Reducing the Cost of Security in Link-State Routing R. Hauser A. Przygienda G. Tsudik McKinsey Consulting Fore Systems USC-ISI Zurich, Switzerland Bet
|
|
- Augusta Daniel
- 5 years ago
- Views:
Transcription
1 Reducing the Cost of Security in Link-State Routing R. Hauser A. Przygienda G. Tsudik McKinsey Consulting Fore Systems USC-ISI Zurich, Switzerland Bethesda, MD Marina Del Rey, CA ISOC Symposium on Network and Distributed System Security, Feb 10-11, 1996, San Diego, CA 1
2 Ford/Fulkerson's Max Flow,! Distance Vector,! How to minimize the cost of security in Link State Routing? Introduction Routing Protocols: e.g., OSPF, IDPR, ATM-PNNI Dijkstra's Shortest Path,! Link State, e.g., RIP, BGP, IDRP Focus of this work: 2
3 Link State Security Link State (LS) Security Requirements: 1. Origin Authentication 2. Non-repudiation 3. Data integrity 4. Timeliness and Ordering Building Blocks: Public key-based digital signatures (RSA, DSS, El Gamal, Schnorr, etc.) (Conjectured/alleged) one-way hash functions (MD5, 8-pass SNEFRU, SHA, etc.) Hash chain constructs (e.g., S/KEY one-time authentication, micro-payments, etc.) 3
4 H 1 (R),..., H i (R),... H n (R) Hash Chains Example: 1. Alice generates a secret R 2. Computes a hash chain of length n: where H 0 (R) =Rand H i (R) =H(H i,1 (R)) for 0 <i<n 3. Initially, Bob receives H n (R) 4. Alice releases H n,1 (R) 5. Bob checks that H(H n,1 (R)) matches H n (R). Last two steps can be repeated n, 1 times 4
5 2. Chained LSU { CLSU i Stable Link State { SLS Observation A large percentage (50%, by some estimates) of LSU-s are simply re-statements of previous LSU-s, i.e., an LSU often carries no new information other than its timing since links and nodes go up and down infrequently. LSU types: 1. Anchor LSU { ALSU generated whenever a link state change occurs or the current hash chain is depleted. Signed, sequenced, timestamped. Contains: H n (R); T 0 ; n; flinksg; SIG generated periodically or upon explicit request Unsigned, sequenced, timestamped. Contains: H n,i (R); T i ; i 5
6 SLS contd. Issues: Missing CLSU-s? Storage Requirements? Only eective in STABLE routing environments! 6
7 [nodeid; T n ; H n (R 1 ); G n (R 1 ); :::; H n (R j ); G n (R j ); :::; H n (R k ); G n (R k )] SK Fluctuating Link State { FLS Observation The state of a link is (typically) a binary value. Each node generates (n k s) hash chains n - chain length k - # of incident links s - # of possible link states (typically 2: UP and DOW N) All R j (1 j k) must be random and unique, ALSU contains: 7
8 Hash Table 1... L j... L k L down... up down... up down up 1 H 1 (R 1 ) G 1 (R 1 )... H 1 (R j ) G 1 (R j )... H 1 (R k ) G 1 (R k ) i H i (R 1 ) G i (R 1 )... H i (R j ) G i (R j )... H i (R k ) G i (R k ) n H n (R 1 ) G n (R 1 )... H n (R j ) G n (R j )... H n (R k ) G n (R k ) 8
9 8 >< >: 8 >< >: H n,i (R j ) if LF i (j) =1 G n,i (R j ) if LF i (j) =0 CLSU Construction For each link L j ; (1 j k) and for each CLSU i, (1 i< n)link state ags (LSF i ) is dened as: LSF i =[LF i (1); :::; LF i (k)] where: 1 if L j is UP LF i (j) = 0 if L j is DOWN For each link L j ; (1 j k) and for each CLSU i, (1 i< n)link state vector (LSV i ) is dened as: LSV i =[LS i (1); :::; LS i (k)] where: LS i (j) = CLSU i contains: [nodeid; i; T i ;LSF i ;LSV i ] 9
10 G i,p (LS i (j)) if LF i (j) =0 H i,p (LS i (j)) if LF i (j) =1 G i (G n,i (R j )) if LF i (j) =0 H i (H n,i (R j )) if LF i (j) =1 CLSU Processing 1. Looks up the current entry for nodeid 2. Validates T i and i: Checks that T i is valid (reasonably close to current time), i>pand T i >T p (last stored timestamp from CLSU p.) 3. For each link L j reected in CLSU i (0 <j<k): a) if L j 's state is unchanged (LF i (j) =LF p (j)), compute: and compare to LS p (j); reject upon mismatch. b) if L j 's state has changed (LF i (j) 6= LF p (j)), compute: and compare to LS n (j); reject upon mismatch. Replace LSV p with LSV i. 10
11 4. Loose clock synchronization: maximum skew =(2t) Analysis Security (both SLS and FLS): 1. Strength of the underlying signature function (wrt ALSUs) 2. Strength of the underlying hash function (wrt CLSUs) 3. Randomness of the starting values Limitations: Very frequent state oscillations Clock synchronization impossible Multiple-valued (or continuous) link state 11
