Properties of distinct-difference configurations and lightweight key predistribution schemes for grid-based networks

Size: px
Start display at page:

Download "Properties of distinct-difference configurations and lightweight key predistribution schemes for grid-based networks"

Transcription

1 Properties of distinct-difference configurations and lightweight key predistribution schemes for grid-based networks Simon R. lackburn 1 Keith M. Martin 1 Tuvi Etzion 2 Maura. Paterson 1 1 Information Security Group Royal Holloway, University of London 2 Technion -Israel Institute of Technology epartment of omputer Science 19 May 2009 Maura Paterson s and KPSs for Grid-ased WSNs 1/ 17

2 Outline Key Predistribution for Grid-ased Networks Maura Paterson s and KPSs for Grid-ased WSNs 2/ 17

3 Precision griculture Maura Paterson s and KPSs for Grid-ased WSNs 3/ 17

4 Grid-ased Wireless Sensor Networks r restricted memory restricted battery power restricted computational ability vulnerable to compromise Maura Paterson s and KPSs for Grid-ased WSNs 4/ 17

5 Key Predistribution efinition (key predistribution scheme (KPS)) nodes are assigned keys before deployment nodes that share keys can communicate securely {k 1, k 5, k 7 } {k 3, k 5, k 12 } k 5 e.g. Eschenauer and Gligor: Each node randomly draws m keys uniformly without replacement from a keypool K Maura Paterson s and KPSs for Grid-ased WSNs 5/ 17

6 Goals for a KPS in a Grid-ased Network enable as many pairs of neighbouring nodes as possible to communicate securely minimise storage be resilient against node compromise Observation: it is not necessary for two nodes to share more than one key Maura Paterson s and KPSs for Grid-ased WSNs 6/ 17

7 ostas rrays one dot per row/column vector differences between dots are distinct applications to sonar, radar known constructions are based on finite fields Maura Paterson s and KPSs for Grid-ased WSNs 7/ 17

8 Translated ostas rrays Overlap in at Most One Point Maura Paterson s and KPSs for Grid-ased WSNs 8/ 17

9 Translated ostas rrays Overlap in at Most One Point Maura Paterson s and KPSs for Grid-ased WSNs 8/ 17

10 Translated ostas rrays Overlap in at Most One Point Maura Paterson s and KPSs for Grid-ased WSNs 8/ 17

11 Translated ostas rrays Overlap in at Most One Point Maura Paterson s and KPSs for Grid-ased WSNs 8/ 17

12 Translated ostas rrays Overlap in at Most One Point Maura Paterson s and KPSs for Grid-ased WSNs 8/ 17

13 Key Predistribution Using ostas rrays uses an n n ostas array each sensor stores n keys each key is assigned to n sensors two sensors share at most one key the distance between two sensors that share a key is at most 2(n 1) Maura Paterson s and KPSs for Grid-ased WSNs 9/ 17

14 Key Predistribution Using ostas rrays uses an n n ostas array each sensor stores n keys each key is assigned to n sensors two sensors share at most one key the distance between two sensors that share a key is at most 2(n 1) Maura Paterson s and KPSs for Grid-ased WSNs 9/ 17

15 Key Predistribution Using ostas rrays uses an n n ostas array each sensor stores n keys each key is assigned to n sensors two sensors share at most one key the distance between two sensors that share a key is at most 2(n 1) Maura Paterson s and KPSs for Grid-ased WSNs 9/ 17

16 Key Predistribution Using ostas rrays uses an n n ostas array each sensor stores n keys each key is assigned to n sensors two sensors share at most one key the distance between two sensors that share a key is at most 2(n 1) Maura Paterson s and KPSs for Grid-ased WSNs 9/ 17

17 Key Predistribution Using ostas rrays uses an n n ostas array each sensor stores n keys each key is assigned to n sensors two sensors share at most one key the distance between two sensors that share a key is at most 2(n 1) Maura Paterson s and KPSs for Grid-ased WSNs 9/ 17

18 Key Predistribution Using ostas rrays uses an n n ostas array each sensor stores n keys E E E each key is assigned to n sensors two sensors share at most one key the distance between two sensors that share a key is at most 2(n 1) Maura Paterson s and KPSs for Grid-ased WSNs 9/ 17

19 Key Predistribution Using ostas rrays uses an n n ostas array each sensor stores n keys E E F F E F each key is assigned to n sensors two sensors share at most one key the distance between two sensors that share a key is at most 2(n 1) Maura Paterson s and KPSs for Grid-ased WSNs 9/ 17

20 Key Predistribution Using ostas rrays uses an n n ostas array G G E E G F F E F each sensor stores n keys each key is assigned to n sensors two sensors share at most one key the distance between two sensors that share a key is at most 2(n 1) Maura Paterson s and KPSs for Grid-ased WSNs 9/ 17

21 Key Predistribution Using ostas rrays uses an n n ostas array G G H E H E G F F H E F each sensor stores n keys each key is assigned to n sensors two sensors share at most one key the distance between two sensors that share a key is at most 2(n 1) Maura Paterson s and KPSs for Grid-ased WSNs 9/ 17

22 Key Predistribution Using ostas rrays uses an n n ostas array G G H E H E G I F I F H E I F each sensor stores n keys each key is assigned to n sensors two sensors share at most one key the distance between two sensors that share a key is at most 2(n 1) Maura Paterson s and KPSs for Grid-ased WSNs 9/ 17

23 efinition (istinct-ifference onfiguration (m, r)) m dots are placed in a square grid the distance between any two dots is at most r vector differences between dots are all distinct (5, 8) can be used for key predistribution in the same way as a ostas array more general than a ostas array more flexible choice of parameters Maura Paterson s and KPSs for Grid-ased WSNs 10/ 17

