Efficient Anonymous Key Exchange Protocol for Roaming in Wireless Networks

Size: px
Start display at page:

Download "Efficient Anonymous Key Exchange Protocol for Roaming in Wireless Networks"

Transcription

1 Iteratioal Joural of Scietific Research Egieerig & Techology (IJSRET), ISSN Efficiet Aoymous Key Exchage Protocol for Roamig i Wireless Networks 1 Joshua J. Tom, 2 Prof. Boiface K. Alese, 3 Prof. Olumide S. Adewale, 4 Dr. Aderoke F. Thompso 1,2,3,4 Departmet of Computer Sciece, Federal Uiversity of Techology, Akure, Nigeria 1 tomjoshua.tom@gmail.com, 2 bkalese@futa.edu.g, 3 adewale@futal.edu.g, 4 afthompso@futal.edu.g Abstract Group sigature schemes existetially provide aoymity, o-repudiatio ad ca make a mobile device utraceable. But usig group sigature oly i desigig aoymous key exchage system is time wastig ad cosumes much of other computig resources hece the use of it must be miimal especially whe deployed o resources-costraied mobile devices. I.this paper, we propose the combied use of group sigature because of its iheret security properties which are very importat whe a mobile user roams i the isecure wireless etwork ad message autheticatio code to reduce the huge computatioal burde occasioed by group sigature s expesive public key operatios resultig i ubearable autheticatio latecy. I this paper, we built two autheticators, a sigature based autheticator ad a message autheticatio code based autheticator. These models are based o the Caetti-Krawczyk model. We implemeted the desig usig Java 8 o Adroid Studio 2.2 ad tested it o Geymotio based emulator o Oracle VM VirtualBox. The experimet result showed a sigificat reductio i the autheticatio time whe message autheticatio code based autheticator was executed compared to autheticatio time result i the group sigature based autheticator. We further compared our model with a similar model ad fid that ours was superior i efficiecy measured from autheticatio latecy whe a user roams from his home domai to a visited etwork ad other etworks subsequetly while maitaiig same security characteristics. Keywords: Wireless etwork, Roamig, Autheticatio, security, Aoymity, utraceability, Autheticatiolatecy, Groupsigature, message autheticatio code, mobile device, Aoymous key exchage, Visited etwork 1. INTRODUCTION Nowadays we have witessed the expasive deploymet of wireless etworks locally ad iteratioally. This, expectedly, is eabled by availability ad affordability of mobile devices icludig PDAs, smart phoes, etc. This proliferatio ehaces the mobile users mobility as these techologies allow people to get coected seamlessly, have access to, ad ejoy ormal etwork services as they move about from their local domai to a foreig domai without beig limited by geographical coverage of their home etwork. A wireless etwork that provides its subscribers with the ability to access services while outside its coverage is said to provide roamig services. Before access is grated to roamig users by foreig etworks, these users must be autheticated. Autheticatio ivolves esurig that etwork services are ot obtaied frauduletly hece, it is very crucial that the idetities of mobile users egaged i roamig must be autheticated to prevet illegal use of resources, etc. However, the autheticatio credetials of these mobile users must be protected from third parties to esure privacy of users. Aoymous roamig is a key requiremet whe people roam amog visited etworks. Allowig third parties, such as eavesdroppers, access to users roamig data ca have very serious cosequeces to the detrimet of the user. Firstly, the real idetity of the mobile user must ot be kow by ayoe else except the mobile user ad the home etwork. This is referred to as idetity aoymity. Secodly, the locatio of the mobile user should also be kept secret from other etwork users while abroad. We refer to this as locatio aoymity. A privacy policy specificatio ca require the home etwork to gai kowledge of the real idetity of a mobile user oly whe it is extremely ecessary such as whe the foreig etwork bills the home etwork for services ejoyed by the mobile user or whe the mobile user exhibits malicious behavior or breaks oe the rules a warrat of revocatio ca be issued by a costituted authority to reveal such user s real idetity. To realize the sceario above a aoymous autheticatio protocol desig is a good way to achieve it. We must always take cogizace of the limited computatioal resources of mobile termial to keep the protocol ot too complex. I a roamig sceario, there are typically three etities ivolved: the home etwork, the roamig mobile user ad the visited foreig etwork. It is atural for the home etwork that must have a roamig agreemet with the visited etwork. Where this is applicable, the visited etwork must autheticate home etwork s subscribers before gratig them access to its roamig services they roam to visited etwork. Most existig autheticatio protocols such as those of [6], [7], [8], ad [9] require a mobile user, the visited etwork, ad the home etwork to participate i the roamig service. These protocols

2 Iteratioal Joural of Scietific Research Egieerig & Techology (IJSRET), ISSN adopt three-party autheticatio techique. The disadvatages of this techique iclude: first, may iteractive message flows are eeded (ot less tha 4 flows). Here it takes a log time for the home server to commuicate with the visited server because they are far away from each other; secod, the home server must always be olie ad available makig it vulerable to autheticatio problem; third, accordig to [10], sice the visited server must verify messages by commuicatig with the home server, there may be a Deial-of-Service (DoS) attack o the protocol because the home server will be verifyig a lot of messages set to it from visited servers. The structure for a three-party autheticatio is show i figure 1. Mobile User Autheticatio ad key establishmet Figure 1: Three-Party Autheticatio Architecture To improve upo the lapses of most three-party autheticatio protocols, recetly aoymous autheticatio schemes ivolvig oly the roamig mobile user ad the visited etwork have received sigificat research attetio ad have made some progress. These protocols which do ot eed the realtime participatio of the home etwork i the autheticatio process are referred to as two-party autheticatio protocols show i figure 2. Examples of two-party protocols iclude those of [11] ad [12]. Mobile User Access Foreig Server Autheticatio data request Autheticatio data respose Mutual Autheticatio ad key establishmet Home Server Foreig Server Figure 2: Two-Party Autheticatio Architecture Although autheticatig a mobile user is pertiet, the privacy of the user is paramout. Roamig autheticatio protocols exposes the users privacy i terms of their idetities ad locatio iformatio at the autheticatio phase. The disclosure of a user s idetity may allow uauthorized etities to track the user s movemet history ad curret locatio ad therefore create users behavior profiles. Ay illegal access to iformatio relatig to the user s locatio without his attetio ca be a serious violatio of his privacy. Idetity ad locatio aoymity are importat properties for roamig services ad these aoymity characteristics are the focus of this paper. 2. RELATED WORKS I [1] a aoymousautheticatio protocol based o group sigature for mobile roamig etworks was carried out.the protocol ivolves oly a mobile user ad theuser s visited server, without the real time ivolvemet of the user shome server util the user s idetity (ID) eeds to be revealed.the protocol gives a method that to reduce the computatioal burde the mobile termials, miimizes expesive pairig operatios. It was show thatthe protocol greatly reduces the average autheticatiolatecy while security ad aoymity are still preserved. The limitatio of this protocol is that foreig servers are give iformatio to idetify revoked users ad this iformatio ca eable the foreig servers to lik other protocol rus ivolvig the revoked user. Hece the protocol does esure ulikability. I [2] the authors proposed a privacy-preservig uiversal autheticatio protocol, called Priauth, which provides strog user aoymity agaist both eavesdroppers ad foreig servers, sessio key establishmet, ad achieves efficiecy. Most importatly, Priauth provides a way to trace users sigatures i idividual period, a approach that adequately tackles the problem of user revocatio ad esures ulikability while supportig strog user utraceability. But the protocol utilized expesice ad resources-hugry biliear pairig-based group sigature both whe the user coects to the first foreig etwork ad i subsequet coectios to other foreig etworks. This has great egative impact o the overall autheticatio process. A short group sigature scheme that supports Verifier- Local Revocatio (VLR) is costructed i [3]. I this model, revocatio messages are oly set to sigature verifiers ad to both sigers ad verifiers. This is appealig for systems providig attestatio capabilities. Their sigatures are as short as stadard RSA sigatures with comparable security. The security of their group sigature scheme is based o the Strog Diffie-Hellma assumptio ad the Decisio Liear assumptio i biliear groups. They gave a precisemodel for VLR group sigatures. The weakess of their protocol lies i the fact that protocol rus ivolvig the same user could be liked. Therefore the scheme does ot satisfy the backward ulikability. Agai, sice the protocol does ot cosider differetiatio i applicatio of the group sigature durig differet stages of the autheticatio, the computatioal load ivolved is boud to be high. I [4] the authors idetified verifier-local revocatio as a approach of membership revocatio i group sigatures. I the approach, oly verifiers are ivolved i the revocatio mechaism, while sigers have o

