DoS-Resistant Broadcast Authentication Protocol with Low End-to-end Delay

Size: px
Start display at page:

Download "DoS-Resistant Broadcast Authentication Protocol with Low End-to-end Delay"

Transcription

1 DoS-Resistant Broadast Authentiation Protool with Low End-to-end Delay Ying Huang, Wenbo He and Klara Nahrstedt {huang, wenbohe, Department of Computer Siene University of Illinois at Urbana-Champaign Siebel Center, 1 N. Goodwin Ave. Urbana, IL 6181 Whay C. Lee Whay.Lee@motorola.om Networks and Systems Researh Center Motorola Labs 111 Loke Drive, Marlborough, MA Abstrat In mission-ritial networks, ommand, alerts, and ritial data are frequently broadast over wireless networks. Broadast traffi must be proteted from maliious attaks, wherein soures are impersonated or broadast pakets are forged. Even though broadast authentiation eliminates suh attaks, attakers an still launh Denial-of-Servie attaks by injeting substantive false pakets, whih onsume both ommuniation and omputation resoures. Due to inevitable proliferation of dupliates of broadast pakets, it is espeially important to limit false paket propagation range. Evidently, authentiating eah paket before forwarding an effetively ontain false pakets within one hop. But it results in onsiderable end-to-end delay penalty on authenti pakets. In this paper, we propose a randomized authentiation sheme, DREAM, whih ontains most of false pakets in one-hop range of attakers and yet keeps end-to-end delay relatively low. Dream also ontinuously monitors the ontextual threat and dynamially adjusts the trade-off among ontainment and end-to-end delay performane. Extensive evaluations in ns validate our idea. I. INTRODUCTION Mobile ad ho wireless networks (MANET) are deployed for many mission-ritial appliations, suh as military operations, emergeny response and disaster reovery. Often operating in multi-hop and open wireless environment, they are vulnerable to various attaks, suh as paket modifiation, impersonation, and Denial-of-Servie (DoS) attaks. Thus, the primary onern is to onsistently assure availability of ommuniation resoures, arefully grant authorized aess and prevent maliious tamper on network funtion from outside the administrative domain. Commands, alerts and data are frequently broadast network-wide to relay time-sensitive information and support ritial deision-making proess. If broadast traffi is not authentiated, soures an be impersonated and message ontent an be forged by adversaries and rivals. Misleading or false information ould ause unneessary operation or wrong deision. Thus, it is important and ommon to authentiate broadast traffi. However, without areful design, broadast authentiation may suffer from DoS attaks and negatively affet performane of broadast protool. In DoS attaks, attakers need neither to ompromise legitimate devies nor to know trust and key information. They only flood faked and format-ompatible pakets so as to onsume exessive bandwidth, omputation and memory resoures network-wide. Even though ounterfeit pakets are rejeted after signature validation, they ause serious problems: (1) validating those pakets wastes energy and CPU resoures; () before they are verified, storing those pakets temporally wastes buffer spae; () transmitting those pakets wastes limited wireless bandwidth. Therefore, broadast authentiation protools must ontain forged messages near attakers to prevent the rest of the network from infetion. A typial plae to perform broadast authentiation is at the ends of ommuniation, whih means that forwarders do not hek the integrity of pakets. This broadast authentiation sheme residing at appliation layer an be onsidered as a sheme using forward-first poliy: a node rebroadasts eah paket if needed and then delivers authenti ones to appliation after signature validation. Pure forward-first sheme misses the ontainment apability. A false paket is broadast everywhere before its authentiity is verified. In order to ontain false pakets, an intuitive way is to apply hopby-hop authentiation sheme based on authentiate-first poliy at routing layer: a node only rebroadasts authenti messages after validation. In this way, false pakets are filtered out at the first hop and devies outside the transmission range of attakers are immune. However, this hop-by-hop authentiation sheme imposes remarkable penalty on endto-end delay of legitimate traffi due to authentiation delay at eah intermediate hop. The aumulated delay postpones paket delivery to nodes far away from the soures and the maximal delay is proportional to network diameter in hops. Publi key sheme and one-way hash funtion sheme represented by TESLA [1] are two ommon ryptographi primitives for broadast authentiation (Other alternatives are extensively surveyed in []). TESLA is an effiient protool that utilizes one-way hash hains and delayed key dislosure to authentiate broadast traffi. But, TESLA inurs seurity vulnerability if used together with authentiate-first poliy. This is beause at the time forwarding nodes are able to authentiate a paket Msg, the seret hash key hkey used to sign Msg is already released by the soure. Afterwards, no nodes an trust any newly reeived pakets signed by hkey. Hene, the intermediate hop has to resign M sg under his identity before forwarding. By manipulating resigning proess, a ompromised node ould flood as many pakets as it wants and viiously laim that those pakets are sent by other innoent soures.

2 In this paper, we present a novel broadast authentiation sheme, alled DREAM, an aronym for DoS-Resistant Effiient Authentiation Mehanism. It effetively limits false data injetion via frequently using authentiate-first poliy based on publi-key authentiation. It also redues the endto-end delay by allowing a small perentage of unverified pakets forwarded probabilistially via forward-first poliy so that remote nodes obtain the broadast messages quikly. Compared with most pertinent work onsidering ontainment of false broadast injetion [][][], DREAM offers the following two advantages: (1) The remote nodes, who reeive the unverified pakets, are randomly determined for eah paket. Hene, DREAM avoids a single point of failure and ahieves load balaning. () In order to redue end-to-end delay, not everyone in the neighborhood of a broadast soure has to forward unverified pakets. Allowing only a small number of pakets to reah remote regions is suffiient to redue delay, while it effetively restrits ontagious areas of false pakets. II. DESIGN GOAL AND SYSTEM MODEL To guarantee that appliation reeives only authenti pakets, there is no doubt that every node needs to authentiate eah paket. Resoures of nodes in one-hop neighborhood of attakers annot be proteted unless they beome inative. Nevertheless, we want to eliminate faked pakets as early as possible to protet resoures far away from attakers and still keep average end-to-end delay low for authenti pakets. Next, we present our network, broadast traffi and attaker models. A. Node and Network Model We onsider an ad ho multi-hop wireless network supporting ommuniation among a large number of devies. They may be mobile, but without rapid hanges of network topology. These devies are all dispathed from a single administrative domain. Before deployment, eah devie reeives digital ertifiates and neessary keying materials from a trusted server. These devies are thus able to establish pairwise trust relationship and shared serets in field without ontating the remote trusted server. B. Broadast Model All of the nodes partiipate in a predetermined broadast protool. The protool an be in any form, ranging from flooding, probabilisti broadast [6] to tree-base broadast [7]. Although DREAM is designed based on flooding, it works with other broadast protools by minor modifiation. Any devie an originate broadast messages. A broadast message is uniquely defined by the ID of the originator and a sequene number. Upon message arrival, the reipients deide about dupliation suppression, rebroadast, and delivery to appliations aording to the broadast protool used. All broadast messages are sent in lear text. Broadast pakets are authentiated before delivered to appliations. C. Attaker Model Attakers are unaffiliated with the administrative domain, and they have neither valid ertifiates nor keys. Via snooping on wireless hannels, attakers an gather the details of broadast and authentiation protool. They intend to launh DoS attaks by flooding false or old pakets. Sine attakers do not have keys or ertifiates, they annot produe valid signatures in false pakets and those pakets are dropped ultimately. Their ommon strategy is to let false pakets permeate throughout the network as muh as possible to aggressively onsume ommuniation and omputation resoures network-wide. III. DREAM In order to promptly ontain injeted false pakets, we need to push publi-key authentiation from appliation layer down to network layer so that the broadast protool only allows authenti pakets to be rebroadast after validation. A hopby-hop authentiation sheme relying on authentiate-first poliy perfetly ontains false pakets in one hop range of an attaker. However, it unfavorably imposes signifiant delay penalty on authenti traffi, espeially for the traffi to the set of nodes far away from broadast soures. DREAM addresses this end-to-end delay issue by relaxing ontainment requirement. The main idea is to allow a small and ontrolled number of pakets transmitted to remote loations quikly without authentiation in a probabilisti manner. A path segment over whih paket P is not validated before forwarding is referred to as an unverified forwarding path for P. Nodes along the unverified forwarding paths forward pakets before authentiating; while the other nodes, representing the majority of the network, authentiate pakets before forwarding. Those unverified transmissions virtually redue the network radius from the broadast soure and derease end-to-end delay. 1 Beause of the diversified suppression poliies of broadast protools, DREAM is integrated with broadast protool and independently runs at eah devie. The arhiteture of DREAM ontains three modules as shown in Figure 1. Broadast + Paket Authentiation Fig. 1. Appliation Risk Management Neighbor Management MAC DREAM DREAM Arhiteture Paket Authentiation Module is responsible for signing and validating pakets. There are two operating modes yielding different delay and ontainment trade-offs. Risk Management Module ontinuously monitors ontextual threat. When evidene of false paket injetion shows up, the module adjusts the operating mode in Paket Authentiation Module to a more defensive and seure mode. Neighbor Management Module periodially exhanges hello messages with one-hop neighbors. Hello messages not only indiate a node s liveness but also inlude a field speifying a node s one-hop neighborhood size. In order to prevent maliious tampering, hello messages are signed and verified. Next two setions are devoted to Paket Authentiation and Risk Management modules separately. 1 This may introdue out-of-order pakets with large delay variane. We assume that appliations will reorder pakets if in-order delivery is required.