24 Upper ounds on m Theorem If a (m, r) exists, then m π 2 r + 3π1/3 2 5/3 r 2/3 + O(r 1/3 ) r + O(r 2/3 ). a (m, r) is contained in an anticode of diameter at most r and area at most (π/4)r 2 cover in circles of radius l count pairs (, d) where d is a pair of dots in (m, r) Maura Paterson s and KPSs for Grid-ased WSNs 11/ 17

25 Lower ounds on m Theorem There exists a (m, r) with m r o(r). Maura Paterson s and KPSs for Grid-ased WSNs 12/ 17

26 Sequences with istinct ifferences efinition Let be an abelian group. sequence {a 1, a 2,..., a m } is a 2 -sequence if all the sums a i1 + a i2 with 1 i 1 i 2 m are distinct. examples: Singer difference set Golomb ruler ose: 2 -sequence of size q in Z q 2 1 Maura Paterson s and KPSs for Grid-ased WSNs 13/ 17

27 Folding a 2 -Sequence {3, 13, 24, 29, 37, 41, 43, 44} (mod 63) Maura Paterson s and KPSs for Grid-ased WSNs 14/ 17

28 Results for the Manhattan Metric Theorem If a (m, r) exists then m 1 2 r + (3/2 4/3 )r 2/3 + O(r 1/3 ). There exists a (m, r) with m = 1 2 r o(r) Maura Paterson s and KPSs for Grid-ased WSNs 15/ 17

29 Efficient Key Predistribution for Grid-ased Wireless Sensor Networks, Information Theoretic Security, LNS 5155, 54-69, istinct ifference onfigurations: Multihop Paths and Key Predistribution in Sensor Networks. Two-imensional Patterns with istinct ifferences onstructions, ounds, and Maximal nticodes. Key Predistribution Techniques for Grid-ased Wireless Sensor Networks. Maura Paterson s and KPSs for Grid-ased WSNs 16/ 17

30 thank you! Maura Paterson s and KPSs for Grid-ased WSNs 17/ 17

Designing Secure and Reliable Wireless Sensor Networks

Designing Secure and Reliable Wireless Sensor Networks Designing Secure and Reliable Wireless Sensor Networks Osman Yağan" Assistant Research Professor, ECE" Joint work with J. Zhao, V. Gligor, and F. Yavuz Wireless Sensor Networks Ø Distributed collection

More information

Two Improvements of Random Key Predistribution for Wireless Sensor Networks

Two Improvements of Random Key Predistribution for Wireless Sensor Networks Two Improvements of Random Key Predistribution for Wireless Sensor Networks Jiří Kůr, Vashek Matyáš, Petr Švenda Faculty of Informatics Masaryk University Capture resilience improvements Collision key

More information

Chapter 9: Localization & Positioning

Chapter 9: Localization & Positioning hapter 9: Localization & Positioning 98/5/25 Goals of this chapter Means for a node to determine its physical position with respect to some coordinate system (5, 27) or symbolic location (in a living room)

More information

University of Bristol - Explore Bristol Research. Peer reviewed version. Link to published version (if available): /VETECF.2011.

University of Bristol - Explore Bristol Research. Peer reviewed version. Link to published version (if available): /VETECF.2011. Vatsikas, S., Armour, SMD., De Vos, M., & Lewis, T. (2011). A fast and fair algorithm for distributed subcarrier allocation using coalitions and the Nash bargaining solution. In IEEE Vehicular Technology

More information

A Combinatorial Framework for Frequency Hopping Multiple Access

A Combinatorial Framework for Frequency Hopping Multiple Access Fourteenth International Workshop on Algebraic and Combinatorial Coding Theory September 7 13, 2014, Svetlogorsk (Kaliningrad region), Russia pp. 271 276 A Combinatorial Framework for Frequency Hopping

More information

Transport Capacity and Spectral Efficiency of Large Wireless CDMA Ad Hoc Networks

Transport Capacity and Spectral Efficiency of Large Wireless CDMA Ad Hoc Networks Transport Capacity and Spectral Efficiency of Large Wireless CDMA Ad Hoc Networks Yi Sun Department of Electrical Engineering The City College of City University of New York Acknowledgement: supported

More information

The Eyes Have It: Shapely Servings

The Eyes Have It: Shapely Servings The Eyes Have It: Shapely Servings 2007 The University of Texas Health Science Center at San Antonio Station 1 Student Information Page 5C Activity Introduction: Today you will be asked to look at different

More information

Coverage Issue in Sensor Networks with Adjustable Ranges

Coverage Issue in Sensor Networks with Adjustable Ranges overage Issue in Sensor Networks with Adjustable Ranges Jie Wu and Shuhui Yang Department of omputer Science and Engineering Florida Atlantic University oca Raton, FL jie@cse.fau.edu, syang@fau.edu Abstract

More information

Secure and reliable connectivity in heterogeneous wireless sensor networks

Secure and reliable connectivity in heterogeneous wireless sensor networks Secure and reliable connectivity in heterogeneous wireless sensor networks Rashad Eletreby and Osman Yağan Department of Electrical and Computer Engineering and CyLab, Carnegie Mellon University, Pittsburgh,

More information

Node Deployment Strategies and Coverage Prediction in 3D Wireless Sensor Network with Scheduling

Node Deployment Strategies and Coverage Prediction in 3D Wireless Sensor Network with Scheduling Advances in Computational Sciences and Technology ISSN 0973-6107 Volume 10, Number 8 (2017) pp. 2243-2255 Research India Publications http://www.ripublication.com Node Deployment Strategies and Coverage

