I
nd
o
ne
s
ia
n J
o
urna
l o
f
E
lect
rica
l En
g
ineering
a
nd
Co
m
pu
t
er
Science
Vo
l.
24
,
No
.
2
,
N
o
v
em
b
e
r
20
21
,
p
p
.
7
8
0
~
7
8
8
I
SS
N:
2
5
0
2
-
4
7
5
2
,
DOI
: 1
0
.
1
1
5
9
1
/ijeecs.v
2
4
.i
2
.
pp
780
-
7
8
8
780
J
o
ur
na
l ho
m
ep
a
g
e
:
h
ttp
:
//ij
ee
cs.ia
esco
r
e.
co
m
A cloud ba
sed
3
-
t
ier data
secu
rity f
ra
mewo
rk f
o
r i
nd
ustria
l
interne
t
o
f
things
M
ira
do
r
G
.
L
a
bra
do
r
1
,
Abeg
a
il B
o
rdio
s
2
,
Weiy
a
n H
o
u
3
1
Ce
n
ter fo
r
E
n
g
i
n
e
e
rin
g
,
S
c
ien
c
e
a
n
d
Tec
h
n
o
l
o
g
y
&
In
n
o
v
a
ti
o
n
,
S
a
m
a
r
S
tate
Un
iv
e
rsity
,
Ca
tb
a
lo
g
a
n
.
P
h
il
ip
p
in
e
s
2
Co
ll
e
g
e
o
f
Ed
u
c
a
ti
o
n
,
S
a
m
a
r
S
ta
te Un
iv
e
rsity
,
Ca
tb
a
l
o
g
a
n
,
P
h
il
i
p
p
in
e
s
1,
3
S
c
h
o
o
l
o
f
I
n
fo
rm
a
ti
o
n
a
n
d
C
o
m
m
u
n
ica
ti
o
n
En
g
i
n
e
e
rin
g
,
Zh
e
n
g
z
h
o
u
U
n
iv
e
rsit
y
,
He
n
a
n
,
Ch
i
n
a
Art
icle
I
nfo
AB
S
T
RAC
T
A
r
ticle
his
to
r
y:
R
ec
eiv
ed
J
a
n
19
,
2
0
2
1
R
ev
is
ed
Sep
12
,
2
0
2
1
Acc
ep
ted
Sep
17
,
2
0
2
1
Th
e
c
o
n
v
e
rg
e
n
c
e
o
f
m
icro
e
lec
tro
n
ics
a
n
d
m
icro
m
e
c
h
a
n
ica
l
sy
ste
m
with
in
a
se
n
sin
g
d
e
v
ice
,
th
e
p
r
o
li
fe
ra
ti
o
n
o
f
wire
les
s
c
o
m
m
u
n
ica
ti
o
n
,
a
n
d
th
e
u
se
o
f
so
ftwa
re
-
d
riv
e
n
e
q
u
ip
m
e
n
t
a
re
a
lrea
d
y
c
h
a
n
g
i
n
g
t
h
e
lan
d
sc
a
p
e
o
f
th
e
m
a
n
u
fa
c
tu
rin
g
i
n
d
u
stries
.
Th
is
situ
a
ti
o
n
c
o
m
p
e
ls
t
h
e
in
d
u
str
ies
to
a
d
o
p
t
in
d
u
strial
in
ter
n
e
t
o
f
th
i
n
g
s
(I
I
o
T)
sy
ste
m
s
a
n
d
p
ro
c
e
ss
e
s
with
th
e
m
a
in
o
b
jec
ti
v
e
-
t
o
imp
r
o
v
e
th
e
p
ro
c
e
ss
e
s
a
n
d
in
c
re
a
se
p
ro
d
u
c
ti
o
n
.
Ho
w
e
v
e
r,
it
is
u
n
d
e
n
iab
le
th
a
t
d
e
sp
i
te
IIo
T
a
d
v
a
n
tag
e
s,
it
p
o
se
d
sig
n
ifi
c
a
n
t
issu
e
s
o
n
th
e
se
c
u
rit
y
a
n
d
p
r
iv
a
c
y
o
n
in
d
u
str
y
a
u
to
m
a
ti
o
n
e
sp
e
c
ially
a
l
o
n
g
d
a
ta
g
e
n
e
ra
ti
o
n
a
n
d
c
o
n
tro
l
s
y
ste
m
.
He
n
c
e
,
th
is
p
a
p
e
r
p
ro
p
o
se
s
a
c
lo
u
d
b
a
se
d
3
-
ti
e
r
d
a
ta
se
c
u
rit
y
fra
m
e
wo
rk
th
a
t
p
e
rfo
rm
s
two
-
lev
e
l
se
c
u
r
it
y
v
e
rifi
c
a
ti
o
n
p
ro
c
e
ss
e
s.
Th
e
fra
m
e
wo
rk
h
a
s
b
e
e
n
tes
ted
a
n
d
v
a
li
d
a
te
d
u
si
n
g
a
n
e
x
p
e
rime
n
t
a
l
in
d
u
stry
a
u
to
m
a
ti
o
n
sy
ste
m
a
n
d
h
a
s
b
e
e
n
fo
u
n
d
t
o
b
e
fu
n
c
ti
o
n
a
ll
y
e
ffe
c
ti
v
e
with
a
n
a
c
c
e
p
tab
le h
a
n
d
o
ff
d
e
lay
.
K
ey
w
o
r
d
s
:
3
-
tier
d
ata
m
o
d
el
C
lo
u
d
b
ased
s
ec
u
r
ity
Field
co
n
tr
o
l sy
s
tem
I
n
d
u
s
tr
ial
in
ter
n
et
o
f
th
in
g
s
Secu
r
ity
f
r
am
ewo
r
k
T
h
is i
s
a
n
o
p
e
n
a
c
c
e
ss
a
rticle
u
n
d
e
r th
e
CC B
Y
-
SA
li
c
e
n
se
.
C
o
r
r
e
s
p
o
nd
ing
A
uth
o
r
:
Mir
ad
o
r
G.
L
a
b
r
ad
o
r
C
en
ter
f
o
r
E
n
g
in
ee
r
in
g
,
Scien
ce
an
d
T
ec
h
n
o
lo
g
y
an
d
I
n
n
o
v
atio
n
Sam
ar
State
Un
iv
er
s
ity
Ar
tech
e
B
lv
d
.
,
B
r
g
y
.
G
u
in
d
ap
u
n
an
,
C
atb
a
lo
g
a
n
C
ity
,
Sam
ar
,
Ph
ilip
p
in
es
E
m
ail: la
b
r
ad
o
r
m
ir
ad
o
r
@
y
ah
o
o
.
co
m
1.
I
NT
RO
D
UCT
I
O
N
C
lo
u
d
-
b
ased
s
to
r
ag
e
a
n
d
p
r
o
ce
s
s
h
as
ch
an
g
ed
th
e
v
e
r
y
n
atu
r
e
o
f
in
f
o
r
m
atio
n
th
e
way
it
ca
n
b
e
s
h
ar
ed
an
d
ac
ce
s
s
ed
,
m
an
a
g
ed
an
d
d
eli
v
er
ed
.
I
t
c
h
an
g
es
th
e
lan
d
s
ca
p
e
o
f
wir
eless
co
m
m
u
n
icatio
n
co
n
n
ec
tiv
ity
an
d
th
e
ass
o
ciate
d
d
ata
ac
ce
s
s
s
ec
u
r
ity
.
So
m
e
ar
g
u
ed
th
at
clo
u
d
co
m
p
u
tin
g
is
a
n
ew
tech
n
o
lo
g
y
b
u
t
wh
at
is
r
ea
l
is
th
at
it
s
u
p
p
o
r
ts
g
r
i
d
tech
n
o
lo
g
y
,
u
tili
ty
,
v
ir
tu
aliza
tio
n
in
co
m
p
u
tin
g
,
n
etwo
r
k
tec
h
n
o
lo
g
y
an
d
s
o
f
twar
e
ap
p
licatio
n
s
[
1
]
.
I
n
p
ar
ticu
lar
,
clo
u
d
co
m
p
u
tin
g
ap
p
licab
ilit
y
is
v
er
y
d
iv
er
s
e
as
it
ca
n
b
e
u
s
ed
in
co
m
p
u
tin
g
v
ir
tu
aliza
tio
n
,
in
n
etwo
r
k
in
g
a
n
d
s
o
f
twar
e
s
er
v
ic
es,
in
d
is
tr
ib
u
ted
an
d
in
p
a
r
allel
co
m
p
u
tin
g
.
On
th
e
o
th
er
h
an
d
,
th
e
s
h
if
tin
g
o
f
in
d
u
s
tr
y
au
to
m
ati
o
n
an
d
co
n
tr
o
l
p
r
o
ce
s
s
es
f
r
o
m
wir
ed
to
wir
eles
s
s
y
s
tem
g
iv
es
b
ir
th
to
in
d
u
s
tr
ial
in
ter
n
et
o
f
th
in
g
s
(
I
I
o
T
)
.
I
I
o
T
is
an
in
ter
co
n
n
ec
tio
n
o
f
s
en
s
in
g
d
ev
ices,
in
s
tr
u
m
en
t a
n
d
o
t
h
er
elec
tr
o
n
i
c
eq
u
ip
m
en
t n
etwo
r
k
ed
to
g
eth
er
in
o
r
d
er
t
o
allo
w
d
ata
co
llectio
n
,
ex
ch
an
g
e
an
d
an
aly
s
is
to
im
p
r
o
v
e
an
d
m
a
k
e
in
d
u
s
tr
y
o
p
e
r
atio
n
s
ef
f
ec
tiv
e
an
d
ef
f
icien
t.
At
t
h
e
m
a
cr
o
lev
el,
I
I
o
T
is
a
n
etwo
r
k
ed
in
f
r
astru
ct
u
r
e
th
at
r
eq
u
ir
es
s
elf
-
c
o
n
f
ig
u
r
in
g
o
b
jects
in
h
ig
h
ly
in
tellig
en
t
way
b
u
t
h
as
a
lim
ite
d
s
to
r
ag
e
an
d
co
m
p
u
tin
g
ca
p
ac
i
ty
.
As
a
r
esu
lt,
clo
u
d
co
m
p
u
t
in
g
ca
n
p
lay
a
s
ig
n
i
f
ican
t
r
o
l
e
as
it
ca
n
s
u
p
p
o
r
t
in
tellig
en
t p
r
o
ce
s
s
es a
n
d
at
th
e
s
am
e
tim
e
r
eso
lv
es th
e
s
to
r
ag
e
p
r
o
b
lem
.
Hen
ce
,
th
e
co
m
p
lem
en
tin
g
f
e
atu
r
es
o
f
clo
u
d
b
ased
s
y
s
tem
with
th
at
o
f
th
e
3
-
lay
e
r
d
ata
o
p
er
atio
n
al
an
d
tr
an
s
ac
tio
n
al
p
r
o
ce
s
s
o
f
I
I
o
T
b
ec
o
m
es
th
e
m
o
tiv
atio
n
al
asp
ec
t
o
f
th
is
p
ar
ticu
lar
s
t
u
d
y
.
I
n
p
ar
ticu
lar
,
th
e
s
tu
d
y
aim
s
to
ex
p
lo
r
e
an
d
ap
p
ly
cl
o
u
d
co
m
p
u
tin
g
as
o
n
e
o
f
th
e
s
ec
u
r
ity
m
ec
h
an
is
m
s
in
I
I
o
T
ad
d
r
ess
in
g
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
d
o
n
esian
J
E
lec
E
n
g
&
C
o
m
p
Sci
I
SS
N:
2502
-
4
7
5
2
A
clo
u
d
b
a
s
ed
3
-
tier
d
a
ta
s
ec
u
r
ity
fr
a
me
w
o
r
k
fo
r
in
d
u
s
tr
ia
l i
n
tern
et
o
f th
in
g
s
(
Mir
a
d
o
r
G.