3 A. Paket Authentiation Paket Authentiation Module omprises two parts: (a) signing at soures and (b) verifiation and forwarding at reeivers. Whenever a soure sends out a broadast paket, it signs the paket. Upon reeiving a broadast message, a node probabilistially determines to forward it first or to authentiate it first. When a node authentiates the paket first, we all the node an authentiating node. No matter whih hoie is made, eah node will (a) only forward a unique broadast paket at most one (it does not forward identified false pakets); and (b) validate the paket and send the authenti one to appliations. The message format is: ID sr, Seqno, Msg, P ubkeysign sr, HT, ID fwder, wherein P ubkeysign sr = Sign sr P ubkey(id sr, Seqno, Msg) ID sr and ID fwder are IDs of the soure and the last forwarder, respetively. When the soure signs M sg, ID fwder is set to ID sr sine soure is the last forwarder. P ubkeysign sr is the publi key signature signed by the soure and is never hanged during forwarding proess. HT is the number of hops traversed sine the last authentiating node. It is reset to at every authentiating node. Soures always set HT to. Eah forwarder, who forwards the unverified opies, inreases HT by 1. Here, we assume that reeivers know the publi key of the soure; otherwise, soures ertifiates should be broadast as well. Next, we will desribe paket verifiation and forwarding algorithm at reeiver sides based on flooding. We redue average end-to-end delay at the ost of imperfet ontainment. Therefore, it is ruial to arefully ontrol unverified forwarding. We have the following requirements: The deision is independently made to avoid message negotiation; The deision is probabilistially made to ahieve load balaning and to prevent a single point of failure; The number of hops that an unverified message is allowed to travel is ontrolled so that on one hand, broadast pakets spread out in spae fast and on the other hand, false injeted pakets are ontained near their originators; The number of forward-first nodes is kept small to redue the ost of ommuniation and publi key omputation wasted on false pakets. Publi key signature verifiation is an expensive operation and usually takes time in seonds or tens of milliseonds in resoure-onstrained wireless mobile devies. Hene, a verifiation queue is plaed in DREAM to buffer the pakets waiting for signature verifiation. We assume for simpliity that at any moment, only one signature verifiation is performed so that spare CPU resoures are reserved for other tasks. A verifiation demon proess, whenever free, ontinuously monitors the verifiation queue. One a paket is found at the head of the queue, the verifiation proess removes the paket from queue, verifies its publi key signature and relays the authenti one to appliations. In addition, if the authenti paket has not been forwarded yet, it rebroadasts the paket not under suppression. When the demon proess ompletes proessing a paket, it beomes free. Upon reeiving a broadast message m, a node v probabilistially determines whether to forward m first or authentiate m first aording to Algorithm 1. Rand is a random number generated uniformly from [, 1]. b, and K are system parameters. b and are the expeted numbers of neighbors in the one-hop neighborhood of the soure and the last forwarder m.id fwder (other than the soure) respetively, who forwards m first. K is the maximum number of hops that m is allowed to travel without verifiation. Algorithm 1: Verifiation and Forwarding Algorithm input : An overheard broadast message m 1 if (overheard messages with the same (m.id sr, m.seqno) before) then return; if (m.ht == & m.id fwder is unknown neighbor) then return; if (I am one-hop neighbor of m.id sr ) then prob = b/ Nbr(m.ID fwder ) ; else prob = / Nbr(m.ID fwder ) ; end if (Rand > prob or m.ht == K) then // authentiate m first; m.ht = ; plae m into verifiation queue; else // forward m first; m.ht + +; rebroadast m; plae m into verifiation queue end Algorithm 1 inorporates steps: (i) Suppression and Filtering (Line 1-): If v has reeived at least one message with the same sequene number from the soure before, message m is dropped. Thereby, a node forwards eah broadast message at most one. If v is onehop away from the last authentiator, whih is an unknown neighbor, message m is ignored due to lak of trust. (ii) Probabilisti Pruning (Line -17): v deides whether to forward m first or authentiate m first probabilistially. Nbr(m.ID fwder ) is the neighborhood size of last forwarder m.id fwder. This value is available via Neighbor Management module. b is usually set to an appropriate value so that unverified broadast messages an over most diretions ( for instane). is seleted from [1, ] to make the event that all the one-hop neighbors are pruned unlikely. Both b and annot be too large, beause we need to ontrol the number of unverified pakets. The onstant before in line 6 aounts for the fat that on average, half of the neighbors of the last forwarder have already heard m. Considering a ase that m is forwarded from node A to v, via B, averagely half neighbors of B have already heard m broadast by A, thus suppressing m aording to line 1. If m has already traversed K hops without verifiation, it is better to authentiate m first to onfine its permeation in ase of a false paket. If v deides to authentiate m first,

4 it resets HT field and plaes m in the verifiation queue. If v deides to forward m first, it inreases HT field by 1, forwards m and then plaes m in the verifiation queue. The verifiation proess is responsible for rebroadast after signature verifiation. If m.ht >, verifiation proess knows that m has already been forwarded one. Sine we use Nbr(m.ID fwder ) to make probabilisti forwarding deision (in Line and 6), network topology should be relative stable so that during the Hello period, the neighbor information is aurate. Otherwise, inaurate and outdated neighborhood sizes may result in more or less number of nodes forwarding the paket first from the last forwarder. B. Risk Management Nodes working as in previous setion are said to be in Normal Mode. Via signature verifiation, they are able to detet emergene of false paket attaks if the number of reeived pakets with invalid signature in a time interval exeeds a predetermined threshold. They swith to hop-by-hop authentiation sheme and totally disable the forward first poliy to ontain false paket injetion in a defensive way. They are then said to be in Alert Mode. Conversely, when the false paket attak lessens, nodes swith bak to Normal Mode to trade for improved end-to-end delay. The transition between two modes is shown in Figure. # false pakets in urrent time window is low Normal Alert # false pakets in urrent time window is high Fig.. Adaptation to Contextual Threat Eah node ontinuously monitors the number of deteted false pakets every riskw indow interval. The node swithes to Alert Mode if this number reahes α and swithes bak to Normal Mode if this number drops to β. α and riskw indow are related to the tolerable perentage of CPU resoure spent in evaluating false pakets before swithing to Alert Mode. Suppose the proessing time to validate one publi key T signature is T val seonds, a node an tolerate val α riskw indow CPU resoure wasted on validating false pakets. For mission ritial networks, this perentage an be set to a small value. β is there to avoid frequent transitions and instability. Swithing to Alert Mode adversely inreases end-to-end delay. However, we isolate the rest of network from infetion and their omputation and ommuniation resoures are proteted. It is expeted that when onverging, only the nodes around the attakers enter Alert Mode. Other nodes an still reeive the pakets through alternative forwarding paths quikly. IV. EVALUATION In this setion, we evaluate the performane of DREAM in ns network simulator by omparing it with hop-by-hop authentiation sheme and (DW) sheme proposed in []. In sheme, the forwarding deision is made by omparing the size of a loally maintained dynami window on sensor nodes and the number of hops the inoming message traversing after its last authentiation: if window size is larger, they use forwarding-first; otherwise, they use authentiation-first. Additive Inrease Multipliative Derease (AIMD) tehnique is used to dynamially manage the window: if an authenti message is reeived, window size inreases; otherwise, window size dereases. The riteria of our evaluation represents two aspets: penalty on authenti messages and ontainment apability of false messages. We have the following metri for legitimate pakets: The average end-to-end delay: End-to-end (authentiation) delay of paket m from broadast soure sr at node v is defined as the interval between the moment sr broadasts m into wireless networks and the moment v finishes verifiation of m. We have the following metris for false pakets: The number of nodes forwarding the false pakets. The number of nodes reeiving the false pakets. The number of publi key signature validation. Publi-key signature validating time is set to. seond. At any moment, a devie performs a single publi key validation and all the other validation requests, up to, are queued. Publi key signature has size bytes. Eah node is equipped with an omni-diretional antenna operating on a single hannel. The hannel model is two-ray path-loss propagation model. The broadast traffi is sent via CBR (onstant bit rate) traffi with paket size 6 bytes in UDP DCF Medium Aess Control protool is used with default onfiguration. Transmission range is m. We investigate two network topologies, i.e. grid topology and random topology. A. Grid Topology The first senario we study is grid topology and eah data point is averaged over runs of simulations. Sine delay penalty is ritial in large sale networks with long diameter, we plae nodes in a grid. Eah row (olumn) ontains nodes equally spaed with distane meters apart. There is a single broadast soure loated at the left top orner. It ontinuously sends CBR traffi at the rate of a paket every seonds. The average network radius from the broadast soure is 1 hops based on the setting. First, we study end-to-end authentiation delay for legitimate traffi in absene of attakers. We vary K from to and from 1. to.. b is set equal to. The length of riskw indow is 6 seonds. α = 6 and β = 1. For Dynami Window Sheme, the initial window size is set to 6. Additive inrease and multipliative values are 1 and separately, default as in []. As shown in Figure 6, the average end-to-end delay in hopby-hop authentiation is the worst, above.6 seonds beause the average length of paths from the broadast soure is 1 hops and the publi key validation delay is. seond. Clearly, the average end-to-end delay in sheme is optimal at about half a seond. Beause there are no false pakets deteted, the window size is at least 6, whih is always greater than the number of hops traversed sine last authentiator. The performane of DREAM is shown by the middle lines. As inreases, the end-to-end delay dereases sine more nodes are inlined to forward pakets first, thus