More information

Ad hoc and Sensor Networks Chapter 9: Localization & positioning

Ad hoc and Sensor Networks Chapter 9: Localization & positioning Ad hoc and Sensor Networks Chapter 9: Localization & positioning Holger Karl Computer Networks Group Universität Paderborn Goals of this chapter Means for a node to determine its physical position (with

More information

ITLinQ: A New Approach for Spectrum Sharing in Device-to-Device Networks

ITLinQ: A New Approach for Spectrum Sharing in Device-to-Device Networks ITLinQ: A New Approach for Spectrum Sharing in Device-to-Device Networks Salman Avestimehr In collaboration with Navid Naderializadeh ITA 2/10/14 D2D Communication Device-to-Device (D2D) communication

More information

2005 Galois Contest Wednesday, April 20, 2005

2005 Galois Contest Wednesday, April 20, 2005 Canadian Mathematics Competition An activity of the Centre for Education in Mathematics and Computing, University of Waterloo, Waterloo, Ontario 2005 Galois Contest Wednesday, April 20, 2005 Solutions

More information

PROBABILISTIC MITIGATION OF CONTROL CHANNEL JAMMING VIA RANDOM KEY DISTRIBUTION

PROBABILISTIC MITIGATION OF CONTROL CHANNEL JAMMING VIA RANDOM KEY DISTRIBUTION PROBABILISTIC MITIGATION OF CONTROL CHANNEL JAMMING VIA RANDOM KEY DISTRIBUTION Patrick Tague, Mingyan Li, and Radha Poovendran Network Security Lab NSL, Department of Electrical Engineering, University

More information

Name: Partners: Math Academy I. Review 2 Version A

Name: Partners: Math Academy I. Review 2 Version A Name: Partners: Math Academy I ate: Review 2 Version A [A] ircle whether each statement is true or false. 1. Any two lines are coplanar. 2. Any three points are coplanar. 3. The measure of a semicircle

More information

Wormhole-Based Anti-Jamming Techniques in Sensor. Networks

Wormhole-Based Anti-Jamming Techniques in Sensor. Networks Wormhole-Based Anti-Jamming Techniques in Sensor Networks Mario Čagalj Srdjan Čapkun Jean-Pierre Hubaux Laboratory for Computer Communications and Applications (LCA) Faculty of Informatics and Communication

More information

UNIVERSITY OF NORTHERN COLORADO MATHEMATICS CONTEST

UNIVERSITY OF NORTHERN COLORADO MATHEMATICS CONTEST UNIVERSITY OF NORTHERN COLORADO MATHEMATICS CONTEST First Round For all Colorado Students Grades 7-12 October 31, 2009 You have 90 minutes no calculators allowed The average of n numbers is their sum divided

More information

Trade-offs Between Mobility and Density for Coverage in Wireless Sensor Networks. Wei Wang, Vikram Srinivasan, Kee-Chaing Chua

Trade-offs Between Mobility and Density for Coverage in Wireless Sensor Networks. Wei Wang, Vikram Srinivasan, Kee-Chaing Chua Trade-offs Between Mobility and Density for Coverage in Wireless Sensor Networks Wei Wang, Vikram Srinivasan, Kee-Chaing Chua Coverage in sensor networks Sensors are often randomly scattered in the field

More information

Optimization Techniques for Alphabet-Constrained Signal Design

Optimization Techniques for Alphabet-Constrained Signal Design Optimization Techniques for Alphabet-Constrained Signal Design Mojtaba Soltanalian Department of Electrical Engineering California Institute of Technology Stanford EE- ISL Mar. 2015 Optimization Techniques

More information

p-percent Coverage in Wireless Sensor Networks

p-percent Coverage in Wireless Sensor Networks p-percent Coverage in Wireless Sensor Networks Yiwei Wu, Chunyu Ai, Shan Gao and Yingshu Li Department of Computer Science Georgia State University October 28, 2008 1 Introduction 2 p-percent Coverage

More information

Joint work with Dragana Bajović and Dušan Jakovetić. DLR/TUM Workshop, Munich,

Joint work with Dragana Bajović and Dušan Jakovetić. DLR/TUM Workshop, Munich, Slotted ALOHA in Small Cell Networks: How to Design Codes on Random Geometric Graphs? Dejan Vukobratović Associate Professor, DEET-UNS University of Novi Sad, Serbia Joint work with Dragana Bajović and

More information

Robust Key Establishment in Sensor Networks

Robust Key Establishment in Sensor Networks Robust Key Establishment in Sensor Networks Yongge Wang Abstract Secure communication guaranteeing reliability, authenticity, and privacy in sensor networks with active adversaries is a challenging research

More information

Localization (Position Estimation) Problem in WSN

Localization (Position Estimation) Problem in WSN Localization (Position Estimation) Problem in WSN [1] Convex Position Estimation in Wireless Sensor Networks by L. Doherty, K.S.J. Pister, and L.E. Ghaoui [2] Semidefinite Programming for Ad Hoc Wireless

More information

Zigzag Coverage Scheme Algorithm & Analysis for Wireless Sensor Networks

Zigzag Coverage Scheme Algorithm & Analysis for Wireless Sensor Networks Zigzag Coverage Scheme Algorithm & Analysis for Wireless Sensor Networks Ammar Hawbani School of Computer Science and Technology, University of Science and Technology of China, E-mail: ammar12@mail.ustc.edu.cn

More information

Online Computation and Competitive Analysis

Online Computation and Competitive Analysis Online Computation and Competitive Analysis Allan Borodin University of Toronto Ran El-Yaniv Technion - Israel Institute of Technology I CAMBRIDGE UNIVERSITY PRESS Contents Preface page xiii 1 Introduction

More information

Secure Pairwise Key Establishment in Large-scale Sensor Networks: An Area Partitioning and Multi-group Key Predistribution Approach

