Radha Poovendran Network Security Lab University of Washington
|
|
- Prosper Boone
- 5 years ago
- Views:
Transcription
1 A Gaph Theoetic Famewok fo Peventing the Womhole Attack in Wieless Senso Netwoks Radha Poovendan Netwok Secuity Lab Univesity of Washington Womholes Hope fo time tavel Womhole: A space-time distotion that links two points in the Univese via a shote path in distance/duation than the diect path. Can be a poblem in wong hands! 2 Outline The Womhole theat in Wieless Senso Netwoks (WSN) Gaph Theoetic Fomulation Related Wok Ou Appoach: Local boadcast Keys Secuity Analysis Conclusions WSN Deployment Envionment Souce: Destination: Ad hoc mode of communication - Distibuted algoithms based on a coopeative pinciple Exchange of infomation locally Deployment egion may be hostile 3 4 1
2 Womhole Attack Example 1 Senso ange Attacke ecods info in Region B Tunnels it via the womhole link to Region A Replays the info to Region A Clustehead in Region A tigges false alam Sensos Sensos epot thei tempeatue Region A eadings to a clustehead senso Clustehead tigges alam if the majoity of the sensos epots eadings ove th Clustehead Womhole link Region B Attacke 5 Womhole Attack Example 2 s 3 s 4 Routing Tee s 5 Senso Womhole link ange Attacke establishes a womhole link between s 31 and s 3. s 31 and s 3 become neighbos in outing tee Sensos {,, s 3, s 4, s 5, s 7 } oute though the womhole link to each any of {s 30, s 31, s 32, s 33, s 34 }, and vice vesa. The attacke contols/obseves lage amount of data. It can selectively dop packets, affect thoughput, cause oute oscillation. Senso s 3 becomes a sinkhole fo the local taffic to {s 30, s 31, s 32, s 33, s 34 } s 7 s 30 s31 s 32 s 33 s 34 6 Impact of the Womhole Theat WSN Applications Monitoing Access Contol Localization Netwok Potocols Routing Neighbo discovey Womhole Attack Popeties Type: Replay attack The integity and authenticity of the communication is not compomised The success of the attack is independent of the stength of cyptogaphic pimitives. Feshness can be guaanteed by a speedy diect link
3 Outline The Womhole theat in Wieless Senso Netwoks (WSN) Gaph Theoetic Fomulation Related Wok Ou Appoach: Local boadcast Keys Secuity Analysis Conclusions Gaph Repesentation of WSN i j E(): set of Senso undiected edges ange V: set of vetices WSN epesented by a Geometic Gaph G(V, E()) 1, e( i, j) = 0, if i j if i j > The Communication Gaph G(V, E G ) need not be identical to G(V, E()), but, E G E() 9 10 Gaph Intepetation of Womholes Womholes violate the geometic gaph model of WSN Womhole link The Womhole Poblem Given a logical gaph G (V, E G )with womholes Womhole link Senso ange Senso ange Fo a Communication Gaph G (V, E G ) with womholes E G E() Womholes tansfom G(V, E G ) to a Logical Gaph G (V, E G ) 11 Extact fom G the communication gaph G(V, E G )with E G E() 12 3
4 Solving the Womhole Poblem If G(V, E()) can be constucted (e.g. known locations of sensos) then: G ( V, E() ) G' ( V, ) S( G, G') E G ' G( V, EG ) S : GxG' G a tansfomation such as XOR opeation between the connectivity matices of G, G What if G(V, E()) is UNKNOWN? 13 Outline The Womhole theat in Wieless Senso Netwoks (WSN) Gaph Theoetic Fomulation Related Wok Ou Appoach: Local boadcast Keys Secuity Analysis Conclusions 14 Packet Leashes Hu et al. A packet cannot tavel futhe than a pe-defined distance Uncetainty egion Packet Leashes Hu et al. Locations of the nodes ae known Geogaphical Leashes d(, ) δ: synchonization eo : (X 1, Y 1 ) : (X 2, Y 2 ) d max δc c: speed of light d(, ) d max + δc (X 1, Y 1 ) t s Data Timestamp, time sent : Accept packet if: d s1, s2 t ts + δ ( ) ( )c Speed of light Time eceived Synchonization eo
5 Packet Leashes Hu et al. Tempoal Leashes: Locations not known Packet Leashes Hu et al. Packets Leashes can detect (and emove) womholes if: t s t e Data Timestamp, time sent Expiation time : Accept packet if: dmax δc te ts = c Fo t e > t s : d max > δc t t e Time eceived Geogaphical leashes: ( t t + δ )c Senso communication ange Tempoal leashes: t t e s = + s c δ Requies tight synchonization Eg: Fo t e >t s, if δ =0.5msec > 150m Visualization of Womholes Wang Constuct a visual epesentation of the WSN s2 Visualization of Womholes Wang Cental Authoity (CA) collects distance measuements of each senso to its neighbos. Womhole-fee link netwok Womhole between, (font view) Womhole between two nodes (side view) Using Multi Dimensional Scaling (MDS), CA computes the elative position of each senso. Idea: Womholes shink the distance between two points causing wapaound in the visual epesentation
6 Outline The Womhole theat in Wieless Senso Netwoks (WSN) Gaph Theoetic Fomulation Related Wok Ou Appoach: Local boadcast Keys Secuity Analysis Conclusions Ou Appoach : LBK LBK: Local Boadcast Keys Nobody speaks English hee!! Τί λένε οι βάρβαροι 私達は日本語で話すことができる Just me, you neighbo Je suis fancais O football basilian é o mais melho Некоторый русский пожалуйста 21 You need to be in the neighbohood to speak the same language and undestand the message 22 Local Boadcast Keys (LBKs) Ns i Ks i s i Womhole link Each senso uses a key Ks i ONLY KNOWN to its neighbohood Ns i. Boadcast infomation encoded with Ks i, cannot be decypted outside Ns i. s j Ns j Coectness of the LBK Solution Imposing LBKs to the womhole infected logical gaph G (V,E G ), 1, e( i, j) = 0, if j holds Ks i othewise Since j holds Ks i iff j in in the neighbohood of i, 1, e( i, j) = 0, if if i j i j > Geometic gaph model is satisfied