12 Conclusions Related Work: [MB-96 ] S. Murphy and M. Badger, Digital Signature Protection of the OSPF Routing Protocol, 1996 Symposium on Network and Distributed Systems Security (SNDSS'96), February [P-88 ] R. Perlman, Network Layer Protocols with Byzantine Robustness, Ph.D. Dissertation, MIT LCS TR-429, October Future Work: Experimental Results (OSPF) SLS/FLS Hybrid Other Constructs? 12
Introduction to OSPF. ISP Workshops. Last updated 11 November 2013
Introduction to OSPF ISP Workshops Last updated 11 November 2013 1 OSPF p Open Shortest Path First p Open: n Meaning an Open Standard n Developed by IETF (OSPF Working Group) for IP RFC1247 n Current standard
More informationOSPF Fundamentals. Agenda. OSPF Principles. L41 - OSPF Fundamentals. Open Shortest Path First Routing Protocol Internet s Second IGP
OSPF Fundamentals Open Shortest Path First Routing Protocol Internet s Second IGP Agenda OSPF Principles Introduction The Dijkstra Algorithm Communication Procedures LSA Broadcast Handling Splitted Area
More informationOSPF - Open Shortest Path First. OSPF Fundamentals. Agenda. OSPF Topology Database
OSPF - Open Shortest Path First OSPF Fundamentals Open Shortest Path First Routing Protocol Internet s Second IGP distance vector protocols like RIP have several dramatic disadvantages: slow adaptation
More informationCSE/EE 461. Link State Routing. Last Time. This Lecture. Routing Algorithms Introduction Distance Vector routing (RIP)
CSE/EE 46 Link State Routing Last Time Routing Algorithms Introduction Distance Vector routing (RIP) Application Presentation Session Transport Network Data Link Physical This Lecture Routing Algorithms
More informationLink-state protocols and Open Shortest Path First (OSPF)
Fixed Internetworking Protocols and Networks Link-state protocols and Open Shortest Path First (OSPF) Rune Hylsberg Jacobsen Aarhus School of Engineering rhj@iha.dk 0 ITIFN Objectives Describe the basic
More informationLink State Routing. In particular OSPF. dr. C. P. J. Koymans. Informatics Institute University of Amsterdam. March 4, 2008
Link State Routing In particular OSPF dr. C. P. J. Koymans Informatics Institute University of Amsterdam March 4, 2008 dr. C. P. J. Koymans (UvA) Link State Routing March 4, 2008 1 / 70 1 Link State Protocols
More informationLink State Routing. In particular OSPF. Karst Koymans. Informatics Institute University of Amsterdam. (version 16.3, 2017/03/09 11:25:31)
Link State Routing In particular OSPF Karst Koymans Informatics Institute University of Amsterdam (version 16.3, 2017/03/09 11:25:31) Tuesday, March 7, 2017 Karst Koymans (UvA) Link State Routing Tuesday,
More informationLink State Routing. In particular OSPF. Karst Koymans. Informatics Institute University of Amsterdam. (version 17.4, 2017/11/30 12:33:57)
Link State Routing In particular OSPF Karst Koymans Informatics Institute University of Amsterdam (version 17.4, 2017/11/30 12:33:57) Tuesday, November 28, 2017 Karst Koymans (UvA) Link State Routing Tuesday,
More informationSecure Ad-Hoc Routing Protocols
Secure Ad-Hoc Routing Protocols ARIADNE (A secure on demand RoutIng protocol for Ad-Hoc Networks & TESLA ARAN (A Routing protocol for Ad-hoc Networks SEAD (Secure Efficient Distance Vector Routing Protocol
More informationSecurity in Sensor Networks. Written by: Prof. Srdjan Capkun & Others Presented By : Siddharth Malhotra Mentor: Roland Flury
Security in Sensor Networks Written by: Prof. Srdjan Capkun & Others Presented By : Siddharth Malhotra Mentor: Roland Flury Mobile Ad-hoc Networks (MANET) Mobile Random and perhaps constantly changing
More informationCS 457 Lecture 16 Routing Continued. Spring 2010
CS 457 Lecture 16 Routing Continued Spring 2010 Scaling Link-State Routing Overhead of link-state routing Flooding link-state packets throughout the network Running Dijkstra s shortest-path algorithm Introducing
