T
E
L
K
O
M
N
I
K
A
T
elec
o
m
m
un
ica
t
io
n,
Co
m
pu
t
ing
,
E
lect
ro
nics
a
nd
Co
ntr
o
l
Vo
l.
1
9
,
No
.
4
,
A
u
g
u
s
t
2
0
2
1
,
p
p
.
1
1
7
7
~
1
1
8
4
I
SS
N:
1
6
9
3
-
6
9
3
0
,
ac
cr
ed
ited
First Gr
ad
e
b
y
Kem
en
r
is
tek
d
i
k
ti,
Dec
r
ee
No
: 2
1
/E/KPT
/2
0
1
8
DOI
: 1
0
.
1
2
9
2
8
/TE
L
KOM
NI
K
A.
v
1
9
i
4
.
1
8
4
6
4
1177
J
o
ur
na
l ho
m
ep
a
g
e
:
h
ttp
:
//jo
u
r
n
a
l.u
a
d
.
a
c.
id
/in
d
ex
.
p
h
p
/TELK
OM
N
I
K
A
Phys
ica
l cyber
-
se
curity a
lg
o
rithm
f
o
r wire
less
senso
r
net
wo
rks
Dhuh
a
Dhey
a
a
K
hu
dh
ur
1
,
M
ua
y
a
d Sa
dik
Cro
o
ck
2
1
Co
m
p
u
ter E
n
g
in
e
e
rin
g
De
p
a
rtm
e
n
t,
Un
i
v
e
rsity
o
f
Tec
h
n
o
l
o
g
y
,
B
a
g
h
d
a
d
,
Ira
q
2
Co
n
tr
o
l
a
n
d
S
y
ste
m
s E
n
g
in
e
e
rin
g
De
p
a
rtme
n
t,
U
n
iv
e
rsit
y
o
f
Tec
h
n
o
l
o
g
y
,
Ba
g
h
d
a
d
,
Ira
q
Art
icle
I
nfo
AB
S
T
RAC
T
A
r
ticle
his
to
r
y:
R
ec
eiv
ed
No
v
7
,
2
0
2
0
R
ev
is
ed
Ma
r
1
7
,
2
0
2
1
Acc
ep
ted
Ma
r
3
0
,
2
0
2
1
To
d
a
y
,
t
h
e
wire
les
s
se
n
so
r
n
e
tw
o
rk
(W
S
N)
p
lay
s
a
n
imp
o
rtan
t
r
o
le
i
n
o
u
r
d
a
il
y
li
fe
.
I
n
a
d
d
it
i
o
n
,
it
is
u
se
d
i
n
m
a
n
y
a
p
p
li
c
a
ti
o
n
s
su
c
h
a
s
m
il
it
a
ry
,
m
e
d
ica
l,
g
re
e
n
h
o
u
se
,
a
n
d
tran
s
p
o
rt.
Du
e
to
t
h
e
se
n
d
in
g
d
a
ta
b
e
twe
e
n
it
s
n
o
d
e
s
o
r
t
o
th
e
b
a
se
sta
ti
o
n
re
q
u
i
re
s
a
c
o
n
n
e
c
ti
o
n
li
n
k
,
th
e
se
n
so
r
n
o
d
e
s
c
a
n
b
e
e
x
p
o
se
d
t
o
th
e
m
a
n
y
a
tt
a
c
k
s
t
h
a
t
e
x
p
l
o
it
th
e
we
a
k
n
e
ss
e
s
o
f
t
h
e
n
e
two
rk
.
On
e
o
f
t
h
e
m
o
st
imp
o
rtan
t
t
y
p
e
s
o
f
th
e
se
a
tt
a
c
k
s
is
th
e
d
e
n
ial
o
f
se
rv
ice
(Do
S
).
Do
S
a
tt
a
c
k
e
x
h
a
u
sts
th
e
sy
ste
m
'
s
re
so
u
rc
e
s
th
a
t
lea
d
th
e
sy
ste
m
to
b
e
o
u
t
o
f
se
rv
ice
.
In
th
is
p
a
p
e
r,
a
c
y
b
e
r
-
se
c
u
rit
y
a
lg
o
rit
h
m
is
p
r
o
p
o
se
d
fo
r
p
h
y
sic
a
l
lev
e
l
o
f
W
S
N
th
a
t
a
d
o
p
ts
m
e
ss
a
g
e
q
u
e
u
in
g
tele
m
e
try
t
ra
n
sp
o
rt
(
M
QTT
)
p
r
o
to
c
o
l
f
o
r
d
a
ta
tra
n
sm
issio
n
a
n
d
n
e
two
r
k
in
g
.
Th
is
a
lg
o
rit
h
m
p
re
d
icts
t
h
e
Do
S
a
tt
a
c
k
s
a
t
t
h
e
fir
st
ti
m
e
o
f
h
a
p
p
e
n
i
n
g
t
o
b
e
iso
late
d
fr
o
m
th
e
WS
N.
It
i
n
c
lu
d
e
s
th
re
e
sta
g
e
s
o
f
d
e
tec
ti
n
g
th
e
a
tt
a
c
k
,
p
re
d
icti
n
g
t
h
e
e
ffe
c
ts
o
f
th
is
a
tt
a
c
k
a
n
d
p
re
v
e
n
ti
n
g
th
e
a
tt
a
c
k
s
b
y
e
x
c
lu
d
in
g
t
h
e
p
re
d
icte
d
n
o
d
e
s
fr
o
m
th
e
WS
N.
We
a
p
p
li
e
d
a
ty
p
e
o
f
D
o
S
a
tt
a
c
k
th
a
t
is
a
Do
S
in
jec
t
io
n
a
tt
a
c
k
(Do
S
IA)
o
n
th
e
n
e
two
r
k
p
ro
t
o
c
o
l.
T
h
e
p
ro
p
o
se
d
a
lg
o
r
it
h
m
is
tes
ted
b
y
a
d
o
p
t
in
g
t
h
re
e
c
a
se
stu
d
ies
to
c
o
v
e
r
th
e
m
o
st
c
o
m
m
o
n
c
a
se
s
o
f
a
t
tac
k
s.
Th
e
e
x
p
e
rime
n
t
re
su
lt
s
sh
o
w
th
e
s
u
p
e
rio
r
o
f
th
e
p
r
o
p
o
se
d
a
lg
o
rit
h
m
in
d
e
tec
ti
n
g
a
n
d
so
l
v
i
n
g
t
h
e
c
y
b
e
r
-
a
tt
a
c
k
s.
K
ey
w
o
r
d
s
:
C
y
b
er
-
s
ec
u
r
ity
D
o
S a
ttack
E
m
b
ed
d
e
d
s
y
s
tem
MQ
T
T
b
r
o
k
e
r
T
h
is i
s
a
n
o
p
e
n
a
c
c
e
ss
a
rticle
u
n
d
e
r
th
e
CC B
Y
-
SA
li
c
e
n
se
.
C
o
r
r
e
s
p
o
nd
ing
A
uth
o
r
:
Dh
u
h
a
Dh
ey
aa
Kh
u
d
h
u
r
Dep
ar
tm
en
t o
f
C
o
m
p
u
ter
E
n
g
i
n
ee
r
in
g
Un
iv
er
s
ity
o
f
T
ec
h
n
o
lo
g
y
Als
in
aa
Stre
et,
B
ag
h
d
ad
,
I
r
aq
E
m
ail:
ce
.
1
9
.
0
7
@
g
r
ad
.
u
o
tech
n
o
lo
g
y
.
ed
u
.
i
q
1.
I
NT
RO
D
UCT
I
O
N
T
h
e
tech
n
o
lo
g
y
o
f
wir
eless
s
e
n
s
o
r
n
etwo
r
k
(
W
SN
)
h
as
em
e
r
g
ed
as
a
s
u
itab
le
o
p
tio
n
to
co
v
er
m
a
n
y
g
r
o
u
n
d
b
r
ea
k
in
g
ac
tiv
ities
an
d
s
u
p
p
o
r
t
th
e
d
if
f
er
e
n
t
r
eq
u
ir
em
en
ts
o
f
o
u
r
d
aily
life
.
W
SN
is
a
lo
w
-
co
s
t
an
d
less
en
er
g
y
co
n
s
u
m
p
tio
n
wir
eless
n
etwo
r
k
th
at
is
d
esig
n
ed
f
r
o
m
th
o
u
s
an
d
s
o
f
in
tellig
en
t
s
en
s
o
r
n
etwo
r
k
s
.
T
h
ese
s
en
s
o
r
s
ar
e
s
en
s
in
g
th
e
m
an
y
d
if
f
er
en
t
p
a
r
am
eter
s
d
ep
e
n
d
i
n
g
o
n
th
e
b
ased
en
v
ir
o
n
m
e
n
t
r
eq
u
ir
em
e
n
ts
[
1
]
.
B
es
i
d
e
s
,
t
h
e
n
e
t
w
o
r
k
m
a
y
b
e
i
n
m
u
l
t
i
-
l
e
v
el
s
t
o
p
o
l
o
g
y
,
s
o
th
e
s
e
n
s
o
r
n
o
d
e
n
e
e
d
s
t
o
s
e
n
d
i
t
s
r
e
a
d
i
n
g
s
t
o
t
h
e
n
e
i
g
h
b
o
r
i
n
g
n
o
d
e
s
t
h
a
t
a
r
e
i
n
tu
r
n
t
o
s
e
n
d
t
h
e
r
e
c
e
i
v
e
d
d
a
t
a
t
o
a
n
o
t
h
e
r
n
o
d
e
u
n
t
i
l
i
t
r
e
a
c
h
es
t
h
e
d
e
s
i
r
e
d
p
l
a
ce
[
2
]
.
At
th
e
o
th
er
h
an
d
,
W
SN
is
wi
d
ely
u
s
ed
f
o
r
m
a
n
y
ap
p
licatio
n
s
s
u
ch
as
m
ilit
ar
y
[
3
]
,
m
ed
ic
al
ca
r
e
[
4
]
,
g
r
o
u
n
d
ea
r
th
q
u
ak
e
m
o
n
ito
r
in
g
[
5
]
,
s
m
ar
t
cities
[
6
]
,
g
r
ee
n
h
o
u
s
es
[
7
]
,
an
d
air
p
o
llu
tio
n
m
o
n
ito
r
in
g
[
8
]
.
T
h
ese
ap
p
licatio
n
s
ar
e
s
en
s
itiv
e
to
th
eir
d
ata
as
well
as
m
o
s
t
o
r
p
er
h
a
p
s
all
o
f
th
em
r
elate
to
p
eo
p
le'
s
liv
es.
T
h
er
ef
o
r
e,
s
ec
u
r
in
g
th
is
d
ata
an
d
its
co
n
f
id
en
tiality
a
g
ain
s
t
an
y
attac
k
er
w
h
o
in
te
r
ce
p
ts
i
t,
h
as
b
ec
o
m
e
v
er
y
im
p
o
r
ta
n
t.
