I
nte
rna
t
io
na
l J
o
urna
l o
f
E
lect
rica
l a
nd
Co
m
p
ute
r
E
ng
in
ee
ring
(
I
J
E
CE
)
Vo
l.
9
,
No
.
4
,
A
u
g
u
s
t
201
9
,
p
p
.
2
6
8
2
~
2
6
9
0
I
SS
N:
2088
-
8708
,
DOI
: 1
0
.
1
1
5
9
1
/
i
j
ec
e
.
v
9
i
4
.
p
p
2
6
8
2
-
2690
2682
J
o
ur
na
l ho
m
ep
a
g
e
:
h
ttp
:
//ia
e
s
co
r
e
.
co
m/
jo
u
r
n
a
ls
/in
d
ex
.
p
h
p
/
I
JE
C
E
N
-
t
ie
r
m
o
delling
o
f
r
o
bust
k
ey
m
a
na
g
e
m
en
t
for
s
ec
ure
d
a
ta
a
g
g
rega
tion in
w
i
reless
s
enso
r
n
e
tw
o
rk
J
y
o
t
i
M
et
a
n
1
,
K
.
N
.
Na
ra
s
hin
ha
M
urt
hy
2
1
De
p
a
rtme
n
t
o
f
Co
m
p
u
ter S
c
ien
c
e
&
En
g
g
in
e
e
rin
g
,
A
CS
Co
l
leg
e
o
f
En
g
in
e
e
rin
g
,
In
d
ia
2
F
a
c
u
lt
y
o
f
En
g
in
e
e
rin
g
,
Ch
rist
U
n
iv
e
rsity
,
In
d
ia
Art
icle
I
nfo
AB
ST
RAC
T
A
r
ticle
his
to
r
y:
R
ec
eiv
ed
J
u
n
20
,
2
0
1
8
R
ev
i
s
ed
J
an
1
2
,
2
0
1
9
A
cc
ep
ted
Mar
4
,
2
0
1
9
S
e
c
u
rit
y
p
ro
b
lem
s
in
W
irele
ss
S
e
n
so
r
Ne
tw
o
rk
(W
S
N)
h
a
v
e
b
e
e
n
re
se
a
rc
h
e
d
f
ro
m
m
o
re
th
a
n
a
d
e
c
a
d
e
.
T
h
e
re
a
re
v
a
rio
u
s
se
c
u
rit
y
a
p
p
ro
a
c
h
e
s
b
e
in
g
e
v
o
lv
in
g
to
w
a
rd
s
re
sistin
g
v
a
rio
u
s
f
o
rm
s
o
f
a
tt
a
c
k
u
sin
g
d
if
fe
re
n
t
m
e
th
o
d
o
lo
g
ies
.
Af
ter
re
v
ie
w
in
g
th
e
e
x
isti
n
g
s
e
c
u
rit
y
a
p
p
ro
a
c
h
e
s,
it
c
a
n
b
e
c
o
n
c
lu
d
e
d
th
a
t
su
c
h
se
c
u
rit
y
a
p
p
ro
a
c
h
e
s a
re
h
ig
h
l
y
a
tt
a
c
k
-
sp
e
c
i
f
ic
a
n
d
d
o
e
sn
t
a
d
d
re
ss
v
a
rio
u
s
a
ss
o
c
iate
d
iss
u
e
s
in
W
S
N.
It
is
e
ss
e
n
ti
a
l
f
o
r
se
c
u
rit
y
a
p
p
ro
a
c
h
to
b
e
c
o
m
p
u
tatio
n
a
ll
y
li
g
h
tw
e
ig
h
t.
T
h
e
re
f
o
re
,
th
is
p
a
p
e
r
p
re
se
n
ts
a
n
o
v
e
l
a
n
a
ly
ti
c
a
l
m
o
d
e
ll
in
g
th
a
t
is
b
a
se
d
o
n
n
-
ti
e
r
a
p
p
ro
a
c
h
w
it
h
a
targ
e
t
to
g
e
n
e
ra
te
a
n
o
p
ti
m
ize
d
se
c
re
t
k
e
y
th
a
t
c
o
u
ld
e
n
su
re
h
ig
h
e
r
d
e
g
re
e
o
f
se
c
u
rit
y
d
u
ri
n
g
th
e
p
ro
c
e
ss
o
f
d
a
ta
a
g
g
re
g
a
ti
o
n
in
W
S
N.
T
h
e
stu
d
y
o
u
tco
m
e
sh
o
w
s
th
a
t
p
ro
p
o
se
d
sy
ste
m
is
c
o
m
p
u
tatio
n
a
ll
y
li
g
h
twe
ig
h
t
w
it
h
g
o
o
d
p
e
rf
o
r
m
a
n
c
e
o
n
re
d
u
c
e
d
d
e
lay
a
n
d
re
d
u
c
e
d
e
n
e
rg
y
c
o
n
su
m
p
ti
o
n
.
It
a
lso
e
x
h
ib
it
s
e
n
h
a
n
c
e
d
re
sp
o
n
se
ti
m
e
a
n
d
g
o
o
d
d
a
ta
d
e
li
v
e
r
y
p
e
r
f
o
r
m
a
n
c
e
to
b
a
lan
c
e
t
h
e
n
e
e
d
o
f
se
c
u
rit
y
a
n
d
d
a
ta f
o
r
w
a
rd
in
g
p
e
rfo
rm
a
n
c
e
in
W
S
N.
K
ey
w
o
r
d
s
:
A
ttac
k
A
d
v
er
s
ar
y
C
r
y
p
to
g
r
ap
h
y
P
u
b
lic
k
e
y
e
n
cr
y
p
tio
n
W
ir
eless
s
en
s
o
r
n
et
w
o
r
k
Co
p
y
rig
h
t
©
2
0
1
9
In
stit
u
te o
f
A
d
v
a
n
c
e
d
E
n
g
i
n
e
e
rin
g
a
n
d
S
c
ien
c
e
.
Al
l
rig
h
ts re
se
rv
e
d
.
C
o
r
r
e
s
p
o
nd
ing
A
uth
o
r
:
J
y
o
ti M
eta
n
,
Dep
ar
t
m
en
t o
f
C
o
m
p
u
ter
Scie
n
ce
&
E
n
g
g
i
n
ee
r
in
g
,
AC
S
C
o
lleg
e
o
f
E
n
g
in
ee
r
i
n
g
,
B
an
g
alo
r
e,
I
n
d
ia
.
E
m
ail:
j
y
o
ti
m
etan
@
g
m
ail.
co
m
1.
I
NT
RO
D
UCT
I
O
N
A
W
ir
eless
Sen
s
o
r
Net
w
o
r
k
(
W
SN)
h
as
co
m
p
letel
y
r
ed
e
f
in
ed
its
elf
as
it
e
n
ter
s
th
e
ar
e
n
a
o
f
f
u
tu
r
i
s
ti
c
tech
n
o
lo
g
y
ca
lled
as
I
n
ter
n
et
-
of
-
T
h
i
n
g
s
(
I
o
T
)
[
1
]
.
I
t
is
b
eliev
ed
th
a
t
I
o
T
is
all
ab
o
u
t
i
n
te
g
r
atin
g
s
e
n
s
o
r
n
o
d
es
w
it
h
clo
u
d
i
n
o
r
d
er
to
ex
p
o
n
e
n
tiall
y
ex
p
a
n
d
th
e
n
e
t
w
o
r
k
s
i
ze
as
w
ell
a
s
ca
p
ab
ilit
y
[
2
]
.
A
t
p
r
ese
n
t,
th
er
e
ar
e
v
ar
io
u
s
r
esear
c
h
w
o
r
k
alr
ea
d
y
ca
r
r
ied
o
u
t
to
w
ar
d
s
W
SN
d
o
m
ai
n
[
3
,
4
]
as
w
ell
as
o
n
I
o
T
d
o
m
ain
[
5
,
6
]
.
Ho
w
e
v
er
,
it is
r
eq
u
ir
ed
to
th
in
k
m
u
c
h
n
u
m
b
er
o
f
ti
m
e
s
ab
o
u
t
th
e
s
u
cc
ess
f
u
l p
o
s
s
ib
ilit
y
o
f
i
m
p
licatio
n
o
f
th
is
.
T
h
e
f
ir
s
t
r
ea
s
o
n
o
f
s
ec
u
r
it
y
c
h
alle
n
g
e
s
w
ill
b
e
d
if
f
er
e
n
ce
i
n
th
e
f
o
r
m
o
f
n
et
w
o
r
k
o
r
h
eter
o
g
en
eit
y
asp
ec
t
o
f
it.
B
o
th
clo
u
d
an
d
W
SN
ar
e
to
tally
d
i
f
f
er
e
n
t
tec
h
n
o
lo
g
ies
an
d
h
a
v
e
d
if
f
er
e
n
t
f
o
r
m
o
f
p
r
o
to
co
ls
to
co
n
tr
o
l
d
ata
co
m
m
u
n
icatio
n
s
.
Mid
d
le
w
ar
e
is
u
s
ed
in
g
ate
w
a
y
n
o
d
es
in
o
r
d
er
to
h
an
d
le
th
e
h
eter
o
g
e
n
eit
y
asp
ec
t
in
clo
u
d
it
s
el
f
as
w
ell
a
s
in
W
SN
i
ts
el
f
.
Ho
w
ev
er
,
t
h
e
s
e
f
o
r
m
s
o
f
m
id
d
le
w
ar
e
ar
e
v
e
r
y
m
u
c
h
ad
v
an
ce
d
in
w
o
r
k
o
p
er
atio
n
in
co
n
tr
a
s
t
to
m
id
d
le
w
ar
e
d
ev
ices
u
s
ed
in
g
ate
w
a
y
s
y
s
te
m
o
f
I
o
T
as
th
e
y
h
av
e
co
m
p
ar
ati
v
el
y
v
er
y
m
u
c
h
r
ed
u
ce
d
ca
p
ab
ilit
y
f
o
r
ass
is
tin
g
i
n
d
ata
tr
an
s
latio
n
a
l ser
v
ice
s
[
7
]
.
T
h
is
p
r
o
b
lem
w
i
ll
r
es
u
lt
i
n
n
o
n
-
i
m
p
licatio
n
s
o
f
s
ec
u
r
it
y
p
r
o
b
lem
s
t
h
at
ar
e
alr
ea
d
y
p
r
o
v
en
to
b
e
s
u
cc
e
s
s
f
u
l
in
h
a
n
d
lin
g
t
h
r
ea
ts
in
clo
u
d
a
s
w
ell
a
s
i
n
W
SN
in
d
iv
id
u
all
y
,
Ho
w
ev
er
,
t
h
er
e
is
n
o
u
n
iv
er
s
a
l
o
r
co
m
m
o
n
s
ec
u
r
it
y
p
r
o
to
co
l
th
a
t
co
u
ld
co
n
tr
o
l
s
ec
u
r
it
y
t
h
r
ea
ts
w
h
en
W
SN
is
co
n
n
ec
ted
in
cl
o
u
d
.
Hen
ce
,
u
s
a
g
e
o
f
s
u
c
h
s
y
s
te
m
w
i
ll
ca
u
s
e
f
a
ilu
r
e
i
n
id
en
ti
f
icatio
n
o
f
t
h
r
e
ats
it
s
e
l
f
.
He
n
ce
,
ir
r
esp
ec
ti
v
e
o
f
lo
t
o
f
w
o
r
k
i
n
in
tr
u
s
io
n
p
r
ev
e
n
tio
n
s
y
s
te
m
i
n
W
SN,
th
e
y
ar
e
n
o
t
d
ir
ec
tl
y
a
p
p
licab
le
in
I
o
T
[
8
]
.
T
h
is
is
t
h
e
p
r
im
e
r
ea
s
o
n
th
a
t
f
o
r
etells
w
h
y
at
p
r
ese
n
t
I
o
T
u
s
es
s
i
m
p
li
f
ied
n
o
d
e
co
n
n
ec
ti
v
i
t
y
a
n
d
n
o
t
ac
t
u
all
y
t
h
e
co
n
n
ec
tiv
it
y
d
escr
i
b
ed
b
y
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
t J
E
lec
&
C
o
m
p
E
n
g
I
SS
N:
2088
-
8708
N
-
t
ier mo
d
ellin
g
o
f ro
b
u
s
t k
ey
ma
n
a
g
eme
n
t f
o
r
s
ec
u
r
e
d
a
ta
a
g
g
r
eg
a
tio
n
in
w
ir
eless
....
(
Jy
o
ti Meta
n
)
2683
W
SN.
I
t
w
ill
d
ir
ec
tl
y
m
ea
n
I
o
T
d
ep
lo
y
s
s
e
n
s
o
r
s
b
u
t
n
o
t
d
ir
ec
tl
y
t
y
p
ical
W
SN
at
p
r
ese
n
t
in
an
y
co
m
m
er
cial
ap
p
licatio
n
.
I
t is st
ill i
n
n
a
s
ce
n
t stag
e
o
f
r
esear
c
h
.
T
h
e
s
ec
o
n
d
r
ea
s
o
n
o
f
s
ec
u
r
ity
c
h
alle
n
g
e
s
is
th
a
t
th
er
e
ar
e
s
er
io
u
s
o
f
r
o
b
u
s
t
en
cr
y
p
tio
n
alg
o
r
ith
m
s
o
v
er
clo
u
d
o
r
in
ter
n
et
[
9
]
;
h
o
w
e
v
er
,
v
er
y
least
p
r
o
p
o
r
tio
n
o
f
an
y
o
f
s
u
c
h
s
ec
u
r
it
y
alg
o
r
it
h
m
s
ca
n
b
e
ac
tu
all
y
i
m
p
le
m
en
ted
o
v
er
s
e
n
s
o
r
n
o
d
e.
