routng Problem, Journal of Software, vol. 6, No. 9, pp , Sep. 0. do:0.4304/jsw [9] J L, Vehcle Routng Problem wth Tme Wndows for Reducng Fuel Consumpton, Journal of Computers, vol. 7, No., pp , Dec. 0. do:0.4304/jcp [0] D Hankerson, A Menezes, S Vanstone, Gude to Ellptc Curve Cryptography, Sprnger-Verlag, 004. [] F L, X Xn, Y Hu, Identty-based broadcast sgncrypton, Computer Standard & Interfaces, vol. 30, no. -, pp , Jan [] J-H Yang, C Chang, An ID-based remote mutual authentcaton wth key agreement scheme for moble devces on ellptc curve cryptosystem, Computer Securty, vol. 8, no. 3-4, pp , 009. [3] IEEE Standard IEEE Tral-Use Standard for Wreless Access n Vehcular Envronments - Securty Servces for Applcatons and Management Messages, July 006. [4] C Zhang, P-H Ho and J Tapolca, On batch verfcaton wth group testng for vehcular communcatons,wreless Networks, vol.7, no. 8, pp , 0. Xuedan Ja was born n Chna n 988. She s a master degree canddate n Jangsu Unversty. Her research nterests nclude secure authentcaton and prvacy preservaton technology for VANETs. Langmn Wang was born n Chna n 977. He s an assocate professor n Jangsu Unversty and a specal term professor n Anhu Unversty. Hs research nterests nclude securty and prvacy-preservng technology for the Internet of Thngs.

Efficient Large Integers Arithmetic by Adopting Squaring and Complement Recoding Techniques

Efficient Large Integers Arithmetic by Adopting Squaring and Complement Recoding Techniques The th Worshop on Combnatoral Mathematcs and Computaton Theory Effcent Large Integers Arthmetc by Adoptng Squarng and Complement Recodng Technques Cha-Long Wu*, Der-Chyuan Lou, and Te-Jen Chang *Department

More information

DRIVERS ANONYMITY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS NADER MAZEN RABADI DISSERTATION. Submitted to the Graduate School

DRIVERS ANONYMITY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS NADER MAZEN RABADI DISSERTATION. Submitted to the Graduate School DRIVERS ANONYMITY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS by NADER MAZEN RABADI DISSERTATION Submtted to the Graduate School of Wayne State Unversty, Detrot, Mchgan n partal fulfllment of the requrements

More information

Improving the Authentication Scheme and Access Control Protocol for VANETs

Improving the Authentication Scheme and Access Control Protocol for VANETs Entropy 2014, 16, 6152-6165; do:10.3390/e16116152 OPEN ACCESS entropy ISSN 1099-4300 www.mdp.com/journal/entropy Artcle Improvng the Authentcaton Scheme and Access Control Protocol for VANETs We-Chen Wu

More information

A Digital Content Distribution Using a Group-Key and Multi-layered Structure Based on Web

A Digital Content Distribution Using a Group-Key and Multi-layered Structure Based on Web A Dgtal Content Dstrbuton Usng a Group-Key and Mult-layered Structure Based on Web Yun-J Na and Il Seo Ko 2 Department of Internet Software, Honam Unversty 59-, Seobong-Dong, Gwangsan-Gu, Gwangju 506-74,

More information

A New Type of Weighted DV-Hop Algorithm Based on Correction Factor in WSNs

A New Type of Weighted DV-Hop Algorithm Based on Correction Factor in WSNs Journal of Communcatons Vol. 9, No. 9, September 2014 A New Type of Weghted DV-Hop Algorthm Based on Correcton Factor n WSNs Yng Wang, Zhy Fang, and Ln Chen Department of Computer scence and technology,

More information

Calculation of the received voltage due to the radiation from multiple co-frequency sources

Calculation of the received voltage due to the radiation from multiple co-frequency sources Rec. ITU-R SM.1271-0 1 RECOMMENDATION ITU-R SM.1271-0 * EFFICIENT SPECTRUM UTILIZATION USING PROBABILISTIC METHODS Rec. ITU-R SM.1271 (1997) The ITU Radocommuncaton Assembly, consderng a) that communcatons

More information

熊本大学学術リポジトリ. Kumamoto University Repositor

熊本大学学術リポジトリ. Kumamoto University Repositor 熊本大学学術リポジトリ Kumamoto Unversty Repostor Ttle Wreless LAN Based Indoor Poston and Its Smulaton Author(s) Ktasuka, Teruak; Nakansh, Tsune CtatonIEEE Pacfc RIM Conference on Comm Computers, and Sgnal Processng

More information

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS 1. Jiawen Kang, Rong Yu, Member, IEEE, Xumin Huang, and Yan Zhang, Senior Member, IEEE

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS 1. Jiawen Kang, Rong Yu, Member, IEEE, Xumin Huang, and Yan Zhang, Senior Member, IEEE IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS 1 Prvacy-Preserved Pseudonym Scheme for Fog Computng Supported Internet of Vehcles Jawen Kang, Rong Yu, Member, IEEE, Xumn Huang, and Yan Zhang,

More information

An Efficient Ownership Transfer Protocol for RFID Conforming to EPC Class 1 Generation 2 Standards

An Efficient Ownership Transfer Protocol for RFID Conforming to EPC Class 1 Generation 2 Standards Journal of Computers Vol. 27, No. 3, 2016, pp. 41-51 do:10.3966/199115592016102703005 An Effcent Ownershp Transfer Protocol for RFID Conformng to EPC Class 1 Generaton 2 Standards Fan-Shuo Lu 1 Ha-Bng

