Efficient and Privacy-Preserving Data Aggregation in Mobile Sensing

Size: px
Start display at page:

Download "Efficient and Privacy-Preserving Data Aggregation in Mobile Sensing"

Transcription

1 Efficiet ad Privacy-Preservig Data Aggregatio i Mobile Sesig Qighua Li, Guohog Cao Departmet of Computer Sciece ad Egieerig The Pesylvaia State Uiversity, Uiversity Park {qxl8, gcao}@cse.psu.edu Abstract The proliferatio ad ever-icreasig capabilities of mobile devices such as smart phoes give rise to a variety of mobile sesig applicatios. This paper studies how a utrusted aggregator i mobile sesig ca periodically obtai desired statistics over the data cotributed by multiple mobile users, without compromisig the privacy of each user. Although there are some existig works i this area, they either require bidirectioal commuicatios betwee the aggregator ad mobile users i every aggregatio period, or has high computatio overhead ad caot support large plaitext spaces. Also, they do ot cosider the Mi aggregate which is quite useful i mobile sesig. To address these problems, we propose a efficiet protocol to obtai the Sum aggregate, which employs a additive homomorphic ecryptio ad a ovel key maagemet techique to support large plaitext space. We also exted the sum aggregatio protocol to obtai the Mi aggregate of timeseries data. Evaluatios show that our protocols are orders of magitude faster tha existig solutios. I. INTRODUCTION Mobile devices such as smart phoes are gaiig a evericreasig popularity. Most smart phoes are equipped with a rich set of embedded sesors such as camera, microphoe, GPS, accelerometer, ambiet light sesor, gyroscope, etc. The data geerated by these sesors provides opportuities to make sophisticated ifereces about ot oly people (e.g., huma activity, health, locatio, social evet) but also their surroudig (e.g., pollutio, oise, weather, oxyge level), ad thus ca help improve people s health as well as life. This eables various mobile sesig applicatios such as evirometal moitorig [], traffic moitorig [2], healthcare [3], etc. I may scearios, aggregatio statistics eed to be periodically computed from a stream of data cotributed by mobile users [4], i order to idetify some pheomea or track some importat patters. For example, the average amout of daily exercise (which ca be measured by motio sesors [5]) that people do ca be used to ifer public health coditios. The average or maximum level of air pollutio ad polle cocetratio i a area may be useful for people to pla their outdoor activities. Other statistics of iterests iclude the lowest gasolie price i a city, the highest movig speed of road traffic durig rush hour, etc. Although aggregatio statistics computed from time-series data is very useful, i may scearios, the data from idividual user may be privacy-sesitive, ad users do ot trust ay sigle third-party aggregator to see their data i cleartext. For istace, to moitor the propagatio of a ew flu, the aggregator will cout the umber of users ifected by this flu. owever, a user may ot wat to directly provide her true status ( if beig ifected ad 0 otherwise) if she is ot sure whether the iformatio will be abused by the aggregator. Accordigly, systems that collect users true data values ad compute aggregate statistics over them may ot meet users privacy requiremet [4]. Thus, a importat challege is how to protect the users privacy i mobile sesig, especially whe the aggregator is utrusted. Most previous works o sesor data aggregatio assume a trusted aggregator, ad hece caot protect user privacy agaist a utrusted aggregator i mobile sesig applicatios. Several recet works [6] [9] cosider the aggregatio of timeseries data i the presece of a utrusted aggregator. To protect user privacy, they desig ecryptio schemes i which the aggregator ca oly decrypt the sum of all users data but othig else. Rastogi ad Nath [6] use threshold Paillier cryptosystem [0] to build such a ecryptio scheme. To decrypt the sum, their scheme eeds a extra roud of iteractio betwee the aggregator ad all users i every aggregatio period, which meas high commuicatio cost ad log delay. Moreover, it requires all users to be olie util decryptio is completed, which may ot be practical i may mobile sesig scearios due to user mobility ad the heterogeeity of user coectivity. Rieffel et al. [9] propose a costructio that does ot require bidirectioal commuicatios betwee the aggregator ad the users, but it has high computatio ad storage cost to deal with collusios i a large system. Shi et al. [7], [8] also propose a costructio for sum aggregatio which does ot eed the extra roud of iteractio. owever, the decryptio i their costructio eeds to traverse the possible plaitext space of the aggregated value, which is very expesive for a large system with large plaitext space. I mobile sesig, the plaitext space of some applicatio ca be large. For example, carbo dioxide levels ca rage from 350 ppm outdoors to over 0000 ppm i idustrial workplaces []. ece i applicatios which cotiuously moitor the carbo dioxide levels that people are exposed to i their daily life [2], [3], the plaitext space ca reach 0 4. Uder this plaitext space, for a large system with oe millio users, the costructio i [7] requires 30 secods to decrypt the sum o a moder 64-bit desktop PC. Its computatio overhead is too high for a aggregator to ru realtime moitorig applicatios with short aggregatio itervals ad to collect

2 multiple aggregate statistics simultaeously. Moreover, oe of these existig schemes cosiders the Mi aggregate (i.e., the miimum value) of time-series data, which is also importat i may mobile sesig applicatios. I this paper, we propose a ew protocol for mobile sesig to obtai the sum aggregate of time-series data i the presece of a utrusted aggregator. Our protocol employs a additive homomorphic ecryptio ad a ovel key maagemet scheme based o efficiet MAC to esure that the aggregator ca oly obtai the sum of all users data, without kowig idividual user s data or itermediate result. I our protocol, each user (the aggregator) oly eeds to compute a very small umber of MACs to ecrypt her data (decrypt the sum). ece, the computatio cost is very low, ad the protocol ca scale to large systems with large plaitext spaces, resourcecostraied devices ad high aggregatio loads. Aother ice property of our protocol is that it oly requires a sigle roud of user-to-aggregator commuicatio. Based o the sum aggregatio protocol, we also propose a protocol to obtai the Mi aggregate. To our best kowledge, this is the first privacy-preservig solutio to obtai the Mi of time-series data i mobile sesig with just oe roud of userto-aggregator commuicatio. Our protocols for Sum ad Mi ca be easily adapted to derive may other aggregate statistics such as Cout, Average ad Max. The remaider of this paper is orgaized as follows. Sectio II discusses related work. Sectio III presets system models ad assumptios. Sectio IV ad Sectio V preset our protocols for Sum ad Mi, respectively. Sectio VI evaluates the practical performace ad cost of our solutios. The last two sectios preset discussios ad coclusios. II. RELATED WORK May works have addressed various security ad privacy issues i mobile sesig etworks ad systems (e.g., [4] [8]), but they do ot cosider data aggregatio. There are a lot of existig works (e.g., [9] [22]) o security ad privacypreservig data aggregatio, but most of them assume a trusted aggregator ad caot protect user privacy agaist utrusted aggregators. Yag et al. [23] proposed a ecryptio scheme that allows a utrusted aggregator to obtai the sum of multiple users s data without kowig ay specific user s data. owever, their scheme requires expesive re-keyig operatios to support multiple time steps, ad thus may ot work for time-series data. Shi et al. [24] proposed a privacy-preservig data aggregatio scheme based o data slicig ad mixig techiques. owever, their scheme relies o peer-to-peer commuicatios amog users, which is otrivial i mobile sesig scearios due to the high mobility of users. Also, their scheme does ot work well for time-series data, sice each user may eed to select a ew set of peers i each aggregatio iterval due to mobility. Besides, their scheme for o-additive aggregates (e.g., Max/Mi) requires multiple rouds of bi-directioal commuicatios betwee the aggregator ad mobile users which meas log delays. I cotrast, our scheme obtais those aggregates with just oe roud of ui-directioal commuicatio from users to the aggregator. To achieve privacy-preservig sum aggregatio of timeseries data, Rastogi ad Nath [6] desiged a ecryptio scheme based o threshold Paillier cryptosystem [0], where the decryptio key is divided ito portios ad distributed to the users. The aggregator collects the ciphertexts of users, multiplies them together ad seds the aggregate ciphertext to all users. Each user decrypts a share of the sum aggregate. The aggregator collects all the shares ad gets the fial sum. owever, their scheme requires a extra roud of iteractio betwee the aggregator ad users i every aggregatio period. Based o a efficiet additive homomorphic ecryptio scheme, Rieffel et al. [9] proposed a costructio that does ot require a extra roud of iteractio betwee the aggregator ad the users. I their scheme, the computatio ad storage cost is roughly equal to the umber of colludig users that the system ca tolerate. Thus, their scheme has high overhead to achieve good resistace to collusio, especially whe the system is large ad a large umber of users collude. I cotrast, our scheme tolerates a high fractio of colludig users (e.g., 30%) with very small cost eve whe the system is large. Acs ad Castelluccia [25] also proposed a scheme based o additive homomorphic ecryptio, but i their scheme each ode shares a pairwise key with ay other ode. Shi et al. [7] proposed a costructio for sum aggregatio based o the assumptio that the Decisioal Diffie-ellma problem is hard over fiite cyclic groups. I their costructio, each user seds her ciphertext to the aggregator ad o commuicatio is eeded from the aggregator to the users. To decrypt the sum, their costructio eeds to traverse the possible plaitext space of sum, ad thus it is ot efficiet for a large system with large plaitext spaces. Cha et al. [8] exteded the costructio i [7] with a biary iterval tree techique, but their scheme still has the limitatio i plaitext spaces. Jawurek ad Kerschbaum [26] proposed a scheme which provides differetial privacy for sum. Our aggregatio protocol for sum ca be used as a buildig block of their scheme to improve the computatioal efficiecy. Also, existig works do ot cosider the Mi of time-series data. III. PRELIMINARIES A. Models ad Assumptios Figure shows our system model, which is similar to the model i [7]. A aggregator wishes to get the aggregate statistics of mobile users periodically, e.g., i every hour. The time periods are umbered as, 2, 3,..., etc. I every time period, each user i ecrypts her data x i with key k i ad seds the derived ciphertext to the aggregator. From the ciphertexts, the aggregator decrypts the eeded aggregate statistics usig her aggregator capability k 0. The value of each user s data is a iteger withi rage [0, Δ]. Two types of aggregate statistics are cosidered i this work, which are Sum ad Mi. Sum is defied as the sum of all users data ad Mi is defied as the miimum value of the users data. From Sum ad Mi, may other aggregate statistics ca be easily derived, such as

