Time-Assisted Authentication Protocol

Size: px
Start display at page:

Download "Time-Assisted Authentication Protocol"

Transcription

1 Tme-Asssted Authentcaton Protocol 1 Muhammad Blal Unversty of Scence and Technology, Korea Electroncs and Telecommuncaton Research Insttute, Rep. of Korea mblal@etr.re.kr, engr.mblal@yahoo.com 2 Shn-Gak Kang Electroncs and Telecommuncaton Research Insttute, Rep. of Korea sgkang@etr.re.kr, Abstract Authentcaton s the frst step toward establshng a servce provder and customer (C-P) assocaton. In a moble network envronment, a lghtweght and secure authentcaton protocol s one of the most sgnfcant factors to enhance the degree of servce persstence. Ths work presents a secure and lghtweght keyng and authentcaton protocol sute termed TAP (Tme- Asssted Authentcaton Protocol). TAP mproves the securty of protocols wth the assstance of tme-based encrypton keys and scales down the authentcaton complexty by ssung a reauthentcaton tcket. Whle movng across the network, a moble customer node sends a reauthentcaton tcket to establsh new sessons wth servce-provdng nodes. Consequently, ths reduces the communcaton and computatonal complexty of the authentcaton process. In the keyng protocol sute, a key dstrbutor controls the key generaton arguments and tme factors, whle other partcpants ndependently generate a keychan based on key generaton arguments. We undertake a rgorous securty analyss and prove the securty strength of TAP usng CSP and rank functon analyss. Keywords: authentcaton, key dstrbuton, network securty, CSP, rank functons I. Introducton Newly emergng technologes such as IoT devces, smartphones wth varous sensors, wreless power chargng systems, wearable devces, and smart sensors have brought forth dfferent servces wth new types of servce provder and customer (P-C) assocaton requrements. For any servce provder and customer (P-C) assocaton, authentcaton s the frst step. Typcally, customers seek to obtan servces from an authentcated servce provder, and servce provders are concerned about provdng servces to verfed customers. However, to provde seamless servce n a moble envronment, the servce provder entty should be able to authentcate the moble customer node wth only a mnmum delay tme. Ths mples that the message exchange complexty of the authentcaton process should be low. A sutable authentcaton protocol for such an applcaton should be lghtweght and yet should ensure a proper protocol securty level. Moreover, a secure authentcaton protocol certfes that the communcatng entty s an authorzed entty whch s alve and partcpatng n a protocol run accordng to a defned role. Further, the protocol run follows the correct pre-set sequence of a protocol run, and ths should be acheved over nsecure communcaton channels between the servce provder and customer nodes [1-2].

2 Varous authentcaton protocols have been desgned to meet the requrements of dfferent applcatons, ncludng authentcaton for sensor networks [3], authentcaton for streamng data [4], authentcaton for IoT solutons [5], and authentcaton for ad-hoc networks [6]. The protocols developed thus far can be categores nto the three prmary categores of passwordbased authentcaton [7-8], certfcate-based authentcaton [9-10], and sgnature-based authentcaton protocols [11]. In ths study, we ntroduce a novel, lghtweght, and secure tmeasssted authentcaton protocol sute termed TAP [12]. The TAP protocol sute conssts of keyng and authentcaton protocol sutes. The keyng protocol sute conssts of key agreement and key retreval protocols. Lkewse, the authentcaton protocol conssts of the three protocols of the ntal authentcaton protocol, re-authentcaton protocol 1, and re-authentcaton protocol 2. The ntal authentcaton protocol s a password-based authentcaton protocol, whereas the reauthentcaton protocols are certfcate-based authentcaton protocols where the certfcate s a tme-based tcket ssued for a specfed tme duraton. The well-known authentcaton protocol Kerberos [13] also employs a tcket for authentcaton, though n contrast wth Kerberos, TAP does not requre tme synchronzaton. Moreover, n TAP the tcket verfer can authentcate the customer by tself wthout contactng the tcket-grantng entty. Moreover, a stolen tcket n TAP s of no sgnfcance, whle n the case of Kerberos, an unexpred stolen tcket s useful for an ntruder. In an earler study [14], the author analyzed the Kerberos protocol usng CSP (communcatng sequental processes) and a rank functon analyss and establshed that the protocol s vulnerable to few known attacks, whereas our CSP and rank functon analyss show that TAP s an entrely secure protocol. To ensure secure authentcaton, TAP employs a dstrbuted keychan generaton mechansm and reverses the tme-based usage of the keychan. Unlke TESLA [15], n TAP the keychan s ndependently generated by multple devces and s also used by each devce to drve other encrypton keys. For nstance, durng an nterval when a customer node wants to obtan servce, t acqures an authentcaton tcket encrypted wth the th key, and once t moves across the network, the verfer can verfy the tcket by decryptng the tcket usng the th key. The key dstrbuton and tme-based usage of the keychan are controlled by the man authentcaton entty (ME), whch can be an ndependent authentcaton server or an agent nstalled on a server. Whle movng across the network, a moble customer experences the authentcaton process multple tmes. Wth authentcaton tcket, the overall computatonal and message exchange complexty of the authentcaton process s reduced sgnfcantly. To establsh the overall nfrastructure for servce and authentcaton, each man authentcaton entty (ME) creates a group of servce provder enttes and neghborng man authentcaton enttes (ME). Usng group key encrypton, the man authentcaton entty (ME) broadcasts the tme-based key generaton parameters to all group members. In earler work [16], the author presented and examned several group key management protocols. In ths dscusson, we assume that the man authentcaton entty (ME) has knowledge of the publc keys of all group members; hence, t can share a group key wth new group members usng publc-prvate key semantcs. To determne the securty strength of TAP, we consdered an ntruder as dscussed n earler work

3 [17] wth certan extra capabltes. For nstance, the ntruder s capable of operatng on all communcaton channels between the customer and servce provder entty. Moreover, the ntruder can redrect, spoof, replay or block messages, and has ntally known nformaton; e.g., t knows the IDs of all users and servce provder enttes. It can ntercept, record, and generate a message from known nformaton. Gven the presence of such an ntruder, we dscuss the strength of TAP aganst some known attacks and nstances of ntercepted credentals, such as mpersonaton of a customer node, mpersonaton of a servce provder entty, and a replay attack. We further analyze TAP usng CSP and rank functon analyss. The remander of the paper s organzed as follows: Secton II gves a bref system overvew and dscusses the proposed strategy n partcular. In Secton III, we revew the strength of TAP aganst several known attacks and cases of ntercepted credentals. Next, the formal analyss of TAP usng CSP and rank functon analyss s presented n Secton IV. Then, n Secton V, we compare the securty and performance of the TAP protocol sute wth those of prevous methods work n the lterature. Fnally, we provde concludng remarks n Secton VI. II. Analytcal Model and Proposed Scheme The TAP system s not lmted to a partcular network type or applcaton; t s sutable for sensor networks, moble networks, and clent-server applcatons, among others. For the dscusson and analyss, we consder that the TAP system conssts of the three maor enttes of the man authentcaton entty (ME), the servce provder entty (P), and the customer node (C). The man authentcaton entty (ME) knows the publc keys of all servce provder enttes (P) and customer nodes (C). It authentcates and ssues a tme-based tcket (T k ) for re-authentcaton. It also authentcates any newly onng servce provder entty ( P). Durng the authentcaton process of P, the ME sends the customer node s requrement profle for an effcent and optmzed P C relatonshp. In addton, the ME controls the key dstrbuton and derves varous keys from the keychan. All MEs are connected va secure lnks and share publc keys wth all of ther neghbors. The servce provder entty (P) authentcates C upon recevng a vald authentcaton tcket (T k ) and starts provdng servces based upon the user profle. Upon the recept of the ntal authentcaton request, P forwards the message to ME. In some applcatons, P has two separate areas of operaton: the servce-delvery area ( A s ) and the communcaton area (A c ). P may authentcate or forward a request to ME whle C s n A s, and t may provde servces once t enters A c. The customer node (C) can on or leave the system dynamcally and can move across the network. Ether C ons the network or swtches from one servce provder (P) to another. In both cases, C s responsble for ntatng the authentcaton procedure. Notatons: ME = The th man authentcaton entty. P = The th servce provder entty. C = The th customer node.

4 A B = A s assocated wth B such that B s n controllng authorty. P ME represents that th servce provder entty s assocated wth th ME. G =Group of all assocated enttes of th ME. G o = Group of all non-assocated enttes of th ME who knows the K G. K 0 =The tme-based key generated at 0th nterval known as commtment key. K =The tme-based key generated at th nterval by ME. K C = The secret publc key of th Customer, t s publcally known to the MEs only. K ME s the publc key of ME, K P s the publc key of P and K C s the publc key of C. K G =A group key generated by ME. K S = A C P sesson key generated at th nterval. K p k = A partal key of C k used to generate C C sesson key. K, = A C C sesson key generated from partal keys. E B (m)=encryptng message m wth key K B. E ME (m) represents the encrypton of m' usng K ME. V 0 =The ndex value for nterval 0. T k = The kth Tcket generated at th nterval. Z(A) = An ntruder Z mpersonatng entty A. N = th nonce n a TAP message exchange. Fgure 1. System archtecture The overall system archtecture s shown n Fgure 1. Each ME creates a group whch conssts of neghbor MEs and assocated servce provder enttes. The ME shares a symmetrc group key K G wth all group members. For nstance, n Fgure 1 ME 2 creates a group consstng of ME 1, ME 3, and assocated servce provders (P 1 P k ). The group formaton and group key K G management processes can be done as per system constrants and requrements. In ths dscusson, we assume that ME knows the publc keys of all group members; consequently, t can share group key K G wth new group members usng publc-prvate key encrypton. The group key s a ratonal choce gven the assumpton that group members are not synchronzed wth regard to tme. In a stable synchronzed dstrbuted system, the group key K G can be replaced by the tme-based key K, where K should be the fnal key n the keychan. The TAP

