An One-way Hash Function Based Lightweight Mutual Authentication RFID Protocol

Size: px
Start display at page:

Download "An One-way Hash Function Based Lightweight Mutual Authentication RFID Protocol"

Transcription

1 JOUNAL OF COMPUES, VOL 8, NO 9, SEPEMBE An One-wy Hsh Function Bsed Lightweight Mutul Authentiction FID Protocol Xuping en Institute of Softwre nd Intelligent echnology, HngZhou Dinzi University, Hngzhou, Chin Xinghu Xu nd Yunf Li Institute of Softwre nd Intelligent echnology, HngZhou Dinzi University, Hngzhou, Chin {xhxu, Abstrct With the widespred development of FID technology, security nd privcy issues become more prominent in FID pplictions In this pper, new onewy hsh function bsed mutul uthentiction protocol is proposed to ddress such security nd privcy problems Prticulrly, ccess list nd pseudorndom flgs re dopted for quick serch, to ensure good efficiency nd sclbility he proposed protocol is nlyzed ccording to three spects: logic, security nd performnce Concretely, GNY logic forml method is used to verify the design correctness of the protocol, the ttck model is used to nlyze the security, nd the performnce is evluted from communiction overlod, storge, nd computtion requirement he nlysis results show tht the protocol hs no obvious design flws, cn resist mjor ttcks, nd improves the system relibility nd effectiveness he proposed protocol cn be esily sclble for lightweight FID systems Index erms uthentiction protocol, logicl nlysis, security, privcy, FID I INODUCION dio Frequency Identifiction (FID systems, thnks to their low cost nd their convenience in identifying n object without physicl contct, hve found mny pplictions in mnufcturing, supply chin mngement, prking grge mngement, nd inventory control[1] Moreover, FID technology is envisioned s n economicl replcement for trditionl brcode counterprt nd expected to be mssively deployed in consumer object identifiction he dvntges of FID system over brcode system include mny-to-mny communiction, wireless dt trnsmission nd its computing nture [2] Despite mny prospective pplictions, FID technology lso poses severl security nd privcy threts [3] [4] which could hrm its globl doption Mny schemes hve been proposed to ddress those security/privcy issues Authentiction of FID tgs is n ctive reserch re nd protocols hve been extensively studied nd reported in the literture [5][6] It is more common tht mutul uthentiction of the tg, reder nd bck-end server [7][8][9] Mutul uthentiction is required to ensure tht tg informtion cn only be legitimte reder nd server systems to get nd reder nd server systems only ccept legl tg informtion Moreover, communiction dt need to be protected Some uthentiction protocols [10][11][12] provide security bsed on bitwise opertion or other simple functions Some uthentiction protocols [13][14][15] [16]minly execute irreversible hsh function nd pseudorndom number genertor (PNG Other uthentiction protocols [17][18] minly use typicl cryptogrphy to chieve high security nd require more system resources Most uthentiction protocols hve been designed without strict forml proof However, lck of forml nlysis my mke those protocols ignoring design flws nd security vulnerbilities In mny cses, people wnt to chieve good security nd privcy gurntee, but do not wnt to consume too much system resources In this pper, we proposed mutul uthentiction protocol bsed on one-wy hsh function for FID system, which hope to meet forementioned requirement he min contributions of our work re s follows Onewy hsh function is used to protect communiction dt during uthentiction Access lists nd pseudorndom flgs re used to chieve quick serch GNY logic forml method is used to verify the design correctness of the protocol he ttck model is used to do the security nlysis In next section, relted FID protocols re reviewed nd nlyzed he proposed protocol is described in section 3 Forml nlysis of the protocol with GNY logic is given in section 4 In section 5, the ttck model is used to nlyze the security on the mjor ttcks Performnce nlysis is done in section 6 Finlly, section 7 drws conclusion II ELAED WOKS According to the security efficiency nd opertion complexity, the protocols (including ccess control, uthentiction nd encryption cn be clssified into three ctegories: ultr-lightweight, lightweight, middleweight he proposed protocol is lightweight protocol So the 2013 ACADEMY PUBLISHE doi:104304/jcp

2 2406 JOUNAL OF COMPUES, VOL 8, NO 9, SEPEMBE 2013 uthors focus on some relted lightweight uthentiction protocols Song nd Mitchell (SM [13] propose FID Authentiction Protocol for Low-cost gs which uses rndom number s temporry secret nd keyed hsh function to protect the messges communicted between tg nd reder It is climed tht the scheme cn provides the identified privcy nd security fetures But this scheme resists forwrd trcebility nd server impersontion under n ssumption And the scheme hs not been proved by forml method nd there my be design flw Ning et l [9] suggest distributed key rry uthentiction protocol (KAAP tht provides clssified security protection It is syntheticlly nlyzed in three spects: logic, security nd performnce It is climed tht the scheme cn resist both externl ttcks nd internl forgery ttcks with insignificntly incresed complexity he scheme need hold key rry, once the key rry is leked, the entire system security cn not be gurnteed Moreover, the key rry method limits the system sclbility hee et l [14] propose Chllenge-esponse Bsed FID Authentiction Protocol (HIDVP he protocol is bsed on Chllenge-esponse using one-wy hsh function nd rndom number It is climed tht the scheme cn resist spoofing, reply ttck nd so on But it hs been found to be unsuitble for distributed dtbse environment [8] Liu nd Ning [8] present zero-knowledge uthentiction protocol bsed on lterntive mode in FID systems (ZKAP In ZKAP, dul zero-knowledge proofs re rndomly chosen to provide nonymity nd mutul uthentiction without reveling ny sensitive identifiers he scheme uses Pseudo-rndom flgs nd ccess lists for quick serch nd check And it employs forml proof model nd ttck model to prove tht ZKAP owns no obvious design defects nd cn resist mjor ttcks But the scheme requires too mny rounds (4 or 5 nd too mny messges (8 or 10 need to be communicted he conventionl security scheme only need communicte 5 messges III POOCOL DESCIPION A System Prmeters ble 1 shows the prmeters pplied in the protocol B Authenticte Phse Figure 1 shows the new protocol We describe the protocol detil in the following ccording to the sequence of messge exchnges 1 Phse 1: Chllenge messges: genertes rndom number r, then computes B = h( PID, r nd C = PID r, nd sends B nd C to s n initil query Nottion DB L L r, r ABLE I NOAION Description he reder in the FID system he tg in the FID system he dtbse in the FID system the ccess list for tgs to retrieve certin reder the ccess list for the dtbse to retrieve certin tg the rndom numbers generted by, PID, he pseudonym of, PID h( A one-wy hsh function [ ] he rounding opertion XO bitwise logic opertor Conctente opertor 2 Phse 2: esponse messges: Upon receiving the query, verifies by serch PID in the ccess list nd clcultes the corresponding r If there isn t PID to meet B nd C, the protocol will terminte with n error code Otherwise, gets PID nd r, nd performs the rounding opertion on r to gin round-off integer d = [ r ] long generting rndom number r computes D = h( r, PID nd E = ( r PID >> d, then responds D nd E to 3 Phse 3: Forwrd messge: When receives the response, it extrcts r from E hen it forwrds D nd r to the dtbse DB for the further uthentiction 4 Phse 4: Authenticte the tg: While receiving D nd r, DB verifies whether there is PID in L If it is flse, is considered s n illegl entity nd will terminte the uthentiction process with n error code Otherwise, DB forwrds PID to nd will be uthenticted by hen obtins F = h( PID, r by performing one-wy hsh function nd sends F to 5 Phse 5: Authenticte the reder: Upon receiving F, performs the one-wy hsh function on its current r If the two vlues re equl, will be PID nd uthenticted by Otherwise, will be considered s n illegl entity nd will terminte the uthentiction with n error code he proposed protocol dopts lightweight mechnisms to relize security, efficiency nd relibility, including one-wy hsh, quick check, nd mutul uthentiction he min pproches re complementry s follows 1 One-wy hsh is dopted to protect PID nd PID to relize no reversibility without reveling ny sensitive dt he one-wy hsh function hs the following property: For ny output y, it is 2013 ACADEMY PUBLISHE