Secure Pairwise Key Establishment in Large-scale Sensor Networks: An Area Partitioning and Multi-group Key Predistribution Approach Secure Pairwise Key Establishment in Large-scale Sensor Networks: An Area Partitioning and Multi-group Key Predistribution Approach Dijiang Huang Arizona State University Deep Medhi University of Missouri

More information

A VORONOI DIAGRAM-BASED APPROACH FOR ANALYZING AREA COVERAGE OF VARIOUS NODE DEPLOYMENT SCHEMES IN WSNS

A VORONOI DIAGRAM-BASED APPROACH FOR ANALYZING AREA COVERAGE OF VARIOUS NODE DEPLOYMENT SCHEMES IN WSNS A VORONOI DIAGRAM-BASED APPROACH FOR ANALYZING AREA COVERAGE OF VARIOUS NODE DEPLOYMENT SCHEMES IN WSNS G Sanjiv Rao 1 and V Vallikumari 2 1 Associate Professor, Dept of CSE, Sri Sai Aditya Institute of

More information

Wormhole-Based Anti-Jamming Techniques in Sensor. Networks

Wormhole-Based Anti-Jamming Techniques in Sensor. Networks Wormhole-Based Anti-Jamming Techniques in Sensor Networks Mario Čagalj Srdjan Čapkun Jean-Pierre Hubaux Laboratory for Computer Communications and Applications (LCA) Faculty of Informatics and Communication

More information

Identifying, Modeling, and Mitigating Attacks in Wireless Ad-Hoc and Sensor Networks

Identifying, Modeling, and Mitigating Attacks in Wireless Ad-Hoc and Sensor Networks Identifying, Modeling, and Mitigating Attacks in Wireless Ad-Hoc and Sensor Networks Patrick Tague A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy

More information

The CENTRE for EDUCATION in MATHEMATICS and COMPUTING cemc.uwaterloo.ca Fryer Contest. Thursday, April 18, 2013

The CENTRE for EDUCATION in MATHEMATICS and COMPUTING cemc.uwaterloo.ca Fryer Contest. Thursday, April 18, 2013 The CENTRE for EDUCATION in MATHEMATICS and COMPUTING cemc.uwaterloo.ca 2013 Fryer Contest Thursday, April 18, 2013 (in North America and South America) Friday, April 19, 2013 (outside of North America

More information

ENERGY-EFFICIENT NODE SCHEDULING MODELS IN SENSOR NETWORKS WITH ADJUSTABLE RANGES

ENERGY-EFFICIENT NODE SCHEDULING MODELS IN SENSOR NETWORKS WITH ADJUSTABLE RANGES International Journal of Foundations of Computer Science c World Scientific Publishing Company ENERGY-EFFICIENT NODE SCHEDULING MODELS IN SENSOR NETWORKS WITH ADJUSTABLE RANGES JIE WU and SHUHUI YANG Department

More information

Jamming as Information: a Geometric Approach

Jamming as Information: a Geometric Approach arxiv:0809.0011v1 [math.ho] 29 ug 2008 Jamming as Information: a Geometric pproach Tanya Khovanova epartment of Mathematics, MIT ugust 27, 2008 bstract In this paper I discuss the kinds of information

More information

Towards a Unified View of Localization in Wireless Sensor Networks

Towards a Unified View of Localization in Wireless Sensor Networks Towards a Unified View of Localization in Wireless Sensor Networks Suprakash Datta Joint work with Stuart Maclean, Masoomeh Rudafshani, Chris Klinowski and Shaker Khaleque York University, Toronto, Canada

More information

DEEJAM: Defeating Energy-Efficient Jamming in IEEE based Wireless Networks

DEEJAM: Defeating Energy-Efficient Jamming in IEEE based Wireless Networks DEEJAM: Defeating Energy-Efficient Jamming in IEEE 802.15.4-based Wireless Networks Anthony D. Wood, John A. Stankovic, Gang Zhou Department of Computer Science University of Virginia Wireless Sensor Networks

More information

Wireless Sensor Networks

Wireless Sensor Networks DEEJAM: Defeating Energy-Efficient Jamming in IEEE 802.15.4-based Wireless Networks Anthony D. Wood, John A. Stankovic, Gang Zhou Department of Computer Science University of Virginia June 19, 2007 Wireless

More information

Round minutes. Best results:

Round minutes. Best results: Round 1 30 minutes Best results: Jakub Ondroušek Jan Zvěřina Matúš Demiger 410 points 390 points 350 points Round 1 Translation Sheet 1-3) Classic sudoku 6 6 Fill in the grid with digits 1 to 6 so that

More information

Wireless ad hoc networks. Acknowledgement: Slides borrowed from Richard Y. Yale

Wireless ad hoc networks. Acknowledgement: Slides borrowed from Richard Y. Yale Wireless ad hoc networks Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale Infrastructure-based v.s. ad hoc Infrastructure-based networks Cellular network 802.11, access points Ad hoc networks

More information

Application-Specific Node Clustering of IR-UWB Sensor Networks with Two Classes of Nodes

Application-Specific Node Clustering of IR-UWB Sensor Networks with Two Classes of Nodes Application-Specific Node Clustering of IR-UWB Sensor Networks with Two Classes of Nodes Daniel Bielefeld 1, Gernot Fabeck 2, Rudolf Mathar 3 Institute for Theoretical Information Technology, RWTH Aachen

More information

Anti-Jamming: A Study

Anti-Jamming: A Study Anti-Jamming: A Study Karthikeyan Mahadevan, Sojeong Hong, John Dullum December 14, 25 Abstract Addressing jamming in wireless networks is important as the number of wireless networks is on the increase.