3 Iteratioal Joural of Scietific Research Egieerig & Techology (IJSRET), ISSN ivolvemet. They proposed VLR group sigature schemes with the backward ulikability from biliear maps ad asserted that their protocol is suitable for mobile eviromets sice sigers have o load. Here, we do or seem to agree totally with this assert sice group sigature schemes are kow to be aturally computatioally demadig i terms of computig resources. We believe that aoymity, utraceability, revocatio, etc. could still be achieved by usig a scheme which is computatioally less demadig. The authors i [5] proposed a ovel protocol to achieve privacy-preservig uiversal autheticatio protocol for wireless commuicatios. This is to secure the commuicatio as the data are sesitive or to esure that the user is billed for services redered i their scheme, revokig multiple users is to associate a key with every oempty subset of users i the group such that if oe or more users are revoked, the VA uses the key associated with the subset of the remaiig users to ecrypt the ew key ad trasmits the ew group key to them. The advatage of this approach is that the commuicatio overhead is oly oe message for revokig ay umber of users. However, the umber of keys stored by the VA ad the users is expoetial i the size of the group. Also, this approach suffers from all the users i the subgroup beig automatically revoked. I such case, their protocol rus ca be likable. This approach has two cots overheads;storage is computed i terms of keys that each user (respectively, VA) maitais ad revocatio cost is computed i terms of the ecryptios performed, ad the umber of messages trasmitted, by the VA. I view of related literatures, it is obvious that the focus of most of the literatures is either choosig primitives to esure privacy while tradig off computatioal expese o the commuicatig parties or beig resource efficiet while tradig off privacy cocers. Hece, this paper proposes a ew model that pays attetio to both privacy of the mobile user ad computatioal efficiecy through reduced latecy. 3. MODELLING AND SIMULATION 3.1 Methodology We divide the autheticatio process ito two; (1) whe the mobile user first roams to foreig etwork (2) whe the mobile user subsequetly roams to a differet foreig etwork. We propose to use these differet approaches because group sigature is quite a expesive cryptographic scheme therefore miimal usage is advised. Our protocol deploys group sigature scheme message autheticatio code i the two autheticatio processes respectively. The reaso for this combiatio is that group sigature existetially provides aoymity ad utraceability ad message autheticatio code is less expesive i terms of computatioal complexity. I the group sigature scheme, whe U roams to a visited etwork V, U ca sig messages o behalf of the group without showig its ID. By verifyig the group sigature, V is sure that U is oe of the valid users of H. The home server does ot eed to be always olie ad few message flows are eeded for autheticatio [12]. I cosideratio of the resources restrictiveess of mobile devices, the foreig server is made to sig messages destied for a mobile user usig the Elliptic Curve Digital Sigature Algorithm (ECDSA) scheme sice ECDSA sigature verificatio takes less time compared to its group sigature couterpart. Details of our protocol model are as follows. Our protocol is based o the system architecture is show i figure 3 ad is cosists of two phases: a iitializatio ad autheticatio phases. The autheticatio phase is divided ito two parts as earlier stated: autheticatio process whe U coects to V 1 ad autheticatio process whe U coects to V 2. Figure 3: Protocol System Architecture Model To achieve revocatio ad ulikability, the verifier local revocatio with backward ulikability (VLR-GS BU) group sigature variat is used whe U coects to the first visited server, V 1 ad mutual autheticatio code (MAC) whe U roams to the secod visited server, V Protocol Iitializatio Phase H (also kow as the group maager) computes iitializatio parameters. The parameters iclude (i) H selects a radom umber γ Z ad computes a group maager private key (gmpk) computed as: gmsk = γ (1) (ii) The group maager public key (gmpk) is give as, gmpk = (g, g, h, h, h, w) (2) where give Fq a fiite field with a elliptic curve E, G a multiplicative cyclic group of prime order p ad G a multiplicative group of expoet p, with some power of p as its order, g is a geerator of G ad g is a order-p elemet of G. The elemets g ad g will be selected at radom as part of system setup. h, h,

4 Iteratioal Joural of Scietific Research Egieerig & Techology (IJSRET), ISSN h represet radomly selected h G for each iterval j ad w is give as w= g γ. (iii) H uses the above computed parameters to geerate a vector of N user s secret keys usk ad a vector of N x T revocatio tokes (urt) for each registered user with curret time itervals to esure ulikability as follows: usk = (usk[1], usk[2],, usk[n]) (3) urt = (urt[1][1],, urt[1][t],, urt[n][t]) (4) (iv) The user secret key for N users is give as: usk[i] = (A, ) (5) Where Ai = g / γ+x i for all i [, N] ad Z is selected radomly. (v) Next, radomly selected h [, ] is used to compute the revocatio toke at time iterval j of with secret key (A, ) as: B = h x i for all i [, N] ad j N (6) (vi) H computes a alias for each registered user itedig to roam usig secret splittig mechaism from: a a = H H (7) Where ID H is the Home Server idetity, ID is the idetity of the user, U ad is a Exclusive-Or operator. 3.3 Autheticatio Phase (1) Autheticatio Process whe U coects to V 1 : A pairig-based verifier-local revocatio group sigature with backward ulikability ad the covetioal digital sigature scheme, ECDSA are used i this process. The process is show i figure 4 ad illustrated as follows: (i) U selects a radom umber, N ad computes N (we assume = =, from biliear map) ad seds ( H, N ) to. (ii) selects a radom umber N, computes a ECDSA sigature, σ with its secret key, sk as follows: σ =ECDSA.sig(sk, N G,NUG) (8) ad seds (ID, N G, σ ) to U. ID is the idetity of the first etwork visited by U. After that, computes a sessio key used betwee ad U as follows k = N (N ) (9) (iii) U verifies V s sigature, σ with s public key, pk by ruig ECDSA verificatio algorithm, ECDSA.ver(pk, N G, NUG, σ ) ad accept or reject coectio based o the verificatio result as follows:, σ a a σ = {, σ a If the sigature σ equals to 1, U computes a sessio key to betwee U ad as follows: k =N (N G) (10) It the computes a temporary alias by ecryptig a a give to it by its home etwork usig its sessio key. The it computes a group sigature, σ with usk[i] as: σ = G.Sig(gmpk, usk[i], j, alias, N G) (11) ad seds (alias, σ ) to. Otherwise, if the sigature σ = 0, coectio rejected. (iv) verifies the sigature from U with home server s public key, gmpk by ruig verificatio algorithm, G.Ver(gmpk, usk[i], j, alias, N G, σ u )., σ a, allow σ = {, h disallow allows coectio if σ =1 ad disallow otherwise. (2) Autheticatio Process whe U coects to : Message Autheticatio Code (MAC) reduces roamig autheticatio time whe U coects to. This is show i figure 5 ad illustrated as follows: (i) passes (alias, ID H, k ) to (ii) U selects a ew radom umbern, ecrypts the message (alias, ID, N ) usig its sessio key, k, ad sed E (alias, ID, N ) to. (iii) takes out, from message i (i) above ad use it to decrypt alias to get a a. The it selects a radom umber N, computes a sessio key k ad a ew alias by decryptig the alias received from from: = N (N ) ad alias' = (a a u) the, it computes a message autheticatio code (MAC) value σ usig σ = MAC K (N, N G) ad seds, N G, σ to U (iv) U computes a sessio key betwee U ad as k = N (N G) It the verifies the MAC valueσ by computig σ = MAC K (N, N G) ad compare it with σ received from. If σ = MAC value σ, the σ is valid ad U updates its ID ad computes a ew MAC value as: alias" = E (alias ) σ = MAC K (alias", N, N G) ad seds (alias", σ ) to. Otherwise U rejects the coectio.

5 Iteratioal Joural of Scietific Research Egieerig & Techology (IJSRET), ISSN (v) verifies the MAC value σ by computig σ = MAC (alias", N'UG, N G) the it compares it with MAC value σ received from U. If σ = σ, takes alias" as U s temporary idetity ad k as ew sessio key. Otherwise rejects the coectio. If k = K ad alias' = alias'' secure re-autheticatio. 4. IMPLEMENTATION AND RESULTS The Protocol is implemeted usig Java 8 o Adroid Studio 2.2, ad tested i a Geymotio supported VirtualBox to provide the eeded virtualizatio support. Figure 4 shows the key geeratio iterface, where the home server geerates the group public key gpk, a vector of N user secret keys usk, a vector of NxT user revocatio tokes urt, ada group master secret key gmsk. These keys are store i MySQL database amed roamig_table (see figure 5 below). Figure 6 shows the output of the implemeted key geeratio algorithm icludig a secret key for a roamig user, revocatio tokes for the iterval, i this case oe week (7 days). Figure 4: The Key Geeratio Iitial Iterface Figure 7: Group sigature verified by V 1. This shows group sigature received from mobile subscriber for verificatio. The result of implemetatio of the verificatio algorithm is show i figure 7 as the received group sigature is verified by the FS-Autheticator. The total sigature-based autheticatio is also show to be millsecods. Figure 5: roamig_table Desig Structure Figure 6: The Key Geeratio Result Iterface Figure 8: ECDSA sigature verificatio