3 JOUNAL OF COMPUES, VOL 8, NO 9, SEPEMBE computtionlly infesible to find n input such tht h ( X = y, given no corresponding input is known [13] In the open ir interfce, { B, D, F }cn be sfely published since n ttcker my not find useful dt from those messges 2 Access lists ( L, L store ll the pseudorndom identifiers nd re used to mrk certin reder or certin tg for quick serch DB mintins L nd mintins L For exmple, while receiving D nd r, DB checks L for mtching entry he ccess lists s index-pseudonyms effectively reduce the time complexity of serch opertion nd enble more sclble for dynmic systems 3 Pseudorndom identifiers re trnsmitted insted of the rel identifiers Furthermore, nd generte their rndom numbers r nd r which re to ensure dynmic refresh in ech session Moreover, nd store the lst Pseudorndom identifiers nd rndom numbers, if new query rrives with the sme dt within certin time, it will be neglected his will help the system resist the replying or jmming ttcks 4 Mutul uthentiction procedure is performed to relize ccess control verifies by two steps he first step is to ensure the vlidity of PID he second is to indeed uthenticte DB uthentictes then trnsmits the messge to If nd only if both uthentictions succeed, communiction between nd is secure nd will continue In summry, the new protocol is lightweight mutul uthentiction scheme bsed on one-wy hsh function Figure 1 he mutul uthentiction protocol IV FOMAL ANALYSIS OF HE POOCOL WIH GNY LOGIC Most uthentiction protocols hve been designed nd demonstrted in informl wys However, informl nlysis my ignore design flws nd security errors In the lst section, we hve been described bsic security verifiction for the new protocol in the intuitive wy In the section, GNY Logic [19] is pplied to nlyze the design correctness of the new protocol he forml method my evlute the protocol strictly nd completely therefore even subtle defects cn be found With the forml method, protocol cn be demonstrted to resonbly chieve its gols using logicl postultes We do the GNY forml logic nlysis like [9], nd the nlysis comprises of four steps: 1 formliztion of the messges; 2 definition of initil ssumptions; 3 definition of nticipnt gols; 4 verifiction by logicl rules nd formuls A Formliztion of Messges We formlize of the protocol messges in the lnguge of GNY Logic nd express ech exchnged messge s logicl formul For the ske of clrity, we use the sme sttements like [19][20] ble 2 shows those sttements ABLE II BASIC SAEMENS Nottion Description S X S receives messge contining X, S cn red nd repet X S X S receives X, X is not-originted-here formul S X S possesses, or is cpble of possessing X S ~ X S once conveyed X S X S believes, or would be entitled to believe, tht sttement X holds S φ X S believes, or is entitled to believe tht X is recognizble S # X S believes, or is entitled to believe tht X is fresh v S S X S believes, or is entitled to believe, tht V is suitble secret for S nd X { X, Y } Conctention here re five messges (we clled them: M1, M2, M3, M4, M5 between DB, nd in the uthentiction phses With those sttements the formlized messges re s follows: (M1 * h( PID, r, *( PID r (M2 * h( r, PID, *( r PID >> d (M3 DB * h ( r, PID, DB *r (M4 *PID (M5 h( PID, r, * B Initil Assumptions In order to deduce the security gols from the forementioned sttements, some ssumptions re needed We ssume tht the following sttements cn be obtined: (A1 r ; PID (A2 PID, # PID, ; (A3 r ; (A4 PID, PID DB (A5 #PID, PID (A6 DB # PID, DB DB PID (A7 DB ( DB * 2013 ACADEMY PUBLISHE

4 2408 JOUNAL OF COMPUES, VOL 8, NO 9, SEPEMBE 2013 hose sttements show the initil possessions nd bilities of ech prticiptor Ech tg possesses r nd PID, nd it is entitled to believe the PID is fresh he reder possesses r nd PID he dtbse DB is entitled to believe the PID is fresh he communiction chnnel between nd DB is considered to be secure; so believes tht DB hs jurisdiction over ll his beliefs C Anticipnt Gols he im of the protocol is to mutul uthenticte between nd nd ssure the messges not used in the previous sessions he nticipnt gol cn be expressed s follows: (G1 ~ r, (G2 ~ PID, (G3 ~ r (G4 ~ PID (G5 DB ~ PID (G6 # h( PID (G7 # h( PID G1 nd G2 show tht believes tht conveyed r nd PID G3 nd G4 show tht believes tht conveyed r nd PID G5 shows tht DB believes tht conveyed PID G6 nd G7 show tht the messges re not used in the previous sessions he first to fifth gols indicte tht the messges re from legl entities And the sixth nd seventh gols indicte freshness requirements D Logic Verifiction In this subsection, we will show tht the gols cn be deduced from the ssumption, the formlized messges nd the relted GNY ules From M1, is informed messges h ( PID, r nd ( PID r hs not received or sent them in the previous sessions, we hve * h( PID, r, *( PID r (1 Applying the Being-old ule 1: ( P ( X /( P X deduces h( PID, r, ( PID r (2 cn retrieve PID from L, nd pplying the Being-old ule 5: ( P F( X, Y, P X/( P Y deduces PID, r (3 hus, is considered to hve been informed PID nd r Applying the Possession ule P1 : ( P X /( P X deduces PID, r, h( PID, r (4 Applying the Possession ule P2: ( P X, P Y /( P ( X, Y, P F( X, Y deduces PID, r (5 ( From A5, #PID, nd pplying the Freshness ule F1: ( P #( X /( P #( X, Y, P # F( X deduces #( PID, r, (6 Applying the Messge Interprettion ule I3: S P H ( X, < S >, P ( X, S, P P Q, P #( X, S P Q ~( X, < S>, P Q ~ H ( X, < S> deduces ~ ( PID, r (7 Finlly, from I3 interprettion nd pplying the Messge Interprettion ule I7: ( P Q ~ ( X, Y/ P Q ~ X deduces ~ ( PID, ~ ( r (8 As result, believes tht once conveyed PID nd r Gol G1 nd G2 re chieved Hereinfter, for simplicity, we directly mrk the pplied logicl rules nd formuls behind the formul For Gol 3: We cn deduce tht *( r PID >> d // by M2 ( r PID >> d //by 1 ( r PID //by 5 r // by 5 r // by P1 ( r, PID //by P2 φ( r // by P4, 6 #( r, PID //by A2, F1 ~ r //by I1 According to I1, is entitled to believe tht once conveyed r For Gol 5: We cn deduce tht DB * h( r, PID, DB *r //by M3 DB h ( r, PID, DB r //by 1 DB, DB h r, PID //by P1 r ( DB PID // by P5 nd ccess list DB ( r, PID //by P2 DB # PID //A6 DB #( r, PID //by F1 DB ~ ( PID // by I3 According to I3, DB is entitled to believe tht once conveyed PID For Gol 4: we cn deduce tht DB ( DB * //by A7 DB ~ ( PID // by Gol 5 DB ( ~ PID DB ( ~ PID //by J3 ( ~ PID //by J1 As result, is entitled to believe tht once conveyed PID For Gol 6: We cn deduce tht # PID // by A5 L 2013 ACADEMY PUBLISHE

5 JOUNAL OF COMPUES, VOL 8, NO 9, SEPEMBE PID // from formul (2 # h( PID // by F10 As result, is entitled to believe tht h( PID is fresh For Gol 7: We cn deduce tht DB ( DB * //by A7 DB # PID //by A6 DB # PID DB # PID // by J3 # PID // by J1 *PID // by M4 PID // by 1 PID //by P1 # h( PID // by F10 As result, is entitled to believe tht h( PID is fresh V SECUIY ANALYSIS Like the mjority of similr protocols, we suppose the communiction between DB nd the reder is secure However, the wireless communiction between the reder nd the tg is confronted more serious chllenges We consider the following ttck in the ttck model: spoofing, replying, trcking nd DOS We perform the nlysis with three steps like [9] he first step is to suppose the ction of the ttcker nd the second is to simulte the process of the ttcking step by step he lst is to deduce the security A Spoofing Attck In spoofing ttck, the ttck forges legl reder to get the informtion of the tg or forges legl tg to chet the reder During the reder spoofing ttck, n ttcker simultes s reder nd performs the following ctions: In one session: A: A disguises s reder nd send query to A( : h( PID, r,( PID r : cn not find one mtch to verify A ( / A( : Authentiction will fil In bd conditions: A( : h( r, PID,( r PID >> d // d = [ r ] If responses A by mistke, then A ( ( obtins r In the next session: A: A disguises s tg first nd intercept messges sent to A( / : h( PID, r,( PID r A ( : h( r, PID,( r PID >> d : obtins r from ( r PID >> d using PID nd r DB : r, h( r, PID DB: DB checks whether there is corresponding PID in L, nd it will find tht no mtching flg since the probbility tht r equls r is negligible DB / A(, uthentiction fils In the worse conditions: If DB ignores the mistke nd responses PI D to, clcultes to get h ( PID, r, nd forwrds it to A DB : ( PID A( : h( PID, r A ( cn not obtin PID from h ( PID, r even if it possesses r A: Finlly, A disguises s reder nd forwrds h ( PID, r to A ( : h( PID, r : h( PID, r h( PID, r / A(, uthentiction fils B eply Attck eply ttck refers to tht n ttcker impersontes legl entity to involve into the communictions so s to ccess, modify, nd even delete the messges [8] he protocol uses rndom number to resist the reply ttck In one session: A hs lernt : { h ( PID, r, PID r, h ( r, PID, ( r PID >> d, h ( PID, r } In the next session: A disguises s tg A( / : h( PID, r, PID r A( : h( r, PID,( r PID >> d : If ( [ r ] == [ r ] then obtins r from ( r PID >> d, then will find tht r hs been used in the former session he protocol termintes Else, obtins r from ( r PID >> d, nd r r DB : r, h( r, PID DB:DB checks whether there is corresponding PID in L, nd it will find tht no mtching flg since r r In the worse condition If DB ignores nd responses PI D to, clcultes to get h ( PID, r, nd forwrds it to A DB : PID A : h ( PID, r ( 2013 ACADEMY PUBLISHE