7 Establishment of LBKs (1) A) Static Netwok: Locations of the sensos ae known. Establishment of LBKs (2) B) Locations of the sensos ae unknown, how do sensos discove thei neighbos? (X i, Y i ) Womhole link CA A Cental Authoity (CA) distibutes the LBKs to sensos. 25 Senso ange Neighbo discovey schemes ae vulneable to womholes 26 Secue Neighbo Discovey 1.Pefom distance bounding with neighbos Requies: time measuements with nanosecond accuacy Nanosecond pocessing capable hadwae 2.Pefom Secue Localization (SeRLoc) 3.Use Powe Poximity to infe distance 4.Poposed Appoach: Use special nodes we call GUARDS. 27 LBK Establishment Step 1 Guad ange R FK 1 s Senso ange FK 2 FK 3 FK 4 All nodes ae peloaded with a common key K 0 Each Guad G i boadcasts an encypted factional key E K0 {FK i } FK
8 LBK Establishment Step 1 LBK Establishment Step 2 {i,j,k, }: indexes of the Guads head Evey senso announces the indexes of the factional keys it heas and a theshold th {1,2,4} {1,2,4} {1,3,4} s {2,4,5} th=3 {1,3,4} {2,4,5} {2,3,4,5} {2,3,4,5} Sensos collect all the factional keys they hea. If a senso s i shaes moe than th factional keys with establish paiwise key K s1,si LBK Establishment Step 2 LBK Establishment Step 3 Senso distibutes its LBK via unicast to each neighbo s i, using K s1,si. {1,2,4} th=3 {1,3,4} {2,4,5} LBK {2,3,4,5} K s1,s2 =H(FK 1 FK 2 FK 3 FK 4 } H: Collision Resistant Hash function Each senso holds its own LBK and the LBks of its neighbos
9 LBK Establishment non-neighbos What if a node outside the senso ange shaes sufficient keys with? th=2 s {1,3,4} 4 {1,2,4} {2,4,5} Deciding the Theshold value (1) R: Guad ange, l: distance between sensos (l ) A c : Common aea Guads head to both, R A c l R {2,3,4,5} Theshold must be chosen caefully! What do we mean by this? At least th guads need to lay within A c, l Computed as if all neighbos ae at l= Deciding the Theshold value (2) Pobability of establishing a LBK with nonimmediate neighbos Locally computed Theshold Locally decide fo the theshold value th based on # of guads head GH s. R A c l R The theshold is some function of GH s th = f(gh s ) At least th guads need to lye within A c, l > ρ g =0.03 Senso ange ρ g =0.03 Senso ange
10 Womholes against the FK distibution G G Womhole link 2 3 G 6 Attacke tunnels the tansmissions of the FK via the womhole link and eplays at both ends. Sensos, hea set of guads GH s ={ G 7 }, establish a paiwise key and hence, a LBK If th >3, cannot establish an LBK with any of its neighbos G 7 Detecting womholes duing the FK distibution Guads include thei coodinates with evey tansmission of Factional Keys (FK). Oigin point If senso s heas a FK 2R multiple times it is A 1 s unde a womhole O A 2 attack A c If senso s heas two guads moe than 2R apat, it is unde a Womhole link womhole attack P det ρga ga ga1 ( 1 ) ( 1 ) 2 c ρ c ρ e + e e Womhole Attack Detection P det duing the distibution of factional keys Once attack is detected execute challengeesponse scheme to identify the closest guad 99.48% Conclusions We showed: Any candidate solution eliminates womholes if the communication gaph poduced satisfies the geometic gaph constaints We poposed: A scheme fo eliminating womholes when sensos have unknown location and ae not time synchonized Main idea behind the solution: If boadcasted infomation is encypted at each neighbohood with a diffeent Local Boadcast Key, it cannot be decypted at some othe neighbohood
Key Establishment Protocols. Cryptography CS 507 Erkay Savas Sabanci University
Key Establishment Potocols Cyptogaphy CS 507 Ekay Savas Sabanci Univesity ekays@sabanciuniv.edu Key distibution poblem Secuity of the keys Even if the cyptogaphic algoithms & potocols ae cyptogaphically
More informationEnergy Savings Achievable in Connection Preserving Energy Saving Algorithms
Enegy Savings Achievable in Connection Peseving Enegy Saving Algoithms Seh Chun Ng School of Electical and Infomation Engineeing Univesity of Sydney National ICT Austalia Limited Sydney, Austalia Email:
More informationStanford University CS259Q: Quantum Computing Handout 8 Luca Trevisan October 18, 2012
Stanfod Univesity CS59Q: Quantum Computing Handout 8 Luca Tevisan Octobe 8, 0 Lectue 8 In which we use the quantum Fouie tansfom to solve the peiod-finding poblem. The Peiod Finding Poblem Let f : {0,...,
More informationPerformance Analysis of Rayleigh Fading Ad Hoc Networks with Regular Topology
Pefomance Analysis of Rayleigh Fading Ad Hoc Netwoks with Regula Topology Xiaowen Liu and Matin Haenggi Depatment of Electical Engineeing Univesity of Note Dame Note Dame, IN 6556, USA {xliu, mhaenggi}@nd.edu
More informationVector Control. Application to Induction Motor Control. DSP in Motion Control - Seminar
Vecto Contol Application to Induction Moto Contol Vecto Contol - Pinciple The Aim of Vecto Contol is to Oient the Flux Poducing Component of the Stato Cuent to some Suitable Flux Vecto unde all Opeating
More informationCSCE 478/878 Lecture 4: Experimental Design and Analysis. Stephen Scott. 3 Building a tree on the training set Introduction. Outline.
