Security Issues in Smart Card Authentication Scheme

Size: px
Start display at page:

Download "Security Issues in Smart Card Authentication Scheme"

Transcription

1 Interntonl Journl o Computer Theory nd Engneerng Vol. 4, No., Aprl 0 ecurty Issues n mrt Crd Authentcton cheme Rv ngh Pppl, Jdhr C. D., nd hshkl Tpsw Abstrct To secure normton rom unuthorzed ccess, vrous uthentcton schemes hve been deployed. Among these, pssword bsed uthentcton schemes usng smrt crd re wdely used or vrous pplctons such s remote user logn, onlne bnkng, vercton, ccess control nd e-commerce. It provdes mutul uthentcton between user nd server. Ths rtcle portrys securty requrements nd possble ttcks or smrt crd bsed pssword uthentcton scheme. In ddton, vrous solutons or derent ttcks re lso dscussed. Index Terms Authentcton, pssword, securty, smrt crd. I. INTRODCTION Wth the rpd growth o computer networks, more nd more users ccess the remote server s servce n dstrbuted computng envronment. Due to the st development o Internet nd wreless communctons, mny ctvtes lke onlne-shoppng, onlne bnkng, onlne votng re conducted over t. Electronc trnsctons crred out over the network pltorm re gnng populrty nd t s wdely ccepted n the Internet computng world. A number o orgnztons dong busness n the trdtonl wy re extendng themselves to do busness over the Internet. To protect dt durng ther trnsmsson over nsecure chnnel, dequte network securty mesures re needed to resst potentl ttcks rom evesdroppng, unuthorzed retrevl nd ntended modcton, etc. For every busness trnscton uthentcton s requred. It ensures the orgn o messge or electronc document correctly dented wth n ssurnce tht the dentty s not ke. It s the prmry requrement beore the user ccesses the server over nsecure chnnel s t prevents unuthorzed ccess. Vrous uthentcton schemes hve been proposed to secure the normton or resources rom unuthorzed user [], []. One mong them s pssword uthentcton scheme. In conventonl pssword uthentcton schemes, server mntns pssword tble or vercton tble whch contns user denter nd pssword or ll the regstered users. It s used to uthentcte the legtmte user. Every user hs n nd. Whenever user wnts to ccess resources rom server, he or she submts nd to pss the uthentcton phse. The server veres the correspondng to the rom vercton tble. I the submtted pssword mtches the one stored n the vercton Mnuscrpt receved Februry 6, 0; revsed Mrch 7, 0. R.. Pppl,. Tpsw re wth ABV-Indn Insttute o Inormton Technology nd Mngement, Gwlor-47400, Ind e-ml: rv@ tm.c.n, stpsw@ tm.c.n. Jdhr C. D. s wth Deence Insttute o Advnce Technology, Pune-405, Ind e-ml: jdhrcd@ dt.c.n. tble then server uthentctes the user. However, there s thret n such process; n ntruder cn mpersonte legl user by nterceptng the messges rom the network nd logn to the server lter usng the ntercepted normton. Even the s encrypted durng communcton, such n mpersonton ttck s stll possble. In ddton, n ntruder brek nto the server; the contents o the vercton tble cn be esly moded or stolen. Mjor downsde o ths scheme s securng the vercton tble whch stores the pssword n pln text orm. One o the solutons to cope up wth ths problem s to encode the pssword usng hsh uncton nd store the resultnt test pttern n vercton tble []. Another lternte soluton s to store the pssword n encrypted orm whch cnnot be esly derved rom n ttcker even ttcker knows the content o the vercton tble. However, t consumes more memory spce to store the encrypted pssword. In both the pproches, sze o the vercton tble s drectly proportonl to the number o users. In other words, sze o the vercton tble ncreses s the number o users ncreses. Mngement o such huge vercton tble ncreses burden to the server. In ddton, they re not secure snce n ttcker cn mody the contents o the vercton tble whch result the entre system to brek down. To resst ll possble ttcks on the vercton tble, smrt crd bsed pssword uthentcton scheme hs been proposed. In ths scheme, server does not mntn vercton tble to uthentcte the legtmte user. The rest o the pper s orgnzed s ollows. ecton II descrbes vrous possble ttcks on smrt crd uthentcton scheme wth solutons or them. ecton III explores the securty requrements. Fnlly, secton IV concludes the pper. II. POIBLE ATTACK ON MART CARD ATHENTICATION CHEME The remote user uthentcton scheme s used to uthentcte the legtmcy o the remote users over n nsecure chnnel. nce lst decde mny elegnt remote user uthentcton schemes usng smrt crd hve been proposed [4], [6], [8-0], [-7], [], [], [4-5]. mrt crd uthentcton scheme s usully composed o three phses nmely; regstrton phse, logn phse nd uthentcton phse. The regstrton phse s nvoked only once when new user regsters n the server. pon recevng regstrton request over secure chnnel, server ssues smrt crd to user by storng the computed prmeters nto smrt crd memory. The logn phse nd uthentcton phse re nvoked when user wnts to logn the server. pon recevng the logn request, server checks the vldty o the logn request to uthentcte the user. The nottons used throughout ths 06

2 Interntonl Journl o Computer Theory nd Engneerng Vol. 4, No., Aprl 0 rtcle re dened n Tble I. Nottons X TABLE I: NOTATION ED IN THI PAPER Ther Menng Legtmte user Identer o Pssword o ecret key o the server Adversry Identer o Pssword o Pssword guessed by New pssword entered durng pssword chnge phse T Tmestmp t whch logn request s creted T T T 4 Tmestmp t whch server receves the logn request Tmestmp t whch server sends messge bck to Tmestmp t whch receves messge rom server Current tmestmp o s system T T Predetermned tme ntervl o trnsmsson dely r, b Rndom numbers Prmtve element p, q Prme numbers hdowed dentty h ecure one wy hsh uncton Btwse Exclusve-OR operton E ymmetrc encrypton usng key x x D x ymmetrc decrypton usng key x C K Functon to generte check dgt Re d One-wy shdow uncton mntned t the server A remote user uthentcton scheme bsed on ElGml s cryptosystem hs been proposed [4]. It conssts o regstrton phse, logn phse nd uthentcton phse. In the regstrton phse, submts to the server. pon recevng the regstrton request, server computes X mod p nd ssues smrt crd to by storng h, p nto smrt crd memory. The s delvered to through secure chnnel. In the logn phse, nserts the smrt crd to the crd reder nd keys n nd. Ater enterng the credentls, the crd reder genertes rndom number r, computes C r mod p, t h T mod p, M t r mod p, C M mod p nd sends the logn request, C, C, T to the server. In the uthentcton phse, upon recevng the logn request, server rst checks the vldty o to ccept/reject the logn request. I t s ncorrect, the request s rejected else t s consdered or next step o check. The vldty o tme ntervl between T nd T s computed.e., checks T T T. I true, server rejects the logn request, else, X test out whetherc C h T mod p holds or not n order to uthentcte. It s clmed tht the scheme does not mntn ny pssword or vercton tble nd secure gnst reply ttck. However, t s vulnerble to mpersonton ttck [5]. A. Impersonton Attck It s dened s the ttck n whch ttempts to mody the ntercepted messges to msquerde the legl nd logn to the server. submts to the server to msquerde s legl [5]. The server ssues nd smrt crd to. pon recevng, computes vld pr o, o legtmte user wthout knowng server secret key,.e. X. mod p X mod p mod p Further mprovement hs been suggested [6] whch s lso cryptnlyzed [7]. To wthstnd mpersonton ttck, moded scheme hs lso been proposed n whch logn request prmeters re computed rom nsted o [8]. Addtonl mprovement hs been gven n whch computed nsted o, ts logn request contents re C, C, C, T [9], where C C K. A remote user uthentcton scheme usng one-wy hsh uncton hs been proposed [0]. Its mjor drwbcks re pssword s ssued by the server whch results not to choose nd chnge the pssword reely. no mutul uthentcton. In ddton, t s ponted out tht the scheme s vulnerble to olne nd onlne pssword guessng ttcks []. B. Olne Pssword Guessng Attck In olne pssword guessng ttck, s ttempts to determne whether ech o the guessed psswords s correct or not rom the ntercepted messges trnsmtted between nd the server. cn esly very whether guessed pssword s correct or not s pssword s wek. As per the scheme [], ntercepts the logn request, T, C where C h T, rndomly guesses nd checks whether C h T holds or not. I equl, the guessed s vld one. sng, s ble to mpersonte the legtmte to logn the server. The other possble ttck s onlne pssword guessng ttck. C. Onlne Pssword Guessng Attck In ths, tres to use guessed psswords tertvely to pss the uthentcton phse onlne. As dened n [], rndomly guesses nd cretes orged logn request, T, C where C h T P. I the logn request s ccepted by the server, vld s W successully mpersontes to logn the server nd the guessed pssword s pssword. Ths ttck cn be restrcted by lmtng 07

