NFC Communications-based Mutual Authentication Scheme for the Internet of Things

Size: px
Start display at page:

Download "NFC Communications-based Mutual Authentication Scheme for the Internet of Things"

Transcription

1 Internatonal Journal of Network Securty, Vol.19, No.4, PP , July 2017 (DOI: /IJNS (4).17) 631 NFC Communcatons-based Mutual uthentcaton Scheme for the Internet of Thngs Yanna Ma (Correspondng author: Yanna Ma) Zheang Unversty of Water Resources and Electrc Power, Zheang , Chna (Emal: (Receved May 10, 2016; revsed and accepted Sept. 3 & Sept. 25, 2016) bstract The ntegraton of Near Feld Communcaton (NFC) nto consumer electroncs devces has opened up opportuntes for the nternet of thngs applcatons such as electronc payment, electronc tcketng and sharng contacts, etc.. Meanwhle, varous securty rsks should not be gnored. Therefore, all knds of dfferent protocols have been released wth the purposng of securng NFC communcatons. Lately, a pseudonym-based NFC protocol for the consumer Internet of thngs was presented. They clamed that ther scheme could wthstand man-n-the mddle attack headed from ther scheme could provde mutual authentcaton. Ths study presents a securty analyss on ther scheme and fnds that ther scheme s not really secure aganst man-n-the-mddle attack. Subsequently, ths paper proposes an enhancement for purpose of thwartng ths securty attack. The securty and performance analyses show that the enhancement s secure and effcent whle keepng prvacy preservng. Keywords: uthentcaton; Key Establshment; Smart Cards; Wreless Communcatons 1 Introducton Several wreless communcatons technques and protocols are avalable n the market, such as luetooth, Zgee, RF, W-F and Infrared, whch have dfferent workng frequences and ranges. more recent technology for short-range wreless (up to 10 cm) s the Near Feld Communcaton (NFC) [16] that enables an easy, fast and secure communcaton between two devces n proxmty. Its communcaton occurs wth MHz operatng frequency whle provdng a hgh-level safety than other wellknown wreless technologes, e.g. luetooth [3, 6]. The prmary characterstc of NFC, leadng to ts wdespread use and popularty s the advent of touch-less transactons, whch leads to no cards, no cons and no laborous connectons and network setup [2]. NFC thus enables the long awated Internet-of-Thngs (IoT) [13], changng the nteractons wth the world n subtle but pervasve ways whle provdng dgtally mmersve experence. lthough the communcaton range of NFC s lmted to a few centmeters, NFC alone does not ensure secure communcatons, especally authentcaton between the sender and the recpent. One of the most mportant propertes for data communcaton s mutual authentcaton whch s defned as the ablty that both communcatng partes can authentcate wth each other, thus preventng mann-the-mddle attack and replay attack [11, 14, 17]. In order to be secure NFC, the NFC securty standards have been proposed n order to defne data exchange format, tag types, and securty protocols, e.g., a key agreement protocol [8, 9, 10]. In the process of key agreement, Certfcate uthorty (C) as the Trusted Thrd Party (TTP) s n charge of generatng the publc key of the correspondents. Recently, Eun et al. [5] proposed an authentcaton scheme for NFC communcatons to prevent replay and man-n-the-mddle attack by provdng mutual authentcaton based on a trusted servce manager. The scheme was based on asymmetrc cryptography and hash functons. y usng an asymmetrc cryptographc system, t was possble to address several securty threats such as an evl twn attack, hotspot or captve portal eavesdroppng, and even man-n-the-mddle attacks [15]. However, He et al. [7] found that the scheme of Eun et al. could not resst mpersonaton attack. s a counter measure to these sufferngs, He et al. presented a modfed authentcaton NFC protocol to amend aforementoned securty weaknesses. Unfortunately, ths study showed that He et al. s modfcaton was not secure aganst the man-n-themddle attack. s a result, a secure NFC mutual authentcaton scheme wth prvacy preservaton for the Internet of thngs was desgned n ths paper. The remander of the paper s arranged as follows. In Secton 2, a bref revew of He et al. s securty protocol. In Secton 3, man-n-the-mddle attack s developed to analyze Eun et al. s protocol. In Secton 4, the proposed NFC communcaton-based protocol. Securty and performance analyses results are gven n Sectons 5 and 6, respectvely. Secton 7 concludes ths paper.

2 Internatonal Journal of Network Securty, Vol.19, No.4, PP , July 2017 (DOI: /IJNS (4).17) Revew of He et al. s Scheme Ths part concsely revew the NFC mutual authentcaton scheme by He et al. n For ease of presentaton, Table I shows some ntutve abbrevatons and notatons. X T SM G KDF d X X SK E K(m) h( ), f( ) Sg K(m) Table 1: Notatons the dentty of the user X a trusted servce manager the base pont of the ellptc curve a key dervaton functon the prvate key of the user X the publc key of the user X, where X = d XG exclusve-or operaton symmetrc encrypton of usng the key K hash functons sgnature of m usng the key K Once recevng the user s request, the T SM generates n pseudonyms and delvers them to va a prvate channel. The T SM also stores the user s dentty and pseudonyms nto ts database. Next, the T SM computes P N = {, E d T SM (, ), T SM, S T SM } and S T SM = Sg d T SM (, E d T SM (, ), T SM ), where = q G s the publc key of, d = q + h( T SM, P N )d T SM s s prvate key, and S T SM s the T SM s sgnature on the th message. The users and execute the establshment of the sesson key n the followng manner: Step 1: computes = r G and sends the message {P N,, N } to, where r and N are the random numbers generated by, P N s a pseudonym selected by. Step 2: computes = r G and sends back the message {P N,, N } to, where r and N are the random numbers generated by and P N s a pseudonym selected by. Step 3: fter recevng the message, computes Z 1 = r, Z2 = d ( + h( T SM, P N ) T SM ), SK = KDF (N, N,,, Z 1, Z2 ) and MacT ag = f(sk,,,, 2 ). Subsequently, sends the message {MacT ag } to. Step 4: When recevng the message, computes Z 1 = r, Z2 = d ( + h( T SM, P N ) T SM ), SK = KDF (N, N,,, Z 1, Z2 ) and verfes f(sk,,,, ) = MacT ag. If t holds, computes MacT ag = f(sk,,,, ) and sets SK as the sesson key. Fnally, transmts the message {MacT ag } to. Step 5: Once recevng the message, computes: Z 1 = r = r r G = r r G = r, Z 2 = d ( + h( T SM, P N ) T SM ) = (q + h( T SM, P N )d T SM ) (q + h( T SM, P N )d T SM )G = (q + h( T SM, P N )d T SM ) (q + h( T SM, P N )d T SM )G = (q + h( T SM, P N )d T SM ) (q G + h( T SM, P N )d T SM G) = d ( + h( T SM, P N ) T SM ). computes SK and f(sk,,,, ), then, checks the correctness of the value MacT ag. If t does not hold, stops the sesson; Otherwse, agrees on the sesson key SK wth. 3 Weaknesses of He et al. s Scheme He et al. declared that ther mprovements could resst the man-n-the-mddle-attack due to ther proposed scheme could provde the mutual authentcaton between and. ctually, a notable queston s that and are unable to confrm the real dentty of the other entty because of the absence of T SM durng the executon of ther scheme, thus gvng a perfect opportunty for an adversary to launch the man-n-the-mddle attack. The man-n-the-mddle attack s a form of actve eavesdroppng n whch makes ndependent connectons wth the vctms and relays messages between them, makng them beleve that they are talkng drectly to each other over a prvate connecton, whle n fact the entre conversaton s controlled by. Let s descrbe the detals of the attack as follows. Step 1: When the message M 1 = {, P N, N } s sent from to, ntercepts the message and computes = r1 G, and sends the forged message M 1 = {, P N, N 1} to, where r1 and N 1 are the random numbers of. Step 2: When recevng the message, computes = r G and sends the message M 2 = {, P N, N } to. Step 3: ntercepts the message M 2 and computes = r2 G and sends the forged message M 2 = {, P N, N 2} to, where r2 and N 2 are the random numbers of. Step 4: fter recevng the message, computes Z 2 = d1 ( + h( T SM, P N ) T SM ), Z 1 = r, and the sesson key SK = KDF (N, N 2,,, Z 1, Z2 ) and MacT ag =

