Modeling Pairwise Key Establishment for Random Key Predistribution in Large-scale Sensor Networks

Size: px
Start display at page:

Download "Modeling Pairwise Key Establishment for Random Key Predistribution in Large-scale Sensor Networks"

Transcription

1 Modeling Pirwise Key Estlisment for Rndom Key Predistriution in Lrge-scle Sensor Networs Dijing Hung, Memer, IEEE, Mnis Met, Memer, IEEE, Appie vn de Liefvoort, Memer, IEEE, Deep Medi, Senior Memer, IEEE, Astrct Sensor networs re composed of lrge numer of low power sensor devices. For secure communiction mong sensors, secret eys re required to e estlised etween tem. Considering te storge limittions nd te lc of postdeployment configurtion informtion of sensors, Rndom Key Predistriution scemes ve een proposed. Due to limited numer of eys, sensors cn only sre eys wit suset of te neigoring sensors. Sensors ten use tese neigors to estlis pirwise eys wit te remining neigors. In order to study te communiction overed incurred due to pirwise ey estlisment, we derive proility models to design nd nlyze pirwise ey estlisment scemes for lrge-scle sensor networs. Our model pplies te inomil distriution nd modified inomil distriution nd nlyzes te ey pt lengt in op-y-op fsion. We lso vlidte our models troug systemtic vlidtion procedure. We ten sow te roustness of our results nd illustrte ow our models cn e used for ddressing sensor networ design prolems. I. INTRODUCTION Lrge-scle sensor networs re composed of lrge numer of low-powered sensor devices. According to [], te numer of sensor nodes deployed to study penomenon my e on te order of undreds or tousnds; depending on te ppliction, te numer my rec n extreme vlue of millions. Typiclly, tese networs re instlled to collect sensed dt from sensors deployed in lrge re. Witin networ, sensors communicte mong temselves to excnge dt nd routing informtion. Becuse of te wireless nture of te communiction mong sensors, tese networs re vulnerle to vrious ctive nd pssive ttcs on te communiction protocols nd devices. Tis demnds secure communiction mong sensors. Due to inerent storge constrints, it is infesile for sensor device to store sred ey vlue for every oter sensor in te system. Moreover, ecuse of te lc of postdeployment geogrpic configurtion informtion of sensors, eys cnnot e selectively stored in sensor devices. Altoug nïve solution would e to use common ey etween every pir of sensors to overcome te storge constrints, it offers we security. Mnuscript received Mrc 5; revised Ferury 6, April 6. D. Hung is wit te Deprtment of Computer Science & Engineering, Arizon Stte University, Tempe, AZ, USA (e-mil: dijing@su.edu. M. Met is wit Tumleweed Communictions. (emil: mnis.met@tumleweed.com. A. vn de Liefvoort nd D. Medi re wit te Deprtment of Computer Science nd Electricl Engineering, University of Missouri Knss City, USA (e-mil: ppie@umc.edu, dmedi@umc.edu. Rndom Key Predistriution (RKP scemes ([], [6], [5] nd [8] ve een proposed to provide flexiility for te designers of sensor networs to tilor te networ deployment to te ville storge nd te security requirements. Te RKP scemes propose to rndomly select smll numer of eys from fixed ey pool for ec sensor. Sensors ten sre eys wit ec oter wit proility proportionl to te numer of eys stored in ec sensor. Since te RKP scemes necessitte only limited numer of eys to e preinstlled in sensors, sensor my not sre eys wit ll of its neigor nodes. In tis cse, Pirwise Key Estlisment (PKE sceme is required to set up sred eys wit required frction of neigor nodes. Te PKE scemes require sensors to set up pirwise eys vi te nodes tt sre eys wit eiter or ot te sensors. Tis PKE pse involves communiction overed for finding te sortest pt to neigor node nd for setting up te pirwise ey troug tt pt. Te lesser te numer of eys preinstlled in ec sensor, te lower te proility tt sensor sres ey wit given neigor node. Consequently, te sensor requires more overed in te PKE pse wit te remining neigor nodes. Studies in [5] sow tt te energy consumption due to communiction in sensors is severl orders iger tn tt due to computtion overed. Te constrints suc s scrce ttery power nd limited storge necessitte reference model to study te trdeoff etween storge nd communiction overed involved during te PKE pse in RKP scemes. It my e noted tt te memory limittion of sensors restricts te numer of eys tt cn e preinstlled in ec sensor to smll numer. For exmple, te cpilities of sensor nodes for lrge-scle sensor networs cn e s limited s tose of Smrt Dust sensors [], [] tt ve only 8K of progrm nd 5 ytes for dt memory. Moreover, studies in [6] nd [8] sow tt smll ey pool size increses security vulnerilities. Tus, for lrge-scle sensor networs, smll numer of eys preinstlled in ec sensor nd lrge ey pool size result in smll vlue of proility (p tt two sensors sre eys (see ( in Section II-B.. Our studies sow tt te smller te vlue of p, te iger te numer of ops required to set up pirwise eys (A detiled nlysis is given in Section V. Anlyses presented in [6] nd [8] provide communiction overed in te PKE pse for up to 3 ops. Due to te restrictions mentioned ove, generl mtemticl model to study te communiction overed for te PKE pse is required. In tis pper, we propose proility model to nlyze

2 communiction overed requirements for te PKE pse in RKP scemes. Unlie te PKE sceme proposed in [8], our model is sed on te PKE sceme were sensors set up pirwise eys using only teir neigor nodes. Tis design significntly reduces te communiction overed involved in te PKE pse. Similr to te recent scemes in [], [6], [5], [8], [] nd [4], our model is sed on networs wit uniformly distriuted sensors. Our model pplies te inomil proility distriution nd modified inomil proility distriution (presented in Section III-B in op-y-op fsion. Tere re tree input prmeters to our model: proility of two sensors sring eys, verge numer of neigors of sensor, nd 3 proility tt two neigors of node sre eys nd re locted witin ec oter s communiction rnge. Our model cn e used for evluting te frction of neigors of sensor to wic it cn communicte securely. Furtermore, te model derives te proility tt for given sensor networ configurtion, every sensor cn securely communicte wit ll its neigors. We ten vlidte our model troug our proposed vlidtion procedure. Finlly, we use our model to nlyze te communiction overed in te PKE pse. Te rest of te pper is orgnized s follows: In section II, we provide necessry cground nd relted wor in te re of RKP scemes. Section III descries te proposed proility model for pirwise ey estlisment nd ey-grp connectivity. Section IV presents te vlidtion metodology nd results of our proposed proility model. Communiction overed nlysis of using our proposed model is given is Section V. Section VI summrizes te wor. II. BACKGROUND OF RANDOM KEY PREDISTRIBUTION SCHEMES Te gol [] of RKP scemes is to reduce te numer of preinstlled eys in ec sensor considering unnown postdeployment geogrpic configurtion. Te preinstlled eys cn elp te sensor to set up pirwise eys wit its neigors. Sensors locted witin sensor s communiction rnge re clled neigors of tt sensor. In tis pper, we use terms sensor nd node intercngely. In tis section, we first list pses for pirwise ey setup in RKP scemes. We ten provide generl mtemticl cground of RKP scemes in literture. Finlly, we present relted wor. A. Te Pses In Rndom Key Predistriution Scemes Four min pses for ey setup in RKP scemes re presented s follows:. Key predistriution pse: A centrlized ey server genertes lrge ey pool offline. Te ey server is ssumed to e protected nd no dversry cn re into te server to revel te eys. Te procedure for offline ey distriution is s follows: Generte lrge ey pool of size P. Rndomly select m different eys for ec sensor from te ey pool to form ey ring. c Lod te ey ring into te memory of te sensor. d Assign unique node identifier or ey ring identifer to ec sensor.. Sensor deployment pse: Sensors re rndomly piced nd uniformly distriuted in lrge re. Typiclly, te verge numer of neigors of sensor (n is muc smller tn te totl numer of deployed sensors (n. 3. Key discovery pse: Two steps re involved in te ey discovery pse. In te first step, ec sensor ttempts to discover sred ey(s wit ec of its neigors. To ccomplis tis, te sensor cn rodcst its ey ring identifier to its neigors. Te sensor cn lso use te secret discovery protocol specified in [], [7], [7] to discover te sred ey witout using clertext rodcst. After te first step of te ey discovery pse, te sensor nows ll its neigors. Te set of ll neigors of sensor i is represented y W i nd W i = n. Te set of neigors of sensor i wo sre t lest one ey wit te sensor i is represented y Q i. Te set of neigors of sensor i wo do not sre ny ey wit sensor i is represented y R i. Tus, we ve W i = Q i R i nd Q i + R i = n. In te second step, every sensor i rodcsts its set Q i. Using te sets received from neigors, sensor cn uild ey grp (see Definition sed on te ey-sre reltions mong neigors. 4. Pirwise ey estlisment pse: If sensor i sres t lest one ey wit given neigor ( neigor in set Q i, te sred ey(s cn e used s teir pirwise ey(s. For ec of te neigors in set R i, sensor i uses te ey grp uilt during ey discovery pse to find ey pt (see Definition vi te neigors in set Q i to set up pirwise ey. Once pirwise ey is set up wit neigor in set R i, te neigor is included in set Q i nd deleted from set R i. Te ove PKE procedure cn e cieve y using source-routing sed pirwise ey PKE protocol [3]. Te gol of te PKE pse for sensor i is to set up pirwise eys wit its neigors in set R i nd stisfy f = Qi W i c, were c is te frction of te totl numer of neigors of sensor i tt re required to e reced. Definition (Key grp: A ey grp mintined y node i is defined s G i = (V i, E i were, V i = {j j W i j = i}, E i = {e j j, V i W j j W js}, S is reltion defined etween two nodes if tey sre t lest one ey fter te ey discovery pse. Definition (Key pt: A ey pt etween node A nd B is defined s sequence of nodes A, N, N,..., N j, B, suc tt, ec pir of nodes (A, N, (N, N,..., (N j, N j, (N j, B s t lest one sred ey fter te ey discovery pse. Te lengt of te ey pt is te numer of pirs of nodes in it. B. Mtemticl Foundtions of Rndom Key Predistriution Sceme An importnt proility (p is te proility tt two nodes sre t lest one ey fter te ey predistriution pse []. We first stte tis result ere for completeness. We ten

