I
nte
rna
t
io
na
l J
o
urna
l o
f
E
lect
rica
l a
nd
Co
m
p
ute
r
E
ng
in
ee
ring
(
I
J
E
CE
)
Vo
l.
8
,
No
.
2
,
A
p
r
il
201
8
,
p
p
.
1169
~
1
1
8
1
I
SS
N:
2088
-
8708
,
DOI
: 1
0
.
1
1
5
9
1
/
i
j
ec
e
.
v
8
i
2
.
p
p
1
1
6
9
-
1181
1169
J
o
ur
na
l ho
m
ep
a
g
e
:
h
ttp
:
//ia
e
s
co
r
e
.
co
m/
jo
u
r
n
a
ls
/in
d
ex
.
p
h
p
/
I
JE
C
E
A New
Sche
m
e of
G
ro
up
-
b
a
sed A
K
A f
o
r Ma
chine
Ty
pe
Co
m
m
uni
ca
tion o
v
er LTE
Net
w
o
rks
M
a
riy
a
O
ua
is
s
a
1
,
A.
Rha
t
t
o
y
2
1
IS
IC,
Hig
h
S
c
h
o
o
l
o
f
T
e
c
h
n
o
lo
g
y
,
L
M
M
I
L
a
b
o
ra
to
ry
,
ENS
A
M
,
M
o
u
lay
-
Is
m
a
il
Un
iv
e
rsit
y
,
M
e
k
n
e
s,
M
o
ro
c
c
o
2
IS
IC,
De
p
a
rtm
e
n
t
o
f
Co
m
p
u
ter E
n
g
in
e
e
rin
g
,
Hig
h
S
c
h
o
o
l
o
f
T
e
c
h
n
o
lo
g
y
,
M
o
u
lay
-
Is
m
a
il
Un
iv
e
rsit
y
,
M
e
k
n
e
s,
M
o
r
o
c
co
Art
icle
I
nfo
AB
ST
RAC
T
A
r
ticle
his
to
r
y:
R
ec
eiv
ed
J
u
n
2
9
,
2
0
1
7
R
ev
i
s
ed
Dec
1
6
,
2
0
1
7
A
cc
ep
ted
Dec
2
3
,
2
0
1
7
M
a
c
h
in
e
Ty
p
e
Co
m
m
u
n
ica
ti
o
n
(M
T
C)
is
c
o
n
sid
e
re
d
a
s
o
n
e
o
f
th
e
m
o
st
im
p
o
rtan
t
a
p
p
r
o
a
c
h
e
s
to
t
h
e
f
u
tu
re
o
f
m
o
b
il
e
c
o
m
m
u
n
ica
ti
o
n
h
a
s
a
tt
ra
c
ted
m
o
re
a
n
d
m
o
re
a
tt
e
n
ti
o
n
.
T
o
re
a
c
h
th
e
sa
f
e
t
y
o
f
M
T
C,
a
p
p
li
c
a
ti
o
n
s
in
n
e
tw
o
rk
s
m
u
st
m
e
e
t
th
e
lo
w
p
o
w
e
r
c
o
n
su
m
p
ti
o
n
re
q
u
irem
e
n
ts
o
f
d
e
v
ice
s
a
n
d
m
a
ss
tran
s
m
issio
n
d
e
v
ice
.
W
h
e
n
a
larg
e
n
u
m
b
e
r
o
f
M
T
C
d
e
v
ice
s
g
e
t
c
o
n
n
e
c
ted
to
t
h
e
n
e
tw
o
rk
,
e
a
c
h
M
T
C
d
e
v
ic
e
m
u
st
i
m
p
le
m
e
n
t
a
n
in
d
e
p
e
n
d
e
n
t
a
c
c
e
s
s
a
u
th
e
n
ti
c
a
ti
o
n
p
r
o
c
e
ss
a
c
c
o
rd
in
g
t
o
th
e
3
G
P
P
sta
n
d
a
rd
,
w
h
ich
w
il
l
c
a
u
se
se
rio
u
s
traf
f
ic
c
o
n
g
e
stio
n
in
t
h
e
L
o
n
g
T
e
r
m
Ev
o
lu
ti
o
n
(L
T
E)
n
e
tw
o
rk
.
In
th
is
a
rti
c
le,
w
e
p
ro
p
o
se
a
n
e
w
g
ro
u
p
a
c
c
e
ss
a
u
th
e
n
ti
c
a
ti
o
n
s
c
h
e
m
e
,
b
y
w
h
ich
a
h
u
g
e
n
u
m
b
e
r
o
f
M
T
C
d
e
v
ice
s
c
a
n
b
e
si
m
u
lt
a
n
e
o
u
sly
a
u
t
h
e
n
ti
c
a
ted
b
y
th
e
n
e
tw
o
rk
a
n
d
e
sta
b
li
sh
a
n
in
d
e
p
e
n
d
e
n
t
se
ss
io
n
k
e
y
w
i
th
th
e
n
e
tw
o
rk
re
sp
e
c
ti
v
e
l
y
.
Ex
p
e
ri
m
e
n
tal
re
su
lt
s
sh
o
w
th
a
t
th
e
p
ro
p
o
se
d
sc
h
e
m
e
c
a
n
a
c
h
iev
e
ro
b
u
st se
c
u
rit
y
a
n
d
a
v
o
id
sig
n
a
li
n
g
o
v
e
rlo
a
d
o
n
L
T
E
n
e
tw
o
rk
s.
K
ey
w
o
r
d
:
Au
t
h
en
t
icatio
n
L
T
E
/SA
E
M2
M/M
T
C
Net
w
o
r
k
s
Secu
r
it
y
Co
p
y
rig
h
t
©
2
0
1
8
In
stit
u
te o
f
A
d
v
a
n
c
e
d
E
n
g
i
n
e
e
rin
g
a
n
d
S
c
ien
c
e
.
Al
l
rig
h
ts
re
se
rv
e
d
.
C
o
r
r
e
s
p
o
nd
ing
A
uth
o
r
:
Ma
r
i
y
a
Ou
ai
s
s
a,
I
SIC,
Hig
h
Sc
h
o
o
l o
f
T
ec
h
n
o
lo
g
y
,
L
MM
I
L
ab
o
r
ato
r
y
,
E
NS
A
M
,
Mo
u
la
y
-
I
s
m
ail
U
n
i
v
er
s
it
y
,
Me
k
n
e
s
,
Mo
r
o
cc
o
.
E
m
ail:
m
ar
i
y
a.
o
u
ais
s
a@
ed
u
.
u
m
i.a
c.
m
a
1.
I
NT
RO
D
UCT
I
O
N
Ma
ch
i
n
e
-
to
-
Ma
c
h
in
e
(
M2
M)
en
ab
les
ten
s
o
f
b
illi
o
n
s
o
f
m
a
ch
in
e
s
in
t
h
e
w
o
r
ld
to
talk
to
ea
ch
o
th
er
ab
o
u
t
th
eir
s
u
r
r
o
u
n
d
i
n
g
e
n
v
i
r
o
n
m
e
n
t
th
r
o
u
g
h
w
ir
ed
o
r
w
ir
ele
s
s
co
n
n
ec
tio
n
s
.
Ma
n
y
ap
p
licatio
n
s
in
t
h
e
ca
teg
o
r
ies
o
f
m
o
n
ito
r
in
g
,
m
ai
n
ten
a
n
ce
an
d
s
a
f
et
y
ca
n
b
e
co
n
s
id
er
ed
as
e
m
er
g
i
n
g
M2
M
c
o
m
m
u
n
icatio
n
s
.
T
h
e
Stan
d
ar
d
3
r
d
Gen
er
atio
n
P
ar
tn
er
s
h
ip
P
r
o
j
ec
t
(
3
G
PP
)
h
as
b
ec
o
m
e
a
s
o
lu
t
io
n
to
f
ac
il
itate
M2
M
co
m
m
u
n
i
ca
tio
n
.I
t
h
as b
ec
o
m
e
k
n
o
w
n
as
M
ac
h
i
n
e
T
y
p
e
C
o
m
m
u
n
icat
io
n
(
MT
C
)
[
1
]
.
I
n
th
e
s
e
d
a
y
s
,
th
e
m
o
b
ile
w
ir
e
less
co
m
m
u
n
icati
o
n
is
w
id
el
y
u
s
ed
i
n
h
u
m
a
n
co
m
m
u
n
ica
tio
n
s
s
u
c
h
a
s
v
o
ice
ca
ll,
m
es
s
ag
in
g
an
d
W
eb
b
r
o
w
s
i
n
g
.
Ho
w
e
v
er
,
th
ese
t
y
p
es
o
f
s
er
v
ice
s
an
d
n
e
w
t
y
p
es
o
f
s
er
v
ices
a
n
d
tech
n
o
lo
g
ies
ar
e
a
v
ailab
le
o
n
r
eq
u
es
t.
O
f
all
th
e
s
e,
MT
C
is
th
e
m
o
s
t
i
m
p
o
r
tan
t
i
s
s
u
e
i
n
t
h
e
f
ield
s
o
f
s
tan
d
ar
d
izatio
n
a
n
d
in
d
u
s
tr
y
[
2
]
.
Ma
n
y
s
ta
n
d
ar
d
s
ex
is
t
f
r
o
m
t
h
e
lev
el
co
m
p
o
n
en
ts
,
s
p
ea
k
i
n
g
d
i
f
f
er
e
n
t
r
ad
io
in
ter
f
ac
e
s
,
d
if
f
er
e
n
t
ch
o
ice
r
o
u
ted
o
r
m
e
s
h
n
e
t
w
o
r
k
s
,
o
r
o
f
f
er
a
ch
o
ice
o
f
id
en
tity
s
y
s
te
m
s
.
Ho
w
ev
er
,
litt
le
ef
f
o
r
t
h
as
b
ee
n
m
ad
e
to
f
o
cu
s
o
n
th
e
s
ec
u
r
it
y
a
s
p
ec
ts
.
I
t
ca
n
b
e
f
o
u
n
d
th
at
s
u
ch
a
n
in
cid
en
t
i
n
th
e
a
u
t
h
en
t
icatio
n
an
d
k
e
y
a
g
r
ee
m
e
n
t
(
A
K
A
)
p
r
o
ce
d
u
r
e
in
a
f
o
u
r
t
h
-
g
en
er
atio
n
(
4
G)
ce
llu
lar
n
et
wo
r
k
w
h
e
n
a
d
ev
ice
r
eg
is
ter
ed
t
o
th
e
co
r
e
n
et
w
o
r
k
.
T
h
e
A
K
A
p
r
o
ce
d
u
r
e
is
r
eq
u
ir
ed
ea
ch
ti
m
e
a
d
ev
ice
i
s
attac
h
ed
to
ex
ch
a
n
g
e
o
n
e
o
f
th
e
n
ea
r
b
y
ac
ce
s
s
p
o
in
ts
n
et
w
o
r
k
s
.