More information

EPDA: Enhancing Privacy-Preserving Data Authentication for Mobile Crowd Sensing

EPDA: Enhancing Privacy-Preserving Data Authentication for Mobile Crowd Sensing EPDA: Enhancng Prvacy-Preservng Data Authentcaton for Moble Crowd Sensng arxv:8.375v [cs.cr] 9 Nov 8 Jngwe Lu, Fanghu Ca, Longfe Wu, Rong Sun, Lehuang Zhu and Xaojang Du State Key Lab of ISN, Xdan Unversty,

More information

High Speed, Low Power And Area Efficient Carry-Select Adder

High Speed, Low Power And Area Efficient Carry-Select Adder Internatonal Journal of Scence, Engneerng and Technology Research (IJSETR), Volume 5, Issue 3, March 2016 Hgh Speed, Low Power And Area Effcent Carry-Select Adder Nelant Harsh M.tech.VLSI Desgn Electroncs

More information

MTBF PREDICTION REPORT

MTBF PREDICTION REPORT MTBF PREDICTION REPORT PRODUCT NAME: BLE112-A-V2 Issued date: 01-23-2015 Rev:1.0 Copyrght@2015 Bluegga Technologes. All rghts reserved. 1 MTBF PREDICTION REPORT... 1 PRODUCT NAME: BLE112-A-V2... 1 1.0

More information

Secure Transmission of Sensitive data using multiple channels

Secure Transmission of Sensitive data using multiple channels Secure Transmsson of Senstve data usng multple channels Ahmed A. Belal, Ph.D. Department of computer scence and automatc control Faculty of Engneerng Unversty of Alexandra Alexandra, Egypt. aabelal@hotmal.com

More information

Chaotic Filter Bank for Computer Cryptography

Chaotic Filter Bank for Computer Cryptography Chaotc Flter Bank for Computer Cryptography Bngo Wng-uen Lng Telephone: 44 () 784894 Fax: 44 () 784893 Emal: HTwng-kuen.lng@kcl.ac.ukTH Department of Electronc Engneerng, Dvson of Engneerng, ng s College

More information

Walsh Function Based Synthesis Method of PWM Pattern for Full-Bridge Inverter

Walsh Function Based Synthesis Method of PWM Pattern for Full-Bridge Inverter Walsh Functon Based Synthess Method of PWM Pattern for Full-Brdge Inverter Sej Kondo and Krt Choesa Nagaoka Unversty of Technology 63-, Kamtomoka-cho, Nagaoka 9-, JAPAN Fax: +8-58-7-95, Phone: +8-58-7-957

More information

Research of Dispatching Method in Elevator Group Control System Based on Fuzzy Neural Network. Yufeng Dai a, Yun Du b

Research of Dispatching Method in Elevator Group Control System Based on Fuzzy Neural Network. Yufeng Dai a, Yun Du b 2nd Internatonal Conference on Computer Engneerng, Informaton Scence & Applcaton Technology (ICCIA 207) Research of Dspatchng Method n Elevator Group Control System Based on Fuzzy Neural Network Yufeng

More information

Article Localization-Free Detection of Replica Node Attacks in Wireless Sensor Networks Using Similarity Estimation with Group Deployment Knowledge

Article Localization-Free Detection of Replica Node Attacks in Wireless Sensor Networks Using Similarity Estimation with Group Deployment Knowledge Artcle ocalaton-free Detecton of Replca Node Attacks n Wreless Sensor Networks Usng Smlarty Estmaton wth Group Deployment Knowledge Chao Dng 1, jun Yang, * and Meng Wu 3, * 1 College of Computer Scence,

More information

To: Professor Avitabile Date: February 4, 2003 From: Mechanical Student Subject: Experiment #1 Numerical Methods Using Excel

To: Professor Avitabile Date: February 4, 2003 From: Mechanical Student Subject: Experiment #1 Numerical Methods Using Excel To: Professor Avtable Date: February 4, 3 From: Mechancal Student Subject:.3 Experment # Numercal Methods Usng Excel Introducton Mcrosoft Excel s a spreadsheet program that can be used for data analyss,

More information

Prevention of Sequential Message Loss in CAN Systems

Prevention of Sequential Message Loss in CAN Systems Preventon of Sequental Message Loss n CAN Systems Shengbng Jang Electrcal & Controls Integraton Lab GM R&D Center, MC: 480-106-390 30500 Mound Road, Warren, MI 48090 shengbng.jang@gm.com Ratnesh Kumar

More information

Comparative Analysis of Reuse 1 and 3 in Cellular Network Based On SIR Distribution and Rate

Comparative Analysis of Reuse 1 and 3 in Cellular Network Based On SIR Distribution and Rate Comparatve Analyss of Reuse and 3 n ular Network Based On IR Dstrbuton and Rate Chandra Thapa M.Tech. II, DEC V College of Engneerng & Technology R.V.. Nagar, Chttoor-5727, A.P. Inda Emal: chandra2thapa@gmal.com

More information

Dynamic Optimization. Assignment 1. Sasanka Nagavalli January 29, 2013 Robotics Institute Carnegie Mellon University

Dynamic Optimization. Assignment 1. Sasanka Nagavalli January 29, 2013 Robotics Institute Carnegie Mellon University Dynamc Optmzaton Assgnment 1 Sasanka Nagavall snagaval@andrew.cmu.edu 16-745 January 29, 213 Robotcs Insttute Carnege Mellon Unversty Table of Contents 1. Problem and Approach... 1 2. Optmzaton wthout