5 # of False Pakets Reeived.. DREAM K= DREAM K= Dynami WIndow # of False Pakets Forwarded DREAM K= DREAM K= # of False Pakets Validated DREAM K= DREAM K= Fig.. Normalized # of False Pakets Reeived Fig.. virtually reduing the end-to-end path length. However, as inreases above 1., the degree of improvement levels off. When K inreases, end-to-end delay dereases beause distane between two suessive authentiators is lengthened and the entire network is quikly overed. Normalized # of False Pakets Forwarded End to end Delay (s) Fig.. Normalized # of False Pakets Validated DREAM K= DREAM K= End to end Delay (s) DREAM K= DREAM K= Fig. 6. End-to-End Delay Next, we study the ontainment apability of DREAM and its response to maliious injetion from Figure to. Clearly, if attakers always flood less than α false pakets in riskw indow interval, DREAM never swithes to Alert Mode. However, this is not the best interest for attakers. Therefore, we fous on ases of high-rate false injetion. Again, we use the same onfiguration as before exept that an attaker is flooding simultaneously near the soure at the left top orner of grid. The attaker floods pakets at the rate of 1 paket per seond. During the false injetion attak, it is out of question that all the neighboring nodes have to reeive the false pakets and validate them. But our sheme an effetively onfine the false pakets within a small number of nodes. The number of false pakets is normalized by the total number of false pakets sent by the attaker. The normalized number of reeived false pakets is below for both DREAM and sheme sine they both swith to defensive mode. However, before the window size in DW is adjusted down, many false pakets are broadast to the whole network. Furthermore, the mixing traffis of good and false pakets interdit the slowdown of dynami window. For every paket sent by attaker, DW has 1 nodes to forward, nodes to reeive and 19 nodes to verify the message. On the ontrary, the ontainment performane of DREAM is lose to hop-byhop authentiation. The infetion of false injetion inreases as or K inreases. However, waste on both transmission and omputational resoures by the false pakets are under ontrol. The end-to-end authentiation delay in presene of the attaker is shown in Figure 7. Delay for both DREAM and sheme inreases, ompared with the ase in absene of attakers. From the above measurements, we see lear tradeoff between end-to-end authentiation delay and ontainment apability, i.e. publi key signature omputational overhead and Fig. 7. End-to-End Delay forwarding overhead for false pakets. B. Random Topology The seond senario we study is random topology with nodes randomly plaed in a m*m network. We make sure that the resulting topology is almost onneted. There are 1 broadast soure randomly seleted to send CBR traffi at rate of pakets per seonds and two attakers randomly seleted to send CBR traffi at rate of 1 pakets per seonds eah. Nodes swith to Alert Mode whenever the number of false pakets in 6-seond interval reahes and falls bak to Normal Mode when this number drops to 1. Sine the proessing time for one publi key signature validation is. seond, a node an tolerate at most./6 = % CPU spend in evaluating false signatures. End to End Delay (s) DREAM =1. K= DREAM =1. K= 1 Senario Fig. 8. End-to-End Delay The end-to-end delay for two example onfigurations of DREAM is ompared with the delay for and hop-by-hop authentiation shemes in Figure 8. X-axis shows random senarios with different loation deployments. As usual, hop-by-hop authentiation has the worst end-to-end delay for authenti traffi. DREAM with set to 1. halves the end-to-end delay. Further improvement is present with set to 1.. Even though Sheme has the best performane in terms of end-to-end delay, it is not resilient to false paket injetion mixed with the legitimate traffis. As shown in Table I, for the total false pakets sent by attakers, sheme forwards more than false pakets in order to ahieve the desired delay. But DREAM only forwards tens of false pakets before nodes

6 around attakers swith to Alert Mode. Due to spae limit, we do not plae the results for the number of false pakets reeived and validated here. Those two results are similar as the number of false pakets being forwarded. TABLE I NORMALIZED # OF FALSE PACKETS FORWARDED Senario I Senario II Senario III DREAM = DREAM = Hop-by-Hop We show sensitivity to b in Figure 9, varying and fixing K at in absene of attakers. The same onfiguration as in Figure 8 is used. Inreasing b dereases end-to-end delay, but without dramati improvement. Possible reasons are lak of enough number of neighbors around broadast soures or the set of non-authentiating forwarders are not spread out enough in all diretions. End to end Delay (s) =1., b= =1. b= =1. b= =1. b= =1. b= =1. b= 1 Senario Fig. 9. End-to-End Delay V. RELATED WORK Wang, Du and Ning proposed a dynami window sheme to ontain bogus data by publi key ryptography (PKC) authentiation [], where sensor nodes determine whether to verify a message first or forward the message first by estimating their distane from the maliious attakers and how many hops the inoming message has passed without authentiation. As we show in the evaluation setion, despite the fat that sheme displays good potential to improve end-to-end delay of authenti traffi, it is not robust against smart attakers who maliiously manipulate AIMD sheme. Additional, during the dereasing proess of AIMD, a large number of false pakets are broadast to the whole network. Drissi and Gu onsidered a large sensor network with a few predetermined trusted and better seured nodes whih divides the whole network into subnets [][]. Trusted nodes use TESLA to broadast messages to its subnet and eah ordinary node, upon reeiving broadast messages from its subnet, rebroadasts them before validation. Trusted nodes exhange broadast messages among themselves. A soure other than the trusted nodes sends messages to a nearby trusted node. However, the predetermined set of trusted nodes may attrat attaks and too muh authentiation and oordination overhead onsumes their battery and the battery of nodes around them quikly. Besides, how messages are sent from soure to trusted nodes, from trusted nodes to trusted nodes and from trusted nodes to subnets may introdue additional vulnerability, suh as DoS attaks and jamming. [8] proposed an effiient, onetime signature-based broadast authentiation sheme that redues storage usage and inludes a re-keying mehanism and [9] introdued a novel ryptographi paradigm of broadast authentiation with preferred verifiers. But, none of them offers ontainment apability against false injetion attaks. VI. CONCLUSION In this paper, we propose a novel broadast authentiation sheme, whih onfines false paket injetion mostly inside one-hop neighborhood around attakers with improved end-to-end delay for legitimate traffi. Via frequently using authentiate-first poliy, DREAM ontains most of faked pakets in one-hop neighborhood of attakers. Probabilisti forward-first deision dramatially improves the end-to-end delay for nodes far away from the broadast soure. With dynami adaptation to hanging threat level, our sheme is flexible to trade off delay with ontainment apability. Extensive simulation verifies end-to-end delay and ontainment performane in DREAM. In the future, we plan to integrate DREAM with other broadast protools and test its performane. DREAM relies on the probabilisti deision to push unverified pakets remotely. But the unverified forwarding path may not be optimal for quik overage. We will apply GPSR routing protool [1] to deterministially forward the unverified pakets further along the best diretion. We will also investigate ountermeasurement for attaks on broadast suppression, wherein attakers pretend to be the broadast soure and send pakets with higher or equal sequene numbers before the true soure. ACKNOWLEDGEMENT The researh in this paper is supported by Motorola grant REFERENCES [1] A. Perrig, R. Canetti, D. Tygar, and D. Song, The tesla broadast authentiation protool,. [Online]. Available: iteseer.ist.psu.edu/perrigtesla.html [] D. Liu, P. Ning, S. Zhu, and S. Jajodia, Pratial broadast authentiation in sensor networks, in MOBIQUITOUS : Proeedings of the The Seond Annual International Conferene on Mobile and Ubiquitous Systems: Networking and Servies,. [] R. Wang, W. Du, and P. Ning, Containing denial-of-servie attaks in broadast authentiation in sensor networks, in MobiHo 7: Proeedings of the 8th ACM international symposium on Mobile ad ho networking and omputing, 7, pp [] Q. Gu and J. Drissi, Dominating set based overhead redution for broadast authentiation in large sensor networks, in ICNS 7: Proeedings of the Third International Conferene on Networking and Servies. Washington, DC, USA: IEEE Computer Soiety, 7, p. 81. [] J. Drissi and Q. Gu, Loalized broadast authentiation in large sensor networks, in ICNS 6: Proeedings of the International onferene on Networking and Servies, 6, p.. [6] Y. Sasson, D. Cavin, and A. Shiper, Probabilisti broadast for flooding in wireless mobile ad ho networks, in Proeedings of IEEE Wireless Communiations and Networking Conferene (WCNC ). [7] J. E. Wieselthier, G. D. Nguyen, and A. Ephremides, On the onstrution of energy-effiient broadast and multiast trees in wireless networks, in INFOCOM (),, pp [8] S.-M. Chang, S. Shieh, W. W. Lin, and C.-M. Hsieh, An effiient broadast authentiation sheme in wireless sensor networks, in ASIACCS 6: Proeedings of the 6 ACM Symposium on Information, omputer and ommuniations seurity. ACM, 6, pp. 11. [9] M. Ramkumar, Broadast authentiation with hashed random preloaded subsets, in eprint Arhive,. [1] B. Karp and H. T. Kung, Gpsr: greedy perimeter stateless routing for wireless networks, in MobiCom : Proeedings of the 6th annual international onferene on Mobile omputing and networking.