In Homewok, you ae (supposedly) Choosing a data set 2 Extacting a test set of size > 3 3 Building a tee on the taining set 4 Testing on the test set 5 Repoting the accuacy (Adapted fom Ethem Alpaydin and
More informationScheduling Algorithms and Bounds for Rateless Data Dissemination in Dense Wireless Networks
Scheduling Algoithms and Bounds fo Rateless Data Dissemination in Dense Wieless Netwoks Kan Lin, David Staobinski, Ai Tachtenbeg Depatment of Electical and Compute Engineeing Boston Univesity Boston, Massachusetts,
More informationScheduling Wireless Ad Hoc Networks in Polynomial Time Using Claw-free Conflict Graphs
Scheduling Wieless d Hoc Netwoks in Polynomial Time Using law-fee onflict Gaphs axiv:1711.01620v1 [cs.it] 5 Nov 2017 lpe Köse, Muiel Médad Reseach Laboatoy of lectonics, Massachusetts Institute of Technology,
More informationAQI: Advanced Quantum Information Lecture 2 (Module 4): Order finding and factoring algorithms February 20, 2013
AQI: Advanced Quantum Infomation Lectue 2 (Module 4): Ode finding and factoing algoithms Febuay 20, 203 Lectue: D. Mak Tame (email: m.tame@impeial.ac.uk) Intoduction In the last lectue we looked at the
More informationIN SITU SOUND ABSORPTION COEFFICIENT MEASUREMENT OF VARIOUS SURFACES
IN SITU SOUND ABSORPTION COEFFICIENT MEASUREMENT OF VARIOUS SURFACES PACS REFERENCES : 43.20.El, 43.20.Ye, 43.55.Ev, 43.58.Bh Michel Béengie 1 ; Massimo Gaai 2 1 Laboatoie Cental des Ponts et Chaussées
More informationBroadcasting in Undirected Ad hoc Radio Networks
Boadcasting in Undiected Ad hoc Radio Netwoks aiusz R. Kowalski Instytut Infomatyki Uniwesytet Waszawski Banacha 2, 02-097 Waszawa, Poland daek@mimuw.edu.pl Andzej Pelc épatement d Infomatique Univesité
More informationDuality between Statical and Kinematical Engineering Systems
Pape 00, Civil-Comp Ltd., Stiling, Scotland Poceedings of the Sixth Intenational Confeence on Computational Stuctues Technology, B.H.V. Topping and Z. Bittna (Editos), Civil-Comp Pess, Stiling, Scotland.
More informationMerging Uncertain Multi-Version XML Documents
Meging Uncetain Multi-Vesion XML Documents M. Lamine BA, Talel Abdessalem & Piee Senellat ACM DocEng 2013-1st Intenational Wokshop on Document Changes (Floence, Italy) Septembe 10 th, 2013 M. L. Ba, T.
More informationHigh precision computer simulation of cyclotrons KARAMYSHEVA T., AMIRKHANOV I. MALININ V., POPOV D.
High pecision compute simulation of cyclotons KARAMYSHEVA T., AMIRKHANOV I. MALININ V., POPOV D. Abstact Effective and accuate compute simulations ae highly impotant in acceleatos design and poduction.
More information4/18/2005. Statistical Learning Theory
Statistical Leaning Theoy Statistical Leaning Theoy A model of supevised leaning consists of: a Envionment - Supplying a vecto x with a fixed but unknown pdf F x (x b Teache. It povides a desied esponse
More informationLecture 18: Graph Isomorphisms
INFR11102: Computational Complexity 22/11/2018 Lectue: Heng Guo Lectue 18: Gaph Isomophisms 1 An Athu-Melin potocol fo GNI Last time we gave a simple inteactive potocol fo GNI with pivate coins. We will
More informationCheetah: Fast Graph Kernel Tracking on Dynamic Graphs
Cheetah: Fast Gaph Kenel Tacking on Dynamic Gaphs Pesente: Liangyue Li Joint wok with Hanghang Tong (ASU), Yanghua Xiao (Fudan), Wei Fan (Baidu) 1 Aizona State Univesity Gaphs ae Eveywhee Collaboation
More informationModeling Primary User Emulation Attacks and Defenses in Cognitive Radio Networks
Modeling Pimay Use Emulation Attacks and efenses in Cognitive Radio Netwoks Zesheng Chen, Todo Cooklev, Chao Chen, and Calos Pomalaza-Ráez Indiana Univesity - Pudue Univesity Fot Wayne Fot Wayne, IN 46805
More informationClassical Worm algorithms (WA)
Classical Wom algoithms (WA) WA was oiginally intoduced fo quantum statistical models by Pokof ev, Svistunov and Tupitsyn (997), and late genealized to classical models by Pokof ev and Svistunov (200).
