An Efficient and Flexible Decentralized Multicast Key Distribution Scheme

Size: px
Start display at page:

Download "An Efficient and Flexible Decentralized Multicast Key Distribution Scheme"

Transcription

1 IJCSNS Internatonal Journal of Computer Scence and Networ Securty VOL. 6 No. 8B August An Effcent and Flexble Decentralzed Multcast Key Dstrbuton Scheme Wen-Shenq Juang and Jyan-Cwan Wu Department of Informaton Management Shh Hsn Unversty Tape Tawan R.O.C. Summary Multcast communcaton s becomng the bass for a growng number of Internet-based applcatons. The secure dstrbuton of servces or messages by the server to all multcastng group members requres an effcent and scalable way for dstrbutng a group ey to elgble members. Most of the exstng research are focusng on group ey and group members management and can be dvded nto four types: centralzed decentralzed dstrbuted and hybrd schemes. In ths paper we propose an effcent and flexble decentralzed multcast ey dstrbuton scheme wth less computatonal cost and more functonalty. The merts nclude: (1) the scheme needs no shared eys table between the regstraton center and all members; () a group ey s dstrbuted by servers to elgble members; (3) the computaton cost s very low; () members and servers can authentcate each other; (5) our scheme s nonce-based and dose not have a serous tme-synchronzaton problem; (6) also the shared secret ey dstrbuton between dynamc partcpants s addressed n our proposed scheme. Key words: Multcast Multcast group ey Key dstrbuton Networ securty Securty servce. 1. Introducton Multcastng s becomng the bass for a growng number of Internet-based applcatons [19] e.g. teleconferencng pay-per-vew on-lne TV and on-lne games. The dstrbuton of servces or messages by the server to all multcastng group members requres a securty framewor wth an effcent and scalable way of dstrbutng a group ey to the elgble members. In a secure multcast communcaton system [3 8] n order to preserve the secrecy of elgble members the group ey must be changed and redstrbuted to all the current members when some member leaves or on ths group. Otherwse t s possble for the new members to decrypt the past tapped encrypted messages or for the former members to decrypt the new encrypted messages. To prevent these problems the followng two securty crtera are mportant for the group ey dstrbuton n secure multcast communcaton [16]. S1: Forward secrecy: If a person has left a group the departed member cannot decrypt encrypted messages transmtted after the leavng. S: Bacward secrecy: If a person ons a group he cannot decrypt encrypted messages transmtted before the onng. The process for achevng forward and bacward secrecy requres redstrbutng the group ey. Ths process s called group reeyng. In [16] the multcastng group ey dstrbuton s dvded nto three man classes: centralzed group ey management protocols decentralzed archtectures and dstrbuted ey management protocols. Most centralzed models use Logcal Key Herarchcal (LKH) methods [ ]. However these approaches ntroduce ey storage rs and are neffcent when the group s large. Decentralzed archtectures use subgroup controllers to dstrbute the group ey [ 13]. They do not dscuss how Key Encrypton Keys (KEKs) between a subgroup controller and ts members are dstrbuted. Dstrbuted ey management protocols use the varant Dffe- Hellman ey agreement [18]. All members submt some nformaton to generate the correspondng group ey. It s neffcent because t has hgher computaton and communcaton costs. Snce the group s generated by all members t s hard to control forward and bacward secrecy. In ths paper we propose an effcent and flexble decentralzed multcast ey dstrbuton scheme wth less computatonal cost and more functonalty. Our proposed scheme satsfes the forward and bacward secrecy requrement for members who on or leave a group. In addton we propose a novel shared ey dstrbuton scheme between all members that s not addressed by other decentralzed schemes. The structure of ths paper s organzed as follows. In secton we gve a bref revew of related wor. In secton 3 we descrbe the decentralzed multcast ey

2 1 IJCSNS Internatonal Journal of Computer Scence and Networ Securty VOL.6 No.8B August 006 dstrbuton scheme. Securty analyss and effcency consderatons are dscussed n sectons and 5. In secton 6 we offer concludng remars.. Related wor In [1 16] secure approaches of multcastng group ey dstrbuton are dvded nto four man classes: centralzed group ey management protocols decentralzed archtectures dstrbuted ey management protocols and hybrd models..1 Centralzed group ey management A typcal centralzed group ey management protocol contans one mportant entty the Key Dstrbuton Center (KDC) whch generates the group ey and dstrbutes t to all members. The easest way to dstrbutng group ey s usng the Group Key Management Protocol (GKMP) [6 7]. When a reeyng s requred the old conference ey s used to encrypt the new conference ey. However the approach s not a soluton for the forward secrecy. Another mportant property of a centralzed mode s the use of a Logcal Key Herarchcal (LKH) [ ]. LKH s a nd of a bnary tree to solve the ey dstrbuton n a group. However these approaches ntroduce ey storage rs and are neffcent when the group s large.. Decentralzed archtectures In decentralzed models [ 13] a KDC s used and the large group s splt nto small subgroups. Each subgroup has a subgroup controller to reduce the wor of the KDC. In Iolus [13] there s a group securty agent (GSA) to manage each subgroup. Those GSAs are also managed by a group securty controller (GSC). The GSC uses ndependent eys for each subgroup. No general group ey s avalable for all group members. Although membershp changes n subgroups are local the maor drawbac of Iolus s that when a subgroup member wants to transmt the messages to other subgroups GSA must perform the translaton snce data are encrypted by each GSA s subgroup secret ey. Ths approach can reduce the worload on the GSC but the GSA can become a bottlenec. Furthermore the GSC does not authentcate each subgroup member. The shared eys between GSC and ts dynamc members are not addressed n those schemes [ 13]..3 Dstrbuted ey management protocols The dstrbuted approaches [18] have no group controller. All members must contrbute ther own secrets to generate the group ey. A typcal way s usng the varant Dffe-Hellman ey dstrbuton schemes to generate the group ey. However the computaton and communcaton cost s very hgh due to many exponentaton operatons.. Hybrd models In [1] a hybrd secure multcast communcaton scheme was proposed by combnng the LKH and the Iolus framewor. The scheme has a group controller (GC) and the large group s also splt nto small subgroups. The GC uses Iolus to dstrbute the group ey to the subgroup controller (SC). The SC uses LKH to forward the group ey to group members. Although ths approach can lower the GC load the maor drawbacs are the centralzed problem n SC and the GC could not authentcate each subgroup member. In addton the shared ey dstrbuton between GC and hs dynamc members s not addressed. 3. Our proposed scheme In ths secton we propose an effcent and flexble decentralzed multcast ey dstrbuton scheme. There are three nds of partcpants n our scheme: the regstraton center subgroup controllers and subgroup members. In our scheme all members submt ther denttes to the regstraton center for regstraton. The regstraton center classfes members nto dfferent subgroups. In each subgroup the regstraton center assgns a statc member as the subgroup controller to reduce the cost of ey dstrbuton traffc. When a subgroup controller wants to send the group ey to members the KEK eys between the subgroup controller and ts members can be nqured from the regstraton center. We assume the regstraton center s a trusted server that performs regstraton shared ey queres and multcast groupng. In the proposed approach the regstraton center dvdes all members nto subgroups based on ther behavors and dstances. The subgroups are connected to the regstraton center and arranged n the form of a herarchy. Let RC be the regstraton center. Let U denote the dynamc member n the subgroup and ID denote the unque dentfcaton of U. Wthout loss of generalty let U 0 be the statc member n the subgroup. Let G be the subgroup. Let ) be a secure one-way hashng functon [1]. Let E K (m) be the cphertext of m encrypted usng the secret ey K of a secure symmetrc cryptosystem [1]. Let D K (c) denote the plantext of c decrypted usng the secret ey

3 IJCSNS Internatonal Journal of Computer Scence and Networ Securty VOL.6 No.8B August K of the correspondng symmetrc cryptosystem [1]. Then let denote the conventonal strng concatenaton operator. Let X Y :{ Z} denote a sender X sends a message Z to a recever Y. Fnally let x be the master secret ey of RC V = x ID ) s the secret ey computed by RC and shared by U and RC after U regsterng at RC. Therefore V 0 = ID 0 V ) s the secret ey computed by RC and U shared by U 0 and U. The proposed scheme conssts of fve phases: the regstraton phase the groupng phase the ey dstrbuton phase the shared ey nqury phase and the dynamc membershp management phase. 3.1 The regstraton phase RC performs groupng and ey management requred for the multcast ey dstrbuton. Each member submts hs dentty nformaton to RC for regstraton. If RC accepts ths request then t wll perform the followng steps. Step 1 : Compute U s secret ey V = x ID ) Step :Send V to U va a secure channel or store V n a smart card and gve t to U. 3. The groupng phase To reduce the cost of ey dstrbuton traffc an effcent groupng mechansm follows. The regstraton center RC classfes members nto dfferent subgroups based on ther behavor and geography. In each subgroup RC assgns a statc member as the subgroup head (controller). The general classfcaton mechansm s based on the dstance from the statc members or the value of a threshold functon. The statc members perform the group ey dstrbuton for ther subgroups. These approaches wll reduce the burden on the RC. 3.3 The ey dstrbuton phase After groupng RC generates a group ey K and sends t to all subgroup s statc members U 0. Then all of the subgroup s statc members dstrbute the group ey K to all ther members. The followng protocol s the group ey dstrbuton for each subgroup. Step 1: RC U :{ N E ( K K N ))} 0 1 V 1 0 Step : U RC { E ( N + 1 N )} 0 : V 0 1 Step 3: RC U :{ E ( N + 1)} 0 V 0 Step : U U :{ ID N E ( K K N ID ))} 0 G 0 3 V Step 5: U U : { E ( N 1 N )} G 0 V Step 6: U U : { E ( N 1)} 0 G V + 0 In step 1 RC generates the group ey K a nonce N and sends the message N E ( K K N ))} to 1 { 1 V 0 1 U 0. The nonce N 1 s a fresh random number for freshness checng. The authentcaton tag h K ) s used for verfyng the dentfcaton of ( N 1 RC. After recevng the message n step 1 U 0 decrypts the message usng ts secret ey and derves the group K by computng ( E ( ( 1))) 0 V 0. Then t checs f the authentcaton tag h ( K N 1) s vald. If yes U 0 sends the encrypted message ( N 1 +1 ) 0 N bac to RC. The nonce N s for freshness checng. Upon recevng the encrypted message n step RC decrypts t by computng ( E ( 1 +1 )) 0 V N 0 N and checs f the nonce N 1 +1 s n t for freshness checng. If yes RC ( N +1) 0 bac to U 0 n step 3. Upon recevng the message E N +1) 0 U 0 decrypts t by computng ( E ( +1)) 0 V N 0 and checs f the nonce N + 1 s n t for freshness checng. After step 3 RC has sent the group ey K to all subgroup heads. When U 0 wants to send the group ey K to hs subgroup member U the shared ey V 0 can be nqured from RC usng the shared ey nqury phase. In step U 0 generates a nonce N and sends ID 0 N 3 the encrypted message ( ( 3 0 )) 0 ID to U. The nonce N 3 s for freshness checng. After recevng ID 0 N 3 and the encrypted message n step U decrypts the message by frst

