I
nte
rna
t
io
na
l J
o
urna
l o
f
E
lect
rica
l a
nd
Co
m
p
ute
r
E
ng
in
ee
ring
(
I
J
E
CE
)
Vo
l.
7
,
No
.
6
,
Dec
em
b
er
201
7
,
p
p
.
3
6
2
2
~
3
6
3
1
I
SS
N:
2
0
8
8
-
8708
,
DOI
: 1
0
.
1
1
5
9
1
/
i
j
ec
e
.
v7
i
6
.
pp
3
6
2
2
-
3631
3622
J
o
ur
na
l ho
m
ep
a
g
e
:
h
ttp
:
//ia
e
s
jo
u
r
n
a
l.c
o
m/o
n
lin
e/in
d
ex
.
p
h
p
/I
JE
C
E
E
f
ficien
t
End
-
to
-
End Secur
e
K
ey
M
a
na
g
em
e
nt
Pr
o
toco
l f
o
r
Interne
t
o
f
Thi
ng
s
Ya
m
i
na
B
en
Sli
m
a
ne
1
,
K
heli
f
a
B
en
Ah
m
ed
2
1
L
a
b
o
ra
to
ry
o
f
P
h
y
sic
s an
d
S
e
m
i
-
c
o
n
d
u
c
to
r
De
v
ice
,
Un
iv
e
rsity
T
a
h
ri
M
o
h
a
m
e
d
,
Be
c
h
a
r,
A
l
g
e
ria
2
E
x
a
c
t
S
c
ien
c
e
s De
p
a
rt
m
e
n
t
,
Un
iv
e
rsit
y
T
a
h
ri
M
o
h
a
m
e
d
,
Be
c
h
a
r,
A
l
g
e
ria
Art
icle
I
nfo
AB
ST
RAC
T
A
r
ticle
his
to
r
y:
R
ec
eiv
ed
J
an
1
7
,
2
0
1
7
R
ev
i
s
ed
A
p
r
1
2
,
2
0
1
7
A
cc
ep
ted
Ma
y
2
,
2
0
1
7
In
tern
e
t
o
f
th
in
g
s
(Io
T
)
h
a
s
d
e
sc
rib
e
d
a
f
u
tu
re
v
isio
n
o
f
in
tern
e
twh
e
re
u
se
rs,
c
o
m
p
u
ti
n
g
s
y
ste
m
,
a
n
d
e
v
e
r
y
d
a
y
o
b
jec
ts
p
o
ss
e
ss
in
g
s
e
n
sin
g
a
n
d
a
c
tu
a
ti
n
g
c
a
p
a
b
il
it
ies
a
re
p
a
rt
o
f
d
istri
b
u
ted
a
p
p
l
ica
ti
o
n
s
a
n
d
re
q
u
ired
t
o
su
p
p
o
r
t
sta
n
d
a
rd
in
tern
e
t
c
o
m
m
u
n
ica
ti
o
n
w
it
h
m
o
re
p
o
we
r
f
u
l
d
e
v
ice
o
r
in
tern
e
t
hos
ts.
T
h
is
v
isio
n
n
e
c
e
ss
it
a
tes
th
e
se
c
u
rit
y
m
e
c
h
a
n
is
m
s
f
o
r
e
n
d
-
to
-
e
n
d
c
o
m
m
u
n
ica
ti
o
n
.
A
k
e
y
m
a
n
a
g
e
m
e
n
t
p
ro
t
o
c
o
l
is
c
rit
ica
l
to
e
n
su
ri
n
g
th
e
se
c
u
re
e
x
c
h
a
n
g
e
o
f
d
a
ta
b
e
t
w
e
e
n
in
terc
o
n
n
e
c
ti
n
g
e
n
ti
ti
e
s,
b
u
t
d
u
e
to
th
e
n
a
tu
re
o
f
th
is
c
o
m
m
u
n
ica
ti
o
n
sy
st
e
m
w
h
e
r
e
a
h
i
g
h
re
so
u
rc
e
c
o
n
stra
in
e
d
n
o
d
e
m
a
y
b
e
c
o
m
m
u
n
ica
ti
n
g
w
it
h
n
o
d
e
w
it
h
h
i
g
h
e
n
e
rg
y
m
a
k
e
s
th
e
a
p
p
li
c
a
ti
o
n
o
f
e
x
isti
n
g
k
e
y
m
a
n
a
g
e
m
e
n
t
p
ro
t
o
c
o
ls
im
p
o
ss
ib
le.
I
n
th
is
p
a
p
e
r,
w
e
p
ro
p
o
se
a
n
e
w
li
g
h
tw
e
ig
h
t
k
e
y
m
a
n
a
g
e
m
e
n
t
p
ro
to
c
o
l
th
a
t
a
ll
o
w
s
th
e
c
o
n
stra
in
e
d
n
o
d
e
i
n
6
lo
W
P
A
N
n
e
tw
o
rk
to
tran
s
m
it
c
a
p
tu
re
d
d
a
ta
t
o
in
ter
n
e
t
h
o
st
in
se
c
u
re
c
h
a
n
n
e
l.
T
h
is
p
ro
t
o
c
o
l
is
b
a
se
d
o
n
c
o
o
p
e
ra
ti
o
n
o
f
se
lec
ted
6
l
o
W
P
A
N
ro
u
ters
to
p
a
rti
c
ip
a
te
i
n
c
o
m
p
u
tatio
n
o
f
h
ig
h
ly
c
o
n
su
m
in
g
c
r
y
p
to
g
ra
p
h
ic
p
rim
it
iv
e
s.
Ou
r
p
r
o
to
c
o
l
is
a
ss
e
ss
e
d
w
it
h
A
V
IS
P
A
to
o
l,
t
h
e
re
su
lt
s
sh
o
w
th
a
t
o
u
r
sc
h
e
m
e
e
n
su
re
d
se
c
u
rit
y
p
ro
p
e
rti
e
s.
K
ey
w
o
r
d
:
6
L
o
W
P
A
N
n
et
w
o
r
k
I
n
ter
n
et
o
f
t
h
i
n
g
s
Ke
y
m
a
n
a
g
e
m
en
t p
r
o
to
co
l
6
L
o
W
P
A
N
r
o
u
ter
s
A
VI
SP
A
t
ool
Co
p
y
rig
h
t
©
2
0
1
7
I
n
stit
u
te o
f
Ad
v
a
n
c
e
d
E
n
g
i
n
e
e
rin
g
a
n
d
S
c
ien
c
e
.
Al
l
rig
h
ts
re
se
rv
e
d
.
C
o
r
r
e
s
p
o
nd
ing
A
uth
o
r
:
Ya
m
i
n
a
B
en
Sli
m
a
n
e,
L
ab
o
r
ato
r
y
o
f
P
h
y
s
ics a
n
d
Sem
i
-
co
n
d
u
c
to
r
Dev
ice,
T
ah
r
i M
o
h
a
m
ed
Un
i
v
er
s
it
y
-
B
ec
h
ar
,
Stre
et
in
d
ep
en
d
en
ce
B
.
P
.
417
,
B
ec
h
ar
,
A
lg
er
ia
E
m
ail:
Ya
m
i.b
en
s
li
m
a
n
e@
g
m
ail.
co
m
1.
I
NT
RO
D
UCT
I
O
N
T
h
e
in
ter
n
e
t
o
f
t
h
i
n
g
s
h
as
m
ad
e
a
r
ev
o
lu
tio
n
in
t
h
e
w
o
r
l
d
o
f
co
m
m
u
n
icatio
n
b
y
co
n
n
ec
ted
t
h
e
p
h
y
s
ical
o
b
j
ec
ts
to
I
n
ter
n
et.
A
cc
o
r
d
in
g
to
[
1
]
(
I
o
T
)
is
a
co
n
ce
p
t
an
d
a
p
ar
ad
ig
m
t
h
at
c
o
n
s
id
er
s
p
er
v
as
iv
e
p
r
esen
ce
i
n
t
h
e
e
n
v
ir
o
n
m
e
n
t
o
f
a
v
ar
iet
y
o
f
t
h
i
n
g
s
/o
b
j
ec
ts
th
at
th
r
o
u
g
h
w
ir
ele
s
s
an
d
w
ir
ed
c
o
n
n
ec
tio
n
s
an
d
u
n
iq
u
e
ad
d
r
ess
in
g
s
c
h
e
m
es
a
r
e
ab
le
to
in
ter
ac
t
w
it
h
ea
ch
o
th
er
an
d
co
o
p
er
ate
w
it
h
o
th
er
th
in
g
s
/o
b
j
ec
ts
to
cr
ea
te
n
e
w
ap
p
licatio
n
s
/
s
er
v
ic
es.
T
h
e
in
ter
n
e
t
o
f
t
h
i
n
g
s
(
I
o
T
)
d
escr
ib
es
t
h
e
n
e
x
t
g
en
er
atio
n
o
f
I
n
ter
n
et,
w
h
er
e
t
h
e
p
h
y
s
ical
th
i
n
g
s
o
r
o
b
j
ec
ts
ar
e
co
n
n
ec
ted
,
ac
ce
s
s
e
d
an
d
id
en
tif
ied
th
r
o
u
g
h
th
e
I
n
ter
n
et,
m
a
n
y
t
ec
h
n
o
lo
g
ie
s
a
r
e
in
v
o
l
v
ed
in
I
o
T
,
s
u
c
h
as
W
SN
(
W
ir
eles
s
Se
n
s
o
r
s
n
et
w
o
r
k
)
[
2
]
,
in
telli
g
e
n
t
s
en
s
i
n
g
,
R
ad
io
Fre
q
u
e
n
c
y
I
d
e
n
ti
f
icatio
n
(
R
FID
)
[
3
],
6
L
o
W
P
A
N
[
4
],
Nea
r
Fiel
d
co
m
m
u
n
icat
io
n
s
(
NF
C
)
[
5
]
[
6
]
,
lo
w
e
n
er
g
y
w
ir
ele
s
s
co
m
m
u
n
icat
io
n
,
clo
u
d
co
m
p
u
ti
n
g
,
a
n
d
s
o
o
n
.
T
h
ese
tech
n
o
lo
g
ies
w
i
ll
in
ter
ac
t
w
i
th
p
h
y
s
ical
p
h
e
n
o
m
e
n
a
b
y
e
m
p
lo
y
in
g
m
o
r
e
co
n
s
tr
ai
n
e
d
s
en
s
i
n
g
p
latf
o
r
m
s
a
n
d
lo
w
-
e
n
er
g
y
w
ir
ele
s
s
co
m
m
u
n
icatio
n
s
,
t
h
er
ef
o
r
e,
en
d
-
to
-
e
n
d
co
m
m
u
n
ica
tio
n
b
et
w
ee
n
co
n
s
tr
ain
ed
s
en
s
i
n
g
d
e
v
ices
an
d
o
th
er
I
n
ter
n
et
h
o
s
t
w
il
l
b
e
a
f
u
n
d
a
m
e
n
tal
r
eq
u
ir
e
m
e
n
t
o
f
m
an
y
s
e
n
s
in
g
ap
p
licatio
n
u
s
i
n
g
th
e
s
e
tec
h
n
o
lo
g
ies,
t
h
i
s
asp
ec
ts
t
h
at
s
er
io
u
s
l
y
co
m
p
licate
t
h
e
d
esi
g
n
a
n
d
ad
o
p
tio
n
o
f
ap
p
r
o
p
r
iate
s
ec
u
r
it
y
m
ec
h
a
n
i
s
m
s
e
s
p
ec
iall
y
e
n
d
-
to
-
en
d
s
ec
u
r
it
y
m
ec
h
a
n
is
m
s
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
J
E
C
E
I
SS
N:
2
0
8
8
-
8708
E
fficien
t E
n
d
-
to
-
E
n
d
S
ec
u
r
e
K
ey
Ma
n
a
g
eme
n
t P
r
o
to
c
o
l fo
r
I
n
tern
et
o
f Th
in
g
s
(
Ya
min
a
B
en
S
lima
n
e
)
3623
I
n
th
e
li
ter
atu
r
e,
s
e
v
er
al
r
ese
ar
ch
ef
f
o
r
ts
h
a
v
e
b
ee
n
i
n
tr
o
d
u
ce
d
to
o
v
er
co
m
e
ch
al
len
g
es
an
d
f
i
n
d
ap
p
r
o
p
r
iate
s
o
lu
tio
n
s
as
s
o
ciat
ed
to
s
ec
u
r
it
y
esp
ec
iall
y
e
n
d
-
to
-
en
d
s
ec
u
r
it
y
.
So
m
e
r
esear
ch
h
av
e
f
o
c
u
s
ed
th
eir
ef
f
o
r
t
s
to
m
a
k
in
g
th
e
s
ec
u
r
it
y
p
r
o
to
co
l
s
tan
d
ar
d
s
s
u
itab
le
to
th
e
co
n
tex
t
o
f
I
o
T
as
Hu
m
m
e
n
et
al
i
n
[
7
]
,
h
a
v
e
d
ev
elo
p
ed
a
co
m
p
le
m
e
n
tar
y
l
i
g
h
t
w
eig
h
t
f
u
ll
e
x
te
n
s
io
n
to
HI
P
DE
X
(
Ho
s
t
I
d
en
tit
y
P
r
o
to
c
o
l
Diet
E
x
c
h
a
n
g
e)
s
tan
d
ar
d
f
o
r
w
o
r
k
i
n
g
w
i
th
th
e
I
o
T
ar
ch
it
ec
tu
r
e
s
p
ec
i
f
ic
ati
o
n
,
th
i
s
ex
te
n
s
io
n
co
u
ld
b
e
g
en
er
alize
d
to
DT
L
S
p
r
o
to
co
l
an
d
I
KE
.
