Defending Against Vehicular Rogue APs

Size: px
Start display at page:

Download "Defending Against Vehicular Rogue APs"

Transcription

1 This paper was presente as part of the main technical program at IEEE INFOCOM 2011 Defening Against Vehicular Rogue APs Hao Han, Fengyuan Xu, Chiu C. Tan, Yifan Zhang, Qun Li College of William an Mary, Williamsburg, VA, USA {hhan, fxu, cct, yzhang, Abstract This paper consiers vehicular rogue access points (APs) that rogue APs are set up in moving vehicles to mimic legitimate roasie APs to lure users to associate to them. Due to its mobility, a vehicular rogue AP is able to maintain a long connection with users. Thus, the aversary has more time to launch various attacks to steal users private information. We propose a practical etection scheme base on the comparison of Receive Signal Strength (RSS) to prevent users from connecting to rogue APs. The basic iea of our solution is to force APs (both legitimate an fake) to report their GPS locations an transmission powers in beacons. Base on such information, users can valiate whether the measure RSS matches the value estimate from the AP s location, transmission power, an its own GPS location. Furthermore, we consier the impact of path loss an shaowing an propose a metho base on rate aaption to eal with avance rogue APs. We implemente our etection technique on commercial off-the-shelf evices incluing wireless cars, antennas, an GPS moules to evaluate the efficacy of our scheme. I. INTRODUCTION The proliferation of IEEE access points (APs) in public spaces has provie users easy access to the Internet anytime an anywhere. Many city-wie wifi networks have alreay been eploye in the real worl. For instance, Google provies a free wireless Internet service to the city of Mountain View [1]. APs are also propose for eployment along the roa for vehicular networks. We believe future vehicles will be equippe with wireless capabilities that enable a car to communicate over the Internet through roasie APs (also known as Drive-thru Internet [2], [3]), an this will become a reality in the next few years. Due to the ubiquitous eployment of APs, the problem of rogue access points (also known as rogue APs) has emerge as a well recognize security issue. A rogue AP is a malicious AP that pretens to be a legitimate AP to inuce users to connect. Once an innocent user has associate to a rogue AP, the aversary can then launch various attacks by manipulating users packets. For example, the aversary can launch phishing attacks to reirect a user s web page request to a fake location, seeking to steal the user s private information such as bank account numbers an passwors. In a vehicular network, rogue APs can be classifie into two categories: static an mobile. In the first category, a rogue AP is set up at a fixe place, for example in public hotspots such as a builing facing a busy roa. Since this type of rogue AP usually keeps active for a long time an uses the same infrastructure to access Internet, it is relatively not ifficult for aministrators to etect such a rogue AP. Previous work [4] [14] has alreay propose several methos to etect static rogue APs. However, there is little work on how to efen against a mobile rogue AP where the rogue AP is set up in a moving vehicle to attract users on the roa. Due to its mobility, such a rogue AP is able to maintain a long connection with users. Thus, the aversary has more time to launch various attacks to steal users private information. Detecting a vehicular rogue AP is challenging because the uration for a vehicle connecte to any single AP is short. When the signal strength of a connecte AP is less than a threshol, the client has to take a hanoff [15] an re-associate to another AP with the strongest signal strength. Hence, the time left for the rogue AP etection is restricte. We nee a more efficient etecting scheme, since it is meaningless for a client to ientify a legitimate AP while such an AP is out of the communication range. In aition, it is more ifficult to prevent the installation of a vehicular rogue AP, since this type of rogue AP is always moving. Even if extensive sniffers are eploye along the roa, the vehicular rogue will have move to a ifferent location before the authority can etect it. Furthermore, we consier a sophisticate vehicular rogue AP, which can mimic the roasie AP to avoi simple etection. For example, we cannot simply use the uration of the association time to inicate whether a connecte AP is a rogue AP, since the aversary can control the rogue AP to reply fake messages irectly. Consiering the above challenges, we propose a practical etection scheme that prevents user from connecting to a vehicular rogue AP. Our solution imposes minimal moification to existing wireless stanar. The whole etection process relies on the knowlege of the transmission powers an the locations of APs in the vicinity. The clients leverage the receive signal strength (RSS) of beacons which are broacaste by the APs perioically, an tune the transmission rate of probe requests to etect rogue APs. To the best of our knowlege, we are the first to consier the vehicular rogue AP problem an propose a practical etection solution. Our main contributions are liste as follows: 1) We are the first to consier the vehicular rogue AP problem an emonstrate the feasibility of this type of rogue AP. 2) We propose a practical metho to efen against vehicular rogue APs incluing basic attacks an sophisticate attacks. Our solution is user-centric an can apply to base vehicular networks. Our metho can be implemente with little moification to current stanar. U.S. Government work not protecte by U.S. copyright 1665

2 x 3) We implement our schemes using commercial off-theshelf evices incluing wireless cars, antennas, an GPS moules. Also, we perform extensive experiments on realistic roa conitions to evaluate our schemes. The rest of the paper is organize as follows. Section II iscusses the relate work. Section III escribes some backgroun incluing motivation, problem formulation, an aversary moel respectively. Our etection algorithm is etaile in Section IV. Our implementation an evaluation results are presente in Section V. We iscuss the limitation of our solution in Section VI an conclue in Section VII. II. RELATED WORK The threat of rogue APs has attracte the attention of both inustrial an acaemic researchers. Previous research has been mainly focuse on etecting static rogue APs in an enterprise or a hotspot scenario. Typically, existing schemes can be classifie into to three categories. The first category relies on sniffers to monitor wireless traffic. These sniffers usually scan spectrum to examine the 2.4 an 5GHz frequencies. Once etecting any traffic from unauthorize APs, they will alert the aministrator. This approach usually emans well controlle infrastructure such as enterprise networks, where the aministrator can easily eploy sniffers an cut off the access of rogue APs to Internet. Some commercial proucts [16] [18] have been evelope following this technique. In acaemic community, an architecture for iagnosing various faults in WLAN incluing rogue APs, is presente in [10], where multiple APs an mobile clients installing a special iagnostic software cooperate to perform RF monitoring. In [13], another monitoring infrastructure calle DAIR is propose, where USB wireless aapters are attache to esktop machines for capturing more comprehensive traffic to reuce false etection rate. Different from this type of solution, our efening scheme oes not reply on sniffers. That is because a small amount of sniffers may not catch vehicular rogue APs well, but extensive eployment of sniffers is impractical. The technique use in the secon category is leveraging fingerprints to ientify rogue APs. Since an avance aversary can easily spoof a rogue AP s MAC aress, SSID, venor name, an configuration to escape from the etection, the previous work often aopte the fingerprints that cannot be easily forge. For example, the work by [19] calculate every AP s clock skew by collecting their beacons an probe responses. Since clock skew is ifficult to forge, any AP with unknown clock skew is ientifie as a rogue AP. In aition to clock skew, RSS values [20], raio frequency variations [21] are also use. However, a major rawback of this type of schemes is that the AP valiation requires to access a atabase containing the fingerprints of all legitimate APs. This atabase may not be available for en users before they connect to the AP. Our solution iffers from such schemes in that we o not assume the clients know the fingerprints of legitimate APs in avance. Therefore, our etection scheme can apply to not only network aministrators but also en users who use the wireless network for the first time. The last category exploits the features of wireless traffic to etect the presence of rogue APs [4] [6], [9]. In [4], a practical timing base scheme is propose. The metho employs the roun trip time between user an local DNS server to etect rogue APs without assistance from network aministrators. [11] utilizes the immeiate switch connecting rogue APs to measure roun trip time of TCP traffic. Other work by [12], [14] uses the spacing between packets to istinguish wireless networks from wire networks. In [6], inter-arrival time of ACK-pair is use to etect rogue APs. In [9], wire verifier an wireless sniffers are eploye at the same time to etect layer-3 rogue APs. Since we consier a new type of rogue AP, it is unclear whether previous solutions coul work in vehicular networks. Although some schemes might work, it may spen much time on analyzing the network traffic. Our solution is more efficient an en-user centric. III. BACKGROUND In this section, we iscuss some backgroun to our vehicular rogue AP problem, incluing problem formulation, motivation an aversary moel. A. Problem formulation When a vehicular client tries to access Internet through roasie APs, the client will first scan all wireless channels. After scanning, the client coul iscover multiple APs within its communication range, where some APs are legitimate an some are rogue. Accoring to current stanar, a client will pick the AP with strongest signal strength to associate. To inuce clients, the aversary will choose to rive a car along the roa with a rogue AP insie. Since the rogue AP is closer to vehicular clients, the rogue AP s signal strength is very likely to be greater than a roasie AP. In aition, a sophisticate aversary coul control the rogue AP elicately to avoi etection. For example, the aversary can forge a vali SSID an MAC aress, or irectly reply fake messages without accessing Internet first to avoi some timing-base etections. The objective of this paper is to help clients to avoi associating to such a smart vehicular rogue AP. Our solution can be viewe as a complementary part to existing AP selection policies. Fig. 1. Rogue AP (a) Rogue AP (b) x Roasie AP Cell tower Illustration of two typical setups for vehicular rogue APs 1666