6 2410 JOUNAL OF COMPUES, VOL 8, NO 9, SEPEMBE 2013 hen A disguises s reder A ( : h( PID, r : h PID, r h( PID, r, the protocol termintes ( C rcking Attck he ttcker my trce tgs through collecting the trnsferring messges in the pst trnsmissions or through mlicious reders In the former sitution, the reder nd tg generte nd use different rndom numbers for ech uthentiction, so the ttcker cn not find two sme messges nd is incpble of trcing the certin tg In the ltter, some mlicious reders send the sme query to tg If the tg responses the sme messge, the reder my trce the certin tg nd chieve its relted informtion If the ttcker A performs the following ctions: A( i : h ( PID, r 1 1, PID r 1 1 ; h ( PID, r 2 2, PID r 2 2 receives the messges nd serches ccess list L PID i in the, there is no mtching entry nd the protocol will terminte In the worse conditions, my responses those reders by mistke: A( i : h ( r, PID 1, ( r PID d 1 >> 1 1 ; h ( r, PID 2, ( r PID d 2 >> 2 2 ; Any two responses re independent since ( r, r, 1 r 2 re diverse from ech other nd 3 ( r, r, 1 r 2 re the sme situtions, while 3 d = [ ] hus, the ttcker is no bility to trce the i r i certin tg ccording to those different messges herefore, no mtter which wy the ttcker employs, it is impossible to trce certin tg nd the loction privcy is ensured D DOS Attck DOS ttck refers to the dtbse nd reders re not ble to process the norml communictions, becuse the ttcker mkes sure tht their resources struggling to keep up through lunching lot of requests he purpose of DOS ttck is not to chieve the sensitive dt, but rther tying to disturb the norml communiction In this protocol, we dopt two pproches to provide protection ginst the DOS ttck like [9] One is ccess lists ( L, L for preliminry check he dtbse will block mlicious ttcks by no mtching pseudorndom identifier in the ccess list L nd similrly L will help the tg discern the illegl reder Another pproch is rndom/ pseudorndom numbers ( r, r, PID, PID he legl tg nd reder store the lst received rndom numbers nd pseudorndom identifiers s temp lists hey cn refuse the query with the sme rndom number or pseudorndom identifier within certin time So the ttcker cn not disturb the norml communiction In the protocol, the forwrd security cn be ensured becuse of rndom / pseudorndom numbers An ttcker cnnot obtin tg s identifier replced by PID even it correctly guesses the rndom number r So the protocol offers nonymity VI PEFOMANCE ANALYSIS In FID systems, the performnce is nother importnt metric besides the security issue, such tht the optimiztion nd blnce between security nd performnce re necessry for FID systems [22] Like most uthentiction protocols, the protocol needs five phses to complete the whole uthentiction process In order to properly evlute the protocol, we compre it with other relted protocols in two spects: storge requirement nd computtion lod In our protocol, ech tg stores identifier pseudorndom identifier PID nd ccess list ID, L, while other relted cryptogrphic lgorithms(such s KAAP need store the secret keys Access list stores ll reders pseudorndom identifiers Additionlly, the memory consumption on one-wy hsh function is nother concern Stndrdized cryptogrphic hsh functions such s SHA-1 re too expensive for use in tody s low-cost FID tgs [22][23] A potentil lterntive is the Whirlpool hsh function, which hs been stndrdized by ISO/IEC nd evluted by the New Europen Schemes for Signtures, Integrity nd Encryption (NESSIE project [24] Prmstlleret l [25] present compct hrdwre implementtion of Whirlpool, which uses n innovtive stte representtion tht mkes it possible to significntly reduce the required hrdwre resources [13] During the entire round, ech reder nd ech tg performs one rndom number genertion ( NG opertion Ech tg lso performs one cryptogrphic hsh function while ech reder performs twice Like KAAP, we dopt the ccess lists L nd L to void exhustive serches in the storge, which reduce the time complexity of serch opertion ble 4 shows the performnce comprison with other relted protocols Our protocol hs the similr storge requirement s protocols [9][14] nd it is more thn S-M here re no exhustive serches in the protocol like protocols [9][14], while protocol [13] require t lest n serches in the storge In the storge nlysis, keys, rndom numbers nd hsh function vlue re ignored for the ske of simplicity All the other components re ssumed L bits sized he protocol owns cceptble storge requirement nd computtion lod From ble 4, it shows tht the protocol requirements fewer complex function invoctions for the tg thn the other three protocols 2013 ACADEMY PUBLISHE

7 JOUNAL OF COMPUES, VOL 8, NO 9, SEPEMBE ABLE III PEFOMANCE COMPAISON storge computtion DB+ S-M L +2H +(N+1H HIDVP 3L 3H +3H KAAP 3L +2E +2E Our protocol 3L +H +2H :NG opertion; H: hsh opertion; E: encryption; N:number of tgs; L: length of identifier/ccess list; Note: Ignoring the length of keys, rndom numbers nd hsh function vlue VII CONCLUSIONS In this pper, novel mutul uthentiction protocol bsed on one-wy hsh function is proposed for security protection in FID-bsed sensor systems he protocol dopts mutul uthentiction mechnism, ccess lists nd rndom ccess control mechnism to strengthen security nd privcy protection he design correctness of the protocol is verified by GNY logic using s forml nlysis According to ttck model nlysis, the protocol cn resist severl mjor ttcks Moreover, the protocol hs cceptble storge requirements nd computtion lod bsed on performnce nlysis he protocol hs better sclbility becuse it does not need the secret keys So the protocol is suitble for more lrge-scle nd highrelibility ppliction ACKNOWLEDGMEN his work ws supported in prt by grnt from ZheJing science nd technology pln key project, No 2007 c11023 EFEENCES [1] H Chien nd C Chen, Mutul uthentiction protocol for FID conforming to EPC clss 1 genertion 2 stndrds Computer Stndrds & Interfces, 29(2: , Februry 2007 [2] Dng Nguyen Duc, Hyunrok Lee nd Kwngjo Kim Enhncing Security of EPCGlobl Gen-2 FID ginst rcebility nd cloning Auto-ID Lbs White Pper WP- SWNE-016, 2006 [3] Meingst Mrci, King Jennifer nd Mullign Deirdre K Security nd privcy risks of embedded FID in everydy things: he e-pssport nd beyond Journl of Communictions, v 2, n 7, p 36-48, 2007 [4] Chen Bing, n Chengxing, Jin Bo, Zou Xing nd Di YueboFID-bsed electronic identity security cloud pltform in cyberspce Journl of Networks, v 7, n 7, p , 2012 [5] Gurv Kpoor nd Selwyn Pirmuthu Vulnerbilities in Some ecently Proposed FID Ownership rnsfer Protocols IEEE COMMUNICAIONS LEES, VOL 12, NO 3, MACH 2010 [6]S Pirmuthu, Lightweight cryptogrphic uthentiction in pssive FID-tgged systems, IEEE rns Systems, Mn, nd Cybernetics -Prt C, vol 38, no 3, pp , 2008 [7] A Juels, Yoking-proofs for FID tgs, in: First Interntionl Workshop on Pervsive Computing nd Communiction Security, 2004 [8] H Liu, H Ning,: Zero-Knowledge Authentiction Protocol Bsed on Alterntive Mode in FID Systems, IEEE Sensors Journl, Dec 2011,Vol 11, No 12, pp [9] H Ning, H Liu, J Mo, Y Zhng: Sclble nd distributed key rry uthentiction protocol in rdio frequency identifiction-bsed sensor systems, IE Communictions,2011,vol 5, lss12, pp [10] Sun, HM, ing, WC: A Gen2-bsed FID uthentiction protocol for security nd privcy, IEEE rns Mob Comput 2009, 8, (8, pp [11] K Ski, W Ku, Zimmermnn, M Sun, Dynmic Bit Encoding for Privcy Protection ginst Correltion Attcks in FID Bckwrd Chnnel IEEE ANSACIONS ON COMPUES, VOL 62, NO 1, JANUAY 2013,pp [12] Y in, G Chen, nd J Li A New Ultrlightweight FID Authentiction Protocol with Permuttion IEEE COMMUNICAIONS LEES, VOL 16, NO 5, MAY 2012, pp [13] B Song nd C J Mitchell, FID uthentiction protocol for Low-cost gs, In the Proceedings of WiSec 08, Mrch 2008, pp [14] hee, K, Kwk, J, Kim, S, Won, D: Chllenge-response bsed FID uthentiction protocol for distributed dtbse environment, Secur Pervsive Comput, 2005, 3450, pp [15] Doss, W Zhou, S Sundresn, S Yu, L Go A minimum disclosure pproch to uthentiction nd privcy in FID systems Computer Networks 56 ( [16] Bin Wng nd Mode M A Server Independent Authentiction Scheme for FID Systems IEEE ANSACIONS ON INDUSIAL INFOMAICS, VOL 8, NO 3, AUG 2012,pp [17] M Feldhofer, S Dominikus, nd JWolkerstorfer, Strong uthentiction for FID ystems using the AES lgorithm, in Proc CryptogrHrdw Embed Syst, CHES 04, 2004, vol 3156, LNCS, pp [18] S I Ahmed, F hmn, nd E Hoque, EAP: ECC bsed FID uthentiction protocol, in Proc 12th IEEE Int Workshop on Future rends of Distrib Comput Syst (FDCS 08, 2008, pp [19] Gong, L, Needhm,, Yhlom, : esoning bout belief in cryptogrphic protocols Proc IEEE Computer Society Symp eserch in Security nd Privcy, Cliforni, USA, My 1990,pp [20] Godor, G, Imre, S: Security nlysis of the simple lightweight uthentiction protocol Proc 2010 Ninth Int Conf Networks (ICN, French Alps, Frnce, April 2010, pp [21] Oltenu, A, Xio, Y, Zhng, Y: Optimiztion between AES security nd performnce for IEEE WPAN, IEEE rns Wirel Commun, 2009, 8, (12, pp [22] M Lehtonen, Stke, F Michhelles, nd E Fleisch From identifiction to uthentiction review of FID product uthentiction techniques In Printed hndout of Workshop on FID Security FIDSec 2006, 2006 [23] Stephen Weis Security nd privcy in rdio-frequency identifiction devices Mster s thesis, Msschusetts Institute of echnology (MI, Msschusetts, USA, My 2003 [24] B Preneel et l Finl report of Europen project IS : New Europen schemes for signtures, integrity, nd encryption Avilble t: wwwcosicestkuleuvenbe/nessie/, April 2004 [25] N Prmstller, C echberger, nd V ijmen A compct FPGA implementtion of the hsh function whirlpool In ACM/SIGDA 14th interntionl symposium on Field 2013 ACADEMY PUBLISHE