Multi-Channel Wireless Networks: Capacity and Protocols

Multi-Channel Wireless Networks: Capacity and Protocols Multi-Channel Wireless Networks: Capaity and Protools Tehnial Report April 2005 Pradeep Kyasanur Dept. of Computer Siene, and Coordinated Siene Laboratory, University of Illinois at Urbana-Champaign Email:

More information

Acoustic Links. Maximizing Channel Utilization for Underwater

Acoustic Links. Maximizing Channel Utilization for Underwater Maximizing Channel Utilization for Underwater Aousti Links Albert F Hairris III Davide G. B. Meneghetti Adihele Zorzi Department of Information Engineering University of Padova, Italy Email: {harris,davide.meneghetti,zorzi}@dei.unipd.it

More information

What are Cycle-Stealing Systems Good For? A Detailed Performance Model Case Study

What are Cycle-Stealing Systems Good For? A Detailed Performance Model Case Study What are Cyle-Stealing Systems Good For? A Detailed Performane Model Case Study Wayne Kelly and Jiro Sumitomo Queensland University of Tehnology, Australia {w.kelly, j.sumitomo}@qut.edu.au Abstrat The

More information

Batch Auditing for Multiclient Data in Multicloud Storage

Batch Auditing for Multiclient Data in Multicloud Storage Advaned Siene and Tehnology Letters, pp.67-73 http://dx.doi.org/0.4257/astl.204.50. Bath Auditing for Multilient Data in Multiloud Storage Zhihua Xia, Xinhui Wang, Xingming Sun, Yafeng Zhu, Peng Ji and

More information

Pipelined Multipliers for Reconfigurable Hardware

Pipelined Multipliers for Reconfigurable Hardware Pipelined Multipliers for Reonfigurable Hardware Mithell J. Myjak and José G. Delgado-Frias Shool of Eletrial Engineering and Computer Siene, Washington State University Pullman, WA 99164-2752 USA {mmyjak,

More information

Fine-Grained Capabilities for Flooding DDoS Defense Using Client Reputations

Fine-Grained Capabilities for Flooding DDoS Defense Using Client Reputations Fine-Grained Capabilities for Flooding DDoS Defense Using Client Reputations ABSTRACT Maitreya Natu University of Delaware 103 Smith Hall Newark, DE 19716, USA natu@is.udel.edu Reently proposed apability

More information

On - Line Path Delay Fault Testing of Omega MINs M. Bellos 1, E. Kalligeros 1, D. Nikolos 1,2 & H. T. Vergos 1,2

On - Line Path Delay Fault Testing of Omega MINs M. Bellos 1, E. Kalligeros 1, D. Nikolos 1,2 & H. T. Vergos 1,2 On - Line Path Delay Fault Testing of Omega MINs M. Bellos, E. Kalligeros, D. Nikolos,2 & H. T. Vergos,2 Dept. of Computer Engineering and Informatis 2 Computer Tehnology Institute University of Patras,

More information

Accommodations of QoS DiffServ Over IP and MPLS Networks

Accommodations of QoS DiffServ Over IP and MPLS Networks Aommodations of QoS DiffServ Over IP and MPLS Networks Abdullah AlWehaibi, Anjali Agarwal, Mihael Kadoh and Ahmed ElHakeem Department of Eletrial and Computer Department de Genie Eletrique Engineering

More information

- 1 - S 21. Directory-based Administration of Virtual Private Networks: Policy & Configuration. Charles A Kunzinger.

- 1 - S 21. Directory-based Administration of Virtual Private Networks: Policy & Configuration. Charles A Kunzinger. - 1 - S 21 Diretory-based Administration of Virtual Private Networks: Poliy & Configuration Charles A Kunzinger kunzinge@us.ibm.om - 2 - Clik here Agenda to type page title What is a VPN? What is VPN Poliy?

More information

A Load-Balanced Clustering Protocol for Hierarchical Wireless Sensor Networks

A Load-Balanced Clustering Protocol for Hierarchical Wireless Sensor Networks International Journal of Advanes in Computer Networks and Its Seurity IJCNS A Load-Balaned Clustering Protool for Hierarhial Wireless Sensor Networks Mehdi Tarhani, Yousef S. Kavian, Saman Siavoshi, Ali

More information

Episode 12: TCP/IP & UbiComp

Episode 12: TCP/IP & UbiComp Episode 12: TCP/IP & UbiComp Hannes Frey and Peter Sturm University of Trier Outline Introdution Mobile IP TCP and Mobility Conlusion Referenes [1] James D. Solomon, Mobile IP: The Unplugged, Prentie Hall,

More information

Uplink Channel Allocation Scheme and QoS Management Mechanism for Cognitive Cellular- Femtocell Networks

Uplink Channel Allocation Scheme and QoS Management Mechanism for Cognitive Cellular- Femtocell Networks 62 Uplink Channel Alloation Sheme and QoS Management Mehanism for Cognitive Cellular- Femtoell Networks Kien Du Nguyen 1, Hoang Nam Nguyen 1, Hiroaki Morino 2 and Iwao Sasase 3 1 University of Engineering

More information

Displacement-based Route Update Strategies for Proactive Routing Protocols in Mobile Ad Hoc Networks

Displacement-based Route Update Strategies for Proactive Routing Protocols in Mobile Ad Hoc Networks Displaement-based Route Update Strategies for Proative Routing Protools in Mobile Ad Ho Networks Mehran Abolhasan 1 and Tadeusz Wysoki 1 1 University of Wollongong, NSW 2522, Australia E-mail: mehran@titr.uow.edu.au,

More information

HEXA: Compact Data Structures for Faster Packet Processing

HEXA: Compact Data Structures for Faster Packet Processing Washington University in St. Louis Washington University Open Sholarship All Computer Siene and Engineering Researh Computer Siene and Engineering Report Number: 27-26 27 HEXA: Compat Data Strutures for

More information

Establishing Secure Ethernet LANs Using Intelligent Switching Hubs in Internet Environments