La
b
r
a
d
o
r
)
781
th
e
co
n
tr
ain
ts
o
f
I
I
o
T
m
em
o
r
y
r
eq
u
ir
em
e
n
t
with
o
u
t
co
m
p
r
o
m
i
s
in
g
tr
an
s
ac
tio
n
an
d
d
ata
tr
an
s
f
er
p
r
o
ce
s
s
in
g
tim
e.
Mo
r
eo
v
er
,
as
in
d
u
s
tr
ial
eq
u
ip
m
en
t
a
n
d
d
e
v
ices
b
ec
o
m
e
co
n
n
ec
ted
,
clo
u
d
co
m
p
u
tin
g
ca
n
b
e
i
n
teg
r
ated
f
o
r
it
will
p
r
o
v
id
e
n
ew
s
to
r
ag
e,
p
r
o
ce
s
s
in
g
,
s
ca
lab
ilit
y
,
s
ec
u
r
ity
an
d
n
etwo
r
k
in
g
ca
p
ab
ilit
ies.
T
h
u
s
,
th
is
p
ap
er
ex
p
lo
r
es
an
d
p
r
o
p
o
s
es
th
e
clo
u
d
-
b
ased
3
-
tier
d
ata
s
ec
u
r
ity
f
r
am
ewo
r
k
f
o
r
in
d
u
s
tr
ial
in
ter
n
et
o
f
th
in
g
s
.
T
h
e
f
r
am
ewo
r
k
d
ea
ls
o
n
th
e
ap
p
lic
atio
n
o
f
2
-
lev
el
s
ec
u
r
ity
m
ea
s
u
r
es
o
n
th
e
3
-
k
ey
co
m
p
o
n
e
n
t
o
f
I
I
o
T
a
r
ch
itectu
r
e
an
d
o
p
er
atio
n
s
-
th
e
d
ev
ice,
th
e
ch
an
n
el
an
d
th
e
ass
o
ciate
d
s
e
r
v
ices.
T
h
e
r
em
ain
g
s
ec
tio
n
o
f
th
e
p
a
p
er
in
cl
u
d
es
p
r
esen
tatio
n
o
f
r
elev
a
n
t
an
d
r
elate
d
s
tu
d
ies,
th
e
c
lo
u
d
-
b
ased
s
ec
u
r
ity
f
r
am
ewo
r
k
-
wh
ich
is
b
ased
o
n
th
e
co
m
p
lem
en
tin
g
f
ea
tu
r
es
o
f
I
I
o
T
tr
an
s
ac
atio
n
al
an
d
o
p
er
atio
n
al
p
r
o
ce
s
s
es
v
is
-
à
-
v
is
3
-
tier
d
a
ta
im
p
lem
en
tatio
n
r
eq
u
ir
em
e
n
t,
p
r
esen
tatio
n
o
f
t
h
e
ex
p
er
im
e
n
tal
s
et
-
u
p
an
d
r
es
u
lts
.
2.
RE
L
AT
E
D
S
T
UDI
E
S
I
I
o
T
is
an
ex
ten
s
io
n
o
f
in
ter
n
et
o
f
th
in
g
s
(
I
o
T
)
,
th
is
s
ec
tio
n
ex
p
lo
r
es
s
ec
u
r
ity
ap
p
r
o
ac
h
es
g
o
v
er
n
in
g
I
o
T
.
N
o
te
th
at
a
s
ig
n
i
f
ican
t
n
u
m
b
er
s
o
f
r
esear
ch
h
as
b
ee
n
u
n
d
er
tak
e
n
t
o
a
d
d
r
ess
th
e
s
ec
u
r
ity
is
s
u
es
o
f
I
o
T
.
So
m
e
o
f
th
ese
s
ec
u
r
ity
s
o
lu
ti
o
n
tar
g
ets
s
ec
u
r
ity
is
s
u
es
at
a
s
p
ec
if
ic
lay
er
,
wh
er
ea
s
,
o
th
er
ap
p
r
o
ac
h
es
aim
at
p
r
o
v
id
i
n
g
a
cu
t
-
ac
r
o
s
s
s
o
lu
tio
n
s
[
2
]
.
Ph
y
s
ical
an
d
d
ata
li
n
k
lay
e
r
s
s
ec
u
r
ity
is
s
u
es
ar
e
co
n
s
id
er
e
d
as
th
e
lo
west
-
lev
el
s
ec
u
r
ity
is
s
u
es
[
3
]
.
So
m
e
o
f
th
ese
is
s
u
es
in
clu
d
es:
(
1
)
jam
m
in
g
ad
v
e
r
s
ar
ies
-
an
in
ten
tio
n
al
d
is
r
u
p
tio
n
o
n
wir
eless
d
ev
ices
co
m
m
u
n
icatio
n
o
r
tr
an
s
m
is
s
i
on,
(
2
)
in
s
ec
u
r
e
in
itializatio
n
-
a
s
ec
u
r
ity
is
s
u
es
th
at
ca
u
s
es
g
en
er
atatio
n
an
d
tr
an
s
m
is
s
io
n
o
f
u
n
v
er
if
ied
o
r
u
n
at
h
en
ticated
d
ata,
(
3
)
l
ow
-
lev
el
s
y
b
il
an
d
s
p
o
o
f
in
g
attac
k
s
-
an
attac
k
in
a
wir
eless
n
etwo
r
k
s
wh
er
e
a
n
o
d
e
m
a
y
o
p
er
ate
in
a
f
a
k
e
id
e
n
titi
es,
(
4
)
i
n
s
ec
u
r
e
p
h
y
s
ical
in
ter
f
ac
e
-
f
ac
t
o
r
s
ass
o
ciat
ed
to
s
er
io
u
s
th
r
ea
ts
to
p
r
o
p
er
f
u
n
cti
o
n
s
o
f
I
o
T
d
e
v
ices,
an
d
(
5
)
s
leep
d
ep
r
iv
atio
n
attac
k
-
an
attac
k
t
h
at
ca
u
s
es
th
e
s
en
s
o
r
n
o
d
e
to
b
e
alwa
y
s
in
ac
tiv
e
s
tate
wh
ich
r
esu
lts
to
th
e
d
ep
letio
n
o
f
b
atter
y
[
4
]
-
[
6
]
.
I
n
ter
m
ed
iate
-
lev
el
s
ec
u
r
ity
is
s
u
es
tak
e
p
lace
a
t
tr
an
s
p
o
r
t
an
d
n
etwo
r
k
lay
er
s
.
Dif
f
e
r
en
t
s
ec
u
r
ity
is
s
u
es
o
n
th
is
lev
el
in
cl
u
d
es:
d
u
p
licatio
n
,
b
u
f
f
e
r
r
eser
v
atio
n
,
r
o
u
tin
g
,
s
in
k
h
o
le
a
n
d
wo
r
m
h
o
le,
an
d
s
y
b
i
l
attac
k
s
[
7
]
,
[
8
]
.
D
u
p
licatio
n
at
tack
s
is
ca
u
s
ed
b
y
f
r
ag
m
e
n
tatio
n
o
r
in
s
ec
u
r
e
n
eig
h
b
o
r
d
eso
v
er
y
.
Oth
er
s
ec
u
r
ity
is
s
u
es
in
clu
d
e:
au
th
en
ticatio
n
an
d
s
ec
u
r
e
c
o
m
m
u
n
icatio
n
,
tr
an
s
p
o
r
t
lev
el
s
ec
u
r
ity
,
s
ess
io
n
in
itiatio
n
a
n
d
r
esu
m
p
tio
n
,
an
d
clo
u
d
-
b
ased
p
r
iv
ac
y
v
i
o
latio
n
.
On
th
e
o
t
h
e
r
-
h
an
d
,
h
ig
h
-
lev
el
s
ec
u
r
ity
is
s
u
es
tak
e
p
lace
in
th
e
ap
p
licatio
n
lay
er
s
wh
ich
in
cl
u
d
e,
b
u
t
n
o
t
lim
ited
to
,
in
s
ec
u
r
e
in
ter
f
ac
es,
in
s
ec
u
r
e
s
o
f
tw
ar
e
an
d
f
ir
m
war
e,
m
id
d
e
war
e
s
ec
u
r
ity
is
s
u
es a
n
d
th
e
s
ec
u
r
ity
is
s
u
es a
s
s
o
ciate
d
to
co
n
s
tr
ain
ed
ap
p
licatio
n
p
r
o
t
o
co
l (
C
o
AP)
with
in
ter
n
et
[
9
]
-
[
1
2
]
.
I
n
f
ac
t,
it
h
as
b
ee
n
ar
g
u
ed
t
h
at
I
o
T
s
ec
u
r
ity
n
ee
d
s
to
m
o
v
e
f
r
o
m
s
in
g
le
p
r
o
d
u
cts
to
en
d
-
to
-
e
n
d
s
o
lu
tio
n
an
d
ev
en
t
u
ally
to
th
e
en
tire
s
ec
u
r
ity
ar
ch
itectu
r
e
[
1
3
]
.
A
s
u
r
v
ey
p
ap
er
wh
ich
ca
teg
o
r
izes th
e
d
if
f
er
en
t
s
ec
u
r
ity
is
s
u
es
in
to
ap
p
licatio
n
,
co
m
m
u
n
icatio
n
,
an
d
d
ata
ar
e
d
escr
ib
ed
an
d
p
r
esen
ted
in
[
1
4
]
.
T
h
e
s
aid
p
a
p
er
d
is
cu
s
s
es
th
e
d
if
f
er
en
t
I
o
T
th
r
ea
ts
b
ased
o
n
h
a
r
d
war
e,
n
etwo
r
k
a
n
d
a
p
p
licatio
n
co
m
p
o
n
e
n
ts
.
I
n
p
ar
ticu
lar
,
I
o
T
h
ar
d
war
e
th
r
ea
ts
in
clu
d
es:
tr
ac
k
in
g
,
d
is
k
o
p
er
atin
g
s
y
s
t
em
(
Do
S
)
,
r
ep
u
d
iatio
n
an
d
s
p
o
o
f
in
g
f
o
r
r
ad
i
o
f
r
eq
u
e
n
cy
i
d
en
tific
atio
n
(
R
FID
)
b
ased
h
ar
d
war
e
,
p
ac
k
et
m
a
n
ip
u
latio
n
f
o
r
Z
ig
b
ee
;
ea
v
esd
r
o
p
p
in
g
an
d
Do
S
f
o
r
b
lu
et
o
o
th
;
an
d
Do
S,
e
x
h
au
s
ti
o
n
,
u
n
f
air
n
ess
an
d
s
y
b
il
f
o
r
s
en
s
o
r
n
o
d
e
.
Fo
r
n
etwo
r
k
c
o
m
p
o
n
e
n
ts
,
th
r
ea
ts
in
clu
d
es,
m
an
ip
u
latio
n
o
f
d
ata
,
ex
to
r
tio
n
h
ac
k
,
r
o
g
u
e
ac
ce
s
s
p
o
in
ts
,
an
d
m
is
co
n
f
ig
u
r
atio
n
s
.
W
h
ile
f
o
r
th
r
ea
ts
ass
o
ciate
d
in
ap
p
licatio
n
co
m
p
o
n
en
ts
in
clu
d
es:
Do
S
m
an
ip
u
latio
n
o
f
in
f
o
r
m
atio
n
,
co
s
tu
m
er
s
ec
u
r
ity
,
p
h
y
s
ical
s
ec
u
r
ity
,
th
ef
t
an
d
lo
s
s
,
in
s
id
er
m
is
u
s
e,
an
d
u
n
in
ten
tio
n
al
ac
tio
n
s
.
On
th
e
o
th
er
h
an
d
,
Gr
an
jal
et
a
l.
[
1
5
]
an
aly
ze
s
s
ec
u
r
ity
is
s
u
es
b
ased
o
n
I
o
T
p
r
o
t
o
co
ls
.