T
h
is
attac
h
m
e
n
t
an
d
ch
an
g
e
ca
n
o
cc
u
r
at
an
y
t
i
m
e.
W
h
en
a
g
r
o
u
p
o
f
d
ev
ices
atte
m
p
t
s
to
r
eg
is
ter
s
i
m
u
lta
n
eo
u
s
l
y
,
s
ig
n
ali
n
g
tr
af
f
ic
ass
o
ciate
d
g
en
er
ate
a
s
ig
n
if
ica
n
t
o
v
er
lo
ad
o
f
th
e
au
t
h
en
ticatio
n
s
er
v
er
an
d
cr
ea
te
co
n
g
esti
o
n
in
t
h
e
li
n
k
b
et
w
ee
n
a
s
er
v
er
a
n
d
ter
m
i
n
als
[
3]
,
[
4
]
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8708
I
n
t J
E
lec
&
C
o
m
p
E
n
g
,
Vo
l.
8
,
No
.
2
,
A
p
r
il
201
8
:
1
1
6
9
–
1181
1170
T
o
av
o
id
th
is
p
r
o
b
lem
,
w
e
e
m
p
h
a
s
ize
t
h
e
n
ee
d
f
o
r
th
e
d
esig
n
o
f
e
f
f
ec
ti
v
e
A
K
A
p
r
o
c
ed
u
r
e
th
at
r
ed
u
ce
s
r
ep
etitiv
e
in
v
o
ca
ti
o
n
o
f
co
s
t
l
y
a
u
t
h
e
n
ticatio
n
s
i
g
n
ali
n
g
,
e
s
p
ec
iall
y
i
n
g
r
o
u
p
s
i
tu
at
io
n
s
o
p
tim
izatio
n
[
5
]
.
T
h
e
g
o
al
o
f
t
h
i
s
ar
ticle
i
s
to
t
ak
e
s
i
g
n
i
f
ica
n
t
s
tep
s
to
w
ar
d
s
a
n
e
w
s
ec
u
r
it
y
f
ea
t
u
r
e
t
h
at
r
e
d
u
ce
s
t
h
e
a
m
o
u
n
t o
f
s
ig
n
ali
n
g
tr
af
f
ic
i
n
t
h
e
A
K
A
p
h
a
s
e
ev
e
n
i
f
th
e
n
u
m
b
er
o
f
MT
C
d
ev
ice
s
is
i
m
p
o
r
tan
t a
n
d
v
ar
iab
le.
I
n
t
h
is
p
ap
er
,
w
e
r
e
v
ie
w
r
ela
te
d
s
tu
d
ie
s
alr
ea
d
y
d
o
n
e
i
n
t
h
i
s
co
n
tex
t.
T
h
en
w
e
p
r
esen
t
t
h
e
L
T
E
/MT
C
s
y
s
te
m
ar
ch
itec
tu
r
e
,
a
n
d
w
e
d
escr
ib
e
th
e
a
u
t
h
en
ticatio
n
p
r
o
to
co
l
E
P
S
-
A
K
A
.
F
u
r
th
er
m
o
r
e
,
i
n
o
r
d
er
to
s
ec
u
r
e
a
n
MT
C
co
m
m
u
n
ica
tio
n
,
w
e
p
r
o
p
o
s
e
a
n
e
w
p
r
o
to
co
l
b
ased
o
n
g
r
o
u
p
a
u
t
h
en
t
icatio
n
,
t
h
en
w
e
d
is
c
u
s
s
it
s
i
m
p
o
r
tan
t d
etails (
d
esi
g
n
,
s
ec
u
r
it
y
an
d
p
er
f
o
r
m
a
n
ce
ev
al
u
ati
o
n
)
.
2.
R
E
L
AT
E
D
WO
RK
I
n
th
e
l
iter
atu
r
e,
f
e
w
au
th
e
n
ticatio
n
p
r
o
to
co
ls
o
f
g
r
o
u
p
co
m
m
u
n
icatio
n
s
h
av
e
b
ee
n
p
r
o
p
o
s
ed
.
Ho
w
e
v
er
,
th
er
e
ar
e
s
till
n
o
ap
p
r
o
p
r
iate
g
r
o
u
p
au
th
en
tica
tio
n
m
eth
o
d
s
f
o
r
MT
C
co
m
m
u
n
ic
atio
n
s
i
n
3
GP
P
.
On
th
e
o
t
h
er
h
a
n
d
,
s
e
v
er
al
e
x
is
ti
n
g
p
r
o
to
co
ls
f
o
r
3
GP
P
n
et
w
o
r
k
s
ac
ce
s
s
,
li
k
e
UM
T
S
-
A
K
A
[
6
]
an
d
E
P
S
-
AK
A
[
7
]
ar
e
n
o
t
s
u
itab
le
f
o
r
g
r
o
u
p
au
t
h
en
t
icatio
n
.
T
h
e
y
n
ee
d
to
b
e
m
o
d
i
f
ied
to
ap
p
l
y
to
t
h
e
g
r
o
u
p
au
t
h
en
t
icatio
n
o
f
MT
C
.
An
alter
n
ati
v
e
m
ig
h
t b
e
t
h
e
g
r
o
u
p
in
g
o
f
d
ev
ices a
n
d
h
a
v
i
n
g
a
lead
er
o
f
th
e
g
r
o
u
p
r
ep
r
esen
t
th
e
g
r
o
u
p
to
s
er
v
in
g
n
et
w
o
r
k
s
.
T
h
e
lead
er
au
th
e
n
t
icate
s
its
e
lf
to
t
h
e
n
et
w
o
r
k
o
n
b
eh
al
f
o
f
al
l
th
e
M
T
C
d
ev
ices.
On
ce
it
is
s
u
cc
e
s
s
f
u
l,
th
e
lead
er
is
e
n
t
r
u
s
ted
w
it
h
p
o
w
er
o
v
er
th
e
e
n
d
d
ev
ices
an
d
au
t
h
o
r
ized
to
a
u
th
e
n
tica
te
th
e
e
n
d
d
ev
ices lo
ca
ll
y
w
it
h
o
u
t
h
av
i
n
g
ea
ch
d
ev
ice
ac
ce
s
s
a
r
e
m
o
te
a
u
th
e
n
tica
tio
n
s
er
v
er
.
I
n
2
0
1
2
,
C
h
en
et
al.
p
r
o
p
o
s
e
a
s
ec
u
r
it
y
g
r
o
u
p
a
u
th
e
n
tica
tio
n
a
n
d
k
e
y
a
g
r
ee
m
e
n
t
p
r
o
to
co
l
(
G
-
A
K
A)
f
o
r
a
g
r
o
u
p
o
f
m
o
b
ile
s
ta
tio
n
s
(
MSs)
r
o
a
m
in
g
f
r
o
m
t
h
e
s
a
m
e
h
o
m
e
n
et
w
o
r
k
(
HN)
to
a
s
er
v
in
g
n
et
w
o
r
k
(
SN
)
in
th
is
r
o
a
m
i
n
g
s
ce
n
ar
io
,
b
ec
au
s
e
o
f
t
h
e
g
r
o
u
p
i
n
g
m
o
d
el,
th
i
s
p
r
o
to
co
l
ca
n
less
en
co
m
m
u
n
icatio
n
co
s
ts
o
n
t
h
e
n
et
w
o
r
k
.
H
o
w
e
v
er
,
it
also
c
an
n
o
t
p
r
o
v
id
e
en
o
u
g
h
s
ec
u
r
i
t
y
a
n
d
is
v
u
l
n
er
ab
le
to
r
ed
ir
ec
tio
n
,
m
a
n
-
in
-
t
h
e
-
m
id
d
le
attac
k
s
,
etc
[
8
].
T
h
e
D
y
n
a
m
ic
Gr
o
u
p
B
ase
d
an
d
Ke
y
Ag
r
ee
m
en
t
(
D
GB
A
K
A
)
is
a
s
ec
u
r
it
y
p
r
o
to
co
l
f
o
r
au
th
e
n
tica
tio
n
o
f
a
g
r
o
u
p
o
f
MT
C
d
ev
ices
in
th
i
s
r
o
a
m
i
n
g
s
ce
n
ar
io
.
B
ec
au
s
e
o
f
t
h
e
g
r
o
u
p
in
g
m
o
d
el,
th
i
s
p
r
o
to
co
l
o
p
tim
izes
t
h
e
p
er
f
o
r
m
a
n
ce
o
f
au
th
e
n
ti
ca
tio
n
o
f
g
r
o
u
p
co
m
m
u
n
icatio
n
s
n
ev
er
th
ele
s
s
,
o
v
er
al
l
co
m
p
le
x
it
y
o
f
t
h
e
s
y
s
te
m
ca
n
b
e
b
u
ilt to
u
p
to
lar
g
e
as th
e
n
u
m
b
er
o
f
MT
C
d
ev
ices i
n
cr
ea
s
es [
9
].
C
ao
et
al.
a
p
r
o
p
o
s
ed
g
r
o
u
p
-
b
ase
d
ac
ce
s
s
a
u
th
e
n
ticat
io
n
s
ch
e
m
e
f
o
r
MT
C
,
th
at
is
b
a
s
ed
o
n
an
ag
g
r
e
g
ate
s
i
g
n
atu
r
e.
An
elec
te
d
lead
er
g
en
er
ates
th
e
a
g
g
r
e
g
a
te
s
ig
n
at
u
r
e
an
d
f
o
r
w
ar
d
s
it
to
th
e
co
r
e
n
et
w
o
r
k
.
T
h
e
n
et
w
o
r
k
ca
n
a
u
th
e
n
tica
te
all
t
h
e
g
r
o
u
p
m
e
m
b
er
s
b
y
v
e
r
if
y
i
n
g
t
h
e
a
g
g
r
e
g
ate
s
ig
n
at
u
r
e
an
d
ca
n
estab
li
s
h
d
is
tin
ct
s
es
s
io
n
k
e
y
s
w
it
h
ea
ch
m
e
m
b
er
[
1
0
].
Secu
r
e
a
n
d
E
f
f
icie
n
t
(
SE
-
A
K
A
)
i
s
a
s
ec
u
r
e
a
n
d
ef
f
icie
n
t
g
r
o
u
p
au
th
e
n
ticat
io
n
a
n
d
k
e
y
ag
r
ee
m
e
n
t
p
r
o
to
co
l
w
h
ic
h
ca
n
f
it
in
w
it
h
t
h
e
en
tire
g
r
o
u
p
a
u
t
h
en
t
icat
io
n
s
ce
n
ar
io
s
i
n
t
h
e
L
o
n
g
T
er
m
E
v
o
lu
tio
n
(
L
T
E
)
n
et
w
o
r
k
s
.