3 Interntonl Journl o Computer Theory nd Engneerng Vol. 4, No., Aprl 0 the number o ttempts. To overcome these lmttons, remote user uthentcton scheme usng one-wy hsh uncton hs been proposed []. It s clmed tht the scheme does not requre ny pssword or vercton tble n the server nd legl user cn choose pssword wthout the help o server. Moreover, t provdes mutul uthentcton between user nd server. However, t s ponted out tht scheme s vulnerble to prllel sesson ttck []. D. Prllel esson Attck It s dened s the ttck n whch evesdrops the messges trnsmtted between nd server nd sends t bck s vld logn request to the server. As mentoned n [], computes C h h T to crete the logn request, C, T whch s trnsmtted to server. In order to provde mutul uthentcton, server sends the response messge T, C to n whch C h C T h h T. ntercepts the messges exchnged between nd server to msquerde s legl to strt new sesson. sends, C, T bck to server where T T nd C C. Ths messge psses the uthentcton phse snce C C h C T h h whch T results to logn nto the server. Moded scheme hs been proposed to overcome the prllel sesson ttck []. However, stll t s vulnerble to mpersonton ttck nd relecton ttck; does not provde user nonymty [4]. E. Relecton Attck In relecton ttck, evesdrops logn request durng trnsmsson between nd server nd sends t or moded verson o the messge bck to to msquerde s the legtmte server. As stted n [4], ntercepts the logn request, C, T trnsmtted between nd the server, where C h h nd sends bck T T, C to mmedtely to mpersonte the server where T nd C h C h h h. pon T T recevng the messge T, C, computes h h C T h h h. nce the T computed result equls C, beleves tht the messge s sent by the server. The relecton nd prllel sesson ttcks re possble due to the trnsmsson o messges wth smlr structure. To overcome these weknesses, urther mprovement hs lso been proposed [4]. However, the scheme does not solve the tme synchronzton problem nd server mntns n extr dtbse or ech user. To wthstnd nsder ttck nd relecton ttck, n mprovement over the scheme [] hs been suggested [5]. F. Insder Attck Durng the regstrton phse, s pssword s reveled to server over secure chnnel. An nsder o server obtns s pssword to mpersonte the legl nd ccess other servers sme pssword s used to ccess other servers. In ddton, the scheme [5] llows users to chnge ther pssword reely through pssword chnge phse. The pssword chnge phse s nvoked whenever wnts to chnge old pssword wth new pssword. nserts the smrt crd to the reder, keys nd nd requests to chnge the pssword by enterng new. mrt crd computes R R h b h b whch yelds h E h b where E n, R h E h b, n denotes the number o tmes re-regsters to server. mrt crd replces R wth R. nce the pssword chnge operton s perormed t the crd reder sde, there s no need to nterct wth the server. It s proved tht the scheme s wek gnst prllel sesson ttck nd hs nsecure pssword chnge phse. Further mprovement hs lso been suggested [6]. Nevertheless, the scheme s vulnerble to guessng ttck, Denl-o-ervce ttck nd orgery ttck [7]. To overcome these drwbcks, n mproved scheme hs been proposed whch s lso cryptnlyzed [8]. Further, t s ound tht the scheme s nsecure gnst guessng ttck, dennng-scco ttck nd hs ndequcy to provde perect orwrd secrecy. G. Attck on Perect Forwrd ecrecy Perect orwrd secrecy ssures tht even one long term key s compromsed, t does not revel ny sesson keys used beore. esson key s C h s per [8]. I gets server secret key X nd evesdrops the logn request, C, C,, where T C P h C h h C hp h T esly computes P h nd C P C h whch results to obtn the sesson key. Another possble ttck s dennng scco ttck. H. Dennng cco Attck It s n cton where obtns sesson key rom n evesdropped sesson nd uses the sme key ether to mpersonte the legtmte or mount dctonry ttck on s pssword. As per [8], gets the sesson key C h r nd obtns s secret normton s b ollows C C P h h C C P C C h pon obtnng s secret vlue h, cn mpersonte the legtmte. Consder the cse, computes C P h r b, C h h r P b T where r,b re two rndom numbers chosen by nd T 08

4 Interntonl Journl o Computer Theory nd Engneerng Vol. 4, No., Aprl 0 denotes current tmestmp o s system. prepres orged logn request M, C, C, T to mpersonte. Another possble ttck s smrt crd stolen ttck. I. mrt Crd tolen Attck When smrt crd s lost or stolen, unuthorzed user who obtns the smrt crd cn guess the pssword o usng pssword guessng ttcks or mpersonte vld to logn nto the server. who stels the smrt crd cn obtn the secret normton stored n the stolen smrt crd by montorng the consumpton o power [9] or by nlyzng the reveled normton [0]., who stels smrt crd, knows R, V, b, h, h nd [8]. sng these prmeters, k derves rom V hp h b wthout ny knowledge o server secret key X s by checkng V hr h b h b or not where s the guessed pssword V h h b P I holds, pproch, R h b W P Rh b P h s the correct pssword o. In ths derves h nd h b to s mpersonte. All the schemes dscussed so r do not solve the tme synchronzton problem. Nonce-bsed scheme [] overcomes the tme synchronzton problem. It nherts ll the prevous dvntges wth ddtonl eture such s sesson key generton greed between nd server. However, securty lws n ths scheme re: t s susceptble to nsder ttck. s not llowed to chnge the pssword reely. t uses symmetrc encrypton nd decrypton whch s necent or low computtonl powered smrt crds. Another nonce-bsed scheme hs been proposed [] to solve the serous tme synchronzton problem. It tkes over ll the prevous dvntges wth n ddtonl chrcterstc tht t uses one wy hsh uncton to reduce the computtonl cost. Nevertheless, t s vulnerble to mpersonton ttck, olne pssword guessng ttck, Denl-o-ervce ttck nd mn-n-the-mddle ttck []. J. Mn-n-the-Mddle Attck The mn-n-the-mddle ttck s orm o ctve evesdroppng n whch sts between the server nd by mkng ndependent connectons between them. The messges whch re exchnged between nd server re ntercepted by wthout the knowledge o nd server. As per the scheme [], ssume tht N modq nd W N modq sent by server nd respectvely. Durng the trnsmsson, ntercepts both the messges nd sends the moded/new messge to both o them. hs two sesson keys, one s used between nd.e., K se N Ns N modq modq nd the other s used between server nd.e., N N N Keu W mod q mod q. Hence, ntercepts the communcton exchnged between nd the server. In ddton, cn reply moded/new messge to both o them. Another scheme whch ressts mpersonton ttck, smrt crd loss ttck nd nsder ttck hs been proposed [4]. In ths scheme, tmestmp T s used n the logn phse to resst reply ttck. However, t ls to wthstnd ths ttck. K. Reply Attck The reply ttck s one n whch n ttcker re-submts the ntercepted logn request to mpersonte the genune user. The logn request contents re, C, r, k, y, T s per [4]. Durng the trnsmsson o logn request exchnged between nd server, cptures t nd resends the request by chngng the vlue o T. pon recevng the request, server nds the derence between T nd T to check the reshness o receved request.e., T T T. I t holds, s successul n n ttempt o mpersonton. Another possble ttck s Denl-o-ervce ttck. L. Denl-o-ervce Attck The Denl-o-ervce ttck prevents/nhbts the use o network resources nd communcton cltes. For exmple, sends nvld logn requests contnuously to mke the server busy. The schemes [], [], [5], [6], [], [], [4], [7], [0-5] re vulnerble to ths ttck. nserts ts own smrt crd nto the crd reder nd keys n nvld nd. The crd reder perorms the computton to crete logn request nd sends t to the server. contnuously does the sme thng to overlod the server whch results to restrn the server ccessblty or the other vld users. An bsed scheme usng RA cryptosystem hs been proposed [5]. However, t exhbts mpersonton ttck nd urther mprovement hs lso been suggested [6] whch nherts ll the merts o the prevous scheme wth n dded eture o mutul uthentcton. A user rendly uthentcton scheme bsed on one wy hsh uncton hs been proposed [7]. However, t s ponted out tht the scheme s vulnerble to mpersonton ttck. To overcome ths ttck, urther mprovement hs lso been proposed [8]. Moreover, t s proved tht the scheme s nsecure gnst guessng ttck nd orgery ttck. To overcome these securty weknesses, n mproved scheme hs lso been proposed [9]. Though, t s nlyzed tht scheme s vulnerble to relecton ttck nd prllel sesson ttck. Ths s due to the symmetrc structure o communcton messges exchnged between user nd server. A dynmc -bsed remote user uthentcton scheme usng one wy hsh uncton hs been proposed [0] nd clmed tht the scheme llows the users to choose nd chnge ther psswords reely, secure gnst -thet, nd ressts reply ttck, orgery ttck, guessng ttck, nsder 09