I
t
is
b
ec
au
s
e
a
s
en
s
o
r
n
o
d
e
h
as
v
er
y
les
s
co
m
p
u
tatio
n
a
l
c
ap
ab
ilit
y
as
w
ell
a
s
less
a
v
ailab
ilit
y
o
f
n
ec
e
s
s
ar
y
r
eso
u
r
ce
s
to
ca
r
r
y
o
u
t
h
i
g
h
en
d
p
r
o
ce
s
s
in
g
.
He
n
ce
,
co
m
p
lex
cr
y
p
to
g
r
ap
h
ic
alg
o
r
ith
m
t
h
at
r
u
n
s
s
u
cc
e
s
s
f
u
ll
y
o
v
er
o
th
er
n
et
w
o
r
k
s
w
il
l n
o
t
w
o
r
k
o
u
t i
n
s
e
n
s
o
r
n
o
d
es.
T
h
e
th
ir
d
r
ea
s
o
n
o
f
s
ec
u
r
it
y
ch
alle
n
g
e
s
in
W
SN
is
th
a
t
it
h
as
a
s
u
p
p
o
r
tab
ilit
y
o
f
w
id
e
r
an
g
es
o
f
ap
p
licatio
n
s
o
f
d
i
f
f
er
en
t
t
y
p
es
.
T
h
ese
ap
p
licatio
n
s
h
av
e
d
if
f
er
en
t
f
o
r
m
s
o
f
d
ata
f
o
r
w
ar
d
i
n
g
r
eq
u
ir
e
m
en
t
s
t
h
at
u
s
u
all
y
d
ep
en
d
s
o
n
r
o
u
ti
n
g
b
eh
av
io
u
r
.
I
r
r
esp
ec
tiv
e
o
f
av
ai
l
ab
ilit
y
o
f
s
ec
u
r
e
r
o
u
ti
n
g
p
r
o
to
co
ls
in
W
SN
[
1
0
]
,
th
er
e
ar
e
v
er
y
a
s
m
aller
n
u
m
b
er
o
f
s
c
h
e
m
es t
h
at
h
a
s
b
ee
n
p
r
o
v
en
to
b
e
r
es
ilie
n
t a
g
ain
s
t
u
p
co
m
in
g
o
r
all
m
aj
o
r
th
r
ea
ts
i
n
it.
T
h
e
th
ir
d
r
ea
s
o
n
b
eh
in
d
t
h
is
s
ec
u
r
it
y
p
r
o
b
lem
i
s
also
ab
o
u
t
m
o
d
eli
n
g
ap
p
r
o
ac
h
u
s
ed
till
d
ate.
T
h
er
e
is
less
u
tili
za
tio
n
o
f
h
y
b
r
id
izin
g
m
o
d
els
a
n
d
m
o
r
e
em
p
h
a
s
is
i
s
g
i
v
en
to
ev
o
l
v
e
u
p
w
it
h
a
s
o
lu
t
io
n
t
h
at
co
u
ld
j
u
s
t
m
in
i
m
ize
th
e
s
ec
u
r
i
t
y
t
h
r
ea
t.
I
t
h
a
s
to
b
e
u
n
d
er
s
to
o
d
th
at
s
ec
u
r
it
y
p
r
o
b
le
m
s
ar
e
also
clo
s
el
y
r
elate
d
to
m
a
n
y
o
th
er
p
r
o
b
lem
s
in
W
SN.
I
t
w
ill
m
ea
n
th
at
a
n
in
ap
p
r
o
p
r
iate
m
o
d
elin
g
w
i
ll
d
ef
i
n
i
tel
y
lead
to
v
a
r
io
u
s
h
id
d
en
p
r
o
b
le
m
s
a
m
o
n
g
th
e
s
en
s
o
r
n
o
d
e.
I
n
s
u
ch
ca
s
e,
r
o
b
u
s
t
s
ec
u
r
it
y
ca
n
b
e
ac
h
ie
v
ed
a
t
th
e
co
s
t
o
f
in
f
er
io
r
d
ata
d
eliv
er
y
p
er
f
o
r
m
an
ce
.
T
h
er
ef
o
r
e,
p
r
o
p
o
s
ed
s
y
s
te
m
o
f
f
er
s
a
s
o
lu
t
io
n
to
w
ar
d
s
s
u
c
h
s
ec
u
r
it
y
p
r
o
b
lem
i
n
W
SN so
th
at
t
h
e
y
ca
n
b
e
s
ec
u
r
el
y
in
t
eg
r
ated
to
I
o
T
ap
p
licati
o
n
s
in
f
u
t
u
r
e.
T
h
e
m
a
n
u
s
cr
ip
t
p
r
esen
ts
a
d
is
cu
s
s
io
n
o
f
an
a
n
al
y
tical
m
o
d
e
l
th
at
u
s
es
n
-
tier
ap
p
r
o
ac
h
to
r
esis
ts
t
h
e
m
ax
i
m
u
m
f
o
r
m
s
o
f
leth
a
l
th
r
e
ats
in
W
SN.
Sec
tio
n
1
.
1
d
is
cu
s
s
es
ab
o
u
t
t
h
e
e
x
is
ti
n
g
liter
at
u
r
es
w
h
er
e
d
if
f
er
en
t
tech
n
i
q
u
es
ar
e
d
is
c
u
s
s
ed
f
o
r
s
ec
u
r
it
y
s
ch
e
m
e
s
u
s
ed
in
W
SN
f
o
llo
w
ed
b
y
d
is
cu
s
s
io
n
o
f
r
es
ea
r
ch
p
r
o
b
lem
s
i
n
Sectio
n
1
.
2
an
d
p
r
o
p
o
s
ed
s
o
lu
tio
n
in
1
.
3
.
Sectio
n
2
d
is
c
u
s
s
es
ab
o
u
t
alg
o
r
it
h
m
i
m
p
le
m
en
tatio
n
w
h
er
e
a
d
etec
tio
n
alg
o
r
ith
m
as
w
e
ll
as
an
o
p
ti
m
ized
v
er
s
io
n
o
f
i
ts
is
p
r
esen
ted
f
o
llo
w
ed
b
y
d
is
cu
s
s
io
n
o
f
r
es
u
l
t
an
al
y
s
is
w
i
h
r
esp
ec
t
to
co
m
p
a
r
ativ
e
a
n
al
y
s
is
w
it
h
f
r
eq
u
en
t
y
u
s
ed
e
n
cr
y
p
tio
n
alg
o
r
it
h
m
s
a
s
w
e
ll
as
m
o
s
t
cited
r
esear
ch
w
o
r
k
in
Sectio
n
3
.
Fi
n
all
y
,
t
h
e
co
n
cl
u
s
iv
e
r
e
m
ar
k
s
ar
e
p
r
o
v
id
ed
in
Sectio
n
4
.
T
h
is
s
ec
tio
n
d
is
c
u
s
s
e
s
ab
o
u
t
t
h
e
ex
i
s
ti
n
g
s
ec
u
r
it
y
ap
p
r
o
ac
h
es
in
W
SN
as
a
p
ar
t
o
f
ex
ten
s
io
n
o
f
o
u
r
p
r
io
r
r
ev
ie
w
w
o
r
k
[
1
1
]
.
T
h
e
w
o
r
k
ca
r
r
ied
o
u
t
b
y
Nu
r
ellar
i
et
al.
[
1
2
]
h
as
p
r
esen
ted
a
m
e
ch
an
i
s
m
to
id
en
ti
f
y
th
e
attac
k
er
u
s
i
n
g
p
r
o
b
ab
ilit
y
t
h
eo
r
y
.
Mo
s
t
r
ec
en
tl
y
a
u
n
iq
u
e
s
ec
u
r
it
y
ap
p
r
o
a
ch
w
as
p
r
esen
ted
b
y
Ya
n
g
et
al.
[
1
3
]
w
h
er
e
d
u
t
y
c
y
cle
i
s
co
n
s
id
er
ed
as
o
n
e
o
f
t
h
e
m
ai
n
in
d
icato
r
s
o
f
s
ec
u
r
i
t
y
.
R
an
a
et
al.
[
1
4
]
h
av
e
d
is
cu
s
s
ed
ab
o
u
t
attac
k
r
esis
ti
v
it
y
i
n
v
e
h
icle
s
y
s
te
m
u
s
in
g
W
SN.
T
h
e
au
th
o
r
h
a
s
d
ev
elo
p
ed
a
h
ar
d
w
ar
e
-
b
ased
co
n
tr
o
l
s
y
s
te
m
t
h
at
u
s
e
s
f
ee
d
b
ac
k
f
o
r
o
b
tain
i
n
g
s
y
s
te
m
s
tab
ilizatio
n
in
W
SN.
G
u
a
n
a
n
d
Ge
[
1
5
]
h
av
e
p
r
esen
ted
a
s
t
u
d
y
t
h
at
co
u
ld
o
f
f
er
s
ec
u
r
it
y
ag
ai
n
s
t
j
a
m
m
in
g
attac
k
in
m
u
ltic
h
a
n
n
el
s
.
T
h
e
au
th
o
r
s
h
a
v
e
u
s
ed
Ma
r
k
o
v
ch
ai
n
i
n
o
r
d
er
to
d
esi
g
n
t
h
e
s
o
l
u
tio
n
.
W
ei
et
al.
[
1
6
]
h
av
e
p
r
esen
te
d
a
tech
n
iq
u
e
w
h
er
e
t
h
e
lo
ca
lizatio
n
o
f
th
e
W
SN
is
p
r
o
tecte
d
ag
ain
s
t
B
y
za
n
ti
n
e
attac
k
u
s
in
g
p
r
o
b
ab
ilit
y
t
h
eo
r
y
m
o
d
eli
n
g
o
n
r
ec
eiv
ed
s
ig
n
al
s
tr
en
g
t
h
.
Z
o
u
et
al
[
1
7
]
h
av
e
p
r
esen
ted
a
d
is
cu
s
s
io
n
ab
o
u
t t
h
e
ea
v
esd
r
o
p
p
in
g
attac
k
i
n
o
r
d
e
r
to
u
n
d
er
s
tan
d
t
h
e
attac
k
b
e
h
av
io
u
r
.
D
en
g
et
al.
[
1
8
]
h
a
v
e
ap
p
lied
s
to
ch
asti
c
-
b
ased
g
eo
m
etr
ical
ap
p
r
o
ac
h
as
a
s
o
l
u
ti
o
n
to
w
ar
d
s
s
ec
u
r
it
y
p
r
o
b
le
m
s
in
p
h
y
s
ical
la
y
er
s
.
T
h
e
au
th
o
r
s
h
a
v
e
co
n
s
id
er
e
d
th
r
ee
-
tier
ap
p
r
o
ac
h
th
a
t
h
as
r
e
s
u
l
ted
i
n
o
p
ti
m
izatio
n
o
f
s
ec
r
e
c
y
r
ate.
L
i
et
al.
[
1
9
]
h
av
e
p
r
ese
n
ted
s
o
lu
tio
n
to
w
ar
d
s
r
e
s
is
t
in
g
w
o
r
m
h
o
le
attac
k
w
h
er
e
th
e
s
o
l
u
ti
o
n
is
m
o
d
eled
o
n
t
h
e
b
asis
o
f
co
n
n
ec
tiv
it
y
a
m
o
n
g
t
h
e
n
ei
g
h
b
o
r
in
g
n
o
d
es.
T
h
e
w
o
r
k
also
ad
d
r
ess
es
th
e
lo
ca
lizatio
n
p
r
o
b
lem
s
t
h
at
o
cc
u
r
in
m
a
licio
u
s
en
v
ir
o
n
m
e
n
t.
Ki
m
a
n
d
A
n
[
2
0
]
h
av
e
p
r
ese
n
ted
a
th
e
m
atic
m
o
d
el
f
o
r
r
e
s
is
ti
n
g
d
en
ial
o
f
s
er
v
ice
attac
k
.
Si
m
ilar
d
ir
ec
tio
n
o
f
w
o
r
k
is
also
b
ein
g
ca
r
r
ied
o
u
t
b
y
Go
p
e
et
al.
[
2
1
]
.
Dif
f
er
en
t
f
o
r
m
s
o
f
co
m
p
l
ex
attac
k
s
i
n
W
SN
h
av
e
b
ee
n
d
is
c
u
s
s
ed
b
y
W
u
et
al.
[
2
2
]
w
h
er
e
an
a
n
al
y
tical
-
b
ased
m
o
d
elin
g
h
as
b
ee
n
d
esig
n
ed
w
it
h
r
esp
ec
t
to
d
is
cr
ete
r
u
le
s
et
w
it
h
th
e
s
in
k
n
o
d
e
to
o
f
f
er
s
ec
u
r
it
y
.
T
h
e
tech
n
iq
u
e
also
in
tr
o
d
u
ce
d
a
n
o
v
el
v
ir
tu
al
izatio
n
tech
n
o
lo
g
y
to
f
u
r
th
er
o
f
f
er
b
et
ter
r
esis
ti
v
it
y
i
n
W
SN.
So
lu
tio
n
to
w
ar
d
s
r
esis
tin
g
n
o
d
e
ca
p
t
u
r
e
attac
k
h
a
s
b
ee
n
ca
r
r
ied
o
u
t
b
y
Z
h
ao
et
al.
[
2
3
]
u
s
i
n
g
k
e
y
P
r
ed
is
tr
ib
u
tio
n
s
c
h
e
m
e.
C
h
a
n
n
el
s
tate
i
n
f
o
r
m
atio
n
is
also
r
ep
o
r
ted
t
o
co
n
tr
ib
u
te
s
ec
u
r
it
y
f
ea
t
u
r
e
as
s
ee
n
in
th
e
w
o
r
k
o
f
Go
n
g
et
al.
[
2
4
]
.
T
h
e
s
tu
d
y
ca
r
r
ied
o
u
t
b
y
R
en
et
al.
[
2
5
]
h
av
e
ad
d
r
ess
ed
p
r
o
b
le
m
s
a
s
s
o
ciate
d
w
it
h
s
e
lecti
v
e
f
o
r
w
ar
d
in
g
at
tack
u
s
in
g
r
ep
u
tat
io
n
-
b
ased
ap
p
r
o
ac
h
in
o
r
d
er
t
o
id
en
tify
th
e
s
tate
o
f
co
m
p
r
o
m
izatio
n
in
W
SN.