Su
cc
ed
in
g
p
ar
a
g
r
ap
h
s
o
u
tlin
es
th
e
d
if
f
er
en
t
I
o
T
s
ec
u
r
ity
r
eq
u
ir
em
e
n
ts
v
er
s
u
s
s
ec
u
r
ity
a
ttack
s
,
th
r
ea
ts
,
an
d
s
o
lu
tio
n
s
.
I
n
p
ar
tic
u
lar
,
th
e
s
tu
d
y
o
f
[
1
6
]
p
r
o
p
o
s
es
B
lo
ck
ch
ain
m
ec
h
an
is
m
f
o
r
I
o
T
s
ec
u
r
ity
.
T
h
e
s
tu
d
y
em
p
h
asizes
th
at
b
lo
ck
ch
ain
is
m
o
r
e
ef
f
ec
tiv
e
wh
en
u
s
ed
at
th
e
lo
wer
lay
er
o
f
th
e
co
m
m
u
n
icatio
n
m
o
d
el
as
well
as
at
th
e
a
p
p
licatio
n
lay
er
.
Ho
wev
er
,
th
e
s
tu
d
y
also
p
o
in
ts
o
u
t
th
at
in
o
r
d
e
r
to
m
ain
tain
I
o
T
in
teg
r
ity
,
it
is
n
ec
ess
ar
y
th
at
o
th
e
r
s
ec
u
r
ity
m
ec
h
an
is
m
s
u
ch
as
f
ir
ewa
ll,
en
cr
y
p
tio
n
an
d
au
t
h
o
r
izatio
n
m
u
s
t
b
e
co
m
b
in
ed
with
th
at
o
f
b
lo
c
k
ch
ain
s
ec
u
r
ity
.
I
n
s
im
ilar
m
a
n
n
er
,
b
lo
c
k
ch
ai
n
tech
n
o
lo
g
y
was
p
r
o
p
o
s
ed
a
s
a
s
ec
u
r
ity
m
ec
h
an
is
m
f
o
r
in
ter
n
et
o
f
v
eh
icle
(
I
o
V)
i
n
[
1
7
]
.
T
h
e
s
tu
d
y
d
ea
ls
o
n
th
e
u
s
e
o
f
b
lo
ck
ch
ain
tech
n
o
lo
g
y
co
u
p
led
with
cr
y
p
to
g
r
ap
h
ic
s
er
v
ices in
th
e
im
p
lem
en
tatio
n
o
f
I
o
V
a
n
d
ar
g
u
es th
at
th
e
u
s
ed
o
f
th
e
s
aid
m
ec
h
an
is
m
en
s
u
r
es c
o
m
m
u
n
icatio
n
p
r
iv
ac
y
an
d
d
ata
au
th
en
ticity
.
I
n
g
en
er
al,
it
ca
n
b
e
v
iewe
d
th
at
b
lo
ck
ch
ain
is
m
o
r
e
ef
f
e
ctiv
e
an
d
ef
f
icien
t
wh
en
it
is
b
ein
g
p
air
e
d
with
o
th
er
s
ec
u
r
ity
s
o
lu
tio
n
ap
p
r
o
ac
h
es
wh
en
it
is
b
ein
g
u
s
ed
in
I
o
T
.
I
n
o
th
e
r
wo
r
d
s
,
liter
atu
r
e
in
d
icate
s
th
at
ex
is
tin
g
I
o
T
s
ec
u
r
ity
m
ec
h
an
is
m
in
cl
u
d
in
g
th
at
o
f
b
lo
ck
ch
ai
n
ca
n
s
till
b
e
im
p
r
o
v
ed
if
it is
b
ein
g
co
u
p
le
d
wi
th
an
o
t
h
er
s
ec
u
r
ity
ap
p
r
o
ac
h
es.
As
s
u
ch
,
co
n
s
id
er
i
n
g
t
h
e
d
if
f
e
r
en
t
s
ec
u
r
ity
th
r
ea
ts
an
d
is
s
u
es
in
th
e
d
if
f
er
e
n
t
n
etwo
r
k
la
y
e
r
o
f
I
o
T
as
cited
in
th
e
p
r
ev
io
u
s
p
ar
a
g
r
ap
h
v
is
-
à
-
v
is
th
e
ass
o
ciate
d
d
at
a
r
eq
u
ir
e
m
en
t,
th
e
d
esig
n
o
f
s
ec
u
r
ity
f
r
am
ewo
r
k
b
ased
o
n
th
e
s
aid
co
n
s
tr
ain
ts
a
n
d
r
eq
u
ir
em
en
ts
was
ex
p
lo
r
ed
an
d
p
r
o
p
o
s
ed
o
n
th
is
p
ap
er
.
T
h
e
p
r
im
ar
y
r
ea
s
o
n
o
f
th
e
p
r
o
p
o
s
ed
s
ec
u
r
ity
f
r
am
e
wo
r
k
is
to
im
p
r
o
v
ed
ex
is
tin
g
I
o
T
m
ec
h
a
n
is
m
s
an
d
at
th
e
s
a
m
e
tim
e
ad
d
r
ess
th
e
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
5
0
2
-
4
7
5
2
I
n
d
o
n
esian
J
E
lec
E
n
g
&
C
o
m
p
Sci,
Vo
l.
2
4
,
No
.
2
,
No
v
em
b
er
20
21
:
7
8
0
-
788
782
d
if
f
er
en
t
t
h
r
ea
ts
an
d
s
ec
u
r
ity
co
n
s
tr
ain
ts
as
p
r
esen
te
d
in
th
e
p
r
ev
io
u
s
p
ar
a
g
r
ap
h
.
Descr
ip
tio
n
o
f
th
e
p
r
o
p
o
s
ed
f
r
am
ewo
r
k
is
p
r
esen
ted
in
t
h
e
s
u
cc
ee
d
in
g
s
ec
tio
n
o
f
th
is
p
ap
er
.
On
th
e
o
th
er
h
an
d
,
as
clo
u
d
co
m
p
u
tin
g
o
f
f
er
s
an
s
ca
lab
ale
an
d
co
n
v
en
ien
t
n
etwo
r
k
ac
ce
s
s
,
it
s
ac
tu
ally
en
ab
les
a
d
y
n
am
ic
d
a
ta
in
teg
r
atio
n
f
r
o
m
a
n
d
ac
r
o
s
s
all
co
n
n
ec
ted
I
o
T
d
ev
ices.
T
h
u
s
,
s
ev
er
al
s
tu
d
ies
h
av
e
b
ee
n
u
n
d
er
tak
e
n
o
n
th
e
clo
u
d
a
n
d
I
o
T
in
te
g
r
atio
n
wh
ich
h
as
b
ee
n
p
r
esen
ted
in
[
1
8
]
,
[
1
9
]
.
T
h
e
in
teg
r
atio
n
d
ea
ls
o
n
ad
d
r
ess
in
g
th
e
d
if
f
er
e
n
t
s
e
cu
r
ity
is
s
u
es
in
I
o
T
.
Sh
ar
m
a
et
al
.
[
2
0
]
p
r
o
p
o
s
ed
a
m
itig
atio
n
ar
ch
itectu
r
e
f
o
r
s
ec
u
r
ity
attac
k
s
th
at
in
co
r
p
o
r
ate
a
h
ig
h
l
y
p
r
o
g
r
am
m
ab
le
m
o
n
ito
r
in
g
n
et
wo
r
k
b
ased
o
n
clo
u
d
co
m
p
u
tin
g
wh
ich
is
r
ef
er
r
e
d
to
as
Op
C
lo
u
d
Sec
a
r
ch
itec
tu
r
e.
Op
C
lo
u
d
Sec
allo
ws
n
e
two
r
k
co
n
tr
o
l
a
n
d
m
o
n
ito
r
in
g
in
th
e
clo
u
d
wh
ich
h
a
s
a
v
er
y
h
ig
h
d
etec
tio
n
an
d
id
en
tific
atio
n
ca
p
ab
ilit
y
o
f
I
o
T
d
ev
ices.
Similar
s
tu
d
ies
h
av
e
b
ee
n
u
n
d
e
r
tak
en
b
y
[
2
1
]
-
[
2
3
]
.
Alth
o
u
g
h
th
e
s
tu
d
ies
p
r
esen
ted
s
h
o
w
th
at
clo
u
d
co
m
p
u
tin
g
h
as
a
v
er
y
g
o
o
d
s
ec
u
r
ity
p
er
f
o
r
m
an
ce
ass
e
s
s
m
en
t,
it
ca
n
b
e
v
iew
ed
th
at
th
e
s
tr
ateg
y
ca
n
b
e
s
ti
ll
b
e
im
p
r
o
v
ed
b
y
em
b
ed
d
in
g
s
elec
tiv
e
s
en
s
in
g
in
tellig
en
ce
in
th
e
ed
g
e
n
o
d
es
with
th
e
in
teg
r
atio
n
o
f
i
n
tellig
en
t
m
o
b
ilit
y
m
an
ag
em
en
t
tech
n
iq
u
es
f
o
r
d
ata
g
en
er
ato
r
s
.
Hen
ce
,
it
is
f
o
r
th
is
r
ea
s
o
n
th
at
th
e
in
teg
r
atio
n
o
f
clo
u
d
co
m
p
u
tin
g
as
an
ad
d
itio
n
al
s
ec
u
r
ity
p
r
o
ce
s
s
es
f
o
r
I
o
T
an
d
I
I
o
T
in
p
ar
ticu
lar
is
b
ein
g
p
r
o
p
o
s
ed
b
ased
th
e
co
m
p
lem
en
tin
g
ch
ar
a
cter
is
tics
o
f
I
I
o
T
I
n
teleg
g
en
t
le
v
el
m
an
u
f
ac
tu
r
in
g
p
r
o
ce
s
s
es
with
th
at
o
f
th
e
d
ata
r
eq
u
ir
em
e
n
ts
b
ased
o
n
3
-
tier
m
o
d
el
o
f
f
er
ed
b
y
th
e
c
lo
u
d
co
m
p
u
tin
g
as in
d
icate
d
in
F
ig
u
r
e
1
.
3.
CL
O
UD
-
B
A
SE
D
3
-
T
I
E
R
SE
CURI
T
Y
F
RA
M
E
WO
RK
T
h
e
co
m
p
lem
en
tin
g
f
ea
t
u
r
es
o
f
3
-
tier
d
ata
m
o
d
el
an
d
th
at
o
f
th
e
th
r
ee
-
le
v
el
in
tellig
en
t
p
r
o
c
ess
es
o
f
a
m
an
u
f
ac
tu
r
in
g
in
d
u
s
tr
y
b
ec
o
m
es
th
e
f
u
n
d
am
en
tal
b
asis
o
f
th
is
p
r
o
p
o
s
ed
s
ec
u
r
ity
m
o
d
el.
Fig
u
r
e
1
s
h
o
ws
th
e
f
r
am
ewo
r
k
o
f
a
clo
u
d
-
b
ased
3
-
tier
s
ec
u
r
ity
m
o
d
el
f
o
r
I
I
o
T
.
As
in
d
icate
d
in
F
ig
u
r
e
1
,
t
h
e
in
tellig
en
t
lev
el
o
f
m
an
u
f
ac
tu
r
in
g
p
lan
t
in
clu
d
es
th
e
(
1
)
en
ter
p
r
is
e
r
eso
u
r
c
e
p
lan
n
in
g
(
E
R
P),
(
2
)
th
e
m
a
n
u
f
ac
tu
r
in
g
e
x
ec
u
tio
n
lay
er
(
ME
S)
an
d
(
3
)
th
e
f
ield
co
n
tr
o
l
s
y
s
tem
(
FC
S).
On
th
is
,
a
co
r
r
esp
o
n
d
in
g
d
ata
an
d
p
r
o
ce
s
s
es
ar
e
b
ein
g
id
en
tifie
d
a
n
d
b
ein
g
m
atch
e
d
with
th
at
o
f
th
e
3
-
tier
d
ata
m
o
d
el.