3 3 TABLE I COMPARISON OF EXISTING RKP SCHEMES Bsic sceme[] q-composite[6] Grid-sed[5] s-rkp[8], [5] -pt[6], [] Key pool (P unstructured unstructured structured structured unstructured Key selection (m RWR RWR restricted rndom restricted rndom RWR Sred-ey discovery CB/PSD CB/PSD CB/PSD CB/PSD CB/PSD Numer of ey pts one-pt one-pt one-pt one-pt -pt Communiction overed nlysis n/ prtil n/ prtil n/ RWR: rndom witout replcement. : Tey only present te nlysis for ey pt lengt nd 3. CB/PSD: cler-text rodcsting or privte sred-ey discovery. give two pproces proposed in te literture tt re used for computing te ey grp connectivity. Te proility tt two nodes sre t lest one ey (p : Given ey pool of size P nd tt ec sensor is loded wit rndomly selected m different eys from te ey pool, te proility tt two sensors sre t lest one ey is given s (for proof, see []: ( P P m p = m( m ((P m! = (P m!p!, ( ( P m (were P > m. Rndom grp pproc (RGA : An pproximtion metod to compute ey grp connectivity is proposed y Escenuer nd Gligor []. Teir metod utilizes te rndom grp teory []. Given desired proility of te grp connectivity P c = e e c, p l is te glol two-node connectivity proility tt lin exists etween ny two nodes: p l = ln(n n + c n, were n is te totl numer of sensors in te system. Using p l, we cn derive te locl two-node connectivity proility (p y mplifying p l wit fctor (n /n. Here, p is te estimted proility tt node sres ey wit ny of its neigors, were n is te verge size of its neigorood. p = n n p l. Note tt in [8], te utors define te P c s te proility for glol ey grp connectivity nd te p s te proility for te locl ey grp connectivity. Te RGA uses te proility of glol ey grp connectivity to estimte te locl ey grp connectivity. Tis pproc does not provide te ey pt lengt informtion of ey grp tt cn e useful in design of pirwise ey estlisment scemes. Moreover it estimtes te ey grp connectivity nd produces inconsistent results wen te neigorood size n is reltively smll (see our vlidtion results in Section IV-E. 3 Are covering pproc: Du et l. [8] uses te re covering pproc to nlyze te proility tt node cn set up pirwise eys wit ny of its neigors. Tey clculte te two-node connectivity proility s function of te overlpped rnge sred y sensor wit its neigors. During te PKE pse, te intermedite nodes my not necessrily e locted witin te source node s communiction rnge. Tus, te sensor cnnot determine ey pts to set up pirwise eys wit its neigors. In oter words, te ey setuequests must e flooded insted of using cosen pts. Consequently, te communiction overed invoed y te pirwise ey requests is proiitively ig. Moreover, te re covering pproc is sed on te nlysis of geogrpicl loctions of nodes on ll possile ey pts. For te pt lengt greter tn 3, te nlyses of te node loctions nd te grpicl representtions re very complicted. In teir wor in [8], te utors only present te nlyses for ey pts wit lengts nd 3. C. Relted Wor Te first RKP sceme ws proposed y Escenuer nd Gligor [], nd we cll it te sic sceme. Te proposls tt followed re ll sed on te sic sceme nd tey propose improvements in terms of security. Te proposed improvements focus on tree spects: ey pool structure [8] [5], ey selection tresold [6], nd pt-ey estlisment protocol [6] []. Tle I sows five recent proposls nd te sic sceme. Cn et l. [6] proposed te q-composite sceme. In tis sceme, te ey selection tresold is set to q. To form secure lin, te sceme requires t lest q sred eys etween two nodes. Te structured ey pool sceme (s-rkp [8] proposed y Du et l. nd Grid-sed sceme [5] proposed y Liu nd Ning cnge te unstructured ey pool to structured ey pool. Te structured ey pool is formed y multiple ey spces. Witin ec ey spce, te ey spce structure uses te group ey sceme proposed y Blom [] nd furter developed y Blundo et l. [3]. Bot q-composite sceme nd -pt sceme [] use ey pts ( to setup pirwise ey. Te -pt sceme uses secret sring sceme to setup pirwise ey. In ll presented scemes, during te ey discovery pse, ot te cler-text rodcst discovery nd te privte sre-ey discovery sceme re specified. Clerly, te privte sre-ey discovery pproc involves more communiction overed. It my e noted tt te ey-grp connectivity prolem we ve considered ere s some similrity to glol networ connectivity prolems, i.e., te connectivity of n entire In teir proposed sceme, pirwise ey cn e derived y exclusive-or opertions on secret sres received from pts. Specified in [], using privte sre-ey discovery, for every ey on ey ring, ec node could rodcst of list α, E Ki (α, i =,...,, were α is cllenge. Te encryption of E Ki (α wit te proper ey y recipient would revel te cllenge α nd estlis sred ey wit te rodcsting node.

4 4 TABLE II NOTATIONS i numer of nodes selected on op i n Totl numer of sensors in te networ n Te verge numer of sensors witin sensor s rnge p Proility tt two sensors sre t lest one ey efore te PKE pse. p p = p p c Te proility tt ny two neigors of sensor re witin ec oter s rnge p p = p p c p p = p Te proility tt sensor cn set up pirwise ey wit given neigor wit exctly ops ( Te proility tt sensor cn set up pirwise ey wit given neigor witin ops p con Te proility tt sensor cn set up pirwise eys wit ll of its neigors witin ops networ; compreensive study on grp connectivity cn e found in [8]. Te recent wor y Xue nd Kumr [] ddresses te connectivity of wireless networs y inspecting te miniml numer of neigors in order to cieve glol connectivity. Note tt ot tese wors cieve networ connectivity of te entire grp. In our cse, te ey-grp connectivity is from te point of view of ec individul sensor (node wen glol nowledge/connectivity is not nown/possile due to limited storge nd communiction ility t ec sensor. In our sensor networ model, two neigoring sensors must e pysiclly visile vi direct wireless lin in order to set up direct ey in teir ey grps; in oter words, te wireless lins outside of sensor s communiction rnge re considered to e invisile for tt sensor. Consequently, given te storge nd communiction restrictions, we study te following prolem: te proility tt node cn estlis ey wit one or ll of neigors witin -op visile ey pt(s. III. PROBABILITY MODEL FOR PAIRWISE KEY ESTABLISHMENT In tis section, we nlyze te PKE pse of RKP sceme for lrge numer of sensors uniformly distriuted witin vst -dimensionl re. Te uniform distriution of sensors ws introduced in [] nd extensively utilized in mny proposls, suc s [6], [5] nd [8]. We derive ere te proility tt node cn rec ny of its neigors wit exctly ops nd te proility tt node cn rec ll of its neigors witin ops. Nottions used for tis wor re summrized in Tle II. A. Computing p c nd p In order to model te proility tt sensor cn set up pirwise ey wit ny of its neigors wit exctly ops, we first determine te proility tt ny two neigors, sy j nd, of sensor, sy i, re witin ec oter s rnge tis proility is denoted y p c. Our nlyticl pproc requires result on expected re of overlegion, A(x, given in [6]. In order to review tis result, consider Fig. ; we cn drw two circles wit centers s sensor node i nd j nd ec wit communiction rdius r resemling te rnge of sensors. Te Fig.. i r x c Overlpped Region Between Two Sensor Nodes. distnce etween i nd j is x. Te cumultive distriution function for te distnce etween node nd one of its neigors is given y F(x = Pr(distnce x = x /r. Tus, te proility density function is f(x = F (x = x/r. Te re of te overlpped region cd is: A cd (x = r cos ( x r x r x 4. Te expected re of te overlpped region is given y [6]: A(x = r j A cd (xf(x = (π r =.5865πr. As sown in Fig., node must e locted witin te sded region cd in order to e in node i s nd node j s rnge simultneously. On n verge, p c is te rtio of te sded re to te wole re of te circle. Using te result for A(x, we cn ten determine p c s d p c =.5865 πr /(πr = ( Furtermore, given node i nd its rnge, te proility tt ny two nodes witin te rnge of node i sre ey nd re in ec oter rnge is given s: p = p c p. (3 In our cse, p =.5865 p due to (. It my e noted tt p is computed sed on te ssumption tt every sensor s circulr communiction rnge wit equl rdius. Oter mecnisms cn e devised to find p for different configurtions. However, ny different mecnism will not ffect our proility model introduced in Section III-B nd Section III-C. B. Computing Te sic ide eind our pproc is te proility of node selection on ec op. Te selection follows te inomil distriution or modified inomil distriution. Te inomil proility mss function for given n nd p is represented s: f(n, p = ( n p ( p n, =,...,n. Te modified inomil proility mss function is represented s follows: ( n f(n, p, p = p ( p n, =,...,n (4 were proilities p nd p need not e te sme.

5 5 stge A stge C stge B su-stge B stge A stge C su-stge B - - stge C = - - n'- n'- nodes n'- - n'- nodes n'- nodes ( = ( = (c 3 Fig.. Node selection for computing. Fig. gives grpicl view of our pproc. Node is sensor tt wnts to set up pirwise ey wit one of its neigors, sy node. s rnge contins n nodes including te node. is te proility tt node cn set up pirwise ey wit given neigor wit exctly ops. As sown in Fig., our eqution is derived in tree stges. Stge C lwys represents te finl stge tt node cn rec node ; stge B represents ll te intermedite ops wen 3; nd stge A represents te first op wen. For =, s sown in Fig. (, tere is no intermedite node. Terefore, p is te proility tt node sres t lest one ey wit node. If node nd node sre ey(s, te sme ey(s cn e used s pirwise ey(s nd no dditionl ey setup is required. Oterwise, tey cnnot set up pirwise ey(s directly nd must go troug te PKE pse to set up pirwise ey(s. Tus, we ve: ( = p. (5 Te cse for = is sown in Fig. (. In stge A, we select nodes from n nodes s te first op nodes wo sre t lest one ey wit node, were =,...,n. Since our gol is to derive te proility tt node is recle wit exctly ops, once node is fixed, we cn only select t most n nodes s te first op nodes. We ( n (p ( p n for n now ve te eqution p = stge A. Tis eqution cn e interpreted s follows: out of n nodes re selected for te first op; te proility tt nodes sre eys wit node is (p ; te proility tt n nodes do not sre eys wit node is ( p n ; lso, in ec selection, we ve te condition tt node does not sre eys wit node (represented y p = p. Following stge A, is te stge C in te second op. Any selected node in stge A my sre eys wit node. Tus te proility tt t lest one of te selected nodes in stge A sres ey wit node is given s: p, in wic p mens tt ll selected nodes in stge A do not sre ey wit node. It my e noted tt te proility tt node selected in stge A sres eys wit node is p, s derived in Section III-A. Tus, we ve, n ( n ( = p (p ( p n ( p. (6 = For = 3, s sown in Fig. (c, tere exists tree stges. In stge A, te mtemticl expression is similr to te expression we presented for =. One difference ( n (p p ( p n is n is tt eqution p = cumultive modified inomil distriution function multiplied y p (using (4, p = p p, p = p. Te expression (p p stnds for te condition tt none of te nodes selected for te first op sre eys wit node nd node simultneously. Since tere must e t lest one node ville on op, te mximum numer of nodes tt cn e selected from n cndidte nodes is n. In stge B (only sustge B exist wen = 3, te formul is cumultive inomil distriution function tt nodes re selected from te remining nodes (n nodes fter te selection for te first op nd ec of te nodes sres t lest one ey wit t lest one of te nodes. Te expression for stge B is ( n ( p ( p n. given s: n = All te nodes selected for tis op re eligile to connect to node. Te expression of stge C is p, wic mens tt t lest one of te nodes sres ey wit node. Using te expressions of ll te stges, we derive te following eqution for = 3: (3 = n p = n = ( n (p p ( p n. ( n ( p ( p n ( p. (7 For 4, tere exists tree stges; see Fig. (c. Te nlysis of stge A is te sme s tt for = 3. We ve te expression p n + ( n = (p p ( p n for stge A. Tere re two su-stges in stge B, we denote tem s B nd B. Te expression of sustge B represents te formuls from op to op. It represents itertive process tt is used on ec op. In oter words, on op i, i nodes re selected from te left over nodes of previous i ops. For exmple, on op, we select nodes from n nodes. We now sow induction s follows: on op i, we cn select i nodes from n i j= j nodes. Following (4, p = ( p i p sows te proility of selection of