T
h
e
w
o
r
k
o
f
A
l
-
Ha
m
ad
i
a
n
d
C
h
e
n
[
2
6
]
h
as
i
m
p
le
m
e
n
ted
a
s
ec
u
r
e
m
u
ltip
at
h
r
o
u
ti
n
g
m
ec
h
an
i
s
m
f
o
r
p
r
ev
en
tio
n
p
u
r
p
o
s
e
ag
ai
n
s
t
let
h
al
t
h
r
ea
ts
i
n
W
SN.
C
h
u
e
t
al.
[
2
7
]
h
av
e
p
r
esen
ted
a
h
ar
d
w
a
r
e
-
b
ased
ap
p
r
o
ac
h
n
o
r
d
er
t
o
d
ev
elo
p
a
lig
h
t
w
ei
g
h
t
e
n
cr
y
p
tio
n
p
r
o
to
co
l
f
o
r
a
s
s
is
tin
g
in
a
u
t
h
en
tica
tio
n
.
Hs
u
eh
et
al.
[
2
8
]
h
av
e
p
r
esen
ted
a
cr
o
s
s
la
y
er
-
b
a
s
ed
ap
p
r
o
ac
h
to
ad
d
r
ess
th
e
p
r
o
b
l
e
m
s
ass
o
ciate
d
w
i
th
en
er
g
y
d
ep
letin
g
at
tack
s
i
n
W
SN.
So
lu
tio
n
to
w
ar
d
s
j
a
m
m
i
n
g
attac
k
a
n
d
s
i
n
k
h
o
le
at
t
ac
k
h
as
b
ee
n
d
is
c
u
s
s
ed
b
y
P
i
n
tea
et
al.
[
2
9
]
an
d
Han
et
al.
[
3
0
]
r
esp
ec
tiv
el
y
.
So
o
s
ah
ab
i
et
al.
[
3
1
]
h
av
e
p
r
esen
ted
a
d
etec
tio
n
m
ec
h
a
n
is
m
f
o
r
o
f
f
er
in
g
b
ett
er
f
o
r
m
o
f
p
h
y
s
ical
la
y
er
s
ec
u
r
it
y
i
n
W
SN.
T
h
e
s
t
u
d
y
al
s
o
u
s
e
s
p
r
o
b
ab
ilit
y
t
h
eo
r
y
i
n
o
r
d
er
to
p
er
f
o
r
m
m
o
d
eli
n
g
th
at
w
as c
ar
r
ied
o
u
t u
s
i
n
g
a
n
al
y
tical
ap
p
r
o
ac
h
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8708
I
n
t J
E
lec
&
C
o
m
p
E
n
g
,
Vo
l.
9
,
No
.
4
,
A
u
g
u
s
t
201
9
:
2
6
8
2
-
2690
2684
J
y
o
ti
Me
ta
n
an
d
Nar
ash
i
n
h
a
Mu
r
th
y
[
3
2
]
h
av
e
in
tr
o
d
u
ce
d
a
s
tr
u
ctu
r
e
f
o
r
s
ec
u
r
it
y
i
n
d
ata
ag
g
r
e
g
at
io
n
in
t
h
e
W
SN
f
o
r
i
m
p
r
o
v
in
g
t
h
e
k
e
y
m
an
a
g
i
n
g
.
Ma
n
j
u
n
ath
B
.
E
an
d
R
ao
[
3
3
]
h
av
e
d
e
m
o
n
s
g
tar
etd
a
tec
h
n
iq
u
e
o
f
s
ec
u
r
it
y
i
n
t
h
e
f
r
a
m
e
w
o
r
k
o
f
W
SN
w
h
ic
h
i
s
p
r
esen
ted
t
w
o
k
i
n
d
s
o
f
s
e
n
s
o
r
n
o
d
e
d
ep
lo
y
ed
w
i
th
v
ar
io
u
s
ab
ilit
ies.
Fi
s
s
ao
u
i
et
a
l.
[
3
4
]
h
av
e
ill
u
s
tr
ated
an
d
p
u
b
li
s
h
ed
to
en
h
a
n
ce
p
o
w
er
co
n
s
u
m
p
tio
n
i
n
e
v
er
y
f
ield
o
f
th
e
W
SNs
,
s
u
ch
as,
a)
lo
ca
lizatio
n
,
b
)
a)
r
o
u
tin
g
,
c)
co
v
er
ag
e,
d
)
s
ec
u
r
ity
,
etc.
T
h
e
n
ex
t
s
e
ctio
n
h
i
g
h
lig
h
t
s
th
e
s
ig
n
i
f
ica
n
t li
m
itatio
n
ex
p
lo
r
ed
f
r
o
m
ab
o
v
e
m
e
n
tio
n
ed
s
ec
u
r
it
y
-
b
a
s
ed
ap
p
r
o
ac
h
in
W
SN.
T
h
e
s
ig
n
i
f
ica
n
t r
esear
c
h
p
r
o
b
l
e
m
s
ar
e
as
f
o
llo
w
s
:
-
E
x
is
ti
n
g
s
ec
u
r
i
t
y
-
b
ased
ap
p
r
o
ac
h
es
ar
e
h
ig
h
l
y
s
p
ec
if
ic
to
attac
k
an
d
th
er
e
is
n
o
s
o
lu
t
io
n
co
n
s
id
er
in
g
h
y
b
r
id
izi
n
g
t
h
e
attac
k
o
r
co
n
s
i
d
er
in
g
u
n
ce
r
tai
n
t
y
p
ar
t o
f
it.
-
Mo
r
e
w
o
r
k
is
ca
r
r
ied
o
u
t
to
w
ar
d
s
d
etec
tio
n
tec
h
n
iq
u
e
a
s
co
m
p
ar
ed
to
p
r
ev
en
tio
n
tec
h
n
iq
u
e
to
w
ar
d
s
d
if
f
er
e
n
t t
h
r
ea
ts
m
o
d
els.
-
I
r
r
esp
ec
tiv
e
o
f
lo
t
o
f
w
o
r
k
o
n
k
e
y
m
a
n
ag
e
m
e
n
t
tec
h
n
iq
u
e,
t
h
er
e
ar
e
v
er
y
le
s
s
n
u
m
b
er
o
f
tech
n
iq
u
es
t
h
at
co
u
ld
o
f
f
er
r
o
b
u
s
t sec
u
r
it
y
to
th
e
g
e
n
er
ated
k
e
y
.
-
L
es
s
w
o
r
k
to
w
ar
d
s
o
p
ti
m
izi
n
g
th
e
e
n
cr
y
p
tio
n
p
r
o
ce
s
s
h
as
b
ee
n
r
ep
o
r
ted
in
ex
is
tin
g
s
y
s
t
e
m
th
a
t
f
ail
s
to
r
esis
ts
t
h
e
co
m
p
u
tatio
n
a
l o
v
er
h
ea
d
in
ex
is
ti
n
g
s
ec
u
r
it
y
s
y
s
te
m
.
T
h
er
ef
o
r
e,
th
e
p
r
o
b
lem
s
tate
m
en
t
o
f
t
h
e
p
r
o
p
o
s
ed
s
tu
d
y
ca
n
b
e
s
tated
as
“
Dev
elo
p
in
g
a
co
s
t
effec
tiv
e
mo
d
eli
n
g
to
w
a
r
d
s
in
co
r
p
o
r
a
ti
n
g
h
ig
h
er
d
eg
r
ee
o
f
r
esil
ien
cy
a
g
a
in
s
t
ma
ximu
m
fo
r
ms
o
f
th
r
ea
ts
in
W
S
N
is
a
co
mp
u
ta
tio
n
a
l c
h
a
llen
g
in
g
t
a
s
k
”.
T
h
e
n
ex
t sectio
n
p
r
ese
n
ts
t
h
e
s
o
lu
tio
n
to
th
is
p
r
o
b
le
m
.
T
h
e
p
r
im
e
g
o
al
o
f
t
h
e
p
r
o
p
o
s
ed
s
y
s
te
m
is
to
d
ev
elo
p
a
n
n
-
tier
m
o
d
eli
n
g
o
f
k
e
y
m
an
a
g
e
m
e
n
t
f
o
r
s
ec
u
r
i
n
g
co
m
m
u
n
icatio
n
i
n
W
SN.
T
h
e
p
r
o
p
o
s
ed
s
y
s
te
m
i
s
b
u
ilt
co
n
s
id
er
in
g
n
-
tier
m
o
d
el,
w
h
ic
h
is
a
s
tan
d
ar
d
ar
ch
itect
u
r
e
f
o
r
in
d
u
s
tr
y
-
b
ase
d
s
o
f
t
w
ar
e
m
o
d
els.
T
h
e
co
m
p
lete
id
ea
is
b
ased
o
n
th
e
f
ac
t
th
at
a
clu
s
ter
h
ea
d
w
il
l
h
a
v
e
an
in
cr
ea
s
in
g
d
ep
en
d
en
c
y
o
f
a
s
ec
r
et
k
e
y
esp
ec
ial
y
d
u
r
i
n
g
t
h
e
d
ata
ag
g
r
eg
a
t
io
n
p
r
o
ce
s
s
an
d
in
ab
s
en
ce
o
f
s
ec
u
r
e
k
e
y
,
t
h
e
cl
u
s
ter
h
ea
d
m
a
y
p
o
is
o
n
th
e
co
m
p
lete
n
et
w
o
r
k
v
er
y
s
lo
w
l
y
l
ea
d
in
g
to
co
llater
a
l
attac
k
s
ce
n
ar
io
.
He
n
ce
,
an
an
a
l
y
tical
ap
p
r
o
ac
h
i
s
co
n
s
id
er
ed
to
d
e
v
elo
p
an
ap
p
r
o
ac
h
th
a
t c
a
n
g
en
er
ate
a
s
ec
r
et
k
e
y
to
b
e
u
s
ed
i
n
d
ata
ag
g
r
eg
atio
n
.
T
h
e
co
r
e
em
p
h
a
s
is
o
f
t
h
e
p
r
o
p
o
s
ed
im
p
le
m
e
n
tat
io
n
p
lan
is
al
s
o
to
en
s
u
r
e
h
ig
h
e
s
t
d
ea
l
o
f
p
r
iv
ac
y
an
d
in
teg
r
i
t
y
i
n
an
y
f
o
r
m
s
o
f
co
m
m
u
n
icatio
n
o
f
W
SN
co
n
s
id
er
in
g
all
t
h
e
m
aj
o
r
sc
en
ar
io
o
f
t
h
r
ea
ts
.
A
l
g
o
r
i
t
h
m
f
o
r
G
e
n
e
r
a
t
i
n
g
a
S
e
c
u
r
e
k
e
y
O
p
t
i
m
i
z
a
t
i
o
n
A
l
g
o
r
i
t
h
m
I
d
e
n
t
i
f
i
c
a
t
i
o
n
o
f
U
n
i
q
u
e
S
e
n
s
o
r
C
h
a
r
a
c
t
e
r
i
s
t
i
c
s
S
t
a
t
i
c
C
h
a
r
e
c
t
e
r
i
s
t
i
c
D
y
n
a
m
i
c
C
h
a
r
a
c
t
e
r
i
s
t
i
c
P
o
l
y
n
o
m
i
a
l
A
p
p
r
o
a
c
h
S
H
A
3
D
i
g
i
t
a
l
S
i
g
n
a
t
u
r
e
E
l
l
i
p
t
i
c
a
l
C
u
r
v
e
C
r
y
p
t
o
s
y
s
t
e
m
Fig
u
r
e
1
.
Flo
w
o
f
ad
o
p
ted
p
o
lic
y
to
w
ar
d
s
k
e
y
m
a
n
ag
e
m
e
n
t
Un
li
k
e
co
n
v
e
n
tio
n
al
s
ec
u
r
it
y
alg
o
r
ith
m
s
,
th
e
p
r
o
p
o
s
ed
s
y
s
t
e
m
c
h
o
o
s
es
to
r
ep
r
esen
t
th
e
s
en
s
o
r
n
o
d
e
n
o
t
m
er
el
y
w
it
h
a
n
id
b
u
t
w
it
h
d
if
f
er
e
n
t
f
o
r
m
o
f
id
t
h
at
b
ea
r
s
b
o
th
s
tatic
c
h
ar
ec
ter
is
tic
s
(
e.
g
.
n
a
m
e,
I
P
ad
d
r
ess
,
MA
C
ad
d
r
ess
,
Facto
r
y
d
ef
a
u
lt
k
e
y
s
etc)
an
d
d
y
n
a
m
ic
c
h
ar
ec
ter
is
tic
(
ti
m
e
s
ta
m
p
)
.
A
m
at
h
e
m
atica
l
e
x
p
r
ess
io
n
u
s
i
n
g
p
o
l
y
n
o
m
ial
ap
p
r
o
ac
h
h
a
s
b
ee
n
co
n
s
tr
u
c
ted
th
at
u
s
es b
o
th
th
e
f
ea
t
u
r
es
in
o
r
d
er
to
g
e
n
er
ate
a
s
ec
r
et
at
th
e
en
d
.
T
h
e
f
ir
s
t
al
g
o
r
ith
m
f
o
r
g
en
er
atio
n
o
f
s
ec
r
et
k
e
y
i
s
d
esig
n
ed
o
n
t
h
e
b
asi
s
o
f
t
h
e
c
o
n
ce
p
t
th
at
f
ac
to
r
y
-
d
ef
au
lt
k
e
y
s
s
h
o
u
ld
n
o
t
b
e
u
s
ed
f
o
r
au
th
e
n
tica
tio
n
a
n
d
s
h
o
u
ld
g
e
n
er
ate
n
e
w
s
ec
r
et
k
e
y
.