Oth
er
r
ese
ar
ch
as
Gr
an
j
al
et
a
l
i
n
[
8
]
,
h
av
e
p
r
o
p
o
s
ed
a
p
r
o
ce
d
u
r
e
o
f
d
eleg
atio
n
o
f
lar
g
e
co
m
p
u
tatio
n
in
DT
L
S
p
r
o
to
co
l
to
a
r
ich
r
eso
u
r
ce
en
tit
y
,
A
l
s
o
Olev
ea
u
an
d
Said
in
[
9
]
h
av
e
p
r
esen
ted
a
d
is
tr
ib
u
ted
HI
P
(
D
-
HI
P
)
in
s
p
ir
ed
f
r
o
m
HI
P
-
B
E
X,
T
h
e
y
ar
e
u
s
ed
p
r
o
x
ies
n
o
d
es
to
ca
lcu
lat
e
th
e
DH
p
r
o
to
co
l
o
f
o
p
er
atio
n
s
f
o
r
s
es
s
io
n
k
e
y
e
s
tab
lis
h
m
e
n
t,
ea
c
h
p
r
o
x
y
n
o
d
e
tak
es a
ca
lc
u
latio
n
p
ar
t.
An
o
th
er
v
is
io
n
o
f
s
o
lu
tio
n
h
a
v
e
b
ee
n
in
tr
o
d
u
c
ed
,
it
is
t
h
e
p
r
o
p
o
s
al
o
f
co
m
p
r
ess
io
n
s
ch
e
m
es
ap
p
lied
to
d
if
f
er
en
t
p
r
o
to
co
ls
.
I
n
[
10
,
11
]
,
th
e
au
th
o
r
s
h
a
v
e
p
r
o
p
o
s
ed
I
P
V6
h
ea
d
er
c
o
m
p
r
ess
io
n
,
ex
ten
s
io
n
h
ea
d
er
s
,
an
d
UDP
(
User
Data
g
r
a
m
P
r
o
to
co
l)
h
ea
d
er
s
tan
d
ar
d
ized
th
r
o
u
g
h
6
L
o
W
P
A
N
(
I
P
v
6
o
v
er
L
o
w
p
o
w
er
W
ir
el
ess
P
er
s
o
n
al
A
r
ea
Net
w
o
r
k
s
)
.
Au
th
o
r
s
in
[
12
,
13
]
h
av
e
p
r
esen
ted
6
L
o
W
P
A
N
co
m
p
r
es
s
io
n
s
f
o
r
I
P
s
ec
p
ay
lo
ad
h
ea
d
er
s
:
A
H
(
Au
t
h
e
n
ticatio
n
Hea
d
er
)
an
d
E
SP
(
E
n
ca
p
s
u
l
atin
g
Sec
u
r
it
y
P
a
y
lo
ad
)
.
R
az
a
et
al.
[
1
4
]
h
av
e
p
r
o
p
o
s
ed
a
m
o
d
i
f
icatio
n
o
f
D
T
L
S
h
ea
d
er
s
u
s
i
n
g
t
h
e
6
L
o
W
P
A
N
co
m
p
r
ess
io
n
s
c
h
e
m
e
.
T
h
e
m
o
d
if
ied
p
r
o
to
co
l
r
ed
u
ce
s
th
e
s
ize
o
f
s
o
m
e
h
e
ad
er
s
(
i.e
.
th
e
DT
L
S
r
ec
o
r
d
h
ea
d
er
,
th
e
h
an
d
s
h
a
k
e
h
ea
d
er
,
th
e
h
a
n
d
s
h
ak
e
m
es
s
ag
e)
.
So
m
a
n
y
w
o
r
k
s
f
o
cu
s
o
n
t
h
e
ad
ap
tatio
n
o
f
ex
i
s
ti
n
g
s
ec
u
r
it
y
s
o
lu
tio
n
s
to
t
h
e
s
p
ec
i
f
icatio
n
r
elate
d
to
I
o
T
en
v
ir
o
n
m
en
t,
o
u
r
w
o
r
k
p
r
o
v
id
es
a
s
u
itab
le
k
e
y
m
a
n
ag
e
m
en
t
p
r
o
to
co
l
f
o
r
I
o
T
s
ce
n
ar
io
s
.
I
n
th
i
s
p
ap
er
,
w
e
p
r
o
p
o
s
e
a
n
e
w
lig
h
t
w
ei
g
h
t
k
e
y
m
a
n
ag
e
m
e
n
t
p
r
o
to
co
l
w
h
ich
is
b
ased
o
n
co
o
p
er
atio
n
b
et
w
ee
n
s
elec
ted
r
o
u
ter
s
in
6
lo
W
P
A
N
n
et
w
o
r
k
to
e
s
ta
b
lis
h
a
s
ec
u
r
ed
c
o
m
m
u
n
icatio
n
ch
a
n
n
el
b
et
w
ee
n
a
h
ig
h
l
y
r
eso
u
r
ce
co
n
s
tr
ain
ed
n
o
d
e
in
6
lo
W
P
A
N
n
et
w
o
r
k
an
d
a
r
em
o
te
en
tit
y
(
i.e
.
s
er
v
er
)
.
I
n
o
u
r
p
r
o
to
c
o
l,
th
e
th
ir
d
p
ar
ti
es
(
r
o
u
ter
s
)
h
av
e
a
m
o
r
e
ac
t
iv
e
r
o
le
t
h
r
o
u
g
h
t
ak
in
g
r
esp
o
n
s
ib
ilit
y
to
co
m
p
u
tatio
n
o
f
t
h
e
h
ig
h
l
y
co
n
s
u
m
i
n
g
cr
y
p
to
g
r
ap
h
i
c
p
r
im
iti
v
es.
W
e
h
a
v
e
as
s
es
s
ed
o
u
r
p
r
o
to
co
l u
s
i
n
g
A
VI
SP
A
to
o
l,
th
e
o
b
tai
n
ed
r
es
u
lts
s
h
o
w
s
th
at
o
u
r
p
r
o
to
co
l is
s
af
e
in
ter
m
s
o
f
s
ec
u
r
it
y
p
r
o
p
er
ties
.
Ou
r
p
ap
er
p
r
o
ce
ed
s
as
f
o
llo
w
s
:
I
n
s
ec
tio
n
2
,
w
e
e
x
p
lain
th
e
r
esear
ch
m
et
h
o
d
.
T
h
e
r
esu
lt a
n
d
d
is
cu
s
s
io
n
ar
e
p
r
esen
ted
in
Sec
tio
n
3
.
Fin
all
y
,
Sectio
n
4
co
n
cl
u
d
es
th
e
p
ap
er
.
2.
RE
S
E
ARCH
M
E
T
H
O
D
I
n
t
h
is
s
ec
tio
n
,
w
e
p
r
esen
te
o
u
r
lig
h
t
w
ei
g
h
t
e
n
d
-
to
-
e
n
d
k
e
y
m
an
a
g
e
m
e
n
t
p
r
o
to
co
l.
Firstl
y
,
w
e
g
i
v
e
a
br
ief
o
v
er
v
ie
w
o
n
6
L
o
W
PA
N
n
et
w
o
r
k
.
T
h
en
,
w
ep
r
es
en
te
th
e
p
r
o
p
o
s
ed
n
et
w
o
r
k
m
o
d
el
an
d
s
et
o
f
ass
u
m
p
tio
n
s
.
Af
ter
w
ar
d
s
,
w
e
d
escr
ib
e
o
u
r
p
r
o
p
o
s
ed
p
r
o
t
o
co
l
.
Fin
al
y
w
e
ex
p
lai
n
e
in
d
etail
th
e
d
if
f
er
en
t
p
h
ases
o
f
o
u
r
m
o
d
el
alo
n
g
w
it
h
a
s
u
m
m
ar
y
o
f
th
e
n
o
tatio
n
s
u
s
ed
th
r
o
u
g
h
o
u
t t
h
e
p
ap
er
.
2
.
1
.
6
l
o
WP
AN
Net
w
o
rk
6
L
o
W
P
A
N
is
co
n
n
ec
ti
n
g
m
o
r
e
th
i
n
g
s
to
t
h
e
clo
u
d
.
L
o
w
-
p
o
w
er
,
I
P
-
d
r
iv
en
n
o
d
es
a
n
d
l
ar
g
e
m
e
s
h
n
et
w
o
r
k
s
u
p
p
o
r
t
m
a
k
e
t
h
i
s
tec
h
n
o
lo
g
y
a
g
r
ea
t
o
p
tio
n
f
o
r
I
n
t
er
n
et
o
f
T
h
i
n
g
s
(
I
o
T
)
ap
p
licatio
n
s
.
A
cc
o
r
d
in
g
to
[1
5
]
a
L
o
W
P
A
N
is
L
o
w
-
p
o
w
er
W
ir
eles
s
P
er
s
o
n
al
A
r
ea
Net
w
o
r
k
s
(
L
o
W
P
A
N
s
)
co
m
p
o
s
ed
o
f
d
e
v
ices
co
n
f
o
r
m
i
n
g
to
th
e
I
E
E
E
8
0
2
.
1
5
.
4
-
2
0
0
3
s
tan
d
ar
d
d
ef
in
ed
b
y
t
h
e
I
E
E
E
[
1
6
]
.
I
E
E
E
8
0
2
.
1
5
.
4
d
ev
ices
ar
e
ch
ar
ac
ter
ized
b
y
s
h
o
r
t
r
an
g
e,
lo
w
b
it
r
ate
(
f
r
o
m
2
0
Kb
its
/
s
(
8
6
8
MH
z)
to
2
5
0
Kb
its
/
s
(
2
.
4
5
GHz
)
)
,
Sm
a
ll
p
ac
k
et
s
ize
(
t
h
e
m
a
x
i
m
u
m
tr
a
n
s
m
i
s
s
io
n
u
n
it
o
r
MT
U
o
n
I
E
E
E
8
0
2
.
1
5
.
4
lin
k
s
i
s
1
2
7
b
y
te
s
)
,
lo
w
p
o
w
er
,
an
d
lo
w
co
s
t.
T
h
e
I
P
v
6
o
v
er
L
o
w
-
p
o
w
er
W
P
A
N
(
6
L
o
w
W
P
A
N)
W
o
r
k
i
n
g
Gr
o
u
p
w
as
f
o
r
m
ed
i
n
2
0
0
4
to
w
o
r
k
o
n
p
r
o
to
co
l
s
p
ec
if
icatio
n
s
to
o
p
ti
m
ize
t
h
e
o
p
er
atio
n
o
f
I
P
v
6
o
v
er
n
et
w
o
r
k
s
m
ad
e
o
f
I
E
E
E
8
0
2
.
1
5
.
4
lin
k
s
in
L
o
W
P
A
N
(
L
o
w
-
p
o
w
er
W
ir
eless
P
er
s
o
n
al
A
r
ea
Net
w
o
r
k
s
)
,
it
w
a
s
d
ec
id
ed
to
ex
clu
s
iv
el
y
w
o
r
k
o
n
t
h
e
r
eq
u
ir
ed
I
P
v
6
p
r
o
to
co
l
ex
ten
s
i
o
n
s
f
o
r
L
o
W
P
A
N
(
s
u
c
h
as
f
r
a
g
m
e
n
tat
io
n
a
n
d
r
ea
s
s
e
m
b
l
y
,
h
ea
d
er
co
m
p
r
ess
io
n
,
n
eig
h
b
o
r
d
is
co
v
er
y
ad
ap
tatio
n
,
etc.
)
.
T
h
e
6
L
o
W
P
A
N
W
o
r
k
in
g
Gr
o
u
p
b
elo
n
g
s
to
th
e
I
n
t
er
n
et
ar
ea
(
I
N
T
)
o
f
th
e
I
E
T
F
[1
7
]
,
T
h
en
th
e
R
o
u
ti
n
g
O
v
er
L
o
w
-
p
o
w
er
an
d
L
o
s
s
y
n
et
w
o
r
k
(
R
O
L
L
)
W
o
r
k
in
g
Gr
o
u
p
w
a
s
f
o
r
m
ed
to
d
ea
l
w
ith
r
o
u
ti
n
g
i
s
s
u
es
i
n
n
et
w
o
r
k
s
w
i
th
s
i
m
i
lar
ch
ar
ac
ter
i
s
tics
at
t
h
e
I
P
la
y
er
t
h
u
s
alle
v
ia
tin
g
t
h
e
r
e
s
tr
ictio
n
o
f
u
s
in
g
I
E
E
E
8
0
2
.
1
5
.
4
lin
k
s
,
s
in
ce
b
y
d
e
f
i
n
itio
n
r
o
u
tin
g
o
p
er
ates
at
th
e
n
et
w
o
r
k
la
y
er
.