8 2412 JOUNAL OF COMPUES, VOL 8, NO 9, SEPEMBE 2013 Progrmmble Gte Arrys FPGA 06, ACM Press, pges , New York, 2006 Xueping en ws born in 1978 in Zhejing Province, Chin She received the BS degree from Hnzhou Dinzi University, Hngzhou, Chin, in 2005 Currently, she is lecturer t the School of computer science nd technology, Hngzhou Dinzi University She hs prticipted in severl reserch projects t the provincil Science Foundtion of Zhejing nd the Development Progrm of Chin (973 Project, etc She hs published more thn 10 ppers in journls, interntionl confer ences nd workshops, her current reserch focuses on FID Xinghu Xu is now professor in the School of Computer Science t Hngzhou Dinzi Unviersity, Chin He received his BEng in Computer Science from Hngzhou Dinzi University, Chin, nd his PhD degree in Computer Science from Zhejing University, Chin His reserch interests include wireless networks, prllel nd distributed computing, cloud computing His recent reserch hs been supported by Nturl Science Fundtion of Chin He hs served s progrm committee member of ChinGrid 2008/2009/2011, GCC 2009/2010 nd the publiction chir of APSCC 2010 He is the member of the IEEE, ACM, the senior member of CCF (Chin Computer Federtion He is lso the member of CCF echnicl Committee of Service Computing nd CCF echnicl Committee of High Performnce Computing E-mil: xhxu@hdueducn Yunf Li is n ssocite professor of the School of Computer Science nd echnology, Hngzhou Dinzi University, P Chin He received the PhD degree nd the Mster degree in Computing Science from Huzhong University of Science nd echnology, nd the bchelor's degree in mthemtics from Wuhn University His reserch interests include Performnce Modeling nd Anlysis of Softwre, Virtul Mchine, Cloud Computing, System Security, nd Network Security He hs published over 30 reserch ppers in the well-estblished journls nd conferences including Cluster Computing, he Journl of Supercomputing, IE Communictions, Interntionl Journl of Ad Hoc Ubiquitous Computing, Jisunji Ynjiu yu Fnzhn, nd ien zu Hsueh Po 2013 ACADEMY PUBLISHE

Y9.ET1.3 Implementation of Secure Energy Management against Cyber/physical Attacks for FREEDM System

Y9.ET1.3 Implementation of Secure Energy Management against Cyber/physical Attacks for FREEDM System Y9.ET1.3 Implementtion of Secure Energy ngement ginst Cyber/physicl Attcks for FREED System Project Leder: Fculty: Students: Dr. Bruce cillin Dr. o-yuen Chow Jie Dun 1. Project Gols Develop resilient cyber-physicl

More information

Study on SLT calibration method of 2-port waveguide DUT

Study on SLT calibration method of 2-port waveguide DUT Interntionl Conference on Advnced Electronic cience nd Technology (AET 206) tudy on LT clibrtion method of 2-port wveguide DUT Wenqing Luo, Anyong Hu, Ki Liu nd Xi Chen chool of Electronics nd Informtion

More information

A Novel Back EMF Zero Crossing Detection of Brushless DC Motor Based on PWM

A Novel Back EMF Zero Crossing Detection of Brushless DC Motor Based on PWM A ovel Bck EMF Zero Crossing Detection of Brushless DC Motor Bsed on PWM Zhu Bo-peng Wei Hi-feng School of Electricl nd Informtion, Jingsu niversity of Science nd Technology, Zhenjing 1003 Chin) Abstrct:

More information

CHAPTER 2 LITERATURE STUDY

CHAPTER 2 LITERATURE STUDY CHAPTER LITERATURE STUDY. Introduction Multipliction involves two bsic opertions: the genertion of the prtil products nd their ccumultion. Therefore, there re two possible wys to speed up the multipliction:

More information

Efficient and Resilient Key Discovery based on Pseudo-Random Key Pre-Deployment

Efficient and Resilient Key Discovery based on Pseudo-Random Key Pre-Deployment Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment p. 1 Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment Roerto Di Pietro, Luigi V. Mncini, nd Alessndro

More information

A Slot-Asynchronous MAC Protocol Design for Blind Rendezvous in Cognitive Radio Networks

A Slot-Asynchronous MAC Protocol Design for Blind Rendezvous in Cognitive Radio Networks Globecom 04 - Wireless Networking Symposium A Slot-Asynchronous MAC Protocol Design for Blind Rendezvous in Cognitive Rdio Networks Xingy Liu nd Jing Xie Deprtment of Electricl nd Computer Engineering

More information

Multi-beam antennas in a broadband wireless access system

Multi-beam antennas in a broadband wireless access system Multi-em ntenns in rodnd wireless ccess system Ulrik Engström, Mrtin Johnsson, nders Derneryd nd jörn Johnnisson ntenn Reserch Center Ericsson Reserch Ericsson SE-4 84 Mölndl Sweden E-mil: ulrik.engstrom@ericsson.com,

More information

Interference Cancellation Method without Feedback Amount for Three Users Interference Channel

Interference Cancellation Method without Feedback Amount for Three Users Interference Channel Open Access Librry Journl 07, Volume, e57 ISSN Online: -97 ISSN Print: -9705 Interference Cncelltion Method without Feedbc Amount for Three Users Interference Chnnel Xini Tin, otin Zhng, Wenie Ji School

More information

Fuzzy Logic Controller for Three Phase PWM AC-DC Converter

Fuzzy Logic Controller for Three Phase PWM AC-DC Converter Journl of Electrotechnology, Electricl Engineering nd Mngement (2017) Vol. 1, Number 1 Clusius Scientific Press, Cnd Fuzzy Logic Controller for Three Phse PWM AC-DC Converter Min Muhmmd Kml1,, Husn Ali2,b

More information

On the Description of Communications Between Software Components with UML

On the Description of Communications Between Software Components with UML On the Description of Communictions Between Softwre Components with UML Zhiwei An Dennis Peters Fculty of Engineering nd Applied Science Memoril University of Newfoundlnd St. John s NL A1B 3X5 zhiwei@engr.mun.c

More information

Rek Molva, Alain Pannetrat. Institut Eurecom, Sophia-Antipolis, France. cryptographic keying material.