More informationConfiguring the maximum number of external LSAs in LSDB 27 Configuring OSPF exit overflow interval 28 Enabling compatibility with RFC Logging
Contents Configuring OSPF 1 Overview 1 OSPF packets 1 LSA types 1 OSPF areas 2 Router types 4 Route types 5 Route calculation 6 OSPF network types 6 DR and BDR 6 Protocols and standards 8 OSPF configuration
More informationLecture 8 Link-State Routing
6998-02: Internet Routing Lecture 8 Link-State Routing John Ioannidis AT&T Labs Research ji+ir@cs.columbia.edu Copyright 2002 by John Ioannidis. All Rights Reserved. Announcements Lectures 1-5, 7-8 are
More informationBitcoin and Blockchain for Pythoneers
Bitcoin and Blockchain for Pythoneers EuroPython 2017 Benno Luthiger 10.07.2017 1 Why Bitcoin? Crypto currency fast reliable without central authority The Blockchain is a distributed ledger (peer to peer).
More informationLink State Routing. Brad Karp UCL Computer Science. CS 3035/GZ01 3 rd December 2013
Link State Routing Brad Karp UCL Computer Science CS 33/GZ 3 rd December 3 Outline Link State Approach to Routing Finding Links: Hello Protocol Building a Map: Flooding Protocol Healing after Partitions:
More informationC Commands. Send comments to
This chapter describes the Cisco NX-OS Open Shortest Path First (OSPF) commands that begin with C. UCR-583 clear ip ospf neighbor clear ip ospf neighbor To clear neighbor statistics and reset adjacencies
More informationTable of Contents. OSPF Configuration 1
Table of Contents OSPF Configuration 1 Introduction to OSPF 1 Basic Concepts 2 Area Based OSPF Network Partition 3 Router Types 7 Classification of OSPF Networks 9 DR and BDR 9 OSPF Packet Formats 11 Supported
More informationInterlayer routing issues for wireless networks
NRL Cross-Layer Workshop Interlayer routing issues for wireless networks June 2, 2004 Tom Henderson Marcelo Albuquerque Phil Spagnolo Jae H. Kim Boeing Phantom Works 1 Report Documentation Page Form Approved
More informationWireless Network Security Spring 2014
Wireless Network Security 14-814 Spring 2014 Patrick Tague Class #5 Jamming 2014 Patrick Tague 1 Travel to Pgh: Announcements I'll be on the other side of the camera on Feb 4 Let me know if you'd like
More informationEnergy Saving Routing Strategies in IP Networks
Energy Saving Routing Strategies in IP Networks M. Polverini; M. Listanti DIET Department - University of Roma Sapienza, Via Eudossiana 8, 84 Roma, Italy 2 june 24 [scale=.8]figure/logo.eps M. Polverini
More informationOSPF for IPv6. ISP Workshops
OSPF for IPv6 ISP Workshops These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/) Last updated 17
More informationA Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks
A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks Elisabeth M. Royer, Chai-Keong Toh IEEE Personal Communications, April 1999 Presented by Hannu Vilpponen 1(15) Hannu_Vilpponen.PPT
More informationLink State Routing. Link state routing principles Dijkstra s shortest-path-first algorithm The OSPF protocol. (Chapter 6 in Huitema) E7310/Comnet 1
Link State Routing Link state routing principles Dijkstra s shortest-path-first algorithm The OSPF protocol (Chapter 6 in Huitema) 7310/Comnet 1 Link State Routing Principles 7310/Comnet 2 Link state routing
More informationA Comparative Study of Quality of Service Routing Schemes That Tolerate Imprecise State Information
A Comparative Study of Quality of Service Routing Schemes That Tolerate Imprecise State Information Xin Yuan Wei Zheng Department of Computer Science, Florida State University, Tallahassee, FL 330 {xyuan,zheng}@cs.fsu.edu
More informationScalable Routing Protocols for Mobile Ad Hoc Networks
Helsinki University of Technology T-79.300 Postgraduate Course in Theoretical Computer Science Scalable Routing Protocols for Mobile Ad Hoc Networks Hafeth Hourani hafeth.hourani@nokia.com Contents Overview
More informationROUTING PROTOCOLS. Dr. Ahmed Khattab. EECE Department Cairo University Fall 2012 ELC 659/ELC724
ROUTING PROTOCOLS Dr. Ahmed Khattab EECE Department Cairo University Fall 2012 ELC 659/ELC724 Dr. Ahmed Khattab Fall 2012 2 Routing Network-wide process the determine the end to end paths that packets
