Reducing the Cost of Security in Link-State Routing R. Hauser A. Przygienda G. Tsudik McKinsey Consulting Fore Systems USC-ISI Zurich, Switzerland Bet

Size: px
Start display at page:

Download "Reducing the Cost of Security in Link-State Routing R. Hauser A. Przygienda G. Tsudik McKinsey Consulting Fore Systems USC-ISI Zurich, Switzerland Bet"

Transcription

1 Reducing the Cost of Security in Link-State Routing R. Hauser A. Przygienda G. Tsudik McKinsey Consulting Fore Systems USC-ISI Zurich, Switzerland Bethesda, MD Marina Del Rey, CA ISOC Symposium on Network and Distributed System Security, Feb 10-11, 1996, San Diego, CA 1

2 Ford/Fulkerson's Max Flow,! Distance Vector,! How to minimize the cost of security in Link State Routing? Introduction Routing Protocols: e.g., OSPF, IDPR, ATM-PNNI Dijkstra's Shortest Path,! Link State, e.g., RIP, BGP, IDRP Focus of this work: 2

3 Link State Security Link State (LS) Security Requirements: 1. Origin Authentication 2. Non-repudiation 3. Data integrity 4. Timeliness and Ordering Building Blocks: Public key-based digital signatures (RSA, DSS, El Gamal, Schnorr, etc.) (Conjectured/alleged) one-way hash functions (MD5, 8-pass SNEFRU, SHA, etc.) Hash chain constructs (e.g., S/KEY one-time authentication, micro-payments, etc.) 3

4 H 1 (R),..., H i (R),... H n (R) Hash Chains Example: 1. Alice generates a secret R 2. Computes a hash chain of length n: where H 0 (R) =Rand H i (R) =H(H i,1 (R)) for 0 <i<n 3. Initially, Bob receives H n (R) 4. Alice releases H n,1 (R) 5. Bob checks that H(H n,1 (R)) matches H n (R). Last two steps can be repeated n, 1 times 4

5 2. Chained LSU { CLSU i Stable Link State { SLS Observation A large percentage (50%, by some estimates) of LSU-s are simply re-statements of previous LSU-s, i.e., an LSU often carries no new information other than its timing since links and nodes go up and down infrequently. LSU types: 1. Anchor LSU { ALSU generated whenever a link state change occurs or the current hash chain is depleted. Signed, sequenced, timestamped. Contains: H n (R); T 0 ; n; flinksg; SIG generated periodically or upon explicit request Unsigned, sequenced, timestamped. Contains: H n,i (R); T i ; i 5

6 SLS contd. Issues: Missing CLSU-s? Storage Requirements? Only eective in STABLE routing environments! 6

7 [nodeid; T n ; H n (R 1 ); G n (R 1 ); :::; H n (R j ); G n (R j ); :::; H n (R k ); G n (R k )] SK Fluctuating Link State { FLS Observation The state of a link is (typically) a binary value. Each node generates (n k s) hash chains n - chain length k - # of incident links s - # of possible link states (typically 2: UP and DOW N) All R j (1 j k) must be random and unique, ALSU contains: 7

8 Hash Table 1... L j... L k L down... up down... up down up 1 H 1 (R 1 ) G 1 (R 1 )... H 1 (R j ) G 1 (R j )... H 1 (R k ) G 1 (R k ) i H i (R 1 ) G i (R 1 )... H i (R j ) G i (R j )... H i (R k ) G i (R k ) n H n (R 1 ) G n (R 1 )... H n (R j ) G n (R j )... H n (R k ) G n (R k ) 8

9 8 >< >: 8 >< >: H n,i (R j ) if LF i (j) =1 G n,i (R j ) if LF i (j) =0 CLSU Construction For each link L j ; (1 j k) and for each CLSU i, (1 i< n)link state ags (LSF i ) is dened as: LSF i =[LF i (1); :::; LF i (k)] where: 1 if L j is UP LF i (j) = 0 if L j is DOWN For each link L j ; (1 j k) and for each CLSU i, (1 i< n)link state vector (LSV i ) is dened as: LSV i =[LS i (1); :::; LS i (k)] where: LS i (j) = CLSU i contains: [nodeid; i; T i ;LSF i ;LSV i ] 9

10 G i,p (LS i (j)) if LF i (j) =0 H i,p (LS i (j)) if LF i (j) =1 G i (G n,i (R j )) if LF i (j) =0 H i (H n,i (R j )) if LF i (j) =1 CLSU Processing 1. Looks up the current entry for nodeid 2. Validates T i and i: Checks that T i is valid (reasonably close to current time), i>pand T i >T p (last stored timestamp from CLSU p.) 3. For each link L j reected in CLSU i (0 <j<k): a) if L j 's state is unchanged (LF i (j) =LF p (j)), compute: and compare to LS p (j); reject upon mismatch. b) if L j 's state has changed (LF i (j) 6= LF p (j)), compute: and compare to LS n (j); reject upon mismatch. Replace LSV p with LSV i. 10

11 4. Loose clock synchronization: maximum skew =(2t) Analysis Security (both SLS and FLS): 1. Strength of the underlying signature function (wrt ALSUs) 2. Strength of the underlying hash function (wrt CLSUs) 3. Randomness of the starting values Limitations: Very frequent state oscillations Clock synchronization impossible Multiple-valued (or continuous) link state 11