I
P
v
6
b
ased
W
ir
eless
s
en
s
o
r
n
et
w
o
r
k
ca
n
b
e
co
n
s
id
er
ed
as
o
n
e
en
ab
li
n
g
w
ir
eles
s
tech
n
o
lo
g
ies
th
at
o
f
f
er
s
g
r
ea
te
r
ad
v
an
ta
g
e
f
o
r
th
e
ad
v
an
ce
m
en
t o
f
M2
M
co
m
m
u
n
i
ca
tio
n
.
T
h
e
6
L
o
W
P
A
N
n
et
w
o
r
k
is
c
o
n
n
ec
ted
to
t
h
e
I
P
v
6
n
et
w
o
r
k
u
s
i
n
g
an
ed
g
e
r
o
u
ter
.
T
h
e
e
d
g
e
r
o
u
ter
h
an
d
le
s
th
r
ee
ac
tio
n
s
:
-
T
h
e
d
ata
ex
ch
an
g
e
b
et
w
ee
n
6
L
o
W
P
A
N
d
ev
ice
s
an
d
t
h
e
I
n
te
r
n
et
(
o
r
o
th
er
I
P
v
6
n
et
w
o
r
k
)
.
-
L
o
ca
l d
ata
ex
c
h
an
g
e
b
et
w
ee
n
d
ev
ices i
n
s
id
e
th
e
6
L
o
W
P
A
N.
-
T
h
e
g
en
er
atio
n
a
n
d
m
ai
n
te
n
an
ce
o
f
th
e
r
ad
io
s
u
b
n
et
(
t
h
e
6
L
o
W
P
A
N
n
et
w
o
r
k
)
.
T
h
e
6
L
o
W
P
A
N
n
et
w
o
r
k
s
ar
e
co
n
n
ec
ted
to
o
th
er
n
et
w
o
r
k
s
s
i
m
p
l
y
u
s
i
n
g
I
P
r
o
u
ter
s
.
A
s
s
h
o
w
n
i
n
Fig
u
r
e
1
,
t
h
e
ed
g
e
r
o
u
ter
is
co
n
s
id
er
ed
li
k
e
s
tu
b
n
et
w
o
r
k
.
T
h
is
m
ea
n
s
d
ata
g
o
in
g
in
to
th
e
n
et
w
o
r
k
is
d
esti
n
ed
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2088
-
8708
I
J
E
C
E
Vo
l.
7
,
No
.
6
,
Dec
em
b
er
2
0
1
7
:
3
6
2
2
–
3
6
3
1
3624
f
o
r
o
n
e
o
f
t
h
e
d
ev
ice
s
i
n
s
id
e
t
h
e
6
L
o
W
P
A
N.
6
lo
W
P
A
N
d
ev
ice
m
a
y
b
e
co
n
n
ec
ted
to
th
e
i
n
t
er
n
et
h
o
s
t
i
n
o
th
er
I
P
n
et
w
o
r
k
s
t
h
r
o
u
g
h
o
n
e
o
r
m
o
r
e
ed
g
e
r
o
u
ter
s
th
at
f
o
r
w
ar
d
I
P
d
atag
r
am
s
b
et
w
e
e
n
d
i
f
f
er
e
n
t
m
ed
ia.
Fig
u
r
e
1
.
C
o
n
n
ec
ted
6
L
o
W
P
A
N
n
et
w
o
r
k
w
it
h
I
P
V6
n
et
w
o
r
k
C
o
n
n
ec
ti
v
it
y
to
o
t
h
er
I
P
n
et
wo
r
k
s
m
a
y
b
e
p
r
o
v
id
ed
th
r
o
u
g
h
an
y
ar
b
itra
r
y
lin
k
,
s
u
c
h
a
s
E
t
h
er
n
et,
W
I
-
Fi
o
r
3
G/4
G.
I
n
th
e
T
y
p
ical
6
lo
W
P
A
N
n
et
w
o
r
k
t
h
er
e
ar
e
tw
o
o
th
er
d
ev
ice
t
y
p
es:
r
o
u
ter
s
an
d
h
o
s
t
s
.
R
o
u
ter
s
ca
n
,
as t
h
e
n
a
m
e
i
m
p
l
ies,
r
o
u
t
e
d
ata
d
esti
n
ed
to
an
o
t
h
er
n
o
d
e
in
t
h
e
6
L
o
W
P
A
N
n
e
t
w
o
r
k
.
Ho
s
ts
ar
e
n
o
t a
b
le
to
ro
u
te
d
ata
to
o
th
er
d
ev
ices
in
th
e
n
et
w
o
r
k
.
T
h
e
h
o
s
t
ca
n
al
s
o
b
e
a
s
leep
y
d
ev
ice,
w
a
k
i
n
g
u
p
p
er
io
d
icall
y
to
ch
ec
k
it
s
p
ar
en
t (
a
r
o
u
ter
)
f
o
r
d
ata,
en
ab
lin
g
v
er
y
lo
w
p
o
w
er
co
n
s
u
m
p
tio
n
.
T
h
e
b
asic
co
n
ce
p
t
o
f
6
L
o
W
PA
N
s
tack
i
s
ill
u
s
tr
ated
in
Fig
u
r
e
2
.
6
L
o
W
P
A
N
is
a
n
ad
ap
tati
o
n
la
y
er
is
ad
d
ed
b
etw
ee
n
th
e
n
et
w
o
r
k
a
n
d
I
E
E
E
8
0
2
.
1
5
.
4
MA
C
la
y
er
.
T
h
is
la
y
er
i
s
r
esp
o
n
s
ib
le
to
estab
lis
h
6
lo
W
P
A
N
d
ev
ice’
s
d
ir
ec
t c
o
m
m
u
n
icatio
n
w
it
h
an
y
s
er
v
er
o
n
th
e
i
n
ter
n
et.
Fig
u
r
e
2
.
6
lo
W
P
A
N
p
r
o
to
co
ls
s
tack
2
.
2
.
Net
w
o
rk
M
o
del a
nd
Ass
u
m
ptio
ns
I
n
th
is
w
o
r
k
,
th
e
ar
ch
itectu
r
e
s
h
o
w
n
i
n
Fig
u
r
e
3
is
co
n
s
id
er
ed
.
I
t
c
o
n
s
is
ts
o
f
t
w
o
p
ar
ties
,
th
e
f
ir
s
t
p
ar
t
co
n
s
is
ts
o
f
t
h
e
6
lo
W
P
A
N
h
o
s
t
(
H)
,
6
lo
W
P
A
N
R
o
u
ter
s
(R
i
),
A
cc
e
s
s
C
o
n
tr
o
l
s
er
v
er
(
AC
)
in
6
lo
W
P
A
N
2
0
0
1
:4
3
2
1
::
4
5
6
I
NT
E
R
NE
T
SERVE
R
SERVE
R
R
OUT
E
R
R
OUT
E
R
6
L
o
W
P
A
N
e
d
g
e
2
0
0
1
:1
2
3
4
::
1234
2
0
0
1
:8
7
6
5
::
/4
8
2
0
0
1
:8
7
6
5
:
2
2
::
/5
1
2
0
0
1
:8
7
6
5
:
2
2
:
:3
2
0
0
1
:8
7
6
5
:
2
2
:
:
2
2
0
0
1
:8
7
6
5
:
2
2
::1
2
0
0
1
:8
7
6
5
::
5
4
8
1
R
H
R
R
R
R
H
H
H
::
3
::1
::
8
::
2
::1
::
5
::
7
::
6
::
4
2
0
0
1
:8
7
6
5
:
2
3
::/4
8
::
9
R
H
R
o
u
ter
Ho
s
t
App
li
c
a
tio
n
La
y
e
r
(C
O
AP)
Tr
a
n
spo
r
t
La
y
e
r
(UD
P)
Ne
tw
o
r
k
La
y
e
r
(IP
v
6
)
(RPL)
6
Lo
W
PAN A
d
a
p
tio
n
s L
a
y
e
r
IEE
E
8
0
2
.
1
5
.
4
M
AC
IEE
E
8
0
2
.
1
5
.
4
PHY
Evaluation Warning : The document was created with Spire.PDF for Python.
I
J
E
C
E
I
SS
N:
2
0
8
8
-
8708
E
fficien
t E
n
d
-
to
-
E
n
d
S
ec
u
r
e
K
ey
Ma
n
a
g
eme
n
t P
r
o
to
c
o
l fo
r
I
n
tern
et
o
f Th
in
g
s
(
Ya
min
a
B
en
S
lima
n
e
)
3625
n
et
w
o
r
k
,
th
e
s
ec
o
n
d
p
ar
t
co
n
s
is
ts
o
f
t
h
e
r
e
m
o
te
s
er
v
er
(
R
S)
i
n
I
P
V6
n
et
w
o
r
k
,
f
u
r
t
h
er
m
o
r
e
an
o
th
er
co
m
p
o
n
e
n
t
p
lay
s
r
o
le
in
o
u
r
ar
ch
ite
c
tu
r
e
i
s
th
e
C
er
ti
f
icatio
n
au
t
h
o
r
it
y
s
er
v
er
(
C
A
)
d
eliv
er
s
a
u
t
h
e
n
ticat
ed
ce
r
tif
icate
s
.
T
h
e
A
cc
e
s
s
C
o
n
tr
o
l
(
A
C
)
s
er
v
er
s
u
p
p
o
r
ts
au
th
e
n
ticatio
n
an
d
tr
u
s
t
o
p
er
atio
n
in
6
lo
W
P
AN
n
et
w
o
r
k
an
d
also
p
o
s
s
ess
a
tr
u
s
t
r
elat
io
n
s
h
ip
w
i
th
a
r
e
m
o
te
s
er
v
er
,
6
L
B
R
ca
n
s
er
v
e
a
s
a
g
ate
w
a
y
to
t
h
e
6
lo
W
P
A
N
n
o
d
es
w
h
il
e
co
m
m
u
n
icati
n
g
w
i
th
a
r
e
m
o
te
s
er
v
er
in
t
h
e
I
n
ter
n
et.
Fig
u
r
e
3
.
Net
w
o
r
k
Mo
d
el
I
n
th
is
ar
c
h
itect
u
r
e,
it
is
ass
u
m
ed
th
a
t
all
n
o
d
es
t
h
at
ar
e
r
eg
is
ter
ed
to
t
h
e
6
L
B
R
ar
e
m
o
ti
o
n
less
.
T
h
e
s
elec
ted
6
L
o
W
P
A
N
r
o
u
te
rs
(R
i
)
ar
e
eq
u
ip
p
ed
w
ith
s
u
f
f
icie
n
t
co
m
p
u
tat
io
n
an
d
s
to
r
ag
e
c
ap
ab
ilit
ies
th
a
n
th
e
6
lo
W
P
A
N
h
o
s
t
(
H)
.
Du
r
in
g
in
itia
l
b
o
o
ts
tr
ap
p
in
g
n
et
w
o
r
k
,
th
e
s
ec
u
r
it
y
k
e
y
s
(
w
h
ic
h
ar
e
r
ef
r
esh
ed
p
er
io
d
ically
)
ar
e
d
is
tr
ib
u
ted
to
all
n
o
d
es
b
y
T
h
e
A
cc
es
s
C
o
n
tr
o
l
(
AC
)
s
er
v
er
.
I
n
th
is
n
et
w
o
r
k
w
e
d
is
ti
n
g
u
i
s
h
t
w
o
t
y
p
e
s
o
f
n
o
d
es in
ter
m
o
f
s
to
r
ag
e
ca
p
ac
ities
,
co
m
p
u
tin
g
p
o
w
er
an
d
en
er
g
y
r
eso
u
r
ce
s
:
T
h
e
f
ir
s
t,
h
i
g
h
l
y
r
eso
u
r
ce
co
n
s
tr
ai
n
ed
n
o
d
e
(
6
L
o
W
P
A
N
h
o
s
t
(
H)
)
,
w
h
ich
ar
e
u
n
ab
le
to
p
er
f
o
r
m
p
u
b
lic
k
e
y
cr
y
p
to
g
r
ap
h
ic
o
p
er
atio
n
s
.
T
h
e
s
ec
o
n
d
No
d
e
w
it
h
h
ig
h
ca
p
ab
ilit
ies
o
f
s
t
o
r
ag
e,
en
er
g
y
a
n
d
co
m
p
u
ti
n
g
p
o
w
er
(
th
e
s
elec
te
d
6
lo
W
P
A
N
r
o
u
ter
s
(R
i
)
an
d
t
h
e
r
e
m
o
te
s
er
v
er
(
R
S))
.
2
.
3
.
Descript
io
n
o
f
O
ur
P
ro
p
o
s
ed
P
ro
t
o
co
l
W
h
ile
g
u
ar
an
teein
g
E
2
E
s
ec
u
r
it
y
b
et
w
ee
n
a
6
lo
W
P
A
N
h
o
s
t
(
H)
an
d
a
r
e
m
o
te
s
er
v
er
,
w
e
estab
lis
h
a
s
h
ar
ed
k
e
y
b
et
w
ee
n
th
e
t
w
o
en
d
s
o
f
co
m
m
u
n
icatio
n
,
f
o
r
ac
h
iev
e
th
is
g
o
al,
a
k
e
y
ex
ch
an
g
e
p
r
o
to
co
l
is
r
eq
u
ir
ed
b
etw
ee
n
t
h
e
t
w
o
e
n
ti
ties
to
s
ec
u
r
e
th
e
s
e
co
m
m
u
n
i
ca
ti
o
n
s
.