Rek Molva, Alain Pannetrat. Institut Eurecom, Sophia-Antipolis, France. cryptographic keying material. clble Multicst ecurity in Dynmic Groups. Rek Molv, Alin Pnnetrt Institut Eurecom, ophi-antipolis, Frnce. fmolv,pnnetrg@eurecom.fr Abstrct In this pper we propose new frmework for multicst security bsed

More information

MAXIMUM FLOWS IN FUZZY NETWORKS WITH FUNNEL-SHAPED NODES

MAXIMUM FLOWS IN FUZZY NETWORKS WITH FUNNEL-SHAPED NODES MAXIMUM FLOWS IN FUZZY NETWORKS WITH FUNNEL-SHAPED NODES Romn V. Tyshchuk Informtion Systems Deprtment, AMI corportion, Donetsk, Ukrine E-mil: rt_science@hotmil.com 1 INTRODUCTION During the considertion

More information

METHOD OF LOCATION USING SIGNALS OF UNKNOWN ORIGIN. Inventor: Brian L. Baskin

METHOD OF LOCATION USING SIGNALS OF UNKNOWN ORIGIN. Inventor: Brian L. Baskin METHOD OF LOCATION USING SIGNALS OF UNKNOWN ORIGIN Inventor: Brin L. Bskin 1 ABSTRACT The present invention encompsses method of loction comprising: using plurlity of signl trnsceivers to receive one or

More information

Jamming-Resistant Collaborative Broadcast In Wireless Networks, Part II: Multihop Networks

Jamming-Resistant Collaborative Broadcast In Wireless Networks, Part II: Multihop Networks Jmming-Resistnt ollbortive Brodcst In Wireless Networks, Prt II: Multihop Networks Ling Xio Ximen University, hin 361005 Emil: lxio@xmu.edu.cn Huiyu Di N Stte University, Rleigh, N 27695 Emil: huiyu di@ncsu.edu

More information

The Discussion of this exercise covers the following points:

The Discussion of this exercise covers the following points: Exercise 4 Bttery Chrging Methods EXERCISE OBJECTIVE When you hve completed this exercise, you will be fmilir with the different chrging methods nd chrge-control techniques commonly used when chrging Ni-MI

More information

Information-Coupled Turbo Codes for LTE Systems

Information-Coupled Turbo Codes for LTE Systems Informtion-Coupled Turbo Codes for LTE Systems Lei Yng, Yixun Xie, Xiowei Wu, Jinhong Yun, Xingqing Cheng nd Lei Wn rxiv:709.06774v [cs.it] 20 Sep 207 Abstrct We propose new clss of informtion-coupled

More information

Algorithms for Memory Hierarchies Lecture 14

Algorithms for Memory Hierarchies Lecture 14 Algorithms for emory Hierrchies Lecture 4 Lecturer: Nodri Sitchinv Scribe: ichel Hmnn Prllelism nd Cche Obliviousness The combintion of prllelism nd cche obliviousness is n ongoing topic of reserch, in

More information

Simulation of Transformer Based Z-Source Inverter to Obtain High Voltage Boost Ability

Simulation of Transformer Based Z-Source Inverter to Obtain High Voltage Boost Ability Interntionl Journl of cience, Engineering nd Technology Reserch (IJETR), olume 4, Issue 1, October 15 imultion of Trnsformer Bsed Z-ource Inverter to Obtin High oltge Boost Ability A.hnmugpriy 1, M.Ishwry

More information

Understanding Basic Analog Ideal Op Amps

Understanding Basic Analog Ideal Op Amps Appliction Report SLAA068A - April 2000 Understnding Bsic Anlog Idel Op Amps Ron Mncini Mixed Signl Products ABSTRACT This ppliction report develops the equtions for the idel opertionl mplifier (op mp).

More information

ABB STOTZ-KONTAKT. ABB i-bus EIB Current Module SM/S Intelligent Installation Systems. User Manual SM/S In = 16 A AC Un = 230 V AC

ABB STOTZ-KONTAKT. ABB i-bus EIB Current Module SM/S Intelligent Installation Systems. User Manual SM/S In = 16 A AC Un = 230 V AC User Mnul ntelligent nstlltion Systems A B 1 2 3 4 5 6 7 8 30 ma 30 ma n = AC Un = 230 V AC 30 ma 9 10 11 12 C ABB STOTZ-KONTAKT Appliction Softwre Current Vlue Threshold/1 Contents Pge 1 Device Chrcteristics...

More information

Exercise 1-1. The Sine Wave EXERCISE OBJECTIVE DISCUSSION OUTLINE. Relationship between a rotating phasor and a sine wave DISCUSSION

Exercise 1-1. The Sine Wave EXERCISE OBJECTIVE DISCUSSION OUTLINE. Relationship between a rotating phasor and a sine wave DISCUSSION Exercise 1-1 The Sine Wve EXERCISE OBJECTIVE When you hve completed this exercise, you will be fmilir with the notion of sine wve nd how it cn be expressed s phsor rotting round the center of circle. You

More information

Electrically Large Zero-Phase-Shift Metamaterial-based Grid Array Antenna for UHF Near-Field RFID Readers

Electrically Large Zero-Phase-Shift Metamaterial-based Grid Array Antenna for UHF Near-Field RFID Readers Electriclly Lrge Zero-Phse-Shift Metmteril-bsed Grid Arry Antenn for UHF Ner-Field RFID Reders Jin Shi, Xinming Qing, member IEEE, Zhi Ning Chen, Fellow, IEEE Abstrct A grid rry ntenn using zero-phse-shift

More information

BP-P2P: Belief Propagation-Based Trust and Reputation Management for P2P Networks

BP-P2P: Belief Propagation-Based Trust and Reputation Management for P2P Networks BP-PP: Belief Propgtion-Bsed Trust nd Reputtion Mngement for PP Networs Ermn Aydy School of Electricl nd Comp. Eng. Georgi Institute of Technology Atlnt, GA 333, USA Emil: eydy@gtech.edu Frmrz Feri School

More information

CS2204 DIGITAL LOGIC & STATE MACHINE DESIGN fall 2008

CS2204 DIGITAL LOGIC & STATE MACHINE DESIGN fall 2008 CS224 DIGITAL LOGIC & STATE MACHINE DESIGN fll 28 STAND ALONE XILINX PROJECT 2-TO- MULTIPLEXER. Gols : Lern how to develop stnd lone 2-to- multiplexer () Xilinx project during which the following re introduced

More information

Engineer-to-Engineer Note

Engineer-to-Engineer Note Engineer-to-Engineer Note EE-236 Technicl notes on using Anlog Devices DSPs, processors nd development tools Contct our technicl support t dsp.support@nlog.com nd t dsptools.support@nlog.com Or visit our

More information

Application of Wavelet De-noising in Vibration Torque Measurement

Application of Wavelet De-noising in Vibration Torque Measurement IJCSI Interntionl Journl of Computer Science Issues, Vol. 9, Issue 5, No 3, September 01 www.ijcsi.org 9 Appliction of Wvelet De-noising in Vibrtion orque Mesurement Ho Zho 1 1 Jixing University, Jixing,

More information

A Key Set Cipher for Wireless Sensor Networks

A Key Set Cipher for Wireless Sensor Networks A Key Set Cipher for Wireless Sensor etworks Subhsh Kk Abstrct This pper proposes the use of sets of keys, together with corresponding identifiers, for use in wireless sensor networks (WS) nd similr computing

More information

To provide data transmission in indoor

To provide data transmission in indoor Hittite Journl of Science nd Engineering, 2018, 5 (1) 25-29 ISSN NUMBER: 2148-4171 DOI: 10.17350/HJSE19030000074 A New Demodultor For Inverse Pulse Position Modultion Technique Mehmet Sönmez Osmniye Korkut

More information

This is a repository copy of Effect of power state on absorption cross section of personal computer components.

This is a repository copy of Effect of power state on absorption cross section of personal computer components. This is repository copy of Effect of power stte on bsorption cross section of personl computer components. White Rose Reserch Online URL for this pper: http://eprints.whiterose.c.uk/10547/ Version: Accepted

More information

Mixed CMOS PTL Adders

Mixed CMOS PTL Adders Anis do XXVI Congresso d SBC WCOMPA l I Workshop de Computção e Aplicções 14 20 de julho de 2006 Cmpo Grnde, MS Mixed CMOS PTL Adders Déor Mott, Reginldo d N. Tvres Engenhri em Sistems Digitis Universidde

More information

Synchronous Machine Parameter Measurement

Synchronous Machine Parameter Measurement Synchronous Mchine Prmeter Mesurement 1 Synchronous Mchine Prmeter Mesurement Introduction Wound field synchronous mchines re mostly used for power genertion but lso re well suited for motor pplictions

More information

A Development of Earthing-Resistance-Estimation Instrument

A Development of Earthing-Resistance-Estimation Instrument A Development of Erthing-Resistnce-Estimtion Instrument HITOSHI KIJIMA Abstrct: - Whenever erth construction work is done, the implnted number nd depth of electrodes hve to be estimted in order to obtin

More information

Synchronous Generator Line Synchronization

Synchronous Generator Line Synchronization Synchronous Genertor Line Synchroniztion 1 Synchronous Genertor Line Synchroniztion Introduction One issue in power genertion is synchronous genertor strting. Typiclly, synchronous genertor is connected

More information

CS 135: Computer Architecture I. Boolean Algebra. Basic Logic Gates

CS 135: Computer Architecture I. Boolean Algebra. Basic Logic Gates Bsic Logic Gtes : Computer Architecture I Boolen Algebr Instructor: Prof. Bhgi Nrhri Dept. of Computer Science Course URL: www.ses.gwu.edu/~bhgiweb/cs35/ Digitl Logic Circuits We sw how we cn build the

More information

Postprint. This is the accepted version of a paper presented at IEEE PES General Meeting.