5 Interntonl Journl o Computer Theory nd Engneerng Vol. 4, No., Aprl 0 ttck nd stolen verer ttck. However, t s proved tht the scheme s nsecure gnst guessng ttck nd does not provde mutul uthentcton []. To deet these securty lws, new scheme hs been suggested. Nevertheless, t s susceptble to mpersonton ttck. Further, mproved scheme hs lso been proposed []. Its mjor drwbcks re t does not provde secure pssword chnge phse. b user needs to remember the secret number Y. On the other hnd, t s ponted out tht the scheme [0] does not provde mutul uthentcton nd s pssword ndependent. To overcome these lmttons, n enhnced scheme hs been proposed []. It s shown tht the scheme s exposed to nsder ttck, does not provde users to choose the pssword, sesson key estblshment nd does not preserve user nonymty [4]. An mproved scheme hs lso been proposed to overcome these lws. Mjor drwbcks n the mproved scheme re server mntns n extr tble or the vlue o N correspondng to every user, where N denotes the number o tmes user regsters t the server. b wrong pssword detecton s slow. mrt crd uthentcton scheme bsed on one wy hsh uncton nd symmetrc key cryptogrphy hs been proposed [5]. It s clmed tht the scheme ressts mpersonton ttck, prllel sesson ttck, reply ttck nd modcton ttck. In ddton, t provdes mutul uthentcton nd genertes shred sesson key. However, t s ponted out tht the scheme ls to resst Denl-o-ervce ttck nd provde perect orwrd secrecy [6]. III. ECRITY REQIREMENT FOR MART CARD ATHENTICATION CHEME Ths secton descrbes mjor securty requrements or n del smrt crd uthentcton scheme. To consder ny uthentcton scheme s secure nd ecent, t hs to encompss the ollowng etures: erver need not to mntn pssword or vercton tble to uthentcte the vld user. ser nds dculty to remember the pssword t s ssued by the server. Hence, scheme s needed to llow the users to choose nd chnge ther pssword reely t ny tme wthout ny ntercton rom the server. ecure trnsmsson o pssword s desrble t the tme o regstrton. The pssword s not embedded n logn request or n other words t s not reveled to the server n pln text s prt o logn request. 4 The computtonl worklod o the smrt crd needs to be low. Even though the cpbltes o smrt crds re ncresng, they re stll lmted. Intense computtons need to be voded both t the crd reder sde s well s server sde. 5 Attcks such s Impersonton ttck, Prllel sesson ttck, relecton ttck, Onlne Pssword Guessng ttck, Olne Pssword Guessng ttck, Reply ttck, tolen Verer ttck, ttck on Perect Forwrd ecrecy, mrt Crd Loss ttck, Denl-o-ervce ttck, Dennng cco ttck, Mn-n-the-Mddle ttck must be wthstnd by the uthentcton scheme. 6 I n dversry tres to ccess the resources rom the server by enterng wrong pssword, t hs to detect quckly. 7 In tmestmp-bsed uthentcton schemes, the clock o the server nd ll user systems re to be synchronzed. In ddton, trnsmsson dely o the logn request needs to be lmted. However, t s necent rom the prctcl pont o vew. To overcome clock synchronzton problem nd the lmtton o trnsmsson dely tme, some o the schemes use nonce n plce o tmestmps. In order to check the reshness o the nonce, server needs to mntn n older nonce vlue or short spn o tme. 8 It s necessry tht not only server veres the legl users, but users lso very the legl server to cheve two wy uthentcton. Every uthentcton scheme must support mutul uthentcton. 9 esson keys re used to secure the communcton between user nd server tll the end o the sesson. Every smrt crd uthentcton scheme needs to support sesson key generton. 0 It s better tht the user s dentty s nonymous. It s necessry tht n ecent remote user uthentcton scheme preserves strong nonymty not only rom the evesdropper but lso rom the server. IV. CONCLION ecurty nd ecency re the mn ctors or ny uthentcton scheme rom the user s perspectve. In vew o the ct, severl smrt crd bsed remote user uthentcton schemes hve been proposed. Ths pper descrbes vrous possble ttcks nd prmry requrements to consder ny smrt crd bsed uthentcton scheme s secure nd ecent or prctcl pplctons. These ssues re helpul to desgn nd develop secure nd ecent smrt crd uthentcton scheme. ACKNOWLEDGMENT The uthors would lke to thnk ABV-Indn Insttute o Inormton Technology nd Mngement, Gwlor, Ind or provdng the cdemc support. REFERENCE [] R. M. Needhm nd M. D. chroeder, sng encrypton or uthentcton n lrge networks o computers, Communctons o the ACM, vol., no., pp , 978. [] K.. Booth, Authentcton o sgntures usng publc key encrypton, Communctons o the ACM, vol. 4, no., pp , 98. [] L. Lmport, Pssword uthentcton wth nsecure communcton, Communctons o the ACM, vol. 4, no., pp , 98. [4] M.. Hwng nd L. H. L, A new remote user uthentcton scheme usng smrt crds, IEEE Trnsctons on Consumer Electroncs, vol. 46, no., pp. 8-0, 000. [5] C. K. Chn nd L. M. Cheng, Cryptnlyss o remote user uthentcton scheme usng smrt crds, IEEE Trnsctons on Consumer Electroncs, vol. 46, no. 4, pp , 000. [6] J. J. hen, C. W. Ln, nd M.. Hwng, A moded remote user uthentcton scheme usng smrt crds, IEEE Trnsctons on Consumer Electroncs, vol. 49, no., pp , 00. [7] K. C. Leung, L. M. Cheng, A.. Fong, nd C. K. Chn, Cryptnlyss o moded remote user uthentcton scheme usng smrt crds, IEEE Trnsctons on Consumer Electroncs, vol. 49, no. 4, pp. 4-45, 00. [8] A. K. Awsth nd. Ll, An enhnced remote user uthentcton scheme usng smrt crds, IEEE Trnsctons on Consumer Electroncs, vol. 50, no., pp ,

6 Interntonl Journl o Computer Theory nd Engneerng Vol. 4, No., Aprl 0 [9] M. Kumr, New remote user uthentcton scheme usng smrt crds, IEEE Trnsctons on Consumer Electroncs, vol. 50, no., pp , 004. [0] H. M. un, An ecent remote user uthentcton scheme usng smrt crds, IEEE Trnsctons on Consumer Electroncs, vol. 46, no. 4, pp , 000. [] C. L. Hsu, ecurty o two remote user uthentcton schemes usng smrt crds, IEEE Trnsctons on Consumer Electroncs, vol. 49, no. 4, pp , 00. [] H. Y. Chen, J. K. Jn, nd Y. M. Tseng, An ecent nd prctcl soluton to remote uthentcton: smrt crd, Computers nd ecurty, vol., no. 4, pp. 7-75, 00. []. W. Lee, H.. Km, nd K. Y. Yoo, Improvement o Chen et l.'s remote user uthentcton scheme usng smrt crds, Computer tndrds nd Interces, vol. 7, no., pp. 8-8, 005. [4]. K. ood, A. K. rje, nd K. ngh, ecure dynmc dentty-bsed remote user uthentcton scheme, n Proc. 6 th Interntonl Conerence on Dstrbuted Computng nd Internet Technologes, Bhubneswr, Ind, 00, pp [5] W. C. Ku nd. M. Chen, Weknesses nd mprovements o n ecent pssword bsed remote user uthentcton scheme usng smrt crds, IEEE Trnsctons on Consumer Electroncs, vol. 50, no., pp , 004. [6] E. J. Yoon, E. K. Ryu, nd K. Y. Yoo, Further mprovement o n ecent pssword bsed remote user uthentcton scheme usng smrt crds, IEEE Trnsctons on Consumer Electroncs, vol. 50, no., pp. 6-64, 004. [7] X. M. Wng, W. F. Zhng, J.. Zhng, nd M. K. Khn, Cryptnlyss nd mprovement on two ecent remote user uthentcton scheme usng smrt crds, Computer tndrds nd Interces, vol. 9, no. 5, pp , 007. [8] E. J. Yoon, E. J. Lee, nd K. Y. Yoo, Cryptnlyss o Wng et l. s remote user uthentcton scheme usng smrt crds, n Proc. 5 th Interntonl Conerence on Inormton Technology: New Genertons, Ls Vegs, Nevd, A, 008, pp [9] P. Kocher, J. Je, nd B. Jun, Derent power nlyss, n Proc. Advnces n Cryptology, Clorn, A, 999, pp [0] T.. Messerges, E. A. Dbbsh, nd R. H. lon, Exmnng smrt crd securty under the thret o power nlyss ttcks, IEEE Trnsctons on Computers, vol. 5, no. 5, pp , 00. [] W.. Jung, Ecent pssword uthentcted key greement usng smrt crds, Computers nd ecurty, vol., no., pp. 67-7, 004. [] H. T. Lw, J. F. Ln, nd W. C. Wu, An ecent nd complete remote user uthentcton scheme usng smrt crds, Mthemtcl nd Computer Modellng, vol. 44, no. -, pp. -8, 006. [] K. Hung, Q. Ou, X. Wu, nd Y. ong, Cryptnlyss o remote user uthentcton scheme usng smrt crds, n Proc. 5 th Interntonl Conerence on Wreless Communctons, Networkng nd Moble Computng, Bejng, Chn, 009, pp. -4. [4] Z. H. hen, A new moded remote user uthentcton scheme usng smrt crds, Appled Mthemtcs-A Journl o Chnese nverstes, vol., no., pp. 7-76, 008. [5] W. H. Yng nd. P. heh, Pssword uthentcton schemes wth smrt crds, Computers nd ecurty, vol. 8, no. 8, pp. 77-7, 999. [6] J. J. hen, C. W. Ln, nd M.. Hwng, ecurty enhncement or the tmestmp-bsed pssword uthentcton scheme usng smrt crds, Computers nd ecurty, vol., no. 7, pp , 00. [7]. T. Wu nd B. C. Cheu, A user rendly remote uthentcton scheme wth smrt crds, Computers nd ecurty, vol., no. 6, pp , 00. [8] N. Y. Lee nd Y. C. Chu, Improved remote uthentcton scheme wth smrt crd, Computer tndrds nd Interces, vol. 7, no., pp , 005. [9] M. Holbl nd T. Welzer, Cryptnlyss nd mprovement o n mproved remote uthentcton scheme wth smrt crd, n Proc. rd Interntonl Conerence on Avlblty, Relblty nd ecurty, Brcelon, pn, 008, pp [0] M. L. Ds, A. xen, nd V. P. Gult, A dynmc -bsed remote user uthentcton scheme, IEEE Trnsctons on Consumer Electroncs, vol. 50, no., pp. 69-6, 004. [] I. E. Lo, C. C. Lee, nd M.. Hwng, ecurty enhncement or dynmc -bsed remote user uthentcton scheme, In Proc. Interntonl Conerence on Next Generton Web ervces Prctces, eoul, Kore, 005, pp [] Q. Xe, J. L. Wng, D. R. Chen, nd X. Y. Yu, A novel user uthentcton scheme usng smrt crds, n Proc. Interntonl Conerence on Computer cence nd otwre Engneerng, Wuhn, Hube, Chn, 008, pp [] Y. Y. Wng, J. Y. Lu, F. X. Xo, nd J. Dn, A more ecent nd secure dynmc -bsed remote user uthentcton scheme, Computer Communctons, vol., no. 4, pp , 009. [4] M. K. Khn, Enhncng the securty o More ecent nd secure dynmc -bsed remote user uthentcton scheme, n Proc. rd Interntonl Conerence on Network nd ystem ecurty, Queenslnd, Austrl, 009, pp [5] R. ong, Advnced smrt crd bsed pssword uthentcton protocol, Computer tndrds nd Interces, vol., no. 5-6, pp. -5, 00. [6] R.. Pppl, Jdhr, C. D., nd. Tpsw, Comments on symmetrc key encrypton bsed smrt crd uthentcton scheme, n Proc. nd Interntonl Conerence on Computer Technology nd Development, Cro, Egypt, 00, pp Rv ngh Pppl hs receved B.E. Computer cence nd Engneerng rom J. E. C., Jblpur, Ind n 005 nd M.Tech. Computer cence nd Engneerng rom. A. T. I., Vdsh, Ind n 008. At present, he s pursung Full Tme Ph.D. n Inormton Technology t ABV-Indn Insttute o Inormton Technology nd Mngement, Gwlor, Ind. Hs reserch res o nterest nclude Cryptogrphy, Network ecurty Authentcton, Key Mngement, Dgtl gnture nd Hsh Functon. Jdhr C. D. hs obtned Ph.D. Computer cence nd Engneerng rom Ntonl Insttute o Technology, Truchrppll-5, Ind. He s presently workng s Assstnt Proessor t Deence Insttute o Advnce Technology, Pune, Ind. Hs prmry reserch re ncludes Network ecurty Authentcton, Key Mngement, Dgtl gnture nd Hsh Functon, ecurty ssues n Cloud Computng, ecurty Issues n Voce-over-IP, Cyber ecurty, Computer Networks, Adhoc Networks nd Cryptogrphy nd Ellptc Curve Cryptogrphy. hshkl Tpsw hs obtned her Ph.D. Computer Engneerng rom Indn Insttute o Technology, Roorkee, Ind n 00, M.Tech Computer cence rom nversty o Delh, Ind n 99 nd B.E. Electroncs Engneerng rom Jwj nversty, Gwlor, Ind n 986. he s Proessor n Inormton Technology Deprtment, ABV-Indn Insttute o Inormton Technology nd Mngement, Gwlor, Ind. Her prmry reserch res o nterest re Artcl Intellgence, Neurl Networks, Fuzzy Logc, Dgtl Imge Processng, Computer Networks, Moble Networks, Adhoc Networks, Network ecurty etc.