I
n
t
h
is
s
ec
tio
n
,
w
e
p
r
o
v
id
e
an
o
v
er
v
ie
w
o
v
er
s
tep
s
o
f
o
u
r
p
r
o
to
c
o
l.
Fir
s
tl
y
,
th
e
6
lo
W
P
A
N
h
o
s
t(
H)
is
w
illi
n
g
estab
lis
h
a
s
h
ar
ed
s
ec
r
et
k
e
y
w
it
h
r
e
m
o
te
s
er
v
er
,
it
in
it
iates
o
u
r
p
r
o
to
co
l,
th
e
6
lo
W
P
A
N
h
o
s
t
(
H)
g
en
er
ates
a
s
ec
r
et
k
e
y
(
u
s
i
n
g
o
n
e
o
f
th
e
ap
p
r
o
p
r
iate
m
et
h
o
d
s
f
o
r
r
eso
u
r
ce
co
n
s
tr
ain
ed
n
o
d
e
)
w
h
ic
h
i
s
t
h
e
n
r
an
d
o
m
l
y
s
p
lit
to
s
e
v
er
al
s
ec
r
et
p
ar
ts
,
h
o
w
ev
er
th
is
s
tep
s
i
s
p
er
f
o
r
m
ed
af
ter
an
a
u
th
e
n
tica
tio
n
p
r
o
ce
d
u
r
e
b
et
w
ee
n
a
6
lo
W
P
A
N
h
o
s
t
(
H)
a
n
d
ea
ch
6
lo
W
P
A
N
r
o
u
ter
s
(
R
i
)
.
E
ac
h
p
ar
t
o
f
th
e
s
ec
r
et
k
e
y
is
en
cr
y
p
ted
an
d
s
en
t
to
co
r
r
esp
o
n
d
in
g
6
lo
W
P
A
N
r
o
u
ter
(
R
i
)
b
y
6
lo
W
P
A
N
h
o
s
t(
H)
,
th
is
latter
u
s
e
s
y
m
m
e
tr
i
c
alg
o
r
ith
m
b
as
ed
s
h
ar
ed
k
e
y
f
o
r
en
cr
y
p
tio
n
an
d
MA
C
(
m
es
s
a
g
e
au
th
e
n
tica
tio
n
co
d
e)
to
en
s
u
r
e
au
th
e
n
ticatio
n
.
O
n
ce
th
e
6
lo
W
P
A
N
r
o
u
ter
(
R
i
)
r
ec
eiv
es
its
co
r
r
es
p
o
n
d
in
g
p
ar
t
o
f
th
e
s
ec
r
et
k
e
y
,
it
d
ec
r
y
p
ts
th
e
m
e
s
s
a
g
e
th
e
n
th
e
6
lo
W
PA
N
r
o
u
ter
(
R
i
)
en
cr
y
p
ts
t
h
e
s
a
m
e
m
e
s
s
a
g
e
u
s
i
n
g
p
u
b
lic
k
e
y
e
n
cr
y
p
tio
n
a
n
d
s
en
d
it
to
th
e
r
em
o
te
s
er
v
er
,
th
e
a
u
th
e
n
tica
tio
n
b
et
w
ee
n
t
h
e
6
lo
W
P
A
N
r
o
u
ter
s
an
d
r
e
m
o
te
s
er
v
er
e
n
s
u
r
es
w
it
h
d
i
g
ital
s
i
g
n
at
u
r
e.
Af
ter
r
ec
eiv
in
g
all
th
e
p
ar
t
o
f
s
ec
r
et
k
e
y
b
y
th
e
r
e
m
o
te
s
er
v
er
,
i
t
r
ea
s
s
e
m
b
le
s
th
e
s
h
ar
ed
s
ec
r
et,
w
h
ic
h
w
ill b
e
u
s
ed
to
d
er
iv
e
f
u
r
th
er
k
e
y
i
n
g
m
ater
ial
s
.
IN
TERN
ET
Re
m
o
t
e
S
e
r
v
e
r
6
L
BR
H
R
2
R
1
R
R
R
R
R
3
H
H
H
H
H
H
R
H
H
R
m
K
1
K
2
K
3
K
m
R
i
H
R
em
o
t
e
S
e
r
v
e
r
S
e
g
1
:
S
y
mm
e
t
r
i
c
En
c
r
y
p
t
i
o
n
S
e
g
2
:
A
s
y
mm
e
t
r
i
c
En
c
r
y
p
t
i
o
n
H
R
i
K
i
6
L
BR
6
L
o
W
P
A
N
H
o
st
i
th
6
L
o
W
P
A
N
R
o
u
t
e
r
P
a
r
t
i
c
i
p
a
t
e
d
A
c
c
e
ss
c
o
n
tro
l
se
rv
e
r
C
e
r
t
i
f
i
c
a
t
i
o
n
a
u
t
h
o
r
i
t
y
se
r
v
e
r
6
l
o
W
P
A
N
B
o
r
d
e
r
R
o
u
t
e
r
i
th
p
a
r
t
o
f
se
c
r
e
t
k
e
y
K
K
K
S
e
c
re
t
Ke
y
T
r
u
st
R
e
l
a
t
i
o
n
sh
i
p
W
i
t
h
o
u
t
s
h
a
r
e
d
se
c
re
t
6
Lo
W
PAN
n
e
tw
o
r
k
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2088
-
8708
I
J
E
C
E
Vo
l.
7
,
No
.
6
,
Dec
em
b
er
2
0
1
7
:
3
6
2
2
–
3
6
3
1
3626
2
.
4
.
No
t
a
t
io
ns
a
nd
F
o
r
m
a
l D
escript
io
n
Du
r
in
g
an
i
n
itia
lizatio
n
p
h
a
s
e,
th
e
r
eso
u
r
ce
-
co
n
s
tr
ai
n
ed
6
lo
W
P
A
N
h
o
s
t
(
H)
ca
r
ef
u
ll
y
s
elec
ts
t
h
e
R
1
,
….
.
,
R
m
th
a
t
w
ill
ass
i
s
t
its
k
e
y
e
x
ch
a
n
g
e,
th
is
o
p
er
atio
n
is
r
ea
lized
b
etw
ee
n
t
h
e
H
an
d
6
L
B
R
w
h
er
e
t
h
is
latter
d
eliv
er
s
to
H
th
e
s
elec
ted
6
lo
W
P
A
N
r
o
u
ter
s
(
R
i
)
’
s
id
en
ti
f
ier
s
(
I
Ds),
th
e
6
L
B
R
r
eli
es
o
n
th
e
m
o
d
el
o
f
tr
u
s
t
m
a
n
a
g
e
m
e
n
t
f
o
r
s
elec
tio
n
o
f
6
lo
W
P
A
N
r
o
u
ter
s
.
T
ab
le
1
.
Su
m
m
ar
izes
th
e
n
o
tatio
n
s
u
s
ed
to
p
r
ese
n
t
t
h
e
ex
ch
a
n
g
ed
m
es
s
ag
e
s
,
an
d
Fi
g
u
r
e
4
illu
s
tr
ate
t
h
e
s
u
cc
ee
d
in
g
s
tep
s
o
f
o
u
r
p
r
o
to
co
l.
T
ab
le
1
.
T
h
e
n
o
tat
io
n
s
u
s
ed
in
ex
ch
a
n
g
ed
m
es
s
ag
e
s
N
o
t
a
t
i
o
n
D
e
scri
p
t
i
o
n
H
6
L
o
W
P
A
N
H
o
st
R
i
I
th
6
L
o
W
P
A
N
R
o
u
t
e
r
AC
A
c
c
e
ss
C
o
n
t
r
o
l
S
e
r
v
e
r
RS
R
e
mo
t
e
S
e
r
v
e
r
CA
C
e
r
t
i
f
i
c
a
t
i
o
n
A
u
t
h
o
r
i
t
y
N
X
N
o
n
c
e
g
e
n
e
r
a
t
e
d
b
y
n
o
d
e
X
K
X
-
Y
S
h
a
r
e
d
p
a
i
r
w
i
se
k
e
y
b
e
t
w
e
e
n
X
a
n
d
Y
K
pu
b
l
i
c
-
X
P
u
b
l
i
c
k
e
y
o
f
n
o
d
e
X
(
me
ssag
e
)
K
M
e
ssag
e
e
n
c
r
y
p
t
e
d
w
i
t
h
t
h
e
k
e
y
K
S
i
g
n
X
X
’
s d
i
g
i
t
a
l
s
i
g
n
a
t
u
r
e
M
A
C
M
e
ssag
e
A
u
t
h
e
n
t
i
c
a
t
i
o
n
C
o
d
e
K
i
P
a
r
t
o
f
se
c
r
e
t
K
e
y
K
K
S
e
c
r
e
t
K
e
y
K
C
e
r
t
X
X
’
s C
e
r
t
i
f
i
c
a
t
e
d
e
l
i
v
e
r
e
d
b
y
C
A
l
i
f
e
t
i
me
X
X
’
s Key
l
i
f
e
t
i
me
T
i
c
k
e
t
R
i
(
H
,
R
i
,
K
H
−
R
i
,
li
f
e
t
i
m
e
R
i
,
C
e
r
t
R
i
,
N
H
)
Ste
ps
1
:
6
lo
W
P
A
N
h
o
s
t(
H)
i
n
itiate
s
t
h
e
p
r
o
to
co
l
b
y
s
en
d
i
n
g
a
Hello
_
H
m
es
s
ag
e
to
r
em
o
te
s
er
v
er
(
R
S).
T
h
is
m
e
s
s
a
g
e
co
n
tai
n
s
th
e
s
ec
u
r
it
y
p
o
licies
as
s
o
ci
ated
to
th
e
6
lo
W
P
A
N
h
o
s
t
(
H)
lik
e
en
cr
y
p
tio
n
alg
o
r
ith
m
s
,
li
f
et
i
m
e,
a
n
d
co
m
p
r
e
s
s
io
n
m
et
h
o
d
s
.
etc.
th
e
R
S
r
esp
o
n
s
e
s
w
it
h
Hello
_
R
S
m
es
s
ag
e
w
h
er
e
it
s
elec
ts
ap
p
r
o
p
r
iates
alg
o
r
ith
m
s
.
T
h
e
ex
c
h
a
n
g
ed
m
ess
a
g
es
in
cl
u
d
e
th
e
n
o
n
ce
to
p
r
o
tect
ag
ain
s
t
r
ep
la
y
m
es
s
ag
e.
Ste
ps
2
:
w
h
e
n
th
e
co
n
n
ec
tio
n
b
et
w
ee
n
t
h
e
6
lo
W
P
A
N
h
o
s
t
(
H)
an
d
t
h
e
r
e
m
o
te
s
er
v
er
i
s
s
u
cc
ee
d
,
th
e
6
lo
W
P
A
N
h
o
s
t
(
H)
r
eq
u
est
s
AC
s
er
v
er
to
o
b
tain
t
h
e
s
ec
u
r
i
t
y
-
r
elate
d
in
f
o
r
m
at
io
n
’
s
f
o
r
6
lo
W
P
A
N
r
o
u
ter
s
(
R
i
)
in
v
o
l
v
ed
.
T
h
e
r
eq
u
est
m
e
s
s
a
g
e
id
en
ti
f
ies
th
e
6
lo
W
P
A
N
r
o
u
ter
s
(
R
i
)
a
n
d
6
lo
W
P
A
N
h
o
s
t
(
H)
,
w
h
i
le
also
in
cl
u
d
in
g
a
n
o
n
ce
.
T
h
is
m
e
s
s
ag
e
is
en
cr
y
p
ted
w
it
h
p
r
e
-
s
h
a
r
ed
k
e
y
K
H
-
AC
.
T
h
e
A
C
s
er
v
er
r
esp
o
n
s
es
w
it
h
t
h
e
en
cr
y
p
ted
m
e
s
s
a
g
e
co
n
tai
n
t
h
e
s
ec
r
et
s
h
ar
ed
k
e
y
K
H
−
R
i
b
etw
ee
n
H
an
d
R
i
p
lu
s
6
lo
W
P
A
N
h
o
s
t
(
H)
’
s
I
D
an
d
th
e
n
o
n
ce
.
A
l
s
o
th
e
A
C
b
u
ild
s
an
a
u
th
e
n
tica
tio
n
m
o
d
el
co
n
t
ain
s
th
e
s
ec
u
r
i
t
y
in
f
o
r
m
atio
n
ab
o
u
t
R
i
(
Ti
c
k
e
t
R
i
)
an
d
s
en
d
s
i
t
to
g
et
h
er
w
ith
a
t
o
k
en
co
n
tai
n
i
n
g
th
e
id
e
n
ti
f
ica
tio
n
an
d
a
n
o
n
ce
o
f
6
lo
W
P
A
N
h
o
s
t
(
H)
to
ea
ch
6
lo
W
P
A
N
r
o
u
ter
R
i
.
W
h
en
e
ac
h
6
lo
W
P
A
N
r
o
u
ter
(
R
i
)
r
ec
eiv
e
s
t
h
i
s
m
e
s
s
a
g
e,
it
co
m
p
ar
es
th
e
i
n
f
o
r
m
atio
n
co
n
tain
ed
i
n
t
h
e
t
w
o
to
k
e
n
s
r
ec
eiv
ed
in
o
r
d
er
to
au
th
e
n
ticate
t
h
e
h
o
s
t
(
H)
.