FC
S
in
v
o
lv
es
t
h
e
ac
tu
al
s
en
s
o
r
s
an
d
ac
tu
ato
r
s
f
u
n
ctio
n
s
s
u
c
h
as
ac
tu
al
d
ata
s
en
s
in
g
an
d
tr
ig
g
er
i
n
g
o
f
d
ev
i
ce
/eq
u
ip
m
en
t
f
o
r
ce
r
tain
o
p
e
r
atio
n
.
L
ik
ewise,
th
e
s
aid
FC
S
d
ef
in
ed
p
r
o
ce
s
s
es
is
in
co
n
f
o
r
m
ity
to
th
e
p
r
esen
tatio
n
lay
e
r
o
f
th
at
o
f
t
h
e
3
-
tier
d
ata
m
o
d
el
ca
teg
o
r
ically
r
ef
er
r
ed
to
as
d
ev
ice/u
s
er
lay
er
as
in
d
icate
d
in
F
ig
u
r
e
1
.
T
h
is
is
b
ec
au
s
e
th
e
FC
S
p
r
o
ce
s
s
e
s
an
d
th
e
ass
o
ciate
d
d
ata
g
en
er
atio
n
an
d
f
u
n
ctio
n
o
n
th
is
lev
el
is
v
i
r
tu
ally
-
tied
with
th
at
o
f
th
e
d
e
v
ice
its
elf
.
Ma
n
u
f
ac
tu
r
in
g
ex
ec
u
tio
n
lay
e
r
(
ME
S)
is
th
e
s
ec
o
n
d
le
v
el
o
f
in
d
u
s
tr
y
p
lan
t
o
p
er
atio
n
.
M
E
S
u
s
u
ally
en
ab
les
co
n
tr
o
l
o
f
m
u
ltip
le
el
em
en
t
o
f
FC
S.
I
n
th
e
s
am
e
m
an
n
er
to
wh
ic
h
th
e
ap
p
licatio
n
lay
er
o
f
th
e
3
-
tier
d
ata
m
o
d
el
p
er
f
o
r
m
s
p
r
o
ce
s
s
in
g
o
f
co
m
m
an
d
s
,
m
ak
es
lo
g
ical
d
ec
is
io
n
s
an
d
co
n
tr
o
l,
an
d
d
r
iv
es
ap
p
licatio
n
co
r
e
ca
p
ab
ilit
ies.
T
h
u
s
,
th
e
p
r
o
p
o
s
ed
m
o
d
el
o
f
F
ig
u
r
e
1
will e
n
ab
le
b
etter
co
n
tr
o
l,
m
an
a
g
e
m
en
t a
n
d
co
n
tr
o
l o
f
FC
S d
ev
ices
.
Fig
u
r
e
1
.
I
n
d
u
s
tr
y
o
p
e
r
atio
n
s
an
d
d
ata
r
e
q
u
ir
em
e
n
t m
o
d
e
l
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
d
o
n
esian
J
E
lec
E
n
g
&
C
o
m
p
Sci
I
SS
N:
2502
-
4
7
5
2
A
clo
u
d
b
a
s
ed
3
-
tier
d
a
ta
s
ec
u
r
ity
fr
a
me
w
o
r
k
fo
r
in
d
u
s
tr
ia
l i
n
tern
et
o
f th
in
g
s
(
Mir
a
d
o
r
G.
La
b
r
a
d
o
r
)
783
Me
an
wh
ile,
E
R
P
in
teg
r
ates
a
l
l
f
ac
ets
o
f
an
o
p
er
atio
n
,
in
clu
d
in
g
p
r
o
d
u
ct
p
lan
n
in
g
,
d
e
v
elo
p
m
en
t,
an
d
m
an
u
f
ac
tu
r
in
g
p
r
o
ce
s
s
es
.
I
n
s
im
p
le
ter
m
s
,
it
en
ab
les
s
er
v
ic
es
f
o
r
s
to
r
ag
e
a
n
d
ac
ce
s
s
o
f
d
ata,
p
r
o
ce
s
s
in
g
o
f
d
ata
an
d
o
th
e
r
f
o
r
m
s
o
f
s
er
v
ices
r
elev
an
t
to
in
d
u
s
tr
y
o
p
er
atio
n
.
T
h
is
f
u
n
ctio
n
al
E
R
P
s
er
v
ices
r
eq
u
ir
es
ef
f
icien
t
an
d
ef
f
ec
tiv
e
d
ata
a
n
d
s
er
v
ice
m
an
ag
em
e
n
t
wh
ich
is
b
ein
g
g
o
v
er
n
e
d
b
y
th
at
o
f
th
e
d
ata
lay
er
in
d
icate
d
in
F
ig
u
r
e
1
.
Th
er
ef
o
r
e,
th
e
b
in
d
in
g
m
ec
h
a
n
is
m
o
f
th
e
in
d
u
s
tr
y
p
lan
t
o
p
er
atio
n
w
ith
th
at
o
f
th
e
3
-
tier
d
ata
ar
ch
itectu
r
e
en
ab
les
th
e
p
o
s
s
ib
ilit
y
f
o
r
th
e
im
p
lem
en
tatio
n
o
f
clo
u
d
-
b
ased
3
-
tier
d
ata
m
o
d
el
s
ec
u
r
ity
ap
p
r
o
ac
h
as d
escr
ib
e
in
Fig
u
r
e
2
.
Fig
u
r
e
2
.
I
n
d
u
s
tr
y
o
p
e
r
atio
n
s
an
d
d
ata
r
e
q
u
ir
em
e
n
t m
o
d
el
N
o
t
e
t
h
a
t
I
I
o
T
d
e
v
i
c
e
s
h
a
s
n
o
c
a
p
a
b
i
l
i
t
i
e
s
t
o
c
o
m
m
u
n
i
c
a
t
e
d
i
r
e
c
t
l
y
w
i
t
h
t
h
e
c
l
o
u
d
n
e
t
w
o
r
k
.
O
n
t
h
i
s
,
I
I
o
T
d
e
v
i
c
e
s
r
e
q
u
i
r
e
s
e
x
t
e
r
n
a
l
a
n
d
i
n
t
e
r
f
a
c
e
c
o
m
m
u
n
i
c
a
t
i
o
n
f
a
c
i
l
i
t
y
v
i
a
a
s
p
e
c
i
a
l
i
z
e
d
g
a
t
e
w
a
y
c
o
l
l
e
c
t
i
v
e
l
y
r
e
f
e
r
r
e
d
t
o
t
h
a
t
o
f
d
a
t
a
a
c
q
u
i
s
i
t
i
o
n
s
y
s
t
e
m
(
D
A
S
)
a
s
i
n
d
i
c
a
t
e
d
i
n
F
i
g
u
r
e
1
a
n
d
Fi
g
u
r
e
3
.
T
h
i
s
s
p
e
c
i
a
l
i
z
e
d
g
a
t
e
w
a
y
s
e
r
v
e
s
a
s
a
r
e
l
a
y
s
t
a
t
i
o
n
o
f
d
a
t
a
t
r
a
n
s
m
i
s
s
i
o
n
a
n
d
c
o
n
t
r
o
l
o
p
e
r
a
t
i
o
n
b
e
t
w
e
e
n
t
h
e
F
C
S
d
e
v
i
c
e
s
a
n
d
t
h
a
t
o
f
t
h
e
c
l
o
u
d
s
y
s
t
e
m
s
e
r
v
i
c
e
s
.
I
n
p
a
r
t
i
c
u
l
a
r
,
F
i
g
u
r
e
2
d
e
s
c
r
i
b
e
h
o
w
a
c
l
o
u
d
b
a
s
e
d
3
-
t
i
e
r
s
e
c
u
r
i
t
y
m
o
d
e
l
c
a
n
b
e
i
m
p
l
e
m
e
n
t
e
d
.
Fig
u
r
e
3
.
B
in
d
in
g
s
ec
u
r
ity
p
r
o
ce
s
s
FC
S
d
ev
ices
an
d
th
e
DAS
w
h
o
s
e
f
u
n
ctio
n
s
an
d
c
h
ar
ac
ter
i
s
tics
d
escr
ib
e
in
Fig
u
r
e
2
as
tier
1
an
d
2
r
esp
ec
tiv
ely
estab
lis
h
a
s
af
e
c
o
m
m
u
n
icatio
n
in
d
icate
d
in
a
s
ec
u
r
ity
ec
o
s
y
s
tem
o
f
Fig
u
r
e
2
as
id
en
tific
atio
n
,
au
th
o
r
izatio
n
an
d
a
u
th
en
ticati
o
n
.
T
h
is
s
ec
u
r
ity
f
e
atu
r
es
b
in
d
s
b
o
th
th
e
FC
S
d
ev
ices
an
d
th
at
o
f
th
e
DAS.
Mo
r
eo
v
er
,
tier
1
an
d
tier
3
ar
e
s
ec
u
r
ity
-
tied
to
g
eth
er
v
ia
th
e
d
ata
ac
ce
s
s
co
n
tr
o
l
an
d
th
e
is
s
u
an
ce
o
f
tr
ig
g
er
s
ig
n
al
f
o
r
s
p
ec
if
ic
d
e
v
ice
o
p
e
r
atio
n
.
T
h
e
b
in
d
in
g
s
ec
u
r
ity
p
r
o
ce
s
s
es a
s
p
r
esen
ted
in
F
ig
u
r
e
3
ar
e
as f
o
llo
ws:
−
T
h
e
FC
S
d
ev
ice
r
eq
u
ests
a
c
o
n
n
ec
tio
n
f
r
o
m
th
e
DAS.
T
h
e
DAS
r
esp
o
n
d
s
with
ac
k
n
o
wled
g
e
(
AC
K)
s
ig
n
al.
AC
K
s
ig
n
al
is
is
s
u
ed
to
th
e
d
ev
ice
v
ia
a
h
an
d
s
h
ak
e
p
r
o
ce
s
s
.
(
I
n
s
o
m
e
ca
s
es
A
C
K
m
ay
n
o
t
b
e
is
s
u
ed
if
th
e
DAS
is
b
u
s
y
.
A
tr
an
s
ac
tio
n
q
u
eiu
i
n
g
alg
o
r
ith
m
m
ay
b
e
u
tili
ze
d
).
−
W
h
en
co
n
n
ec
tio
n
is
estab
lis
h
ed
,
th
e
DAS
(
v
ia
a
s
er
v
er
-
s
id
e
ap
p
licatio
n
)
v
e
r
if
ies
th
e
FC
S
d
ev
ice
id
en
tific
atio
n
an
d
au
th
o
r
izatio
n
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
5
0
2
-
4
7
5
2
I
n
d
o
n
esian
J
E
lec
E
n
g
&
C
o
m
p
Sci,
Vo
l.
2
4
,
No
.
2
,
No
v
em
b
er
20
21
:
7
8
0
-
788
784
−
DAS
will f
o
r
war
d
d
ev
ice
s
er
v
i
ce
/o
p
er
atio
n
r
eq
u
est an
d
its
co
r
r
esp
o
n
d
i
n
g
I
D
to
clo
u
d
s
er
v
er
.
−
C
lo
ud
s
er
v
er
(
v
ia
C
lo
u
d
Ser
v
i
ce
s
)
p
er
f
o
r
m
s
DAS
I
D
an
d
r
eq
u
est v
er
if
icatio
n
.
−
C
lo
u
d
-
b
ased
Secu
r
ity
p
er
m
its
o
r
r
estricts o
p
er
atio
n
r
eq
u
est
.
T
h
e
p
r
o
ce
s
s
in
d
icate
s
th
e
two
-
lev
el
s
ec
u
r
ity
b
in
d
in
g
p
r
o
to
c
o
l
o
f
th
e
p
r
o
p
o
s
ed
s
y
s
tem
.
T
h
e
f
ir
s
t
lev
el
id
en
tity
,
p
r
o
ce
s
s
au
th
o
r
izatio
n
an
d
tr
an
s
ac
tio
n
au
th
en
ticity
.