3 Vehicular rogue AP is assume to be launche in a car with two wireless interfaces. The first interface pretens to be a vali AP, an the other interface is use to connect to Internet. Fig. 1 illustrates two typical setups for a vehicular rogue AP. In the first setting (a), the rogue AP is equippe with two wireless aapters: the first aapter is configure to AP moe, whereas the secon aapter is set to station moe for connection to a real roasie AP. Nevertheless, the rogue AP oes not reply on roasie APs. In the alternative setting (b), the first interface still pretens to be an AP, but the secon interface connects to a cellular tower. For both settings, a brige is set between two interfaces. Once a packet is receive by the first interface, it will be forware to the secon interface, an vice versa. The aversary may choose either setting to launch attacks. We seek to etect rogue APs uner both settings. In this paper, we o not consier AP is capable of using RADIUS-base 802.1X authentication of users, since it requires each vehicle to have the correct key to access the network. While this may be possible, for example, every car when registere with the DMV is issue the appropriate creentials, it is unclear how well this will work in practice. Thus, we only consier the open network where any car can connect. B. Practicality of vehicular rogue APs Fig. 2. Demonstration of the feasibility of vehicular rogue APs To emonstrate vehicular rogue AP is a feasible threat, we set up a testbe shown in Fig. 2, where three laptops an two vehicles are use. The first laptop configure as a roasie AP is place at location C. An external antenna connecte to such a laptop is mounte on the top of a laer in the height of 2 meters. A vehicular rogue AP an a vehicular client rive from location A to B, each with a laptop insie an an external antenna mounte on the roof. They maintaine the istance of 10 meters away from each other. The length between A an B is approximately 500 meters. From the vehicular client s view, we measure the RSS of beacons broacaste by both roasie AP an the vehicular rogue AP. Fig. 3 shows the results, where the x-axis enotes the elapse time an the y-axis presents the RSS values. As we see, the vehicular rogue AP is easy to maintain relatively larger RSS values than the roasie AP. It is true that a client will be attracte by the vehicular rogue, since the client will always pick the AP with the strongest signal strength to associate. Note that both the roasie AP an the vehicular rogue use the same maximum transmission power Roasie AP Vehicular AP Elapse time (sec) Fig. 3. Measure RSS of the roasie AP an the vehicular rogue from location A to B C. Aversary moel Recall that the goal of vehicular rogues is to inuce clients to connect. If any client associates to a vehicular rogue, the aversary succees. Next are several assumptions of vehicular rogue APs. First, we assume that the aversary uses offthe-shelf harware to set up a vehicular rogue. The rogue AP is able to transmit a packet with arbitrary transmission (TX) power, an inject any packet with any content (incluing changing the MAC heaer). For example, the aversary is able to forge fake re-associate frames to force clients to re-select APs immeiately. Secon, we assume the aversary cannot moify the firmware of harware evices. In other wors, the rogue AP cannot control ACK frames. Although any frame incluing the ACK can be generate, the ACK cannot be sent back to the client within an ACK timeout. It is reporte that the time interval between ata an ACK is a SIFS (10 µs in g [22]). Software (not firmware) ACK cannot be prepare within such a interval [23]. Last, the aversary is able to provie whatever fake information to clients. For example, the aversary can monitor the wireless channels to learn the SSID an MAC aress of a legitimate AP, an then set up its rogue AP with the same information. Base on the assumptions escribe above, the aversary has two types of attacks. Basic attack In the basic attack, the vehicular rogue always broacasts beacons with the maximum TX power. That is because the maximum power will lea to the strongest signal strength with which the vehicular rogue has most probability to attract users to connect. The avantage of the basic attack is its easy setup. Without any complicate configuration, the basic attack can be launche anytime an anywhere. Avance attack The avance attack iffers from the basic attack in two aspects. First, the avance aversary 1667

4 is able to perform backgroun preparation before creating a vehicular rogue AP. The backgroun preparation inclues profiling the RSS values of roasie APs, investigating the roa conitions (e.g. the roa irection, lanes, intersection an so on) an traffic conitions. Secon, the avance aversary targets a specific area of the roa. By tuning the TX power carefully, the aversary forges the signal strength receive in the target area, so that it appears to be real. Compare with the basic attack, the avance attack is more time-consuming, but is more ifficult to be etecte. IV. OUR SOLUTION Our vehicular rogue AP etection scheme emans slight moification to APs that each AP embes its GPS location an TX power in every beacon. The GPS location inicates the AP s coorinates in the form of a latitue-longitue pair. The TX power presents the effective isotropic-raiate power (EIRP) which equals to the power level plus antenna gain an minus cable loss. This two pieces of information can be obtaine by the aministrator in avance, or obtaine from wireless river automatically. A user will then use them to etect vehicular rogues. Note that the stanar allows us to a variable-length information elements at the en of each beacon frame. The form of information elements is shown in Fig. 4. Furthermore, if an AP uses static TX power, this two pieces of information can be manually set in the SSID fiel without any moification to APs. For example, a vali SSID is like W-M_Wireless, ( , ), 20Bm. bytes 1 Element ID Fig Length length (in bytes) Content Format of information elements A. Defening against the basic attacks Since a roasie AP has to report its TX power an GPS location. The aversary will have to ecie what values shoul be appene in beacons. In the basic attack, the aversary is assume to inuce users in an opportunistic manner. Hence, choosing the maximum power is the best strategy for them. However, the aversary shoul not report its actual GPS location, since this location inicates that the AP is in the mile of the roa. A user can easily etect it. Therefore, the aversary must report a fake AP location. Fig. 5 shows three possibilities. Upon receiving a beacon, the client then obtains AP s reporte location, TX power, an a measure RSS. After knowing the reporte GPS location as well as its own GPS location, the client can then calculate the istance between the AP an itself. Base on that istance, TX power, an RSS, our algorithm is use to etermine whether the teste AP is a rogue AP. The main iea is as follows. Let an enote the actual an reporte istance between the rogue AP an the client separately. Suppose the aversary picke a location reporte location (1) < reporte location (2) = reporte location (3) > Fig. 5. Illustration of basic attacks, where triangle, circle, an cross enote vehicular rogue AP, vehicular client, an reporte location respectively such that < (see Fig. 5 (1)). The client is expecte to receive beacons with abnormally large RSS values. On the other han, if > (see Fig. 5 (3)), the RSS values are abnormally less than the expectation. Here, the abnormality is efine as exceeing (i.e. less than the lower boun or greater than the upper boun) a vali range of RSS values erive from the path loss moel. We aopt a common path loss moel [24] consiering two factors that may incur signal attenuation: path loss an shaowing. The path loss is the attenuation of electromagnetic signal propagating through space. The moel assumes the path loss (PL) is exponentially proportional to the transmit-receive istance, PL() γ. The shaowing that is cause by obstacles between the transmitter an receiver that attenuate signal power through absorption, reflection, scattering, an iffraction. The receive signal strength P r in Bm is then given by P r = P t (10γlog 10 ()+c+x δ ) (Bm), (1) where P t is the transmission power in Bm. Variable γ, the path loss exponent, etermines the rate of attenuation when the signal propagating through the space. Variablec is a correction constant which escribes the aitional loss or gain in the moel. VariableX δ is a ranom variable escribing the shaow faing which makes the receive signal strength ifferent from the mean preicte path loss. Fiel measurements have verifie this variation to be environment epenable an follows lognormal istribution [24]. Algorithm 1 presents our solution to efen against basic attacks. We use clt to enote a client an ap to enote a teste AP with the strongest signal strength iscovere by the client. If ap passe the algorithm, the client will terminate the test an connect to that AP. Otherwise, the client will continue the algorithm on next AP until all the APs are teste. Eventually if no AP can pass the algorithm, the client will keep un-associate until a new AP is scanne. In Algorithm 1, the client first collects n beacons from ap an measure RSS values. Meanwhile, AP s TX powers an GPS locations, as well as client s GPS locations, are recore (in line 1). Then, the client calculates the istance from the AP (in line 2). It is notice that the upate of GPS usually is slower than the 1668