6 Iteratioal Joural of Scietific Research Egieerig & Techology (IJSRET), ISSN The implemeted ECDSA sigature is show i figure 8 as the mobile user received the sigature from FS- Autheticator for verificatio 8. Whe mobile user roams to V 2, V 1 seds mobile user s autheticatio iformatio to V 2. Figure 9 ad 10 show key exchages betwee V 1 ad V 2. Figure 9: MAC-Based Autheticatio V 2. It ca be see from figure 9 that the total MAC based autheticatio time is 339 millisecods. The results of autheticatio usig the Sigature based autheticator ad the MAC Based autheticator cofirms that group sigature based autheticatio is very expesive ad resource cosumig tha the MAC based autheticatio resultig i autheticatio times as show i figure 9 ad 10. This justifies the deploymet of MAC based autheticatio i subsequet autheticatio after the user roams from the first foreig etwork. Figure 10: MAC-Based Autheticatio Mobile User. 5. ANALYSIS 5.1 Security Aalysis The desig of our protocol is based o the CK-Model [13]. Based o this, we desig we ca desig our keyexchage protocol i a idealized model, ad the traslate it usig geeral tools to obtai security i the realistic model. It icludes three parts: Autheticatedliks Adversarial model (AM); Uautheticated-liks adversarial model (UM); Autheticators. AM is cosidered as a idealized model where the commuicatio liks are perfectly autheticated; UM is the realistic settig of adversary-cotrolled liks; Autheticators are the so-called geeral algorithm tools that traslate a protocol which is Sessio-key secure (SK-secure) i AM ito a protocol which is SK-secure i UM. Sice the protocol desig i this paper follows from the CK model, our protocol guaratees security. 5.2 Aoymity ad Ulikability User aoymity is achieved due to the existetial aoymity of a special group sigature algorithm which employs verifier local revocatio. With this algorithm, is ot able to obtai the idetity of the real siger sice it does ot have s revocatio toke [ ][ ], oly s home server has. User utraceability is also achieved by the aoymity of the deployed scheme. Whe exists i the revocatio list, RL of durig a particular iterval, ca obtai [ ][ ] ad uses it to make sure that is revoked for iterval. caot lik s protocol ru durig ay iterval 1 to [ ][ ], because the revocatio toke of each user chages for every iterval j where 1. Based o this, our autheticatio ad key exchage system ca achieve aoymity ad ulikability of s protocol rus durig past ad future periods. Besides, obody icludig V 1 kows U s ew temporary ID, so oe of the etities takig part i the commuicatio protocol ca idetify ad trace U. Eve if V 1 gets N G ad N U G, it still caot compute K U = N N G due to DDH assumptio, ad thus caot get alias which is ecrypted usig K U. From the above aalysis, our protocol ca esure secure ad aoymous key exchage betwee the commuicatig parties. 6. EVALUATION AND COMPARISON The differece betwee our protocol ad that of [12] is that whe U roams subsequetly to other foreig etworks, UPK operatios are costat (still ECSM Pairig) but oly 11.5ECSM are eeded i our protocol. The authors i [1] did a similar work ad obtaied a better result tha the result i this work but i their protocol whe a user is revoked, the users previous caot protocol rus are likable. This meas that their protocol does ot provide backward ulikability which our protocol provides.

7 Iteratioal Joural of Scietific Research Egieerig & Techology (IJSRET), ISSN The protocol developed i this paper is compared with the protocol i [12] i terms of user public key (UPK) operatios ad UPK computatio latecy. Whe U first coects to a etwork, 8.75 Elliptic curve scalar multiplicatio (ECSM) plus 12.95Pairig operatios are eeded i both protocols. Whe U roams to aother etwork, UPK operatios are still 8.75ECSM plus 3Pairig i [12], but oly 2ECSM operatios are eeded i our protocol. Let X be UPK operatios whe U coects to V1, ad ( X, X,, X ) be UPK operatios whe U roams to etworks (V 2, V 3,, V ), the we calculate the average UPK operatios as follows: X + X + X + + X X A erage = (12) where is the umber of etworks the user has roamed. Goig by equatio (12), X A erage i [12] is 9. ECSM Pairig. I the case of the protocol developed i this paper, X A erage = 9. EC +.9 Pa r g + EC =. ECSM + (13) I equatio (13) above ECSM Pairig represets the user public key operatios ivolved i autheticatio process whe the user roams to the first visited etwork usig group sigature scheme i [14]. The time of autheticatio obtaied i our case is millisecods (0.12 secods approx.). Let L be computatio latecy for UPK operatios whe U coects to V1, ad ( L, L,, L ) be that whe U roams to etworks (V 2, V 3,, V ), the the average latecy is computed as follows: L A erage = 9. EC +.9 Pa r g (14) Based o the autheticatio delay of millisecods obtaied i this work (see figure 7), 1ECSM ad 1Pairig eed 2300 millisecods ad 3800 millisecods respectively i a termial with a 2.20GHz processor, so L Average i [12] would be permaetly millisecods, but i our protocol it is: = L A erage = 9 + x 9 + = + 9 = 9 + (15) I this evaluatio it ca be see from equatio (15) that the bigger is the smaller the computatio latecy. This is ot the case for a scheme employig oly the expesive group sigature example [16]. Figure 11 is the average latecy compariso betwee the protocol developed i [12] ad our protocol accordig to the user s roamig frequecy. From the figure we ca see that, the more frequetly the user roams amog differet etworks, the less time it will take i autheticatio. Average latecy i ms Our protocol Figure 11: Average latecy comparisos [12] Roamig frequecy 7. CONCLUSION Accordig to the results obtaied i this work, geeratig a group sigature imposes a sigificat burde o the computig termial ad eeds 117,095 millisecods for autheticatio. O first coectio to a foreig etwork, it may be bearable for U to wait this log. Whe U roams to aother etwork such as V 2, reautheticatio process has to restart, ad U has to wait aother 117,095 millisecods. It will become ubearable for U to be iterrupted regularly whe U roams amog foreig etworks frequetly. Because group sigature weighs so much o computig resources miimal usage of it is eeded. It ca be adequate to make use of a group sigature whe U coects to V 1, but it is ot ecessary to do that agai whe U roams to V 2. This is the reaso why this work employs message autheticatio code which greatly reduces roamig autheticatio time to 339 millisecods. User aoymity is easy to be revoked by its home server; utraceability is achieved because whe a user is revoked i a particular time iterval, say j, he caot be liked to ay of his previous protocol rus; the foreig servers do ot have to commuicate with the home server to autheticate the user, so it eeds few message flows. The aalysis shows that the protocol is practical for roamig i wireless etworks i which users are roamig frequetly.

8 Iteratioal Joural of Scietific Research Egieerig & Techology (IJSRET), ISSN REFERENCES [1] JIANG Chuli, JIA Weijia, GU Ke ad XU Nig Aoymous Autheticatio without Home Server i Mobile Roamig Networks Chiese Joural of Electroics, Vol.22, No.2, Apr [2] Daojig He, Jiaju Bu, Sammy Cha, Chu Che, ad Migjia Yi, Privacy-Preservig Uiversal Autheticatio Protocol for Wireless Commuicatios. IEEE Trasactios O Wireless Commuicatios, Vol. 10, NO. 2, February [3] Boeh, D. Shacham, H. Group sigatures with verifier-local revocatio. I Proceedigs of the 11th ACM coferece o Computer ad commuicatios security, Washigto, DC, USA, pp [4] T. Nakaishi ad N. Fuabiki, Verifier-local revocatio group sigature schemes with backward ulikability from biliear maps, Proc. ASIACRYPT 2005, LNCS 3788, pp , [5] M Saraya, P Dhivya A Optimized Secure Commuicatio Usig VLR-GS-BU o Wireless Network, Idia Joural of Computer Sciece ad Egieerig, idia, Vol.3 No.3 Ju-Jul 2012 [6] G.M. Yag, Q. Huag, D.S. Wog, X. T. Deg Uiversal autheticatio protocols for aoymous wireless commuicatios, IEEE Trasactios o Wireless Commuicatios, Vol.9, No.1, pp , CCS 06, New York, NY, USA: ACM 2006, ISBN , pp [12] Yag, G. Huag, Q. Wog, D. S. Deg, X. Uiversal autheticatio protocols for aoymous wireless commuicatios, IEEE Trasactios o Wireless Commuicatios 2010, vol. 9, o. 1: pp [13] Caetti, R. Krawczyk, H. Aalysis of keyexchage protocols ad their use for buildig secure chaels (Full Versio), [14] Boeh, D. Shacham, H. Group sigatures with verifier-local revocatio. I Proceedigs of the 11th ACM coferece o Computer ad commuicatios security, Washigto, DC, USA, pp [15] Ateiese, G. Tsudik, G. ad Sog, D. Quasiefficiet revocatio of group sigatures. I M. Blaze, editor, Proceedigs of Fiacial Cryptography 2002, volume 2357 of LNCS, pages Spriger-Verlag, [16] He, D. Bu, J. Cha, S. Che, C. Yi, M. Privacypreservig uiversal autheticatio protocol for wireless commuicatios. Wireless Commuicatios, IEEE Trasactios o, vol. 10, o. 2, 2011: pp [7] Lee W. B., Yeh C. K.: A New Delegatio-based Autheticatio Protocol for Use i Portable Commuicatio Systems. IEEE Tras. Wireless Commu., 4(1),57 64 (2005) [8] Tag C., Wu D. O.: A Efficiet Mobile Autheticatio for Wireless Networks. IEEE Tras. Wireless Commu., 7(4), (2008) [9] Zhou T, Xu J. Provable secure autheticatio protocol with aoymity for roamig service i global mobility etworks. ComputNetw 2011;55(1):205e13. [10] Wa, C.S. Hu, A.Q. Zhag, J. A elliptic curve based hadoff autheticatio protocol for WLAN, Acta Electroica Siica, Vol.39, No.1, pp [11] Cameisch, J. Hoheberger, S. Kohlweiss, M. Lysyaskaya, A. Meyerovich, M. How to wi the cloewars: efficiet periodic -times aoymous autheticatio. I Proceedigs of the 13th ACM coferece o Computer ad commuicatios security,