4 1 IJCSNS Internatonal Journal of Computer Scence and Networ Securty VOL.6 No.8B August 006 computng the shared ey V ID V ). Then 0 = 0 U can derve the group ey K by computng ( E ( ( 3 0))) 0 V 0 ID and checng f the authentcaton tag h K N ID ) s vald. If yes U sends the encrypted message E N +1 N ) ( 3 0 V ( 0 3 bac to U 0 n step 5. The nonce N s for freshness checng. Upon recevng the encrypted message n step 5 U decrypts t by computng 0 ( E ( 3 +1 )) 0 V N 0 N and checng f the nonce N 1 s n t for freshness checng. If yes U sends the encrypted message E 1) V ( 0 N + bac to U. Upon recevng ( N + 1) 0 U decrypts t by computng ( E ( + 1)) 0 V N 0 and checs f the nonce N + 1 s n t for freshness checng. After fnshng all steps all group members can use the group ey K for secure communcaton. 3. The shared ey nqury phase When U 0 wants to send the group ey K to hs subgroup members U the shared ey V 0 can be nqured from RC. Ths approach can avod the rs of secret ey storage. The followng protocols are the shared ey nqury phase. Step 1: U RC :{ N ID ID E ( ID V 0 0 ID N 5 ))} Step : RC U :{ E ( V V ( N +1)))} 0 V In step 1 U 0 sends the nqury message to RC. The message ncludes the authentcaton tag h ID ID N ) and s encrypted by the secret ey ( 0 5 V 0 shared by 0 U and RC whch s for verfyng the dentfcaton of U 0. After recevng the nqury message RC frst decrypts t by computng ( E ( ( 0 5))) 0 V h ID 0 ID N then checs f the message contans the authentcaton tag h ( ID 0 ID N 5) and f the nonce N 5 s fresh. RC can eep a smple table to record recently used nonces. RC reects the nqury f t s not vald. If t s vald and the nonce s fresh RC computes the shared ey V 0 = ID0 V ) shared by U 0 and hs subgroup members U. Then RC sends the encrypted message ( V 0 ( 0 0 h V ( N 5 + 1))) bac to U n step. Upon recevng the encrypted message n step U 0 uses hs secret ey to decrypt t and derves the subgroup member s shared ey V The dynamc membershp management phase To ensure the forward secrecy and bacward secrecy a secure multcast protocol must update the group ey when the group members change. In our scheme RC performs the dynamc membershp management for scalablty. The on and leave protocols are ntalzed by the dynamc members. We also consder the stuaton of the leavng of a subgroup s statc member Member onng We assume a new member U wants to on the servce t must submt hs dentty nformaton to RC for regsterng frst. If RC accepts ths request then t wll perform the followng steps. Step 1:Compute U s secret ey V = x ID ) Step :Send V to U va a secure channel or store V n a smart card and gve t to U. After regsterng RC updates the group ey K ' and sends t to all members to mantan forward secrecy. The followng protocol s the group ey dstrbuton for each subgroup where N N 1 N N 3 N are nonces and JN s the onng-request message. Step 1: U RC : { ID JN N E ( V ID N JN ))} Step : RC U :{ N JN ID E ( ' 0 1 V K 0 K' N 1 ID JN))} Step 3: U 0 RC : { E N )} 0 N Step : RC U :{ E ( N +1)} Step 5: U 0 V 0 0 U G :{ ID 0 N 3 JN 0 ( K' K' ID 0 N 3 JN ))} Step 6: U G U 0 :{ ( N 3 +1 )} 0 N Step 7: U U :{ E ( N +1)} 0 G V 0

5 IJCSNS Internatonal Journal of Computer Scence and Networ Securty VOL.6 No.8B August In step 1 U sends hs dentty ID a nonce N the onng message JN and the message E V ( h ( ID N JN ) to RC to on the servce. If RC accepts the request then t executes the groupng protocol and classfes the member U nto U 0 s subgroup. After groupng RC updates the group ey K ' and sends the message N JN ID E ( K' K' N ID JN ))} { 1 V 1 0 ncludng the new member s onng message to U 0 n step. The nonce N 1 s a fresh random number for freshness checng. The authentcaton tag K ' N 1 ID JN ) s used for verfyng the dentfcaton of RC. Upon recevng the encrypted message n step U 0 decrypts the message usng hs secret ey and derves the new group ey K ' by computng ( E ( ' ( ' 1 0 V 0 ID JN ))). Then checs f the authentcaton tag K' N 1 ID JN) s vald. If the authentcaton tag K' N 1 ID JN) s vald U 0 sends the encrypted message ( N 1 +1 ) 0 N bac to RC n step 3. The nonce N s for freshness checng. After recevng the encrypted message n step 3 RC decrypts t by computng ( E ( 1 +1 )) 0 V N 0 N and checs f the nonce N 1 +1 s n t for freshness checng. If yes RC ( N +1) 0 bac to U 0 n step. Upon recevng the message E N +1) 0 U 0 decrypts t by computng ( E ( +1)) 0 V N 0 and checs f the nonce N + 1 s n t for freshness checng. After step RC has sent the new group ey K ' to all subgroup heads. In step 5 U 0 generates a nonce N 3 and sends hs ID 0 N 3 the encrypted message ( K' K' N 3 ID 0 JN )) 0 to U G. The nonce N 3 s for freshness checng. After recevng the ID 0 N 3 and the encrypted message n step 5 U G decrypted the message by frst computng the shared ey V 0 = ID0 V ). Then U can derve the group ey K ' by computng ( E ( ' ( ' 3))) 0 V 0. U G sends the encrypted message ( 3 +1 ) 0 N N bac to U 0 n step 6. The nonce N s for freshness checng. Upon recevng the encrypted message n step 6 U 0 decrypts t by computng ( E ( 3 +1 )) 0 V N 0 N and checs f the nonce N s n t for freshness checng. If yes U 0 ( N +1) 0 bac to U G n step 7. Upon recevng ( N +1) 0 U G decrypts t by computng ( E ( +1)) 0 V N 0 and checs f the nonce N + 1 s n t for freshness checng. After fnshng the steps all group members can use the group ey K ' for secure communcaton Member leavng If U wants to leave the servce the group ey needs to be changed. After a member sends the leave-request to RC RC updates the group ey K to protect the forward secrecy. The followng are the common ey updatng protocols for each subgroup where N N 1 N N 3 N are nonces and LR s the leave-request message. Step 1: U RC:{ ID N LRE V ( ID N LR))} Step : RC U : { N LR ID E ( K 0 1 V 0 K N 1 ID LR ))} Step 3: U 0 RC :{ ( N 1 +1 )} 0 N Step : RC U :{ E ( N +1)} 0 V 0 Step 5: U U :{ ID N E ( K V 0 G h ( K" ID 0 N 3))} Step 6: U U :{ E ( N +1 N )} 0 V 0 3 G Step 7: U U :{ E ( N + 1)} 0 V 0 G In step 1 U sends hs dentty ID a nonce N LR and the message E V ( h ( ID N LR ) to RC to leave the servce. If RC accepts the request