5 scheme conssts of two protocol sutes, the keyng protocol sute and the authentcaton protocol sute, whch are dscussed below n subsectons A and B, respectvely B. Keyng Protocol: As n TESLA [15], TAP also generates a keychan usng an rreversble functon. However, n TESLA keys are used to authentcate a broadcastng entty; n TAP the keys are used to derve several other keys, such as a tcket encrypton key, a C P sesson key, and partal sesson key generators whch provde securty to the authentcaton system overall. Moreover, n TESLA [15], the keychan s generated n the broadcastng entty, whereas n TAP all members of G generate and share the same chan of key generators of length L. The group leader (ME ) shares the key generaton nformaton (Key MSG ) wth group members when they on the group. After the expraton of T d (at a vald tme for commtment key) ME broadcast Key MSG to all members of G ; Key MSG s encrypted wth K G or n the case of a tme-synchronzed system s encrypted wth K l (the fnal key n the keychan). The key generaton nformaton (Key MSG ) s used to generate a commtment key (K 0 ); afterward, all group members ndependently generate the chan of key generators. The group leader ME controls the procedure of commtment key generaton and all related characterstcs. The key generaton nformaton Key MSG = lookup(i, O) T d T c N 0 L MODE conssts of several peces of nformaton. I and O are ndex and offset values, respectvely, whch are used to select a predefned value from the secret TABLE. T d s the vald tme duraton for commtment key K 0, T C s the tme on ME when t was broadcastng Key MSG, N o s a nonce and MODE s the key retreval mode (dscussed n subsecton b). Note that T d s dvded nto L number of ntervals; t also determnes the keychan length. a) Key Generaton and Dstrbuton: The tme frame shown n Fgure 3-(a) s composed of three perods: the tme requred for key generaton ( T G ), the tme needed for key dstrbuton ( T Ds ), and the vald tme for the commtment key (T d ). All G members follow the subsequent steps: (1) run a functon g (shown n Fgure 3-(b)) to generate the commtment key generator G 0 = g(lookup(i, O), T d, N 0 ). (2) An rreversble functon F takes G 0 as nput argument and generates a chan of key generators of length L, {F(G 0 ) = G 1, F(G 1 ) = G 2 F(G l 1 ) = G l ; -e F(G k ) = G k+. (3) Usng another rreversble functon f (shown n Fgure 3(c)) all members of G generate an ndex value and keychan, f(g 0 ) = (K 0 V 0 ), f(g 1 ) = (K 1 V 1 ) f(g l ) = (K l V l ) V K ; where, V = {V 0, V 1,. V l } and K = {K 0, K 1,.. K l }. These keys are used for tcket encrypton; for nstance, the th key (K ) s used to encrypt tckets (T k ) ssued durng the th tme nterval. Keys are dsclosed n reverse order such the ntruder cannot generate future keys, whereas the ndexng vector (V) serves n an ndexng role to retreve the tcket encrypton key. For nstance, f V

6 corresponds to the th nterval, the key s retreved as F(G 0 ) = G f(g ) = (K, V ). (4) ME broadcasts Key MSG for the next chan to all group members usng K G or K l. Steps 1-3 are performed n T G and step 4 s executed durng T Ds. In addton to the tme-based keys (for tcket encrypton), ME also generates a unque C P sesson key K S = H(K H(K C k )) for verfed C k and P. Moreover, the valdty tme for K S k s gven as T R = l L. Fgure 2. Tme-based keys generaton and admsson wth reference to tme passage. Fgure 3. (a) Tme frame. (b) Structure of functon g H(lookup(I, O) T d N 0 ). (c) Structure of functon f H(G ) N 0 H() N 0 ). b) The Retreval Modes For The Tcket Encrypton Key: The authentcaton tcket conssts of two segments: the customer nformaton segment and the key retreval nformaton segment respectvely encrypted wth the tme-based key K l and group key K G. The key retreval procedure depends on the structure of the tcket, whch s determned by the system requrements and constrants. We propose three dfferent key retreval modes, as presented below. E (C k K s V Profle H head ) E G (C k V H(G ) H(K C k )) Mode-1 E (C k K s V Profle H head ) E G (C k (T t ) H(G ) H(K C k )) Mode-2

7 E (C k K s V Profle H head ) E G (C k V H head Vector Hash H(K C k )) Mode-3 The second half of T k depends on the mode and conssts of tme-based key retreval nformaton; once the tme-based key s retreved, t s then employed to decrypt and verfy the frst half of T k. In mode-01, ME adds the ndex value (V ) n the key retreval nformaton segment. The tcket verfer compares the appended value wthn the locally generated vector (V). A match at the th place ndcates that the tcket s generated by ME at the th nterval and can be decrypted by key K. In mode-02, ME nserts the tcket ssung tme T t nto the key retreval nformaton segment. The verfers can search for the value of the ndex wthn the followng range: [ T c T t T d ε L updated, T c T t T d + ε L updated ] Where, T c s the current tme of the verfer clock and ε s the tme drft. Intally, the value of ε s calculated as ε 0 = T c T c. Upon each successful retreval of K k, the value of ε s updated as shown below. ε updated = w 0 ε prevous + w 1 ε current In ths equaton, w 0 = 1 T c +T t T d and w 1 = T c +T t T d In mode-03, all G members ndependently generate a bnary hash tree whose leaf nodes are ndexng values taken from ndex vector (V). ME adds the ndex value (V ) and log 2 V number of hash values n key retreval nformaton segment; these hash values are selected nodes of the hash tree. Lkewse, the verfer can reconstruct the hash tree wth the total log 2 V number of hash operatons, whch gves the complexty of O(log). After the reconstructon of the tree and confrmaton of the head node, the verfer retreves the ndex value by runnng the followng smple search algorthm. Owng to the appended hash values, the ndex search complexty s reduced to O (1). Search algorthm: Start from head node and go down Ignore the appended values and follow reconstructed node. Do untl level log 2 V 1 Now, fnally select the appended value whch s the ndex value The mode 3 s sutable f the keychan s very long. C. Authentcaton Protocol Sute: A customer node C s authentcated n three dfferent ways. When t ons the system, t goes through a password-based authentcaton procedure termed the ntal authentcaton protocol. Hereafter, when C moves across the network, t s re-authentcated by a certfcate-based authentcaton procedure known as a re-authentcaton protocol, where a certfcate s a tmebased tcket ssued by ME durng the ntal authentcaton protocol run.

8 a) Intal Authentcaton Protocol: After every th nterval, P broadcasts ME s publc key. A newly onng C may receve multple broadcast messages; however, C contnues wth the frst P, and the protocol proceeds as follows: Fgure 4. Message exchange for the ntal authentcaton protocol. M1. P broadcast ME s publc key. M2. In the onng request C sends N 0 encrypted wth ME s publc key to P. If C s already regstered wth ME, the nonce N 0 can be replaced wth the hash value of the password. M3. P forwards the request to ME. ME retreves the profle from the database; f C s authorzed for the requested servces, ME retreves C 's secret key and sends the message M4. M4. ME sends M4 to P composed of tcket T k, the ndex value, and N 1 (challenge for C ) all encrypted wth K G ntended for P and u 0 = E C (P N N 1 T k T R K s ) ntended for C. P retreves the customer profle and sesson key K s from the tcket T k. M5. P forwards u 0 to C. After challenge verfcaton, C accepts T k. a. P C : u 0 Lmted f the servce provder entty cannot fulfll the servce requested due to resource lmtatons, t sends a message 'Lmted'. C may contnue or connect to another servce provder entty wth the allotted tcket. M6. After challenge confrmaton, P starts provdng servces; otherwse, P halts the servce and announces T k as an nvald tcket. b) Re-Authentcaton Protocol-1: When an authentcated C moves from P k P such that {P k, P } G, the protocol proceeds as follows.

9 Fgure 5. Message exchange for re-authentcaton protocol-1. M1. C sends Swtch Req = E S (C N 0 ) T k h(me ) to P. P decrypts the tcket, retreves the customer profle, and confrms whether C s authorzed for the further servce. a. Note that f P receves multple dentcal Swtch Req messages from C, t ndcates the exstence of a malcous user. M2. P sends a challenge response along wth a new challenge for C encrypted wth the C P sesson key. M3. After challenge confrmaton, P starts provdng servces; otherwse, P halts the servce and announces T k as an nvald tcket. c) Re-Authentcaton Protocol-2: When an authentcated C moves from P k P such that P G k o, the protocol proceeds as follows. Fgure 6. Message exchange for re- authentcaton protocol-2. M1. C sends Swtch Req = E S (C N 0 ) T k h(me ) to P. The P decrypts the second half of T k ; f the request s not from C, then P dscards the request; otherwse, P forwards t to ME. M2. ME decrypts the tcket, retreves the customer profle, and confrms whether C s authorzed for the further servce. If C s elgble for further servces, ME generates K s = h(k c V ) and proceeds as descrbed below. Otherwse, ME gnores the request and C may ntate the ntal authentcaton protocol. If C sends multple M1 messages, P gnores the messages, and C s marked as a malcous user. M3. ME sends M3 to P composed of new tcket T k, the ndex value V, and N 1 (challenge for C ) encrypted wth K G ntended for P and u 0 new = E C (T k T R K s N 1 N P ) ntended for C. P retreves the customer profle and sesson key K s from the new tcket T k. M4. P forwards u 0 to C. After challenge verfcaton, C accepts the T k. M5. After challenge confrmaton, P starts provdng servces; otherwse, P halts the servce and announces T k as an nvald tcket. If C G k o G k,the P gnores the request, and C ntates the ntal authentcaton protocol.