3 2 users Fig.. c = Ec(k ;x ) c 2 = Ec(k 2 ;x 2 ) c = Ec(k ;x ) aggregator AggrDec(k 0 ;c ;:::;c ) aggregates P i= x i mifx ;:::;x g Our system model of time-series data aggregatio. Cout (i.e., the umber of users that satisfy certai predicate), Average (which is derivable from Sum ad Cout), ad Max (which ca be obtaied from the Mi of Δ x). I each time period, a mobile user seds her ecrypted data to the aggregator via WiFi, 3G or other available access etworks. No peer-to-peer commuicatio is required amog mobile users, sice such commuicatio is otrivial i mobile sesig scearios due to the high mobility of users ad users may ot be aware of each other for privacy reasos. We cosider a utrusted aggregator that is curious about each idividual user s data. The aggregator may eavesdrop all the messages set from/to every user. A umber of users may collude with the aggregator, ad reveal their data to the aggregator. A umber of users may also collude to obtai the aggregate. Similar to [7], we assume that the fractio of users that collude with/agaist the aggregator is at most γ (0 γ<), ad the system has a priori estimate over the upper boud of γ which ca be used i practice. I additio, the aggregator ad users have limited computatio capability. We assume a trusted authority which issues proper keys to the users ad the aggregator via a secure chael. Our goal is to guaratee the privacy of each user s data agaist the utrusted aggregator, i.e., the aggregator obtais the aggregate statistics without kowig ay idividual user s data. Note that we aim to protect the privacy of data cotet ot data source [27]. Also, we aim to guaratee that ay party without a appropriate aggregator capability obtais othig. Malicious users may also perform data pollutio attacks i which they provide false data values i order to sway the fial aggregate statistics. Data pollutio attacks are outside the scope of this paper, ad their ifluece ca be bouded if each user uses a o-iteractive zero-kowledge proof to prove that her data lies i a valid rage. B. Uderlyig Ecryptio Scheme Oe buildig block of our solutio is the additive homomorphic ecryptio scheme proposed by Castelluccia et al. [2], [28]. This scheme works as follows. Ecryptio: ) Represet message m as iteger m [0,M ] where M is a large iteger. 2) Let k be a radomly geerated key, k {0, } λ, where λ is a security parameter. 3) Output ciphertext c =(m + h(f k (r))) mod M, where f k is a pseudoradom fuctio (PRF) that uses k as TABLE I NOTATIONS The umber of users i the system γ The maximum fractio of users that collude Δ The maximum value of ay user s data M M =2 log 2 (Δ) F λ F λ = {f s : {0, } λ {0, } λ } s {0,} λ is a family of pesudoradom fuctios idexed by key s h A legth-matchig hash fuctio, h : {0, } λ {0, } α, where α = log 2 (Δ) k 0 The decryptio key used by the aggregator k i The ecryptio key used by user i l The required security level, e.g., l =80 c The umber of secrets assiged to each user i our protocol q The umber of secrets assiged to the aggregator i our protocol a parameter, h is a legth-matchig hash fuctio (see details below) ad r is a oce for this message. Decryptio: ) Output plaitext m =(c h(f k (r))) mod M. The PRF f k is a fuctio of the PRF family F λ = {f k : {0, } λ {0, } λ } k {0,} λ idexed by k. Sice provably secure PRFs are usually computatioally expesive, Castelluccia et al. [2] advocate usig keyed hash fuctios (e.g., MAC) as PRFs. MAC is a PRF if the uderlyig compressio fuctio of the hash fuctio i use is a PRF [29]. Whe MAC is used, f k (r) is the MAC of r with k as the key. The purpose of h is to shorte a log bit strig. It maps the output of f k to a shorter bit strig of legth α, where α is the modulus size of M (i.e., α = M ). h is ot required to be collisio-cosistet, but its output should be uiformly distributed over {0, } α. A example costructio for h is to trucate the output of f k ito shorter bit strigs of legth α, take exclusive-or o all these strigs ad use it as the output of h. This scheme is proved to be sematically secure [2]. This scheme allows additive homomorphic ecryptio. Give two ciphertexts c = (m + h(f k (r))) mod M ad c 2 =(m 2 + h(f k (r))) mod M, a idividual that kows k ad k ca compute the sum of m ad m 2 directly from the aggregate ciphertext c = c + c 2 : m = m + m 2 =(c h(f k (r)) h(f k (r))) mod M. To correctly compute the sum of messages m, m 2,..., m, M must be larger tha i= m i. I practice, M should be selected as M =2 log 2 (max(mi) ). Table I shows the otatios used i this paper. IV. AGGREGATION PROTOCOL FOR SUM A. Protocol Overview Setup: The trusted authority assigs a set of secret values (secrets for short) to each user ad the aggregator. Ec: I each time period, user i (i [,]) geerates ecryptio key k i usig the secrets that it is assiged. It ecrypts its data x i by computig c i =(k i + x i ) mod M () where M =2 log 2 (Δ). The it seds the ciphertext c i to the aggregator.

4 umbers kow to the aggregator secret mappig sum k aggregator k 0 sum sum k 2 sum user user 2 user Fig. 2. The ituitio behid the straw-ma costructio. The aggregator computes the sum of a set of umbers as the decryptio key. These umbers are secretly allocated to the users, ad each user computes the sum of its allocated umbers as the ecryptio key. The aggregator caot kow ay user s ecryptio key sice it does ot kow the mappig betwee the umbers ad the users. AggrDec: I each time period, the aggregator geerates decryptio key k 0 usig the secrets that it is assiged, ad decrypts the sum aggregate S = i= x i by computig S =( c i k 0 ) mod M. (2) i= The keys are geerated usig a PRF family ad a legthmatchig hash fuctio (see later). Accordig to [28], the aggregator ca get the correct sum so log as the followig equatio holds: k 0 =( k i ) mod M. (3) i= I our protocol, the setup phase oly rus oce. After the setup phase, the trusted authority does ot eed to distribute secrets to the users ad the aggregator agai. I additio, the users ad the aggregator do ot have to sychroize their key geeratios with commuicatios i every time period. These restrictios make it challegig for the users ad the aggregator to geerate their keys such that Equatio 3 holds i every time period ad the ecryptio (decryptio) key used by each user (the aggregator) caot be leared by ay other party besides the trusted authority. We propose a costructio for key geeratios which p- reserves the privacy of each user ad the Sum aggregate efficietly. Before presetig our costructio, we first discuss a straw-ma costructio which is very efficiet for the users but ot efficiet for the aggregator. The we exted this strawma scheme to derive our costructio. Both costructios iclude three processes, which are secret setup, ecryptio key geeratio ad decryptio key geeratio. They proceed i the Setup phase, Ec phase ad AggrDec phase of the aggregatio protocol, respectively. B. A Straw-ma Costructio for Key Geeratio ) Ituitio: Figure 2 shows the ituitio of the strawma costructio. Suppose there are c radom umbers. The aggregator has access to all the umbers, ad it computes the sum of these umbers as the decryptio key k 0. These umbers k TABLE II SECURITY LEVELS OF TE STRAW-MAN CONSTRUCTION WEN γ =0.. =0 2 c p b =0 3 c p b =0 4 c p b =0 5 c p b =0 6 c p b are divided ito radom disjoit subsets, each of size c. These subsets are assiged to the users, where each user has access to oe subset of umbers. User i computes the sum of the umbers assiged to it as the ecryptio key k i. Clearly, Equatio 3 holds. The aggregator caot kow ay user s ecryptio key sice it does ot kow the mappig betwee the umbers ad the users. Whe c is large eough, it is ifeasible for the aggregator to guess the umbers assiged to a particular user with a brute-force method. The aggregator s decryptio key caot be revealed by ay user sice o user kows all the umbers. 2) Costructio: The costructio is as follows: Secret Setup: The trusted authority geerates c radom ad differet secrets s,..., s c. It divides these secrets ito radom disjoit subsets, with c secrets i each subset. Let S deote the set of all secrets, ad let S i deote the i th subset. Clearly, S = i= S i ad i j, S i Sj = φ. The trusted authority seds the secrets i subset S i to user i ad seds all the secrets i S to the aggregator. Ecryptio Key Geeratio: I time period t N, user i geerates its ecryptio key as follows: k i =( h(f s (t))) mod M. (4) s S i Decryptio Key Geeratio: I time period t N, the aggregator geerates the decryptio key as follows: k 0 =( s S h(f s (t))) mod M. (5) I Equatio 4, sice each h(f s (t)) is uiformly distributed over {0, } α, k i is also uiformly distributed over {0, } α. Thus, the ecryptio keys satisfy the security requiremet of the uderlyig cryptosystem. Equatio 3 also holds sice k i = ( h(f s (t))) mod M i= i= s S i = ( h(f s (t))) mod M s S = k 0 mod M. 3) Security level: If the aggregator kows the c secrets used by a user, it ca obtai the ecryptio key of the user. We ca derive the probability that the aggregator fids the c secrets used by a user. Let p b deote the probability that i a sigle

5 TABLE III TE MINIMUM VALUES OF c FOR 80-BIT SECURITY IN TE STRAW-MAN CONSTRUCTION γ =0, 0., 0.2, itegers derived from secrets decryptio key ecryptio keys k itegers derived from secrets decryptio key ecryptio keys k trial the aggregator ca successfully guess the secrets assiged to the user. Recall that γ is the maximal fractio of users that collude with the aggregator. I the worst case, the aggregator kows the γc secrets assiged to the colludig users, but it does ot kow how the remaiig ( γ)c secrets are assiged to other users. There are ( ) ( γ)c c possible secret assigmets for each user. ece we have: p b = ( ( γ)c c ). (6) With a smaller p b, better security ca be achieved. Table II shows the values of p b for varyig parameters ad c. Asc icreases, the security level icreases quickly. Give the umber of users ad a estimate of γ, weca derive the miimum value of c to achieve a certai required security level. (c is miimized to miimize the cost.) For l-bit security (e.g., l =80), c should be selected as the miimum value that satisfies p b 2 l. Table III shows the values of c for 80-bit security. A fractio of users may collude agaist the aggregator to reveal the aggregate. To achieve this goal, they eed to obtai all the secrets that the aggregator has. owever, each participat oly kows a subset of the secrets. So log as ot all users collude, they caot obtai all the secrets. 4) Cost: I each time period, each user computes c PRFs ad the aggregator computes c PRFs. Sice c is small as show i Table III, the computatio cost at each user is very low. owever, whe the umber of users is very large, the computatio cost at the aggregator is high. C. Our Costructio for Key Geeratio Our costructio exteds the straw-ma costructio to reduce the computatio overhead at the aggregator. ) Ituitio: Cosider a equatio: a + a a c = a + a a c. (7) If we remove c q summads from the right side ad subtract them from the left side, the derived equatio a + +a c +( a )+ +( a c q )=a c q+ + +a c (8) is equivalet to the origial equatio. To meet the requiremet of Equatio 3, the straw-ma costructio essetially mimics Equatio 7, i.e., the users collectively geerate the summads o the left side ad add them to the aggregate, while the aggregator aloe geerates the summads o the right side ad subtracts them from the perturbed aggregate (see Figure 3(a)). Each summad is geerated from a secret. Sice Equatio 7 ad 8 are equivalet, we ca remove some summads from the aggregator side ad subtract them from the user side without violatig Equatio k 0 additio k 2 k (a) Straw-ma costructio k 0 additio subtractio k 2 k (b) Our costructio Fig. 3. The ituitio behid our costructio i compariso with the strawma costructio. 3. Now the aggregator has less computatio overhead sice it eeds to geerate less summads. The reduced computatio does ot come for free, as it is amortized amog the users such that each user geerates more summads (see Figure 3(b)). A ice property is that it is ow more difficult to guess the summads geerated by each user ad thus each user has better security. 2) Costructio: The costructio is as follows: Secret Distributio: The trusted authority geerates c radom ad differet secrets s,..., s c. Let S deote the set composed of all the secrets. The trusted authority divides these secrets ito radom disjoit subsets, with c secrets i each subset. For coveiece, we call these subsets additive subsets. Let S i deote the i th additive subset. Clearly, S = i= S i. Out of the c secrets, the trusted authority radomly selects q secrets ad assigs them to the aggregator. Let Ŝ deote the set of secrets assiged to the aggregator. The trusted authority divides the remaiig c q secrets evely ito radom disjoit subsets. Amog them, (c q) c q subsets have c q c q + secrets each, ad the other ( + ) c+q subsets have c q secrets each. For coveiece, we call these subsets subtractive subsets. Let S i deote the i th subtractive subset. Clearly, S =( S i= i ) Ŝ. The trusted authority assigs the secrets i the additive subset S i ad subtractive subset Si to user i. Ecryptio Key Geeratio: I time period t N, user i geerates its ecryptio key by computig k i =( h(f s (t)) h(f s (t))) mod M. (9) s S i s S i Decryptio Key Geeratio: I time period t N, the aggregator geerates the decryptio key by computig k 0 =( s Ŝ h(f s (t))) mod M. (0)