W
h
ile
th
e
s
ec
o
n
d
s
ec
u
r
ity
le
v
el
b
in
d
s
th
e
tier
2
an
d
3
o
f
in
d
u
s
tr
y
o
p
e
r
atio
n
,
c
o
n
tr
o
l
a
n
d
m
a
n
ag
em
e
n
t.
I
t
e
n
s
u
r
es
d
ata
p
r
iv
ac
y
,
an
d
ap
p
r
o
p
r
iate
ex
ec
u
tio
n
o
f
FC
S
d
ev
ice
o
p
er
atio
n
.
I
n
g
en
e
r
al,
th
e
co
n
tr
ib
u
ti
o
n
o
f
th
is
p
a
p
er
is
th
e
in
teg
r
atio
n
o
f
clo
u
d
co
m
p
u
tin
g
s
er
v
ices
to
s
tr
en
g
th
en
t
h
e
lo
w
-
lev
el
s
ec
u
r
ity
m
ec
h
a
n
is
m
o
f
th
at
o
f
I
I
o
T
u
tili
zin
g
th
e
3
-
tier
d
ata
m
o
d
el
co
n
ce
p
ts
.
4.
E
XP
E
R
I
M
E
N
T
A
L
SE
T
-
UP
AND
RE
SUL
T
S
4
.
1
.
P
la
t
f
o
rm
deplo
y
m
ent
,
a
pp
lica
t
io
n a
nd
net
wo
rk
s
ce
na
rio
T
h
is
p
ap
er
p
r
o
p
o
s
es
th
e
clo
u
d
-
b
ased
3
-
tier
d
ata
s
ec
u
r
ity
f
r
a
m
ewo
r
k
f
o
r
I
I
o
T
.
On
th
is
,
a
p
o
wer
p
lan
t
s
y
s
tem
au
to
m
atio
n
an
d
m
an
a
g
em
en
t
s
y
s
tem
was
u
s
ed
as
a
n
ex
p
er
im
en
tal
s
et
-
u
p
.
Fig
u
r
e
4
is
t
h
e
o
p
er
atio
n
al
s
ch
em
a
o
f
th
e
s
aid
s
y
s
tem
.
I
n
p
ar
ti
cu
lar
,
th
e
ap
p
licatio
n
s
ce
n
ar
io
is
d
iv
id
ed
in
to
two
lev
el
-
(
1
)
th
e
DAS
s
y
s
tem
s
er
v
ices
an
d
(
2
)
th
e
p
o
wer
p
la
n
t
clo
u
d
-
b
ased
s
er
v
ic
es.
T
ak
e
n
o
te
th
at
s
ec
u
r
ity
s
er
v
ices
ar
e
tied
-
u
p
to
th
e
s
er
v
ice
f
u
n
ctio
n
s
o
f
ea
c
h
f
u
n
ctio
n
al
lev
el
o
f
p
o
wer
p
lan
t
o
p
er
atio
n
.
T
h
e
p
o
wer
p
lan
t
s
y
s
tem
a
u
to
m
atio
n
is
an
ex
am
p
le
o
f
an
I
I
o
T
.
Fig
u
r
e
4
en
s
u
r
es
an
a
p
p
r
o
p
r
iate
au
to
m
ated
FC
S
d
ev
ice
co
n
tr
o
l
an
d
o
p
e
r
atio
n
.
FC
S
d
ev
ice
ar
e
s
en
s
o
r
s
an
d
ac
tu
ato
r
s
.
I
ts
m
ain
f
u
n
ctio
n
s
ar
e
to
co
llect
d
ata
(
s
en
s
o
r
s
)
n
ec
e
s
s
ar
y
as
an
in
p
u
t
f
o
r
a
n
au
to
m
at
ed
o
p
e
r
atio
n
an
d
th
e
ex
ec
u
tio
n
o
f
f
u
n
ctio
n
/o
p
er
atio
n
(
ac
tu
ato
r
s
)
.
Data
co
llected
ar
e
tr
an
s
m
itted
to
th
e
g
atew
ay
f
o
r
p
r
o
ce
s
s
in
g
v
ia
a
lo
w
-
p
o
we
r
wid
e
ar
ea
ac
ce
s
s
n
etwo
r
k
(
L
P
W
AN)
tech
n
o
lo
g
y
em
b
ed
d
e
d
as c
o
m
p
o
n
e
n
t o
f
a
n
FC
S d
ev
ice.
On
th
e
o
th
er
h
a
n
d
,
th
e
DAS
a
n
d
clo
u
d
s
er
v
ices
ar
e
b
o
t
h
a
p
p
licatio
n
p
r
o
g
r
am
s
.
DAS
s
er
v
ic
es
in
v
o
lv
e
tr
an
s
ac
tio
n
q
u
eu
e
m
an
a
g
em
en
t
(
in
ca
s
es
to
wh
ich
m
o
r
e
th
an
o
n
e
FC
S
d
ev
ices
r
eq
u
est
s
er
v
ice
co
n
n
ec
tio
n
in
a
p
ar
ticu
lar
p
er
i
o
d
o
f
tim
e)
.
H
o
wev
er
,
o
n
th
is
p
ar
ticu
lar
s
tu
d
y
,
a
s
im
p
le
f
ir
s
t
-
co
m
e
,
f
ir
s
t
-
s
er
v
e
(
FC
FS
)
q
u
eu
e
m
o
d
el
is
u
s
ed
.
Fu
r
th
er
,
o
n
e
o
f
th
e
m
aj
o
r
f
u
n
ctio
n
alities
o
f
DAS
is
to
d
ir
ec
tly
co
n
tr
o
l
t
h
e
o
p
er
atio
n
o
f
FC
S
d
ev
ices
it
is
th
e
o
n
e
th
at
is
s
u
es
tr
ig
g
er
s
ig
n
al.
W
h
er
ea
s
,
clo
u
d
s
er
v
ices
ar
e
E
R
P
-
b
ased
s
y
s
tem
.
Ser
v
ices
in
clu
d
e
d
ata
m
a
n
ag
e
m
en
t
an
d
g
en
er
al
p
lan
t
o
p
er
atio
n
m
an
ag
em
en
t.
E
R
P
p
er
f
o
r
m
s
d
ata
p
r
o
ce
s
s
in
g
.
I
t
n
o
tifie
s
DAS
to
i
s
s
u
e
tr
ig
g
er
s
ig
n
als
t
o
ex
ec
u
te
p
ar
ticu
lar
FC
S
d
ev
ice
o
p
er
atio
n
s
.
Secu
r
ity
f
u
n
ct
io
n
s
an
d
p
r
o
ce
s
s
es
ar
e
in
teg
r
ated
as p
a
r
t o
f
t
h
e
D
AS a
n
d
C
lo
u
d
s
er
v
ices d
ef
in
e
d
in
Fig
u
r
e
2
an
d
Fig
u
r
e
4
.
Fig
u
r
e
4
.
Ap
p
licatio
n
an
d
n
et
wo
r
k
s
ce
n
ar
io
4
.
2
.
Securit
y
pro
ce
du
ra
l pr
o
ce
s
s
es a
nd
ex
perim
ent
a
l r
es
ults
I
n
th
e
ex
p
er
im
en
tal
s
et
-
u
p
th
e
FC
S
d
ev
ice
is
tied
-
u
p
to
th
e
DAS.
I
n
o
th
er
wo
r
d
s
,
FC
S
d
ev
ices
ar
e
p
air
ed
u
p
s
u
cc
ess
f
u
lly
b
y
th
e
co
m
m
u
n
icatio
n
ca
p
a
b
ilit
y
o
f
L
PW
AN.
Pair
in
g
b
ec
o
m
es
s
u
cc
ess
f
u
l
wh
en
DAS
-
g
atew
ay
is
s
u
es
an
ac
k
n
o
wled
g
e
s
ig
n
al
to
th
e
d
ev
ice.
Af
ter
wh
ich
FC
S
d
ev
ice
will
s
en
d
its
id
en
tific
atio
n
a
n
d
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
d
o
n
esian
J
E
lec
E
n
g
&
C
o
m
p
Sci
I
SS
N:
2502
-
4
7
5
2
A
clo
u
d
b
a
s
ed
3
-
tier
d
a
ta
s
ec
u
r
ity
fr
a
me
w
o
r
k
fo
r
in
d
u
s
tr
ia
l i
n
tern
et
o
f th
in
g
s
(
Mir
a
d
o
r
G.
La
b
r
a
d
o
r
)
785
th
e
ass
o
ciate
d
d
ata/r
eq
u
est
o
p
er
atio
n
s
.
DAS
will
p
er
f
o
r
m
d
ev
ice
I
D
v
e
r
if
icatio
n
an
d
au
t
h
o
r
izatio
n
.
I
n
o
th
e
r
wo
r
d
s
,
DAS
p
er
f
o
r
m
s
th
e
f
ir
s
t
lev
el
s
ec
u
r
ity
ch
ec
k
.
On
ce
v
er
if
ied
,
DAS
will
f
o
r
war
d
th
e
au
th
o
r
izat
io
n
r
eq
u
est
an
d
its
I
D
to
th
e
clo
u
d
s
er
v
er
.
C
lo
u
d
se
r
v
er
p
er
f
o
r
m
s
th
e
s
ec
o
n
d
-
lev
el
s
ec
u
r
ity
ch
ec
k
b
y
v
alid
atin
g
DAS
id
en
tific
atio
n
an
d
d
ev
ic
e
o
p
er
atio
n
r
eq
u
est.
C
lo
u
d
will
p
er
m
it
o
r
r
estrict
r
eq
u
est
o
p
er
atio
n
s
.
Fig
u
r
e
5
s
h
o
ws
th
e
ac
tu
al
a
p
p
licatio
n
p
r
o
g
r
a
m
o
p
er
atio
n
f
o
r
DAS
s
ec
u
r
ity
v
e
r
if
icatio
n
p
r
o
ce
s
s
w
h
ile
Fig
u
r
e
6
s
h
o
ws
clo
u
d
s
er
v
er
s
u
cc
ess
f
u
l lin
e
s
ec
u
r
ity
v
er
if
icatio
n
p
r
o
ce
d
u
r
e.
Fig
u
r
e
5
.
DAS
FC
S v
er
if
icatio
n
p
r
o
ce
s
s
Fig
u
r
e
6
.
C
lo
u
d
s
er
v
er
s
u
cc
ess
f
u
l secu
r
ity
v
e
r
if
icatio
n
As
in
d
icate
d
in
Fig
u
r
e
6
,
w
h
en
a
s
u
cc
ess
f
u
l
FC
S
d
ev
ice
r
eq
u
est
v
er
if
icatio
n
is
s
u
cc
e
s
s
f
u
l,
lin
e
in
d
icato
r
ch
a
n
g
es
co
lo
r
f
r
o
m
g
r
ee
n
to
r
ed
in
d
icatin
g
th
at
th
e
co
n
n
ec
tio
n
f
r
o
m
FC
S
d
ev
ice
an
d
c
lo
u
d
s
er
v
er
co
n
tr
o
l
is
estab
lis
h
ed
.
Als
o
,
d
etailed
FC
S
d
ev
ice
in
f
o
r
m
atio
n
,
p
r
o
p
er
ties
an
d
ad
d
itio
n
al
c
o
n
tr
o
l
ar
e
in
d
icate
d
in
th
e
n
ew
win
d
o
w.
On
t
h
e
o
th
er
h
an
d
,
it
is
t
o
b
e
u
n
d
er
s
co
r
ed
th
at
th
e
2
-
lev
el
s
ec
u
r
ity
m
ec
h
an
is
m
b
ased
o
n
3
-
tier
d
ata
f
r
am
ewo
r
k
o
f
I
I
o
T
co
u
ld
b
e
in
f
lu
en
ce
d
b
y
f
e
w
m
etr
ics
s
u
ch
as
th
e
d
is
tan
ce
b
etwe
e
n
th
e
FC
S
d
ev
ice
an
d
th
e
DAS.
Hen
ce
,
th
er
e
ar
e
f
ac
to
r
s
th
at
will
d
eter
m
in
e
th
e
ef
f
icien
cy
o
f
th
e
p
r
o
p
o
s
ed
m
o
d
el.