6 16 IJCSNS Internatonal Journal of Computer Scence and Networ Securty VOL.6 No.8B August 006 then RC updates the group ey K and redstrbutes to all group members. In step RC sends a nonce N 1 U s dentfy ID and the leavng message LR and the message { N 1 LR ID ( K K 0 N 1 ID LR ))} to U 0. The nonce N 1 s a fresh random number for freshness checng. The authentcaton tag K N 1 ID LR ) s used for verfyng the dentfcaton of RC. Upon recevng the encrypted message n step U 0 decrypts the message usng hs secret ey and derves the new group K by computng ( E ( K K 0 V N ))) 0 1 ID LR. Then t checs f the authentcaton tag K N 1 ID LR) s vald. If yes U 0 sends the encrypted message E N +1 N ) bac to 0 1 RC n step 3. The nonce N s for freshness checng. After recevng the encrypted message n step 3 RC decrypts t by computng ( E ( 1 +1 )) 0 V N 0 N and checs f the nonce N 1 +1 s n t for freshness checng. If yes RC ( N +1) 0 bac to U 0 n step. Upon recevng the message E N +1) 0 U 0 decrypts t by computng ( E ( +1)) 0 V N 0 and checs f the nonce N + 1 s n t for freshness checng. After step RC has sent the new group ey K to all subgroup heads. In step 5 U 0 generates a nonce N 3 and sends hs ID 0 N 3 the encrypted message ( K K N 3 ID 0 JN )) 0 to U G. The nonce N 3 s for freshness checng. After recevng 0 N 3 and the encrypted message n step 5 U G ID decrypts the message by frst computng the shared ey V ID V ). Then U can derve the 0 = 0 group D G ey K by computng ( ( K K N 3))) and chec f the V 0 0 authentcaton tag h K ) s vald. If yes ( N 3 U G ( 3 +1 ) 0 N N bac to U 0 n step 6. The nonce N s for freshness checng. Upon recevng the encrypted message n step 6 U decrypts t by computng 0 ( E ( 3 +1 )) 0 V N 0 N and checs f the nonce N s n t for freshness checng. If yes U 0 ( N +1) 0 bac to n step 7. Upon the recept of ( N +1) U G U G 0 decrypts t by computng ( E ( +1)) 0 V N 0 and checs f the nonce N + 1 s n t for freshness checng. After fnshng these steps all group members can use the new group ey K for secure communcaton Reconfguraton If the statc member U 0 wants to leave the servce the group ey needs to be updated. Followng are the reey operatons requred The groupng phase After the statc member U 0 sends the leaverequest to RC RC chooses another member U as the new statc member of ths subgroup G. For smplcty we exchange ID wth ID 0 and publsh t The ey dstrbuton phase RC updates the group ey K ' to protect the forward secrecy and sends t to other members except U. The followng protocols are the group ey dstrbuton for each subgroup where N N 1 N N 3 N are nonces and SLR s the statc member leave-request message. V Step 1: U RC :{ ID N SLR E ( ID N SLR ))}

7 IJCSNS Internatonal Journal of Computer Scence and Networ Securty VOL.6 No.8B August Step : RC U :{ N SLR ID E ( K ' 0 1 V 0 K N 1 ID SLR ))} 0 V 0 1 Step 3: U RC :{ E ( N +1 N )} Step : RC U 0 : { ( N + 1)} 0 Step 5: U U :{ ID N E ( K V 0 G ' h ( K ID 0 N 3))} Step 6 U U :{ E ( N +1 N )} 0 V 0 3 G Step 7 U U :{ E ( N +1)} 0 V 0 G In step 1 U sends hs dentty ID a nonce N SLR and the message E V ( h ( ID N SLR ) to RC for leavng the servce. If RC accepts the request ' then RC updates the group ey K and redstrbutes t to all group members. After groupng RC sends a nonce N 1 U s dentfy ID and the leavng message SLR and the message ' ' { N 1 SLR ID ( K K N 1 ID SLR ))} 0 to the new U 0 n step. The nonce N 1 s a fresh random number for freshness checng. The ' authentcaton tag K N 1 ID SLR ) s used for verfyng the dentfcaton of RC. Upon recevng the message n step U 0 decrypts the message usng hs secret ey and derves the ' new group K by computng ' ' ( E ( ( 1 0 V 0 ID SLR ))). Then t checs f the authentcaton tag ' K N 1 ID SLR) s vald. If yes U 0 sends the encrypted message E N +1 N ) bac to 0 1 RC n step 3. The nonce N s for freshness checng. After recevng the encrypted message n step 3 RC decrypts t by computng ( E ( 1 +1 )) 0 V N 0 N and checs f the nonce N s n t for freshness checng. If yes RC +1 1 ' ' ( N +1) 0 bac to U 0 n step. Upon recevng the message E N +1) 0 U 0 decrypts t by computng ( E ( +1)) 0 V N 0 and checs f the nonce N + 1 s n t for freshness checng. ' After step RC has sent the new group ey K to all subgroup heads. In step 5 U 0 generates a nonce N 3 and sends hs ID 0 N 3 the encrypted message ' ' ( K K N3 ID 0 SLR)) 0 to U G. The nonce N 3 s for freshness checng. After recevng the ID 0 N 3 and the encrypted message n step 5 U G decrypted the message by frst computng the shared ey V ID V ). Then 0 = 0 U G can ' derve the group ey K by computng ' ' ( E ( ( 3))) 0 V 0 and chec f the ' authentcaton tag h K ) s vald. If yes ( N 3 U G ( 3 +1 ) 0 N N bac to U 0 n step 6. The nonce N s for freshness checng. Upon recevng the encrypted message n step 6 U 0 decrypts t by computng ( E ( 3 +1 )) 0 V N 0 N and checs f the nonce N s n t for freshness checng. If yes U 0 sends the encrypted message ( N +1) 0 bac to U n step 7. Upon the recept of E N +1) V ( 0 G U G decrypts t by computng ( E ( +1)) 0 V N 0 and checs f the nonce N + 1 s n t for freshness checng. After fnshng all steps all group members can use the new ' group ey K for secure communcaton.. Securty analyss In ths secton we analyze the securty of our proposed scheme. (1) The secret ey V x ID ) of each member =

8 18 IJCSNS Internatonal Journal of Computer Scence and Networ Securty VOL.6 No.8B August 006 computed by RC and the shared secret ey V 0 = V ID 0) between U 0 and U are both protected by the secure one-way hash functon h (). It s nfeasble to compute V wthout nowng the secret nformaton x of RC. It s also nfeasble to compute V 0 wthout nowng the secret nformaton x or V. () The replay attac fals snce the freshness of messages transmtted n ey dstrbuton phase s provde by the nonces N N 1 N N3 N. Only vald partcpants can put the related nonces generated by the elgble partner n the encrypted message. The authentcaton tags are used to mae sure that the receved messages were correctly sent by the elgble partners. (3) In the dynamc membershp management phase the group ey s updated when members on leave or reconfgure. It provdes forward and bacward secrecy. In our scheme for mprovng the reparablty mentoned n [9 10] the shared eys V x ID ) stored n U = 's smart card can be replaced wth the new value V = x ID ) where s the number of tmes that U has revoed hs used secret ey V. Ths approach requres RC to record the number n hs database or U to send the number to hs subgroup controller n ey dstrbuton. 5. Performance analyss Table 1: Number of eys stored for our proposed scheme and related schemes Group controller Subgroup controller Iolus [13] Aslan s scheme [1] Our Scheme N n 1 N N-1 N Each member 1 h 1 We analyze the number of stored eys for our proposed scheme and the related schemes [1 13] n Table 1. We assume the total number of subgroups n [1 13] and our scheme s n. The number of each subgroup members s N. Therefore members of the whole group are n* N. The heght of the protocol s tree n [1] s h = (logd N) +1 where d s the degree of the tree. In our scheme the shared ey V x ID ) and = V V ID ) can be computed by the master secret 0 = 0 x and RC only has to eep secretly the master ey x. Each subgroup controller needs to store N-1 shared eys V 0 = V ID 0) nqured from the group controller wth hs subgroup member and one shared ey V 0 = x ID 0) wth the group controller. Each subgroup member U only needs to store one secret ey V = x ID ). In Iolus [13] the group controller needs to store n shared eys wth n subgroup controllers. Each subgroup controller needs to store N-1 shared eys wth hs N-1 subgroup members and at least one shared ey wth hs nearest subgroup controller. Each subgroup member only needs to store one shared secret ey wth hs subgroup controller. In Aslan s protocol [1] the group controller needs to store n shared eys wth n subgroup controllers. Each subgroup controller needs to store N- shared eys ncludng N-1 KEKs and N-1 LKH eys wth hs N-1 subgroup members and at least one shared ey wth hs nearest subgroup controller. The total number of eys s (N-1)+(N-1)+1=N-1. Each subgroup member needs to store h shared secret eys wth hs subgroup controller. Table : Computaton cost of a multcast message for our proposed scheme and related schemes Number of encrypton/decrypton operatons for all subgroup controllers Number of encrypton/decrypton operatons for each subgroup member Iolus [13] Aslan s scheme [1] Our Scheme 3n- 3n The number of encrypton/decrypton operatons for a multcast message n each subgroup controller and member about our scheme and related schemes s presented n Table. In our scheme all subgroup controllers need not do any encrypton or decrypton for multcastng a message. Each subgroup member needs to do one encrypton or decrypton operaton when a