3 Internatonal Journal of Network Securty, Vol.19, No.4, PP , July 2017 (DOI: /IJNS (4).17) 633 f(sk,,,, ). Next, sends the message M 3 = {MacT ag } to. Step 5: eavesdrops ths message and computes Z 2 = d1 ( + h( T SM, P N ) T SM ), Z 1 = r 1, and the sesson key SK = KDF (N, N 1,,, Z 1, Z2 ) and MacT ag = f(sk,,,, ). fter that, sends the forged message M 3 = {MacT ag } to. Step 6: When recevng the message M 3, computes Z 1 = r, Z2 = d1 ( +h( T SM, P N ) T SM ) and SK = KDF (N, N 1,,, Z 1, Z2 ). verfes whether f(sk,,,, ) = MacT ag and t s obvous that the equaton s true, because: Z 1 = r = r r 1 G = r 1 = Z 1, Z 2 = d 1 ( + h( T SM, P N ) T SM ) = (q + h( T SM, P N )d T SM ) (q G + h( T SM, P N )d T SM )G) = (q + h( T SM, P N )d T SM ) (q + h( T SM, P N )d T SM )G = d 1 ( + h( T SM, P N ) T SM ) = Z 2. computes MacT ag = f(sk,,,, ) and sends the message M 4 = {MacT ag } to. Step 7: receves the message M 4 from to, computes Z 2 = d ( + h( T SM, P N ) T SM ), Z 1 = r 2 and the sesson key SK = KDF (N, N 2,,, Z 1, Z2 ) and MacT ag = f(sk,,,, ). fter that, sends the forged message M 4 = {MacT ag } to. Step 8: When recevng the message, checks the valdness of MacT ag and t s sure that the equaton wll be equal to f(sk,,,, ). Therefore, agrees on the sesson key SK as the common key amng at encryptng the communcaton messages. In ths way, s successfully authentcated by and, respectvely. That s, shares a sesson key SK = KDF (N, N 2,,, Z 1, Z2 ) wth, at the same tme, he shares a sesson key SK = KDF (N, N 1,,, Z 1, Z2 ) wth. However, both of and do not know that they are communcatng wth an attacker at all. They beleve they successfully have fnshed the handshake agreement wth each other. 4 The Proposed Scheme Ths secton wll present the proposed scheme as Fgure 1. fter recevng the user s request for pseudonyms, the T SM generates n pseudonyms and sends them to va a secret channel. The T SM also stores the user s dentty and pseudonyms nto ts database. There are four partes n a pseudonym P N : the s publc key, s prvate key, the T SM s dentty and the T SM s sgnature. P N = {, Enc({, }, d T SM ), T SM, S T SM }, S T SM = Sg(d T SM,, Enc(, d T SM ), T SM ), d = d T SM + h(, r S )h(, P N ). s the same method, the user could get ts pseudonyms and correspondng prvate key d = d T SM + h(, r S )h(, P N ) and publc key d G. 4.1 Establshment of the Sesson Key When and attempts to establsh the handshake, they perform as follows: Step 1: computes = r G, = r d G, where r s a nonce generated by. Then, sends {, } to. Step 2: When recevng the message, computes (d ) 1 =, = r G, and = r d G, where d G s the publc key of. Fnally, returns {, } to. Step 3: Once recevng the message, computes (d ) 1 =, Z = r,z = d ( T SM + h(, P N ) ), SK = KDF (,, Z, Z ) and MacT ag = f(,, SK, ). t last, sends back the message {MacT ag } to. Step 4: When recevng the messages, computes Z = r,z = d ( T SM + h(, P N ) ), SK = KDF (,, Z, Z ) and verfes whether f(,, SK, ) = MacT ag. If t s equal, sets SK as the sesson key and computes MacT ag = f(,, SK, ). fter that, delvers back the message {MacT ag } to. Step 5: When recevng the message, checks whether f(,, SK, ) = MacT ag. If t holds, successfully negotates the sesson key SK wth. 5 Securty nalyss Ths secton analyze the securty of the proposed scheme, whch ncludes achevng users anonymty, mutual authentcaton, perfect forward sesson key securty, and wthstandng relay attack, mpersonaton attack. The detals descrbe below. 5.1 Users nonymty In the proposed scheme, the users denttes and are respectvely mpled n MacT ag () =

4 Internatonal Journal of Network Securty, Vol.19, No.4, PP , July 2017 (DOI: /IJNS (4).17) 634 Key agreement (1)Select r, PN (5)( d Z Z ) 1 r SK KDF( MacTag, d ( (9) f( TSM f(, r G, r d G., h(,, SK,, Z,, PN, Z ) ),, SK, ). ) MacTag ),. (2),, PN (4),, PN (6)MacTag (8)MacTag (7) Z Z (3)Select f( ( d d ), 1 r r d r G, ( SK KDF( MacTag r TSM, f( G.,, SK, h(,, Z ) MacTag,, PN, Z ) ),, SK, ). ), Fgure 1: Mutual authentcaton and key agreement of our scheme f(,, SK, () ), where SK s the sesson key, () = r ()d () () G, r () and d () () are the random numbers and the prvate keys. Therefore, s not able to be derved from Z wthout knowng the users prvate key, owng to the one-way property of the hash functon. Therefore, the proposed scheme preserves dentty prvacy. 5.2 Mutual uthentcaton In the proposed scheme, authentcates by checkng = (d ) 1 and MacT ag = f(,, SK, ), where SK = KDF (,, r, d d G). ddtonally, authentcates by verfyng whether = (d ) 1 and MacT ag = f(,, SK, ), where SK = KDF (,, r, d d G). 5.3 Perfect Forward Securty of the Sesson Key Gven,,, and d d, the sesson key SK = KDF (,, r, d d G) cannot be calculated wthout the knowledge of r and r, owng to the Dffe-Hellman problem. ddtonally, gven MacT ag = f(,, SK, ) and MacT ag = f(,, SK, ). SK cannot be determned due to the one-way property of the hash functon and no knowledge of users denttes. Therefore, the sesson key cannot be derved from the revealed messages n the proposed scheme. 5.4 Known Sesson Key Securty In the proposed scheme, the sesson key s computed as SK = KDF (,, r r G, d d G), whch does not gve any useful nformaton for computng the next sesson keys because r and r are randomly generated n dfferent runs and are ndependent of each other among scheme executons. Therefore, the proposed scheme has the property of known-key securty. 5.5 Resstance to relay attack Relay ttack s also popularly known as man n the mddle attack n network securty. n attacker acts as a mddleman between two NFC devces to ntercept the data

5 Internatonal Journal of Network Securty, Vol.19, No.4, PP , July 2017 (DOI: /IJNS (4).17) 635 Table 2: Computatonal cost comparson Eun et al. [5] He et al. [7] The Proposal 3T ecm + 1T eca + 2T h + 2T mm + 1T kdf 4T ecm + 1T eca + 2T h + 1T kdf 4T ecm + 1T m + 2T h + 1T kdf T ecm + 1T eca + 2T h + 2T mm + 1T kdf 4T ecm + 1T eca + 3T h + 1T kdf 4T ecm + 1T m + 2T h + 1T kdf Total 6T ecm + 2T eca + 4T h + 4T mm + 2T kdf 8T ecm + 2T eca + 5T h + 2T kdf 8T ecm + 2T m + 4T h + 2T kdf wthout the knowledge of the two NFC devces. The attacker ether reads and records or manpulates the data before relayng t to the recevng devce [18]. If an adversary ntends to mpersonate as a legal user to cheat and, he cannot accomplsh hs well as he wshed. ecause and each hold the data whch s only verfed by the other sde, any forgery data wll be detected by the recever. Specfcally, sends Z = d d G whch s concealed n the sesson key and = r d G to, where d G s a secret value of. fter verfyng the correctness of the two values, udges whether the sender s the real. Smlarly, can also authentcate the valdty of by checkng Z = d d G and = r d G. 5.6 Resstance to Impersonaton ttack In the establshment of the sesson key, transmts = r d G to, where d s the secret key of, only knows d. Others are mpossble to know the value of d G and cannot compute Z. Wthout the value of Z, an adversary cannot pass the authentcaton of. Meanwhle, also sends back the value d G whch s hdden n = r d G, where d G s the secret nformaton only known by of and, and only knows d. That s, any unauthorzed user cannot compute the correct Z and hence cannot be verfed by wthout the value of d G. In ths way, the proposed scheme can wthstand the mpersonaton attack. 5.7 No Key Control In the proposed scheme, both and ontly compute the sesson key SK = KDF (,, r r G, d d G) and therefore, fals to predetermne a sesson key snce SK contans r and d, where r and d are the secret values of and ndependent among scheme executons. In other word, or cannot determne a sesson key alone and hence, the proposed scheme provdes the no key control property. 5.8 Verfcaton Usng Scyther Tool Scyther s a tool for the automatc verfcaton of securty protocols. In ths part, we use Scyther-w32-v1.1.3 [4] to analyze the proposed scheme. Fgure 1 shows a summary of the clams n the proposed scheme. The verfcaton result (Fguer 2) shows our scheme s correct. 6 Performance Comparsons Ths secton wll evaluate the performance of the proposed scheme, and compare t wth other related schemes [5, 7] for performance and functonalty aspects. In order to facltate the analyss of the performance, some notatons was defned as below: T ecm : the tme consumpton for an ellptc curve pont multplcaton operaton; T h : the tme consumpton for a hash functon operaton; T eca : the tme consumpton for an ellptc curve pont addton operaton; T kdf : the tme consumpton for a key dervaton functon operaton; T mm : the tme consumpton for a modular multplcaton operaton; T m : The tme consumpton for a modular nverson operaton. Generally, T mm s far greater than T ecm, T eca and T h. ccordng to [1], under the envronment of 2.2 GHz CPU and 2.0G RM, T ecm and T eca are and ms, T m, T mm and T h are 5.565, and 2.3 µs, respectvely. Table 2 demonstrates that the proposed scheme has less computatonal effcency as compared wth He et al. [7] but a slghter hgher than Eun et al. [5] schemes, where the computatonal cost for executng the scheme once s only half of the tme needed for other related scheme due to the proposed scheme needs more ellptc curve pont multplcaton computaton than Eun et al. s scheme, and employ modular nverson computaton nstead of ellptc curve pont addton computaton. Table 3 shows the functonalty analyss of the proposed scheme wth Eun et al. s [5] and He et al. s [7] schemes. It s observed that the proposed scheme outperforms as compared to He et al. s and Eun et al. s schemes as the proposed scheme supports extra features lsted n