5 Algorithm 1 Detecting Basic Rogue APs 1: Listen n beacons from the teste ap an recor {rss i }, {power i }, {gps ap i }, an {gps clt i } for each beacon 2: istance i = gps ap i gps clt i 3: for k = 1 to n 2 o 4: if rss k rss k+1 an rss k+1 rss k+2 > τ then 5: rss k+1 (rss k +rss k+2 )/2 6: en if 7: en for 8: Use maximum likelihoo estimation to calculate ˆγ by Eq. 2 an Eq. 3 9: if (ˆγ < lower boun ) or (ˆγ > upper boun) then 10: ap is a rogue AP 11: en if beacon interval. Thus, multiple beacons may have the same coorinates. To improve accuracy, we apply interpolation to consecutive GPS ata. For example, consier the following segment of GPS coorinates inclue in consecutive beacons: (x 1,y 1 ), (x 2,y 2 ), (x 3,y 3 ), (x 4,y 4 ), (x 5,y 5 ) Suppose the meian three coorinates have the same value (i.e. x 2 = x 3 = x 4 an y 2 = y 3 = y 4 ), since GPS was not upate at that time. After applying the interpolation, we obtain where an (x 1,y 1 ), (x 2,y 2 ), (x 3,y 3 ), (x 4,y 4 ), (x 5,y 5 ) (x 3,y 3) = (x 2 + x 5 x 2 3,y 2 + y 5 y 2 ) 3 (x 4,y 4 ) = (x (x 5 x 2 ),y (y 5 y 2 ) ). 3 3 The etaile coe of interpolation is ignore. Next, the loop from line 3 to 7 is use to filter out the extreme RSS values cause by environment interference. The client checks consecutive three RSS values. If the ifference between the meian value an the first/last value excees a threshol τ, the meian value is replace by the average of its previous an next values. After smoothing, we fit RSS values, istances, an TX powers into our path loss moel (i.e. Eq. 1), an use maximum likelihoo estimation (MLE) to estimate the parameter γ of the moel. Without fitting, the variations of measure GPS an RSS ata may lea to etection errors in practice. To minimize the square error, the estimation of γ can be obtaine by n f(ˆγ,ĉ) = (RSS i Pt i +10ˆγlog 10 ( i )+ĉ) 2. i=1 Differentiating f(ˆγ,ĉ) an setting it to be zero, the value of ˆγ an ĉ can be erive as follows, ˆγ = n i=1 (RSS i Pt i +ĉ)log 10 ( i ) n i=1 10(log 10 ( i)) 2 (2) ĉ = n i=1 (RSS i Pt i +10ˆγlog 10 ( i )) n (3) If ˆγ excees an empirical boun, we suspect the teste ap to be rogue. Previous work has pointe out that the path loss exponent normally ranges from 2 to 6 [25], where 2 is for propagation in free space, an 6 is for relatively lossy environment. Therefore, we heuristically set the lower boun of γ to 2 an the upper boun to 6. Last, in the case that =, our algorithm cannot istinguish the rogue AP. However, we argue that the cars are continuously moving, the aversary cannot maintain this conition. Therefore, this conition is safe to be ignore. B. Defening against avance attacks A more sophisticate aversary can launch avance attacks which require more preparations than basic attacks. For example, the aversary can set up a stationary AP at a specific location an rive along the roa to profile RSS values from that AP. The aversary ynamically tweaks the TX power to make the RSS receive at a esire target area similar to the profile values. Then, the rogue AP reports such a location. Within the targete area, the client cannot use RSS to etect the rogue AP, since the RSS values appear to come from the reporte location. To efen against the avance attacks, our algorithm requires the client to actively sen probe request frames to the AP with the TX power inclue in beacons but ifferent bitrates. In stanar, ifferent moulation schemes support the packet transmission with multi-rates. IEEE a uses a multi-carrier moulation scheme (OFDM), where ifferent ata rates will use ifferent moulation formats (BPSK, QPSK, QAM) accoringly. IEEE b uses irect sequence sprea spectrum (DSSS) moulation. For the 1Mbps an 2Mbps ata rates, the moulation format is set to DBPSK an DQPSK respectively. For 5.5Mbps an 11 Mbps, there are two coing schemes: CCK an PBCC, where CCK is manatory an PBCC is optional. The etails are escribe in Table I [26]. TABLE I MODULATIONS FOR A/G Rates (Mbps) stanar Moulation RX sensitivity (Bm) a/g BPSK/OFDM a/g BPSK/OFDM a/g QPSK/OFDM a/g QPSK/OFDM a/g QAM-16/OFDM a/g QAM-16/OFDM a/g QAM-64/OFDM a/g QAM-64/OFDM -65 As we see, ifferent transmission rate requires ifferent receiver (RX) sensitivity. Accoring to stanar, a receiver cannot emoulate the packet with RSS less than the RX sensitivity. Thus, we can sen packets with varying transmission rates to test if the AP is within a certain istance at which a corresponing rate can be emoulate with an acceptable bit error rate (BER). If the AP is out of the range of such a bit rate, the client cannot receive any ACK frame. 1669

6 Otherwise, the client can receive the ACK frame. Base on that, we can verify if the AP reporte its location honestly. client (1) < Fig. 6. range of a bit rate targete area reporte loation range of a bit rate targete area reporte location (2) > Illustration of avance attacks Next, we consier two situations of avance attacks (shown in Fig. 6): (1) the reporte location is far away from the targete area, whereas the istance between AP s actual location an the targete area is closer (i.e. < ); (2) opposite to the first situation (i.e. > ). In the first conition, the aversary shoul use a relatively small TX power, since the actual istance is closer than the reporte. In other wors, the reporte TX power is greater than the actual TX power. Suppose there is a client within the targete area. If such a client starts a transmission with RX sensitivity greater than the receive RSS, it is expecte that the packet will not be emoulate at the reporte location. As illustrate in Fig. 6 (1), the big circle epicts the range of the transmission rate. Within the circle, the packet can be emoulate. Out of the circle, the packet cannot be emoulate. Here, the client can receive ACKs. That implies the teste AP shoul not be locate at the reporte location. Hence, the teste AP is suspecte to be a rogue AP. In the secon situation that >, the client will transmit a probe request with a transmission rate whose RX sensitivity is less than the receive RSS. It is expecte the teste AP will reply ACKs. However, the client oes not receive the ACK. Thus, the teste AP is also suspecte to be a rogue AP. At last, ue to the similar reason mentione in previous subsection, we o not consier the situation that =. Algorithm 2 escribes our scheme to efen against avance attacks, where some functions are escribe in Table II. function name sen(x) pre(x) next(x) ratio(x) rateset[i] TABLE II FUNCTION DESCRIPTION notation return the RX sensitivity (Bm) of a bit-rate x return the bit-rate slightly slower than the bit-rate x return the bit-rate slightly faster than the bit-rate x return the ratio of the number of ACKs replie to the number of probe requests transmitte with bit-rate x return the ith rate in rateset In the algorithm, the client tries multiple bit-rates (smaller an larger rates) to verify both cases that > an <. Since the ACK may be corrupte by noisy environment, the client oes not receive the ACK not only because of the e emoulation of probe requests, but also ue to the lost ACKs. Therefore, multiple rouns are use to reuce the errors. Algorithm 2 Detecting Avance Rogue APs proceure 1: ajust tx power (rss, pt) if rss > sen(48mbps) then return pt (rss sen(36mbps)+sen(48mbps) 2 ) else return pt en if proceure 2: return bitrate set (rss, pt) if rss > sen(48mbps) then return {24Mbps, 36Mbps, 48Mbps, 54Mbps} else rate s.t. sen(pre(rate)) rss i an sen(rate) > rss i return {pre(pre(rate)), pre(rate), rate, next(rate)} en if 1: Initialize pass k to false where k [1,4] 2: for i = 1 to n o 3: Receive a beacon an recor rss i an pt i 4: txpower ajust tx power (rss i, pt i ) 5: rateset return bitrate set (rss i, pt i ) 6: for j = 1 to m o 7: Ranomly pick a rate x from rateset 8: Transmit a probe request with rate x an txpower 9: en for 10: en for 11: for k = 1 to 4 o 12: pass k trueif ratio(rateset[k]) > θ 13: en for 14: if pass 1 = true an pass 2 = true an pass 3 = false an pass 4 = false then 15: The teste AP is a legitimate AP 16: else 17: The teste AP is a rogue AP 18: en if During the test, a client receives n beacons from an AP, an sensmprobe requests to that AP right after each beacon. After that, the client will make a ecision whether to associate to that AP. The ecision is base on the ACK reply ratio (which is referre to the ratio of the number of receive ACKs to the number of transmitte probe requests). Particularly, once a client receives a beacon from an AP, the client will measure the RSS an extract the TX power. Then, the client etermines a set of bit-rates consisting of four bit-rates. Two rates have greater RX sensitivity than the measure RSS, whereas the other two rates have the less RX sensitivity. Note that if the RSS is greater than 48Mbps, the client cannot fin two higher rates since the maximum rate is 54Mbps. In that case, the client must reuces the TX power (see proceure 1). This is verifie in practice that 10Bm reuction in TX power will lea to 10Bm ecrease in RSS if the istance between sener an receiver is not far away. 1670

7 Next, the client ranomly picks a rate from the rate set to transmit a probe request frame. It is expecte that the AP can emoulate two lower bit-rates but on two higher bit-rates. For each rate in the set, the client will compute an ACK reply ratio. If the ratio is greater than a threshol θ, it is eeme that the AP can emoulate packets with such a rate. If two lower bit-rates excee θ but two higher bit-rates are less than θ, the client will associate to that AP. Otherwise, the AP is suspecte to be rogue. Variables n, m, an θ are three ajustable parameters in our algorithm. Accoring to our experimental results, we heuristically set that m = n = 10 an θ = 50%. Lastly, our avance etection algorithm relies on a relatively symmetric wireless channel. This is a reasonable assumption also mentione in [27]. The symmetric channel means that the path loss between a transmitter an a receiver is similar. With the same transmission power, both the sener an receiver are suppose to receive packets with similar RSS values. To verify if this assumption is vali in outoor vehicular networks, we conucte the experiment by recoring the RSS values at both sener an receiver sies in moving vehicles. The results are shown in 7. As we see, the majority of the RSS pairs are within 3 Bm. Besies that, experimental results presente in evaluation section also show our schemes work in practice. Fig Receiver sie Sener sie Timestamp Illustration of symmetric channel in outoor vehicular scenario V. EVALUATION In this section, we escribe the setup of our experiments, followe by the experimental results. A. Experimental setup The experiments have three components: a roasie AP, a vehicular rogue AP, an a client. Roasie AP A laptop connecte with an external omniantenna an a GPS receiver (see Fig. 8-left) mounte on the top of a laer (in height of 2m) is configure as a roasie AP. The laptop was running a generic Linux kernel with the latest mawifi river (svn r4128). The wireless car is set to monitor moe which is easier for us to inject beacons with aitional information such as GPS location an TX power. In our implementation, the fiel of GPS location has 18 bytes incluing 1 byte element ID, 1 byte length, 8 bytes latitue, an 8 bytes longitue. The fiel of TX power contains 1 byte element ID, 1 byte length, an 1 byte power value. The whole beacon packet is irectly elivere to the wireless river through libpcap [28]. Fig. 8. Illustration of experimental equipment Vehicular rogue AP For ease of setup, we i not set up the Internet access for the vehicular rogue AP, since it oes not affect the experiments. The configuration of our vehicular rogue AP is similar to the roasie AP except that the external antenna an the GPS receiver are mounte on the roof of the car (see Fig. 8-right). For basic attacks, the TX power is fixe by executing comman iwconfig txpower [value] with the maximum power value. For avance attacks, tuning TX power per packet is achieve through raiotap heaer. In Linux, MAC layer allows arbitrary injecte packet compose in the following format: [raiotap heaer] + [ieee80211 heaer] + [payloa]. In the raiotap heaer, two types of argument are use by injection packet, namelyieee80211_radiotap_rate an IEEE80211_RADIOTAP_DMB_TX_POWER. By filling the ifferent value, the packet can be transmitte with the esire power level. Note that to control per-packet TX power, hal_tpc must be enable while loaing the mawifi moule. Another laptop with GPS moule an external antenna is configure as a client. Similar to the APs, the client also sets the wireless interface to monitor moe. Sening an receiving packets are achieve by libpcap. Per-packet bit-rate control is one by raiotap heaer. Table III presents all the equipment use in our experiments. Name Laptop GPS Wireless car Antenna TABLE III EQUIPMENT DESCRIPTION Notation Lenovo T61 with 2.0GHz processor an 1G RAM GlobalSat BU-353 USB GPS receiver CB9-GP Carbus a/b/g using Atheros chipset 7 Bi MA24-7N magnetic-mount omniirectional The experiments are conucte in an outoor parking lot, where we can freely rive along the roa or stop to collect measurements. We took two sets of experiment to evaluate our vehicular rogue AP etection schemes. The first set of experiments is for the basic attack. We set up a roasie AP near the roa, an a vehicular rogue AP riving in front of a client. Both the roasie AP an the vehicular rogue AP use the same maximum TX power to transmit beacons. In the secon set of experiments, we seek to test our solution to 1671