More information

Time-frequency Analysis Based State Diagnosis of Transformers Windings under the Short-Circuit Shock

Time-frequency Analysis Based State Diagnosis of Transformers Windings under the Short-Circuit Shock Tme-frequency Analyss Based State Dagnoss of Transformers Wndngs under the Short-Crcut Shock YUYING SHAO, ZHUSHI RAO School of Mechancal Engneerng ZHIJIAN JIN Hgh Voltage Lab Shangha Jao Tong Unversty

More information

Digital Transmission

Digital Transmission Dgtal Transmsson Most modern communcaton systems are dgtal, meanng that the transmtted normaton sgnal carres bts and symbols rather than an analog sgnal. The eect o C/N rato ncrease or decrease on dgtal

More information

Resource Allocation Optimization for Device-to- Device Communication Underlaying Cellular Networks

Resource Allocation Optimization for Device-to- Device Communication Underlaying Cellular Networks Resource Allocaton Optmzaton for Devce-to- Devce Communcaton Underlayng Cellular Networks Bn Wang, L Chen, Xaohang Chen, Xn Zhang, and Dacheng Yang Wreless Theores and Technologes (WT&T) Bejng Unversty

More information

NFC Communications-based Mutual Authentication Scheme for the Internet of Things

NFC Communications-based Mutual Authentication Scheme for the Internet of Things Internatonal Journal of Network Securty, Vol.19, No.4, PP.631-638, July 2017 (DOI: 10.6633/IJNS.201707.19(4).17) 631 NFC Communcatons-based Mutual uthentcaton Scheme for the Internet of Thngs Yanna Ma

More information

A Novel Optimization of the Distance Source Routing (DSR) Protocol for the Mobile Ad Hoc Networks (MANET)

A Novel Optimization of the Distance Source Routing (DSR) Protocol for the Mobile Ad Hoc Networks (MANET) A Novel Optmzaton of the Dstance Source Routng (DSR) Protocol for the Moble Ad Hoc Networs (MANET) Syed S. Rzv 1, Majd A. Jafr, and Khaled Ellethy Computer Scence and Engneerng Department Unversty of Brdgeport

More information

Utility-based Routing

Utility-based Routing Utlty-based Routng Je Wu Dept. of Computer and Informaton Scences Temple Unversty Roadmap Introducton Why Another Routng Scheme Utlty-Based Routng Implementatons Extensons Some Fnal Thoughts 2 . Introducton

More information

An Efficient and Flexible Decentralized Multicast Key Distribution Scheme

An Efficient and Flexible Decentralized Multicast Key Distribution Scheme IJCSNS Internatonal Journal of Computer Scence and Networ Securty VOL. 6 No. 8B August 006 11 An Effcent and Flexble Decentralzed Multcast Key Dstrbuton Scheme Wen-Shenq Juang and Jyan-Cwan Wu Department

More information

A Comparison of Two Equivalent Real Formulations for Complex-Valued Linear Systems Part 2: Results

A Comparison of Two Equivalent Real Formulations for Complex-Valued Linear Systems Part 2: Results AMERICAN JOURNAL OF UNDERGRADUATE RESEARCH VOL. 1 NO. () A Comparson of Two Equvalent Real Formulatons for Complex-Valued Lnear Systems Part : Results Abnta Munankarmy and Mchael A. Heroux Department of

More information

Uncertainty in measurements of power and energy on power networks

Uncertainty in measurements of power and energy on power networks Uncertanty n measurements of power and energy on power networks E. Manov, N. Kolev Department of Measurement and Instrumentaton, Techncal Unversty Sofa, bul. Klment Ohrdsk No8, bl., 000 Sofa, Bulgara Tel./fax:

More information

Joint Adaptive Modulation and Power Allocation in Cognitive Radio Networks

Joint Adaptive Modulation and Power Allocation in Cognitive Radio Networks I. J. Communcatons, etwork and System Scences, 8, 3, 7-83 Publshed Onlne August 8 n ScRes (http://www.scrp.org/journal/jcns/). Jont Adaptve Modulaton and Power Allocaton n Cogntve Rado etworks Dong LI,

More information

TECHNICAL NOTE TERMINATION FOR POINT- TO-POINT SYSTEMS TN TERMINATON FOR POINT-TO-POINT SYSTEMS. Zo = L C. ω - angular frequency = 2πf

TECHNICAL NOTE TERMINATION FOR POINT- TO-POINT SYSTEMS TN TERMINATON FOR POINT-TO-POINT SYSTEMS. Zo = L C. ω - angular frequency = 2πf TECHNICAL NOTE TERMINATION FOR POINT- TO-POINT SYSTEMS INTRODUCTION Because dgtal sgnal rates n computng systems are ncreasng at an astonshng rate, sgnal ntegrty ssues have become far more mportant to

More information

Topology Control for C-RAN Architecture Based on Complex Network

Topology Control for C-RAN Architecture Based on Complex Network Topology Control for C-RAN Archtecture Based on Complex Network Zhanun Lu, Yung He, Yunpeng L, Zhaoy L, Ka Dng Chongqng key laboratory of moble communcatons technology Chongqng unversty of post and telecommuncaton

More information

PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION. Evgeny Artyomov and Orly Yadid-Pecht

PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION. Evgeny Artyomov and Orly Yadid-Pecht 68 Internatonal Journal "Informaton Theores & Applcatons" Vol.11 PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION Evgeny Artyomov and Orly

More information

International Journal of Network Security & Its Application (IJNSA), Vol.2, No.1, January SYSTEL, SUPCOM, Tunisia.

