Ndsp: Neighbor Assisted Distributed Self-Healing Protocol for Compromised Node Recovery in Wireless Sensor Networks

Size: px
Start display at page:

Download "Ndsp: Neighbor Assisted Distributed Self-Healing Protocol for Compromised Node Recovery in Wireless Sensor Networks"

Transcription

1 IOSR Journal of Computer Engneerng (IOSR-JCE) e-issn: ,p-ISSN: , Volume 17, Issue 6, Ver. IV (Nov Dec. 2015), PP Ndsp: Neghbor Asssted Dstrbuted Self-Healng Protocol for Compromsed Node Recovery n Wreless Sensor Networks Slochana Dev, RohtVad 1,2 CSE Department M. M. Engneerng College, M. M. Unversty, Mullana, Ambala, Inda Abstract: Wreless sensors network (WSN) s collecton of sensors nodes and a base staton. All the sensor nodes n the network collect data from the envronment and sent ths data to the base staton (BS). Ths data s transmtted n hope by hope fashon,.e. each sensor sent the data to ts one hope neghbor n the drecton of BS on wreless medum. As themedum s wreless whch s already less securedthus more prone to attacks. Therefore securty s one of the major ssues n WSN. An adversary s a node whch steals nformaton stored n the memory of sensor nodes. Ths paper presentsa neghbor asssted dstrbuted self-healng protocol (NDSP) for compromsed node recoveryn wreless sensor networks. Presented NDSP protocol allows a compromsed sensor node to contnuously and collectvely recover from a compromse stage to a normal stage. Detecton of compromsed node s out of the scope of ths research paper. Smulaton and analytcal results proves that presented scheme to recover a compromsed sensor node s both effectve and effcent. Keywords: WSN, BS, Recovery I. Introducton To Wreless Sensor Networks Wreless sensor networks can vrtually work n any envronment, especally where wred connectons are not possble. It s consstsof a number of sensor nodes that are used to gather nformaton from the envronment, and actuator nodes that are used to change the behavor of the envronment. Wreless sensors network n sensor node are usually random deployed n the nterested area. When the node s deployed n area does not effect n other area. Wreless networks can also be deployed n extreme envronmental condtons and may be prone to enemy attacks These sensors are consst of low power, lmted memory, and energy constraned due to ther small sze. From a techncal perspectve, a sensor s a devce that translates parameters or events n the physcal world nto sgnals that can be measured and analyzed. Durng development of a wreless sensor node, t s ensured that there s always adequate energy avalable to power the system. Power s stored ether n batteres or capactors. Batteres used for power supply can be both rechargeable and non-rechargeable. Sensor nodes can use lmted supply of energy performng computatons and transmttng nformaton n a wreless envronment. As such, energy-conservng forms of communcaton and computaton are essental. Sensor node lfetme shows a strong dependence on the battery lfetme. Wreless Sensor Networks (WSNs) s to collect nformaton from the physcal world. It s conssts of base statons and a number of wreless sensors.it also represent the moblty of nods, t means movement of node one node to other node n nterested area. When the change of node no effect are other sensor node. They are performng easer.sensor nodes sense and report the state of the envronment whle actuator nodes gather data from sensors and are able to act on the envronment. It s expected to be self-organzed and potentally operate autonomously n unattended envronments, wth basc and Mnmal drectves from the user that mght be remotely connected to the scene. In the wreless communcaton the number of sensor nodes deployed n a montorng regon may be n the order of hundreds or thousands whle such sze s not necessary for actuator nodes snce they have hgher capabltes and can act on larger areas.the unrelable Sensor nodes represents the sensor node are lmted energy and small sze.there are always rsk that a node wll fal or physcally damage. Ths wll be causes of unrelablty n the network. Whle many sensors connect to controllers and processng statons drectly (e.g., usng local area networks), an ncreasng number of sensors communcate the collected data wrelessly to a centralzed processng staton. Ths s mportant snce many network applcatons requre hundreds or thousands of sensor nodes, often deployed n remote and naccessble. Therefore, a wreless sensor has not only a sensng component, but also on-board processng, communcaton, and storage capabltes. Wth these enhancements, a sensor node s often not only responsble for data collecton, but also for n-network analyss, correlaton, and fuson of ts own sensor data and data from other sensor nodes for example, usng ultrasound, nfrared, or rado frequency technologes wth varyng data rates and latences. Fnally, some devces may have access to addtonal supportng technologes, for example, Global Postonng System (GPS) recevers. It s represent the random node s deployed n unattended envronment; they are usually operated by battery to perform any type of operaton. It s also mpossble to change or recharge ther batteres once they are deployed. In the WSNs the DOI: / Page

2 Ndsp: Neghbor Asssted Dstrbuted Self-Healng Protocol for Compromsed Node Recovery n Wreless Sensor node s deployed randomly n nterested area wthout careful plannng. Once node deployed, they are perform the autonomously confgure themselves nto the communcaton network. Although deployed n an ad hoc manner they need to be self-organzed and self-healng and can face constant reconfguraton. The WSNs represent themany-to-one Traffc Pattern, n most of the sensor network applcatons, when the need of same data n base staton then the every sensor node sends from the data n the drecton of a base staton. It process cycle s called many to one traffc process WSNs have been employed n many applcatons, such as envronment montorng and health care.there are many applcatons n montorng envronmental and earth sensng parameters. These are Forest Fre Detecton, Ar polluton Water qualty montorng, and Landslde detectons, HealthApplcatons, Areamontorng, Securty and Survellance. II. Revew Of Lterature Ths secton presents varous works that has been done n the feld of dstrbuted self-healng, data secrecy, n WSNs. The revews of prevous work help us to analyses the problems n the exstng system and we can get some help to develop our proposed system. V. Nak, et al. [1] proposed a Local secret mantenance n sensor networks. In ths paper present a smple protocol for secret mantenance between a par of network. It s show that f the current secret between the par s somehow dsclosed and prevous key are not compromsed and nor can future secret compromsed. Local keys are updated perodcally to mtgate the effect of sensor compromse. Thsprotocol provdes both forward and backward securty for communcaton between par of sensors. However, the scheme s securty reles on a somewhat unrealstc assumpton that the adversary s unable to compromse both sensors smultaneously. The concluson of paper whsper s the frst pece of work n whch neghborng node to node local secret mantaned wth the property of forward secrecy acheved s usng sesson key only. Hu, F. et al. [2] proposed a Securty n wreless sensor networks. Data secrecy s a fundamental securty ssue n sensor networks and encrypton s the standard way to acheve t Many research efforts have yelded technques for establshng par wse keys used to secure sensor-to-sensor and snk-to-sensor communcaton D. Ma et al. [3] presents unattended sensors and sensor networks have become subject of attenton n the securty research communty and varous aspects of securty have been explored. Parno, et al. proposed two dstrbuted algorthms where sensors (wthout nterference of snk) work collectvely to detect node replcaton attack. Securty and prvacy n data-centrc sensor networks typcally runnng n unattended mode have been recently studed n. Unattended wreless sensor networks (UWSNs) operatng n hostle envronments face the rsk of compromse. Unable to offload collected data to a snk or some other trusted external entty, sensors must protect themselves by attemptng to mtgate potental compromse and safeguardng ther data.uwsns have also been consdered the context of mnmzng storage and bandwdth overhead due to data authentcaton [1]. A generalzaton of ths s the cryptographc lterature; n ths scheme they consder notons of ntruson-reslence [4] and key nsulaton [5] refer to technques of provdng both forward and backward securty to mtgate the effect of exposure of decrypton keys. However, these technques are unsutable for solvng the problem at hand, control of the adversary. Data ntegrty s an equally mportant ssue whch s normally consdered n random wth data secrecy. However, n ths paper, we gnore data ntegrty. Ths s because we dstngush between read-only and read-wrte adversares. The former s assumed to compromse sensors and leave no evdence behnd: t merely reads all memory and storage. In contrast, a read-wrte adversary can delete or modfy exstng and/or ntroduce ts own fraudulent data. We consder a read-only adversary to be more realstc, especally snce t ams to reman stealthy. A stealthy adversary has an ncentve (and the ablty) to vst the UWSN agan and agan, whle a non-stealthy one mght be unable to do so once an attack s detected and correspondng measurements are taken. Author n [6] presents Self-Healng strateges. The strateges they perform to nvestgate two cooperatve self-healng strateges that allow an UWSN to recover from compromse and mantan secrecy of collected data. Because the cure comes from peer sensors, the network exhbts a self-healng property that emerges through collaboraton of all nodes somethng no ndvdual node can provde. In ths paper we propose DISH (Dstrbuted Self-Healng), a scheme where unattended sensors collectvely attempt to recover from compromse and mantan secrecy of collected data. DISH does not absolutely guarantee data secrecy; nstead, t offers probablstc tunable degree of secrecy whch depends on varables such as: adversaral capablty (number of nodes t can compromse at a gven tme nterval), amount of nter-node communcaton the UWSNs can support, and number of data collecton ntervals between successve snk vsts. We beleve that ths work represents the frst attempt to cope wth the powerful moble adversary n UWSNs. We also show that, n ths context, healng capabltes are subject to a 0-1 law. Results obtaned from our analyss are supported by extensve smulatons, showng that the proposed protocols are very effectve n self-healng, despte the power of the moble adversary. Fnally, some ssues related to UWSN deployment are addressed, whle some open research problems callng for further nvestgaton are ntroduced DOI: / Page