6 TABLE IV TE SECURITY LEVEL OF OUR CONSTRUCTION WEN γ =0.. =0 2 c p b =0 3 c p b =0 4 c p b =0 5 c p b =0 6 c p b The requiremet i Equatio 3 is satisfied sice k i = ( ( h(f s (t)) h(f s (t)))) mod M i= i= s S i s S i = ( h(f s (t)) h(f s (t))) mod M s S s S i= i = ( h(f s (t))) mod M s Ŝ = k 0. 3) Security level: The aggregator caot lear ay user s ecryptio key sice it does ot kow the additive secrets (i.e., secrets i the additive subset) ad the subtractive secrets (i.e., secrets i the subtractive subset) assiged to this user. Each user has c additive secrets ad at least c q subtractive secrets. The aggregator may kow the secrets assiged to itself ad those to its γ colluders, but there are still ( γ)c additive secrets ad at least ( γ) c q subtractive secrets that the aggregator does ot kow how they are assiged to the good users. There are at least ( ) ( ( γ)c ( γ) c q c ) c q possible secret assigmets for each good user. Thus, p b ( ( γ)c c ) ( ( γ) c q c q ). () p b decreases (i.e., the security for the users is better) whe ad c icrease, but p b icreases whe γ icreases. Uder the same total computatio cost, the smaller q is, the more subtractive secrets the users are assiged ad the better security the users have. owever, if q is too small, the secrets (ad hece the decryptio key) used by the aggregator may be leared by a umber of colludig users i the brute-force way. We ca derive the miimum value of q to make it ifeasible for γ fractio of users to collusively obtai the decryptio key. These colluders kow at most γc subtractive secrets, but they do ot kow which q of the remaiig ( γ)c secrets the aggregator has. There are ( ) ( γ)c q possible secret assigmets for the aggregator. Let p c deote the probability that the q secrets assiged to the aggregator ca be guessed i a sigle trial. We have p c ( ( γ)c q ). (2) TABLE V TE VALUES OF c FOR 80-BIT SECURITY IN OUR CONSTRUCTION γ =0, 0., γ = TABLE VI TE VALUES OF q FOR 80-BIT SECURITY IN OUR CONSTRUCTION γ = γ = γ = γ = Whe q icreases, p c decreases which meas better security for the aggregator. 4) Practical cosideratios: To achieve l-bit security for each user ad the aggregator, it is required that p b 2 l ad p c 2 l respectively. Give parameters ad γ, large-eough values should be set for c ad q to meet these requiremets. Sice the values of c ad q deped o each other, which ca be see from Equatio ad 2, they ca be set as follows. First, we assume q (0,]. Uder this assumptio, Equatio ca be rewritte as: p b ( ( γ)c c ) ( ( γ)(c ) c ). (3) We ca derive the miimum value of c that makes the righthad side of Equatio 3 smaller tha 2 l. The we apply the derived value of c to Equatio 2, ad obtai the miimum value of q that makes the right-had side of Equatio 2 smaller tha 2 l. If the obtaied value of q falls ito the assumed rage (0,], the values of c ad q are accepted. Otherwise, we ca icrease the value of c, util the miimum value of q that makes the right-had side of Equatio 2 smaller tha 2 l is ot larger tha. This method of settig c ad q esures that q, ad thus p b is give i Equatio 3. Table IV shows the values of p b whe ad c chage. Table V ad Table VI show the values of c ad q respectively for 80-bit security. It ca be see that both c ad q are very small. 5) Cost: Sice the setup phase is ru oly oce, we aalyze the cost of our costructio i each aggregatio period. The computatio cost is measured by the umber of PRFs computed, sice the legth-matchig hash fuctio (which maily cosists of exclusive-or operatios) ad arithmetic additio are much less expesive i computatio. I each time period, each user computes 2c q PRFs o average, while the aggregator computes q PRFs. As for the storage cost, the trusted authority stores c secrets as well as 2c mappigs betwee the secrets ad the users/aggregator. Each user stores 2c q secrets o average, while the aggregator stores q secrets. Besides sedig the ecrypted data to the aggregator, each user does ot make ay extra commuicatios. 6) Comparisos with the Straw-ma Costructio: Table VII compares our costructio to the straw-ma costructio i security ad cost. Whe the total computatio cost (for users

7 TABLE VII TE SECURITY AND COST OF OUR CONSTRUCTION AND TE STRAW-MAN CONSTRUCTION.FOR COMPUTATION COST, TE VALUE IS TE COST PER TIME PERIOD. Straw-ma Ours p b ( ( γ)c ) ( ( γ)c ) ( ( γ)(c ) ) c c Comp. (total) 2c 2c c Comp. (user) c 2c q Comp. c q(q <) (aggregator) Storage (user) c 2c q Storage c q (aggregator) TABLE VIII TE COMPUTATION COST OF OUR CONSTRUCTION AND TE STRAW-MAN CONSTRUCTION FOR 80-BIT SECURITY WEN γ = User Straw-ma Ours Aggregator Straw-ma Ours ad the aggregator) is the same, our costructio achieves better security. Also, it has smaller computatio cost at the aggregator. Upo iitial ispectio, our costructio may seem to double the computatio cost at each user (i.e., from c to roughly 2c). I practice, however, it ca use a smaller c to achieve the same security level. Table VIII shows the computatio cost of the two costructios at the same security level. For a wide rage of ( ), the computatio cost at each user is slightly higher (i.e., oe or two PRFs) i our costructio, but the computatio cost at the aggregator is orders of magitude smaller. V. AGGREGATION PROTOCOL FOR MIN The Mi aggregate is defied as the miimum value of the users data. This sectio presets a protocol which employs the Sum aggregate to get Mi. A. The Basic Scheme This scheme gets the Mi aggregate of each time period usig Δ+ parallel Sum aggregates i the same time period. The sums used to obtai Mi are based o a umber of -bit derivative data (deoted by d) derived from the users raw data x. Without loss of geerality, we assume that Δ is a power of two. The scheme works as follows. I each time period, each user geerates Δ+ derivative data d[0], d[],..., d[δ], where each derivative data correspods to oe possible data value i the plaitext space. For each j [0, Δ], the user assigs to d[j] if its raw data value is equal to j ad assigs 0 otherwise. For each j [0, Δ], the aggregator ca obtai the Sum aggregate of d[j] usig the sum aggregatio protocol preseted i Sectio IV. The Mi is the smallest j that returs a positive sum. I each time period, each user ivolves i Δ+ sum aggregates over Δ+ derivative data. Note that i the sum aggregatio protocol each user computes 2c PRFs to ecrypt her data. It is iefficiet to compute 2c PRFs for User Derivative data d[] d[2] d[3] d[4] Sum (a) Origial derivative data Fig. 4. data. User 2 3 Sum d[] Derivative data d[2] d[3] d[4] (b) Exteded ad cocateated data A example of sum based o exteded ad cocateated derivative each derivative data. Sice these data are idepedet, we use a more efficiet techique that cocateates multiple data together ad ecrypts them as a whole. This techique exteds each derivative data from oe bit to log ( +) bits by addig log ( +) 0 s o the left, ad the cocateates all exteded derivative data ito a sigle bit strig. The sum of the cocateated strig (iterpreted as a iteger) is obtaied usig the sum aggregatio protocol. The obtaied sum is cosidered as a bit strig, ad split ito substrigs of log ( + ) bits each. Each substrig, whe iterpreted as a iteger, represets the sum of oe derivative data. Note that these substrigs do ot affect each other (i.e., o carries amog them), sice the sum of each derivative data does ot exceed. Figure 4 shows a example of this process. Clearly, the cocateated data has (Δ + ) log ( + ) bits. The ciphertext geerated by each user has α =(Δ+ ) log ( +) bits. If α is larger tha, which is the size of the output geerated by the PRF (i.e., a MAC), we ca (Δ+) log (+) divide the derivative data ito groups ad apply the above techique to each group. Thus, (Δ+) log (+) istaces of the sum aggregatio protocol are eeded i each time period. For example, whe = 000, Δ = 0000 ad SA-52 is used as the hash fuctio of MAC, 96 istaces of the sum aggregatio protocol are eeded. Each user uses just oe set of secrets for all istaces of the sum aggregatio protocol. For istace j, it uses h(f s (j t)) to geerate the ecryptio key istead of usig h(f s (t)) i the origial protocol (see Equatio 9). Similarly, the aggregator also uses just oe set of secrets. Sice the sum aggregatio protocol does ot leak the derivative data of ay user, the aggregator caot kow the data value of ay specific user. B. Low-cost Mi Aggregatio Whe the plaitext space is large, the cost of the basic scheme is high. I some applicatio scearios, it may ot be ecessary to get the exact Mi, but a approximate aswer is good eough. For such scearios, the basic scheme ca be exteded to get a approximate Mi with much smaller cost. Specifically, we wish to obtai a approximate Mi where Exact Mi Approximate Mi the relative error (defied as max{exact Mi,} ) is required to be lower tha 2 (ɛ 0). To meet this requiremet, ɛ the exact value of Mi should be obtaied if Mi is smaller tha or equal to 2 ɛ, ad the ɛ-bit segmet of Mi (whe Mi is iterpreted as a bit strig) that starts from the first bit should be obtaied if Mi is larger tha 2 ɛ. For example, suppose Mi is 42 (00000) out of 8-bit data. To make

8 the relative error smaller tha 2, it is sufficiet to kow 3 that Mi has the bit patter 000xxx. The we ca set the bit that follows the kow bits as ad set other bits as 0. The obtaied approximate Mi is 00000, which is 44. The relative error is 2, which is smaller tha the required 2. 3 To obtai the approximate Mi, each user appeds ɛ + paddig bits to its raw data. If the data value is zero, the first paddig bit is ad the others are 0; otherwise, all the paddig bits are 0. The padded data has log Δ + ɛ +2 bits ad at least oe bit is. The first bit of Mi may appear i ay of the first log Δ + 2 bits of the padded data. I the case it appears at the first paddig bit, Mi is zero. Suppose i the biary represetatio of data value, the weight of bit decreases from the left to the right. Let δ (δ [, log Δ + 2]) deote the locatio (idexed from the left) of the first bit of Mi. Smaller δ meas larger Mi. Let σ deote the value of the (ɛ )-bit segmet of Mi that follows δ. Whe δ is the same, a larger σ meas larger Mi. Clearly, there are 2 ɛ (log Δ + 2) possible combiatios of δ, σ. We map these combiatios to a auxiliary plaitext space 0,,..., 2 ɛ (log Δ+2), such that if oe combiatio meas smaller Mi tha aother combiatio, it is mapped to a smaller value i the auxiliary plaitext space tha that combiatio. Let v[δ, σ] deote the value that combiatio δ, σ maps to. I each time period, each user coverts its padded raw data to a value x i the auxiliary plaitext space as follows: if i its padded raw data the first bit appears at δ ad the value of the (ɛ )-bit segmet that follows the first bit is σ,it sets x = v[δ,σ ]. The aggregator ca get the Mi of x usig the basic scheme, ad reversely map the Mi of x to a pair of δ, σ. It kows that the first bit of the Mi aggregate over padded raw data appears at locatio δ, ad the (ɛ )-bit segmet that follows the first bit is σ. The it sets the bit that follows the (ɛ )-bit segmet as, ad sets the remaiig bits as 0. This derives the Mi aggregate over padded raw data, which has the form {0} δ {} {0, } ɛ {} {0} log Δ+2 δ. From this bit strig, the last ɛ + paddig bits are removed ad the the approximate Mi of users raw data is obtaied. Figure 5 shows a ruig example of this process. I total, this scheme uses 2 ɛ (log Δ + 2) Sum aggregates 2 of -bit derivative data. Thus, ɛ (log Δ+2) istaces of the sum aggregatio protocol are eeded i each time period. For example, whe Δ=0 4, SA-52 is used as the hash fuctio of MAC ad it is required to limit the relative error to % (i.e., ɛ =7), oly 2 istaces are eeded. Table IX summarizes the relative error ad cost of the basic scheme ad the low-cost scheme. VI. EVALUATIONS This sectio evaluates the cost of our aggregatio protocols for Sum ad Mi. We compare our solutio agaist two existig privacy-preservig aggregatio protocols for timeseries data: the protocol proposed i [7] (deoted by EXP) ad CollaPSE [9]. TABLE IX TE RELATIVE ERROR AND COST OF TE BASIC SCEME AND TE LOW-COST SCEME. Basic Low-cost Relative error 0 2 ɛ 2c(Δ+) log (+) 2 Ecryptio (PRFs) ɛ c(log Δ+2) q(δ+) log (+) 2 Decryptio (PRFs) ɛ q(log Δ+2) Ciphertext size (bit) (Δ + ) log ( +) 2 ɛ (log Δ + 2) is the size of the output geerated by the PRF. TABLE X COMPARISONS BETWEEN OUR SUM AGGREGATION PROTOCOL AND EXISTING PROTOCOLS IN COMPUTATION AND STORAGE COST. Ecryptio Decryptio Storage Storage (user) (aggregator) (user) (aggr.) EXP 2 Mod. Exp. Δ Mod. Exp. CollaPSE (γ +) PRFs (γ +) PRFs γ + γ + Ours 2c PRFs q PRFs 2c q Mod. Exp. stads for modular expoetiatios. I practice, MAC ca be used as a pseudoradom fuctio (PRF). Parameters of the three schemes are set to tolerate γ colludig users. I most practical settigs, c 7 ad q 3 (see Table V ad VI). A. Aalytical Comparisos ) Cost of Sum aggregatio: EXP is a Sum aggregatio protocol based o the decisioal Diffie-ellma assumptio (see [7] for details). I EXP, ecryptio maily requires two modular expoetiatios. The aggregator decrypts the sum via a brute-force trial of possible plaitext. It takes oe modular expoetiatio to try each possible plaitext ad a total of Δ modular expoetiatios are eeded. If Pollard s Rho method is used, the decryptio cost ca be reduced to about Δ modular expoetiatios. ere, we use the reduced cost of EXP for compariso, ad later we will show that our solutio ca further reduce the cost. Similar to our protocol, CollaPSE also uses the homomorphic ecryptio scheme proposed i [2] to derive the Sum aggregate, but i a differet way (see [9] for details). I CollaPSE, each user (the aggregator) computes s + PRFs to ecrypt her data (decrypt the sum). ere, s is a system parameter ad it deotes the umber of colludig users that the protocol ca tolerate. Table X shows the computatio ad storage cost of the three aggregatio protocols for Sum, where the cost is derived uder the same coditio that they ca tolerate γ colludig users. Compared with CollaPSE, our protocol has much smaller computatio ad storage cost at both the users ad the aggregator, especially for a large system with possibly may colludig users. Compared with EXP, our protocol has slightly higher storage cost (i.e., aroud 0 secrets each with just tes of bytes), but our computatio overhead is much lower sice PRF (whe implemeted with MAC) ca ru orders of magitude faster tha modular expoetiatio i practice. We elaborate this poit further i Sectio VI-B. 2) Cost of Mi aggregatio: The Mi aggregatio scheme preseted i Sectio V-B derives Mi from 2 ɛ (log Δ + 2) parallel Sum aggregates of -bit data, where each sum is obtaied usig our Sum aggregatio protocol. ere, each sum ca also be obtaied usig EXP, ad we refer to the Mi