T
h
is
in
clu
d
es
FC
S
d
ev
ice
ac
tiv
e
ti
m
e,
p
ac
k
et
tr
a
n
s
m
is
s
io
n
r
atio
,
an
d
p
ac
k
et
ar
r
iv
al
r
ate.
Pack
e
t
tr
an
s
m
is
s
io
n
r
atio
is
d
ef
in
ed
as
t
h
e
p
r
o
d
u
ct
o
f
th
e
FC
S
d
ev
ice
ac
tiv
e
tim
e
an
d
p
ac
k
et
ar
r
iv
al
tim
e.
T
h
u
s
,
p
r
o
p
o
s
ed
m
o
d
el
p
er
f
o
r
m
an
ce
d
e
p
en
d
s
o
n
th
e
s
aid
p
ar
am
eter
s
.
E
x
p
er
im
en
tal
r
esu
lts
o
f
th
e
p
r
o
p
o
s
ed
f
r
am
ewo
r
k
u
tili
zin
g
th
e
s
es
s
io
n
in
itiatio
n
p
r
o
to
co
l
(
SIP)
ap
p
ea
r
th
at
FC
S
d
ev
ices
(
wir
ele
s
s
s
en
s
o
r
s
)
tak
e
ad
v
an
tag
e
o
f
t
h
e
ap
p
licatio
n
lay
er
s
ig
n
ali
n
g
to
p
r
o
v
id
e
DAS
f
u
n
ctio
n
ality
.
I
ts
s
ig
n
alin
g
s
u
f
f
er
s
f
o
r
a
d
d
itio
n
al
d
elay
d
u
e
to
p
r
o
ce
s
s
in
g
d
elay
at
th
e
ap
p
licatio
n
lay
er
h
an
d
o
f
f
.
Fig
u
r
e
7
illu
s
tr
ates
t
h
e
ass
o
ciate
d
ca
ll
f
lo
ws
d
u
r
in
g
a
FC
S
d
ev
ice
h
an
d
o
f
f
in
th
e
n
etwo
r
k
.
T
ab
le
1
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
5
0
2
-
4
7
5
2
I
n
d
o
n
esian
J
E
lec
E
n
g
&
C
o
m
p
Sci,
Vo
l.
2
4
,
No
.
2
,
No
v
em
b
er
20
21
:
7
8
0
-
788
786
s
h
o
ws
th
e
ex
p
er
im
en
tal
r
esu
lts
in
v
o
lv
in
g
h
an
d
o
f
f
d
elay
f
o
r
SIP
as
r
ep
o
r
ted
in
[
2
4
]
.
T
h
e
h
an
d
o
f
f
ca
s
es
r
ep
r
esen
t
th
e
m
o
v
em
en
t
f
r
o
m
FC
S
d
ev
ice
to
DAS
to
clo
u
d
s
y
s
tem
.
I
t
s
h
o
ws
th
at
th
e
d
el
ay
ass
o
ciate
d
with
s
ig
n
alin
g
an
d
clo
u
d
f
o
r
t
wo
c
ases
with
an
d
with
o
u
t
d
u
p
lica
te
ad
d
r
ess
d
etec
tio
n
.
SIP
-
b
ased
m
o
b
ilit
y
ap
p
ea
r
s
to
s
u
f
f
er
b
e
ca
u
s
e
o
f
a
p
p
licatio
n
lay
er
p
r
o
ce
s
s
in
g
.
Fig
u
r
e
7
.
C
lo
u
d
s
er
v
er
s
u
cc
ess
f
u
l secu
r
ity
v
e
r
if
icatio
n
T
ab
le
1
.
Sam
p
le
h
an
d
o
f
f
d
elay
H
a
n
d
o
f
f
C
a
s
e
S
i
g
n
a
l
i
n
g
(
ms)
M
e
d
i
a
(
ms)
S
I
P
(
D
A
D
)
S
I
P
(
N
D
A
D
)
S
I
P
(
D
A
D
)
S
I
P
(
N
D
A
D
)
H
1
2
3
8
1
9
1
6
7
.
1
3
8
6
1
4
1
5
.
8
H
2
3
3
9
2
4
1
5
5
.
6
4
1
8
0
,
7
4
1
1
.
6
H
3
1
1
9
3
4
.
7
1
5
4
.
1
1
9
3
1
,
4
4
0
4
.
4
4.
3
.
F
ea
t
ure
o
f
t
he
po
wer
pla
nt
a
uto
m
a
t
io
n
m
a
na
g
e
m
ent
a
nd
co
ntr
o
l sy
s
t
em
T
h
e
p
o
wer
p
lan
t
a
u
to
m
atio
n
an
d
m
an
a
g
em
en
t
s
y
s
tem
a
s
im
p
le
au
to
m
atio
n
co
n
tr
o
l
s
y
s
tem
is
an
ex
p
an
d
e
d
an
d
u
p
g
r
a
d
ed
v
e
r
s
io
n
o
f
th
e
d
e
v
elo
p
e
d
s
y
s
tem
in
d
icate
d
in
[
2
5
]
wh
ich
h
as
b
ee
n
p
u
r
p
o
s
iv
ely
u
tili
ze
d
f
o
r
p
u
r
p
o
s
es
o
f
s
im
u
latin
g
th
e
p
r
o
p
o
s
ed
s
ec
u
r
ity
f
r
am
ewo
r
k
.
T
h
e
s
y
s
tem
co
m
p
r
i
s
es
o
f
th
e
d
if
f
er
en
t
co
m
p
o
n
en
ts
an
d
m
o
d
u
les
n
ec
e
s
s
ar
y
in
th
e
ex
ec
u
tio
n
o
f
its
o
p
er
atio
n
as
im
p
lied
in
F
ig
u
r
e
6
.
c
r
itical
to
th
is
ar
e
th
e
FC
S
d
ev
ices.
T
h
is
is
b
e
ca
u
s
e
FC
S
d
ev
ices
ar
e
to
b
e
d
ev
elo
p
e
d
/co
n
s
tr
u
cted
b
o
th
with
h
ar
d
war
e
an
d
s
o
f
twar
e
co
m
p
o
n
en
ts
.
Har
d
w
ar
e
co
m
p
o
n
en
ts
in
clu
d
es
th
e
in
teg
r
atio
n
o
f
L
PW
AN,
s
en
s
o
r
s
,
ac
tu
ato
r
s
an
d
a
m
icr
o
p
r
o
ce
s
s
o
r
/
m
icr
o
co
n
tr
o
ller
(
p
r
e
-
p
r
o
ce
s
s
in
g
c
o
m
p
o
n
en
t
)
.
I
n
p
ar
ticu
lar
,
an
AL
T
1
2
5
0
NB
-
I
o
T
ch
ip
s
et
was
u
s
ed
as
wir
el
ess
co
m
m
u
n
icatio
n
m
o
d
u
le,
a
PIC3
2
M
X
as
m
icr
o
co
n
tr
o
ller
c
h
ip
s
et,
an
d
s
p
ec
if
ic
s
en
s
o
r
s
/actu
ato
r
s
(
b
ased
o
n
f
u
n
ctio
n
s
)
am
o
n
g
o
th
er
s
.
T
h
e
FC
S
d
ev
ices
ar
e
v
ir
t
u
ally
-
co
n
n
ec
ted
to
th
e
au
to
m
atio
n
a
n
d
c
o
n
tr
o
l
m
an
a
g
em
en
t
s
o
f
twar
e
as
d
ep
lo
y
ed
s
ep
ar
ately
o
n
DAS
an
d
cl
o
u
d
s
er
v
er
.
At
th
e
cl
o
u
d
s
er
v
er
is
th
e
o
v
er
-
all
p
o
wer
p
l
an
t
co
n
tr
o
l
an
d
m
an
ag
em
e
n
t
wh
ile
o
n
th
e
DAS
is
th
e
FC
S
d
ev
ice
d
ir
ec
t
co
n
tr
o
l
an
d
m
an
a
g
em
en
t.
T
h
er
e
ar
e
two
m
ec
h
an
is
m
s
to
wh
ich
th
e
p
o
wer
p
lan
t
o
p
er
a
tio
n
ca
n
b
e
c
o
n
tr
o
lled
.
First
is
th
e
FC
S
d
ev
ice
d
r
iv
e
n
o
p
er
ati
o
n
.
On
t
h
is
m
ec
h
an
is
m
,
th
e
FC
S
d
ev
ice
in
v
o
k
e
an
i
n
ter
r
u
p
t
s
ig
n
al
to
th
e
DAS.
I
n
ter
r
u
p
t
s
ig
n
als
is
b
ased
o
n
th
e
cu
r
r
en
t
s
tatu
s
o
f
o
p
er
atio
n
(
i.e
.
if
s
e
n
s
o
r
s
wer
e
ab
le
to
d
etec
t/co
llect
d
ata
th
at
is
n
o
t
with
in
th
e
p
r
eset
s
tan
d
ar
d
)
.
W
h
en
in
ter
r
u
p
t
s
ig
n
al
is
b
ein
g
r
ec
eiv
e
d
b
y
DAS,
it
will
es
tab
lis
h
co
n
n
ec
tio
n
to
th
e
clo
u
d
s
er
v
er
f
o
r
d
ata
an
aly
s
is
.
R
esu
lt
s
o
f
d
ata
a
n
aly
s
is
wo
u
ld
th
en
b
e
th
e
b
asis
f
o
r
an
a
u
to
m
ated
o
p
er
atio
n
(
i.e
.
au
to
m
atic
s
h
u
td
o
wn
o
f
F
C
S
d
ev
ice,
an
d
ac
tiv
a
tio
n
o
f
ce
r
tain
o
p
e
r
atio
n
s
)
.
S
ec
o
n
d
is
th
e
m
a
n
ag
em
e
n
t
-
co
n
tr
o
lled
o
p
er
atio
n
wh
er
ein
th
e
au
th
o
r
ized
p
er
s
o
n
n
el
m
ay
en
ab
le
ac
tiv
atio
n
/d
ea
ctiv
at
io
n
o
f
ce
r
tain
FC
S
d
ev
ices
an
d
/
o
r
p
r
o
ce
s
s
es
b
ase
d
o
n
th
e
in
f
o
r
m
atio
n
d
is
p
lay
ed
in
th
e
in
ter
f
ac
e
m
an
a
g
em
en
t
s
y
s
tem
s
o
f
twar
e.
Fig
u
r
e
8
is
th
e
s
am
p
le
ap
p
licatio
n
p
r
o
g
r
am
in
ter
f
ac
e
at
th
e
clo
u
d
s
er
v
e
r
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
d
o
n
esian
J
E
lec
E
n
g
&
C
o
m
p
Sci
I
SS
N:
2502
-
4
7
5
2
A
clo
u
d
b
a
s
ed
3
-
tier
d
a
ta
s
ec
u
r
ity
fr
a
me
w
o
r
k
fo
r
in
d
u
s
tr
ia
l i
n
tern
et
o
f th
in
g
s
(
Mir
a
d
o
r
G.
La
b
r
a
d
o
r
)
787
Fig
u
r
e
8
.
C
lo
u
d
s
er
v
er
a
u
to
m
a
tio
n
co
n
tr
o
l
5.
CO
NCLU
SI
O
N
T
h
is
p
ap
er
p
r
o
p
o
s
es
a
clo
u
d
-
b
ased
3
-
tier
s
ec
u
r
ity
s
o
lu
tio
n
f
o
r
I
I
o
T
.
T
h
e
ap
p
r
o
ac
h
was
b
ased
o
n
th
e
co
m
p
lem
en
tin
g
f
ea
tu
r
es
o
f
b
o
th
th
e
3
-
tier
d
ata
m
o
d
el
an
d
th
at
o
f
th
e
3
-
le
v
el
in
tellig
en
t
m
an
u
f
ac
tu
r
in
g
p
r
o
ce
s
s
es
o
f
an
in
d
u
s
tr
y
.