6 Internatonal Journal of Network Securty, Vol.19, No.4, PP , July 2017 (DOI: /IJNS (4).17) 636 hashfuncton H;hashfuncton KDF; const dd: Functon;const Mul: Functon; usertype Strng;const a,b: Strng; protocol lu(,) { role { fresh Ra, G, PNa, PNb, tsm: Nonce; var a1, a2, b1, b2, Za1, Za2: Nonce; var SK, MacTaga, MacTagb: Nonce; match(a1,mul(ra, G));match(a2,Mul(Ra,pk())); send_!1(,,a1,a2,pna);recv_!2(,,b1,b2,pnb); match(za1,mul(ra,b1));match(za2,{dd(mul(h(b,pnb),a1),tsm)}sk()); match(sk,kdf(a, b, Za1, Za2)); match(mactaga,h(a, b, SK, b1));send_!3(,,mactaga); recv_!4(,,mactagb);clam_1(,secret,mactaga);clam_2(,secret,a1); clam_3(,secret,a2);clam_4(,secret,b1); clam_5(,secret,b1);clam_6(,lve); clam_7(,weakagree);clam_8(,nagree); clam_9(,nsynch);} role { fresh Rb, G, PNa, PNb, tsm: Nonce; var a1, a2, b1, b2, Zb1, Zb2: Nonce; var SK, MacTaga, MacTagb: Nonce; recv_!1(,,a1,a2,pna);match(b1,mul(rb, G)); match(b2,mul(rb,pk()));send_!2(,,b1,b2,pnb); recv_!3(,,mactaga);match(zb1,mul(rb,a1)); match(zb2,{dd(mul(h(a,pnb),b1),tsm)}sk()); match(sk,kdf(a, b, Zb1, Zb2)); match(mactagb,h(a, b, SK, a1)); send_!4(,,mactagb);clam_1(,secret,mactagb); clam_2(,secret,a1);clam_3(,secret,a2); clam_4(,secret,b1);clam_5(,secret,b1); clam_6(,lve);clam_7(,weakagree); clam_8(,nagree);clam_9(,nsynch);}} Fgure 2: The scheme descrpton Table 3: Comparson of functonalty features Eun et al. [5] He et al. [7] The Proposal Mutual authentcaton Yes Yes Yes User anonymty Yes Yes Yes No key control Yes Yes Yes Known sesson key securty Yes Yes Yes Impersonaton attack No Yes Yes Perfect forward securty of the sesson key - - Yes Relay attack - No Yes

7 Internatonal Journal of Network Securty, Vol.19, No.4, PP , July 2017 (DOI: /IJNS (4).17) 637 Fgure 3: Test result. ths table and s also more secure than He et al. s scheme. s a result, the proposed scheme s much sutable for practcal applcatons as compared to the recently proposed He et al. s scheme. 7 Concluson Ths paper have nvestgated the NFC communcatonsbased mutual authentcaton scheme presented by He et al.. y cryptanalyzng studes, a fatal securty weakness n He et al. s scheme have been found. In order to remedy ths flaw, an enhancement based on He et al. s scheme have been presented. ased on the securty analyss, the proposed scheme has been demonstrated to be satsfed both the verfablty and prvacy of attrbutes. ccordng to the performance comparson results, the effcency and feasblty of the proposed scheme under dfferent prvacy requrements for the IOT have been shown. References [1] H. rshad, and M. Nkooghadam, n effcent and secure authentcaton and key agreement scheme for ses-

8 Internatonal Journal of Network Securty, Vol.19, No.4, PP , July 2017 (DOI: /IJNS (4).17) 638 son ntaton protocol usng ECC, Multmeda Tools and pplcatons, vol. 75, no. 1, pp , [2] G. roll, S. Sorpaes, E. Rukzo, M. Paolucc, J. Hamard, M. Wagner and. Schmdt, Supportng moble servce usage through physcal moble nteracton, n 5th nnual IEEE Internatonal Conference on Pervasve Computng and Communcatons, Whte Plans, NY, US [3] V. Coskun, K. Ok, and. Ozdenzc, Near Feld Communcaton (NFC): From Theory to Practce, London, Wley, February, [4] C. Cremers, The Scyther Tool, pr. 4, ( scyther/) [5] H. Eun, H. Lee, and H. Oh, Condtonal prvacy preservng securty protocol for NFC applcatons, IEEE Transacton on Consumer Electroncs, vol. 59, no. 1, pp , [6] E. Hasoo, L. Hoonung, S. Junggab, K. Sangn, and O. Heekuck, Condtonal prvacy preservng securty protocol for NFC applcatons, n IEEE Internatonal Conference on Consumer Electroncs, pp , [7] D. He, N. Kumar, and J. H. Lee, Secure pseudonymbased near feld communcaton protocol for the consumer nternet of thngs, IEEE Transactons on Consumer Electroncs, vol. 61, no. 1, pp , [8] ISO/IEC, Informaton Technology-Securty Methods- Cryptographc Methods ased on Ellptc Curves - Part 1: General, ISO/IEC , pr [9] ISO/IEC, Informaton Technology Telecommuncatons and Informaton Exchange etween Systems- NFC Securty - Part 1: NFC-SEC NFCIP-1 Securty Servce and Protocol, ISO/IEC : 2010, May [10] ISO/IEC, Informaton Technology Telecommuncatons and Informaton Exchange etween Systems- NFC Securty - Part 2: NFC-SEC Cryptography Standard Usng ECDH and ES, ISO/IEC : 2010, May [11] P. Kumar,. Gurtov, J. Inatt, and S. G. Lee, Delegaton-based robust authentcaton model for wreless roamng usng portable communcaton devces, IEEE Transacton on Consumer Electroncs, vol. 60, no.4, pp , [12] Y. Lu, X. Wu, X. Yang, secure anonymous authentcaton scheme for wreless communcatons usng smart cards, Internatonal Journal of Network Securty, vol. 17, no. 3, pp , [13] W. Lumpkns, and M. Joyce, Near-feld communcaton: It pays: Moble payment systems explaned and explored, IEEE Consumer Electroncs Magazne, vol. 4, no. 2, pp , [14] G. Madlmayr, J. Langer, and C. Kantner, NFC devces: Securty and prvacy, n 3th nnual IEEE Internatonal Conference on valablty, Relablty and Securty, pp , [15]. Matos, D. Romao, and P. Trezentos, Secure hotspot authentcaton through a near feld communcaton sde-channel, n 2012 IEEE 8th Internatonal Conference on Wreless and Moble Computng, Networkng and Communcatons, pp , Oct [16] K. F. Warnck, R.. Gottula, S. Shrestha, and J. Smth, Optmzng power transfer effcency and bandwdth for near feld communcaton systems, IEEE Transacton on ntennas and Propagaton, vol. 61, no. 2, pp , [17] T. Sunl,. Rabn, and M. Sangman, NFC and ts applcaton to moble payment: Overvew and comparson, n th IEEE Internatonal Conference on Informaton Scence and Dgtal Content Technology, pp , [18] C. Thammarat, R. Chokngamwong, C. Techapanupreeda, and S. Kungpsdan, secure lghtweght protocol for NFC communcatons wth mutual authentcaton based on lmted-use of sesson keys, n Proceedngs of 2015 IEEE Internatonal Conference on Informaton Networkng, pp , ography Yan-Na Ma receved the.s. degree n electrcal engneerng from Dalan Unversty (DUT) of Technology, Dalan, Chna, n 2009 and the M.S. and Ph.D. degree n communcatons and ntegrated system from Tokyo Insttute of Technology, Tokyo, Japan, n 2011 and 2014, respectvely. Currently, she s a faculty member wth School of Informaton Engneerng and rt Desgn, Zheang Unversty of Water Resources and Electrc Power, Chna. Her research nterests are speech sgnal processng, nose reducton, near feld communcaton and ther applcatons to communcaton devces.