Novel pseudo random number generation using variant logic framework

Novel pseudo random number generation using variant logic framework Edith Cowa Uiversity Research Olie Iteratioal Cyber Resiliece coferece Cofereces, Symposia ad Campus Evets 011 Novel pseudo radom umber geeratio usig variat logic framework Jeffrey Zheg Yua Uiversity,

More information

A SELECTIVE POINTER FORWARDING STRATEGY FOR LOCATION TRACKING IN PERSONAL COMMUNICATION SYSTEMS

A SELECTIVE POINTER FORWARDING STRATEGY FOR LOCATION TRACKING IN PERSONAL COMMUNICATION SYSTEMS A SELETIVE POINTE FOWADING STATEGY FO LOATION TAKING IN PESONAL OUNIATION SYSTES Seo G. hag ad hae Y. Lee Departmet of Idustrial Egieerig, KAIST 373-, Kusug-Dog, Taejo, Korea, 305-70 cylee@heuristic.kaist.ac.kr

More information

High-Order CCII-Based Mixed-Mode Universal Filter

High-Order CCII-Based Mixed-Mode Universal Filter High-Order CCII-Based Mixed-Mode Uiversal Filter Che-Nog Lee Departmet of Computer ad Commuicatio Egieerig, Taipei Chegshih Uiversity of Sciece ad Techology, Taipei, Taiwa, R. O. C. Abstract This paper

More information

A 2 ENCRYPTION/DECRYPTION ALGORITHM

A 2 ENCRYPTION/DECRYPTION ALGORITHM It. J. Egg. Res. & Sci. & Tech. 2016 Arulaatham Kadhappa ad Aadh Arul, 2016 Research Paper ISSN 2319-5991 www.ijerst.com Vol. 5, No. 1, February 2016 2016 IJERST. All Rights Reserved A 2 ENCRYPTION/DECRYPTION

More information

CHAPTER 5 A NEAR-LOSSLESS RUN-LENGTH CODER

CHAPTER 5 A NEAR-LOSSLESS RUN-LENGTH CODER 95 CHAPTER 5 A NEAR-LOSSLESS RUN-LENGTH CODER 5.1 GENERAL Ru-legth codig is a lossless image compressio techique, which produces modest compressio ratios. Oe way of icreasig the compressio ratio of a ru-legth

More information

High Speed Area Efficient Modulo 2 1

High Speed Area Efficient Modulo 2 1 High Speed Area Efficiet Modulo 2 1 1-Soali Sigh (PG Scholar VLSI, RKDF Ist Bhopal M.P) 2- Mr. Maish Trivedi (HOD EC Departmet, RKDF Ist Bhopal M.P) Adder Abstract Modular adder is oe of the key compoets

More information

Application of Improved Genetic Algorithm to Two-side Assembly Line Balancing

Application of Improved Genetic Algorithm to Two-side Assembly Line Balancing 206 3 rd Iteratioal Coferece o Mechaical, Idustrial, ad Maufacturig Egieerig (MIME 206) ISBN: 978--60595-33-7 Applicatio of Improved Geetic Algorithm to Two-side Assembly Lie Balacig Ximi Zhag, Qia Wag,

More information

A New Space-Repetition Code Based on One Bit Feedback Compared to Alamouti Space-Time Code

A New Space-Repetition Code Based on One Bit Feedback Compared to Alamouti Space-Time Code Proceedigs of the 4th WSEAS It. Coferece o Electromagetics, Wireless ad Optical Commuicatios, Veice, Italy, November 0-, 006 107 A New Space-Repetitio Code Based o Oe Bit Feedback Compared to Alamouti

More information

Data Acquisition System for Electric Vehicle s Driving Motor Test Bench Based on VC++ *

Data Acquisition System for Electric Vehicle s Driving Motor Test Bench Based on VC++ * Available olie at www.sciecedirect.com Physics Procedia 33 (0 ) 75 73 0 Iteratioal Coferece o Medical Physics ad Biomedical Egieerig Data Acquisitio System for Electric Vehicle s Drivig Motor Test Bech

More information

Single Bit DACs in a Nutshell. Part I DAC Basics

Single Bit DACs in a Nutshell. Part I DAC Basics Sigle Bit DACs i a Nutshell Part I DAC Basics By Dave Va Ess, Pricipal Applicatio Egieer, Cypress Semicoductor May embedded applicatios require geeratig aalog outputs uder digital cotrol. It may be a DC

More information

A study on the efficient compression algorithm of the voice/data integrated multiplexer

A study on the efficient compression algorithm of the voice/data integrated multiplexer A study o the efficiet compressio algorithm of the voice/data itegrated multiplexer Gyou-Yo CHO' ad Dog-Ho CHO' * Dept. of Computer Egieerig. KyiigHee Uiv. Kiheugup Yogiku Kyuggido, KOREA 449-71 PHONE

More information

Design of FPGA Based SPWM Single Phase Inverter

Design of FPGA Based SPWM Single Phase Inverter Proceedigs of MUCEET2009 Malaysia Techical Uiversities Coferece o Egieerig ad Techology Jue 20-22, 2009, MS Garde,Kuata, Pahag, Malaysia MUCEET2009 Desig of FPGA Based SPWM Sigle Phase Iverter Afarulrazi

More information

SOFTWARE DEFINED RADIO IN WIRELESS AD-HOC NETWORK

SOFTWARE DEFINED RADIO IN WIRELESS AD-HOC NETWORK SOFTWARE DEFINED RADIO IN WIRELESS AD-HOC NETWORK Ajay Kr. Sigh 1, G. Sigh 2 ad D. S. Chauha 2 1 Departmet of Computer Sciece ad Egieerig Jaypee Uiversity of Iformatio Techology, Sola -173 215, Idia 2

More information

Adaptive Resource Allocation in Multiuser OFDM Systems

Adaptive Resource Allocation in Multiuser OFDM Systems Adaptive Resource Allocatio i Multiuser OFDM Systems Fial Report Multidimesioal Digital Sigal Processig Malik Meherali Saleh The Uiversity of Texas at Austi malikmsaleh@mail.utexas.edu Sprig 005 Abstract

More information

Radar emitter recognition method based on AdaBoost and decision tree Tang Xiaojing1, a, Chen Weigao1 and Zhu Weigang1 1

Radar emitter recognition method based on AdaBoost and decision tree Tang Xiaojing1, a, Chen Weigao1 and Zhu Weigang1 1 Advaces i Egieerig Research, volume 8 d Iteratioal Coferece o Automatio, Mechaical Cotrol ad Computatioal Egieerig (AMCCE 7) Radar emitter recogitio method based o AdaBoost ad decisio tree Tag Xiaojig,

More information

Secret Searching in Wireless Sensor Networks with RFIDs

Secret Searching in Wireless Sensor Networks with RFIDs Secret Searchig i Wireless Sesor Networks with RFIDs Shih-I Huag Shiuhpyg Shieh Dept. of Comp. Sci. & Ifo. Eg. Natioal Chiao Tug Uiversity, Hsichu, Taiwa 300 {sihuag,ssp}@csie.ctu.edu.tw Abstract I this

More information

APPLICATION NOTE UNDERSTANDING EFFECTIVE BITS

APPLICATION NOTE UNDERSTANDING EFFECTIVE BITS APPLICATION NOTE AN95091 INTRODUCTION UNDERSTANDING EFFECTIVE BITS Toy Girard, Sigatec, Desig ad Applicatios Egieer Oe criteria ofte used to evaluate a Aalog to Digital Coverter (ADC) or data acquisitio

More information

Design of FPGA- Based SPWM Single Phase Full-Bridge Inverter

Design of FPGA- Based SPWM Single Phase Full-Bridge Inverter Desig of FPGA- Based SPWM Sigle Phase Full-Bridge Iverter Afarulrazi Abu Bakar 1, *,Md Zarafi Ahmad 1 ad Farrah Salwai Abdullah 1 1 Faculty of Electrical ad Electroic Egieerig, UTHM *Email:afarul@uthm.edu.my

More information

Data Mining of Bayesian Networks to Select Fusion Nodes from Wireless Sensor Networks