More informationOn Combination Networks with Cache-aided Relays and Users
On Combination Netwoks with Cache-aided Relays and Uses Kai Wan, Daniela Tuninetti Pablo Piantanida, Mingyue Ji, L2S CentaleSupélec-CNRS-Univesité Pais-Sud, Gif-su-Yvette 91190, Fance, {kai.wan, pablo.piantanida}@l2s.centalesupelec.f
More informationTeachers notes. Beyond the Thrills excursions. Worksheets in this book. Completing the worksheets
Beyond the Thills excusions Teaches notes Physics is the science of how the wold (and Univese) woks. Luna Pak Sydney is a lage hands-on physics laboatoy full of fee falling objects, otating systems and
More informationMULTILAYER PERCEPTRONS
Last updated: Nov 26, 2012 MULTILAYER PERCEPTRONS Outline 2 Combining Linea Classifies Leaning Paametes Outline 3 Combining Linea Classifies Leaning Paametes Implementing Logical Relations 4 AND and OR
More informationA Bijective Approach to the Permutational Power of a Priority Queue
A Bijective Appoach to the Pemutational Powe of a Pioity Queue Ia M. Gessel Kuang-Yeh Wang Depatment of Mathematics Bandeis Univesity Waltham, MA 02254-9110 Abstact A pioity queue tansfoms an input pemutation
More informationDetermining solar characteristics using planetary data
Detemining sola chaacteistics using planetay data Intoduction The Sun is a G-type main sequence sta at the cente of the Sola System aound which the planets, including ou Eath, obit. In this investigation
More informationA more efficient secure event signature protocol for massively multiplayer online games based on P2P Dapeng Li1, a, Liang Hu1,b, and JianFeng Chu1,c
Intenational Foum on Mechanical, Contol and Automation (IFMCA 2016) A moe efficient secue event signatue potocol fo massively multiplaye online games based on P2P Dapeng Li1, a, Liang Hu1,b, and JianFeng
More informationMultipath routing and congestion control
Multipath outing and congestion contol Fank Kelly Univesity of Cambidge (with wok of Damon Wischik, Mak Handley and Costin Raiciu, Univesity College London) Chinese Univesity of Hong Kong (Institute of
More information10/04/18. P [P(x)] 1 negl(n).
Mastemath, Sping 208 Into to Lattice lgs & Cypto Lectue 0 0/04/8 Lectues: D. Dadush, L. Ducas Scibe: K. de Boe Intoduction In this lectue, we will teat two main pats. Duing the fist pat we continue the
More informationMath 301: The Erdős-Stone-Simonovitz Theorem and Extremal Numbers for Bipartite Graphs
Math 30: The Edős-Stone-Simonovitz Theoem and Extemal Numbes fo Bipatite Gaphs May Radcliffe The Edős-Stone-Simonovitz Theoem Recall, in class we poved Tuán s Gaph Theoem, namely Theoem Tuán s Theoem Let
More informationLimited Feedback Scheme for Device to Device Communications in 5G Cellular Networks with Reliability and Cellular Secrecy Outage Constraints
Limited Feedback Scheme fo Device to Device Communications in 5G Cellula Netwoks with Reliability and Cellula Sececy Outage Constaints Faezeh Alavi, Nade Mokai, Mohammad R. Javan, and Kanapathippillai
More informationMore Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries
Moe Efficient Oblivious Tansfe Extensions with Secuity fo Malicious Advesaies Gilad Ashaov Yehuda Lindell Thomas Schneide Michael Zohne Hebew Univesity Ba-Ilan Univesity Damstadt Damstadt EUROCRYPT 2015
More informationInformation Retrieval Advanced IR models. Luca Bondi
Advanced IR models Luca Bondi Advanced IR models 2 (LSI) Pobabilistic Latent Semantic Analysis (plsa) Vecto Space Model 3 Stating point: Vecto Space Model Documents and queies epesented as vectos in the
More informationAutomatic Composition of e-services: The Roman way. Daniela Berardi Dipartimento di Informatica e Sistemistica Università di Roma La Sapienza
Automatic Composition of e-sevices: The Roman way Daniela Beadi Dipatimento di Infomatica e Sistemistica Univesità di Roma La Sapienza beadi@dis.unioma1.it http://www.dis.unioma1.it/~beadi/ Daniela Beadi
More informationChapter 22: Electric Fields. 22-1: What is physics? General physics II (22102) Dr. Iyad SAADEDDIN. 22-2: The Electric Field (E)
Geneal physics II (10) D. Iyad D. Iyad Chapte : lectic Fields In this chapte we will cove The lectic Field lectic Field Lines -: The lectic Field () lectic field exists in a egion of space suounding a
More informationConspiracy and Information Flow in the Take-Grant Protection Model
Conspiacy and Infomation Flow in the Take-Gant Potection Model Matt Bishop Depatment of Compute Science Univesity of Califonia at Davis Davis, CA 95616-8562 ABSTRACT The Take Gant Potection Model is a
More informationFractional Zero Forcing via Three-color Forcing Games