9 x =4 x 2 =4 x 3 =3 x 4 = x[] x[2] x[3] x[4] x[5] x[6] x[7] Raw data Paddig bits ± ¾ v[±; ¾] x =4 x 2=4 x 3=3 x 4= Sum (a) Padded raw data (b) Derivative data Fig. 5. A example of the process that obtais a approximate Mi, where Δ=4ad ɛ =3. The four users auxiliary data values are x =2, x 2 =2, x 3 =0ad x 4 =4. The Mi of the auxiliary data is 4, ad it is reversely mapped to δ, σ = 3, 00. Thus, the approximate Mi of padded raw data is After the last four paddig bits are removed, the output is 00. aggregatio scheme that uses EXP as a buildig block as EXP- Mi. I EXP-Mi, each user computes 2 ɛ (log Δ + 2) modular expoetiatios to ecrypt her data, ad the aggregator computes 2 ɛ (log Δ + 2) modular expoetiatios to decrypt the Mi. Similarly, CollaPSE ca also be used as a buildig block of Mi aggregatio, ad the resultig scheme is referred to as CollaPSE-Mi. I CollaPSE-Mi, the computatio cost is 2 ɛ (γ+)(log Δ+2) PRFs for both ecryptio ad decryptio, cosiderig that the cocateatio techique i Sectio V-A also works for CollaPSE. Compared with CollaPSE-Mi, our Mi aggregatio scheme improves the computatio cost of ecryptio ad decryptio by a factor of γ+ 2c ad γ+ q respectively (see Table IX for the cost of our scheme). Our scheme is also much more efficiet tha EXP-Mi i computatio, as show i Sectio VI-B. B. Practical Performaces I Table X, the computatio costs of our Sum aggregatio protocol ad EXP are measured by differet uits, i.e., modular expoetiatio ad PRF ivocatio. ere, we elaborate the compariso betwee them with results i ruig time. Note that PRF ca be implemeted with MAC i practice. Accordig to the bech-markig data reported by ebacs [30], it takes roughly 0.3 ms to compute a modular expoetiatio usig high-speed elliptic curves such as curve2559 o a 64-bit desktop PC, ad it takes roughly 0.26 μs to compute a MAC whe SA-52 is used as the hash fuctio. Based o these umbers, Table XI shows the ruig time of our Sum aggregatio protocol ad EXP. Our protocol is much faster tha EXP i both ecryptio ad decryptio. Specifically, ecryptio is two orders of magitude faster. Whe the plaitext space Δ 0 3, decryptio is at least four orders of magitudes faster. I our protocol, the computatio cost decreases as the system scale icreases, ad it does ot chage with the plaitext space (so log as the size of plaitext data does ot exceed the size of a MAC output). Thus, our protocol ca support large systems ad large plaitext spaces. Table XII shows the ruig time of our Mi aggregatio protocol ad EXP-Mi. ere, the plaitext space is set as Δ= 0 4. The parameters of our protocol are set accordig to Table V ad Table VI whe γ =0.2. I all the show cases, our protocol is at least five (six) orders of magitude faster tha Accordig to ebacs, it takes 0.3 μs to compute oe SA-52. Sice oe MAC maily computes two hashes, we simply double this time to get the ruig time of MAC. TABLE XI TE RUNNING TIME OF OUR PROTOCOL FOR SUM AND TE CONSTRUCTION PROPOSED IN [7] (DENOTED BY EXP ) Ec. Ours 3.μs 2.6μs 2.μs.6μs.6μs EXP 600μs 600μs 600μs 600μs 600μs Dec. Ours 3.3μs 2.μs.6μs.3μs μs EXP(Δ =0 2 ) 30ms 95ms 300ms 950ms 3s EXP(Δ =0 3 ) 95ms 300ms 950ms 3s 9.5s EXP(Δ =0 4 ) 300ms 950ms 3s 9.5s 30s EXP(Δ =0 5 ) 950ms 3s 9.5s 30s 95s Δ is the plaitext space. Each user s data value is from {0,,..., Δ}. EXP-Mi i ecryptio (decryptio). Especially, as the system scale icreases, the ruig time of decryptio i EXP-Mi icreases quickly which shows the poor scalability of EXP- Mi, but the ruig time of our protocol decreases ad is always very low, which shows that our protocol is scalable. VII. DISCUSSIONS More aggregate statistics. I the basic aggregatio scheme for Mi preseted i Sectio V-A, the aggregator ca actually get the umber of times that each possible data value appears, ad derive the accurate distributio of the users data i the plaitext space [0, Δ]. From the distributio, other aggregate statistics such as Media, Percetile ad istogram ca be obtaied. I this process, the aggregator kows othig about each idividual user s data. Differetial privacy for Sum. Differetial privacy [3] provides strog ad provable privacy guaratee for users such that a user s participatio i the system oly leaks egligible iformatio about the user. Our protocol for Sum ca be adapted to provide computatioal differetial privacy [8]. To achieve this goal, a appropriate oise is added to each user s data (e.g., usig the data perturbatio algorithms proposed i [7] or [6]), ad the the sum of oisy data is obtaied usig our protocol. Dyamic jois/leaves ad fault tolerace Whe a user jois or leaves, the trusted authority ca issue a ew set of secrets to every user ad the aggregator. For a large system with high chur, the commuicatio cost caused by dyamic jois or leaves may be high. To reduce the cost, the biary costructio proposed i [8] ca be applied o top of our Sum aggregatio protocol, such that the expesive rekeyig is oly eeded i a small umber of jois or leaves. With data perturbatio [7] ad the biary costructio icorporated, fault tolerace ca also be achieved. Whe a umber of users