3 Ndsp: Neghbor Asssted Dstrbuted Self-Healng Protocol for Compromsed Node Recovery n Wreless Sensor Huhns et al. [7] have proposed a Software agent-based self-healng archtecture presented the concept of mult-agent redundancy to fabrcate software adaptaton. Software engneerng ntersects mult-agent systems n many ways. Such as, mult-agent systems can be used to assst conventonal software systems or tradtonal software engneerng technques can be used to buld mult-agent systems. The benefts of usng agents as buldng blocks for conventonal software are agents can dynamcally compose n a system when all the components of the system are unknown tll runtme. Also, as agents can be added to a system n run tme, software can be customzed over ts lfetme, even by the end-users too. Ths can produce more robust systems. Blundo, et al. [8] proposed Self-healng Key Dstrbuton Scheme. In ths work, the author ncludes the proposed forward and backward secrecy. Forward secrecy s usedto prevent a revoked user from contnued accessng thesesson key even f t keeps recevng the broadcast messages. Backward secrecy s used to prevent a new user from decodng messages broadcasted before t jons the group. When a group requres forward and backward secrecy, the sesson key must be changed for every membershp change. Canett and Herzberg [9] proposed a generc determnstc Scheme s proposed that mantans secrecy n the presence of a moble adversary. In ths scheme, a node must communcate wth all other nodes to update ts state at each round. Ths mght work for small wred networks, but due to communcaton overhead the proposal would not scale to the envsaged UWSN sze. Also, snce sensor communcaton s wreless and broadcast n nature, Eavesdroppng s easy, whch makes our analyss very dfferent from that n unattended sensors and sensor networks have become subject of attenton. The ntal work ntroduced the UWSN scenaro, defned the moble adversary and dscussed a number of challenges n the new scenaro. Ths work s later extended to nclude the case where the adversary s goal s to ndscrmnately erase all sensor data. Authors n [10] proposed a dstrbuted scheme to detect node replcaton attack n sensor network. In ths attack, an adversary uses the credentals of a compromsed node to ntroduce replcas of a node n the network. III. Problem Descrpton In ths secton, we descrbe network assumptons and dfferent states of sensor nodes n the compromsed WSN. A. Network Assumptons All the sensors n the network know the publc key of BS r d n round r, random number generated by sensor node PK BS. As soon as a sensornode S collects data r r, R, d, r, S R refer to one tme S encrypts ths data usng followng procedure: r E Enc PK,...) where r ( BS S n round r nclude n each randomzed encrypton operaton. Each sensor node encrypts the data usng publc key of BS whereas BS decrypts ths data usng ts own prvate key K BS. Each sensor node uses ts own seed value Seed to generate the random number r R n round r. The random number s generated by applyng one way hash functon h on seed value Seed.The functon h s appled r th tme on seed value Seed to generate the random number r R used n round r. B. Type of compromsed node attack Once an adversary compromsed a sensor node S n the network, t steels all the nformaton stored n the memory of S. As the sensor node S s compromsed, ts secret seed value to generate the random number r R s also dsclosed to adversary. So any key whch s generated by a compromsed sensor node S s alsodsclosed to the adversary. The adversary s only nterested n steelng the nformaton stored n the memory of sensor node S, adversary never nterferes or steel any message communcated over wreless medum between two nodes weather the nodes are compromsed or not. So once a node s compromsed, t s no use to generate a random number r R usng ts compromsed seed value. At ths stage, t s tme to replace the seed value Seed usng new seed value Seed. Ths s done by replacng the seed value Seed of th sensor wth the seed value of Seed of j th sensor. j C. Types of Sensor Nodes n compromsed WSNs There are three types of node n the network. If the network s not compromsed, only sngle type of nodes are presents n the network,.e. healthy nodes. But once the network s compromsed and t s under the control of an adversary node, all the compromsed sensor nodes changes there states n to a dfferent states. There are three types of nodes presents n the compromsed WSNs whch are as under: a. Healthy Node: A node s healthy f ts nternal data and seed values to generate a key are confdental from adversary node. DOI: / Page