12 Conclusions Related Work: [MB-96 ] S. Murphy and M. Badger, Digital Signature Protection of the OSPF Routing Protocol, 1996 Symposium on Network and Distributed Systems Security (SNDSS'96), February [P-88 ] R. Perlman, Network Layer Protocols with Byzantine Robustness, Ph.D. Dissertation, MIT LCS TR-429, October Future Work: Experimental Results (OSPF) SLS/FLS Hybrid Other Constructs? 12

Introduction to OSPF. ISP Workshops. Last updated 11 November 2013

Introduction to OSPF. ISP Workshops. Last updated 11 November 2013 Introduction to OSPF ISP Workshops Last updated 11 November 2013 1 OSPF p Open Shortest Path First p Open: n Meaning an Open Standard n Developed by IETF (OSPF Working Group) for IP RFC1247 n Current standard

More information

OSPF Fundamentals. Agenda. OSPF Principles. L41 - OSPF Fundamentals. Open Shortest Path First Routing Protocol Internet s Second IGP

OSPF Fundamentals. Agenda. OSPF Principles. L41 - OSPF Fundamentals. Open Shortest Path First Routing Protocol Internet s Second IGP OSPF Fundamentals Open Shortest Path First Routing Protocol Internet s Second IGP Agenda OSPF Principles Introduction The Dijkstra Algorithm Communication Procedures LSA Broadcast Handling Splitted Area

More information

OSPF - Open Shortest Path First. OSPF Fundamentals. Agenda. OSPF Topology Database

OSPF - Open Shortest Path First. OSPF Fundamentals. Agenda. OSPF Topology Database OSPF - Open Shortest Path First OSPF Fundamentals Open Shortest Path First Routing Protocol Internet s Second IGP distance vector protocols like RIP have several dramatic disadvantages: slow adaptation

More information

CSE/EE 461. Link State Routing. Last Time. This Lecture. Routing Algorithms Introduction Distance Vector routing (RIP)

CSE/EE 461. Link State Routing. Last Time. This Lecture. Routing Algorithms Introduction Distance Vector routing (RIP) CSE/EE 46 Link State Routing Last Time Routing Algorithms Introduction Distance Vector routing (RIP) Application Presentation Session Transport Network Data Link Physical This Lecture Routing Algorithms

More information

Link-state protocols and Open Shortest Path First (OSPF)

Link-state protocols and Open Shortest Path First (OSPF) Fixed Internetworking Protocols and Networks Link-state protocols and Open Shortest Path First (OSPF) Rune Hylsberg Jacobsen Aarhus School of Engineering rhj@iha.dk 0 ITIFN Objectives Describe the basic

More information

Link State Routing. In particular OSPF. dr. C. P. J. Koymans. Informatics Institute University of Amsterdam. March 4, 2008

Link State Routing. In particular OSPF. dr. C. P. J. Koymans. Informatics Institute University of Amsterdam. March 4, 2008 Link State Routing In particular OSPF dr. C. P. J. Koymans Informatics Institute University of Amsterdam March 4, 2008 dr. C. P. J. Koymans (UvA) Link State Routing March 4, 2008 1 / 70 1 Link State Protocols

More information

Link State Routing. In particular OSPF. Karst Koymans. Informatics Institute University of Amsterdam. (version 16.3, 2017/03/09 11:25:31)

Link State Routing. In particular OSPF. Karst Koymans. Informatics Institute University of Amsterdam. (version 16.3, 2017/03/09 11:25:31) Link State Routing In particular OSPF Karst Koymans Informatics Institute University of Amsterdam (version 16.3, 2017/03/09 11:25:31) Tuesday, March 7, 2017 Karst Koymans (UvA) Link State Routing Tuesday,

More information

Link State Routing. In particular OSPF. Karst Koymans. Informatics Institute University of Amsterdam. (version 17.4, 2017/11/30 12:33:57)

Link State Routing. In particular OSPF. Karst Koymans. Informatics Institute University of Amsterdam. (version 17.4, 2017/11/30 12:33:57) Link State Routing In particular OSPF Karst Koymans Informatics Institute University of Amsterdam (version 17.4, 2017/11/30 12:33:57) Tuesday, November 28, 2017 Karst Koymans (UvA) Link State Routing Tuesday,

More information

Secure Ad-Hoc Routing Protocols

Secure Ad-Hoc Routing Protocols Secure Ad-Hoc Routing Protocols ARIADNE (A secure on demand RoutIng protocol for Ad-Hoc Networks & TESLA ARAN (A Routing protocol for Ad-hoc Networks SEAD (Secure Efficient Distance Vector Routing Protocol

More information

Security in Sensor Networks. Written by: Prof. Srdjan Capkun & Others Presented By : Siddharth Malhotra Mentor: Roland Flury

Security in Sensor Networks. Written by: Prof. Srdjan Capkun & Others Presented By : Siddharth Malhotra Mentor: Roland Flury Security in Sensor Networks Written by: Prof. Srdjan Capkun & Others Presented By : Siddharth Malhotra Mentor: Roland Flury Mobile Ad-hoc Networks (MANET) Mobile Random and perhaps constantly changing

More information

CS 457 Lecture 16 Routing Continued. Spring 2010

CS 457 Lecture 16 Routing Continued. Spring 2010 CS 457 Lecture 16 Routing Continued Spring 2010 Scaling Link-State Routing Overhead of link-state routing Flooding link-state packets throughout the network Running Dijkstra s shortest-path algorithm Introducing