Data Mining of Bayesian Networks to Select Fusion Nodes from Wireless Sensor Networks www.ijcsi.org http://dx.doi.org/10.20943/01201604.1115 11 Data Miig of Bayesia Networks to Select Fusio Nodes from Wireless Networks Yee Mig Che 1 Chi-Shu Hsueh 2 Chu-Kai Wag 3 1,3 Departmet of Idustrial

More information

COMPRESSION OF TRANSMULTIPLEXED ACOUSTIC SIGNALS

COMPRESSION OF TRANSMULTIPLEXED ACOUSTIC SIGNALS COMPRESSION OF TRANSMULTIPLEXED ACOUSTIC SIGNALS Mariusz Ziółko, Przemysław Sypka ad Bartosz Ziółko Departmet of Electroics, AGH Uiversity of Sciece ad Techology, al. Mickiewicza 3, 3-59 Kraków, Polad,

More information

WAVE-BASED TRANSIENT ANALYSIS USING BLOCK NEWTON-JACOBI

WAVE-BASED TRANSIENT ANALYSIS USING BLOCK NEWTON-JACOBI WAVE-BASED TRANSIENT ANALYSIS USING BLOCK NEWTON-JACOBI Muhammad Kabir McGill Uiversity Departmet of Electrical ad Computer Egieerig Motreal, QC H3A 2A7 Email: muhammad.kabir@mail.mcgill.ca Carlos Christofferse

More information

Faulty Clock Detection for Crypto Circuits Against Differential Faulty Analysis Attack

Faulty Clock Detection for Crypto Circuits Against Differential Faulty Analysis Attack Faulty Clock Detectio for Crypto Circuits Agaist Differetial Faulty Aalysis Attack Pei uo ad Yusi Fei Departmet of Electrical ad Computer Egieerig Northeaster Uiversity, Bosto, MA 02115 Abstract. Differetial

More information

A Bipolar Cockcroft-Walton Voltage Multiplier for Gas Lasers

A Bipolar Cockcroft-Walton Voltage Multiplier for Gas Lasers America Joural of Applied cieces 4 (10): 79-799, 007 N 1546-99 007 ciece Publicatios orrespodig Author: A Bipolar ockcroft-walto Voltage Multiplier for Gas Lasers hahid qbal ad Rosli Besar Faculty of Egieerig

More information

Performance Analysis of Channel Switching with Various Bandwidths in Cognitive Radio

Performance Analysis of Channel Switching with Various Bandwidths in Cognitive Radio Performace Aalysis of Chael Switchig with Various Badwidths i Cogitive Radio Po-Hao Chag, Keg-Fu Chag, Yu-Che Che, ad Li-Kai Ye Departmet of Electrical Egieerig, Natioal Dog Hwa Uiversity, 1,Sec.2, Da-Hsueh

More information

Spread Spectrum Signal for Digital Communications

Spread Spectrum Signal for Digital Communications Wireless Iformatio Trasmissio System Lab. Spread Spectrum Sigal for Digital Commuicatios Istitute of Commuicatios Egieerig Natioal Su Yat-se Uiversity Spread Spectrum Commuicatios Defiitio: The trasmitted

More information

Indoor Localization by Pattern Matching Method Based On Extended Database

Indoor Localization by Pattern Matching Method Based On Extended Database Vol:8, No:, Idoor Localizatio by atter Matchig Method Based O Exteded Database Gyumi Hwag, Jihog Lee Iteratioal Sciece Idex, Mechaical ad Mechatroics Egieerig Vol:8, No:, waset.org/ublicatio/9997 Abstract

More information

Cross-Layer Performance of a Distributed Real-Time MAC Protocol Supporting Variable Bit Rate Multiclass Services in WPANs

Cross-Layer Performance of a Distributed Real-Time MAC Protocol Supporting Variable Bit Rate Multiclass Services in WPANs Cross-Layer Performace of a Distributed Real-Time MAC Protocol Supportig Variable Bit Rate Multiclass Services i WPANs David Tug Chog Wog, Jo W. Ma, ad ee Chaig Chua 3 Istitute for Ifocomm Research, Heg

More information

Design and Construction of a Three-phase Digital Energy Meter

Design and Construction of a Three-phase Digital Energy Meter Desig ad Costructio of a Three-phase Digital Eergy Meter D.P.Chadima, V.G.R.G. Jayawardae, E.A.E.H. Hemachadra, I.N.Jayasekera, H.V.L.Hasaraga, D.C. Hapuarachchi (chadima@elect.mrt.ac.lk, geethagaj@gmail.com,era.hem@gmail.com,ishaivaka@gmail.com,lahiru_hasaraga@yahoo.com,diya_elect.uom@gmail.com)

More information

AkinwaJe, A.T., IbharaJu, F.T. and Arogundade, 0.1'. Department of Computer Sciences University of Agriculture, Abeokuta, Nigeria

AkinwaJe, A.T., IbharaJu, F.T. and Arogundade, 0.1'. Department of Computer Sciences University of Agriculture, Abeokuta, Nigeria COMPARATIVE ANALYSIS OF ARTIFICIAL NEURAL NETWORK'S BACK PROPAGATION ALGORITHM TO STATISTICAL LEAST SQURE METHOD IN SECURITY PREDICTION USING NIGERIAN STOCK EXCHANGE MARKET AkiwaJe, A.T., IbharaJu, F.T.

More information

Fingerprint Classification Based on Directional Image Constructed Using Wavelet Transform Domains

Fingerprint Classification Based on Directional Image Constructed Using Wavelet Transform Domains 7 Figerprit Classificatio Based o Directioal Image Costructed Usig Wavelet Trasform Domais Musa Mohd Mokji, Syed Abd. Rahma Syed Abu Bakar, Zuwairie Ibrahim 3 Departmet of Microelectroic ad Computer Egieerig

More information

Logarithms APPENDIX IV. 265 Appendix

Logarithms APPENDIX IV. 265 Appendix APPENDIX IV Logarithms Sometimes, a umerical expressio may ivolve multiplicatio, divisio or ratioal powers of large umbers. For such calculatios, logarithms are very useful. They help us i makig difficult

More information

Implementation of Fuzzy Multiple Objective Decision Making Algorithm in a Heterogeneous Mobile Environment

Implementation of Fuzzy Multiple Objective Decision Making Algorithm in a Heterogeneous Mobile Environment Implemetatio of Fuzzy Multiple Objective Decisio Makig Algorithm i a Heterogeeous Mobile Eviromet P.M.L. ha, Y.F. Hu, R.E. Sheriff, Departmet of Electroics ad Telecommuicatios Departmet of yberetics, Iteret

More information

Compound Controller for DC Motor Servo System Based on Inner-Loop Extended State Observer

Compound Controller for DC Motor Servo System Based on Inner-Loop Extended State Observer BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 6, No 5 Special Issue o Applicatio of Advaced Computig ad Simulatio i Iformatio Systems Sofia 06 Prit ISSN: 3-970; Olie ISSN:

More information

Delta- Sigma Modulator with Signal Dependant Feedback Gain

Delta- Sigma Modulator with Signal Dependant Feedback Gain Delta- Sigma Modulator with Sigal Depedat Feedback Gai K.Diwakar #1 ad V.Vioth Kumar *2 # Departmet of Electroics ad Commuicatio Egieerig * Departmet of Electroics ad Istrumetatio Egieerig Vel Tech Uiversity,Cheai,

More information

Introduction to Wireless Communication Systems ECE 476/ECE 501C/CS 513 Winter 2003

Introduction to Wireless Communication Systems ECE 476/ECE 501C/CS 513 Winter 2003 troductio to Wireless Commuicatio ystems ECE 476/ECE 501C/C 513 Witer 2003 eview for Exam #1 March 4, 2003 Exam Details Must follow seatig chart - Posted 30 miutes before exam. Cheatig will be treated

More information

The Detection of Abrupt Changes in Fatigue Data by Using Cumulative Sum (CUSUM) Method

The Detection of Abrupt Changes in Fatigue Data by Using Cumulative Sum (CUSUM) Method Proceedigs of the th WSEAS Iteratioal Coferece o APPLIED ad THEORETICAL MECHANICS (MECHANICS '8) The Detectio of Abrupt Chages i Fatigue Data by Usig Cumulative Sum (CUSUM) Method Z. M. NOPIAH, M.N.BAHARIN,

More information

ELEC 350 Electronics I Fall 2014

ELEC 350 Electronics I Fall 2014 ELEC 350 Electroics I Fall 04 Fial Exam Geeral Iformatio Rough breakdow of topic coverage: 0-5% JT fudametals ad regios of operatio 0-40% MOSFET fudametals biasig ad small-sigal modelig 0-5% iodes (p-juctio

More information

Sapana P. Dubey. (Department of applied mathematics,piet, Nagpur,India) I. INTRODUCTION