SE
-
A
K
A
ca
n
r
esi
s
t
s
ev
er
al
e
x
i
s
ti
n
g
attac
k
s
a
n
d
p
r
o
v
id
e
en
h
a
n
ce
d
u
s
er
’
s
p
r
iv
ac
y
p
r
eser
v
atio
n
an
d
a
g
r
o
u
p
au
t
h
e
n
ticatio
n
m
ec
h
a
n
i
s
m
w
h
ich
ca
n
e
f
f
icie
n
t
l
y
a
u
t
h
en
ticate
d
e
v
ices
in
a
g
r
o
u
p
.
T
h
is
p
r
o
to
co
l e
m
p
lo
y
s
E
llip
tic
C
u
r
v
e
Di
f
f
ie
-
Hell
m
a
n
(
E
C
DH)
to
r
ea
lize
f
o
r
w
ar
d
s
ec
r
ec
y
a
n
d
b
ac
k
w
ar
d
s
ec
r
ec
y
.
I
t
also
ad
o
p
t
s
an
as
y
m
m
etr
ic
k
e
y
cr
y
p
to
s
y
s
te
m
to
p
r
o
tect
d
ev
ices
’
p
r
iv
ac
y
.
E
C
DH
a
n
d
as
y
m
m
etr
ic
cr
y
p
t
o
g
r
ap
h
y
m
a
y
n
o
t
b
e
s
u
itab
le
f
o
r
r
eso
u
r
ce
co
n
s
tr
ai
n
t M
T
C
d
ev
ices [
11
].
E
A
P
-
b
ased
Gr
o
u
p
Au
t
h
e
n
tic
atio
n
(
E
G
-
AK
A
)
p
r
o
p
o
s
ed
in
[
12
]
,
a
g
r
o
u
p
A
K
A
p
r
o
to
co
l
f
o
r
L
T
E
n
et
w
o
r
k
s
is
f
o
r
3
GPP
M
T
C
d
e
v
ices to
ac
ce
s
s
th
e
co
r
e
n
et
w
o
r
k
o
v
er
n
o
n
-
3
GP
P
air
in
ter
f
ac
es.
Ov
er
all
d
ela
y
o
f
th
e
c
u
r
r
en
t
A
K
A
f
o
r
a
s
in
g
le
u
s
er
ta
k
es
lo
n
g
b
ec
au
s
e
o
f
a
r
o
u
n
d
-
tr
ip
d
ela
y
to
th
e
b
ac
k
e
n
d
o
f
t
h
e
au
th
e
n
tica
tio
n
s
er
v
er
i
n
a
co
r
e
n
et
w
o
r
k
.
I
n
o
r
d
er
to
im
p
r
o
v
e
th
is
d
ela
y
,
E
G
-
A
K
A
is
d
esi
g
n
ed
to
r
ed
u
ce
t
h
e
n
u
m
b
er
o
f
ac
ce
s
s
in
g
ti
m
es to
t
h
e
au
t
h
e
n
ticatio
n
s
er
v
er
.
T
h
e
au
th
o
r
s
in
[
13
]
p
r
o
p
o
s
e
a
n
e
w
ef
f
icie
n
t
s
ec
u
r
it
y
p
r
o
to
co
l
f
o
r
MT
C
u
s
in
g
ag
g
r
eg
a
tio
n
o
f
m
an
y
au
th
e
n
tica
tio
n
r
eq
u
est
s
i
n
to
a
s
in
g
le
o
ne
.
T
h
e
d
es
ig
n
o
f
t
h
i
s
p
r
o
to
co
l
is
p
r
esen
ted
to
b
e
c
o
m
p
atib
le
w
it
h
t
h
e
cu
r
r
en
t
s
y
s
te
m
b
y
b
ein
g
co
m
p
o
s
ed
o
f
o
n
l
y
s
y
m
m
etr
ic
cr
y
p
to
g
r
ap
h
y
.
T
h
e
s
ec
u
r
it
y
a
n
d
p
er
f
o
r
m
a
n
ce
o
f
th
e
n
e
w
d
esi
g
n
ar
e
ev
al
u
ated
v
ia
f
o
r
m
al
v
er
i
f
icatio
n
a
n
d
th
eo
r
eti
ca
l a
n
al
y
s
is
.
I
n
[
14
]
au
th
o
r
s
p
r
o
p
o
s
e
a
n
o
v
el
lig
h
t
w
eig
h
t
g
r
o
u
p
au
th
e
n
tic
atio
n
s
ch
e
m
e
f
o
r
M2
M
(
GL
AR
M)
u
n
d
er
th
e
3
GP
P
n
et
w
o
r
k
ar
ch
itect
u
r
e,
w
h
ic
h
co
n
s
is
t
s
o
f
t
w
o
p
r
o
to
co
ls
th
at
ca
n
ac
h
iev
e
e
f
f
icie
n
t
a
n
d
s
ec
u
r
e
g
r
o
u
p
au
th
e
n
tica
tio
n
i
n
th
e
3
GP
P
ac
ce
s
s
ca
s
e
a
n
d
n
o
n
-
3
GP
P
ac
ce
s
s
ca
s
e,
r
esp
ec
ti
v
el
y
.
T
h
e
s
ec
u
r
it
y
a
n
al
y
s
i
s
s
h
o
w
s
th
at
t
h
e
p
r
o
p
o
s
ed
s
ch
e
m
e
ca
n
ac
h
iev
e
t
h
e
s
ec
u
r
it
y
g
o
als,
an
d
p
r
ev
e
n
t
t
h
e
v
ar
io
u
s
s
ec
u
r
it
y
t
h
r
ea
ts
.
A
l
s
o
,
p
er
f
o
r
m
a
n
ce
ev
al
u
a
tio
n
d
e
m
o
n
s
t
r
ate
s
its
ef
f
icie
n
c
y
re
g
ar
d
i
n
g
co
m
p
u
tatio
n
co
m
p
le
x
it
y
a
n
d
co
m
m
u
n
icatio
n
o
v
er
h
ea
d
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
t J
E
lec
&
C
o
m
p
E
n
g
I
SS
N:
2088
-
8708
A
N
ew S
ch
eme
o
f G
r
o
u
p
-
b
a
s
ed
A
K
A
fo
r
Ma
ch
in
e
Typ
e
C
o
mmu
n
ica
tio
n
o
ve
r
LT
E
….
(
Ma
r
iya
Ou
a
is
s
a
)
1171
3.
B
ACK
G
RO
UND
T
h
is
s
ec
tio
n
p
r
o
v
id
es
an
o
v
er
v
ie
w
o
f
t
h
e
m
a
in
ele
m
e
n
ts
o
f
th
e
MT
C
ar
ch
itect
u
r
e
i
n
L
T
E
n
et
w
o
r
k
an
d
p
r
esen
ts
t
h
e
E
P
S
-
A
K
A
p
r
o
ce
d
u
r
e
u
s
ed
to
r
ea
lize
m
u
tu
a
l
au
t
h
en
ticatio
n
b
et
w
ee
n
th
e
u
s
er
an
d
t
h
e
n
et
w
o
r
k
.
3
.
1
.
Net
w
o
rk
A
rc
hite
ct
ure
T
h
e
E
v
o
lv
ed
P
ac
k
et
S
y
s
te
m
(
E
P
S
)
n
et
w
o
r
k
s
u
p
p
o
r
ts
d
ata
s
er
v
ices,
w
h
er
e
s
er
v
ices
"
cir
cu
it"
m
i
g
r
ate
to
"
p
ac
k
ag
e"
s
er
v
ices.
I
t
p
r
o
v
id
es
I
P
co
n
n
ec
ti
v
it
y
b
et
w
ee
n
t
h
e
(
U
s
er
E
q
u
ip
m
e
n
t)
UE
an
d
t
h
e
P
ac
k
et
Data
Net
w
o
r
k
(
P
DN)
an
d
p
r
o
v
id
es
s
u
p
p
o
r
t
d
if
f
er
en
t
r
ad
io
ac
ce
s
s
n
et
w
o
r
k
s
.
I
n
Fig
u
r
e
1
,
th
er
e
ar
e
tw
o
t
y
p
es
o
f
tr
af
f
ic:
th
e
u
s
er
tr
a
f
f
ic
a
n
d
tr
af
f
ic
co
n
tr
o
l (
s
i
g
n
al
in
g
)
.
T
h
e
ac
ce
s
s
n
et
w
o
r
k
,
ca
lled
L
T
E
o
r
E
v
o
lv
ed
UT
R
A
N
(
E
-
U
T
R
A
N)
,
is
co
m
p
o
s
ed
o
f
n
o
d
es
E
v
o
lv
ed
No
d
eB
(
eNo
d
eB
)
.
T
h
e
E
P
C
c
o
n
s
is
ts
o
f
s
e
v
er
al
n
o
d
es
w
h
ic
h
ar
e:
t
h
e
Mo
b
ilit
y
Ma
n
a
g
e
m
en
t
E
n
tit
y
(
MM
E
)
,
th
e
Ho
m
e
Su
b
s
cr
ib
er
Ser
v
er
(
HSS),
t
h
e
Ser
v
i
n
g
Gate
w
a
y
(
S
-
GW
)
a
n
d
t
h
e
P
DN
Gate
wa
y
(
P
DN
-
GW
)
.
T
o
u
n
d
er
s
ta
n
d
th
e
o
p
er
atio
n
o
f
t
h
e
s
y
s
te
m
,
w
e
g
i
v
e
a
d
escr
i
p
tio
n
o
f
ea
ch
o
f
th
e
s
e
n
o
d
es
[
1
5
].
As
s
h
o
w
n
i
n
Fi
g
u
r
e
1
,
a
n
MT
C
u
s
er
ca
n
u
s
e
th
e
s
er
v
ices
p
r
o
v
id
ed
b
y
o
n
e
o
r
m
o
r
e
MT
C
s
er
v
er
s
t
o
o
p
er
ate
a
lar
g
e
n
u
m
b
er
o
f
M
T
C
d
ev
ices
.
A
n
MT
C
s
er
v
er
is
a
s
er
v
er
,
w
h
ic
h
ca
n
co
m
m
u
n
ica
te
to
t
h
e
L
T
E
n
et
w
o
r
k
it
s
el
f
,
an
d
to
MT
C
d
e
v
ices
v
ia
t
h
e
L
T
E
n
et
w
o
r
k
[
1
6
]
.
Fig
u
r
e
1
.
S
y
s
te
m
ar
ch
itect
u
r
e
3
.
2
.
L
T
E
Aut
he
ntic
a
t
io
n P
ro
t
o
co
l
(
E
P
S
-
AK
A)
T
h
e
3
GPP
d
esig
n
ed
th
e
s
ec
u
r
i
t
y
p
r
o
ce
d
u
r
e
E
P
S
-
AK
A
f
o
r
th
e
m
u
tu
al
a
u
t
h
en
ticati
o
n
i
n
L
T
E
n
et
w
o
r
k
an
d
f
o
r
s
ec
u
r
i
n
g
th
e
s
h
ar
in
g
o
f
a
cr
y
p
to
g
r
ap
h
ic
k
e
y
.