Postprint.   This is the accepted version of a paper presented at IEEE PES General Meeting. http://www.div-portl.org Postprint This is the ccepted version of pper presented t IEEE PES Generl Meeting. Cittion for the originl published pper: Mhmood, F., Hooshyr, H., Vnfretti, L. (217) Sensitivity

More information

Foot-Pedal: Haptic Feedback Human Interface Bridging Sensational Gap between Remote Places

Foot-Pedal: Haptic Feedback Human Interface Bridging Sensational Gap between Remote Places Foot-Pedl: Hptic Feedbck Humn Interfce Bridging Senstionl Gp between Remote Plces Mincheol Kim 1, De-Keun Yoon 2, Shin-Young Kim 1, Ji-Hi Cho 1, Kwng-Kyu Lee 1, Bum-Je You 1,3 1 Center of Humn-centered

More information

BP-P2P: Belief Propagation-Based Trust and Reputation Management for P2P Networks

BP-P2P: Belief Propagation-Based Trust and Reputation Management for P2P Networks 1 9th Annul IEEE Communictions Society Conference on Sensor, Mesh nd Ad Hoc Communictions nd Networs (SECON) BP-PP: Belief Propgtion-Bsed Trust nd Reputtion Mngement for PP Networs Ermn Aydy School of

More information

Dataflow Language Model. DataFlow Models. Applications of Dataflow. Dataflow Languages. Kahn process networks. A Kahn Process (1)

Dataflow Language Model. DataFlow Models. Applications of Dataflow. Dataflow Languages. Kahn process networks. A Kahn Process (1) The slides contin revisited mterils from: Peter Mrwedel, TU Dortmund Lothr Thiele, ETH Zurich Frnk Vhid, University of liforni, Riverside Dtflow Lnguge Model Drsticlly different wy of looking t computtion:

More information

CHAPTER 3 AMPLIFIER DESIGN TECHNIQUES

CHAPTER 3 AMPLIFIER DESIGN TECHNIQUES CHAPTER 3 AMPLIFIER DEIGN TECHNIQUE 3.0 Introduction olid-stte microwve mplifiers ply n importnt role in communiction where it hs different pplictions, including low noise, high gin, nd high power mplifiers.

More information

Synchronous Machine Parameter Measurement

Synchronous Machine Parameter Measurement Synchronous Mchine Prmeter Mesurement 1 Synchronous Mchine Prmeter Mesurement Introduction Wound field synchronous mchines re mostly used for power genertion but lso re well suited for motor pplictions

More information

Adaptive Network Coding for Wireless Access Networks

Adaptive Network Coding for Wireless Access Networks Adptive Network Coding for Wireless Access Networks Tun Trn School of Electricl Engineering nd Computer Science Oregon Stte University, Corvllis, Oregon 9733 Emil: trntu@eecs.orst.edu Thinh Nguyen School

More information

A Cluster-based TDMA System for Inter-Vehicle Communications *

A Cluster-based TDMA System for Inter-Vehicle Communications * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 30, 213-231 (2014) A Cluster-bsed TDMA System for Inter-Vehicle Communictions * Deprtment of Electricl Engineering Ntionl Sun Yt-Sen University Kohsiung,

More information

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad Hll Ticket No Question Pper Code: AEC009 INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigl, Hyderd - 500 043 MODEL QUESTION PAPER Four Yer B.Tech V Semester End Exmintions, Novemer - 2018 Regultions:

More information

Energy Harvesting Two-Way Channels With Decoding and Processing Costs

Energy Harvesting Two-Way Channels With Decoding and Processing Costs IEEE TRANSACTIONS ON GREEN COMMUNICATIONS AND NETWORKING, VOL., NO., MARCH 07 3 Energy Hrvesting Two-Wy Chnnels With Decoding nd Processing Costs Ahmed Arf, Student Member, IEEE, Abdulrhmn Bknin, Student

More information

EE Controls Lab #2: Implementing State-Transition Logic on a PLC

EE Controls Lab #2: Implementing State-Transition Logic on a PLC Objective: EE 44 - Controls Lb #2: Implementing Stte-rnsition Logic on PLC ssuming tht speed is not of essence, PLC's cn be used to implement stte trnsition logic. he dvntge of using PLC over using hrdwre

More information

A COMPARISON OF CIRCUIT IMPLEMENTATIONS FROM A SECURITY PERSPECTIVE

A COMPARISON OF CIRCUIT IMPLEMENTATIONS FROM A SECURITY PERSPECTIVE A COMPARISON OF CIRCUIT IMPLEMENTATIONS FROM A SECURITY PERSPECTIVE Mster Thesis Division of Electronic Devices Deprtment of Electricl Engineering Linköping University y Timmy Sundström LITH-ISY-EX--05/3698--SE

More information

(CATALYST GROUP) B"sic Electric"l Engineering

(CATALYST GROUP) Bsic Electricl Engineering (CATALYST GROUP) B"sic Electric"l Engineering 1. Kirchhoff s current l"w st"tes th"t (") net current flow "t the junction is positive (b) Hebr"ic sum of the currents meeting "t the junction is zero (c)

More information

Network-coded Cooperation for Multi-unicast with Non-Ideal Source-Relay Channels

Network-coded Cooperation for Multi-unicast with Non-Ideal Source-Relay Channels This full text pper ws peer reviewed t the direction of IEEE Communictions Society suject mtter experts for puliction in the IEEE ICC 2010 proceedings Network-coded Coopertion for Multi-unicst with Non-Idel

More information

Open Access A Novel Parallel Current-sharing Control Method of Switch Power Supply

Open Access A Novel Parallel Current-sharing Control Method of Switch Power Supply Send Orders for Reprints to reprints@enthmscience.e 170 The Open Electricl & Electronic Engineering Journl, 2014, 8, 170-177 Open Access A Novel Prllel Current-shring Control Method of Switch Power Supply

More information

The Math Learning Center PO Box 12929, Salem, Oregon Math Learning Center

The Math Learning Center PO Box 12929, Salem, Oregon Math Learning Center Resource Overview Quntile Mesure: Skill or Concept: 300Q Model the concept of ddition for sums to 10. (QT N 36) Model the concept of sutrction using numers less thn or equl to 10. (QT N 37) Write ddition

More information

Engineer-to-Engineer Note

Engineer-to-Engineer Note Engineer-to-Engineer Note EE-297 Technicl notes on using Anlog Devices DSPs, processors nd development tools Visit our Web resources http://www.nlog.com/ee-notes nd http://www.nlog.com/processors or e-mil

More information

Domination and Independence on Square Chessboard

Domination and Independence on Square Chessboard Engineering nd Technology Journl Vol. 5, Prt, No. 1, 017 A.A. Omrn Deprtment of Mthemtics, College of Eduction for Pure Science, University of bylon, bylon, Irq pure.hmed.omrn@uobby lon.edu.iq Domintion

More information

A Channel Splitting Technique for Reducing Handoff Delay in Wireless Networks

A Channel Splitting Technique for Reducing Handoff Delay in Wireless Networks Interntionl Journl o Engineering Reserch & Technology (IJERT) A Chnnel Splitting Technique or Reducing Hndo ely in Wireless Networks Jeykumr. J #1, Venktesh. * 2, Vigneswri. G* 3, Nivethith. V *4 # 1 PG

More information

Development and application of a patent-based design around. process

Development and application of a patent-based design around. process Authors: Yeh-Ling Hsu, Po-Er Hsu, Yung-Chieh Hung, Y-Dn Xio (--4); recommended: Yeh-Ling Hsu (-6-9). Note: his pper is presented t the st Interntionl Conference on Systemtic Innovtion, Hsinchu, iwn, Jnury.

