Radha Poovendran Network Security Lab University of Washington

Size: px
Start display at page:

Download "Radha Poovendran Network Security Lab University of Washington"

Transcription

1 A Gaph Theoetic Famewok fo Peventing the Womhole Attack in Wieless Senso Netwoks Radha Poovendan Netwok Secuity Lab Univesity of Washington Womholes Hope fo time tavel Womhole: A space-time distotion that links two points in the Univese via a shote path in distance/duation than the diect path. Can be a poblem in wong hands! 2 Outline The Womhole theat in Wieless Senso Netwoks (WSN) Gaph Theoetic Fomulation Related Wok Ou Appoach: Local boadcast Keys Secuity Analysis Conclusions WSN Deployment Envionment Souce: Destination: Ad hoc mode of communication - Distibuted algoithms based on a coopeative pinciple Exchange of infomation locally Deployment egion may be hostile 3 4 1

2 Womhole Attack Example 1 Senso ange Attacke ecods info in Region B Tunnels it via the womhole link to Region A Replays the info to Region A Clustehead in Region A tigges false alam Sensos Sensos epot thei tempeatue Region A eadings to a clustehead senso Clustehead tigges alam if the majoity of the sensos epots eadings ove th Clustehead Womhole link Region B Attacke 5 Womhole Attack Example 2 s 3 s 4 Routing Tee s 5 Senso Womhole link ange Attacke establishes a womhole link between s 31 and s 3. s 31 and s 3 become neighbos in outing tee Sensos {,, s 3, s 4, s 5, s 7 } oute though the womhole link to each any of {s 30, s 31, s 32, s 33, s 34 }, and vice vesa. The attacke contols/obseves lage amount of data. It can selectively dop packets, affect thoughput, cause oute oscillation. Senso s 3 becomes a sinkhole fo the local taffic to {s 30, s 31, s 32, s 33, s 34 } s 7 s 30 s31 s 32 s 33 s 34 6 Impact of the Womhole Theat WSN Applications Monitoing Access Contol Localization Netwok Potocols Routing Neighbo discovey Womhole Attack Popeties Type: Replay attack The integity and authenticity of the communication is not compomised The success of the attack is independent of the stength of cyptogaphic pimitives. Feshness can be guaanteed by a speedy diect link

3 Outline The Womhole theat in Wieless Senso Netwoks (WSN) Gaph Theoetic Fomulation Related Wok Ou Appoach: Local boadcast Keys Secuity Analysis Conclusions Gaph Repesentation of WSN i j E(): set of Senso undiected edges ange V: set of vetices WSN epesented by a Geometic Gaph G(V, E()) 1, e( i, j) = 0, if i j if i j > The Communication Gaph G(V, E G ) need not be identical to G(V, E()), but, E G E() 9 10 Gaph Intepetation of Womholes Womholes violate the geometic gaph model of WSN Womhole link The Womhole Poblem Given a logical gaph G (V, E G )with womholes Womhole link Senso ange Senso ange Fo a Communication Gaph G (V, E G ) with womholes E G E() Womholes tansfom G(V, E G ) to a Logical Gaph G (V, E G ) 11 Extact fom G the communication gaph G(V, E G )with E G E() 12 3

4 Solving the Womhole Poblem If G(V, E()) can be constucted (e.g. known locations of sensos) then: G ( V, E() ) G' ( V, ) S( G, G') E G ' G( V, EG ) S : GxG' G a tansfomation such as XOR opeation between the connectivity matices of G, G What if G(V, E()) is UNKNOWN? 13 Outline The Womhole theat in Wieless Senso Netwoks (WSN) Gaph Theoetic Fomulation Related Wok Ou Appoach: Local boadcast Keys Secuity Analysis Conclusions 14 Packet Leashes Hu et al. A packet cannot tavel futhe than a pe-defined distance Uncetainty egion Packet Leashes Hu et al. Locations of the nodes ae known Geogaphical Leashes d(, ) δ: synchonization eo : (X 1, Y 1 ) : (X 2, Y 2 ) d max δc c: speed of light d(, ) d max + δc (X 1, Y 1 ) t s Data Timestamp, time sent : Accept packet if: d s1, s2 t ts + δ ( ) ( )c Speed of light Time eceived Synchonization eo

5 Packet Leashes Hu et al. Tempoal Leashes: Locations not known Packet Leashes Hu et al. Packets Leashes can detect (and emove) womholes if: t s t e Data Timestamp, time sent Expiation time : Accept packet if: dmax δc te ts = c Fo t e > t s : d max > δc t t e Time eceived Geogaphical leashes: ( t t + δ )c Senso communication ange Tempoal leashes: t t e s = + s c δ Requies tight synchonization Eg: Fo t e >t s, if δ =0.5msec > 150m Visualization of Womholes Wang Constuct a visual epesentation of the WSN s2 Visualization of Womholes Wang Cental Authoity (CA) collects distance measuements of each senso to its neighbos. Womhole-fee link netwok Womhole between, (font view) Womhole between two nodes (side view) Using Multi Dimensional Scaling (MDS), CA computes the elative position of each senso. Idea: Womholes shink the distance between two points causing wapaound in the visual epesentation

6 Outline The Womhole theat in Wieless Senso Netwoks (WSN) Gaph Theoetic Fomulation Related Wok Ou Appoach: Local boadcast Keys Secuity Analysis Conclusions Ou Appoach : LBK LBK: Local Boadcast Keys Nobody speaks English hee!! Τί λένε οι βάρβαροι 私達は日本語で話すことができる Just me, you neighbo Je suis fancais O football basilian é o mais melho Некоторый русский пожалуйста 21 You need to be in the neighbohood to speak the same language and undestand the message 22 Local Boadcast Keys (LBKs) Ns i Ks i s i Womhole link Each senso uses a key Ks i ONLY KNOWN to its neighbohood Ns i. Boadcast infomation encoded with Ks i, cannot be decypted outside Ns i. s j Ns j Coectness of the LBK Solution Imposing LBKs to the womhole infected logical gaph G (V,E G ), 1, e( i, j) = 0, if j holds Ks i othewise Since j holds Ks i iff j in in the neighbohood of i, 1, e( i, j) = 0, if if i j i j > Geometic gaph model is satisfied