I
n
t
h
e
ca
s
e
o
f
s
u
cc
ess
f
u
l
au
th
e
n
tica
tio
n
,
ea
ch
6
lo
W
P
AN
r
o
u
ter
(
R
i
)
is
p
o
s
s
ess
t
h
e
s
h
ar
ed
s
ec
r
et
k
e
y
K
H
−
R
i
.
T
h
e
r
ep
ly
m
ess
a
g
e
i
s
en
cr
y
p
ted
w
it
h
th
i
s
k
e
y
an
d
ca
r
r
ies to
6
lo
w
p
a
n
Ho
s
t (
H)
w
it
h
n
o
n
ce
.
Ste
p
3
:
if
s
tep
2
is
s
u
cc
ee
d
,
n
o
w
t
h
e
6
lo
W
P
A
N
h
o
s
t(
H)
s
en
d
s
t
h
e
m
es
s
a
g
e
w
itch
i
n
f
o
r
m
s
ea
ch
6
lo
W
P
A
N
r
o
u
ter
(
R
i
)
ab
o
u
t
r
e
m
o
te
s
er
v
er
id
en
t
it
y
,
th
is
m
e
s
s
a
g
e
co
n
tai
n
s
t
h
e
R
S
’
s
I
D
a
n
d
en
cr
y
p
ted
w
i
th
K
H
−
R
i
,
p
lu
s
a
Me
s
s
ag
e
A
u
th
e
n
ticat
i
o
n
C
o
d
e.
Af
ter
R
i
r
ec
eiv
ed
t
h
e
m
es
s
ag
e,
it
p
r
o
v
id
es
th
e
R
S
w
i
th
t
h
eir
ce
r
tif
icate
co
n
tai
n
i
n
g
it
s
p
u
b
l
ic
k
e
y
(
d
eliv
er
ed
b
y
C
A
)
.
I
n
ad
d
itio
n
,
it
r
eq
u
ests
th
e
ce
r
tific
ate
o
f
R
S.
I
n
th
e
r
esp
o
n
s
e
o
f
th
i
s
m
es
s
ag
e
,
R
S
s
en
d
s
r
eq
u
ir
e
in
f
o
r
m
atio
n
.
T
h
e
No
n
ce
is
also
in
clu
d
ed
in
th
e
ex
c
h
an
g
ed
m
es
s
ag
e
s
to
p
r
ev
en
t r
ep
la
y
att
ac
k
s
.
Ste
p
4
:
i
n
t
h
is
s
tep
,
t
h
e
6
lo
W
P
A
N
h
o
s
t
(
H)
g
e
n
er
ates
th
e
s
ec
r
et
Ke
y
K
w
h
ic
h
w
il
l
b
e
u
s
ed
later
to
g
en
er
ate
f
u
r
th
er
k
e
y
i
n
g
m
a
ter
i
als
at
b
o
th
H
a
n
d
R
S
s
id
es.
T
h
e
s
ec
r
et
is
s
p
lit
i
n
to
K
1
,
K
2
,
……K
m
p
ar
ts
.
E
ac
h
p
ar
t
K
i
is
en
cr
y
p
ted
w
ith
s
y
m
m
etr
ic
m
et
h
o
d
s
an
d
s
ec
u
r
el
y
s
e
n
t
w
it
h
M
A
C
to
t
h
e
ap
p
r
o
p
r
iate
6
l
o
W
P
A
N
r
o
u
ter
(R
i
)
in
t
h
e
m
es
s
ag
e
.
A
t
th
e
le
v
el
o
f
ea
c
h
6
lo
W
P
A
N
r
o
u
ter
R
i
,
ea
ch
R
i
u
s
e
s
R
S
’
s
p
u
b
lic
k
e
y
to
e
n
cr
y
p
t
m
es
s
ag
e
.
T
h
is
m
es
s
a
g
e
co
n
ta
in
s
t
h
e
s
ec
r
et
p
ar
t
K
i
a
n
d
R
i
’
s
s
i
g
n
at
u
r
e.
R
S
v
er
if
ie
s
t
h
e
a
u
th
e
n
tic
it
y
o
f
ea
ch
m
es
s
ag
e
u
s
i
n
g
R
i
’
s
p
u
b
lic
k
e
y
.
I
f
all
th
e
m
ess
a
g
e
s
ar
e
r
ec
eiv
ed
an
d
a
u
t
h
en
ticated
s
u
cc
ef
u
ll
y
,
t
h
e
n
R
S
r
ec
o
n
s
tr
u
ct
s
th
e
s
ec
r
et
K.
T
h
is
s
ec
r
et
alo
n
g
w
it
h
t
h
e
p
r
ev
io
u
s
ex
c
h
an
g
ed
n
o
n
ce
ar
e
u
s
ed
to
d
er
iv
e
f
u
r
t
h
er
k
e
y
cr
ed
en
tials
.
T
h
e
n
o
n
ce
s
ar
e
i
n
clu
d
ed
in
th
e
m
e
s
s
a
g
es.
Ste
p
5
:
th
i
s
s
tep
ter
m
in
a
tes
t
h
e
ex
ch
a
n
g
es
m
es
s
ag
e
b
y
p
r
o
v
in
g
to
H
th
e
k
n
o
w
led
g
e
o
f
th
e
s
ec
r
et
K.
T
h
e
d
er
iv
atio
n
p
r
o
ce
s
s
is
e
n
s
u
r
ed
b
y
a
h
a
s
h
f
u
n
ctio
n
a
g
r
ee
d
u
p
o
n
d
u
r
in
g
t
h
e
f
ir
s
t
s
tep
.
B
o
th
p
ar
ties
ar
e
t
h
en
ab
le
to
d
er
iv
e
s
tate
co
n
n
ec
tio
n
k
e
y
s
f
o
r
en
cr
y
p
tio
n
an
d
au
th
e
n
ticatio
n
o
f
t
h
e
ex
c
h
an
g
ed
d
ata.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
J
E
C
E
I
SS
N:
2
0
8
8
-
8708
E
fficien
t E
n
d
-
to
-
E
n
d
S
ec
u
r
e
K
ey
Ma
n
a
g
eme
n
t P
r
o
to
c
o
l fo
r
I
n
tern
et
o
f Th
in
g
s
(
Ya
min
a
B
en
S
lima
n
e
)
3627
Fig
u
r
e
4
.
I
llu
s
tr
atio
n
o
f
th
e
d
i
f
f
er
en
t
s
tep
s
an
d
m
es
s
ag
e
e
x
ch
an
g
e
s
o
f
o
u
r
p
r
o
to
co
l
3.
RE
SU
L
T
S AN
D
D
I
SCU
SS
I
O
N
I
n
th
i
s
s
ec
tio
n
,
w
e
p
r
o
v
id
e
a
d
etailed
an
al
y
s
is
o
f
o
u
r
p
r
o
p
o
s
ed
k
e
y
m
a
n
a
g
e
m
en
t
p
r
o
to
co
l
in
ter
m
s
o
f
s
ec
u
r
it
y
p
r
o
p
er
ties
th
en
w
e
p
r
esen
te
t
h
e
v
alid
atio
n
o
f
o
u
r
p
r
o
to
co
l
u
s
in
g
av
i
s
p
a
to
o
l
an
d
co
m
p
ar
es
th
e
p
er
f
o
r
m
a
n
ce
o
f
o
u
r
m
o
d
el
w
it
h
o
th
er
s
r
esear
c
h
in
li
ter
atu
r
e.
3
.
1
Securit
y
Ana
ly
s
is
Ou
r
an
al
y
s
i
s
is
b
ased
o
n
s
ec
u
r
it
y
p
r
o
p
er
ties
o
f
s
ec
u
r
it
y
p
r
o
to
co
ls
in
I
o
T
p
r
esen
ted
in
[
1
8
]
[
19
].
F
o
r
th
e
f
o
llo
w
i
n
g
d
is
c
u
s
s
io
n
,
w
e
co
n
s
id
er
t
h
at
o
u
r
co
m
m
u
n
ica
t
io
n
c
h
an
n
el
d
i
v
id
es
in
to
t
w
o
s
eg
m
e
n
t
s
(
e
x
p
lain
ed
in
f
ig
u
r
e
3
)
:
Co
nfident
ia
lity
:
th
e
co
n
f
id
e
n
tialit
y
o
f
e
x
ch
a
n
g
e
m
es
s
a
g
es
in
o
u
r
p
r
o
to
co
l
is
r
ea
lized
in
t
w
o
s
e
g
m
e
n
t
s
.
Fo
r
s
eg
1
,
th
e
s
y
m
m
etr
ic
e
n
cr
y
p
t
io
n
i
s
e
f
f
ec
t
u
at
ed
w
it
h
t
h
e
s
et
o
f
p
r
e
-
s
h
ar
ed
k
e
y
s
d
eli
v
er
ed
f
r
o
m
th
e
tr
u
s
ted
ac
ce
s
s
s
er
v
er
A
C
.
w
e
p
r
ef
er
t
h
e
c
h
o
o
s
e
f
o
r
en
cr
y
p
tio
n
al
g
o
r
ith
m
s
t
h
e
A
E
S
-
C
C
M
m
o
d
e
t
h
at
d
ef
in
e
s
A
E
S
-
C
B
C
f
o
r
M
AC
g
en
er
atio
n
w
it
h
A
E
S
-
C
T
R
f
o
r
en
cr
y
p
tio
n
[
20
]
.
Fo
r
s
eg
2
,
th
e
as
y
m
m
etr
ic
en
cr
y
p
tio
n
w
it
h
p
u
b
lic
k
e
y
is
u
s
ed
f
o
r
en
s
u
r
in
g
t
h
e
s
ec
u
r
it
y
co
m
m
u
n
icat
io
n
b
et
w
ee
n
en
titi
es.
W
e
r
ec
o
m
m
e
n
d
th
e
u
s
e
E
C
DH
(
E
llip
tic
C
u
r
v
e
Di
f
f
ie
–
Hel
l
m
a
n
e
x
ch
a
n
g
e)
.
T
h
e
C
A
d
eli
v
er
s
th
e
r
eq
u
ir
ed
ce
r
tif
icate
s
to
t
h
e
i
n
v
o
l
v
ed
en
t
ities
.
O
u
r
p
r
o
to
co
l c
an
b
e
r
u
n
p
er
io
d
ically
to
u
p
d
ate
th
e
esta
b
lis
h
ed
k
e
y
s
i
n
o
r
d
er
t
o
s
tr
en
g
t
h
en
co
n
f
id
en
ti
alit
y
,
an
d
p
r
ev
e
n
t lo
n
g
ter
m
at
tack
s
I
nte
g
rit
y
:
th
r
o
u
g
h
th
e
u
s
e
o
f
MA
C
(
Me
s
s
ag
e
Au
th
e
n
ticat
io
n
C
o
d
e)
[
2
1
]
in
e
x
ch
a
n
g
ed
m
e
s
s
a
g
es
i
n
s
eg
1
,
th
e
d
ata
h
a
v
e
n
o
t b
ee
n
alter
ed
.
T
h
e
s
am
e
ai
m
i
s
en
s
u
r
ed
i
n
s
e
g
2
b
y
u
s
in
g
t
h
e
d
ig
ital
s
ig
n
at
u
r
es,
Aut
hentic
a
t
io
n
a
nd
Aut
ho
r
iza
t
io
n
:
th
e
AC
s
er
v
er
a
s
s
u
r
es
t
h
e
au
th
e
n
ticat
io
n
o
f
t
h
e
co
m
p
o
n
e
n
t
s
i
n
6
lo
W
P
A
N
d
o
m
ai
n
an
d
p
o
s
s
es
s
es a
tr
u
s
ted
r
elatio
n
s
h
ip
w
it
h
th
e
r
e
m
o
te
s
er
v
er
.
F
re
s
hn
es
s
: to
av
o
id
an
y
r
ep
lay
attac
k
s
,
w
e
i
n
c
lu
d
e
n
o
n
ce
in
th
e
d
if
f
er
en
t e
x
c
h
an
g
ed
m
e
s
s
ag
es.
E
x
t
en
s
ibi
lity
a
nd
s
ca
la
bil
it
y
: in
o
u
r
m
o
d
el,
it
is
ea
s
y
to
i
n
te
g
r
ate
a
n
e
w
s
en
s
o
r
.
T
h
is
later
r
ec
eiv
es a
p
r
e
-
s
h
ar
ed
k
e
y
w
it
h
ac
ce
s
s
co
n
tr
o
l
s
er
v
er
d
u
r
in
g
its
b
o
o
ts
tr
ap
p
in
g
p
h
ase
i
n
n
et
w
o
r
k
.
T
h
en
,
it
p
ass
t
h
r
o
u
g
h
an
in
itial
izatio
n
p
h
ase
a
n
d
r
ec
ei
v
e
a
s
elec
ted
6
lo
w
p
a
n
r
o
u
ter
s
’
I
Ds t
h
at
t
h
eir
p
ar
ticip
ated
in
its
k
e
y
ex
c
h
a
n
g
e
p
r
o
to
co
l.