More informationSignatures for Network Coding
Conference on Random network codes and Designs over F q Signatures for Network Coding Oliver Gnilke, Claude-Shannon-Institute, University College Dublin 18. September 2013 1 / 14 Network Coding Signature
More informationSSL Time-Diagram. First Variant: Generation of a Temporary 512-bit RSA Key
http://www.tech-invite.com SSL Time-Diagram This document provides a detailed description of the sequence of first exchanges between an SSL and an SSL. This is the first variant to the main scenario described
More informationA Blueprint for Civil GPS Navigation Message Authentication
A Blueprint for Civil GPS Navigation Message Authentication Andrew Kerns, Kyle Wesson, and Todd Humphreys Radionavigation Laboratory University of Texas at Austin Applied Research Laboratories University
More informationDesign and implementation of LDPC decoder using time domain-ams processing
2015; 1(7): 271-276 ISSN Print: 2394-7500 ISSN Online: 2394-5869 Impact Factor: 5.2 IJAR 2015; 1(7): 271-276 www.allresearchjournal.com Received: 31-04-2015 Accepted: 01-06-2015 Shirisha S M Tech VLSI
More informationGuide to OSPF Application on the CSS 11000
Guide to OSPF Application on the CSS 11000 Document ID: 12638 Contents Introduction Before You Begin Conventions Prerequisites Components Used Description OSPF Configuration Task List Configuration Global
More informationImplementation and Performance Testing of the SQUASH RFID Authentication Protocol
Implementation and Performance Testing of the SQUASH RFID Authentication Protocol Philip Koshy, Justin Valentin and Xiaowen Zhang * Department of Computer Science College of n Island n Island, New York,
More informationOSPF and MANET WG meetings, IETF64. OSPF MANET Design Team outbrief. November, Tom Henderson
OSPF and MANET WG meetings, IETF64 OSPF MANET Design Team outbrief November, 2005 Tom Henderson {thomas.r.henderson@boeing.com} Design team members: Emmanuel Baccelli, Madhavi Chandra, Thomas Clausen,
More informationLink State Routing. Stefano Vissicchio UCL Computer Science CS 3035/GZ01
Link State Routing Stefano Vissicchio UCL Computer Science CS 335/GZ Reminder: Intra-domain Routing Problem Shortest paths problem: What path between two vertices offers minimal sum of edge weights? Classic
More informationJunos Intermediate Routing
Junos Intermediate Routing Chapter 4: Open Shortest Path First 2012 Juniper Networks, Inc. All rights reserved. www.juniper.net Worldwide Education Services Chapter Objectives After successfully completing
More informationOSPF Domain / OSPF Area. OSPF Advanced Topics. OSPF Domain / OSPF Area. Agenda
OSPF Domain / OSPF Area OSPF Advanced Topics Areas,, Backbone, Summary-LSA, ASBR, Stub Area, Route Summarization, Virtual Links, Header Details OSPF domain can be divided in multiple OSPF areas to improve
More informationRobust Key Establishment in Sensor Networks
Robust Key Establishment in Sensor Networks Yongge Wang Abstract Secure communication guaranteeing reliability, authenticity, and privacy in sensor networks with active adversaries is a challenging research
More informationSecret Key Extraction in MIMO like Sensor Networks Using Wireless Signal Strength
Secret Key Extraction in MIMO like Sensor Networks Using Wireless Signal Strength Sriram Nandha Premnath Academic Advisors: Sneha K. Kasera, Neal Patwari nandha@cs.utah.edu, kasera@cs.utah.edu, npatwari@ece.utah.edu
More informationPractical Experiences with NFC Security on mobile Phones
Practical Experiences with NFC Security on mobile Phones Gauthier Van Damme Karel Wouters Katholieke Universiteit Leuven ESAT/SCD/IBBT-COSIC Workshop on RFID Security, 2009 ESAT/SCD/IBBT-COSIC (KUL) Practical
More informationComputer Networks II
ipartimento di Informatica e Sistemistica omputer Networks II Routing protocols Overview Luca Becchetti Luca.Becchetti@dis.uniroma.it.. 2009/200 Goals escribe approaches and give overview of mechanisms
More information4. Design Principles of Block Ciphers and Differential Attacks