More information

Opportunistic Communications under Energy & Delay Constraints

Opportunistic Communications under Energy & Delay Constraints Opportunistic Communications under Energy & Delay Constraints Narayan Mandayam (joint work with Henry Wang) Opportunistic Communications Wireless Data on the Move Intermittent Connectivity Opportunities

More information

Energy-Efficient Duty Cycle Assignment for Receiver-Based Convergecast in Wireless Sensor Networks

Energy-Efficient Duty Cycle Assignment for Receiver-Based Convergecast in Wireless Sensor Networks Energy-Efficient Duty Cycle Assignment for Receiver-Based Convergecast in Wireless Sensor Networks Yuqun Zhang, Chen-Hsiang Feng, Ilker Demirkol, Wendi B. Heinzelman Department of Electrical and Computer

More information

IN THIS ISSUE. Cave vs. Pentagroups

IN THIS ISSUE. Cave vs. Pentagroups 3 IN THIS ISSUE 1. 2. 3. 4. 5. 6. Cave vs. Pentagroups Brokeback loop Easy as skyscrapers Breaking the loop L-oop Triple loop Octave Total rising Dead end cells Pentamino in half Giant tents Cave vs. Pentagroups

More information

Chapter 2 Distributed Consensus Estimation of Wireless Sensor Networks

Chapter 2 Distributed Consensus Estimation of Wireless Sensor Networks Chapter 2 Distributed Consensus Estimation of Wireless Sensor Networks Recently, consensus based distributed estimation has attracted considerable attention from various fields to estimate deterministic

More information

Standard Sudoku point. 1 point. P a g e 1

Standard Sudoku point. 1 point. P a g e 1 P a g e 1 Standard 1-2 Place a digit from 1 to 6 in each empty cell so that each digit appears exactly once in each row, column and 2X box. 1 point A 6 2 6 2 1 5 1 point B 5 2 2 4 1 1 6 5 P a g e 2 Standard

More information

A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks

A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks Elisabeth M. Royer, Chai-Keong Toh IEEE Personal Communications, April 1999 Presented by Hannu Vilpponen 1(15) Hannu_Vilpponen.PPT

More information

WPF SUDOKU GP 2014 ROUND 2 WPF SUDOKU/PUZZLE GRAND PRIX Puzzle authors: Serbia. Organised by

WPF SUDOKU GP 2014 ROUND 2 WPF SUDOKU/PUZZLE GRAND PRIX Puzzle authors: Serbia. Organised by WPF SUDOKU/PUZZLE GRAND PRIX 2014 WPF SUDOKU GP 2014 Puzzle authors: Serbia Classic sudoku by Nikola Živanović Sudoku variations by Zoran Tanasić and Čedomir Milanović Organised by 1 Classic Sudoku (6

More information

Gravitational Lensing Experiment

Gravitational Lensing Experiment EKA Advanced Physics Laboratory Gravitational Lensing Experiment Getting Started Guide In this experiment you will be studying gravitational lensing by simulating the phenomenon with optical lenses. The

More information

Effects of Beamforming on the Connectivity of Ad Hoc Networks

Effects of Beamforming on the Connectivity of Ad Hoc Networks Effects of Beamforming on the Connectivity of Ad Hoc Networks Xiangyun Zhou, Haley M. Jones, Salman Durrani and Adele Scott Department of Engineering, CECS The Australian National University Canberra ACT,

More information

Wireless Sensor Networks 17th Lecture

Wireless Sensor Networks 17th Lecture Wireless Sensor Networks 17th Lecture 09.01.2007 Christian Schindelhauer schindel@informatik.uni-freiburg.de 1 Goals of this chapter Means for a node to determine its physical position (with respect to

More information

Time Synchronization and Distributed Modulation in Large-Scale Sensor Networks

Time Synchronization and Distributed Modulation in Large-Scale Sensor Networks Time Synchronization and Distributed Modulation in Large-Scale Sensor Networks Sergio D. Servetto School of Electrical and Computer Engineering Cornell University http://cn.ece.cornell.edu/ RPI Workshop

More information

Outline. Communications Engineering 1

Outline. Communications Engineering 1 Outline Introduction Signal, random variable, random process and spectra Analog modulation Analog to digital conversion Digital transmission through baseband channels Signal space representation Optimal

More information

Daniel Plotnick. November 5 th, 2017 Mock (Practice) AMC 8 Welcome!

Daniel Plotnick. November 5 th, 2017 Mock (Practice) AMC 8 Welcome! November 5 th, 2017 Mock (Practice) AMC 8 Welcome! 2011 = prime number 2012 = 2 2 503 2013 = 3 11 61 2014 = 2 19 53 2015 = 5 13 31 2016 = 2 5 3 2 7 1 2017 = prime number 2018 = 2 1009 2019 = 3 673 2020

More information

A Practical Approach to Landmark Deployment for Indoor Localization

A Practical Approach to Landmark Deployment for Indoor Localization A Practical Approach to Landmark Deployment for Indoor Localization Yingying Chen, John-Austen Francisco, Wade Trappe, and Richard P. Martin Dept. of Computer Science Wireless Information Network Laboratory

More information

Graphs of Tilings. Patrick Callahan, University of California Office of the President, Oakland, CA

Graphs of Tilings. Patrick Callahan, University of California Office of the President, Oakland, CA Graphs of Tilings Patrick Callahan, University of California Office of the President, Oakland, CA Phyllis Chinn, Department of Mathematics Humboldt State University, Arcata, CA Silvia Heubach, Department

More information

Coverage in Sensor Networks

Coverage in Sensor Networks Coverage in Sensor Networks Xiang Luo ECSE 6962 Coverage problems Definition: the measurement of quality of service (surveillance) that can be provided by a particular sensor network Coverage problems