More information

Design of UHF Fractal Antenna for Localized Near-Field RFID Application

Design of UHF Fractal Antenna for Localized Near-Field RFID Application 1 Design of UHF Frctl Antenn for Loclized Ner-Field RFID Appliction Yonghui To, Erfu Yng, Yxin Dong, nd Gng Wng, Memer, IEEE Astrct In this pper, frctl structure is proposed for loclized ner-field UHF

More information

A New Algorithm to Compute Alternate Paths in Reliable OSPF (ROSPF)

A New Algorithm to Compute Alternate Paths in Reliable OSPF (ROSPF) A New Algorithm to Compute Alternte Pths in Relile OSPF (ROSPF) Jin Pu *, Eric Mnning, Gholmli C. Shoj, Annd Srinivsn ** PANDA Group, Computer Science Deprtment University of Victori Victori, BC, Cnd Astrct

More information

Design and Modeling of Substrate Integrated Waveguide based Antenna to Study the Effect of Different Dielectric Materials

Design and Modeling of Substrate Integrated Waveguide based Antenna to Study the Effect of Different Dielectric Materials Design nd Modeling of Substrte Integrted Wveguide bsed Antenn to Study the Effect of Different Dielectric Mterils Jgmeet Kour 1, Gurpdm Singh 1, Sndeep Ary 2 1Deprtment of Electronics nd Communiction Engineering,

More information

CS2204 DIGITAL LOGIC & STATE MACHINE DESIGN SPRING 2005

CS2204 DIGITAL LOGIC & STATE MACHINE DESIGN SPRING 2005 CS2204 DIGITAL LOGIC & STATE MACHINE DESIGN SPRING 2005 EXPERIMENT 1 FUNDAMENTALS 1. GOALS : Lern how to develop cr lrm digitl circuit during which the following re introduced : CS2204 l fundmentls, nd

More information

Robustness Analysis of Pulse Width Modulation Control of Motor Speed

Robustness Analysis of Pulse Width Modulation Control of Motor Speed Proceedings of the World Congress on Engineering nd Computer Science 2007 WCECS 2007, October 24-26, 2007, Sn Frncisco, USA obustness Anlysis of Pulse Width Modultion Control of Motor Speed Wei Zhn Abstrct

More information

Redundancy Data Elimination Scheme Based on Stitching Technique in Image Senor Networks

Redundancy Data Elimination Scheme Based on Stitching Technique in Image Senor Networks Sensors & Trnsducers 204 by IFSA Publishing, S. L. http://www.sensorsportl.com Redundncy Dt Elimintion Scheme Bsed on Stitching Technique in Imge Senor Networks hunling Tng hongqing Technology nd Business

More information

Nevery electronic device, since all the semiconductor

Nevery electronic device, since all the semiconductor Proceedings of Interntionl Joint Conference on Neurl Networks, Orlndo, Florid, USA, August 12-17, 2007 A Self-tuning for Rel-time Voltge Regultion Weiming Li, Xio-Hu Yu Abstrct In this reserch, self-tuning

More information

University of North Carolina-Charlotte Department of Electrical and Computer Engineering ECGR 4143/5195 Electrical Machinery Fall 2009

University of North Carolina-Charlotte Department of Electrical and Computer Engineering ECGR 4143/5195 Electrical Machinery Fall 2009 Problem 1: Using DC Mchine University o North Crolin-Chrlotte Deprtment o Electricl nd Computer Engineering ECGR 4143/5195 Electricl Mchinery Fll 2009 Problem Set 4 Due: Thursdy October 8 Suggested Reding:

More information

Engineer-to-Engineer Note

Engineer-to-Engineer Note Engineer-to-Engineer Note EE-247 Technicl notes on using Anlog Devices DSPs, processors nd development tools Contct our technicl support t dsp.support@nlog.com nd t dsptools.support@nlog.com Or visit our

More information

Experiment 3: Non-Ideal Operational Amplifiers

Experiment 3: Non-Ideal Operational Amplifiers Experiment 3: Non-Idel Opertionl Amplifiers Fll 2009 Equivlent Circuits The bsic ssumptions for n idel opertionl mplifier re n infinite differentil gin ( d ), n infinite input resistnce (R i ), zero output

More information

LECTURE 9: QUADRATIC RESIDUES AND THE LAW OF QUADRATIC RECIPROCITY

LECTURE 9: QUADRATIC RESIDUES AND THE LAW OF QUADRATIC RECIPROCITY LECTURE 9: QUADRATIC RESIDUES AND THE LAW OF QUADRATIC RECIPROCITY 1. Bsic roerties of qudrtic residues We now investigte residues with secil roerties of lgebric tye. Definition 1.1. (i) When (, m) 1 nd

More information

Sequential Logic (2) Synchronous vs Asynchronous Sequential Circuit. Clock Signal. Synchronous Sequential Circuits. FSM Overview 9/10/12

Sequential Logic (2) Synchronous vs Asynchronous Sequential Circuit. Clock Signal. Synchronous Sequential Circuits. FSM Overview 9/10/12 9//2 Sequentil (2) ENGG5 st Semester, 22 Dr. Hden So Deprtment of Electricl nd Electronic Engineering http://www.eee.hku.hk/~engg5 Snchronous vs Asnchronous Sequentil Circuit This Course snchronous Sequentil

More information

Polar Coordinates. July 30, 2014

Polar Coordinates. July 30, 2014 Polr Coordintes July 3, 4 Sometimes it is more helpful to look t point in the xy-plne not in terms of how fr it is horizontlly nd verticlly (this would men looking t the Crtesin, or rectngulr, coordintes

More information

Design And Implementation Of Luo Converter For Electric Vehicle Applications

Design And Implementation Of Luo Converter For Electric Vehicle Applications Design And Implementtion Of Luo Converter For Electric Vehicle Applictions A.Mnikndn #1, N.Vdivel #2 ME (Power Electronics nd Drives) Deprtment of Electricl nd Electronics Engineering Sri Shkthi Institute

More information

Joanna Towler, Roading Engineer, Professional Services, NZTA National Office Dave Bates, Operations Manager, NZTA National Office

Joanna Towler, Roading Engineer, Professional Services, NZTA National Office Dave Bates, Operations Manager, NZTA National Office . TECHNICA MEMOANDM To Cc repred By Endorsed By NZTA Network Mngement Consultnts nd Contrctors NZTA egionl Opertions Mngers nd Are Mngers Dve Btes, Opertions Mnger, NZTA Ntionl Office Jonn Towler, oding

More information

MATH 118 PROBLEM SET 6

MATH 118 PROBLEM SET 6 MATH 118 PROBLEM SET 6 WASEEM LUTFI, GABRIEL MATSON, AND AMY PIRCHER Section 1 #16: Show tht if is qudrtic residue modulo m, nd b 1 (mod m, then b is lso qudrtic residue Then rove tht the roduct of the

More information

Student Book SERIES. Patterns and Algebra. Name

Student Book SERIES. Patterns and Algebra. Name E Student Book 3 + 7 5 + 5 Nme Contents Series E Topic Ptterns nd functions (pp. ) identifying nd creting ptterns skip counting completing nd descriing ptterns predicting repeting ptterns predicting growing

More information

April 9, 2000 DIS chapter 10 CHAPTER 3 : INTEGRATED PROCESSOR-LEVEL ARCHITECTURES FOR REAL-TIME DIGITAL SIGNAL PROCESSING

April 9, 2000 DIS chapter 10 CHAPTER 3 : INTEGRATED PROCESSOR-LEVEL ARCHITECTURES FOR REAL-TIME DIGITAL SIGNAL PROCESSING April 9, 2000 DIS chpter 0 CHAPTE 3 : INTEGATED POCESSO-LEVEL ACHITECTUES FO EAL-TIME DIGITAL SIGNAL POCESSING April 9, 2000 DIS chpter 3.. INTODUCTION The purpose of this chpter is twofold. Firstly, bsic

More information

High-speed Simulation of the GPRS Link Layer

High-speed Simulation of the GPRS Link Layer 989 High-speed Simultion of the GPRS Link Lyer J Gozlvez nd J Dunlop Deprtment of Electronic nd Electricl Engineering, University of Strthclyde 204 George St, Glsgow G-lXW, Scotlnd Tel: +44 4 548 206,

More information

A New Stochastic Inner Product Core Design for Digital FIR Filters

A New Stochastic Inner Product Core Design for Digital FIR Filters MATEC Web of Conferences, (7) DOI:./ mtecconf/7 CSCC 7 A New Stochstic Inner Product Core Design for Digitl FIR Filters Ming Ming Wong,, M. L. Dennis Wong, Cishen Zhng, nd Ismt Hijzin Fculty of Engineering,

More information

Products no longer available

Products no longer available echnicl dt sheet otry ctutor F2-P(-O) ultifunctionl rotry ctutor with emergency control for 2 nd 3 wy control bll vlve orque Nm Nominl voltge C/DC 2 V Control: odulting DC... V or vrible Position feedbck

More information

Improving Iris Identification using User Quality and Cohort Information

Improving Iris Identification using User Quality and Cohort Information Improving Iris Identifiction using User Qulity nd Cohort Informtion Arun Pssi, Ajy Kumr Biometrics Reserch Lbortory Deprtment of Electricl Engineering, Indin Institute of Technology Delhi Huz Khs, New

More information

Math Circles Finite Automata Question Sheet 3 (Solutions)

Math Circles Finite Automata Question Sheet 3 (Solutions) Mth Circles Finite Automt Question Sheet 3 (Solutions) Nickols Rollick nrollick@uwterloo.c Novemer 2, 28 Note: These solutions my give you the nswers to ll the prolems, ut they usully won t tell you how

More information

Three-Phase NPC Inverter Using Three-Phase Coupled Inductor

Three-Phase NPC Inverter Using Three-Phase Coupled Inductor ThreePhse NPC Inverter Using ThreePhse Coupled Inductor Romeu Husmnn 1, Rodrigo d Silv 2 nd Ivo Brbi 2 1 Deprtment of Electricl nd Telecommuniction Engineering, University of Blumenu FURB Blumenu SC Brzil,

More information

On the Prediction of EPON Traffic Using Polynomial Fitting in Optical Network Units