7 Establishment of LBKs (1) A) Static Netwok: Locations of the sensos ae known. Establishment of LBKs (2) B) Locations of the sensos ae unknown, how do sensos discove thei neighbos? (X i, Y i ) Womhole link CA A Cental Authoity (CA) distibutes the LBKs to sensos. 25 Senso ange Neighbo discovey schemes ae vulneable to womholes 26 Secue Neighbo Discovey 1.Pefom distance bounding with neighbos Requies: time measuements with nanosecond accuacy Nanosecond pocessing capable hadwae 2.Pefom Secue Localization (SeRLoc) 3.Use Powe Poximity to infe distance 4.Poposed Appoach: Use special nodes we call GUARDS. 27 LBK Establishment Step 1 Guad ange R FK 1 s Senso ange FK 2 FK 3 FK 4 All nodes ae peloaded with a common key K 0 Each Guad G i boadcasts an encypted factional key E K0 {FK i } FK

8 LBK Establishment Step 1 LBK Establishment Step 2 {i,j,k, }: indexes of the Guads head Evey senso announces the indexes of the factional keys it heas and a theshold th {1,2,4} {1,2,4} {1,3,4} s {2,4,5} th=3 {1,3,4} {2,4,5} {2,3,4,5} {2,3,4,5} Sensos collect all the factional keys they hea. If a senso s i shaes moe than th factional keys with establish paiwise key K s1,si LBK Establishment Step 2 LBK Establishment Step 3 Senso distibutes its LBK via unicast to each neighbo s i, using K s1,si. {1,2,4} th=3 {1,3,4} {2,4,5} LBK {2,3,4,5} K s1,s2 =H(FK 1 FK 2 FK 3 FK 4 } H: Collision Resistant Hash function Each senso holds its own LBK and the LBks of its neighbos

9 LBK Establishment non-neighbos What if a node outside the senso ange shaes sufficient keys with? th=2 s {1,3,4} 4 {1,2,4} {2,4,5} Deciding the Theshold value (1) R: Guad ange, l: distance between sensos (l ) A c : Common aea Guads head to both, R A c l R {2,3,4,5} Theshold must be chosen caefully! What do we mean by this? At least th guads need to lay within A c, l Computed as if all neighbos ae at l= Deciding the Theshold value (2) Pobability of establishing a LBK with nonimmediate neighbos Locally computed Theshold Locally decide fo the theshold value th based on # of guads head GH s. R A c l R The theshold is some function of GH s th = f(gh s ) At least th guads need to lye within A c, l > ρ g =0.03 Senso ange ρ g =0.03 Senso ange

10 Womholes against the FK distibution G G Womhole link 2 3 G 6 Attacke tunnels the tansmissions of the FK via the womhole link and eplays at both ends. Sensos, hea set of guads GH s ={ G 7 }, establish a paiwise key and hence, a LBK If th >3, cannot establish an LBK with any of its neighbos G 7 Detecting womholes duing the FK distibution Guads include thei coodinates with evey tansmission of Factional Keys (FK). Oigin point If senso s heas a FK 2R multiple times it is A 1 s unde a womhole O A 2 attack A c If senso s heas two guads moe than 2R apat, it is unde a Womhole link womhole attack P det ρga ga ga1 ( 1 ) ( 1 ) 2 c ρ c ρ e + e e Womhole Attack Detection P det duing the distibution of factional keys Once attack is detected execute challengeesponse scheme to identify the closest guad 99.48% Conclusions We showed: Any candidate solution eliminates womholes if the communication gaph poduced satisfies the geometic gaph constaints We poposed: A scheme fo eliminating womholes when sensos have unknown location and ae not time synchonized Main idea behind the solution: If boadcasted infomation is encypted at each neighbohood with a diffeent Local Boadcast Key, it cannot be decypted at some othe neighbohood

Key Establishment Protocols. Cryptography CS 507 Erkay Savas Sabanci University

Key Establishment Protocols. Cryptography CS 507 Erkay Savas Sabanci University Key Establishment Potocols Cyptogaphy CS 507 Ekay Savas Sabanci Univesity ekays@sabanciuniv.edu Key distibution poblem Secuity of the keys Even if the cyptogaphic algoithms & potocols ae cyptogaphically

More information

Energy Savings Achievable in Connection Preserving Energy Saving Algorithms

Energy Savings Achievable in Connection Preserving Energy Saving Algorithms Enegy Savings Achievable in Connection Peseving Enegy Saving Algoithms Seh Chun Ng School of Electical and Infomation Engineeing Univesity of Sydney National ICT Austalia Limited Sydney, Austalia Email:

More information

Stanford University CS259Q: Quantum Computing Handout 8 Luca Trevisan October 18, 2012

Stanford University CS259Q: Quantum Computing Handout 8 Luca Trevisan October 18, 2012 Stanfod Univesity CS59Q: Quantum Computing Handout 8 Luca Tevisan Octobe 8, 0 Lectue 8 In which we use the quantum Fouie tansfom to solve the peiod-finding poblem. The Peiod Finding Poblem Let f : {0,...,

More information

Performance Analysis of Rayleigh Fading Ad Hoc Networks with Regular Topology

Performance Analysis of Rayleigh Fading Ad Hoc Networks with Regular Topology Pefomance Analysis of Rayleigh Fading Ad Hoc Netwoks with Regula Topology Xiaowen Liu and Matin Haenggi Depatment of Electical Engineeing Univesity of Note Dame Note Dame, IN 6556, USA {xliu, mhaenggi}@nd.edu

More information

Vector Control. Application to Induction Motor Control. DSP in Motion Control - Seminar

Vector Control. Application to Induction Motor Control. DSP in Motion Control - Seminar Vecto Contol Application to Induction Moto Contol Vecto Contol - Pinciple The Aim of Vecto Contol is to Oient the Flux Poducing Component of the Stato Cuent to some Suitable Flux Vecto unde all Opeating

More information

CSCE 478/878 Lecture 4: Experimental Design and Analysis. Stephen Scott. 3 Building a tree on the training set Introduction. Outline.