More information

Configuring the maximum number of external LSAs in LSDB 27 Configuring OSPF exit overflow interval 28 Enabling compatibility with RFC Logging

Configuring the maximum number of external LSAs in LSDB 27 Configuring OSPF exit overflow interval 28 Enabling compatibility with RFC Logging Contents Configuring OSPF 1 Overview 1 OSPF packets 1 LSA types 1 OSPF areas 2 Router types 4 Route types 5 Route calculation 6 OSPF network types 6 DR and BDR 6 Protocols and standards 8 OSPF configuration

More information

Lecture 8 Link-State Routing

Lecture 8 Link-State Routing 6998-02: Internet Routing Lecture 8 Link-State Routing John Ioannidis AT&T Labs Research ji+ir@cs.columbia.edu Copyright 2002 by John Ioannidis. All Rights Reserved. Announcements Lectures 1-5, 7-8 are

More information

Bitcoin and Blockchain for Pythoneers

Bitcoin and Blockchain for Pythoneers Bitcoin and Blockchain for Pythoneers EuroPython 2017 Benno Luthiger 10.07.2017 1 Why Bitcoin? Crypto currency fast reliable without central authority The Blockchain is a distributed ledger (peer to peer).

More information

Link State Routing. Brad Karp UCL Computer Science. CS 3035/GZ01 3 rd December 2013

Link State Routing. Brad Karp UCL Computer Science. CS 3035/GZ01 3 rd December 2013 Link State Routing Brad Karp UCL Computer Science CS 33/GZ 3 rd December 3 Outline Link State Approach to Routing Finding Links: Hello Protocol Building a Map: Flooding Protocol Healing after Partitions:

More information

C Commands. Send comments to

C Commands. Send comments to This chapter describes the Cisco NX-OS Open Shortest Path First (OSPF) commands that begin with C. UCR-583 clear ip ospf neighbor clear ip ospf neighbor To clear neighbor statistics and reset adjacencies

More information

Table of Contents. OSPF Configuration 1

Table of Contents. OSPF Configuration 1 Table of Contents OSPF Configuration 1 Introduction to OSPF 1 Basic Concepts 2 Area Based OSPF Network Partition 3 Router Types 7 Classification of OSPF Networks 9 DR and BDR 9 OSPF Packet Formats 11 Supported

More information

Interlayer routing issues for wireless networks

Interlayer routing issues for wireless networks NRL Cross-Layer Workshop Interlayer routing issues for wireless networks June 2, 2004 Tom Henderson Marcelo Albuquerque Phil Spagnolo Jae H. Kim Boeing Phantom Works 1 Report Documentation Page Form Approved

More information

Wireless Network Security Spring 2014

Wireless Network Security Spring 2014 Wireless Network Security 14-814 Spring 2014 Patrick Tague Class #5 Jamming 2014 Patrick Tague 1 Travel to Pgh: Announcements I'll be on the other side of the camera on Feb 4 Let me know if you'd like

More information

Energy Saving Routing Strategies in IP Networks

Energy Saving Routing Strategies in IP Networks Energy Saving Routing Strategies in IP Networks M. Polverini; M. Listanti DIET Department - University of Roma Sapienza, Via Eudossiana 8, 84 Roma, Italy 2 june 24 [scale=.8]figure/logo.eps M. Polverini

More information

OSPF for IPv6. ISP Workshops

OSPF for IPv6. ISP Workshops OSPF for IPv6 ISP Workshops These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/) Last updated 17

More information

A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks

A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks Elisabeth M. Royer, Chai-Keong Toh IEEE Personal Communications, April 1999 Presented by Hannu Vilpponen 1(15) Hannu_Vilpponen.PPT

More information

Link State Routing. Link state routing principles Dijkstra s shortest-path-first algorithm The OSPF protocol. (Chapter 6 in Huitema) E7310/Comnet 1

Link State Routing. Link state routing principles Dijkstra s shortest-path-first algorithm The OSPF protocol. (Chapter 6 in Huitema) E7310/Comnet 1 Link State Routing Link state routing principles Dijkstra s shortest-path-first algorithm The OSPF protocol (Chapter 6 in Huitema) 7310/Comnet 1 Link State Routing Principles 7310/Comnet 2 Link state routing

More information

A Comparative Study of Quality of Service Routing Schemes That Tolerate Imprecise State Information

A Comparative Study of Quality of Service Routing Schemes That Tolerate Imprecise State Information A Comparative Study of Quality of Service Routing Schemes That Tolerate Imprecise State Information Xin Yuan Wei Zheng Department of Computer Science, Florida State University, Tallahassee, FL 330 {xyuan,zheng}@cs.fsu.edu

More information

Scalable Routing Protocols for Mobile Ad Hoc Networks

Scalable Routing Protocols for Mobile Ad Hoc Networks Helsinki University of Technology T-79.300 Postgraduate Course in Theoretical Computer Science Scalable Routing Protocols for Mobile Ad Hoc Networks Hafeth Hourani hafeth.hourani@nokia.com Contents Overview

More information

ROUTING PROTOCOLS. Dr. Ahmed Khattab. EECE Department Cairo University Fall 2012 ELC 659/ELC724