8 avance attacks, but the ifference is that the roasie AP, the vehicular rogue AP, an the client are all eploye stationary. Here, we o not conuct the experiment in moving vehicles. The reason is that we optimistically assume the vehicular rogue AP always tunes the TX power to make the RSS to look like real. However, it is ifficult for the aversary to o that in practice. Therefore, for simplicity, we just investigate our scheme in several snapshots. Note that all the experiments were conucte extensively. We achieve similar results. The following section presents the etail. B. Evaluation results 1) Basic attack evaluation: In this experiment, the roasie AP is static, whereas the vehicular rogue AP an the client are moving. We first test if the legitimate roasie AP can pass our algorithms. The left figure of Fig. 9 shows the RSS values of the roasie AP measure by the client an the istance between the AP an the client. Note that, the whole test was performe over 30 secons. We ignore the perios from the starting point to 15 secons an from 25 secons to 30 secons. That is because the RSS values measure in these perios are too weak for a client to connect. The right figure shows the fitting results of our algorithms for the perio from 15 secons to 20 secons. As we see, ˆγ = 3.06 that is within the vali range. Therefore, the AP is not a rogue. Distance (m) Elapse time (secon) Elapse time (secon) Fig Fitting RSS measure from 15s to 20s γ=3.06, c= Elapse time (sec) Results of our algorithms in the case of the legitimate AP To perform meaningful comparison, we assume the aversary reporte the same location as the roasie AP. In that case, the istance between the client an the reporte location (i.e. ) varies as shown in the left of Fig. 10, but the actual istance (i.e. ) keeps about 3 4 meters. Thus, fitting incorrect istance into the pass loss moel will lea to the large eparture from the vali range of moel parameters. The right figure in Fig. 10 presents the incorrect fitting results. It is seen that the calculate ˆγ equals to Therefore, such an AP is a rogue AP. Distance (m) Distance bewteen reporte location an client Elapse time (secon) Elapse time (secon) Fig Fitting RSS measure from 0s to 30s γ= , c= Elapse time (sec) Results of our algorithm in case of the basic attack 2) Avance attack evaluation: Since the avance attacks are more complicate, we separate our evaluation into two cases. In the first case that <, the sophisticate aversary will ecrease its TX power to make the RSS smaller, so that it appears to come from the reporte location rather than the actual location. To verify if the probe requests can be emoulate at the reporte location, we physically set an AP there. Thus, we have two APs at both reporte location an actual location. It is expecte that only the legitimate AP cannot emoulate packets with two low rates but can emoulate packets with the other two high rates. The opposite is true of rogue APs. Fig. 11 shows the results, where = 42.67m an is set to three values of 7.4m, 22.3m, an 37.5m respectively. As we see, all s e in passing our algorithms, even the aversary tunes the TX power carefully. Percentage of ACK receive (%) The case of < pass AP Bit rate (Mbps) Fig. 11. Case 1: < where the istance between the reporte location (we physically set an AP there) an the client is that = 42.67m. The istance between the vehicular rogue AP i an the client is 1 = 7.4m, 2 = 22.3m, an 3 = 37.5m respectively. The reporte TX power is 20Bm. The aversary will tune its TX power to make the mean RSS at client sie to be 68 Bm. Percentage of ACK receive (%) AP 1 2 The case of > pass Bit rate (Mbps) Fig. 12. Case 2: > where the istance between the reporte location (we physically set an AP there) an the client is that = 6.32m. The istance between two locations of the rogue an the client are 1 = 17.7m an 2 = 30.3m respectively. In the secon case that >, the aversary must increase the TX power to make the RSS larger. Again, an AP was set up in the reporte location ( = 6.32m). Such an AP use 14Bm as the reporte TX power to broacast beacons. The mean RSS value receive by the client was -60Bm, which 1672

9 was greater than the RX sensitivity of 48Mbps (say -66Bm). Following our secon algorithm, the client then reuce TX power (6Bm) to transmit probe requests. Next, the vehicular rogue was place at two further locations with istance that 1 = 17.7m an 2 = 30.3m. The client use the same power 6Bm to test the vehicular rogue. The results are shown in Fig. 12. As we see, only the legitimate AP can emoulate the two high rates but on the other two low rates. Hence, the rogues are successfully etermine. VI. DISCUSSION Our solution makes use of physical characteristic such as path loss an RX sensitivity to etermine the iscrepancy between the rogue AP s actual location an its reporte location. This makes our solution vulnerable to the following factors. One factor is when the aversary picks its fake location that is very close to its current location. In other wors, is some very small value. From our experience, this is approximate 5 meters. When this happens, our scheme is unable to etect the rogue AP. However, in practice, this attack is not easily launche. The reason is that the vehicular rogue has to be continuously moving, an will quickly exten the istance between an. For example, a vehicular rogue traveling with 60 miles per hour will have travele approximately 27 meters in one secon. Thus, the winow of opportunity for the aversary to launch this attack is very small. The other factor is that outoor wireless channel conition is unpreictable. While our solution relies on the well-known signal propagation moels. It is inevitable that there will be instances where the actual conitions eviate from the moels. When this happens, our solution will not be able to etermine the rogue AP as well. We can mitigate by aopting a more accurate moel in our solution (Algorithm 1 line 8). In aition, it is unclear how well the aversary can take avantage of this limitation since the aversary is unable to preict the channel conitions as well. Finally, base on our eployment experiences, we observe that our scheme o not work as well in locations where there are a lot of builings. This suggests that our vehicular rogue AP etection will be more suitable for interstate highways which have less physical obstacles, an less so for ense urban areas. unfortunately, ue to safety concerns, we were unable to conuct experiments in highway environments. VII. CONCLUSION The ease of setting up a successful rogue AP in vehicular makes this form of wireless attack a particularly serious security problem in vehicular networks. In this paper, we are the first to emonstrate the feasibility of this type of rogue APs, an present a practical efening schemes to prevent the users to connect to vehicular rogues. We implement our approach on commercially available harware, an perform extensive real worl experiments to evaluate our solutions. ACKNOWLEDGMENT The authors woul like to thank all the reviewers for their helpful comments. This project was supporte in part by US National Science Founation grants CNS , an CAREER Awar CNS REFERENCES [1] Google Mountain View. [Online]. Available: [2] V. Bychkovsky, B. Hull, A. K. Miu, H. Balakrishnan, an S. Maen, A Measurement Stuy of Vehicular Internet Access Using In Situ Wi-Fi Networks, in 12th ACM MOBICOM Conf., Los Angeles, CA, September [3] J. Ott an D. Kutscher, Drive-thru internet: Ieee b for automobile users, in INFOCOM, [4] H. Han, B. Sheng, C. Tan, Q. Li, an S. Lu, A measurement base rogue AP etection scheme, in The 28th IEEE International Conference on Computer Communications, Rio e Janeiro, Brazil, [5] L. Ma, A. Y. Teymorian, an X. Cheng, A hybri rogue access point protection framework for commoity Wi-Fi networks, in Infocom [6] W. Wei, K. Suh, B. Wang, Y. Gu, J. Kurose, an D. Towsley, Passive online rogue access point etection using sequential hypothesis testing with TCP ACK-pairs, in IMC [7] W. Wei, S. Jaiswal, J. F. Kurose, an D. F. Towsley, Ientifying traffic from passive measurements using iterative bayesian inference, in INFOCOM, [8] A. Venkataraman an R. Beyah, Rogue access point etection using innate characteristics of the mac, in SecureComm [9] H. Yin, G. Chen, an J. Wang, Detecting protecte layer-3 rogue APs, in Broanets [10] A. Aya, P. Bahl, R. Chanra, an L. Qiu, Architecture an techniques for iagnosing faults in IEEE infrastructure networks, in Mobicom [11] L. Watkins, R. Beyah, an C. Corbett, A passive approach to rogue access point etection, in Globecom [12] R. Beyah, S. Kangue, G. Yu, B. Stricklan, an J. Copelan, Rogue access point etection using temporal traffic characteristics, in Globecom [13] P. Bahl, R. Chanra, J. Pahye, L. Ravinranath, M. Singh, A. Wolman, an B. Zill, Enhancing the security of corporate Wi-Fi networks using DAIR, in MobiSys [14] S. Shetty, M. Song, an L. Ma, Rogue access point etection by analyzing network traffic characteristics, in Milcom [15] A. Giannoulis, M. Fiore, an E. W. Knightly, Supporting vehicular mobility in urban multi-hop wireless networks, in MobiSys, [16] Air efence. [Online]. Available: [17] Air magnet. [Online]. Available: [18] Air wave. [Online]. Available: [19] S. Jana an S. Kasera, On fast an accurate etection of unauthorize wireless access points using clock skews, in Mobicom [20] Y. Sheng, K. Tan, G. Chen, D. Kotz, an A. Campbell., Detecting MAC layer spoofing using receive signal strength, in Infocom [21] V. Brik, S. Banerjee, M. Gruteser, an S. Oh, Wireless evice ientification with raiometric signatures, in Mobicom [22] D. Vassis, G. Kormentzas, A. N. Rouskas, an I. Maglogiannis, The ieee g stanar fo high ata rate wlans, IEEE Network, vol. 19, no. 3, pp , [23] M. Neufel, J. Fifiel, C. Doerr, an A. S. andirk Grunwal, Softmac - flexible wireless research platform, in HotNets-IV, [24] A. Golsmith, Wireless Communications. Cambrige University Press, [25] J. Turkka an M. Renfors, Path loss measurements for a non-line-ofsight mobile-to-mobile environment, in ITST, [26] J. Yee an H. Pezeshki-Esfahani, Unerstaning wireless lan performance trae-offs, Communication Systems esign, pp , [27] G. Ju, X. Wang, an P. Steenkiste, Efficient channel-aware rate aaptation in ynamic environments, in MobiSys, [28] Libpcap. [Online]. Available:

THE Drive-thru Internet [1] has been of special interest in

THE Drive-thru Internet [1] has been of special interest in x IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY VR-Defender: Self-Defense against Vehicular Rogue APs for Drive-thru Internet Hao Han, Fengyuan Xu, Member, IEEE, Chiu C. Tan, Member, IEEE, Yifan Zhang, and

More information

Overview : Computer Networking. IEEE MAC Protocol: CSMA/CA Internet mobility TCP over noisy links

Overview : Computer Networking. IEEE MAC Protocol: CSMA/CA Internet mobility TCP over noisy links Overview 15-441 15-441: Computer Networking 15-641 Lecture 24: Wireless Eric Anerson Fall 2014 www.cs.cmu.eu/~prs/15-441-f14 Internet mobility TCP over noisy links Link layer challenges an WiFi Cellular

More information

Offloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization

Offloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization 1 Offloaing Cellular Traffic through Opportunistic Communications: Analysis an Optimization Vincenzo Sciancalepore, Domenico Giustiniano, Albert Banchs, Anreea Picu arxiv:1405.3548v1 [cs.ni] 14 May 24

More information

Improving Spatial Reuse of IEEE Based Ad Hoc Networks

Improving Spatial Reuse of IEEE Based Ad Hoc Networks mproving Spatial Reuse of EEE 82.11 Base A Hoc Networks Fengji Ye, Su Yi an Biplab Sikar ECSE Department, Rensselaer Polytechnic nstitute Troy, NY 1218 Abstract n this paper, we evaluate an suggest methos

More information

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama an Hayato Ohwaa Faculty of Sci. an Tech. Tokyo University of Science, 2641 Yamazaki, Noa-shi, CHIBA, 278-8510, Japan hiroyuki@rs.noa.tus.ac.jp,

More information

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks : a Movement-Base Routing Algorithm for Vehicle A Hoc Networks Fabrizio Granelli, Senior Member, Giulia Boato, Member, an Dzmitry Kliazovich, Stuent Member Abstract Recent interest in car-to-car communications

More information

Architecture Design of Mobile Access Coordinated Wireless Sensor Networks

Architecture Design of Mobile Access Coordinated Wireless Sensor Networks Architecture Design of Mobile Access Coorinate Wireless Sensor Networks Mai Abelhakim 1 Leonar E. Lightfoot Jian Ren 1 Tongtong Li 1 1 Department of Electrical & Computer Engineering, Michigan State University,

More information

Comparison of Methods for Increasing the Performance of a DUA Computation

Comparison of Methods for Increasing the Performance of a DUA Computation Comparison of Methos for Increasing the Performance of a DUA Computation Michael Behrisch, Daniel Krajzewicz, Peter Wagner an Yun-Pang Wang Institute of Transportation Systems, German Aerospace Center,

More information

Message Transport With The User Datagram Protocol

Message Transport With The User Datagram Protocol Message Transport With The User Datagram Protocol User Datagram Protocol (UDP) Use During startup For VoIP an some vieo applications Accounts for less than 10% of Internet traffic Blocke by some ISPs Computer

More information

Online Appendix to: Generalizing Database Forensics

Online Appendix to: Generalizing Database Forensics Online Appenix to: Generalizing Database Forensics KYRIACOS E. PAVLOU an RICHARD T. SNODGRASS, University of Arizona This appenix presents a step-by-step iscussion of the forensic analysis protocol that

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu Institute of Information Science Acaemia Sinica Taipei, Taiwan Da-wei Wang Jan-Jan Wu Institute of Information Science

More information

Comparison of Wireless Network Simulators with Multihop Wireless Network Testbed in Corridor Environment

Comparison of Wireless Network Simulators with Multihop Wireless Network Testbed in Corridor Environment Comparison of Wireless Network Simulators with Multihop Wireless Network Testbe in Corrior Environment Rabiullah Khattak, Anna Chaltseva, Laurynas Riliskis, Ulf Boin, an Evgeny Osipov Department of Computer

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks TR-IIS-05-021 Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu, Pangfeng Liu, Da-Wei Wang, Jan-Jan Wu December 2005 Technical Report No. TR-IIS-05-021 http://www.iis.sinica.eu.tw/lib/techreport/tr2005/tr05.html

More information

MODULE VII. Emerging Technologies

MODULE VII. Emerging Technologies MODULE VII Emerging Technologies Computer Networks an Internets -- Moule 7 1 Spring, 2014 Copyright 2014. All rights reserve. Topics Software Define Networking The Internet Of Things Other trens in networking

More information

Coupling the User Interfaces of a Multiuser Program

Coupling the User Interfaces of a Multiuser Program Coupling the User Interfaces of a Multiuser Program PRASUN DEWAN University of North Carolina at Chapel Hill RAJIV CHOUDHARY Intel Corporation We have evelope a new moel for coupling the user-interfaces

More information

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Queueing Moel an Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Marc Aoun, Antonios Argyriou, Philips Research, Einhoven, 66AE, The Netherlans Department of Computer an Communication

More information

EDOVE: Energy and Depth Variance-Based Opportunistic Void Avoidance Scheme for Underwater Acoustic Sensor Networks

EDOVE: Energy and Depth Variance-Based Opportunistic Void Avoidance Scheme for Underwater Acoustic Sensor Networks sensors Article EDOVE: Energy an Depth Variance-Base Opportunistic Voi Avoiance Scheme for Unerwater Acoustic Sensor Networks Safar Hussain Bouk 1, *, Sye Hassan Ahme 2, Kyung-Joon Park 1 an Yongsoon Eun

More information

On Effectively Determining the Downlink-to-uplink Sub-frame Width Ratio for Mobile WiMAX Networks Using Spline Extrapolation

On Effectively Determining the Downlink-to-uplink Sub-frame Width Ratio for Mobile WiMAX Networks Using Spline Extrapolation On Effectively Determining the Downlink-to-uplink Sub-frame With Ratio for Mobile WiMAX Networks Using Spline Extrapolation Panagiotis Sarigianniis, Member, IEEE, Member Malamati Louta, Member, IEEE, Member

More information

Questions? Post on piazza, or Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)!