Semi-quantum private comparison protocol under an. almost-dishonest third party

Semi-quantum private comparison protocol under an. almost-dishonest third party Sem-quntum prvte comprson protocol under n lmost-dshonest thrd prty Wen-Hn Chou Tzonelh Hwng nd Jun Gu Deprtment of Computer Scence nd nformton Engneerng Ntonl Cheng Kung Unversty No. Unversty Rd. Tnn

More information

Digital Transmission

Digital Transmission Dgtal Transmsson Most modern communcaton systems are dgtal, meanng that the transmtted normaton sgnal carres bts and symbols rather than an analog sgnal. The eect o C/N rato ncrease or decrease on dgtal

More information

Energy Efficient Session Key Establishment in Wireless Sensor Networks

Energy Efficient Session Key Establishment in Wireless Sensor Networks Energy Effcent Sesson ey Estlshment n Wreless Sensor Networks Y Cheng nd Dhrm P. Agrwl OBR Center for Dstruted nd Mole Computng, Deprtment of ECECS Unversty of Cncnnt, Cncnnt, OH 45 {chengyg, dp}@ececs.uc.edu

More information

Simplified Algorithm and Hardware Implementation for the (24, 12, 8) Extended Golay Soft Decoder Up to 4 Errors

Simplified Algorithm and Hardware Implementation for the (24, 12, 8) Extended Golay Soft Decoder Up to 4 Errors The Interntonl Arb Journl of Informton Technology, Vol., No., Mrch 04 Smplfed Algorthm nd Hrdwre Implementton for the (4,, 8 Extended Goly Soft Decoder Up to 4 Errors Dongfu Xe College of Mechncl nd Electrcl

More information

An Optimal Method for Using Multiple Gateways in Cellular IP Networks

An Optimal Method for Using Multiple Gateways in Cellular IP Networks Bond Unversty epublctons@bond Informton Technology ppers Bond Busness School Aprl 2004 An Optml Method for Usng Multple Gtewys n ellulr IP Networks Zheng d Wu Bond Unversty, Zheng_D_Wu@bond.edu.u Follow

More information

Efficient and Resilient Key Discovery based on Pseudo-Random Key Pre-Deployment

Efficient and Resilient Key Discovery based on Pseudo-Random Key Pre-Deployment Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment p. 1 Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment Roerto Di Pietro, Luigi V. Mncini, nd Alessndro

More information

Sinusoidal Steady State Analysis

Sinusoidal Steady State Analysis CHAPTER 8 Snusodl Stedy Stte Anlyss 8.1. Generl Approch In the prevous chpter, we hve lerned tht the stedy-stte response of crcut to snusodl nputs cn e otned y usng phsors. In ths chpter, we present mny

More information

VI.C CIRCUIT BREAKERS

VI.C CIRCUIT BREAKERS VI.C CIRCUIT BREAKERS DMS #84474 Pge of 28 Revsed : GUIDE FOR DETERMINATION OF CIRCUIT BREAKER LOAD CURRENT CAPABILITY RATINGS PENNSYLVANIA-NEW JERSEY-MARYLAND INTERCONNECTION PLANNING AND ENGINEERING

More information

Math Circles Finite Automata Question Sheet 3 (Solutions)

Math Circles Finite Automata Question Sheet 3 (Solutions) Mth Circles Finite Automt Question Sheet 3 (Solutions) Nickols Rollick nrollick@uwterloo.c Novemer 2, 28 Note: These solutions my give you the nswers to ll the prolems, ut they usully won t tell you how

More information

Pre-distortion Linearization for 64-QAM Modulation in Ka-Band Satellite Link

Pre-distortion Linearization for 64-QAM Modulation in Ka-Band Satellite Link IJCSNS Interntonl Journl of Computer Scence nd Network Securty, VOL.8 No.8, August 008 47 Pre-dstorton Lnerzton for 64-QAM Modulton n K-Bnd Stellte Lnk P. Sojood Srdrood,, G.R. solt nd P. Prvnd Summry

More information

CHAPTER 2 LITERATURE STUDY

CHAPTER 2 LITERATURE STUDY CHAPTER LITERATURE STUDY. Introduction Multipliction involves two bsic opertions: the genertion of the prtil products nd their ccumultion. Therefore, there re two possible wys to speed up the multipliction:

More information

Chinese Remainder. Discrete Mathematics Andrei Bulatov

Chinese Remainder. Discrete Mathematics Andrei Bulatov Chnese Remander Introducton Theorem Dscrete Mathematcs Andre Bulatov Dscrete Mathematcs Chnese Remander Theorem 34-2 Prevous Lecture Resdues and arthmetc operatons Caesar cpher Pseudorandom generators

More information

i S1 V IN i C1 i N i C2 i S2

i S1 V IN i C1 i N i C2 i S2 ENGINEERING FOR RURAL DEVELOPMENT Jelgv, 0.-.05.05. VOLTAGE BALANCE CONTROL OF TWO-LEVEL DC-DC CONVERTER Ksprs Krocs, Ugs Srmels, Vesturs Brzs Insttute of Physcl Energetcs; Rg Techncl Unversty kselt@nbox.lv

More information

A Key Set Cipher for Wireless Sensor Networks

A Key Set Cipher for Wireless Sensor Networks A Key Set Cipher for Wireless Sensor etworks Subhsh Kk Abstrct This pper proposes the use of sets of keys, together with corresponding identifiers, for use in wireless sensor networks (WS) nd similr computing