Efficient Large Integers Arithmetic by Adopting Squaring and Complement Recoding Techniques

Efficient Large Integers Arithmetic by Adopting Squaring and Complement Recoding Techniques The th Worshop on Combnatoral Mathematcs and Computaton Theory Effcent Large Integers Arthmetc by Adoptng Squarng and Complement Recodng Technques Cha-Long Wu*, Der-Chyuan Lou, and Te-Jen Chang *Department

More information

High Speed, Low Power And Area Efficient Carry-Select Adder

High Speed, Low Power And Area Efficient Carry-Select Adder Internatonal Journal of Scence, Engneerng and Technology Research (IJSETR), Volume 5, Issue 3, March 2016 Hgh Speed, Low Power And Area Effcent Carry-Select Adder Nelant Harsh M.tech.VLSI Desgn Electroncs

More information

Xiuqing Chen 1 *, Tianjie Cao 1 *, Jingxuan Zhai 1, Yu Guo 2 1 School of Computer, China University of Mining and Technology, Xuzhou,

Xiuqing Chen 1 *, Tianjie Cao 1 *, Jingxuan Zhai 1, Yu Guo 2 1 School of Computer, China University of Mining and Technology, Xuzhou, [Type text] [Type text] [Type text] ISSN : 0974-7435 Volume 0 Issue 9 BoTechnology 04 An Indan Journal FULL PAPE BTAIJ, 0(9, 04 [3908-397] Securty lghtweght FID protocol for U- healthcare system Xuqng

More information

Improving the Authentication Scheme and Access Control Protocol for VANETs

Improving the Authentication Scheme and Access Control Protocol for VANETs Entropy 2014, 16, 6152-6165; do:10.3390/e16116152 OPEN ACCESS entropy ISSN 1099-4300 www.mdp.com/journal/entropy Artcle Improvng the Authentcaton Scheme and Access Control Protocol for VANETs We-Chen Wu

More information

An Efficient Ownership Transfer Protocol for RFID Conforming to EPC Class 1 Generation 2 Standards

An Efficient Ownership Transfer Protocol for RFID Conforming to EPC Class 1 Generation 2 Standards Journal of Computers Vol. 27, No. 3, 2016, pp. 41-51 do:10.3966/199115592016102703005 An Effcent Ownershp Transfer Protocol for RFID Conformng to EPC Class 1 Generaton 2 Standards Fan-Shuo Lu 1 Ha-Bng

More information

Calculation of the received voltage due to the radiation from multiple co-frequency sources

Calculation of the received voltage due to the radiation from multiple co-frequency sources Rec. ITU-R SM.1271-0 1 RECOMMENDATION ITU-R SM.1271-0 * EFFICIENT SPECTRUM UTILIZATION USING PROBABILISTIC METHODS Rec. ITU-R SM.1271 (1997) The ITU Radocommuncaton Assembly, consderng a) that communcatons

More information

Chaotic Filter Bank for Computer Cryptography

Chaotic Filter Bank for Computer Cryptography Chaotc Flter Bank for Computer Cryptography Bngo Wng-uen Lng Telephone: 44 () 784894 Fax: 44 () 784893 Emal: HTwng-kuen.lng@kcl.ac.ukTH Department of Electronc Engneerng, Dvson of Engneerng, ng s College

More information

PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION. Evgeny Artyomov and Orly Yadid-Pecht

PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION. Evgeny Artyomov and Orly Yadid-Pecht 68 Internatonal Journal "Informaton Theores & Applcatons" Vol.11 PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION Evgeny Artyomov and Orly

More information

MTBF PREDICTION REPORT

MTBF PREDICTION REPORT MTBF PREDICTION REPORT PRODUCT NAME: BLE112-A-V2 Issued date: 01-23-2015 Rev:1.0 Copyrght@2015 Bluegga Technologes. All rghts reserved. 1 MTBF PREDICTION REPORT... 1 PRODUCT NAME: BLE112-A-V2... 1 1.0

More information

DRIVERS ANONYMITY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS NADER MAZEN RABADI DISSERTATION. Submitted to the Graduate School

DRIVERS ANONYMITY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS NADER MAZEN RABADI DISSERTATION. Submitted to the Graduate School DRIVERS ANONYMITY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS by NADER MAZEN RABADI DISSERTATION Submtted to the Graduate School of Wayne State Unversty, Detrot, Mchgan n partal fulfllment of the requrements

More information

Topology Control for C-RAN Architecture Based on Complex Network

Topology Control for C-RAN Architecture Based on Complex Network Topology Control for C-RAN Archtecture Based on Complex Network Zhanun Lu, Yung He, Yunpeng L, Zhaoy L, Ka Dng Chongqng key laboratory of moble communcatons technology Chongqng unversty of post and telecommuncaton

More information

EMA. Education Maintenance Allowance (EMA) Financial Details Form 2017/18. student finance wales cyllid myfyrwyr cymru.

EMA. Education Maintenance Allowance (EMA) Financial Details Form 2017/18. student finance wales cyllid myfyrwyr cymru. student fnance wales cylld myfyrwyr cymru Educaton Mantenance Allowance (EMA) Fnancal Detals Form 2017/18 sound advce on STUDENT FINANCE EMA Educaton Mantenance Allowance (EMA) 2017/18 /A How to complete

More information

EPAS: Efficient Privacy-preserving Authentication Scheme for VANETs-based Emergency Communication

EPAS: Efficient Privacy-preserving Authentication Scheme for VANETs-based Emergency Communication 94 JOURNAL OF SOFTWARE, VOL. 8, NO. 8, AUGUST 03 EPAS: Effcent Prvacy-preservng Authentcaton Scheme for VANETs-based Emergency Communcaton Xuedan Ja School of Computer Scence and Telecommuncaton Engneerng,

More information

To: Professor Avitabile Date: February 4, 2003 From: Mechanical Student Subject: Experiment #1 Numerical Methods Using Excel

To: Professor Avitabile Date: February 4, 2003 From: Mechanical Student Subject: Experiment #1 Numerical Methods Using Excel To: Professor Avtable Date: February 4, 3 From: Mechancal Student Subject:.3 Experment # Numercal Methods Usng Excel Introducton Mcrosoft Excel s a spreadsheet program that can be used for data analyss,

More information

Uncertainty in measurements of power and energy on power networks

Uncertainty in measurements of power and energy on power networks Uncertanty n measurements of power and energy on power networks E. Manov, N. Kolev Department of Measurement and Instrumentaton, Techncal Unversty Sofa, bul. Klment Ohrdsk No8, bl., 000 Sofa, Bulgara Tel./fax:

More information

A Comparison of Two Equivalent Real Formulations for Complex-Valued Linear Systems Part 2: Results

A Comparison of Two Equivalent Real Formulations for Complex-Valued Linear Systems Part 2: Results AMERICAN JOURNAL OF UNDERGRADUATE RESEARCH VOL. 1 NO. () A Comparson of Two Equvalent Real Formulatons for Complex-Valued Lnear Systems Part : Results Abnta Munankarmy and Mchael A. Heroux Department of

More information

Secure Transmission of Sensitive data using multiple channels

Secure Transmission of Sensitive data using multiple channels Secure Transmsson of Senstve data usng multple channels Ahmed A. Belal, Ph.D. Department of computer scence and automatc control Faculty of Engneerng Unversty of Alexandra Alexandra, Egypt. aabelal@hotmal.com

More information

Performance Analysis of Multi User MIMO System with Block-Diagonalization Precoding Scheme

Performance Analysis of Multi User MIMO System with Block-Diagonalization Precoding Scheme Performance Analyss of Mult User MIMO System wth Block-Dagonalzaton Precodng Scheme Yoon Hyun m and Jn Young m, wanwoon Unversty, Department of Electroncs Convergence Engneerng, Wolgye-Dong, Nowon-Gu,

More information

VRT014 User s guide V0.8. Address: Saltoniškių g. 10c, Vilnius LT-08105, Phone: (370-5) , Fax: (370-5) ,

VRT014 User s guide V0.8. Address: Saltoniškių g. 10c, Vilnius LT-08105, Phone: (370-5) , Fax: (370-5) , VRT014 User s gude V0.8 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

A Digital Content Distribution Using a Group-Key and Multi-layered Structure Based on Web

A Digital Content Distribution Using a Group-Key and Multi-layered Structure Based on Web A Dgtal Content Dstrbuton Usng a Group-Key and Mult-layered Structure Based on Web Yun-J Na and Il Seo Ko 2 Department of Internet Software, Honam Unversty 59-, Seobong-Dong, Gwangsan-Gu, Gwangju 506-74,

More information

An Efficient and Flexible Decentralized Multicast Key Distribution Scheme

An Efficient and Flexible Decentralized Multicast Key Distribution Scheme IJCSNS Internatonal Journal of Computer Scence and Networ Securty VOL. 6 No. 8B August 006 11 An Effcent and Flexble Decentralzed Multcast Key Dstrbuton Scheme Wen-Shenq Juang and Jyan-Cwan Wu Department

More information

antenna antenna (4.139)

antenna antenna (4.139) .6.6 The Lmts of Usable Input Levels for LNAs The sgnal voltage level delvered to the nput of an LNA from the antenna may vary n a very wde nterval, from very weak sgnals comparable to the nose level,

More information

Resource Allocation Optimization for Device-to- Device Communication Underlaying Cellular Networks