CSCE 478/878 Lecture 4: Experimental Design and Analysis. Stephen Scott. 3 Building a tree on the training set Introduction. Outline. In Homewok, you ae (supposedly) Choosing a data set 2 Extacting a test set of size > 3 3 Building a tee on the taining set 4 Testing on the test set 5 Repoting the accuacy (Adapted fom Ethem Alpaydin and

More information

Scheduling Algorithms and Bounds for Rateless Data Dissemination in Dense Wireless Networks

Scheduling Algorithms and Bounds for Rateless Data Dissemination in Dense Wireless Networks Scheduling Algoithms and Bounds fo Rateless Data Dissemination in Dense Wieless Netwoks Kan Lin, David Staobinski, Ai Tachtenbeg Depatment of Electical and Compute Engineeing Boston Univesity Boston, Massachusetts,

More information

Scheduling Wireless Ad Hoc Networks in Polynomial Time Using Claw-free Conflict Graphs

Scheduling Wireless Ad Hoc Networks in Polynomial Time Using Claw-free Conflict Graphs Scheduling Wieless d Hoc Netwoks in Polynomial Time Using law-fee onflict Gaphs axiv:1711.01620v1 [cs.it] 5 Nov 2017 lpe Köse, Muiel Médad Reseach Laboatoy of lectonics, Massachusetts Institute of Technology,

More information

AQI: Advanced Quantum Information Lecture 2 (Module 4): Order finding and factoring algorithms February 20, 2013

AQI: Advanced Quantum Information Lecture 2 (Module 4): Order finding and factoring algorithms February 20, 2013 AQI: Advanced Quantum Infomation Lectue 2 (Module 4): Ode finding and factoing algoithms Febuay 20, 203 Lectue: D. Mak Tame (email: m.tame@impeial.ac.uk) Intoduction In the last lectue we looked at the

More information

IN SITU SOUND ABSORPTION COEFFICIENT MEASUREMENT OF VARIOUS SURFACES

IN SITU SOUND ABSORPTION COEFFICIENT MEASUREMENT OF VARIOUS SURFACES IN SITU SOUND ABSORPTION COEFFICIENT MEASUREMENT OF VARIOUS SURFACES PACS REFERENCES : 43.20.El, 43.20.Ye, 43.55.Ev, 43.58.Bh Michel Béengie 1 ; Massimo Gaai 2 1 Laboatoie Cental des Ponts et Chaussées

More information

Broadcasting in Undirected Ad hoc Radio Networks

Broadcasting in Undirected Ad hoc Radio Networks Boadcasting in Undiected Ad hoc Radio Netwoks aiusz R. Kowalski Instytut Infomatyki Uniwesytet Waszawski Banacha 2, 02-097 Waszawa, Poland daek@mimuw.edu.pl Andzej Pelc épatement d Infomatique Univesité

More information

Duality between Statical and Kinematical Engineering Systems

Duality between Statical and Kinematical Engineering Systems Pape 00, Civil-Comp Ltd., Stiling, Scotland Poceedings of the Sixth Intenational Confeence on Computational Stuctues Technology, B.H.V. Topping and Z. Bittna (Editos), Civil-Comp Pess, Stiling, Scotland.

More information

Merging Uncertain Multi-Version XML Documents

Merging Uncertain Multi-Version XML Documents Meging Uncetain Multi-Vesion XML Documents M. Lamine BA, Talel Abdessalem & Piee Senellat ACM DocEng 2013-1st Intenational Wokshop on Document Changes (Floence, Italy) Septembe 10 th, 2013 M. L. Ba, T.

More information

High precision computer simulation of cyclotrons KARAMYSHEVA T., AMIRKHANOV I. MALININ V., POPOV D.

High precision computer simulation of cyclotrons KARAMYSHEVA T., AMIRKHANOV I. MALININ V., POPOV D. High pecision compute simulation of cyclotons KARAMYSHEVA T., AMIRKHANOV I. MALININ V., POPOV D. Abstact Effective and accuate compute simulations ae highly impotant in acceleatos design and poduction.

More information

4/18/2005. Statistical Learning Theory

4/18/2005. Statistical Learning Theory Statistical Leaning Theoy Statistical Leaning Theoy A model of supevised leaning consists of: a Envionment - Supplying a vecto x with a fixed but unknown pdf F x (x b Teache. It povides a desied esponse

More information

Lecture 18: Graph Isomorphisms

Lecture 18: Graph Isomorphisms INFR11102: Computational Complexity 22/11/2018 Lectue: Heng Guo Lectue 18: Gaph Isomophisms 1 An Athu-Melin potocol fo GNI Last time we gave a simple inteactive potocol fo GNI with pivate coins. We will

More information

Cheetah: Fast Graph Kernel Tracking on Dynamic Graphs

Cheetah: Fast Graph Kernel Tracking on Dynamic Graphs Cheetah: Fast Gaph Kenel Tacking on Dynamic Gaphs Pesente: Liangyue Li Joint wok with Hanghang Tong (ASU), Yanghua Xiao (Fudan), Wei Fan (Baidu) 1 Aizona State Univesity Gaphs ae Eveywhee Collaboation

More information

Modeling Primary User Emulation Attacks and Defenses in Cognitive Radio Networks

Modeling Primary User Emulation Attacks and Defenses in Cognitive Radio Networks Modeling Pimay Use Emulation Attacks and efenses in Cognitive Radio Netwoks Zesheng Chen, Todo Cooklev, Chao Chen, and Calos Pomalaza-Ráez Indiana Univesity - Pudue Univesity Fot Wayne Fot Wayne, IN 46805

More information

Classical Worm algorithms (WA)

Classical Worm algorithms (WA) Classical Wom algoithms (WA) WA was oiginally intoduced fo quantum statistical models by Pokof ev, Svistunov and Tupitsyn (997), and late genealized to classical models by Pokof ev and Svistunov (200).