10 TABLE XII TE RUNNING TIME OF OUR MIN AGGREGATION PROTOCOL AND EXP-MIN WIC USES EXP AS A BUILDING BLOCK. Ecryptio Decryptio =0 3 =0 4 =0 5 =0 6 =0 3 =0 4 =0 5 =0 6 Relative error < % EXP-Mi 587ms 587ms 587ms 587ms 9.3s 29s 93s 294s Ours 5μs 4μs 3μs 3μs 4μs 3μs 2.5μs 2μs Relative error < 0.% EXP-Mi 4.7s 4.7s 4.7s 4.7s 74s 235s 743s 2348s Ours 40μs 32μs 24μs 24μs 32μs 24μs 20μs 6μs fail (e.g., due to loss of power or etwork coectio), the aggregator ca still get the aggregate statistics of the remaiig users. VIII. CONCLUSIONS To facilitate the collectio of useful aggregate statistics i mobile sesig without leakig mobile users privacy, we proposed a ew privacy-preservig protocol to obtai the Sum aggregate of time-series data. The protocol utilizes additive homomorphic ecryptio ad a ovel, MAC-based key maagemet techique to perform extremely efficiet aggregatio. Comparisos based o bech-markig measuremet data show that operatios at user ad aggregator i our protocol are orders of magitude faster tha existig work. Thus, our protocol ca be applied to a wide rage of mobile sesig systems with various scales, plaitext spaces, aggregatio loads ad resource costraits. Based o the Sum aggregatio protocol, we also proposed two schemes to derive the Mi aggregate of time-series data. Oe scheme ca obtai the accurate Mi while the other oe ca obtai a approximate Mi with provable error guaratee at much lower cost. REFERENCES [] M. Mu, S. Reddy, K. Shilto, N. Yau, J. Burke, D. Estri, M. ase, E. oward, R. West, ad P. Boda, Peir, the persoal evirometal impact report, as a platform for participatory sesig systems research, i Proceedigs of the 7th iteratioal coferece o Mobile systems, applicatios, ad services, ser. MobiSys 09, 2009, pp [2] A. Thiagaraja, L. Ravidraath, K. LaCurts, S. Madde,. Balakrisha, S. Toledo, ad J. Eriksso, Vtrack: accurate, eergy-aware road traffic delay estimatio usig mobile phoes, i Proceedigs of the 7th ACM Coferece o Embedded Networked Sesor Systems, ser. SeSys 09, 2009, pp [3] S. Cosolvo, D. W. McDoald, T. Toscos, M. Y. Che, J. Froehlich, B. arriso, P. Klasja, A. LaMarca, L. LeGrad, R. Libby, I. Smith, ad J. A. Laday, Activity sesig i the wild: a field trial of ubifit garde, i Proceedigs of the twety-sixth aual SIGCI coferece o uma factors i computig systems (CI), 2008, pp [4] J. icks, N. Ramaatha, D. Kim, M. Moibi, J. Selsky, M. ase, ad D. Estri, Adwelless: a ope mobile system for activity ad experiece samplig, i Proc. Wireless ealth, 200, pp [5] N. D. Lae, M. Mohammod, M. Li, X. Yag,. Lu, S. Ali, A. Doryab, E. Berke, T. Choudhury, ad A. Campbell, Bewell: A smartphoe applicatio to moitor, model ad promote wellbeig, i 5th Iteratioal ICST Coferece o Pervasive Computig Techologies for ealthcare, 20. [6] V. Rastogi ad S. Nath, Differetially private aggregatio of distributed time-series with trasformatio ad ecryptio, ACM SIGMOD, 200. [7] E. Shi, T.-.. Cha, E. Rieffel, R. Chow, ad D. Sog, Privacypreservig aggregatio of time-series data, Network ad Distributed System Security Symposium (NDSS), 20. [8] T.-.. Cha, E. Shi, ad D. Sog, Privacy-preservig stream aggregatio with fault tolerace, Fiacial Cryptography ad Data Security (FC), 202. [9] E. G. Rieffel, J. Biehl, W. va Melle, ad A. J. Lee, Secured histories: computig group statistics o ecrypted data while preservig idividual privacy. I submissio, 200. [0] P.-A. Fouque, G. Poupard, ad J. Ster, Sharig decryptio i the cotext of votig or lotteries, i Proceedigs of the 4th Iteratioal Coferece o Fiacial Cryptography, ser. FC 00, 2000, pp [] MNDOLI, Mosha permissible exposure limits, available at [2] S. B. Eisema, E. Miluzzo, N. D. Lae, R. A. Peterso, G.-S. Ah, ad A. T. Campbell, The bikeet mobile sesig system for cyclist experiece mappig, i Proceedigs of the 5th iteratioal coferece o Embedded etworked sesor systems (SeSys), 2007, pp [3] M. G. Apte, W. J. Fisk, ad J. M. Daisey, Idoor carbo dioxide cocetratios ad sbs i office workers, i Proceedigs of ealthy Buildigs, 2000, pp [4] Z. Zhu ad G. Cao, Applaus: A privacy-preservig locatio proof updatig system for locatio-based services, i Proc. IEEE INFOCOM, 20. [5] Q. Li ad G. Cao, Mitigatig routig misbehavior i disruptio tolerat etworks, IEEE Trasactios o Iformatio Foresics ad Security, vol. 7, o. 2, pp , April 202. [6] E. D. Cristofaro ad C. Soriete, Short paper: Pepsi privacy-ehaced participatory sesig ifrastructure, i Proceedigs of the fourth ACM coferece o Wireless etwork security (WiSec), 20, pp [7] Q. Li, S. Zhu, ad G. Cao, Routig i socially selfish delay tolerat etworks, i Proc. IEEE INFOCOM, 200, pp. 9. [8] Q. Li, W. Gao, S. Zhu, ad G. Cao, A routig protocol for socially selfish delay tolerat etworks, Ad oc Networks, vol. 0, o. 8, pp , 202. [9] D. Boet, E.-J. Goh, ad K. Nissim, Evaluatig 2-df formulas o ciphertexts, TCC, [20] C. Getry, Fully homomorphic ecryptio usig ideal lattices, i ACM symposium o Theory of computig (STOC), 2009, pp [2] C. Castelluccia, A. C.-F. Cha, E. Mykletu, ad G. Tsudik, Efficiet ad provably secure aggregatio of ecrypted data i wireless sesor etworks, ACM Trasactios o Sesor Networks (TOSN), vol. 5, o. 3, pp. 20: 20:36, [22] Y. Yag, X. Wag, S. Zhu, ad G. Cao, Sdap: A secure hop-by-hop data aggregatio protocol for sesor etworks, ACM Trasactios o Iformatio ad System Security (TISSEC), vol., o. 4, [23] Z. Yag, S. Zhog, ad R. N. Wright, Privacy-preservig classificatio of customer data without loss of accuracy, i SIAM SDM, 2005, pp [24] J. Shi, R. Zhag, Y. Liu, ad Y. Zhag, Prisese: privacy-preservig data aggregatio i people-cetric urba sesig systems, i Proc. IEEE INFOCOM, 200, pp [25] G. Ács ad C. Castelluccia, I have a dream!: differetially private smart meterig, i Proceedigs of the 3th iteratioal coferece o Iformatio hidig, ser. I, 20, pp [26] M. Jawurek ad F. Kerschbaum, Fault-tolerat privacy-preservig statistics, i The 2th Privacy Ehacig Techologies Symposium (PETS), 202. [27] M. Shao, Y. Yag, S. Zhu, ad G. Cao, Towards statistically strog source aoymity for sesor etworks, i Proc. IEEE INFOCOM, [28] C. Castelluccia, Efficiet aggregatio of ecrypted data i wireless sesor etworks, i I MobiQuitous. IEEE Computer Society, 2005, pp [29] M. Bellare, New proofs for mac ad hmac: security without collisioresistace, i Proceedigs of the 26th aual iteratioal coferece o Advaces i Cryptology, ser. CRYPTO 06. Spriger-Verlag, 2006, pp [30] D. J. Berstei ad T. L. (editors), ebacs: Ecrypt bechmarkig of cryptographic systems, accessed Feb 202. [3] C. Dwork, F. McSherry, K. Nissim, ad A. Smith, Calibratig oise to sesitivity i private data aalysis, TCC, 2006.

x y z HD(x, y) + HD(y, z) HD(x, z)

x y z HD(x, y) + HD(y, z) HD(x, z) Massachusetts Istitute of Techology Departmet of Electrical Egieerig ad Computer Sciece 6.02 Solutios to Chapter 5 Updated: February 16, 2012 Please sed iformatio about errors or omissios to hari; questios

More information

A SELECTIVE POINTER FORWARDING STRATEGY FOR LOCATION TRACKING IN PERSONAL COMMUNICATION SYSTEMS

A SELECTIVE POINTER FORWARDING STRATEGY FOR LOCATION TRACKING IN PERSONAL COMMUNICATION SYSTEMS A SELETIVE POINTE FOWADING STATEGY FO LOATION TAKING IN PESONAL OUNIATION SYSTES Seo G. hag ad hae Y. Lee Departmet of Idustrial Egieerig, KAIST 373-, Kusug-Dog, Taejo, Korea, 305-70 cylee@heuristic.kaist.ac.kr

More information

A New Space-Repetition Code Based on One Bit Feedback Compared to Alamouti Space-Time Code

A New Space-Repetition Code Based on One Bit Feedback Compared to Alamouti Space-Time Code Proceedigs of the 4th WSEAS It. Coferece o Electromagetics, Wireless ad Optical Commuicatios, Veice, Italy, November 0-, 006 107 A New Space-Repetitio Code Based o Oe Bit Feedback Compared to Alamouti

More information

Unit 5: Estimating with Confidence

Unit 5: Estimating with Confidence Uit 5: Estimatig with Cofidece Sectio 8.2 The Practice of Statistics, 4 th editio For AP* STARNES, YATES, MOORE Uit 5 Estimatig with Cofidece 8.1 8.2 8.3 Cofidece Itervals: The Basics Estimatig a Populatio

More information

Roberto s Notes on Infinite Series Chapter 1: Series Section 2. Infinite series

Roberto s Notes on Infinite Series Chapter 1: Series Section 2. Infinite series Roberto s Notes o Ifiite Series Chapter : Series Sectio Ifiite series What you eed to ow already: What sequeces are. Basic termiology ad otatio for sequeces. What you ca lear here: What a ifiite series

More information

CHAPTER 5 A NEAR-LOSSLESS RUN-LENGTH CODER

CHAPTER 5 A NEAR-LOSSLESS RUN-LENGTH CODER 95 CHAPTER 5 A NEAR-LOSSLESS RUN-LENGTH CODER 5.1 GENERAL Ru-legth codig is a lossless image compressio techique, which produces modest compressio ratios. Oe way of icreasig the compressio ratio of a ru-legth

More information

Novel pseudo random number generation using variant logic framework

Novel pseudo random number generation using variant logic framework Edith Cowa Uiversity Research Olie Iteratioal Cyber Resiliece coferece Cofereces, Symposia ad Campus Evets 011 Novel pseudo radom umber geeratio usig variat logic framework Jeffrey Zheg Yua Uiversity,

More information

Permutation Enumeration

Permutation Enumeration RMT 2012 Power Roud Rubric February 18, 2012 Permutatio Eumeratio 1 (a List all permutatios of {1, 2, 3} (b Give a expressio for the umber of permutatios of {1, 2, 3,, } i terms of Compute the umber for

More information

A study on the efficient compression algorithm of the voice/data integrated multiplexer

A study on the efficient compression algorithm of the voice/data integrated multiplexer A study o the efficiet compressio algorithm of the voice/data itegrated multiplexer Gyou-Yo CHO' ad Dog-Ho CHO' * Dept. of Computer Egieerig. KyiigHee Uiv. Kiheugup Yogiku Kyuggido, KOREA 449-71 PHONE

More information

Application of Improved Genetic Algorithm to Two-side Assembly Line Balancing

Application of Improved Genetic Algorithm to Two-side Assembly Line Balancing 206 3 rd Iteratioal Coferece o Mechaical, Idustrial, ad Maufacturig Egieerig (MIME 206) ISBN: 978--60595-33-7 Applicatio of Improved Geetic Algorithm to Two-side Assembly Lie Balacig Ximi Zhag, Qia Wag,

More information

Intermediate Information Structures

Intermediate Information Structures Modified from Maria s lectures CPSC 335 Itermediate Iformatio Structures LECTURE 11 Compressio ad Huffma Codig Jo Roke Computer Sciece Uiversity of Calgary Caada Lecture Overview Codes ad Optimal Codes

More information

Logarithms APPENDIX IV. 265 Appendix

Logarithms APPENDIX IV. 265 Appendix APPENDIX IV Logarithms Sometimes, a umerical expressio may ivolve multiplicatio, divisio or ratioal powers of large umbers. For such calculatios, logarithms are very useful. They help us i makig difficult

More information

Data Mining of Bayesian Networks to Select Fusion Nodes from Wireless Sensor Networks

Data Mining of Bayesian Networks to Select Fusion Nodes from Wireless Sensor Networks www.ijcsi.org http://dx.doi.org/10.20943/01201604.1115 11 Data Miig of Bayesia Networks to Select Fusio Nodes from Wireless Networks Yee Mig Che 1 Chi-Shu Hsueh 2 Chu-Kai Wag 3 1,3 Departmet of Idustrial

More information

Fingerprint Classification Based on Directional Image Constructed Using Wavelet Transform Domains

Fingerprint Classification Based on Directional Image Constructed Using Wavelet Transform Domains 7 Figerprit Classificatio Based o Directioal Image Costructed Usig Wavelet Trasform Domais Musa Mohd Mokji, Syed Abd. Rahma Syed Abu Bakar, Zuwairie Ibrahim 3 Departmet of Microelectroic ad Computer Egieerig

More information

Radar emitter recognition method based on AdaBoost and decision tree Tang Xiaojing1, a, Chen Weigao1 and Zhu Weigang1 1

Radar emitter recognition method based on AdaBoost and decision tree Tang Xiaojing1, a, Chen Weigao1 and Zhu Weigang1 1 Advaces i Egieerig Research, volume 8 d Iteratioal Coferece o Automatio, Mechaical Cotrol ad Computatioal Egieerig (AMCCE 7) Radar emitter recogitio method based o AdaBoost ad decisio tree Tag Xiaojig,

More information

Secret Searching in Wireless Sensor Networks with RFIDs

Secret Searching in Wireless Sensor Networks with RFIDs Secret Searchig i Wireless Sesor Networks with RFIDs Shih-I Huag Shiuhpyg Shieh Dept. of Comp. Sci. & Ifo. Eg. Natioal Chiao Tug Uiversity, Hsichu, Taiwa 300 {sihuag,ssp}@csie.ctu.edu.tw Abstract I this

More information

Tehrani N Journal of Scientific and Engineering Research, 2018, 5(7):1-7

Tehrani N Journal of Scientific and Engineering Research, 2018, 5(7):1-7 Available olie www.jsaer.com, 2018, 5(7):1-7 Research Article ISSN: 2394-2630 CODEN(USA): JSERBR 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38

More information

Sapana P. Dubey. (Department of applied mathematics,piet, Nagpur,India) I. INTRODUCTION