9 IJCSNS Internatonal Journal of Computer Scence and Networ Securty VOL.6 No.8B August multcast message s transmtted. In the schemes [1 13] all subgroup controllers need to do message translaton. Ths tas needs at least 3n- encrypton or decrypton operatons ncludng 1 decrypton operaton and n-1 encrypton operaton by the sender subgroup controller and n-1 decrypton operatons and n-1 encrypton operatons for all other n-1 subgroup controllers. If you would le to temze some parts of your manuscrpt please mae use of the specfed style temze from the drop-down menu of style categores In the case that you would le to paragraph your manuscrpt please mae use of the specfed style paragraph from the drop-down menu of style categores Table 3: Comparson between our proposed scheme and related schemes Iolus [13] Aslan s Our scheme [1] Scheme No ey table No No Yes Mutual authentcaton No No Yes Computaton cost of multcastng messages Hgh Hgh Very low Secret ey generaton No No Yes We summarze the functonalty of the related schemes [1 13] and our scheme n Table 3. In the schemes [1 13] the group controller must store the shared eys for all subgroup controllers. In our scheme the regstraton center RC needs only to protect hs master secret ey x. The subgroup controller and subgroup members can authentcate each other n our scheme. The computaton cost of multcastng messages n our scheme s very low compared to the schemes [1 13]. We also address the shared eys generaton between RC and subgroup controllers RC and subgroup members and subgroup controllers and subgroup members. 6. Concludng remars In ths paper we have proposed an effcent and flexble decentralzed multcast ey dstrbuton scheme. Our scheme does not need a shared eys table between the regstraton center and all users to reduce the ey storage rs and the computaton cost s very low. In our scheme when a subgroup member wants to transmt messages to other subgroups these messages can be encrypted by the group ey. It does not have the bottlenec problem n subgroup heads. The subgroup heads can authentcate each subgroup members. The Key Encrypton Keys dstrbuton between the ey center and all members are addressed n our proposed scheme but not consdered n other related schemes. Acnowledgments Ths wor was supported n part by the Natonal Scence Councl of Republc of Chna under contract NSC 9-13-E and NSC 95-1-E MY. References [1] H. Aslan A Scalable and Dstrbuted Multcast Securty Protocol Usng A Subgroup-Key Herarchy Computers and Securty Vol. 3 pp [] A. Ballarde Scalable Multcast Key Dstrbuton RFC [3] M. Burmenster Y. Desmedt A Secure and Effcent Conference Key Dstrbuton System In Advances n Cryptology EUROCRYPT 9 A. D. Sants Ed. Lecture Notes n Computer Scence 950 Sprnger-Verlag New Yor pp [] R. Canett J. Garay G. Its D. Mccanco M. Naor B. Pnas Multcast Securty: A Taxonomy and Some Effcent Constructons In Proceedngs of the IEEE INFOCOM Vol. pp [5] R. Canett T. Maln K. Nssm Effcent Communcaton-Storage Tradeoffs for Multcast Encrypton In Advances n Cryptology EUROCRYPT 99 J. Stem Ed. Lectures Notes n Computer Scence Sprnger-Verlag New Yor pp [6] H. Harney C. Mucenhrn Group Key Management Protocol (GKMP) Specfcaton RFC [7] H. Harney C. Mucenhrn Group Key Management Protocol (GKMP) Archtecture RFC [8] G. Horng Cryptanalyss of A Key Management Scheme for Secure Multcast Communcatons IEICE Trans. Communcatons Vol. E85-B No. 5 pp [9] T. Hwang and W. Ku Reparable Key Dstrbuton Protocols for Internet Envronments IEEE Trans. on Communcatons Vol. 3 No. 5 pp [10] W. Ku and S. Chen Weanesses and Improvements of an Effcent Password Based Remote User Authentcaton Scheme Usng Smart

10 150 IJCSNS Internatonal Journal of Computer Scence and Networ Securty VOL.6 No.8B August 006 Cards IEEE Trans on Consumer Electroncs Vol. 50 No. 1 pp [11] M. L R. Poovendran C. Berensten Desgn of Secure Multcast Key Management Schemes wth Communcaton Budget Constrant IEEE Communcatons Letters Vol. 6 No.3 pp [1] R. Merle One Way Hash Functons and DES In Brassard G. (ed.) Advances n Cryptology-Crypt'89 LNCS 35 pp. 8-6 Sprnger New Yor [13] S. Mttra Iolus: A Framewor for Scalable Secure Multcastng In Proceedngs of ACM SIGCOMM pp [1] NIST FIPS PUB 197 Announcng the Advanced Encrypton Standard (AES) Natonal Insttute of Standards and Technology U. S. Department of Commerce 001. [15] A. Perrg D. Song J. Tygar A New Protocol for Effcent Large-Group Key Dstrbuton In Proceedngs of the IEEE Symposum on Securty and Prvacy IEEE Computer Socety Press Los Alamtos Calf [16] S. Rafael D. Hutchson A Survey of Key Management for Secure Group Communcaton ACM Computng Surveys Vol. 35 No. 3 pp [17] O. Rodeh K. Brman D. Dolev Optmzed group reey for group communcaton systems In Networ and Dstrbuted System Securty San Dego Calf. Feb [18] M. Stener G. Tsud M. Wadner Dffe-Hellman Key Dstrbuton Extended to Group Communcaton In SIGSAC Proceedngs of the 3rd ACM Conference on Computer and Communcatons Securty New Yor pp [19] R. Wttmann M. Ztterbart Multcast Communcaton Protocols and Applcatons Morgan Kaufman Publshers 001. [0] C. Wong M. Gouda L. Smon Secure Group Communcaton Usng Key Graphs IEEE/ACM Transactons on Networng Vol. 8 No.1 pp Wen-Shenq Juang receved hs master's degree n Computer Informaton Scence from Natonal Chao Tung Unversty n 1993 and hs Ph. D. degree n electrcal engneerng from Natonal Tawan Unversty n He oned the Department of Informaton Management Shh Hsn Unversty Tape Tawan n 000 as an assstant professor. He s current an assocate professor n the same department. Dr. Juang's current research nterests nclude appled cryptography nformaton securty and networ securty. Jyan-Cwan Wu s now worng toward MS degree n Informaton Management from Shh Hsn Unversty Tawan. Hs current nterests nclude nformaton securty electronc commerce and networ securty.

Efficient Large Integers Arithmetic by Adopting Squaring and Complement Recoding Techniques

Efficient Large Integers Arithmetic by Adopting Squaring and Complement Recoding Techniques The th Worshop on Combnatoral Mathematcs and Computaton Theory Effcent Large Integers Arthmetc by Adoptng Squarng and Complement Recodng Technques Cha-Long Wu*, Der-Chyuan Lou, and Te-Jen Chang *Department

More information

A Digital Content Distribution Using a Group-Key and Multi-layered Structure Based on Web

A Digital Content Distribution Using a Group-Key and Multi-layered Structure Based on Web A Dgtal Content Dstrbuton Usng a Group-Key and Mult-layered Structure Based on Web Yun-J Na and Il Seo Ko 2 Department of Internet Software, Honam Unversty 59-, Seobong-Dong, Gwangsan-Gu, Gwangju 506-74,

More information

An Efficient Ownership Transfer Protocol for RFID Conforming to EPC Class 1 Generation 2 Standards

An Efficient Ownership Transfer Protocol for RFID Conforming to EPC Class 1 Generation 2 Standards Journal of Computers Vol. 27, No. 3, 2016, pp. 41-51 do:10.3966/199115592016102703005 An Effcent Ownershp Transfer Protocol for RFID Conformng to EPC Class 1 Generaton 2 Standards Fan-Shuo Lu 1 Ha-Bng

More information

Improving the Authentication Scheme and Access Control Protocol for VANETs

Improving the Authentication Scheme and Access Control Protocol for VANETs Entropy 2014, 16, 6152-6165; do:10.3390/e16116152 OPEN ACCESS entropy ISSN 1099-4300 www.mdp.com/journal/entropy Artcle Improvng the Authentcaton Scheme and Access Control Protocol for VANETs We-Chen Wu

More information

PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION. Evgeny Artyomov and Orly Yadid-Pecht

PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION. Evgeny Artyomov and Orly Yadid-Pecht 68 Internatonal Journal "Informaton Theores & Applcatons" Vol.11 PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION Evgeny Artyomov and Orly

More information

Graphical User-ID with Partial Match Scheme and Application for Mobile Web-Services

Graphical User-ID with Partial Match Scheme and Application for Mobile Web-Services Journal of Advances n Informaton Technology Vol. 7, No. 3, August 2016 Graphcal User-ID wth Partal Match Scheme and Applcaton for Moble Web-Servces Yusue Matsuno, Kyoj Kawagoe, and Kenta Ou Rtsumean Unversty,

More information

Calculation of the received voltage due to the radiation from multiple co-frequency sources

Calculation of the received voltage due to the radiation from multiple co-frequency sources Rec. ITU-R SM.1271-0 1 RECOMMENDATION ITU-R SM.1271-0 * EFFICIENT SPECTRUM UTILIZATION USING PROBABILISTIC METHODS Rec. ITU-R SM.1271 (1997) The ITU Radocommuncaton Assembly, consderng a) that communcatons

More information

Priority based Dynamic Multiple Robot Path Planning

Priority based Dynamic Multiple Robot Path Planning 2nd Internatonal Conference on Autonomous obots and Agents Prorty based Dynamc Multple obot Path Plannng Abstract Taxong Zheng Department of Automaton Chongqng Unversty of Post and Telecommuncaton, Chna

More information

DRIVERS ANONYMITY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS NADER MAZEN RABADI DISSERTATION. Submitted to the Graduate School

DRIVERS ANONYMITY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS NADER MAZEN RABADI DISSERTATION. Submitted to the Graduate School DRIVERS ANONYMITY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS by NADER MAZEN RABADI DISSERTATION Submtted to the Graduate School of Wayne State Unversty, Detrot, Mchgan n partal fulfllment of the requrements

More information

High Speed, Low Power And Area Efficient Carry-Select Adder

High Speed, Low Power And Area Efficient Carry-Select Adder Internatonal Journal of Scence, Engneerng and Technology Research (IJSETR), Volume 5, Issue 3, March 2016 Hgh Speed, Low Power And Area Effcent Carry-Select Adder Nelant Harsh M.tech.VLSI Desgn Electroncs

More information

Adaptive System Control with PID Neural Networks

Adaptive System Control with PID Neural Networks Adaptve System Control wth PID Neural Networs F. Shahra a, M.A. Fanae b, A.R. Aromandzadeh a a Department of Chemcal Engneerng, Unversty of Sstan and Baluchestan, Zahedan, Iran. b Department of Chemcal

More information

Secure Power Scheduling Auction for Smart Grids Using Homomorphic Encryption

Secure Power Scheduling Auction for Smart Grids Using Homomorphic Encryption Secure Power Schedulng Aucton for Smart Grds Usng Homomorphc Encrypton Haya Shajaah, Student Member, IEEE, Ahmed Abdelhad, Senor Member, IEEE, and Charles Clancy, Senor Member, IEEE Abstract In ths paper,