4 Ndsp: Neghbor Asssted Dstrbuted Self-Healng Protocol for Compromsed Node Recovery n Wreless Sensor b. Sck Node: A node s n Sck state when data stored n the node memory s avalable to adversary but the seed value to generate the key s safe from adversary. c. Compromsed Node: A node s n compromsed state when both data stored n the memory of node along wth seed value to generate the key generaton materal are avalable to adversary. IV. Ndsp Protocol All the sensor nodes are programmed for collectng data perodcally. Each sensor wats for a predetermned tme to upload data to the moble snk node. Each tme a snk vsts a sensor node; all the network securty parameters of all the sensors are securely rentalzed whch ncludes all cryptography key as well as ntal seed value for random number generaton, etc. Adversary can compromsed at most k number of sensors out of total N number of sensors n the nterval of sngle collecton. Adversary s only nterest s n the secret of compromsed node t does not nterfere n the communcaton of any sensors n does not try to change anythng n them. Adversary movements are unpredctable and untraceable. The ntruson detecton process s out of scope of the research work. In the presented scheme, the unattended sensor nodes collectvely attempt to recover from compromse state to sck or healthy state to mantan network performance n terms of secrecy of collected data. Because the cure comes from peer sensors, the network exhbts a self-healng property that emerges through collaboraton of all nodes. Fgure 1 shows the system model of neghbor asssted dstrbuted scheme for compromsed node recover n wreless sensor networks. The process starts wth the ntruson detecton. If the system detects an ntruder n the network, then t starts reparng the network. The network s assumed to be a normal network only f no more than 70% of the nodes are compromsed. So f entre network s not compromsed then system repars all the sck and compromsed sensors by refllng the seed values of such nodes wth the seed value generated by healthy and sck sensors as shown n Fgure 2. Fgure 1: System model for compromsed sensors recovery D. Compromsed and sck node recovery Fgure 2 shows the neghbor asssted dstrbuted scheme for compromsed node recover n wreless sensor networks.a healthy (H) sensor helps n replacng the seed value of both sck (S) and compromsed (C) sensors. A healthy sensor selects ts randomly neghbor R. If the selected neghbor R s already n a healthy state then t does not change the state of R.But f the state of R s sck state then t wll automatcally changes nto healthy state. On the other hand f R s n compromsed state, then the state of R s changes nto sck state. A sck sensor helps n replacng the seed value of compromsed sensor only. But the sensor s already sck so a sngle sck sensor s unable to recover a compromsed state nto a sck state. Two sck sensors are requred for the recovery of a compromsed sensor from compromsed state nto a sck state. Fgure 2 shows the DOI: / Page

5 Ndsp: Neghbor Asssted Dstrbuted Self-Healng Protocol for Compromsed Node Recovery n Wreless Sensor recovery process where a healthy sensor gves recovery to a sck and compromsed sensor. And smlarly two sck sensors gve recovery to a compromsed sensor. Fgure 2: Network self-healng for compromsed node recovery V. Smulaton Envronment Fgure 3 shows an envronment of wreless sensor networks. The sze of network s 100X100 meter square n 2-dmentonal area A. Thrty sensors are deployed randomly n ths area. So the network consst of a set of sensor nodes S such that S { S1, S2,..., S30}.The network s statc where each sensor s s located at ts random locaton dentfed by a coordnate ( x, y ). Each sensor s dentfed by a unque number known as Identfcaton (ID) number. Fgure 3: Randomly deployed wreless sensor networks Each sensor node dentfes ts one hope neghbors that falls wthn ts lmted communcaton range. Fgure 3 shows a lnk between a sensor node and ts one hope neghborng sensor nodes. Neghbor of each node are shown n Table 2. Table 2:Sngle Hope neghbor Node Neghbors 1 3,4,5,9,10,12,13,14,17,20,22,26 2 6,7,11,16,24,28,30 3 1,4,5,7,10,13,14,17,18,20,22,23,26 4 1,3,5,7,10,13,14,17,18,20,22,23,26 5 1,3,4,9,10,12,13,14,17,20,22,26 6 2,11,16,24,28,30 7 2,3,4,10,18,23, ,15,19,21,25,27,29 9 1,5,10,13,17,22 DOI: / Page

6 Ndsp: Neghbor Asssted Dstrbuted Self-Healng Protocol for Compromsed Node Recovery n Wreless Sensor 10 1,3,4,5,7,9,12,13,14,17,18,20,22, ,6,16,24,27,28, ,5,8,10,14,15,17,20,21,22,26, ,3,4,5,9,10,17, ,3,4,5,10,12,17,20,21,22,26, ,12,19,21,25,27, ,6,11,24,28, ,3,4,5,9,10,12,13,14,20,21,22, ,4,7,10,23, ,15,21,25,27, ,3,4,5,10,12,14,17,21,22, ,12,14,15,17,19,20,27, ,3,4,5,9,10,12,13,14,17,20, ,4,7, ,6,11,16,28, ,15,19,27, ,3,4,5,7,10,12,14,17,18,20, ,11,12,14,15,19,21,25, ,6,11,16,24, ,15,19,21,25, ,6,11,16,24,28 A. Compromsed Network In each round, the adversary node attacks over the network. It then controls a number of sensor nodes from the network. These sensor nodes are known as compromsed sensors. Fgure 4 shows a compromsed wreless sensor networks. Three types of nodes are presents n the compromsed wreless sensor network,.e. Healthy (H), Sck (S) and Compromsed (C). All three types of nodes (Healthy, Sck and Compromsed) are randomly selected to show the behavor of the network. Each types of sensor nodes selected randomly n the compromsed wreless sensor network are gven below: ID of Compromsed sensors: 3, 4, 5, 15, 17, 21, 23, 24, 27, 29. Sck sensors: 6, 8, 12, 13, 14, 16, 19, 22, 25, 28. Healthy sensors: 1, 2, 7, 9, 10, 11, 18, 20, 26, 30. Fgure 4: Network wth Compromsed Nodes B. Network Recovery Fgure 5 represent the process of network recovery n presented NDSP protocol. If a node s compromsed then t s recovered only when t update ts seed value from a healthy or two sck sensors. Smlarly a sck sensor updates ts seed value from healthy sensors. A sensor node from compromsed state s changes nto sck state only when t updates ts seed value from ahealthy sensor or from two dfferent sck sensors, then the stage of compromsed sensor becomes sck. Smlarly a sck sensor update ts seed value wth the help of a healthy sensor, t also becomes healthy. Fgure 6 shows a scenaro where each sensor node selects ts one randomly selected neghbor to update ts seed value. DOI: / Page

7 Ndsp: Neghbor Asssted Dstrbuted Self-Healng Protocol for Compromsed Node Recovery n Wreless Sensor a. Network before Recovery Fgure 5: Exchange of seed value n compromsed network Fgure 6: Healthy and sck sensors updatng seed value of ther one random neghbor Table 3 show the status of each sensor nodes whch are selected by a Healthy sensor node as a randomly selected neghbor. Table 3: Recovery gven by a healthy sensor to ts one randomly selected neghbor ID of Healthy sensor State of neghborng sensors 1 4: C 2 7:H 7 18:H 9 5:C 10 18:H 11 2:H 18 7:H 20 26:H 26 3:C 30 6:S Smlarly each sck sensor also selects ts one random neghbor to change ther state as shown n Table 4. In ths way each healthy and sck sensors partcpate n recovery process. DOI: / Page

8 Ndsp: Neghbor Asssted Dstrbuted Self-Healng Protocol for Compromsed Node Recovery n Wreless Sensor Table 4: Recovery gven by a sck sensor to ts one randomly selected neghbor ID of Healthy sensor State of neghborng sensors 6 28:S 8 21:C 12 5:C 13 10:H 14 10:H 16 6:S 19 27:C 22 10:H 25 29:C 28 16:S b. Network after Recovery Fgures 7 shows recovered wreless sensor network. The ID of each types of sensor node after recovery s gven n Table 4. Table 5 shows the status of those nodes that have recovered ther state from compromse state to sck state or healthy state and smlarly from a sck state to a healthy state. Fgure 7: Status of nodes after recovery Table 5: Sensor nodeidafter recovery Compromsed Sensors Healthy Sensors Sck Sensors Table 6:Sensor state after recovery Sensors ID wth state before recovery Recovered state 3:C S 4:C S 5:C S 6:S H DOI: / Page