10 d) Specal Cases: Customer-Customer (C C ) Mutual Authentcaton: Here, we assume that two customer nodes ( C and C ) want to communcate drectly. To authentcate each other, C and C exchange messages composed of respectve tckets and partal keys whch are encrypted wth the respectve C P sesson keys. C C : E s (C N 0 K p ) T k. C C : E s (C N N 1 K p ) T k. To decrypt the authentcaton message, both C and C forward t to ther assocated servce provder enttes. After the frst message exchange, there are three possble scenaros concernng the C P assocaton. The customer-customer mutual authentcaton protocol proceeds dfferently for each scenaro, as dscussed below. 1- If {C, C } P, the respectve servce provder entty (P ) decrypts the messages and retreves the partal keys for assocated customers; P sends the partal key along wth a challenge response to C and C. After challenge verfcaton, both C and C generate a C C sesson key K, = H(K p N 1 K p N 0 ) for further communcaton. 2- If {P, P } G and C P and C P, the respectve servce provder enttes decrypt the message and retreve the partal key for assocated customers. P and P send the partal key along wth a challenge response to C and C, respectvely. After the challenge verfcaton step, both C and C generate a C C sesson key K, = H(K p N 1 K p N 0 ) for further communcaton. 3- If {P, P } G 0, C P, and C P, the ndvdual servce provders forward the message to the respectve MEs to retreve the partal keys. After recevng the response from the respectve ME s, P and P send the partal key along wth a challenge response to C and C, respectvely. After challenge verfcaton, both C and C generate a C C sesson key K, = H(K p N 1 K p N 0 ) for further communcaton. Delayed or lost response for a onng/swtch request: As dscussed earler, multple dentcal onng/swtch requests from the same C ndcate the exstence of an ntruder. The ncluson of the prevous nonce prevents the stuaton of msnterpretaton between a lost request and a replay attack. a. C P : E ME (C N 0 N 0 ). b. C P : E s (C N 0 N 0 ) T k Swtch Req. For re-authentcaton protocol-2, f C does not obtan a response for a swtch request, t ndcates that an ntruder has forged h(me ), and P s unable to proceed. Hence, P gnores the request and C sends an ntal authentcaton request along wth nonce sent n the prevous request. The ncluson of the prevous nonce prevents the stuaton of msunderstandng between a lost request and a replay attack.. a. C P : E ME (C N 0 N 0 T k Alert).

11 III. Strength aganst several known attacks To verfy the securty of TAP, we ntroduce an ntruder Z nto the system, as dscussed n earler work [17]. The ntruder s capable of controllng all communcaton channels (send and receve); t can redrect, spoof, replay or block messages and has ntally known nformaton, such as the IDs of all users. In the presence of such an ntruder, we explore the strength of TAP aganst certan known attacks, n ths case the replay, parallel sesson, and bndng attacks. A. Impersonatng C Let us consder an ntruder Z(C ) who ntercepts and records the messages from C and can communcate wth P. Durng the ntal authentcaton process, f Z(C ) mpersonates C wthout nterceptng orgnal messages from C, at M3 the presence of the ntruder s detected, as ME receves multple on requests from the same C such that the requests come from multple or sngle nstances of P wth multple requests per P, thus ndcatng the presence of an ntruder. In the gven scenaro, ME sends an alert message appended wth M4; addtonally, each M4 ncludes a dfferent N 1 challenge nonce for each request forwardng P ( ME P : u 0 E G (V N 1 T k ) Alert ). Smlarly, even f Z(C ) mpersonates and successfully ntercepts all messages from C, t stll fals to send M6 wthout knowng the C P sesson key and the prvate key of C. In re-authentcaton protocol-1 and protocol-2, f Z(C ) mpersonates and successfully ntercepts all the messages from C, wthout knowng the C P sesson key, Z(C ) fals to send a vald M3 n protocol-1 and an authentc M5 n protocol- 2. The falure of M3/M5 ndcates the presence of a malcous user. Lkewse, n mutual authentcaton protocol for customers, an ntruder cannot acqure partal keys wthout knowng the C P sesson keys. B. Impersonatng P Let us consder an ntruder Z(P ) who can ntercept and record messages from P and can communcate wth C. If Z(P ) mpersonates P and successfully ntercepts all messages from P, t brngs a mnor delay, and C ntates another authentcaton process. Moreover, Z(P ) s unable to obtan T k wthout knowng the prvate key of C and cannot obtan K G wthout knowng the prvate key of P. Smlarly, n re-authentcaton protocol-1 and protocol-2, f Z(P ) mpersonates and successfully ntercepts all messages from P, Z(P ) s stll unable to obtan T k wthout knowng the C P sesson key. C. Replay or Multplcty Attack To nvestgate the strength of TAP aganst a replay or multplcty attack, as ntroduce the ntruder Z(C ), as dscussed above, and launch a replay attack aganst ntal and reauthentcaton protocols.

12 a) Replay attack on the Intal Authentcaton Protocol In the {Z(C ), C } ME case, the ntruder Z(C ) can replay a few messages n the ntal authentcaton protocol run; however, t fals to complete the protocol run, and the presence of the ntruder s detected after few messages are exchanged. Fgure 7. An example of replay attack on TAP ntal authentcaton protocol. M2 : Intruder Z(C ) ntercepts M2 and replays the message towards P. M3 : ME receves smlar multple on requests from P and P, whch s a concevable ndcaton of a malcous user. ME wll send M4 and M4 to P and P, respectvely. Both messages consst of an alert sgnal and two dfferent challenges. M6 : The ntruder fals to complete the attack, as the expected reply s E s (C N 1 + 1), and P notfes ME of the exstence of an ntruder. b) Replay attack on Re-Authentcaton Protocol-1 In the case of {P, P } ME, the ntruder Z(C ) can replay a few messages n re-authentcaton protocol-1; however, t fals to complete the protocol run and the presence of the ntruder s thus detected after a few messages are exchanged. Fgure 8. An example of replay attack on TAP re-authentcaton protocol-1.

13 M1 : The ntruder replays the message to deceve P wth a message seemngly sent by C and encrypted wth K s. M3 : The ntruder fals to complete the attack, as the expected reply s E s (C N 1 + 1), and P notfes ME of the exstence of an ntruder. c) Replay attack n Re-Authentcaton Protocol-2 In the case of {Z(C ), C } ME, the attack follows a message sequence smlar to that of the ntal authentcaton case and provdes the same concluson; at M3, ME detects the threat, and at M5 the correspondng P dentfes the ntruder. However, f {C } ME and Z(C ) ME k such that {ME, ME k } G, meanng that the ntruder ntercepts the messages and uses t to become authentcated by another ME by explotng the fact that the ME s do not nteract throughout the procedure. Ths attack s carred out as follows: Fgure 9. An example of replay attack on TAP re-authentcaton protocol-2. M1 : The ntruder replays the message to deceve P wth a message seemngly sent by C and encrypted wth K s. M3/M3 : ME or ME k cannot detect an ntruder. M5 : The ntruder fals to complete the attack, as the expected reply s E s (C N 1 + 1), and P notfes ME of the exstence of an ntruder D. TAP falure under gven condtons Let s Next, we consder a certan exceptonal condton whch enables an ntruder to launch a successful attack. C1. Z(C ) s n P coverage area. C2. C s not n the range of any legtmate P. C3. Z(P ) can communcate wth C pretendng to be a legtmate servce provder. C4. Z(C ) and Z(P ) can communcate drectly wth neglgble tme delay. C5. All four condtons should hold together. Under the gven condtons, the ntruder can act as a man n mddle, replay messages, and run a parallel sesson of the protocol wth bndng attack abltes. The ntruder replays the message

14 whch t receves from ts partner, who runs a parallel sesson wth a legtmate counterpart. However, even under the gven condtons, the ntruder cannot re-authentcate. The attack on the ntal authentcaton wll proceed as follows: Fgure 10. An example of a successful attack on TAP under gven condtons. E. Remarks on TAP securty In TAP, f a legtmate counter entty s an actve partcpant n the system, the mpersonatng C or P s detectable and dentfable; ths mples that replay, bndng, and parallel sesson attacks are not successful attacks aganst TAP. However, under hghly exceptonal condtons, a man n the mddle, who can replay the messages and run a parallel sesson of the protocol wth the capablty of a bndng attack, can launch a successful attack. In a system where these condtons are lkely to occur, t s recommended to take certan measures to authentcate the dentty of the broadcastng servce provder entty (P ). To prevent DDoS attacks, the group on and ntal authentcaton procedures nclude a puzzle n M1 and proceed f the requestng entty provdes a vald soluton [18,19]. VII. Formal analyss of TAP usng CSP and RANK functon analyss Communcatng Sequental Processes (CSP) refer a form of algebra whch descrbes and analyzes a system whch conssts of communcatng processes [20]. TAP authentcaton procedures can be defned as events of CSP processes, and through the rank functon analyss method [21-23], we can verfy the securty of TAP. CSP Notatons: A P: Process P performs an event A on ts nterface. After performng event A process P may or may not change ts state. P Q: P Choce Q s a choce operator, t provdes a process who behaves as P or Q. P R Q: P and Q run n parallel and synchronzed on event P.