Sapana P. Dubey. (Department of applied mathematics,piet, Nagpur,India) I. INTRODUCTION IOSR Joural of Mathematics (IOSR-JM) www.iosrjourals.org COMPETITION IN COMMUNICATION NETWORK: A GAME WITH PENALTY Sapaa P. Dubey (Departmet of applied mathematics,piet, Nagpur,Idia) ABSTRACT : We are

More information

High Speed Area Efficient Modulo 2 1

High Speed Area Efficient Modulo 2 1 High Speed Area Efficiet Modulo 2 1 1-Soali Sigh (PG Scholar VLSI, RKDF Ist Bhopal M.P) 2- Mr. Maish Trivedi (HOD EC Departmet, RKDF Ist Bhopal M.P) Adder Abstract Modular adder is oe of the key compoets

More information

COS 126 Atomic Theory of Matter

COS 126 Atomic Theory of Matter COS 126 Atomic Theory of Matter 1 Goal of the Assigmet Video Calculate Avogadro s umber Usig Eistei s equatios Usig fluorescet imagig Iput data Output Frames Blobs/Beads Estimate of Avogadro s umber 7.1833

More information

Random Block Verification: Improving the Norwegian Electoral Mix Net

Random Block Verification: Improving the Norwegian Electoral Mix Net Radom Block Verificatio: Improvig the Norwegia Electoral Mix Net Deise Demirel 1,2, Hugo Joker 3, Melaie Volkamer 1,2 1 CASED, Darmstadt 2 SeCuSo group, TU Darmstadt 3 SaToSS group, Uiversity of Luxembourg

More information

7. Counting Measure. Definitions and Basic Properties

7. Counting Measure. Definitions and Basic Properties Virtual Laboratories > 0. Foudatios > 1 2 3 4 5 6 7 8 9 7. Coutig Measure Defiitios ad Basic Properties Suppose that S is a fiite set. If A S the the cardiality of A is the umber of elemets i A, ad is

More information

On the Delay Performance of In-network Aggregation in Lossy Wireless Sensor Networks

On the Delay Performance of In-network Aggregation in Lossy Wireless Sensor Networks O the Delay Performace of I-etwork Aggregatio i Lossy Wireless Sesor Networks Chaghee Joo, Member, IEEE, ad Ness B. Shroff, Fellow, IEEE Abstract I this paper, we study the implicatio of wireless broadcast

More information

A New Energy Efficient Data Gathering Approach in Wireless Sensor Networks

A New Energy Efficient Data Gathering Approach in Wireless Sensor Networks Commuicatios ad Network, 0, 4, 6-7 http://dx.doi.org/0.436/c.0.4009 Published Olie February 0 (http://www.scirp.org/joural/c) A New Eergy Efficiet Data Gatherig Approach i Wireless Sesor Networks Jafar

More information

Distributed Resource Management in Multi-hop Cognitive Radio Networks for Delay Sensitive Transmission

Distributed Resource Management in Multi-hop Cognitive Radio Networks for Delay Sensitive Transmission 1 Distributed Resource Maagemet i Multi-hop Cogitive Radio Networs for Delay Sesitive Trasmissio Hsie-Po Shiag ad Mihaela va der Schaar Departmet of Electrical Egieerig (EE), Uiversity of Califoria Los

More information

Compound Controller for DC Motor Servo System Based on Inner-Loop Extended State Observer

Compound Controller for DC Motor Servo System Based on Inner-Loop Extended State Observer BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 6, No 5 Special Issue o Applicatio of Advaced Computig ad Simulatio i Iformatio Systems Sofia 06 Prit ISSN: 3-970; Olie ISSN:

More information

International Power, Electronics and Materials Engineering Conference (IPEMEC 2015)

International Power, Electronics and Materials Engineering Conference (IPEMEC 2015) Iteratioal Power, Electroics ad Materials Egieerig Coferece (IPEMEC 205) etwork Mode based o Multi-commuicatio Mechaism Fa Yibi, Liu Zhifeg, Zhag Sheg, Li Yig Departmet of Military Fiace, Military Ecoomy

More information

EMU-Synchronization Enhanced Mobile Underwater Networks for Assisting Time Synchronization Scheme in Sensors

EMU-Synchronization Enhanced Mobile Underwater Networks for Assisting Time Synchronization Scheme in Sensors www.ijecs.i Iteratioal Joural Of Egieerig Ad Computer Sciece ISSN:319-74 Volume 4 Issue 3 March 015, Page No. 760-763 EMU-Sychroizatio Ehaced Mobile Uderwater Networks for Assistig ime Sychroizatio Scheme

More information

Cross-Layer Performance of a Distributed Real-Time MAC Protocol Supporting Variable Bit Rate Multiclass Services in WPANs

Cross-Layer Performance of a Distributed Real-Time MAC Protocol Supporting Variable Bit Rate Multiclass Services in WPANs Cross-Layer Performace of a Distributed Real-Time MAC Protocol Supportig Variable Bit Rate Multiclass Services i WPANs David Tug Chog Wog, Jo W. Ma, ad ee Chaig Chua 3 Istitute for Ifocomm Research, Heg

More information

APPLICATION NOTE UNDERSTANDING EFFECTIVE BITS

APPLICATION NOTE UNDERSTANDING EFFECTIVE BITS APPLICATION NOTE AN95091 INTRODUCTION UNDERSTANDING EFFECTIVE BITS Toy Girard, Sigatec, Desig ad Applicatios Egieer Oe criteria ofte used to evaluate a Aalog to Digital Coverter (ADC) or data acquisitio

More information

Performance Analysis of Channel Switching with Various Bandwidths in Cognitive Radio

Performance Analysis of Channel Switching with Various Bandwidths in Cognitive Radio Performace Aalysis of Chael Switchig with Various Badwidths i Cogitive Radio Po-Hao Chag, Keg-Fu Chag, Yu-Che Che, ad Li-Kai Ye Departmet of Electrical Egieerig, Natioal Dog Hwa Uiversity, 1,Sec.2, Da-Hsueh

More information

Optimal Arrangement of Buoys Observable by Means of Radar

Optimal Arrangement of Buoys Observable by Means of Radar Optimal Arragemet of Buoys Observable by Meas of Radar TOMASZ PRACZYK Istitute of Naval Weapo ad Computer Sciece Polish Naval Academy Śmidowicza 69, 8-03 Gdyia POLAND t.praczy@amw.gdyia.pl Abstract: -

More information

Ch 9 Sequences, Series, and Probability

Ch 9 Sequences, Series, and Probability Ch 9 Sequeces, Series, ad Probability Have you ever bee to a casio ad played blackjack? It is the oly game i the casio that you ca wi based o the Law of large umbers. I the early 1990s a group of math

More information

The Fundamental Capacity-Delay Tradeoff in Large Mobile Ad Hoc Networks

The Fundamental Capacity-Delay Tradeoff in Large Mobile Ad Hoc Networks The Fudametal Capacity-Delay Tradeoff i Large Mobile Ad Hoc Networks Xiaoju Li ad Ness B. Shroff School of Electrical ad Computer Egieerig, Purdue Uiversity West Lafayette, IN 47907, U.S.A. {lix, shroff}@ec.purdue.edu

More information

PROJECT #2 GENERIC ROBOT SIMULATOR

PROJECT #2 GENERIC ROBOT SIMULATOR Uiversity of Missouri-Columbia Departmet of Electrical ad Computer Egieerig ECE 7330 Itroductio to Mechatroics ad Robotic Visio Fall, 2010 PROJECT #2 GENERIC ROBOT SIMULATOR Luis Alberto Rivera Estrada

More information

4. INTERSYMBOL INTERFERENCE

4. INTERSYMBOL INTERFERENCE DATA COMMUNICATIONS 59 4. INTERSYMBOL INTERFERENCE 4.1 OBJECT The effects of restricted badwidth i basebad data trasmissio will be studied. Measuremets relative to itersymbol iterferece, usig the eye patter

More information

8. Combinatorial Structures

8. Combinatorial Structures Virtual Laboratories > 0. Foudatios > 1 2 3 4 5 6 7 8 9 8. Combiatorial Structures The purpose of this sectio is to study several combiatorial structures that are of basic importace i probability. Permutatios

More information

Indoor Localization by Pattern Matching Method Based On Extended Database

Indoor Localization by Pattern Matching Method Based On Extended Database Vol:8, No:, Idoor Localizatio by atter Matchig Method Based O Exteded Database Gyumi Hwag, Jihog Lee Iteratioal Sciece Idex, Mechaical ad Mechatroics Egieerig Vol:8, No:, waset.org/ublicatio/9997 Abstract

More information

OPTIMIZATION OF RNS FIR FILTERS FOR 6-INPUTS LUT BASED FPGAS

OPTIMIZATION OF RNS FIR FILTERS FOR 6-INPUTS LUT BASED FPGAS OPTIMIZATION OF RNS FIR FILTERS FOR 6-INPUTS LUT BASED FPGAS G.C. Cardarilli, M. Re, A. Salsao Uiversity of Rome Tor Vergata Departmet of Electroic Egieerig Via del Politecico 1 / 00133 / Rome / ITAL {marco.re,

More information

Outline. Motivation. Analog Functional Testing in Mixed-Signal Systems. Motivation and Background. Built-In Self-Test Architecture

Outline. Motivation. Analog Functional Testing in Mixed-Signal Systems. Motivation and Background. Built-In Self-Test Architecture Aalog Fuctioal Testig i Mixed-Sigal s Jie Qi Dept. of Electrical & Computer Egieerig Aubur Uiversity Co-Advisors: Charles Stroud ad Foster Dai Outlie Motivatio ad Backgroud Built-I Self-Test Architecture

More information

Message Scheduling for the FlexRay Protocol: The Dynamic Segment

Message Scheduling for the FlexRay Protocol: The Dynamic Segment IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY 1 Message Schedulig for the FlexRay Protocol: The Dyamic Segmet Ece Gura Schmidt, Member, IEEE, Klaus Schmidt Abstract The FlexRay commuicatio protocol is expected

More information

ASample of an XML stream is:

ASample of an XML stream is: 1 Efficiet Multichael i XML Wireless Broadcast Stream Arezoo Khatibi* 1 ad Omid Khatibi 2 1 Faculty of Computer Sciece, Uiversity of Kasha, Kasha, Ira 2 Faculty of Mathematics, Uiversity of Viea,Viea,

More information

On the Capacity of k-mpr Wireless Networks

On the Capacity of k-mpr Wireless Networks O the Capacity of -MPR Wireless Networs Mig-Fei Guo, Member, IEEE, Xibig Wag, Member, IEEE, Mi-You Wu, Seior Member, IEEE Abstract The capacity of wireless ad hoc etwors is maily restricted by the umber

More information

The Potential of Dynamic Power and Sub-carrier Assignments in Multi-User OFDM-FDMA Cells

The Potential of Dynamic Power and Sub-carrier Assignments in Multi-User OFDM-FDMA Cells The Potetial of Dyamic Power ad Sub-carrier Assigmets i Multi-User OFDM-FDMA Cells Mathias Bohge, James Gross, Adam Wolisz TU Berli Eisteiufer 5, 1587 Berli, Germay {bohge gross wolisz}@tk.tu-berli.de

More information

CS 201: Adversary arguments. This handout presents two lower bounds for selection problems using adversary arguments ëknu73,

CS 201: Adversary arguments. This handout presents two lower bounds for selection problems using adversary arguments ëknu73, CS 01 Schlag Jauary 6, 1999 Witer `99 CS 01: Adversary argumets This hadout presets two lower bouds for selectio problems usig adversary argumets ëku73, HS78, FG76ë. I these proofs a imagiary adversary

More information

Spread Spectrum Signal for Digital Communications

Spread Spectrum Signal for Digital Communications Wireless Iformatio Trasmissio System Lab. Spread Spectrum Sigal for Digital Commuicatios Istitute of Commuicatios Egieerig Natioal Su Yat-se Uiversity Spread Spectrum Commuicatios Defiitio: The trasmitted