Establishing Secure Ethernet LANs Using Intelligent Switching Hubs in Internet Environments Establishing Seure Ethernet LANs Using Intelligent Swithing Hubs in Internet Environments WOEIJIUNN TSAUR AND SHIJINN HORNG Department of Eletrial Engineering, National Taiwan University of Siene and Tehnology,

More information

A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR

A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR Malaysian Journal of Computer Siene, Vol 10 No 1, June 1997, pp 36-41 A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR Md Rafiqul Islam, Harihodin Selamat and Mohd Noor Md Sap Faulty of Computer Siene and

More information

Flow Demands Oriented Node Placement in Multi-Hop Wireless Networks

Flow Demands Oriented Node Placement in Multi-Hop Wireless Networks Flow Demands Oriented Node Plaement in Multi-Hop Wireless Networks Zimu Yuan Institute of Computing Tehnology, CAS, China {zimu.yuan}@gmail.om arxiv:153.8396v1 [s.ni] 29 Mar 215 Abstrat In multi-hop wireless

More information

New Channel Allocation Techniques for Power Efficient WiFi Networks

New Channel Allocation Techniques for Power Efficient WiFi Networks ew Channel Alloation Tehniques for Power Effiient WiFi etworks V. Miliotis, A. Apostolaras, T. Korakis, Z. Tao and L. Tassiulas Computer & Communiations Engineering Dept. University of Thessaly Centre

More information

Outline: Software Design

Outline: Software Design Outline: Software Design. Goals History of software design ideas Design priniples Design methods Life belt or leg iron? (Budgen) Copyright Nany Leveson, Sept. 1999 A Little History... At first, struggling

More information

Automatic Physical Design Tuning: Workload as a Sequence Sanjay Agrawal Microsoft Research One Microsoft Way Redmond, WA, USA +1-(425)

Automatic Physical Design Tuning: Workload as a Sequence Sanjay Agrawal Microsoft Research One Microsoft Way Redmond, WA, USA +1-(425) Automati Physial Design Tuning: Workload as a Sequene Sanjay Agrawal Mirosoft Researh One Mirosoft Way Redmond, WA, USA +1-(425) 75-357 sagrawal@mirosoft.om Eri Chu * Computer Sienes Department University

More information

A {k, n}-secret Sharing Scheme for Color Images

A {k, n}-secret Sharing Scheme for Color Images A {k, n}-seret Sharing Sheme for Color Images Rastislav Luka, Konstantinos N. Plataniotis, and Anastasios N. Venetsanopoulos The Edward S. Rogers Sr. Dept. of Eletrial and Computer Engineering, University

More information

A Multi-Head Clustering Algorithm in Vehicular Ad Hoc Networks

A Multi-Head Clustering Algorithm in Vehicular Ad Hoc Networks International Journal of Computer Theory and Engineering, Vol. 5, No. 2, April 213 A Multi-Head Clustering Algorithm in Vehiular Ad Ho Networks Shou-Chih Lo, Yi-Jen Lin, and Jhih-Siao Gao Abstrat Clustering

More information

Multi-hop Fast Conflict Resolution Algorithm for Ad Hoc Networks

Multi-hop Fast Conflict Resolution Algorithm for Ad Hoc Networks Multi-hop Fast Conflit Resolution Algorithm for Ad Ho Networks Shengwei Wang 1, Jun Liu 2,*, Wei Cai 2, Minghao Yin 2, Lingyun Zhou 2, and Hui Hao 3 1 Power Emergeny Center, Sihuan Eletri Power Corporation,

More information

A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks

A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks Abouberine Ould Cheikhna Department of Computer Siene University of Piardie Jules Verne 80039 Amiens Frane Ould.heikhna.abouberine @u-piardie.fr

More information

Improved flooding of broadcast messages using extended multipoint relaying

Improved flooding of broadcast messages using extended multipoint relaying Improved flooding of broadast messages using extended multipoint relaying Pere Montolio Aranda a, Joaquin Garia-Alfaro a,b, David Megías a a Universitat Oberta de Catalunya, Estudis d Informàtia, Mulimèdia

More information

A Lightweight Intrusion-Tolerant Overlay Network

A Lightweight Intrusion-Tolerant Overlay Network A Lightweight Intrusion-Tolerant Overlay Network Rafael R. Obelheiro and Joni da Silva Fraga Department of Automation and Systems Federal University of Santa Catarina, Brazil Email: rro@das.ufs.br, fraga@das.ufs.br

More information

Anonymity Trilemma: Strong Anonymity, Low Bandwidth, Low Latency Choose Two

Anonymity Trilemma: Strong Anonymity, Low Bandwidth, Low Latency Choose Two Anonymity Trilemma: Strong Anonymity, Low Bandwidth, Low Lateny Choose Two Debajyoti Das Purdue University, USA das48@purdue.edu Sebastian Meiser University College London, U s.meiser@ul.a.uk Esfandiar

More information

Extracting Partition Statistics from Semistructured Data

Extracting Partition Statistics from Semistructured Data Extrating Partition Statistis from Semistrutured Data John N. Wilson Rihard Gourlay Robert Japp Mathias Neumüller Department of Computer and Information Sienes University of Strathlyde, Glasgow, UK {jnw,rsg,rpj,mathias}@is.strath.a.uk

More information

DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT

DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT 1 ZHANGGUO TANG, 2 HUANZHOU LI, 3 MINGQUAN ZHONG, 4 JIAN ZHANG 1 Institute of Computer Network and Communiation Tehnology,

More information

Cluster-based Cooperative Communication with Network Coding in Wireless Networks

Cluster-based Cooperative Communication with Network Coding in Wireless Networks Cluster-based Cooperative Communiation with Network Coding in Wireless Networks Zygmunt J. Haas Shool of Eletrial and Computer Engineering Cornell University Ithaa, NY 4850, U.S.A. Email: haas@ee.ornell.edu

More information

Cross-layer Resource Allocation on Broadband Power Line Based on Novel QoS-priority Scheduling Function in MAC Layer

Cross-layer Resource Allocation on Broadband Power Line Based on Novel QoS-priority Scheduling Function in MAC Layer Communiations and Networ, 2013, 5, 69-73 http://dx.doi.org/10.4236/n.2013.53b2014 Published Online September 2013 (http://www.sirp.org/journal/n) Cross-layer Resoure Alloation on Broadband Power Line Based

More information

Partial Character Decoding for Improved Regular Expression Matching in FPGAs

Partial Character Decoding for Improved Regular Expression Matching in FPGAs Partial Charater Deoding for Improved Regular Expression Mathing in FPGAs Peter Sutton Shool of Information Tehnology and Eletrial Engineering The University of Queensland Brisbane, Queensland, 4072, Australia

More information

DECT Module Installation Manual

DECT Module Installation Manual DECT Module Installation Manual Rev. 2.0 This manual desribes the DECT module registration method to the HUB and fan airflow settings. In order for the HUB to ommuniate with a ompatible fan, the DECT module

More information

SVC-DASH-M: Scalable Video Coding Dynamic Adaptive Streaming Over HTTP Using Multiple Connections

SVC-DASH-M: Scalable Video Coding Dynamic Adaptive Streaming Over HTTP Using Multiple Connections SVC-DASH-M: Salable Video Coding Dynami Adaptive Streaming Over HTTP Using Multiple Connetions Samar Ibrahim, Ahmed H. Zahran and Mahmoud H. Ismail Department of Eletronis and Eletrial Communiations, Faulty

More information

A Dual-Hamiltonian-Path-Based Multicasting Strategy for Wormhole-Routed Star Graph Interconnection Networks

A Dual-Hamiltonian-Path-Based Multicasting Strategy for Wormhole-Routed Star Graph Interconnection Networks A Dual-Hamiltonian-Path-Based Multiasting Strategy for Wormhole-Routed Star Graph Interonnetion Networks Nen-Chung Wang Department of Information and Communiation Engineering Chaoyang University of Tehnology,

More information

Robust Dynamic Provable Data Possession

Robust Dynamic Provable Data Possession Robust Dynami Provable Data Possession Bo Chen Reza Curtmola Department of Computer Siene New Jersey Institute of Tehnology Newark, USA Email: b47@njit.edu, rix@njit.edu Abstrat Remote Data Cheking (RDC)

More information

Crowd-GPS-Sec: Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks

Crowd-GPS-Sec: Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks Crowd-GPS-Se: Leveraging Crowdsouring to Detet and Loalize GPS Spoofing Attaks Kai Jansen, Matthias Shäfer, Daniel Moser, Vinent Lenders, Christina Pöpper and Jens Shmitt Ruhr-University Bohum, Germany,