ROUTING PROTOCOLS. Dr. Ahmed Khattab. EECE Department Cairo University Fall 2012 ELC 659/ELC724 ROUTING PROTOCOLS Dr. Ahmed Khattab EECE Department Cairo University Fall 2012 ELC 659/ELC724 Dr. Ahmed Khattab Fall 2012 2 Routing Network-wide process the determine the end to end paths that packets

More information

Signatures for Network Coding

Signatures for Network Coding Conference on Random network codes and Designs over F q Signatures for Network Coding Oliver Gnilke, Claude-Shannon-Institute, University College Dublin 18. September 2013 1 / 14 Network Coding Signature

More information

SSL Time-Diagram. First Variant: Generation of a Temporary 512-bit RSA Key

SSL Time-Diagram. First Variant: Generation of a Temporary 512-bit RSA Key http://www.tech-invite.com SSL Time-Diagram This document provides a detailed description of the sequence of first exchanges between an SSL and an SSL. This is the first variant to the main scenario described

More information

A Blueprint for Civil GPS Navigation Message Authentication

A Blueprint for Civil GPS Navigation Message Authentication A Blueprint for Civil GPS Navigation Message Authentication Andrew Kerns, Kyle Wesson, and Todd Humphreys Radionavigation Laboratory University of Texas at Austin Applied Research Laboratories University

More information

Design and implementation of LDPC decoder using time domain-ams processing

Design and implementation of LDPC decoder using time domain-ams processing 2015; 1(7): 271-276 ISSN Print: 2394-7500 ISSN Online: 2394-5869 Impact Factor: 5.2 IJAR 2015; 1(7): 271-276 www.allresearchjournal.com Received: 31-04-2015 Accepted: 01-06-2015 Shirisha S M Tech VLSI

More information

Guide to OSPF Application on the CSS 11000

Guide to OSPF Application on the CSS 11000 Guide to OSPF Application on the CSS 11000 Document ID: 12638 Contents Introduction Before You Begin Conventions Prerequisites Components Used Description OSPF Configuration Task List Configuration Global

More information

Implementation and Performance Testing of the SQUASH RFID Authentication Protocol

Implementation and Performance Testing of the SQUASH RFID Authentication Protocol Implementation and Performance Testing of the SQUASH RFID Authentication Protocol Philip Koshy, Justin Valentin and Xiaowen Zhang * Department of Computer Science College of n Island n Island, New York,

More information

OSPF and MANET WG meetings, IETF64. OSPF MANET Design Team outbrief. November, Tom Henderson

OSPF and MANET WG meetings, IETF64. OSPF MANET Design Team outbrief. November, Tom Henderson OSPF and MANET WG meetings, IETF64 OSPF MANET Design Team outbrief November, 2005 Tom Henderson {thomas.r.henderson@boeing.com} Design team members: Emmanuel Baccelli, Madhavi Chandra, Thomas Clausen,

More information

Link State Routing. Stefano Vissicchio UCL Computer Science CS 3035/GZ01

Link State Routing. Stefano Vissicchio UCL Computer Science CS 3035/GZ01 Link State Routing Stefano Vissicchio UCL Computer Science CS 335/GZ Reminder: Intra-domain Routing Problem Shortest paths problem: What path between two vertices offers minimal sum of edge weights? Classic

More information

Junos Intermediate Routing

Junos Intermediate Routing Junos Intermediate Routing Chapter 4: Open Shortest Path First 2012 Juniper Networks, Inc. All rights reserved. www.juniper.net Worldwide Education Services Chapter Objectives After successfully completing

More information

OSPF Domain / OSPF Area. OSPF Advanced Topics. OSPF Domain / OSPF Area. Agenda

OSPF Domain / OSPF Area. OSPF Advanced Topics. OSPF Domain / OSPF Area. Agenda OSPF Domain / OSPF Area OSPF Advanced Topics Areas,, Backbone, Summary-LSA, ASBR, Stub Area, Route Summarization, Virtual Links, Header Details OSPF domain can be divided in multiple OSPF areas to improve

More information

Robust Key Establishment in Sensor Networks

Robust Key Establishment in Sensor Networks Robust Key Establishment in Sensor Networks Yongge Wang Abstract Secure communication guaranteeing reliability, authenticity, and privacy in sensor networks with active adversaries is a challenging research

More information

Secret Key Extraction in MIMO like Sensor Networks Using Wireless Signal Strength

Secret Key Extraction in MIMO like Sensor Networks Using Wireless Signal Strength Secret Key Extraction in MIMO like Sensor Networks Using Wireless Signal Strength Sriram Nandha Premnath Academic Advisors: Sneha K. Kasera, Neal Patwari nandha@cs.utah.edu, kasera@cs.utah.edu, npatwari@ece.utah.edu

More information

Practical Experiences with NFC Security on mobile Phones

Practical Experiences with NFC Security on mobile Phones Practical Experiences with NFC Security on mobile Phones Gauthier Van Damme Karel Wouters Katholieke Universiteit Leuven ESAT/SCD/IBBT-COSIC Workshop on RFID Security, 2009 ESAT/SCD/IBBT-COSIC (KUL) Practical

More information

Computer Networks II

Computer Networks II ipartimento di Informatica e Sistemistica omputer Networks II Routing protocols Overview Luca Becchetti Luca.Becchetti@dis.uniroma.it.. 2009/200 Goals escribe approaches and give overview of mechanisms