No
r
m
ally
,
th
e
attac
k
er
tr
ies
to
ch
a
n
g
e
t
h
is
d
ata
o
r
m
o
n
o
p
o
lizes
s
o
m
e
n
etwo
r
k
n
o
d
es
to
f
ailed
d
ata
in
ject.
T
h
at
is
in
tu
r
n
lead
s
to
s
lo
w
d
o
wn
o
r
s
to
p
th
e
en
tire
n
etwo
r
k
.
T
h
e
r
ef
o
r
e,
th
e
n
etwo
r
k
m
u
s
t
b
e
s
ec
u
r
e
d
f
r
o
m
a
n
y
attac
k
e
r
s
o
r
u
n
au
t
h
o
r
ized
u
s
er
s
[
9
]
-
[
1
2
]
an
d
th
e
in
f
ec
ted
n
o
d
es
s
h
o
u
ld
b
e
i
s
o
lated
as
s
o
o
n
as
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
1
6
9
3
-
6
9
3
0
T
E
L
KOM
NI
KA
T
elec
o
m
m
u
n
C
o
m
p
u
t E
l Co
n
tr
o
l
,
Vo
l.
1
9
,
No
.
4
,
Au
g
u
s
t
2
0
2
1
:
1
1
7
7
-
1
1
8
4
1178
d
etec
ted
[
1
3
]
.
I
n
a
d
d
itio
n
,
th
e
r
e
ar
e
m
a
n
y
p
r
o
b
lem
s
f
ac
in
g
th
e
W
SN,
as
well
as
m
o
s
t
o
f
th
e
s
y
s
tem
s
in
o
u
r
r
ea
l
wo
r
ld
,
wh
ich
is
th
e
f
ailu
r
e
[
1
4
]
.
T
h
e
d
en
ial
o
f
s
er
v
ice
(
Do
S
)
attac
k
is
th
e
m
o
s
t
f
a
m
o
u
s
attac
k
th
at
is
f
ac
in
g
th
e
W
SN
in
cy
b
er
-
s
ec
u
r
ity
s
id
e.
T
h
is
attac
k
aim
s
to
t
ak
e
f
u
ll
ad
v
an
ta
g
e
o
f
wea
k
n
es
s
es
in
th
e
n
etwo
r
k
b
y
s
en
d
in
g
a
lo
t
o
f
u
n
n
ec
ess
ar
y
r
eq
u
ests
to
co
n
s
u
m
e
t
h
e
s
er
v
er
'
s
r
eso
u
r
ce
s
.
T
h
u
s
,
s
er
v
e
r
o
r
co
m
m
u
n
icatio
n
n
etwo
r
k
s
b
ec
o
m
e
u
n
a
b
le
to
d
e
liv
er
th
e
r
eq
u
ir
ed
s
er
v
ices [
1
5
]
-
[
1
8
]
.
D
u
e
t
o
t
h
e
i
m
p
o
r
t
a
n
ce
o
f
k
e
e
p
i
n
g
t
h
e
W
S
N
o
r
a
n
y
o
t
h
e
r
a
p
p
l
i
c
a
ti
o
n
s
f
r
e
e
f
r
o
m
a
n
y
p
r
o
b
l
em
.
S
o
,
t
h
e
m
i
n
i
m
i
z
i
n
g
,
p
r
e
v
e
n
ti
n
g
p
r
o
b
l
em
s
as
we
l
l
a
s
f
i
n
d
i
n
g
o
p
t
i
m
al
s
o
l
u
t
i
o
n
s
f
o
r
t
h
es
e
p
r
o
b
l
e
m
s
,
h
a
v
e
b
e
e
n
t
h
e
m
o
s
t
i
n
t
e
r
e
s
t
e
d
t
o
p
i
c
i
n
m
a
n
y
r
es
e
a
r
c
h
e
s
.
W
e
d
i
s
c
u
s
s
s
o
m
e
o
f
t
h
e
r
e
s
e
a
r
c
h
e
r
s
’
f
o
c
u
s
o
n
t
h
e
m
et
h
o
d
s
t
h
a
t
w
e
r
e
a
p
p
l
i
ed
t
o
i
d
e
n
t
i
f
y
i
n
g
,
d
e
t
e
c
t
,
m
i
t
i
g
ate
,
p
r
e
v
e
n
t
a
n
d
l
i
m
i
t
o
f
c
y
b
e
r
-
a
t
t
a
c
k
s
t
h
at
p
e
n
e
t
r
a
t
e
s
y
s
t
e
m
s
.
K
u
r
n
i
a
w
a
n
a
n
d
Y
a
z
i
d
[
1
9
]
,
t
h
e
a
u
t
h
o
r
s
p
r
o
p
o
s
e
d
a
w
a
y
t
o
d
e
t
e
c
t
a
n
d
m
it
i
g
a
t
e
d
e
n
i
al
o
f
s
e
r
v
i
c
e
a
t
t
ac
k
s
o
n
a
w
i
r
el
e
s
s
s
e
n
s
o
r
n
e
t
w
o
r
k
.
T
h
i
s
w
a
s
d
o
n
e
b
y
m
e
a
n
i
n
g
o
f
a
n
i
n
t
r
u
d
e
r
d
e
t
e
c
ti
o
n
s
y
s
t
e
m
a
n
d
a
b
l
o
c
k
i
n
g
a
p
p
l
i
c
at
io
n
f
o
r
t
h
e
n
o
d
e
t
h
a
t
h
a
s
b
e
e
n
d
e
t
e
c
t
e
d
a
s
a
n
a
tt
a
c
k
e
r
.
I
n
a
n
o
t
h
e
r
m
e
a
n
i
n
g
,
a
l
l
t
h
e
p
a
c
k
e
t
s
s
e
n
t
f
r
o
m
t
h
e
a
t
t
a
c
k
e
r
w
e
r
e
d
r
o
p
p
e
d
t
o
p
r
o
t
e
c
t
t
h
e
s
y
s
t
e
m
f
r
o
m
a
l
l
a
tt
a
c
k
s
.
W
h
i
l
e
t
h
e
a
u
t
h
o
r
s
o
f
[
2
0
]
p
r
o
p
o
s
e
d
a
n
i
n
t
r
u
d
e
r
d
e
t
e
c
t
i
o
n
s
y
s
t
e
m
(
I
D
S)
p
l
a
t
f
o
r
m
b
a
s
e
d
o
n
c
o
n
v
o
l
u
t
i
o
n
a
l
n
e
u
r
a
l
n
e
t
w
o
r
k
(
C
N
N
)
w
h
i
ch
i
s
c
a
ll
e
d
I
D
S
-
C
N
N
t
o
d
e
t
ec
t
D
o
S
a
t
ta
c
k
.
H
a
s
a
n
e
t
a
l
.
[
2
1
]
,
t
h
e
a
u
t
h
o
r
s
p
r
o
p
o
s
e
d
a
n
o
f
f
l
i
n
e
s
y
s
t
e
m
b
a
s
e
d
o
n
t
h
e
m
e
s
s
a
g
e
q
u
e
u
i
n
g
t
e
l
e
m
e
t
r
y
t
r
a
n
s
p
o
r
t
(
M
Q
T
T
)
t
h
a
t
w
as
s
e
cu
r
e
d
a
g
a
i
n
s
t
c
y
b
e
r
-
a
t
t
a
c
k
s
t
o
m
o
n
i
t
o
r
a
n
d
c
o
n
t
r
o
l
a
i
r
c
o
n
d
i
t
i
o
n
e
r
s
a
n
d
c
o
o
l
e
r
s
i
n
t
h
e
s
t
o
r
e
.
B
e
s
i
d
es
,
t
h
e
e
x
c
h
an
g
e
o
f
d
a
t
a
i
n
s
i
d
e
t
h
e
s
t
o
r
e
to
o
k
p
l
a
c
e
o
v
e
r
a
n
i
n
t
e
r
n
a
l
n
e
t
w
o
r
k
t
h
a
t
w
as
n
o
t
c
o
n
n
e
c
t
e
d
t
o
t
h
e
o
u
t
s
i
d
e
w
o
r
ld
o
r
a
n
o
t
h
e
r
n
e
t
w
o
r
k
.
T
h
e
y
u
s
e
d
a
s
i
n
g
l
e
i
n
t
e
r
f
a
c
e
t
o
c
o
n
ti
n
u
o
u
s
l
y
m
o
n
i
t
o
r
a
n
d
m
a
n
a
g
e
t
h
e
s
y
s
t
e
m
t
o
m
e
et
i
ts
r
e
q
u
i
r
e
m
e
n
t
s
i
n
r
e
al
-
t
i
m
e
.
N
u
r
j
a
h
a
n
e
t
a
l
.
[
2
2
]
,
t
h
e
a
u
t
h
o
r
s
p
r
o
p
o
s
e
d
a
m
e
t
h
o
d
t
o
d
e
t
e
ct
a
n
d
p
r
e
v
e
n
t
c
y
b
e
r
-
a
t
t
a
c
k
s
as
d
i
s
t
r
i
b
u
t
e
d
d
e
n
i
a
l
o
f
s
e
r
v
i
c
e
(
DD
o
S
)
a
n
d
f
a
c
t
i
ti
o
u
s
d
is
o
r
d
e
r
i
m
p
o
s
e
d
o
n
an
o
t
h
e
r
(
F
D
I
A
)
o
n
t
h
e
c
y
b
e
r
-
p
h
y
s
i
c
a
l s
y
s
t
e
m
.
T
h
is
w
a
s
d
o
n
e
u
s
i
n
g
s
p
e
c
i
al
i
z
e
d
t
e
ch
n
i
q
u
e
s
t
o
d
e
t
e
c
t
a
n
d
i
d
e
n
t
i
f
y
t
h
e
a
t
t
a
c
k
.
D
a
ta
w
e
r
e
c
o
l
l
e
ct
e
d
b
y
L
M
S
f
i
l
t
e
r
a
n
d
t
h
e
y
u
s
e
d
a
C
h
i
-
s
q
u
a
r
e
d
e
t
e
cto
r
t
o
d
e
t
e
r
m
i
n
e
w
h
et
h
e
r
a
n
att
a
c
k
o
c
c
u
r
r
e
d
o
r
n
o
t
a
n
d
f
u
z
zy
l
o
g
i
c
-
b
a
s
e
d
a
t
ta
c
k
c
l
a
s
s
i
f
ie
r
(
F
L
AC
)
t
o
d
e
te
r
m
i
n
e
a
p
a
r
t
i
c
u
l
a
r
at
t
a
c
k
n
a
m
e
o
n
t
h
e
b
a
s
is
o
f
s
u
c
h
c
r
i
te
r
i
a
.
S
y
e
d
e
t
a
l
.