More information

Space Time Equalization-space time codes System Model for STCM

Space Time Equalization-space time codes System Model for STCM Space Tme Eualzaton-space tme codes System Model for STCM The system under consderaton conssts of ST encoder, fadng channel model wth AWGN, two transmt antennas, one receve antenna, Vterb eualzer wth deal

More information

Chaotic Filter Bank for Computer Cryptography

Chaotic Filter Bank for Computer Cryptography Chaotc Flter Bank for Computer Cryptography Bngo Wng-uen Lng Telephone: 44 () 784894 Fax: 44 () 784893 Emal: HTwng-kuen.lng@kcl.ac.ukTH Department of Electronc Engneerng, Dvson of Engneerng, ng s College

More information

Gustavus J. Simmons Sandia National Laboratories Albuquerque, NM 87185

Gustavus J. Simmons Sandia National Laboratories Albuquerque, NM 87185 An Impersonaton-Proof Identty Verfcaton Scheme* Gustavus J. Smmons Sanda Natonal Laboratores Albuquerque, NM 87185 Most schemes for the verfcaton of personal dentty are logcally flawed n that they requre

More information

Chinese Remainder. Discrete Mathematics Andrei Bulatov

Chinese Remainder. Discrete Mathematics Andrei Bulatov Chnese Remander Introducton Theorem Dscrete Mathematcs Andre Bulatov Dscrete Mathematcs Chnese Remander Theorem 34-2 Prevous Lecture Resdues and arthmetc operatons Caesar cpher Pseudorandom generators

More information

A Mathematical Model for Restoration Problem in Smart Grids Incorporating Load Shedding Concept

A Mathematical Model for Restoration Problem in Smart Grids Incorporating Load Shedding Concept J. Appl. Envron. Bol. Sc., 5(1)20-27, 2015 2015, TextRoad Publcaton ISSN: 2090-4274 Journal of Appled Envronmental and Bologcal Scences www.textroad.com A Mathematcal Model for Restoraton Problem n Smart

More information

Performance Analysis of Multi User MIMO System with Block-Diagonalization Precoding Scheme

Performance Analysis of Multi User MIMO System with Block-Diagonalization Precoding Scheme Performance Analyss of Mult User MIMO System wth Block-Dagonalzaton Precodng Scheme Yoon Hyun m and Jn Young m, wanwoon Unversty, Department of Electroncs Convergence Engneerng, Wolgye-Dong, Nowon-Gu,

More information

SECURE COMMUNICATION BY USING MULTIPLE KEYS HAVING VARIABLE LENGTH IN A REAL TIME ENVIRONMENT FOR MULTIPLE STATIONS

SECURE COMMUNICATION BY USING MULTIPLE KEYS HAVING VARIABLE LENGTH IN A REAL TIME ENVIRONMENT FOR MULTIPLE STATIONS Journal of Engneerng Scence and echnology Vol. 7, No. 4 ( 55-56 School of Engneerng, aylor s Unversty SECURE COMMUNICAION BY USING MULIPLE KEYS HAVING VARIABLE LENGH IN A REAL IME ENVIRONMEN FOR MULIPLE

More information

Comparative Analysis of Reuse 1 and 3 in Cellular Network Based On SIR Distribution and Rate

Comparative Analysis of Reuse 1 and 3 in Cellular Network Based On SIR Distribution and Rate Comparatve Analyss of Reuse and 3 n ular Network Based On IR Dstrbuton and Rate Chandra Thapa M.Tech. II, DEC V College of Engneerng & Technology R.V.. Nagar, Chttoor-5727, A.P. Inda Emal: chandra2thapa@gmal.com

More information

Prevention of Sequential Message Loss in CAN Systems

Prevention of Sequential Message Loss in CAN Systems Preventon of Sequental Message Loss n CAN Systems Shengbng Jang Electrcal & Controls Integraton Lab GM R&D Center, MC: 480-106-390 30500 Mound Road, Warren, MI 48090 shengbng.jang@gm.com Ratnesh Kumar

More information

A Comparison of Two Equivalent Real Formulations for Complex-Valued Linear Systems Part 2: Results

A Comparison of Two Equivalent Real Formulations for Complex-Valued Linear Systems Part 2: Results AMERICAN JOURNAL OF UNDERGRADUATE RESEARCH VOL. 1 NO. () A Comparson of Two Equvalent Real Formulatons for Complex-Valued Lnear Systems Part : Results Abnta Munankarmy and Mchael A. Heroux Department of

More information

NFC Communications-based Mutual Authentication Scheme for the Internet of Things

NFC Communications-based Mutual Authentication Scheme for the Internet of Things Internatonal Journal of Network Securty, Vol.19, No.4, PP.631-638, July 2017 (DOI: 10.6633/IJNS.201707.19(4).17) 631 NFC Communcatons-based Mutual uthentcaton Scheme for the Internet of Thngs Yanna Ma

More information

A New Type of Weighted DV-Hop Algorithm Based on Correction Factor in WSNs

A New Type of Weighted DV-Hop Algorithm Based on Correction Factor in WSNs Journal of Communcatons Vol. 9, No. 9, September 2014 A New Type of Weghted DV-Hop Algorthm Based on Correcton Factor n WSNs Yng Wang, Zhy Fang, and Ln Chen Department of Computer scence and technology,

More information

Rational Secret Sharing without Broadcast

Rational Secret Sharing without Broadcast Ratonal Secret Sharng wthout Broadcast Amjed Shareef, Department of Computer Scence and Engneerng, Indan Insttute of Technology Madras, Chenna, Inda. Emal: amjedshareef@gmal.com Abstract We use the concept

More information

Research of Dispatching Method in Elevator Group Control System Based on Fuzzy Neural Network. Yufeng Dai a, Yun Du b

Research of Dispatching Method in Elevator Group Control System Based on Fuzzy Neural Network. Yufeng Dai a, Yun Du b 2nd Internatonal Conference on Computer Engneerng, Informaton Scence & Applcaton Technology (ICCIA 207) Research of Dspatchng Method n Elevator Group Control System Based on Fuzzy Neural Network Yufeng

More information

Evaluating Different One to Many Packet Delivery Schemes for UMTS

Evaluating Different One to Many Packet Delivery Schemes for UMTS Evaluatng Dfferent One to Many Packet Delvery Schemes for UMTS Antonos Alexou, Dmtros Antonells, Chrstos Bouras Research Academc Computer Technology Insttute, Greece and Computer Engneerng and Informatcs

More information

A study of turbo codes for multilevel modulations in Gaussian and mobile channels

A study of turbo codes for multilevel modulations in Gaussian and mobile channels A study of turbo codes for multlevel modulatons n Gaussan and moble channels Lamne Sylla and Paul Forter (sylla, forter)@gel.ulaval.ca Department of Electrcal and Computer Engneerng Laval Unversty, Ste-Foy,

More information

A Novel Optimization of the Distance Source Routing (DSR) Protocol for the Mobile Ad Hoc Networks (MANET)

A Novel Optimization of the Distance Source Routing (DSR) Protocol for the Mobile Ad Hoc Networks (MANET) A Novel Optmzaton of the Dstance Source Routng (DSR) Protocol for the Moble Ad Hoc Networs (MANET) Syed S. Rzv 1, Majd A. Jafr, and Khaled Ellethy Computer Scence and Engneerng Department Unversty of Brdgeport

More information

Network Reconfiguration in Distribution Systems Using a Modified TS Algorithm

Network Reconfiguration in Distribution Systems Using a Modified TS Algorithm Network Reconfguraton n Dstrbuton Systems Usng a Modfed TS Algorthm ZHANG DONG,FU ZHENGCAI,ZHANG LIUCHUN,SONG ZHENGQIANG School of Electroncs, Informaton and Electrcal Engneerng Shangha Jaotong Unversty

More information

Dynamic Optimization. Assignment 1. Sasanka Nagavalli January 29, 2013 Robotics Institute Carnegie Mellon University

Dynamic Optimization. Assignment 1. Sasanka Nagavalli January 29, 2013 Robotics Institute Carnegie Mellon University Dynamc Optmzaton Assgnment 1 Sasanka Nagavall snagaval@andrew.cmu.edu 16-745 January 29, 213 Robotcs Insttute Carnege Mellon Unversty Table of Contents 1. Problem and Approach... 1 2. Optmzaton wthout

More information

MULTICORE IMPLEMENTATION OF THE AES ALGORITHM IN THE MEASUREMENT SYSTEM

MULTICORE IMPLEMENTATION OF THE AES ALGORITHM IN THE MEASUREMENT SYSTEM XIX IMEKO World Congress Fundamental and Appled Metrology September 6 11, 2009, Lsbon, Portugal MULTICORE IMPLEMENTATION OF THE AES ALGORITHM IN THE MEASUREMENT SYSTEM Potr Blsk 1,2, Wesław Wneck 2 1 Warsaw

More information

EMA. Education Maintenance Allowance (EMA) Financial Details Form 2017/18. student finance wales cyllid myfyrwyr cymru.