More information

CleanUp: Improving Quadrilateral Finite Element Meshes

CleanUp: Improving Quadrilateral Finite Element Meshes CleanUp: Improving Quadrilateral Finite Element Meshes Paul Kinney MD-10 ECC P.O. Box 203 Ford Motor Company Dearborn, MI. 8121 (313) 28-1228 pkinney@ford.om Abstrat: Unless an all quadrilateral (quad)

More information

Algorithms for External Memory Lecture 6 Graph Algorithms - Weighted List Ranking

Algorithms for External Memory Lecture 6 Graph Algorithms - Weighted List Ranking Algorithms for External Memory Leture 6 Graph Algorithms - Weighted List Ranking Leturer: Nodari Sithinava Sribe: Andi Hellmund, Simon Ohsenreither 1 Introdution & Motivation After talking about I/O-effiient

More information

Using Game Theory and Bayesian Networks to Optimize Cooperation in Ad Hoc Wireless Networks

Using Game Theory and Bayesian Networks to Optimize Cooperation in Ad Hoc Wireless Networks Using Game Theory and Bayesian Networks to Optimize Cooperation in Ad Ho Wireless Networks Giorgio Quer, Federio Librino, Lua Canzian, Leonardo Badia, Mihele Zorzi, University of California San Diego La

More information

Performance Improvement of TCP on Wireless Cellular Networks by Adaptive FEC Combined with Explicit Loss Notification

Performance Improvement of TCP on Wireless Cellular Networks by Adaptive FEC Combined with Explicit Loss Notification erformane Improvement of TC on Wireless Cellular Networks by Adaptive Combined with Expliit Loss tifiation Masahiro Miyoshi, Masashi Sugano, Masayuki Murata Department of Infomatis and Mathematial Siene,

More information

Australian Journal of Basic and Applied Sciences. A new Divide and Shuffle Based algorithm of Encryption for Text Message

Australian Journal of Basic and Applied Sciences. A new Divide and Shuffle Based algorithm of Encryption for Text Message ISSN:1991-8178 Australian Journal of Basi and Applied Sienes Journal home page: www.ajbasweb.om A new Divide and Shuffle Based algorithm of Enryption for Text Message Dr. S. Muthusundari R.M.D. Engineering

More information

The Implementation of RRTs for a Remote-Controlled Mobile Robot

The Implementation of RRTs for a Remote-Controlled Mobile Robot ICCAS5 June -5, KINEX, Gyeonggi-Do, Korea he Implementation of RRs for a Remote-Controlled Mobile Robot Chi-Won Roh*, Woo-Sub Lee **, Sung-Chul Kang *** and Kwang-Won Lee **** * Intelligent Robotis Researh

More information

PBFT: A Byzantine Renaissance. The Setup. What could possibly go wrong? The General Idea. Practical Byzantine Fault-Tolerance (CL99, CL00)

PBFT: A Byzantine Renaissance. The Setup. What could possibly go wrong? The General Idea. Practical Byzantine Fault-Tolerance (CL99, CL00) PBFT: A Byzantine Renaissane Pratial Byzantine Fault-Tolerane (CL99, CL00) first to be safe in asynhronous systems live under weak synhrony assumptions -Byzantine Paos! The Setup Crypto System Model Asynhronous

More information

Analysis of input and output configurations for use in four-valued CCD programmable logic arrays

Analysis of input and output configurations for use in four-valued CCD programmable logic arrays nalysis of input and output onfigurations for use in four-valued D programmable logi arrays J.T. utler H.G. Kerkhoff ndexing terms: Logi, iruit theory and design, harge-oupled devies bstrat: s in binary,

More information

Test Case Generation from UML State Machines

Test Case Generation from UML State Machines Test Case Generation from UML State Mahines Dirk Seifert To ite this version: Dirk Seifert. Test Case Generation from UML State Mahines. [Researh Report] 2008. HAL Id: inria-00268864

More information

Routing Protocols for Wireless Ad Hoc Networks Hybrid routing protocols Theofanis Kilinkaridis

Routing Protocols for Wireless Ad Hoc Networks Hybrid routing protocols Theofanis Kilinkaridis Routing Protools for Wireless Ad Ho Networks Hyrid routing protools Theofanis Kilinkaridis tkilinka@.hut.fi Astrat This paper presents a partiular group of routing protools that aim to omine the advantages

More information

Scalable P2P Search Daniel A. Menascé George Mason University

Scalable P2P Search Daniel A. Menascé George Mason University Saling the Web Salable P2P Searh aniel. Menasé eorge Mason University menase@s.gmu.edu lthough the traditional lient-server model irst established the Web s bakbone, it tends to underuse the Internet s

More information

Learning Convention Propagation in BeerAdvocate Reviews from a etwork Perspective. Abstract

Learning Convention Propagation in BeerAdvocate Reviews from a etwork Perspective. Abstract CS 9 Projet Final Report: Learning Convention Propagation in BeerAdvoate Reviews from a etwork Perspetive Abstrat We look at the way onventions propagate between reviews on the BeerAdvoate dataset, and

More information

A Novel Validity Index for Determination of the Optimal Number of Clusters

A Novel Validity Index for Determination of the Optimal Number of Clusters IEICE TRANS. INF. & SYST., VOL.E84 D, NO.2 FEBRUARY 2001 281 LETTER A Novel Validity Index for Determination of the Optimal Number of Clusters Do-Jong KIM, Yong-Woon PARK, and Dong-Jo PARK, Nonmembers

More information

Dubins Path Planning of Multiple UAVs for Tracking Contaminant Cloud

Dubins Path Planning of Multiple UAVs for Tracking Contaminant Cloud Proeedings of the 17th World Congress The International Federation of Automati Control Dubins Path Planning of Multiple UAVs for Traking Contaminant Cloud S. Subhan, B.A. White, A. Tsourdos M. Shanmugavel,

More information

Facility Location: Distributed Approximation

Facility Location: Distributed Approximation Faility Loation: Distributed Approximation Thomas Mosibroda Roger Wattenhofer Distributed Computing Group PODC 2005 Where to plae ahes in the Internet? A distributed appliation that has to dynamially plae

More information

References. December 1992, pp. 71 { 81. pp.457{467. Magazine, June for very large high throughput database systems,"

References. December 1992, pp. 71 { 81. pp.457{467. Magazine, June for very large high throughput database systems, the overall working time for other appliations. In ase, data ltering was the only appliation being run, then using distributed indexing, we an serve 00 times as many requests. 6 Conlusion We have explored

More information

RAC 2 E: Novel Rendezvous Protocol for Asynchronous Cognitive Radios in Cooperative Environments

RAC 2 E: Novel Rendezvous Protocol for Asynchronous Cognitive Radios in Cooperative Environments 21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communiations 1 RAC 2 E: Novel Rendezvous Protool for Asynhronous Cognitive Radios in Cooperative Environments Valentina Pavlovska,

More information

Detection and Recognition of Non-Occluded Objects using Signature Map

Detection and Recognition of Non-Occluded Objects using Signature Map 6th WSEAS International Conferene on CIRCUITS, SYSTEMS, ELECTRONICS,CONTROL & SIGNAL PROCESSING, Cairo, Egypt, De 9-31, 007 65 Detetion and Reognition of Non-Oluded Objets using Signature Map Sangbum Park,

More information

arxiv:cs/ v1 [cs.ni] 12 Dec 2006

arxiv:cs/ v1 [cs.ni] 12 Dec 2006 Optimal Filtering for DDoS Attaks Karim El Defrawy ICS Dept. UC Irvine keldefra@ui.edu Athina Markopoulou EECS Dept. UC Irvine athina@ui.edu Katerina Argyraki EE Dept. Stanford Univ. argyraki@stanford.edu

More information

Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks

Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 12, NO. 2, FEBRUARY 2013 289 Disovery and Verifiation of Neighbor Positions in Mobile Ad Ho Networks Maro Fiore, Member, IEEE, Claudio Ettore Casetti, Member,

More information

Multiple-Criteria Decision Analysis: A Novel Rank Aggregation Method

Multiple-Criteria Decision Analysis: A Novel Rank Aggregation Method 3537 Multiple-Criteria Deision Analysis: A Novel Rank Aggregation Method Derya Yiltas-Kaplan Department of Computer Engineering, Istanbul University, 34320, Avilar, Istanbul, Turkey Email: dyiltas@ istanbul.edu.tr

More information

Distributed Resource Allocation Strategies for Achieving Quality of Service in Server Clusters