More information

problems palette of David Rock and Mary K. Porter 6. A local musician comes to your school to give a performance

problems palette of David Rock and Mary K. Porter 6. A local musician comes to your school to give a performance palette of problems Davd Rock and Mary K. Porter 1. If n represents an nteger, whch of the followng expressons yelds the greatest value? n,, n, n, n n. A 60-watt lghtbulb s used for 95 hours before t burns

More information

MAXIMUM FLOWS IN FUZZY NETWORKS WITH FUNNEL-SHAPED NODES

MAXIMUM FLOWS IN FUZZY NETWORKS WITH FUNNEL-SHAPED NODES MAXIMUM FLOWS IN FUZZY NETWORKS WITH FUNNEL-SHAPED NODES Romn V. Tyshchuk Informtion Systems Deprtment, AMI corportion, Donetsk, Ukrine E-mil: rt_science@hotmil.com 1 INTRODUCTION During the considertion

More information

An Efficient Ownership Transfer Protocol for RFID Conforming to EPC Class 1 Generation 2 Standards

An Efficient Ownership Transfer Protocol for RFID Conforming to EPC Class 1 Generation 2 Standards Journal of Computers Vol. 27, No. 3, 2016, pp. 41-51 do:10.3966/199115592016102703005 An Effcent Ownershp Transfer Protocol for RFID Conformng to EPC Class 1 Generaton 2 Standards Fan-Shuo Lu 1 Ha-Bng

More information

Rough Set Approach for Categorical Data Clustering 1

Rough Set Approach for Categorical Data Clustering 1 Interntonl Journl of Dtbse Theory nd Applcton Vol., No., Mrch, Rough Set Approch for Ctegorcl Dt Clusterng Tutut Herwn*, Rozd Ghzl, Iwn Tr Ryd Ynto, nd Mustf Mt Ders Deprtment of Mthemtcs Educton nversts

More information

BnB-ADOPT + with Several Soft Arc Consistency Levels

BnB-ADOPT + with Several Soft Arc Consistency Levels BnB-ADOPT + wth Severl Soft Arc Consstency Levels Ptrc Guterrez nd Pedro Meseguer Astrct. Dstruted constrnt optmzton prolems cn e solved y BnB-ADOPT +, dstruted synchronous serch lgorthm. In the centrlzed

More information

Web-based Remote Human Pulse Monitoring System with Intelligent Data Analysis for Home Healthcare

Web-based Remote Human Pulse Monitoring System with Intelligent Data Analysis for Home Healthcare We-sed Remote Humn Pulse Montorng System wth Intellgent Dt Anlyss for Home Helthcre Chh-Mng Chen Grdute Insttute of Lrry, Informton nd Archvl Studes, Ntonl Chengch Unversty, Tpe 6, Twn, R.O.C. chencm@nccu.edu.tw

More information

NFC Communications-based Mutual Authentication Scheme for the Internet of Things

NFC Communications-based Mutual Authentication Scheme for the Internet of Things Internatonal Journal of Network Securty, Vol.19, No.4, PP.631-638, July 2017 (DOI: 10.6633/IJNS.201707.19(4).17) 631 NFC Communcatons-based Mutual uthentcaton Scheme for the Internet of Thngs Yanna Ma

More information

Performance Evaluation of Survivable Multifiber WDM Networks

Performance Evaluation of Survivable Multifiber WDM Networks erformnce Evluton of Survvble ultfber WD Networks Yunqu Luo nd Nrwn Ansr Advnced Networkng Lbortory Deprtment of Electrcl nd Computer Engneerng New Jersey Intute of Technology Unvery Heghts, Newrk, NJ

More information

Efficient Large Integers Arithmetic by Adopting Squaring and Complement Recoding Techniques

Efficient Large Integers Arithmetic by Adopting Squaring and Complement Recoding Techniques The th Worshop on Combnatoral Mathematcs and Computaton Theory Effcent Large Integers Arthmetc by Adoptng Squarng and Complement Recodng Technques Cha-Long Wu*, Der-Chyuan Lou, and Te-Jen Chang *Department

More information

Superposition, Thevenin and Norton. Superposition

Superposition, Thevenin and Norton. Superposition Superposton, Thevenn nd Norton OUTINE Superposton Thevenn Equvlent Crcut Norton Equvlent Crcut Mxmum Power Theorem ecture 6, 9/1/05 Redng Chpter.6-.8 ecture 6, Slde 1 Superposton A lner crcut s one constructed

More information

An Improved Profile-Based Location Caching with Fixed Local Anchor Based on Group Deregistration for Wireless Networks

An Improved Profile-Based Location Caching with Fixed Local Anchor Based on Group Deregistration for Wireless Networks An Improved Prole-Based Locaton Cachng wth Fxed Local Anchor Based on Group Deregstraton or Wreless Networks Md. Kowsar Hossan, Mousume Bhowmck, Tumpa Ran Roy 3 Department o Computer Scence and Engneerng,

More information

Algorithms for Memory Hierarchies Lecture 14

Algorithms for Memory Hierarchies Lecture 14 Algorithms for emory Hierrchies Lecture 4 Lecturer: Nodri Sitchinv Scribe: ichel Hmnn Prllelism nd Cche Obliviousness The combintion of prllelism nd cche obliviousness is n ongoing topic of reserch, in

More information

Comparative Analysis of Reuse 1 and 3 in Cellular Network Based On SIR Distribution and Rate

Comparative Analysis of Reuse 1 and 3 in Cellular Network Based On SIR Distribution and Rate Comparatve Analyss of Reuse and 3 n ular Network Based On IR Dstrbuton and Rate Chandra Thapa M.Tech. II, DEC V College of Engneerng & Technology R.V.. Nagar, Chttoor-5727, A.P. Inda Emal: chandra2thapa@gmal.com

More information

Rek Molva, Alain Pannetrat. Institut Eurecom, Sophia-Antipolis, France. cryptographic keying material.

Rek Molva, Alain Pannetrat. Institut Eurecom, Sophia-Antipolis, France. cryptographic keying material. clble Multicst ecurity in Dynmic Groups. Rek Molv, Alin Pnnetrt Institut Eurecom, ophi-antipolis, Frnce. fmolv,pnnetrg@eurecom.fr Abstrct In this pper we propose new frmework for multicst security bsed

More information

A Comparison of South East Asian Face Emotion Classification Based on Optimized Ellipse Data Using Clustering Technique

A Comparison of South East Asian Face Emotion Classification Based on Optimized Ellipse Data Using Clustering Technique A Comprson of South Est Asn Fce Emoton Clssfcton Bsed on Optmzed Ellpse Dt Usng Clusterng Technque K. Muthukruppn, S. Thrugnnm, R. Ngrjn, M. Rzon, S. Ycob, M. Muthukumrn3, nd T. Rmchndrn3 School of Scence

More information

A Comparison of Two Equivalent Real Formulations for Complex-Valued Linear Systems Part 2: Results

A Comparison of Two Equivalent Real Formulations for Complex-Valued Linear Systems Part 2: Results AMERICAN JOURNAL OF UNDERGRADUATE RESEARCH VOL. 1 NO. () A Comparson of Two Equvalent Real Formulatons for Complex-Valued Lnear Systems Part : Results Abnta Munankarmy and Mchael A. Heroux Department of

More information

Reinforcement Learning for Fuzzy Control with Linguistic States

Reinforcement Learning for Fuzzy Control with Linguistic States 54545454543 Journl of Uncertn Systems ol., No., pp.54-66, 8 Onlne t: www.jus.org.uk Renforcement Lernng for Fuzzy Control wth Lngustc Sttes Mohmmd Hossen Fzel Zrnd,*, Jvd Jouzdn, Mrym Fzel Zrnd Deprtment

More information

A Novel Back EMF Zero Crossing Detection of Brushless DC Motor Based on PWM

A Novel Back EMF Zero Crossing Detection of Brushless DC Motor Based on PWM A ovel Bck EMF Zero Crossing Detection of Brushless DC Motor Bsed on PWM Zhu Bo-peng Wei Hi-feng School of Electricl nd Informtion, Jingsu niversity of Science nd Technology, Zhenjing 1003 Chin) Abstrct:

More information

Domination and Independence on Square Chessboard

Domination and Independence on Square Chessboard Engineering nd Technology Journl Vol. 5, Prt, No. 1, 017 A.A. Omrn Deprtment of Mthemtics, College of Eduction for Pure Science, University of bylon, bylon, Irq pure.hmed.omrn@uobby lon.edu.iq Domintion

More information

Figure 1. DC-DC Boost Converter

Figure 1. DC-DC Boost Converter EE46, Power Electroncs, DC-DC Boost Converter Verson Oct. 3, 11 Overvew Boost converters make t possble to effcently convert a DC voltage from a lower level to a hgher level. Theory of Operaton Relaton

More information

CONSTRUCTING MINIMAL ADJACENT DOMINATING SETS IN SEMIGRAPHS FOR CLUSTERING IN WIRELESS NETWORKS

CONSTRUCTING MINIMAL ADJACENT DOMINATING SETS IN SEMIGRAPHS FOR CLUSTERING IN WIRELESS NETWORKS CONSTRUCTING MINIMAL ADJACENT DOMINATING SETS IN SEMIGRAPHS FOR CLUSTERING IN WIRELESS NETWORKS S. Srvnn 1, R. Poovzhk 2 nd N. R. Shnker 3 1 Deprtment of Mthemtcs, R.M.D. Engneerng College, Kvrpett, Tml