6 6 stge C stge A stge C stge A stge B stge C - - n' nodes ( = n' nodes ( = n' nodes (c 3 Fig. 3. Node selection for computing p con. node tt sres t lest one ey wit t lest one of te i nodes in te op i nd tis selected node does not sre ey(s wit node ; p = p i represents te proility tt node does not sre ny ey wit i nodes in te op i. For ec op i, te vlue of i s to e less tn n + i i j= j to gurntee tt t lest one node is ville t ec of te ops from i + to. Te su-stge B represents te op. As discussed in te nlysis of (3, te nodes selected for op re ll eligile to sre ey wit node. Te nlysis of stge C is te sme s tt of stge C for = 3. Tus, we rrive t: ( 4 + n = p = i= ( n (p p ( p n i X n + i j i= j= i X n i j= j [( p i ] i ( p p i n X n j j= = X n j= j ( ( n p p ix j j= X j j= ( p. (8 Te proility tt node cn rec ny of its neigors witin ops is represented s (. Te formul is ten given s: ( = (i, (9 i= were (i is s derived for different vlues of i erlier in tis section. Note tt (9 is not dependent on rdius r nor on te totl numer of sensors n; it is dependent on n, p, nd p. C. Key Grp Connectivity In tis susection, we study te ey grp connectivity of given sensor networ. A grp is sid to e connected if ny two of its vertices cn e joined y pt, disconnected oterwise [4]. We sy tt ey grp, G i, is -op-connected t vertex i if vertex i cn rec ny oter vertex of te ey grp wit pt no more tn ops in lengt. We now derive te proility tt ey grp, G, mintined y node is -op-connected. Our eqution derivtion includes tree stges s sown in Fig. 3. Tere re n nodes witin s rnge. p con is te proility tt te ey grp G is -op-connected. Stge C lwys represents te finl op in wic node cn rec ll its neigors; stge B represents ll te intermedite ops wen 3; nd stge A represents te first op wen. We first present te formul for = (see Fig. 3(. It is esy to see tt p con ( is: p con ( = (p n. ( For =, s sown in Fig. 3(, tere re two stges: te first stge A nd te finl stge C. In stge A, out of n nodes ( n re selected for te first op. Tis is inomil proility mss function wit proility p. Tus, we ve te inomil proility distriution n ( n = p p (n to represent te first op. Unlie in expressions for (, te vlue of for p con ( cn e n. In stge C, te proility tt ec of n nodes sres t lest one ey wit t lest one of te nodes is given y p. Ten, te proility of connecting to ll n nodes on op is ( p n. Te p con ( is given s follows: p con ( = n = ( n p ( p n ( p n. ( For 3, s sown in Fig. 3(c, tere re tree stges. Te nlysis nd mtemticl expression of stge A re te sme s tt for =. Tere re ops in te stge B. For op, we select nodes from n nodes tt sre eys wit nodes in op. Now, we cn do induction s follows: in op i, we cn select i nodes from n i j= j nodes; it is inomil proility mss function wit te proility p i tt ec of i op nodes sres t lest one ey wit t lest one of te i op nodes nd n i j= j nodes do not sre ey(s wit i op nodes. Ten, we

7 7.9.9 Accumulte Poisson Distriution Accumulted Norml Distriution Numer of neigors (n Communiction rdius (r Fig. 4. Cumultive Poisson Distriution, r =. Te verge numer of neigors of sensor is n = ρπr = 5. Fig. 5. δ =. Cumultive Norml Distriution, r =. δ =.5r =.5 nd conclude tt te stge B is sequence of cumultive inomil distriution functions nd ec successive function depends on te previous op nodes selection. Te nlysis of stge C is te sme s tt for =. Ten, we ve te following expression for 3, p con ( 3 n ( n = p ( p n = i= i X n j j= i= ( p i n n i X j= ix j= i j ( p i i j ( X n j p j=. ( In order to deploy sensor system using RKP scemes, we first select different vlues of p nd plug tem into (-( to find out suitle vlue of p to cieve te required vlue of connectivity proility p con. Once p is found, we cn pply ( to select te proper P (ey pool size nd m (te numer of eys to e preinstlled in sensor. IV. VALIDATION METHODOLOGY AND RESULTS In (3 (, we ve te following ssumptions: ec sensor cn communicte directly wit n neigors, were n is te verge numer of neigors of sensor, ec sensor s te sme communiction rdius r, nd 3 p is fixed vlue. Here, troug systemtic pproc, we sow tt our mtemticl derivtions sed on ove ssumptions re sound pproximtions. We consider following two prmeters in our vlidtion: te numer of neigors of sensor, nd te communiction rdius of sensor. We lso consider two different distriutions: sensors re uniformly distriuted witin vst re, nd sensor s communiction rdius follows norml distriution wit men r nd stndrd devition δ or uniform distriution witin te intervl [r δ, r + δ]. A. Numer of Neigors of Sensor We consider A to e lrge sensor deployment re, i.e., A π(r were r is te verge trnsmission rnge of sensor nd A = π(r. We define ρ = n/a is te sensor deployment density. Te proility tt node is plced witin re A is p = A /A. Proility, p(x, tt x of n nodes re plced in te re A is: ( n p(x = n = n p n ( p n n. (3 Wen n nd A A, we cn pproximte tis solution wit Poisson distriution [9]: p(x = n (npn n e np! (n A A n A n n e A! (ρa n n! e ρa (ρπr n n e ρπr. (4! Te cumultive poisson distriution function P(X is: P(X = e ρπr X n = Te verge numer of neigors of sensor is: (ρπr n n. (5! n = ρπr. (6 In order to ssign numer of neigors of sensor, we cn simply mp uniform distriution in te rnge of [, ] to te cumultive poisson distriution. For exmple, for ec sensor, we rndomly select numer witin te rnge [, ] (y-xis in Fig. 4; sed on te istogrm sown Fig. 4, we cn find its corresponding x-coordinte, wic is te numer of neigors ssigned to te sensor.

8 8 c r r r j x i c r r r i x j d i r r r x c r j d d r r, r r r r r, r r Fig. 6. Coverge re wit different communiction rdius. B. Generting p We ssume tt sensors ve verge communiction rdius r wen tey re sipped out of fctories. We consider ot norml distriution nd uniform distriution to model te communiction rdius of sensor. We use men r nd stndrd devition δ =.5r. We cn esily derive te proportion of distriution tt is elow given numer of stndrd devitions from te men. It cn e sown tt only.3% of te popultion will e less tn or equl to vlue two stndrd devitions elow te men. Similrly, te sme portion tt is ove te men. Using te similr mpping tecnique, we cn drw te cumultive norml distriution function for sensor s communiction rdius. For exmple, sown in Figure 5, we cn rndomly select vlue from te y- xis (witin te intervl of dsed lines; ten we cn ssign te rdius of sensor from te x-xis to sensor. Note tt te vlue selected for sensor is witin δ from te men r. In te cse of uniform distriution, we rndomly select rdius witin te rnge [r δ, r + δ] for ec sensor. In rel world, te communiction rdii of sensors re of vrying lengt. Fig. 6 sows te coverge re of sensors in tree different scenrios. Sensor i (wit communiction rdius r s two neigors j nd wit communiction rdii r nd r, respectively: were r r, r, r r r (te nlysis of te scenrio r r r is te sme, nd 3 r, r r. In ll our following nlysis, we ssume r r. In order to set up pirwise eys, two sensors must e locted witin ec oter s communiction rnge. In Fig. 6, te sde re is te intersected coverge re etween two sensors wit smller communiction rdii. It is esy to prove tt, in ll tree scenrios, te intersected coverge re used to compute p c is te intersected re of two sensors wit less communiction rdii. We note tt, in te scenrio r, r r sown in Fig. 6, if is locted in te re etween te dsed circle (centered y node i wit rdius r nd te circle centered y i (wit rdius r, node will not consider i s its neigor. Tus node must locted witin te sde re. Te re cd sown in Fig. 6 is: A cd (x = cos ( γ + x γ xγ + cos ( γ + x γ xγ γ γ S(S x(s γ (S γ, (7 were S = (x+γ +γ /, γ nd γ represent two of te less communiction rdii of r, r, nd r (we ssume γ γ. In Section III-A, we presented te cumultive distriution function for te distnce etween te node nd one of its neigors wit F(x = Pr(distnce x = x /r, were we ssume ec node s te sme communiction rdius r. Te proility density function is f(x = df(x/dx = x/r. For te sensor networ wit different communiction rdii, we ve te proility density function f(x = df(x/dx = x/γ. Tus, te expected coverge re cd is given y: A(x = γ Ten, we cn compute p c s follows: nd, p is computed using (3. C. Vlidtion Procedure A cd (xf(xdx. (8 p c = A(x/πr (9 Our im ere is to vlidte te soundness of proility models nd p con derived erlier in Section III. We use te following procedure to estimte nd p con to compre ginst te models presented in Section III:. Select n to e verge numer of neigors for sensor.. For te verge communiction rdius of sensors, r, use te exponentil mpping metod presented in Section IV-A to find te numer of neigors of sensor. 3. Select distriution for ec neigor, nd use te metod presented in Section IV-B to ssign rdius for ec sensor. 4. Use (7 (9 to compute p c for ec pir of neigors, nd ten use (3 to derive te proility p for te sme. Bsed on te derived vlue of p, ssign pirwise eys for ec pir of neigors. 5. Compute nd p con sed on te steps to 4 descried ove. Te ove procedure is run 3, times for ec distriution selected in step-3, nd ten te verge vlue for nd p con is otined over te 3, runs; note tt we consider uniform nd norml distriution seprtely for tis step.

9 9 Rdius r follows Uniform distriution rdius= rdius=3 rdius=5 teoreticl Numer of ops (n =,p =. rdius= rdius=3 rdius=5 teoreticl Numer of ops (n =,p =..3 rdius= rdius=3. rdius=5 teoreticl rdius= rdius=3 rdius=5 teoreticl Numer of ops (n =3,p =. rdius= rdius=3 rdius=5 teoreticl Numer of ops (n =3,p =..6 rdius=.4 rdius=3 rdius=5 teoreticl rdius= rdius=3 rdius=5 teoreticl Numer of ops (n =5,p =. rdius= rdius=3 rdius=5 teoreticl Numer of ops (n =5,p =. rdius= rdius=3 rdius=5 teoreticl Numer of ops (n =,p =.3 Numer of ops (n =3,p =.3 Numer of ops (n =5,p =.3 ( n = ( n = 3 (c n = 5 Rdius r follows Norml distriution rdius= rdius=3 rdius=5 teoreticl Numer of ops (n =,p =. rdius= rdius=3 rdius=5 teoreticl Numer of ops (n =,p =..3 rdius= rdius=3. rdius=5 teoreticl rdius= rdius=3 rdius=5 teoreticl Numer of ops (n =3,p =. rdius= rdius=3 rdius=5 teoreticl Numer of ops (n =3,p =..6 rdius=.4 rdius=3 rdius=5 teoreticl rdius= rdius=3 rdius=5 teoreticl p r Numer of ops (n =5,p =. rdius= rdius=3 rdius=5 teoreticl p r Numer of ops (n =5,p =. rdius= rdius=3 rdius=5 teoreticl p r Numer of ops (n =,p =.3 Numer of ops (n =3,p =.3 Numer of ops (n =5,p =.3 (d n = (e n = 3 (f n = 5 Rdius r follows Uniform distriution.5 x rdius= rdius=3 rdius=5 teoreticl p con Numer of ops (n =,p =. rdius= rdius=3 rdius=5 teoreticl p con Numer of ops (n =,p =. Numer of ops (n =,p =.3 (g n = rdius= rdius=3 rdius=5 teoreticl p con rdius= rdius=3 rdius=5 teoreticl p con Numer of ops (n =3,p =. rdius= rdius=3 rdius=5 teoreticl p con Numer of ops (n =3,p =. Numer of ops (n =3,p =.3 n = 3 rdius= rdius=3 rdius=5 teoreticl p con rdius= rdius=3 rdius=5 teoreticl p con Numer of ops (n =5,p =. rdius= rdius=3 rdius=5 teoreticl p con Numer of ops (n =5,p =. rdius= rdius=3 rdius=5 teoreticl p con Numer of ops (n =5,p =.3 (i n = 5 Rdius r follows Norml distriution.5 x 3.5 rdius= rdius=3 rdius=5 teoreticl p con Numer of ops (n =,p = rdius= rdius=3 rdius=5 teoreticl p con Numer of ops (n =3,p =...5 rdius= rdius=3 rdius=5 teoreticl p con Numer of ops (n =5,p = rdius= rdius=3 rdius=5 teoreticl p con Numer of ops (n =,p =. Numer of ops (n =,p =.3 rdius= rdius=3 rdius=5 teoreticl p con rdius= rdius=3 rdius=5 teoreticl p con Numer of ops (n =3,p =. Numer of ops (n =3,p =.3 rdius= rdius=3 rdius=5 teoreticl p con rdius= rdius=3 rdius=5 teoreticl p con Numer of ops (n =5,p =. rdius= rdius=3 rdius=5 teoreticl p con Numer of ops (n =5,p =.3 (j n = ( n = 3 (l n = 5 Fig. 7. n =, 3, 5, p =.,.,.3, rdius =,, 3. (-(f: vlidte ; (g-(l: vlidte p con.