More information

PART 2 VARIA 1 TEAM FRANCE WSC minutes 750 points

PART 2 VARIA 1 TEAM FRANCE WSC minutes 750 points Name : PART VARIA 1 TEAM FRANCE WSC 00 minutes 0 points 1 1 points Alphabet Triplet No more than three Circles Quad Ring Consecutive Where is Max? Puzzle Killer Thermometer Consecutive irregular Time bonus

More information

A Greedy Algorithm for Target Coverage Scheduling in Directional Sensor Networks

A Greedy Algorithm for Target Coverage Scheduling in Directional Sensor Networks A Greedy Algorithm for Target Coverage Scheduling in Directional Sensor Networks Youn-Hee Han, Chan-Myung Kim Laboratory of Intelligent Networks Advanced Technology Research Center Korea University of

More information

Robust Location Distinction Using Temporal Link Signatures

Robust Location Distinction Using Temporal Link Signatures Robust Location Distinction Using Temporal Link Signatures Neal Patwari Sneha Kasera Department of Electrical and Computer Engineering What is location distinction? Ability to know when a transmitter has

More information

A Solution to Cooperative Area Coverage Surveillance for a Swarm of MAVs

A Solution to Cooperative Area Coverage Surveillance for a Swarm of MAVs International Journal of Advanced Robotic Systems ARTICLE A Solution to Cooperative Area Coverage Surveillance for a Swarm of MAVs Regular Paper Wang Zheng-jie,* and Li Wei 2 School of Mechatronic Engineering,

More information

2010 Pascal Contest (Grade 9)

2010 Pascal Contest (Grade 9) Canadian Mathematics Competition n activity of the Centre for Education in Mathematics and Computing, University of Waterloo, Waterloo, Ontario 2010 Pascal Contest (Grade 9) Thursday, February 25, 2010

More information

a. Sketch a wrapper like the one described above, using the actual size of your cone. Ignore any overlap required for assembly.

a. Sketch a wrapper like the one described above, using the actual size of your cone. Ignore any overlap required for assembly. Illustrative Mathematics G-MG Ice Cream Cone Alignment : G-MG.A.3 You have been hired by the owner of a local ice cream parlor to assist in his company s new venture. The company will soon sell its ice

More information

Localization in Wireless Sensor Networks

Localization in Wireless Sensor Networks Localization in Wireless Sensor Networks Part 2: Localization techniques Department of Informatics University of Oslo Cyber Physical Systems, 11.10.2011 Localization problem in WSN In a localization problem

More information

Collaborative transmission in wireless sensor networks

Collaborative transmission in wireless sensor networks Collaborative transmission in wireless sensor networks Randomised search approaches Stephan Sigg Distributed and Ubiquitous Systems Technische Universität Braunschweig November 22, 2010 Stephan Sigg Collaborative

More information

Beliefs and Sequential Equilibrium

Beliefs and Sequential Equilibrium Beliefs and Sequential Equilibrium to solve a game of incomplete information, we should look at the beliefs of the uninformed player(s) suppose that player 2 is in an information set which contains two

More information

Maximizing Number of Satisfiable Routing Requests in Static Ad Hoc Networks

Maximizing Number of Satisfiable Routing Requests in Static Ad Hoc Networks Maximizing Number of Satisfiable Routing Requests in Static Ad Hoc Networks Zane Sumpter 1, Lucas Burson 1, Bin Tang 2, Xiao Chen 3 1 Department of Electrical Engineering and Computer Science, Wichita

More information

Examples: Find the domain and range of the function f(x, y) = 1 x y 2.

Examples: Find the domain and range of the function f(x, y) = 1 x y 2. Multivariate Functions In this chapter, we will return to scalar functions; thus the functions that we consider will output points in space as opposed to vectors. However, in contrast to the majority of

More information

A camera controlling method for lecture archive

A camera controlling method for lecture archive A camera controlling method for lecture archive NISHIGUHI Satoshi Kyoto University Graduate School of Law, Kyoto University nishigu@mm.media.kyoto-u.ac.jp MINOH Michihiko enter for Information and Multimedia

More information

Proceedings Statistical Evaluation of the Positioning Error in Sequential Localization Techniques for Sensor Networks

Proceedings Statistical Evaluation of the Positioning Error in Sequential Localization Techniques for Sensor Networks Proceedings Statistical Evaluation of the Positioning Error in Sequential Localization Techniques for Sensor Networks Cesar Vargas-Rosales *, Yasuo Maidana, Rafaela Villalpando-Hernandez and Leyre Azpilicueta

More information

A Stepped Frequency CW SAR for Lightweight UAV Operation

A Stepped Frequency CW SAR for Lightweight UAV Operation UNCLASSIFIED/UNLIMITED A Stepped Frequency CW SAR for Lightweight UAV Operation ABSTRACT Dr Keith Morrison Department of Aerospace, Power and Sensors University of Cranfield, Shrivenham Swindon, SN6 8LA

More information

Implicit Fitness Functions for Evolving a Drawing Robot

Implicit Fitness Functions for Evolving a Drawing Robot Implicit Fitness Functions for Evolving a Drawing Robot Jon Bird, Phil Husbands, Martin Perris, Bill Bigge and Paul Brown Centre for Computational Neuroscience and Robotics University of Sussex, Brighton,

More information

arxiv: v1 [cs.cc] 21 Jun 2017

arxiv: v1 [cs.cc] 21 Jun 2017 Solving the Rubik s Cube Optimally is NP-complete Erik D. Demaine Sarah Eisenstat Mikhail Rudoy arxiv:1706.06708v1 [cs.cc] 21 Jun 2017 Abstract In this paper, we prove that optimally solving an n n n Rubik