On the Prediction of EPON Traffic Using Polynomial Fitting in Optical Network Units On the Prediction of EP Trffic Using Polynomil Fitting in Opticl Networ Units I. Mmounis (1),(3), K. Yinnopoulos (2), G. Ppdimitriou (4), E. Vrvrigos (1),(3) (1) Computer Technology Institute nd Press

More information

B inary classification refers to the categorization of data

B inary classification refers to the categorization of data ROBUST MODULAR ARTMAP FOR MULTI-CLASS SHAPE RECOGNITION Chue Poh Tn, Chen Chnge Loy, Weng Kin Li, Chee Peng Lim Abstrct This pper presents Fuzzy ARTMAP (FAM) bsed modulr rchitecture for multi-clss pttern

More information

Geometric quantities for polar curves

Geometric quantities for polar curves Roerto s Notes on Integrl Clculus Chpter 5: Bsic pplictions of integrtion Section 10 Geometric quntities for polr curves Wht you need to know lredy: How to use integrls to compute res nd lengths of regions

More information

High Speed On-Chip Interconnects: Trade offs in Passive Termination

High Speed On-Chip Interconnects: Trade offs in Passive Termination High Speed On-Chip Interconnects: Trde offs in Pssive Termintion Rj Prihr University of Rochester, NY, USA prihr@ece.rochester.edu Abstrct In this pper, severl pssive termintion schemes for high speed

More information

Experiment 3: Non-Ideal Operational Amplifiers

Experiment 3: Non-Ideal Operational Amplifiers Experiment 3: Non-Idel Opertionl Amplifiers 9/11/06 Equivlent Circuits The bsic ssumptions for n idel opertionl mplifier re n infinite differentil gin ( d ), n infinite input resistnce (R i ), zero output

More information

Secret Key Generation and Agreement in UWB Communication Channels

Secret Key Generation and Agreement in UWB Communication Channels Secret Key Genertion nd greement in UW Communiction Chnnels Msoud Ghoreishi Mdiseh, Michel L. McGuire, Stephen S. Neville, Lin Ci, Michel Horie Deprtment of Electricl nd Computer Engineering University

More information

Module 9. DC Machines. Version 2 EE IIT, Kharagpur

Module 9. DC Machines. Version 2 EE IIT, Kharagpur Module 9 DC Mchines Version EE IIT, Khrgpur esson 40 osses, Efficiency nd Testing of D.C. Mchines Version EE IIT, Khrgpur Contents 40 osses, efficiency nd testing of D.C. mchines (esson-40) 4 40.1 Gols

More information

Application Note. Differential Amplifier

Application Note. Differential Amplifier Appliction Note AN367 Differentil Amplifier Author: Dve n Ess Associted Project: Yes Associted Prt Fmily: CY8C9x66, CY8C7x43, CY8C4x3A PSoC Designer ersion: 4. SP3 Abstrct For mny sensing pplictions, desirble

More information

ECE 274 Digital Logic. Digital Design. Datapath Components Shifters, Comparators, Counters, Multipliers Digital Design

ECE 274 Digital Logic. Digital Design. Datapath Components Shifters, Comparators, Counters, Multipliers Digital Design ECE 27 Digitl Logic Shifters, Comprtors, Counters, Multipliers Digitl Design..7 Digitl Design Chpter : Slides to ccompny the textbook Digitl Design, First Edition, by Frnk Vhid, John Wiley nd Sons Publishers,

More information

PB-735 HD DP. Industrial Line. Automatic punch and bind machine for books and calendars

PB-735 HD DP. Industrial Line. Automatic punch and bind machine for books and calendars PB-735 HD DP Automtic punch nd bind mchine for books nd clendrs A further step for the utomtion of double loop binding. A clever nd flexible mchine ble to punch nd bind in line up to 9/16. Using the best

More information

Design and implementation of a high-speed bit-serial SFQ adder based on the binary decision diagram

Design and implementation of a high-speed bit-serial SFQ adder based on the binary decision diagram INSTITUTE OFPHYSICS PUBLISHING Supercond. Sci. Technol. 16 (23) 1497 152 SUPERCONDUCTORSCIENCE AND TECHNOLOGY PII: S953-248(3)67111-3 Design nd implementtion of high-speed it-seril SFQ dder sed on the

More information

DYE SOLUBILITY IN SUPERCRITICAL CARBON DIOXIDE FLUID

DYE SOLUBILITY IN SUPERCRITICAL CARBON DIOXIDE FLUID THERMAL SCIENCE, Yer 2015, Vol. 19, No. 4, pp. 1311-1315 1311 DYE SOLUBILITY IN SUPERCRITICAL CARBON DIOXIDE FLUID by Jun YAN, Li-Jiu ZHENG *, Bing DU, Yong-Fng QIAN, nd Fng YE Lioning Provincil Key Lbortory

More information

DP4T RF CMOS Switch: A Better Option to Replace the SPDT Switch and DPDT Switch

DP4T RF CMOS Switch: A Better Option to Replace the SPDT Switch and DPDT Switch Send Orders of Reprints t reprints@enthmscience.org 244 Recent Ptents on Electricl & Electronic Engineering 2012, 5, 244-248 DP4T RF CMOS Switch: A Better Option to Replce the SPDT Switch nd DPDT Switch

More information

Lecture 16: Four Quadrant operation of DC Drive (or) TYPE E Four Quadrant chopper Fed Drive: Operation

Lecture 16: Four Quadrant operation of DC Drive (or) TYPE E Four Quadrant chopper Fed Drive: Operation Lecture 16: Four Qudrnt opertion of DC Drive (or) TYPE E Four Qudrnt chopper Fed Drive: Opertion The rmture current I is either positive or negtive (flow in to or wy from rmture) the rmture voltge is lso

More information

Implementation of Different Architectures of Forward 4x4 Integer DCT For H.264/AVC Encoder

Implementation of Different Architectures of Forward 4x4 Integer DCT For H.264/AVC Encoder Implementtion of Different Architectures of Forwrd 4x4 Integer DCT For H.64/AVC Encoder Bunji Antoinette Ringnyu, Ali Tngel, Emre Krulut 3 Koceli University, Institute of Science nd Technology, Koceli,

More information

MULTILEVEL INVERTER TOPOLOGIES USING FLIPFLOPS

MULTILEVEL INVERTER TOPOLOGIES USING FLIPFLOPS MULTILVL INVRTR TOPOLOGIS USING FLIPFLOPS C.R.BALAMURUGAN S.SIVASANKARI Aruni ngineering College, Tiruvnnmli. Indi crblin010@gmil.com, sivyokesh1890@gmil.com S.P.NATARAJAN Annmli University, Chidmbrm,

More information

Signaling-Embedded Preamble Design for Flexible Optical Transport Networks

Signaling-Embedded Preamble Design for Flexible Optical Transport Networks Signling-Embedded Premble Design for Flexible Opticl Trnsport Networks Linglong Di nd Zhocheng Wng Tsinghu Ntionl Lbortory for Informtion Science nd Technology, Deprtment of Electronic Engineering, Tsinghu

More information

Automatic Heuristic Construction in a Complete General Game Player

Automatic Heuristic Construction in a Complete General Game Player Automtic Heuristic Construction in Complete Generl Gme Plyer Gregory Kuhlmnn, Kurt Dresner nd Peter Stone Deprtment of Computer Sciences, The University of Texs t Austin 1 University Sttion C0500, Austin,

More information

Soft switched DC-DC PWM Converters

Soft switched DC-DC PWM Converters Soft switched DC-DC PWM Converters Mr.M. Prthp Rju (), Dr. A. Jy Lkshmi () Abstrct This pper presents n upgrded soft switching technique- zero current trnsition (ZCT), which gives better turn off chrcteristics

More information

Novel Dragon Shape UHF RFID Tag Antenna

Novel Dragon Shape UHF RFID Tag Antenna Interntionl Journl of Electronics Engineering, 4 (), 0, pp. 3 9 Serils Publictions, ISSN : 0973-7383 Novel Drgon Shpe UHF RFID Tg Antenn T.G. Abo-Elng, E.A.F. Abdllh, H. El-Hennwy 3, Microstrip Dept.,

More information

Design of FPGA-Based Rapid Prototype Spectral Subtraction for Hands-free Speech Applications

Design of FPGA-Based Rapid Prototype Spectral Subtraction for Hands-free Speech Applications Design of FPGA-Bsed Rpid Prototype Spectrl Subtrction for Hnds-free Speech Applictions Sryut Amornwongpeeti *, Nobutk Ono *, nd Mongkol Ekpnypong * Principles of Informtics Reserch Division, Ntionl Institute

More information

Hardware Implementation of Image Compression Technique using Wavelet

Hardware Implementation of Image Compression Technique using Wavelet Interntionl Journl of Electronics Communiction nd Computer Engineering Technovision-2014: 1st Interntionl Conference t SITS, Nrhe, Pune on April 5-6, 2014 Hrdwre Implementtion of Imge Compression Technique

More information