Sapana P. Dubey. (Department of applied mathematics,piet, Nagpur,India) I. INTRODUCTION IOSR Joural of Mathematics (IOSR-JM) www.iosrjourals.org COMPETITION IN COMMUNICATION NETWORK: A GAME WITH PENALTY Sapaa P. Dubey (Departmet of applied mathematics,piet, Nagpur,Idia) ABSTRACT : We are

More information

Survey of Low Power Techniques for ROMs

Survey of Low Power Techniques for ROMs Survey of Low Power Techiques for ROMs Edwi de Agel Crystal Semicoductor Corporatio P.O Box 17847 Austi, TX 78744 Earl E. Swartzlader, Jr. Departmet of Electrical ad Computer Egieerig Uiversity of Texas

More information

DIGITALLY TUNED SINUSOIDAL OSCILLATOR USING MULTIPLE- OUTPUT CURRENT OPERATIONAL AMPLIFIER FOR APPLICATIONS IN HIGH STABLE ACOUSTICAL GENERATORS

DIGITALLY TUNED SINUSOIDAL OSCILLATOR USING MULTIPLE- OUTPUT CURRENT OPERATIONAL AMPLIFIER FOR APPLICATIONS IN HIGH STABLE ACOUSTICAL GENERATORS Molecular ad Quatum Acoustics vol. 7, (6) 95 DGTALL TUNED SNUSODAL OSCLLATOR USNG MULTPLE- OUTPUT CURRENT OPERATONAL AMPLFER FOR APPLCATONS N HGH STABLE ACOUSTCAL GENERATORS Lesław TOPÓR-KAMŃSK Faculty

More information

Broadcasting in Multichannel Cognitive Radio Ad Hoc Networks

Broadcasting in Multichannel Cognitive Radio Ad Hoc Networks 2013 IEEE Wireless Commuicatios ad Networkig Coferece (WCNC): MAC Broadcastig i Multichael Cogitive Radio Ad Hoc Networks Zaw Htike Departmet of Computer Egieerig Kyug Hee Uiversity 1 Seocheo,Giheug, Yogi,

More information

International Power, Electronics and Materials Engineering Conference (IPEMEC 2015)

International Power, Electronics and Materials Engineering Conference (IPEMEC 2015) Iteratioal Power, Electroics ad Materials Egieerig Coferece (IPEMEC 205) etwork Mode based o Multi-commuicatio Mechaism Fa Yibi, Liu Zhifeg, Zhag Sheg, Li Yig Departmet of Military Fiace, Military Ecoomy

More information

PROJECT #2 GENERIC ROBOT SIMULATOR

PROJECT #2 GENERIC ROBOT SIMULATOR Uiversity of Missouri-Columbia Departmet of Electrical ad Computer Egieerig ECE 7330 Itroductio to Mechatroics ad Robotic Visio Fall, 2010 PROJECT #2 GENERIC ROBOT SIMULATOR Luis Alberto Rivera Estrada

More information

Random Block Verification: Improving the Norwegian Electoral Mix Net

Random Block Verification: Improving the Norwegian Electoral Mix Net Radom Block Verificatio: Improvig the Norwegia Electoral Mix Net Deise Demirel 1,2, Hugo Joker 3, Melaie Volkamer 1,2 1 CASED, Darmstadt 2 SeCuSo group, TU Darmstadt 3 SaToSS group, Uiversity of Luxembourg

More information

Combined Scheme for Fast PN Code Acquisition

Combined Scheme for Fast PN Code Acquisition 13 th Iteratioal Coferece o AEROSPACE SCIENCES & AVIATION TECHNOLOGY, ASAT- 13, May 6 8, 009, E-Mail: asat@mtc.edu.eg Military Techical College, Kobry Elkobbah, Cairo, Egypt Tel : +(0) 4059 4036138, Fax:

More information

INCREASE OF STRAIN GAGE OUTPUT VOLTAGE SIGNALS ACCURACY USING VIRTUAL INSTRUMENT WITH HARMONIC EXCITATION

INCREASE OF STRAIN GAGE OUTPUT VOLTAGE SIGNALS ACCURACY USING VIRTUAL INSTRUMENT WITH HARMONIC EXCITATION XIX IMEKO World Cogress Fudametal ad Applied Metrology September 6, 9, Lisbo, Portugal INCREASE OF STRAIN GAGE OUTPUT VOLTAGE SIGNALS ACCURACY USING VIRTUAL INSTRUMENT WITH HARMONIC EXCITATION Dalibor

More information

Neighbor Discovery for Cognitive Radio Ad Hoc Networks

Neighbor Discovery for Cognitive Radio Ad Hoc Networks Neighbor Discovery for Cogitive Radio Ad Hoc Networks Zaw Htike Departmet of Computer Egieerig, Kyug Hee Uiversity, 1 Seocheo,Giheug, Yogi, Gyeoggi 449-701 Korea +8-10-561-811 htike@etworkig.khu.ac.kr,

More information

Fault Diagnosis in Rolling Element Bearing Using Filtered Vibration and Acoustic Signal

Fault Diagnosis in Rolling Element Bearing Using Filtered Vibration and Acoustic Signal Volume 8 o. 8 208, 95-02 ISS: 3-8080 (prited versio); ISS: 34-3395 (o-lie versio) url: http://www.ijpam.eu ijpam.eu Fault Diagosis i Rollig Elemet Usig Filtered Vibratio ad Acoustic Sigal Sudarsa Sahoo,

More information

General Model :Algorithms in the Real World. Applications. Block Codes

General Model :Algorithms in the Real World. Applications. Block Codes Geeral Model 5-853:Algorithms i the Real World Error Correctig Codes I Overview Hammig Codes Liear Codes 5-853 Page message (m) coder codeword (c) oisy chael decoder codeword (c ) message or error Errors

More information

NEXT GENERATION WIRELESS LAN SYSTEM DESIGN 1. Chutima Prommak, Joseph Kabara, David Tipper, Chalermpol Charnsripinyo

NEXT GENERATION WIRELESS LAN SYSTEM DESIGN 1. Chutima Prommak, Joseph Kabara, David Tipper, Chalermpol Charnsripinyo NEXT GENERATION WIRELESS LAN SYSTEM DESIGN Chutima Prommak, Joseph Kabara, David Tipper, Chalermpol Charsripiyo Departmet of Iformatio Sciece & Telecommuicatios 35 N. Bellefield ave., Uiversity of Pittsburgh,

More information

HELIARC. THE FIRST NAME IN TIG.

HELIARC. THE FIRST NAME IN TIG. HELIARC. THE FIRST NAME IN TIG. YOU AND HELIARC. NOT EVERYONE APPRECIATES THE BEAUTY OF A TRULY GREAT WELD. BUT YOU DO. YOU VE PUT IN THE YEARS AND MASTERED THE ART AND CRAFT OF GTAW (TIG). AND EVER SINCE

More information

A New Design of Log-Periodic Dipole Array (LPDA) Antenna

A New Design of Log-Periodic Dipole Array (LPDA) Antenna Joural of Commuicatio Egieerig, Vol., No., Ja.-Jue 0 67 A New Desig of Log-Periodic Dipole Array (LPDA) Atea Javad Ghalibafa, Seyed Mohammad Hashemi, ad Seyed Hassa Sedighy Departmet of Electrical Egieerig,

More information

Efficient and Privacy-Preserving Data Aggregation in Mobile Sensing

Efficient and Privacy-Preserving Data Aggregation in Mobile Sensing Efficiet ad Privacy-Preservig Data Aggregatio i Mobile Sesig Qighua Li, Guohog Cao Departmet of Computer Sciece ad Egieerig The Pesylvaia State Uiversity, Uiversity Park Email: {qxl8, gcao}@cse.psu.edu

More information

Intermediate Information Structures

Intermediate Information Structures Modified from Maria s lectures CPSC 335 Itermediate Iformatio Structures LECTURE 11 Compressio ad Huffma Codig Jo Roke Computer Sciece Uiversity of Calgary Caada Lecture Overview Codes ad Optimal Codes

More information

13 Legislative Bargaining

13 Legislative Bargaining 1 Legislative Bargaiig Oe of the most popular legislative models is a model due to Baro & Ferejoh (1989). The model has bee used i applicatios where the role of committees have bee studies, how the legislative

More information

x y z HD(x, y) + HD(y, z) HD(x, z)

x y z HD(x, y) + HD(y, z) HD(x, z) Massachusetts Istitute of Techology Departmet of Electrical Egieerig ad Computer Sciece 6.02 Solutios to Chapter 5 Updated: February 16, 2012 Please sed iformatio about errors or omissios to hari; questios

More information

SEVEN-LEVEL THREE PHASE CASCADED H-BRIDGE INVERTER WITH A SINGLE DC SOURCE

SEVEN-LEVEL THREE PHASE CASCADED H-BRIDGE INVERTER WITH A SINGLE DC SOURCE SEVEN-LEVEL THREE PHASE CASCADED H-BRIDGE INVERTER WITH A SINGLE DC SOURCE T. Porselvi 1 ad Ragaath Muthu 1 Sri Sairam Egieerig College, Cheai, Idia SSN College of Egieerig, Cheai, Idia E-Mail: tporselvi@yahoo.com