4. Design Principles of Block Ciphers and Differential Attacks Nonli near 28-bits Trans forma tion 28-bits Model of Block Ciphers @G. Gong A. Introduction to Block Ciphers A Block Cipher Algorithm: E and
More informationConfiguring OSPF. The Cisco OSPF Implementation
Configuring OSPF This chapter describes how to configure Open Shortest Path First (OSPF). For a complete description of the OSPF commands in this chapter, refer to the OSPF s chapter of the Cisco IOS IP
More informationWatermarking-based Image Authentication with Recovery Capability using Halftoning and IWT
Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT Luis Rosales-Roldan, Manuel Cedillo-Hernández, Mariko Nakano-Miyatake, Héctor Pérez-Meana Postgraduate Section,
More informationDiffie-Hellman key-exchange protocol
Diffie-Hellman key-exchange protocol This protocol allows two users to choose a common secret key, for DES or AES, say, while communicating over an insecure channel (with eavesdroppers). The two users
More informationWave Pipelined Circuit with Self Tuning for Clock Skew and Clock Period Using BIST Approach
Technology Volume 1, Issue 1, July-September, 2013, pp. 41-46, IASTER 2013 www.iaster.com, Online: 2347-6109, Print: 2348-0017 Wave Pipelined Circuit with Self Tuning for Clock Skew and Clock Period Using
More informationChapter 10 Mobile Communication Systems
Chapter 10 Mobile Communication Systems Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Outline Cellular System Infrastructure Registration Handoff Parameters and Underlying
More informationAd Hoc Networks - Routing and Security Issues
Ad Hoc Networks - Routing and Security Issues Mahalingam Ramkumar Mississippi State University, MS January 25, 2005 1 2 Some Basic Terms Basic Terms Ad Hoc vs Infrastructured AHN MANET (Mobile Ad hoc NETwork)
More informationhttp://www.expertnetworkconsultant.com/configuring/ospf-neighbor-adjacency/ Brought to you by Expert Network Consultant.com OSPF Neighbor Adjacency Once upon a time, we walked together holding hands, we
More informationDTTF/NB479: Dszquphsbqiz Day 30
DTTF/NB479: Dszquphsbqiz Day 30 Announcements: Questions? This week: Digital signatures, DSA Coin flipping over the phone RSA Signatures allow you to recover the message from the signature; ElGamal signatures
More informationQuestion No: 2 In an OSPF Hello packet, which of the following fields must match for all neighbor routers on the segment? Choose three answers.
Volume: 335 Questions Question No: 1 What is the default preference value for a static route in the Alcatel-Lucent 7750 SR? A. 0 B. 5 C. 10 D. 15 Answer: B Question No: 2 In an OSPF Hello packet, which
More informationBabel A flexible routing protocol
Babel A flexible routing protocol Juliusz Chroboczek PPS Université Paris-Diderot (Paris 7) 11 March 2014 1/33 The story In December 2006, I started on a quest to bring wifi to the Ph.D. students couch:
More informationNetwork Working Group Request for Comments: Category: Standards Track A. Zinin Alcatel-Lucent R. Coltun Acoustra Productions July 2008
Network Working Group Request for Comments: 5250 Obsoletes: 2370 Category: Standards Track L. Berger LabN I. Bryskin Adva A. Zinin Alcatel-Lucent R. Coltun Acoustra Productions July 2008 The OSPF Opaque
More informationCS649 Sensor Networks IP Lecture 9: Synchronization
CS649 Sensor Networks IP Lecture 9: Synchronization I-Jeng Wang http://hinrg.cs.jhu.edu/wsn06/ Spring 2006 CS 649 1 Outline Description of the problem: axes, shortcomings Reference-Broadcast Synchronization
More informationConfiguring OSPF. Information About OSPF CHAPTER
CHAPTER 22 This chapter describes how to configure the ASASM to route data, perform authentication, and redistribute routing information using the Open Shortest Path First (OSPF) routing protocol. The
More informationUTILIZATION OF AN IEEE 1588 TIMING REFERENCE SOURCE IN THE inet RF TRANSCEIVER
UTILIZATION OF AN IEEE 1588 TIMING REFERENCE SOURCE IN THE inet RF TRANSCEIVER Dr. Cheng Lu, Chief Communications System Engineer John Roach, Vice President, Network Products Division Dr. George Sasvari,
More informationKillTest *KIJGT 3WCNKV[ $GVVGT 5GTXKEG Q&A NZZV ]]] QORRZKYZ IUS =K ULLKX LXKK [VJGZK YKX\OIK LUX UTK _KGX