I
t
is
b
ec
au
s
e
f
ac
to
r
y
d
ef
au
lt
k
e
y
s
ca
n
b
e
ea
s
il
y
c
o
m
p
r
o
m
is
ed
d
u
r
in
g
u
s
a
g
e
o
f
p
u
b
lic
k
e
y
en
cr
y
p
tio
n
.
T
h
is
alg
o
r
ith
m
f
u
r
th
er
en
cr
y
p
ts
t
h
is
k
e
y
u
s
in
g
n
o
v
el
SH
A
3
i
n
o
r
d
er
to
co
m
p
u
te
t
h
e
e
x
ac
t
v
al
u
e
o
f
s
h
ar
ed
k
e
y
.
T
h
e
p
o
s
s
es
s
io
n
o
f
s
h
ar
ed
k
e
y
ca
n
b
e
o
n
l
y
w
it
h
l
eg
iti
m
ate
n
o
d
es.
E
v
e
n
i
f
th
e
y
ar
e
ca
p
tu
r
ed
,
th
e
ti
m
e
s
ta
m
p
f
ac
to
r
w
o
u
ld
ass
i
s
ts
in
id
en
t
if
y
i
n
g
w
h
et
h
er
t
h
e
r
ec
eiv
ed
k
e
y
h
a
s
b
ee
n
g
en
er
ated
b
y
t
h
e
r
eg
u
lar
n
o
d
e
o
r
th
e
m
alicio
u
s
n
o
d
e.
T
h
e
f
u
r
t
h
er
i
m
p
r
o
v
e
m
en
t
is
ca
r
r
ie
d
o
u
t
b
y
i
n
co
r
p
o
r
atin
g
o
p
ti
m
i
za
tio
n
to
w
ar
d
s
t
h
e
p
r
o
ce
s
s
o
f
g
en
er
ati
n
g
t
h
e
s
ec
r
et
k
e
y
.
Fo
r
th
i
s
p
u
r
p
o
s
e,
th
e
s
y
s
t
e
m
r
ed
esig
n
s
t
h
e
d
ig
ital
s
i
g
n
at
u
r
e
an
d
i
m
p
r
o
v
es
E
llip
tical
C
u
r
v
e
E
n
cr
y
p
tio
n
f
o
r
y
ield
in
g
f
a
s
ter
s
ec
r
et
k
e
y
w
it
h
n
o
n
-
o
v
er
lap
p
in
g
c
h
ar
ec
eter
is
tics
a
m
o
n
g
th
e
g
e
n
er
ated
k
e
y
s
.
T
h
e
n
ex
t
s
ec
tio
n
f
u
r
t
h
er
ill
u
s
tr
ate
s
th
e
al
g
o
r
i
th
m
d
esi
g
n
p
r
in
cip
le.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
t J
E
lec
&
C
o
m
p
E
n
g
I
SS
N:
2088
-
8708
N
-
t
ier mo
d
ellin
g
o
f ro
b
u
s
t k
ey
ma
n
a
g
eme
n
t f
o
r
s
ec
u
r
e
d
a
ta
a
g
g
r
eg
a
tio
n
in
w
ir
eless
....
(
Jy
o
ti Meta
n
)
2685
2.
AL
G
O
RI
T
H
M
I
M
P
L
E
M
E
NT
A
T
I
O
N
I
n
o
r
d
er
to
d
esig
n
a
n
al
g
o
r
ith
m
f
o
r
p
er
f
o
r
m
i
n
g
an
n
-
tier
m
o
d
elin
g
o
f
k
e
y
g
e
n
er
atio
n
s
y
s
te
m
,
it
i
s
r
eq
u
ir
ed
to
id
en
tify
s
o
m
e
o
f
t
h
e
u
n
iq
u
e
ele
m
e
n
ts
to
b
e
u
s
e
d
in
k
e
y
d
e
s
ig
n
.
E
m
p
h
a
s
in
g
o
n
th
e
f
o
r
w
ar
d
an
d
b
ac
k
w
ar
d
s
ec
r
ec
y
,
t
h
e
p
r
o
p
o
s
ed
alg
o
r
ith
m
co
n
s
id
er
s
th
at
a
s
en
s
o
r
n
o
d
e
b
e
id
en
t
if
ied
u
s
in
g
t
h
r
ee
d
if
f
er
en
t
ele
m
e
n
ts
w
h
er
e
t
w
o
ele
m
e
n
t
s
i
1
a
n
d
i
2
r
ep
r
esen
t
s
tatic
f
e
atu
r
e
o
f
n
o
d
e
w
h
ile
th
ir
d
elem
en
t
i
3
r
ep
r
esen
t
s
d
y
n
a
m
ic
f
ea
t
u
r
e
o
f
n
o
d
e.
T
h
e
p
r
o
p
o
s
ed
n
-
tier
m
o
d
elin
g
o
f
k
e
y
m
a
n
ag
e
m
e
n
t
tec
h
n
iq
u
e
in
W
SN
is
ca
r
r
ied
o
u
t
u
s
i
n
g
t
w
o
e
s
s
e
n
tial
al
g
o
r
it
h
m
s
v
iz.
Alg
o
r
it
h
m
f
o
r
g
e
n
er
atin
g
a
s
ec
u
r
e
k
e
y
an
d
Op
ti
m
ized
A
l
g
o
r
ith
m
f
o
r
Secu
r
e
Ke
y
Ge
n
er
atio
n
.
T
h
e
f
ir
s
t
alg
o
r
it
h
m
is
r
esp
o
n
s
ib
le
f
o
r
en
s
u
r
i
n
g
t
h
e
f
ac
t
th
at
th
er
e
s
h
o
u
ld
b
e
p
r
esen
ce
o
f
ce
r
tai
n
u
n
iq
u
e
k
e
y
w
h
en
t
w
o
s
e
n
s
o
r
n
o
d
es
f
r
o
m
d
i
f
f
er
e
n
t
cl
u
s
ter
s
p
er
f
o
r
m
co
m
m
u
n
icatio
n
a
m
o
n
g
ea
ch
o
th
er
.
T
h
e
ter
m
le
v
el
m
ea
n
s
r
o
u
ti
n
g
s
ta
g
es
o
f
d
ata
a
g
g
r
eg
atio
n
i.e
.
1
st
lev
el
co
r
r
esp
o
n
d
s
to
s
ec
u
r
in
g
r
o
u
te
s
b
et
w
ee
n
m
e
m
b
er
n
o
d
es a
n
d
cl
u
s
ter
h
ea
d
,
2
nd
lev
el
co
r
r
esp
o
n
d
s
to
th
at
o
f
cl
u
s
ter
h
ea
d
to
an
o
th
er
cl
u
s
ter
h
ea
d
,
w
h
ile
th
ir
d
lev
el
co
r
r
esp
o
n
d
s
to
s
ec
u
r
i
n
g
lin
k
b
et
w
ee
n
cl
u
s
ter
h
ea
d
to
s
in
k
.
As
t
h
e
cl
u
s
ter
h
ea
d
b
ea
r
s
en
o
u
g
h
p
h
y
s
ical
in
f
o
r
m
atio
n
o
f
its
m
e
m
b
er
n
o
d
e
alo
n
g
w
it
h
o
t
h
er
i
n
f
o
r
m
ati
o
n
e.
g
.
b
atter
y
l
if
e,
b
u
f
f
er
etc
,
h
e
n
ce
c
h
an
ce
s
o
f
m
e
m
b
er
n
o
d
e
b
ein
g
r
o
g
u
e
i
s
n
o
t
co
n
s
id
er
ed
.
Hen
ce
,
t
h
e
s
t
u
d
y
is
m
o
r
e
d
o
m
i
n
a
n
t
f
o
r
2
nd
a
n
d
3
rd
lev
e
l
o
f
d
ata
ag
g
r
e
g
atio
n
.
Fo
r
t
h
is
p
u
r
p
o
s
e,
th
e
s
y
s
te
m
in
i
t
iall
y
co
n
s
id
er
s
ass
u
m
i
n
g
i
n
tr
u
d
er
m
o
d
u
l
e
th
at
h
a
s
r
ec
e
n
tl
y
in
tr
u
d
ed
th
e
n
et
w
o
r
k
eith
er
u
s
i
n
g
in
s
id
e
o
r
o
u
ts
id
e
attac
k
in
g
s
tr
ate
g
y
.
T
h
e
d
is
cu
s
s
io
n
o
f
th
e
alg
o
r
it
h
m
is
as f
o
llo
w
:
Alg
o
rit
h
m
-
1
:
Alg
o
rit
h
m
f
o
r
G
ener
a
t
ing
a
Secure
k
ey
I
np
ut
:
τ
(
Sen
s
o
r
k
e
y
)
,
θ
(
s
en
s
o
r
tag
)
O
utput
: K
(
Secu
r
e
k
e
y
)
Sta
rt
1
.
in
it τ
,
θ,
2
.
F
o
r
i=1
:n
node
3
.
If
(i
3A
≠i
3B
)
4
.
If
(
p
≠
0
)
5
.
If
(γ
1
&
&
γ
2
<τ)
6
.
K=
ψ(
(
D
ij
|
|
θ
|
|
θ)
,
‘
S
HA
3
’
)
7
.
E
nd
8
.
E
nd
9
.
E
nd
1
0
.
E
nd
E
nd
T
h
e
p
r
im
ar
y
ass
u
m
p
tio
n
o
f
t
h
i
s
alg
o
r
it
h
m
is
to
r
ea
lize
t
h
e
p
it
f
alls
o
f
u
s
a
g
e
o
f
s
y
m
m
etr
ic
k
e
y
s
d
u
r
in
g
th
e
b
r
o
ad
ca
s
tin
g
m
ec
h
a
n
is
m
o
n
t
h
e
w
ir
ele
s
s
ch
a
n
n
els
o
f
s
en
s
o
r
n
et
w
o
r
k
.
T
h
er
ef
o
r
e,
p
o
s
s
ib
ilit
y
o
f
attac
k
i
n
g
th
e
f
ac
to
r
y
-
b
u
il
t
k
e
y
s
ar
e
q
u
i
t
e
h
i
g
h
a
l
w
a
y
s
.
T
h
er
ef
o
r
e,
th
i
s
alg
o
r
ith
m
d
o
es
n
’
t
d
ep
en
t
o
n
u
s
i
n
g
f
ac
to
r
y
-
b
u
ilt
k
e
y
s
f
o
r
s
ec
u
r
i
n
g
co
m
m
u
n
ic
atio
n
r
ath
er
i
ts
r
e
-
co
m
p
u
te
d
y
n
a
m
ical
l
t
h
e
s
ec
r
et
k
e
y
to
o
f
f
er
m
o
r
e
lev
el
o
f
s
ec
u
r
it
y
.
T
h
e
al
g
o
r
ith
m
in
itial
izes
t
h
e
s
en
s
o
r
k
e
y
as
w
ell
a
s
s
e
n
s
o
r
ta
g
s
(
L
i
n
e
-
1
)
,
w
h
er
e
ea
ch
tag
b
ea
r
s
t
h
e
n
o
v
el
ch
ar
ec
ter
i
s
tics
o
f
s
en
s
o
r
i.e
.
i
1
,
i
2
,
an
d
i
3
.
T
h
e
alg
o
r
ith
m
co
m
p
ar
es
th
e
d
y
n
a
m
ic
f
ea
t
u
r
e
o
f
th
e
s
e
n
s
o
r
A
i.e
.
i
3A
w
i
th
t
h
at
o
f
s
e
n
s
o
r
B
i.e
.
i
3B
(
L
i
n
e
-
3
)
.
T
h
is
o
p
er
atio
n
i
s
ca
r
r
ied
o
u
t
o
n
l
y
f
o
r
co
m
m
u
n
icati
n
g
n
o
d
es
(
n
node
)
an
d
o
n
l
y
g
e
n
u
i
n
e
n
o
d
e
is
ex
p
ec
te
d
to
h
av
e
d
if
f
er
e
n
t
d
y
n
a
m
ic
f
ea
t
u
r
es
o
th
er
w
is
e
o
n
e
o
f
th
e
co
m
m
u
n
icatin
g
n
o
d
es
is
co
n
s
id
er
ed
to
b
e
c
o
m
p
r
o
m
is
ed
if
t
h
e
d
y
n
a
m
ic
f
ea
tu
r
e
f
r
o
m
t
w
o
co
m
m
u
n
icati
n
g
s
en
s
o
r
s
is
f
o
u
n
d
to
b
e
s
a
m
e.
T
h
e
alg
o
r
ith
m
th
en
ap
p
lies
a
p
o
l
y
n
o
m
ial
f
u
n
ctio
n
o
v
er
th
e
t
w
o
-
s
tatic
f
e
a
tu
r
e
o
f
t
h
e
s
e
n
s
o
r
n
o
d
e
i.e
.
f
(
x
)
(i
1
, i
2
)
.
I
n
ca
s
e
o
f
n
o
n
-
n
e
g
ativ
e
v
al
u
e
o
f
p
o
l
y
n
o
m
ial
f
u
n
ct
io
n
(
L
in
e
-
4
)
,
th
e
m
ath
e
m
at
ical
ex
p
r
ess
io
n
i
s
co
n
s
id
er
ed
to
b
e
v
alid
an
d
th
e
alg
o
r
ith
m
f
u
r
t
h
er
ch
ec
k
s
f
o
r
th
e
s
ce
n
ar
io
s
h
o
w
n
i
n
L
in
e
-
5
,
w
h
er
e
γ
1
an
d
γ
2
ar
e
co
n
s
id
er
ed
to
b
e
tw
o
s
u
b
-
p
o
l
y
n
o
m
ial
e
x
p
r
ess
io
n
s
d
er
iv
ed
f
r
o
m
f
(
x
)
(i
1
,
i
2
)
.
T
h
e
s
ec
u
r
e
k
e
y
is
g
e
n
er
ated
b
y
ap
p
ly
i
n
g
a
n
en
cr
y
p
tio
n
a
lg
o
r
ith
m
o
f
SH
A
3
o
v
er
t
h
e
d
o
u
b
le
co
n
ca
ten
ated
d
ata
o
f
(
γ
1
an
d
γ
2
)
an
d
[
θ
θ]
.