Resource Allocation Optimization for Device-to- Device Communication Underlaying Cellular Networks Resource Allocaton Optmzaton for Devce-to- Devce Communcaton Underlayng Cellular Networks Bn Wang, L Chen, Xaohang Chen, Xn Zhang, and Dacheng Yang Wreless Theores and Technologes (WT&T) Bejng Unversty

More information

Secure Power Scheduling Auction for Smart Grids Using Homomorphic Encryption

Secure Power Scheduling Auction for Smart Grids Using Homomorphic Encryption Secure Power Schedulng Aucton for Smart Grds Usng Homomorphc Encrypton Haya Shajaah, Student Member, IEEE, Ahmed Abdelhad, Senor Member, IEEE, and Charles Clancy, Senor Member, IEEE Abstract In ths paper,

More information

Cryptanalysis and Improvement of a Password-Based Authenticated Three-Party Key Exchange Protocol

Cryptanalysis and Improvement of a Password-Based Authenticated Three-Party Key Exchange Protocol Internatonal Journal of Securt and Its pplcatons pp.151-160 http://d.do.org/10.14257/jsa.2014.8.4.14 rptanalss and Improvement of a Password-ased uthentcated Three-Part e Echange Protocol oungsook Lee

More information

Figure.1. Basic model of an impedance source converter JCHPS Special Issue 12: August Page 13

Figure.1. Basic model of an impedance source converter JCHPS Special Issue 12: August Page 13 A Hgh Gan DC - DC Converter wth Soft Swtchng and Power actor Correcton for Renewable Energy Applcaton T. Selvakumaran* and. Svachdambaranathan Department of EEE, Sathyabama Unversty, Chenna, Inda. *Correspondng

More information

熊本大学学術リポジトリ. Kumamoto University Repositor

熊本大学学術リポジトリ. Kumamoto University Repositor 熊本大学学術リポジトリ Kumamoto Unversty Repostor Ttle Wreless LAN Based Indoor Poston and Its Smulaton Author(s) Ktasuka, Teruak; Nakansh, Tsune CtatonIEEE Pacfc RIM Conference on Comm Computers, and Sgnal Processng

More information

Hardware Design of Filter Bank-Based Narrowband/Wideband Interference Canceler for Overlaid TDMA/CDMA Systems

Hardware Design of Filter Bank-Based Narrowband/Wideband Interference Canceler for Overlaid TDMA/CDMA Systems Hardware Desgn of Flter anased arrowband/deband Interference Canceler for Overlad TDMA/CDMA Systems Toyoau Ktano Kaunor Hayash Htosh Masutan and Shnsue Hara Graduate School of Engneerng Osaa Unversty YamadaOa

More information

Gustavus J. Simmons Sandia National Laboratories Albuquerque, NM 87185

Gustavus J. Simmons Sandia National Laboratories Albuquerque, NM 87185 An Impersonaton-Proof Identty Verfcaton Scheme* Gustavus J. Smmons Sanda Natonal Laboratores Albuquerque, NM 87185 Most schemes for the verfcaton of personal dentty are logcally flawed n that they requre

More information

Walsh Function Based Synthesis Method of PWM Pattern for Full-Bridge Inverter

Walsh Function Based Synthesis Method of PWM Pattern for Full-Bridge Inverter Walsh Functon Based Synthess Method of PWM Pattern for Full-Brdge Inverter Sej Kondo and Krt Choesa Nagaoka Unversty of Technology 63-, Kamtomoka-cho, Nagaoka 9-, JAPAN Fax: +8-58-7-95, Phone: +8-58-7-957

More information

EPDA: Enhancing Privacy-Preserving Data Authentication for Mobile Crowd Sensing

EPDA: Enhancing Privacy-Preserving Data Authentication for Mobile Crowd Sensing EPDA: Enhancng Prvacy-Preservng Data Authentcaton for Moble Crowd Sensng arxv:8.375v [cs.cr] 9 Nov 8 Jngwe Lu, Fanghu Ca, Longfe Wu, Rong Sun, Lehuang Zhu and Xaojang Du State Key Lab of ISN, Xdan Unversty,

More information

Research of Dispatching Method in Elevator Group Control System Based on Fuzzy Neural Network. Yufeng Dai a, Yun Du b

Research of Dispatching Method in Elevator Group Control System Based on Fuzzy Neural Network. Yufeng Dai a, Yun Du b 2nd Internatonal Conference on Computer Engneerng, Informaton Scence & Applcaton Technology (ICCIA 207) Research of Dspatchng Method n Elevator Group Control System Based on Fuzzy Neural Network Yufeng

More information

Defense Against Selfish PUEA in Cognitive Radio Networks Based on Hash Message Authentication Code

Defense Against Selfish PUEA in Cognitive Radio Networks Based on Hash Message Authentication Code Internatonal Journal of Electroncs and Informaton Engneerng, Vol.4, No.1, PP.12-21, Mar. 2016 12 Defense Aganst Selfsh PUEA n Cogntve Rado Networks Based on Hash Message Authentcaton Code Wald Ramadan

More information

A study of turbo codes for multilevel modulations in Gaussian and mobile channels

A study of turbo codes for multilevel modulations in Gaussian and mobile channels A study of turbo codes for multlevel modulatons n Gaussan and moble channels Lamne Sylla and Paul Forter (sylla, forter)@gel.ulaval.ca Department of Electrcal and Computer Engneerng Laval Unversty, Ste-Foy,

More information

FAST ELECTRON IRRADIATION EFFECTS ON MOS TRANSISTOR MICROSCOPIC PARAMETERS EXPERIMENTAL DATA AND THEORETICAL MODELS

FAST ELECTRON IRRADIATION EFFECTS ON MOS TRANSISTOR MICROSCOPIC PARAMETERS EXPERIMENTAL DATA AND THEORETICAL MODELS Journal of Optoelectroncs and Advanced Materals Vol. 7, No., June 5, p. 69-64 FAST ELECTRON IRRAIATION EFFECTS ON MOS TRANSISTOR MICROSCOPIC PARAMETERS EXPERIMENTAL ATA AN THEORETICAL MOELS G. Stoenescu,

More information

RC Filters TEP Related Topics Principle Equipment

RC Filters TEP Related Topics Principle Equipment RC Flters TEP Related Topcs Hgh-pass, low-pass, Wen-Robnson brdge, parallel-t flters, dfferentatng network, ntegratng network, step response, square wave, transfer functon. Prncple Resstor-Capactor (RC)

More information

Time-frequency Analysis Based State Diagnosis of Transformers Windings under the Short-Circuit Shock

Time-frequency Analysis Based State Diagnosis of Transformers Windings under the Short-Circuit Shock Tme-frequency Analyss Based State Dagnoss of Transformers Wndngs under the Short-Crcut Shock YUYING SHAO, ZHUSHI RAO School of Mechancal Engneerng ZHIJIAN JIN Hgh Voltage Lab Shangha Jao Tong Unversty

More information

The Performance Improvement of BASK System for Giga-Bit MODEM Using the Fuzzy System

The Performance Improvement of BASK System for Giga-Bit MODEM Using the Fuzzy System Int. J. Communcatons, Network and System Scences, 10, 3, 1-5 do:10.36/jcns.10.358 Publshed Onlne May 10 (http://www.scrp.org/journal/jcns/) The Performance Improvement of BASK System for Gga-Bt MODEM Usng

More information

International Journal of Network Security & Its Application (IJNSA), Vol.2, No.1, January SYSTEL, SUPCOM, Tunisia.

International Journal of Network Security & Its Application (IJNSA), Vol.2, No.1, January SYSTEL, SUPCOM, Tunisia. Internatonal Journal of Network Securty & Its Applcaton (IJNSA), Vol.2, No., January 2 WEAKNESS ON CRYPTOGRAPHIC SCHEMES BASED ON REGULAR LDPC CODES Omessaad Hamd, Manel abdelhed 2, Ammar Bouallegue 2,

More information

A New Type of Weighted DV-Hop Algorithm Based on Correction Factor in WSNs

A New Type of Weighted DV-Hop Algorithm Based on Correction Factor in WSNs Journal of Communcatons Vol. 9, No. 9, September 2014 A New Type of Weghted DV-Hop Algorthm Based on Correcton Factor n WSNs Yng Wang, Zhy Fang, and Ln Chen Department of Computer scence and technology,

More information

Broadcast Authentication for Wireless Sensor Networks Using Nested Hashing and the Chinese Remainder Theorem

Broadcast Authentication for Wireless Sensor Networks Using Nested Hashing and the Chinese Remainder Theorem Sensors 2010, 10, 8683-8695; do:10.3390/s100908683 OPEN CCESS sensors ISSN 1424-8220 www.mdp.com/ournal/sensors rtcle roadcast uthentcaton for Wreless Sensor Networks Usng Nested Hashng and the Chnese

More information

Tile Values of Information in Some Nonzero Sum Games

Tile Values of Information in Some Nonzero Sum Games lnt. ournal of Game Theory, Vot. 6, ssue 4, page 221-229. Physca- Verlag, Venna. Tle Values of Informaton n Some Nonzero Sum Games By P. Levne, Pars I ), and ZP, Ponssard, Pars 2 ) Abstract: The paper