15 P R STOP: Restrct process P on event set R. P Q: P and Q are the nterleavng processes, and run n parallel wthout event synchronzaton. It s a specal case of the parallel process, where an event set of synchronzaton s an empty set. P Q = P <> Q. S m: Set of messages S can generate message m. traces(p): All possble event traces of process P. tr traces(p): A trace sequence tr belongs to traces(p) f P performs events of tr n the same sequence. tr C: The set of messages n trace sequence tr collected at channel C. tr A: Maxmal subsequence of trace sequence tr who's elements are taken from event set A. P sat S tr traces(p) S. If the trace tr s one of the traces of process P such that trace tr predcated by the event/message S, mples that process P satsfes the event/message set S. Such statement s trace specfcaton (TS). CP d : Set of d s of all C and P. n m: n s suffcent nformaton to trust that m s correct/true nformaton. A. Modelng the TAP network n CSP We consder the system NET, whch s defned by the legtmate user processes of TAP n conuncton wth the ntruder process Z. NET = (User C (N 0 ) User P User ME ) [send, receve] User Z (S) Where, User C (N 0 ), User P and User ME represent the legtmate nterleavng processes of C, P and ME, respectvely, whch are runnng n parallel and whch are synchronzed to ntruder Z at the [send, receve] event set. Ths gves the ntruder the capabltes dscussed below. a) Modelng Intruder Z n CSP Let us defne a CSP model for ntruder process Z as dscussed n an earler study [17] wth certan extra capabltes. The ntruder s capable of controllng all communcaton channels (send and receve) and can redrect, spoof, replay or block messages. It also has the ntally known nformaton INIT, e.g., the IDs of all users. When a legtmate user sends a message to another legtmate user, Z can ntercept and record each message; these ntercepted messages are addtonal nformaton wth regard to the current nformaton (S) of Z -e S {m}. User z (S) = send. A. B. m Z(S {m}) S m receve. A. B. m Z(S) Let us also suppose the exstence of legtmate users A and B. Intruder Z can deceve A by

16 sendng a message m, ntercepted or generated from current nformaton S ( S m ), and pretendng to be user B. b) Modelng TAP Authentcaton Procedures n CSP The actvtes of C, P and ME n TAP can be defned as CSP processes. In addton to the actvaton of TAP authentcaton, the CSP processes also generate two sgnals, conf and Auth: conf. A. B. n m : Based upon nformaton n, partcpant A s confdent that shared nformaton m s trusted nformaton between A and B. Auth. B. A. m: B authentcates A based upon trusted nformaton m and B agrees that A was prevously runnng the protocol and performed the correspondng sgnal conf. The CSP processes for the TAP ntal authentcaton protocol: User C = P receve. C. P. K ME send. C. P. E ME (C N 0 ) receve. C. P. u 0 conf. C. P. N 0 N 1 send. C. P. E s (C N 1 + 1) STOP The CSP processes for TAP re-authentcaton protocol-1: User C = P send. C. P. E s (C N 0 ) T k receve. C. P. E s (P N 1 N 0 + 1) conf. C. P. N 0 N 1 send. C. P. E s (C N 1 + 1) STOP The CSP processes for TAP re-authentcaton protocol-2: User C = P send. C. P. E s (C N 0 ) T k h(me ) receve. C. P. u 0 conf. C. P. N 0 N 1 send. C. P. E s (C N 1 + 1) STOP User P = send. P. C. K ME receve. P. C. E ME (C N 0 ) send. P. ME. E ME (C N 0 ) receve. ME. P. u 0 send. P. C. u 0 receve. P. C. E s (C N 1 + 1) Auth. P. C. N 1 STOP Where the actvtes of ME are common for all of the TAP protocols. User ME = receve. ME. P. (C N 0 ) send. ME. P. u 0 E G (V N 1 T k ) STOP User P = receve. P. C. E s (C N 0 ) T k send. P. C. E s (P N 1 N 0 + 1) receve. P. C. E s (C N 1 + 1) Auth. P. C. N 1 STOP User P = receve. P. C. E s (C N 0 ) T k h(me ) send. P. ME. E s (C N 0 ) T k h(me ) receve. ME. P. u 0 send. P. C. u 0 receve. P. C. E s (C N 1 + 1) Auth. P. C. N 1 STOP B. Rank Functon Analyss To prove the overall securty of TAP, we use a proof strategy whch verfes that all authentcaton protocols satsfy the rank theorem, whch mples that TAP s a secure protocol. The entre process s dscussed n detal n subsequent sub-sectons. a) Proof strategy Accordng to the protocol semantcs, the sgnal conf. A. b. m must follow a sgnal Auth. A. B. m, whch mples the followng authentcaton property (AP1): NET Sat conf. C. P. (N 0 N 1 ) precedes Auth. P. C N 1

17 To prove that NET should meet AP1, Schneder [22] specfes a smple strategy: for NET to satsfy AP1, NET must establsh that Auth. P. C N 1 cannot be generated n NET f an occurrence of conf. C. P. N 0 N 1 s prevented. Ths proof strategy mples the followng trace specfcaton (TS1): NET conf. C. P. N 1 STOP Sat tr Auth. P. C N 1 =< > b) Rank Functon Rank functon ( ρ : M Num ) maps the messages to a number, where M s the set of all messages and sgnal generated messages (S m) appearng n the protocol run. ρ(m) > 0 f the dsclosure of m s safe (.e., f NET mantans a secure state) and ρ(m) 0 f the dsclosure of m s unsafe (.e., f NET enters a compromsng state). For a process P to mantan a postve ρ, t should not transmt ρ(m) 0 untl and unless P has already receved (m) 0. Such a process mantans the followng trace specfcaton (TS2). P mantans ρ tr trace(p) ρ(tr receve) > 0 ρ(tr send) > 0 If a process mantans TS2, t never ntroduces ρ(m) 0; hence, a protocol s proved to be secure f all processes mantan TS2. c) Rank Theorem and Suffcent Condton Rank Theorem: If, for event sets R and T, ρ satsfyng P1) m INIT ρ(m) > 0 P2) S M, m M ( m S ρ(m ) > 0) S m ρ(m) > 0 P3) t Tρ(t) 0 P4) (User R stop sat mantan ρ) for each user then, NET sat R Precedes T. The proof of theorem s presented n earler work [20]. The four propertes of the rank functon prevent an exchange of non-postve messages n the system NET R STOP, whch s synchronzed wth STOP upon event set R. In TAP, R = conf. A. B. m and T = Auth. A. B. m, whch mples that the occurrence of sgnal conf wll stop the process NET. Earler, we dscussed wth regard to the proof strategy that TAP s secure f t satsfes TS1. If the rank functon of TAP holds all propertes of the rank theorem, ths mples that all of the processes mantan TS2, and NET satsfes TS1. Ths condton s suffcent to prove that TAP s a secure authentcaton protocol. d) Rank Analyss for TAP ntal Authentcaton Here, we defne the rank functon for the ntal authentcaton. As dscussed earler, f an ntruder mpersonates C or P, the system NET mantans a secure state; hence, ρ(cp d ) > 0. All nonce nstances are non-postve such that ρ(n) 0 ; hence, the nonce must be sent out encrypted wth a secure key (K represents the set of all secure keys);.e., ρ(e k (N)) > 0. As descrbed n TS1, NET s restrcted upon conf. A. B. m, and any message or sgnal after the conf sgnal s marked as non-postve.

18 ρ(k) = { 1 f K = K ME 0 otherwse 0 f m = receve. P. C. E s (C_ N 1 + 1)Or ρ(m) = { m = send. C. P. E s (C N 1 + 1) 1 otherwse ρ(cp d ) > 0 ρ(e k (N)) > 0 ρ(athu) 0 ρ(n) 0 At ths stage, we can verfy the securty of the TAP ntal authentcaton usng the rank theorem propertes. P1) m INIT ρ(m) > 0: The fundamental knowledge of the ntruder INIT ncludes CP d and K ME, whch have postve rank values, hence satsfyng P1. P2) S M, m M ( m S ρ(m ) > 0) S m ρ(m) > 0 : Ths property verfes whether a set of postve rank messages can generate a non-postve rank message. All nonpostve rank messages are encrypted wth the non-postve encrypton key K s. The ntruder cannot acqure K s wthout knowng the non-postve key K c, the non-postve nonce N 0, and the non-postve nonce N 1 ; hence, ths condton satsfes P2. P3) t Tρ(t) 0: The event set T s the Auth. A. B. m sgnal, and under the gven restrcton we have ρ(athu. A. B. m) 0, hence satsfyng P3. P4) (User R stop sat mantan ρ) for each user Ths property states that all users CP d should mantan a postve state when restrcted wth regard to event set R = conf. A. B. m. We confrm f the processes User C and User P satsfy P4 User C Conf. C. P. N 1 STOP = P receve. C. P. k ME send. C. P. E ME (C N 0 ) receve. C. P. u 0 f P = P N = N 0 N 1 STOP else fp = P N N 0 Intate wth resend mode Hence, the protocol mantans a postve ρ under the gven restrcton, and t satsfes P4. It s concluded that the TAP ntal authentcaton protocol s secure, and we further check reauthentcaton protocol-1 and protocol-2. e) Rank Analyss for TAP Re-Authentcaton Rank functon for TAP re-authentcaton protocols 1 and 2 are smlar to the rank functon for ntal authentcaton (because all the conventons of ntal authentcaton hold true for reauthentcaton protocol 1 and 2), except tcket, whch s encrypted wth non-postve keys, hence we have ρ(t k ) >0. From CSP of TAP re-authentcaton, we notce that message and sgnal pattern after conf. A. b. m s smlar to the ntal authentcaton protocol. Hence, TAP satsfes the rank propertes for re-authentcaton protocol 1 and 2 as well. It concludes that TAP s a secure authentcaton protocol.

19 Clams Weak Agreement Agreement Nonnectve Nonnectve Agreement TABLE II AUTHENTICATION PROPERTIES COMPARISON B. Vayda et. al [24] I. Chang et. al [25] L Xehua [26] H. Ln et. al [27] TAP TAP Not Restrcted Restrcted Not Restrcted Restrcted Not Restrcted Restrcted Not Restrcted Restrcted Not Restrcted Restrcted U GW S U GW S U GW S U GW S UE MME HSS UE MME HSS U S U S C P ME C P ME N Y N N Y N Y Y N Y Y N N N N N Y N N N N Y Y Y Y Y Y Y N Y N N Y N Y Y N Y Y N N N N N Y N N N N Y N Y Y Y Y Y N Y N N Y N Y Y N Y Y N N N N N Y N N N N Y N N N Y Y Y Ths artcle has been accepted for publcaton n a future ssue of Internatonal Journal of VIII. Securty and Performance Comparson A. Securty Comparson In ths secton, we compare TAP wth exstng authentcaton schemes [24-27]. The TAP protocol s not lmted to a partcular network type or applcaton scenaro; thus, we compare TAP wth a sensor network [24-25], LTE [26] and clent-server applcatons [27]. In the prevous sectons, we examned the strength of TAP wth a rgorous analyss. For further confrmaton of the strength of the TAP protocol, we mplemented TAP and several well-known prevously proposed schemes [24-27] n an automated securty protocol analyss tool, Scyther [28]. The Scyther tool verfes protocol clams aganst possble attacks n the presence of an ntruder, as dscussed n Secton V- B. The clams are events whch descrbe the am and securty propertes of the authentcaton protocol, as defned below [1-2]. Alveness: Ths clam nfers that at the end of a protocol run, the partcpants are guaranteed that all partcpants were runnng the protocol. Weak Agreement: Ths clam presumes that at the end of the protocol run, protocol ntator s confdent that the protocol responder has been runnng the protocol, though superfcally. Non-nectve Agreement: Ths clam nfers that at the end of a protocol run, the protocol ntator s confdent that the protocol responder has been runnng the Parameter TABLE I SCYTHER PARAMETER SETTINGS Type Number of Runs 1~100 Matchng Type Fnd all Type Flaws Search prunng Fnd All Attacks Number of pattern per clam 100 Alveness N Y N N Y N Y Y N Y Y N N N N N Y N N Y N Y Y Y Y Y Y Y