T
h
is
lead
s
to
g
e
n
er
atio
n
o
f
a
s
ec
u
r
e
k
e
y
t
h
at
co
u
ld
b
e
u
s
ed
f
o
r
s
ec
u
r
i
n
g
t
h
e
d
ata
a
g
g
r
eg
a
tio
n
.
T
h
e
p
r
o
p
o
s
ed
s
y
s
te
m
ap
p
lies
S
H
A
3
,
w
h
ic
h
is
a
n
o
v
el
cr
y
p
tp
g
r
ap
h
ic
alg
o
r
ith
m
.
A
n
i
n
ter
esti
n
g
f
ac
t
to
f
i
n
d
in
u
s
ag
e
o
f
t
h
i
s
alg
o
r
ith
m
is
t
h
at
th
er
e
is
o
n
l
y
o
n
e
s
tep
o
f
en
cr
y
p
tio
n
,
w
h
ic
h
s
tates
t
h
at
th
e
alg
o
r
it
h
m
d
o
es
n
o
t
h
av
e
r
ec
u
r
s
iv
e
en
cr
y
p
tio
n
o
p
er
atio
n
n
o
r
d
o
es
it
co
u
ld
b
r
in
g
m
o
r
e
a
m
o
u
n
t
o
f
n
et
w
o
r
k
o
v
er
h
ea
d
.
O
w
i
n
g
to
in
tellec
tu
al
u
s
ag
e
o
f
b
o
th
s
tatic
a
n
d
d
y
n
a
m
ic
c
h
ar
ec
ter
is
tic
o
f
a
s
e
n
s
o
r
n
o
d
e,
t
h
is
a
lg
o
r
it
h
m
h
a
s
a
h
i
g
h
er
s
u
p
p
o
r
tab
ilit
y
o
f
b
o
th
f
o
r
w
ar
d
a
n
d
b
ac
k
w
ar
d
s
ec
r
e
c
y
t
h
at
i
s
h
ig
h
l
y
e
s
s
e
n
tial
t
o
s
ec
u
r
i
n
g
co
m
m
u
n
icat
io
n
i
n
W
SN.
An
o
t
h
er
i
m
p
o
r
tan
t
p
o
in
t
to
o
b
s
er
v
e
is
th
at
SH
A
3
is
co
m
p
ar
ati
v
el
y
a
n
e
w
e
n
cr
y
p
tio
n
tec
h
n
iq
u
e
wh
ich
d
o
esn
’
t
h
as
a
f
u
ll
s
p
ec
i
f
icatio
n
o
f
i
m
p
le
m
e
n
tatio
n
ti
ll
d
ate
as
it
i
s
q
u
i
te
n
o
v
e
l.
He
n
ce
,
it
is
r
eq
u
ir
ed
to
f
u
r
th
er
o
p
ti
m
ize
th
e
s
ec
u
r
it
y
s
tr
e
n
g
t
h
o
f
t
h
e
k
e
y
g
e
n
er
atio
n
al
g
o
r
ith
m
t
h
at
is
ca
r
r
i
ed
o
u
t in
n
e
x
t sta
g
e
o
f
i
m
p
le
m
en
tatio
n
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8708
I
n
t J
E
lec
&
C
o
m
p
E
n
g
,
Vo
l.
9
,
No
.
4
,
A
u
g
u
s
t
201
9
:
2
6
8
2
-
2690
2686
T
h
is
alg
o
r
it
h
m
u
s
es
i
m
p
r
o
v
ed
v
er
s
io
n
o
f
d
i
g
ital
s
i
g
n
a
tu
r
e
i
n
o
r
d
er
to
f
u
r
t
h
er
o
p
ti
m
ize
th
e
s
ec
u
r
it
y
s
tr
en
g
th
o
f
E
llip
tical
C
u
r
v
e
C
r
y
p
to
g
r
ap
h
y
e
m
p
h
a
s
izi
n
g
o
n
th
e
p
r
iv
ac
y
an
d
in
te
g
r
it
y
i
s
s
u
es.
On
e
o
f
t
h
e
u
n
iq
u
e
f
ac
ts
ab
o
u
t
u
s
a
g
e
o
f
s
u
ch
p
u
b
lic
k
e
y
en
cr
y
p
tio
n
m
ec
h
a
n
i
s
m
is
it
s
ca
p
ab
ilit
y
to
g
e
n
er
ate
m
u
c
h
n
u
m
b
er
o
f
r
o
b
u
s
t
s
ec
r
et
k
e
y
s
.
Ho
w
e
v
er
,
th
e
p
r
o
p
o
s
ed
s
y
s
te
m
d
e
v
elo
p
s
a
s
i
m
p
le
o
b
j
ec
tiv
e
f
u
n
ct
io
n
to
s
elec
t
o
n
l
y
o
n
e
s
ec
r
et
k
e
y
o
u
t
o
f
all
th
e
p
o
s
s
ib
ilit
ies
o
f
g
en
er
atio
n
o
f
s
ec
r
et
k
e
y
alter
i
n
g
t
h
e
p
r
i
m
e
n
u
m
b
er
s
.
T
h
is
ca
n
b
e
co
n
tr
o
lled
b
y
r
es
tr
ictin
g
t
h
e
o
r
d
er
v
alu
e
o
f
E
llip
tical
C
u
r
v
e
C
r
y
p
to
g
r
ap
h
y
.
He
n
ce
,
th
e
o
r
d
er
w
it
h
it
s
co
r
r
esp
o
n
d
in
g
li
m
it
is
e
m
p
h
a
s
ized
in
th
i
s
alg
o
r
it
h
m
.
T
h
e
in
itiatio
n
o
f
th
e
al
g
o
r
ith
m
ca
ll
s
f
o
r
f
o
r
w
ar
d
i
n
g
t
h
e
m
es
s
ag
e
b
y
t
h
e
tr
an
s
m
it
tin
g
n
o
d
e
to
th
e
r
ec
eiv
in
g
s
e
n
s
o
r
s
.
I
n
o
r
d
e
r
to
co
n
tr
o
l
th
e
n
ec
ess
ar
y
n
et
w
o
r
k
an
d
co
m
p
u
tatio
n
al
o
v
er
h
ea
d
,
th
e
a
lg
o
r
ith
m
p
er
f
o
r
m
s
r
an
d
o
m
s
elec
tio
n
o
f
t
h
e
k
e
y
w
it
h
th
e
l
i
m
it
o
f
1
an
d
(
U
-
1
)
.
T
h
er
ef
o
r
e,
th
e
co
m
p
lete
h
y
b
r
i
d
izatio
n
p
r
o
ce
s
s
o
f
n
-
tier
m
o
d
elin
g
is
ca
r
r
ied
o
u
t
co
n
s
id
er
i
n
g
Di
g
ital
Si
g
n
at
u
r
e
an
d
E
llip
tical
C
u
r
v
e
C
r
y
p
to
g
r
ap
h
y
.
T
h
e
s
tep
s
in
v
o
l
v
ed
ar
e
as f
o
llo
w
s
:
Alg
o
rit
h
m
-
2
:
O
pti
m
ized
A
lg
o
rit
h
m
f
o
r
Secure
K
ey
G
ene
ra
t
io
n
I
np
ut
:
n
(
n
u
m
b
er
o
f
co
m
m
u
n
i
ca
tin
g
n
o
d
es)
O
utput
: K
op
(
o
p
ti
m
ized
s
ec
u
r
e
k
e
y
)
Sta
rt
1
.
F
o
r
i=1
:n
2
.
If
α
=0
3
.
Select
r
1
4
.
E
ls
e
5
.
C
o
m
p
u
te
V
1
a
n
d
V
2
6
.
If
V
2
0
7
.
C
o
m
p
u
te
α
8
.
E
ls
e
9
.
k
op
(
α
,
V
2
)
E
nd
T
h
e
alg
o
r
ith
m
i
m
p
le
m
e
n
t
s
E
llip
tical
C
u
r
v
e
E
n
cr
y
p
tio
n
in
o
r
d
e
r
to
p
er
f
o
r
m
o
p
ti
m
izati
o
n
w
h
ic
h
p
er
f
o
r
m
s
o
p
ti
m
izat
io
n
to
w
ar
d
s
f
u
r
t
h
er
in
cr
ea
s
in
g
th
e
s
e
cu
r
it
y
s
tr
en
g
t
h
.
T
h
e
alg
o
r
ith
m
ch
o
o
s
es
al
l
th
e
co
m
m
u
n
icati
n
g
n
o
d
es
an
d
ch
ec
k
s
i
f
α
is
eq
u
i
v
ale
n
t
to
ze
r
o
(
L
in
e
-
2
)
.
T
h
e
co
m
p
u
tatio
n
o
f
α
is
ca
r
r
ied
o
u
t
b
y
s
ca
lar
m
u
ltip
licatio
n
o
f
lo
ca
tio
n
in
f
o
r
m
atio
n
o
f
n
o
d
e
w
it
h
h
i
g
h
e
s
t
li
m
it
o
f
o
r
d
er
.
I
n
ca
s
e
α
=0
th
a
n
th
e
alg
o
r
ith
m
r
a
n
d
o
m
l
y
s
e
lects
a
n
in
te
g
er
t
y
p
e
r
1
(
L
i
n
e
-
3
)
;
o
th
er
w
i
s
e,
t
h
e
al
g
o
r
ith
m
p
er
f
o
r
m
s
co
m
p
u
tatio
n
o
f
t
w
o
v
ar
iab
les
V
1
an
d
V
2
(
L
i
n
e
-
5
)
.
T
h
e
co
m
p
u
tatio
n
o
f
V
1
is
ca
r
r
ied
o
u
t
b
y
ap
p
l
y
i
n
g
an
e
n
cr
y
p
tio
n
f
u
n
c
tio
n
o
v
er
co
n
tr
o
m
e
s
s
a
g
e
an
d
co
m
p
u
te
d
α
v
alu
e
w
h
i
le
th
e
co
m
p
u
t
atio
n
o
f
V
2
is
ca
r
r
ied
o
u
t
b
y
ad
d
in
g
a
r
an
d
o
m
v
ar
iab
le
w
i
th
t
h
e
p
r
o
d
u
ct
o
f
r
1
an
d
u
p
p
er
lim
it
o
f
o
r
d
er
.
T
h
e
alg
o
r
ith
m
f
u
r
t
h
er
co
m
p
u
te
s
α
if
V
2
is
f
o
u
n
d
to
b
e
eq
u
iv
ale
n
t
to
ze
r
o
(
L
in
e
-
6
)
o
t
h
er
w
is
e
th
e
e
x
tr
ac
tio
n
o
f
t
h
e
o
p
tim
ized
k
e
y
k
op
i
s
ca
r
r
ied
o
u
t
o
v
er
α
an
d
V
2
(
L
in
e
-
9
)
to
co
m
p
lete
t
h
e
s
tep
o
f
o
p
ti
m
izat
io
n
.
A
clo
s
er
lo
o
k
in
to
t
h
e
ab
o
v
e
alg
o
r
it
h
m
ic
s
te
p
s
w
ill
s
h
o
w
th
at
it
h
y
b
r
id
s
t
h
e
ellip
tical
c
u
r
v
e
c
r
y
p
to
g
r
ap
h
y
w
i
th
t
y
p
ical
s
ig
n
atu
r
e
i
n
o
r
d
er
to
g
en
er
ate
a
lig
h
t
w
ei
g
h
t
a
n
d
d
y
n
a
m
ic
s
ec
u
r
it
y
to
k
en
th
at
is
r
eq
u
ir
ed
to
m
ain
tiai
n
h
ig
h
er
d
eg
r
ee
o
f
p
r
iv
ac
y
a
s
w
ell
a
s
co
n
f
id
en
tial
it
y
.
At
t
h
e
s
a
m
e
ti
m
e,
t
h
e
alg
o
r
it
h
m
a
ls
o
co
n
tr
ib
u
tes to
m
in
i
m
izatio
n
o
f
th
e
co
m
p
u
ta
tio
n
al
o
v
er
h
ea
d
as
w
e
ll.
A
f
ter
th
e
ex
ec
u
tio
n
o
f
t
h
e
o
p
tim
izatio
n
p
r
o
ce
s
s
is
o
v
er
,
th
e
n
ex
t
s
tep
is
to
p
er
f
o
r
m
v
alid
ati
o
n
o
p
er
atio
n
th
at
is
u
s
u
al
l
y
ca
r
r
i
ed
o
u
t
o
v
er
th
e
r
ec
ei
v
er
s
id
e
th
at
as
s
u
m
e
s
t
h
e
p
o
s
s
es
s
io
n
o
f
p
u
b
lic
k
e
y
o
f
t
h
e
s
o
u
r
ce
n
o
d
e.
T
h
e
alg
o
r
it
h
m
ab
o
r
ts
an
y
f
o
r
m
o
f
c
o
m
m
u
n
icati
o
n
if
its
f
i
n
d
s
ab
s
e
n
ce
o
f
an
y
n
o
n
-
ze
r
o
p
u
b
lic
k
e
y
o
th
er
w
is
e
i
t
as
s
es
s
es
th
e
n
u
m
er
ical
co
n
ten
t
w
it
h
i
n
t
h
e
k
e
y
.
T
h
e
n
u
m
er
ical
co
n
te
n
t
o
f
t
h
is
k
e
y
i
s
e
x
p
ec
ted
to
b
e
w
it
h
i
n
t
h
e
r
an
g
e
o
f
o
r
d
er
d
ef
i
n
ed
in
p
r
ev
io
u
s
a
lg
o
r
it
h
m
.
I
n
ter
esti
n
g
,
if
th
er
e
i
s
p
r
esen
ce
o
f
an
y
n
o
n
-
i
n
teg
e
r
f
o
r
m
o
f
k
e
y
th
a
n
it
is
co
n
s
id
e
r
ed
to
b
e
g
en
er
ated
b
y
m
alici
o
u
s
n
o
d
e
an
d
an
y
co
n
n
ec
tio
n
w
it
h
s
u
c
h
n
o
d
e
is
in
s
ta
n
tl
y
d
r
o
p
p
ed
.