More information

Dynamic Coverage of Mobile Sensor Networks

Dynamic Coverage of Mobile Sensor Networks 1 Dynamic Coverage of Mobile Sensor Networks Benyuan Liu, Olivier Dousse, Philippe Nain and Don Towsley To appear in IEEE Trans. on Parallel and Distributed Systems (TPDS) 2012 Abstract In this paper we

More information

Near-Optimal Radio Use For Wireless Network Synch. Synchronization

Near-Optimal Radio Use For Wireless Network Synch. Synchronization Near-Optimal Radio Use For Wireless Network Synchronization LANL, UCLA 10th of July, 2009 Motivation Consider sensor network: tiny, inexpensive embedded computers run complex software sense environmental

More information

Wireless PHY: Modulation and Demodulation

Wireless PHY: Modulation and Demodulation Wireless PHY: Modulation and Demodulation Y. Richard Yang 09/11/2012 Outline Admin and recap Amplitude demodulation Digital modulation 2 Admin Assignment 1 posted 3 Recap: Modulation Objective o Frequency

More information

Data Gathering. Chapter 4. Ad Hoc and Sensor Networks Roger Wattenhofer 4/1

Data Gathering. Chapter 4. Ad Hoc and Sensor Networks Roger Wattenhofer 4/1 Data Gathering Chapter 4 Ad Hoc and Sensor Networks Roger Wattenhofer 4/1 Environmental Monitoring (PermaSense) Understand global warming in alpine environment Harsh environmental conditions Swiss made

More information

The Pythagorean Theorem

The Pythagorean Theorem . The Pythagorean Theorem Goals Draw squares on the legs of the triangle. Deduce the Pythagorean Theorem through exploration Use the Pythagorean Theorem to find unknown side lengths of right triangles

More information

Efficient and Resilient Key Discovery based on Pseudo-Random Key Pre-Deployment

Efficient and Resilient Key Discovery based on Pseudo-Random Key Pre-Deployment Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment p. 1 Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment Roerto Di Pietro, Luigi V. Mncini, nd Alessndro

More information

BL V 2.0A 1.3MHz Synchronous Buck Converter

BL V 2.0A 1.3MHz Synchronous Buck Converter GENERATION DESCRIPTION The BL9309 is a high-efficiency, DC-to-DC step-down switching regulators, capable of delivering up to 2A of output current. The device operates from an input voltage range of 2.5V

More information

TOTAL MATHEMATICS KEY STAGE LEVELS 3 5 TEST B BORDERLINE CHECK CALCULATOR ALLOWED. First Name. Last Name.

TOTAL MATHEMATICS KEY STAGE LEVELS 3 5 TEST B BORDERLINE CHECK CALCULATOR ALLOWED. First Name. Last Name. MATHEMATICS KEY STAGE 2 2006 TEST B LEVELS 3 5 CALCULATOR ALLOWED PAGE 5 7 9 11 13 15 17 19 21 TOTAL BORDERLINE CHECK MARKS First Name Last Name School Lin David Rosie 2 Instructions You may use a calculator

More information

Probabilistic Coverage in Wireless Sensor Networks

Probabilistic Coverage in Wireless Sensor Networks Probabilistic Coverage in Wireless Sensor Networks Mohamed Hefeeda and Hossein Ahmadi School of Computing Science Simon Fraser University Surrey, Canada {mhefeeda, hahmadi}@cs.sfu.ca Technical Report:

More information

The Pigeonhole Principle

The Pigeonhole Principle The Pigeonhole Principle Some Questions Does there have to be two trees on Earth with the same number of leaves? How large of a set of distinct integers between 1 and 200 is needed to assure that two numbers

More information

ON SPLITTING UP PILES OF STONES

ON SPLITTING UP PILES OF STONES ON SPLITTING UP PILES OF STONES GREGORY IGUSA Abstract. In this paper, I describe the rules of a game, and give a complete description of when the game can be won, and when it cannot be won. The first

More information

INTRODUCTION TO WIRELESS SENSOR NETWORKS. CHAPTER 8: LOCALIZATION TECHNIQUES Anna Förster

INTRODUCTION TO WIRELESS SENSOR NETWORKS. CHAPTER 8: LOCALIZATION TECHNIQUES Anna Förster INTRODUCTION TO WIRELESS SENSOR NETWORKS CHAPTER 8: LOCALIZATION TECHNIQUES Anna Förster OVERVIEW 1. Localization Challenges and Properties 1. Location Information 2. Precision and Accuracy 3. Localization

More information

Outline. Wireless PHY: Modulation and Demodulation. Recap: Modulation. Admin. Recap: Demod of AM. Page 1. Recap: Amplitude Modulation (AM)

Outline. Wireless PHY: Modulation and Demodulation. Recap: Modulation. Admin. Recap: Demod of AM. Page 1. Recap: Amplitude Modulation (AM) Outline Wireless PHY: Modulation and Demodulation Admin and recap Amplitude demodulation Digital modulation Y. Richard Yang 9// Admin Assignment posted Recap: Modulation Objective o Frequency assignment

More information

Sequestration of Malevolent Anchor Nodes in Wireless Sensor Networks using Mahalanobis Distance

Sequestration of Malevolent Anchor Nodes in Wireless Sensor Networks using Mahalanobis Distance Sequestration of Malevolent Anchor Nodes in Wireless Sensor Networks using Mahalanobis Distance Jeril Kuriakose 1, V. Amruth 2, Swathy Nandhini 3 and V. Abhilash 4 1 School of Computing and Information