T
h
e
E
P
S
-
A
K
A
co
n
s
is
t
s
o
f
s
e
v
en
m
e
s
s
ag
e
s
ill
u
s
tr
ated
i
n
Fig
u
r
e
2
.
T
h
e
MM
E
p
ass
es
t
h
is
f
ir
s
t
m
ess
a
g
e
to
th
e
HSS
w
i
th
th
e
s
er
v
ice
n
et
w
o
r
k
id
en
t
it
y
(
SN
i
d
)
.
I
f
th
e
I
MSI
is
v
alid
,
t
h
e
HSS
g
e
n
er
a
tes
a
n
d
s
e
n
d
s
a
s
et
o
f
s
e
v
er
al
au
th
e
n
tica
tio
n
v
ec
to
r
s
to
t
h
e
MM
E
.
A
d
er
iv
ed
k
e
y
(
KA
S
ME
)
in
cl
u
d
ed
in
t
h
e
au
t
h
en
t
icatio
n
v
ec
to
r
is
a
lo
ca
l
k
e
y
d
er
iv
ed
f
r
o
m
K,
w
h
ic
h
is
a
s
ec
r
et
k
e
y
s
h
ar
ed
b
et
w
ee
n
th
e
UE
a
n
d
th
e
H
SS
.
T
h
e
MM
E
s
elec
ts
a
v
ec
to
r
au
th
e
n
tica
tio
n
i
n
th
e
n
et
w
o
r
k
a
n
d
s
en
d
s
R
A
ND
[
i]
an
d
A
UT
N
[
i]
to
MT
C
d
ev
ice
to
ch
al
len
g
e
t
h
e
d
e
v
ice
a
u
t
h
e
n
ticatio
n
.
T
h
e
d
ev
ice
au
t
h
e
n
ti
ca
tes
t
h
e
MM
E
b
y
ch
ec
k
i
n
g
th
e
m
e
s
s
a
g
e
au
t
h
e
n
t
icat
io
n
co
d
e.
I
t
th
en
d
er
iv
es
C
K,
A
K,
I
K
an
d
K
A
SME
f
r
o
m
K
to
r
esp
ec
tiv
el
y
p
r
o
tect
lay
er
s
,
A
cc
e
s
s
Stra
t
u
m
(
A
S)
an
d
No
n
-
A
cc
e
s
s
Stra
t
u
m
(
N
AS)
la
y
er
s
.
L
o
ca
l
Ma
s
t
er
Ke
y
,
K
A
SME
,
i
s
v
alid
f
o
r
a
p
er
io
d
d
eter
m
i
n
e
d
b
y
th
e
ti
m
i
n
g
o
f
t
h
e
n
e
x
t
E
P
S
-
A
K
A
p
r
o
ce
d
u
r
e.
T
h
e
d
e
v
ice
ca
n
c
h
o
o
s
e
to
in
v
o
k
e
t
h
e
E
P
S
-
A
K
A
p
r
o
to
co
l
w
h
e
n
e
v
er
t
h
e
MM
E
s
er
v
ice
ch
an
g
es,
b
ec
au
s
e
o
f
r
o
a
m
i
n
g
to
an
o
th
er
n
et
w
o
r
k
s
er
v
ice
[
17
].
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8708
I
n
t J
E
lec
&
C
o
m
p
E
n
g
,
Vo
l.
8
,
No
.
2
,
A
p
r
il
201
8
:
1
1
6
9
–
1181
1172
Fig
u
r
e
2
.
E
P
S
-
A
K
A
p
r
o
ce
d
u
r
e
3
.
3
.
G
ro
up
A
uthent
ica
t
io
n P
ro
ce
du
re
T
h
e
au
th
e
n
tica
tio
n
s
y
s
te
m
s
o
f
ex
i
s
ti
n
g
n
e
t
w
o
r
k
s
ar
e
d
esi
g
n
e
d
p
r
im
ar
i
l
y
f
o
r
a
s
i
n
g
le
o
b
j
ec
t,
an
d
t
h
e
y
all
n
ee
d
3
o
r
4
r
o
u
n
d
s
o
f
in
t
er
ac
tio
n
to
ac
h
ie
v
e
m
u
tu
a
l
au
th
en
ticatio
n
b
et
w
ee
n
a
u
s
er
an
d
a
s
er
v
er
.
B
u
t
i
n
p
r
ac
tical
ap
p
licatio
n
s
,
th
er
e
m
a
y
b
e
a
lar
g
e
n
u
m
b
er
o
f
u
s
er
s
w
it
h
t
h
e
s
a
m
e
p
r
o
p
er
ties
in
a
n
et
w
o
r
k
.
L
et
's
ta
k
e
a
s
p
ec
if
ic
ex
a
m
p
le
o
f
MT
C
,
u
s
er
ter
m
i
n
al
s
ca
n
f
o
r
m
a
g
r
o
u
p
w
h
en
t
h
e
y
ar
e
in
t
h
e
s
a
m
e
ar
ea
,
th
e
s
a
m
e
ap
p
licatio
n
o
r
th
e
s
a
m
e
b
eh
a
v
i
o
r
.
T
h
e
g
r
o
u
p
co
m
m
u
n
icatio
n
n
et
w
o
r
k
m
o
d
el
i
s
ill
u
s
tr
ated
in
Fig
u
r
e
3
.
Fig
u
r
e
3
.
Net
w
o
r
k
m
o
d
el
o
f
g
r
o
u
p
co
m
m
u
n
icatio
n
T
h
is
p
ap
er
p
r
esen
ts
a
n
e
w
m
et
h
o
d
o
f
g
r
o
u
p
au
t
h
en
ticati
o
n
b
ased
o
n
an
au
t
h
en
ticatio
n
an
d
k
e
y
ag
r
ee
m
e
n
t
p
r
o
to
co
l.
T
h
e
m
ai
n
id
ea
is
th
e
f
o
llo
w
i
n
g
:
f
ir
s
t
,
a
lead
er
M
T
C
d
ev
ice
is
s
elec
ted
f
r
o
m
a
g
r
o
u
p
,
an
d
a
f
u
ll
a
u
t
h
en
t
icatio
n
AK
A
p
r
o
ce
d
u
r
e
is
p
er
f
o
r
m
ed
.
I
n
t
h
is
p
r
o
ce
s
s
,
th
e
lead
er
MT
C
d
ev
ice
o
b
tain
s
a
g
r
o
u
p
o
f
au
th
e
n
tica
tio
n
v
ec
to
r
s
an
d
g
r
o
u
p
au
t
h
en
t
icatio
n
k
e
y
(
G
AK)
o
n
b
eh
alf
o
f
o
th
er
MT
C
Gr
o
u
p
d
ev
ices
[
18
]
.
T
h
en
t
h
e
s
er
v
ice
n
et
w
o
r
k
(
M
ME
)
is
al
lo
w
ed
to
p
er
f
o
r
m
m
u
tu
a
l
a
u
t
h
en
t
icatio
n
w
it
h
th
e
r
est
o
f
t
h
e
g
r
o
u
p
MT
C
d
ev
ices
u
s
in
g
th
e
au
th
e
n
ticatio
n
v
ec
to
r
o
b
tain
ed
GA
K
an
d
th
e
u
n
atte
n
d
ed
r
e
m
o
te
co
r
e
n
et
w
o
r
k
(
HSS).
T
h
e
au
th
e
n
tica
tio
n
d
el
a
y
ca
n
b
e
d
ec
r
ea
s
ed
as
a
w
h
o
l
e
,
an
d
th
e
s
ig
n
ali
n
g
o
v
er
h
ea
d
b
et
w
ee
n
t
h
e
MM
E
an
d
th
e
HS
S is
s
ig
n
i
f
ica
n
tl
y
r
e
d
u
ce
d
.
4.
P
RO
P
O
SE
D
AU
T
H
E
N
T
I
C
AT
I
O
N
P
RO
T
O
CO
L
I
n
t
h
is
s
ec
tio
n
,
w
e
p
r
o
p
o
s
e
a
n
e
w
AK
A
p
r
o
to
co
l
b
ased
g
r
o
u
p
a
u
t
h
e
n
ticatio
n
f
o
r
MT
C
co
m
m
u
n
icatio
n
s
i
n
L
T
E
n
et
wo
r
k
s
,
w
h
ich
o
v
er
co
m
e
s
t
h
e
r
e
p
lay
attac
k
,
Ma
n
i
n
T
h
e
M
id
d
le
(
MI
T
M)
atta
ck
,
s
p
o
o
f
in
g
attac
k
s
a
n
d
Den
ia
l
o
f
Ser
v
ice
(
Do
S)
attac
k
s
.
T
h
is
p
r
o
p
o
s
ed
s
o
lu
tio
n
f
o
llo
w
s
s
tr
i
ctl
y
t
h
e
f
r
a
m
e
w
o
r
k
o
f
t
h
e
3
GP
P
p
r
o
to
co
l
E
P
S
-
AKA
.
E
ac
h
MT
C
d
ev
ice
an
d
H
SS
s
h
ar
e
a
s
ec
r
et
au
t
h
e
n
ticati
o
n
k
e
y
Ks.
T
h
er
e
ar
e
th
r
ee
r
an
d
o
m
n
u
m
b
er
s
to
s
ec
u
r
e
th
e
f
ir
s
t
p
h
ase
o
f
th
e
p
r
o
to
co
l
s
to
r
ed
in
MM
E
an
d
th
e
U
E
(
SR
an
D)
.
I
t
is
a
n
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
t J
E
lec
&
C
o
m
p
E
n
g
I
SS
N:
2088
-
8708
A
N
ew S
ch
eme
o
f G
r
o
u
p
-
b
a
s
ed
A
K
A
fo
r
Ma
ch
in
e
Typ
e
C
o
mmu
n
ica
tio
n
o
ve
r
LT
E
….
(
Ma
r
iya
Ou
a
is
s
a
)
1173
ac
cu
m
u
lato
r
n
u
m
b
er
th
at
i
s
r
an
d
o
m
l
y
g
e
n
er
ated
.
E
ac
h
S
R
an
D
h
a
s
a
f
ix
ed
s
ize
o
f
2
4
b
its
.
T
h
e
len
g
th
o
f
th
e
p
ar
am
eter
s
u
s
ed
i
n
th
is
p
r
o
ce
d
u
r
e
is
p
r
esen
ted
i
n
T
ab
le
1
.
Ou
r
p
r
o
to
co
l
co
n
s
is
ts
o
f
t
h
r
ee
p
h
ases
:
I
n
itial
izatio
n
p
h
ase,
Gr
o
u
p
au
th
e
n
tica
tio
n
a
n
d
k
e
y
ag
r
ee
m
e
n
t
p
h
ase
an
d
Gr
o
u
p
m
e
m
b
er
s
tat
e.
T
ab
le
1
.