More information

On Combination Networks with Cache-aided Relays and Users

On Combination Networks with Cache-aided Relays and Users On Combination Netwoks with Cache-aided Relays and Uses Kai Wan, Daniela Tuninetti Pablo Piantanida, Mingyue Ji, L2S CentaleSupélec-CNRS-Univesité Pais-Sud, Gif-su-Yvette 91190, Fance, {kai.wan, pablo.piantanida}@l2s.centalesupelec.f

More information

Teachers notes. Beyond the Thrills excursions. Worksheets in this book. Completing the worksheets

Teachers notes. Beyond the Thrills excursions. Worksheets in this book. Completing the worksheets Beyond the Thills excusions Teaches notes Physics is the science of how the wold (and Univese) woks. Luna Pak Sydney is a lage hands-on physics laboatoy full of fee falling objects, otating systems and

More information

MULTILAYER PERCEPTRONS

MULTILAYER PERCEPTRONS Last updated: Nov 26, 2012 MULTILAYER PERCEPTRONS Outline 2 Combining Linea Classifies Leaning Paametes Outline 3 Combining Linea Classifies Leaning Paametes Implementing Logical Relations 4 AND and OR

More information

A Bijective Approach to the Permutational Power of a Priority Queue

A Bijective Approach to the Permutational Power of a Priority Queue A Bijective Appoach to the Pemutational Powe of a Pioity Queue Ia M. Gessel Kuang-Yeh Wang Depatment of Mathematics Bandeis Univesity Waltham, MA 02254-9110 Abstact A pioity queue tansfoms an input pemutation

More information

Determining solar characteristics using planetary data

Determining solar characteristics using planetary data Detemining sola chaacteistics using planetay data Intoduction The Sun is a G-type main sequence sta at the cente of the Sola System aound which the planets, including ou Eath, obit. In this investigation

More information

A more efficient secure event signature protocol for massively multiplayer online games based on P2P Dapeng Li1, a, Liang Hu1,b, and JianFeng Chu1,c

A more efficient secure event signature protocol for massively multiplayer online games based on P2P Dapeng Li1, a, Liang Hu1,b, and JianFeng Chu1,c Intenational Foum on Mechanical, Contol and Automation (IFMCA 2016) A moe efficient secue event signatue potocol fo massively multiplaye online games based on P2P Dapeng Li1, a, Liang Hu1,b, and JianFeng

More information

Multipath routing and congestion control

Multipath routing and congestion control Multipath outing and congestion contol Fank Kelly Univesity of Cambidge (with wok of Damon Wischik, Mak Handley and Costin Raiciu, Univesity College London) Chinese Univesity of Hong Kong (Institute of

More information

10/04/18. P [P(x)] 1 negl(n).

10/04/18. P [P(x)] 1 negl(n). Mastemath, Sping 208 Into to Lattice lgs & Cypto Lectue 0 0/04/8 Lectues: D. Dadush, L. Ducas Scibe: K. de Boe Intoduction In this lectue, we will teat two main pats. Duing the fist pat we continue the

More information

Math 301: The Erdős-Stone-Simonovitz Theorem and Extremal Numbers for Bipartite Graphs

Math 301: The Erdős-Stone-Simonovitz Theorem and Extremal Numbers for Bipartite Graphs Math 30: The Edős-Stone-Simonovitz Theoem and Extemal Numbes fo Bipatite Gaphs May Radcliffe The Edős-Stone-Simonovitz Theoem Recall, in class we poved Tuán s Gaph Theoem, namely Theoem Tuán s Theoem Let

More information

Limited Feedback Scheme for Device to Device Communications in 5G Cellular Networks with Reliability and Cellular Secrecy Outage Constraints

Limited Feedback Scheme for Device to Device Communications in 5G Cellular Networks with Reliability and Cellular Secrecy Outage Constraints Limited Feedback Scheme fo Device to Device Communications in 5G Cellula Netwoks with Reliability and Cellula Sececy Outage Constaints Faezeh Alavi, Nade Mokai, Mohammad R. Javan, and Kanapathippillai

More information

More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries

More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries Moe Efficient Oblivious Tansfe Extensions with Secuity fo Malicious Advesaies Gilad Ashaov Yehuda Lindell Thomas Schneide Michael Zohne Hebew Univesity Ba-Ilan Univesity Damstadt Damstadt EUROCRYPT 2015

More information

Information Retrieval Advanced IR models. Luca Bondi

Information Retrieval Advanced IR models. Luca Bondi Advanced IR models Luca Bondi Advanced IR models 2 (LSI) Pobabilistic Latent Semantic Analysis (plsa) Vecto Space Model 3 Stating point: Vecto Space Model Documents and queies epesented as vectos in the

More information

Automatic Composition of e-services: The Roman way. Daniela Berardi Dipartimento di Informatica e Sistemistica Università di Roma La Sapienza

Automatic Composition of e-services: The Roman way. Daniela Berardi Dipartimento di Informatica e Sistemistica Università di Roma La Sapienza Automatic Composition of e-sevices: The Roman way Daniela Beadi Dipatimento di Infomatica e Sistemistica Univesità di Roma La Sapienza beadi@dis.unioma1.it http://www.dis.unioma1.it/~beadi/ Daniela Beadi

More information

Chapter 22: Electric Fields. 22-1: What is physics? General physics II (22102) Dr. Iyad SAADEDDIN. 22-2: The Electric Field (E)

Chapter 22: Electric Fields. 22-1: What is physics? General physics II (22102) Dr. Iyad SAADEDDIN. 22-2: The Electric Field (E) Geneal physics II (10) D. Iyad D. Iyad Chapte : lectic Fields In this chapte we will cove The lectic Field lectic Field Lines -: The lectic Field () lectic field exists in a egion of space suounding a

More information

Conspiracy and Information Flow in the Take-Grant Protection Model

Conspiracy and Information Flow in the Take-Grant Protection Model Conspiacy and Infomation Flow in the Take-Gant Potection Model Matt Bishop Depatment of Compute Science Univesity of Califonia at Davis Davis, CA 95616-8562 ABSTRACT The Take Gant Potection Model is a

More information

Fractional Zero Forcing via Three-color Forcing Games

Fractional Zero Forcing via Three-color Forcing Games Factional Zeo Focing via Thee-colo Focing Games Leslie Hogben Kevin F. Palmowski David E. Robeson Michael Young May 13, 2015 Abstact An -fold analogue of the positive semidefinite zeo focing pocess that

More information

Information-Theoretic

Information-Theoretic Infomation-Theoetic Key Ageement fom Close Secets Leonid Reyzin Januay 5, 2018 IISc 1 Infomation-Theoetic Key Ageement fom Close Secets: A Suvey 0 1 assume these ae close and patially secet 2 Infomation-Theoetic

More information

Fields and Waves I Spring 2005 Homework 4. Due 8 March 2005

Fields and Waves I Spring 2005 Homework 4. Due 8 March 2005 Homewok 4 Due 8 Mach 005. Inceasing the Beakdown Voltage: This fist question is a mini design poject. You fist step is to find a commecial cable (coaxial o two wie line) fo which you have the following