T
h
e
6
L
o
W
P
A
N
n
et
w
o
r
k
i
s
v
u
ln
er
ab
le
f
r
o
m
m
a
n
y
k
in
d
s
o
f
attac
k
li
k
e
r
ep
la
y
attac
k
,
D
Do
s
attac
k
,
s
in
k
h
o
le
attac
k
,
w
o
r
m
h
o
le
at
tack
,
r
an
k
attac
k
,
etc.
Ou
r
p
r
o
to
co
l
p
o
s
s
ess
a
m
ec
h
an
is
m
s
t
h
at
p
r
o
tect
th
e
n
et
w
o
r
k
f
r
o
m
t
h
e
ef
f
ec
t
o
f
t
h
ese
attac
k
s
,
f
o
r
r
ep
lay
attac
k
,
w
e
h
a
v
e
i
m
p
le
m
e
n
ted
th
e
m
ec
h
a
n
i
s
m
s
o
f
th
e
n
o
n
ce
i
n
d
i
f
f
er
en
t
e
x
c
h
an
g
e
m
es
s
ag
e
s
a
n
d
th
e
m
ec
h
a
n
is
m
s
o
f
M
AC
t
h
at
p
r
e
v
en
t
m
o
d
i
f
icatio
n
,
alter
atio
n
,
H
R
i
AC
RS
H
ELLO
_
H
(
,
S
e
c
u
r
ity
Po
li
c
y
)
H
ELLO
_
RS
(
,
S
e
c
u
r
ity
Po
li
c
y
)
∀
i
∈
{
1
,
.
.
,
m
}
(
,
H
,
)_
−
∀
i
∈
{
1
,
.
.
,
m
}
(H
,
−
,
)_
−
∀
i
∈
{
1
,
.
.
,
m
}
(
(
)
−
,
(H
,
)_
−
)
∀
∈
{
,
.
.
,
}
(
)_
−
∀
∈
{
,
.
.
,
}
(
(RS,
,
)_
−
,
M
AC
)
∀
∈
{
,
.
.
,
}
(
,
,
,
,
)
∀
∈
{
,
.
.
,
}
(
,
)
∀
∈
{
,
.
.
,
}
(
(
,
)
_
−
,
M
AC
)
∀
∈
{
,
.
.
,
}
(
,
,
)_
_
(
)
_
K
1
2
S
te
p
1
3
4
5
6
9
10
7
11
1
8
S
te
p
2
S
te
p
4
S
te
p
5
S
te
p
3
12
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2088
-
8708
I
J
E
C
E
Vo
l.
7
,
No
.
6
,
Dec
em
b
er
2
0
1
7
:
3
6
2
2
–
3
6
3
1
3628
in
s
er
tio
n
o
f
m
es
s
ag
e
s
b
y
at
tac
k
er
.
T
h
r
o
u
g
h
t
h
e
a
u
t
h
en
t
icatio
n
m
ec
h
a
n
is
m
s
i
n
o
u
r
p
r
o
to
co
l
th
at
i
n
s
p
ir
ed
f
r
o
m
Ker
b
er
o
s
p
r
o
t
o
co
l
[
2
2
]
,
th
e
ac
ce
s
s
co
n
tr
o
l
s
er
v
er
ca
n
c
h
ec
k
id
en
tit
y
o
f
ea
c
h
n
o
d
e
in
6
L
o
W
P
A
N
n
et
w
o
r
k
.
So
,
it is
i
m
p
o
s
s
ib
le
to
lau
n
ch
a
n
at
tack
li
k
e
s
i
n
k
h
o
le,
w
o
r
m
h
o
le
an
d
DOS
attac
k
s
.
3
.
2
F
o
r
m
a
l V
a
lid
a
t
io
n Wit
h Av
i
s
pa
T
o
o
l
T
h
e
A
VI
SP
A
T
o
o
l
[
2
3
]
is
a
p
u
s
h
-
b
u
t
to
n
to
o
l
f
o
r
th
e
Au
to
m
ated
Valid
atio
n
o
f
I
n
ter
n
et
Secu
r
it
y
P
r
o
to
c
o
ls
an
d
A
p
p
licatio
n
s
.
I
t
p
r
o
v
id
es
a
m
o
d
u
lar
a
n
d
ex
p
r
ess
i
v
e
f
o
r
m
al
la
n
g
u
a
g
e
f
o
r
s
p
ec
if
y
in
g
p
r
o
to
co
ls
an
d
th
eir
s
ec
u
r
it
y
p
r
o
p
er
ties
,
an
d
in
teg
r
ate
s
d
if
f
er
en
t
b
ac
k
-
e
n
d
s
t
h
at
i
m
p
le
m
e
n
t
a
v
ar
iet
y
o
f
au
to
m
atic
p
r
o
to
co
l
an
aly
s
is
tech
n
iq
u
e
s
t
o
illu
s
tr
ate
w
h
e
th
er
t
h
e
ca
n
d
id
ate
p
r
o
to
co
l
is
s
af
e
o
r
n
o
t.
T
h
e
to
o
l
p
r
o
v
id
es
a
tr
ac
e
h
ig
h
lig
h
ti
n
g
th
e
s
tep
s
th
at
h
av
e
led
to
th
e
attac
k
.
I
n
f
a
ct,
A
VI
SP
A
is
co
n
s
id
er
ed
as
an
ef
f
ec
ti
v
e
to
o
l
f
o
r
th
e
an
al
y
s
i
s
o
f
d
if
f
er
en
t
I
n
t
er
n
et
s
ec
u
r
it
y
p
r
o
to
co
ls
an
d
ap
p
licatio
n
s
.
I
n
th
e
liter
atu
r
e,
s
ev
er
al
s
ec
u
r
it
y
p
r
o
to
co
ls
h
av
e
b
ee
n
v
ali
d
ate
d
th
r
o
u
g
h
A
VI
SP
A
[
2
4
]
,
as
I
KE
,
T
L
S,
AAA
p
r
o
to
co
ls
o
f
I
E
T
F.
T
h
e
to
o
l
i
m
p
le
m
en
t
s
th
e
Do
le
v
-
Yao
in
tr
u
d
er
m
o
d
el
[
2
5
]
ab
le
t
o
ea
v
esd
r
o
p
,
in
ter
ce
p
t
m
es
s
ag
e
s
,
in
s
er
t
b
o
g
u
s
d
ata,
o
r
m
o
d
i
f
y
tr
a
f
f
ic
p
as
s
in
g
th
r
o
u
g
h
.
A
VI
SP
A
s
u
p
p
o
r
ts
m
u
ltip
le
b
ac
k
en
d
m
o
d
el
c
h
ec
k
er
s
.
So
m
e
o
f
t
h
e
i
m
p
o
r
tan
t
b
ac
k
-
e
n
d
to
o
ls
u
s
ed
b
y
A
VI
S
P
A
ar
e
OFMC,
C
l
-
AtSe,
S
A
T
MC a
n
d
T
A
4
SP
.
T
h
e
s
p
ec
if
icatio
n
lan
g
u
ag
e
HL
P
S
L
is
u
s
ed
to
d
escr
ib
e
th
e
s
ec
u
r
it
y
p
r
o
to
co
l
as
s
e
q
u
en
ce
s
o
f
ex
ch
a
n
g
ed
m
e
s
s
a
g
es
b
et
w
ee
n
d
if
f
er
en
t
en
t
ities
.
T
h
e
ac
t
io
n
o
f
ea
c
h
e
n
tit
y
i
s
o
r
g
a
n
ized
i
n
a
m
o
d
u
le
ca
lled
b
asic
r
o
le.
Ho
w
ev
er
,
t
h
e
in
ter
ac
tio
n
s
o
f
e
n
ti
ties
ar
e
d
escr
ib
ed
b
y
co
m
p
o
s
i
n
g
m
u
lt
ip
le
b
asi
c
r
o
les
to
g
eth
er
i
n
to
a
co
m
p
o
s
ed
r
o
le.
I
n
ad
d
itio
n
,
th
e
s
ec
u
r
it
y
g
o
als
o
f
th
e
an
a
l
y
ze
d
p
r
o
to
co
l
ar
e
s
p
ec
if
ied
i
n
th
e
g
o
al
s
ec
t
io
n
b
ef
o
r
e
lau
n
ch
i
n
g
t
h
e
a
n
al
y
s
i
s
.
T
h
e
f
o
r
m
al
v
alid
atio
n
o
f
o
u
r
p
r
o
to
co
l
w
a
s
ac
h
iev
ed
u
s
in
g
A
VI
SP
A
to
o
l
to
p
r
o
v
e
th
e
n
o
n
-
v
io
latio
n
o
f
t
h
e
r
eq
u
ir
ed
s
ec
u
r
it
y
p
r
o
p
er
ties
.
I
n
o
u
r
m
o
d
el,
w
e
h
a
v
e
f
ir
s
t
d
e
f
in
ed
a
b
as
ic
r
o
le
to
d
escr
ib
e
th
e
ac
tio
n
s
o
f
th
e
d
i
f
f
er
en
t
e
n
ti
tie
s
i
n
v
o
lv
ed
.
T
h
en
,
w
e
h
a
v
e
d
escr
ib
ed
h
o
w
t
h
e
p
ar
ticip
atin
g
en
t
ities
in
ter
ac
t
w
i
th
ea
c
h
o
t
h
er
i
n
a
co
m
p
o
s
ed
r
o
le.
T
h
e
r
esu
lts
o
f
th
e
s
i
m
u
latio
n
s
h
o
w
th
a
t
o
u
r
p
r
o
to
co
l
is
“
s
a
f
e”
ag
ain
s
t
O
FMC
(
s
ee
Fi
g
u
r
e
5
)
,
C
L
-
AtSe
(
s
ee
F
ig
u
r
e
6
)
an
d
S
A
T
MC
(
s
ee
Fi
g
u
r
e
7
)
.
Ho
w
e
v
er
,
ag
ai
n
s
t
T
A
4
SP
d
atab
ase,
th
e
r
esu
lt
w
as
‘
‘
I
N
C
ONC
L
USI
VE
’
’
(
s
ee
Fi
g
u
r
e
8
)
.
T
h
ese
r
ep
o
r
ts
o
f
ea
ch
b
ac
k
e
n
d
m
o
d
el
p
r
o
d
u
ce
d
b
y
AVI
SP
A
to
o
l
ex
p
lai
n
ed
th
at
o
u
r
p
r
o
to
co
l
is
s
af
e
r
eg
ar
d
in
g
t
h
e
s
p
ec
i
f
ied
s
ec
u
r
it
y
g
o
al.
I
t
is
i
m
p
o
s
s
ib
le
f
o
r
an
attac
k
er
to
v
io
late
an
y
o
f
t
h
e
s
p
ec
if
ied
s
ec
u
r
it
y
p
r
o
p
er
ties
,
an
d
d
is
r
u
p
t th
e
f
u
n
ctio
n
i
n
g
o
f
th
e
p
r
o
to
co
l.
Fig
u
r
e
5
.
B
ac
k
-
en
d
A
VI
SP
A
(
OFMC)
Fig
u
r
e
6
.
B
ac
k
-
en
d
A
VI
SP
A
(
C
L
-
AtSe)
Evaluation Warning : The document was created with Spire.PDF for Python.
I
J
E
C
E
I
SS
N:
2
0
8
8
-
8708
E
fficien
t E
n
d
-
to
-
E
n
d
S
ec
u
r
e
K
ey
Ma
n
a
g
eme
n
t P
r
o
to
c
o
l fo
r
I
n
tern
et
o
f Th
in
g
s
(
Ya
min
a
B
en
S
lima
n
e
)
3629
Fig
u
r
e
7
.
B
ac
k
-
en
d
A
VI
SP
A
(
S
A
T
MC)
Fig
u
r
e
8
.
B
ac
k
-
en
d
A
VI
SP
A
(
T
A
4
SP
)
I
n
o
r
d
er
to
d
eter
m
i
n
e
th
e
p
er
f
o
r
m
a
n
ce
o
f
o
u
r
p
r
o
p
o
s
ed
p
r
o
to
co
l,
w
e
co
m
p
ar
ed
o
u
r
k
e
y
ex
ch
an
g
e
s
c
h
e
m
e
ag
ain
s
t o
th
er
s
s
ch
e
m
e
s
.
As s
e
en
in
tab
le
2
,
o
n
e
o
f
t
h
e
m
aj
o
r
d
if
f
er
e
n
ce
s
b
et
w
ee
n
th
e
p
r
o
p
o
s
ed
m
et
h
o
d
an
d
o
th
er
m
e
n
tio
n
ed
m
eth
o
d
s
i
s
th
at
w
e
p
r
o
p
o
s
e
an
au
t
h
en
t
icatio
n
p
h
ase
i
n
o
u
r
p
r
o
to
co
l w
i
th
o
u
t in
cr
ea
s
in
g
co
m
p
u
tatio
n
al
an
d
s
to
r
ag
e
co
s
t in
6
L
o
W
P
A
N
n
et
w
o
r
k
s
p
ec
i
all
y
f
o
r
6
L
B
R
an
d
r
o
u
ter
(R
i
).
f
o
r
ex
a
m
p
le
i
n
S
A
KE
S
[
2
6
]
,
th
er
e
is
o
n
e
6
lo
W
P
A
N
r
o
u
ter
o
n
l
y
t
h
at
p
ar
tici
p
ates in
k
e
y
estab
li
s
h
e
m
e
n
t sc
h
e
m
e
u
s
in
g
DH
(
Dif
f
ie
–
Hell
m
an
)
al
g
o
r
ith
m
.