L
en
g
t
h
o
f
p
ar
a
m
eter
s
P
a
r
a
me
t
e
r
s
V
a
l
u
e
(
B
i
t
s)
I
M
S
I
/
I
M
G
I
1
2
8
S
R
a
n
D
1
/
S
R
a
n
D
2
/
S
R
a
n
D
3
24
K
/
K
s
1
2
8
Km
2
5
6
X
R
ES/
R
ES
1
2
8
A
U
T
H
/
S
Q
N
1
2
8
R
A
N
D
1
2
8
A
M
F
/
S
Q
N
48
L
A
I
40
M
A
C
64
S
N
i
d
/
I
D
H
S
S
20
4
.
1
.
I
nitia
liza
t
io
n P
ha
s
e
T
h
e
M
T
C
d
ev
ices
f
o
r
m
g
r
o
u
p
s
b
ased
o
n
ce
r
tain
p
r
in
cip
les
(
e.
g
.
,
b
elo
n
g
to
th
e
s
a
m
e
a
p
p
licatio
n
,
w
it
h
i
n
th
e
s
a
m
e
r
e
g
io
n
,
etc.
)
.
T
h
e
n
et
w
o
r
k
s
er
v
ice
p
r
o
v
id
er
ca
n
g
r
o
u
p
MT
C
d
ev
ice
s
to
g
et
h
er
.
Gr
o
u
p
m
e
m
b
er
s
h
ip
m
a
y
b
e
ch
an
g
ed
at
an
y
ti
m
e
w
h
e
n
th
e
s
er
v
ice
p
r
o
v
id
er
ad
d
s
M
T
C
d
ev
ices
to
g
r
o
u
p
s
o
r
r
etir
es
MT
C
d
ev
ices.
T
h
e
s
er
v
ice
p
r
o
v
id
er
is
r
esp
o
n
s
ib
le
f
o
r
d
eter
m
in
i
n
g
an
d
m
ai
n
tai
n
i
n
g
g
r
o
u
p
m
e
m
b
er
s
h
ip
s
.
T
h
en
ea
ch
g
r
o
u
p
f
o
r
au
th
e
n
ticatio
n
h
as
a
g
r
o
u
p
au
t
h
en
tica
tio
n
k
e
y
(
GA
K)
an
d
a
g
r
o
u
p
id
en
tit
y
(
I
MG
I
)
.
A
s
ec
u
r
e
co
m
m
u
n
icatio
n
ch
a
n
n
el
b
et
w
ee
n
t
h
e
MM
E
a
n
d
th
e
HS
S
h
as
alr
ea
d
y
b
ee
n
estab
lis
h
ed
(
b
ased
o
n
Dia
m
eter
p
r
o
to
co
l [
19
]
)
an
d
ca
n
p
r
o
v
id
e
s
ec
u
r
it
y
s
er
v
ices to
t
h
e
tr
an
s
m
itted
d
ata.
a.
E
ac
h
MT
C
d
ev
ice
h
as
a
n
id
en
tit
y
(
I
MSI
i)
t
h
at
allo
w
s
to
t
h
e
MT
C
d
ev
ice
to
r
eg
i
s
ter
i
n
a
3
GP
P
n
et
w
o
r
k
.
b.
E
ac
h
MT
C
d
ev
ice
h
as a
p
r
e
-
s
h
ar
ed
s
ec
r
et
k
e
y
(
K
s
i
)
w
ith
H
S
S
w
h
e
n
it is
f
ir
s
t r
e
g
is
ter
ed
in
HSS.
c.
HSS
g
e
n
er
ates
g
r
o
u
p
k
e
y
(
G
A
K)
f
o
r
ea
c
h
g
r
o
u
p
.
F
u
r
th
er
,
th
e
s
er
v
ice
p
r
o
v
id
er
s
to
r
es
a
s
et
o
f
p
ar
am
eter
s
i
n
t
h
e
s
ec
u
r
e
s
to
r
ag
e
o
f
th
e
MT
C
d
ev
ice
at
th
e
ti
m
e
o
f
r
eg
i
s
tr
atio
n
.
T
h
ese
p
ar
am
eter
s
ar
e
I
MG
I
,
GK,
Ks.
T
h
e
g
r
o
u
p
is
id
en
ti
f
ied
b
y
t
h
e
I
MG
I
(
I
n
ter
n
atio
n
a
l
Mo
b
ile
Gr
o
u
p
I
d
en
tit
y
)
a
n
d
a
s
ec
r
et
k
e
y
K
s
cr
ea
ted
b
y
th
e
H
SS
a
n
d
s
h
ar
ed
b
et
w
ee
n
t
h
e
H
SS
an
d
ea
ch
d
e
v
ice.
A
g
r
o
u
p
o
f
lead
er
s
is
in
cl
u
d
ed
am
o
n
g
th
e
MT
C
d
ev
ices
to
r
ep
r
esen
t
th
e
g
r
o
u
p
to
th
e
co
r
e
n
et
w
o
r
k
w
il
l
b
e
s
elec
ted
b
ased
o
n
th
e
co
m
m
u
n
icatio
n
ca
p
ab
ilit
y
,
s
to
r
ag
e
s
tat
u
s
a
n
d
b
atter
y
s
t
atu
s
o
f
ea
ch
MT
C
d
ev
ice.
T
h
ese
lead
er
s
ar
e
r
eg
is
ter
ed
in
th
e
HSS
a
n
d
id
en
ti
f
i
ed
b
y
th
eir
id
en
ti
t
y
I
MSI
s
.
T
h
e
lead
er
its
elf
is
also
an
MT
C
d
ev
ice
an
d
h
e
n
ce
n
ee
d
s
to
s
to
r
e
th
e
s
a
m
e
p
ar
a
m
eter
s
as
a
m
e
m
b
er
.
T
h
is
p
r
o
ce
s
s
is
d
escr
ib
ed
as
f
o
llo
w
s
.
4
.
2
.
G
ro
up
A
uthent
ica
t
io
n a
nd
K
ey
Ag
re
e
m
ent
P
ha
s
e
T
h
e
s
ess
io
n
au
t
h
e
n
ticatio
n
an
d
k
e
y
ag
r
ee
m
e
n
t
f
ir
s
t
o
cc
u
r
s
b
et
w
ee
n
a
s
elec
ted
lead
er
an
d
th
e
co
r
e
n
et
w
o
r
k
.
A
cc
o
r
d
in
g
l
y
,
a
s
ec
u
r
e
co
n
n
ec
tio
n
is
e
s
tab
lis
h
ed
in
t
h
e
E
-
UT
R
A
N,
t
h
e
n
all
m
e
m
b
e
r
s
o
f
th
e
g
r
o
u
p
ar
e
au
th
e
n
tica
ted
w
i
th
t
h
e
co
r
e
n
et
w
o
r
k
o
n
th
e
s
ec
u
r
e
lin
k
v
ia
th
e
lead
er
.
Fig
u
r
e
4
s
h
o
w
s
t
h
e
p
r
o
p
o
s
ed
M
T
C
A
K
A
co
m
p
o
s
ed
o
f
1
1
m
e
s
s
a
g
es.
M
1
:
T
h
e
MM
E
s
en
d
s
a
lead
er
id
en
tit
y
r
eq
u
e
s
t to
th
e
MT
C
d
ev
ice
M
2
:
T
h
e
lead
er
m
ee
t
s
th
e
M
ME
w
it
h
t
h
e
id
en
tit
y
o
f
all
m
e
m
b
er
s
in
c
lu
d
i
n
g
I
M
SIi,
I
MG
I
g
r
o
u
p
id
en
tit
y
,
an
d
a
r
an
d
o
m
ac
c
u
m
u
lato
r
SR
a
n
D
1
.
M
3
:
I
n
r
esp
o
n
s
e,
MM
E
r
eg
is
ter
s
(
I
MSI
i,
I
MG
I
,
an
d
SR
an
D1
)
an
d
s
en
d
s
an
o
t
h
er
r
an
d
o
m
ac
cu
m
u
lato
r
SR
a
n
D2
to
MT
C
d
ev
ice
to
ch
ec
k
w
h
et
h
er
it is
ac
t
iv
e
o
r
n
o
t.
M
4
:
I
f
th
e
MT
C
d
ev
ice
is
ac
ti
v
e
a
n
d
i
s
th
e
leg
i
ti
m
a
te
d
ev
ice
,
it
ca
lcu
late
s
S
R
an
D3
a
n
d
M
AC
MTC
a
s
s
h
o
w
n
i
n
(
1
)
an
d
(
2
)
an
d
d
eliv
er
s
th
e
m
t
o
th
e
MM
E
b
esid
es th
e
I
MSI
i
,
I
MG
I
,
SN id
an
d
I
D
HSS
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8708
I
n
t J
E
lec
&
C
o
m
p
E
n
g
,
Vo
l.
8
,
No
.
2
,
A
p
r
il
201
8
:
1
1
6
9
–
1181
1174
SR
a
n
D3
=
f
1
Ks (
S
R
an
D1
,
SR
an
D2
)
(
1
)
MA
C
MTC
=
f
2
Ks (
SR
a
n
D3
,
I
D
HSS
)
(
2
)
M
5
:
HSS ca
lcu
lated
GT
K
b
y
u
s
i
n
g
G
A
K,
R
AND
an
d
SN id
b
y
u
s
i
n
g
(
3
)
.
On
u
s
i
n
g
t
h
e
s
i
g
n
at
u
r
e
S
MME
,
th
e
H
SS
s
h
o
u
ld
p
r
o
v
id
e
a
lev
el
o
f
a
u
th
e
n
tic
it
y
to
MM
E
a
n
d
a
h
i
g
h
er
le
v
el
o
f
co
n
f
id
e
n
ce
.
T
h
is
s
i
g
n
at
u
r
e
m
a
y
b
e
co
n
s
id
er
ed
in
ca
s
e
t
h
e
M
T
C
d
ev
ice
is
r
o
am
in
g
an
d
n
o
t
d
ir
ec
tly
t
ied
to
its
n
et
w
o
r
k
.
GT
K
=
f
3
GA
K(
R
AND,
SN
id
)
(
3
)
M
6
:
HSS
g
e
n
er
ates
AUT
H
HSS
b
y
u
s
i
n
g
t
h
e
I
d
en
ti
f
ier
I
DHSS
a
n
d
c
h
ec
k
s
t
h
e
v
alid
it
y
o
f
MM
E
w
i
th
co
n
s
id
er
atio
n
o
f
SN
id
an
d
ca
lcu
late
s
XAUT
H
to
au
th
en
ti
ca
te
an
in
d
iv
id
u
al
d
ev
ice
an
d
f
o
u
r
A
V
s
et
tin
g
s
:
R
A
ND,
A
UT
H,
XR
E
S
,
an
d
K
m
,
r
esp
ec
tiv
el
y
u
s
i
n
g
(
4
)
,
(
5
)
,
(
6
)
an
d
(
7
)
.
T
h
e
m
a
s
ter
k
e
y
K
m
is
d
er
iv
ed
f
r
o
m
th
e
s
ec
r
et
k
e
y
Ks
s
h
ar
ed
b
et
w
ee
n
t
h
e
H
SS
an
d
t
h
e
lead
er
.