More information

4. Design Principles of Block Ciphers and Differential Attacks

4. Design Principles of Block Ciphers and Differential Attacks 4. Design Principles of Block Ciphers and Differential Attacks Nonli near 28-bits Trans forma tion 28-bits Model of Block Ciphers @G. Gong A. Introduction to Block Ciphers A Block Cipher Algorithm: E and

More information

Configuring OSPF. The Cisco OSPF Implementation

Configuring OSPF. The Cisco OSPF Implementation Configuring OSPF This chapter describes how to configure Open Shortest Path First (OSPF). For a complete description of the OSPF commands in this chapter, refer to the OSPF s chapter of the Cisco IOS IP

More information

Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT

Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT Luis Rosales-Roldan, Manuel Cedillo-Hernández, Mariko Nakano-Miyatake, Héctor Pérez-Meana Postgraduate Section,

More information

Diffie-Hellman key-exchange protocol

Diffie-Hellman key-exchange protocol Diffie-Hellman key-exchange protocol This protocol allows two users to choose a common secret key, for DES or AES, say, while communicating over an insecure channel (with eavesdroppers). The two users

More information

Wave Pipelined Circuit with Self Tuning for Clock Skew and Clock Period Using BIST Approach

Wave Pipelined Circuit with Self Tuning for Clock Skew and Clock Period Using BIST Approach Technology Volume 1, Issue 1, July-September, 2013, pp. 41-46, IASTER 2013 www.iaster.com, Online: 2347-6109, Print: 2348-0017 Wave Pipelined Circuit with Self Tuning for Clock Skew and Clock Period Using

More information

Chapter 10 Mobile Communication Systems

Chapter 10 Mobile Communication Systems Chapter 10 Mobile Communication Systems Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Outline Cellular System Infrastructure Registration Handoff Parameters and Underlying

More information

Ad Hoc Networks - Routing and Security Issues

Ad Hoc Networks - Routing and Security Issues Ad Hoc Networks - Routing and Security Issues Mahalingam Ramkumar Mississippi State University, MS January 25, 2005 1 2 Some Basic Terms Basic Terms Ad Hoc vs Infrastructured AHN MANET (Mobile Ad hoc NETwork)

More information

http://www.expertnetworkconsultant.com/configuring/ospf-neighbor-adjacency/ Brought to you by Expert Network Consultant.com OSPF Neighbor Adjacency Once upon a time, we walked together holding hands, we

More information

DTTF/NB479: Dszquphsbqiz Day 30

DTTF/NB479: Dszquphsbqiz Day 30 DTTF/NB479: Dszquphsbqiz Day 30 Announcements: Questions? This week: Digital signatures, DSA Coin flipping over the phone RSA Signatures allow you to recover the message from the signature; ElGamal signatures

More information

Question No: 2 In an OSPF Hello packet, which of the following fields must match for all neighbor routers on the segment? Choose three answers.

Question No: 2 In an OSPF Hello packet, which of the following fields must match for all neighbor routers on the segment? Choose three answers. Volume: 335 Questions Question No: 1 What is the default preference value for a static route in the Alcatel-Lucent 7750 SR? A. 0 B. 5 C. 10 D. 15 Answer: B Question No: 2 In an OSPF Hello packet, which

More information

Babel A flexible routing protocol

Babel A flexible routing protocol Babel A flexible routing protocol Juliusz Chroboczek PPS Université Paris-Diderot (Paris 7) 11 March 2014 1/33 The story In December 2006, I started on a quest to bring wifi to the Ph.D. students couch:

More information

Network Working Group Request for Comments: Category: Standards Track A. Zinin Alcatel-Lucent R. Coltun Acoustra Productions July 2008

Network Working Group Request for Comments: Category: Standards Track A. Zinin Alcatel-Lucent R. Coltun Acoustra Productions July 2008 Network Working Group Request for Comments: 5250 Obsoletes: 2370 Category: Standards Track L. Berger LabN I. Bryskin Adva A. Zinin Alcatel-Lucent R. Coltun Acoustra Productions July 2008 The OSPF Opaque

More information

CS649 Sensor Networks IP Lecture 9: Synchronization

CS649 Sensor Networks IP Lecture 9: Synchronization CS649 Sensor Networks IP Lecture 9: Synchronization I-Jeng Wang http://hinrg.cs.jhu.edu/wsn06/ Spring 2006 CS 649 1 Outline Description of the problem: axes, shortcomings Reference-Broadcast Synchronization

More information

Configuring OSPF. Information About OSPF CHAPTER

Configuring OSPF. Information About OSPF CHAPTER CHAPTER 22 This chapter describes how to configure the ASASM to route data, perform authentication, and redistribute routing information using the Open Shortest Path First (OSPF) routing protocol. The

More information

UTILIZATION OF AN IEEE 1588 TIMING REFERENCE SOURCE IN THE inet RF TRANSCEIVER

UTILIZATION OF AN IEEE 1588 TIMING REFERENCE SOURCE IN THE inet RF TRANSCEIVER UTILIZATION OF AN IEEE 1588 TIMING REFERENCE SOURCE IN THE inet RF TRANSCEIVER Dr. Cheng Lu, Chief Communications System Engineer John Roach, Vice President, Network Products Division Dr. George Sasvari,