KillTest Q&A Exam : JN0-643 Title : Enterprise Routing and Switching, Professional (JNCIP-ENT) Version : Demo 1 / 10 1.Which connection method do OSPF routers use to communicate with each other? A. IP
More informationGen-Adler: The Generalized Adler's Equation for Injection Locking Analysis in Oscillators
Gen-Adler: The Generalized Adler's Equation for Injection Locking Analysis in Oscillators Prateek Bhansali, Jaijeet Roychowdhury University of Minnesota, USA Slide 1 Outline Introduction Previous work
More informationOSPF Nonstop Routing. Finding Feature Information. Prerequisites for OSPF NSR
The feature allows a device with redundant Route Processors (RPs) to maintain its Open Shortest Path First (OSPF) state and adjacencies across planned and unplanned RP switchovers. The OSPF state is maintained
More informationIntroduction to Cryptography CS 355
Introduction to Cryptography CS 355 Lecture 25 Mental Poker And Semantic Security CS 355 Fall 2005 / Lecture 25 1 Lecture Outline Review of number theory The Mental Poker Protocol Semantic security Semantic
More informationaccurate as possible, the enclosed material is presented on an as is basis. Neither the authors nor
OSPF Disclaimer This Configuration Guide is designed to assist members to enhance their skills in particular technology area. While every effort has been made to ensure that all material is as complete
More informationRouting and Wavelength Assignment in All-Optical DWDM Transport Networks with Sparse Wavelength Conversion Capabilities. Ala I. Al-Fuqaha, Ph.D.
Routing and Wavelength Assignment in All-Optical DWDM Transport Networks with Sparse Wavelength Conversion Capabilities Ala I. Al-Fuqaha, Ph.D. Overview Transport Network Architectures: Current Vs. IP
More informationPreservation of Records Entrusted to the Cloud Perspectives of the InterPARES Trust Project
Preservation of Records Entrusted to the Cloud Perspectives of the InterPARES Trust Project Ph.D. Hrvoje Stančić, assoc. prof. Director Team Europe, InterPARES Trust Department of Information and Communication
More informationPrinciples of Ad Hoc Networking
Principles of Ad Hoc Networking Michel Barbeau and Evangelos Kranakis November 12, 2007 Wireless security challenges Network type Wireless Mobility Ad hoc Sensor Challenge Open medium Handover implies
More informationCryptology and Graph Theory
Cryptology and Graph Theory Jean-Jacques Quisquater jjq@dice.ucl.ac.be November 16, 2005 http://www.uclcrypto.org Mierlo, Netherlands Warning: Audience may be addicted by Powerpoint. Use with moderation.
More informationCS/EE Homework 9 Solutions
S/EE 260 - Homework 9 Solutions ue 4/6/2000 1. onsider the synchronous ripple carry counter on page 5-8 of the notes. Assume that the flip flops have a setup time requirement of 2 ns and that the gates
More informationA HYBRID GENETIC ALGORITHM FOR THE WEIGHT SETTING PROBLEM IN OSPF/IS-IS ROUTING
A HYBRID GENETIC ALGORITHM FOR THE WEIGHT SETTING PROBLEM IN OSPF/IS-IS ROUTING L.S. BURIOL, M.G.C. RESENDE, C.C. RIBEIRO, AND M. THORUP Abstract. Intra-domain traffic engineering aims to make more efficient
More informationClock Synchronization
Clock Synchronization Chapter 9 d Hoc and Sensor Networks Roger Wattenhofer 9/1 coustic Detection (Shooter Detection) Sound travels much slower than radio signal (331 m/s) This allows for quite accurate
More informationJamming-resistant Key Establishment using Uncoordinated Frequency Hopping
Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping Mario Strasser Computer Eng. and Networks Laboratory ETH Zurich, Switzerland strasser@tik.ee.ethz.ch Srdjan Čapkun Department of
More informationWIRELESS physical layer security is becoming increasingly
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 11, NO. 7, JULY 2016 1515 Mimicry Attacks Against Wireless Link Signature and New Defense Using Time-Synched Link Signature Song Fang, Yao
More informationCONTENTS Sl. No. Experiment Page No
CONTENTS Sl. No. Experiment Page No 1a Given a 4-variable logic expression, simplify it using Entered Variable Map and realize the simplified logic expression using 8:1 multiplexer IC. 2a 3a 4a 5a 6a 1b