20 protocol accordng to a defned role and partcpants are agreed upon a data set shared durng the protocol run. Non-nectve Synchronzaton: Ths clam nfers that at the end of a protocol run, all partcpants are confdent that all other partcpants exactly followed ther roles n the protocol and exchanged messages n the ntended order. In Scyther the protocols are modeled as an exchange of messages among the partcpants performng specfc roles ; for nstance, the customer node performs the role of the ntator, the servce provder performs the role of the responder, and the ME performs the role of a server. We mplemented and tested TAP and the proposed methods of Vayda et al. [24], Chang et al. [25], Xehua [26], and Ln et al. [27] through the clams mentoned above wth the parameter settngs gven n Table I. The protocols are tested under Restrcted and Not Restrcted condtons. Under the Restrcted condtons, honest partcpants usng the protocol are restrcted and can thus run only one nstance of the protocol. These results are shown n Table II. It s clear that our protocol qualfes all of the protocol clams, and no attacks were noted under the restrcted condton. Conversely, t fals to fulfll a few clams when partcpants are permtted to run multple nstances. However, our protocol outperforms those n the earler works [24-27], and t s secure n a large number of systems and scenaros. In contrast, the earler methods [24-27] are susceptble to several attacks and fal to fulfll the maorty of authentcaton clams. B. Performance Comparson The results of the performance comparson are presented n Table III, where we compare the effcency of the TAP authentcaton protocol sute n terms of the computatonal cost, message complexty and tme synchronzaton requrements aganst the authentcaton schemes dscussed above [24-27]. The computatonal cost s estmated to be the sum of the overall number of modular exponentatons (e) and the hash (h) and XOR (x) operatons. To compute the computatonal cost of one of the earler methods [26], we assumed that the cost of TABLE III PERFORMANCE COMPARISON OF TAP WITH PREVIOUS WORK Scheme Comp. Complexty Message Complexty Tme Syn. B. Vayda et. al [24] 8H+4X (6+k)U Y I. Chang et. al [25] 25H+1X (2+5)U Y L Xehua [26] 12H+2X 8U N H. Ln et. 13H+12X+2 al [27] E (2+3)U Y TAP (IA) 3H 5U N TAP (RA- 1) 1H 3U N TAP (RA- 2) 4H 4U N E=Modular exponentaton, H = hash operaton, X=XOR operaton, U = uncast message functons f3, f4, and s10 n the SE-EPS vector generaton algorthm were dentcal to one hash operaton. Regardng the computatonal cost, the TAP protocol sute greatly outperforms all of the schemes. Referrng to the modular exponentaton, the approach presented by Ln et al. [27] s the most expensve scheme, followed by those of Chang et al. [25], Xehua [26] and Vayda et

21 al. [24]. For the sake of smplcty, we gnore the computatonal cost of the XOR operaton. Fgure 11 shows the computatonal cost of TAP compared to the approaches of Vayda et al. [24], Chang et al. [25] and Xehua [26] for a moble customer node movng across the network and experencng the authentcaton process. Fgure 12 shows the message complexty of TAP compared to these earler schemes [24-27] for a moble customer node movng across the network and experencng the authentcaton process multple tmes. The message complexty s presented for the method of Vayda et al. [24], calculated wth the assumpton that k=3, meanng that at the tme of onng there are fve potental nodes whch can process the logn request sent by a user. In the bestcase scenaro, when a customer experences re-authentcaton protocol 1 the, TAP message complexty s the lowest. However, the message complexty of the approach by Ln et al. [27] s slghtly better than the message complexty of TAP n the worst-case scenaro. Moreover, unlke the methods of Vayda et al. [24], Chang et al. [25] and Ln et al. [27], TAP and the approach by Xehua [26] do not requre tme synchronzaton among the partcpatng enttes. Fgure 12. Message Complexty comparson of TAP wth prevous works. Fgure 11. Computatonal cost comparson of TAP wth prevous works. IX. Concluson In ths paper, we proposed a novel key dstrbuton and authentcaton protocol (TAP) for dynamc and moble network applcatons. TAP enhances the level of protocol securty wth the assstance of tme-based encrypton keys and scales down the authentcaton complexty by ssung an authentcaton tcket. A securty analyss conducted here shows that TAP s secure aganst known attacks. A formal analyss usng CSP and rank functon analyss further confrms the strength of the TAP protocol. We also compared the securty and performance of TAP wth a

22 sensor network [24-25], LTE [26] and wth the Clent Server Applcaton approach [27]. The fnal results show that TAP s secure and desrable for an mmense range of network applcatons. ACKNOWLEDGEMENT Ths work was supported by Insttute for Informaton &communcatons Technology Promoton (IITP) grant funded by the Korea government (MSIP). (No. R , Standardzaton of Wreless Power Transfer Technology and Servce)] References [1] G. Lowe. A Herarchy of Authentcaton Specfcatons. In proceedngs. 10th Computer Securty Foundatons Workshop. June 1997 [2] C. Cremers, S. Mauw, E.P. De Vnk. Inectve synchronzaton: An extenson of the authentcaton herarchy. Theoretcal Computer Scence, vol. 367, no. 1-2, November 2006 [3] S. Msra, S. Goswam, C. Tanea and A. Mukheree. Desgn and mplementaton analyss of a publc key nfrastructure-enabled securty framework for ZgBee sensor networks. Int. J. Commun. Syst., November 2014, DOI: /dac.2893 [4] Phlppe Golle and Nagendra Modadugu. Authentcatng Streamed Data n the Presence of Random Packet Loss. avalable at Feb, 2008 [5] K. T. Nguyen, M. Laurent, N. Oualha. Survey on secure communcaton protocols for the Internet of Thngs. Ad Hoc Networks, vol. 32, September 2015 [6] N. Komnnos, D. D. Vergados and C. Doulgers. Multfold node authentcaton n moble ad hoc networks. Int. J. Commun. Syst., March 2007, DOI: /dac.882 [7] M. S. Farash1, M. A. Attar and Saru Kumar. Cryptanalyss and mprovement of a threeparty password-based authentcated key exchange protocol wth user anonymty usng extended chaotc maps. Int. J. Commun. Syst. (2014), DOI: /dac.2912 [8] J. We, X. Hu and W. Lu. wo-factor authentcaton scheme usng attrbute and password. Int. J. Commun. Syst. (2014), DOI: /dac.2915 [9] W. Wen, T. Sato, and F. Mzoguch. Securty of Publc Key Certfcate Based Authentcaton Protocols. Chapter, Publc Key Cryptography, Volume 1751, Lecture Notes n Computer Scence, pp , DOI: / _14 [10] A. Kukec, S. Groš and V. Glavnc. Implementaton of Certfcate Based Authentcaton n IKEv2 Protocol. 29th Internatonal Conference on Informaton Technology Interfaces, June 2007 [11] R. Anderson, F. Bergadano, B. Crspo, J.Lee, C. Manfavas and R. Needham. A New Famly of Authentcaton Protocols. ACM SIGOPS Operatng Systems Revew, Volume 32, Number 4, October 1998 [12] Blal, M.; Kang SG. Tme-Asssted Authentcaton Protocol (Under revew for US patent, Pendng App No. 15/348,480) [13] C. Neuman, S. Hartman and K. Raeburn. The Kerberos Network Authentcaton Servce (V5). [RFC4120], July 2005

23 [14] Yoney Krsal and Orhan Gemkonakl. Analysng the Kerberos Tmed Authentcaton Protocol Usng CSP-Rank Functons. Chapter, Global Securty, Safety, and Sustanablty, Volume 45, pp [15] Adran Perrg, Ran Canett, J. D. Tygar anddawn Song. The TESLA Broadcast Authentcaton Protocol. Avalable at f, 2002 [16] S. Rafael and D. Hutchson. A Survey of Key Management for Secure Group Communcaton, ACM Computng Surveys. Vol. 35, No. 3, September 2003 [17] D. Dolev and A. C. Yao. On the Securty of Publc Key Protocols. IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. IT-29, NO. 2, MARCH 1983 [18] Ar Juels and John Branard. Clent Puzzles: A Cryptographc Countermeasure Aganst Connecton Depleton Attacks. In Conference Proceedngs of Network and Dstrbuted System Securty Symposum, NDSS 1999, USA [19] Ncholas A. Fraser, Douglas J. Kelly, Rchard A. Ranes, Rusty O. Baldwn, and Barry E. Mulln. Usng Clent Puzzles to Mtgate Dstrbuted Denal of Servce Attacks n the Tor Anonymous Routng Envronment. In Conference Proceedngs, IEEE Internatonal Conference on Communcatons, June 2007 [20] P.Y.A. Ryan, S.A. Schneder, M.H. Goldsmth, G. Lowe and A.W. Roscoe. The Modellng and Analyss of Securty Protocols: the CSP Approach. Book, ISBN: , 2000 [21] S. Shakh and V. Bush. Analysng the Woo-Lam Protocol Usng CSP and Rank Functons. Journal of Research and Practce n Informaton Technology, Vol. 38, No. 1, February 2006 [22] S. Schneder. Securty Propertes and CSP. Proceedngs of IEEE Symposum on Securty and Prvacy, May 1996 [23] S. Schneder. Verfyng Authentcaton Protocols n CSP. IEEE Transactons on Software Engneerng, Vol. 24, No. 9, September 1998 [24] B. Vadya, J. J. Rodrgues and J. Hyuk Park. User authentcaton schemes wth pseudonymty for ubqutous sensor network n NGN. Int. J. Commun. Syst. 2010, DOI: /dac.1097 [25] I. Chang, T. Lee, T. Ln 3 and C. Lu. Enhanced Two-Factor Authentcaton and Key Agreement Usng Dynamc Identtes n Wreless Sensor Networks. Sensors, 2015, DOI: /s [26] L. Xehua, W. Yongun. Securty Enhanced Authentcaton and Key Agreement Protocol for LTE/SAE Network. Internatonal Conference on Wreless Communcatons, Networkng and Moble Computng (WCOM), 2011, Wuhan [27] H. Ln. Effcent moble dynamc ID authentcaton and key agreement scheme wthout trusted servers. Int. J. Commun. Syst. (2014), DOI: /dac.2818 [28] Cas J.F. Cremers.The Scyther Tool: Verfcaton, Falsfcaton, and Analyss of Securty Protocols. Chapter Computer Aded Verfcaton, Volume 5123, seres Lecture Notes n Computer Scence, pp , DOI: / _38