T
h
u
s
,
th
e
s
to
r
ag
e
an
d
co
m
p
u
tati
o
n
al
co
s
t in
6
L
o
W
P
A
N
r
o
u
ter
au
g
m
e
n
te.
Un
l
ik
e
S
A
KE
S
,
th
e
p
r
o
p
o
s
ed
m
o
d
el
u
s
e
s
th
e
s
e
lectio
n
ed
s
et
o
f
r
o
u
t
er
s
b
ased
o
n
tr
u
s
t
m
o
d
el
a
n
d
em
p
lo
y
t
h
e
cr
y
p
to
g
r
ap
h
ic
alg
o
r
it
h
m
E
C
D
H
(
E
llip
tic
C
u
r
v
e
Di
f
f
ie
–
He
l
l
m
an
)
t
h
at
it
’
s
co
n
s
id
er
ab
le
as
lig
h
t
w
ei
g
h
t
alg
o
r
ith
m
m
o
r
e
t
h
an
DH
f
o
r
co
n
s
tr
ain
ed
d
ev
ice
.
An
o
th
er
ad
v
an
ta
g
e
o
f
t
h
e
p
r
o
p
o
s
ed
m
et
h
o
d
is
t
h
e
u
s
ed
o
f
an
ac
ce
s
s
co
n
tr
o
l
s
er
v
er
t
h
at
e
n
s
u
r
e
au
to
r
is
atio
n
an
d
a
u
t
h
e
n
ticatio
n
i
n
6
L
o
W
P
A
N
n
et
w
o
r
k
a
n
d
d
ec
r
ea
s
e
th
e
s
to
r
ag
e
co
s
t
i
n
6
L
B
R
,
f
o
r
e
x
a
m
p
le
in
[
2
7
]
-
[
2
8
]
d
id
n
o
t p
r
o
p
o
s
ed
th
e
au
t
h
en
t
icatio
n
s
y
s
te
m
i
n
6
L
o
W
P
A
N
n
et
w
o
r
k
.
H
o
w
ev
er
i
n
S
A
KE
S,
t
h
er
e
is
a
n
m
o
d
u
le
i
n
b
o
r
d
er
r
o
u
ter
th
at
en
s
u
r
e
au
t
h
e
n
ticatio
n
in
6
L
o
W
P
A
N
n
et
w
o
r
k
,
b
u
t
t
h
is
m
ec
an
is
m
i
n
cr
ea
s
es
th
e
s
to
r
ag
e
co
s
t in
6
L
B
R
W
h
ic
h
l
ea
d
s
to
th
e
n
et
w
o
r
k
ca
n
n
o
t b
e
ea
s
il
y
e
x
te
n
d
.
T
ab
le
2
.
Su
m
m
ar
izes t
h
e
d
if
f
e
r
en
ts
m
etr
ics o
f
co
m
p
ar
ai
s
o
n
M
e
t
h
o
d
s
A
u
t
h
e
n
t
i
c
a
t
i
o
n
i
n
6
L
o
W
P
A
N
n
e
t
w
o
r
k
S
t
o
r
a
g
e
c
o
st
i
n
b
o
r
d
e
r
r
o
u
t
e
r
(
6
L
B
R
)
C
o
mp
u
t
a
t
i
o
n
a
l
c
o
st
i
n
6
L
o
W
P
A
N
r
o
u
t
e
r
(R
i
)
En
c
r
y
p
t
i
o
n
a
l
g
o
r
i
t
h
ms
S
c
a
l
a
b
i
l
i
t
y
&
e
x
t
e
n
si
b
i
l
i
t
y
R
e
si
l
i
a
n
c
e
S
A
K
ES
[
2
6
]
+
x
x
x
+
+
S
e
c
u
r
e
c
o
mm
u
n
i
c
a
t
i
o
n
i
n
I
P
-
b
a
se
d
w
i
r
l
e
ss
se
n
so
r
n
e
t
w
o
r
k
s v
i
a
a
t
r
u
st
e
d
g
a
t
e
w
a
y
[
2
7
]
-
x
*
*
-
+
S
e
c
u
r
e
a
n
d
C
o
st
-
e
f
f
e
c
t
i
v
e
A
p
p
l
i
c
a
t
i
o
n
L
a
y
e
r
P
r
o
t
o
c
o
l
w
i
t
h
A
u
t
h
e
n
t
i
c
a
t
i
o
n
I
n
t
e
r
o
p
e
r
a
b
i
l
i
t
y
f
o
r
I
O
T
[
2
8
]
-
*
*
*
-
+
O
u
r
p
r
o
t
o
c
o
l
+
*
*
*
+
+
W
h
e
r
e
+,
-
,
x
,
*
d
e
n
o
t
e
r
e
sp
e
c
t
i
v
e
l
y
:
su
p
p
o
r
t
e
d
,
n
o
t
s
u
p
p
o
r
t
e
d
,
I
mp
o
r
t
a
n
t
,
L
o
w
i
n
O
v
e
r
h
e
a
d
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2088
-
8708
I
J
E
C
E
Vo
l.
7
,
No
.
6
,
Dec
em
b
er
2
0
1
7
:
3
6
2
2
–
3
6
3
1
3630
4.
CO
NCLU
SI
O
N
Dev
ice
a
n
d
n
et
w
o
r
k
co
n
s
tr
ai
n
ts
in
I
o
T
n
ec
ess
itate
th
e
e
m
p
l
o
y
ed
p
r
o
to
co
ls
to
b
e
tailo
r
ed
t
o
w
ar
d
s
th
e
s
p
ec
ial
r
eq
u
ir
e
m
en
t
s
o
f
I
o
T
n
et
w
o
r
k
en
v
ir
o
n
m
e
n
ts
,
in
t
h
is
p
ap
er
w
e
p
r
esen
ted
a
k
e
y
m
a
n
ag
e
m
e
n
t
p
r
o
to
co
l
s
u
itab
le
a
co
n
s
tr
ai
n
t e
n
v
ir
o
n
m
en
ts
l
ik
e
6
L
o
W
P
A
N
n
et
w
o
r
k
,
th
is
p
r
o
to
co
l
h
as e
s
tab
lis
h
ed
a
s
h
ar
ed
s
ec
r
et
k
e
y
b
et
w
ee
n
t
h
e
6
L
o
w
P
AN
Ho
s
t
an
d
a
r
e
m
o
te
s
er
v
er
in
I
P
V
6
n
et
w
o
r
k
.
D
u
r
in
g
t
h
e
ex
ec
u
tin
g
p
r
o
ce
s
s
o
f
o
u
r
p
r
o
to
co
l,
th
e
co
n
s
tr
ai
n
ed
n
o
d
e
u
s
e
o
n
l
y
s
y
m
m
etr
ic
c
r
y
p
to
g
r
ap
h
y
.
B
esid
es,
t
h
e
h
ea
v
y
as
y
m
m
etr
ic
cr
y
p
to
g
r
ap
h
y
i
s
af
f
ec
ted
to
s
el
ec
ted
6
L
o
W
P
A
N
r
o
u
ter
s
.
I
n
ad
d
itio
n
,
au
th
e
n
ticatio
n
s
y
s
te
m
in
6
L
o
w
p
a
n
is
r
ea
lized
b
y
AC
s
er
v
er
,
th
is
later
s
to
ck
a
ll
s
ec
u
r
it
y
-
r
elate
d
in
f
o
r
m
a
tio
n
ab
o
u
t
co
m
p
o
n
en
ts
o
f
6
L
o
W
P
A
N
n
et
w
o
r
k
.
T
h
is
m
ec
h
a
n
is
m
m
iti
g
ate
t
h
e
o
v
er
h
ea
d
s
to
r
ag
e
o
f
s
ec
u
r
it
y
i
n
f
o
r
m
atio
n
i
n
ea
c
h
n
o
d
e.
T
h
e
s
ec
u
r
it
y
p
r
o
p
er
ties
ar
e
s
a
tis
f
ied
i
n
o
u
r
p
r
o
to
co
l.
T
h
e
f
u
t
u
r
e
w
o
r
k
f
o
cu
s
o
n
t
h
e
ad
ap
tatio
n
of
tr
u
s
t
m
a
n
ag
e
m
e
n
t
p
r
o
to
co
l
th
at
allo
w
s
th
e
6
L
B
R
s
e
lects
t
h
e
tr
u
s
ted
6
L
o
W
P
A
N
R
o
u
ter
s
.
RE
F
E
R
E
NC
E
S
[1
]
O.
V
e
rm
e
sa
n
,
a
n
d
P
.
F
ries
s,
In
tern
e
t
o
f
th
i
n
g
s
-
f
ro
m
re
se
a
r
c
h
a
n
d
i
n
n
o
v
a
ti
o
n
to
m
a
rk
e
t
d
e
p
lo
y
m
e
n
t:
Riv
e
r
P
u
b
l
ish
e
rs A
a
lb
o
rg
,
2
0
1
4
.
[2
]
F
.
L
ian
g
,
L
.
Zh
a
n
g
,
a
n
d
P
.
S
u
n
,
“
S
tu
d
y
o
n
th
e
Ro
u
g
h
-
se
t
-
b
a
se
d
Clu
ste
rin
g
A
lg
o
rit
h
m
f
o
r
S
e
n
so
r
Ne
tw
o
rk
s
”
,
Bu
ll
e
ti
n
o
f
El
e
c
trica
l
E
n
g
in
e
e
rin
g
a
n
d
I
n
fo
rm
a
t
ics
,
v
o
l.
3
,
n
o
.
2
,
p
p
.
7
7
-
9
0
,
2
0
1
4
.
[3
]
K.
A
sh
to
n
,
“
T
h
a
t
‘in
ter
n
e
t
o
f
th
i
n
g
s’ t
h
in
g
”
,
RF
iD
J
o
u
rn
a
l
,
v
o
l.
2
2
,
n
o
.
7
,
p
p
.
9
7
-
1
1
4
,
2
0
0
9
.
[4
]
C.
Bo
rm
a
n
n
,
“
6
L
o
W
P
A
N R
o
a
d
m
a
p
a
n
d
Im
p
lem
e
n
tatio
n
G
u
id
e
”
,
2
0
1
3
.
[5
]
B.
Oz
d
e
n
izc
i,
V
.
C
o
sk
u
n
,
a
n
d
K
.
Ok
,
“
NFC
in
tern
a
l:
A
n
i
n
d
o
o
r
n
a
v
ig
a
ti
o
n
sy
ste
m
”
,
S
e
n
so
rs
,
v
o
l
.
1
5
,
n
o
.
4
,
p
p
.
7
5
7
1
-
7
5
9
5
,
2
0
1
5
.
[6
]
F
.
F
e
rd
ian
t
i,
a
n
d
Y.
T
riy
u
s
w
o
y
o
,
“
Util
iza
ti
o
n
o
f
Ne
a
r
F
ield
Co
m
m
u
n
ica
ti
o
n
T
e
c
h
n
o
lo
g
y
f
o
r
L
o
y
a
lt
y
M
a
n
a
g
e
m
e
n
t
”
,
T
EL
KOM
NIKA
(
T
e
lec
o
mm
u
n
ica
t
io
n
C
o
mp
u
ti
n
g
E
lec
tro
n
ics
a
n
d
C
o
n
tro
l),
v
o
l
.
1
1
,
n
o
.
3
,
p
p
.
6
1
7
-
6
2
4
,
2
0
1
3
.
[7
]
R.
Hu
m
m
e
n
,
H.
W
irt
z
,
J.
H.
Zi
e
g
e
ld
o
rf
,
J.
Hill
e
r,
a
n
d
K.
Weh
rle,
“
T
a
il
o
rin
g
e
n
d
-
to
-
e
n
d
I
P
se
c
u
rit
y
p
ro
t
o
c
o
ls
to
th
e
In
tern
e
t
o
f
T
h
in
g
s
”
,
in
20
1
3
2
1
st
IEE
E
In
ter
n
a
ti
o
n
a
l
C
o
n
fer
e
n
c
e
o
n
Ne
two
rk
Pro
t
o
c
o
ls
(
ICNP)
,
2
0
1
3
,
p
p
.
1
-
10.
[8
]
J.
G
ra
n
jal,
E.
M
o
n
teiro
,
a
n
d
J.
S
.
S
il
v
a
,
“
En
d
-
to
-
e
n
d
tran
sp
o
r
t
-
lay
e
r
se
c
u
rit
y
f
o
r
In
tern
e
t
-
in
te
g
ra
ted
se
n
sin
g
a
p
p
li
c
a
ti
o
n
s
w
it
h
m
u
tu
a
l
a
n
d
d
e
l
e
g
a
te
d
ECC
p
u
b
l
ic
-
k
e
y
a
u
th
e
n
ti
c
a
ti
o
n
”
,
in
IFI
P
Ne
tw
o
rk
in
g
C
o
n
fer
e
n
c
e
,
IEE
E
,
2
0
1
3
,
p
p
.
1
-
9.
[9
]
Y.
B.
S
a
ied
a
n
d
A
.