Distributed Resource Allocation Strategies for Achieving Quality of Service in Server Clusters Proeedings of the 45th IEEE Conferene on Deision & Control Manhester Grand Hyatt Hotel an Diego, CA, UA, Deember 13-15, 2006 Distributed Resoure Alloation trategies for Ahieving Quality of ervie in erver

More information

Modeling Wireless Channel for Ad-Hoc Network Routing Protocol

Modeling Wireless Channel for Ad-Hoc Network Routing Protocol Modeling Wireless Channel for Ad-Ho Network Routing Protool Merlinda Drini, Tarek Saadawi Dept. ofeletrial Engineering, City College and Graduate Center ofcity University ofnew York New York, NY 10031,

More information

Fast Distribution of Replicated Content to Multi- Homed Clients Mohammad Malli Arab Open University, Beirut, Lebanon

Fast Distribution of Replicated Content to Multi- Homed Clients Mohammad Malli Arab Open University, Beirut, Lebanon ACEEE Int. J. on Information Tehnology, Vol. 3, No. 2, June 2013 Fast Distribution of Repliated Content to Multi- Homed Clients Mohammad Malli Arab Open University, Beirut, Lebanon Email: mmalli@aou.edu.lb

More information

An Efficient and Scalable Approach to CNN Queries in a Road Network

An Efficient and Scalable Approach to CNN Queries in a Road Network An Effiient and Salable Approah to CNN Queries in a Road Network Hyung-Ju Cho Chin-Wan Chung Dept. of Eletrial Engineering & Computer Siene Korea Advaned Institute of Siene and Tehnology 373- Kusong-dong,

More information

Volume 3, Issue 9, September 2013 International Journal of Advanced Research in Computer Science and Software Engineering

Volume 3, Issue 9, September 2013 International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advaned Researh in Computer Siene and Software Engineering Researh Paper Available online at: www.ijarsse.om A New-Fangled Algorithm

More information

Implementing Load-Balanced Switches With Fat-Tree Networks

Implementing Load-Balanced Switches With Fat-Tree Networks Implementing Load-Balaned Swithes With Fat-Tree Networks Hung-Shih Chueh, Ching-Min Lien, Cheng-Shang Chang, Jay Cheng, and Duan-Shin Lee Department of Eletrial Engineering & Institute of Communiations

More information

Approximate logic synthesis for error tolerant applications

Approximate logic synthesis for error tolerant applications Approximate logi synthesis for error tolerant appliations Doohul Shin and Sandeep K. Gupta Eletrial Engineering Department, University of Southern California, Los Angeles, CA 989 {doohuls, sandeep}@us.edu

More information

Path Diversity for Overlay Multicast Streaming

Path Diversity for Overlay Multicast Streaming Path Diversity for Overlay Multiast Streaming Matulya Bansal and Avideh Zakhor Department of Eletrial Engineering and Computer Siene University of California, Berkeley Berkeley, CA 9472 {matulya, avz}@ees.berkeley.edu

More information

Detection of RF interference to GPS using day-to-day C/No differences

Detection of RF interference to GPS using day-to-day C/No differences 1 International Symposium on GPS/GSS Otober 6-8, 1. Detetion of RF interferene to GPS using day-to-day /o differenes Ryan J. R. Thompson 1#, Jinghui Wu #, Asghar Tabatabaei Balaei 3^, and Andrew G. Dempster

More information

CA Privileged Identity Manager r12.x (CA ControlMinder) Implementation Proven Professional Exam (CAT-480) Study Guide Version 1.5

CA Privileged Identity Manager r12.x (CA ControlMinder) Implementation Proven Professional Exam (CAT-480) Study Guide Version 1.5 Proven Professional Exam (CAT-480) Study Guide Version 1.5 PROPRIETARY AND CONFIDENTIAL INFORMATION 2016 CA. All rights reserved. CA onfidential & proprietary information. For CA, CA Partner and CA Customer

More information

Dynamic Backlight Adaptation for Low Power Handheld Devices 1

Dynamic Backlight Adaptation for Low Power Handheld Devices 1 Dynami Baklight Adaptation for ow Power Handheld Devies 1 Sudeep Pasriha, Manev uthra, Shivajit Mohapatra, Nikil Dutt and Nalini Venkatasubramanian 444, Computer Siene Building, Shool of Information &

More information

Algorithms, Mechanisms and Procedures for the Computer-aided Project Generation System

Algorithms, Mechanisms and Procedures for the Computer-aided Project Generation System Algorithms, Mehanisms and Proedures for the Computer-aided Projet Generation System Anton O. Butko 1*, Aleksandr P. Briukhovetskii 2, Dmitry E. Grigoriev 2# and Konstantin S. Kalashnikov 3 1 Department

More information

Abstract. Key Words: Image Filters, Fuzzy Filters, Order Statistics Filters, Rank Ordered Mean Filters, Channel Noise. 1.

Abstract. Key Words: Image Filters, Fuzzy Filters, Order Statistics Filters, Rank Ordered Mean Filters, Channel Noise. 1. Fuzzy Weighted Rank Ordered Mean (FWROM) Filters for Mixed Noise Suppression from Images S. Meher, G. Panda, B. Majhi 3, M.R. Meher 4,,4 Department of Eletronis and I.E., National Institute of Tehnology,

More information

A Dictionary based Efficient Text Compression Technique using Replacement Strategy

A Dictionary based Efficient Text Compression Technique using Replacement Strategy A based Effiient Text Compression Tehnique using Replaement Strategy Debashis Chakraborty Assistant Professor, Department of CSE, St. Thomas College of Engineering and Tehnology, Kolkata, 700023, India

More information

Taming Decentralized POMDPs: Towards Efficient Policy Computation for Multiagent Settings

Taming Decentralized POMDPs: Towards Efficient Policy Computation for Multiagent Settings Taming Deentralized PMDPs: Towards ffiient Poliy omputation for Multiagent Settings. Nair and M. Tambe omputer Siene Dept. University of Southern alifornia Los Angeles A 90089 nair,tambe @us.edu M. Yokoo

More information

NONLINEAR BACK PROJECTION FOR TOMOGRAPHIC IMAGE RECONSTRUCTION. Ken Sauer and Charles A. Bouman

NONLINEAR BACK PROJECTION FOR TOMOGRAPHIC IMAGE RECONSTRUCTION. Ken Sauer and Charles A. Bouman NONLINEAR BACK PROJECTION FOR TOMOGRAPHIC IMAGE RECONSTRUCTION Ken Sauer and Charles A. Bouman Department of Eletrial Engineering, University of Notre Dame Notre Dame, IN 46556, (219) 631-6999 Shool of

More information

Speeding up Consensus by Chasing Fast Decisions

Speeding up Consensus by Chasing Fast Decisions Speeding up Consensus by Chasing Fast Deisions Balaji Arun, Sebastiano Peluso, Roberto Palmieri, Giuliano Losa, Binoy Ravindran ECE, Virginia Teh, USA {balajia,peluso,robertop,giuliano.losa,binoy}@vt.edu

More information

IN structured P2P overlay networks, each node and file key

IN structured P2P overlay networks, each node and file key 242 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 21, NO. 2, FEBRUARY 2010 Elasti Routing Table with Provable Performane for Congestion Control in DHT Networks Haiying Shen, Member, IEEE,

More information

A Comparison of Hard-state and Soft-state Signaling Protocols

A Comparison of Hard-state and Soft-state Signaling Protocols University of Massahusetts Amherst SholarWorks@UMass Amherst Computer Siene Department Faulty Publiation Series Computer Siene 2003 A Comparison of Hard-state and Soft-state Signaling Protools Ping Ji

More information

System-Level Parallelism and Throughput Optimization in Designing Reconfigurable Computing Applications

System-Level Parallelism and Throughput Optimization in Designing Reconfigurable Computing Applications System-Level Parallelism and hroughput Optimization in Designing Reonfigurable Computing Appliations Esam El-Araby 1, Mohamed aher 1, Kris Gaj 2, arek El-Ghazawi 1, David Caliga 3, and Nikitas Alexandridis

More information

Methods for Multi-Dimensional Robustness Optimization in Complex Embedded Systems

Methods for Multi-Dimensional Robustness Optimization in Complex Embedded Systems Methods for Multi-Dimensional Robustness Optimization in Complex Embedded Systems Arne Hamann, Razvan Rau, Rolf Ernst Institute of Computer and Communiation Network Engineering Tehnial University of Braunshweig,