Questions? Post on piazza, or  Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)! EE122 Fall 2013 HW3 Instructions Recor your answers in a file calle hw3.pf. Make sure to write your name an SID at the top of your assignment. For each problem, clearly inicate your final answer, bol an

More information

An Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources

An Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources An Algorithm for Builing an Enterprise Network Topology Using Wiesprea Data Sources Anton Anreev, Iurii Bogoiavlenskii Petrozavosk State University Petrozavosk, Russia {anreev, ybgv}@cs.petrsu.ru Abstract

More information

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 4, APRIL

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 4, APRIL IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 1, NO. 4, APRIL 01 74 Towar Efficient Distribute Algorithms for In-Network Binary Operator Tree Placement in Wireless Sensor Networks Zongqing Lu,

More information

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control Almost Disjunct Coes in Large Scale Multihop Wireless Network Meia Access Control D. Charles Engelhart Anan Sivasubramaniam Penn. State University University Park PA 682 engelhar,anan @cse.psu.eu Abstract

More information

Study of Network Optimization Method Based on ACL

Study of Network Optimization Method Based on ACL Available online at www.scienceirect.com Proceia Engineering 5 (20) 3959 3963 Avance in Control Engineering an Information Science Stuy of Network Optimization Metho Base on ACL Liu Zhian * Department

More information

Probabilistic Medium Access Control for. Full-Duplex Networks with Half-Duplex Clients

Probabilistic Medium Access Control for. Full-Duplex Networks with Half-Duplex Clients Probabilistic Meium Access Control for 1 Full-Duplex Networks with Half-Duplex Clients arxiv:1608.08729v1 [cs.ni] 31 Aug 2016 Shih-Ying Chen, Ting-Feng Huang, Kate Ching-Ju Lin, Member, IEEE, Y.-W. Peter

More information

AnyTraffic Labeled Routing

AnyTraffic Labeled Routing AnyTraffic Labele Routing Dimitri Papaimitriou 1, Pero Peroso 2, Davie Careglio 2 1 Alcatel-Lucent Bell, Antwerp, Belgium Email: imitri.papaimitriou@alcatel-lucent.com 2 Universitat Politècnica e Catalunya,

More information

On the Placement of Internet Taps in Wireless Neighborhood Networks

On the Placement of Internet Taps in Wireless Neighborhood Networks 1 On the Placement of Internet Taps in Wireless Neighborhoo Networks Lili Qiu, Ranveer Chanra, Kamal Jain, Mohamma Mahian Abstract Recently there has emerge a novel application of wireless technology that

More information

An Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique

An Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique International OPEN ACCESS Journal Of Moern Engineering Research (IJMER) An Aaptive Routing Algorithm for Communication Networks using Back Pressure Technique Khasimpeera Mohamme 1, K. Kalpana 2 1 M. Tech

More information

Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks

Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks 01 01 01 01 01 00 01 01 Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks Mihaela Carei, Yinying Yang, an Jie Wu Department of Computer Science an Engineering Floria Atlantic University

More information

Skyline Community Search in Multi-valued Networks

Skyline Community Search in Multi-valued Networks Syline Community Search in Multi-value Networs Rong-Hua Li Beijing Institute of Technology Beijing, China lironghuascut@gmail.com Jeffrey Xu Yu Chinese University of Hong Kong Hong Kong, China yu@se.cuh.eu.h

More information

WLAN Indoor Positioning Based on Euclidean Distances and Fuzzy Logic

WLAN Indoor Positioning Based on Euclidean Distances and Fuzzy Logic WLAN Inoor Positioning Base on Eucliean Distances an Fuzzy Logic Anreas TEUBER, Bern EISSFELLER Institute of Geoesy an Navigation, University FAF, Munich, Germany, e-mail: (anreas.teuber, bern.eissfeller)@unibw.e

More information

Research Article REALFLOW: Reliable Real-Time Flooding-Based Routing Protocol for Industrial Wireless Sensor Networks

Research Article REALFLOW: Reliable Real-Time Flooding-Based Routing Protocol for Industrial Wireless Sensor Networks Hinawi Publishing Corporation International Journal of Distribute Sensor Networks Volume 2014, Article ID 936379, 17 pages http://x.oi.org/10.1155/2014/936379 Research Article REALFLOW: Reliable Real-Time

More information

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 3 Sofia 017 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.1515/cait-017-0030 Particle Swarm Optimization Base

More information

A Plane Tracker for AEC-automation Applications

A Plane Tracker for AEC-automation Applications A Plane Tracker for AEC-automation Applications Chen Feng *, an Vineet R. Kamat Department of Civil an Environmental Engineering, University of Michigan, Ann Arbor, USA * Corresponing author (cforrest@umich.eu)

More information

Estimating Velocity Fields on a Freeway from Low Resolution Video

Estimating Velocity Fields on a Freeway from Low Resolution Video Estimating Velocity Fiels on a Freeway from Low Resolution Vieo Young Cho Department of Statistics University of California, Berkeley Berkeley, CA 94720-3860 Email: young@stat.berkeley.eu John Rice Department

More information

Non-homogeneous Generalization in Privacy Preserving Data Publishing

Non-homogeneous Generalization in Privacy Preserving Data Publishing Non-homogeneous Generalization in Privacy Preserving Data Publishing W. K. Wong, Nios Mamoulis an Davi W. Cheung Department of Computer Science, The University of Hong Kong Pofulam Roa, Hong Kong {wwong2,nios,cheung}@cs.hu.h

More information

THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE

THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE БСУ Международна конференция - 2 THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE Evgeniya Nikolova, Veselina Jecheva Burgas Free University Abstract:

More information

Politehnica University of Timisoara Mobile Computing, Sensors Network and Embedded Systems Laboratory. Testing Techniques

Politehnica University of Timisoara Mobile Computing, Sensors Network and Embedded Systems Laboratory. Testing Techniques Politehnica University of Timisoara Mobile Computing, Sensors Network an Embee Systems Laboratory ing Techniques What is testing? ing is the process of emonstrating that errors are not present. The purpose

More information

Robust PIM-SM Multicasting using Anycast RP in Wireless Ad Hoc Networks

Robust PIM-SM Multicasting using Anycast RP in Wireless Ad Hoc Networks Robust PIM-SM Multicasting using Anycast RP in Wireless A Hoc Networks Jaewon Kang, John Sucec, Vikram Kaul, Sunil Samtani an Mariusz A. Fecko Applie Research, Telcoria Technologies One Telcoria Drive,

More information

Software Reliability Modeling and Cost Estimation Incorporating Testing-Effort and Efficiency

Software Reliability Modeling and Cost Estimation Incorporating Testing-Effort and Efficiency Software Reliability Moeling an Cost Estimation Incorporating esting-effort an Efficiency Chin-Yu Huang, Jung-Hua Lo, Sy-Yen Kuo, an Michael R. Lyu -+ Department of Electrical Engineering Computer Science

More information

Impact of FTP Application file size and TCP Variants on MANET Protocols Performance

Impact of FTP Application file size and TCP Variants on MANET Protocols Performance International Journal of Moern Communication Technologies & Research (IJMCTR) Impact of FTP Application file size an TCP Variants on MANET Protocols Performance Abelmuti Ahme Abbasher Ali, Dr.Amin Babkir

More information

Topics. Computer Networks and Internets -- Module 5 2 Spring, Copyright All rights reserved.

Topics. Computer Networks and Internets -- Module 5 2 Spring, Copyright All rights reserved. Topics Internet concept an architecture Internet aressing Internet Protocol packets (atagrams) Datagram forwaring Aress resolution Error reporting mechanism Configuration Network aress translation Computer

More information

Supporting Fully Adaptive Routing in InfiniBand Networks

Supporting Fully Adaptive Routing in InfiniBand Networks XIV JORNADAS DE PARALELISMO - LEGANES, SEPTIEMBRE 200 1 Supporting Fully Aaptive Routing in InfiniBan Networks J.C. Martínez, J. Flich, A. Robles, P. López an J. Duato Resumen InfiniBan is a new stanar

More information

A shortest path algorithm in multimodal networks: a case study with time varying costs

A shortest path algorithm in multimodal networks: a case study with time varying costs A shortest path algorithm in multimoal networks: a case stuy with time varying costs Daniela Ambrosino*, Anna Sciomachen* * Department of Economics an Quantitative Methos (DIEM), University of Genoa Via

More information

Using the disparity space to compute occupancy grids from stereo-vision

Using the disparity space to compute occupancy grids from stereo-vision The 2010 IEEE/RSJ International Conference on Intelligent Robots an Systems October 18-22, 2010, Taipei, Taiwan Using the isparity space to compute occupancy gris from stereo-vision Mathias Perrollaz,

More information

Chapter 5 Proposed models for reconstituting/ adapting three stereoscopes

Chapter 5 Proposed models for reconstituting/ adapting three stereoscopes Chapter 5 Propose moels for reconstituting/ aapting three stereoscopes - 89 - 5. Propose moels for reconstituting/aapting three stereoscopes This chapter offers three contributions in the Stereoscopy area,

More information

Distributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs

Distributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs IEEE TRANSACTIONS ON KNOWLEDE AND DATA ENINEERIN, MANUSCRIPT ID Distribute Line raphs: A Universal Technique for Designing DHTs Base on Arbitrary Regular raphs Yiming Zhang an Ling Liu, Senior Member,

More information

A Measurement Based Rogue AP Detection Scheme

A Measurement Based Rogue AP Detection Scheme A Measurement Based Rogue AP Detection Scheme Hao Han, Bo Sheng,ChiuC.Tan,QunLi, Sanglu Lu State Key Laboratory of Novel Software Technology, Nanjing University, China College of William and Mary, Williamsburg,

More information

Image Segmentation using K-means clustering and Thresholding

Image Segmentation using K-means clustering and Thresholding Image Segmentation using Kmeans clustering an Thresholing Preeti Panwar 1, Girhar Gopal 2, Rakesh Kumar 3 1M.Tech Stuent, Department of Computer Science & Applications, Kurukshetra University, Kurukshetra,

More information

Computer Organization

Computer Organization Computer Organization Douglas Comer Computer Science Department Purue University 250 N. University Street West Lafayette, IN 47907-2066 http://www.cs.purue.eu/people/comer Copyright 2006. All rights reserve.

More information

Real Time On Board Stereo Camera Pose through Image Registration*

Real Time On Board Stereo Camera Pose through Image Registration* 28 IEEE Intelligent Vehicles Symposium Einhoven University of Technology Einhoven, The Netherlans, June 4-6, 28 Real Time On Boar Stereo Camera Pose through Image Registration* Fai Dornaika French National

More information

Questions? Post on piazza, or Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)!