More information

NATIONAL RADIO ASTRONOMY OBSERVATORY Green Bank, West Virginia SPECTRAL PROCESSOR MEMO NO. 25. MEMORANDUM February 13, 1985

NATIONAL RADIO ASTRONOMY OBSERVATORY Green Bank, West Virginia SPECTRAL PROCESSOR MEMO NO. 25. MEMORANDUM February 13, 1985 NATONAL RADO ASTRONOMY OBSERVATORY Green Bank, West Vrgna SPECTRAL PROCESSOR MEMO NO. 25 MEMORANDUM February 13, 1985 To: Spectral Processor Group From: R. Fsher Subj: Some Experments wth an nteger FFT

More information

HUAWEI TECHNOLOGIES CO., LTD. Huawei Proprietary Page 1

HUAWEI TECHNOLOGIES CO., LTD. Huawei Proprietary Page 1 Project Ttle Date Submtted IEEE 802.16 Broadband Wreless Access Workng Group Double-Stage DL MU-MIMO Scheme 2008-05-05 Source(s) Yang Tang, Young Hoon Kwon, Yajun Kou, Shahab Sanaye,

More information

Control Chart. Control Chart - history. Process in control. Developed in 1920 s. By Dr. Walter A. Shewhart

Control Chart. Control Chart - history. Process in control. Developed in 1920 s. By Dr. Walter A. Shewhart Control Chart - hstory Control Chart Developed n 920 s By Dr. Walter A. Shewhart 2 Process n control A phenomenon s sad to be controlled when, through the use of past experence, we can predct, at least

More information

Parameter Free Iterative Decoding Metrics for Non-Coherent Orthogonal Modulation

Parameter Free Iterative Decoding Metrics for Non-Coherent Orthogonal Modulation 1 Parameter Free Iteratve Decodng Metrcs for Non-Coherent Orthogonal Modulaton Albert Gullén Fàbregas and Alex Grant Abstract We study decoder metrcs suted for teratve decodng of non-coherently detected

More information

Research on Controller of Micro-hydro Power System Nan XIE 1,a, Dezhi QI 2,b,Weimin CHEN 2,c, Wei WANG 2,d

Research on Controller of Micro-hydro Power System Nan XIE 1,a, Dezhi QI 2,b,Weimin CHEN 2,c, Wei WANG 2,d Advanced Materals Research Submtted: 2014-05-13 ISSN: 1662-8985, Vols. 986-987, pp 1121-1124 Accepted: 2014-05-19 do:10.4028/www.scentfc.net/amr.986-987.1121 Onlne: 2014-07-18 2014 Trans Tech Publcatons,

More information

Network Reconfiguration in Distribution Systems Using a Modified TS Algorithm

Network Reconfiguration in Distribution Systems Using a Modified TS Algorithm Network Reconfguraton n Dstrbuton Systems Usng a Modfed TS Algorthm ZHANG DONG,FU ZHENGCAI,ZHANG LIUCHUN,SONG ZHENGQIANG School of Electroncs, Informaton and Electrcal Engneerng Shangha Jaotong Unversty

More information

Comparative Analysis of Reuse 1 and 3 in Cellular Network Based On SIR Distribution and Rate

Comparative Analysis of Reuse 1 and 3 in Cellular Network Based On SIR Distribution and Rate Comparatve Analyss of Reuse and 3 n ular Network Based On IR Dstrbuton and Rate Chandra Thapa M.Tech. II, DEC V College of Engneerng & Technology R.V.. Nagar, Chttoor-5727, A.P. Inda Emal: chandra2thapa@gmal.com

More information

Th P5 13 Elastic Envelope Inversion SUMMARY. J.R. Luo* (Xi'an Jiaotong University), R.S. Wu (UC Santa Cruz) & J.H. Gao (Xi'an Jiaotong University)

Th P5 13 Elastic Envelope Inversion SUMMARY. J.R. Luo* (Xi'an Jiaotong University), R.S. Wu (UC Santa Cruz) & J.H. Gao (Xi'an Jiaotong University) -4 June 5 IFEMA Madrd h P5 3 Elastc Envelope Inverson J.R. Luo* (X'an Jaotong Unversty), R.S. Wu (UC Santa Cruz) & J.H. Gao (X'an Jaotong Unversty) SUMMARY We developed the elastc envelope nverson method.

More information

POLYTECHNIC UNIVERSITY Electrical Engineering Department. EE SOPHOMORE LABORATORY Experiment 1 Laboratory Energy Sources

POLYTECHNIC UNIVERSITY Electrical Engineering Department. EE SOPHOMORE LABORATORY Experiment 1 Laboratory Energy Sources POLYTECHNIC UNIERSITY Electrcal Engneerng Department EE SOPHOMORE LABORATORY Experment 1 Laboratory Energy Sources Modfed for Physcs 18, Brooklyn College I. Oerew of the Experment Ths experment has three

More information

Sensors for Motion and Position Measurement

Sensors for Motion and Position Measurement Sensors for Moton and Poston Measurement Introducton An ntegrated manufacturng envronment conssts of 5 elements:- - Machne tools - Inspecton devces - Materal handlng devces - Packagng machnes - Area where

More information

Accelerated Modular Multiplication Algorithm of Large Word Length Numbers with a Fixed Module

Accelerated Modular Multiplication Algorithm of Large Word Length Numbers with a Fixed Module Accelerated Modular Multplcaton Algorthm of Large Word Length Numbers wth a Fxed Module Nkolaos Bards 1, Athanasos Drgas 1, Alexander Markovskyy, and John Vrettaros 1 1 Natonal Centre for Scentfc Research

More information

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS 1. Jiawen Kang, Rong Yu, Member, IEEE, Xumin Huang, and Yan Zhang, Senior Member, IEEE

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS 1. Jiawen Kang, Rong Yu, Member, IEEE, Xumin Huang, and Yan Zhang, Senior Member, IEEE IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS 1 Prvacy-Preserved Pseudonym Scheme for Fog Computng Supported Internet of Vehcles Jawen Kang, Rong Yu, Member, IEEE, Xumn Huang, and Yan Zhang,

More information

THE ARCHITECTURE OF THE BROADBAND AMPLIFIERS WITHOUT CLASSICAL STAGES WITH A COMMON BASE AND A COMMON EMITTER

THE ARCHITECTURE OF THE BROADBAND AMPLIFIERS WITHOUT CLASSICAL STAGES WITH A COMMON BASE AND A COMMON EMITTER VOL. 0, NO. 8, OCTOBE 205 ISSN 89-6608 2006-205 Asan esearch Publshng Network (APN. All rghts reserved. THE ACHITECTUE OF THE BOADBAND AMPLIFIES WITHOUT CLASSICAL STAGES WITH A COMMON BASE AND A COMMON

More information

An efficient cluster-based power saving scheme for wireless sensor networks

An efficient cluster-based power saving scheme for wireless sensor networks RESEARCH Open Access An effcent cluster-based power savng scheme for wreless sensor networks Jau-Yang Chang * and Pe-Hao Ju Abstract In ths artcle, effcent power savng scheme and correspondng algorthm

More information

A NSGA-II algorithm to solve a bi-objective optimization of the redundancy allocation problem for series-parallel systems

A NSGA-II algorithm to solve a bi-objective optimization of the redundancy allocation problem for series-parallel systems 0 nd Internatonal Conference on Industral Technology and Management (ICITM 0) IPCSIT vol. 49 (0) (0) IACSIT Press, Sngapore DOI: 0.776/IPCSIT.0.V49.8 A NSGA-II algorthm to solve a b-obectve optmzaton of

More information

Distributed Uplink Scheduling in EV-DO Rev. A Networks

Distributed Uplink Scheduling in EV-DO Rev. A Networks Dstrbuted Uplnk Schedulng n EV-DO ev. A Networks Ashwn Srdharan (Sprnt Nextel) amesh Subbaraman, och Guérn (ESE, Unversty of Pennsylvana) Overvew of Problem Most modern wreless systems Delver hgh performance

More information

Side-Match Vector Quantizers Using Neural Network Based Variance Predictor for Image Coding

Side-Match Vector Quantizers Using Neural Network Based Variance Predictor for Image Coding Sde-Match Vector Quantzers Usng Neural Network Based Varance Predctor for Image Codng Shuangteng Zhang Department of Computer Scence Eastern Kentucky Unversty Rchmond, KY 40475, U.S.A. shuangteng.zhang@eku.edu

More information

Priority based Dynamic Multiple Robot Path Planning

Priority based Dynamic Multiple Robot Path Planning 2nd Internatonal Conference on Autonomous obots and Agents Prorty based Dynamc Multple obot Path Plannng Abstract Taxong Zheng Department of Automaton Chongqng Unversty of Post and Telecommuncaton, Chna

More information

Strain Gauge Measuring Amplifier BA 660

Strain Gauge Measuring Amplifier BA 660 Stran Gauge Measurng Amplfer BA 660 Orgnal of the Manual BA660 / IP20 BA660 / IP66 Table of Contents 1. Safety precautons...2 1.1. Feld of applcaton...2 1.2. Installaton...2 1.3. Mantenance...2 2. Functon...2