[
2
3
]
,
t
h
e
a
u
t
h
o
r
s
p
r
o
p
o
s
e
d
a
m
a
c
h
i
n
e
l
e
a
r
n
i
n
g
f
r
am
e
w
o
r
k
f
o
r
d
e
t
e
c
t
i
n
g
a
n
d
e
v
a
lu
a
t
i
n
g
t
h
e
d
e
n
i
a
l
-
of
-
s
e
r
v
i
c
e
at
t
a
c
k
s
o
n
t
h
e
M
Q
T
T
p
r
o
t
o
c
o
l
.
T
h
e
y
d
e
s
i
g
n
e
d
a
n
d
t
e
s
t
e
d
t
h
e
a
tt
a
c
k
t
o
c
a
p
t
u
r
e
n
o
r
m
a
l
,
o
f
f
e
n
s
i
v
e
t
r
a
f
f
ic
,
a
n
d
s
t
at
i
s
t
i
c
al
f
l
o
w
f
e
at
u
r
e
s
b
a
s
e
d
o
n
d
i
m
e
n
s
i
o
n
.
B
e
s
i
d
e
s
,
t
h
e
c
o
n
t
r
o
l
p
a
c
k
e
t
f
i
el
d
s
i
z
e
/l
e
n
g
t
h
a
n
d
M
Q
T
T
c
h
a
r
a
c
t
e
r
i
s
t
i
cs
w
e
r
e
e
v
a
l
u
a
t
e
d
f
o
r
a
t
ta
c
k
d
e
t
e
c
ti
o
n
.
N
u
r
a
n
d
T
o
z
a
l
[
2
4
]
,
t
h
e
a
u
t
h
o
r
s
p
r
o
p
o
s
e
d
a
n
e
w
p
r
o
b
a
b
i
l
i
s
t
i
c
p
a
c
k
a
g
e
s
c
h
e
m
e
o
f
t
a
g
g
i
n
g
t
o
c
a
l
c
u
l
a
te
p
r
o
g
r
e
s
s
p
a
t
h
s
f
r
o
m
a
n
at
t
a
c
k
er
t
o
a
v
i
ct
i
m
l
o
c
a
t
i
o
n
a
n
d
a
s
s
ig
n
t
h
e
p
r
o
t
e
c
t
i
o
n
t
o
t
h
e
u
p
s
t
r
ea
m
i
n
t
e
r
n
e
t
s
e
r
v
ic
e
p
r
o
v
i
d
e
r
s
(
I
SP
s
)
.
T
h
e
o
b
t
ai
n
e
d
r
e
s
u
l
ts
w
e
r
e
i
n
d
i
c
a
t
e
d
t
h
a
t
t
h
e
v
i
c
t
i
m
l
o
c
a
ti
o
n
c
a
n
c
r
e
a
t
e
a
p
r
o
g
r
e
s
s
p
at
h
f
r
o
m
t
h
e
a
t
t
a
c
k
e
r
a
f
te
r
g
e
t
t
i
n
g
2
3
p
a
c
k
ag
e
s
o
n
a
v
e
r
a
g
e
.
F
i
r
d
o
u
s
e
t
a
l
.
[
2
5
]
,
t
h
e
a
u
t
h
o
r
s
p
r
o
p
o
s
e
d
t
h
e
t
h
r
e
a
t
m
o
d
e
l
w
i
t
h
a
p
a
r
t
i
c
u
l
a
r
f
o
c
u
s
o
n
M
Q
T
T
-
b
a
s
e
d
I
o
T
d
e
p
l
o
y
m
e
n
t
s
.
T
h
e
y
p
e
r
f
o
r
m
e
d
t
e
s
ts
t
o
m
e
a
s
u
r
e
t
h
e
e
f
f
e
c
t
o
f
D
o
S
a
t
t
a
c
k
s
o
n
t
h
e
M
Q
T
T
b
r
o
k
e
r
,
w
h
i
c
h
a
r
e
r
e
p
r
e
s
e
n
t
e
d
f
o
r
t
h
e
tw
o
t
y
p
e
s
o
f
a
t
t
a
c
k
(
S
YN
f
l
o
o
d
i
n
g
a
n
d
l
a
r
g
e
p
a
y
l
o
a
d
a
t
ta
c
k
s
)
.
P
o
t
r
i
n
o
e
t
a
l
.
[
2
6
]
,
t
h
e
a
u
t
h
o
r
s
e
v
a
l
u
a
t
e
d
a
n
d
d
e
s
i
g
n
e
d
a
n
e
w
I
o
T
s
a
f
e
t
y
s
y
s
te
m
.
T
h
e
w
o
r
k
i
n
g
p
r
i
n
c
i
p
l
e
o
f
t
h
e
s
y
s
t
e
m
w
e
r
e
b
a
s
e
d
o
n
a
g
r
o
u
p
o
f
s
e
n
s
o
r
s
a
n
d
a
c
t
u
a
t
o
r
s
,
w
h
i
c
h
a
r
e
e
x
c
h
a
n
g
i
n
g
m
e
s
s
a
g
es
v
i
a
t
h
e
M
Q
T
T
p
r
o
t
o
c
o
l
.
C
h
i
w
a
r
i
r
o
a
n
d
R
a
j
e
n
d
r
a
n
[
2
7
]
,
t
h
e
a
u
t
h
o
r
s
p
r
o
p
o
s
e
d
a
li
g
h
tw
e
i
g
h
t
(
HM
AC
)
o
r
/
a
n
d
d
a
t
a
e
n
c
r
y
p
t
i
o
n
l
i
g
h
t
w
e
i
g
h
t
a
l
g
o
r
i
t
h
m
.
T
h
i
s
s
ec
r
e
t
is
t
o
e
n
s
u
r
e
t
h
e
s
a
f
et
y
a
n
d
p
r
o
t
e
c
t
i
o
n
o
f
t
h
e
c
o
m
m
u
n
i
ca
t
i
o
n
m
e
s
s
a
g
es
v
i
a
M
Q
T
T
p
r
o
t
o
c
o
l
.
A
n
d
y
e
t
a
l
.
[
2
8
]
,
t
h
e
a
u
t
h
o
r
s
d
i
s
c
u
s
s
e
d
s
e
v
er
a
l
r
e
a
s
o
n
s
f
o
r
t
h
e
e
x
is
t
e
n
c
e
o
f
s
o
m
e
I
o
T
s
y
s
t
e
m
s
t
h
a
t
d
o
n
o
t
p
r
o
v
i
d
e
a
d
e
q
u
at
e
p
r
o
t
e
c
t
i
o
n
.
H
a
r
i
p
r
i
y
a
a
n
d
K
u
lo
t
h
u
n
g
a
n
[
2
9
]
,
t
h
e
a
u
t
h
o
r
s
p
r
o
p
o
s
e
d
a
n
i
n
t
r
u
s
i
o
n
d
e
t
e
c
t
i
o
n
s
c
h
e
m
e
o
f
t
h
e
S
e
c
u
r
e
-
M
Q
T
T
t
h
a
t
c
al
l
e
d
li
g
h
t
w
e
ig
h
t
f
u
z
z
y
l
o
g
i
c
,
f
o
r
d
e
t
e
c
t
i
n
g
m
a
l
i
c
i
o
u
s
b
e
h
a
v
i
o
r
d
u
r
i
n
g
t
h
e
c
o
n
v
e
r
s
a
t
i
o
n
o
f
I
o
T
d
e
v
i
c
e
s
.
T
h
e
a
p
p
r
o
a
c
h
s
u
g
g
e
s
t
e
d
u
s
e
s
a
f
u
z
z
y
l
o
g
i
c
-
b
a
s
e
d
ap
p
r
o
a
c
h
m
e
t
h
o
d
t
o
d
e
t
e
c
t
t
h
e
n
o
d
e'
s
m
a
l
ic
i
o
u
s
ac
t
iv
i
t
y
w
i
t
h
t
h
e
a
i
d
o
f
a
n
i
n
t
e
r
p
o
l
at
i
o
n
p
r
o
c
e
s
s
o
f
f
u
z
z
y
la
w
.
W
h
i
l
e
S
a
n
d
h
u
et
a
l
.
[
3
0
]
p
r
o
p
o
s
e
d
a
n
i
n
t
r
u
s
i
o
n
d
e
te
c
t
i
o
n
s
y
s
t
e
m
(
I
D
S
)
t
o
d
e
t
e
ct
t
h
e
f
l
o
o
d
i
n
g
a
t
t
a
c
k
w
h
i
c
h
c
a
u
s
e
s
c
o
n
n
e
c
t
i
o
n
f
a
i
l
u
r
e
t
h
a
t
w
as
b
as
e
d
o
n
a
d
is
t
r
i
b
u
t
ed
a
n
d
r
a
n
d
o
m
i
z
e
d
n
o
d
e
p
r
es
e
n
te
d
.
M
o
r
e
o
v
e
r
,
t
h
e
y
a
r
e
i
m
p
l
e
m
e
n
t
e
d
a
m
a
c
h
i
n
e
le
a
r
n
i
n
g
t
e
c
h
n
i
q
u
e
t
o
i
m
p
r
o
v
e
t
h
e
n
e
t
w
o
r
k
'
s
r
e
li
a
b
i
li
t
y
u
n
d
e
r
a
f
l
o
o
d
a
t
t
a
c
k
.
F
r
a
n
j
i
ć
[
3
1
]
s
u
g
g
e
s
t
e
d
l
o
o
k
i
n
g
a
t
t
h
e
u
s
e
o
f
m
o
d
e
r
n
c
o
m
p
u
t
e
r
t
e
c
h
n
i
q
u
e
s
,
t
h
r
o
u
g
h
b
o
o
k
s
a
n
d
i
n
f
o
r
m
a
t
i
o
n
o
n
l
i
n
e
r
e
s
o
u
r
c
e
s
.
I
n
a
d
d
i
t
i
o
n
,
d
e
te
c
t
i
n
g
m
a
l
i
c
i
o
u
s
s
o
f
t
w
a
r
e
a
n
d
t
o
o
l
s
,
w
h
i
c
h
a
r
e
l
e
a
d
i
n
g
t
o
c
o
m
p
u
te
r
s
a
b
o
t
a
g
e
s
u
c
h
as
i
d
e
n
t
i
t
y
t
h
e
f
t
,
i
m
p
o
r
t
a
n
t
d
a
t
a
d
e
s
t
r
u
c
ti
o
n
a
n
d
c
r
e
a
t
i
n
g
a
h
a
r
m
f
u
l
c
o
m
p
u
t
e
r
n
e
t
w
o
r
k
.
I
n
th
is
p
ap
er
,
a
cy
b
er
-
s
ec
u
r
ity
alg
o
r
ith
m
is
p
r
esen
ted
f
o
r
W
S
N
th
at
u
s
es
MQ
T
T
n
etwo
r
k
in
g
p
r
o
to
c
o
l
f
o
r
co
m
m
u
n
icatio
n
.