International Journal of Network Security & Its Application (IJNSA), Vol.2, No.1, January SYSTEL, SUPCOM, Tunisia. Internatonal Journal of Network Securty & Its Applcaton (IJNSA), Vol.2, No., January 2 WEAKNESS ON CRYPTOGRAPHIC SCHEMES BASED ON REGULAR LDPC CODES Omessaad Hamd, Manel abdelhed 2, Ammar Bouallegue 2,

More information

Customer witness testing guide

Customer witness testing guide Customer wtness testng gude Ths gude s amed at explanng why we need to wtness test equpment whch s beng connected to our network, what we actually do when we complete ths testng, and what you can do to

More information

Figure.1. Basic model of an impedance source converter JCHPS Special Issue 12: August Page 13

Figure.1. Basic model of an impedance source converter JCHPS Special Issue 12: August Page 13 A Hgh Gan DC - DC Converter wth Soft Swtchng and Power actor Correcton for Renewable Energy Applcaton T. Selvakumaran* and. Svachdambaranathan Department of EEE, Sathyabama Unversty, Chenna, Inda. *Correspondng

More information

Rational Secret Sharing without Broadcast

Rational Secret Sharing without Broadcast Ratonal Secret Sharng wthout Broadcast Amjed Shareef, Department of Computer Scence and Engneerng, Indan Insttute of Technology Madras, Chenna, Inda. Emal: amjedshareef@gmal.com Abstract We use the concept

More information

Gustavus J. Simmons Sandia National Laboratories Albuquerque, NM 87185

Gustavus J. Simmons Sandia National Laboratories Albuquerque, NM 87185 An Impersonaton-Proof Identty Verfcaton Scheme* Gustavus J. Smmons Sanda Natonal Laboratores Albuquerque, NM 87185 Most schemes for the verfcaton of personal dentty are logcally flawed n that they requre

More information

IEE Electronics Letters, vol 34, no 17, August 1998, pp ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES

IEE Electronics Letters, vol 34, no 17, August 1998, pp ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES IEE Electroncs Letters, vol 34, no 17, August 1998, pp. 1622-1624. ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES A. Chatzgeorgou, S. Nkolads 1 and I. Tsoukalas Computer Scence Department, 1 Department

More information

Performance Analysis of Multi User MIMO System with Block-Diagonalization Precoding Scheme

Performance Analysis of Multi User MIMO System with Block-Diagonalization Precoding Scheme Performance Analyss of Mult User MIMO System wth Block-Dagonalzaton Precodng Scheme Yoon Hyun m and Jn Young m, wanwoon Unversty, Department of Electroncs Convergence Engneerng, Wolgye-Dong, Nowon-Gu,

More information

Intelligent Wakening Scheme for Wireless Sensor Networks Surveillance

Intelligent Wakening Scheme for Wireless Sensor Networks Surveillance The Frst Internatonal Workshop on Cyber-Physcal Networkng Systems Intellgent Wakenng Scheme for Wreless Sensor Networks Survellance Ru Wang, Le Zhang, L Cu Insttute of Computng Technology of the Chnese

More information

Low Sampling Rate Technology for UHF Partial Discharge Signals Based on Sparse Vector Recovery

Low Sampling Rate Technology for UHF Partial Discharge Signals Based on Sparse Vector Recovery 017 nd Internatonal Semnar on Appled Physcs, Optoelectroncs and Photoncs (APOP 017) ISBN: 978-1-60595-5-3 Low Samplng Rate Technology for UHF Partal Dscharge Sgnals Based on Sparse Vector Recovery Qang

More information

An Energy-aware Awakening Routing Algorithm in Heterogeneous Sensor Networks

An Energy-aware Awakening Routing Algorithm in Heterogeneous Sensor Networks An Energy-aware Awakenng Routng Algorthm n Heterogeneous Sensor Networks TAO Dan 1, CHEN Houjn 1, SUN Yan 2, CEN Ygang 3 1. School of Electronc and Informaton Engneerng, Bejng Jaotong Unversty, Bejng,

More information

Priority based Dynamic Multiple Robot Path Planning

Priority based Dynamic Multiple Robot Path Planning 2nd Internatonal Conference on Autonomous obots and Agents Prorty based Dynamc Multple obot Path Plannng Abstract Taxong Zheng Department of Automaton Chongqng Unversty of Post and Telecommuncaton, Chna

More information

Secure Power Scheduling Auction for Smart Grids Using Homomorphic Encryption

Secure Power Scheduling Auction for Smart Grids Using Homomorphic Encryption Secure Power Schedulng Aucton for Smart Grds Usng Homomorphc Encrypton Haya Shajaah, Student Member, IEEE, Ahmed Abdelhad, Senor Member, IEEE, and Charles Clancy, Senor Member, IEEE Abstract In ths paper,

More information

High Speed ADC Sampling Transients

High Speed ADC Sampling Transients Hgh Speed ADC Samplng Transents Doug Stuetzle Hgh speed analog to dgtal converters (ADCs) are, at the analog sgnal nterface, track and hold devces. As such, they nclude samplng capactors and samplng swtches.