More information

EMU-Synchronization Enhanced Mobile Underwater Networks for Assisting Time Synchronization Scheme in Sensors

EMU-Synchronization Enhanced Mobile Underwater Networks for Assisting Time Synchronization Scheme in Sensors www.ijecs.i Iteratioal Joural Of Egieerig Ad Computer Sciece ISSN:319-74 Volume 4 Issue 3 March 015, Page No. 760-763 EMU-Sychroizatio Ehaced Mobile Uderwater Networks for Assistig ime Sychroizatio Scheme

More information

A 5th order video band elliptic filter topology using OTRA based Fleischer Tow Biquad with MOS-C Realization

A 5th order video band elliptic filter topology using OTRA based Fleischer Tow Biquad with MOS-C Realization Natural ad Egieerig Scieces 44 olume 1, No. 2, 44-52, 2016 A 5th order video bad elliptic filter topology usig OTA based Fleischer Tow Biquad with MOS-C ealiatio Ahmet Gökçe 1*, Uğur Çam 2 1 Faculty of

More information

Advanced Telemetry Tracking System for High Dynamic Targets

Advanced Telemetry Tracking System for High Dynamic Targets Advaced Telemetry Trackig System for High Dyamic Targets Item Type text; Proceedigs Authors Mischwaer, Natha; Leide, Nelso Paiva Oliveira Publisher Iteratioal Foudatio for Telemeterig Joural Iteratioal

More information

PHY-MAC dialogue with Multi-Packet Reception

PHY-MAC dialogue with Multi-Packet Reception PHY-AC dialogue with ulti-packet Receptio arc Realp 1 ad Aa I. Pérez-Neira 1 CTTC-Cetre Tecològic de Telecomuicacios de Cataluya Edifici Nexus C/Gra Capità, - 0803-Barceloa (Cataluya-Spai) marc.realp@cttc.es

More information

Test Time Minimization for Hybrid BIST with Test Pattern Broadcasting

Test Time Minimization for Hybrid BIST with Test Pattern Broadcasting Test Time Miimizatio for Hybrid BIST with Test Patter Broadcastig Raimud Ubar, Maksim Jeihhi Departmet of Computer Egieerig Talli Techical Uiversity EE-126 18 Talli, Estoia {raiub, maksim}@pld.ttu.ee Gert

More information

A New Basic Unit for Cascaded Multilevel Inverters with the Capability of Reducing the Number of Switches

A New Basic Unit for Cascaded Multilevel Inverters with the Capability of Reducing the Number of Switches Joural of Power Electroics, ol, o, pp 67-677, July 67 JPE --6 http://dxdoiorg/6/jpe67 I(Prit: 98-9 / I(Olie: 9-78 A ew Basic Uit for Cascaded Multi Iverters with the Capability of Reducig the umber of

More information

A New Energy Consumption Algorithm with Active Sensor Selection Using GELS in Target Coverage WSN

A New Energy Consumption Algorithm with Active Sensor Selection Using GELS in Target Coverage WSN IJCSI Iteratioal Joural of Computer Sciece Issues, Vol. 10, Issue 4, No 1, July 2013 ISSN (Prit): 1694-0814 ISSN (Olie): 1694-0784 www.ijcsi.org 11 A New Eergy Cosumptio Algorithm with Active Sesor Selectio

More information

Synchronization of the distributed PWM carrier waves for Modular Multilevel Converters

Synchronization of the distributed PWM carrier waves for Modular Multilevel Converters Sychroizatio of the distributed PWM carrier waves for Modular Multilevel Coverters Paul Da Burlacu, Laszlo Mathe, IEEE Member ad Remus Teodorescu, IEEE Fellow Member Departmet of Eergy Techology, Aalborg

More information

Lecture 4: Frequency Reuse Concepts

Lecture 4: Frequency Reuse Concepts EE 499: Wireless & Mobile Commuicatios (8) Lecture 4: Frequecy euse Cocepts Distace betwee Co-Chael Cell Ceters Kowig the relatio betwee,, ad, we ca easily fid distace betwee the ceter poits of two co

More information

Delta- Sigma Modulator based Discrete Data Multiplier with Digital Output

Delta- Sigma Modulator based Discrete Data Multiplier with Digital Output K.Diwakar et al. / Iteratioal Joural of Egieerig ad echology (IJE Delta- Sigma Mulator based Discrete Data Multiplier with Digital Output K.Diwakar #,.ioth Kumar *2, B.Aitha #3, K.Kalaiarasa #4 # Departmet

More information

LETTER A Novel Adaptive Channel Estimation Scheme for DS-CDMA

LETTER A Novel Adaptive Channel Estimation Scheme for DS-CDMA 1274 LETTER A Novel Adaptive Chael Estimatio Scheme for DS-CDMA Che HE a), Member ad Xiao-xiag LI, Nomember SUMMARY This paper proposes a adaptive chael estimatio scheme, which uses differet movig average

More information

Outline. Motivation. Analog Functional Testing in Mixed-Signal Systems. Motivation and Background. Built-In Self-Test Architecture

Outline. Motivation. Analog Functional Testing in Mixed-Signal Systems. Motivation and Background. Built-In Self-Test Architecture Aalog Fuctioal Testig i Mixed-Sigal s Jie Qi Dept. of Electrical & Computer Egieerig Aubur Uiversity Co-Advisors: Charles Stroud ad Foster Dai Outlie Motivatio ad Backgroud Built-I Self-Test Architecture

More information

Reconfigurable architecture of RNS based high speed FIR filter

Reconfigurable architecture of RNS based high speed FIR filter Idia Joural of Egieerig & Materials Scieces Vol. 21, April 214, pp. 233-24 Recofigurable architecture of RNS based high speed FIR filter J Britto Pari* & S P Joy Vasatha Rai Departmet of Electroics Egieerig,

More information

Analysis of SDR GNSS Using MATLAB

Analysis of SDR GNSS Using MATLAB Iteratioal Joural of Computer Techology ad Electroics Egieerig (IJCTEE) Volume 5, Issue 3, Jue 2015 Aalysis of SDR GNSS Usig MATLAB Abstract This paper explais a software defied radio global avigatio satellite

More information

A Comparison on FPGA of Modular Multipliers Suitable for Elliptic Curve Cryptography over GF(p) for Specific p Values

A Comparison on FPGA of Modular Multipliers Suitable for Elliptic Curve Cryptography over GF(p) for Specific p Values A Compariso o FPGA of Modular Multipliers Suitable for Elliptic Curve Cryptography over GF(p) for Specific p Values Mark Hamilto, William Marae, Araud Tisserad To cite this versio: Mark Hamilto, William

More information

Joint Power Allocation and Beamforming for Cooperative Networks

Joint Power Allocation and Beamforming for Cooperative Networks It. J. Commuicatios, etwork ad System Scieces,, 4, 447-45 doi:.436/ijcs..4753 Published Olie July (http://www.scirp.org/joural/ijcs) Joit Power Allocatio ad Beamformig for Cooperative etworks Sodes Maadi,,

More information

8. Combinatorial Structures

8. Combinatorial Structures Virtual Laboratories > 0. Foudatios > 1 2 3 4 5 6 7 8 9 8. Combiatorial Structures The purpose of this sectio is to study several combiatorial structures that are of basic importace i probability. Permutatios

More information

Design and Implementation of Vedic Algorithm using Reversible Logic Gates

Design and Implementation of Vedic Algorithm using Reversible Logic Gates www.ijecs.i Iteratioal Joural Of Egieerig Ad Computer Sciece ISSN: 2319-7242 Volume 4 Issue 8 Aug 2015, Page No. 13734-13738 Desig ad Implemetatio of Vedic Algorithm usig Reversible Logic s Hemagi P.Patil

More information

A Radio Resource Allocation Algorithm for QoS Provision in PMP-based Systems

A Radio Resource Allocation Algorithm for QoS Provision in PMP-based Systems 530 OURAL OF COMMUICATIOS, VOL. 5, O. 7, ULY 00 A Radio Resource Allocatio Algorithm for QoS Provisio i PMP-based Systems Pig Wag Broadbad Wireless commuicatios ad Multimedia laboratory, Key Laboratory

More information

Problem of calculating time delay between pulse arrivals

Problem of calculating time delay between pulse arrivals America Joural of Egieerig Research (AJER) 5 America Joural of Egieerig Research (AJER) e-issn: 3-847 p-issn : 3-936 Volume-4, Issue-4, pp-3-4 www.ajer.org Research Paper Problem of calculatig time delay

More information

IEEE Protocol Implementation And Measurement Of Current Consumption by Rajan Rai

IEEE Protocol Implementation And Measurement Of Current Consumption by Rajan Rai Electrical ad Computer Egieerig Departmet IEEE 82.15.4 Protocol Implemetatio Ad Measuremet Of Curret Cosumptio by Raja Rai Advisor : Dr. James M. Corad Committee : Dr. Iva L. Howitt Dr. Yogedra P. Kakad