9 Ndsp: Neghbor Asssted Dstrbuted Self-Healng Protocol for Compromsed Node Recovery n Wreless Sensor VI. Smulaton Results Network lfetme s measured n terms of number of healthy, compromsed and sck sensor nodes wth respect to dfferent number of compromsed sensor nodes. Fgure 8: Network Lfetme of Healthy Sensor wth ncreasng Number of Compromsed Sensor Nodes A. Network Lfe Tme Wth Dfferent Compromse Rato Network lfetme n terms of healthy sensor nodes s measured as the number of sensor nodes stll healthy by recovery process n presence of compromsed sensor nodes. Number of compromsed nodesare ncreased from 90 sensors to 95,100,105,110,115to chck the behavor of the network. The smulaton s run for the network tll more than 10% nodes are healthy or n other words more than 90% of the total number of nodes are not compromsedas shown n Fgure 8. The lfetme of network s 100 number of rounds when number of compromsed sensor nodes n each round are 90 whereas more than 80% nodes are de befor 25 number of rounds when the number of compromsed sensor nodes n each round are 115. Smlarly number of compromsed sensor nodes wth dfferent compromsed raton s shown n Fgure 9. When the number of compromsed sensor nodes n each round s 115, the total numbers of sensor nodes that are compromsed n the network are ncreased to 360 sensors after 25 numbers of rounds. On the other hand when the number of compromsed sensor nodes n each round s 90 then the total numbers of compromsed sensor nodes n the network are 360 sensors after 95 numbers of rounds. Fgure 9:Lfetme of compromsed Sensor wth Varable Number of Compromsed Sensor Nodes Fgure 10 shows network lfetme for sck sensor wth same compromsed rato,.e. 90 compromsed sensor to 115 number of compromsed sensor n each round. The numbers of sck sensors ncreases n each round for the frst 15 rounds only. When 80% of the sensors are compromsed, the numbers of sck sensors decreases due to network recovery by healthy and sck sensors. Otherwse all the healthy sensors n the network changes to sck state and number of sck and compromsed sensors ncreases. DOI: / Page

10 Ndsp: Neghbor Asssted Dstrbuted Self-Healng Protocol for Compromsed Node Recovery n Wreless Sensor Fgure 10:Lfetme of sck Sensor wth Varable Number of Compromsed Sensor Nodes B. Status of Sck, Healthy and Compromsed Sensors wth Fx Compromse Rato The network behavor wth fx compromsed rato,.e. 50 numbers of compromsed sensors n each round are shown n Fgure 11. The fgure represents total number of sck, healthy and compromsed sensors n each round where X-axs represents the number of rounds and Y-axs represents total number of healthy, sck or compromsed sensor nodes. Compromsed sensors are represented by red lne n the graph. Healthy and sck sensors are represented by green and blue lnes respectvely. In case of compromsed sensors, 330 sensor nodes are compromsed tll round number 22. In case of healthy sensors, the number of sensor nodes rses to 400 between 0-3 rounds and then falls back to 20 nodes at 65 th round whch clearly represents the network lfetme of healthy sensors n the graph. In case of sck sensors, the number of sensor nodes rses to 75 between 0-5 rounds and goes on varyng (rse and fall) after ffth round. The number of sck sensors falls to 0 nodes after 78 th round. Fgure 11:Network Lfetme Wth Statc Number of Compromsed Sensor Nodes VII. Concluson In ths research paper, we presented a NDSP: Neghbor asssted Dstrbuted Self-healng Protocol for compromsed node recovery n wreless sensor networks.the scheme s used n compromsed wreless sensor networks to recover most of the compromsed sensor nodes from compromsed and sck state. The recovery scheme presented n NDSP recoversa sngle sensor node by a healthy or sck sensors but our future work for recovery s mult node recovery where a healthy sensor gves recovery to ts more than one random neghbor n the network. The future model of NDSP s also based on the concept of centralzed ntruson detecton. DOI: / Page

11 Ndsp: Neghbor Asssted Dstrbuted Self-Healng Protocol for Compromsed Node Recovery n Wreless Sensor References [1]. V. Nak, S. Bapat, and M. Gouda, Whsper, local secret mantenance n sensor networks," n Prncples of Dependable System, [2]. Hu, F.and Sharma, N. 2005, Securty consderatons n ad hoc sensor networks, Ad Hoc Networks (Elsever) 3, 1, [3]. R. D. Petro, C. Sorente, A. Spognard, and G. Tsudk, data survval n unattended sensor networks," n IEEE PERCOM'08, March [4]. G. Itks and L. Reyzn, Sbr, sgner-base ntruson-reslent sgnatures." n Crypto'02, [5]. Y. Dods, J. Katz, S. Xu, and M. Yung, Key-nsulated publc key cryptosystems," n Eurocrypt'02, May [6]. MA, D. and Tsudk, G. DISH: Dstrbuted self-healng n unattended wreless sensor networks. In 10th Internatonal Symposum on Stablzaton, Safety, and Securty of Dstrbuted Systems (SSS 08) , [7]. M.N.Huhns, V.T. Holderfeld, R.L. Guterrez, Robust software va agent-based redundancy,aamas'03, 2003 [8]. Blundo, C, D, Arco, P. and Lsto, A New Self-healng Key Dstrbuton Scheme. Proc. Eghth IEEE Int. Symp. Computer Commun, vol. 2, pp , [9]. Canett, R. and Herzberg, Mantanng securty n the presence of transent faults In 14th Annual IACR Crypto Conference (Crypto 94) [10]. B. Parno, A. Perrg and V. Glgor, Dstrbuted detecton of node replcaton attacks n sensor networks In IEEE Symposum on Securty and Prvacy, DOI: / Page

Constructing Minimum Connected Dominating Set: Algorithmic approach

Constructing Minimum Connected Dominating Set: Algorithmic approach Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments Internatonal Journal of u- and e- ervce, cence and Technology Vol8, o 7 0), pp7-6 http://dxdoorg/07/unesst087 ecurty Enhanced Dynamc ID based Remote ser Authentcaton cheme for ult-erver Envronments Jun-ub

More information

Efficient Distributed File System (EDFS)

Efficient Distributed File System (EDFS) Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate

More information

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS

DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS Arun Avudanayagam Yuguang Fang Wenjng Lou Department of Electrcal and Computer Engneerng Unversty of Florda Ganesvlle, FL 3261

More information

Wightman. Mobility. Quick Reference Guide THIS SPACE INTENTIONALLY LEFT BLANK

Wightman. Mobility. Quick Reference Guide THIS SPACE INTENTIONALLY LEFT BLANK Wghtman Moblty Quck Reference Gude THIS SPACE INTENTIONALLY LEFT BLANK WIGHTMAN MOBILITY BASICS How to Set Up Your Vocemal 1. On your phone s dal screen, press and hold 1 to access your vocemal. If your

More information

Extending Network Life by Using Mobile Actors in Cluster-based Wireless Sensor and Actor Networks

Extending Network Life by Using Mobile Actors in Cluster-based Wireless Sensor and Actor Networks Extendng Networ Lfe by Usng Moble Actors n Cluster-based Wreless Sensor and Actor Networs Nauman Aslam, Wllam Phllps, Wllam Robertson and S. Svaumar Department of Engneerng Mathematcs & Internetworng Dalhouse