Factional Zeo Focing via Thee-colo Focing Games Leslie Hogben Kevin F. Palmowski David E. Robeson Michael Young May 13, 2015 Abstact An -fold analogue of the positive semidefinite zeo focing pocess that
More informationInformation-Theoretic
Infomation-Theoetic Key Ageement fom Close Secets Leonid Reyzin Januay 5, 2018 IISc 1 Infomation-Theoetic Key Ageement fom Close Secets: A Suvey 0 1 assume these ae close and patially secet 2 Infomation-Theoetic
More informationFields and Waves I Spring 2005 Homework 4. Due 8 March 2005
Homewok 4 Due 8 Mach 005. Inceasing the Beakdown Voltage: This fist question is a mini design poject. You fist step is to find a commecial cable (coaxial o two wie line) fo which you have the following
More informationCOMP Parallel Computing SMM (3) OpenMP Case Study: The Barnes-Hut N-body Algorithm
COMP 633 - Paallel Computing Lectue 8 Septembe 14, 2017 SMM (3) OpenMP Case Study: The Banes-Hut N-body Algoithm Topics Case study: the Banes-Hut algoithm Study an impotant algoithm in scientific computing»
More informationThe Millikan Experiment: Determining the Elementary Charge
LAB EXERCISE 7.5.1 7.5 The Elementay Chage (p. 374) Can you think of a method that could be used to suggest that an elementay chage exists? Figue 1 Robet Millikan (1868 1953) m + q V b The Millikan Expeiment:
More informationMagnetometer Calibration Algorithm Based on Analytic Geometry Transform Yongjian Yang, Xiaolong Xiao1,Wu Liao
nd Intenational Foum on Electical Engineeing and Automation (IFEEA 5 Magnetomete Calibation Algoithm Based on Analytic Geomety ansfom Yongjian Yang, Xiaolong Xiao,u Liao College of Compute Science and
More informationRevision of Lecture Eight
Revision of Lectue Eight Baseband equivalent system and equiements of optimal tansmit and eceive filteing: (1) achieve zeo ISI, and () maximise the eceive SNR Thee detection schemes: Theshold detection
More informationgr0 GRAPHS Hanan Samet
g0 GRPHS Hanan Samet ompute Science epatment and ente fo utomation Reseach and Institute fo dvanced ompute Studies Univesity of Mayland ollege Pak, Mayland 074 e-mail: hjs@umiacs.umd.edu opyight 1997 Hanan
More informationFresnel Diffraction. monchromatic light source
Fesnel Diffaction Equipment Helium-Neon lase (632.8 nm) on 2 axis tanslation stage, Concave lens (focal length 3.80 cm) mounted on slide holde, iis mounted on slide holde, m optical bench, micoscope slide
More informationQuantum Fourier Transform
Chapte 5 Quantum Fouie Tansfom Many poblems in physics and mathematics ae solved by tansfoming a poblem into some othe poblem with a known solution. Some notable examples ae Laplace tansfom, Legende tansfom,
More informationLight Time Delay and Apparent Position
Light Time Delay and ppaent Position nalytical Gaphics, Inc. www.agi.com info@agi.com 610.981.8000 800.220.4785 Contents Intoduction... 3 Computing Light Time Delay... 3 Tansmission fom to... 4 Reception
More informationTop K Nearest Keyword Search on Large Graphs
Top K Neaest Keywod Seach on Lage Gaphs Miao Qiao, Lu Qin, Hong Cheng, Jeffey Xu Yu, Wentao Tian The Chinese Univesity of Hong Kong, Hong Kong, China {mqiao,lqin,hcheng,yu,wttian}@se.cuhk.edu.hk ABSTRACT
More informationA scaling-up methodology for co-rotating twin-screw extruders
A scaling-up methodology fo co-otating twin-scew extudes A. Gaspa-Cunha, J. A. Covas Institute fo Polymes and Composites/I3N, Univesity of Minho, Guimaães 4800-058, Potugal Abstact. Scaling-up of co-otating
More informationDistributed Control of Mobility & Routing in Networks of Robots
20 IEEE 2th Intenational Wokshop on Signal Pocessing Advances in Wieless Communications Distibuted Contol of Mobility & Routing in Netwoks of Robots Michael M. Zavlanos, Alejando Ribeio, and Geoge. Pappas
More information( ) [ ] [ ] [ ] δf φ = F φ+δφ F. xdx.
9. LAGRANGIAN OF THE ELECTROMAGNETIC FIELD In the pevious section the Lagangian and Hamiltonian of an ensemble of point paticles was developed. This appoach is based on a qt. This discete fomulation can
More informationIEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY 1
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY 1 1 2 3 4 Distibuted Multistage Coopeative-Social-Multicast-Aided Content Dissemination in Random Mobile Netwoks Jie Hu, Student Membe, IEEE, Lie-Liang Yang, Senio
More informationFUSE Fusion Utility Sequence Estimator
FUSE Fusion Utility Sequence Estimato Belu V. Dasaathy Dynetics, Inc. P. O. Box 5500 Huntsville, AL 3584-5500 belu.d@dynetics.com Sean D. Townsend Dynetics, Inc. P. O. Box 5500 Huntsville, AL 3584-5500
More informationHOW TO TEACH THE FUNDAMENTALS OF INFORMATION SCIENCE, CODING, DECODING AND NUMBER SYSTEMS?