I
t
d
etec
t
s
th
e
Do
S
attac
k
at
th
e
f
ir
s
t
s
tag
e
an
d
th
en
in
clu
d
es
th
e
u
n
d
er
ly
i
n
g
n
o
d
e
in
p
r
ed
ictio
n
p
r
o
ce
s
s
to
en
s
u
r
e
i
f
its
Do
S
o
r
n
o
t
b
e
f
o
r
e
ex
clu
d
in
g
it
f
r
o
m
W
SN.
T
h
e
Do
S
attac
k
s
d
etec
tio
n
is
b
ased
o
n
th
e
tr
an
s
m
is
s
io
n
tim
e
(
m
ess
ag
e
p
er
io
d
)
d
ep
e
n
d
in
g
o
n
th
e
b
eh
av
io
r
o
f
Do
S a
ttack
s
.
2.
P
RO
P
O
SE
D
SYS
T
E
M
F
i
g
u
r
e
1
s
h
o
ws
t
h
e
b
l
o
c
k
d
i
ag
r
a
m
o
f
t
h
e
p
r
o
p
o
s
e
d
s
y
s
t
e
m
p
r
o
t
o
t
y
p
e
t
h
a
t
is
m
o
n
i
t
o
r
i
n
g
an
d
s
e
n
s
i
n
g
e
n
v
i
r
o
n
m
e
n
t
p
a
r
a
m
e
t
e
r
s
o
f
t
em
p
e
r
a
t
u
r
e
a
n
d
s
o
il
m
o
is
t
u
r
e
.
T
h
e
W
S
N
s
t
r
u
c
t
u
r
e
i
n
c
l
u
d
es
t
h
r
e
e
s
e
n
s
o
r
n
o
d
e
s
Evaluation Warning : The document was created with Spire.PDF for Python.
T
E
L
KOM
NI
KA
T
elec
o
m
m
u
n
C
o
m
p
u
t E
l Co
n
tr
o
l
P
h
ysica
l c
yb
er
-
s
ec
u
r
ity
a
lg
o
r
ith
m
fo
r
w
ir
ele
s
s
s
en
s
o
r
n
etw
o
r
ks
(
Dh
u
h
a
Dh
ey
a
a
K
h
u
d
h
u
r
)
1179
(
N
o
d
e
M
C
U
E
SP
8
2
6
6
)
a
s
t
h
e
m
i
c
r
o
c
o
n
t
r
o
l
l
e
r
,
tw
o
s
e
n
s
o
r
s
(
D
S
1
8
B
2
0
,
te
m
p
e
r
a
t
u
r
e
s
e
n
s
o
r
s
)
,
t
w
o
s
o
il
m
o
i
s
t
u
r
e
s
e
n
s
o
r
s
,
tw
o
a
c
t
u
at
o
r
s
(
L
E
D
1
,
L
E
D
2
)
,
a
n
d
a
m
i
c
r
o
c
o
m
p
u
t
er
(
R
as
p
b
e
r
r
y
p
i
3
)
.
Fi
g
u
r
e
2
s
h
o
w
s
t
h
e
h
a
r
d
w
a
r
e
c
o
m
p
o
n
e
n
t
s
o
f
t
h
e
i
m
p
l
e
m
e
n
te
d
p
r
o
t
o
t
y
p
e
.
T
o
s
e
n
d
t
h
e
d
a
t
a
b
e
t
w
e
e
n
N
o
d
e
M
C
U
a
n
d
R
asp
b
e
r
r
y
p
i
3
,
w
i
r
e
l
e
s
s
f
i
d
e
l
i
t
y
(
Wi
-
Fi
)
c
o
n
n
e
c
ti
o
n
,
a
n
d
i
n
t
e
r
n
e
t
o
f
t
h
i
n
g
s
(
I
o
T
)
M
Q
T
T
p
r
o
t
o
c
o
l
a
r
e
a
p
p
l
i
e
d
t
h
a
t
a
d
o
p
t
s
T
C
P
/
I
P
a
n
d
(
p
u
b
l
i
s
h
/
s
u
b
s
c
r
i
b
e
)
p
r
o
t
o
c
o
l
.
T
h
e
ex
ch
an
g
i
n
g
d
ata
ar
e
r
ec
ei
v
ed
an
d
an
aly
ze
d
b
y
th
e
b
ase
s
tatio
n
(
r
ep
r
esen
ted
in
a
R
asp
b
er
r
y
Pi).
B
y
in
s
p
ec
tin
g
th
e
o
b
tain
e
d
d
a
ta
in
r
ea
l
-
tim
e
m
o
d
e,
th
e
m
o
n
i
to
r
in
g
p
r
o
ce
s
s
is
co
n
d
u
cted
h
e
r
e.
I
n
ad
d
itio
n
,
we
ap
p
ly
Do
SIA
f
o
r
th
e
ab
o
v
e
-
m
en
tio
n
ed
en
v
ir
o
n
m
en
t
p
ar
a
m
eter
s
f
r
o
m
o
n
e
o
f
o
u
r
n
etwo
r
k
n
o
d
es
ag
ain
s
t
th
e
MQ
T
T
B
r
o
k
er
.
W
e
ad
o
p
t
p
y
th
o
n
p
r
o
g
r
am
m
in
g
la
n
g
u
a
g
e
in
R
asp
b
er
r
y
p
i 3
t
o
b
u
il
d
th
e
p
r
o
p
o
s
ed
alg
o
r
it
h
m
.
Fig
u
r
e
1
.
T
h
e
b
lo
c
k
d
iag
r
am
o
f
th
e
p
r
o
p
o
s
ed
s
y
s
tem
Fig
u
r
e
2
.
Used
h
a
r
d
war
e
c
o
m
p
o
n
en
ts
As
m
en
tio
n
ed
ab
o
v
e,
we
p
r
o
p
o
s
ed
an
alg
o
r
ith
m
to
d
etec
t,
m
itig
ate,
an
d
p
r
e
v
en
t
th
e
ef
f
ec
t
o
f
Do
S
attac
k
o
n
W
SN.
T
h
is
alg
o
r
ith
m
test
s
th
e
d
ata
r
ec
eiv
ed
f
r
o
m
th
r
ee
n
o
d
es
b
y
e
x
am
in
in
g
t
h
e
d
if
f
er
en
ce
o
f
th
e
r
ec
eiv
ed
tim
e
as we
ll a
s
th
e
m
ess
ag
e
s
ize
b
etwe
en
t
wo
co
n
s
ec
u
tiv
e
m
ess
ag
es with
in
s
p
ec
i
f
ied
th
r
esh
o
ld
s
.
T
h
e
f
ir
s
t
th
r
esh
o
ld
is
tak
en
ac
co
r
d
i
n
g
to
th
e
m
in
im
u
m
ti
m
e
d
if
f
er
en
ce
s
b
etwe
en
all
th
e
p
r
e
-
r
ec
e
iv
ed
r
ea
d
in
g
s
f
r
o
m
in
clu
d
ed
n
o
d
es,
wh
ich
is
1
0
s
ec
o
n
d
s
.
Mo
r
eo
v
e
r
,
th
e
s
ec
o
n
d
th
r
esh
o
ld
c
o
n
s
id
er
s
th
e
d
if
f
er
en
ce
o
f
m
ess
ag
e
s
ize
b
etwe
en
two
s
elec
ted
ty
p
es
o
f
r
ea
d
in
g
m
ess
ag
es.
W
e
m
ea
n
t
b
y
m
ess
ag
e
s
ize
is
th
e
p
o
s
s
ib
le
r
ea
d
in
g
s
r
an
g
e
o
f
m
a
x
im
u
m
a
n
d
m
in
i
m
u
m
v
alu
es.
T
h
ese
th
r
esh
o
ld
s
in
cr
ea
s
e
th
e
p
o
s
s
ib
ilit
y
o
f
b
ein
g
s
u
ch
n
o
d
e
is
a
Do
S
attac
k
.
T
h
is
/th
ese
n
o
d
e
(
s
)
is
/ar
e
en
ter
ed
to
p
r
ed
ictio
n
s
tag
e
to
d
ec
id
ed
later
to
b
e
Do
S
o
r
n
o
t.
T
h
e
d
ec
is
io
n
is
b
ased
o
n
co
n
tin
u
i
n
g
th
e
s
a
m
e
cr
o
s
s
in
g
o
f
th
e
t
wo
th
r
esh
o
ld
s
.
Fig
u
r
e
3
s
h
o
w
s
a
f
lo
w
ch
ar
t
o
f
th
e
p
r
o
p
o
s
ed
alg
o
r
ith
m
,
wh
ich
ca
n
b
e
s
u
m
m
a
r
ized
in
th
e
f
o
llo
w
in
g
:
−
R
ec
eiv
in
g
d
ata
f
r
o
m
th
e
n
o
d
es
b
y
th
e
R
asp
b
er
r
y
Pi (
b
ase
s
tatio
n
)
.
−
W
e
test
th
e
in
co
m
in
g
d
ata
b
y
ex
am
in
in
g
th
e
tim
e
d
if
f
er
en
ce
an
d
th
e
s
ize
o
f
th
e
m
ess
ag
e
co
m
p
ar
ed
t
o
th
e
th
r
esh
o
ld
f
o
r
th
e
s
eq
u
en
tial
m
ess
ag
es
r
esp
ec
tiv
ely
.
I
t
is
im
p
o
r
tan
t
t
o
n
o
te
th
at
th
e
n
o
d
es
s
en
d
t
h
eir
r
ea
d
in
g
s
ev
er
y
1
0
s
ec
o
n
d
s
to
b
e
r
ec
eiv
ed
b
y
b
ase
s
t
atio
n
at
th
e
s
am
e
tim
e.
−
I
f
a
d
i
f
f
e
r
e
n
c
e
i
s
f
o
u
n
d
b
e
twe
e
n
s
e
q
u
e
n
t
ia
l
m
ess
a
g
e
s
,
t
h
e
n
w
e
p
u
t
t
h
e
n
o
d
e
u
n
d
e
r
D
o
S
s
u
s
p
ic
i
o
n
a
n
d
i
n
c
r
e
a
s
e
t
h
e
s
u
s
p
i
c
i
o
n
c
o
u
n
t
e
r
b
y
o
n
e
.
T
h
e
R
a
s
p
b
e
r
r
y
p
i
3
r
e
tu
r
n
s
t
o
r
e
c
e
i
v
i
n
g
t
h
e
n
e
x
t
d
at
a
f
r
o
m
t
h
e
n
o
d
e
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
1
6
9
3
-
6
9
3
0
T
E
L
KOM
NI
KA
T
elec
o
m
m
u
n
C
o
m
p
u
t E
l Co
n
tr
o
l
,
Vo
l.
1
9
,
No
.
4
,
Au
g
u
s
t
2
0
2
1
:
1
1
7
7
-
1
1
8
4
1180
−
I
f
th
e
s
u
s
p
icio
n
co
u
n
te
r
o
f
th
e
n
o
d
e
is
g
r
ea
ter
th
an
o
r
eq
u
a
l
to
th
e
t
o
tal
to
ler
an
ce
f
o
r
th
e
wr
o
n
g
r
ea
d
i
n
g
,
we
b
lo
ck
t
h
e
s
u
s
p
icio
n
n
o
d
e'
s
I
P
ad
d
r
ess
an
d
c
o
n
s
id
er
it
as
a
Do
S
attac
k
.