More information

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

Distributed Resource Scheduling in Grid Computing Using Fuzzy Approach

Distributed Resource Scheduling in Grid Computing Using Fuzzy Approach Dstrbuted Resource Schedulng n Grd Computng Usng Fuzzy Approach Shahram Amn, Mohammad Ahmad Computer Engneerng Department Islamc Azad Unversty branch Mahallat, Iran Islamc Azad Unversty branch khomen,

More information

Real-Time Guarantees. Traffic Characteristics. Flow Control

Real-Time Guarantees. Traffic Characteristics. Flow Control Real-Tme Guarantees Requrements on RT communcaton protocols: delay (response s) small jtter small throughput hgh error detecton at recever (and sender) small error detecton latency no thrashng under peak

More information

Two-Factor User Authentication in Multi-Server Networks

Two-Factor User Authentication in Multi-Server Networks Internatonal Journal of ecurty and Its Applcatons Vol. 6, No., Aprl, 0 Two-Factor ser Authentcaton n Mult-erver Networks Chun-Ta L, Ch-Yao Weng,* and Chun-I Fan Department of Informaton Management, Tanan

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

TN348: Openlab Module - Colocalization

TN348: Openlab Module - Colocalization TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

Distributed Topology Control for Power Efficient Operation in Multihop Wireless Ad Hoc Networks

Distributed Topology Control for Power Efficient Operation in Multihop Wireless Ad Hoc Networks Dstrbuted Topology Control for Power Effcent Operaton n Multhop Wreless Ad Hoc Networks Roger Wattenhofer L L Paramvr Bahl Y-Mn Wang Mcrosoft Research CS Dept. Cornell Unversty Mcrosoft Research Mcrosoft

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

User Authentication Based On Behavioral Mouse Dynamics Biometrics

User Authentication Based On Behavioral Mouse Dynamics Biometrics User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA

More information

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Overvew 2 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Introducton Mult- Smulator MASIM Theoretcal Work and Smulaton Results Concluson Jay Wagenpfel, Adran Trachte Motvaton and Tasks Basc Setup

More information

Analysis of Collaborative Distributed Admission Control in x Networks

Analysis of Collaborative Distributed Admission Control in x Networks 1 Analyss of Collaboratve Dstrbuted Admsson Control n 82.11x Networks Thnh Nguyen, Member, IEEE, Ken Nguyen, Member, IEEE, Lnha He, Member, IEEE, Abstract Wth the recent surge of wreless home networks,

More information

Problem Set 3 Solutions

Problem Set 3 Solutions Introducton to Algorthms October 4, 2002 Massachusetts Insttute of Technology 6046J/18410J Professors Erk Demane and Shaf Goldwasser Handout 14 Problem Set 3 Solutons (Exercses were not to be turned n,

More information

Private Information Retrieval (PIR)

Private Information Retrieval (PIR) 2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market

More information

A Semi-Distributed Load Balancing Architecture and Algorithm for Heterogeneous Wireless Networks

A Semi-Distributed Load Balancing Architecture and Algorithm for Heterogeneous Wireless Networks A Sem-Dstrbuted oad Balancng Archtecture and Algorthm for Heterogeneous reless Networks Md. Golam Rabul Ala Choong Seon Hong * Kyung Hee Unversty, Korea rob@networkng.khu.ac.kr, cshong@khu.ac.kr Abstract

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

Combined SINR Based Vertical Handoff Algorithm for Next Generation Heterogeneous Wireless Networks

Combined SINR Based Vertical Handoff Algorithm for Next Generation Heterogeneous Wireless Networks Combned SINR Based Vertcal Handoff Algorthm for Next Generaton Heterogeneous Wreless Networks Kemeng Yang, Iqbal Gondal, Bn Qu and Laurence S. Dooley Faculty of Informaton Technology Monash Unversty Melbourne,

More information

Performance Comparison of a QoS Aware Routing Protocol for Wireless Sensor Networks

Performance Comparison of a QoS Aware Routing Protocol for Wireless Sensor Networks Communcatons and Network, 2016, 8, 45-55 Publshed Onlne February 2016 n ScRes. http://www.scrp.org/journal/cn http://dx.do.org/10.4236/cn.2016.81006 Performance Comparson of a QoS Aware Routng Protocol

More information

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 An Iteratve Soluton Approach to Process Plant Layout usng Mxed

More information

Efficient Content Distribution in Wireless P2P Networks

Efficient Content Distribution in Wireless P2P Networks Effcent Content Dstrbuton n Wreless P2P Networs Qong Sun, Vctor O. K. L, and Ka-Cheong Leung Department of Electrcal and Electronc Engneerng The Unversty of Hong Kong Pofulam Road, Hong Kong, Chna {oansun,

More information

A New Transaction Processing Model Based on Optimistic Concurrency Control

A New Transaction Processing Model Based on Optimistic Concurrency Control A New Transacton Processng Model Based on Optmstc Concurrency Control Wang Pedong,Duan Xpng,Jr. Abstract-- In ths paper, to support moblty and dsconnecton of moble clents effectvely n moble computng envronment,

More information

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems:

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems: Speed/RAP/CODA Presented by Octav Chpara Real-tme Systems Many wreless sensor network applcatons requre real-tme support Survellance and trackng Border patrol Fre fghtng Real-tme systems: Hard real-tme:

More information

Mobile Adaptive Distributed Clustering Algorithm for Wireless Sensor Networks

Mobile Adaptive Distributed Clustering Algorithm for Wireless Sensor Networks Internatonal Journal of Computer Applcatons (975 8887) Volume No.7, Aprl Moble Adaptve Dstrbuted Clusterng Algorthm for Wreless Sensor Networks S.V.Mansekaran Department of Informaton Technology Anna Unversty

More information

Video Proxy System for a Large-scale VOD System (DINA)

Video Proxy System for a Large-scale VOD System (DINA) Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,

More information

Detection of masquerade attacks on Wireless Sensor Networks

Detection of masquerade attacks on Wireless Sensor Networks Detecton of masquerade attacks on Wreless Sensor Networks Vjay Bhuse,, Ajay Gupta and Ala Al-Fuqaha Department of Computer Scence, Western Mchgan Unversty, alamazoo, MI 49008 Insttute of Securty Technology

More information

Resource and Virtual Function Status Monitoring in Network Function Virtualization Environment

Resource and Virtual Function Status Monitoring in Network Function Virtualization Environment Journal of Physcs: Conference Seres PAPER OPEN ACCESS Resource and Vrtual Functon Status Montorng n Network Functon Vrtualzaton Envronment To cte ths artcle: MS Ha et al 2018 J. Phys.: Conf. Ser. 1087

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

Cognitive Radio Resource Management Using Multi-Agent Systems

Cognitive Radio Resource Management Using Multi-Agent Systems Cogntve Rado Resource Management Usng Mult- Systems Jang Xe, Ivan Howtt, and Anta Raja Department of Electrcal and Computer Engneerng Department of Software and Informaton Systems The Unversty of North

More information

X- Chart Using ANOM Approach

X- Chart Using ANOM Approach ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