6th INTERNATIONAL MULTIDISCIPLINARY CONFERENCE HOW TO TEACH THE FUNDAMENTALS OF INFORMATION SCIENCE, CODING, DECODING AND NUMBER SYSTEMS? Cecília Sitkuné Göömbei College of Nyíegyháza Hungay Abstact: The
More informationOpen Access Research on Ranging Optimization and Twice-Weighted Centroid Calculation in Wireless Sensor Network Localization Algorithm
Send Odes fo Repints to epints@benthamscience.net 154 The Open Automation and Contol Systems Jounal, 013, 5, 154-160 Open Access Reseach on Ranging Optimization and Twice-Weighted Centoid Calculation in
More informationIntroduction to Arrays
Intoduction to Aays Page 1 Intoduction to Aays The antennas we have studied so fa have vey low diectivity / gain. While this is good fo boadcast applications (whee we want unifom coveage), thee ae cases
More informationExperiment I Voltage Variation and Control
ELE303 Electicity Netwoks Expeiment I oltage aiation and ontol Objective To demonstate that the voltage diffeence between the sending end of a tansmission line and the load o eceiving end depends mainly
More informationSUFFICIENT CONDITIONS FOR MAXIMALLY EDGE-CONNECTED AND SUPER-EDGE-CONNECTED GRAPHS DEPENDING ON THE CLIQUE NUMBER
Discussiones Mathematicae Gaph Theoy 39 (019) 567 573 doi:10.7151/dmgt.096 SUFFICIENT CONDITIONS FOR MAXIMALLY EDGE-CONNECTED AND SUPER-EDGE-CONNECTED GRAPHS DEPENDING ON THE CLIQUE NUMBER Lutz Volkmann
More informationBayesian Congestion Control over a Markovian Network Bandwidth Process
Bayesian Congestion Contol ove a Makovian Netwok Bandwidth Pocess Paisa Mansouifad,, Bhaska Kishnamachai, Taa Javidi Ming Hsieh Depatment of Electical Engineeing, Univesity of Southen Califonia, Los Angeles,
More informationRegularization. Stephen Scott and Vinod Variyam. Introduction. Outline. Machine. Learning. Problems. Measuring. Performance.
leaning can geneally be distilled to an optimization poblem Choose a classifie (function, hypothesis) fom a set of functions that minimizes an objective function Clealy we want pat of this function to
More informationPsychometric Methods: Theory into Practice Larry R. Price
ERRATA Psychometic Methods: Theoy into Pactice Lay R. Pice Eos wee made in Equations 3.5a and 3.5b, Figue 3., equations and text on pages 76 80, and Table 9.1. Vesions of the elevant pages that include
More informationComputers & Operations Research
Computes & Opeations Reseach 37 (2010) 72 -- 82 Contents lists available at ScienceDiect Computes & Opeations Reseach jounal homepage: www.elsevie.com/locate/co Min-degee constained minimum spanning tee
More informationSeidel s Trapezoidal Partitioning Algorithm
CS68: Geometic Agoithms Handout #6 Design and Anaysis Oigina Handout #6 Stanfod Univesity Tuesday, 5 Febuay 99 Oigina Lectue #7: 30 Januay 99 Topics: Seide s Tapezoida Patitioning Agoithm Scibe: Michae
More informationMultihop MIMO Relay Networks with ARQ
Multihop MIMO Relay Netwoks with ARQ Yao Xie Deniz Gündüz Andea Goldsmith Depatment of Electical Engineeing Stanfod Univesity Stanfod CA Depatment of Electical Engineeing Pinceton Univesity Pinceton NJ
More informationGalilean Transformation vs E&M y. Historical Perspective. Chapter 2 Lecture 2 PHYS Special Relativity. Sep. 1, y K K O.
PHYS-2402 Chapte 2 Lectue 2 Special Relativity 1. Basic Ideas Sep. 1, 2016 Galilean Tansfomation vs E&M y K O z z y K In 1873, Maxwell fomulated Equations of Electomagnetism. v Maxwell s equations descibe
More informationMulticast Capacity with Max-Min Fairness for Heterogeneous Networks
1 Multicast Capacity with Max-Min Fainess fo Heteogeneous Netwoks Yixuan i, Qiuyu Peng, Xinbing Wang Depatment of Electonic Engineeing Shanghai Jiao Tong Univesity, China Email: {lyx1990116, pqy, xwang8}@sjtu.edu.cn
More informationMulti-Objective Optimization Algorithms for Finite Element Model Updating
Multi-Objective Optimization Algoithms fo Finite Element Model Updating E. Ntotsios, C. Papadimitiou Univesity of Thessaly Geece Outline STRUCTURAL IDENTIFICATION USING MEASURED MODAL DATA Weighted Modal
More informationHQuad: Statistics of Hamiltonian Cycles in Wireless Rechargeable Sensor Networks
HQuad: Statistics of Hamiltonian Cycles in Wieless Rechageable Senso Netwoks Yanmao Man Dept. of ECE Univesity of Aizona Tucson, AZ, U.S.A. yman@email.aizona.edu Jing Deng Dept. of CS UNC at Geensboo Geensboo,