More information

Rejection of PSK Interference in DS-SS/PSK System Using Adaptive Transversal Filter with Conditional Response Recalculation

Rejection of PSK Interference in DS-SS/PSK System Using Adaptive Transversal Filter with Conditional Response Recalculation SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol., No., November 23, 3-9 Rejecton of PSK Interference n DS-SS/PSK System Usng Adaptve Transversal Flter wth Condtonal Response Recalculaton Zorca Nkolć, Bojan

More information

IEE Electronics Letters, vol 34, no 17, August 1998, pp ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES

IEE Electronics Letters, vol 34, no 17, August 1998, pp ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES IEE Electroncs Letters, vol 34, no 17, August 1998, pp. 1622-1624. ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES A. Chatzgeorgou, S. Nkolads 1 and I. Tsoukalas Computer Scence Department, 1 Department

More information

Article Localization-Free Detection of Replica Node Attacks in Wireless Sensor Networks Using Similarity Estimation with Group Deployment Knowledge

Article Localization-Free Detection of Replica Node Attacks in Wireless Sensor Networks Using Similarity Estimation with Group Deployment Knowledge Artcle ocalaton-free Detecton of Replca Node Attacks n Wreless Sensor Networks Usng Smlarty Estmaton wth Group Deployment Knowledge Chao Dng 1, jun Yang, * and Meng Wu 3, * 1 College of Computer Scence,

More information

communications are increasingly used in a way that they are scrambling and the combination of scrambling frequency and time domain.

communications are increasingly used in a way that they are scrambling and the combination of scrambling frequency and time domain. Journal of Advances n Computer Research Quarterly pissn: 2345-606x eissn: 2345-6078 Sar Branch, Islamc Azad Unversty, Sar, I.R.Iran (Vol. 7, No. 3, August 2016), Pages: 67-76 www.jacr.ausar.ac.r Audo Sgnal

More information

CMOS Implementation of Lossy Integrator using Current Mirrors Rishu Jain 1, Manveen Singh Chadha 2 1, 2

CMOS Implementation of Lossy Integrator using Current Mirrors Rishu Jain 1, Manveen Singh Chadha 2 1, 2 Proceedngs of Natonal Conference on Recent Advances n Electroncs and Communcaton Engneerng CMOS Implementaton of Lossy Integrator usng Current Mrrors Rshu Jan, Manveen Sngh Chadha 2, 2 Department of Electroncs

More information

The Dynamic Utilization of Substation Measurements to Maintain Power System Observability

The Dynamic Utilization of Substation Measurements to Maintain Power System Observability 1 The Dynamc Utlzaton of Substaton Measurements to Mantan Power System Observablty Y. Wu, Student Member, IEEE, M. Kezunovc, Fellow, IEEE and T. Kostc, Member, IEEE Abstract-- In a power system State Estmator

More information

Fall 2018 #11 Games and Nimbers. A. Game. 0.5 seconds, 64 megabytes

Fall 2018 #11 Games and Nimbers. A. Game. 0.5 seconds, 64 megabytes 5-95 Fall 08 # Games and Nmbers A. Game 0.5 seconds, 64 megabytes There s a legend n the IT Cty college. A student that faled to answer all questons on the game theory exam s gven one more chance by hs

More information

Dynamic Optimization. Assignment 1. Sasanka Nagavalli January 29, 2013 Robotics Institute Carnegie Mellon University

Dynamic Optimization. Assignment 1. Sasanka Nagavalli January 29, 2013 Robotics Institute Carnegie Mellon University Dynamc Optmzaton Assgnment 1 Sasanka Nagavall snagaval@andrew.cmu.edu 16-745 January 29, 213 Robotcs Insttute Carnege Mellon Unversty Table of Contents 1. Problem and Approach... 1 2. Optmzaton wthout

More information

STUDY ON LINK-LEVEL SIMULATION IN MULTI- CELL LTE DOWNLINK SYSTEM

STUDY ON LINK-LEVEL SIMULATION IN MULTI- CELL LTE DOWNLINK SYSTEM Proceedngs of IEEE IC-BMT0 TUDY O LIK-LEVEL IMULATIO I MULTI- CELL LTE DOWLIK YTEM Yang Zhang, Ruoyu Jn, Xn Zhang, Dacheng Yang Beng Unversty of Posts and Telecommuncatons, Beng 00876, Chna 05330@bupt.edu.cn

More information

Evaluating Different One to Many Packet Delivery Schemes for UMTS

Evaluating Different One to Many Packet Delivery Schemes for UMTS Evaluatng Dfferent One to Many Packet Delvery Schemes for UMTS Antonos Alexou, Dmtros Antonells, Chrstos Bouras Research Academc Computer Technology Insttute, Greece and Computer Engneerng and Informatcs

More information

Guidelines for CCPR and RMO Bilateral Key Comparisons CCPR Working Group on Key Comparison CCPR-G5 October 10 th, 2014

Guidelines for CCPR and RMO Bilateral Key Comparisons CCPR Working Group on Key Comparison CCPR-G5 October 10 th, 2014 Gudelnes for CCPR and RMO Blateral Key Comparsons CCPR Workng Group on Key Comparson CCPR-G5 October 10 th, 2014 These gudelnes are prepared by CCPR WG-KC and RMO P&R representatves, and approved by CCPR,

More information

Lecture 10: Bipolar Junction Transistor Construction. NPN Physical Operation.

Lecture 10: Bipolar Junction Transistor Construction. NPN Physical Operation. Whtes, EE 320 Lecture 10 Page 1 of 9 Lecture 10: Bpolar Juncton Transstor Constructon. NPN Physcal Operaton. For the remander of ths semester we wll be studyng transstors and transstor crcuts. The transstor

More information

On Channel Estimation of OFDM-BPSK and -QPSK over Generalized Alpha-Mu Fading Distribution

On Channel Estimation of OFDM-BPSK and -QPSK over Generalized Alpha-Mu Fading Distribution Int. J. Communcatons, Network and System Scences, 010, 3, 380-384 do:10.436/jcns.010.34048 Publshed Onlne Aprl 010 (http://www.scrp.org/journal/jcns/) On Channel Estmaton of OFDM-BPSK and -QPSK over Generalzed

More information

SECURE COMMUNICATION BY USING MULTIPLE KEYS HAVING VARIABLE LENGTH IN A REAL TIME ENVIRONMENT FOR MULTIPLE STATIONS

SECURE COMMUNICATION BY USING MULTIPLE KEYS HAVING VARIABLE LENGTH IN A REAL TIME ENVIRONMENT FOR MULTIPLE STATIONS Journal of Engneerng Scence and echnology Vol. 7, No. 4 ( 55-56 School of Engneerng, aylor s Unversty SECURE COMMUNICAION BY USING MULIPLE KEYS HAVING VARIABLE LENGH IN A REAL IME ENVIRONMEN FOR MULIPLE

More information

Optimization Frequency Design of Eddy Current Testing

Optimization Frequency Design of Eddy Current Testing Optmzaton Frequency Desgn of Eddy Current Testng NAONG MUNGKUNG 1, KOMKIT CHOMSUWAN 1, NAONG PIMPU 2 AND TOSHIFUMI YUJI 3 1 Department of Electrcal Technology Educaton Kng Mongkut s Unversty of Technology

More information

Passive Filters. References: Barbow (pp ), Hayes & Horowitz (pp 32-60), Rizzoni (Chap. 6)

Passive Filters. References: Barbow (pp ), Hayes & Horowitz (pp 32-60), Rizzoni (Chap. 6) Passve Flters eferences: Barbow (pp 6575), Hayes & Horowtz (pp 360), zzon (Chap. 6) Frequencyselectve or flter crcuts pass to the output only those nput sgnals that are n a desred range of frequences (called

More information

Figure 1. DC-DC Boost Converter

Figure 1. DC-DC Boost Converter EE46, Power Electroncs, DC-DC Boost Converter Verson Oct. 3, 11 Overvew Boost converters make t possble to effcently convert a DC voltage from a lower level to a hgher level. Theory of Operaton Relaton

More information

Multi-hop Coordination in Gossiping-based Wireless Sensor Networks

Multi-hop Coordination in Gossiping-based Wireless Sensor Networks Mult-hop Coordnaton n Gosspng-based Wreless Sensor Networks Zhlang Chen, Alexander Kuehne, and Anja Klen Communcatons Engneerng Lab, Technsche Unverstät Darmstadt, Germany Emal: {z.chen,a.kuehne,a.klen}@nt.tu-darmstadt.de

More information

Multiple Error Correction Using Reduced Precision Redundancy Technique

Multiple Error Correction Using Reduced Precision Redundancy Technique Multple Error Correcton Usng Reduced Precson Redundancy Technque Chthra V 1, Nthka Bhas 2, Janeera D A 3 1,2,3 ECE Department, Dhanalakshm Srnvasan College of Engneerng,Combatore, Tamlnadu, Inda Abstract

More information

A High-Sensitivity Oversampling Digital Signal Detection Technique for CMOS Image Sensors Using Non-destructive Intermediate High-Speed Readout Mode

A High-Sensitivity Oversampling Digital Signal Detection Technique for CMOS Image Sensors Using Non-destructive Intermediate High-Speed Readout Mode A Hgh-Senstvty Oversamplng Dgtal Sgnal Detecton Technque for CMOS Image Sensors Usng Non-destructve Intermedate Hgh-Speed Readout Mode Shoj Kawahto*, Nobuhro Kawa** and Yoshak Tadokoro** *Research Insttute

More information

Chapter 2 Basics of Efficient Secure Function Evaluation

Chapter 2 Basics of Efficient Secure Function Evaluation Chapter 2 Bascs of Effcent Secure Functon Evaluaton 2.1 Common Notaton and Defntons In ths secton we ntroduce common notaton (Sect. 2.1.1), cryptographc prmtves (Sect. 2.1.2), functon representatons (Sect.