More information

COMP Parallel Computing SMM (3) OpenMP Case Study: The Barnes-Hut N-body Algorithm

COMP Parallel Computing SMM (3) OpenMP Case Study: The Barnes-Hut N-body Algorithm COMP 633 - Paallel Computing Lectue 8 Septembe 14, 2017 SMM (3) OpenMP Case Study: The Banes-Hut N-body Algoithm Topics Case study: the Banes-Hut algoithm Study an impotant algoithm in scientific computing»

More information

The Millikan Experiment: Determining the Elementary Charge

The Millikan Experiment: Determining the Elementary Charge LAB EXERCISE 7.5.1 7.5 The Elementay Chage (p. 374) Can you think of a method that could be used to suggest that an elementay chage exists? Figue 1 Robet Millikan (1868 1953) m + q V b The Millikan Expeiment:

More information

Magnetometer Calibration Algorithm Based on Analytic Geometry Transform Yongjian Yang, Xiaolong Xiao1,Wu Liao

Magnetometer Calibration Algorithm Based on Analytic Geometry Transform Yongjian Yang, Xiaolong Xiao1,Wu Liao nd Intenational Foum on Electical Engineeing and Automation (IFEEA 5 Magnetomete Calibation Algoithm Based on Analytic Geomety ansfom Yongjian Yang, Xiaolong Xiao,u Liao College of Compute Science and

More information

Revision of Lecture Eight

Revision of Lecture Eight Revision of Lectue Eight Baseband equivalent system and equiements of optimal tansmit and eceive filteing: (1) achieve zeo ISI, and () maximise the eceive SNR Thee detection schemes: Theshold detection

More information

gr0 GRAPHS Hanan Samet

gr0 GRAPHS Hanan Samet g0 GRPHS Hanan Samet ompute Science epatment and ente fo utomation Reseach and Institute fo dvanced ompute Studies Univesity of Mayland ollege Pak, Mayland 074 e-mail: hjs@umiacs.umd.edu opyight 1997 Hanan

More information

Fresnel Diffraction. monchromatic light source

Fresnel Diffraction. monchromatic light source Fesnel Diffaction Equipment Helium-Neon lase (632.8 nm) on 2 axis tanslation stage, Concave lens (focal length 3.80 cm) mounted on slide holde, iis mounted on slide holde, m optical bench, micoscope slide

More information

Quantum Fourier Transform

Quantum Fourier Transform Chapte 5 Quantum Fouie Tansfom Many poblems in physics and mathematics ae solved by tansfoming a poblem into some othe poblem with a known solution. Some notable examples ae Laplace tansfom, Legende tansfom,

More information

Light Time Delay and Apparent Position

Light Time Delay and Apparent Position Light Time Delay and ppaent Position nalytical Gaphics, Inc. www.agi.com info@agi.com 610.981.8000 800.220.4785 Contents Intoduction... 3 Computing Light Time Delay... 3 Tansmission fom to... 4 Reception

More information

Top K Nearest Keyword Search on Large Graphs

Top K Nearest Keyword Search on Large Graphs Top K Neaest Keywod Seach on Lage Gaphs Miao Qiao, Lu Qin, Hong Cheng, Jeffey Xu Yu, Wentao Tian The Chinese Univesity of Hong Kong, Hong Kong, China {mqiao,lqin,hcheng,yu,wttian}@se.cuhk.edu.hk ABSTRACT

More information

A scaling-up methodology for co-rotating twin-screw extruders

A scaling-up methodology for co-rotating twin-screw extruders A scaling-up methodology fo co-otating twin-scew extudes A. Gaspa-Cunha, J. A. Covas Institute fo Polymes and Composites/I3N, Univesity of Minho, Guimaães 4800-058, Potugal Abstact. Scaling-up of co-otating

More information

Distributed Control of Mobility & Routing in Networks of Robots

Distributed Control of Mobility & Routing in Networks of Robots 20 IEEE 2th Intenational Wokshop on Signal Pocessing Advances in Wieless Communications Distibuted Contol of Mobility & Routing in Netwoks of Robots Michael M. Zavlanos, Alejando Ribeio, and Geoge. Pappas

More information

( ) [ ] [ ] [ ] δf φ = F φ+δφ F. xdx.

( ) [ ] [ ] [ ] δf φ = F φ+δφ F. xdx. 9. LAGRANGIAN OF THE ELECTROMAGNETIC FIELD In the pevious section the Lagangian and Hamiltonian of an ensemble of point paticles was developed. This appoach is based on a qt. This discete fomulation can

More information

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY 1

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY 1 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY 1 1 2 3 4 Distibuted Multistage Coopeative-Social-Multicast-Aided Content Dissemination in Random Mobile Netwoks Jie Hu, Student Membe, IEEE, Lie-Liang Yang, Senio

More information

FUSE Fusion Utility Sequence Estimator

FUSE Fusion Utility Sequence Estimator FUSE Fusion Utility Sequence Estimato Belu V. Dasaathy Dynetics, Inc. P. O. Box 5500 Huntsville, AL 3584-5500 belu.d@dynetics.com Sean D. Townsend Dynetics, Inc. P. O. Box 5500 Huntsville, AL 3584-5500

More information

HOW TO TEACH THE FUNDAMENTALS OF INFORMATION SCIENCE, CODING, DECODING AND NUMBER SYSTEMS?