Questions? Post on piazza, or  Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)! EE122 Fall 2013 HW3 Instructions Recor your answers in a file calle hw3.pf. Make sure to write your name an SID at the top of your assignment. For each problem, clearly inicate your final answer, bol an

More information

Adaptive Load Balancing based on IP Fast Reroute to Avoid Congestion Hot-spots

Adaptive Load Balancing based on IP Fast Reroute to Avoid Congestion Hot-spots Aaptive Loa Balancing base on IP Fast Reroute to Avoi Congestion Hot-spots Masaki Hara an Takuya Yoshihiro Faculty of Systems Engineering, Wakayama University 930 Sakaeani, Wakayama, 640-8510, Japan Email:

More information

Adjusted Probabilistic Packet Marking for IP Traceback

Adjusted Probabilistic Packet Marking for IP Traceback Ajuste Probabilistic Packet Marking for IP Traceback Tao Peng, Christopher Leckie, an Kotagiri Ramamohanarao 2 ARC Special Research Center for Ultra-Broaban Information Networks Department of Electrical

More information

MODULE V. Internetworking: Concepts, Addressing, Architecture, Protocols, Datagram Processing, Transport-Layer Protocols, And End-To-End Services

MODULE V. Internetworking: Concepts, Addressing, Architecture, Protocols, Datagram Processing, Transport-Layer Protocols, And End-To-End Services MODULE V Internetworking: Concepts, Aressing, Architecture, Protocols, Datagram Processing, Transport-Layer Protocols, An En-To-En Services Computer Networks an Internets -- Moule 5 1 Spring, 2014 Copyright

More information

Using Ray Tracing for Site-Specific Indoor Radio Signal Strength Analysis 1

Using Ray Tracing for Site-Specific Indoor Radio Signal Strength Analysis 1 Using Ray Tracing for Site-Specific Inoor Raio Signal Strength Analysis 1 Michael Ni, Stephen Mann, an Jay Black Computer Science Department, University of Waterloo, Waterloo, Ontario, NL G1, Canaa Abstract

More information

NEW METHOD FOR FINDING A REFERENCE POINT IN FINGERPRINT IMAGES WITH THE USE OF THE IPAN99 ALGORITHM 1. INTRODUCTION 2.

NEW METHOD FOR FINDING A REFERENCE POINT IN FINGERPRINT IMAGES WITH THE USE OF THE IPAN99 ALGORITHM 1. INTRODUCTION 2. JOURNAL OF MEDICAL INFORMATICS & TECHNOLOGIES Vol. 13/009, ISSN 164-6037 Krzysztof WRÓBEL, Rafał DOROZ * fingerprint, reference point, IPAN99 NEW METHOD FOR FINDING A REFERENCE POINT IN FINGERPRINT IMAGES

More information

Dual Arm Robot Research Report

Dual Arm Robot Research Report Dual Arm Robot Research Report Analytical Inverse Kinematics Solution for Moularize Dual-Arm Robot With offset at shouler an wrist Motivation an Abstract Generally, an inustrial manipulator such as PUMA

More information

Enabling Rollback Support in IT Change Management Systems

Enabling Rollback Support in IT Change Management Systems Enabling Rollback Support in IT Change Management Systems Guilherme Sperb Machao, Fábio Fabian Daitx, Weverton Luis a Costa Coreiro, Cristiano Bonato Both, Luciano Paschoal Gaspary, Lisanro Zambeneetti

More information

Preamble. Singly linked lists. Collaboration policy and academic integrity. Getting help

Preamble. Singly linked lists. Collaboration policy and academic integrity. Getting help CS2110 Spring 2016 Assignment A. Linke Lists Due on the CMS by: See the CMS 1 Preamble Linke Lists This assignment begins our iscussions of structures. In this assignment, you will implement a structure

More information

An Energy Efficient Routing for Wireless Sensor Networks: Hierarchical Approach

An Energy Efficient Routing for Wireless Sensor Networks: Hierarchical Approach An Energy Efficient Routing for Wireless Sensor Networks: Hierarchical Approach Nishi Sharma, Vanna Verma Abstract Wireless sensor networks (WSNs) is one of the emerging fiel of research in recent era

More information

Provisioning Virtualized Cloud Services in IP/MPLS-over-EON Networks

Provisioning Virtualized Cloud Services in IP/MPLS-over-EON Networks Provisioning Virtualize Clou Services in IP/MPLS-over-EON Networks Pan Yi an Byrav Ramamurthy Department of Computer Science an Engineering, University of Nebraska-Lincoln Lincoln, Nebraska 68588 USA Email:

More information

Threshold Based Data Aggregation Algorithm To Detect Rainfall Induced Landslides

Threshold Based Data Aggregation Algorithm To Detect Rainfall Induced Landslides Threshol Base Data Aggregation Algorithm To Detect Rainfall Inuce Lanslies Maneesha V. Ramesh P. V. Ushakumari Department of Computer Science Department of Mathematics Amrita School of Engineering Amrita

More information

An Infrastructureless End-to-End High Performance Mobility Protocol

An Infrastructureless End-to-End High Performance Mobility Protocol Proceeings of the 5 IEEE International Conference on Electro Information Technology, 5, Lincoln Nebraska, May 5 An Infrastructureless En-to-En High Performance Mobility Protocol Saneep Davu, Rai Y. Zaghal

More information

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method Southern Cross University epublications@scu 23r Australasian Conference on the Mechanics of Structures an Materials 214 Transient analysis of wave propagation in 3D soil by using the scale bounary finite

More information

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH Galen H Sasaki Dept Elec Engg, U Hawaii 2540 Dole Street Honolul HI 96822 USA Ching-Fong Su Fuitsu Laboratories of America 595 Lawrence Expressway

More information

NAND flash memory is widely used as a storage

NAND flash memory is widely used as a storage 1 : Buffer-Aware Garbage Collection for Flash-Base Storage Systems Sungjin Lee, Dongkun Shin Member, IEEE, an Jihong Kim Member, IEEE Abstract NAND flash-base storage evice is becoming a viable storage

More information

CS 106 Winter 2016 Craig S. Kaplan. Module 01 Processing Recap. Topics

CS 106 Winter 2016 Craig S. Kaplan. Module 01 Processing Recap. Topics CS 106 Winter 2016 Craig S. Kaplan Moule 01 Processing Recap Topics The basic parts of speech in a Processing program Scope Review of syntax for classes an objects Reaings Your CS 105 notes Learning Processing,

More information

Scalable Deterministic Scheduling for WDM Slot Switching Xhaul with Zero-Jitter

Scalable Deterministic Scheduling for WDM Slot Switching Xhaul with Zero-Jitter FDL sel. VOA SOA 100 Regular papers ONDM 2018 Scalable Deterministic Scheuling for WDM Slot Switching Xhaul with Zero-Jitter Bogan Uscumlic 1, Dominique Chiaroni 1, Brice Leclerc 1, Thierry Zami 2, Annie

More information

Fuzzy Learning Variable Admittance Control for Human-Robot Cooperation

Fuzzy Learning Variable Admittance Control for Human-Robot Cooperation Fuzzy Learning ariable Amittance Control for Human-Robot Cooperation Fotios Dimeas an Nikos Aspragathos Abstract This paper presents a metho for variable amittance control in human-robot cooperation tasks,

More information

Robust Camera Calibration for an Autonomous Underwater Vehicle

Robust Camera Calibration for an Autonomous Underwater Vehicle obust Camera Calibration for an Autonomous Unerwater Vehicle Matthew Bryant, Davi Wettergreen *, Samer Aballah, Alexaner Zelinsky obotic Systems Laboratory Department of Engineering, FEIT Department of

More information

An Investigation in the Use of Vehicle Reidentification for Deriving Travel Time and Travel Time Distributions

An Investigation in the Use of Vehicle Reidentification for Deriving Travel Time and Travel Time Distributions An Investigation in the Use of Vehicle Reientification for Deriving Travel Time an Travel Time Distributions Carlos Sun Department of Civil an Environmental Engineering, University of Missouri-Columbia,

More information

On the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems

On the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems On the Role of Multiply Sectione Bayesian Networks to Cooperative Multiagent Systems Y. Xiang University of Guelph, Canaa, yxiang@cis.uoguelph.ca V. Lesser University of Massachusetts at Amherst, USA,

More information

Intensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2

Intensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2 This paper appears in J. of Parallel an Distribute Computing 10 (1990), pp. 167 181. Intensive Hypercube Communication: Prearrange Communication in Link-Boun Machines 1 2 Quentin F. Stout an Bruce Wagar

More information

State Indexed Policy Search by Dynamic Programming. Abstract. 1. Introduction. 2. System parameterization. Charles DuHadway

State Indexed Policy Search by Dynamic Programming. Abstract. 1. Introduction. 2. System parameterization. Charles DuHadway State Inexe Policy Search by Dynamic Programming Charles DuHaway Yi Gu 5435537 503372 December 4, 2007 Abstract We consier the reinforcement learning problem of simultaneous trajectory-following an obstacle

More information

EVIL TWIN ACCESS POINT DETECTION AND PREVENTION IN WIRELESS NETWORK Sandip S. Thite Bharati Vidyapeeth s College of Engineering for Women, Pune, India

EVIL TWIN ACCESS POINT DETECTION AND PREVENTION IN WIRELESS NETWORK Sandip S. Thite Bharati Vidyapeeth s College of Engineering for Women, Pune, India EVIL TWIN ACCESS POINT DETECTION AND PREVENTION IN WIRELESS NETWORK Sandip S. Thite Bharati Vidyapeeth s College of Engineering for Women, Pune, India Abstract Now a days wireless access points are widely

More information

Wireless Sensing and Structural Control Strategies

Wireless Sensing and Structural Control Strategies Wireless Sensing an Structural Control Strategies Kincho H. Law 1, Anrew Swartz 2, Jerome P. Lynch 3, Yang Wang 4 1 Dept. of Civil an Env. Engineering, Stanfor University, Stanfor, CA 94305, USA 2 Dept.