A
p
ar
t
f
r
o
m
th
is
in
f
o
r
m
a
tio
n
r
elate
d
to
s
u
ch
n
o
d
e
as
w
el
l
as
n
ei
g
h
b
o
r
in
g
n
o
d
es
o
f
s
u
c
h
v
icti
m
/co
m
p
r
o
m
ized
n
o
d
e
i
s
i
n
s
ta
n
tl
y
u
p
d
ated
to
all
t
h
e
o
t
h
er
s
en
s
o
r
n
o
d
es
f
o
r
ad
d
itio
n
al
s
ec
u
r
it
y
.
An
o
t
h
er
in
ter
esti
n
g
f
ac
t
is
t
h
at
t
h
e
al
g
o
r
ith
m
d
o
es
n
’
t
r
ep
ea
t
th
e
s
a
m
e
s
tep
s
u
s
ed
in
e
n
cr
y
p
tio
n
o
r
in
k
e
y
g
e
n
er
atio
n
p
r
o
ce
s
s
,
w
h
ic
h
m
a
k
e
s
th
e
p
r
o
p
o
s
ed
s
y
s
te
m
m
o
r
e
r
esis
tiv
e
to
w
ar
d
s
b
ac
k
w
ar
d
s
ec
r
ec
y
.
I
n
s
u
ch
ca
s
e,
t
h
e
alg
o
r
ith
m
co
n
s
id
er
s
th
e
lo
c
atio
n
-
b
ased
in
f
o
r
m
at
io
n
in
o
r
d
er
to
p
er
f
o
r
m
v
alid
atio
n
ap
ar
t
f
r
o
m
u
s
ag
e
o
f
V
1
.
T
h
e
r
ea
s
o
n
b
eh
in
d
s
ele
ctio
n
o
f
lo
ca
tio
n
-
b
ased
in
f
o
r
m
atio
n
is
n
o
t
to
r
etain
p
r
io
r
ly
-
u
s
ed
d
y
n
a
m
ic
f
ea
tu
r
e
i.e
.
ti
m
e
-
s
ta
m
p
b
u
t
to
r
ep
lace
it
w
ith
lo
ca
tio
n
.
T
h
is
d
esi
g
n
p
r
in
cip
le
s
ig
n
i
f
ica
n
tl
y
r
ed
u
ce
s
n
et
w
o
r
k
o
v
er
h
ea
d
as
w
ell
as
co
m
p
u
tatio
n
al
o
v
er
h
ea
d
to
o
to
a
lar
g
e
ex
ten
t.
T
h
e
alg
o
r
ith
m
d
o
es
n
’
t
allo
w
t
h
e
r
o
u
ti
n
g
to
b
e
co
n
f
ir
m
a
n
d
ab
o
r
ts
th
e
co
n
n
ec
tio
n
o
n
ce
t
h
e
f
ir
s
t
s
ta
g
e
o
f
v
al
id
atio
n
its
el
f
f
ail
s
.
Hen
ce
,
in
a
s
m
ar
t
m
a
n
n
er
,
t
h
e
alg
o
r
ith
m
o
f
f
er
s
s
ec
u
r
it
y
to
i
ts
n
e
ig
h
b
o
r
in
g
n
o
d
es
al
s
o
.
Mo
r
eo
v
er
,
o
w
in
g
to
u
tili
za
t
i
o
n
o
f
n
o
n
-
r
ec
u
r
s
iv
e
ap
p
r
o
ac
h
,
th
e
alg
o
r
ith
m
o
f
f
e
r
s
s
ig
n
i
f
ica
n
t
ad
v
a
n
ta
g
e
in
te
r
m
s
o
f
co
m
m
u
n
icatio
n
ef
f
ici
en
c
y
w
i
th
r
ed
u
ce
d
co
m
p
u
tatio
n
al
b
u
r
d
en
ap
ar
t f
r
o
m
i
ts
s
ec
u
r
it
y
ca
p
ab
ilit
y
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
t J
E
lec
&
C
o
m
p
E
n
g
I
SS
N:
2088
-
8708
N
-
t
ier mo
d
ellin
g
o
f ro
b
u
s
t k
ey
ma
n
a
g
eme
n
t f
o
r
s
ec
u
r
e
d
a
ta
a
g
g
r
eg
a
tio
n
in
w
ir
eless
....
(
Jy
o
ti Meta
n
)
2687
3.
RE
SU
L
T
S
AND
AN
AL
Y
SI
S
T
h
e
im
p
le
m
en
tatio
n
o
f
th
e
p
r
o
p
o
s
ed
s
tu
d
y
h
a
s
b
ee
n
ca
r
r
ied
o
u
t
co
n
s
id
er
in
g
I
E
E
E
8
0
2
.
1
5
MA
C
p
r
o
to
co
ls
w
h
er
e
t
h
e
s
e
n
s
o
r
s
ar
e
in
itia
lized
to
0
.
5
jo
u
les o
f
e
n
er
g
y
.
C
o
n
s
id
er
in
g
1
1
0
0
x
1
2
0
0
m
2
s
i
m
u
lat
io
n
ar
ea
,
th
e
r
esu
lt
s
h
a
v
e
b
ee
n
ca
p
tu
r
ed
f
o
r
6
0
0
-
1
0
0
0
s
en
s
o
r
n
o
d
es
o
v
er
1
0
0
0
s
im
u
latio
n
r
o
u
n
d
s
w
it
h
b
ea
co
n
s
ize
o
f
2
5
0
b
y
tes
an
d
p
ac
k
e
t
s
ize
o
f
1
0
0
0
b
y
tes.
Fo
r
b
etter
an
al
y
s
is
,
t
h
e
p
r
o
p
o
s
ed
s
y
s
te
m
p
er
f
o
r
m
s
co
m
p
ar
ati
v
e
an
la
y
s
i
s
w
ith
t
h
e
e
x
is
t
in
g
s
y
s
t
e
m
w
it
h
r
esp
ec
t to
ea
ch
alg
o
r
i
th
m
i
m
p
le
m
e
n
tatio
n
.
T
h
e
f
ir
s
t
alg
o
r
it
h
m
to
w
ar
d
s
g
en
er
ati
n
g
s
ec
u
r
e
k
e
y
i
s
co
m
p
ar
ed
w
it
h
th
e
w
o
r
k
c
ar
r
ied
o
u
t
b
y
T
an
g
[
3
5
]
an
d
R
o
y
[
3
6
]
o
w
i
n
g
to
s
i
m
iliar
it
y
i
n
t
h
e
r
e
s
ea
r
ch
g
o
al
to
w
ar
d
s
r
esi
s
ti
n
g
p
o
ten
tial
attac
k
s
i
n
W
SNe.
g
.
f
lo
o
d
in
g
attac
k
,
s
in
k
h
o
le
attac
k
,
S
y
b
il
attac
k
,
etc.
T
h
e
o
u
tco
m
e
s
h
o
w
s
th
at
p
r
o
p
o
s
ed
s
y
s
te
m
o
f
f
er
s
s
ig
n
i
f
ica
n
tl
y
le
s
s
d
ela
y
as
co
m
p
ar
ed
to
ex
is
t
in
g
s
y
s
te
m
as
s
h
o
w
n
i
n
Fi
g
u
r
e
2
an
d
m
o
r
e
en
er
g
y
r
ete
n
tio
n
as
s
h
o
w
n
in
Fi
g
u
r
e
3
.
T
h
e
p
r
im
e
r
ea
s
o
n
b
eh
i
n
d
th
i
s
is
t
h
at
t
h
e
ex
its
in
g
ap
p
r
o
ac
h
es
o
f
T
an
g
[
3
5
]
an
d
R
o
y
[
3
6
]
h
av
e
in
cr
ea
s
in
g
l
y
u
s
ed
h
i
g
h
e
r
n
u
m
b
er
o
f
r
ec
u
r
s
iv
e
s
tep
s
in
o
r
d
er
to
o
f
f
er
r
esis
tan
ce
a
g
ain
s
t
s
m
a
x
i
m
u
m
n
u
m
b
er
o
f
d
ef
i
n
ed
t
h
r
ea
ts
.
T
h
is
ca
u
s
es
t
h
e
al
g
o
r
ith
m
to
f
o
c
u
s
m
o
r
e
o
n
s
ec
u
r
it
y
a
n
d
les
s
o
n
its
ad
v
er
s
e
ef
f
ec
t
to
w
ar
d
s
co
m
m
u
n
icatio
n
p
r
o
ce
s
s
.
Ho
w
ev
er
,
t
h
e
p
r
o
p
o
s
ed
alg
o
r
ih
m
i
s
co
m
p
letel
y
f
r
ee
o
f
a
n
y
s
u
ch
f
ea
t
u
r
es.
I
n
d
u
e
co
u
r
s
e
o
f
ti
m
e,
p
r
o
p
o
s
ed
alg
o
r
ith
m
o
f
f
er
s
b
etter
r
esu
lts
.
T
h
is
f
ac
t
is
f
u
r
th
er
v
er
i
f
ied
w
ith
r
esp
ec
t
to
r
esp
o
n
s
e
ti
m
e
a
s
s
h
o
w
n
i
n
Fig
u
r
e
4
.
W
h
e
n
co
m
p
ar
ed
with
t
h
e
s
tan
d
ar
d
an
d
f
r
eq
u
e
n
t
l
y
u
s
ed
e
n
cr
y
p
tio
n
alg
o
r
ith
m
s
e.
g
.
MD
5
,
SH
A
-
1
,
SH
A
-
2
,
an
d
b
lo
w
f
is
h
,
t
h
e
p
r
o
p
o
s
ed
s
tu
d
y
i
s
f
o
u
n
d
to
o
f
f
er
f
aster
r
esp
o
n
s
e
ti
m
e.
T
h
i
s
e
v
id
en
t
l
y
p
r
o
v
es
th
at
p
r
o
p
o
s
ed
alg
o
r
ith
m
f
o
r
g
en
er
atin
g
a
k
e
y
i
s
le
s
s
co
m
p
u
tati
o
n
all
y
co
m
p
le
x
a
n
d
th
er
ef
o
r
e
is
h
ig
h
l
y
s
ca
lab
le
i
n
n
atu
r
e
o
f
i
m
p
le
m
e
n
tatio
n
.
Fig
u
r
e
2
.
Dela
y
p
er
f
o
r
m
a
n
ce
Fig
u
r
e
3
.
R
esid
u
al
e
n
er
g
y
p
er
f
o
r
m
a
n
ce
Fig
u
r
e
4
.
R
esp
o
n
s
e
ti
m
e
a
n
al
y
s
is
w
it
h
s
ta
n
d
ar
d
en
cr
y
p
tio
n
te
ch
n
iq
u
es
T
h
e
r
esu
lt
s
h
o
w
n
in
Fi
g
u
r
e
5
u
n
ti
l
Fi
g
u
r
e
8
r
ep
r
esen
t
s
th
e
o
u
tco
m
e
o
f
o
p
ti
m
ized
alg
o
r
ith
m
i
m
p
le
m
en
ta
tio
n
,
w
h
ic
h
is
th
e
s
ec
o
n
d
alg
o
r
it
h
m
i
n
t
h
is
p
ap
er
.
I
t
s
h
o
u
ld
b
e
k
n
o
w
n
t
h
at
AE
S
is
o
n
e
o
f
t
h
e
m
o
s
t
s
ec
u
r
ed
en
cr
y
p
tio
n
alg
o
r
it
h
m
s
ad
o
p
ted
w
o
r
ld
w
id
e
o
w
in
g
to
its
li
g
h
t
w
eig
h
t o
p
er
atio
n
s
i
n
a
n
y
d
e
v
ice.
A
clo
s
er
lo
o
k
in
to
Fig
.
5
w
ill
s
h
o
w
t
h
at
p
r
o
p
o
s
ed
s
y
s
te
m
o
f
f
er
s
b
etter
d
elay
co
n
tr
o
l
ev
e
n
co
m
p
ar
ed
to
A
E
S.
Alth
o
u
g
h
,
SH
A
-
2
is
f
o
u
n
d
to
o
f
f
er
s
li
g
h
t
l
y
r
ed
u
ce
d
d
elay
t
h
a
n
A
E
S,
b
u
t
th
e
y
ar
e
n
ev
er
r
ec
o
m
m
e
n
d
ed
to
b
e
u
s
ed
o
w
i
n
g
to
its
d
ep
en
d
en
cie
s
o
v
er
h
ig
h
e
r
v
alu
e
o
f
k
e
y
s
izes.
A
p
ar
t
f
r
o
m
t
h
is
,
p
r
o
p
o
s
ed
s
y
s
te
also
e
x
h
ib
its
b
etter
e
n
er
g
y
co
n
s
er
v
atio
n
as
co
m
p
ar
ed
to
ex
is
ti
n
g
A
E
S
o
r
SH
A
-
2
.
I
t
s
h
o
u
ld
b
e
k
n
o
w
n
t
h
atp
r
o
p
o
s
ed
s
y
s
te
m
d
o
esn
’
t
co
m
p
lete
l
y
i
m
p
le
m
en
t
SH
A
3
as
co
m
p
lete
s
p
ec
if
icat
io
n
o
f
SHA
3
is
y
et
n
o
t
a
v
ailab
le.
Ho
w
e
v
er
,
a
s
lig
h
t
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8708
I
n
t J
E
lec
&
C
o
m
p
E
n
g
,
Vo
l.
9
,
No
.
4
,
A
u
g
u
s
t
201
9
:
2
6
8
2
-
2690
2688
in
itiat
iv
e
to
w
ar
d
s
SH
A
3
d
ev
el
o
p
m
e
n
t
s
h
o
w
s
m
u
c
h
b
etter
en
er
g
y
co
n
s
er
v
at
io
n
f
o
r
p
r
o
p
o
s
e
d
s
y
s
te
m
,
w
h
ic
h
i
s
tr
u
l
y
a
co
n
tr
ib
u
tio
n
to
w
ar
d
s
e
n
er
g
y
e
f
f
icie
n
t
s
ec
u
r
it
y
s
y
s
te
m
o
v
er
W
SN.