HOW TO TEACH THE FUNDAMENTALS OF INFORMATION SCIENCE, CODING, DECODING AND NUMBER SYSTEMS? 6th INTERNATIONAL MULTIDISCIPLINARY CONFERENCE HOW TO TEACH THE FUNDAMENTALS OF INFORMATION SCIENCE, CODING, DECODING AND NUMBER SYSTEMS? Cecília Sitkuné Göömbei College of Nyíegyháza Hungay Abstact: The

More information

Open Access Research on Ranging Optimization and Twice-Weighted Centroid Calculation in Wireless Sensor Network Localization Algorithm

Open Access Research on Ranging Optimization and Twice-Weighted Centroid Calculation in Wireless Sensor Network Localization Algorithm Send Odes fo Repints to epints@benthamscience.net 154 The Open Automation and Contol Systems Jounal, 013, 5, 154-160 Open Access Reseach on Ranging Optimization and Twice-Weighted Centoid Calculation in

More information

Introduction to Arrays

Introduction to Arrays Intoduction to Aays Page 1 Intoduction to Aays The antennas we have studied so fa have vey low diectivity / gain. While this is good fo boadcast applications (whee we want unifom coveage), thee ae cases

More information

Experiment I Voltage Variation and Control

Experiment I Voltage Variation and Control ELE303 Electicity Netwoks Expeiment I oltage aiation and ontol Objective To demonstate that the voltage diffeence between the sending end of a tansmission line and the load o eceiving end depends mainly

More information

SUFFICIENT CONDITIONS FOR MAXIMALLY EDGE-CONNECTED AND SUPER-EDGE-CONNECTED GRAPHS DEPENDING ON THE CLIQUE NUMBER

SUFFICIENT CONDITIONS FOR MAXIMALLY EDGE-CONNECTED AND SUPER-EDGE-CONNECTED GRAPHS DEPENDING ON THE CLIQUE NUMBER Discussiones Mathematicae Gaph Theoy 39 (019) 567 573 doi:10.7151/dmgt.096 SUFFICIENT CONDITIONS FOR MAXIMALLY EDGE-CONNECTED AND SUPER-EDGE-CONNECTED GRAPHS DEPENDING ON THE CLIQUE NUMBER Lutz Volkmann

More information

Bayesian Congestion Control over a Markovian Network Bandwidth Process

Bayesian Congestion Control over a Markovian Network Bandwidth Process Bayesian Congestion Contol ove a Makovian Netwok Bandwidth Pocess Paisa Mansouifad,, Bhaska Kishnamachai, Taa Javidi Ming Hsieh Depatment of Electical Engineeing, Univesity of Southen Califonia, Los Angeles,

More information

Regularization. Stephen Scott and Vinod Variyam. Introduction. Outline. Machine. Learning. Problems. Measuring. Performance.

Regularization. Stephen Scott and Vinod Variyam. Introduction. Outline. Machine. Learning. Problems. Measuring. Performance. leaning can geneally be distilled to an optimization poblem Choose a classifie (function, hypothesis) fom a set of functions that minimizes an objective function Clealy we want pat of this function to

More information

Psychometric Methods: Theory into Practice Larry R. Price

Psychometric Methods: Theory into Practice Larry R. Price ERRATA Psychometic Methods: Theoy into Pactice Lay R. Pice Eos wee made in Equations 3.5a and 3.5b, Figue 3., equations and text on pages 76 80, and Table 9.1. Vesions of the elevant pages that include

More information

Computers & Operations Research

Computers & Operations Research Computes & Opeations Reseach 37 (2010) 72 -- 82 Contents lists available at ScienceDiect Computes & Opeations Reseach jounal homepage: www.elsevie.com/locate/co Min-degee constained minimum spanning tee

More information

Seidel s Trapezoidal Partitioning Algorithm

Seidel s Trapezoidal Partitioning Algorithm CS68: Geometic Agoithms Handout #6 Design and Anaysis Oigina Handout #6 Stanfod Univesity Tuesday, 5 Febuay 99 Oigina Lectue #7: 30 Januay 99 Topics: Seide s Tapezoida Patitioning Agoithm Scibe: Michae

More information

Multihop MIMO Relay Networks with ARQ

Multihop MIMO Relay Networks with ARQ Multihop MIMO Relay Netwoks with ARQ Yao Xie Deniz Gündüz Andea Goldsmith Depatment of Electical Engineeing Stanfod Univesity Stanfod CA Depatment of Electical Engineeing Pinceton Univesity Pinceton NJ

More information

Galilean Transformation vs E&M y. Historical Perspective. Chapter 2 Lecture 2 PHYS Special Relativity. Sep. 1, y K K O.

Galilean Transformation vs E&M y. Historical Perspective. Chapter 2 Lecture 2 PHYS Special Relativity. Sep. 1, y K K O. PHYS-2402 Chapte 2 Lectue 2 Special Relativity 1. Basic Ideas Sep. 1, 2016 Galilean Tansfomation vs E&M y K O z z y K In 1873, Maxwell fomulated Equations of Electomagnetism. v Maxwell s equations descibe

More information

Multicast Capacity with Max-Min Fairness for Heterogeneous Networks

Multicast Capacity with Max-Min Fairness for Heterogeneous Networks 1 Multicast Capacity with Max-Min Fainess fo Heteogeneous Netwoks Yixuan i, Qiuyu Peng, Xinbing Wang Depatment of Electonic Engineeing Shanghai Jiao Tong Univesity, China Email: {lyx1990116, pqy, xwang8}@sjtu.edu.cn

More information

Multi-Objective Optimization Algorithms for Finite Element Model Updating

Multi-Objective Optimization Algorithms for Finite Element Model Updating Multi-Objective Optimization Algoithms fo Finite Element Model Updating E. Ntotsios, C. Papadimitiou Univesity of Thessaly Geece Outline STRUCTURAL IDENTIFICATION USING MEASURED MODAL DATA Weighted Modal

More information

HQuad: Statistics of Hamiltonian Cycles in Wireless Rechargeable Sensor Networks

HQuad: Statistics of Hamiltonian Cycles in Wireless Rechargeable Sensor Networks HQuad: Statistics of Hamiltonian Cycles in Wieless Rechageable Senso Netwoks Yanmao Man Dept. of ECE Univesity of Aizona Tucson, AZ, U.S.A. yman@email.aizona.edu Jing Deng Dept. of CS UNC at Geensboo Geensboo,

More information

Lifting Private Information Retrieval from Two to any Number of Messages

Lifting Private Information Retrieval from Two to any Number of Messages Lifting Pivate Infomation Retieval fom Two to any umbe of Messages Rafael G.L. D Oliveia, Salim El Rouayheb ECE, Rutges Univesity, Piscataway, J Emails: d746@scaletmail.utges.edu, salim.elouayheb@utges.edu

More information

ON THE INVERSE SIGNED TOTAL DOMINATION NUMBER IN GRAPHS. D.A. Mojdeh and B. Samadi

ON THE INVERSE SIGNED TOTAL DOMINATION NUMBER IN GRAPHS. D.A. Mojdeh and B. Samadi Opuscula Math. 37, no. 3 (017), 447 456 http://dx.doi.og/10.7494/opmath.017.37.3.447 Opuscula Mathematica ON THE INVERSE SIGNED TOTAL DOMINATION NUMBER IN GRAPHS D.A. Mojdeh and B. Samadi Communicated