More information

KillTest *KIJGT 3WCNKV[ $GVVGT 5GTXKEG Q&A NZZV ]]] QORRZKYZ IUS =K ULLKX LXKK [VJGZK YKX\OIK LUX UTK _KGX

KillTest *KIJGT 3WCNKV[ $GVVGT 5GTXKEG Q&A NZZV ]]] QORRZKYZ IUS =K ULLKX LXKK [VJGZK YKX\OIK LUX UTK _KGX KillTest Q&A Exam : JN0-643 Title : Enterprise Routing and Switching, Professional (JNCIP-ENT) Version : Demo 1 / 10 1.Which connection method do OSPF routers use to communicate with each other? A. IP

More information

Gen-Adler: The Generalized Adler's Equation for Injection Locking Analysis in Oscillators

Gen-Adler: The Generalized Adler's Equation for Injection Locking Analysis in Oscillators Gen-Adler: The Generalized Adler's Equation for Injection Locking Analysis in Oscillators Prateek Bhansali, Jaijeet Roychowdhury University of Minnesota, USA Slide 1 Outline Introduction Previous work

More information

OSPF Nonstop Routing. Finding Feature Information. Prerequisites for OSPF NSR

OSPF Nonstop Routing. Finding Feature Information. Prerequisites for OSPF NSR The feature allows a device with redundant Route Processors (RPs) to maintain its Open Shortest Path First (OSPF) state and adjacencies across planned and unplanned RP switchovers. The OSPF state is maintained

More information

Introduction to Cryptography CS 355

Introduction to Cryptography CS 355 Introduction to Cryptography CS 355 Lecture 25 Mental Poker And Semantic Security CS 355 Fall 2005 / Lecture 25 1 Lecture Outline Review of number theory The Mental Poker Protocol Semantic security Semantic

More information

accurate as possible, the enclosed material is presented on an as is basis. Neither the authors nor

accurate as possible, the enclosed material is presented on an as is basis. Neither the authors nor OSPF Disclaimer This Configuration Guide is designed to assist members to enhance their skills in particular technology area. While every effort has been made to ensure that all material is as complete

More information

Routing and Wavelength Assignment in All-Optical DWDM Transport Networks with Sparse Wavelength Conversion Capabilities. Ala I. Al-Fuqaha, Ph.D.

Routing and Wavelength Assignment in All-Optical DWDM Transport Networks with Sparse Wavelength Conversion Capabilities. Ala I. Al-Fuqaha, Ph.D. Routing and Wavelength Assignment in All-Optical DWDM Transport Networks with Sparse Wavelength Conversion Capabilities Ala I. Al-Fuqaha, Ph.D. Overview Transport Network Architectures: Current Vs. IP

More information

Preservation of Records Entrusted to the Cloud Perspectives of the InterPARES Trust Project

Preservation of Records Entrusted to the Cloud Perspectives of the InterPARES Trust Project Preservation of Records Entrusted to the Cloud Perspectives of the InterPARES Trust Project Ph.D. Hrvoje Stančić, assoc. prof. Director Team Europe, InterPARES Trust Department of Information and Communication

More information

Principles of Ad Hoc Networking

Principles of Ad Hoc Networking Principles of Ad Hoc Networking Michel Barbeau and Evangelos Kranakis November 12, 2007 Wireless security challenges Network type Wireless Mobility Ad hoc Sensor Challenge Open medium Handover implies

More information

Cryptology and Graph Theory

Cryptology and Graph Theory Cryptology and Graph Theory Jean-Jacques Quisquater jjq@dice.ucl.ac.be November 16, 2005 http://www.uclcrypto.org Mierlo, Netherlands Warning: Audience may be addicted by Powerpoint. Use with moderation.

More information

CS/EE Homework 9 Solutions

CS/EE Homework 9 Solutions S/EE 260 - Homework 9 Solutions ue 4/6/2000 1. onsider the synchronous ripple carry counter on page 5-8 of the notes. Assume that the flip flops have a setup time requirement of 2 ns and that the gates

More information

A HYBRID GENETIC ALGORITHM FOR THE WEIGHT SETTING PROBLEM IN OSPF/IS-IS ROUTING

A HYBRID GENETIC ALGORITHM FOR THE WEIGHT SETTING PROBLEM IN OSPF/IS-IS ROUTING A HYBRID GENETIC ALGORITHM FOR THE WEIGHT SETTING PROBLEM IN OSPF/IS-IS ROUTING L.S. BURIOL, M.G.C. RESENDE, C.C. RIBEIRO, AND M. THORUP Abstract. Intra-domain traffic engineering aims to make more efficient

More information

Clock Synchronization

Clock Synchronization Clock Synchronization Chapter 9 d Hoc and Sensor Networks Roger Wattenhofer 9/1 coustic Detection (Shooter Detection) Sound travels much slower than radio signal (331 m/s) This allows for quite accurate

More information

Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping

Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping Mario Strasser Computer Eng. and Networks Laboratory ETH Zurich, Switzerland strasser@tik.ee.ethz.ch Srdjan Čapkun Department of

More information

WIRELESS physical layer security is becoming increasingly

WIRELESS physical layer security is becoming increasingly IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 11, NO. 7, JULY 2016 1515 Mimicry Attacks Against Wireless Link Signature and New Defense Using Time-Synched Link Signature Song Fang, Yao

More information

CONTENTS Sl. No. Experiment Page No

CONTENTS Sl. No. Experiment Page No CONTENTS Sl. No. Experiment Page No 1a Given a 4-variable logic expression, simplify it using Entered Variable Map and realize the simplified logic expression using 8:1 multiplexer IC. 2a 3a 4a 5a 6a 1b