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments Internatonal Journal of u- and e- ervce, cence and Technology Vol8, o 7 0), pp7-6 http://dxdoorg/07/unesst087 ecurty Enhanced Dynamc ID based Remote ser Authentcaton cheme for ult-erver Envronments Jun-ub

More information

Two-Factor User Authentication in Multi-Server Networks

Two-Factor User Authentication in Multi-Server Networks Internatonal Journal of ecurty and Its Applcatons Vol. 6, No., Aprl, 0 Two-Factor ser Authentcaton n Mult-erver Networks Chun-Ta L, Ch-Yao Weng,* and Chun-I Fan Department of Informaton Management, Tanan

More information

Security Vulnerabilities of an Enhanced Remote User Authentication Scheme

Security Vulnerabilities of an Enhanced Remote User Authentication Scheme Contemporary Engneerng Scences, Vol. 7, 2014, no. 26, 1475-1482 HIKARI Ltd, www.m-hkar.com http://dx.do.org/10.12988/ces.2014.49186 Securty Vulnerabltes of an Enhanced Remote User Authentcaton Scheme Hae-Soon

More information

An Improved User Authentication and Key Agreement Scheme Providing User Anonymity

An Improved User Authentication and Key Agreement Scheme Providing User Anonymity 35 JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY, VOL. 9, NO. 4, DECEMBER 0 An Improved User Authentcaton and Key Agreement Scheme Provdng User Anonymty Ya-Fen Chang and Pe-Yu Chang Abstract When accessng

More information

A Secure Dynamic Identity Based Authentication Protocol with Smart Cards for Multi-Server Architecture

A Secure Dynamic Identity Based Authentication Protocol with Smart Cards for Multi-Server Architecture JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 31, 1975-1992 (2015) A Secure Dynamc Identty Based Authentcaton Protocol wth Smart Cards for Mult-Server Archtecture CHUN-TA LI 1, CHENG-CHI LEE 2;3,*, CHI-YAO

More information

New Remote Mutual Authentication Scheme using Smart Cards

New Remote Mutual Authentication Scheme using Smart Cards 141 152 New Remote Mutual Authentcaton Scheme usng Smart Cards Rajaram Ramasamy*, Amutha Prabakar Munyand** * Thagarajar College of Engneerng, Madura, Taml Nadu 625 015, Inda E mal: rrajaram@tce.edu **

More information

A new remote user authentication scheme for multi-server architecture

A new remote user authentication scheme for multi-server architecture Future Generaton Computer Systems 19 (2003) 13 22 A new remote user authentcaton scheme for mult-server archtecture Iuon-Chang Ln a, Mn-Shang Hwang b,, L-Hua L b a Department of Computer Scence and Informaton

More information

An enhanced dynamic-id-based remote user authentication protocol with smart card

An enhanced dynamic-id-based remote user authentication protocol with smart card Internatonal Journal of Engneerng Advanced Research Technology (IJEART) ISSN: 2454-9290 Volume-2 Issue-4 Aprl 206 An enhanced dynamc-id-based remote user authentcaton protocol wth smart card aoran Chen

More information

Improvement ofmanik et al. s remote user authentication scheme

Improvement ofmanik et al. s remote user authentication scheme Improvement ofmank et al. s remote user authentcaton scheme Abstract Jue-Sam Chou, a,yaln Chen b Jyun-Yu Ln c a Department of Informaton Management, Nanhua Unversty Chay, 622, Tawan schou@mal.nhu.edu.tw

More information

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

Distributed Secret Key Management Based on ECC for Ad-hoc Network Yi-xuan WU, Hua-wei CHEN * and Lei WANG

Distributed Secret Key Management Based on ECC for Ad-hoc Network Yi-xuan WU, Hua-wei CHEN * and Lei WANG 2017 2nd Internatonal Conference on Computer, Network Securty and Communcaton Engneerng (CNSCE 2017) ISBN: 978-1-60595-439-4 Dstrbuted Secret Key Management Based on ECC for Ad-hoc Network Y-xuan WU, Hua-we

More information

A Time-Bound Ticket-Based Mutual Authentication Scheme for Cloud Computing

A Time-Bound Ticket-Based Mutual Authentication Scheme for Cloud Computing Int. J. of Computers, Communcatons & Control, ISSN 1841-9836, E-ISSN 1841-9844 Vol. VI (2011), No. 2 (June), pp. 227-235 A Tme-Bound Tcket-Based Mutual Authentcaton Scheme for Cloud Computng Z. Hao, S.

More information

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.

More information

User Authentication Based On Behavioral Mouse Dynamics Biometrics

User Authentication Based On Behavioral Mouse Dynamics Biometrics User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA

More information

Weaknesses of a dynamic ID-based remote user authentication. He Debiao*, Chen Jianhua, Hu Jin

Weaknesses of a dynamic ID-based remote user authentication. He Debiao*, Chen Jianhua, Hu Jin Weaknesses of a dynamc -based remote user authentcaton scheme He Debao, Chen anhua, Hu n School of Mathematcs Statstcs, Wuhan nversty, Wuhan, Hube 430072, Chna Abstract: he securty of a password authentcaton

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

Private Information Retrieval (PIR)

Private Information Retrieval (PIR) 2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market

More information

Concurrent Apriori Data Mining Algorithms

Concurrent Apriori Data Mining Algorithms Concurrent Apror Data Mnng Algorthms Vassl Halatchev Department of Electrcal Engneerng and Computer Scence York Unversty, Toronto October 8, 2015 Outlne Why t s mportant Introducton to Assocaton Rule Mnng

More information

Hermite Splines in Lie Groups as Products of Geodesics

Hermite Splines in Lie Groups as Products of Geodesics Hermte Splnes n Le Groups as Products of Geodescs Ethan Eade Updated May 28, 2017 1 Introducton 1.1 Goal Ths document defnes a curve n the Le group G parametrzed by tme and by structural parameters n the

More information

Efficient Distributed File System (EDFS)

Efficient Distributed File System (EDFS) Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate

More information

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1)

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1) Secton 1.2 Subsets and the Boolean operatons on sets If every element of the set A s an element of the set B, we say that A s a subset of B, or that A s contaned n B, or that B contans A, and we wrte A

More information

Resource-Efficient Multi-Source Authentication Utilizing Split-Join One-Way Key Chain

Resource-Efficient Multi-Source Authentication Utilizing Split-Join One-Way Key Chain Resource-Effcent Mult-Source Authentcaton Utlzng Splt-Jon One-Way ey Chan Seonho Cho, un Sun, Hyeonsang Eom 3 Department of Computer Scence, Bowe State Unversty, Bowe, Maryland, U.S.A. Center for Secure

More information

A software agent enabled biometric security algorithm for secure file access in consumer storage devices

A software agent enabled biometric security algorithm for secure file access in consumer storage devices A software agent enabled bometrc securty algorthm for secure fle access n consumer storage devces Artcle Accepted Verson Amn, R., Sherratt, R. S., Gr, D., Islam, S. K. H. and Khan, M. K. (2017) A software

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

HYMN: AN INTEREST-BASED MULTIMEDIA PROVIDING SYSTEM FOR HYBRID WIRELESS NETWORKS

HYMN: AN INTEREST-BASED MULTIMEDIA PROVIDING SYSTEM FOR HYBRID WIRELESS NETWORKS HYMN: AN INTEREST-BASED MULTIMEDIA PROVIDING SYSTEM FOR HYBRID WIRELESS NETWORKS Adran Andronache 1 ), Matthas R. Brust 2 ), Steffen Rothkugel 3 ) Abstract The concept of self-organzaton already exsts

More information

arxiv: v1 [cs.cr] 20 Jun 2013

arxiv: v1 [cs.cr] 20 Jun 2013 arxv:306.4726v [cs.cr] 20 Jun 203 A secure and effectve anonymous authentcaton scheme for roamng servce n global moblty networks Dawe Zhao a,b Hapeng Peng a,b Lxang L a,b Yxan Yang a,b a Informaton Securty

More information

Secure Distributed Cluster Formation in Wireless Sensor Networks

Secure Distributed Cluster Formation in Wireless Sensor Networks Secure Dstrbuted Cluster Formaton n Wreless Sensor Networks Kun Sun Intellgent Automaton, Inc. ksun@-a-.com Pa Peng Opsware Inc. ppeng@opsware.com Clff Wang Army Research Offce clff.wang@us.army.ml Peng

More information

Constructing Minimum Connected Dominating Set: Algorithmic approach

Constructing Minimum Connected Dominating Set: Algorithmic approach Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected

More information

DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS

DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS Arun Avudanayagam Yuguang Fang Wenjng Lou Department of Electrcal and Computer Engneerng Unversty of Florda Ganesvlle, FL 3261

More information

Sorting Review. Sorting. Comparison Sorting. CSE 680 Prof. Roger Crawfis. Assumptions