10 TABLE III THE CONNECTIVITY PROBABILITY FOR ey grp: ( METHOD VS. D. Vlidtion Results p con METHOD VS. RGA METHOD ( p con RGA n (p (p (p : = 5 nd ( 5 >.99999, : = 5 nd p con (5 >.99999, : P c =.99999, n =. In Fig. 7, we plot computed verge vlue from te vlidtion procedure nd te teoreticl result derived from our proposed proility models (see su-figures ( (f nd p con (see su-figures (g (l. In Fig. 7, ec sufigure sows tree scenrios wit p =.,.,.3 for different vlues of n =, 3, 5 were ec plot considers tree vlues or rdius t, 3, 5 to compre ginst te teoreticl result. We ssume tt sensor s communiction rdius follows eiter uniform distriution wit te rnge r δ r + δ, or norml distriution wit men r nd stndrd devition δ in our vlidtion process. Our results sow tt te proposed proility models fit te metod used for vlidtion. Reders migt notice te gps etween te simultion results nd teoreticl results in figures (g (l. Note owever tt te evluted proilities (see y-xis re very smll; tus, tis difference s less prcticl significnce, nd our nlyticl model cn e considered to e very ccurte. E. Comprison of ey grp connectivity metods Next, we compre ey grp connectivity. We cn find te ey grp connectivity proility y using ny of te following tree metods: Using te proility tt node connects to ny of its neigors witin ops (see (9, we cn derive te frction of neigors of node for wic te pirwise eys cn e set up witin ops. Tis pproc only provides te numer of neigors (cn e derived y n tt connect to node witin ops. Wen, node cn set up pirwise eys wit prcticlly ll its neigors, ten we cn sy te ey grp is connected. Te second metod is s descried in Section III-C (see (-(. To strt wit, tis metod only considers directly recle nodes nd pirwise-ey sring reltions mong sensors witout considering te geogrpicl loction of ec sensor, wic significntly reduces te nlyticl complexity. In ddition, it provides te ey pt lengt informtion wic is vlule for sensor networ designers to evlute or design sensor system. Te tird evlution metod, RGA, is s descried in Section II-B. wic is y []. In Tle III we compre te tree pproces. Note tt te RGA metod requires te totl numer of sensors (n wile our pproc does not. We find tt te RGA metod my produce inconsistent result, especilly wen te neigorood size is reltively smll, for exmple, p > wen n. In ddition, compred to p con metod, te RGA metod requires iger p vlue wen n < 4 nd lower p vlue wen n > 4. Since our model s een vlidted vi simultion (see Section IV-D, our comprtive results in Tle III sow tt te RGA metod will result in inccurte prmeter settings in sensors. F. Using Connectivity or ( to Deploy Sensor Networs Our model llows to nswer questions suc s Cn our proposed nlyticl model elp sensor networ designers to deploy sensor networs nd evlute rndom ey predistriution (RKP sceme wit given storge constrints nd networ configurtions?. We riefly illustrte tis spect. For instnce, we migt ve te following requirements: Deploy uniformly-deployed sensor networ suc tt ec node cn estlis pirwise eys, witin 5 ops, to % of ll its neigoring sensors. Tis requirement cn e trnslted to te following prmeters used in our model, i.e., p con = nd = 5. Once p con is fixed, we need to determine te importnt RKP prmeter, p. Recll tt te selection of p is determined y evluting Eqution (. Since p con nd re nown, tere re tree vriles in Eqution (; tey re n, p, nd p. From Eqution (3, we now tt p is function of p. Tus, te prolem trnsltes to solving Eqution ( in order to determine unnowns n nd p. Reltions etween different vlues of nd p so determined cn e found in Tle III. For exmple, if we coose n = 3, ten p =.649. In fct, we cn crete multiple similr tles wit different connectivity requirements. Te next step is to determine RPK sceme prmeters. We coose tree RKP scemes for our nlysis. Tey re: sic sceme, q-composite sceme, nd s-rkp sceme (see Tle I. Te mtemticl representtions of p for ec RKP sceme re given in Section II-B. nd in Appendices A nd B. For dditionl informtion out tese scemes, refer to te pulictions [], [6], nd ([5], [8]. Tus, we cn use equtions (, (, nd ( to determine te numer of eys to e instlled in ec sensor nd te size of te ey pool. Bsed on te ove discussion, it is esy to see tt our nlyticl model provides nice mtemticl representtion for ey-grp connectivity for given numer of ops. Tis model cn elp networ designers to evlute te communiction overed (restricted y te numer of ops, i.e., wit te considertions of storge cpility of sensors (i.e., te vlue of m. n

11 TABLE IV COMMUNICATION OVERHEAD ANALYSIS FOR ( AND ( 8.5 (i Weigt (i Weigt (i Weigt (i Weigt Hop (i n = (% n = 3 (% n = 5 (% n = 7 (% ( ( V. COMMUNICATION OVERHEAD ANALYSIS In tis section, we use our proposed proility model to nlyze te communiction overed involved in te PKE pse. We nlyze te required numer of ops to set up pirwise ey nd te communiction overed for PKE distriuted on ec op. Since sensors estlis pirwise eys vi only te neigors nodes in our model, our nlysis is sed on te verge numer of neigors (n nd is independent of te size of te sensor networ (n. Te numer of neigors (n of sensor is usully less tn. For our computtions, wen (.99999, we ssume tt sensor cn set up pirwise eys wit ll its neigors witin ops. We refer to te condition ( p s p-frction -connected condition. A specil cse wen ( is referred to s strong -connected condition. In Tle IV, we sow proility under te conditions strong 4-connected nd.5-frction 8- connected. It my e noted tt te communiction overed during pirwise ey estlisment for strong -connected sensor networs is minly distriuted witin first 3 ops. As sown in Fig. 8, wit increses in te neigorood size, te pirwise ey estlisment communiction overed sifts from op to op nd drops drmticlly on op 3. On te oter nd, te pirwise ey estlisment communiction overed for.5-frction -connected sensor networ is distriuted in more tn 3 ops. Fig. 9 sows tt te proility curves ecome fltter wit increse in te neigorood size nd te proility pes sift to iger op numers. We define te communiction weigt on op i s (i/ (. We notice tt te igest communiction weigt for ec curve lso sifts to iger op numer wit increse in te neigorood size. Tus, we summrize our findings s follows: For strong -connected ( (.99999: te pirwise ey estlisment communiction overed is minly distriuted witin first tree ops. te pirwise ey estlisment communiction overed sifts from te first op to te second op wen n increses ( n. Proility tt two nodes sre ey(s (p r Communiction weigt for ec op (% (<=3>= n = n =3 n =5 n =7 3 Numer of ops Numer of ops n = n =3 n =5 n =7 Fig. 8. Sensor networ ey estlisment communiction overed distriution for ( For p-frction -connected ( < (.99999: For given n nd mximum numer of ops, wen ( decreses, te pirwise ey estlisment communiction overed sifts from lower numer ops to iger numer ops, te vlue of te pe proility decreses nd sifts to iger numer op, te proility curve ecomes fltter, nd p (= ( decreses (see te cnges from Fig. 8 to Fig. 9. For given ( nd te mximum numer of ops, wen n increses, te pirwise ey estlisment communiction overed sifts from lower numer ops to iger numer ops, te vlue of te pe proility decreses, te proility curve ecomes fltter, nd te p (= ( decreses (see Fig From findings nd, we me following oservtions: for fixed n nd te mximum numer of op, te decreses of ( cuses decrese in p ; for fixed given (, te increses in n cuses decrese in p ; te increse in te mximum numer of llowed ops lso cuses decrese in p. Tese oservtions for

12 Proility tt two nodes sre ey(s (p r Communiction weigt for ec op (% (<=8>=.5 n = n =3 n =5 n =7 Numer of ops Numer of ops n = n =3 n =5 n =7 Fig. 9. Sensor networ ey estlisment communiction overed distriution for ( 8.5. te PKE pse led us to te study of trdeoff etween te communiction overed, wic is restricted y, nd te storge overed of sensor, wic is restricted y p. It my e noted from ( tt for fixed P, te smller te p te smller te m. On te oter nd, te smller te mximum numer of ops, te lesser te communiction overed involved. Te exct trdeoff study etween p nd for different scenrios requires dditionl nlysis wic is out of scope of tis pper. VI. SUMMARY In tis pper, we ve derived two nlyticl proility models for lrge-scle sensor networs to nlyze te PKE pse for RKP scemes. Troug vlidtion procedure, we sow te roustness of our mdoels. Our models cn elp designers to nlyze te PKE pse for RKP scemes in following wys: to study te ey grp connectivity, wic in turn elps to determine te numer of eys to e preinstlled in ec sensor nd te rnge of sensor, nd te pirwise ey estlisment pt lengt cn elp in determining te communiction overed during pirwise ey estlisment nd ten evlute if designed te PKE sceme fulfils te energy consumption requirements for sensor. Te softwre for te nlyticl models nd te vlidtion process re ville t ttp:// dmedi/softwre/. REFERENCES [] I. F. Ayildiz, W. Su, Y. Snrsurmnim, nd E. Cyirci, A survey on sensor networs, IEEE Communictions Mgzine, vol. 4, pp. 4, August. [] R. Blom, An optiml clss of symmetric ey genertion systems, in EUROCRYPT 84, ser. Lecture Notes in Computer Science, vol. 9. Pris, Frnce: Springer-Verlg, 985, pp [3] C. Blundo, A. D. Sntis, A. Herzerg, S. Kutten, U. Vccro, nd M. Yung, Perfectly-secure ey distriution for dynmic conferences, Informtion nd Computtion, vol. 46, no., pp. 3, 998. [4] B. Bolloás, Modern Grp Teory. Springer-Verlg, 998. [5] D. W. Crmn, P. S. Kruus, nd B. J. Mtt, Constrints nd pproces for distriuted sensor networ security, NAI L, Tec. Rep., Septemer. [6] H. Cn, A. Perrig, nd D. Song, Rndom ey predistriution scemes for sensor networs, in Proceedings of 3 Symposium on Security nd Privcy. Los Almitos, CA: IEEE Computer Society, 3, pp [7] R. Di Pietro, L. V. Mncini, nd A. Mei, Efficient nd resilient ey discovery sed on pseudo-rndom ey pre-deployment, in Proceedings of 8t Interntionl Prllel nd Distriuted Processing Symposium (IPDPS 4, April 4. [8] W. Du, J. Deng, Y. S. Hn, nd P. K. Vrsney, A pirwise ey pre-distriution sceme for wireless sensor networs, in Proceedings of t ACM Conference on Computer nd Communictions Security (CCS 3, Octoer 3, pp [9] W. Du, J. Deng, Y. S. Hn, P. Vrsney, J. Ktz, nd A. Klili, A pirwise ey pre-distriution sceme for wireless sensor networs, ccepted y te ACM Trnsctions on Informtion nd System Security, 5. [] L. Escenuer nd V. D. Gligor, A ey-mngement sceme for distriuted sensor networs, in Proceedings of 9t ACM Conference on Computer nd Communiction Security (CCS-, Novemer, pp [] V. D. Gligor nd P. Donescu, Fst encryption nd utentiction: Xcc encryption nd xec utentiction modes, in Proceedings of nd NIST Worsop on AES Modes of Opertion, August. [] J. Hill, R. Szewczy, A. Woo, S. Hollr, D. E. Culler, nd K. S. J. Pister, System rcitecture directions for networed sensors, in Proceedings of Arcitecturl Support for Progrmming Lnguges nd Operting Systems,, pp [3] D. Hung, M. Met, nd D. Medi, Source routing sed pirwise ey estlisment protocol for sensor networs, in Proceedings of 4t IEEE Interntionl Performnce Computing nd Communictions Conference, 5, pp [4] D. Hung, M. Met, D. Medi, nd H. Lein, Loction-wre ey mngement sceme for wireless sensor networs, in Proceedings of ACM Worsop on Security of Ad Hoc nd Sensor Networs (SASN 4, Octoer 4, pp [5] D. Liu nd P. Ning, Estlising pirwise eys in distriuted sensor networs, in Proceedings of t ACM Conference on Computer nd Communictions Security (CCS 3, Octoer 3, pp [6] D. Liu, P. Ning, nd R. Li, Estlising pirwise eys in distriuted sensor networs, ACM Trnsctions on Informtion nd System Security, vol. 8, no., pp. 4 77, 5. [7] M. Met, D. Hung, nd L. Hrn, RINK-RKP: A sceme for ey predistriution nd sred-ey discovery in sensor networs, in Proceedings of 4t IEEE Interntionl Performnce Computing nd Communictions Conference, 5. [8] M. D. Penrose, On -connectivity for geometric rndom grp, Rndom Structures nd Algoritms, vol. 5, no., pp , Septemer 999. [9] P. E. Pfeiffer nd D. A. Scum, Introduction to Applied Proility. New Yor: Acdemic Press, 973. [] J. H. Spencer, Te Strnge Logic of Rndom Grps (Algoritms nd Comintorics, ser.. Springer Verlg,. [] F. Xue nd P. R. Kumr, Te numer of neigors needed for connectivity of wireless networs, Wireless Networs, vol., pp. 69 8, 4. [] S. Zu, S. Xu, S. Seti, nd S. Jjodi, Estlising pir-wise eys for secure communiction in d oc networs: A proilistic pproc, in Proceedings of t IEEE Interntionl Conference on Networ Protocols (ICNP, Novemer 3. APPENDIX We riefly review ere te mtemticl cground for two RKP scemes: q-composite sceme [6] nd s-rkp sceme [5], [6], [8], [9]. A. q-composite sceme According to [6], te proility to set up secure lin requires t lest q eys. Te proility tt two nodes cn set up q eys is denote s p(q. Tus, p(q is given s: p(q = ( P q ( ( P q (m q (m q m q ( P m.