More information

Introduction to Local and Wide Area Networks

Introduction to Local and Wide Area Networks Introduction to Local and Wide Area Networks Lecturers Amnach Khawne Jirasak Sittigorn Chapter 1 1 Routing Protocols and Concepts Chapter 10 : Link-State Routing Protocols Chapter 11 : OSPF Chapter 1 2

More information

Ecient Multichip Partial Concentrator Switches. Thomas H. Cormen. Laboratory for Computer Science. Massachusetts Institute of Technology

Ecient Multichip Partial Concentrator Switches. Thomas H. Cormen. Laboratory for Computer Science. Massachusetts Institute of Technology Ecient Multichip Partial Concentrator Switches Thomas H. Cormen Laboratory for Computer Science Massachusetts Institute of Technology Cambridge, Massachusetts 02139 Abstract Due to chip area and pin count

More information

RX1032 PRECISION TEMPERATURE MEASUREMENTS FOR RUGGED ENVIRONMENTS FEATURES. 32-Channel Thermocouple Measurement System

RX1032 PRECISION TEMPERATURE MEASUREMENTS FOR RUGGED ENVIRONMENTS  FEATURES. 32-Channel Thermocouple Measurement System WWW.VTIINSTRUMENTS.COM RX1032 PRECISION TEMPERATURE MEASUREMENTS FOR RUGGED ENVIRONMENTS FEATURES 32-Channel Thermocouple Measurement System Advanced CJC Implementation 1000 Sample/sec/channel Scan Rate

More information

OSPF Enhanced Traffic Statistics for OSPFv2 and OSPFv3

OSPF Enhanced Traffic Statistics for OSPFv2 and OSPFv3 OSPF Enhanced Traffic Statistics for OSPFv2 and OSPFv3 This document describes new and modified commands that provide enhanced OSPF traffic statistics for OSPFv2 and OSPFv3. The ability to collect and

More information

Jamming-resistant Broadcast Communication without Shared Keys

Jamming-resistant Broadcast Communication without Shared Keys 1/18 Jamming-resistant Broadcast Communication without Shared Keys Christina Pöpper Joint work with Mario Strasser and Srdjan Čapkun System Security Group ETH Zürich August 2009 Broadcast Communication

More information

Bitcoin: Synchronization and Sharing of Transactions

Bitcoin: Synchronization and Sharing of Transactions Bitcoin: Synchronization and Sharing of Transactions Roger Wattenhofer ETH Zurich Distributed Computing Group www.disco.ethz.ch 1200 Exchange Rate USD/BTC 1000 Price [USD/BTC] 800 600 400 200 0 2010 2011

More information

Computer Generated Hologram for SemiFragile Watermarking with Encrypted Images

Computer Generated Hologram for SemiFragile Watermarking with Encrypted Images Computer Generated Hologram for SemiFragile Watermarking with Encrypted Images G. Schirripa Spagnolo, M. De Santis Abstract The protection of the contents of digital products is referred to as content

More information

V.S.B. ENGINEERING COLLEGE, KARUR. Department of Computer Science and Engineering

V.S.B. ENGINEERING COLLEGE, KARUR. Department of Computer Science and Engineering V.S.B. ENGINEERING COLLEGE, KARUR. Department of and Details of Faculty Paper Publications in National and International Journals Academic Year : 2016-2017 International Journals : Sl. Name of the Title

More information

Lecture 7: Components of Phase Locked Loop (PLL)

Lecture 7: Components of Phase Locked Loop (PLL) Lecture 7: Components of Phase Locked Loop (PLL) CSCE 6933/5933 Instructor: Saraju P. Mohanty, Ph. D. NOTE: The figures, text etc included in slides are borrowed from various books, websites, authors pages,

More information

A Cryptosystem Based on the Composition of Reversible Cellular Automata

A Cryptosystem Based on the Composition of Reversible Cellular Automata A Cryptosystem Based on the Composition of Reversible Cellular Automata Adam Clarridge and Kai Salomaa Technical Report No. 2008-549 Queen s University, Kingston, Canada {adam, ksalomaa}@cs.queensu.ca

More information

OSPF Sham-Link MIB Support

OSPF Sham-Link MIB Support This feature introduces MIB support for the OSPF Sham-Link feature through the addition of new tables and trap MIB objects to the Cisco OSPF MIB (CISCO-OSPF-MIB) and the Cisco OSPF Trap MIB (CISCO-OSPF-TRAP-MIB).

More information

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn Increasing Broadcast Reliability for Vehicular Ad Hoc Networks Nathan Balon and Jinhua Guo University of Michigan - Dearborn I n t r o d u c t i o n General Information on VANETs Background on 802.11 Background

More information

Monte-Carlo Localization for Mobile Wireless Sensor Networks

Monte-Carlo Localization for Mobile Wireless Sensor Networks Monte-Carlo Localization for Mobile Wireless Sensor Networks Aline Baggio and Koen Langendoen Delft University of Technology, The Netherlands {A.G.Baggio,K.G.Langendoen}@tudelft.nl Abstract. Localization

More information

The number theory behind cryptography

The number theory behind cryptography The University of Vermont May 16, 2017 What is cryptography? Cryptography is the practice and study of techniques for secure communication in the presence of adverse third parties. What is cryptography?