EMA. Education Maintenance Allowance (EMA) Financial Details Form 2017/18. student finance wales cyllid myfyrwyr cymru. student fnance wales cylld myfyrwyr cymru Educaton Mantenance Allowance (EMA) Fnancal Detals Form 2017/18 sound advce on STUDENT FINANCE EMA Educaton Mantenance Allowance (EMA) 2017/18 /A How to complete

More information

Topology Control for C-RAN Architecture Based on Complex Network

Topology Control for C-RAN Architecture Based on Complex Network Topology Control for C-RAN Archtecture Based on Complex Network Zhanun Lu, Yung He, Yunpeng L, Zhaoy L, Ka Dng Chongqng key laboratory of moble communcatons technology Chongqng unversty of post and telecommuncaton

More information

Multicast in UMTS: Evaluation and recommendations

Multicast in UMTS: Evaluation and recommendations WIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wrel. Commun. Mob. Comput. 2008; 8:463 481 Publshed onlne 10 October 2006 n Wley InterScence (www.nterscence.wley.com).464 Multcast n UMTS: Evaluaton and recommendatons

More information

Secure Transmission of Sensitive data using multiple channels

Secure Transmission of Sensitive data using multiple channels Secure Transmsson of Senstve data usng multple channels Ahmed A. Belal, Ph.D. Department of computer scence and automatc control Faculty of Engneerng Unversty of Alexandra Alexandra, Egypt. aabelal@hotmal.com

More information

An efficient cluster-based power saving scheme for wireless sensor networks

An efficient cluster-based power saving scheme for wireless sensor networks RESEARCH Open Access An effcent cluster-based power savng scheme for wreless sensor networks Jau-Yang Chang * and Pe-Hao Ju Abstract In ths artcle, effcent power savng scheme and correspondng algorthm

More information

A Predictive QoS Control Strategy for Wireless Sensor Networks

A Predictive QoS Control Strategy for Wireless Sensor Networks The 1st Worshop on Resource Provsonng and Management n Sensor Networs (RPMSN '5) n conjuncton wth the 2nd IEEE MASS, Washngton, DC, Nov. 25 A Predctve QoS Control Strategy for Wreless Sensor Networs Byu

More information

Source Localization by TDOA with Random Sensor Position Errors - Part II: Mobile sensors

Source Localization by TDOA with Random Sensor Position Errors - Part II: Mobile sensors Source Localzaton by TDOA wth Random Sensor Poston Errors - Part II: Moble sensors Xaome Qu,, Lhua Xe EXOUISITUS, Center for E-Cty, School of Electrcal and Electronc Engneerng, Nanyang Technologcal Unversty,

More information

Optimal Placement of PMU and RTU by Hybrid Genetic Algorithm and Simulated Annealing for Multiarea Power System State Estimation

Optimal Placement of PMU and RTU by Hybrid Genetic Algorithm and Simulated Annealing for Multiarea Power System State Estimation T. Kerdchuen and W. Ongsakul / GMSARN Internatonal Journal (09) - Optmal Placement of and by Hybrd Genetc Algorthm and Smulated Annealng for Multarea Power System State Estmaton Thawatch Kerdchuen and

More information

Uncertainty in measurements of power and energy on power networks

Uncertainty in measurements of power and energy on power networks Uncertanty n measurements of power and energy on power networks E. Manov, N. Kolev Department of Measurement and Instrumentaton, Techncal Unversty Sofa, bul. Klment Ohrdsk No8, bl., 000 Sofa, Bulgara Tel./fax:

More information

Parameter Free Iterative Decoding Metrics for Non-Coherent Orthogonal Modulation

Parameter Free Iterative Decoding Metrics for Non-Coherent Orthogonal Modulation 1 Parameter Free Iteratve Decodng Metrcs for Non-Coherent Orthogonal Modulaton Albert Gullén Fàbregas and Alex Grant Abstract We study decoder metrcs suted for teratve decodng of non-coherently detected

More information

VRT014 User s guide V0.8. Address: Saltoniškių g. 10c, Vilnius LT-08105, Phone: (370-5) , Fax: (370-5) ,

VRT014 User s guide V0.8. Address: Saltoniškių g. 10c, Vilnius LT-08105, Phone: (370-5) , Fax: (370-5) , VRT014 User s gude V0.8 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

Resource Allocation Optimization for Device-to- Device Communication Underlaying Cellular Networks

Resource Allocation Optimization for Device-to- Device Communication Underlaying Cellular Networks Resource Allocaton Optmzaton for Devce-to- Devce Communcaton Underlayng Cellular Networks Bn Wang, L Chen, Xaohang Chen, Xn Zhang, and Dacheng Yang Wreless Theores and Technologes (WT&T) Bejng Unversty

More information

Procedia Computer Science

Procedia Computer Science Proceda Computer Scence 3 (211) 714 72 Proceda Computer Scence (21) Proceda Computer Scence www.elsever.com/locate/proceda www.elsever.com/locate/proceda WCIT-21 Performance evaluaton of data delvery approaches

More information

Utility-based Routing

Utility-based Routing Utlty-based Routng Je Wu Dept. of Computer and Informaton Scences Temple Unversty Roadmap Introducton Why Another Routng Scheme Utlty-Based Routng Implementatons Extensons Some Fnal Thoughts 2 . Introducton

More information

A Multi-Robot System Based on A Hybrid Communication Approach

A Multi-Robot System Based on A Hybrid Communication Approach Studes n Meda and Communcaton Vol. 1, No. 1; June 13 ISSN 35-871 E-ISSN 35-88X Publshed by Redfame Publshng URL: http://smc.redfame.com A Mult-Robot System Based on A Hybrd Communcaton Approach Tngka Wang,

More information

Multi-sensor optimal information fusion Kalman filter with mobile agents in ring sensor networks

Multi-sensor optimal information fusion Kalman filter with mobile agents in ring sensor networks Mult-sensor optmal nformaton fuson Kalman flter wth moble agents n rng sensor networs Behrouz Safarneadan *, Kazem asanpoor ** *Shraz Unversty of echnology, safarnead@sutech.ac.r ** Shraz Unversty of echnology,.hasanpor@gmal.com

More information

Review: Our Approach 2. CSC310 Information Theory

Review: Our Approach 2. CSC310 Information Theory CSC30 Informaton Theory Sam Rowes Lecture 3: Provng the Kraft-McMllan Inequaltes September 8, 6 Revew: Our Approach The study of both compresson and transmsson requres that we abstract data and messages

More information

Medium Access Control for Multi-Channel Parallel Transmission in Cognitive Radio Networks

Medium Access Control for Multi-Channel Parallel Transmission in Cognitive Radio Networks Medum ccess Control for Mult-Channel Parallel Transmsson n Cogntve Rado Networs Tao Shu, Shuguang Cu, and Marwan Krunz Department of Electrcal and Computer Engneerng Unversty of rzona Tucson, Z 85721 {tshu,

More information

MTBF PREDICTION REPORT

MTBF PREDICTION REPORT MTBF PREDICTION REPORT PRODUCT NAME: BLE112-A-V2 Issued date: 01-23-2015 Rev:1.0 Copyrght@2015 Bluegga Technologes. All rghts reserved. 1 MTBF PREDICTION REPORT... 1 PRODUCT NAME: BLE112-A-V2... 1 1.0

More information

Guidelines for CCPR and RMO Bilateral Key Comparisons CCPR Working Group on Key Comparison CCPR-G5 October 10 th, 2014

Guidelines for CCPR and RMO Bilateral Key Comparisons CCPR Working Group on Key Comparison CCPR-G5 October 10 th, 2014 Gudelnes for CCPR and RMO Blateral Key Comparsons CCPR Workng Group on Key Comparson CCPR-G5 October 10 th, 2014 These gudelnes are prepared by CCPR WG-KC and RMO P&R representatves, and approved by CCPR,

More information

熊本大学学術リポジトリ. Kumamoto University Repositor

熊本大学学術リポジトリ. Kumamoto University Repositor 熊本大学学術リポジトリ Kumamoto Unversty Repostor Ttle Wreless LAN Based Indoor Poston and Its Smulaton Author(s) Ktasuka, Teruak; Nakansh, Tsune CtatonIEEE Pacfc RIM Conference on Comm Computers, and Sgnal Processng

More information

Performance Analysis of the Weighted Window CFAR Algorithms

Performance Analysis of the Weighted Window CFAR Algorithms Performance Analyss of the Weghted Wndow CFAR Algorthms eng Xangwe Guan Jan He You Department of Electronc Engneerng, Naval Aeronautcal Engneerng Academy, Er a road 88, Yanta Cty 6400, Shandong Provnce,

More information

Xiuqing Chen 1 *, Tianjie Cao 1 *, Jingxuan Zhai 1, Yu Guo 2 1 School of Computer, China University of Mining and Technology, Xuzhou,

Xiuqing Chen 1 *, Tianjie Cao 1 *, Jingxuan Zhai 1, Yu Guo 2 1 School of Computer, China University of Mining and Technology, Xuzhou, [Type text] [Type text] [Type text] ISSN : 0974-7435 Volume 0 Issue 9 BoTechnology 04 An Indan Journal FULL PAPE BTAIJ, 0(9, 04 [3908-397] Securty lghtweght FID protocol for U- healthcare system Xuqng

More information

A Parallel Task Scheduling Optimization Algorithm Based on Clonal Operator in Green Cloud Computing

A Parallel Task Scheduling Optimization Algorithm Based on Clonal Operator in Green Cloud Computing A Parallel Task Schedulng Optmzaton Algorthm Based on Clonal Operator n Green Cloud Computng Yang Lu, Wanneng Shu, and Chrsh Zhang College of Informaton Scence and Engneerng, Hunan Cty Unversty, Yyang,

More information

Define Y = # of mobiles from M total mobiles that have an adequate link. Measure of average portion of mobiles allocated a link of adequate quality.