13 3 Te proility tt two nodes cn set up secure lin is: B. s-rkp sceme p (q = p(q + p(q p(m. ( Te s-rkp sceme s een independently proposed y Du t l. [8], nd Liu nd Ning [5]. In tis sceme, te ey pool P of RKP scemes is constructed y ω ey spces nd ec ey spce (i.e., ey mtrix is te structure of N su-ey-spce (i.e., n rry of eys, te size of ec ey spce is λ +. For structured ey pool, we cn determine te numer of eys (m tt pre-instlled in sensor is given y m = τ(λ +, were τ is numer of ey spces re selected for ec sensor wit τ < ω, nd λ + is numer of eys instlled in ec sensor from ec of selected ey spces. Te proility p tt two sensor nodes sre t lese one ey is: p ( ω ω τ = τ( τ = ( ω τ ((ω τ! (ω τ!ω!. ( Deep Medi is Professor of Computer Networing, Computer Science nd Electricl Engineering Deprtment t te University of Missouri-Knss City, USA. He received B.Sc. (Hons in Mtemtics from Cotton College/Guti University, Indi, M.Sc. in Mtemtics from te University of Deli, Indi, nd P.D. in Computer Sciences from te University of Wisconsin-Mdison, USA. Prior to joining UMKC in 989, e ws memer of tecnicl stff t AT&T Bell Lortories. He ws n invited visiting professor t te Tecnicl University of Denmr nd visiting reserc fellow t Lund Institute of Tecnology, Sweden. He is Fulrigt senior specilist. His reserc interests re resilient multi-lyer networ design, networ routing nd design, sensor networs. He s pulised over seventy ppers, nd is co-utor of te oo Routing, Flow, nd Cpcity Design in Communiction nd Computer Networs (4, nd te fortcoming oo Networ Routing: Algoritms, Protocols, nd Arcitectures, ot pulised y Morgn Kufmnn Pulisers. Dijing Hung (M /ACM received is B.S. degree from Beijing University of Posts & Telecommunictions, Cin 995. He received is M.S., nd P.D. degrees from te University of Missouri Knss City, in nd 4, respectively. He is n Assistnt Professor in te Computer Science & Engineering Deprtment t te Arizon Stte University. His current reserc interests re computer networing, security, nd privcy. Mnis Met is currently Senior Softwre Engineer t Tumleweed Communictions, Redwood City, CA. He erned is P.D. in Computer Science in 6 nd M.S. in Computer Science in from University of Missouri Knss City (UMKC, USA. He erned is B.E. in Computer Engineering from Mumi University, Indi in 999. His reserc interests re in Cryptogrpy, Networ Security, nd sensor networs. Appie vn de Liefvoort is Professor nd Cir of te Deprtment of Computer Science Electricl Engineering t te University of Missouri-Knss City, were e s een since 987. Prior to joining UMKC, e ws fculty memer t te University of Knss. He received grdute degrees in Computer Science nd Mtemtics from te University of Ners Lincoln, nd from te Ktoliee Universiteit in Nijmegen, te Neterlnds, respectively. His reserc interests include Queueing Teory nd performnce modeling of computer- nd communiction networs, specilizing in liner lgeric queueing teory, te mtrixexponentil distriution, nd correlted mtrix-exponentil sequences.

Efficient and Resilient Key Discovery based on Pseudo-Random Key Pre-Deployment

Efficient and Resilient Key Discovery based on Pseudo-Random Key Pre-Deployment Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment p. 1 Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment Roerto Di Pietro, Luigi V. Mncini, nd Alessndro

More information

10.4 AREAS AND LENGTHS IN POLAR COORDINATES

10.4 AREAS AND LENGTHS IN POLAR COORDINATES 65 CHAPTER PARAMETRIC EQUATINS AND PLAR CRDINATES.4 AREAS AND LENGTHS IN PLAR CRDINATES In this section we develop the formul for the re of region whose oundry is given y polr eqution. We need to use the

More information

CHAPTER 3 AMPLIFIER DESIGN TECHNIQUES

CHAPTER 3 AMPLIFIER DESIGN TECHNIQUES CHAPTER 3 AMPLIFIER DEIGN TECHNIQUE 3.0 Introduction olid-stte microwve mplifiers ply n importnt role in communiction where it hs different pplictions, including low noise, high gin, nd high power mplifiers.

More information

Multi-beam antennas in a broadband wireless access system

Multi-beam antennas in a broadband wireless access system Multi-em ntenns in rodnd wireless ccess system Ulrik Engström, Mrtin Johnsson, nders Derneryd nd jörn Johnnisson ntenn Reserch Center Ericsson Reserch Ericsson SE-4 84 Mölndl Sweden E-mil: ulrik.engstrom@ericsson.com,

More information

Geometric quantities for polar curves

Geometric quantities for polar curves Roerto s Notes on Integrl Clculus Chpter 5: Bsic pplictions of integrtion Section 10 Geometric quntities for polr curves Wht you need to know lredy: How to use integrls to compute res nd lengths of regions

More information

Performance analysis of different routing protocols in wireless sensor networks for real-time estimation

Performance analysis of different routing protocols in wireless sensor networks for real-time estimation Performnce nlysis of different routing protocols in wireless sensor networks for rel- estimtion Dmino Vrgnolo, Poeus Cen, Luc Scento, Snkr S. Sstry Astrct In tis pper we nlyze te performnce of two different

More information

On the Description of Communications Between Software Components with UML

On the Description of Communications Between Software Components with UML On the Description of Communictions Between Softwre Components with UML Zhiwei An Dennis Peters Fculty of Engineering nd Applied Science Memoril University of Newfoundlnd St. John s NL A1B 3X5 zhiwei@engr.mun.c

More information

Dataflow Language Model. DataFlow Models. Applications of Dataflow. Dataflow Languages. Kahn process networks. A Kahn Process (1)

Dataflow Language Model. DataFlow Models. Applications of Dataflow. Dataflow Languages. Kahn process networks. A Kahn Process (1) The slides contin revisited mterils from: Peter Mrwedel, TU Dortmund Lothr Thiele, ETH Zurich Frnk Vhid, University of liforni, Riverside Dtflow Lnguge Model Drsticlly different wy of looking t computtion:

More information

MAXIMUM FLOWS IN FUZZY NETWORKS WITH FUNNEL-SHAPED NODES

MAXIMUM FLOWS IN FUZZY NETWORKS WITH FUNNEL-SHAPED NODES MAXIMUM FLOWS IN FUZZY NETWORKS WITH FUNNEL-SHAPED NODES Romn V. Tyshchuk Informtion Systems Deprtment, AMI corportion, Donetsk, Ukrine E-mil: rt_science@hotmil.com 1 INTRODUCTION During the considertion

More information

CHAPTER 3 EDGE DETECTION USING CLASICAL EDGE DETECTORS

CHAPTER 3 EDGE DETECTION USING CLASICAL EDGE DETECTORS CHAPTER 3 EDE DETECTION USIN CLASICAL EDE DETECTORS Edge detection is one o te most importnt opertions in imge nlsis. An edge is set o connected piels tt lie on te boundr between two regions. Te clssiiction

More information

Algorithms for Memory Hierarchies Lecture 14

Algorithms for Memory Hierarchies Lecture 14 Algorithms for emory Hierrchies Lecture 4 Lecturer: Nodri Sitchinv Scribe: ichel Hmnn Prllelism nd Cche Obliviousness The combintion of prllelism nd cche obliviousness is n ongoing topic of reserch, in

More information

Example. Check that the Jacobian of the transformation to spherical coordinates is

Example. Check that the Jacobian of the transformation to spherical coordinates is lss, given on Feb 3, 2, for Mth 3, Winter 2 Recll tht the fctor which ppers in chnge of vrible formul when integrting is the Jcobin, which is the determinnt of mtrix of first order prtil derivtives. Exmple.

More information

Lecture 20. Intro to line integrals. Dan Nichols MATH 233, Spring 2018 University of Massachusetts.

Lecture 20. Intro to line integrals. Dan Nichols MATH 233, Spring 2018 University of Massachusetts. Lecture 2 Intro to line integrls Dn Nichols nichols@mth.umss.edu MATH 233, Spring 218 University of Msschusetts April 12, 218 (2) onservtive vector fields We wnt to determine if F P (x, y), Q(x, y) is

More information

Understanding Basic Analog Ideal Op Amps

Understanding Basic Analog Ideal Op Amps Appliction Report SLAA068A - April 2000 Understnding Bsic Anlog Idel Op Amps Ron Mncini Mixed Signl Products ABSTRACT This ppliction report develops the equtions for the idel opertionl mplifier (op mp).