More information

Click Here to BEGIN: Independent Agent Contracting Link

Click Here to BEGIN: Independent Agent Contracting Link LOA Guide : Getting Contrcted with AllWell Centene Medicre Advntge This guide is for ll gents who ssign commissions to n gency. You will NOT need to provide ny gency informtion in this contrcting; s ll

More information

Sequential Logic (2) Synchronous vs Asynchronous Sequential Circuit. Clock Signal. Synchronous Sequential Circuits. FSM Overview 9/10/12

Sequential Logic (2) Synchronous vs Asynchronous Sequential Circuit. Clock Signal. Synchronous Sequential Circuits. FSM Overview 9/10/12 9//2 Sequentil (2) ENGG5 st Semester, 22 Dr. Hden So Deprtment of Electricl nd Electronic Engineering http://www.eee.hku.hk/~engg5 Snchronous vs Asnchronous Sequentil Circuit This Course snchronous Sequentil

More information

A Slot-Asynchronous MAC Protocol Design for Blind Rendezvous in Cognitive Radio Networks

A Slot-Asynchronous MAC Protocol Design for Blind Rendezvous in Cognitive Radio Networks Globecom 04 - Wireless Networking Symposium A Slot-Asynchronous MAC Protocol Design for Blind Rendezvous in Cognitive Rdio Networks Xingy Liu nd Jing Xie Deprtment of Electricl nd Computer Engineering

More information

Test 2. ECON3161, Game Theory. Tuesday, November 6 th

Test 2. ECON3161, Game Theory. Tuesday, November 6 th Test 2 ECON36, Game Theory Tuesday, November 6 th Drectons: Answer each queston completely. If you cannot determne the answer, explanng how you would arrve at the answer may earn you some ponts.. (20 ponts)

More information

Exercise 1-1. The Sine Wave EXERCISE OBJECTIVE DISCUSSION OUTLINE. Relationship between a rotating phasor and a sine wave DISCUSSION

Exercise 1-1. The Sine Wave EXERCISE OBJECTIVE DISCUSSION OUTLINE. Relationship between a rotating phasor and a sine wave DISCUSSION Exercise 1-1 The Sine Wve EXERCISE OBJECTIVE When you hve completed this exercise, you will be fmilir with the notion of sine wve nd how it cn be expressed s phsor rotting round the center of circle. You

More information

A Digital Content Distribution Using a Group-Key and Multi-layered Structure Based on Web

A Digital Content Distribution Using a Group-Key and Multi-layered Structure Based on Web A Dgtal Content Dstrbuton Usng a Group-Key and Mult-layered Structure Based on Web Yun-J Na and Il Seo Ko 2 Department of Internet Software, Honam Unversty 59-, Seobong-Dong, Gwangsan-Gu, Gwangju 506-74,

More information

A Novel Control Method for Input Output Harmonic Elimination of the PWM Boost Type Rectifier Under Unbalanced Operating Conditions

A Novel Control Method for Input Output Harmonic Elimination of the PWM Boost Type Rectifier Under Unbalanced Operating Conditions A Novel Control Method for nput Output Hrmonc Elmnton of the PWM Boost Type Rectfer Under Unblnced Opertng Condtons A. V. Stnkovc T. A. Lpo Electrcl nd Computer Engneerng Clevelnd Stte Unversty Deprtment

More information

A Substractive Clustering Based Fuzzy Hybrid Reference Control Design for Transient Response Improvement of PID Controller

A Substractive Clustering Based Fuzzy Hybrid Reference Control Design for Transient Response Improvement of PID Controller IB J. Eng. Sc. Vol. 4, No., 009, 67-86 67 A Substrctve lusterng Bsed Fuzzy Hybrd Reference ontrol Desgn for rnsent Response Improvement of PID ontroller Endr Joelnto & Prlndungn H. Stnggng Instrumentton

More information

EFFECTIVE CURRENT CONTROL DESIGN AND ANALYSIS OF SINGLE PHASE INVERTER FOR POWER QUALITY IMPROVEMENT

EFFECTIVE CURRENT CONTROL DESIGN AND ANALYSIS OF SINGLE PHASE INVERTER FOR POWER QUALITY IMPROVEMENT VOL., NO. 7, APRIL 5 IN 89-668 ARPN Journl of Engneerng nd Appled cences 6-5 Asn Reserch Publshng Network (ARPN). All rghts reserved. EFFECTIVE CURRENT CONTROL DEIGN AND ANALYI OF INGLE PHAE INVERTER FOR

More information

International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN

International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN 48(Prnt), ISSN 97 499(Onlne) Volume 4, Issue 5, July August (2), IAEME ENGINEERING AND TECHNOLOGY (IJARET) ISSN 97-48 (Prnt) ISSN 97-499 (Onlne) Volume 4,

More information

A New Medium Access Control Protocol for TDD Mode Wideband CDMA Wireless Local Area Networks

A New Medium Access Control Protocol for TDD Mode Wideband CDMA Wireless Local Area Networks A New Medum Access ontrol Protocol for TDD Mode Wdebnd DMA Wreless Locl Are Networks In F. Akyldz nd Xudong Wng Brodbnd nd Wreless Networkng Lb, School of Electrcl nd omuter Engneerng Georg Insttute of

More information

Bit Error Probability of Cooperative Diversity for M-ary QAM OFDM-based system with Best Relay Selection

Bit Error Probability of Cooperative Diversity for M-ary QAM OFDM-based system with Best Relay Selection 011 Internatonal Conerence on Inormaton and Electroncs Engneerng IPCSIT vol.6 (011) (011) IACSIT Press, Sngapore Bt Error Proalty o Cooperatve Dversty or M-ary QAM OFDM-ased system wth Best Relay Selecton

More information

Synchronous Generator Line Synchronization

Synchronous Generator Line Synchronization Synchronous Genertor Line Synchroniztion 1 Synchronous Genertor Line Synchroniztion Introduction One issue in power genertion is synchronous genertor strting. Typiclly, synchronous genertor is connected

More information

Y9.ET1.3 Implementation of Secure Energy Management against Cyber/physical Attacks for FREEDM System

Y9.ET1.3 Implementation of Secure Energy Management against Cyber/physical Attacks for FREEDM System Y9.ET1.3 Implementtion of Secure Energy ngement ginst Cyber/physicl Attcks for FREED System Project Leder: Fculty: Students: Dr. Bruce cillin Dr. o-yuen Chow Jie Dun 1. Project Gols Develop resilient cyber-physicl

More information

Triangles and parallelograms of equal area in an ellipse

Triangles and parallelograms of equal area in an ellipse 1 Tringles nd prllelogrms of equl re in n ellipse Roert Buonpstore nd Thoms J Osler Mthemtics Deprtment RownUniversity Glssoro, NJ 0808 USA uonp0@studentsrownedu osler@rownedu Introduction In the pper

More information

Lecture 20. Intro to line integrals. Dan Nichols MATH 233, Spring 2018 University of Massachusetts.

Lecture 20. Intro to line integrals. Dan Nichols MATH 233, Spring 2018 University of Massachusetts. Lecture 2 Intro to line integrls Dn Nichols nichols@mth.umss.edu MATH 233, Spring 218 University of Msschusetts April 12, 218 (2) onservtive vector fields We wnt to determine if F P (x, y), Q(x, y) is

More information

Section 16.3 Double Integrals over General Regions

Section 16.3 Double Integrals over General Regions Section 6.3 Double Integrls over Generl egions Not ever region is rectngle In the lst two sections we considered the problem of integrting function of two vribles over rectngle. This sitution however is

More information

Resource Allocation Optimization for Device-to- Device Communication Underlaying Cellular Networks

Resource Allocation Optimization for Device-to- Device Communication Underlaying Cellular Networks Resource Allocaton Optmzaton for Devce-to- Devce Communcaton Underlayng Cellular Networks Bn Wang, L Chen, Xaohang Chen, Xn Zhang, and Dacheng Yang Wreless Theores and Technologes (WT&T) Bejng Unversty

More information

Cross-layer Quality of Service Support for UWB Wireless Multimedia Sensor Networks

Cross-layer Quality of Service Support for UWB Wireless Multimedia Sensor Networks Ths full text pper ws peer revewed t the drecton of IEEE Communctons Socety subject mtter experts for publcton n the IEEE INFOCOM 28 proceedngs. Cross-lyer Qulty of Servce Support for UWB Wreless Multmed

More information

CS 135: Computer Architecture I. Boolean Algebra. Basic Logic Gates

CS 135: Computer Architecture I. Boolean Algebra. Basic Logic Gates Bsic Logic Gtes : Computer Architecture I Boolen Algebr Instructor: Prof. Bhgi Nrhri Dept. of Computer Science Course URL: www.ses.gwu.edu/~bhgiweb/cs35/ Digitl Logic Circuits We sw how we cn build the

More information

MATH 118 PROBLEM SET 6

MATH 118 PROBLEM SET 6 MATH 118 PROBLEM SET 6 WASEEM LUTFI, GABRIEL MATSON, AND AMY PIRCHER Section 1 #16: Show tht if is qudrtic residue modulo m, nd b 1 (mod m, then b is lso qudrtic residue Then rove tht the roduct of the

More information

VRT014 User s guide V0.8. Address: Saltoniškių g. 10c, Vilnius LT-08105, Phone: (370-5) , Fax: (370-5) ,