T
h
is
n
o
d
e
is
d
is
co
n
n
ec
ted
f
r
o
m
th
e
W
SN b
y
b
lo
ck
in
g
its
I
P a
d
d
r
ess
.
Fig
u
r
e
3
.
T
h
e
f
lo
w
c
h
ar
t
o
f
th
e
p
r
o
p
o
s
ed
alg
o
r
ith
m
3.
RE
SU
L
T
S
A
ND
AN
AL
Y
SI
S
As
m
en
tio
n
p
r
e
v
io
u
s
ly
,
o
u
r
p
r
o
p
o
s
ed
s
y
s
tem
is
co
m
p
o
s
ed
o
f
th
r
ee
n
o
d
es
co
n
n
ec
te
d
to
t
h
e
n
etwo
r
k
p
r
o
to
co
l
(
MQ
T
T
)
th
at
is
r
ec
ei
v
in
g
t
h
eir
r
ea
d
in
g
d
ata.
B
esid
es,
it
s
en
d
s
b
ac
k
t
h
ese
r
ea
d
i
n
g
s
to
th
e
b
ase
s
tatio
n
(
R
asp
b
er
r
y
Pi3
)
.
Fig
u
r
e
4
s
h
o
ws
th
e
R
asp
b
er
r
y
Pi3
win
d
o
w
wh
ich
is
r
em
o
tely
ac
ce
s
s
ed
b
y
th
e
v
ir
tu
al
n
etwo
r
k
co
m
p
u
tin
g
(
VNC
)
v
iewe
r
p
latf
o
r
m
,
th
at
is
in
s
talled
o
n
th
e
PC
.
T
h
r
o
u
g
h
th
is
p
latf
o
r
m
,
p
y
th
o
n
c
o
d
e
is
r
esp
o
n
s
ib
le
f
o
r
d
is
p
lay
in
g
t
h
e
s
en
s
o
r
r
ea
d
in
g
s
f
o
r
th
r
ee
n
o
d
e
s
v
ia
th
e
MQ
T
T
b
r
o
k
er
.
T
h
e
p
r
o
p
o
s
ed
a
lg
o
r
ith
m
test
s
th
e
co
r
r
ec
tn
ess
o
f
th
e
r
ec
ei
v
ed
r
ea
d
in
g
s
an
d
p
r
e
v
en
t
an
y
in
co
r
r
ec
t
r
ea
d
in
g
s
wh
ic
h
a
r
e
lead
i
n
g
to
s
y
s
tem
f
ailu
r
e.
B
esid
es,
to
e
x
am
in
e
t
h
e
r
eliab
ilit
y
o
f
th
e
p
r
o
p
o
s
ed
alg
o
r
ith
m
an
d
its
ef
f
ec
ts
o
n
th
e
o
v
er
all
p
er
f
o
r
m
a
n
ce
o
f
th
e
wh
o
le
p
r
e
-
m
en
tio
n
ed
p
r
o
p
o
s
ed
s
y
s
tem
,
th
r
ee
test
ca
s
e
s
tu
d
ies
ar
e
ad
o
p
te
d
.
T
h
ese
s
tu
d
ies
ar
e
b
ased
o
n
th
e
ef
f
ec
ts
o
f
a
D
o
S
attac
k
th
at
is
f
ac
in
g
W
SN
th
r
o
u
g
h
a
n
y
n
o
d
e.
T
h
e
f
ir
s
t
s
tu
d
y
ta
k
es
th
e
ca
s
e
wh
er
e
n
o
attac
k
w
as
d
etec
ted
.
W
h
ile,
th
e
s
ec
o
n
d
o
n
e
d
ea
ls
with
s
u
s
p
icio
u
s
c
ases
o
n
ly
.
Mo
r
eo
v
er
,
th
e
last
s
tu
d
y
tak
es
th
e
ca
s
e
wh
en
an
attac
k
is
f
o
u
n
d
in
g
an
d
illu
s
tr
ated
h
o
w
to
p
r
ev
e
n
t it
.
Evaluation Warning : The document was created with Spire.PDF for Python.
T
E
L
KOM
NI
KA
T
elec
o
m
m
u
n
C
o
m
p
u
t E
l Co
n
tr
o
l
P
h
ysica
l c
yb
er
-
s
ec
u
r
ity
a
lg
o
r
ith
m
fo
r
w
ir
ele
s
s
s
en
s
o
r
n
etw
o
r
ks
(
Dh
u
h
a
Dh
ey
a
a
K
h
u
d
h
u
r
)
1181
3
.
1
.
Ca
s
e
s
t
ud
y
o
ne
T
h
is
s
tu
d
y
in
clu
d
es
test
in
g
th
e
r
ec
eiv
ed
d
ata,
r
ec
eiv
ed
f
r
o
m
an
y
n
o
d
e
th
r
o
u
g
h
th
e
a
b
o
v
e
-
m
en
tio
n
e
d
alg
o
r
ith
m
.
I
f
th
er
e
is
n
o
d
if
f
e
r
en
ce
f
o
u
n
d
,
th
e
W
SN
wo
r
k
s
n
o
r
m
ally
a
n
d
th
e
n
o
d
es
s
en
d
r
ea
d
in
g
s
ev
er
y
1
0
s
ec
o
n
d
s
th
at
ar
e
r
ec
eiv
e
d
b
y
b
ase
s
tatio
n
as we
ll.
T
h
u
s
,
th
is
ca
s
e
s
tu
d
y
is
n
o
t c
o
n
s
id
er
ed
as a
D
o
S a
ttack
(
D
o
S
ch
ec
k
=0
)
as
s
h
o
wn
Fig
u
r
e
5
.
As
a
r
e
s
u
lt,
th
e
W
SN
wo
r
k
s
n
o
r
m
ally
an
d
in
v
o
lv
ed
n
o
d
es
ex
ch
an
g
e
d
ata
s
m
o
o
th
ly
as sh
o
wn
Fig
u
r
e
6
.
Fig
u
r
e
4
.
T
h
e
R
asp
b
er
r
y
Pi3
win
d
o
w
Fig
u
r
e
5
.
C
ase
s
tu
d
y
o
n
e:
n
o
r
m
al
m
ess
ag
e
r
ec
eiv
in
g
Fig
u
r
e
6
.
C
ase
s
tu
d
y
o
n
e:
n
o
r
m
al
s
er
ial
m
o
n
ito
r
in
g
o
u
tp
u
t
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
1
6
9
3
-
6
9
3
0
T
E
L
KOM
NI
KA
T
elec
o
m
m
u
n
C
o
m
p
u
t E
l Co
n
tr
o
l
,
Vo
l.
1
9
,
No
.
4
,
Au
g
u
s
t
2
0
2
1
:
1
1
7
7
-
1
1
8
4
1182
3
.
2
.
Ca
s
e
s
t
ud
y
t
wo
T
h
is
s
tu
d
y
in
clu
d
es
test
in
g
th
e
r
ec
eiv
ed
d
ata
f
r
o
m
a
n
y
n
o
d
e
t
h
r
o
u
g
h
th
e
ab
o
v
e
-
m
e
n
tio
n
ed
a
lg
o
r
ith
m
.
I
f
a
d
if
f
er
e
n
ce
is
f
o
u
n
d
b
etwe
en
th
e
r
ec
eiv
ed
tim
e
an
d
t
h
e
m
ess
ag
e
s
ize
f
o
r
s
u
ch
n
o
d
e,
th
is
n
o
d
e
is
a
Do
S
s
u
s
p
icio
n
th
at
is
p
u
tted
u
n
d
e
r
m
o
n
ito
r
in
g
.
I
t
is
im
p
o
r
tan
t
t
o
n
o
te
th
at
th
e
n
o
r
m
al
th
r
esh
o
l
d
s
o
f
m
ess
ag
e
tim
e
d
if
f
er
en
ce
a
n
d
s
ize
ar
e
1
0
s
e
co
n
d
s
an
d
3
1
,
r
esp
ec
tiv
ely
.
Af
ter
r
ec
eiv
in
g
two
s
eq
u
en
tial
m
ess
ag
es
f
r
o
m
th
e
Do
S su
s
p
icio
n
n
o
d
e
(
D
o
S c
h
ec
k
=2
)
,
it st
ar
ts
to
s
en
d
m
es
s
ag
es with
n
o
r
m
al
th
r
esh
o
ld
s
.
T
h
er
ef
o
r
e,
th
is
n
o
d
e
is
ex
clu
d
ed
f
r
o
m
th
e
Do
S
s
u
s
p
icio
n
lis
t
an
d
r
etu
r
n
b
ac
k
to
ac
ce
p
ted
lis
t
an
d
s
et
(
Do
S
ch
ec
k
=0
)
as
s
h
o
wn
Fig
u
r
e
7
.
As a
r
esu
lt,
th
is
n
o
d
e
k
ee
p
s
g
o
in
g
to
s
en
d
its
r
ea
d
in
g
to
th
e
b
ase
s
tatio
n
,
as sh
o
wn
Fig
u
r
e
8
.
Fig
u
r
e
7
.
C
ase
s
tu
d
y
two
,
Do
S
s
u
s
p
icio
n
to
n
o
r
m
al
Fig
u
r
e
8
.
C
ase
s
tu
d
y
two
,
n
o
r
m
al
s
er
ial
m
o
n
ito
r
in
g
o
u
tp
u
t
3.
3
.
Ca
s
e
s
t
ud
y
t
hree
T
h
is
s
tu
d
y
ad
d
r
ess
es
th
e
ef
f
ec
t
o
f
Do
SIA
Attack
o
n
th
e
MQ
T
T
B
r
o
k
er
in
s
talled
o
n
R
as
p
b
er
r
y
Pi3
(
b
ase
s
tatio
n
)
.
T
h
is
attac
k
is
i
n
jecte
d
in
to
o
n
e
o
f
W
SN
n
o
d
es
to
test
th
e
v
u
ln
er
ab
ilit
ies
o
f
MQ
T
T
B
r
o
k
er
an
d
h
o
w
it
p
r
o
tecte
d
.
As
m
e
n
tio
n
ed
ab
o
v
e,
th
e
p
r
o
p
o
s
ed
alg
o
r
i
th
m
d
etec
ts
th
is
ty
p
e
o
f
attac
k
b
y
m
o
n
ito
r
in
g
th
e
tim
e
d
if
f
er
en
ce
an
d
th
e
s
ize
o
f
th
e
m
ess
ag
e
co
m
p
ar
e
d
to
t
h
e
th
r
esh
o
ld
.
I
f
a
d
if
f
e
r
en
ce
i
s
f
o
u
n
d
.
T
h
u
s
,
th
is
n
o
d
e
is
D
o
S
s
u
s
p
icio
n
to
b
e
m
o
n
ito
r
ed
f
o
r
f
iv
e
r
ec
eiv
ed
m
ess
ag
es.