Define Y = # of mobiles from M total mobiles that have an adequate link. Measure of average portion of mobiles allocated a link of adequate quality. Wreless Communcatons Technologes 6::559 (Advanced Topcs n Communcatons) Lecture 5 (Aprl th ) and Lecture 6 (May st ) Instructor: Professor Narayan Mandayam Summarzed by: Steve Leung (leungs@ece.rutgers.edu)

More information

Distributed Fault Detection of Wireless Sensor Networks

Distributed Fault Detection of Wireless Sensor Networks Dstrbuted Fault Detecton of Wreless Sensor Networs Jnran Chen, Shubha Kher, and Arun Soman Dependable Computng and Networng Lab Iowa State Unversty Ames, Iowa 50010 {jrchen, shubha, arun}@astate.edu ABSTRACT

More information

NOVEL ITERATIVE TECHNIQUES FOR RADAR TARGET DISCRIMINATION

NOVEL ITERATIVE TECHNIQUES FOR RADAR TARGET DISCRIMINATION NOVEL ITERATIVE TECHNIQUES FOR RADAR TARGET DISCRIMINATION Phaneendra R.Venkata, Nathan A. Goodman Department of Electrcal and Computer Engneerng, Unversty of Arzona, 30 E. Speedway Blvd, Tucson, Arzona

More information

IEE Electronics Letters, vol 34, no 17, August 1998, pp ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES

IEE Electronics Letters, vol 34, no 17, August 1998, pp ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES IEE Electroncs Letters, vol 34, no 17, August 1998, pp. 1622-1624. ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES A. Chatzgeorgou, S. Nkolads 1 and I. Tsoukalas Computer Scence Department, 1 Department

More information

Radial Distribution System Reconfiguration in the Presence of Distributed Generators

Radial Distribution System Reconfiguration in the Presence of Distributed Generators 4th Internatonal Conference on Coputer, Mechatroncs, Control and Electronc Engneerng (ICCMCEE 205) Radal Dstrbuton Syste Reconfguraton n the Presence of Dstrbuted Generators Xngquan J, a, Q Lu, GuoZheng

More information

A Novel DSA-Driven MAC Protocol for Cognitive Radio Networks

A Novel DSA-Driven MAC Protocol for Cognitive Radio Networks Wreless Sensor Networ, 29, 2, 6-2 do:.4236/wsn.29.2 7 Publshed Onlne July 29 (http://www.scrp.org/journal/wsn/). A Novel DSA-Drven MAC Protocol for Cogntve Rado Networs Hua SONG, Xaola LIN School of Informaton

More information

Broadcast Authentication for Wireless Sensor Networks Using Nested Hashing and the Chinese Remainder Theorem

Broadcast Authentication for Wireless Sensor Networks Using Nested Hashing and the Chinese Remainder Theorem Sensors 2010, 10, 8683-8695; do:10.3390/s100908683 OPEN CCESS sensors ISSN 1424-8220 www.mdp.com/ournal/sensors rtcle roadcast uthentcaton for Wreless Sensor Networks Usng Nested Hashng and the Chnese

More information

Throughput Maximization by Adaptive Threshold Adjustment for AMC Systems

Throughput Maximization by Adaptive Threshold Adjustment for AMC Systems APSIPA ASC 2011 X an Throughput Maxmzaton by Adaptve Threshold Adjustment for AMC Systems We-Shun Lao and Hsuan-Jung Su Graduate Insttute of Communcaton Engneerng Department of Electrcal Engneerng Natonal

More information

International Journal of Network Security & Its Application (IJNSA), Vol.2, No.1, January SYSTEL, SUPCOM, Tunisia.

International Journal of Network Security & Its Application (IJNSA), Vol.2, No.1, January SYSTEL, SUPCOM, Tunisia. Internatonal Journal of Network Securty & Its Applcaton (IJNSA), Vol.2, No., January 2 WEAKNESS ON CRYPTOGRAPHIC SCHEMES BASED ON REGULAR LDPC CODES Omessaad Hamd, Manel abdelhed 2, Ammar Bouallegue 2,

More information

Network-Hiding Communication and Applications to Multi-Party Protocols

Network-Hiding Communication and Applications to Multi-Party Protocols Network-Hdng Communcaton and Applcatons to Mult-Party Protocols Martn Hrt 1, Uel Maurer 1, Danel Tschud 1, and Vassls Zkas 2 1 ETH Zurch {hrt, maurer, tschudd}@nf.ethz.ch 2 RPI vzkas@cs.rp.edu Abstract.

More information

Uplink User Selection Scheme for Multiuser MIMO Systems in a Multicell Environment

Uplink User Selection Scheme for Multiuser MIMO Systems in a Multicell Environment Uplnk User Selecton Scheme for Multuser MIMO Systems n a Multcell Envronment Byong Ok Lee School of Electrcal Engneerng and Computer Scence and INMC Seoul Natonal Unversty leebo@moble.snu.ac.kr Oh-Soon

More information

A Preliminary Study on Targets Association Algorithm of Radar and AIS Using BP Neural Network

A Preliminary Study on Targets Association Algorithm of Radar and AIS Using BP Neural Network Avalable onlne at www.scencedrect.com Proceda Engneerng 5 (2 44 445 A Prelmnary Study on Targets Assocaton Algorthm of Radar and AIS Usng BP Neural Networ Hu Xaoru a, Ln Changchuan a a Navgaton Insttute

More information

A High-Speed Multiplication Algorithm Using Modified Partial Product Reduction Tree

A High-Speed Multiplication Algorithm Using Modified Partial Product Reduction Tree World Academy of Scence, Engneerng and Technology Internatonal Journal of Electrcal and Computer Engneerng Vol:4, No:, 200 A Hgh-Speed Multplcaton Algorthm Usng Modfed Partal Product educton Tree P Asadee

More information

An Alternation Diffusion LMS Estimation Strategy over Wireless Sensor Network

An Alternation Diffusion LMS Estimation Strategy over Wireless Sensor Network Progress In Electromagnetcs Research M, Vol. 70, 135 143, 2018 An Alternaton Dffuson LMS Estmaton Strategy over Wreless Sensor Network Ln L * and Donghu L Abstract Ths paper presents a dstrbuted estmaton

More information

Walsh Function Based Synthesis Method of PWM Pattern for Full-Bridge Inverter

Walsh Function Based Synthesis Method of PWM Pattern for Full-Bridge Inverter Walsh Functon Based Synthess Method of PWM Pattern for Full-Brdge Inverter Sej Kondo and Krt Choesa Nagaoka Unversty of Technology 63-, Kamtomoka-cho, Nagaoka 9-, JAPAN Fax: +8-58-7-95, Phone: +8-58-7-957

More information

Strategies for Enhanced Dual Failure Restorability with Static or Reconfigurable p-cycle Networks

Strategies for Enhanced Dual Failure Restorability with Static or Reconfigurable p-cycle Networks Reprnt of paper to appear at the 2004 Internatonal Conference on Communcatons (ICC 2004), Pars, France, June 2004. Strateges for Enhanced Dual Falure Restorablty wth Statc or Reconfgurable p-cycle Networs

More information

Online Reporting. Online Reporting. A step-by-step guide. Important information for churches, schools and organisations

Online Reporting. Online Reporting. A step-by-step guide.   Important information for churches, schools and organisations Onlne Reportng Onlne Reportng A step-by-step gude www.olr.ccl.com Important nformaton for churches, schools and organsatons May 2016 Reportng s a vtal part of beng a lcence holder... Reportng s a requrement

More information

Generalized Incomplete Trojan-Type Designs with Unequal Cell Sizes

Generalized Incomplete Trojan-Type Designs with Unequal Cell Sizes Internatonal Journal of Theoretcal & Appled Scences 6(1): 50-54(2014) ISSN No. (Prnt): 0975-1718 ISSN No. (Onlne): 2249-3247 Generalzed Incomplete Trojan-Type Desgns wth Unequal Cell Szes Cn Varghese,

More information

The Synthesis of Dependable Communication Networks for Automotive Systems

The Synthesis of Dependable Communication Networks for Automotive Systems 06AE-258 The Synthess of Dependable Communcaton Networks for Automotve Systems Copyrght 2005 SAE Internatonal Nagarajan Kandasamy Drexel Unversty, Phladelpha, USA Fad Aloul Amercan Unversty of Sharjah,

More information

The Dynamic Utilization of Substation Measurements to Maintain Power System Observability

The Dynamic Utilization of Substation Measurements to Maintain Power System Observability 1 The Dynamc Utlzaton of Substaton Measurements to Mantan Power System Observablty Y. Wu, Student Member, IEEE, M. Kezunovc, Fellow, IEEE and T. Kostc, Member, IEEE Abstract-- In a power system State Estmator

More information

Adaptive Distributed Topology Control for Wireless Ad-Hoc Sensor Networks

Adaptive Distributed Topology Control for Wireless Ad-Hoc Sensor Networks Adaptve Dstrbuted Topology Control for Wreless Ad-Hoc Sensor Networks Ka-Tng Chu, Chh-Yu Wen, Yen-Cheh Ouyang, and Wllam A. Sethares Abstract Ths paper presents a decentralzed clusterng and gateway selecton

More information

A Lower Bound for τ(n) of Any k-perfect Numbers

A Lower Bound for τ(n) of Any k-perfect Numbers Pure Mathematcal Scences, Vol. 4, 205, no. 3, 99-03 HIKARI Ltd, www.m-har.com http://dx.do.org/0.2988/pms.205.4923 A Lower Bound for τn of Any -Perfect Numbers Keneth Adran P. Dagal Department of Mathematcs

More information

Optimizing a System of Threshold-based Sensors with Application to Biosurveillance

Optimizing a System of Threshold-based Sensors with Application to Biosurveillance Optmzng a System of Threshold-based Sensors wth Applcaton to Bosurvellance Ronald D. Frcker, Jr. Thrd Annual Quanttatve Methods n Defense and Natonal Securty Conference May 28, 2008 What s Bosurvellance?