A
UT
H
H
SS
=
(
I
D
H
SS
,
GT
K)
(
4
)
A
UT
H
=
(
SQN,
AM
F,
M
A
C
M
ME
,
GA
K)
(
5
)
XR
E
S
=
f
4
K
m
(
R
AND)
(
6
)
K
m
=
f
5
K
s
(
GT
K,
R
A
ND)
(
7
)
M
7
:
T
h
e
MM
E
p
er
f
o
r
m
s
m
u
t
u
al
a
u
t
h
en
ticatio
n
w
it
h
th
e
le
a
d
er
MT
C
b
y
g
e
n
er
a
ti
n
g
A
UT
H
MME
as
f
o
llo
w
s
i
n
(
8
)
an
d
(
9
)
.
MM
E
s
e
n
d
s
t
h
e
m
e
s
s
a
g
e
to
th
e
lead
er
,
th
e
m
e
m
b
er
s
s
h
o
u
ld
h
av
e
t
h
e
r
i
g
h
t
to
l
is
te
n
to
a
ll
p
r
ev
io
u
s
m
ess
a
g
e
s
.
T
h
e
lead
er
ch
ec
k
s
if
I
MG
I
is
th
e
r
ea
l
g
r
o
u
p
id
en
tit
y
an
d
au
t
h
en
t
icate
s
t
h
e
MM
E
b
y
ch
ec
k
in
g
M
AC
MME
.
T
h
e
s
a
m
e
f
o
r
th
e
o
th
er
MT
C
d
ev
ic
es.
A
UT
H
MME
=
(
R
A
ND,
M
AC
MM
E
)
(
8
)
MA
C
MME
=
f
2
GT
K
(
SQN,
R
AND)
(
9
)
M
8
:
T
h
en
th
e
lead
er
ca
lcu
late
s
K
m
a
n
d
p
r
ep
ar
es th
e
R
E
S r
esp
o
n
s
e
v
a
lu
e
a
n
d
s
en
d
s
i
t to
th
e
MM
E
.
T
h
e
NA
S
s
ec
u
r
it
y
i
s
r
esp
o
n
s
ib
le
f
o
r
th
e
s
ec
u
r
it
y
o
f
co
m
m
u
n
icat
io
n
b
et
w
ee
n
lead
er
an
d
MM
E
M
9
:
MM
E
au
th
en
ticate
s
th
e
l
ea
d
er
b
y
th
e
v
al
id
it
y
o
f
t
h
e
eq
u
iv
a
len
ce
o
f
R
E
S
an
d
XR
E
S
an
d
s
en
d
s
a
r
eq
u
es
t
f
o
r
au
th
e
n
tica
tio
n
o
f
m
e
m
b
er
s
to
all
MT
C
d
ev
ices g
r
o
u
p.
M
1
0
:
E
ac
h
M
T
C
d
ev
ice
ca
lcu
lates
it
s
p
ar
a
m
eter
s
K
MTCi
,
A
UT
H
MTCi
,
an
d
MA
C
MTC
i
as
s
h
o
w
n
i
n
(
1
0
)
,
(
1
1
)
an
d
(
1
2
)
r
esp
ec
tiv
ely
.
K
MTCi
=
KDF
(
Ks
i
⊕
K
m
)
(
1
0
)
A
UT
H
MTCi
=
f
6
K
s
i
(
R
an
d
i
)
(
1
1
)
MA
C
MTCi
=
f
2
K
i
(
AUT
H
MTCi
)
(
1
2
)
M
1
1
:
T
h
e
lead
er
s
en
d
s
t
h
e
a
u
th
en
ticatio
n
r
esp
o
n
s
e
to
t
h
e
M
ME
an
d
t
h
i
s
la
tter
a
u
th
e
n
ticat
e
s
t
h
e
MT
C
d
e
v
ice
b
y
co
m
p
ar
i
n
g
A
UT
H
MTCi
an
d
XAUT
H.
T
h
e
A
K
A
p
r
o
ce
d
u
r
e
is
s
u
cc
e
s
s
f
u
l
,
an
d
t
h
e
MM
E
is
r
ea
d
y
to
j
o
in
th
e
g
r
o
u
p
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
t J
E
lec
&
C
o
m
p
E
n
g
I
SS
N:
2088
-
8708
A
N
ew S
ch
eme
o
f G
r
o
u
p
-
b
a
s
ed
A
K
A
fo
r
Ma
ch
in
e
Typ
e
C
o
mmu
n
ica
tio
n
o
ve
r
LT
E
….
(
Ma
r
iya
Ou
a
is
s
a
)
1175
Fig
u
r
e
4
.
P
r
o
p
o
s
ed
p
r
o
to
c
o
l f
o
r
MT
C
4
.
3
.
G
ro
up
M
e
m
ber
S
t
a
t
e
I
n
o
u
r
s
ch
e
m
e,
t
h
e
g
r
o
u
p
a
u
t
h
en
t
icatio
n
k
e
y
(
G
AK)
ca
n
b
e
u
s
ed
to
au
t
h
en
ticate
HS
S
an
d
MM
E
.
T
h
er
ef
o
r
e,
w
h
e
n
g
r
o
u
p
m
e
m
b
er
s
j
o
in
o
r
leav
e
th
e
g
r
o
u
p
,
th
e
GAK
n
ee
d
to
b
e
u
p
d
ated
im
m
ed
iatel
y
s
i
n
ce
it
w
il
l
i
n
f
lu
e
n
ce
t
h
e
s
ec
u
r
it
y
o
f
t
h
e
s
y
s
te
m
.
Mo
r
eo
v
er
,
if
th
e
G
A
K
is
u
s
ed
to
en
cr
y
p
t
g
r
o
u
p
m
es
s
ag
e
s
,
t
h
e
g
r
o
u
p
w
h
ic
h
f
o
r
m
ed
b
y
MT
C
d
ev
ices
r
eq
u
ir
es
b
ac
k
w
ar
d
an
d
f
o
r
w
ar
d
s
ec
r
ec
y
.
B
ac
k
w
ar
d
s
ec
r
ec
y
is
r
eq
u
ir
ed
th
a
t
a
n
e
w
MT
C
d
ev
ice
ca
n
n
o
t
g
e
t
m
es
s
ag
e
s
e
x
ch
a
n
g
ed
b
ef
o
r
e
it
j
o
in
ed
th
e
g
r
o
u
p
.
Fo
r
w
ar
d
s
ec
r
e
cy
is
r
eq
u
ir
ed
th
at
a
leav
in
g
o
r
ex
p
elled
MT
C
d
ev
ice
ca
n
n
o
t
co
n
ti
n
u
e
ac
ce
s
s
i
n
g
t
h
e
g
r
o
u
p
’
s
co
m
m
u
n
i
ca
tio
n
(
if
it
k
ee
p
s
r
ec
eiv
in
g
t
h
e
m
e
s
s
a
g
es).
W
h
e
n
an
MT
C
d
ev
ice
w
a
n
ts
to
le
av
e
th
e
g
r
o
u
p
,
th
e
H
SS
w
il
l
r
ev
o
k
e
t
h
e
b
in
d
i
n
g
r
elatio
n
s
h
ip
b
et
w
ee
n
th
e
MT
C
d
ev
ice
an
d
th
e
g
r
o
u
p
th
at
i
t
b
elo
n
g
s
to
.T
h
u
s
th
e
MT
C
d
ev
ice
ca
n
n
o
t
lo
n
g
er
co
m
m
u
n
icate
w
it
h
t
h
e
co
r
e
n
et
w
o
r
k
as
t
h
e
g
r
o
u
p
m
e
m
b
er
.
Mo
r
eo
v
er
,
to
p
r
ev
en
t
t
h
e
o
ld
MT
C
d
ev
ice
to
d
ec
r
y
p
t
t
h
e
n
e
w
p
ac
k
ets
o
f
t
h
e
g
r
o
u
p
w
h
ic
h
it
w
as
ab
le
to
s
n
i
f
f
,
th
e
g
r
o
u
p
k
e
y
m
u
s
t
b
e
u
p
d
a
ted
w
h
en
th
e
o
ld
MT
C
d
ev
ice
leav
e
s
t
h
e
g
r
o
u
p
.
Af
ter
t
h
e
o
ld
MT
C
d
ev
ice
le
av
es
t
h
e
g
r
o
u
p
,
all
m
e
m
b
er
s
o
f
t
h
e
g
r
o
u
p
s
h
o
u
ld
s
h
ar
e
a
n
e
w
g
r
o
u
p
k
e
y
.
Si
m
il
ar
l
y
,
w
h
e
n
an
MT
C
d
ev
ice
w
an
ts
to
j
o
in
th
e
g
r
o
u
p
,
an
ac
ce
s
s
co
n
tr
o
l
o
f
th
e
g
r
o
u
p
is
n
ec
es
s
ar
y
f
o
r
it,
an
d
i
t
n
ee
d
s
to
p
er
f
o
r
m
a
f
u
ll
A
K
A
au
t
h
e
n
ticatio
n
p
r
o
ce
d
u
r
e
w
it
h
th
e
HS
S.
Me
an
w
h
ile,
th
e
g
r
o
u
p
k
e
y
m
u
s
t
b
e
u
p
d
ated
w
h
e
n
th
e
n
e
w
MT
C
d
ev
ice
w
an
t
s
to
j
o
in
a
g
r
o
u
p
.
A
f
ter
t
h
e
n
e
w
MT
C
d
ev
ice
j
o
in
s
th
e
g
r
o
u
p
,
all
m
e
m
b
er
s
o
f
th
e
g
r
o
u
p
s
h
o
u
ld
s
h
ar
e
a
n
e
w
g
r
o
u
p
k
e
y
.
I
n
th
at
ca
s
e,
th
e
n
e
w
MT
C
d
ev
ice
ca
n
n
o
t d
ec
r
y
p
t th
e
o
ld
p
ac
k
ets o
f
th
e
g
r
o
u
p
b
ef
o
r
e
it jo
in
s
in
4
.
4
.
T
he
H
iera
rc
hy
o
f
K
ey
s
in t
he
M
T
C
Sy
s
t
e
m
Af
ter
s
u
cc
ess
f
u
l
au
t
h
e
n
ticatio
n
,
ea
ch
MT
C
d
ev
ice
an
d
SN
(
MM
E
)
s
h
ar
ed
a
k
ey
K
m
as
a
n
ess
e
n
tial
to
o
l
f
o
r
th
e
d
er
iv
atio
n
o
f
t
h
e
f
o
llo
w
in
g
k
e
y
s
.
T
h
e
h
ier
ar
ch
y
o
f
k
e
y
s
in
t
h
e
MT
C
co
m
m
u
n
ica
tio
n
s
y
s
te
m
i
s
s
h
o
w
n
in
F
ig
u
r
e
5
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8708
I
n
t J
E
lec
&
C
o
m
p
E
n
g
,
Vo
l.
8
,
No
.