Sorting Review. Sorting. Comparison Sorting. CSE 680 Prof. Roger Crawfis. Assumptions Sortng Revew Introducton to Algorthms Qucksort CSE 680 Prof. Roger Crawfs Inserton Sort T(n) = Θ(n 2 ) In-place Merge Sort T(n) = Θ(n lg(n)) Not n-place Selecton Sort (from homework) T(n) = Θ(n 2 ) In-place

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

Oracle Database: SQL and PL/SQL Fundamentals Certification Course

Oracle Database: SQL and PL/SQL Fundamentals Certification Course Oracle Database: SQL and PL/SQL Fundamentals Certfcaton Course 1 Duraton: 5 Days (30 hours) What you wll learn: Ths Oracle Database: SQL and PL/SQL Fundamentals tranng delvers the fundamentals of SQL and

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour 6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the

More information

A New Security Model for Cross-Realm C2C-PAKE Protocol

A New Security Model for Cross-Realm C2C-PAKE Protocol A New Securty Model for Cross-Realm C2C-PAKE Protocol Fengao Wang 1 Yuqng Zhang Natonal Computer Network Intruson Protecton Center, GSCAS, Beng, 100043 Abstract. Cross realm clent-to-clent password authentcated

More information

The Codesign Challenge

The Codesign Challenge ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

Maintaining temporal validity of real-time data on non-continuously executing resources

Maintaining temporal validity of real-time data on non-continuously executing resources Mantanng temporal valdty of real-tme data on non-contnuously executng resources Tan Ba, Hong Lu and Juan Yang Hunan Insttute of Scence and Technology, College of Computer Scence, 44, Yueyang, Chna Wuhan

More information

Module Management Tool in Software Development Organizations

Module Management Tool in Software Development Organizations Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,

More information

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Overvew 2 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Introducton Mult- Smulator MASIM Theoretcal Work and Smulaton Results Concluson Jay Wagenpfel, Adran Trachte Motvaton and Tasks Basc Setup

More information

Load-Balanced Anycast Routing

Load-Balanced Anycast Routing Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance

More information

Privacy Models for RFID Authentication Protocols

Privacy Models for RFID Authentication Protocols Prvacy Models for RFID Authentcaton Protocols Jan Shen 1,2, Jn Wang 1,2, Yuan Me 1,2, Ilyong Chung 3 1 Jangsu Engneerng Center of Network Montorng, Nanjng Unversty of Informaton Scence &echnology, Nanjng,210044,Chna

More information

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms Course Introducton Course Topcs Exams, abs, Proects A quc loo at a few algorthms 1 Advanced Data Structures and Algorthms Descrpton: We are gong to dscuss algorthm complexty analyss, algorthm desgn technques

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

Cryptanalysis and Improvement of Mutual Authentication Protocol for EPC C1G2 passive RFID Tag

Cryptanalysis and Improvement of Mutual Authentication Protocol for EPC C1G2 passive RFID Tag IJCSI Internatonal Journal of Computer Scence Issues, Volume 14, Issue 6, November 017 ISSN (Prnt): 1694-0814 ISSN (Onlne): 1694-0784 www.ijcsi.org https://do.org/10.0943/0101706.7684 76 Cryptanalyss and

More information

ARTICLE IN PRESS. Signal Processing: Image Communication

ARTICLE IN PRESS. Signal Processing: Image Communication Sgnal Processng: Image Communcaton 23 (2008) 754 768 Contents lsts avalable at ScenceDrect Sgnal Processng: Image Communcaton journal homepage: www.elsever.com/locate/mage Dstrbuted meda rate allocaton

More information

A Method for Detecting the Exposure of a Secret Key in Key-Insulated Scheme

A Method for Detecting the Exposure of a Secret Key in Key-Insulated Scheme IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.8 No.9, September 28 3 A Method for Detectng the Exposure of a Secret ey n ey-insulated Scheme Younggyo Lee and Dongho Won Department

More information

Cordial and 3-Equitable Labeling for Some Star Related Graphs

Cordial and 3-Equitable Labeling for Some Star Related Graphs Internatonal Mathematcal Forum, 4, 009, no. 31, 1543-1553 Cordal and 3-Equtable Labelng for Some Star Related Graphs S. K. Vadya Department of Mathematcs, Saurashtra Unversty Rajkot - 360005, Gujarat,

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

Ontology Generator from Relational Database Based on Jena

Ontology Generator from Relational Database Based on Jena Computer and Informaton Scence Vol. 3, No. 2; May 2010 Ontology Generator from Relatonal Database Based on Jena Shufeng Zhou (Correspondng author) College of Mathematcs Scence, Laocheng Unversty No.34

More information

Video Proxy System for a Large-scale VOD System (DINA)

Video Proxy System for a Large-scale VOD System (DINA) Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,

More information

An efficient biometrics-based authentication scheme for telecare medicine information systems

An efficient biometrics-based authentication scheme for telecare medicine information systems Zuowen Tan Jangx Unversty of Fnance & Economcs An effcent bometrcs-based authentcaton scheme for telecare medcne nformaton systems Abstract. The telecare medcal nformaton system enables the patents gan

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) ,

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) , VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

ETAtouch RESTful Webservices

ETAtouch RESTful Webservices ETAtouch RESTful Webservces Verson 1.1 November 8, 2012 Contents 1 Introducton 3 2 The resource /user/ap 6 2.1 HTTP GET................................... 6 2.2 HTTP POST..................................

More information

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto

More information

Avoiding congestion through dynamic load control

Avoiding congestion through dynamic load control Avodng congeston through dynamc load control Vasl Hnatyshn, Adarshpal S. Seth Department of Computer and Informaton Scences, Unversty of Delaware, Newark, DE 976 ABSTRACT The current best effort approach

More information

Solving two-person zero-sum game by Matlab

Solving two-person zero-sum game by Matlab Appled Mechancs and Materals Onlne: 2011-02-02 ISSN: 1662-7482, Vols. 50-51, pp 262-265 do:10.4028/www.scentfc.net/amm.50-51.262 2011 Trans Tech Publcatons, Swtzerland Solvng two-person zero-sum game by

More information

Goals and Approach Type of Resources Allocation Models Shared Non-shared Not in this Lecture In this Lecture

Goals and Approach Type of Resources Allocation Models Shared Non-shared Not in this Lecture In this Lecture Goals and Approach CS 194: Dstrbuted Systems Resource Allocaton Goal: acheve predcable performances Three steps: 1) Estmate applcaton s resource needs (not n ths lecture) 2) Admsson control 3) Resource

More information

The stream cipher MICKEY-128 (version 1) Algorithm specification issue 1.0

The stream cipher MICKEY-128 (version 1) Algorithm specification issue 1.0 The stream cpher MICKEY-128 (verson 1 Algorthm specfcaton ssue 1. Steve Babbage Vodafone Group R&D, Newbury, UK steve.babbage@vodafone.com Matthew Dodd Independent consultant matthew@mdodd.net www.mdodd.net

More information

Conditional Speculative Decimal Addition*

Conditional Speculative Decimal Addition* Condtonal Speculatve Decmal Addton Alvaro Vazquez and Elsardo Antelo Dep. of Electronc and Computer Engneerng Unv. of Santago de Compostela, Span Ths work was supported n part by Xunta de Galca under grant

More information

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices Steps for Computng the Dssmlarty, Entropy, Herfndahl-Hrschman and Accessblty (Gravty wth Competton) Indces I. Dssmlarty Index Measurement: The followng formula can be used to measure the evenness between

More information

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana

More information

A new attack on Jakobsson Hybrid Mix-Net

A new attack on Jakobsson Hybrid Mix-Net A new attack on Jakobsson Hybrd Mx-Net Seyyed Amr Mortazav Tehran, Iran. sa.mortezav@gmal.com Abstract The Jakobsson hybrd Mx-net proposed by Jakobsson and Juels, s a very practcal and effcent scheme for

More information

Advanced Computer Networks

Advanced Computer Networks Char of Network Archtectures and Servces Department of Informatcs Techncal Unversty of Munch Note: Durng the attendance check a stcker contanng a unque QR code wll be put on ths exam. Ths QR code contans

More information

Problem Set 3 Solutions

Problem Set 3 Solutions Introducton to Algorthms October 4, 2002 Massachusetts Insttute of Technology 6046J/18410J Professors Erk Demane and Shaf Goldwasser Handout 14 Problem Set 3 Solutons (Exercses were not to be turned n,

More information

Securing Quality-of-Service Route Discovery in On-Demand Routing for Ad Hoc Networks

Securing Quality-of-Service Route Discovery in On-Demand Routing for Ad Hoc Networks Securng Qualty-of-Servce Route Dscovery n On-Demand Routng for Ad Hoc Networks Yh-Chun Hu UC Berkeley yhchun@cs.cmu.edu Davd B. Johnson Rce Unversty dbj@cs.rce.edu ABSTRACT An ad hoc network s a collecton

More information

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

International Conference on Materials Engineering and Information Technology Applications (MEITA 2015)

International Conference on Materials Engineering and Information Technology Applications (MEITA 2015) Internatonal Conference on Materals Engneerng and Informaton Technology Applcatons (MEITA 2015) Cryptanalyss of Vadya et al s User Authentcaton Scheme wth Key Agreement n Wreless Sensor Networks L Jpng

More information

Connection-information-based connection rerouting for connection-oriented mobile communication networks

Connection-information-based connection rerouting for connection-oriented mobile communication networks Dstrb. Syst. Engng 5 (1998) 47 65. Prnted n the UK PII: S0967-1846(98)90513-7 Connecton-nformaton-based connecton reroutng for connecton-orented moble communcaton networks Mnho Song, Yanghee Cho and Chongsang

More information

Transaction-Consistent Global Checkpoints in a Distributed Database System

Transaction-Consistent Global Checkpoints in a Distributed Database System Proceedngs of the World Congress on Engneerng 2008 Vol I Transacton-Consstent Global Checkponts n a Dstrbuted Database System Jang Wu, D. Manvannan and Bhavan Thurasngham Abstract Checkpontng and rollback