More information

Modified Predictive Optimal Control Using Neural Network-based Combined Model for Large-Scale Power Plants

Modified Predictive Optimal Control Using Neural Network-based Combined Model for Large-Scale Power Plants 1 Modfed Predctve Optmal Control Usng Neural Networ-based Combned Model for Large-Scale Power Plants Kwang Y Lee, Fellow, IEEE, Jn S Heo, Jason A Hoffman, Sung-Ho Km, and Won-Hee Jung Abstract--Wth a Neural

More information

An Algorithm Forecasting Time Series Using Wavelet

An Algorithm Forecasting Time Series Using Wavelet IJCSI Internatonal Journal of Computer Scence Issues, Vol., Issue, No, January 04 ISSN (Prnt): 94-084 ISSN (Onlne): 94-0784 www.ijcsi.org 0 An Algorthm Forecastng Tme Seres Usng Wavelet Kas Ismal Ibraheem,Eman

More information

communications are increasingly used in a way that they are scrambling and the combination of scrambling frequency and time domain.

communications are increasingly used in a way that they are scrambling and the combination of scrambling frequency and time domain. Journal of Advances n Computer Research Quarterly pissn: 2345-606x eissn: 2345-6078 Sar Branch, Islamc Azad Unversty, Sar, I.R.Iran (Vol. 7, No. 3, August 2016), Pages: 67-76 www.jacr.ausar.ac.r Audo Sgnal

More information

An Energy Efficient Hierarchical Clustering Algorithm for Wireless Sensor Networks

An Energy Efficient Hierarchical Clustering Algorithm for Wireless Sensor Networks An Energy Effcent Herarchcal Clusterng Algorthm for Wreless Sensor Networks Seema Bandyopadhyay and Edward J. Coyle School of Electrcal and Computer Engneerng Purdue Unversty West Lafayette, IN, USA {seema,

More information

An Optimal Model and Solution of Deployment of Airships for High Altitude Platforms

An Optimal Model and Solution of Deployment of Airships for High Altitude Platforms An Optmal Model and Soluton of Deployment of Arshps for Hgh Alttude Platforms Xuyu Wang, Xnbo Gao, Ru Zong, Peng Cheng. VIPS Lab, School of Electronc Engneerng, Xdan Unversty, X an 77, Chna. Department

More information

Inverse Halftoning Method Using Pattern Substitution Based Data Hiding Scheme

Inverse Halftoning Method Using Pattern Substitution Based Data Hiding Scheme Proceedngs of the World Congress on Engneerng 2011 Vol II, July 6-8, 2011, London, U.K. Inverse Halftonng Method Usng Pattern Substtuton Based Data Hdng Scheme Me-Y Wu, Ja-Hong Lee and Hong-Je Wu Abstract

More information

A MODIFIED DIRECTIONAL FREQUENCY REUSE PLAN BASED ON CHANNEL ALTERNATION AND ROTATION

A MODIFIED DIRECTIONAL FREQUENCY REUSE PLAN BASED ON CHANNEL ALTERNATION AND ROTATION A MODIFIED DIRECTIONAL FREQUENCY REUSE PLAN BASED ON CHANNEL ALTERNATION AND ROTATION Vncent A. Nguyen Peng-Jun Wan Ophr Freder Computer Scence Department Illnos Insttute of Technology Chcago, Illnos vnguyen@t.edu,

More information

Digital Transmission

Digital Transmission Dgtal Transmsson Most modern communcaton systems are dgtal, meanng that the transmtted normaton sgnal carres bts and symbols rather than an analog sgnal. The eect o C/N rato ncrease or decrease on dgtal

More information

THE ARCHITECTURE OF THE BROADBAND AMPLIFIERS WITHOUT CLASSICAL STAGES WITH A COMMON BASE AND A COMMON EMITTER

THE ARCHITECTURE OF THE BROADBAND AMPLIFIERS WITHOUT CLASSICAL STAGES WITH A COMMON BASE AND A COMMON EMITTER VOL. 0, NO. 8, OCTOBE 205 ISSN 89-6608 2006-205 Asan esearch Publshng Network (APN. All rghts reserved. THE ACHITECTUE OF THE BOADBAND AMPLIFIES WITHOUT CLASSICAL STAGES WITH A COMMON BASE AND A COMMON

More information

Queuing-Based Dynamic Channel Selection for Heterogeneous Multimedia Applications over Cognitive Radio Networks

Queuing-Based Dynamic Channel Selection for Heterogeneous Multimedia Applications over Cognitive Radio Networks 1 Queung-Based Dynamc Channel Selecton for Heterogeneous ultmeda Applcatons over Cogntve Rado Networks Hsen-Po Shang and haela van der Schaar Department of Electrcal Engneerng (EE), Unversty of Calforna

More information

EPAS: Efficient Privacy-preserving Authentication Scheme for VANETs-based Emergency Communication

EPAS: Efficient Privacy-preserving Authentication Scheme for VANETs-based Emergency Communication 94 JOURNAL OF SOFTWARE, VOL. 8, NO. 8, AUGUST 03 EPAS: Effcent Prvacy-preservng Authentcaton Scheme for VANETs-based Emergency Communcaton Xuedan Ja School of Computer Scence and Telecommuncaton Engneerng,

More information

A NSGA-II algorithm to solve a bi-objective optimization of the redundancy allocation problem for series-parallel systems

A NSGA-II algorithm to solve a bi-objective optimization of the redundancy allocation problem for series-parallel systems 0 nd Internatonal Conference on Industral Technology and Management (ICITM 0) IPCSIT vol. 49 (0) (0) IACSIT Press, Sngapore DOI: 0.776/IPCSIT.0.V49.8 A NSGA-II algorthm to solve a b-obectve optmzaton of

More information

Chapter 2 Basics of Efficient Secure Function Evaluation

Chapter 2 Basics of Efficient Secure Function Evaluation Chapter 2 Bascs of Effcent Secure Functon Evaluaton 2.1 Common Notaton and Defntons In ths secton we ntroduce common notaton (Sect. 2.1.1), cryptographc prmtves (Sect. 2.1.2), functon representatons (Sect.

More information

Research Article A Utility-Based Rate Allocation of M2M Service in Heterogeneous Wireless Environments

Research Article A Utility-Based Rate Allocation of M2M Service in Heterogeneous Wireless Environments Internatonal Dstrbuted Sensor etworks Volume 3, Artcle ID 3847, 7 pages http://dx.do.org/.55/3/3847 Research Artcle A Utlty-Based Rate Allocaton of MM Servce n Heterogeneous Wreless Envronments Yao Huang,

More information

A MODIFIED DIFFERENTIAL EVOLUTION ALGORITHM IN SPARSE LINEAR ANTENNA ARRAY SYNTHESIS

A MODIFIED DIFFERENTIAL EVOLUTION ALGORITHM IN SPARSE LINEAR ANTENNA ARRAY SYNTHESIS A MODIFIED DIFFERENTIAL EVOLUTION ALORITHM IN SPARSE LINEAR ANTENNA ARRAY SYNTHESIS Kaml Dmller Department of Electrcal-Electroncs Engneerng rne Amercan Unversty North Cyprus, Mersn TURKEY kdmller@gau.edu.tr

More information

Figure.1. Basic model of an impedance source converter JCHPS Special Issue 12: August Page 13

Figure.1. Basic model of an impedance source converter JCHPS Special Issue 12: August Page 13 A Hgh Gan DC - DC Converter wth Soft Swtchng and Power actor Correcton for Renewable Energy Applcaton T. Selvakumaran* and. Svachdambaranathan Department of EEE, Sathyabama Unversty, Chenna, Inda. *Correspondng

More information

Ergodic Capacity of Block-Fading Gaussian Broadcast and Multi-access Channels for Single-User-Selection and Constant-Power

Ergodic Capacity of Block-Fading Gaussian Broadcast and Multi-access Channels for Single-User-Selection and Constant-Power 7th European Sgnal Processng Conference EUSIPCO 29 Glasgow, Scotland, August 24-28, 29 Ergodc Capacty of Block-Fadng Gaussan Broadcast and Mult-access Channels for Sngle-User-Selecton and Constant-Power

More information

Defense Against Selfish PUEA in Cognitive Radio Networks Based on Hash Message Authentication Code

Defense Against Selfish PUEA in Cognitive Radio Networks Based on Hash Message Authentication Code Internatonal Journal of Electroncs and Informaton Engneerng, Vol.4, No.1, PP.12-21, Mar. 2016 12 Defense Aganst Selfsh PUEA n Cogntve Rado Networks Based on Hash Message Authentcaton Code Wald Ramadan

More information

Research on Controller of Micro-hydro Power System Nan XIE 1,a, Dezhi QI 2,b,Weimin CHEN 2,c, Wei WANG 2,d

Research on Controller of Micro-hydro Power System Nan XIE 1,a, Dezhi QI 2,b,Weimin CHEN 2,c, Wei WANG 2,d Advanced Materals Research Submtted: 2014-05-13 ISSN: 1662-8985, Vols. 986-987, pp 1121-1124 Accepted: 2014-05-19 do:10.4028/www.scentfc.net/amr.986-987.1121 Onlne: 2014-07-18 2014 Trans Tech Publcatons,

More information

Ad hoc Service Grid A Self-Organizing Infrastructure for Mobile Commerce

Ad hoc Service Grid A Self-Organizing Infrastructure for Mobile Commerce Ad hoc Servce Grd A Self-Organzng Infrastructure for Moble Commerce Klaus Herrmann, Kurt Gehs, Gero Mühl Berln Unversty of Technology Emal: klaus.herrmann@acm.org Web: http://www.vs.tu-berln.de/herrmann/

More information

A Fuzzy-based Routing Strategy for Multihop Cognitive Radio Networks

A Fuzzy-based Routing Strategy for Multihop Cognitive Radio Networks 74 Internatonal Journal of Communcaton Networks and Informaton Securty (IJCNIS) Vol. 3, No., Aprl 0 A Fuzzy-based Routng Strategy for Multhop Cogntve Rado Networks Al El Masr, Naceur Malouch and Hcham

More information