T
h
e
p
r
o
p
o
s
ed
f
r
am
ewo
r
k
estab
lis
h
ed
a
2
-
lev
el
s
ec
u
r
ity
v
er
if
icatio
n
p
r
o
ce
s
s
es
im
p
lem
en
ted
v
ia
th
e
lo
ca
lize
d
s
er
v
er
f
u
n
ctio
n
in
g
as
d
ata
ac
q
u
is
itio
n
g
atew
ay
an
d
th
at
o
f
th
e
clo
u
d
s
er
v
e
r
.
T
h
e
p
r
o
p
o
s
ed
s
ec
u
r
ity
f
r
am
e
wo
r
k
h
as
b
ee
n
v
alid
ated
as
it
is
b
ein
g
test
ed
in
a
d
ev
el
o
p
ed
in
d
u
s
tr
y
-
lik
e
au
to
m
atio
n
s
y
s
tem
f
o
r
p
o
wer
p
lan
t
co
n
tr
o
l.
H
o
wev
er
,
th
e
s
t
u
d
y
d
o
es
n
o
t
in
cl
u
d
e
p
er
f
o
r
m
an
ce
an
aly
s
is
o
f
th
e
p
r
o
p
o
s
ed
m
o
d
el.
O
n
th
is
,
it
is
s
u
g
g
ested
th
at
a
co
m
p
r
eh
e
n
s
iv
e
p
er
f
o
r
m
a
n
ce
ev
alu
atio
n
is
to
b
e
u
n
d
er
ta
k
en
an
d
co
m
p
ar
ed
t
o
ex
is
tin
g
s
ec
u
r
ity
m
o
d
els
.
ACK
NO
WL
E
DG
E
M
E
NT
S
T
h
is
r
esear
ch
is
f
u
n
d
ed
b
y
th
e
Sam
ar
State
Un
iv
er
s
it
y
-
C
en
ter
f
o
r
E
n
g
in
ee
r
in
g
,
Scien
ce
an
d
T
ec
h
n
o
lo
g
y
&
I
n
n
o
v
atio
n
,
h
en
ce
d
u
e
r
ec
o
g
n
itio
n
an
d
ac
k
n
o
wled
g
e
m
en
t
is
b
ein
g
ac
c
o
r
d
ed
.
L
ik
ewise,
th
e
au
th
o
r
s
also
wis
h
es
to
ex
ten
d
g
r
atitu
d
e
to
Pro
f
.
Dr
.
W
eiy
an
Ho
u
o
f
Z
h
en
g
zh
o
u
Un
iv
er
s
ity
f
o
r
th
e
ex
p
er
tis
e
an
d
in
g
s
ig
h
ts
ac
co
r
d
ed
w
h
ich
lead
s
to
th
e
co
m
p
letio
n
o
f
th
e
s
tu
d
y
.
RE
F
E
R
E
NC
E
S
[1
]
Atlam
,
H.
F
.
,
Ale
n
e
z
i,
A.,
Al
h
a
r
th
i,
A.,
Walters
,
R.
J.,
a
n
d
Wi
ll
s,
G
.
B.
,
“
In
teg
ra
ti
o
n
o
f
c
lo
u
d
c
o
m
p
u
ti
n
g
with
in
tern
e
t
o
f
th
i
n
g
s:
c
h
a
ll
e
n
g
e
s
a
n
d
o
p
e
n
issu
e
s,
”
In
2
0
1
7
IEE
E
I
n
ter
n
a
ti
o
n
a
l
C
o
n
fer
e
n
c
e
o
n
I
n
te
rn
e
t
o
f
T
h
in
g
s
(iT
h
i
n
g
s)
a
n
d
IE
EE
Gr
e
e
n
Co
mp
u
ti
n
g
a
n
d
Co
mm
u
n
ica
ti
o
n
s
(Gr
e
e
n
Co
m)
a
n
d
IEE
E
Cy
b
e
r,
Ph
y
s
ica
l
a
n
d
S
o
c
ia
l
Co
mp
u
t
in
g
(CP
S
Co
m)
a
n
d
I
EE
E
S
ma
rt
Da
t
a
(
S
ma
rtDa
t
a
)
,
2
0
1
7
,
p
p
.
6
7
0
-
6
7
5
,
d
o
i:
1
0
.
1
1
0
9
/i
T
h
in
g
s
-
G
re
e
n
Co
m
-
CP
S
Co
m
-
S
m
a
rtDa
ta.2
0
1
7
.
1
0
5
.
[2
]
Kh
a
n
,
M
.
A.
a
n
d
S
a
lah
,
K.,
“
Io
T
se
c
u
rit
y
:
Re
v
iew
,
b
l
o
c
k
c
h
a
i
n
so
l
u
ti
o
n
s,
a
n
d
o
p
e
n
c
h
a
ll
e
n
g
e
s,
”
Fu
t
u
re
Ge
n
e
ra
ti
o
n
Co
mp
u
ter
S
y
ste
ms
,
v
o
l
82
,
p
p
.
395
-
4
1
1
,
d
o
i:
1
0
.
1
0
1
6
/
j.
fu
tu
re
.
2
0
1
7
.
1
1
.
0
2
2
.
[3
]
M
in
o
l
i,
D
.
a
n
d
Oc
c
h
i
o
g
r
o
ss
o
,
B
.
,
“
Blo
c
k
c
h
a
i
n
m
e
c
h
a
n
ism
s
fo
r
Io
T
se
c
u
rit
y
,
”
In
ter
n
e
t
o
f
T
h
in
g
s
,
v
o
l.
1
-
2
,
p
p
.
1
-
13
,
2
0
1
8
,
d
o
i:
1
0
.
1
0
1
6
/
j.
i
o
t.
2
0
1
8
.
0
5
.
0
0
2
.
[4
]
Lab
ra
d
o
r,
M
.
a
n
d
Ho
u
,
W.
,
“
S
e
c
u
rit
y
M
e
c
h
a
n
ism
fo
r
Ve
h
icle
Id
e
n
ti
fica
ti
o
n
a
n
d
Tran
sa
c
ti
o
n
Au
t
h
e
n
ti
c
a
ti
o
n
i
n
th
e
In
tern
e
t
o
f
Ve
h
icle
(Io
V)
S
c
e
n
a
rio
:
A
Blo
c
k
c
h
a
in
Ba
se
d
M
o
d
e
l,
”
J
o
u
rn
a
l
o
f
Co
m
p
u
ter
S
c
ien
c
e
,
v
o
l.
1
5
,
n
o
.
2
,
p
p
.
2
4
9
-
2
5
7
,
2
0
1
9
,
d
o
i
:
1
0
.
3
8
4
4
/
j
c
ss
p
.
2
0
1
9
.
2
4
9
.
2
5
7
.
[5
]
Lo
h
a
c
h
a
b
,
A.,
“
ECC
b
a
se
d
i
n
ter
-
d
e
v
ice
a
u
t
h
e
n
ti
c
a
ti
o
n
a
n
d
a
u
th
o
ri
z
a
ti
o
n
sc
h
e
m
e
u
si
n
g
M
QTT
fo
r
I
o
T
n
e
two
rk
s
,
”
J
o
u
rn
a
l
o
f
In
fo
rm
a
ti
o
n
S
e
c
u
rity
a
n
d
A
p
p
li
c
a
ti
o
n
s
,
v
o
l
.
46
,
p
p
.
1
-
12
,
2
0
1
9
,
d
o
i:
1
0
.
1
0
1
6
/j
.
ji
sa
.
2
0
1
9
.
0
2
.
0
0
5
.
[6
]
Ya
n
,
H.,
Wan
g
,
Y
.
,
Jia
,
C
.
,
Li
,
J.,
Xia
n
g
,
Y.,
a
n
d
P
e
d
ry
c
z
,
W
.
,
“
Io
T
-
F
BAC:
F
u
n
c
ti
o
n
-
b
a
se
d
a
c
c
e
ss
c
o
n
tro
l
sc
h
e
m
e
u
sin
g
id
e
n
ti
t
y
-
b
a
se
d
e
n
c
r
y
p
ti
o
n
in
I
o
T,
”
F
u
t
u
re
Ge
n
e
ra
ti
o
n
C
o
mp
u
ter
S
y
ste
ms
,
v
o
l.
95
,
p
p
.
344
-
3
5
3
,
2
0
1
9
,
d
o
i:
1
0
.
1
0
1
6
/j
.
f
u
t
u
re
.
2
0
1
8
.
1
2
.
0
6
1
.
[7
]
Kâ
a
fa
r,
M
.
A.,
Be
n
a
z
z
o
u
z
,
L.
,
Ka
m
o
u
n
,
F
.
,
a
n
d
M
a
les
,
D.,
“
A
Ke
rb
e
ro
s
-
b
a
se
d
a
u
t
h
e
n
ti
c
a
ti
o
n
a
rc
h
it
e
c
tu
re
fo
r
Wi
re
les
s
Lan
s,
”
In
I
n
ter
n
a
ti
o
n
a
l
Co
n
fer
e
n
c
e
o
n
Res
e
a
rc
h
i
n
Ne
tw
o
rk
in
g
,
2
0
0
4
,
p
p
.
1
3
4
4
-
1
3
5
3
,
d
o
i:
1
0
.
1
0
0
7
/
9
7
8
-
3
-
540
-
2
4
6
9
3
-
0
_
1
1
7
.
[8
]
S
h
re
sth
a
,
A.
P
.
,
Ch
o
i,
D.
Y
.
,
Kw
o
n
,
G
.
R.
,
a
n
d
Ha
n
,
S
.
J.
,
“
Ke
rb
e
ro
s
b
a
se
d
a
u
th
e
n
ti
c
a
ti
o
n
fo
r
in
ter
-
d
o
m
a
in
ro
a
m
in
g
in
wire
les
s
h
e
ter
o
g
e
n
e
o
u
s
n
e
two
rk
,
”
Co
m
p
u
ter
s
&
M
a
th
e
ma
t
ics
wit
h
Ap
p
li
c
a
ti
o
n
s
,
v
o
l.
60
,
n
o
.
2
,
p
p
.
2
4
5
-
2
5
5
,
2
0
1
0
,
d
o
i:
1
0
.
1
0
1
6
/
j.
c
a
m
wa
.
2
0
1
0
.
0
1
.
0
1
9
.
[9
]
Be
rsa
n
i
F
.
a
n
d
Tsc
h
o
fe
n
ig
H.,
“
T
h
e
EAP
-
P
S
K
p
r
o
to
c
o
l:
A
p
re
-
sh
a
re
d
k
e
y
e
x
ten
si
b
le
a
u
th
e
n
t
ica
ti
o
n
p
ro
t
o
c
o
l
(EAP
)
m
e
th
o
d
,
”
R
FC
4
7
6
4
,
2
0
0
7
,
d
o
i:
1
0
.
1
7
4
8
7
/R
F
C4
7
6
4
.
[1
0
]
Clan
c
y
T
,
a
n
d
Tsc
h
o
fe
n
ig
H.,
“
Ex
ten
si
b
le
a
u
th
e
n
ti
c
a
ti
o
n
p
ro
t
o
c
o
l
g
e
n
e
ra
li
z
e
d
p
re
-
sh
a
r
e
d
k
e
y
(EAP
-
G
P
S
K)
M
e
th
o
d
,
”
RF
C
5
4
3
3
,
2
0
0
9
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
5
0
2
-
4
7
5
2
I
n
d
o
n
esian
J
E
lec
E
n
g
&
C
o
m
p
Sci,
Vo
l.
2
4
,
No
.
2
,
No
v
em
b
er
20
21
:
7
8
0
-
788
788
[1
1
]
G
ra
n
lu
n
d
D.
,
A
n
d
e
rso
n
K.
,
E
lk
o
to
b
M.
a
n
d
Ah
l
u
n
d
C.