More information

Chapter 6 Programmng the fnte element method Inow turn to the man subject of ths book: The mplementaton of the fnte element algorthm n computer programs. In order to make my dscusson as straghtforward

More information

Sample Solution. Advanced Computer Networks P 1 P 2 P 3 P 4 P 5. Module: IN2097 Date: Examiner: Prof. Dr.-Ing. Georg Carle Exam: Final exam

Sample Solution. Advanced Computer Networks P 1 P 2 P 3 P 4 P 5. Module: IN2097 Date: Examiner: Prof. Dr.-Ing. Georg Carle Exam: Final exam Char of Network Archtectures and Servces Department of Informatcs Techncal Unversty of Munch Note: Durng the attendance check a stcker contanng a unque QR code wll be put on ths exam. Ths QR code contans

More information

PYTHON IMPLEMENTATION OF VISUAL SECRET SHARING SCHEMES

PYTHON IMPLEMENTATION OF VISUAL SECRET SHARING SCHEMES PYTHON IMPLEMENTATION OF VISUAL SECRET SHARING SCHEMES Ruxandra Olmd Faculty of Mathematcs and Computer Scence, Unversty of Bucharest Emal: ruxandra.olmd@fm.unbuc.ro Abstract Vsual secret sharng schemes

More information

Optimal Fault-Tolerant Routing in Hypercubes Using Extended Safety Vectors

Optimal Fault-Tolerant Routing in Hypercubes Using Extended Safety Vectors Optmal Fault-Tolerant Routng n Hypercubes Usng Extended Safety Vectors Je Wu Department of Computer Scence and Engneerng Florda Atlantc Unversty Boca Raton, FL 3343 Feng Gao, Zhongcheng L, and Ynghua Mn

More information

A Distributed Private-Key Generator for Identity-Based Cryptography

A Distributed Private-Key Generator for Identity-Based Cryptography A Dstrbuted Prvate-Key Generator for Identty-Based Cryptography Anket Kate Ian Goldberg Davd R. Cherton School of Computer Scence Unversty of Waterloo Waterloo, ON, Canada N2L 3G1 {akate,ang}@cs.uwaterloo.ca

More information

Security analysis and design of an efficient ECC-based two-factor password authentication scheme

Security analysis and design of an efficient ECC-based two-factor password authentication scheme SECURITY ND COMMUNICTION NETWORKS Securty Comm. Networks 2016; 9:4166 4181 Publshed onlne 24 ugust 2016 n Wley Onlne Lbrary (wleyonlnelbrary.com)..1596 RESERCH RTICLE Securty analyss and desgn of an effcent

More information

A Secure Hybrid Wireless Mesh Protocol for s Mesh Network*

A Secure Hybrid Wireless Mesh Protocol for s Mesh Network* A Secure Hybrd Wreless Mesh Protocol for 802.11s Mesh Network* Md. Sharful Islam, Young Jg Yoon, Md. Abdul Hamd, and Choong Seon Hong** Department of Computer Engneerng, Kyung Hee Unversty, Republc of

More information

TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z.

TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z. TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS Muradalyev AZ Azerbajan Scentfc-Research and Desgn-Prospectng Insttute of Energetc AZ1012, Ave HZardab-94 E-mal:aydn_murad@yahoocom Importance of

More information

Learning the Kernel Parameters in Kernel Minimum Distance Classifier

Learning the Kernel Parameters in Kernel Minimum Distance Classifier Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department

More information

A broadcast protocol with drivers anonymity for vehicle-to-vehicle communication networks

A broadcast protocol with drivers anonymity for vehicle-to-vehicle communication networks Int. J. Vehcle Informaton and Communcaton Systems, Vol. 2, Nos. 1/2, 2009 1 A broadcast protocol wth drvers anonymty for vehcle-to-vehcle communcaton networks Nader Mazen Rabad and Syed Masud Mahmud* Electrcal

More information

Analysis and Improvement of a Lightweight Anonymous Authentication Protocol for Mobile Pay-TV Systems (Full text)

Analysis and Improvement of a Lightweight Anonymous Authentication Protocol for Mobile Pay-TV Systems (Full text) Analyss and Improvement of a Lghtweght Anonymous Authentcaton Protocol for Moble Pay-TV Systems (Full text) arxv:1808.09493v3 [cs.cr] 13 Sep 2018 1 st Saeed Banaean Far Department of Electrcal and Computer

More information

A Resources Virtualization Approach Supporting Uniform Access to Heterogeneous Grid Resources 1

A Resources Virtualization Approach Supporting Uniform Access to Heterogeneous Grid Resources 1 A Resources Vrtualzaton Approach Supportng Unform Access to Heterogeneous Grd Resources 1 Cunhao Fang 1, Yaoxue Zhang 2, Song Cao 3 1 Tsnghua Natonal Labatory of Inforamaton Scence and Technology 2 Department

More information

124 Chapter 8. Case Study: A Memory Component ndcatng some error condton. An exceptonal return of a value e s called rasng excepton e. A return s ssue

124 Chapter 8. Case Study: A Memory Component ndcatng some error condton. An exceptonal return of a value e s called rasng excepton e. A return s ssue Chapter 8 Case Study: A Memory Component In chapter 6 we gave the outlne of a case study on the renement of a safe regster. In ths chapter wepresent the outne of another case study on persstent communcaton;

More information

A Low-Overhead Routing Protocol for Ad Hoc Networks with selfish nodes

A Low-Overhead Routing Protocol for Ad Hoc Networks with selfish nodes A Low-Oerhead Routng Protocol for Ad Hoc Networks wth selfsh nodes Dongbn Wang 1, Xaofeng Wang 2, Xangzhan Yu 3, Kacheng Q 1, Zhbn Xa 1 1 School of Software Engneerng, Bejng Unersty of Posts and Telecommuncatons,100876,

More information

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for

More information

A Traffic Aware Routing Protocol for Congestion Avoidance in Content-Centric Network

A Traffic Aware Routing Protocol for Congestion Avoidance in Content-Centric Network , pp.69-80 http://dx.do.org/10.14257/jmue.2014.9.9.08 A Traffc Aware Routng Protocol for Congeston Avodance n Content-Centrc Network Jung-Jae Km 1, Mn-Woo Ryu 2*, S-Ho Cha 3 and Kuk-Hyun Cho 1 1 Dept.

More information

Categories and Subject Descriptors ABSTRACT. General Terms. Keywords 1. INTRODUCTION. C.2.1. [Computer-Communication Networks]: Network Architecture

Categories and Subject Descriptors ABSTRACT. General Terms. Keywords 1. INTRODUCTION. C.2.1. [Computer-Communication Networks]: Network Architecture On Desgnng Incentve-Compatble Routng and Forwardng Protocols n Wreless Ad-Hoc Networks An Integrated Approach Usng Game Theoretcal and Cryptographc Technques Sheng Zhong L (Erran) L Yanbn Grace Lu Yang

More information

Introduction. Leslie Lamports Time, Clocks & the Ordering of Events in a Distributed System. Overview. Introduction Concepts: Time

Introduction. Leslie Lamports Time, Clocks & the Ordering of Events in a Distributed System. Overview. Introduction Concepts: Time Lesle Laports e, locks & the Orderng of Events n a Dstrbuted Syste Joseph Sprng Departent of oputer Scence Dstrbuted Systes and Securty Overvew Introducton he artal Orderng Logcal locks Orderng the Events

More information

Non-Split Restrained Dominating Set of an Interval Graph Using an Algorithm

Non-Split Restrained Dominating Set of an Interval Graph Using an Algorithm Internatonal Journal of Advancements n Research & Technology, Volume, Issue, July- ISS - on-splt Restraned Domnatng Set of an Interval Graph Usng an Algorthm ABSTRACT Dr.A.Sudhakaraah *, E. Gnana Deepka,

More information

arxiv: v1 [cs.cr] 28 May 2013

arxiv: v1 [cs.cr] 28 May 2013 arxv:1305.6350v1 [cs.cr] 28 May 2013 An effcent dynamc ID based remote user authentcaton scheme usng self-certfed publc keys for mult-server envronment Dawe Zhao ab Hapeng Peng ab Shudong L c Yxan Yang

More information

Conformation of EPC class 1 generation 2 standards RFID. system with mutual authentication and privacy protection

Conformation of EPC class 1 generation 2 standards RFID. system with mutual authentication and privacy protection Conformaton of EPC class 1 generaton 2 standards RFID system wth mutual authentcaton and prvacy protecton Chn-Lng Chen Department of Computer Scence and Informaton Engneerng, Chaoyang Unversty of Technology,

More information

Providing Stronger Authentication at a LowCost to RFID Tags Operating under the EPCglobal Framework

Providing Stronger Authentication at a LowCost to RFID Tags Operating under the EPCglobal Framework 2008 IEEE/IFIP Internatonal Conference on Embedded and Ubqutous Computng Provdng Stronger Authentcaton at a LowCost to RFID Tags Operatng under the EPCglobal Framework Pedro Pers-Lopez, ppers@nf.uc3m.es

More information

Wightman. Mobility. Quick Reference Guide THIS SPACE INTENTIONALLY LEFT BLANK

Wightman. Mobility. Quick Reference Guide THIS SPACE INTENTIONALLY LEFT BLANK Wghtman Moblty Quck Reference Gude THIS SPACE INTENTIONALLY LEFT BLANK WIGHTMAN MOBILITY BASICS How to Set Up Your Vocemal 1. On your phone s dal screen, press and hold 1 to access your vocemal. If your

More information

Specifications in 2001

Specifications in 2001 Specfcatons n 200 MISTY (updated : May 3, 2002) September 27, 200 Mtsubsh Electrc Corporaton Block Cpher Algorthm MISTY Ths document shows a complete descrpton of encrypton algorthm MISTY, whch are secret-key

More information

CMPS 10 Introduction to Computer Science Lecture Notes

CMPS 10 Introduction to Computer Science Lecture Notes CPS 0 Introducton to Computer Scence Lecture Notes Chapter : Algorthm Desgn How should we present algorthms? Natural languages lke Englsh, Spansh, or French whch are rch n nterpretaton and meanng are not

More information