More information

(1) Non-linear system

(1) Non-linear system Liner vs. non-liner systems in impednce mesurements I INTRODUCTION Electrochemicl Impednce Spectroscopy (EIS) is n interesting tool devoted to the study of liner systems. However, electrochemicl systems

More information

Module 9. DC Machines. Version 2 EE IIT, Kharagpur

Module 9. DC Machines. Version 2 EE IIT, Kharagpur Module 9 DC Mchines Version EE IIT, Khrgpur esson 40 osses, Efficiency nd Testing of D.C. Mchines Version EE IIT, Khrgpur Contents 40 osses, efficiency nd testing of D.C. mchines (esson-40) 4 40.1 Gols

More information

A Development of Earthing-Resistance-Estimation Instrument

A Development of Earthing-Resistance-Estimation Instrument A Development of Erthing-Resistnce-Estimtion Instrument HITOSHI KIJIMA Abstrct: - Whenever erth construction work is done, the implnted number nd depth of electrodes hve to be estimted in order to obtin

More information

Exercise 1-1. The Sine Wave EXERCISE OBJECTIVE DISCUSSION OUTLINE. Relationship between a rotating phasor and a sine wave DISCUSSION

Exercise 1-1. The Sine Wave EXERCISE OBJECTIVE DISCUSSION OUTLINE. Relationship between a rotating phasor and a sine wave DISCUSSION Exercise 1-1 The Sine Wve EXERCISE OBJECTIVE When you hve completed this exercise, you will be fmilir with the notion of sine wve nd how it cn be expressed s phsor rotting round the center of circle. You

More information

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad Hll Ticket No Question Pper Code: AEC009 INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigl, Hyderd - 500 043 MODEL QUESTION PAPER Four Yer B.Tech V Semester End Exmintions, Novemer - 2018 Regultions:

More information

BP-P2P: Belief Propagation-Based Trust and Reputation Management for P2P Networks

BP-P2P: Belief Propagation-Based Trust and Reputation Management for P2P Networks BP-PP: Belief Propgtion-Bsed Trust nd Reputtion Mngement for PP Networs Ermn Aydy School of Electricl nd Comp. Eng. Georgi Institute of Technology Atlnt, GA 333, USA Emil: eydy@gtech.edu Frmrz Feri School

More information

Y9.ET1.3 Implementation of Secure Energy Management against Cyber/physical Attacks for FREEDM System

Y9.ET1.3 Implementation of Secure Energy Management against Cyber/physical Attacks for FREEDM System Y9.ET1.3 Implementtion of Secure Energy ngement ginst Cyber/physicl Attcks for FREED System Project Leder: Fculty: Students: Dr. Bruce cillin Dr. o-yuen Chow Jie Dun 1. Project Gols Develop resilient cyber-physicl

More information

A New Algorithm to Compute Alternate Paths in Reliable OSPF (ROSPF)

A New Algorithm to Compute Alternate Paths in Reliable OSPF (ROSPF) A New Algorithm to Compute Alternte Pths in Relile OSPF (ROSPF) Jin Pu *, Eric Mnning, Gholmli C. Shoj, Annd Srinivsn ** PANDA Group, Computer Science Deprtment University of Victori Victori, BC, Cnd Astrct

More information

Mutual Adaptation to Mind Mapping in Human-Agent Interaction

Mutual Adaptation to Mind Mapping in Human-Agent Interaction Proceedings of te 2002 IEEE Int. Worksop on Robot nd Humn Interctive Communiction Berlin, Germny, Sept. 25-27, 2002 0-7803-7545-9/02/$17.00 2002 IEEE 105 Mutul Adpttion to Mind Mpping in Humn-Agent Interction

More information

Solutions to exercise 1 in ETS052 Computer Communication

Solutions to exercise 1 in ETS052 Computer Communication Solutions to exercise in TS52 Computer Communiction 23 Septemer, 23 If it occupies millisecond = 3 seconds, then second is occupied y 3 = 3 its = kps. kps If it occupies 2 microseconds = 2 6 seconds, then

More information

BP-P2P: Belief Propagation-Based Trust and Reputation Management for P2P Networks

BP-P2P: Belief Propagation-Based Trust and Reputation Management for P2P Networks 1 9th Annul IEEE Communictions Society Conference on Sensor, Mesh nd Ad Hoc Communictions nd Networs (SECON) BP-PP: Belief Propgtion-Bsed Trust nd Reputtion Mngement for PP Networs Ermn Aydy School of

More information

SUPPLEMENTARY INFORMATION

SUPPLEMENTARY INFORMATION In the formt provided y the uthors nd unedited. SUPPLEMENTARY INFORMATION ARMOUR (7) :: SUPPLEMENTARY INFORMATION Energy udget constrints on climte sensitivity in light of inconstnt climte feedcks DOI:.3/NCLIMATE37

More information

FAST AND ACCURATE MEASUREMENT OF THE RMS VALUE OF A NONCOHERENT SAMPLED SINE-WAVE

FAST AND ACCURATE MEASUREMENT OF THE RMS VALUE OF A NONCOHERENT SAMPLED SINE-WAVE I IEO World Congress Fundmentl nd pplied etrology September 611, 29, Lisbon, Portugl FST ND CCURTE ESUREENT OF THE RS VLUE OF NONCOHERENT SPLED SINE-WVE Dniel Beleg 1, Dominique Dllet 2 1 Fculty o Electronics

More information

Synchronous Machine Parameter Measurement

Synchronous Machine Parameter Measurement Synchronous Mchine Prmeter Mesurement 1 Synchronous Mchine Prmeter Mesurement Introduction Wound field synchronous mchines re mostly used for power genertion but lso re well suited for motor pplictions

More information

Genetic Representations for Evolutionary Minimization of Network Coding Resources

Genetic Representations for Evolutionary Minimization of Network Coding Resources Genetic Representtions for Evolutionry Minimiztion of Network Coding Resources Minkyu Kim 1, Vrun Aggrwl 2, Un-My O Reilly 2, Muriel Médrd 1, nd Wonsik Kim 1 1 Lortory for Informtion nd Decision Systems

More information

TRIGONOMETRIC APPLICATIONS

TRIGONOMETRIC APPLICATIONS HPTER TRIGONOMETRI PPLITIONS n ocen is vst expnse tt cn e life-tretening to person wo experiences disster wile oting. In order for elp to rrive on time, it is necessry tt te cost gurd or sip in te re e

More information

LATEST CALIBRATION OF GLONASS P-CODE TIME RECEIVERS

LATEST CALIBRATION OF GLONASS P-CODE TIME RECEIVERS LATEST CALIBRATION OF GLONASS P-CODE TIME RECEIVERS A. Fos 1, J. Nwroci 2, nd W. Lewndowsi 3 1 Spce Reserch Centre of Polish Acdemy of Sciences, ul. Brtyc 18A, 00-716 Wrsw, Polnd; E-mil: fos@c.ww.pl; Tel.:

More information

ABB STOTZ-KONTAKT. ABB i-bus EIB Current Module SM/S Intelligent Installation Systems. User Manual SM/S In = 16 A AC Un = 230 V AC

ABB STOTZ-KONTAKT. ABB i-bus EIB Current Module SM/S Intelligent Installation Systems. User Manual SM/S In = 16 A AC Un = 230 V AC User Mnul ntelligent nstlltion Systems A B 1 2 3 4 5 6 7 8 30 ma 30 ma n = AC Un = 230 V AC 30 ma 9 10 11 12 C ABB STOTZ-KONTAKT Appliction Softwre Current Vlue Threshold/1 Contents Pge 1 Device Chrcteristics...

More information

CHAPTER 2 LITERATURE STUDY

CHAPTER 2 LITERATURE STUDY CHAPTER LITERATURE STUDY. Introduction Multipliction involves two bsic opertions: the genertion of the prtil products nd their ccumultion. Therefore, there re two possible wys to speed up the multipliction:

More information

METHOD OF LOCATION USING SIGNALS OF UNKNOWN ORIGIN. Inventor: Brian L. Baskin

METHOD OF LOCATION USING SIGNALS OF UNKNOWN ORIGIN. Inventor: Brian L. Baskin METHOD OF LOCATION USING SIGNALS OF UNKNOWN ORIGIN Inventor: Brin L. Bskin 1 ABSTRACT The present invention encompsses method of loction comprising: using plurlity of signl trnsceivers to receive one or

More information

Triangles and parallelograms of equal area in an ellipse

Triangles and parallelograms of equal area in an ellipse 1 Tringles nd prllelogrms of equl re in n ellipse Roert Buonpstore nd Thoms J Osler Mthemtics Deprtment RownUniversity Glssoro, NJ 0808 USA uonp0@studentsrownedu osler@rownedu Introduction In the pper

More information

Mixed CMOS PTL Adders

Mixed CMOS PTL Adders Anis do XXVI Congresso d SBC WCOMPA l I Workshop de Computção e Aplicções 14 20 de julho de 2006 Cmpo Grnde, MS Mixed CMOS PTL Adders Déor Mott, Reginldo d N. Tvres Engenhri em Sistems Digitis Universidde

More information

Transformer Internal Fault Modeling in ATP

Transformer Internal Fault Modeling in ATP Trnsformer Internl Fult Modeling in ATP A. Avendño, B. A. Mork, H. K. Høidlen Astrct An importnt spect to investigte wen designing trnsformer protection scemes is te protection ginst internl fults. Altoug

More information

To provide data transmission in indoor

To provide data transmission in indoor Hittite Journl of Science nd Engineering, 2018, 5 (1) 25-29 ISSN NUMBER: 2148-4171 DOI: 10.17350/HJSE19030000074 A New Demodultor For Inverse Pulse Position Modultion Technique Mehmet Sönmez Osmniye Korkut

More information

Interference Cancellation Method without Feedback Amount for Three Users Interference Channel

Interference Cancellation Method without Feedback Amount for Three Users Interference Channel Open Access Librry Journl 07, Volume, e57 ISSN Online: -97 ISSN Print: -9705 Interference Cncelltion Method without Feedbc Amount for Three Users Interference Chnnel Xini Tin, otin Zhng, Wenie Ji School

More information

Synchronous Machine Parameter Measurement

Synchronous Machine Parameter Measurement Synchronous Mchine Prmeter Mesurement 1 Synchronous Mchine Prmeter Mesurement Introduction Wound field synchronous mchines re mostly used for power genertion but lso re well suited for motor pplictions

More information

8.1. The Sine Law. Investigate. Tools

8.1. The Sine Law. Investigate. Tools 8.1 Te Sine Lw Mimi 50 ermud Tringle ermud 1600 km Sn Jun 74 Puerto Rio Te ermud Tringle, in te nort tlnti Oen, is te lotion of severl unexplined plne nd sip disppernes. Vrious teories ve een suggested

More information

Experiment 3: The research of Thevenin theorem

Experiment 3: The research of Thevenin theorem Experiment 3: The reserch of Thevenin theorem 1. Purpose ) Vlidte Thevenin theorem; ) Mster the methods to mesure the equivlent prmeters of liner twoterminl ctive. c) Study the conditions of the mximum

More information

Kirchhoff s Rules. Kirchhoff s Laws. Kirchhoff s Rules. Kirchhoff s Laws. Practice. Understanding SPH4UW. Kirchhoff s Voltage Rule (KVR):

Kirchhoff s Rules. Kirchhoff s Laws. Kirchhoff s Rules. Kirchhoff s Laws. Practice. Understanding SPH4UW. Kirchhoff s Voltage Rule (KVR): SPH4UW Kirchhoff s ules Kirchhoff s oltge ule (K): Sum of voltge drops round loop is zero. Kirchhoff s Lws Kirchhoff s Current ule (KC): Current going in equls current coming out. Kirchhoff s ules etween

More information

9.4. ; 65. A family of curves has polar equations. ; 66. The astronomer Giovanni Cassini ( ) studied the family of curves with polar equations

9.4. ; 65. A family of curves has polar equations. ; 66. The astronomer Giovanni Cassini ( ) studied the family of curves with polar equations 54 CHAPTER 9 PARAMETRIC EQUATINS AND PLAR CRDINATES 49. r, 5. r sin 3, 5 54 Find the points on the given curve where the tngent line is horizontl or verticl. 5. r 3 cos 5. r e 53. r cos 54. r sin 55. Show

More information

Area-Time Efficient Digit-Serial-Serial Two s Complement Multiplier

Area-Time Efficient Digit-Serial-Serial Two s Complement Multiplier Are-Time Efficient Digit-Seril-Seril Two s Complement Multiplier Essm Elsyed nd Htem M. El-Boghddi Computer Engineering Deprtment, Ciro University, Egypt Astrct - Multipliction is n importnt primitive

More information

The Discussion of this exercise covers the following points:

The Discussion of this exercise covers the following points: Exercise 4 Bttery Chrging Methods EXERCISE OBJECTIVE When you hve completed this exercise, you will be fmilir with the different chrging methods nd chrge-control techniques commonly used when chrging Ni-MI

More information

Math Circles Finite Automata Question Sheet 3 (Solutions)

Math Circles Finite Automata Question Sheet 3 (Solutions) Mth Circles Finite Automt Question Sheet 3 (Solutions) Nickols Rollick nrollick@uwterloo.c Novemer 2, 28 Note: These solutions my give you the nswers to ll the prolems, ut they usully won t tell you how

More information

Section 17.2: Line Integrals. 1 Objectives. 2 Assignments. 3 Maple Commands. 1. Compute line integrals in IR 2 and IR Read Section 17.