I
f
th
e
cr
o
s
s
in
g
o
f
t
h
r
e
s
h
o
ld
s
is
co
n
tin
u
ed
,
th
en
th
e
alg
o
r
ith
m
d
ec
id
es
th
is
n
o
d
e
to
b
e
Do
S
attac
k
er
an
d
s
h
o
u
ld
b
e
is
o
lated
f
r
o
m
th
e
co
n
s
id
er
ed
W
SN
an
d
s
et
(
D
o
S
ch
ec
k
=1
)
.
As
a
r
esu
lt,
its
I
P
ad
d
r
ess
is
b
lo
ck
ed
to
av
o
id
r
ec
eiv
in
g
o
t
h
er
d
ata
f
r
o
m
it
as
s
h
o
wn
in
Fig
u
r
e
9
.
Fin
ally
,
t
h
is
n
o
d
e
ca
n
n
o
t sen
d
d
ata
an
y
m
o
r
e
as sh
o
wn
in
Fig
u
r
e
1
0
.
Evaluation Warning : The document was created with Spire.PDF for Python.
T
E
L
KOM
NI
KA
T
elec
o
m
m
u
n
C
o
m
p
u
t E
l Co
n
tr
o
l
P
h
ysica
l c
yb
er
-
s
ec
u
r
ity
a
lg
o
r
ith
m
fo
r
w
ir
ele
s
s
s
en
s
o
r
n
etw
o
r
ks
(
Dh
u
h
a
Dh
ey
a
a
K
h
u
d
h
u
r
)
1183
Fig
u
r
e
9
.
C
ase
s
tu
d
y
th
r
ee
,
Do
S d
etec
tio
n
o
f
n
o
d
e
2
Fig
u
r
e
1
0
.
C
ase
s
tu
d
y
th
r
ee
,
n
o
d
e2
ca
n
n
o
t sen
d
d
ata
4.
CO
NCLU
SI
O
N
A
cy
b
er
-
s
ec
u
r
ity
alg
o
r
ith
m
f
o
r
W
SN
was
p
r
o
p
o
s
ed
to
d
ea
l
with
Do
S
attac
k
s
.
I
t
u
s
ed
two
im
p
o
r
tan
t
th
r
esh
o
ld
s
to
d
etec
t
th
e
Do
S
attac
k
s
,
wh
ich
ar
e
th
e
tim
e
d
if
f
e
r
en
ce
an
d
s
ize
o
f
r
ec
ei
v
ed
m
ess
ag
es
f
r
o
m
in
clu
d
ed
n
o
d
es.
T
h
e
p
r
o
p
o
s
ed
alg
o
r
ith
m
in
clu
d
ed
d
etec
tio
n
s
tag
e,
p
r
ed
ictio
n
s
tag
e
an
d
is
o
latin
g
s
tag
e.
T
h
e
d
etec
tio
n
was
p
r
o
ce
s
s
ed
f
o
r
th
e
f
ir
s
t
d
etec
tio
n
o
f
cr
o
s
s
in
g
th
e
th
r
esh
o
ld
,
wh
ile
th
e
p
r
ed
icti
o
n
is
p
er
f
o
r
m
e
d
f
o
r
m
o
n
ito
r
in
g
th
e
s
u
s
p
icio
n
n
o
d
e
f
o
r
f
iv
e
m
ess
ag
es,
an
d
th
e
is
o
latio
n
is
ap
p
lied
f
o
r
en
s
u
r
ed
Do
S
n
o
d
es.
T
h
e
p
r
o
p
o
s
ed
alg
o
r
ith
m
s
h
o
wed
g
r
ea
t
r
esu
lts
in
d
etec
tin
g
an
d
p
r
ev
en
tin
g
th
e
wr
o
n
g
i
n
jectio
n
o
f
d
ata.
T
h
u
s
,
it
is
m
ak
in
g
th
e
s
y
s
tem
d
r
iv
e
a
cle
an
an
d
c
o
r
r
ec
t
d
ataset
an
d
k
ee
p
s
er
v
ice
r
eso
u
r
ce
s
o
u
t f
r
o
m
e
x
p
lo
ited
.
RE
F
E
R
E
NC
E
S
[1
]
A.
Ko
re
a
n
d
D.
Ka
d
a
m
,
“
Io
T
Ba
se
d
Re
a
l
Ti
m
e
Gre
e
n
h
o
u
se
m
o
n
it
o
rin
g
sy
ste
m
u
sin
g
Ra
sp
b
e
rry
P
i,
”
In
ter
n
a
ti
o
n
a
l
Res
e
a
rc
h
J
o
u
rn
a
l
o
f
E
n
g
i
n
e
e
rin
g
a
n
d
T
e
c
h
n
o
l
o
g
y
(IR
J
ET
)
,
v
o
l.
0
6
,
n
o
.
0
4
,
2
0
1
9
.
[2
]
S
.
G
.
Ni
k
h
a
d
e
,
"
Wi
re
les
s
se
n
so
r
n
e
two
r
k
sy
ste
m
u
sin
g
Ra
sp
b
e
rry
P
i
a
n
d
z
ig
b
e
e
fo
r
e
n
v
iro
n
m
e
n
tal
m
o
n
it
o
ri
n
g
a
p
p
li
c
a
ti
o
n
s,"
2
0
1
5
In
ter
n
a
ti
o
n
a
l
C
o
n
fer
e
n
c
e
o
n
S
m
a
rt
T
e
c
h
n
o
lo
g
ies
a
n
d
M
a
n
a
g
e
me
n
t
f
o
r
Co
m
p
u
t
in
g
,
Co
mm
u
n
ica
ti
o
n
,
C
o
n
tr
o
ls,
En
e
rg
y
a
n
d
M
a
ter
ia
ls
(I
CS
T
M
)
,
Ch
e
n
n
a
i,
2
0
1
5
,
p
p
.
3
7
6
-
3
8
1
,
d
o
i:
1
0
.
1
1
0
9
/ICS
T
M
.
2
0
1
5
.
7
2
2
5
4
4
5
.
[3
]
I.
Ah
m
a
d
,
K.
S
h
a
h
a
n
d
S
.
Ullah
,
"
M
il
it
a
r
y
Ap
p
li
c
a
ti
o
n
s
u
sin
g
Wi
r
e
les
s
S
e
n
so
r
Ne
two
rk
s:
A
su
rv
e
y
,
"
In
ter
n
a
ti
o
n
a
l
J
o
u
rn
a
l
o
f
E
n
g
i
n
e
e
rin
g
S
c
ien
c
e
a
n
d
C
o
mp
u
ti
n
g
,
v
o
l.
6
,
n
o
.
6
,
p
p
.
7
0
3
9
-
7
0
4
3
,
Ju
n
e
2
0
1
6
,
d
o
i
:
1
0
.
4
0
1
0
/2
0
1
6
.
1
6
7
8
.
[4
]
N.
S
.
Ali,
Z.
A.
A.
Aly
a
ss
e
ri,
a
n
d
A.
Ab
d
u
lm
o
h
so
n
,
“
Re
a
l
-
Ti
m
e
He
a
rt
P
u
lse
M
o
n
it
o
ri
n
g
Tec
h
n
i
q
u
e
Us
in
g
Wi
re
les
s
S
e
n
so
r
Ne
two
rk
a
n
d
M
o
b
il
e
Ap
p
l
ica
ti
o
n
,
”
In
ter
n
a
ti
o
n
a
l
J
o
u
r
n
a
l
o
f
El
e
c
trica
l
a
n
d
Co
mp
u
ter
En
g
in
e
e
rin
g
(IJ
ECE
),
v
o
l.
8
,
n
o
.
6
,
p
p
.
5
1
1
8
-
5
1
2
,
De
c
.
2
0
1
8
,
d
o
i:
1
0
.
1
1
5
9
1
/i
jec
e
.
v
8
i6
.
p
p
5
1
1
8
-
5
1
2
6
.
[5
]
M
.
u
r
Ra
h
m
a
n
,
S
.
Ra
h
m
a
n
,
S
.
M
a
n
so
o
r,
V.
De
e
p
,
a
n
d
M
.
Aa
sh
k
a
a
r,
“
Im
p
lem
e
n
tatio
n
o
f
ICT
a
n
d
wire
les
s
se
n
so
r
n
e
two
rk
s
f
o
r
e
a
rth
q
u
a
k
e
a
lert
a
n
d
d
isa
ste
r
m
a
n
a
g
e
m
e
n
t
in
e
a
rth
q
u
a
k
e
p
ro
n
e
a
re
a
s,”
Pro
c
e
d
ia
C
o
mp
u
t.
S
c
i.
,
v
o
l.
8
5
,
p
p
.
9
2
-
9
9
,
2
0
1
6
,
d
o
i:
1
0
.
1
0
1
6
/
j.
p
r
o
c
s.2
0
1
6
.
0
5
.
1
8
4
.
[6
]
B.
Ka
n
tarc
i
a
n
d
S
.
Ok
t
u
g
,
“
S
p
e
c
i
a
l
issu
e
:
Wi
re
les
s
se
n
so
r
a
n
d
a
c
tu
a
to
r
n
e
two
r
k
s
f
o
r
sm
a
rt
c
it
ies
,
”
J
.
S
e
n
s.
Actu
a
to
r
Ne
tw.
,
v
o
l.
7
,
n
o
.
4
,
p
p
.
1
-
5
,
2
0
1
8
,
d
o
i:
1
0
.
3
3
9
0
/
jsa
n
7
0
4
0
0
4
9
.
[7
]
A.
Ko
c
h
h
a
r
a
n
d
N.
Ku
m
a
r,
“
Wi
re
les
s
se
n
so
r
n
e
two
r
k
s
f
o
r
g
re
e
n
h
o
u
se
s:
An
e
n
d
-
to
-
e
n
d
re
v
iew
,
”
Co
m
p
u
ters
a
n
d
El
e
c
tro
n
ics
i
n
Ag
ricu
lt
u
re
,
v
o
l.
1
6
3
,
A
u
g
.
2
0
1
9
,
d
o
i
:
1
0
.
1
0
1
6
/j
.
c
o
m
p
a
g
.
2
0
1
9
.
1
0
4
8
7
7
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
1
6
9
3
-
6
9
3
0
T
E
L
KOM
NI
KA
T
elec
o
m
m
u
n
C
o
m
p
u
t E
l Co
n
tr
o
l
,
Vo
l.
1
9
,
No
.
4
,
Au
g
u
s
t
2
0
2
1
:
1
1
7
7
-
1
1
8
4
1184
[8
]
A.
Ch
a
tu
r
v
e
d
i
a
n
d
L.