More informationIntroduction to Local and Wide Area Networks
Introduction to Local and Wide Area Networks Lecturers Amnach Khawne Jirasak Sittigorn Chapter 1 1 Routing Protocols and Concepts Chapter 10 : Link-State Routing Protocols Chapter 11 : OSPF Chapter 1 2
More informationEcient Multichip Partial Concentrator Switches. Thomas H. Cormen. Laboratory for Computer Science. Massachusetts Institute of Technology
Ecient Multichip Partial Concentrator Switches Thomas H. Cormen Laboratory for Computer Science Massachusetts Institute of Technology Cambridge, Massachusetts 02139 Abstract Due to chip area and pin count
More informationRX1032 PRECISION TEMPERATURE MEASUREMENTS FOR RUGGED ENVIRONMENTS FEATURES. 32-Channel Thermocouple Measurement System
WWW.VTIINSTRUMENTS.COM RX1032 PRECISION TEMPERATURE MEASUREMENTS FOR RUGGED ENVIRONMENTS FEATURES 32-Channel Thermocouple Measurement System Advanced CJC Implementation 1000 Sample/sec/channel Scan Rate
More informationOSPF Enhanced Traffic Statistics for OSPFv2 and OSPFv3
OSPF Enhanced Traffic Statistics for OSPFv2 and OSPFv3 This document describes new and modified commands that provide enhanced OSPF traffic statistics for OSPFv2 and OSPFv3. The ability to collect and
More informationJamming-resistant Broadcast Communication without Shared Keys
1/18 Jamming-resistant Broadcast Communication without Shared Keys Christina Pöpper Joint work with Mario Strasser and Srdjan Čapkun System Security Group ETH Zürich August 2009 Broadcast Communication
More informationBitcoin: Synchronization and Sharing of Transactions
Bitcoin: Synchronization and Sharing of Transactions Roger Wattenhofer ETH Zurich Distributed Computing Group www.disco.ethz.ch 1200 Exchange Rate USD/BTC 1000 Price [USD/BTC] 800 600 400 200 0 2010 2011
More informationComputer Generated Hologram for SemiFragile Watermarking with Encrypted Images
Computer Generated Hologram for SemiFragile Watermarking with Encrypted Images G. Schirripa Spagnolo, M. De Santis Abstract The protection of the contents of digital products is referred to as content
More informationV.S.B. ENGINEERING COLLEGE, KARUR. Department of Computer Science and Engineering
V.S.B. ENGINEERING COLLEGE, KARUR. Department of and Details of Faculty Paper Publications in National and International Journals Academic Year : 2016-2017 International Journals : Sl. Name of the Title
More informationLecture 7: Components of Phase Locked Loop (PLL)
Lecture 7: Components of Phase Locked Loop (PLL) CSCE 6933/5933 Instructor: Saraju P. Mohanty, Ph. D. NOTE: The figures, text etc included in slides are borrowed from various books, websites, authors pages,
More informationA Cryptosystem Based on the Composition of Reversible Cellular Automata
A Cryptosystem Based on the Composition of Reversible Cellular Automata Adam Clarridge and Kai Salomaa Technical Report No. 2008-549 Queen s University, Kingston, Canada {adam, ksalomaa}@cs.queensu.ca
More informationOSPF Sham-Link MIB Support
This feature introduces MIB support for the OSPF Sham-Link feature through the addition of new tables and trap MIB objects to the Cisco OSPF MIB (CISCO-OSPF-MIB) and the Cisco OSPF Trap MIB (CISCO-OSPF-TRAP-MIB).
More informationIncreasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn
Increasing Broadcast Reliability for Vehicular Ad Hoc Networks Nathan Balon and Jinhua Guo University of Michigan - Dearborn I n t r o d u c t i o n General Information on VANETs Background on 802.11 Background
More informationMonte-Carlo Localization for Mobile Wireless Sensor Networks
Monte-Carlo Localization for Mobile Wireless Sensor Networks Aline Baggio and Koen Langendoen Delft University of Technology, The Netherlands {A.G.Baggio,K.G.Langendoen}@tudelft.nl Abstract. Localization
More informationThe number theory behind cryptography
The University of Vermont May 16, 2017 What is cryptography? Cryptography is the practice and study of techniques for secure communication in the presence of adverse third parties. What is cryptography?