More information

LETTER A Novel Adaptive Channel Estimation Scheme for DS-CDMA

LETTER A Novel Adaptive Channel Estimation Scheme for DS-CDMA 1274 LETTER A Novel Adaptive Chael Estimatio Scheme for DS-CDMA Che HE a), Member ad Xiao-xiag LI, Nomember SUMMARY This paper proposes a adaptive chael estimatio scheme, which uses differet movig average

More information

Design and Construction of a Three-phase Digital Energy Meter

Design and Construction of a Three-phase Digital Energy Meter Desig ad Costructio of a Three-phase Digital Eergy Meter D.P.Chadima, V.G.R.G. Jayawardae, E.A.E.H. Hemachadra, I.N.Jayasekera, H.V.L.Hasaraga, D.C. Hapuarachchi (chadima@elect.mrt.ac.lk, geethagaj@gmail.com,era.hem@gmail.com,ishaivaka@gmail.com,lahiru_hasaraga@yahoo.com,diya_elect.uom@gmail.com)

More information

Combinatorics. Chapter Permutations. Reading questions. Counting Problems. Counting Technique: The Product Rule

Combinatorics. Chapter Permutations. Reading questions. Counting Problems. Counting Technique: The Product Rule Chapter 3 Combiatorics 3.1 Permutatios Readig questios 1. Defie what a permutatio is i your ow words. 2. What is a fixed poit i a permutatio? 3. What do we assume about mutual disjoitedess whe creatig

More information

A 2 ENCRYPTION/DECRYPTION ALGORITHM

A 2 ENCRYPTION/DECRYPTION ALGORITHM It. J. Egg. Res. & Sci. & Tech. 2016 Arulaatham Kadhappa ad Aadh Arul, 2016 Research Paper ISSN 2319-5991 www.ijerst.com Vol. 5, No. 1, February 2016 2016 IJERST. All Rights Reserved A 2 ENCRYPTION/DECRYPTION

More information

Delta- Sigma Modulator with Signal Dependant Feedback Gain

Delta- Sigma Modulator with Signal Dependant Feedback Gain Delta- Sigma Modulator with Sigal Depedat Feedback Gai K.Diwakar #1 ad V.Vioth Kumar *2 # Departmet of Electroics ad Commuicatio Egieerig * Departmet of Electroics ad Istrumetatio Egieerig Vel Tech Uiversity,Cheai,

More information

The Potential of Dynamic Power and Sub-carrier Assignments in Multi-User OFDM-FDMA Cells

The Potential of Dynamic Power and Sub-carrier Assignments in Multi-User OFDM-FDMA Cells The Potetial of Dyamic Power ad Sub-carrier Assigmets i Multi-User OFDM-FDMA Cells Mathias Bohge, James Gross, Adam Wolisz Telecommuicatio Networks Group, TU Berli Eisteiufer 5, 1587 Berli, Germay {bohge

More information

Faulty Clock Detection for Crypto Circuits Against Differential Faulty Analysis Attack

Faulty Clock Detection for Crypto Circuits Against Differential Faulty Analysis Attack Faulty Clock Detectio for Crypto Circuits Agaist Differetial Faulty Aalysis Attack Pei uo ad Yusi Fei Departmet of Electrical ad Computer Egieerig Northeaster Uiversity, Bosto, MA 02115 Abstract. Differetial

More information

SIDELOBE SUPPRESSION IN OFDM SYSTEMS

SIDELOBE SUPPRESSION IN OFDM SYSTEMS SIDELOBE SUPPRESSION IN OFDM SYSTEMS Iva Cosovic Germa Aerospace Ceter (DLR), Ist. of Commuicatios ad Navigatio Oberpfaffehofe, 82234 Wesslig, Germay iva.cosovic@dlr.de Vijayasarathi Jaardhaam Muich Uiversity

More information

Single Bit DACs in a Nutshell. Part I DAC Basics

Single Bit DACs in a Nutshell. Part I DAC Basics Sigle Bit DACs i a Nutshell Part I DAC Basics By Dave Va Ess, Pricipal Applicatio Egieer, Cypress Semicoductor May embedded applicatios require geeratig aalog outputs uder digital cotrol. It may be a DC

More information

Discrete Mathematics and Probability Theory Spring 2014 Anant Sahai Note 12

Discrete Mathematics and Probability Theory Spring 2014 Anant Sahai Note 12 EECS 70 Discrete Mathematics ad Probability Theory Sprig 204 Aat Sahai Note 2 Probability Examples Based o Coutig We will ow look at examples of radom experimets ad their correspodig sample spaces, alog

More information

General Model :Algorithms in the Real World. Applications. Block Codes

General Model :Algorithms in the Real World. Applications. Block Codes Geeral Model 5-853:Algorithms i the Real World Error Correctig Codes I Overview Hammig Codes Liear Codes 5-853 Page message (m) coder codeword (c) oisy chael decoder codeword (c ) message or error Errors

More information

ON THE FUNDAMENTAL RELATIONSHIP BETWEEN THE ACHIEVABLE CAPACITY AND DELAY IN MOBILE WIRELESS NETWORKS

ON THE FUNDAMENTAL RELATIONSHIP BETWEEN THE ACHIEVABLE CAPACITY AND DELAY IN MOBILE WIRELESS NETWORKS Chapter ON THE FUNDAMENTAL RELATIONSHIP BETWEEN THE ACHIEVABLE CAPACITY AND DELAY IN MOBILE WIRELESS NETWORKS Xiaoju Li ad Ness B. Shroff School of Electrical ad Computer Egieerig, Purdue Uiversity West

More information

Distributed Resource Management in Multi-hop Cognitive Radio Networks for Delay Sensitive Transmission

Distributed Resource Management in Multi-hop Cognitive Radio Networks for Delay Sensitive Transmission 1 Distributed Resource Maagemet i Multi-hop Cogitive Radio Networs for Delay Sesitive Trasmissio Hsie-Po Shiag ad Mihaela va der Schaar Departmet of Electrical Egieerig (EE), Uiversity of Califoria Los

More information

Lecture 4: Frequency Reuse Concepts

Lecture 4: Frequency Reuse Concepts EE 499: Wireless & Mobile Commuicatios (8) Lecture 4: Frequecy euse Cocepts Distace betwee Co-Chael Cell Ceters Kowig the relatio betwee,, ad, we ca easily fid distace betwee the ceter poits of two co

More information

I n t r o d u c t i o n t o P h o t o g r a p h y ( 1 0 )

I n t r o d u c t i o n t o P h o t o g r a p h y ( 1 0 ) 9 1 5 7 I t r o d u c t i o t o P h o t o g r a p h y ( 1 0 ) 20S/20E/20M A Photography Course 9 1 5 7 : I t r o d u c t i o t o P h o t o g r a p h y ( 1 0 ) 2 0 S / 2 0 E / 2 0 M Course Descriptio This

More information

Subcarriers and Bits Allocation in Multiuser Orthogonal Frequency Division Multiplexing System

Subcarriers and Bits Allocation in Multiuser Orthogonal Frequency Division Multiplexing System Sesors & Trasducers, Vol. 168, Issue 4, April 014, pp. 10-15 Sesors & Trasducers 014 by IFSA Publishig, S. L. http://www.sesorsportal.com Subcarriers ad Bits Allocatio i Multiuser Orthogoal Frequecy Divisio

More information

Efficient Feedback-Based Scheduling Policies for Chunked Network Codes over Networks with Loss and Delay

Efficient Feedback-Based Scheduling Policies for Chunked Network Codes over Networks with Loss and Delay Efficiet Feedback-Based Schedulig Policies for Chuked Network Codes over Networks with Loss ad Delay Aoosheh Heidarzadeh ad Amir H. Baihashemi Departmet of Systems ad Computer Egieerig, Carleto Uiversity,

More information

Density Slicing Reference Manual

Density Slicing Reference Manual Desity Slicig Referece Maual Improvisio, Viscout Cetre II, Uiversity of Warwick Sciece Park, Millbur Hill Road, Covetry. CV4 7HS Tel: 0044 (0) 24 7669 2229 Fax: 0044 (0) 24 7669 0091 e-mail: admi@improvisio.com

More information

INCREASE OF STRAIN GAGE OUTPUT VOLTAGE SIGNALS ACCURACY USING VIRTUAL INSTRUMENT WITH HARMONIC EXCITATION

INCREASE OF STRAIN GAGE OUTPUT VOLTAGE SIGNALS ACCURACY USING VIRTUAL INSTRUMENT WITH HARMONIC EXCITATION XIX IMEKO World Cogress Fudametal ad Applied Metrology September 6, 9, Lisbo, Portugal INCREASE OF STRAIN GAGE OUTPUT VOLTAGE SIGNALS ACCURACY USING VIRTUAL INSTRUMENT WITH HARMONIC EXCITATION Dalibor

More information

Enhancement of the IEEE MAC Protocol for Scalable Data Collection in Dense Sensor Networks

Enhancement of the IEEE MAC Protocol for Scalable Data Collection in Dense Sensor Networks Ehacemet of the IEEE 8.5. MAC Protocol for Scalable Data Collectio i Dese Sesor Networks Kira Yedavalli Departmet of Electrical Egieerig - Systems Uiversity of Souther Califoria Los Ageles, Califoria,

More information

A Novel Three Value Logic for Computing Purposes

A Novel Three Value Logic for Computing Purposes Iteratioal Joural o Iormatio ad Electroics Egieerig, Vol. 3, No. 4, July 23 A Novel Three Value Logic or Computig Purposes Ali Soltai ad Saeed Mohammadi Abstract The aim o this article is to suggest a

More information

Problem of calculating time delay between pulse arrivals

Problem of calculating time delay between pulse arrivals America Joural of Egieerig Research (AJER) 5 America Joural of Egieerig Research (AJER) e-issn: 3-847 p-issn : 3-936 Volume-4, Issue-4, pp-3-4 www.ajer.org Research Paper Problem of calculatig time delay

More information

ECE 333: Introduction to Communication Networks Fall Lecture 4: Physical layer II

ECE 333: Introduction to Communication Networks Fall Lecture 4: Physical layer II ECE 333: Itroductio to Commuicatio Networks Fall 22 Lecture : Physical layer II Impairmets - distortio, oise Fudametal limits Examples Notes: his lecture cotiues the discussio of the physical layer. Recall,

More information

Evaluation of turbulent parameters based on angle-of-arrival fluctuation Yang LI 1,Chao GAO 2, Yi-Ming LI 2, Gang YANG 2 & Xiao-Feng LI 2

Evaluation of turbulent parameters based on angle-of-arrival fluctuation Yang LI 1,Chao GAO 2, Yi-Ming LI 2, Gang YANG 2 & Xiao-Feng LI 2 Iteratioal Coferece o Iformatio Techology ad Maagemet Iovatio (ICITMI 15) Evaluatio of turbulet parameters based o agle-of-arrival fluctuatio Yag LI 1,Chao GAO, Yi-Mig LI, Gag YANG & Xiao-Feg LI 1 Accoutig

More information

SELEX Elsag. 5/18/2012 R. Pucci SDR 12 WinnComm 1

SELEX Elsag. 5/18/2012 R. Pucci SDR 12 WinnComm 1 SELEX Elsag 5/18/01 R. Pucci SDR 1 WiComm 1 Military BU - SELEX Elsag Possible update of SDR Platforms to COGNITIVE architectures COGNITIVE MANAGER INTERFACE Geolocatio, Voice, Video, etc Applicatio Policy

More information

Using Color Histograms to Recognize People in Real Time Visual Surveillance

Using Color Histograms to Recognize People in Real Time Visual Surveillance Usig Color Histograms to Recogize People i Real Time Visual Surveillace DANIEL WOJTASZEK, ROBERT LAGANIERE S.I.T.E. Uiversity of Ottawa, Ottawa, Otario CANADA daielw@site.uottawa.ca, lagaier@site.uottawa.ca