S
h
r
iv
a
sta
v
a
,
“
IOT
Ba
se
d
Wi
re
les
s
S
e
n
so
r
Ne
two
rk
f
o
r
Air
P
o
ll
u
ti
o
n
M
o
n
it
o
ri
n
g
,
”
2
0
2
0
IEE
E
9
th
I
n
ter
n
a
ti
o
n
a
l
Co
n
fer
e
n
c
e
o
n
Co
mm
u
n
ica
t
io
n
S
y
ste
ms
a
n
d
Ne
two
rk
T
e
c
h
n
o
lo
g
ies
(CS
NT
),
Ap
r.
2
0
2
0
,
d
o
i:
1
0
.
1
1
0
9
/cs
n
t
4
8
7
7
8
.
2
0
2
0
.
9
1
1
5
7
3
3
.
[
9
]
A
.
P
e
d
e
r
s
e
n
,
“
Al
t
e
r
in
g
P
e
r
c
e
p
t
io
n
s
,
V
i
su
a
li
z
i
n
g
S
u
b
-
g
ro
u
n
d
M
e
ta
l
O
b
j
e
c
t
s,
”
E
m
e
r
g
i
n
g
S
c
i
e
n
c
e
J
o
u
rn
a
l
,
v
o
l
.
4
,
n
o
.
3
,
p
p
.
2
0
5
-
2
1
3
,
J
u
n
.
2
0
2
0
,
d
o
i
:
1
0
.
2
8
9
9
1
/
e
sj
-
2
0
2
0
-
0
1
2
2
4
.
[
1
0
]
B
.
F
a
z
e
l
a
b
d
o
l
a
b
a
d
i
a
n
d
M
.
H.
Go
l
e
s
t
a
n
,
“
To
w
a
rd
s
B
a
y
e
s
i
a
n
Q
u
a
n
t
i
f
i
c
a
ti
o
n
o
f
P
e
r
m
e
a
b
i
li
ty
i
n
M
i
c
r
o
-
s
c
a
l
e
P
o
ro
u
s
S
t
r
u
c
t
u
r
e
s
–
Th
e
D
a
t
a
b
a
s
e
o
f
M
i
c
ro
N
e
t
wo
rk
s
,
”
H
ig
h
T
e
c
h
a
n
d
I
n
n
o
v
a
ti
o
n
J
o
u
rn
a
l
,
v
o
l
.
1
,
n
o
.
4
,
p
p
.
1
4
8
-
1
6
0
,
D
e
c
.
2
0
2
0
,
d
o
i
:
1
0
.
2
8
9
9
1
/
h
i
j
-
2
0
2
0
-
01
-
04
-
0
2
.
[
1
1
]
T
.
C
h
u
,
A.
Y
.
Ch
u
a
,
a
n
d
E
.
L
.
S
e
c
c
o
,
“
A
w
e
a
r
a
b
l
e
M
Y
O
g
e
s
tu
r
e
a
r
m
b
a
n
d
c
o
n
t
ro
l
li
n
g
S
p
h
e
r
o
B
B
-
8
ro
b
o
t,
”
H
i
g
h
T
e
c
h
.
I
n
n
o
v
.
J
.
,
v
o
l
.
1
,
n
o
.
4
,
p
p
.
1
7
9
-
1
8
6
,
2
0
2
0
,
d
o
i
:
1
0
.
2
8
9
9
1
/
H
I
J
-
2
0
2
0
-
01
-
04
-
0
5
.
[1
2
]
A.
A.
As
tan
e
h
a
n
d
S
.
G
h
e
isa
ri,
“
Re
v
iew
a
n
d
Co
m
p
a
riso
n
o
f
R
o
u
ti
n
g
M
e
tri
c
s
in
C
o
g
n
it
i
v
e
Ra
d
io
Ne
two
r
k
s,”
Eme
rg
in
g
S
c
ien
c
e
J
o
u
r
n
a
l
,
v
o
l.
2
,
n
o
.
4
,
p
p
.
1
9
1
-
2
0
1
,
S
e
p
.
2
0
1
8
,
d
o
i:
1
0
.
2
8
9
9
1
/es
j
-
2
0
1
8
-
0
1
1
4
3
.
[1
3
]
A.
S
.
A.
Da
ia
,
R.
A.
Ra
m
a
d
a
n
,
a
n
d
M
.
B.
F
a
y
e
k
,
“
S
e
n
s
o
r
Ne
t
wo
rk
s
Attac
k
s
Clas
sifica
ti
o
n
s
a
n
d
M
it
ig
a
ti
o
n
,
”
An
n
a
ls
o
f
Eme
rg
in
g
Tec
h
n
o
l
o
g
ies
i
n
Co
m
p
u
ti
n
g
,
v
o
l.
2
,
n
o
.
4
,
p
p
.
2
8
-
4
3
,
Oc
t.
2
0
1
8
,
d
o
i:
1
0
.
3
3
1
6
6
/ae
ti
c
.
2
0
1
8
.
0
4
.
0
0
3
.
[1
4
]
M
.
S
.
Cr
o
o
c
k
,
S
.
D.
Kh
u
d
e
r,
a
n
d
Z.
A.
Ha
ss
a
n
,
“
S
e
lf
-
c
h
e
c
k
in
g
m
e
th
o
d
f
o
r
fa
u
lt
t
o
lera
n
c
e
so
lu
ti
o
n
i
n
wire
les
s
se
n
so
r
n
e
tw
o
rk
,
”
In
ter
n
a
ti
o
n
a
l
J
o
u
rn
a
l
o
f
El
e
c
trica
l
a
n
d
C
o
mp
u
ter
E
n
g
i
n
e
e
rin
g
(IJ
ECE
),
v
o
l.
1
0
,
n
o
.
4
,
p
p
.
4
4
1
6
-
4
4
2
5
,
Au
g
.
2
0
2
0
,
d
o
i:
1
0
.
1
1
5
9
1
/i
jec
e
.
v
1
0
i
4
.
p
p
4
4
1
6
-
4
4
2
5
.
[1
5
]
Z.
A.
Ba
ig
,
S
.
S
a
n
g
u
a
n
p
o
n
g
,
S
.
N.
F
ird
o
u
s,
V.
N.
VO
,
T
.
G
.
Ng
u
y
e
n
,
a
n
d
C.
S
o
-
In
,
“
Av
e
ra
g
e
d
d
e
p
e
n
d
e
n
c
e
e
stim
a
to
rs
fo
r
Do
S
a
tt
a
c
k
d
e
t
e
c
ti
o
n
in
I
o
T
n
e
two
rk
s,”
F
u
tu
re
Ge
n
e
ra
ti
o
n
Co
m
p
u
ter
S
y
ste
ms
,
v
o
l.
1
0
2
,
p
p
.
1
9
8
-
2
0
9
,
Ja
n
.
2
0
2
0
,
d
o
i:
1
0
.
1
0
1
6
/j
.
f
u
tu
re
.
2
0
1
9
.
0
8
.
0
0
7
.
[1
6
]
S
.
P
a
ti
l
a
n
d
S
.
Ch
a
u
d
h
a
ri,
"
Do
S
a
tt
a
c
k
p
re
v
e
n
ti
o
n
tec
h
n
iq
u
e
i
n
Wi
r
e
les
s
S
e
n
so
r
Ne
two
rk
s
,
"
Pr
o
c
e
d
i
a
Co
m
p
u
t
.
S
c
i
.
,
v
o
l.
7
9
,
p
p
.
7
1
5
-
7
2
1
,
F
e
b
.
2
0
1
6
,
d
o
i:
1
0
.
1
0
1
6
/
j.
p
r
o
c
s.2
0
1
6
.
0
3
.
0
9
4
.
[1
7
]
L.
Ca
o
,
X.
Jia
n
g
,
Y
.
Z
h
a
o
,
S
.
Wan
g
,
D.
Yo
u
a
n
d
X.
Xu
,
"
A
S
u
rv
e
y
o
f
Ne
two
r
k
Attac
k
s
o
n
Cy
b
e
r
-
P
h
y
sic
a
l
S
y
ste
m
s,"
IEE
E
Acc
e
ss
,
v
o
l.
8
,
p
p
.
4
4
2
1
9
-
4
4
2
2
7
,
2
0
2
0
,
d
o
i:
1
0
.
1
1
0
9
/ACCES
S
.
2
0
2
0
.
2
9
7
7
4
2
3
.
[1
8
]
Ž.
G
a
v
rić
a
n
d
D.
S
imić
,
“
Ov
e
rv
iew
o
f
D
o
S
a
t
tac
k
s
o
n
wire
les
s
se
n
so
r
n
e
two
rk
s
a
n
d
e
x
p
e
rime
n
tal
re
su
lt
s
fo
r
sim
u
latio
n
o
f
in
terfe
re
n
c
e
a
tt
a
c
k
s,”
In
g
e
n
iería
e
In
v
e
stig
a
c
ió
n
,
v
o
l
.
3
8
,
n
o
.
1
,
p
p
.
1
3
0
-
1
3
8
,
Ja
n
.
2
0
1
8
,
d
o
i:
1
0
.
1
5
4
4
6
/
in
g
.
i
n
v
e
stig
.
v
3
8
n
1
.
6
5
4
5
3
.
[1
9
]
M
.
T.
Ku
r
n
iaw
a
n
a
n
d
S
.
Ya
z
id
,
“
M
it
ig
a
ti
o
n
a
n
d
De
tec
ti
o
n
S
trate
g
y
o
f
D
o
S
At
tac
k
o
n
Wi
re
les
s
S
e
n
so
r
Ne
two
r
k
Us
in
g
Bl
o
c
k
i
n
g
Ap
p
ro
a
c
h
a
n
d
In
tr
u
sio
n
De
tec
ti
o
n
S
y
ste
m
,
”
2
0
2
0
In
ter
n
a
ti
o
n
a
l
C
o
n
fer
e
n
c
e
o
n
El
e
c
trica
l
,
Co
mm
u
n
ica
ti
o
n
,
a
n
d
C
o
mp
u
ter
En
g
i
n
e
e
rin
g
(ICECC
E
),
Ju
n
.
2
0
2
0
,
d
o
i
:
1
0
.
1
1
0
9
/i
c
e
c
c
e
4
9
3
8
4
.
2
0
2
0
.
9
1
7
9
2
5
5
.
[2
0
]
S.
-
N.
Ng
u
y
e
n
,
V
.
-
Q.
Ng
u
y
e
n
,
J
.
Ch
o
i,
a
n
d
K.
Kim
,
“
De
sig
n
a
n
d
imp
lem
e
n
tatio
n
o
f
i
n
tr
u
sio
n
d
e
tec
ti
o
n
sy
ste
m
u
sin
g
c
o
n
v
o
l
u
ti
o
n
a
l
n
e
u
ra
l
n
e
tw
o
rk
f
o
r
Do
S
d
e
tec
ti
o
n
,
”
i
n
Pro
c
e
e
d
in
g
s
o
f
th
e
2
n
d
I
n
ter
n
a
ti
o
n
a
l
C
o
n
fer
e
n
c
e
o
n
M
a
c
h
i
n
e
L
e
a
r
n
in
g
a
n
d
S
o
ft
C
o
mp
u
ti
n
g
-
IC
M
L
S
C
’1
8
,
2
0
1
8
,
d
o
i:
1
0
.