2
,
A
p
r
il
201
8
:
1
1
6
9
–
1181
1176
Fig
u
r
e
5
.
T
h
e
h
ier
ar
ch
y
o
f
k
e
y
s
T
h
e
f
u
n
c
tio
n
o
f
ea
c
h
k
e
y
is
d
e
s
cr
ib
ed
as f
o
llo
w
s
:
K
m
: p
r
i
m
ar
y
k
e
y
g
e
n
er
ated
d
u
r
in
g
t
h
e
s
e
s
s
io
n
L
T
E
/ E
P
C
K
NAS
: N
A
S
s
ig
n
ali
n
g
s
ec
u
r
it
y
k
e
y
s
K
RRC
: Sec
u
r
it
y
k
e
y
s
i
g
n
al
in
g
r
ad
io
R
R
C
K
UP
:
en
cr
y
p
tio
n
k
e
y
s
es
s
io
n
d
ata
leav
es
k
e
y
K
N
AS
enc
,
K
N
AS
int
,
K
RRCe
nc
,
K
RRCint
an
d
K
UPe
nc
th
at
s
er
v
e
a
s
k
e
y
en
cr
y
p
tio
n
al
g
o
r
ith
m
s
o
r
in
teg
r
it
y
to
p
r
o
tect
th
e
NAS
s
i
g
n
ali
n
g
,
AS a
n
d
th
e
u
s
er
p
lan
e
(
d
at
a)
.
5.
RE
SU
L
T
S AN
D
D
I
SCU
SS
I
O
N
I
n
th
is
s
ec
t
io
n
,
w
e
s
u
b
m
it
th
e
p
r
o
t
o
co
l
to
a
s
ec
u
r
ity
a
n
al
y
s
is
to
s
h
o
w
th
at
it
s
u
p
p
o
r
ts
al
l
s
ec
u
r
it
y
r
eq
u
ir
e
m
en
ts
r
eq
u
ir
ed
b
y
M2
M
an
d
ex
p
lain
h
o
w
th
at
s
o
lu
ti
o
n
is
r
esis
ta
n
t
to
v
ar
io
u
s
s
ec
u
r
it
y
attac
k
s
s
u
ch
a
s
MI
T
M,
Do
S,
r
e
d
ir
ec
tio
n
…
,
th
en
w
e
p
r
ese
n
te
t
h
e
v
alid
atio
n
o
f
o
u
r
p
r
o
to
co
l u
s
i
n
g
A
VI
SP
A
to
o
l a
n
d
co
m
p
ar
e
s
th
e
p
er
f
o
r
m
a
n
ce
o
f
o
u
r
m
o
d
el
w
ith
o
th
er
s
r
esear
ch
in
liter
at
u
r
e.
I
n
ad
d
itio
n
,
w
e
ev
a
lu
ate
t
h
e
p
er
f
o
r
m
a
n
ce
o
f
th
e
p
r
o
p
o
s
ed
g
r
o
u
p
b
ased
A
KA
s
c
h
e
m
e
r
eg
ar
d
in
g
co
m
m
u
n
i
c
atio
n
o
v
er
h
ea
d
an
d
co
m
p
u
tat
io
n
al
o
v
er
h
ea
d
.
5
.
1
.
Securit
y
Ana
ly
s
is
W
e
an
al
y
ze
t
h
e
s
ec
u
r
it
y
p
r
o
p
er
ties
o
f
th
e
p
r
o
p
o
s
ed
s
ch
e
m
e
;
b
o
th
s
ec
u
r
it
y
a
n
al
y
s
is
a
n
d
f
o
r
m
a
l
v
er
if
ica
tio
n
ar
e
co
n
d
u
cted
t
o
d
em
o
n
s
tr
ate
th
a
t
o
u
r
ap
p
r
o
ac
h
can
ac
h
ie
v
e
all
t
h
e
s
ec
u
r
it
y
g
o
als
a
n
d
r
eq
u
ir
e
m
en
ts
.
5
.
1
.
1
.
M
utua
l A
uthent
ica
t
io
n
T
h
e
m
e
s
s
a
g
e
au
th
e
n
ticatio
n
c
o
d
e
MA
C
MM
E
=
f
2
GT
K
(
SQN,
R
A
ND)
s
e
n
t
in
M7
i
s
cr
ea
ted
w
it
h
th
e
te
m
p
o
r
ar
y
k
e
y
g
r
o
u
p
,
GT
K.
B
e
ca
u
s
e
GT
K
is
s
h
ar
ed
o
n
ly
a
m
o
n
g
th
e
m
e
m
b
er
s
o
f
HSS
an
d
g
r
o
u
p
m
e
m
b
er
s
,
in
cl
u
d
in
g
th
e
lead
er
,
ca
n
a
u
th
e
n
ticate
t
h
e
MM
E
if
M
AC
MM
E
p
r
o
v
es tr
u
e.
Fo
r
au
th
e
n
ticat
io
n
i
n
t
h
e
o
th
er
d
ir
ec
tio
n
,
th
e
MM
E
o
n
b
e
h
al
f
o
f
H
SS
a
u
th
e
n
tica
tes
t
h
e
lead
er
b
y
co
m
p
ar
i
n
g
t
h
e
v
al
u
e
o
f
t
h
e
R
E
S
w
it
h
XR
E
S.
T
h
e
lead
er
c
an
d
e
m
o
n
s
tr
ate
h
is
k
n
o
w
led
g
e
o
f
th
e
m
aster
k
e
y
K
m
a
n
d
al
s
o
GT
K
b
y
p
r
ese
n
t
in
g
t
h
e
co
r
r
ec
t
v
alu
e
o
f
R
E
S.
T
h
e
MM
E
can
au
t
h
e
n
ticate
e
ac
h
d
ev
ice
MT
C
i
f
A
UT
H
m
atc
h
es X
AUT
H.
5
.
1
.
2
.
Resis
t
a
nce
t
o
At
t
a
ck
s
5
.
1
.
2
.
1
.
Repla
y
At
t
a
ck
Firstl
y
,
th
e
p
r
o
to
co
l
is
f
r
ee
f
r
o
m
th
i
s
t
y
p
e
o
f
attac
k
b
y
s
en
d
in
g
r
a
n
d
o
m
v
a
lu
e
s
(
SR
an
D1
,
SR
an
D2
,
SR
a
n
D3
)
an
d
b
y
u
s
i
n
g
a
r
an
d
o
m
t
i
m
eo
u
t
d
u
r
in
g
th
e
m
e
s
s
a
g
e
tr
a
n
s
m
is
s
io
n
o
n
th
e
n
e
t
w
o
r
k
I
n
ad
d
itio
n
,
w
ir
ele
s
s
co
m
m
u
n
icatio
n
l
in
k
s
b
et
w
ee
n
m
e
m
b
er
s
,
MT
C
d
ev
ice
,
an
d
t
h
e
MM
E
ca
n
s
u
b
m
it
to
t
h
is
t
y
p
e
o
f
attac
k
b
ec
au
s
e
t
h
e
lead
er
an
d
th
e
MM
E
r
ea
ch
a
n
a
g
r
ee
m
e
n
t
k
e
y
o
n
th
e
s
es
s
io
n
a
f
ter
t
h
e
M8
,
an
o
p
p
o
n
en
t
co
u
ld
h
ea
r
th
e
f
o
u
r
s
i
g
n
i
f
ican
t
m
es
s
ag
e
s
M2
,
M4
,
M7
,
M8
as
s
h
o
w
n
in
Fi
g
u
r
e
4
.
W
ith
th
is
p
o
s
s
e
s
s
io
n
o
f
th
ese
f
o
u
r
m
e
s
s
a
g
es,
a
n
ad
v
e
r
s
ar
y
m
a
y
a
tte
m
p
t
au
t
h
e
n
ticat
io
n
p
r
eten
d
in
g
to
b
e
a
lead
er
an
d
r
ep
la
y
M8
to
M
ME
.
Ho
w
e
v
er
,
th
i
s
atte
m
p
t
w
o
u
ld
f
ai
l
i
m
m
ed
iate
l
y
b
ec
a
u
s
e
th
e
v
al
u
e
o
f
R
E
S
r
ec
o
r
d
ed
b
y
lis
te
n
i
n
g
d
if
f
er
s
f
r
o
m
t
h
at
o
f
MM
E
b
ec
au
s
e
o
f
a
n
e
w
v
al
u
e
o
f
R
A
ND
i
n
XR
E
S =
f
4
K
m
(
R
A
ND)
.
5
.
2
.
1
.
2
.
Do
S At
t
a
ck
T
h
e
attac
k
er
MT
C
0
d
ev
ice
f
l
o
o
d
s
th
e
v
icti
m
MM
E
w
i
th
th
e
au
t
h
e
n
ticatio
n
r
eq
u
est
b
y
u
s
u
r
p
in
g
t
h
e
I
MSI
an
d
th
e
SR
an
D1
,
an
d
th
en
a
n
S
R
a
n
D2
f
r
o
m
MM
E
is
r
etu
r
n
ed
to
th
e
s
p
o
o
f
ed
s
o
u
r
ce
MT
C
0
.
T
h
er
ef
o
r
e,
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
t J
E
lec
&
C
o
m
p
E
n
g
I
SS
N:
2088
-
8708
A
N
ew S
ch
eme
o
f G
r
o
u
p
-
b
a
s
ed
A
K
A
fo
r
Ma
ch
in
e
Typ
e
C
o
mmu
n
ica
tio
n
o
ve
r
LT
E
….
(
Ma
r
iya
Ou
a
is
s
a
)
1177
th
e
MM
E
w
ill
n
o
t
g
et
f
in
al
i
n
f
o
r
m
atio
n
to
co
m
p
lete
a
u
th
en
ticatio
n
r
eq
u
ests
.
T
h
is
lead
s
to
a
h
alf
-
o
p
en
ed
au
th
e
n
tica
tio
n
r
eq
u
e
s
ts
to
th
e
MM
E
.
T
h
er
e
is
a
w
a
iti
n
g
p
er
i
o
d
f
o
r
ea
ch
MT
C
d
ev
ice
to
m
ain
tai
n
t
h
e
s
ta
te
o
f
h
al
f
-
o
p
en
ed
a
u
th
e
n
ticat
io
n
r
e
q
u
ests
.
I
f
th
e
at
tack
er
MT
C
0
ca
n
cr
ea
te
an
o
v
er
f
lo
w
to
th
e
v
icti
m
MM
E
w
it
h
h
al
f
-
o
p
en
ed
au
th
e
n
ticat
io
n
r
eq
u
est
s
,
th
e
MM
E
ca
n
n
o
t a
cc
ep
t
n
e
w
in
co
m
i
n
g
a
u
t
h
en
t
icatio
n
r
eq
u
ests
.
5
.
2
.
1
.
3
.
M
a
n in t
he
M
idd
le
At
t
a
ck
A
n
MI
T
M
attac
k
ca
n
h
ap
p
e
n
w
h
en
a
d
ev
ice
atte
m
p
ts
t
o
co
n
n
ec
t
to
an
eNo
d
eB
.