More information

Fast and Efficient Data Forwarding Scheme for Tracking Mobile Targets in Sensor Networks

Fast and Efficient Data Forwarding Scheme for Tracking Mobile Targets in Sensor Networks Artcle Fast and Effcent Data Forwardng Scheme for Trackng Moble Targets n Sensor etworks M Zhou 1, Mng Zhao, Anfeng Lu 1, *, Mng Ma 3, Tang Wang 4 and Changqn Huang 5 1 School of Informaton Scence and

More information

Application of Intelligent Voltage Control System to Korean Power Systems

Application of Intelligent Voltage Control System to Korean Power Systems Applcaton of Intellgent Voltage Control System to Korean Power Systems WonKun Yu a,1 and HeungJae Lee b, *,2 a Department of Power System, Seol Unversty, South Korea. b Department of Power System, Kwangwoon

More information

Hardware Design of Filter Bank-Based Narrowband/Wideband Interference Canceler for Overlaid TDMA/CDMA Systems

Hardware Design of Filter Bank-Based Narrowband/Wideband Interference Canceler for Overlaid TDMA/CDMA Systems Hardware Desgn of Flter anased arrowband/deband Interference Canceler for Overlad TDMA/CDMA Systems Toyoau Ktano Kaunor Hayash Htosh Masutan and Shnsue Hara Graduate School of Engneerng Osaa Unversty YamadaOa

More information

Guidelines for CCPR and RMO Bilateral Key Comparisons CCPR Working Group on Key Comparison CCPR-G5 October 10 th, 2014

Guidelines for CCPR and RMO Bilateral Key Comparisons CCPR Working Group on Key Comparison CCPR-G5 October 10 th, 2014 Gudelnes for CCPR and RMO Blateral Key Comparsons CCPR Workng Group on Key Comparson CCPR-G5 October 10 th, 2014 These gudelnes are prepared by CCPR WG-KC and RMO P&R representatves, and approved by CCPR,

More information

HUAWEI TECHNOLOGIES CO., LTD. Huawei Proprietary Page 1

HUAWEI TECHNOLOGIES CO., LTD. Huawei Proprietary Page 1 Project Ttle Date Submtted IEEE 802.16 Broadband Wreless Access Workng Group Double-Stage DL MU-MIMO Scheme 2008-05-05 Source(s) Yang Tang, Young Hoon Kwon, Yajun Kou, Shahab Sanaye,

More information

Xiuqing Chen 1 *, Tianjie Cao 1 *, Jingxuan Zhai 1, Yu Guo 2 1 School of Computer, China University of Mining and Technology, Xuzhou,

Xiuqing Chen 1 *, Tianjie Cao 1 *, Jingxuan Zhai 1, Yu Guo 2 1 School of Computer, China University of Mining and Technology, Xuzhou, [Type text] [Type text] [Type text] ISSN : 0974-7435 Volume 0 Issue 9 BoTechnology 04 An Indan Journal FULL PAPE BTAIJ, 0(9, 04 [3908-397] Securty lghtweght FID protocol for U- healthcare system Xuqng

More information

Rejection of PSK Interference in DS-SS/PSK System Using Adaptive Transversal Filter with Conditional Response Recalculation

Rejection of PSK Interference in DS-SS/PSK System Using Adaptive Transversal Filter with Conditional Response Recalculation SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol., No., November 23, 3-9 Rejecton of PSK Interference n DS-SS/PSK System Usng Adaptve Transversal Flter wth Condtonal Response Recalculaton Zorca Nkolć, Bojan

More information

EMA. Education Maintenance Allowance (EMA) Financial Details Form 2017/18. student finance wales cyllid myfyrwyr cymru.

EMA. Education Maintenance Allowance (EMA) Financial Details Form 2017/18. student finance wales cyllid myfyrwyr cymru. student fnance wales cylld myfyrwyr cymru Educaton Mantenance Allowance (EMA) Fnancal Detals Form 2017/18 sound advce on STUDENT FINANCE EMA Educaton Mantenance Allowance (EMA) 2017/18 /A How to complete

More information

Webinar Series TMIP VISION

Webinar Series TMIP VISION Webnar Seres TMIP VISION TMIP provdes techncal support and promotes knowledge and nformaton exchange n the transportaton plannng and modelng communty. DISCLAIMER The vews and opnons expressed durng ths

More information

An efficient cluster-based power saving scheme for wireless sensor networks

An efficient cluster-based power saving scheme for wireless sensor networks RESEARCH Open Access An effcent cluster-based power savng scheme for wreless sensor networks Jau-Yang Chang * and Pe-Hao Ju Abstract In ths artcle, effcent power savng scheme and correspondng algorthm

More information

Space Time Equalization-space time codes System Model for STCM

Space Time Equalization-space time codes System Model for STCM Space Tme Eualzaton-space tme codes System Model for STCM The system under consderaton conssts of ST encoder, fadng channel model wth AWGN, two transmt antennas, one receve antenna, Vterb eualzer wth deal

More information

A MODIFIED DIRECTIONAL FREQUENCY REUSE PLAN BASED ON CHANNEL ALTERNATION AND ROTATION

A MODIFIED DIRECTIONAL FREQUENCY REUSE PLAN BASED ON CHANNEL ALTERNATION AND ROTATION A MODIFIED DIRECTIONAL FREQUENCY REUSE PLAN BASED ON CHANNEL ALTERNATION AND ROTATION Vncent A. Nguyen Peng-Jun Wan Ophr Freder Computer Scence Department Illnos Insttute of Technology Chcago, Illnos vnguyen@t.edu,

More information

An Adaptive Over-current Protection Scheme for MV Distribution Networks Including DG

An Adaptive Over-current Protection Scheme for MV Distribution Networks Including DG An Adaptve Over-current Protecton Scheme for MV Dstrbuton Networks Includng DG S.A.M. Javadan Islamc Azad Unversty s.a.m.javadan@gmal.com M.-R. Haghfam Tarbat Modares Unversty haghfam@modares.ac.r P. Barazandeh