T
h
e
p
r
o
p
o
s
ed
n
-
tier
m
o
d
eli
n
g
ca
n
th
er
eb
y
b
e
clai
m
ed
to
o
f
f
er
r
ed
u
ce
d
d
elay
o
v
er
in
cr
ea
s
ize
p
ac
k
et
s
ize
an
d
h
ig
h
er
co
n
tr
o
l
o
f
en
er
g
y
d
ep
letio
n
o
v
er
in
cr
ea
s
e
o
f
i
n
cl
u
s
io
n
o
f
n
u
m
b
er
o
f
s
e
n
s
o
r
s
.
Fig
u
r
e
5
.
Dela
y
an
al
y
s
is
w
it
h
s
tan
d
ar
d
en
cr
y
p
ti
on
Fig
u
r
e
6
.
E
n
er
g
y
co
n
s
u
m
p
tio
n
an
al
y
s
is
w
it
h
s
tan
d
ar
d
en
cr
y
p
tio
n
Fig
u
r
e
7
.
P
ac
k
et
d
eliv
er
y
r
atio
an
al
y
s
is
w
it
h
s
tan
d
ar
d
en
cr
y
p
tio
n
Fig
u
r
e
8
.
Op
ti
m
izatio
n
alg
o
r
it
h
m
p
r
o
ce
s
s
i
n
g
ti
m
e
a
n
al
y
s
is
Fro
m
th
e
d
ata
-
d
eli
v
er
y
v
ie
w
p
o
in
t,
p
r
o
p
o
s
ed
s
y
s
te
m
i
s
f
o
u
n
d
to
o
f
f
er
in
cr
ea
s
ed
p
ac
k
et
d
eliv
er
y
r
atio
w
it
h
in
cr
ea
s
i
n
g
o
f
n
u
m
b
er
o
f
n
eig
h
b
o
r
in
g
n
o
d
es
as
s
h
o
w
n
i
n
Fi
g
u
r
e
7
.
O
w
i
n
g
to
n
o
n
-
i
n
cl
u
s
io
n
o
f
a
n
y
k
in
d
s
o
f
iter
ati
v
e
s
tep
s
,
th
e
p
r
o
p
o
s
ed
s
tu
d
y
o
f
f
er
s
g
o
o
d
d
ea
l
o
f
p
ac
k
et
d
eliv
er
y
r
atio
.
I
n
co
n
t
r
ast
to
th
e
e
x
i
s
ti
n
g
s
y
s
te
m
.
T
o
tal
ti
m
e
f
o
r
an
o
p
ti
m
ized
alg
o
r
it
h
m
ex
ec
u
tio
n
is
also
ass
es
s
ed
w
it
h
r
esp
ec
t
to
it
er
atio
n
s
to
f
i
n
d
t
h
at
p
r
o
p
o
s
ed
s
y
s
te
m
o
f
f
er
s
h
ig
h
l
y
r
ed
u
ce
d
alg
o
r
ith
m
p
r
o
ce
s
s
i
n
g
ti
m
e.
A
clo
s
er
lo
o
k
in
to
Fi
g
u
r
e
4
an
d
Fi
g
u
r
e
8
w
il
l
s
h
o
w
th
at
o
p
ti
m
izatio
n
p
o
s
itiv
el
y
co
n
tr
ib
u
tes
to
r
ed
u
ce
th
e
al
g
o
r
it
h
m
p
r
o
ce
s
s
i
n
g
ti
m
e
o
f
p
r
o
p
o
s
ed
s
y
s
te
m
,
w
h
er
e
p
r
io
r
l
y
it
w
as
1
.
9
s
ec
o
n
d
s
a
n
d
later
a
f
ter
o
p
ti
m
izat
io
n
,
it
r
es
u
lts
i
n
le
s
s
th
an
0
.
3
5
s
ec
o
n
d
s
.
I
t
also
h
ig
h
li
g
h
ts
t
h
a
t
p
er
f
o
r
m
an
ce
o
f
E
llip
tical
C
u
r
v
e
C
r
y
p
to
g
r
ap
h
y
i
s
h
i
g
h
l
y
i
m
p
r
o
v
ed
an
d
it
is
n
o
w
ca
p
ab
le
o
f
o
f
f
er
i
n
g
s
ec
u
r
e
k
e
y
m
an
a
g
e
m
e
n
t
as
f
a
s
t
as
p
o
s
s
ib
le
a
n
d
is
b
etter
t
h
a
n
a
n
y
f
r
eq
u
en
tl
y
u
s
ed
en
cr
y
p
tio
n
tech
n
iq
u
e
o
r
ap
p
r
o
ac
h
es p
r
ac
ti
ce
d
in
p
r
esen
t ti
m
es.
4.
CO
NCLU
SI
O
N
T
h
e
p
a
p
e
r
h
as
p
r
es
en
te
d
an
a
n
aly
tical
m
o
d
el
w
ith
th
e
b
ase
id
ea
th
at
–
w
h
en
a
clu
s
te
r
h
e
ad
u
s
es
a
co
m
p
r
o
m
is
ed
k
ey
o
r
w
ea
k
er
v
er
s
i
o
n
o
f
an
y
s
ec
r
e
t
k
ey
,
it
n
o
t
o
n
ly
v
ictim
izes
its
e
lf
b
u
t
als
o
m
ak
e
th
e
c
o
m
p
lete
n
etw
o
r
k
v
u
ln
er
a
b
le
.
Du
r
in
g
d
ata
ag
g
r
eg
a
ti
o
n
,
a
cl
u
s
t
er
h
e
a
d
m
u
s
t
f
o
cu
s
o
n
f
o
r
w
ar
d
in
g
an
ag
g
r
eg
at
e
d
d
at
a
an
d
less
o
n
p
er
f
o
r
m
in
g
au
th
en
tica
t
io
n
,
w
h
ich
w
ill
m
ea
n
th
at
an
alg
o
r
ith
m
s
h
o
u
ld
h
av
e
f
aster
r
e
s
p
o
n
s
e
tim
e
to
k
ee
p
a
p
ac
e
w
ith
th
e
r
ate
o
f
d
at
a
ag
g
r
eg
at
io
n
.
T
h
e
r
ef
o
r
e
,
th
e
p
r
o
p
o
s
e
d
a
lg
o
r
ith
m
o
f
f
er
s
f
o
ll
o
w
in
g
co
n
t
r
i
b
u
ti
o
n
v
iz.
i)
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
t J
E
lec
&
C
o
m
p
E
n
g
I
SS
N:
2088
-
8708
N
-
t
ier mo
d
ellin
g
o
f ro
b
u
s
t k
ey
ma
n
a
g
eme
n
t f
o
r
s
ec
u
r
e
d
a
ta
a
g
g
r
eg
a
tio
n
in
w
ir
eless
....
(
Jy
o
ti Meta
n
)
2689
th
e
c
o
m
p
let
e
m
o
d
e
lin
g
is
ca
r
r
i
ed
o
u
t
u
s
in
g
n
-
ti
er
a
r
ch
it
ec
tu
r
e
th
at
h
as
n
o
t
b
ee
n
att
em
p
ted
p
r
ev
i
o
u
s
ly
in
W
SN
.
T
h
e
a
d
v
an
tag
e
o
f
th
is
m
o
d
elin
g
is
its
cl
o
s
e
r
a
cc
e
p
t
an
c
e
to
w
ar
d
s
in
d
u
s
r
ia
l
m
o
d
el
in
g
th
er
e
b
y
s
h
o
w
in
g
ap
p
li
ca
b
i
lity
o
f
p
r
o
p
o
s
e
d
c
o
n
ce
p
t,
ii
)
th
e
c
o
m
p
let
e
w
o
r
k
is
m
ad
e
f
o
r
r
esis
t
in
g
m
ax
i
m
u
m
n
u
m
b
er
o
f
le
th
al
th
r
e
at
an
d
i
ts
n
ev
er
m
ea
n
t
f
o
r
ad
d
r
ess
in
g
o
n
ly
o
n
e
f
o
r
m
o
f
th
r
e
ats,
u
n
lik
e
ex
is
tin
g
s
y
s
te
m
,
iii
)
th
e
p
r
o
p
o
s
e
d
s
y
s
te
m
r
etain
s
a
g
o
o
d
b
al
a
n
ce
b
e
tw
ee
n
s
ec
u
r
ity
an
d
d
at
a
d
eliv
e
r
y
p
er
f
o
r
m
an
ce
u
s
in
g
n
o
n
-
r
ec
u
r
s
iv
e
o
p
tim
izati
o
n
s
te
p
s
.
RE
F
E
R
E
NC
E
S
[1
]
R.
G
ra
v
i
n
a
,
e
t
a
l
.
,
“
I
n
teg
ra
ti
o
n
,
I
n
t
e
rc
o
n
n
e
c
t
i
o
n
,
a
n
d
I
n
ter
o
p
e
ra
b
i
li
ty
o
f
I
o
T
S
y
ste
m
s,
”
S
p
r
in
g
e
r
,
2
0
1
7
.
[2
]
F
.
Al
-
T
u
r
jm
a
n
,
“
C
o
g
n
i
ti
v
e
S
e
n
s
o
r
s a
n
d
I
o
T
:
A
rc
h
i
tec
t
u
re
,
D
e
p
l
o
y
m
e
n
t,
a
n
d
Da
ta
De
l
iv
e
ry
,
”
CR
C
P
re
ss
,
2
0
1
7
.
[3
]
Z.
Z
h
a
n
g
,
e
t
a
l
.
,
“
A
S
u
rv
e
y
o
n
F
a
u
l
t
Dia
g
n
o
s
is
i
n
W
i
re
le
s
s
S
e
n
s
o
r
Ne
tw
o
rk
s,
”
I
EE
E
Acc
e
s
s
,
v
o
l
.
6
,
p
p
.
1
1
3
4
9
-
1
1
3
6
4
,
2
0
1
8
.
[4
]
S
.
B
o
u
b
ic
h
e
,
e
t
a
l
.
,
“
B
ig
Da
ta
C
h
a
ll
e
n
g
e
s
a
n
d
Da
ta
A
g
g
re
g
a
t
i
o
n
S
t
ra
t
e
g
i
e
s
i
n
W
ir
e
le
ss
S
e
n
s
o
r
Ne
tw
o
rk
s
,
”
I
EE
E
Acc
e
ss
,
v
o
l
.
6
,
p
p
.
2
0
5
5
8
-
2
0
5
7
1
,
2
0
1
8
.
[5
]
H.
He
j
a
z
i
,
e
t
a
l
.
,
“
S
u
rv
e
y
o
f
p
l
a
tf
o
r
m
s
f
o
r
m
a
ss
iv
e
I
o
T
,
”
2
0
1
8
IEE
E
I
n
te
r
n
a
t
i
o
n
a
l
C
o
n
fe
re
n
c
e
o
n
F
u
t
u
re
I
o
T
T
e
c
h
n
o
l
o
g
ies
(
F
u
t
u
r
e
I
o
T
)
,
Eg
e
r
,
p
p
.
1
-
8
,
2
0
1
8
.
[6
]
I.
I.
L
y
so
g
o
r,
e
t
a
l
.
,
“
S
u
rv
e
y
o
f
d
a
ta
e
x
c
h
a
n
g
e
f
o
rm
a
ts
f
o
r
h
e
te
r
o
g
e
n
e
o
u
s
L
P
W
A
N
-
sa
te
l
li
te
Io
T
n
e
tw
o
rk
s
,
”
2018
M
o
sc
o
w
W
o
rk
s
h
o
p
o
n
E
lec
tr
o
n
ic
a
n
d
Ne
tw
o
rk
i
n
g
T
e
c
h
n
o
lo
g
ies
(
M
W
EN
T
)
,
M
o
sc
o
w
,
p
p
.
1
-
5
,
2
0
1
8
.
[7
]
E.
Kim
a
n
d
C
.
Ke
u
m
,
“
T
r
u
s
tw
o
r
t
h
y
g
a
tew
a
y
s
y
ste
m
p
r
o
v
i
d
in
g
Io
T
tr
u
s
t
d
o
m
a
i
n
o
f
sm
a
rt
h
o
m
e
,
”
2
0
1
7
N
i
n
t
h
In
ter
n
a
ti
o
n
a
l
C
o
n
fer
e
n
c
e
o
n
U
b
i
q
u
i
t
o
u
s
a
n
d
F
u
t
u
r
e
Ne
t
w
o
rk
s
(
ICU
FN)
,
M
i
la
n
,
p
p
.
5
5
1
-
553
,
2017
.
[8
]
S
.
H.
C
h
o
i
,
e
t
a
l
.
,
“
W
ire
les
s
i
n
t
ru
si
o
n
p
r
e
v
e
n
t
i
o
n
sy
ste
m
u
s
i
n
g
d
y
n
a
m
ic
ra
n
d
o
m
f
o
re
s
t
a
g
a
i
n
s
t
w
irele
s
s
M
A
C
sp
o
o
f
i
n
g
a
t
tac
k
,
”
2
0
1
7
I
EE
E
C
o
n
f
e
re
n
c
e
o
n
De
p
e
n
d
a
b
l
e
a
n
d
S
e
c
u
re
C
o
m
p
u
ti
n
g
,
T
a
i
p
e
i
,
p
p
.
1
3
1
-
137
,
2017
.
[9
]
Z.
Q
i
n
,
e
t
a
l
.
,
“
A
S
u
rv
e
y
o
f
P
r
o
x
y
Re
-
E
n
c
ry
p
t
i
o
n
f
o
r
S
e
c
u
re
Da
ta
S
h
a
r
i
n
g
i
n
Cl
o
u
d
C
o
m
p
u
ti
n
g
,
”
IE
E
E
T
r
a
n
s
a
c
ti
o
n
s
o
n
S
e
rv
i
c
e
s
C
o
m
p
u
ti
n
g
,
2016
.