VRT014 User s guide V0.8. Address: Saltoniškių g. 10c, Vilnius LT-08105, Phone: (370-5) , Fax: (370-5) , VRT014 User s gude V0.8 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

Chaotic Filter Bank for Computer Cryptography

Chaotic Filter Bank for Computer Cryptography Chaotc Flter Bank for Computer Cryptography Bngo Wng-uen Lng Telephone: 44 () 784894 Fax: 44 () 784893 Emal: HTwng-kuen.lng@kcl.ac.ukTH Department of Electronc Engneerng, Dvson of Engneerng, ng s College

More information

An One-way Hash Function Based Lightweight Mutual Authentication RFID Protocol

An One-way Hash Function Based Lightweight Mutual Authentication RFID Protocol JOUNAL OF COMPUES, VOL 8, NO 9, SEPEMBE 2013 2405 An One-wy Hsh Function Bsed Lightweight Mutul Authentiction FID Protocol Xuping en Institute of Softwre nd Intelligent echnology, HngZhou Dinzi University,

More information

458 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 1, JANUARY 2016

458 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 1, JANUARY 2016 458 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 1, JANUARY 2016 Generlzed Cross-Lyer Desgns for Generc Hlf-Duplex Multcrrer Wreless Networks Wth Frequency-Reuse Rozt Rshtch, Student Member,

More information

Misty. Sudnow Dot Songs

Misty. Sudnow Dot Songs Sudnow Dot Songs isty T The Dot Song is nottionl system tht depicts voiced chords in wy where the non-music reder cn find these firly redily. But the Dot Song is not intended be red, not s sight reder

More information

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad Hll Ticket No Question Pper Code: AEC009 INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigl, Hyderd - 500 043 MODEL QUESTION PAPER Four Yer B.Tech V Semester End Exmintions, Novemer - 2018 Regultions:

More information

Study on SLT calibration method of 2-port waveguide DUT

Study on SLT calibration method of 2-port waveguide DUT Interntionl Conference on Advnced Electronic cience nd Technology (AET 206) tudy on LT clibrtion method of 2-port wveguide DUT Wenqing Luo, Anyong Hu, Ki Liu nd Xi Chen chool of Electronics nd Informtion

More information

Guidelines for CCPR and RMO Bilateral Key Comparisons CCPR Working Group on Key Comparison CCPR-G5 October 10 th, 2014

Guidelines for CCPR and RMO Bilateral Key Comparisons CCPR Working Group on Key Comparison CCPR-G5 October 10 th, 2014 Gudelnes for CCPR and RMO Blateral Key Comparsons CCPR Workng Group on Key Comparson CCPR-G5 October 10 th, 2014 These gudelnes are prepared by CCPR WG-KC and RMO P&R representatves, and approved by CCPR,

More information

An Efficient and Flexible Decentralized Multicast Key Distribution Scheme

An Efficient and Flexible Decentralized Multicast Key Distribution Scheme IJCSNS Internatonal Journal of Computer Scence and Networ Securty VOL. 6 No. 8B August 006 11 An Effcent and Flexble Decentralzed Multcast Key Dstrbuton Scheme Wen-Shenq Juang and Jyan-Cwan Wu Department

More information

EE Controls Lab #2: Implementing State-Transition Logic on a PLC

EE Controls Lab #2: Implementing State-Transition Logic on a PLC Objective: EE 44 - Controls Lb #2: Implementing Stte-rnsition Logic on PLC ssuming tht speed is not of essence, PLC's cn be used to implement stte trnsition logic. he dvntge of using PLC over using hrdwre

More information

METHOD OF LOCATION USING SIGNALS OF UNKNOWN ORIGIN. Inventor: Brian L. Baskin

METHOD OF LOCATION USING SIGNALS OF UNKNOWN ORIGIN. Inventor: Brian L. Baskin METHOD OF LOCATION USING SIGNALS OF UNKNOWN ORIGIN Inventor: Brin L. Bskin 1 ABSTRACT The present invention encompsses method of loction comprising: using plurlity of signl trnsceivers to receive one or

More information

Analysis and Enhancement of Bandwidth Request Strategies in IEEE Networks

Analysis and Enhancement of Bandwidth Request Strategies in IEEE Networks Ths ull text paper was peer revewed at the drecton o EEE Communcatons Socety subject matter experts or publcaton n the EEE CC proceedngs nalyss and Enhancement o Bandwdth Request Strateges n EEE 8.6 etworks

More information

University of North Carolina-Charlotte Department of Electrical and Computer Engineering ECGR 4143/5195 Electrical Machinery Fall 2009

University of North Carolina-Charlotte Department of Electrical and Computer Engineering ECGR 4143/5195 Electrical Machinery Fall 2009 Problem 1: Using DC Mchine University o North Crolin-Chrlotte Deprtment o Electricl nd Computer Engineering ECGR 4143/5195 Electricl Mchinery Fll 2009 Problem Set 4 Due: Thursdy October 8 Suggested Reding:

More information

Topic 20: Huffman Coding

Topic 20: Huffman Coding Topic 0: Huffmn Coding The uthor should gze t Noh, nd... lern, s they did in the Ark, to crowd gret del of mtter into very smll compss. Sydney Smith, dinburgh Review Agend ncoding Compression Huffmn Coding

More information

Synchronous Machine Parameter Measurement

Synchronous Machine Parameter Measurement Synchronous Mchine Prmeter Mesurement 1 Synchronous Mchine Prmeter Mesurement Introduction Wound field synchronous mchines re mostly used for power genertion but lso re well suited for motor pplictions

More information

A COMPARISON OF CIRCUIT IMPLEMENTATIONS FROM A SECURITY PERSPECTIVE

A COMPARISON OF CIRCUIT IMPLEMENTATIONS FROM A SECURITY PERSPECTIVE A COMPARISON OF CIRCUIT IMPLEMENTATIONS FROM A SECURITY PERSPECTIVE Mster Thesis Division of Electronic Devices Deprtment of Electricl Engineering Linköping University y Timmy Sundström LITH-ISY-EX--05/3698--SE

More information

Performance Evaluation of an Optical Packet Scheduling Switch

Performance Evaluation of an Optical Packet Scheduling Switch Performnce Evluton of n Optcl Pcket Schedulng Swtch Kyrkos Vlchos, memer IEEE, Kyrk Seklou nd Emmnuel Vrvrgos Reserch Acdemc Computer echnology Insttute, RA-CI, Unversty of Ptrs, GR-26500, RIO, Ptrs, Greece,

More information

TECHNICAL NOTE TERMINATION FOR POINT- TO-POINT SYSTEMS TN TERMINATON FOR POINT-TO-POINT SYSTEMS. Zo = L C. ω - angular frequency = 2πf

TECHNICAL NOTE TERMINATION FOR POINT- TO-POINT SYSTEMS TN TERMINATON FOR POINT-TO-POINT SYSTEMS. Zo = L C. ω - angular frequency = 2πf TECHNICAL NOTE TERMINATION FOR POINT- TO-POINT SYSTEMS INTRODUCTION Because dgtal sgnal rates n computng systems are ncreasng at an astonshng rate, sgnal ntegrty ssues have become far more mportant to

More information

Cryptanalysis and Improvement of a Password-Based Authenticated Three-Party Key Exchange Protocol

Cryptanalysis and Improvement of a Password-Based Authenticated Three-Party Key Exchange Protocol Internatonal Journal of Securt and Its pplcatons pp.151-160 http://d.do.org/10.14257/jsa.2014.8.4.14 rptanalss and Improvement of a Password-ased uthentcated Three-Part e Echange Protocol oungsook Lee

More information

A Cluster-based TDMA System for Inter-Vehicle Communications *

A Cluster-based TDMA System for Inter-Vehicle Communications * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 30, 213-231 (2014) A Cluster-bsed TDMA System for Inter-Vehicle Communictions * Deprtment of Electricl Engineering Ntionl Sun Yt-Sen University Kohsiung,

More information

LECTURE 9: QUADRATIC RESIDUES AND THE LAW OF QUADRATIC RECIPROCITY

LECTURE 9: QUADRATIC RESIDUES AND THE LAW OF QUADRATIC RECIPROCITY LECTURE 9: QUADRATIC RESIDUES AND THE LAW OF QUADRATIC RECIPROCITY 1. Bsic roerties of qudrtic residues We now investigte residues with secil roerties of lgebric tye. Definition 1.1. (i) When (, m) 1 nd

More information

ABB STOTZ-KONTAKT. ABB i-bus EIB Current Module SM/S Intelligent Installation Systems. User Manual SM/S In = 16 A AC Un = 230 V AC

ABB STOTZ-KONTAKT. ABB i-bus EIB Current Module SM/S Intelligent Installation Systems. User Manual SM/S In = 16 A AC Un = 230 V AC User Mnul ntelligent nstlltion Systems A B 1 2 3 4 5 6 7 8 30 ma 30 ma n = AC Un = 230 V AC 30 ma 9 10 11 12 C ABB STOTZ-KONTAKT Appliction Softwre Current Vlue Threshold/1 Contents Pge 1 Device Chrcteristics...