More information

TECHNICAL NOTE TERMINATION FOR POINT- TO-POINT SYSTEMS TN TERMINATON FOR POINT-TO-POINT SYSTEMS. Zo = L C. ω - angular frequency = 2πf

TECHNICAL NOTE TERMINATION FOR POINT- TO-POINT SYSTEMS TN TERMINATON FOR POINT-TO-POINT SYSTEMS. Zo = L C. ω - angular frequency = 2πf TECHNICAL NOTE TERMINATION FOR POINT- TO-POINT SYSTEMS INTRODUCTION Because dgtal sgnal rates n computng systems are ncreasng at an astonshng rate, sgnal ntegrty ssues have become far more mportant to

More information

Digital Transmission

Digital Transmission Dgtal Transmsson Most modern communcaton systems are dgtal, meanng that the transmtted normaton sgnal carres bts and symbols rather than an analog sgnal. The eect o C/N rato ncrease or decrease on dgtal

More information

Bit Error Probability of Cooperative Diversity for M-ary QAM OFDM-based system with Best Relay Selection

Bit Error Probability of Cooperative Diversity for M-ary QAM OFDM-based system with Best Relay Selection 011 Internatonal Conerence on Inormaton and Electroncs Engneerng IPCSIT vol.6 (011) (011) IACSIT Press, Sngapore Bt Error Proalty o Cooperatve Dversty or M-ary QAM OFDM-ased system wth Best Relay Selecton

More information

Application Form. Welsh Government Learning Grant Further Education 2017/18. student finance wales cyllid myfyrwyr cymru

Application Form. Welsh Government Learning Grant Further Education 2017/18. student finance wales cyllid myfyrwyr cymru student fnance wales cylld myfyrwyr cymru Welsh Government Learnng Grant Further Educaton 2017/18 Applcaton Form www.studentfnancewales.co.uk/wglgfe sound advce on STUDENT FINANCE /A How to complete ths

More information

Energy Efficiency Analysis of a Multichannel Wireless Access Protocol

Energy Efficiency Analysis of a Multichannel Wireless Access Protocol Energy Effcency Analyss of a Multchannel Wreless Access Protocol A. Chockalngam y, Wepng u, Mchele Zorz, and Laurence B. Mlsten Department of Electrcal and Computer Engneerng, Unversty of Calforna, San

More information

The Spectrum Sharing in Cognitive Radio Networks Based on Competitive Price Game

The Spectrum Sharing in Cognitive Radio Networks Based on Competitive Price Game 8 Y. B. LI, R. YAG, Y. LI, F. YE, THE SPECTRUM SHARIG I COGITIVE RADIO ETWORKS BASED O COMPETITIVE The Spectrum Sharng n Cogntve Rado etworks Based on Compettve Prce Game Y-bng LI, Ru YAG., Yun LI, Fang

More information

Index Terms Adaptive modulation, Adaptive FEC, Packet Error Rate, Performance.

Index Terms Adaptive modulation, Adaptive FEC, Packet Error Rate, Performance. ANALYTICAL COMPARISON OF THE PERFORMANCE OF ADAPTIVE MODULATION AND CODING IN WIRELESS NETWORK UNDER RAYLEIGH FADING 723 Sab Y.M. BANDIRI, Rafael M.S. BRAGA and Danlo H. SPADOTI Federal Unversty of Itajubá

More information

A High-Speed Multiplication Algorithm Using Modified Partial Product Reduction Tree

A High-Speed Multiplication Algorithm Using Modified Partial Product Reduction Tree World Academy of Scence, Engneerng and Technology Internatonal Journal of Electrcal and Computer Engneerng Vol:4, No:, 200 A Hgh-Speed Multplcaton Algorthm Usng Modfed Partal Product educton Tree P Asadee

More information

Wireless Sensor Network Coverage Optimization Based on Fruit Fly Algorithm

Wireless Sensor Network Coverage Optimization Based on Fruit Fly Algorithm Wreless Sensor Network Coverage Optmzaton Based on Frut Fly Algorthm https://do.org/10.3991/joe.v1406.8698 Ren Song!! ", Zhchao Xu, Yang Lu Jln Unversty of Fnance and Economcs, Jln, Chna rensong1579@163.com

More information

An Adaptive Scheduling Algorithm for Set Cover Problem in Wireless Sensor Networks: A Cellular Learning Automata Approach

An Adaptive Scheduling Algorithm for Set Cover Problem in Wireless Sensor Networks: A Cellular Learning Automata Approach 2 3rd Internatonal Conference on Machne Learnng and Computng (ICMLC 2) n daptve chedulng lgorthm for et Cover Problem n Wreless ensor Networks: Cellular Learnng utomata pproach eza Ghader Computer Engneerng

More information

Application Form Academic year 2015/16

Application Form Academic year 2015/16 EDUCATION MAINTENANCE ALLOWANCE (EMA) Applcaton Form Academc year 2015/16 www.ndrect.gov.uk Apply Now! How to complete ths applcaton form Follow the nstructons, we ll tell you what questons you need to

More information

Joint Adaptive Modulation and Power Allocation in Cognitive Radio Networks

Joint Adaptive Modulation and Power Allocation in Cognitive Radio Networks I. J. Communcatons, etwork and System Scences, 8, 3, 7-83 Publshed Onlne August 8 n ScRes (http://www.scrp.org/journal/jcns/). Jont Adaptve Modulaton and Power Allocaton n Cogntve Rado etworks Dong LI,

More information

Low Switching Frequency Active Harmonic Elimination in Multilevel Converters with Unequal DC Voltages

Low Switching Frequency Active Harmonic Elimination in Multilevel Converters with Unequal DC Voltages Low Swtchng Frequency Actve Harmonc Elmnaton n Multlevel Converters wth Unequal DC Voltages Zhong Du,, Leon M. Tolbert, John N. Chasson, Hu L The Unversty of Tennessee Electrcal and Computer Engneerng

More information

A Novel Soft-Switching Two-Switch Flyback Converter with a Wide Operating Range and Regenerative Clamping

A Novel Soft-Switching Two-Switch Flyback Converter with a Wide Operating Range and Regenerative Clamping 77 Journal of ower Electroncs, ol 9, No 5, September 009 JE 9-5- A Novel Soft-Swtchng Two-Swtch Flybac Converter wth a Wde Operatng Range and Regeneratve Clampng Marn-Go Km and Young-Seo Jung * Dvson of

More information

Adaptive System Control with PID Neural Networks

Adaptive System Control with PID Neural Networks Adaptve System Control wth PID Neural Networs F. Shahra a, M.A. Fanae b, A.R. Aromandzadeh a a Department of Chemcal Engneerng, Unversty of Sstan and Baluchestan, Zahedan, Iran. b Department of Chemcal

More information

An Energy-aware Awakening Routing Algorithm in Heterogeneous Sensor Networks

An Energy-aware Awakening Routing Algorithm in Heterogeneous Sensor Networks An Energy-aware Awakenng Routng Algorthm n Heterogeneous Sensor Networks TAO Dan 1, CHEN Houjn 1, SUN Yan 2, CEN Ygang 3 1. School of Electronc and Informaton Engneerng, Bejng Jaotong Unversty, Bejng,

More information

ECE315 / ECE515 Lecture 5 Date:

ECE315 / ECE515 Lecture 5 Date: Lecture 5 Date: 18.08.2016 Common Source Amplfer MOSFET Amplfer Dstorton Example 1 One Realstc CS Amplfer Crcut: C c1 : Couplng Capactor serves as perfect short crcut at all sgnal frequences whle blockng

More information

BLIND COMPRESSED IMAGE WATERMARKING FOR NOISY COMMUNICATION CHANNELS

BLIND COMPRESSED IMAGE WATERMARKING FOR NOISY COMMUNICATION CHANNELS BLIND COMPRESSED IMAGE WATERMARKING FOR NOISY COMMUNICATION CHANNELS Jonathan Me Carnege Mellon Unversty Department of Electrcal & Computer Engneerng Pttsburgh, PA 523 jme@cmu.edu Scott Pudlewsk Lncoln

More information