Section 17.2: Line Integrals. 1 Objectives. 2 Assignments. 3 Maple Commands. 1. Compute line integrals in IR 2 and IR Read Section 17. Section 7.: Line Integrls Objectives. ompute line integrls in IR nd IR 3. Assignments. Red Section 7.. Problems:,5,9,,3,7,,4 3. hllenge: 6,3,37 4. Red Section 7.3 3 Mple ommnds Mple cn ctully evlute line

More information

Travel Prediction-based Data Forwarding for Sparse Vehicular Networks. Technical Report

Travel Prediction-based Data Forwarding for Sparse Vehicular Networks. Technical Report Trvel Prediction-sed Dt Forwrding for Sprse Vehiculr Networks Technicl Report Deprtment of Computer Science nd Engineering University of Minnesot 4-192 Keller Hll 200 Union Street SE Minnepolis, MN 55455-0159

More information

THE STUDY OF INFLUENCE CORE MATERIALS ON TECHNOLOGICAL PROPERTIES OF UNIVERSAL BENTONITE MOULDING MATERIALS. Matej BEZNÁK, Vladimír HANZEN, Ján VRABEC

THE STUDY OF INFLUENCE CORE MATERIALS ON TECHNOLOGICAL PROPERTIES OF UNIVERSAL BENTONITE MOULDING MATERIALS. Matej BEZNÁK, Vladimír HANZEN, Ján VRABEC THE STUDY OF INFLUENCE CORE MATERIALS ON TECHNOLOGICAL PROPERTIES OF UNIVERSAL BENTONITE MOULDING MATERIALS Mtej BEZNÁK, Vldimír HANZEN, Ján VRABEC Authors: Mtej Beznák, Assoc. Prof. PhD., Vldimír Hnzen,

More information

Localization of Latent Image in Heterophase AgBr(I) Tabular Microcrystals

Localization of Latent Image in Heterophase AgBr(I) Tabular Microcrystals Interntionl ymposium on ilver Hlide Technology Locliztion of Ltent Imge in Heterophse AgBr(I) Tulr Microcrystls Elen V. Prosvirkin, Aigul B. Aishev, Timothy A. Lrichev, Boris A. echkrev Kemerovo tte University,

More information

Network Theorems. Objectives 9.1 INTRODUCTION 9.2 SUPERPOSITION THEOREM

Network Theorems. Objectives 9.1 INTRODUCTION 9.2 SUPERPOSITION THEOREM M09_BOYL3605_13_S_C09.indd Pge 359 24/11/14 1:59 PM f403 /204/PH01893/9780133923605_BOYLSTAD/BOYLSTAD_NTRO_CRCUT_ANALYSS13_S_978013... Network Theorems Ojectives Become fmilir with the superposition theorem

More information

ISSCC 2006 / SESSION 21 / ADVANCED CLOCKING, LOGIC AND SIGNALING TECHNIQUES / 21.5

ISSCC 2006 / SESSION 21 / ADVANCED CLOCKING, LOGIC AND SIGNALING TECHNIQUES / 21.5 21.5 A 1.1GHz Chrge-Recovery Logic Visvesh Sthe, Jung-Ying Chueh, Mrios Ppefthymiou University of Michign, Ann Aror, MI Boost Logic is chrge-recovery circuit fmily cple of operting t GHz-clss frequencies

More information

A Slot-Asynchronous MAC Protocol Design for Blind Rendezvous in Cognitive Radio Networks

A Slot-Asynchronous MAC Protocol Design for Blind Rendezvous in Cognitive Radio Networks Globecom 04 - Wireless Networking Symposium A Slot-Asynchronous MAC Protocol Design for Blind Rendezvous in Cognitive Rdio Networks Xingy Liu nd Jing Xie Deprtment of Electricl nd Computer Engineering

More information

Math 116 Calculus II

Math 116 Calculus II Mth 6 Clculus II Contents 7 Additionl topics in Integrtion 7. Integrtion by prts..................................... 7.4 Numericl Integrtion.................................... 7 7.5 Improper Integrl......................................

More information

Implementation of Different Architectures of Forward 4x4 Integer DCT For H.264/AVC Encoder

Implementation of Different Architectures of Forward 4x4 Integer DCT For H.264/AVC Encoder Implementtion of Different Architectures of Forwrd 4x4 Integer DCT For H.64/AVC Encoder Bunji Antoinette Ringnyu, Ali Tngel, Emre Krulut 3 Koceli University, Institute of Science nd Technology, Koceli,

More information

Simulation of Transformer Based Z-Source Inverter to Obtain High Voltage Boost Ability

Simulation of Transformer Based Z-Source Inverter to Obtain High Voltage Boost Ability Interntionl Journl of cience, Engineering nd Technology Reserch (IJETR), olume 4, Issue 1, October 15 imultion of Trnsformer Bsed Z-ource Inverter to Obtin High oltge Boost Ability A.hnmugpriy 1, M.Ishwry

More information

& Y Connected resistors, Light emitting diode.

& Y Connected resistors, Light emitting diode. & Y Connected resistors, Light emitting diode. Experiment # 02 Ojectives: To get some hndson experience with the physicl instruments. To investigte the equivlent resistors, nd Y connected resistors, nd

More information

University of North Carolina-Charlotte Department of Electrical and Computer Engineering ECGR 4143/5195 Electrical Machinery Fall 2009

University of North Carolina-Charlotte Department of Electrical and Computer Engineering ECGR 4143/5195 Electrical Machinery Fall 2009 Problem 1: Using DC Mchine University o North Crolin-Chrlotte Deprtment o Electricl nd Computer Engineering ECGR 4143/5195 Electricl Mchinery Fll 2009 Problem Set 4 Due: Thursdy October 8 Suggested Reding:

More information

Available online at ScienceDirect. Procedia Engineering 89 (2014 )

Available online at   ScienceDirect. Procedia Engineering 89 (2014 ) Aville online t www.sciencedirect.com ScienceDirect Procedi Engineering 89 (2014 ) 411 417 16th Conference on Wter Distriution System Anlysis, WDSA 2014 A New Indictor for Rel-Time Lek Detection in Wter

More information

SOLVING TRIANGLES USING THE SINE AND COSINE RULES

SOLVING TRIANGLES USING THE SINE AND COSINE RULES Mthemtics Revision Guides - Solving Generl Tringles - Sine nd Cosine Rules Pge 1 of 17 M.K. HOME TUITION Mthemtics Revision Guides Level: GCSE Higher Tier SOLVING TRIANGLES USING THE SINE AND COSINE RULES

More information

Proceedings of Meetings on Acoustics

Proceedings of Meetings on Acoustics Proceedings of Meetings on Acoustics Volume 19, 2013 http://cousticlsociety.org/ ICA 2013 Montrel Montrel, Cnd 2-7 June 2013 Signl Processing in Acoustics Session 4SP: Sensor Arry Bemforming nd Its Applictions

More information

Fuzzy Logic Controller for Three Phase PWM AC-DC Converter

Fuzzy Logic Controller for Three Phase PWM AC-DC Converter Journl of Electrotechnology, Electricl Engineering nd Mngement (2017) Vol. 1, Number 1 Clusius Scientific Press, Cnd Fuzzy Logic Controller for Three Phse PWM AC-DC Converter Min Muhmmd Kml1,, Husn Ali2,b

More information

Performance Monitoring Fundamentals: Demystifying Performance Assessment Techniques

Performance Monitoring Fundamentals: Demystifying Performance Assessment Techniques Simplifying PID Control. Optimizing Plnt Performnce. Performnce Monitoring Fundmentls: Demystifying Performnce Assessment Techniques Roert C. Rice, PhD Rchelle R. Jyringi Dougls J. Cooper, PhD Control

More information

Polar Coordinates. July 30, 2014

Polar Coordinates. July 30, 2014 Polr Coordintes July 3, 4 Sometimes it is more helpful to look t point in the xy-plne not in terms of how fr it is horizontlly nd verticlly (this would men looking t the Crtesin, or rectngulr, coordintes

More information

Software for the automatic scaling of critical frequency f 0 F2 and MUF(3000)F2 from ionograms applied at the Ionospheric Observatory of Gibilmanna

Software for the automatic scaling of critical frequency f 0 F2 and MUF(3000)F2 from ionograms applied at the Ionospheric Observatory of Gibilmanna ANNALS OF GEOPHYSICS, VOL. 47, N. 6, Decemer 2004 Softwre for the utomtic scling of criticl frequency f 0 F2 nd MUF(3000)F2 from ionogrms pplied t the Ionospheric Oservtory of Giilmnn Michel Pezzopne nd

More information

Translate and Classify Conic Sections

Translate and Classify Conic Sections TEKS 9.6 A.5.A, A.5.B, A.5.D, A.5.E Trnslte nd Clssif Conic Sections Before You grphed nd wrote equtions of conic sections. Now You will trnslte conic sections. Wh? So ou cn model motion, s in E. 49. Ke

More information

Engineer-to-Engineer Note

Engineer-to-Engineer Note Engineer-to-Engineer Note EE-297 Technicl notes on using Anlog Devices DSPs, processors nd development tools Visit our Web resources http://www.nlog.com/ee-notes nd http://www.nlog.com/processors or e-mil

More information

High-speed Simulation of the GPRS Link Layer

High-speed Simulation of the GPRS Link Layer 989 High-speed Simultion of the GPRS Link Lyer J Gozlvez nd J Dunlop Deprtment of Electronic nd Electricl Engineering, University of Strthclyde 204 George St, Glsgow G-lXW, Scotlnd Tel: +44 4 548 206,

More information

Design and implementation of a high-speed bit-serial SFQ adder based on the binary decision diagram

Design and implementation of a high-speed bit-serial SFQ adder based on the binary decision diagram INSTITUTE OFPHYSICS PUBLISHING Supercond. Sci. Technol. 16 (23) 1497 152 SUPERCONDUCTORSCIENCE AND TECHNOLOGY PII: S953-248(3)67111-3 Design nd implementtion of high-speed it-seril SFQ dder sed on the

More information

Analysis of Coding-aware MAC Protocols based on Reverse Direction Protocol for IEEE based Wireless Networks using Network Coding*

Analysis of Coding-aware MAC Protocols based on Reverse Direction Protocol for IEEE based Wireless Networks using Network Coding* Anlysis of oding-wre MA Protocols sed on Reverse irection Protocol for IEEE 8.-sed Wireless Networks using Network oding* Rul Plcios, Htegereil Kssye Hile, Jesus Alonso-Zrte nd Frizio Grnelli {plciostrujillo,