More information

An Alternation Diffusion LMS Estimation Strategy over Wireless Sensor Network

An Alternation Diffusion LMS Estimation Strategy over Wireless Sensor Network Progress In Electromagnetcs Research M, Vol. 70, 135 143, 2018 An Alternaton Dffuson LMS Estmaton Strategy over Wreless Sensor Network Ln L * and Donghu L Abstract Ths paper presents a dstrbuted estmaton

More information

VRT014 User s guide V0.8. Address: Saltoniškių g. 10c, Vilnius LT-08105, Phone: (370-5) , Fax: (370-5) ,

VRT014 User s guide V0.8. Address: Saltoniškių g. 10c, Vilnius LT-08105, Phone: (370-5) , Fax: (370-5) , VRT014 User s gude V0.8 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

Journal of Chemical and Pharmaceutical Research, 2016, 8(4): Research Article

Journal of Chemical and Pharmaceutical Research, 2016, 8(4): Research Article Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2016, 8(4):788-793 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 Vrtual Force Coverage Enhancement Optmzaton Algorthm Based

More information

Wireless Sensor Network Coverage Optimization Based on Fruit Fly Algorithm

Wireless Sensor Network Coverage Optimization Based on Fruit Fly Algorithm Wreless Sensor Network Coverage Optmzaton Based on Frut Fly Algorthm https://do.org/10.3991/joe.v1406.8698 Ren Song!! ", Zhchao Xu, Yang Lu Jln Unversty of Fnance and Economcs, Jln, Chna rensong1579@163.com

More information

Low Complexity Duty Cycle Control with Joint Delay and Energy Efficiency for Beacon-enabled IEEE Wireless Sensor Networks

Low Complexity Duty Cycle Control with Joint Delay and Energy Efficiency for Beacon-enabled IEEE Wireless Sensor Networks Low Complexty Duty Cycle Control wth Jont Delay and Energy Effcency for Beacon-enabled IEEE 8254 Wreless Sensor Networks Yun L Kok Keong Cha Yue Chen Jonathan Loo School of Electronc Engneerng and Computer

More information

NETWORK 2001 Transportation Planning Under Multiple Objectives

NETWORK 2001 Transportation Planning Under Multiple Objectives NETWORK 200 Transportaton Plannng Under Multple Objectves Woodam Chung Graduate Research Assstant, Department of Forest Engneerng, Oregon State Unversty, Corvalls, OR9733, Tel: (54) 737-4952, Fax: (54)

More information

Monitoring large-scale power distribution grids

Monitoring large-scale power distribution grids Montorng large-scale power dstrbuton grds D. Gavrlov, M. Gouzman, and S. Lury Center for Advanced Technology n Sensor Systems, Stony Brook Unversty, Stony Brook, NY 11794 Keywords: smart grd; sensor network;

More information

Performance Analysis of the Weighted Window CFAR Algorithms

Performance Analysis of the Weighted Window CFAR Algorithms Performance Analyss of the Weghted Wndow CFAR Algorthms eng Xangwe Guan Jan He You Department of Electronc Engneerng, Naval Aeronautcal Engneerng Academy, Er a road 88, Yanta Cty 6400, Shandong Provnce,

More information

Generalized Incomplete Trojan-Type Designs with Unequal Cell Sizes

Generalized Incomplete Trojan-Type Designs with Unequal Cell Sizes Internatonal Journal of Theoretcal & Appled Scences 6(1): 50-54(2014) ISSN No. (Prnt): 0975-1718 ISSN No. (Onlne): 2249-3247 Generalzed Incomplete Trojan-Type Desgns wth Unequal Cell Szes Cn Varghese,

More information

A NSGA-II algorithm to solve a bi-objective optimization of the redundancy allocation problem for series-parallel systems

A NSGA-II algorithm to solve a bi-objective optimization of the redundancy allocation problem for series-parallel systems 0 nd Internatonal Conference on Industral Technology and Management (ICITM 0) IPCSIT vol. 49 (0) (0) IACSIT Press, Sngapore DOI: 0.776/IPCSIT.0.V49.8 A NSGA-II algorthm to solve a b-obectve optmzaton of

More information

Control Chart. Control Chart - history. Process in control. Developed in 1920 s. By Dr. Walter A. Shewhart

Control Chart. Control Chart - history. Process in control. Developed in 1920 s. By Dr. Walter A. Shewhart Control Chart - hstory Control Chart Developed n 920 s By Dr. Walter A. Shewhart 2 Process n control A phenomenon s sad to be controlled when, through the use of past experence, we can predct, at least

More information

The Performance Improvement of BASK System for Giga-Bit MODEM Using the Fuzzy System

The Performance Improvement of BASK System for Giga-Bit MODEM Using the Fuzzy System Int. J. Communcatons, Network and System Scences, 10, 3, 1-5 do:10.36/jcns.10.358 Publshed Onlne May 10 (http://www.scrp.org/journal/jcns/) The Performance Improvement of BASK System for Gga-Bt MODEM Usng

More information

Low Switching Frequency Active Harmonic Elimination in Multilevel Converters with Unequal DC Voltages

Low Switching Frequency Active Harmonic Elimination in Multilevel Converters with Unequal DC Voltages Low Swtchng Frequency Actve Harmonc Elmnaton n Multlevel Converters wth Unequal DC Voltages Zhong Du,, Leon M. Tolbert, John N. Chasson, Hu L The Unversty of Tennessee Electrcal and Computer Engneerng

More information

An Analytical Method for Centroid Computing and Its Application in Wireless Localization