More information

High Speed, Low Power And Area Efficient Carry-Select Adder

High Speed, Low Power And Area Efficient Carry-Select Adder Internatonal Journal of Scence, Engneerng and Technology Research (IJSETR), Volume 5, Issue 3, March 2016 Hgh Speed, Low Power And Area Effcent Carry-Select Adder Nelant Harsh M.tech.VLSI Desgn Electroncs

More information

Vector Calculus. 1 Line Integrals

Vector Calculus. 1 Line Integrals Vector lculus 1 Line Integrls Mss problem. Find the mss M of very thin wire whose liner density function (the mss per unit length) is known. We model the wire by smooth curve between two points P nd Q

More information

BUBBLE BOBBLE 1 o C r t n o s l 2 t e G t g n i a t S r d e t 3 a B s c i Pl y a 4 a G m S e r c e n e 5 in r Sco g 6 ms e It 7 a P s s o w d r

BUBBLE BOBBLE 1 o C r t n o s l 2 t e G t g n i a t S r d e t 3 a B s c i Pl y a 4 a G m S e r c e n e 5 in r Sco g 6 ms e It 7 a P s s o w d r BUBBLE BOBBLE 1 Control s 2 Gettin g Strted 3 Bsc i Ply 4 Gm e Sce r en 5 Scoring 6 Items 7 Psswor d 1 Control s Bsic Controls Move left pssword Jump Blow s Confirm/Puse/Resume Menu nd right/enter nvigtion

More information

Chapter 1. On-line Choice of On-line Algorithms. Yossi Azar Andrei Z. Broder Mark S. Manasse

Chapter 1. On-line Choice of On-line Algorithms. Yossi Azar Andrei Z. Broder Mark S. Manasse Chapter On-lne Choce of On-lne Algorthms Yoss Azar Andre Z. Broder Mark S. Manasse Abstract Let fa ; A 2; ; Amg be a set of on-lne algorthms for a problem P wth nput set I. We assume that P can be represented

More information

Content Based Color Image Retrieval via Wavelet Transforms

Content Based Color Image Retrieval via Wavelet Transforms 8 IJCSNS Interntonl Journl of Computer Scence nd Network Securty, VOL.7 No., December 7 Content Bsed Color Imge Retrevl v Wvelet Trnsforms Mrs.Y. M. Lth Dr.B.C.Jng V.S.K.Reddy, GNITS,JNTU,Ind Rector,JNTU,Ind

More information

A Multi-Agent Solution to Distribution System Management by Considering Distributed Generators

A Multi-Agent Solution to Distribution System Management by Considering Distributed Generators Pge of 0 IEEE PES Trnsctons on Power Systems 0 0 0 0 0 0 A Mult-Agent Soluton to Dstrbuton System Mngement by Consderng Dstrbuted Genertors Abstrct A trdtonl dstrbuton networ crres electrcty from centrl

More information

Module 9. DC Machines. Version 2 EE IIT, Kharagpur

Module 9. DC Machines. Version 2 EE IIT, Kharagpur Module 9 DC Mchines Version EE IIT, Khrgpur esson 40 osses, Efficiency nd Testing of D.C. Mchines Version EE IIT, Khrgpur Contents 40 osses, efficiency nd testing of D.C. mchines (esson-40) 4 40.1 Gols

More information

Example. Check that the Jacobian of the transformation to spherical coordinates is

Example. Check that the Jacobian of the transformation to spherical coordinates is lss, given on Feb 3, 2, for Mth 3, Winter 2 Recll tht the fctor which ppers in chnge of vrible formul when integrting is the Jcobin, which is the determinnt of mtrix of first order prtil derivtives. Exmple.

More information

Parameter Free Iterative Decoding Metrics for Non-Coherent Orthogonal Modulation

Parameter Free Iterative Decoding Metrics for Non-Coherent Orthogonal Modulation 1 Parameter Free Iteratve Decodng Metrcs for Non-Coherent Orthogonal Modulaton Albert Gullén Fàbregas and Alex Grant Abstract We study decoder metrcs suted for teratve decodng of non-coherently detected

More information

Multi-beam antennas in a broadband wireless access system

Multi-beam antennas in a broadband wireless access system Multi-em ntenns in rodnd wireless ccess system Ulrik Engström, Mrtin Johnsson, nders Derneryd nd jörn Johnnisson ntenn Reserch Center Ericsson Reserch Ericsson SE-4 84 Mölndl Sweden E-mil: ulrik.engstrom@ericsson.com,

More information

Software Pipelining for the Pegasus IR

Software Pipelining for the Pegasus IR Softwre Ppelnng for the Pegsus IR Cod Hrtwg chrtwg@cs.cmu.edu Ele Krevt ekrevt@cs.cmu.edu Abstrct Modern processors, especll VLIW processors, often hve the blt to eecute multple nstructons smultneousl.

More information

EE 330 Lecture 22. Small Signal Analysis Small Signal Analysis of BJT Amplifier

EE 330 Lecture 22. Small Signal Analysis Small Signal Analysis of BJT Amplifier EE Lecture Small Sgnal Analss Small Sgnal Analss o BJT Ampler Revew rom Last Lecture Comparson o Gans or MOSFET and BJT Crcuts N (t) A B BJT CC Q R EE OUT R CQ t DQ R = CQ R =, SS + T = -, t =5m R CQ A

More information

Dataflow Language Model. DataFlow Models. Applications of Dataflow. Dataflow Languages. Kahn process networks. A Kahn Process (1)

Dataflow Language Model. DataFlow Models. Applications of Dataflow. Dataflow Languages. Kahn process networks. A Kahn Process (1) The slides contin revisited mterils from: Peter Mrwedel, TU Dortmund Lothr Thiele, ETH Zurich Frnk Vhid, University of liforni, Riverside Dtflow Lnguge Model Drsticlly different wy of looking t computtion:

More information

Secure Power Scheduling Auction for Smart Grids Using Homomorphic Encryption

Secure Power Scheduling Auction for Smart Grids Using Homomorphic Encryption Secure Power Schedulng Aucton for Smart Grds Usng Homomorphc Encrypton Haya Shajaah, Student Member, IEEE, Ahmed Abdelhad, Senor Member, IEEE, and Charles Clancy, Senor Member, IEEE Abstract In ths paper,

More information

Figure 1. DC-DC Boost Converter

Figure 1. DC-DC Boost Converter EE36L, Power Electroncs, DC-DC Boost Converter Verson Feb. 8, 9 Overvew Boost converters make t possble to effcently convert a DC voltage from a lower level to a hgher level. Theory of Operaton Relaton

More information

Rational Secret Sharing without Broadcast

Rational Secret Sharing without Broadcast Ratonal Secret Sharng wthout Broadcast Amjed Shareef, Department of Computer Scence and Engneerng, Indan Insttute of Technology Madras, Chenna, Inda. Emal: amjedshareef@gmal.com Abstract We use the concept

More information

ELECTRONIC WAVELENGTH TRANSLATION IN OPTICAL NETWORKS. Milan Kovacevic and Anthony Acampora. Center for Telecommunications Research

ELECTRONIC WAVELENGTH TRANSLATION IN OPTICAL NETWORKS. Milan Kovacevic and Anthony Acampora. Center for Telecommunications Research ELECTRONIC WAVELENGTH TRANSLATION IN OPTICAL NETWORKS Mlan Kovacevc Anthony Acampora Department of Electrcal Engneerng Center for Telecommuncatons Research Columba Unversty, New York, NY 0027-6699 Abstract

More information

The Performance Improvement of BASK System for Giga-Bit MODEM Using the Fuzzy System

The Performance Improvement of BASK System for Giga-Bit MODEM Using the Fuzzy System Int. J. Communcatons, Network and System Scences, 10, 3, 1-5 do:10.36/jcns.10.358 Publshed Onlne May 10 (http://www.scrp.org/journal/jcns/) The Performance Improvement of BASK System for Gga-Bt MODEM Usng

More information

Application Note. Differential Amplifier

Application Note. Differential Amplifier Appliction Note AN367 Differentil Amplifier Author: Dve n Ess Associted Project: Yes Associted Prt Fmily: CY8C9x66, CY8C7x43, CY8C4x3A PSoC Designer ersion: 4. SP3 Abstrct For mny sensing pplictions, desirble

More information

Energy Harvesting Two-Way Channels With Decoding and Processing Costs

Energy Harvesting Two-Way Channels With Decoding and Processing Costs IEEE TRANSACTIONS ON GREEN COMMUNICATIONS AND NETWORKING, VOL., NO., MARCH 07 3 Energy Hrvesting Two-Wy Chnnels With Decoding nd Processing Costs Ahmed Arf, Student Member, IEEE, Abdulrhmn Bknin, Student

More information

CAL. NX15 DUO-DISPLAY QUARTZ

CAL. NX15 DUO-DISPLAY QUARTZ L. NX15 UO-ISPLY QURTZ l nlogue time disply l igitl time nd clendr l hronogrph l Tchymeter l t recll function l lrm l Illuminting light (Electroluminescent pnel) ENGLISH Illuminting light (TIME/LENR mode

More information

Secure Transmission of Sensitive data using multiple channels

Secure Transmission of Sensitive data using multiple channels Secure Transmsson of Senstve data usng multple channels Ahmed A. Belal, Ph.D. Department of computer scence and automatc control Faculty of Engneerng Unversty of Alexandra Alexandra, Egypt. aabelal@hotmal.com

More information