More information

LAB15: OSPF IPv6. OSPF: Not So Stubby Area. Disclaimer

LAB15: OSPF IPv6. OSPF: Not So Stubby Area. Disclaimer Page1 LAB15: OSPF IPv6 Disclaimer This Configuration Guide is designed to assist members to enhance their skills in respective technology area. While every effort has been made to ensure that all material

More information

Network Layer (Routing)

Network Layer (Routing) Network Layer (Routing) Where we are in the ourse Moving on up to the Network Layer! Application Transport Network Link Physical SE 61 University of Washington Topics Network service models Datagrams (packets),

More information

Proof of Process A Foundation for Networks of Trust

Proof of Process A Foundation for Networks of Trust Proof of Process A Foundation for Networks of Trust Abstract Proof of Process is a protocol that allows participants to trust a common process by decoupling the proof of data from the actual source data

More information

Information Theory and Communication Optimal Codes

Information Theory and Communication Optimal Codes Information Theory and Communication Optimal Codes Ritwik Banerjee rbanerjee@cs.stonybrook.edu c Ritwik Banerjee Information Theory and Communication 1/1 Roadmap Examples and Types of Codes Kraft Inequality

More information

How to carbon date digital information! Jeremy Clark

How to carbon date digital information! Jeremy Clark How to carbon date digital information! Jeremy Clark Time Mar 2012 2 Notify Vendors Time Mar 2012 3 Notify Vendors Time Mar 2012 Mar 2013 4 Time Mar 2012 Mar 2013 5 Time Mar 2012 Feb 2013 Mar 2013 6 Time

More information

Secure Reac)ve Ad Hoc Rou)ng. Hongyang Li

Secure Reac)ve Ad Hoc Rou)ng. Hongyang Li Secure Reac)ve Ad Hoc Rou)ng Hongyang Li Proac)ve vs. Reac)ve Rou)ng Proac&ve Reac&ve Build routing tables Know path to destination? Route Find path Route 2 Why Reac)ve Ad Hoc Rou)ng Unstable network condi)ons:

More information

Dijkstra s Algorithm (5/9/2013)

Dijkstra s Algorithm (5/9/2013) Dijkstra s Algorithm (5/9/2013) www.alevelmathsng.co.uk (Shortest Path Problem) The aim is to find the shortest path between two specified nodes. The idea with this algorithm is to attach to each node

More information

Low Switching Frequency Pulse Width Modulation For Induction Motor Drives

Low Switching Frequency Pulse Width Modulation For Induction Motor Drives Low Switching Frequency Pulse Width Modulation For Induction Motor Drives Avanish Tripathi, Prof. G. Narayanan Department of Electrical Engineering Indian Institute of Science, Bangalore - 560012 INDIA

More information

Figure 1 Basic Mode Comparison

Figure 1 Basic Mode Comparison Family Autocalibration 1. Introduction The Ambiq includes the capability of using the internal RC Oscillator for all timing functions. For increased accuracy at a small power penalty, the RC Oscillator

More information

Text Book: Simon Haykin & Michael Moher,

Text Book: Simon Haykin & Michael Moher, Qassim University College of Engineering Electrical Engineering Department Electronics and Communications Course: EE322 Digital Communications Prerequisite: EE320 Text Book: Simon Haykin & Michael Moher,

More information

Luca Schenato joint work with: A. Basso, G. Gamba

Luca Schenato joint work with: A. Basso, G. Gamba Distributed consensus protocols for clock synchronization in sensor networks Luca Schenato joint work with: A. Basso, G. Gamba Networked Control Systems Drive-by-wire systems Swarm robotics Smart structures:

More information

Paper ID #7756. Dr. Ernest M. Kim, University of San Diego

Paper ID #7756. Dr. Ernest M. Kim, University of San Diego Paper ID #7756 Using Miller s Theorem and Dominant Poles to Accurately Determine Field Effect Transistor and Bipolar Junction Transistor Small Signal and SPICE Capacitor Values Dr. Ernest M. Kim, University

More information

Yale University Department of Computer Science

Yale University Department of Computer Science LUX ETVERITAS Yale University Department of Computer Science Secret Bit Transmission Using a Random Deal of Cards Michael J. Fischer Michael S. Paterson Charles Rackoff YALEU/DCS/TR-792 May 1990 This work

More information

A Digital Clock Multiplier for Globally Asynchronous Locally Synchronous Designs

A Digital Clock Multiplier for Globally Asynchronous Locally Synchronous Designs A Digital Clock Multiplier for Globally Asynchronous Locally Synchronous Designs Thomas Olsson, Peter Nilsson, and Mats Torkelson. Dept of Applied Electronics, Lund University. P.O. Box 118, SE-22100,

More information

Authentication Using Pulse-Response Biometrics

Authentication Using Pulse-Response Biometrics Authentication Using Pulse-Response Biometrics Kasper B. Rasmussen 1 Marc Roeschlin 2 Ivan Martinovic 1 Gene Tsudik 3 1 University of Oxford 2 ETH Zurich 3 UC Irvine Clermont Ferrand, 2014 Slide 1. A Bit

More information

Identifying Scatter Targets in 2D Space using In Situ Phased Arrays for Guided Wave Structural Health Monitoring

Identifying Scatter Targets in 2D Space using In Situ Phased Arrays for Guided Wave Structural Health Monitoring Identifying Scatter Targets in 2D Space using In Situ Phased Arrays for Guided Wave Structural Health Monitoring Eric Flynn Metis Design Corporation / Los Alamos National Laboratory LA-UR 11-04921 Seth

More information