More information

Indoor Localization in Wireless Sensor Networks

Indoor Localization in Wireless Sensor Networks International Journal of Engineering Inventions e-issn: 2278-7461, p-issn: 2319-6491 Volume 4, Issue 03 (August 2014) PP: 39-44 Indoor Localization in Wireless Sensor Networks Farhat M. A. Zargoun 1, Nesreen

More information

Math Steven Noble. November 22nd. Steven Noble Math 3790

Math Steven Noble. November 22nd. Steven Noble Math 3790 Math 3790 Steven Noble November 22nd Basic ideas of combinations and permutations Simple Addition. If there are a varieties of soup and b varieties of salad then there are a + b possible ways to order

More information

Minimum Cost Deployment of Bistatic Radar Sensor for Perimeter Barrier Coverage

Minimum Cost Deployment of Bistatic Radar Sensor for Perimeter Barrier Coverage sensors Article Minimum Cost Deployment of Bistatic Radar Sensor for Perimeter Barrier Coverage Xianghua Xu 1, *, Chengwei Zhao 1, Tingcong Ye 1 and Tao Gu 1 School of Computer Science and Technology,

More information

Efficient Channel Allocation for Wireless Local-Area Networks

Efficient Channel Allocation for Wireless Local-Area Networks 1 Efficient Channel Allocation for Wireless Local-Area Networks Arunesh Mishra, Suman Banerjee, William Arbaugh Abstract We define techniques to improve the usage of wireless spectrum in the context of

More information

HIGH SCHOOL MATHEMATICS CONTEST. Prepared by the Mathematics Department of Rose-Hulman Institute of Technology Terre Haute, Indiana

HIGH SCHOOL MATHEMATICS CONTEST. Prepared by the Mathematics Department of Rose-Hulman Institute of Technology Terre Haute, Indiana HIGH SCHOOL MATHEMATICS CONTEST Prepared by the Mathematics Department of Rose-Hulman Institute of Technology Terre Haute, Indiana November 14, 015 Instructions: Put your name and home address on the back

More information

T. Yoo, E. Setton, X. Zhu, Pr. Goldsmith and Pr. Girod Department of Electrical Engineering Stanford University

T. Yoo, E. Setton, X. Zhu, Pr. Goldsmith and Pr. Girod Department of Electrical Engineering Stanford University Cross-layer design for video streaming over wireless ad hoc networks T. Yoo, E. Setton, X. Zhu, Pr. Goldsmith and Pr. Girod Department of Electrical Engineering Stanford University Outline Cross-layer

More information

Dutch Sudoku Advent 1. Thermometers Sudoku (Arvid Baars)

Dutch Sudoku Advent 1. Thermometers Sudoku (Arvid Baars) 1. Thermometers Sudoku (Arvid Baars) The digits in each thermometer-shaped region should be in increasing order, from the bulb to the end. 2. Search Nine Sudoku (Richard Stolk) Every arrow is pointing

More information

On the problem of energy efficiency of multi-hop vs one-hop routing in Wireless Sensor Networks

On the problem of energy efficiency of multi-hop vs one-hop routing in Wireless Sensor Networks On the problem of energy efficiency of multi-hop vs one-hop routing in Wireless Sensor Networks Symon Fedor and Martin Collier Research Institute for Networks and Communications Engineering (RINCE), Dublin

More information

Multihop Routing in Ad Hoc Networks

Multihop Routing in Ad Hoc Networks Multihop Routing in Ad Hoc Networks Dr. D. Torrieri 1, S. Talarico 2 and Dr. M. C. Valenti 2 1 U.S Army Research Laboratory, Adelphi, MD 2 West Virginia University, Morgantown, WV Nov. 18 th, 20131 Outline

More information

Locali ation z For For Wireless S ensor Sensor Networks Univ of Alabama F, all Fall

Locali ation z For For Wireless S ensor Sensor Networks Univ of Alabama F, all Fall Localization ation For Wireless Sensor Networks Univ of Alabama, Fall 2011 1 Introduction - Wireless Sensor Network Power Management WSN Challenges Positioning of Sensors and Events (Localization) Coverage

More information

An Efficient Cooperation Protocol to Extend Coverage Area in Cellular Networks

An Efficient Cooperation Protocol to Extend Coverage Area in Cellular Networks An Efficient Cooperation Protocol to Extend Coverage Area in Cellular Networks Ahmed K. Sadek, Zhu Han, and K. J. Ray Liu Department of Electrical and Computer Engineering, and Institute for Systems Research

More information

Static Path Planning for Mobile Beacons to Localize Sensor Networks

Static Path Planning for Mobile Beacons to Localize Sensor Networks Static Path Planning for Mobile Beacons to Localize Sensor Networks Rui Huang and Gergely V. Záruba Computer Science and Engineering Department The University of Texas at Arlington 416 Yates, 3NH, Arlington,

More information

Make and Measure a Circle Without a Pattern

Make and Measure a Circle Without a Pattern Published on Sew4Home Make and Measure a Circle Without a Pattern Editor: Liz Johnson Thursday, 25 August 2016 1:00 The circle is, in my humble opinion, the Queen of the geometric shapes. Don't get me

More information

7. Three friends each order a large

7. Three friends each order a large 005 MATHCOUNTS CHAPTER SPRINT ROUND. We are given the following chart: Cape Bangkok Honolulu London Town Bangkok 6300 6609 5944 Cape 6300,535 5989 Town Honolulu 6609,535 740 London 5944 5989 740 To find

More information

From Fountain to BATS: Realization of Network Coding

From Fountain to BATS: Realization of Network Coding From Fountain to BATS: Realization of Network Coding Shenghao Yang Jan 26, 2015 Shenzhen Shenghao Yang Jan 26, 2015 1 / 35 Outline 1 Outline 2 Single-Hop: Fountain Codes LT Codes Raptor codes: achieving

More information