An Analytical Method for Centroid Computing and Its Application in Wireless Localization An Analytcal Method for Centrod Computng and Its Applcaton n Wreless Localzaton Xue Jun L School of Engneerng Auckland Unversty of Technology, New Zealand Emal: xuejun.l@aut.ac.nz Abstract Ths paper presents

More information

Traffic balancing over licensed and unlicensed bands in heterogeneous networks

Traffic balancing over licensed and unlicensed bands in heterogeneous networks Correspondence letter Traffc balancng over lcensed and unlcensed bands n heterogeneous networks LI Zhen, CUI Qme, CUI Zhyan, ZHENG We Natonal Engneerng Laboratory for Moble Network Securty, Bejng Unversty

More information

Fall 2018 #11 Games and Nimbers. A. Game. 0.5 seconds, 64 megabytes

Fall 2018 #11 Games and Nimbers. A. Game. 0.5 seconds, 64 megabytes 5-95 Fall 08 # Games and Nmbers A. Game 0.5 seconds, 64 megabytes There s a legend n the IT Cty college. A student that faled to answer all questons on the game theory exam s gven one more chance by hs

More information

A study of turbo codes for multilevel modulations in Gaussian and mobile channels

A study of turbo codes for multilevel modulations in Gaussian and mobile channels A study of turbo codes for multlevel modulatons n Gaussan and moble channels Lamne Sylla and Paul Forter (sylla, forter)@gel.ulaval.ca Department of Electrcal and Computer Engneerng Laval Unversty, Ste-Foy,

More information

Procedia Computer Science

Procedia Computer Science Proceda Computer Scence 3 (211) 714 72 Proceda Computer Scence (21) Proceda Computer Scence www.elsever.com/locate/proceda www.elsever.com/locate/proceda WCIT-21 Performance evaluaton of data delvery approaches

More information

MASTER TIMING AND TOF MODULE-

MASTER TIMING AND TOF MODULE- MASTER TMNG AND TOF MODULE- G. Mazaher Stanford Lnear Accelerator Center, Stanford Unversty, Stanford, CA 9409 USA SLAC-PUB-66 November 99 (/E) Abstract n conjuncton wth the development of a Beam Sze Montor

More information

ASFALT: Ā S imple F āult-tolerant Signature-based L ocalization T echnique for Emergency Sensor Networks

ASFALT: Ā S imple F āult-tolerant Signature-based L ocalization T echnique for Emergency Sensor Networks ASFALT: Ā S mple F āult-tolerant Sgnature-based L ocalzaton T echnque for Emergency Sensor Networks Murtuza Jadlwala, Shambhu Upadhyaya and Mank Taneja State Unversty of New York at Buffalo Department

More information

A Feasible Approach to the Evaluation of the Tractions of Vehicle Wheels Driven by DC Motors

A Feasible Approach to the Evaluation of the Tractions of Vehicle Wheels Driven by DC Motors A Feasble Approach to the Evaluaton of the Tractons of Vehcle Wheels Drven by DC Motors Jeh-Shan Young Insttute of Vehcle Engneerng, Natonal Changhua Unversty of Educaton Changhua, Tawan, R.O.C. and Sheng-You

More information

Parameter Free Iterative Decoding Metrics for Non-Coherent Orthogonal Modulation

Parameter Free Iterative Decoding Metrics for Non-Coherent Orthogonal Modulation 1 Parameter Free Iteratve Decodng Metrcs for Non-Coherent Orthogonal Modulaton Albert Gullén Fàbregas and Alex Grant Abstract We study decoder metrcs suted for teratve decodng of non-coherently detected

More information

Index Terms Adaptive modulation, Adaptive FEC, Packet Error Rate, Performance.

Index Terms Adaptive modulation, Adaptive FEC, Packet Error Rate, Performance. ANALYTICAL COMPARISON OF THE PERFORMANCE OF ADAPTIVE MODULATION AND CODING IN WIRELESS NETWORK UNDER RAYLEIGH FADING 723 Sab Y.M. BANDIRI, Rafael M.S. BRAGA and Danlo H. SPADOTI Federal Unversty of Itajubá

More information

The Impact of Spectrum Sensing Frequency and Packet- Loading Scheme on Multimedia Transmission over Cognitive Radio Networks

The Impact of Spectrum Sensing Frequency and Packet- Loading Scheme on Multimedia Transmission over Cognitive Radio Networks Ths artcle has been accepted for publcaton n a future ssue of ths journal, but has not been fully edted. Content may change pror to fnal publcaton. The Impact of Spectrum Sensng Frequency and Pacet- Loadng

More information

sensors ISSN by MDPI

sensors ISSN by MDPI Sensors 2007, 7, 628-648 Full Paper sensors ISSN 1424-8220 2007 by MDPI www.mdp.org/sensors Dstrbuted Partcle Swarm Optmzaton and Smulated Annealng for Energy-effcent Coverage n Wreless Sensor Networks

More information

Understanding the Spike Algorithm

Understanding the Spike Algorithm Understandng the Spke Algorthm Vctor Ejkhout and Robert van de Gejn May, ntroducton The parallel soluton of lnear systems has a long hstory, spannng both drect and teratve methods Whle drect methods exst

More information

antenna antenna (4.139)

antenna antenna (4.139) .6.6 The Lmts of Usable Input Levels for LNAs The sgnal voltage level delvered to the nput of an LNA from the antenna may vary n a very wde nterval, from very weak sgnals comparable to the nose level,

More information

Optimizing a System of Threshold-based Sensors with Application to Biosurveillance

Optimizing a System of Threshold-based Sensors with Application to Biosurveillance Optmzng a System of Threshold-based Sensors wth Applcaton to Bosurvellance Ronald D. Frcker, Jr. Thrd Annual Quanttatve Methods n Defense and Natonal Securty Conference May 28, 2008 What s Bosurvellance?