More information

A Framework for Dialogue Detection in Movies

A Framework for Dialogue Detection in Movies A Framework for Dialogue Detection in Movies Margarita Kotti, Constantine Kotropoulos, Bartosz Ziólko, Ioannis Pitas, an Vassiliki Moschou Department of Informatics, Aristotle University of Thessaloniki

More information

EXTRACTION OF MAIN AND SECONDARY ROADS IN VHR IMAGES USING A HIGHER-ORDER PHASE FIELD MODEL

EXTRACTION OF MAIN AND SECONDARY ROADS IN VHR IMAGES USING A HIGHER-ORDER PHASE FIELD MODEL EXTRACTION OF MAIN AND SECONDARY ROADS IN VHR IMAGES USING A HIGHER-ORDER PHASE FIELD MODEL Ting Peng a,b, Ian H. Jermyn b, Véronique Prinet a, Josiane Zerubia b a LIAMA & PR, Institute of Automation,

More information

CS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing

CS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing CS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing Tim Roughgaren October 19, 2016 1 Routing in the Internet Last lecture we talke about elay-base (or selfish ) routing, which

More information

Trailing Mobile Sinks: A Proactive Data Reporting Protocol for Wireless Sensor Networks

Trailing Mobile Sinks: A Proactive Data Reporting Protocol for Wireless Sensor Networks Trailing Mobile Sinks: A Proactive Data Reporting Protocol for Wireless Sensor Networks Xinxin Liu, Han Zhao, Xin Yang Computer & Information Science & Eng. University of Floria Email:{xinxin,han,xin}@cise.ufl.eu

More information

Stereo Vision-based Subpixel Level Free Space Boundary Detection Using Modified u-disparity and Preview Dynamic Programming

Stereo Vision-based Subpixel Level Free Space Boundary Detection Using Modified u-disparity and Preview Dynamic Programming 2015 IEEE Intelligent Vehicles Symposium (IV) June 28 - July 1, 2015. COEX, Seoul, Korea Stereo Vision-base Subpixel Level Free Space Bounary Detection Using Moifie u-isparity an Preview Dynamic Programming

More information

A Revised Simplex Search Procedure for Stochastic Simulation Response Surface Optimization

A Revised Simplex Search Procedure for Stochastic Simulation Response Surface Optimization 272 INFORMS Journal on Computing 0899-1499 100 1204-0272 $05.00 Vol. 12, No. 4, Fall 2000 2000 INFORMS A Revise Simplex Search Proceure for Stochastic Simulation Response Surface Optimization DAVID G.

More information

Characterizing Decoding Robustness under Parametric Channel Uncertainty

Characterizing Decoding Robustness under Parametric Channel Uncertainty Characterizing Decoing Robustness uner Parametric Channel Uncertainty Jay D. Wierer, Wahee U. Bajwa, Nigel Boston, an Robert D. Nowak Abstract This paper characterizes the robustness of ecoing uner parametric

More information

Dense Disparity Estimation in Ego-motion Reduced Search Space

Dense Disparity Estimation in Ego-motion Reduced Search Space Dense Disparity Estimation in Ego-motion Reuce Search Space Luka Fućek, Ivan Marković, Igor Cvišić, Ivan Petrović University of Zagreb, Faculty of Electrical Engineering an Computing, Croatia (e-mail:

More information

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks 1 Backpressure-base Packet-by-Packet Aaptive Routing in Communication Networks Eleftheria Athanasopoulou, Loc Bui, Tianxiong Ji, R. Srikant, an Alexaner Stolyar Abstract Backpressure-base aaptive routing

More information

Optimal Routing and Scheduling for Deterministic Delay Tolerant Networks

Optimal Routing and Scheduling for Deterministic Delay Tolerant Networks Optimal Routing an Scheuling for Deterministic Delay Tolerant Networks Davi Hay Dipartimento i Elettronica olitecnico i Torino, Italy Email: hay@tlc.polito.it aolo Giaccone Dipartimento i Elettronica olitecnico

More information

PAPER. 1. Introduction

PAPER. 1. Introduction IEICE TRANS. COMMUN., VOL. E9x-B, No.8 AUGUST 2010 PAPER Integrating Overlay Protocols for Proviing Autonomic Services in Mobile A-hoc Networks Panagiotis Gouvas, IEICE Stuent member, Anastasios Zafeiropoulos,,

More information

Research Article Research on Law s Mask Texture Analysis System Reliability

Research Article Research on Law s Mask Texture Analysis System Reliability Research Journal of Applie Sciences, Engineering an Technology 7(19): 4002-4007, 2014 DOI:10.19026/rjaset.7.761 ISSN: 2040-7459; e-issn: 2040-7467 2014 Maxwell Scientific Publication Corp. Submitte: November

More information

Lab work #8. Congestion control

Lab work #8. Congestion control TEORÍA DE REDES DE TELECOMUNICACIONES Grao en Ingeniería Telemática Grao en Ingeniería en Sistemas e Telecomunicación Curso 2015-2016 Lab work #8. Congestion control (1 session) Author: Pablo Pavón Mariño

More information

Local Path Planning with Proximity Sensing for Robot Arm Manipulators. 1. Introduction

Local Path Planning with Proximity Sensing for Robot Arm Manipulators. 1. Introduction Local Path Planning with Proximity Sensing for Robot Arm Manipulators Ewar Cheung an Vlaimir Lumelsky Yale University, Center for Systems Science Department of Electrical Engineering New Haven, Connecticut

More information

TCP Symbiosis: Congestion Control Mechanisms of TCP based on Lotka-Volterra Competition Model

TCP Symbiosis: Congestion Control Mechanisms of TCP based on Lotka-Volterra Competition Model TCP Symbiosis: Congestion Control Mechanisms of TCP base on Lotka-Volterra Competition Moel Go Hasegawa Cybermeia Center Osaka University 1-3, Machikaneyama-cho, Toyonaka, Osaka 56-43, JAPAN Email: hasegawa@cmc.osaka-u.ac.jp

More information

Advanced method of NC programming for 5-axis machining

Advanced method of NC programming for 5-axis machining Available online at www.scienceirect.com Proceia CIRP (0 ) 0 07 5 th CIRP Conference on High Performance Cutting 0 Avance metho of NC programming for 5-axis machining Sergej N. Grigoriev a, A.A. Kutin

More information

Chapter 9 Memory Management

Chapter 9 Memory Management Contents 1. Introuction 2. Computer-System Structures 3. Operating-System Structures 4. Processes 5. Threas 6. CPU Scheuling 7. Process Synchronization 8. Dealocks 9. Memory Management 10.Virtual Memory

More information

1 Surprises in high dimensions

1 Surprises in high dimensions 1 Surprises in high imensions Our intuition about space is base on two an three imensions an can often be misleaing in high imensions. It is instructive to analyze the shape an properties of some basic

More information

AN INVESTIGATION OF FOCUSING AND ANGULAR TECHNIQUES FOR VOLUMETRIC IMAGES BY USING THE 2D CIRCULAR ULTRASONIC PHASED ARRAY

AN INVESTIGATION OF FOCUSING AND ANGULAR TECHNIQUES FOR VOLUMETRIC IMAGES BY USING THE 2D CIRCULAR ULTRASONIC PHASED ARRAY AN INVESTIGATION OF FOCUSING AND ANGULAR TECHNIQUES FOR VOLUMETRIC IMAGES BY USING THE D CIRCULAR ULTRASONIC PHASED ARRAY S. Monal Lonon South Bank University; Engineering an Design 103 Borough Roa, Lonon

More information

Navigation Around an Unknown Obstacle for Autonomous Surface Vehicles Using a Forward-Facing Sonar

Navigation Around an Unknown Obstacle for Autonomous Surface Vehicles Using a Forward-Facing Sonar Navigation Aroun an nknown Obstacle for Autonomous Surface Vehicles sing a Forwar-Facing Sonar Patrick A. Plonski, Joshua Vaner Hook, Cheng Peng, Narges Noori, Volkan Isler Abstract A robotic boat is moving

More information

d 3 d 4 d d d d d d d d d d d 1 d d d d d d

d 3 d 4 d d d d d d d d d d d 1 d d d d d d Proceeings of the IASTED International Conference Software Engineering an Applications (SEA') October 6-, 1, Scottsale, Arizona, USA AN OBJECT-ORIENTED APPROACH FOR MANAGING A NETWORK OF DATABASES Shu-Ching

More information

CordEx. >> Operating instructions. English

CordEx. >> Operating instructions. English CorEx >> Operating instructions English Symbols use in this manual Important information concerning your safety is specifically marke. Follow these instructions closely to prevent accients an amage to

More information

Feature Extraction and Rule Classification Algorithm of Digital Mammography based on Rough Set Theory

Feature Extraction and Rule Classification Algorithm of Digital Mammography based on Rough Set Theory Feature Extraction an Rule Classification Algorithm of Digital Mammography base on Rough Set Theory Aboul Ella Hassanien Jafar M. H. Ali. Kuwait University, Faculty of Aministrative Science, Quantitative

More information

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks 1 Backpressure-base Packet-by-Packet Aaptive Routing in Communication Networks Eleftheria Athanasopoulou, Loc Bui, Tianxiong Ji, R. Srikant, an Alexaner Stoylar arxiv:15.4984v1 [cs.ni] 27 May 21 Abstract

More information