More information

Homework #1 due Monday at 6pm. White drop box in Student Lounge on the second floor of Cory. Tuesday labs cancelled next week

Homework #1 due Monday at 6pm. White drop box in Student Lounge on the second floor of Cory. Tuesday labs cancelled next week Announcements Homework #1 due Mondy t 6pm White drop ox in Student Lounge on the second floor of Cory Tuesdy ls cncelled next week Attend your other l slot Books on reserve in Bechtel Hmley, 2 nd nd 3

More information

Sequential Logic (2) Synchronous vs Asynchronous Sequential Circuit. Clock Signal. Synchronous Sequential Circuits. FSM Overview 9/10/12

Sequential Logic (2) Synchronous vs Asynchronous Sequential Circuit. Clock Signal. Synchronous Sequential Circuits. FSM Overview 9/10/12 9//2 Sequentil (2) ENGG5 st Semester, 22 Dr. Hden So Deprtment of Electricl nd Electronic Engineering http://www.eee.hku.hk/~engg5 Snchronous vs Asnchronous Sequentil Circuit This Course snchronous Sequentil

More information

A COMPARISON OF CIRCUIT IMPLEMENTATIONS FROM A SECURITY PERSPECTIVE

A COMPARISON OF CIRCUIT IMPLEMENTATIONS FROM A SECURITY PERSPECTIVE A COMPARISON OF CIRCUIT IMPLEMENTATIONS FROM A SECURITY PERSPECTIVE Mster Thesis Division of Electronic Devices Deprtment of Electricl Engineering Linköping University y Timmy Sundström LITH-ISY-EX--05/3698--SE

More information

DESIGN OF CONTINUOUS LAG COMPENSATORS

DESIGN OF CONTINUOUS LAG COMPENSATORS DESIGN OF CONTINUOUS LAG COMPENSATORS J. Pulusová, L. Körösi, M. Dúbrvská Institute of Robotics nd Cybernetics, Slovk University of Technology, Fculty of Electricl Engineering nd Informtion Technology

More information

(CATALYST GROUP) B"sic Electric"l Engineering

(CATALYST GROUP) Bsic Electricl Engineering (CATALYST GROUP) B"sic Electric"l Engineering 1. Kirchhoff s current l"w st"tes th"t (") net current flow "t the junction is positive (b) Hebr"ic sum of the currents meeting "t the junction is zero (c)

More information

First Round Solutions Grades 4, 5, and 6

First Round Solutions Grades 4, 5, and 6 First Round Solutions Grdes 4, 5, nd 1) There re four bsic rectngles not mde up of smller ones There re three more rectngles mde up of two smller ones ech, two rectngles mde up of three smller ones ech,

More information

Open Access A Novel Parallel Current-sharing Control Method of Switch Power Supply

Open Access A Novel Parallel Current-sharing Control Method of Switch Power Supply Send Orders for Reprints to reprints@enthmscience.e 170 The Open Electricl & Electronic Engineering Journl, 2014, 8, 170-177 Open Access A Novel Prllel Current-shring Control Method of Switch Power Supply

More information

Experiment 3: Non-Ideal Operational Amplifiers

Experiment 3: Non-Ideal Operational Amplifiers Experiment 3: Non-Idel Opertionl Amplifiers 9/11/06 Equivlent Circuits The bsic ssumptions for n idel opertionl mplifier re n infinite differentil gin ( d ), n infinite input resistnce (R i ), zero output

More information

Experiment 3: Non-Ideal Operational Amplifiers

Experiment 3: Non-Ideal Operational Amplifiers Experiment 3: Non-Idel Opertionl Amplifiers Fll 2009 Equivlent Circuits The bsic ssumptions for n idel opertionl mplifier re n infinite differentil gin ( d ), n infinite input resistnce (R i ), zero output

More information

Section 16.3 Double Integrals over General Regions

Section 16.3 Double Integrals over General Regions Section 6.3 Double Integrls over Generl egions Not ever region is rectngle In the lst two sections we considered the problem of integrting function of two vribles over rectngle. This sitution however is

More information

Chapter 2 Literature Review

Chapter 2 Literature Review Chpter 2 Literture Review 2.1 ADDER TOPOLOGIES Mny different dder rchitectures hve een proposed for inry ddition since 1950 s to improve vrious spects of speed, re nd power. Ripple Crry Adder hve the simplest

More information

Network-coded Cooperation for Multi-unicast with Non-Ideal Source-Relay Channels

Network-coded Cooperation for Multi-unicast with Non-Ideal Source-Relay Channels This full text pper ws peer reviewed t the direction of IEEE Communictions Society suject mtter experts for puliction in the IEEE ICC 2010 proceedings Network-coded Coopertion for Multi-unicst with Non-Idel

More information

Robustness Analysis of Pulse Width Modulation Control of Motor Speed

Robustness Analysis of Pulse Width Modulation Control of Motor Speed Proceedings of the World Congress on Engineering nd Computer Science 2007 WCECS 2007, October 24-26, 2007, Sn Frncisco, USA obustness Anlysis of Pulse Width Modultion Control of Motor Speed Wei Zhn Abstrct

More information

Analysis of circuits containing active elements by using modified T - graphs

Analysis of circuits containing active elements by using modified T - graphs Anlsis of circuits contining ctive elements using modified T - grphs DALBO BOLEK *) nd EA BOLKOA**) Deprtment of Telecommunictions *) dioelectronics **) Brno Universit of Technolog Purknov 8, 6 Brno CECH

More information

Lab 8. Speed Control of a D.C. motor. The Motor Drive

Lab 8. Speed Control of a D.C. motor. The Motor Drive Lb 8. Speed Control of D.C. motor The Motor Drive Motor Speed Control Project 1. Generte PWM wveform 2. Amplify the wveform to drive the motor 3. Mesure motor speed 4. Mesure motor prmeters 5. Control

More information

EET 438a Automatic Control Systems Technology Laboratory 5 Control of a Separately Excited DC Machine

EET 438a Automatic Control Systems Technology Laboratory 5 Control of a Separately Excited DC Machine EE 438 Automtic Control Systems echnology bortory 5 Control of Seprtely Excited DC Mchine Objective: Apply proportionl controller to n electromechnicl system nd observe the effects tht feedbck control

More information

2. Self-tapping screws as tensile reinforcements perpendicular to the grain

2. Self-tapping screws as tensile reinforcements perpendicular to the grain Reinforcements perpeniculr to te grin using self-tpping screws Univ.-Prof. Dr.-Ing. Hns Jocim Blss Dipl.-Ing. Ireneusz Bejtk Lerstul für Ingenieurolzbu un Bukonstruktionen University of Krlsrue 7618 Krlsrue,

More information

This is a repository copy of Effect of power state on absorption cross section of personal computer components.

This is a repository copy of Effect of power state on absorption cross section of personal computer components. This is repository copy of Effect of power stte on bsorption cross section of personl computer components. White Rose Reserch Online URL for this pper: http://eprints.whiterose.c.uk/10547/ Version: Accepted

More information

Network Sharing and its Energy Benefits: a Study of European Mobile Network Operators

Network Sharing and its Energy Benefits: a Study of European Mobile Network Operators Network Shring nd its Energy Benefits: Study of Europen Mobile Network Opertors Mrco Ajmone Mrsn Electronics nd Telecommunictions Dept Politecnico di Torino, nd Institute IMDEA Networks, mrco.jmone@polito.it

More information

CS 135: Computer Architecture I. Boolean Algebra. Basic Logic Gates

CS 135: Computer Architecture I. Boolean Algebra. Basic Logic Gates Bsic Logic Gtes : Computer Architecture I Boolen Algebr Instructor: Prof. Bhgi Nrhri Dept. of Computer Science Course URL: www.ses.gwu.edu/~bhgiweb/cs35/ Digitl Logic Circuits We sw how we cn build the

More information

Discontinued AN6262N, AN6263N. (planed maintenance type, maintenance type, planed discontinued typed, discontinued type)

Discontinued AN6262N, AN6263N. (planed maintenance type, maintenance type, planed discontinued typed, discontinued type) ICs for Cssette, Cssette Deck ANN, ANN Puse Detection s of Rdio Cssette, Cssette Deck Overview The ANN nd the ANN re the puse detection integrted circuits which select the progrm on the cssette tpe. In

More information

4110 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 66, NO. 5, MAY 2017

4110 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 66, NO. 5, MAY 2017 40 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 66, NO. 5, MAY 07 Trnsmit Power Control for DD-Underlid Cellulr Networs Bsed on Sttisticl Fetures Peng Sun, Kng G. Shin, Life Fellow, IEEE, Hilin Zhng,

More information

Postprint. This is the accepted version of a paper presented at IEEE PES General Meeting.

Postprint.   This is the accepted version of a paper presented at IEEE PES General Meeting. http://www.div-portl.org Postprint This is the ccepted version of pper presented t IEEE PES Generl Meeting. Cittion for the originl published pper: Mhmood, F., Hooshyr, H., Vnfretti, L. (217) Sensitivity

More information

Energy Harvesting Two-Way Channels With Decoding and Processing Costs

Energy Harvesting Two-Way Channels With Decoding and Processing Costs IEEE TRANSACTIONS ON GREEN COMMUNICATIONS AND NETWORKING, VOL., NO., MARCH 07 3 Energy Hrvesting Two-Wy Chnnels With Decoding nd Processing Costs Ahmed Arf, Student Member, IEEE, Abdulrhmn Bknin, Student

More information

Performance Comparison between Network Coding in Space and Routing in Space

Performance Comparison between Network Coding in Space and Routing in Space Performnce omprison etween Network oding in Spce nd Routing in Spce Yunqing Ye, Xin Hung, Ting Wen, Jiqing Hung nd lfred Uwitonze eprtment of lectronics nd Informtion ngineering, Huzhong University of

More information

Two-layer slotted-waveguide antenna array with broad reflection/gain bandwidth at millimetre-wave frequencies

Two-layer slotted-waveguide antenna array with broad reflection/gain bandwidth at millimetre-wave frequencies Two-lyer slotted-wveguide ntenn rry with rod reflection/gin ndwidth t millimetre-wve frequencies S.-S. Oh, J.-W. Lee, M.-S. Song nd Y.-S. Kim Astrct: A 24 24 slotted-wveguide rry ntenn is presented in

More information

A Comparative Analysis of Algorithms for Determining the Peak Position of a Stripe to Sub-pixel Accuracy

A Comparative Analysis of Algorithms for Determining the Peak Position of a Stripe to Sub-pixel Accuracy A Comprtive Anlysis of Algorithms for Determining the Pek Position of Stripe to Sub-pixel Accurcy D.K.Nidu R.B.Fisher Deprtment of Artificil Intelligence, University of Edinburgh 5 Forrest Hill, Edinburgh

More information

Use of compiler optimization of software bypassing as a method to improve energy efficiency of exposed data path architectures

Use of compiler optimization of software bypassing as a method to improve energy efficiency of exposed data path architectures Guzm et l. EURASIP Journl on Emedded Systems 213, 213:9 RESEARCH Open Access Use of compiler optimiztion of softwre ypssing s method to improve energy efficiency of exposed dt pth rchitectures Vldimír

More information

CS2204 DIGITAL LOGIC & STATE MACHINE DESIGN SPRING 2005

CS2204 DIGITAL LOGIC & STATE MACHINE DESIGN SPRING 2005 CS2204 DIGITAL LOGIC & STATE MACHINE DESIGN SPRING 2005 EXPERIMENT 1 FUNDAMENTALS 1. GOALS : Lern how to develop cr lrm digitl circuit during which the following re introduced : CS2204 l fundmentls, nd

More information