MobileGrid: Capacity-aware Topology Control in Mobile Ad Hoc Networks

MobileGrid: Capacity-aware Topology Control in Mobile Ad Hoc Networks MobleGrd: Capacty-aware Topology Control n Moble Ad Hoc Networks Jle Lu, Baochun L Department of Electrcal and Computer Engneerng Unversty of Toronto {jenne,bl}@eecg.toronto.edu Abstract Snce wreless moble

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

Secure Distributed Cluster Formation in Wireless Sensor Networks

Secure Distributed Cluster Formation in Wireless Sensor Networks Secure Dstrbuted Cluster Formaton n Wreless Sensor Networks Kun Sun Intellgent Automaton, Inc. ksun@-a-.com Pa Peng Opsware Inc. ppeng@opsware.com Clff Wang Army Research Offce clff.wang@us.army.ml Peng

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

DECA: distributed energy conservation algorithm for process reconstruction with bounded relative error in wireless sensor networks

DECA: distributed energy conservation algorithm for process reconstruction with bounded relative error in wireless sensor networks da Rocha Henrques et al. EURASIP Journal on Wreless Communcatons and Networkng (2016) 2016:163 DOI 10.1186/s13638-016-0662-9 RESEARCH Open Access DECA: dstrbuted energy conservaton algorthm for process

More information

Query Clustering Using a Hybrid Query Similarity Measure

Query Clustering Using a Hybrid Query Similarity Measure Query clusterng usng a hybrd query smlarty measure Fu. L., Goh, D.H., & Foo, S. (2004). WSEAS Transacton on Computers, 3(3), 700-705. Query Clusterng Usng a Hybrd Query Smlarty Measure Ln Fu, Don Hoe-Lan

More information

OPTIMAL CONFIGURATION FOR NODES IN MIXED CELLULAR AND MOBILE AD HOC NETWORK FOR INET

OPTIMAL CONFIGURATION FOR NODES IN MIXED CELLULAR AND MOBILE AD HOC NETWORK FOR INET OPTIMAL CONFIGURATION FOR NODE IN MIED CELLULAR AND MOBILE AD HOC NETWORK FOR INET Olusola Babalola D.E. Department of Electrcal and Computer Engneerng Morgan tate Unversty Dr. Rchard Dean Faculty Advsor

More information

Fast Retransmission of Real-Time Traffic in HIPERLAN/2 Systems

Fast Retransmission of Real-Time Traffic in HIPERLAN/2 Systems Fast Retransmsson of Real-Tme Traffc n HIPERLAN/ Systems José A Afonso and Joaqum E Neves Department of Industral Electroncs Unversty of Mnho, Campus de Azurém 4800-058 Gumarães, Portugal {joseafonso,

More information

Routing in Degree-constrained FSO Mesh Networks

Routing in Degree-constrained FSO Mesh Networks Internatonal Journal of Hybrd Informaton Technology Vol., No., Aprl, 009 Routng n Degree-constraned FSO Mesh Networks Zpng Hu, Pramode Verma, and James Sluss Jr. School of Electrcal & Computer Engneerng

More information

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour 6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the

More information

IMPACT OF RADIO MAP SIMULATION ON POSITIONING IN INDOOR ENVIRONTMENT USING FINGER PRINTING ALGORITHMS

IMPACT OF RADIO MAP SIMULATION ON POSITIONING IN INDOOR ENVIRONTMENT USING FINGER PRINTING ALGORITHMS IMPACT OF RADIO MAP SIMULATION ON POSITIONING IN INDOOR ENVIRONTMENT USING FINGER PRINTING ALGORITHMS Jura Macha and Peter Brda Unversty of Zlna, Faculty of Electrcal Engneerng, Department of Telecommuncatons

More information

Wishing you all a Total Quality New Year!

Wishing you all a Total Quality New Year! Total Qualty Management and Sx Sgma Post Graduate Program 214-15 Sesson 4 Vnay Kumar Kalakband Assstant Professor Operatons & Systems Area 1 Wshng you all a Total Qualty New Year! Hope you acheve Sx sgma

More information

HOMOMORPHIC ENCRYPTION SCHEMES: STEPS TO IMPROVE THE PROFICIENCY

HOMOMORPHIC ENCRYPTION SCHEMES: STEPS TO IMPROVE THE PROFICIENCY HOMOMORPHIC ENCRYPTION SCHEMES: STEPS TO IMPROVE THE PROFICIENCY Pallav 1 Masters n Technology, School of Future Studes and Plannng, DAVV, Indore (Inda) ABSTRACT Homomorphc encrypton schemes are malleable

More information

3. CR parameters and Multi-Objective Fitness Function

3. CR parameters and Multi-Objective Fitness Function 3 CR parameters and Mult-objectve Ftness Functon 41 3. CR parameters and Mult-Objectve Ftness Functon 3.1. Introducton Cogntve rados dynamcally confgure the wreless communcaton system, whch takes beneft

More information

Improvement ofmanik et al. s remote user authentication scheme

Improvement ofmanik et al. s remote user authentication scheme Improvement ofmank et al. s remote user authentcaton scheme Abstract Jue-Sam Chou, a,yaln Chen b Jyun-Yu Ln c a Department of Informaton Management, Nanhua Unversty Chay, 622, Tawan schou@mal.nhu.edu.tw

More information

Resource-Efficient Multi-Source Authentication Utilizing Split-Join One-Way Key Chain

Resource-Efficient Multi-Source Authentication Utilizing Split-Join One-Way Key Chain Resource-Effcent Mult-Source Authentcaton Utlzng Splt-Jon One-Way ey Chan Seonho Cho, un Sun, Hyeonsang Eom 3 Department of Computer Scence, Bowe State Unversty, Bowe, Maryland, U.S.A. Center for Secure

More information

Enhanced Watermarking Technique for Color Images using Visual Cryptography

Enhanced Watermarking Technique for Color Images using Visual Cryptography Informaton Assurance and Securty Letters 1 (2010) 024-028 Enhanced Watermarkng Technque for Color Images usng Vsual Cryptography Enas F. Al rawashdeh 1, Rawan I.Zaghloul 2 1 Balqa Appled Unversty, MIS

More information

Efficient Backoff Algorithm in Wireless Multihop Ad Hoc Networks

Efficient Backoff Algorithm in Wireless Multihop Ad Hoc Networks 1 Chen-Mn Wu, 2 Hu-Ka Su, 3 Wang-Has Yang *1,Correspondng Author Nanhua Unversty, cmwu@mal.nhu.edu.tw 2 Natonal Formosa Unversty, hksu@nfu.edu.tw 3 Hsupng Insttute of Technology, yangwh@mal.ht.edu.tw do:10.4156/jact.vol3.