More informationLifting Private Information Retrieval from Two to any Number of Messages
Lifting Pivate Infomation Retieval fom Two to any umbe of Messages Rafael G.L. D Oliveia, Salim El Rouayheb ECE, Rutges Univesity, Piscataway, J Emails: d746@scaletmail.utges.edu, salim.elouayheb@utges.edu
More informationON THE INVERSE SIGNED TOTAL DOMINATION NUMBER IN GRAPHS. D.A. Mojdeh and B. Samadi
Opuscula Math. 37, no. 3 (017), 447 456 http://dx.doi.og/10.7494/opmath.017.37.3.447 Opuscula Mathematica ON THE INVERSE SIGNED TOTAL DOMINATION NUMBER IN GRAPHS D.A. Mojdeh and B. Samadi Communicated
More informationBrightness Preserving Histogram Equalization with Maximum Entropy: A Variational Perspective Chao Wang and Zhongfu Ye
326 IEEE Tansactions on Consume Electonics, Vol. 5, No. 4, NOVEMBER 25 Bightness Peseving Histogam Equalization with Maximum Entopy: A Vaiational Pespective Chao Wang and Zhongfu Ye Abstact Histogam equalization
More informationQIP Course 10: Quantum Factorization Algorithm (Part 3)
QIP Couse 10: Quantum Factoization Algoithm (Pat 3 Ryutaoh Matsumoto Nagoya Univesity, Japan Send you comments to yutaoh.matsumoto@nagoya-u.jp Septembe 2018 @ Tokyo Tech. Matsumoto (Nagoya U. QIP Couse
More informationConservative Averaging Method and its Application for One Heat Conduction Problem
Poceedings of the 4th WSEAS Int. Conf. on HEAT TRANSFER THERMAL ENGINEERING and ENVIRONMENT Elounda Geece August - 6 (pp6-) Consevative Aveaging Method and its Application fo One Heat Conduction Poblem
More informationThree-dimensional Quantum Cellular Neural Network and Its Application to Image Processing *
Thee-dimensional Quantum Cellula Neual Netwok and Its Application to Image Pocessing * Sen Wang, Li Cai, Huanqing Cui, Chaowen Feng, Xiaokuo Yang Science College, Ai Foce Engineeing Univesity Xi an 701,
More informationDistributed Welfare Games
OPERATIONS RESEARCH Vol. 61, No. 1, Januay Febuay 2013, pp. 155 168 ISSN 0030-364X (pint) ISSN 1526-5463 (online) http://dx.doi.og/10.1287/ope.1120.1137 2013 INFORMS Distibuted Welfae Games Jason R. Maden
More informationInseting this into the left hand side of the equation of motion above gives the most commonly used algoithm in classical molecula dynamics simulations
Chem465 in 2000 Univesity of Washington Lectue notes Hannes Jonsson Classical dynamics When we ae dealing with heavy atoms and high enough enegy o tempeatue, it is often suciently accuate to neglect quantum
More informationTELE4652 Mobile and Satellite Communications
Mobile and Satellite Communications Lectue 3 Radio Channel Modelling Channel Models If one was to walk away fom a base station, and measue the powe level eceived, a plot would like this: Channel Models
More informationEE 5322: Intelligent Control Systems
EE 53: Intelligent Contol Systems Pepaed by: Aaon Halveson, Rich Otten Peti-Nets Intoduction: Peti nets wee developed in the ealy 96s by C.A. Peti in his Ph.D. dissetation. C.A. Peti. Kommunikation mit
More informationNew problems in universal algebraic geometry illustrated by boolean equations
New poblems in univesal algebaic geomety illustated by boolean equations axiv:1611.00152v2 [math.ra] 25 Nov 2016 Atem N. Shevlyakov Novembe 28, 2016 Abstact We discuss new poblems in univesal algebaic
More informationTailoring Materials and Radiation to Explore Cloaking Phenomena
Tailoing Mateials and Radiation to Exploe Cloaking Phenomena Jonathan Samoajski Septembe 22, 2009 1 Intoduction Radiation-matte inteaction is vey impotant in enegy eseach, especially in the aeas of fusion
More informationIEEE/ACM TRANSACTIONS ON NETWORKING, VOL. X, NO. X,
IEEE/ACM TRANSACTIONS ON NETWORING, VOL. X, NO. X, 016 1 Wieless senso netwoks unde the andom paiwise key pedistibution scheme: Can esiliency be achieved with small key ings? Osman Yağan, Membe, IEEE,
More informationSecret Exponent Attacks on RSA-type Schemes with Moduli N = p r q
Secet Exponent Attacks on RSA-type Schemes with Moduli N = p q Alexande May Faculty of Compute Science, Electical Engineeing and Mathematics Univesity of Padebon 33102 Padebon, Gemany alexx@uni-padebon.de
More informationMerging to ordered sequences. Efficient (Parallel) Sorting. Merging (cont.)