Fo
r
p
ay
lo
ad
en
cr
y
p
tio
n
i
n
th
e
p
r
o
p
o
s
ed
s
o
lu
tio
n
,
a
n
e
w
k
e
y
K
m
is
a
co
n
v
er
s
e
b
et
w
ee
n
UE
an
d
MM
E
.
T
h
is
n
e
w
k
e
y
w
a
s
in
tr
o
d
u
ce
d
to
m
ak
e
th
e
m
o
s
t
r
eliab
le
co
m
m
u
n
icat
io
n
b
et
w
ee
n
t
h
e
UE
an
d
MM
E
,
th
i
s
en
cr
y
p
tio
n
k
e
y
i
s
in
tr
o
d
u
ce
d
to
o
v
er
co
m
e
th
e
M
I
T
M
attac
k
,
an
d
t
h
at
i
s
co
n
s
u
l
ted
b
y
t
h
e
UE
a
n
d
t
h
e
MM
E
i
n
t
h
e
la
s
t
m
es
s
ag
e
o
f
th
e
p
r
o
to
co
l.
5
.
1
.
3
.
F
o
r
m
a
l V
er
if
ica
t
io
n
T
h
is
s
o
lu
tio
n
w
as
ch
ec
k
ed
b
y
t
h
e
s
ec
u
r
it
y
p
r
o
to
co
l
v
er
i
f
icatio
n
to
o
l,
Au
to
m
ated
Val
id
atio
n
o
f
I
n
ter
n
et
Sec
u
r
it
y
P
r
o
to
co
ls
an
d
A
p
p
licatio
n
s
(
A
VI
SP
A
)
[
2
0
]
,
w
h
ic
h
i
n
d
icate
d
th
at
it
is
a
v
er
y
s
ec
u
r
e
lev
el.
T
h
e
m
ai
n
ad
v
a
n
ta
g
e
o
f
t
h
i
s
t
o
o
l
is
t
h
e
ab
ili
t
y
to
u
s
e
d
i
f
f
e
r
en
t
v
er
i
f
icatio
n
tec
h
n
iq
u
es
o
n
th
e
s
a
m
e
p
r
o
to
co
l
s
p
ec
if
icatio
n
.
T
h
e
p
r
o
t
o
co
l
d
esig
n
er
in
ter
ac
ts
w
it
h
th
e
to
o
l
b
y
s
p
ec
i
f
y
in
g
a
s
ec
u
r
it
y
p
r
o
b
le
m
i
n
th
e
Hig
h
L
e
v
e
l
P
r
o
to
c
o
l
Sp
ec
if
icatio
n
L
a
n
g
u
ag
e
(
H
L
P
SL
)
.
T
h
e
HL
P
SL
is
an
ex
p
r
ess
i
v
e,
m
o
d
u
lar
,
r
o
le
-
b
ased
,
f
o
r
m
a
l
lan
g
u
a
g
e
t
h
at
is
u
s
ed
to
s
p
ec
if
y
co
n
tr
o
l
-
f
lo
w
p
atter
n
s
,
d
ata
-
s
tr
u
ctu
r
e
s
,
alter
n
ati
v
e
i
n
tr
u
d
er
m
o
d
els
an
d
co
m
p
le
x
s
ec
u
r
it
y
p
r
o
p
er
ties
,
as
w
e
ll a
s
d
if
f
er
e
n
t c
r
y
p
to
g
r
ap
h
ic
p
r
im
iti
v
es
an
d
t
h
eir
alg
eb
r
ai
c
p
r
o
p
e
r
ties
[
2
1
]
.
T
h
e
p
r
im
ar
y
g
o
al
o
f
o
u
r
p
r
o
p
o
s
ed
p
r
o
t
o
co
l
is
to
p
r
o
v
id
e
m
u
tu
a
l
A
K
A
s
er
v
ices
b
et
w
ee
n
th
e
MT
C
d
ev
ices
a
n
d
th
e
MM
E
.
W
e
o
n
l
y
n
ee
d
to
v
er
i
f
y
t
h
at
t
h
e
p
r
o
p
o
s
ed
p
r
o
to
co
l
ca
n
p
r
o
v
id
e
a
s
u
cc
e
s
s
f
u
l
m
u
t
u
al
au
th
e
n
tica
tio
n
b
et
w
ee
n
th
e
M
T
C
d
ev
ices a
n
d
th
e
s
er
v
i
n
g
n
e
t
w
o
r
k
.
I
n
o
u
r
p
r
o
p
o
s
ed
s
ch
e
m
e
d
escr
ib
ed
in
Hig
h
L
e
v
el
P
r
o
to
co
l
Sp
ec
if
icatio
n
s
L
an
g
u
ag
e,
t
h
e
MM
E
an
d
MT
C
d
ev
ice
r
ep
r
esen
t th
e
t
w
o
p
ar
ticip
an
ts
in
b
asic r
o
les.
W
e
n
ee
d
to
v
er
i
f
y
th
a
t
t
h
e
p
r
o
p
o
s
ed
p
r
o
to
c
o
l
ca
n
p
r
o
v
id
e
a
s
u
cc
e
s
s
f
u
l
m
u
t
u
al
a
u
t
h
en
ticatio
n
b
et
w
ee
n
th
e
MT
C
d
ev
ices a
n
d
th
e
M
ME
b
y
u
s
i
n
g
b
ac
k
-
e
n
d
s
er
v
er
s
.
I
n
th
i
s
p
ap
er
,
w
e
o
n
l
y
p
r
ese
n
t
th
e
au
t
h
e
n
ticatio
n
an
al
y
s
i
s
o
f
o
n
e
MT
C
d
ev
ice,
b
asic
r
o
les
o
f
th
e
MM
E
an
d
MT
C
d
ev
ice
a
n
d
th
e
a
u
t
h
en
t
icatio
n
g
o
als
ar
e
s
h
o
w
n
i
n
Fi
g
u
r
e
6
,
Fig
u
r
e
7
an
d
Fi
g
u
r
e
8
,
r
esp
ec
tiv
el
y
.
T
h
e
o
u
tp
u
t
o
f
t
h
e
m
o
d
el
ch
ec
k
i
n
g
r
e
s
u
l
ts
ar
e
s
h
o
w
n
i
n
Fi
g
u
r
es
9
,
w
e
ca
n
co
n
cl
u
d
e
t
h
at
t
h
e
p
r
o
p
o
s
ed
s
ch
e
m
e
ca
n
ac
co
m
p
li
s
h
t
h
e
g
o
al
o
f
m
u
t
u
al
au
t
h
e
n
ticatio
n
an
d
also
ca
n
r
esis
t
t
h
o
s
e
m
alici
o
u
s
attac
k
s
,
s
u
c
h
a
s
r
ep
lay
attac
k
s
,
MI
T
M
attac
k
s
an
d
s
ec
r
ec
y
attac
k
s
u
n
d
er
th
e
t
est o
f
A
VI
SP
A
.
Fig
u
r
e
6
.
R
o
le
o
f
MM
E
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8708
I
n
t J
E
lec
&
C
o
m
p
E
n
g
,
Vo
l.
8
,
No
.
2
,
A
p
r
il
201
8
:
1
1
6
9
–
1181
1178
T
h
e
b
ac
k
-
en
d
O
n
-
t
h
e
-
f
l
y
-
Mo
d
el
-
C
h
ec
k
er
(
O
FMC
)
w
i
ll
b
e
u
s
ed
to
v
er
if
y
t
h
at
t
h
e
p
r
o
p
o
s
ed
s
ch
e
m
e
m
ai
n
tai
n
s
it
s
s
ec
u
r
it
y
o
b
j
ec
tiv
es
ev
e
n
u
n
d
er
v
ar
io
u
s
attac
k
s
.
W
e
r
u
n
t
h
e
Sec
u
r
it
y
P
r
o
to
co
l
An
i
m
ato
r
(
SP
A
N)
f
o
r
A
VI
SP
A
i
n
OF
MC
m
o
d
e
to
v
alid
ate
t
h
e
ab
o
v
e
g
o
al
s
.
T
h
e
o
u
tp
u
t
o
f
t
h
e
m
o
d
el
ch
ec
k
i
n
g
r
es
u
lts
is
s
h
o
w
n
in
F
ig
u
r
e
9
.
A
cc
o
r
d
in
g
to
t
h
i
s
Fi
g
u
r
e
,
w
e
ca
n
co
n
c
lu
d
e
t
h
at
o
u
r
s
c
h
e
m
e
ca
n
ac
h
ie
v
e
t
h
e
s
ec
u
r
it
y
g
o
als
an
d
w
it
h
s
tan
d
v
ar
io
u
s
a
ttack
s
i
n
cl
u
d
in
g
MI
T
M
attac
k
s
,
i
m
p
er
s
o
n
atio
n
at
tack
s
,
Do
S
a
n
d
r
ep
lay
attac
k
s
u
n
d
er
t
h
e
test
o
f
A
VI
SP
A
an
d
SP
A
N
u
s
i
n
g
t
h
e
OFM
C
b
ac
k
-
e
n
d
w
i
th
a
b
o
u
n
d
ed
n
u
m
b
er
o
f
s
es
s
io
n
s
.
Fig
u
r
e
7
.
R
o
le
o
f
MT
C
d
ev
ice
Fig
u
r
e
8
.
An
al
y
s
is
g
o
als o
f
o
u
r
s
ch
e
m
e
Fig
u
r
e
9
.
R
esu
lts
r
ep
o
r
te
d
b
y
t
h
e
OFM
C
b
ac
k
-
en
d
i
n
SP
AN
5
.
1
.
4.
Co
m
pa
riso
n o
f
Securit
y
P
ro
t
o
co
ls
T
h
r
o
u
g
h
T
ab
le
2
w
e
h
av
e
co
m
p
ar
ed
t
h
e
s
ec
u
r
it
y
p
r
o
to
co
ls
p
er
f
o
r
m
an
ce
o
f
e
x
is
ti
n
g
A
K
A
p
r
o
to
co
ls
w
it
h
th
o
s
e
o
f
o
u
r
p
r
o
to
co
l,
an
d
to
c
h
ec
k
th
e
s
ec
u
r
it
y
le
v
el
o
f
t
h
e
p
r
o
p
o
s
ed
s
o
lu
tio
n
,
w
e
h
a
v
e
d
e
m
o
n
s
tr
ated
th
at
o
u
r
p
r
o
to
co
l
ca
n
p
r
o
v
id
e
th
e
m
o
s
t
co
m
p
r
eh
e
n
s
iv
e
s
ec
u
r
it
y
p
er
f
o
r
m
a
n
ce
b
y
u
s
i
n
g
t
h
e
m
o
d
eli
n
g
o
f
t
h
is
p
r
o
to
co
l u
s
in
g
A
VI
SP
A
.
Evaluation Warning : The document was created with Spire.PDF for Python.