Oliv
e
re
a
u
,
“
D
-
HIP
:
A
d
istri
b
u
ted
k
e
y
e
x
c
h
a
n
g
e
sc
h
e
m
e
f
o
r
HIP
-
b
a
se
d
I
n
tern
e
t
o
f
T
h
in
g
s
”
,
in
W
o
rld
o
f
W
ire
les
s,
M
o
b
il
e
a
n
d
M
u
lt
ime
d
i
a
Ne
two
rk
s
(W
o
W
M
o
M
),
2
0
1
2
IEE
E
In
ter
n
a
ti
o
n
a
l
S
y
mp
o
si
u
m
o
n
a
,
2
0
1
2
,
p
p
.
1
-
7.
[1
0
]
G
.
M
o
n
ten
e
g
ro
,
N.
Ku
sh
a
ln
a
g
a
r,
J.
Hu
i,
a
n
d
D.
Cu
ll
e
r,
“
T
ra
n
sm
is
sio
n
o
f
IP
v
6
p
a
c
k
e
ts
o
v
e
r
I
EE
E
8
0
2
.
1
5
.
4
n
e
tw
o
rk
s
”
,
2070
-
1
7
2
1
,
2
0
0
7
.
[1
1
]
J.
Hu
i
a
n
d
P
.
T
h
u
b
e
rt,
“
Co
m
p
re
ss
io
n
f
o
rm
a
t
f
o
r
IP
v
6
d
a
tag
ra
m
s
o
v
e
r
IEE
E
8
0
2
.
1
5
.
4
-
b
a
se
d
n
e
t
w
o
rk
s
”
,
In
tern
e
t
p
ro
p
o
se
d
sta
n
d
a
rd
,
RF
C
6
2
8
2
,
2
0
1
1
.
[1
2
]
J.
G
r
a
n
jal,
E.
M
o
n
teir
o
,
a
n
d
J.S
.
S
il
v
a
,
“
En
a
b
li
n
g
n
e
tw
o
rk
-
la
y
e
r
se
c
u
rit
y
o
n
IP
v
6
w
irele
ss
s
e
n
so
r
n
e
tw
o
rk
s
”
,
in
Glo
b
a
l
T
e
l
e
c
o
mm
u
n
ica
ti
o
n
s C
o
n
f
e
re
n
c
e
(
GLOBE
COM
2
0
1
0
)
,
2
0
1
0
IEE
E
,
2
0
1
0
,
p
p
.
1
-
6.
[1
3
]
S
.
Ra
z
a
,
S
.
Du
q
u
e
n
n
o
y
,
T
.
Ch
u
n
g
,
D.
Ya
z
a
r,
T
.
V
o
ig
t,
a
n
d
U.
Ro
e
d
ig
,
“
S
e
c
u
rin
g
c
o
m
m
u
n
ica
ti
o
n
in
6
L
o
W
P
A
N
w
it
h
c
o
m
p
re
ss
e
d
IP
se
c
”
,
in
2
0
1
1
In
ter
n
a
ti
o
n
a
l
C
o
n
fer
e
n
c
e
o
n
Distrib
u
ted
C
o
mp
u
ti
n
g
in
S
e
n
so
r
S
y
ste
ms
a
n
d
W
o
rk
sh
o
p
s (
DCO
S
S
)
,
2
0
1
1
,
p
p
.
1
-
8.
[1
4
]
S
.
Ra
z
a
,
H.
S
h
a
f
a
g
h
,
K.
He
w
a
g
e
,
R.
Hu
m
m
e
n
,
a
n
d
T
.
V
o
ig
t,
“
L
it
h
e
:
L
ig
h
tw
e
i
g
h
t
se
c
u
re
Co
A
P
f
o
r
th
e
i
n
tern
e
t
o
f
th
in
g
s
”
,
IEE
E
S
e
n
s
o
rs
J
o
u
r
n
a
l
,
v
o
l.
13,
n
o
.
1
0
,
p
p
.
3
7
1
1
-
3
7
2
0
,
2
0
1
3
.
[1
5
]
N.
Ku
sh
a
ln
a
g
a
r,
G
.
M
o
n
ten
e
g
ro
,
a
n
d
C.
S
c
h
u
m
a
c
h
e
r,
“
IP
v
6
o
v
e
r
lo
w
-
p
o
w
e
r
w
ir
e
les
s
p
e
rso
n
a
l
a
re
a
n
e
t
w
o
rk
s
(6
L
o
W
P
A
Ns
):
o
v
e
rv
ie
w
,
a
s
su
m
p
t
io
n
s,
p
ro
b
lem
sta
te
m
e
n
t,
a
n
d
g
o
a
l
s
”
,
2
0
7
0
-
1
7
2
1
,
2
0
0
7
.
[1
6
]
L
.
M
.
S
.
Co
m
m
it
tee
,
Pa
rt
1
5
.
4
:
wi
re
les
s
me
d
iu
m
a
c
c
e
ss
c
o
n
tro
l
(
M
AC)
a
n
d
p
h
y
sic
a
l
l
a
y
e
r
(
PHY
)
sp
e
c
if
ica
ti
o
n
s
fo
r
lo
w
-
ra
te wi
re
les
s p
e
rs
o
n
a
l
a
re
a
n
e
two
rk
s (
L
R
-
W
PA
Ns)
,
2
0
0
3
.
[1
7
]
J.P
.
V
a
ss
e
u
r,
a
n
d
A
.
Du
n
k
e
ls,
In
t
e
rc
o
n
n
e
c
ti
n
g
sm
a
rt
o
b
jec
ts
wit
h
i
p
:
T
h
e
n
e
x
t
in
ter
n
e
t
:
M
o
rg
a
n
Ka
u
fm
a
n
n
,
2
0
1
0
.
[1
8
]
K.T
.
N
g
u
y
e
n
,
M
.
Lau
re
n
t,
a
n
d
N.
Ou
a
lh
a
,
“
S
u
rv
e
y
o
n
se
c
u
re
c
o
m
m
u
n
ica
ti
o
n
p
ro
t
o
c
o
ls
f
o
r
th
e
In
tern
e
t
o
f
T
h
in
g
s”
,
Ad
Ho
c
Ne
tw
o
rk
s,
v
o
l.
3
2
,
p
p
.
1
7
-
3
1
,
2
0
1
5
.
[1
9
]
R.
Ro
m
a
n
,
C.
A
lc
a
ra
z
,
J.
L
o
p
e
z
,
a
n
d
N.
S
k
lav
o
s,
“
Ke
y
m
a
n
a
g
e
m
e
n
t
sy
ste
m
s
f
o
r
se
n
so
r
n
e
tw
o
rk
s
in
th
e
c
o
n
tex
t
o
f
th
e
In
ter
n
e
t
o
f
T
h
in
g
s
”
,
Co
mp
u
ter
s
&
El
e
c
trica
l
En
g
in
e
e
rin
g
,
v
o
l
.
3
7
,
n
o
.
2
,
p
p
.
1
4
7
-
1
5
9
,
2
0
1
1
.
[2
0
]
M
.
J.
Dw
o
rk
in
,
“
S
p
8
0
0
-
3
8
c
.
re
c
o
m
m
e
n
d
a
ti
o
n
f
o
r
b
l
o
c
k
c
ip
h
e
r
m
o
d
e
s o
f
o
p
e
ra
ti
o
n
:
t
h
e
c
c
m
m
o
d
e
fo
r
a
u
th
e
n
ti
c
a
ti
o
n
a
n
d
c
o
n
f
id
e
n
ti
a
li
ty
”
,
2
0
0
4
.
[2
1
]
Z.
G
o
n
g
,
P
.
Ha
rtel,
S
.
Nik
o
v
a
,
S
.
H.
T
a
n
g
,
a
n
d
B
.
Z
h
u
,
“
T
u
L
P
:
A
f
a
m
il
y
o
f
li
g
h
tw
e
i
g
h
t
m
e
ss
a
g
e
a
u
th
e
n
ti
c
a
ti
o
n
c
o
d
e
s f
o
r
b
o
d
y
se
n
so
r
n
e
tw
o
rk
s
”
,
J
o
u
rn
a
l
o
f
c
o
mp
u
ter
sc
ien
c
e
a
n
d
t
e
c
h
n
o
l
o
g
y
,
v
o
l
.
2
9
,
n
o
.
1
,
p
p
.
5
3
-
6
8
,
2
0
1
4
.
[2
2
]
B.
C.
Ne
u
m
a
n
,
a
n
d
T
.
T
s'
o
,
“
Ke
r
b
e
ro
s:
A
n
a
u
th
e
n
ti
c
a
ti
o
n
se
rv
ice
f
o
r
c
o
m
p
u
ter
n
e
tw
o
rk
s
”
,
IEE
E
C
o
mm
u
n
ic
a
ti
o
n
s
ma
g
a
zi
n
e
,
v
o
l.
3
2
,
n
o
.
9
,
p
p
.
3
3
-
3
8
,
1
9
9
4
.
[2
3
]
Av
isp
a
–
a
to
o
l
f
o
r
a
u
t
o
m
a
ted
v
a
l
id
a
ti
o
n
o
f
in
tern
e
t
se
c
u
rit
y
p
ro
to
c
o
ls.
<
h
tt
p
:/
/w
ww
.
a
v
isp
a
-
p
ro
jec
t.
o
rg
>
.
[2
4
]
S
.
M
o
e
d
e
rsh
e
im
a
n
d
P
.
Drie
lsm
a
,
“
A
V
IS
P
A
P
ro
jec
t
De
li
v
e
ra
b
le
D6
.
2
:
S
p
e
c
if
ica
ti
o
n
o
f
th
e
P
ro
b
l
e
m
s
in
th
e
Hig
h
-
L
e
v
e
l
S
p
e
c
if
ic
a
ti
o
n
L
a
n
g
u
a
g
e
(2
0
0
3
)
”
,
e
d
,
1
9
9
7
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
J
E
C
E
I
SS
N:
2
0
8
8
-
8708
E
fficien
t E
n
d
-
to
-
E
n
d
S
ec
u
r
e
K
ey
Ma
n
a
g
eme
n
t P
r
o
to
c
o
l fo
r
I
n
tern
et
o
f Th
in
g
s
(
Ya
min
a
B
en
S
lima
n
e
)
3631
[2
5
]
D.
Do
lev
a
n
d
A
.
Ya
o
,
On
th
e
S
e
c
u
rit
y
o
f
P
u
b
l
ic
Ke
y
P
ro
d
u
c
t
s:
De
p
a
rt
m
e
n
t
o
f
Co
m
p
u
ter
S
c
i
e
n
c
e
,
S
tan
f
o
rd
Un
iv
e
rsit
y
,
1
9
8
1
.
[2
6
]
H.R.
Hu
ss
e
n
,
G
.
A
.
T
iz
a
z
u
,
M
.
T
in
g
,
T
.
L
e
e
,
Y.
Ch
o
i,
a
n
d
K.H
.
Kim
,
“
S
A
KES
:
S
e
c
u
re
a
u
th
e
n
ti
c
a
ti
o
n
a
n
d
k
e
y
e
sta
b
li
sh
m
e
n
t
sc
h
e
m
e
f
o
r
M
2
M
c
o
m
m
u
n
ica
ti
o
n
i
n
t
h
e
I
P
-
b
a
se
d
w
irele
s
s
se
n
so
r
n
e
tw
o
rk
(6
L
0
W
P
A
N)
”
,
in
Ub
iq
u
it
o
u
s a
n
d
Fu
t
u
re
Ne
two
rk
s
(
ICUFN),
2
0
1
3
Fi
ft
h
I
n
ter
n
a
ti
o
n
a
l
Co
n
fer
e
n
c
e
o
n
,
2
0
1
3
,
p
p
.
2
4
6
-
2
5
1
.
[2
7
]
F
.
V
a
n
d
e
n
A
b
e
e
le,
T
.
V
a
n
d
e
w
in
c
k
e
le,
J.
Ho
e
b
e
k
e
,
I.
M
o
e
rm
a
n
,
a
n
d
P
.
De
m
e
e
ste
r,
“
S
e
c
u
re
c
o
m
m
u
n
ica
ti
o
n
in
I
P
-
b
a
se
d
w
irele
ss
s
e
n
so
r
n
e
tw
o
rk
s
v
ia
a
tru
ste
d
g
a
te
w
a
y
,
”
in
In
telli
g
e
n
t
S
e
n
s
o
rs
,
S
e
n
so
r
Ne
two
rk
s
a
n
d
I
n
fo
rm
a
ti
o
n
Pro
c
e
ss
in
g
(
IS
S
NIP),
2
0
1
5
IEE
E
T
e
n
th
I
n
ter
n
a
ti
o
n
a
l
Co
n
fer
e
n
c
e
o
n
,
2
0
1
5
,
p
p
.
1
-
6.
[2
8
]
A
.
A
.
Ch
a
v
a
n
a
n
d
M
.
K.
Nig
h
o
t
,
“
S
e
c
u
re
a
n
d
Co
st
-
e
ff
e
c
ti
v
e
A
p
p
li
c
a
ti
o
n
L
a
y
e
r
P
ro
to
c
o
l
w
it
h
A
u
th
e
n
ti
c
a
ti
o
n
In
tero
p
e
ra
b
il
it
y
f
o
r
IOT
,
”
Pro
c
e
d
ia
Co
m
p
u
ter
S
c
ie
n
c
e
,
v
o
l.
7
8
,
p
p
.
6
4
6
-
6
5
1
,
2
0
1
6
.
Evaluation Warning : The document was created with Spire.PDF for Python.