More information

Unit 5: Estimating with Confidence

Unit 5: Estimating with Confidence Uit 5: Estimatig with Cofidece Sectio 8.2 The Practice of Statistics, 4 th editio For AP* STARNES, YATES, MOORE Uit 5 Estimatig with Cofidece 8.1 8.2 8.3 Cofidece Itervals: The Basics Estimatig a Populatio

More information

Smart Energy & Power Quality Solutions. ProData datalogger. Datalogger and Gateway

Smart Energy & Power Quality Solutions. ProData datalogger. Datalogger and Gateway Smart Eergy & Power Quality Solutios ProData datalogger Datalogger ad Gateway Smart ad compact: Our most uiversal datalogger ever saves power costs Etheret coectio Modbus-Etheret-Gateway 32 MB 32 MB memory

More information

OPTIMIZATION OF RNS FIR FILTERS FOR 6-INPUTS LUT BASED FPGAS

OPTIMIZATION OF RNS FIR FILTERS FOR 6-INPUTS LUT BASED FPGAS OPTIMIZATION OF RNS FIR FILTERS FOR 6-INPUTS LUT BASED FPGAS G.C. Cardarilli, M. Re, A. Salsao Uiversity of Rome Tor Vergata Departmet of Electroic Egieerig Via del Politecico 1 / 00133 / Rome / ITAL {marco.re,

More information

Acquisition of GPS Software Receiver Using Split-Radix FFT

Acquisition of GPS Software Receiver Using Split-Radix FFT 006 IEEE Coferece o Systems, Ma, ad Cyberetics October -, 006, Taipei, Taiwa Acquisitio of GPS Software Receiver Usig Split-Radix FFT W. H. Li, W. L. Mao, H. W. Tsao, F. R. Chag, ad W. H. Huag Abstract

More information

A SIMPLE METHOD OF GOAL DIRECTED LOSSY SYNTHESIS AND NETWORK OPTIMIZATION

A SIMPLE METHOD OF GOAL DIRECTED LOSSY SYNTHESIS AND NETWORK OPTIMIZATION A SIMPL MOD OF GOAL DIRCD LOSSY SYNSIS AND NWORK OPIMIZAION Karel ájek a), ratislav Michal, Jiří Sedláček a) Uiversity of Defece, Kouicova 65,63 00 Bro,Czech Republic, Bro Uiversity of echology, Kolejí

More information

4. INTERSYMBOL INTERFERENCE

4. INTERSYMBOL INTERFERENCE DATA COMMUNICATIONS 59 4. INTERSYMBOL INTERFERENCE 4.1 OBJECT The effects of restricted badwidth i basebad data trasmissio will be studied. Measuremets relative to itersymbol iterferece, usig the eye patter

More information

Sensors & Transducers 2015 by IFSA Publishing, S. L.

Sensors & Transducers 2015 by IFSA Publishing, S. L. Sesors & Trasducers 215 by IFSA Publishig, S. L. http://www.sesorsportal.com Uiversal Sesors ad Trasducers Iterface for Mobile Devices: Metrological Characteristics * Sergey Y. YURISH ad Javier CAÑETE

More information

AME50461 SERIES EMI FILTER HYBRID-HIGH RELIABILITY

AME50461 SERIES EMI FILTER HYBRID-HIGH RELIABILITY PD-94595A AME5046 SERIES EMI FILTER HYBRID-HIGH RELIABILITY Descriptio The AME Series of EMI filters have bee desiged to provide full compliace with the iput lie reflected ripple curret requiremet specified

More information

Tehrani N Journal of Scientific and Engineering Research, 2018, 5(7):1-7

Tehrani N Journal of Scientific and Engineering Research, 2018, 5(7):1-7 Available olie www.jsaer.com, 2018, 5(7):1-7 Research Article ISSN: 2394-2630 CODEN(USA): JSERBR 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38

More information

Density Slicing Reference Manual

Density Slicing Reference Manual Desity Slicig Referece Maual Improvisio, Viscout Cetre II, Uiversity of Warwick Sciece Park, Millbur Hill Road, Covetry. CV4 7HS Tel: 0044 (0) 24 7669 2229 Fax: 0044 (0) 24 7669 0091 e-mail: admi@improvisio.com

More information

CONTROLLING FREQUENCY INFLUENCE ON THE OPERATION OF SERIAL THYRISTOR RLC INVERTERS

CONTROLLING FREQUENCY INFLUENCE ON THE OPERATION OF SERIAL THYRISTOR RLC INVERTERS EETRONIS - September, Sozopol, BUGARIA ONTROING FREQUENY INFUENE ON THE OPERATION OF SERIA THYRISTOR R INVERTERS Evgeiy Ivaov Popov, iliya Ivaova Pideva, Borislav Nikolaev Tsakovski Departmet of Power

More information

On Parity based Divide and Conquer Recursive Functions

On Parity based Divide and Conquer Recursive Functions O Parity based Divide ad Coquer Recursive Fuctios Sug-Hyu Cha Abstract The parity based divide ad coquer recursio trees are itroduced where the sizes of the tree do ot grow mootoically as grows. These

More information

On the Capacity of k-mpr Wireless Networks

On the Capacity of k-mpr Wireless Networks O the Capacity of -MPR Wireless Networs Mig-Fei Guo, Member, IEEE, Xibig Wag, Member, IEEE, Mi-You Wu, Seior Member, IEEE Abstract The capacity of wireless ad hoc etwors is maily restricted by the umber

More information

Vertical Handover Techniques Evaluation

Vertical Handover Techniques Evaluation Vertical Hadover Techiques Evaluatio BOJAN BAKMAZ, ZORAN BOJKOVIC, MIODRAG BAKMAZ Uiversity of Belgrade SERBIA b.bakmaz@sf.bg.ac.rs Abstract: - Hadover techiques are essetial compoets of the heterogeeous

More information

History and Advancement of the Family of Log Periodic Toothed Planer Microstrip Antenna

History and Advancement of the Family of Log Periodic Toothed Planer Microstrip Antenna Joural of Electromagetic Aalysis ad Applicatios, 2011, 3, 242-247 doi:10.4236/jemaa.2011.36039 Published Olie Jue 2011 (http://www.scirp.org/joural/jemaa) History ad Advacemet of the Family of Log Periodic

More information

A novel adaptive modulation and coding strategy based on partial feedback for enhanced MBMS network

A novel adaptive modulation and coding strategy based on partial feedback for enhanced MBMS network THE JOURNAL OF CHINA UNIVERSITIES OF POSTS AND TELECOMMUNICATIONS Volume 5, Issue, March 2008 SHENG Yu, PENG Mu-ge, WANG We-bo A ovel adaptive modulatio ad codig strategy based o partial feedback for ehaced

More information

A Class of Interconnection Networks for Multicasting

A Class of Interconnection Networks for Multicasting A Class of Itercoectio Networks for Multicastig Yuayua Yag Departmet of Computer Sciece ad Electrical Egieerig Uiversity of Vermot, Burligto, VT 05405 yag@cs.uvm.edu Abstract Multicast or oe-to-may commuicatios

More information

Reducing Power Dissipation in Complex Digital Filters by using the Quadratic Residue Number System Λ

Reducing Power Dissipation in Complex Digital Filters by using the Quadratic Residue Number System Λ Reducig Power Dissipatio i Complex Digital Filters by usig the Quadratic Residue Number System Λ Agelo D Amora, Alberto Naarelli, Marco Re ad Gia Carlo Cardarilli Departmet of Electrical Egieerig Uiversity

More information

Permutation Enumeration

Permutation Enumeration RMT 2012 Power Roud Rubric February 18, 2012 Permutatio Eumeratio 1 (a List all permutatios of {1, 2, 3} (b Give a expressio for the umber of permutatios of {1, 2, 3,, } i terms of Compute the umber for

More information

Message Scheduling for the FlexRay Protocol: The Dynamic Segment

Message Scheduling for the FlexRay Protocol: The Dynamic Segment IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY 1 Message Schedulig for the FlexRay Protocol: The Dyamic Segmet Ece Gura Schmidt, Member, IEEE, Klaus Schmidt Abstract The FlexRay commuicatio protocol is expected

More information

An Adaptive Image Denoising Method based on Thresholding

An Adaptive Image Denoising Method based on Thresholding A Adaptive Image Deoisig Method based o Thresholdig HARI OM AND MANTOSH BISWAS Departmet of Computer Sciece & Egieerig Idia School of Mies, Dhabad Jharkad-86004 INDIA {hariom4idia, matoshb}@gmail.com Abstract

More information

A New 3-Bit Integrating Time to Digital Converter Using Time to Voltage Conversion Technique

A New 3-Bit Integrating Time to Digital Converter Using Time to Voltage Conversion Technique Bulleti of Eviromet, Pharmacology ad Life Scieces Bull. Ev. Pharmacol. Life Sci., ol 3 [11] October 2014:115-122 2014 Academy for Eviromet ad Life Scieces, dia Olie SSN 2277-1808 Joural s URL:http://www.bepls.com

More information