More information

Multiple Error Correction Using Reduced Precision Redundancy Technique

Multiple Error Correction Using Reduced Precision Redundancy Technique Multple Error Correcton Usng Reduced Precson Redundancy Technque Chthra V 1, Nthka Bhas 2, Janeera D A 3 1,2,3 ECE Department, Dhanalakshm Srnvasan College of Engneerng,Combatore, Tamlnadu, Inda Abstract

More information

FFT Spectrum Analyzer

FFT Spectrum Analyzer THE ANNUAL SYMPOSIUM OF THE INSTITUTE OF SOLID MECHANICS SISOM 22 BUCHAREST May 16-17 ----------------------------------------------------------------------------------------------------------------------------------------

More information

Test 2. ECON3161, Game Theory. Tuesday, November 6 th

Test 2. ECON3161, Game Theory. Tuesday, November 6 th Test 2 ECON36, Game Theory Tuesday, November 6 th Drectons: Answer each queston completely. If you cannot determne the answer, explanng how you would arrve at the answer may earn you some ponts.. (20 ponts)

More information

A Pervasive Indoor-Outdoor Positioning System

A Pervasive Indoor-Outdoor Positioning System 70 JOURNAL OF NETWORKS, VOL. 3, NO. 8, NOVEMBER 008 A Pervasve Indoor-Outdoor Postonng System Lonel Reyero 1, Glles Delsle 1 INRS-EMT, Unversté du Québec, Montréal, Canada, H5A 1K6, lonel.reyero@telecom.com

More information

Movement - Assisted Sensor Deployment

Movement - Assisted Sensor Deployment Intro Self Deploy Vrtual Movement Performance Concluson Movement - Asssted Sensor Deployment G. Wang, G. Cao, T. La Porta Dego Cammarano Laurea Magstrale n Informatca Facoltà d Ingegnera dell Informazone,

More information

The Spectrum Sharing in Cognitive Radio Networks Based on Competitive Price Game

The Spectrum Sharing in Cognitive Radio Networks Based on Competitive Price Game 8 Y. B. LI, R. YAG, Y. LI, F. YE, THE SPECTRUM SHARIG I COGITIVE RADIO ETWORKS BASED O COMPETITIVE The Spectrum Sharng n Cogntve Rado etworks Based on Compettve Prce Game Y-bng LI, Ru YAG., Yun LI, Fang

More information

POLYTECHNIC UNIVERSITY Electrical Engineering Department. EE SOPHOMORE LABORATORY Experiment 1 Laboratory Energy Sources

POLYTECHNIC UNIVERSITY Electrical Engineering Department. EE SOPHOMORE LABORATORY Experiment 1 Laboratory Energy Sources POLYTECHNIC UNIERSITY Electrcal Engneerng Department EE SOPHOMORE LABORATORY Experment 1 Laboratory Energy Sources Modfed for Physcs 18, Brooklyn College I. Oerew of the Experment Ths experment has three

More information

Analysis of Time Delays in Synchronous and. Asynchronous Control Loops. Bj rn Wittenmark, Ben Bastian, and Johan Nilsson

Analysis of Time Delays in Synchronous and. Asynchronous Control Loops. Bj rn Wittenmark, Ben Bastian, and Johan Nilsson 37th CDC, Tampa, December 1998 Analyss of Delays n Synchronous and Asynchronous Control Loops Bj rn Wttenmark, Ben Bastan, and Johan Nlsson emal: bjorn@control.lth.se, ben@control.lth.se, and johan@control.lth.se

More information

Ad hoc Service Grid A Self-Organizing Infrastructure for Mobile Commerce

Ad hoc Service Grid A Self-Organizing Infrastructure for Mobile Commerce Ad hoc Servce Grd A Self-Organzng Infrastructure for Moble Commerce Klaus Herrmann, Kurt Gehs, Gero Mühl Berln Unversty of Technology Emal: klaus.herrmann@acm.org Web: http://www.vs.tu-berln.de/herrmann/

More information

1 GSW Multipath Channel Models

1 GSW Multipath Channel Models In the general case, the moble rado channel s pretty unpleasant: there are a lot of echoes dstortng the receved sgnal, and the mpulse response keeps changng. Fortunately, there are some smplfyng assumptons

More information

Beam quality measurements with Shack-Hartmann wavefront sensor and M2-sensor: comparison of two methods

Beam quality measurements with Shack-Hartmann wavefront sensor and M2-sensor: comparison of two methods Beam qualty measurements wth Shack-Hartmann wavefront sensor and M-sensor: comparson of two methods J.V.Sheldakova, A.V.Kudryashov, V.Y.Zavalova, T.Y.Cherezova* Moscow State Open Unversty, Adaptve Optcs

More information

Arterial Travel Time Estimation Based On Vehicle Re-Identification Using Magnetic Sensors: Performance Analysis

Arterial Travel Time Estimation Based On Vehicle Re-Identification Using Magnetic Sensors: Performance Analysis Arteral Travel Tme Estmaton Based On Vehcle Re-Identfcaton Usng Magnetc Sensors: Performance Analyss Rene O. Sanchez, Chrstopher Flores, Roberto Horowtz, Ram Raagopal and Pravn Varaya Department of Mechancal

More information