More information

Maintaining temporal validity of real-time data on non-continuously executing resources

Maintaining temporal validity of real-time data on non-continuously executing resources Mantanng temporal valdty of real-tme data on non-contnuously executng resources Tan Ba, Hong Lu and Juan Yang Hunan Insttute of Scence and Technology, College of Computer Scence, 44, Yueyang, Chna Wuhan

More information

Transmit Power Control Algorithms in IEEE h Based Networks

Transmit Power Control Algorithms in IEEE h Based Networks Transmt Power Control Algorthms n IEEE 82.h Based Networks Andreas J. Könsgen, Zakr Hossan, Carmelta Görg Department of Communcaton Networks Center for Informaton and Communcaton Technology (IKOM) Unversty

More information

Wireless Sensor Network Localization Research

Wireless Sensor Network Localization Research Sensors & Transducers 014 by IFSA Publshng, S L http://wwwsensorsportalcom Wreless Sensor Network Localzaton Research Lang Xn School of Informaton Scence and Engneerng, Hunan Internatonal Economcs Unversty,

More information

Ensuring Basic Security and Preventing Replay Attack in a Query Processing Application Domain in WSN

Ensuring Basic Security and Preventing Replay Attack in a Query Processing Application Domain in WSN Ensurng Basc Securty and Preventng Replay Attack n a Query Processng Applcaton Doman n WSN Amrta Ghosal 1, Subr Halder 1, Sanjb Sur 2, Avshek Dan 2, and Spra DasBt 2 1 Dept. of Comp. Sc. & Engg, Dr. B.

More information

An Improved User Authentication and Key Agreement Scheme Providing User Anonymity

An Improved User Authentication and Key Agreement Scheme Providing User Anonymity 35 JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY, VOL. 9, NO. 4, DECEMBER 0 An Improved User Authentcaton and Key Agreement Scheme Provdng User Anonymty Ya-Fen Chang and Pe-Yu Chang Abstract When accessng

More information

Efficient QoS Provisioning at the MAC Layer in Heterogeneous Wireless Sensor Networks

Efficient QoS Provisioning at the MAC Layer in Heterogeneous Wireless Sensor Networks Effcent QoS Provsonng at the MAC Layer n Heterogeneous Wreless Sensor Networks M.Soul a,, A.Bouabdallah a, A.E.Kamal b a UMR CNRS 7253 HeuDaSyC, Unversté de Technologe de Compègne, Compègne Cedex F-625,

More information

IR-HARQ vs. Joint Channel-Network coding for Cooperative Wireless Communication

IR-HARQ vs. Joint Channel-Network coding for Cooperative Wireless Communication Cyber Journals: ultdscplnary Journals n Scence and Technology, Journal of Selected Areas n Telecommuncatons (JSAT), August Edton, 2 IR-HARQ vs. Jont Channel-Network codng for Cooperatve Wreless Communcaton

More information

HYMN: AN INTEREST-BASED MULTIMEDIA PROVIDING SYSTEM FOR HYBRID WIRELESS NETWORKS

HYMN: AN INTEREST-BASED MULTIMEDIA PROVIDING SYSTEM FOR HYBRID WIRELESS NETWORKS HYMN: AN INTEREST-BASED MULTIMEDIA PROVIDING SYSTEM FOR HYBRID WIRELESS NETWORKS Adran Andronache 1 ), Matthas R. Brust 2 ), Steffen Rothkugel 3 ) Abstract The concept of self-organzaton already exsts

More information

THere are increasing interests and use of mobile ad hoc

THere are increasing interests and use of mobile ad hoc 1 Adaptve Schedulng n MIMO-based Heterogeneous Ad hoc Networks Shan Chu, Xn Wang Member, IEEE, and Yuanyuan Yang Fellow, IEEE. Abstract The demands for data rate and transmsson relablty constantly ncrease

More information

An Entropy-Based Approach to Integrated Information Needs Assessment

An Entropy-Based Approach to Integrated Information Needs Assessment Dstrbuton Statement A: Approved for publc release; dstrbuton s unlmted. An Entropy-Based Approach to ntegrated nformaton Needs Assessment June 8, 2004 Wllam J. Farrell Lockheed Martn Advanced Technology

More information

A Variable Threats Based Self-Organization Scheme for Wireless Sensor Networks

A Variable Threats Based Self-Organization Scheme for Wireless Sensor Networks 009 Thrd Internatonal Conference on Sensor Technologes and Applcatons A Varable Threats Based Self-Organzaton Scheme for Wreless Sensor Networks Jan Zhong School of Computer Scence and Informaton Technology

More information

Helsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr)

Helsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr) Helsnk Unversty Of Technology, Systems Analyss Laboratory Mat-2.08 Independent research projects n appled mathematcs (3 cr) "! #$&% Antt Laukkanen 506 R ajlaukka@cc.hut.f 2 Introducton...3 2 Multattrbute

More information

A Low-Overhead Routing Protocol for Ad Hoc Networks with selfish nodes

A Low-Overhead Routing Protocol for Ad Hoc Networks with selfish nodes A Low-Oerhead Routng Protocol for Ad Hoc Networks wth selfsh nodes Dongbn Wang 1, Xaofeng Wang 2, Xangzhan Yu 3, Kacheng Q 1, Zhbn Xa 1 1 School of Software Engneerng, Bejng Unersty of Posts and Telecommuncatons,100876,

More information

Concurrent Apriori Data Mining Algorithms

Concurrent Apriori Data Mining Algorithms Concurrent Apror Data Mnng Algorthms Vassl Halatchev Department of Electrcal Engneerng and Computer Scence York Unversty, Toronto October 8, 2015 Outlne Why t s mportant Introducton to Assocaton Rule Mnng

More information

VISUAL SELECTION OF SURFACE FEATURES DURING THEIR GEOMETRIC SIMULATION WITH THE HELP OF COMPUTER TECHNOLOGIES

VISUAL SELECTION OF SURFACE FEATURES DURING THEIR GEOMETRIC SIMULATION WITH THE HELP OF COMPUTER TECHNOLOGIES UbCC 2011, Volume 6, 5002981-x manuscrpts OPEN ACCES UbCC Journal ISSN 1992-8424 www.ubcc.org VISUAL SELECTION OF SURFACE FEATURES DURING THEIR GEOMETRIC SIMULATION WITH THE HELP OF COMPUTER TECHNOLOGIES

More information

Privacy Models for RFID Authentication Protocols

Privacy Models for RFID Authentication Protocols Prvacy Models for RFID Authentcaton Protocols Jan Shen 1,2, Jn Wang 1,2, Yuan Me 1,2, Ilyong Chung 3 1 Jangsu Engneerng Center of Network Montorng, Nanjng Unversty of Informaton Scence &echnology, Nanjng,210044,Chna

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) ,

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) , VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

IP Camera Configuration Software Instruction Manual

IP Camera Configuration Software Instruction Manual IP Camera 9483 - Confguraton Software Instructon Manual VBD 612-4 (10.14) Dear Customer, Wth your purchase of ths IP Camera, you have chosen a qualty product manufactured by RADEMACHER. Thank you for the

More information

A NOTE ON FUZZY CLOSURE OF A FUZZY SET

A NOTE ON FUZZY CLOSURE OF A FUZZY SET (JPMNT) Journal of Process Management New Technologes, Internatonal A NOTE ON FUZZY CLOSURE OF A FUZZY SET Bhmraj Basumatary Department of Mathematcal Scences, Bodoland Unversty, Kokrajhar, Assam, Inda,

More information

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana

More information

A Topology-aware Random Walk

A Topology-aware Random Walk A Topology-aware Random Walk Inkwan Yu, Rchard Newman Dept. of CISE, Unversty of Florda, Ganesvlle, Florda, USA Abstract When a graph can be decomposed nto clusters of well connected subgraphs, t s possble