Efficient (Paae) Soting One of the most fequent opeations pefomed by computes is oganising (soting) data The access to soted data is moe convenient/faste Thee is a constant need fo good soting agoithms
More informationExplosive Contagion in Networks (Supplementary Information)
Eplosive Contagion in Netwoks (Supplementay Infomation) Jesús Gómez-Gadeñes,, Laua Loteo, Segei N. Taaskin, and Fancisco J. Péez-Reche Institute fo Biocomputation and Physics of Comple Systems (BIFI),
More informationMathematical Model of Magnetometric Resistivity. Sounding for a Conductive Host. with a Bulge Overburden
Applied Mathematical Sciences, Vol. 7, 13, no. 7, 335-348 Mathematical Model of Magnetometic Resistivity Sounding fo a Conductive Host with a Bulge Ovebuden Teeasak Chaladgan Depatment of Mathematics Faculty
More informationCentripetal Force OBJECTIVE INTRODUCTION APPARATUS THEORY
Centipetal Foce OBJECTIVE To veify that a mass moving in cicula motion expeiences a foce diected towad the cente of its cicula path. To detemine how the mass, velocity, and adius affect a paticle's centipetal
More informationA Simple Model of Communication APIs Application to Dynamic Partial-order Reduction
Simple Model of Communication PIs pplication to Dynamic Patial-ode Reduction Cistian Rosa Stephan Mez Matin Quinson VOCS 2010 22/09/2010 1 / 18 Motivation Distibuted lgoithms ae had to get ight: lack of
More informationB. Spherical Wave Propagation
11/8/007 Spheical Wave Popagation notes 1/1 B. Spheical Wave Popagation Evey antenna launches a spheical wave, thus its powe density educes as a function of 1, whee is the distance fom the antenna. We
More informationTradable Network Permits: A New Scheme for the Most Efficient Use of Network Capacity
adable Netwok Pemits: A New Scheme fo the Most Efficient Use of Netwok Capacity akashi Akamatsu Gaduate School of Infomation Sciences, ohoku Univesity, Sendai, Miyagi,98-8579, Japan Akamatsu et al.(26)
More informationChapter 10 Mechanism Design and Postcontractual Hidden Knowledge
Chapte 10 Mechanism Design and Postcontactual Hidden Knowledge 10.1 Mechanisms, Unavelling, Coss Checking, and the Revelation Pinciple A mechanism is a set of ules that one playe constucts and anothe feely
More informationRELIABILITY is an important concept in the design
Poceedings of the Wold Congess on Engineeing 0 Vol I WCE 0, July -, 0, London, U.K. Reliability Measues in Ciculant Netwok *Inda Rajasingh, Bhaati Rajan, and R. Sundaa Rajan Abstact Reliability and efficiency
More informationPhysics 211: Newton s Second Law
Physics 211: Newton s Second Law Reading Assignment: Chapte 5, Sections 5-9 Chapte 6, Section 2-3 Si Isaac Newton Bon: Januay 4, 1643 Died: Mach 31, 1727 Intoduction: Kinematics is the study of how objects
More informationAnalysis of Exponential Backoff with Multipacket Reception in Wireless Networks *
Analysis of Exponential Bacoff with ultipacet Reception in Wieless Netwos * Peng Xuan Zheng, Ying Jun (Angela Zhang and Soung Chang Liew Depatment of Infomation Engineeing The Chinese Univesity of Hong
More informationThree Stories on a Two-sided Coin: Index Coding, Locally Recoverable Distributed Storage, and Guessing Games on Graphs
Fifty-thid Annual Alleton Confeence Alleton House, UIUC, Illinois, USA Septembe 29 - Octobe 2, 2015 Thee Stoies on a Two-sided Coin: Index Coding, Locally Recoveable Distibuted Stoage, and Guessing Games
More information16 Modeling a Language by a Markov Process
K. Pommeening, Language Statistics 80 16 Modeling a Language by a Makov Pocess Fo deiving theoetical esults a common model of language is the intepetation of texts as esults of Makov pocesses. This model
More informationCircular Orbits. and g =
using analyse planetay and satellite motion modelled as unifom cicula motion in a univesal gavitation field, a = v = 4π and g = T GM1 GM and F = 1M SATELLITES IN OBIT A satellite is any object that is
More informationMitigating Primary User Emulation Attacks in Dynamic Spectrum Access Networks using Hypothesis Testing
Mitigating Pimay Use Emulation Attacks in Dynamic Spectum Access Netwoks using Hypothesis Testing Z. Jin S. An K. P. Subbalakshmi zjin@stevens.edu asanthan@stevens.edu ksubbala@stevens.edu Depatment of
More informationTrust Representation and Aggregation in a Distributed Agent System
Tust Repesentation and ggegation in a Distibuted gent System Yonghong Wang and uninda P. Singh Depatment of ompute Science Noth aolina State Univesity Raleigh, N 7695-806, US {ywang4, singh}@ncsu.edu bstact
More informationLab #4: Newton s Second Law
Lab #4: Newton s Second Law Si Isaac Newton Reading Assignment: bon: Januay 4, 1643 Chapte 5 died: Mach 31, 1727 Chapte 9, Section 9-7 Intoduction: Potait of Isaac Newton by Si Godfey Knelle http://www.newton.cam.ac.uk/at/potait.html
More informationA Deep Convolutional Neural Network Based on Nested Residue Number System
A Deep Convolutional Neual Netwok Based on Nested Residue Numbe System Hioki Nakahaa Ehime Univesity, Japan Tsutomu Sasao Meiji Univesity, Japan Abstact A pe-tained deep convolutional neual netwok (DCNN)
More informationMATH 415, WEEK 3: Parameter-Dependence and Bifurcations
MATH 415, WEEK 3: Paamete-Dependence and Bifucations 1 A Note on Paamete Dependence We should pause to make a bief note about the ole played in the study of dynamical systems by the system s paametes.
More informationParticle Systems. University of Texas at Austin CS384G - Computer Graphics Fall 2010 Don Fussell
Paticle Systems Univesity of Texas at Austin CS384G - Compute Gaphics Fall 2010 Don Fussell Reading Requied: Witkin, Paticle System Dynamics, SIGGRAPH 97 couse notes on Physically Based Modeling. Witkin
More information