More information

Brightness Preserving Histogram Equalization with Maximum Entropy: A Variational Perspective Chao Wang and Zhongfu Ye

Brightness Preserving Histogram Equalization with Maximum Entropy: A Variational Perspective Chao Wang and Zhongfu Ye 326 IEEE Tansactions on Consume Electonics, Vol. 5, No. 4, NOVEMBER 25 Bightness Peseving Histogam Equalization with Maximum Entopy: A Vaiational Pespective Chao Wang and Zhongfu Ye Abstact Histogam equalization

More information

QIP Course 10: Quantum Factorization Algorithm (Part 3)

QIP Course 10: Quantum Factorization Algorithm (Part 3) QIP Couse 10: Quantum Factoization Algoithm (Pat 3 Ryutaoh Matsumoto Nagoya Univesity, Japan Send you comments to yutaoh.matsumoto@nagoya-u.jp Septembe 2018 @ Tokyo Tech. Matsumoto (Nagoya U. QIP Couse

More information

Conservative Averaging Method and its Application for One Heat Conduction Problem

Conservative Averaging Method and its Application for One Heat Conduction Problem Poceedings of the 4th WSEAS Int. Conf. on HEAT TRANSFER THERMAL ENGINEERING and ENVIRONMENT Elounda Geece August - 6 (pp6-) Consevative Aveaging Method and its Application fo One Heat Conduction Poblem

More information

Three-dimensional Quantum Cellular Neural Network and Its Application to Image Processing *

Three-dimensional Quantum Cellular Neural Network and Its Application to Image Processing * Thee-dimensional Quantum Cellula Neual Netwok and Its Application to Image Pocessing * Sen Wang, Li Cai, Huanqing Cui, Chaowen Feng, Xiaokuo Yang Science College, Ai Foce Engineeing Univesity Xi an 701,

More information

Distributed Welfare Games

Distributed Welfare Games OPERATIONS RESEARCH Vol. 61, No. 1, Januay Febuay 2013, pp. 155 168 ISSN 0030-364X (pint) ISSN 1526-5463 (online) http://dx.doi.og/10.1287/ope.1120.1137 2013 INFORMS Distibuted Welfae Games Jason R. Maden

More information

Inseting this into the left hand side of the equation of motion above gives the most commonly used algoithm in classical molecula dynamics simulations

Inseting this into the left hand side of the equation of motion above gives the most commonly used algoithm in classical molecula dynamics simulations Chem465 in 2000 Univesity of Washington Lectue notes Hannes Jonsson Classical dynamics When we ae dealing with heavy atoms and high enough enegy o tempeatue, it is often suciently accuate to neglect quantum

More information

TELE4652 Mobile and Satellite Communications

TELE4652 Mobile and Satellite Communications Mobile and Satellite Communications Lectue 3 Radio Channel Modelling Channel Models If one was to walk away fom a base station, and measue the powe level eceived, a plot would like this: Channel Models

More information

EE 5322: Intelligent Control Systems

EE 5322: Intelligent Control Systems EE 53: Intelligent Contol Systems Pepaed by: Aaon Halveson, Rich Otten Peti-Nets Intoduction: Peti nets wee developed in the ealy 96s by C.A. Peti in his Ph.D. dissetation. C.A. Peti. Kommunikation mit

More information

New problems in universal algebraic geometry illustrated by boolean equations

New problems in universal algebraic geometry illustrated by boolean equations New poblems in univesal algebaic geomety illustated by boolean equations axiv:1611.00152v2 [math.ra] 25 Nov 2016 Atem N. Shevlyakov Novembe 28, 2016 Abstact We discuss new poblems in univesal algebaic

More information

Tailoring Materials and Radiation to Explore Cloaking Phenomena

Tailoring Materials and Radiation to Explore Cloaking Phenomena Tailoing Mateials and Radiation to Exploe Cloaking Phenomena Jonathan Samoajski Septembe 22, 2009 1 Intoduction Radiation-matte inteaction is vey impotant in enegy eseach, especially in the aeas of fusion

More information

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. X, NO. X,

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. X, NO. X, IEEE/ACM TRANSACTIONS ON NETWORING, VOL. X, NO. X, 016 1 Wieless senso netwoks unde the andom paiwise key pedistibution scheme: Can esiliency be achieved with small key ings? Osman Yağan, Membe, IEEE,

More information

Secret Exponent Attacks on RSA-type Schemes with Moduli N = p r q

Secret Exponent Attacks on RSA-type Schemes with Moduli N = p r q Secet Exponent Attacks on RSA-type Schemes with Moduli N = p q Alexande May Faculty of Compute Science, Electical Engineeing and Mathematics Univesity of Padebon 33102 Padebon, Gemany alexx@uni-padebon.de

More information

Merging to ordered sequences. Efficient (Parallel) Sorting. Merging (cont.)

Merging to ordered sequences. Efficient (Parallel) Sorting. Merging (cont.) Efficient (Paae) Soting One of the most fequent opeations pefomed by computes is oganising (soting) data The access to soted data is moe convenient/faste Thee is a constant need fo good soting agoithms

More information

Explosive Contagion in Networks (Supplementary Information)

Explosive Contagion in Networks (Supplementary Information) Eplosive Contagion in Netwoks (Supplementay Infomation) Jesús Gómez-Gadeñes,, Laua Loteo, Segei N. Taaskin, and Fancisco J. Péez-Reche Institute fo Biocomputation and Physics of Comple Systems (BIFI),

More information

Mathematical Model of Magnetometric Resistivity. Sounding for a Conductive Host. with a Bulge Overburden

Mathematical Model of Magnetometric Resistivity. Sounding for a Conductive Host. with a Bulge Overburden Applied Mathematical Sciences, Vol. 7, 13, no. 7, 335-348 Mathematical Model of Magnetometic Resistivity Sounding fo a Conductive Host with a Bulge Ovebuden Teeasak Chaladgan Depatment of Mathematics Faculty

More information

Centripetal Force OBJECTIVE INTRODUCTION APPARATUS THEORY

Centripetal Force OBJECTIVE INTRODUCTION APPARATUS THEORY Centipetal Foce OBJECTIVE To veify that a mass moving in cicula motion expeiences a foce diected towad the cente of its cicula path. To detemine how the mass, velocity, and adius affect a paticle's centipetal