More information

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints Australan Journal of Basc and Appled Scences, 2(4): 1204-1208, 2008 ISSN 1991-8178 Sum of Lnear and Fractonal Multobjectve Programmng Problem under Fuzzy Rules Constrants 1 2 Sanjay Jan and Kalash Lachhwan

More information

USER CLASS BASED QoS DIFFERENTIATION IN e WLAN

USER CLASS BASED QoS DIFFERENTIATION IN e WLAN USER CLASS BASED QoS DIFFERENTIATION IN 802.11e WLAN Amt Kejrwal, Ratan Guha School of Computer Scence Unversty of Central Florda Orlando, FL-32816 USA E-mal: {kejrwal, guha}@cs.ucf.edu Manak Chatterjee

More information

PERFORMANCE ANALYSIS OF ROUTING ALGORITHMS OF RD-C/TDMA PACKET RADIO NETWORKS UNDER DYNAMIC RANDOM TOPOLOGY1

PERFORMANCE ANALYSIS OF ROUTING ALGORITHMS OF RD-C/TDMA PACKET RADIO NETWORKS UNDER DYNAMIC RANDOM TOPOLOGY1 PERFORMANCE ANALYSIS OF ROUTING ALGORITHMS OF 1- RD-C/TDMA PACKET RADIO NETWORKS UNDER DYNAMIC RANDOM TOPOLOGY1 A Thess Presented to The Faculty of the College of Engneerng and Technology Oho Unversty

More information

Dynamic Bandwidth Provisioning with Fairness and Revenue Considerations for Broadband Wireless Communication

Dynamic Bandwidth Provisioning with Fairness and Revenue Considerations for Broadband Wireless Communication Ths full text paper was peer revewed at the drecton of IEEE Communcatons Socety subject matter experts for publcaton n the ICC 008 proceedngs. Dynamc Bandwdth Provsonng wth Farness and Revenue Consderatons

More information

Adaptive Network Resource Management in IEEE Wireless Random Access MAC

Adaptive Network Resource Management in IEEE Wireless Random Access MAC Adaptve Network Resource Management n IEEE 802.11 Wreless Random Access MAC Hao Wang, Changcheng Huang, James Yan Department of Systems and Computer Engneerng Carleton Unversty, Ottawa, ON, Canada Abstract

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

Adaptive Energy and Location Aware Routing in Wireless Sensor Network

Adaptive Energy and Location Aware Routing in Wireless Sensor Network Adaptve Energy and Locaton Aware Routng n Wreless Sensor Network Hong Fu 1,1, Xaomng Wang 1, Yngshu L 1 Department of Computer Scence, Shaanx Normal Unversty, X an, Chna, 71006 fuhong433@gmal.com {wangxmsnnu@hotmal.cn}

More information

Convolutional interleaver for unequal error protection of turbo codes

Convolutional interleaver for unequal error protection of turbo codes Convolutonal nterleaver for unequal error protecton of turbo codes Sna Vaf, Tadeusz Wysock, Ian Burnett Unversty of Wollongong, SW 2522, Australa E-mal:{sv39,wysock,an_burnett}@uow.edu.au Abstract: Ths

More information

Mathematics 256 a course in differential equations for engineering students

Mathematics 256 a course in differential equations for engineering students Mathematcs 56 a course n dfferental equatons for engneerng students Chapter 5. More effcent methods of numercal soluton Euler s method s qute neffcent. Because the error s essentally proportonal to the

More information

3D vector computer graphics

3D vector computer graphics 3D vector computer graphcs Paolo Varagnolo: freelance engneer Padova Aprl 2016 Prvate Practce ----------------------------------- 1. Introducton Vector 3D model representaton n computer graphcs requres

More information

Evaluation of Parallel Processing Systems through Queuing Model

Evaluation of Parallel Processing Systems through Queuing Model ISSN 2278-309 Vkas Shnde, Internatonal Journal of Advanced Volume Trends 4, n Computer No.2, March Scence - and Aprl Engneerng, 205 4(2), March - Aprl 205, 36-43 Internatonal Journal of Advanced Trends

More information

A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE

A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE 1 TAO LIU, 2 JI-JUN XU 1 College of Informaton Scence and Technology, Zhengzhou Normal Unversty, Chna 2 School of Mathematcs

More information

Module Management Tool in Software Development Organizations

Module Management Tool in Software Development Organizations Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,

More information

Performance analysis of distributed cluster-based MAC protocol for multiuser MIMO wireless networks

Performance analysis of distributed cluster-based MAC protocol for multiuser MIMO wireless networks RESEARCH Open Access Performance analyss of dstrbuted cluster-based MAC protocol for multuser MIMO wreless networks Azadeh Ettefagh *, Marc Kuhn, Celal Eşl and Armn Wttneben Abstract It s known that multuser

More information

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research Schedulng Remote Access to Scentfc Instruments n Cybernfrastructure for Educaton and Research Je Yn 1, Junwe Cao 2,3,*, Yuexuan Wang 4, Lanchen Lu 1,3 and Cheng Wu 1,3 1 Natonal CIMS Engneerng and Research

More information

Vol. 4, No. 4 April 2013 ISSN Journal of Emerging Trends in Computing and Information Sciences CIS Journal. All rights reserved.

Vol. 4, No. 4 April 2013 ISSN Journal of Emerging Trends in Computing and Information Sciences CIS Journal. All rights reserved. WP A Tree Based Response Tme Algorthm for Event Drven Wreless Sensor Networks 1 Itu Sngdh, 2 Saurabh Kumar 1 Department of Computer Scence and Engneerng, Brla Insttute of Technology, Mesra, Ranch, Jharkhand,

More information

Efficient Video Coding with R-D Constrained Quadtree Segmentation

Efficient Video Coding with R-D Constrained Quadtree Segmentation Publshed on Pcture Codng Symposum 1999, March 1999 Effcent Vdeo Codng wth R-D Constraned Quadtree Segmentaton Cha-Wen Ln Computer and Communcaton Research Labs Industral Technology Research Insttute Hsnchu,

More information

Type-2 Fuzzy Non-uniform Rational B-spline Model with Type-2 Fuzzy Data

Type-2 Fuzzy Non-uniform Rational B-spline Model with Type-2 Fuzzy Data Malaysan Journal of Mathematcal Scences 11(S) Aprl : 35 46 (2017) Specal Issue: The 2nd Internatonal Conference and Workshop on Mathematcal Analyss (ICWOMA 2016) MALAYSIAN JOURNAL OF MATHEMATICAL SCIENCES

More information

Solution Brief: Creating a Secure Base in a Virtual World

Solution Brief: Creating a Secure Base in a Virtual World Soluton Bref: Creatng a Secure Base n a Vrtual World Soluton Bref: Creatng a Secure Base n a Vrtual World Abstract The adopton rate of Vrtual Machnes has exploded at most organzatons, drven by the mproved

More information

HIERARCHICAL SCHEDULING WITH ADAPTIVE WEIGHTS FOR W-ATM *

HIERARCHICAL SCHEDULING WITH ADAPTIVE WEIGHTS FOR W-ATM * Copyrght Notce c 1999 IEEE. Personal use of ths materal s permtted. However, permsson to reprnt/republsh ths materal for advertsng or promotonal purposes or for creatng new collectve wors for resale or

More information