More information

We don t need no generation - a practical approach to sliding window RLNC

We don t need no generation - a practical approach to sliding window RLNC We don t need no generation - a pratial approah to sliding window RLNC Simon Wunderlih, Frank Gabriel, Sreekrishna Pandi, Frank H.P. Fitzek Deutshe Telekom Chair of Communiation Networks, TU Dresden, Dresden,

More information

Boosted Random Forest

Boosted Random Forest Boosted Random Forest Yohei Mishina, Masamitsu suhiya and Hironobu Fujiyoshi Department of Computer Siene, Chubu University, 1200 Matsumoto-ho, Kasugai, Aihi, Japan {mishi, mtdoll}@vision.s.hubu.a.jp,

More information

LRED: A Robust and Responsive AQM Algorithm Using Packet Loss Ratio Measurement

LRED: A Robust and Responsive AQM Algorithm Using Packet Loss Ratio Measurement IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, TPDS-179-5 1 LRED: A Robust and Responsive AQM Algorithm Using Paket Loss Ratio Measurement Chonggang Wang, Member, IEEE, Jianghuan Liu, Member, IEEE,

More information

Announcements. Lecture Caching Issues for Multi-core Processors. Shared Vs. Private Caches for Small-scale Multi-core

Announcements. Lecture Caching Issues for Multi-core Processors. Shared Vs. Private Caches for Small-scale Multi-core Announements Your fous should be on the lass projet now Leture 17: Cahing Issues for Multi-ore Proessors This week: status update and meeting A short presentation on: projet desription (problem, importane,

More information

Z8530 Programming Guide

Z8530 Programming Guide Z8530 Programming Guide Alan Cox alan@redhat.om Z8530 Programming Guide by Alan Cox Copyright 2000 by Alan Cox This doumentation is free software; you an redistribute it and/or modify it under the terms

More information

CA Test Data Manager 4.x Implementation Proven Professional Exam (CAT-681) Study Guide Version 1.0

CA Test Data Manager 4.x Implementation Proven Professional Exam (CAT-681) Study Guide Version 1.0 Implementation Proven Professional Study Guide Version 1.0 PROPRIETARY AND CONFIDENTIAL INFORMATION 2017 CA. All rights reserved. CA onfidential & proprietary information. For CA, CA Partner and CA Customer

More information

Gradient based progressive probabilistic Hough transform

Gradient based progressive probabilistic Hough transform Gradient based progressive probabilisti Hough transform C.Galambos, J.Kittler and J.Matas Abstrat: The authors look at the benefits of exploiting gradient information to enhane the progressive probabilisti

More information

CA Agile Requirements Designer 2.x Implementation Proven Professional Exam (CAT-720) Study Guide Version 1.0

CA Agile Requirements Designer 2.x Implementation Proven Professional Exam (CAT-720) Study Guide Version 1.0 Exam (CAT-720) Study Guide Version 1.0 PROPRIETARY AND CONFIDENTIAL INFORMATION 2017 CA. All rights reserved. CA onfidential & proprietary information. For CA, CA Partner and CA Customer use only. No unauthorized

More information

Cooperative Coverage Extension for Relay-Union Networks

Cooperative Coverage Extension for Relay-Union Networks 1.119/TPDS.214.23821, IEEE Transations on Parallel and Distributed Systems IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 1 Cooperative Coverage Extension for Relay-Union Networks Yong Cui, Xiao

More information

Design of High Speed Mac Unit

Design of High Speed Mac Unit Design of High Speed Ma Unit 1 Harish Babu N, 2 Rajeev Pankaj N 1 PG Student, 2 Assistant professor Shools of Eletronis Engineering, VIT University, Vellore -632014, TamilNadu, India. 1 harishharsha72@gmail.om,

More information

Constructing Transaction Serialization Order for Incremental. Data Warehouse Refresh. Ming-Ling Lo and Hui-I Hsiao. IBM T. J. Watson Research Center

Constructing Transaction Serialization Order for Incremental. Data Warehouse Refresh. Ming-Ling Lo and Hui-I Hsiao. IBM T. J. Watson Research Center Construting Transation Serialization Order for Inremental Data Warehouse Refresh Ming-Ling Lo and Hui-I Hsiao IBM T. J. Watson Researh Center July 11, 1997 Abstrat In typial pratie of data warehouse, the

More information

C 2 C 3 C 1 M S. f e. e f (3,0) (0,1) (2,0) (-1,1) (1,0) (-1,0) (1,-1) (0,-1) (-2,0) (-3,0) (0,-2)

C 2 C 3 C 1 M S. f e. e f (3,0) (0,1) (2,0) (-1,1) (1,0) (-1,0) (1,-1) (0,-1) (-2,0) (-3,0) (0,-2) SPECIAL ISSUE OF IEEE TRANSACTIONS ON ROBOTICS AND AUTOMATION: MULTI-ROBOT SSTEMS, 00 Distributed reonfiguration of hexagonal metamorphi robots Jennifer E. Walter, Jennifer L. Welh, and Nany M. Amato Abstrat

More information

THROUGHPUT EVALUATION OF AN ASYMMETRICAL FDDI TOKEN RING NETWORK WITH MULTIPLE CLASSES OF TRAFFIC

THROUGHPUT EVALUATION OF AN ASYMMETRICAL FDDI TOKEN RING NETWORK WITH MULTIPLE CLASSES OF TRAFFIC THROUGHPUT EVALUATION OF AN ASYMMETRICAL FDDI TOKEN RING NETWORK WITH MULTIPLE CLASSES OF TRAFFIC Priya N. Werahera and Anura P. Jayasumana Department of Eletrial Engineering Colorado State University

More information

Detecting Outliers in High-Dimensional Datasets with Mixed Attributes

Detecting Outliers in High-Dimensional Datasets with Mixed Attributes Deteting Outliers in High-Dimensional Datasets with Mixed Attributes A. Koufakou, M. Georgiopoulos, and G.C. Anagnostopoulos 2 Shool of EECS, University of Central Florida, Orlando, FL, USA 2 Dept. of

More information

Gray Codes for Reflectable Languages

Gray Codes for Reflectable Languages Gray Codes for Refletable Languages Yue Li Joe Sawada Marh 8, 2008 Abstrat We lassify a type of language alled a refletable language. We then develop a generi algorithm that an be used to list all strings

More information

Backpressure with Adaptive Redundancy (BWAR)

Backpressure with Adaptive Redundancy (BWAR) Bakpressure with Adaptive Redundany (BWAR) Majed Alresaini alresain AT us. edu Maheswaran Sathiamoorthy msathiam AT us. edu Bhaskar Krishnamahari bkrishna AT us. edu Mihael J. Neely mjneely AT us. edu

More information

SINR-based Network Selection for Optimization in Heterogeneous Wireless Networks (HWNs)

SINR-based Network Selection for Optimization in Heterogeneous Wireless Networks (HWNs) 48 J. ICT Res. Appl., Vol. 9, No., 5, 48-6 SINR-based Network Seletion for Optimization in Heterogeneous Wireless Networks (HWNs) Abubakar M. Miyim, Mahamod Ismail & Rosdiadee Nordin Department of Eletrial,

More information

Smooth Trajectory Planning Along Bezier Curve for Mobile Robots with Velocity Constraints

Smooth Trajectory Planning Along Bezier Curve for Mobile Robots with Velocity Constraints Smooth Trajetory Planning Along Bezier Curve for Mobile Robots with Veloity Constraints Gil Jin Yang and Byoung Wook Choi Department of Eletrial and Information Engineering Seoul National University of

More information

Calculation of typical running time of a branch-and-bound algorithm for the vertex-cover problem

Calculation of typical running time of a branch-and-bound algorithm for the vertex-cover problem Calulation of typial running time of a branh-and-bound algorithm for the vertex-over problem Joni Pajarinen, Joni.Pajarinen@iki.fi Otober 21, 2007 1 Introdution The vertex-over problem is one of a olletion

More information

High-level synthesis under I/O Timing and Memory constraints

High-level synthesis under I/O Timing and Memory constraints Highlevel synthesis under I/O Timing and Memory onstraints Philippe Coussy, Gwenolé Corre, Pierre Bomel, Eri Senn, Eri Martin To ite this version: Philippe Coussy, Gwenolé Corre, Pierre Bomel, Eri Senn,

More information

Capturing Large Intra-class Variations of Biometric Data by Template Co-updating

Capturing Large Intra-class Variations of Biometric Data by Template Co-updating Capturing Large Intra-lass Variations of Biometri Data by Template Co-updating Ajita Rattani University of Cagliari Piazza d'armi, Cagliari, Italy ajita.rattani@diee.unia.it Gian Lua Marialis University

More information