More information

BOTTLENECK BRANCH MARKING FOR NOISE CONSOLIDATION

BOTTLENECK BRANCH MARKING FOR NOISE CONSOLIDATION BOTTLENECK BRANCH MARKING FOR NOISE CONSOLIDATION IN MULTICAST NETWORKS Jordi Ros, Wei K. Tsai ad Mahadeve Iyer Departmet of Electrical ad Computer Egieerig Uiversity of Califoria, Irvie, CA 92697 {jros,

More information

Introduction to Wireless Communication Systems ECE 476/ECE 501C/CS 513 Winter 2003

Introduction to Wireless Communication Systems ECE 476/ECE 501C/CS 513 Winter 2003 troductio to Wireless Commuicatio ystems ECE 476/ECE 501C/C 513 Witer 2003 eview for Exam #1 March 4, 2003 Exam Details Must follow seatig chart - Posted 30 miutes before exam. Cheatig will be treated

More information

Energy-Optimal Online Algorithms for Broadcasting in Wireless Networks

Energy-Optimal Online Algorithms for Broadcasting in Wireless Networks Eergy-Optimal Olie Algorithms for Broadcastig i Wireless Networks Shay Kutte, Hirotaka Oo, David Peleg, Kuihiko Sadakae, ad Masafumi Yamashita Abstract The paper cosiders the desig of eergy-efficiet olie

More information

Fast Sensor Deployment for Fusion-based Target Detection

Fast Sensor Deployment for Fusion-based Target Detection Fast Sesor Deploymet for Fusio-based Target Detectio Zhaohui Yua*, Rui Ta*, Guoliag Xig*, Cheyag Lu, Yixi Che *Departmet of Computer Sciece, City Uiversity of Hog Kog Departmet of Computer Sciece ad Egieerig,

More information

Test Time Minimization for Hybrid BIST with Test Pattern Broadcasting

Test Time Minimization for Hybrid BIST with Test Pattern Broadcasting Test Time Miimizatio for Hybrid BIST with Test Patter Broadcastig Raimud Ubar, Maksim Jeihhi Departmet of Computer Egieerig Talli Techical Uiversity EE-126 18 Talli, Estoia {raiub, maksim}@pld.ttu.ee Gert

More information

lecture notes September 2, Sequential Choice

lecture notes September 2, Sequential Choice 18.310 lecture otes September 2, 2013 Sequetial Choice Lecturer: Michel Goemas 1 A game Cosider the followig game. I have 100 blak cards. I write dow 100 differet umbers o the cards; I ca choose ay umbers

More information

Lossless image compression Using Hashing (using collision resolution) Amritpal Singh 1 and Rachna rajpoot 2

Lossless image compression Using Hashing (using collision resolution) Amritpal Singh 1 and Rachna rajpoot 2 Lossless image compressio Usig Hashig (usig collisio resolutio) Amritpal Sigh 1 ad Racha rajpoot 2 1 M.Tech.* CSE Departmet, 2 Departmet of iformatio techology Guru Kashi UiversityTalwadi Sabo, Bathida

More information

COMPRESSION OF TRANSMULTIPLEXED ACOUSTIC SIGNALS

COMPRESSION OF TRANSMULTIPLEXED ACOUSTIC SIGNALS COMPRESSION OF TRANSMULTIPLEXED ACOUSTIC SIGNALS Mariusz Ziółko, Przemysław Sypka ad Bartosz Ziółko Departmet of Electroics, AGH Uiversity of Sciece ad Techology, al. Mickiewicza 3, 3-59 Kraków, Polad,

More information

On the Capacity of k-mpr Wireless Networks

On the Capacity of k-mpr Wireless Networks 3878 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 8, NO. 7, JULY 2009 O the Capacity of -MPR Wireless Networs Mig-Fei Guo, Member, IEEE, Xibig Wag, Member, IEEE, Mi-You Wu, Seior Member, IEEE Abstract

More information

Selective Periodic Component Carrier Assignment Technique in LTE and LTE-A Systems

Selective Periodic Component Carrier Assignment Technique in LTE and LTE-A Systems Selective Periodic Compoet Carrier Assigmet Techique i LTE ad LTE-A Systems Husu S. Narma ad Mohammed Atiquzzama School of Computer Sciece, Uiversity of Oklahoma, Norma, OK 73019 Email: {husu, atiq}@ou.edu

More information

The Detection of Abrupt Changes in Fatigue Data by Using Cumulative Sum (CUSUM) Method

The Detection of Abrupt Changes in Fatigue Data by Using Cumulative Sum (CUSUM) Method Proceedigs of the th WSEAS Iteratioal Coferece o APPLIED ad THEORETICAL MECHANICS (MECHANICS '8) The Detectio of Abrupt Chages i Fatigue Data by Usig Cumulative Sum (CUSUM) Method Z. M. NOPIAH, M.N.BAHARIN,

More information

Capacity of Interference-limited Three Dimensional CSMA Networks

Capacity of Interference-limited Three Dimensional CSMA Networks Capacity of Iterferece-limited Three Dimesioal CSMA Networks Tao Yag, Guoqiag Mao School of Electrical ad Iformatio Egieerig The Uiversity of Sydey Email: {tao.yag, guoqiag.mao}@sydey.edu.au Wei Zhag School

More information

Efficient Energy Consumption Scheduling: Towards Effective Load Leveling

Efficient Energy Consumption Scheduling: Towards Effective Load Leveling eergies Article Efficiet Eergy Cosumptio Schedulig: Towards Effective Load Levelig Yua Hog 1, *, Shegbi Wag 2 ad Ziyue Huag 3 1 Departmet of Iformatio Techology Maagemet, Uiversity at Albay, SUNY, 1400

More information

Optimal Geolocation Updating for Location Aware Service Provisioning in Wireless Networks

Optimal Geolocation Updating for Location Aware Service Provisioning in Wireless Networks Optimal Geolocatio Updatig for Locatio Aware Service Provisioig i Wireless Networks Siri Tekiay Amer Catovic tekiay@adm.jit.edu axc4466@jit.edu New Jersey Istitute of Techology Uiversity Heights, Newark,

More information

Analysis of SDR GNSS Using MATLAB

Analysis of SDR GNSS Using MATLAB Iteratioal Joural of Computer Techology ad Electroics Egieerig (IJCTEE) Volume 5, Issue 3, Jue 2015 Aalysis of SDR GNSS Usig MATLAB Abstract This paper explais a software defied radio global avigatio satellite

More information

Mixed Contiguous and Aggregated Spectrum Allocation Algorithm for CR based TD-LTE System

Mixed Contiguous and Aggregated Spectrum Allocation Algorithm for CR based TD-LTE System Commuicatios ad etwork, 2013, 5, 298-302 http://dx.doi.org/10.4236/c.2013.532055 Published Olie September 2013 (http://www.scirp.org/oural/c) ixed Cotiguous ad Aggregated Spectrum Allocatio Algorithm for

More information

1. How many possible ways are there to form five-letter words using only the letters A H? How many such words consist of five distinct letters?

1. How many possible ways are there to form five-letter words using only the letters A H? How many such words consist of five distinct letters? COMBINATORICS EXERCISES Stepha Wager 1. How may possible ways are there to form five-letter words usig oly the letters A H? How may such words cosist of five distict letters? 2. How may differet umber

More information

Implementation of Fuzzy Multiple Objective Decision Making Algorithm in a Heterogeneous Mobile Environment

Implementation of Fuzzy Multiple Objective Decision Making Algorithm in a Heterogeneous Mobile Environment Implemetatio of Fuzzy Multiple Objective Decisio Makig Algorithm i a Heterogeeous Mobile Eviromet P.M.L. ha, Y.F. Hu, R.E. Sheriff, Departmet of Electroics ad Telecommuicatios Departmet of yberetics, Iteret

More information

Data Acquisition System for Electric Vehicle s Driving Motor Test Bench Based on VC++ *

Data Acquisition System for Electric Vehicle s Driving Motor Test Bench Based on VC++ * Available olie at www.sciecedirect.com Physics Procedia 33 (0 ) 75 73 0 Iteratioal Coferece o Medical Physics ad Biomedical Egieerig Data Acquisitio System for Electric Vehicle s Drivig Motor Test Bech

More information

A Radio Resource Allocation Algorithm for QoS Provision in PMP-based Systems

A Radio Resource Allocation Algorithm for QoS Provision in PMP-based Systems 530 OURAL OF COMMUICATIOS, VOL. 5, O. 7, ULY 00 A Radio Resource Allocatio Algorithm for QoS Provisio i PMP-based Systems Pig Wag Broadbad Wireless commuicatios ad Multimedia laboratory, Key Laboratory

More information

Sensors & Transducers 2015 by IFSA Publishing, S. L.

Sensors & Transducers 2015 by IFSA Publishing, S. L. Sesors & Trasducers 215 by IFSA Publishig, S. L. http://www.sesorsportal.com Uiversal Sesors ad Trasducers Iterface for Mobile Devices: Metrological Characteristics * Sergey Y. YURISH ad Javier CAÑETE

More information

Throughput/Delay Analysis of Spectrally Phase- Encoded Optical CDMA over WDM Networks

Throughput/Delay Analysis of Spectrally Phase- Encoded Optical CDMA over WDM Networks Throughput/Delay Aalysis of pectrally Phase- Ecoded Optical over etwors K. Putsri *,. ittichivapa * ad H.M.H.halaby ** * Kig Mogut s Istitute of Techology Ladrabag Departmet of Telecommuicatios Egieerig,

More information

Methods to Reduce Arc-Flash Hazards

Methods to Reduce Arc-Flash Hazards Methods to Reduce Arc-Flash Hazards Exercise: Implemetig Istataeous Settigs for a Maiteace Mode Scheme Below is a oe-lie diagram of a substatio with a mai ad two feeders. Because there is virtually o differece

More information

Optimization of Base Station and Maximizing the Lifetime of Wireless Sensor Network

Optimization of Base Station and Maximizing the Lifetime of Wireless Sensor Network Optimizatio of Base Statio ad Maximizig the Lifetime of Wireless Sesor Network P.Parthiba 1, G.Sudararaj 2, K.A.Jagadheesh 3, P.Maiiarasa 4 SS1 Research Scholar, P.S.G College of Techology, Coimbatore,

More information

On Parity based Divide and Conquer Recursive Functions

On Parity based Divide and Conquer Recursive Functions O Parity based Divide ad Coquer Recursive Fuctios Sug-Hyu Cha Abstract The parity based divide ad coquer recursio trees are itroduced where the sizes of the tree do ot grow mootoically as grows. These

More information

CHAPTER 8 JOINT PAPR REDUCTION AND ICI CANCELLATION IN OFDM SYSTEMS

CHAPTER 8 JOINT PAPR REDUCTION AND ICI CANCELLATION IN OFDM SYSTEMS CHAPTER 8 JOIT PAPR REDUCTIO AD ICI CACELLATIO I OFDM SYSTEMS Itercarrier Iterferece (ICI) is aother major issue i implemetig a OFDM system. As discussed i chapter 3, the OFDM subcarriers are arrowbad

More information

Sensing Strategies for Channel Discovery in Cognitive Radio Networks

Sensing Strategies for Channel Discovery in Cognitive Radio Networks Sesig Strategies for Chael Discovery i Cogitive Radio Networks (Ivited Positio Paper) Abdulkadir Celik, Ramzi Saifa, Ahmed E. Kamal Dept. of Electrical ad Computer Eg., Iowa State Uiversity, Ames, IA 50011

More information

Smart Energy & Power Quality Solutions. ProData datalogger. Datalogger and Gateway

Smart Energy & Power Quality Solutions. ProData datalogger. Datalogger and Gateway Smart Eergy & Power Quality Solutios ProData datalogger Datalogger ad Gateway Smart ad compact: Our most uiversal datalogger ever saves power costs Etheret coectio Modbus-Etheret-Gateway 32 MB 32 MB memory

More information