More informationLAB15: OSPF IPv6. OSPF: Not So Stubby Area. Disclaimer
Page1 LAB15: OSPF IPv6 Disclaimer This Configuration Guide is designed to assist members to enhance their skills in respective technology area. While every effort has been made to ensure that all material
More informationNetwork Layer (Routing)
Network Layer (Routing) Where we are in the ourse Moving on up to the Network Layer! Application Transport Network Link Physical SE 61 University of Washington Topics Network service models Datagrams (packets),
More informationProof of Process A Foundation for Networks of Trust
Proof of Process A Foundation for Networks of Trust Abstract Proof of Process is a protocol that allows participants to trust a common process by decoupling the proof of data from the actual source data
More informationInformation Theory and Communication Optimal Codes
Information Theory and Communication Optimal Codes Ritwik Banerjee rbanerjee@cs.stonybrook.edu c Ritwik Banerjee Information Theory and Communication 1/1 Roadmap Examples and Types of Codes Kraft Inequality
More informationHow to carbon date digital information! Jeremy Clark
How to carbon date digital information! Jeremy Clark Time Mar 2012 2 Notify Vendors Time Mar 2012 3 Notify Vendors Time Mar 2012 Mar 2013 4 Time Mar 2012 Mar 2013 5 Time Mar 2012 Feb 2013 Mar 2013 6 Time
More informationSecure Reac)ve Ad Hoc Rou)ng. Hongyang Li
Secure Reac)ve Ad Hoc Rou)ng Hongyang Li Proac)ve vs. Reac)ve Rou)ng Proac&ve Reac&ve Build routing tables Know path to destination? Route Find path Route 2 Why Reac)ve Ad Hoc Rou)ng Unstable network condi)ons:
More informationDijkstra s Algorithm (5/9/2013)
Dijkstra s Algorithm (5/9/2013) www.alevelmathsng.co.uk (Shortest Path Problem) The aim is to find the shortest path between two specified nodes. The idea with this algorithm is to attach to each node
More informationLow Switching Frequency Pulse Width Modulation For Induction Motor Drives
Low Switching Frequency Pulse Width Modulation For Induction Motor Drives Avanish Tripathi, Prof. G. Narayanan Department of Electrical Engineering Indian Institute of Science, Bangalore - 560012 INDIA
More informationFigure 1 Basic Mode Comparison
Family Autocalibration 1. Introduction The Ambiq includes the capability of using the internal RC Oscillator for all timing functions. For increased accuracy at a small power penalty, the RC Oscillator
More informationText Book: Simon Haykin & Michael Moher,
Qassim University College of Engineering Electrical Engineering Department Electronics and Communications Course: EE322 Digital Communications Prerequisite: EE320 Text Book: Simon Haykin & Michael Moher,
More informationLuca Schenato joint work with: A. Basso, G. Gamba
Distributed consensus protocols for clock synchronization in sensor networks Luca Schenato joint work with: A. Basso, G. Gamba Networked Control Systems Drive-by-wire systems Swarm robotics Smart structures:
More informationPaper ID #7756. Dr. Ernest M. Kim, University of San Diego
Paper ID #7756 Using Miller s Theorem and Dominant Poles to Accurately Determine Field Effect Transistor and Bipolar Junction Transistor Small Signal and SPICE Capacitor Values Dr. Ernest M. Kim, University
More informationYale University Department of Computer Science
LUX ETVERITAS Yale University Department of Computer Science Secret Bit Transmission Using a Random Deal of Cards Michael J. Fischer Michael S. Paterson Charles Rackoff YALEU/DCS/TR-792 May 1990 This work
More informationA Digital Clock Multiplier for Globally Asynchronous Locally Synchronous Designs
A Digital Clock Multiplier for Globally Asynchronous Locally Synchronous Designs Thomas Olsson, Peter Nilsson, and Mats Torkelson. Dept of Applied Electronics, Lund University. P.O. Box 118, SE-22100,
More informationAuthentication Using Pulse-Response Biometrics
Authentication Using Pulse-Response Biometrics Kasper B. Rasmussen 1 Marc Roeschlin 2 Ivan Martinovic 1 Gene Tsudik 3 1 University of Oxford 2 ETH Zurich 3 UC Irvine Clermont Ferrand, 2014 Slide 1. A Bit
More informationIdentifying Scatter Targets in 2D Space using In Situ Phased Arrays for Guided Wave Structural Health Monitoring
Identifying Scatter Targets in 2D Space using In Situ Phased Arrays for Guided Wave Structural Health Monitoring Eric Flynn Metis Design Corporation / Los Alamos National Laboratory LA-UR 11-04921 Seth
More information