More information

A Simple Model of Communication APIs Application to Dynamic Partial-order Reduction

A Simple Model of Communication APIs Application to Dynamic Partial-order Reduction Simple Model of Communication PIs pplication to Dynamic Patial-ode Reduction Cistian Rosa Stephan Mez Matin Quinson VOCS 2010 22/09/2010 1 / 18 Motivation Distibuted lgoithms ae had to get ight: lack of

More information

B. Spherical Wave Propagation

B. Spherical Wave Propagation 11/8/007 Spheical Wave Popagation notes 1/1 B. Spheical Wave Popagation Evey antenna launches a spheical wave, thus its powe density educes as a function of 1, whee is the distance fom the antenna. We

More information

Tradable Network Permits: A New Scheme for the Most Efficient Use of Network Capacity

Tradable Network Permits: A New Scheme for the Most Efficient Use of Network Capacity adable Netwok Pemits: A New Scheme fo the Most Efficient Use of Netwok Capacity akashi Akamatsu Gaduate School of Infomation Sciences, ohoku Univesity, Sendai, Miyagi,98-8579, Japan Akamatsu et al.(26)

More information

Chapter 10 Mechanism Design and Postcontractual Hidden Knowledge

Chapter 10 Mechanism Design and Postcontractual Hidden Knowledge Chapte 10 Mechanism Design and Postcontactual Hidden Knowledge 10.1 Mechanisms, Unavelling, Coss Checking, and the Revelation Pinciple A mechanism is a set of ules that one playe constucts and anothe feely

More information

RELIABILITY is an important concept in the design

RELIABILITY is an important concept in the design Poceedings of the Wold Congess on Engineeing 0 Vol I WCE 0, July -, 0, London, U.K. Reliability Measues in Ciculant Netwok *Inda Rajasingh, Bhaati Rajan, and R. Sundaa Rajan Abstact Reliability and efficiency

More information

Physics 211: Newton s Second Law

Physics 211: Newton s Second Law Physics 211: Newton s Second Law Reading Assignment: Chapte 5, Sections 5-9 Chapte 6, Section 2-3 Si Isaac Newton Bon: Januay 4, 1643 Died: Mach 31, 1727 Intoduction: Kinematics is the study of how objects

More information

Analysis of Exponential Backoff with Multipacket Reception in Wireless Networks *

Analysis of Exponential Backoff with Multipacket Reception in Wireless Networks * Analysis of Exponential Bacoff with ultipacet Reception in Wieless Netwos * Peng Xuan Zheng, Ying Jun (Angela Zhang and Soung Chang Liew Depatment of Infomation Engineeing The Chinese Univesity of Hong

More information

Three Stories on a Two-sided Coin: Index Coding, Locally Recoverable Distributed Storage, and Guessing Games on Graphs

Three Stories on a Two-sided Coin: Index Coding, Locally Recoverable Distributed Storage, and Guessing Games on Graphs Fifty-thid Annual Alleton Confeence Alleton House, UIUC, Illinois, USA Septembe 29 - Octobe 2, 2015 Thee Stoies on a Two-sided Coin: Index Coding, Locally Recoveable Distibuted Stoage, and Guessing Games

More information

16 Modeling a Language by a Markov Process

16 Modeling a Language by a Markov Process K. Pommeening, Language Statistics 80 16 Modeling a Language by a Makov Pocess Fo deiving theoetical esults a common model of language is the intepetation of texts as esults of Makov pocesses. This model

More information

Circular Orbits. and g =

Circular Orbits. and g = using analyse planetay and satellite motion modelled as unifom cicula motion in a univesal gavitation field, a = v = 4π and g = T GM1 GM and F = 1M SATELLITES IN OBIT A satellite is any object that is

More information

Mitigating Primary User Emulation Attacks in Dynamic Spectrum Access Networks using Hypothesis Testing

Mitigating Primary User Emulation Attacks in Dynamic Spectrum Access Networks using Hypothesis Testing Mitigating Pimay Use Emulation Attacks in Dynamic Spectum Access Netwoks using Hypothesis Testing Z. Jin S. An K. P. Subbalakshmi zjin@stevens.edu asanthan@stevens.edu ksubbala@stevens.edu Depatment of

More information

Trust Representation and Aggregation in a Distributed Agent System

Trust Representation and Aggregation in a Distributed Agent System Tust Repesentation and ggegation in a Distibuted gent System Yonghong Wang and uninda P. Singh Depatment of ompute Science Noth aolina State Univesity Raleigh, N 7695-806, US {ywang4, singh}@ncsu.edu bstact

More information

Lab #4: Newton s Second Law

Lab #4: Newton s Second Law Lab #4: Newton s Second Law Si Isaac Newton Reading Assignment: bon: Januay 4, 1643 Chapte 5 died: Mach 31, 1727 Chapte 9, Section 9-7 Intoduction: Potait of Isaac Newton by Si Godfey Knelle http://www.newton.cam.ac.uk/at/potait.html

More information

A Deep Convolutional Neural Network Based on Nested Residue Number System

A Deep Convolutional Neural Network Based on Nested Residue Number System A Deep Convolutional Neual Netwok Based on Nested Residue Numbe System Hioki Nakahaa Ehime Univesity, Japan Tsutomu Sasao Meiji Univesity, Japan Abstact A pe-tained deep convolutional neual netwok (DCNN)

More information

MATH 415, WEEK 3: Parameter-Dependence and Bifurcations

MATH 415, WEEK 3: Parameter-Dependence and Bifurcations MATH 415, WEEK 3: Paamete-Dependence and Bifucations 1 A Note on Paamete Dependence We should pause to make a bief note about the ole played in the study of dynamical systems by the system s paametes.

More information

Particle Systems. University of Texas at Austin CS384G - Computer Graphics Fall 2010 Don Fussell

Particle Systems. University of Texas at Austin CS384G - Computer Graphics Fall 2010 Don Fussell Paticle Systems Univesity of Texas at Austin CS384G - Compute Gaphics Fall 2010 Don Fussell Reading Requied: Witkin, Paticle System Dynamics, SIGGRAPH 97 couse notes on Physically Based Modeling. Witkin

More information