,
"
A
u
n
i
fo
rm
AA
A
h
a
n
d
l
in
g
sc
h
e
m
e
fo
r
h
e
tero
g
e
n
e
o
u
s
n
e
two
rk
i
n
g
e
n
v
iro
n
m
e
n
ts,
"
2
0
0
9
IEE
E
3
4
th
Co
n
fer
e
n
c
e
o
n
L
o
c
a
l
C
o
mp
u
ter
Ne
two
rk
s,
2
0
0
9
,
p
p
.
6
8
3
-
6
8
7
,
d
o
i:
1
0
.
1
1
0
9
/L
CN.
2
0
0
9
.
5
3
5
5
0
5
9
.
[1
2
]
Zh
a
n
g
D.
,
F
re
d
Wan
g
F.
,
B
u
rg
o
s
R.
,
a
n
d
B
o
ro
y
e
v
ich
D.
,
"
C
o
m
m
o
n
-
M
o
d
e
Circ
u
latin
g
Cu
rre
n
t
Co
n
tr
o
l
o
f
P
a
ra
ll
e
led
In
terle
a
v
e
d
T
h
re
e
-
P
h
a
se
Two
-
Lev
e
l
Vo
l
tag
e
-
S
o
u
rc
e
Co
n
v
e
rters
Wi
th
Disc
o
n
t
i
n
u
o
u
s
S
p
a
c
e
Ve
c
to
r
M
o
d
u
lat
io
n
,
"
in
I
EE
E
T
ra
n
sa
c
ti
o
n
s
o
n
Po
w
e
r
El
e
c
to
rn
ic
s,
v
o
l.
2
6
,
n
o
.
1
2
,
p
p
.
3
9
2
5
-
3
9
3
5
,
De
c
.
2
0
1
1
,
d
o
i:
1
0
.
1
1
0
9
/
TP
EL
.
2
0
1
1
.
2
1
3
1
6
8
1
.
[1
3
]
Io
T
S
e
c
u
rity
W
h
i
te
Pa
p
e
r:
Evo
lvin
g
S
e
c
u
rity
Arc
h
it
e
c
tu
r
e
(2
0
1
8
)
,
G
IV
2
0
2
5
.
[O
n
li
n
e
].
Av
a
li
a
b
le
:
h
tt
p
s:/
/www
.
h
u
a
we
i.
c
o
m
/min
isit
e
/g
iv
/e
n
/
.
[1
4
]
Ala
b
a
,
F
.
A.,
Oth
m
a
n
,
M
.
,
Ha
sh
e
m
,
I.
A.
T.
,
a
n
d
Alo
tai
b
i,
F
.
,
“
In
t
e
rn
e
t
o
f
Th
i
n
g
s
se
c
u
rit
y
:
A
su
r
v
e
y
,
”
J
o
u
rn
a
l
o
f
Ne
two
rk
a
n
d
Co
m
p
u
ter
A
p
p
l
ica
ti
o
n
s
,
v
o
l
.
88
,
p
p
.
10
-
28
,
2
0
1
7
,
d
o
i:
1
0
.
1
0
1
6
/j
.
j
n
c
a
.
2
0
1
7
.
0
4
.
0
0
2
.
[1
5
]
G
ra
n
jal,
J.,
M
o
n
teiro
,
E.
,
a
n
d
S
il
v
a
,
J.
S
.
,
“
S
e
c
u
r
it
y
fo
r
th
e
i
n
tern
e
t
o
f
t
h
in
g
s:
a
s
u
rv
e
y
o
f
e
x
isti
n
g
p
ro
to
c
o
ls
a
n
d
o
p
e
n
re
se
a
rc
h
issu
e
s,
”
IEE
E
C
o
mm
u
n
ica
ti
o
n
s
S
u
rv
e
y
s
&
T
u
t
o
ri
a
ls
,
v
o
l.
17
,
n
o
.
3
,
p
p
.
1
2
9
4
-
1
3
1
2
,
2
0
1
5
,
d
o
i:
1
0
.
1
1
0
9
/CO
M
S
T.
2
0
1
5
.
2
3
8
8
5
5
0
.
[1
6
]
Lab
ra
d
o
r,
M
.
,
a
n
d
H
o
u
,
W.
,
“
S
e
c
u
rit
y
M
e
c
h
a
n
ism
fo
r
Ve
h
icle
Id
e
n
ti
fica
ti
o
n
a
n
d
Tran
sa
c
ti
o
n
Au
t
h
e
n
ti
c
a
ti
o
n
in
th
e
In
tern
e
t
o
f
Ve
h
icle
(Io
V
)
S
c
e
n
a
rio
:
A
Bl
o
c
k
c
h
a
in
Ba
se
d
M
o
d
e
l,
”
J
o
u
rn
a
l
o
f
Co
m
p
u
ter
S
c
ie
n
c
e
,
v
o
l.
15
,
n
o
.
2
,
p
p
.
249
-
2
5
7
,
d
o
i
:
1
0
.
3
8
4
4
/
jcs
sp
.
2
0
1
9
.
2
4
9
.
2
5
7
.
[1
7
]
Aru
m
o
z
h
iy
a
l
y
R
.
a
n
d
Ba
sk
a
ra
n
K.
,
"
Im
p
lem
e
n
tatio
n
o
f
a
F
u
z
z
y
P
I
Co
n
tr
o
ll
e
r
fo
r
S
p
e
e
d
Co
n
tro
l
o
f
I
n
d
u
c
t
io
n
M
o
t
o
r
u
sin
g
F
P
G
A,"
J
o
u
rn
a
l
o
f
Po
we
r
El
e
c
tro
n
ic
s,
v
o
l.
1
0
,
n
o
.
1
,
p
p
.
6
5
-
7
1
,
d
o
i:
1
0
.
6
1
1
3
/J
P
E.
2
0
1
0
.
1
0
.
1
.
0
6
5
.
[1
8
]
S
a
h
m
im,
S
.
,
a
n
d
G
h
a
rse
ll
a
o
u
i,
H.
,
“
P
riv
a
c
y
a
n
d
se
c
u
ri
ty
i
n
i
n
tern
e
t
-
b
a
se
d
c
o
m
p
u
ti
n
g
:
c
l
o
u
d
c
o
m
p
u
ti
n
g
,
in
ter
n
e
t
o
f
th
i
n
g
s,
c
l
o
u
d
o
f
th
in
g
s:
a
re
v
iew
,
”
Pro
c
e
d
i
a
c
o
mp
u
ter
sc
i
e
n
c
e
,
v
o
l
.
1
1
2
,
p
p
.
1
5
1
6
-
1
5
2
2
,
2
0
1
7
,
d
o
i:
1
0
.
1
0
1
6
/
j.
p
r
o
c
s.2
0
1
7
.
0
8
.
0
5
0
.
[1
9
]
S
terg
io
u
,
C
.
,
P
sa
n
n
is,
K.
E.
,
Kim
,
B.
G
.
,
a
n
d
G
u
p
ta,
B.
,
“
S
e
c
u
re
i
n
teg
ra
t
io
n
o
f
I
o
T
a
n
d
c
lo
u
d
c
o
m
p
u
ti
n
g
,
”
Fu
tu
re
Ge
n
e
ra
ti
o
n
Co
mp
u
ter
S
y
ste
ms
,
v
o
l.
78
,
p
p
.
9
6
4
-
9
7
5
,
2
0
1
8
,
d
o
i:
1
0
.
1
0
1
6
/
j.
fu
t
u
re
.
2
0
1
6
.
1
1
.
0
3
1
.
[2
0
]
S
h
a
rm
a
,
P
.
K.,
S
i
n
g
h
,
S
.
,
a
n
d
P
a
rk
,
J.
H
.
,
“
Op
Cl
o
u
d
S
e
c
:
o
p
e
n
c
lo
u
d
so
ftwa
re
d
e
fin
e
d
wire
les
s
n
e
tw
o
rk
se
c
u
rit
y
fo
r
th
e
In
ter
n
e
t
o
f
Th
i
n
g
s,
”
C
o
mp
u
ter
Co
mm
u
n
ica
ti
o
n
s
,
v
o
l.
1
2
2
,
p
p
.
1
-
8
,
2
0
1
8
,
d
o
i:
1
0
.
1
0
1
6
/
j.
c
o
m
c
o
m
.
2
0
1
8
.
0
3
.
0
0
8
.
[2
1
]
M
u
k
h
e
rjee
,
B.
,
e
t
a
l
.
,
“
F
lex
i
b
le
Io
T
se
c
u
rit
y
m
id
d
lew
a
re
fo
r
e
n
d
-
to
-
e
n
d
c
l
o
u
d
-
fo
g
c
o
m
m
u
n
ica
ti
o
n
,
”
F
u
tu
re
Ge
n
e
ra
ti
o
n
Co
mp
u
ter
S
y
ste
ms
,
v
o
l.
87
,
p
p
.
6
8
8
-
7
0
3
,
2
0
1
8
,
d
o
i:
1
0
.
1
0
1
6
/j
.
fu
t
u
re
.
2
0
1
7
.
1
2
.
0
3
1
.
[2
2
]
Bit
ten
c
o
u
r
t,
L
.
e
t
a
l
.
,
“
T
h
e
i
n
ter
n
e
t
o
f
t
h
in
g
s,
f
o
g
a
n
d
c
lo
u
d
c
o
n
ti
n
u
u
m
:
I
n
teg
ra
ti
o
n
a
n
d
c
h
a
ll
e
n
g
e
s,
”
In
ter
n
e
t
o
f
T
h
in
g
,
v
o
l.
3
-
4
,
p
p
.
1
3
4
-
1
5
5
,
2
0
1
8
,
d
o
i:
1
0
.
1
0
1
6
/j
.
io
t.
2
0
1
8
.
0
9
.
0
0
5
.
[2
3
]
Hu
ss
a
in
,
M
.
,
a
n
d
Be
g
,
M
.
M
.
,
“
F
o
g
Co
m
p
u
ti
n
g
f
o
r
In
tern
e
t
o
f
T
h
i
n
g
s
(I
o
T)
-
Ai
d
e
d
S
m
a
rt
G
rid
Arc
h
it
e
c
tu
re
s,
”
Bi
g
Da
ta
a
n
d
Co
g
n
it
ive
Co
mp
u
ti
n
g
,
v
o
l.
3
,
n
o
.
1
,
2
0
1
9
,
d
o
i:
1
0
.
1
0
1
6
/j
.
i
o
t.
2
0
1
8
.
0
9
.
0
0
5
.
[2
4
]
N.
Na
k
a
ji
m
a
,
A.
Du
tt
a
,
S
.
Da
s
a
n
d
H
.
S
c
h
u
lzrin
n
e
,
“
Ha
n
d
o
ff
De
lay
An
a
ly
sis
fo
r
S
IP
M
o
b
il
it
y
in
IP
v
6
Tes
tb
e
d
,
”
IEE
E
In
ter
n
a
ti
o
n
a
l
C
o
n
fer
e
n
c
e
o
n
Co
mm
u
n
ica
t
io
n
s
,
2
0
0
3
.
[2
5
]
Lab
ra
d
o
r,
M
irad
o
r
G
.
,
M
ig
u
e
l
L
o
re
n
z
D.
Tab
o
n
,
a
n
d
Al
-
Be
n
y
a
s
h
ier
M
.
S
a
h
h
i
b
a
l.
,
“
De
sig
n
a
n
d
De
v
e
lo
p
m
e
n
t
o
f
G
S
M
-
Co
n
tro
ll
e
d
El
e
c
tri
c
Co
n
su
m
p
ti
o
n
a
n
d
M
o
n
it
o
ri
n
g
S
y
ste
m
,
”
In
ter
n
a
ti
o
n
a
l
J
o
u
rn
a
l
o
f
E
lec
trica
l,
El
e
c
tro
n
ic
s
a
n
d
Co
m
p
u
ter
S
y
ste
ms
(IJ
EE
CS
)
,
v
o
l
.
1
6
,
n
o
.
2
,
2
0
1
3
.
Evaluation Warning : The document was created with Spire.PDF for Python.