1
1
4
5
/3
1
8
4
0
6
6
.
3
1
8
4
0
8
9
.
[2
1
]
N.
I.
Ha
sa
n
,
M
.
T
.
Ha
sa
n
,
N.
H.
Tu
rja,
R.
Ra
iy
a
n
,
S
.
S
a
h
a
,
a
n
d
M
.
F
.
H
o
ss
a
in
,
“
A
Cy
b
e
r
-
S
e
c
u
re
d
M
QT
T
b
a
se
d
Offlin
e
Au
to
m
a
ti
o
n
S
y
ste
m
,
”
2
0
1
9
In
ter
n
a
ti
o
n
a
l
Co
n
fer
e
n
c
e
o
n
W
ire
les
s
Co
mm
u
n
ica
ti
o
n
s
S
i
g
n
a
l
Pro
c
e
ss
in
g
a
n
d
Ne
two
rk
in
g
(W
iS
PNE
T
),
M
a
r.
2
0
1
9
,
d
o
i:
1
0
.
1
1
0
9
/wis
p
n
e
t
4
5
5
3
9
.
2
0
1
9
.
9
0
3
2
7
4
3
.
[2
2
]
Nu
rjah
a
n
,
F
.
Niz
a
m
,
S
.
Ch
a
k
i,
S
.
Al
M
a
m
u
n
a
n
d
M
.
S
.
Ka
ise
r,
"
Attac
k
d
e
tec
ti
o
n
a
n
d
p
re
v
e
n
ti
o
n
in
t
h
e
Cy
b
e
r
P
h
y
sic
a
l
S
y
ste
m
,
"
20
1
6
I
n
ter
n
a
ti
o
n
a
l
Co
n
fer
e
n
c
e
o
n
Co
mp
u
t
e
r
Co
mm
u
n
ica
t
io
n
a
n
d
In
f
o
rm
a
ti
c
s
(ICCCI),
Co
imb
a
to
re
,
2
0
1
6
,
p
p
.
1
-
6
,
d
o
i:
1
0
.
1
1
0
9
/ICCCI.
2
0
1
6
.
7
4
8
0
0
2
2
.
[
2
3
]
N
.
F
.
S
y
e
d
,
Z
.
B
a
ig
,
A
.
I
b
r
a
h
i
m
,
a
n
d
C
.
V
a
ll
i
,
“
D
e
n
i
a
l
o
f
s
e
rv
i
c
e
a
t
t
a
c
k
d
e
t
e
c
t
io
n
th
ro
u
g
h
m
a
c
h
in
e
l
e
a
r
n
in
g
fo
r
t
h
e
I
o
T,
”
J
o
u
rn
a
l
o
f
I
n
f
o
r
ma
t
io
n
a
n
d
T
e
l
e
c
o
m
mu
n
i
c
a
t
io
n
,
v
o
l
.
4
,
n
o
.
4
,
p
p
.
4
8
2
-
5
0
3
,
Ju
n
.
2
0
2
0
,
d
o
i
:1
0
.
1
0
8
0
/
2
4
7
5
1
8
3
9
.
2
0
2
0
.
1
7
6
7
4
8
4
.
[2
4
]
A.
Y.
N
u
r
a
n
d
M
.
E.
To
z
a
l
,
“
De
fe
n
d
in
g
C
y
b
e
r
-
P
h
y
sic
a
l
S
y
ste
m
s
a
g
a
in
st
Do
S
Attac
k
s,”
2
0
1
6
IE
E
E
In
ter
n
a
ti
o
n
a
l
Co
n
fer
e
n
c
e
o
n
S
m
a
rt Co
m
p
u
ti
n
g
(S
M
AR
T
COM
P),
M
a
y
2
0
1
6
,
d
o
i:
1
0
.
1
1
0
9
/sm
a
rtco
m
p
.
2
0
1
6
.
7
5
0
1
6
8
5
.
[2
5
]
S
.
N.
F
i
rd
o
u
s,
Z
.
Ba
ig
,
C.
Va
ll
i,
a
n
d
A.
I
b
ra
h
im,
“
M
o
d
e
ll
i
n
g
a
n
d
Ev
a
lu
a
ti
o
n
o
f
M
a
li
c
i
o
u
s
Attac
k
s
a
g
a
in
st
th
e
I
o
T
M
QTT
P
r
o
t
o
c
o
l,
”
2
0
1
7
IE
EE
In
ter
n
a
t
io
n
a
l
Co
n
fer
e
n
c
e
o
n
I
n
ter
n
e
t
o
f
T
h
in
g
s
(
iT
h
in
g
s)
a
n
d
IEE
E
Gr
e
e
n
Co
mp
u
t
in
g
a
n
d
C
o
mm
u
n
ica
ti
o
n
s
(Gr
e
e
n
Co
m)
a
n
d
IEE
E
Cy
b
e
r,
Ph
y
sic
a
l
a
n
d
S
o
c
i
a
l
Co
m
p
u
t
in
g
(CPS
Co
m)
a
n
d
IEE
E
S
m
a
rt Da
t
a
(
S
ma
rtDa
t
a
)
, J
u
n
.
2
0
1
7
,
d
o
i:
1
0
.
1
1
0
9
/i
t
h
in
g
s
-
g
r
e
e
n
c
o
m
-
c
p
sc
o
m
-
sm
a
rtd
a
ta.2
0
1
7
.
1
1
5
.
[2
6
]
G
.
P
o
tri
n
o
,
F
.
d
e
Ra
n
g
o
,
a
n
d
A.
F
.
S
a
n
tam
a
ria,
“
M
o
d
e
li
n
g
a
n
d
e
v
a
lu
a
ti
o
n
o
f
a
n
e
w
Io
T
se
c
u
rit
y
sy
ste
m
fo
r
m
it
ig
a
ti
n
g
Do
S
a
tt
a
c
k
s
to
t
h
e
M
QTT
b
ro
k
e
r,
”
2
0
1
9
IEE
E
W
ire
le
ss
Co
mm
u
n
ica
ti
o
n
s
a
n
d
Ne
tw
o
rk
in
g
Co
n
fer
e
n
c
e
(W
CNC),
Ap
r.
2
0
1
9
,
d
o
i
:
1
0
.
1
1
0
9
/wc
n
c
.
2
0
1
9
.
8
8
8
5
5
5
3
.
[2
7
]
R.
Ch
iwa
riro
a
n
d
S
.
Ra
jen
d
ra
n
,
“
S
e
c
u
rit
y
in
P
u
b
li
sh
/S
u
b
sc
rib
e
P
ro
to
c
o
l
fo
r
I
n
tern
e
t
o
f
Th
in
g
s,
”
In
ter
n
a
ti
o
n
a
l
J
o
u
rn
a
l
o
f
P
u
re
a
n
d
A
p
p
l
ied
M
a
t
h
e
ma
ti
c
s
,
v
o
l.
1
1
8
,
n
o
.
1
6
,
p
p
.
2
3
1
-
2
4
2
,
2
0
1
8
.
[2
8
]
S
.
An
d
y
,
B.
Ra
h
a
rd
jo
,
a
n
d
B.
H
a
n
in
d
h
it
o
,
“
Attac
k
S
c
e
n
a
rio
s
a
n
d
S
e
c
u
rit
y
A
n
a
ly
sis
o
f
M
QT
T
Co
m
m
u
n
ica
ti
o
n
P
ro
to
c
o
l
i
n
I
o
T
S
y
ste
m
,
”
Pr
o
c
e
e
d
in
g
o
f
t
h
e
El
e
c
trica
l
En
g
in
e
e
r
in
g
Co
mp
u
ter
S
c
ien
c
e
a
n
d
I
n
f
o
rm
a
ti
c
s
,
v
o
l.
4
,
n
o
.
1
,
Oc
t.
2
0
1
7
,
d
o
i:
1
0
.
1
1
5
9
1
/ee
c
si.v
4
.
1
0
6
4
.
[
2
9
]
A
.
P
.
H
a
ri
p
ri
y
a
a
n
d
K.
Ku
lo
th
u
n
g
a
n
,
“
S
e
c
u
r
e
-
M
QT
T
:
a
n
e
f
f
i
c
ie
n
t
f
u
z
z
y
lo
g
i
c
-
b
a
s
e
d
a
p
p
ro
a
c
h
t
o
d
e
t
e
c
t
Do
S
a
t
t
a
c
k
i
n
M
QT
T
p
ro
to
c
o
l
f
o
r
in
t
e
rn
e
t
o
f
th
in
g
s,
”
E
UR
AS
IP
J
o
u
rn
a
l
o
n
W
i
r
e
l
e
s
s
C
o
m
mu
n
i
c
a
t
io
n
s
a
n
d
N
e
t
w
o
r
k
in
g
,
v
o
l.
2
0
1
9
,
n
o
.
1
,
p
p
.
1
-
1
5
,
Ap
r.
2
0
1
9
,
d
o
i
:
1
0
.
1
1
8
6
/
s1
3
6
3
8
-
0
1
9
-
1
4
0
2
-
8.
[
3
0
]
J
.
K
.
S
a
n
d
h
u
,
A
.
K
.
V
e
r
m
a
,
a
n
d
P
.
S
.
R
a
n
a
,
“
E
n
h
a
n
c
i
n
g
d
e
p
e
n
d
a
b
i
l
it
y
o
f
wi
r
e
l
e
s
s
s
e
n
s
o
r
n
e
t
wo
r
k
u
n
d
e
r
f
l
o
o
d
i
n
g
a
t
t
a
c
k
:
a
m
a
c
h
i
n
e
l
e
a
r
n
i
n
g
p
e
r
s
p
e
c
ti
v
e
,
”
In
t
e
r
n
a
ti
o
n
a
l
J
o
u
rn
a
l
o
f
A
d
H
o
c
a
n
d
U
b
i
q
u
it
o
u
s
Co
m
p
u
ti
n
g
,
v
o
l
.
3
3
,
n
o
.
2
,
p
p
.
7
3
-
89
,
2
0
2
0
,
d
o
i
:
1
0
.
1
5
0
4
/i
j
a
h
u
c
.
2
0
2
0
.
1
0
5
4
6
1
.
[3
1
]
S
.
F
r
a
n
j
i
ć
,
“
Cy
b
e
r
c
r
i
m
e
i
s
V
e
r
y
D
a
n
g
e
ro
u
s
F
o
r
m
o
f
C
r
i
m
in
a
l
Be
h
a
v
io
r
a
n
d
Cy
b
e
r
s
e
c
u
r
it
y
,
”
E
me
r
g
in
g
S
c
i
e
n
c
e
J
o
u
rn
a
l
,
v
o
l.
4
,
p
p
.
1
8
–
2
6
,
O
c
t.
2
0
2
0
.
Evaluation Warning : The document was created with Spire.PDF for Python.