[1
0
]
B.
B
h
u
s
h
a
n
a
n
d
G
.
S
a
h
o
o
,
“
A
c
o
m
p
r
e
h
e
n
siv
e
s
u
rv
e
y
o
f
se
c
u
re
a
n
d
e
n
e
rg
y
e
ff
icie
n
t
ro
u
t
in
g
p
r
o
t
o
c
o
ls
a
n
d
d
a
t
a
c
o
ll
e
c
t
i
o
n
a
p
p
r
o
a
c
h
e
s
i
n
w
ire
les
s
se
n
s
o
r
n
e
tw
o
rk
s
,
”
2
0
1
7
I
n
ter
n
a
t
i
o
n
a
l
C
o
n
f
e
re
n
c
e
o
n
S
i
g
n
a
l
Pr
o
c
e
ss
i
n
g
a
n
d
Co
mm
u
n
ic
a
ti
o
n
(
IC
S
PC
)
,
C
o
im
b
a
to
re
,
p
p
.
2
9
4
-
2
9
9
,
2
0
1
7
.
[1
1
]
J.
M
e
ta
n
a
n
d
K
.
N
.
Na
ra
s
im
h
a
M
u
r
t
h
y
,
“
G
r
o
u
p
Ke
y
M
a
n
a
g
e
m
e
n
t
T
e
c
h
n
i
q
u
e
b
a
se
d
o
n
L
o
g
ic
-
Ke
y
T
re
e
i
n
t
h
e
F
i
e
l
d
o
f
W
i
re
le
ss
S
e
n
so
r
Ne
tw
o
rk
,
”
I
n
t
e
rn
a
ti
o
n
a
l
J
o
u
r
n
a
l
o
f
C
o
m
p
u
ter
A
p
p
l
ic
a
ti
o
n
s
,
v
o
l
/i
s
s
u
e
:
117
(
12
)
,
2
0
1
5
.
[1
2
]
E.
N
u
re
l
lar
i
,
e
t
a
l
.
,
“
A
S
e
c
u
re
O
p
t
im
u
m
Distr
i
b
u
te
d
De
tec
ti
o
n
S
c
h
e
m
e
in
Un
d
e
r
-
A
tt
a
c
k
W
ire
les
s
S
e
n
so
r
Ne
tw
o
rk
s
,
”
IE
EE
T
r
a
n
s
a
c
ti
o
n
s
o
n
S
i
g
n
a
l
a
n
d
In
f
o
rm
a
ti
o
n
P
r
o
c
e
ss
i
n
g
o
v
e
r
Ne
tw
o
rk
s
,
v
o
l
/i
ss
u
e
:
4
(
2
)
,
p
p
.
3
2
5
-
3
3
7
,
2
0
1
8
.
[1
3
]
X.
Ya
n
g
,
e
t
a
l
.
,
“
C
S
I
-
b
a
se
d
l
o
w
-
d
u
ty
-
c
y
c
le w
irel
e
ss
m
u
l
ti
m
e
d
ia se
n
so
r
n
e
tw
o
rk
f
o
r
se
c
u
r
i
ty
m
o
n
it
o
ri
n
g
,
”
E
lec
t
r
o
n
ic
s
L
e
t
ter
s
,
v
o
l
/i
ss
u
e
:
54
(
5
)
,
p
p
.
3
2
3
-
3
2
4
,
2
0
1
8
.
[1
4
]
M
.
M
.
R
a
n
a
,
“
A
tt
a
c
k
Re
s
il
ie
n
t
W
irele
ss
S
e
n
s
o
r
Ne
tw
o
rk
s
f
o
r
S
m
a
rt
E
le
c
t
ri
c
V
e
h
icle
s,
”
IE
EE
S
e
n
s
o
r
s
L
e
t
ter
s
,
v
o
l
/
iss
u
e
:
1
(
2
)
,
p
p
.
1
-
4
,
2
0
1
7
.
[1
5
]
Y.
G
u
a
n
a
n
d
X.
G
e
,
“
D
is
tr
i
b
u
te
d
S
e
c
u
re
Es
t
im
a
ti
o
n
Ov
e
r
W
i
re
le
ss
S
e
n
s
o
r
Ne
tw
o
rk
s
A
g
a
i
n
s
t
Ra
n
d
o
m
M
u
l
t
ic
h
a
n
n
e
l
Ja
m
m
in
g
A
tt
a
c
k
s
,
”
I
EE
E
Ac
c
e
ss
,
v
o
l
.
5
,
p
p
.
1
0
8
5
8
-
1
0
8
7
0
,
2
0
1
7
.
[1
6
]
C.
Y
.
W
e
i,
e
t
a
l
.
,
“
L
o
c
a
l
T
h
r
e
s
h
o
l
d
De
s
ig
n
f
o
r
T
a
rg
e
t
L
o
c
a
li
z
a
t
i
o
n
Us
i
n
g
E
rr
o
r
Co
rre
c
t
i
n
g
C
o
d
e
s
i
n
W
irele
ss
S
e
n
s
o
r
Ne
tw
o
rk
s
i
n
t
h
e
P
re
s
e
n
c
e
o
f
B
y
z
a
n
ti
n
e
A
t
tac
k
s
,
”
I
E
EE
T
r
a
n
s
a
c
ti
o
n
s
o
n
I
n
f
o
r
ma
t
i
o
n
F
o
re
n
sic
s
a
n
d
S
e
c
u
r
it
y
,
v
o
l
/
iss
u
e
:
12
(
7
)
,
p
p
.
1
5
7
1
-
1
5
8
4
,
2
0
1
7
.
[1
7
]
Y.
Z
o
u
a
n
d
G
.
W
a
n
g
,
“
I
n
t
e
rc
e
p
t
Be
h
a
v
i
o
r
A
n
a
ly
sis
o
f
I
n
d
u
s
tr
ia
l
W
ir
e
les
s
S
e
n
s
o
r
Ne
tw
o
rk
s
i
n
t
h
e
P
re
s
e
n
c
e
o
f
Eav
e
s
d
r
o
p
p
i
n
g
A
t
tac
k
,
”
IE
EE
T
r
a
n
s
a
c
ti
o
n
s
o
n
I
n
d
u
s
tri
a
l
I
n
f
o
rm
a
t
ic
s
,
v
o
l
/i
s
su
e
:
12
(
2
)
,
p
p
.
7
8
0
-
7
8
7
,
2
0
1
6
.
[1
8
]
Y.
De
n
g
,
e
t
a
l
.
,
“
P
h
y
s
ica
l
L
a
y
e
r
S
e
c
u
r
it
y
i
n
T
h
re
e
-
T
ier
W
ire
l
e
ss
S
e
n
s
o
r
Ne
tw
o
rk
s
:
A
S
to
c
h
a
sti
c
G
e
o
m
e
try
A
p
p
ro
a
c
h
,
”
I
E
EE
T
r
a
n
s
a
c
ti
o
n
s
o
n
I
n
f
o
rm
a
t
i
o
n
F
o
re
n
sic
s
a
n
d
S
e
c
u
ri
ty
,
v
o
l
/
iss
u
e
:
11
(
6
)
,
p
p
.
1
1
2
8
-
1
1
3
8
,
2
0
1
6
.
[1
9
]
J.
L
i
,
e
t
a
l
.
,
“
S
e
c
u
ri
ty
DV
-
h
o
p
l
o
c
a
li
sa
t
i
o
n
a
lg
o
ri
t
h
m
a
g
a
i
n
s
t
w
o
rm
h
o
le
a
t
tac
k
i
n
w
ire
les
s
se
n
s
o
r
n
e
tw
o
rk
,
”
I
E
T
W
ire
l
e
ss
S
e
n
s
o
r
S
y
s
tem
s
,
v
o
l
/
iss
u
e
:
8
(
2
)
,
p
p
.
6
8
-
7
5
,
2
0
1
8
.
[2
0
]
D.
K
im
a
n
d
S
.
A
n
,
“
P
K
C
-
Ba
se
d
D
o
S
A
t
tac
k
s
-
Re
s
is
ta
n
t
S
c
h
e
m
e
i
n
W
i
re
l
e
ss
S
e
n
s
o
r
Ne
tw
o
rk
s
,
”
I
EE
E
S
e
n
s
o
rs
J
o
u
r
n
a
l
,
v
o
l
/i
ss
u
e
:
16
(
8
)
,
p
p
.
2
2
1
7
-
2
2
1
8
,
2
0
1
6
.
[2
1
]
P
.
G
o
p
e
,
e
t
a
l
.
,
“
Re
s
il
ie
n
c
e
o
f
Do
S
A
tt
a
c
k
s
i
n
De
s
ig
n
i
n
g
A
n
o
n
y
m
o
u
s
Us
e
r
A
u
t
h
e
n
ti
c
a
t
i
o
n
P
r
o
t
o
c
o
l
f
o
r
W
ire
les
s
S
e
n
s
o
r
Ne
tw
o
rk
s,
”
IE
EE
S
e
n
s
o
r
s
J
o
u
r
n
a
l
,
v
o
l
/i
ss
u
e
:
17
(
2
)
,
p
p
.
4
9
8
-
5
0
3
,
2
0
1
7
.
[2
2
]
J.
W
u
,
e
t
a
l
.
,
“
A
Hie
ra
rc
h
ica
l
S
e
c
u
r
i
ty
F
ra
m
e
w
o
rk
f
o
r
De
f
e
n
d
i
n
g
A
g
a
in
s
t
S
o
p
h
is
ti
c
a
te
d
A
tt
a
c
k
s
o
n
W
irele
ss
S
e
n
s
o
r
Ne
tw
o
rk
s
i
n
S
m
a
rt
C
i
ti
e
s,
”
I
E
EE
Acc
e
ss
,
v
o
l
.
4
,
p
p
.
4
1
6
-
4
2
4
,
2
0
1
6
.
[2
3
]
J.
Z
h
a
o
,
“
O
n
Re
s
il
ie
n
c
e
a
n
d
C
o
n
n
e
c
ti
v
it
y
o
f
S
e
c
u
re
W
i
re
le
ss
S
e
n
s
o
r
Ne
tw
o
rk
s
u
n
d
e
r
N
o
d
e
Ca
p
t
u
re
A
tt
a
c
k
s,
”
IE
E
E
T
r
a
n
s
a
c
ti
o
n
s
o
n
I
n
f
o
r
m
a
t
i
o
n
F
o
re
n
s
ics
a
n
d
S
e
c
u
r
i
ty
,
v
o
l
/
iss
u
e
:
12
(
3
)
,
p
p
.
5
5
7
-
5
7
1
,
2
0
1
7
.
[2
4
]
X.
G
o
n
g
,
e
t
a
l
.
,
“
C
o
o
p
e
ra
ti
v
e
se
c
u
r
i
ty
c
o
m
m
u
n
i
c
a
t
i
o
n
s
d
e
sig
n
w
it
h
im
p
e
rf
e
c
t
c
h
a
n
n
e
l
sta
te
i
n
f
o
rm
a
ti
o
n
i
n
w
i
re
l
e
ss
se
n
s
o
r
n
e
tw
o
rk
s
,
”
IE
T
W
ir
e
le
ss
S
e
n
s
o
r
S
y
s
tem
s
,
v
o
l
/i
ss
u
e
:
6
(
2
)
,
p
p
.
3
5
-
4
1
,
2
016.
[2
5
]
J.
Re
n
,
et
al
.
,
“
A
d
a
p
t
iv
e
a
n
d
Ch
a
n
n
e
l
-
A
w
a
re
De
tec
t
i
o
n
o
f
S
e
lec
t
iv
e
F
o
rw
a
rd
i
n
g
A
tt
a
c
k
s
in
W
irel
e
ss
S
e
n
so
r
Ne
tw
o
rk
s,
”
IE
EE
T
r
a
n
s
a
c
ti
o
n
s
o
n
W
ir
e
les
s
C
o
mm
u
n
ic
a
t
i
o
n
s
,
v
o
l
/
is
su
e
:
15
(
5
)
,
p
p
.
3
7
1
8
-
3
7
3
1
,
2
0
1
6
.
[2
6
]
H.
A
l
-
Ha
m
a
d
i
a
n
d
I.
R
.
C
h
e
n
,
“
A
d
a
p
ti
v
e
Ne
tw
o
rk
De
f
e
n
se
M
a
n
a
g
e
m
e
n
t
f
o
r
C
o
u
n
ter
i
n
g
S
m
a
rt
A
tt
a
c
k
a
n
d
S
e
lec
t
iv
e
Ca
p
t
u
re
i
n
W
ire
les
s
S
e
n
s
o
r
Ne
t
w
o
rk
s
,
”
IE
E
E
T
r
a
n
s
a
c
t
i
o
n
s
o
n
Ne
t
wo
rk
a
n
d
S
e
rv
ice
M
a
n
a
g
e
me
n
t
,
v
o
l
/
iss
u
e
:
12
(
3
)
,
p
p
.
4
5
1
-
4
6
6
,
2
0
1
5
.
[2
7
]
S
.
I
.
C
h
u
,
e
t
a
l
.
,
“
A
u
t
h
e
n
t
ica
ti
o
n
P
r
o
t
o
c
o
l
De
s
ig
n
a
n
d
L
o
w
-
C
o
s
t
Ke
y
E
n
c
ry
p
ti
o
n
F
u
n
c
t
i
o
n
Im
p
l
e
m
e
n
ta
ti
o
n
f
o
r
W
irele
ss
S
e
n
so
r
Ne
tw
o
rk
s
,
”
I
EE
E
S
y
s
tem
s
J
o
u
r
n
a
l
,
v
o
l
/i
s
s
u
e
:
11
(
4
)
,
p
p
.
2
7
1
8
-
2
7
2
5
,
2
0
1
7
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8708
I
n
t J
E
lec
&
C
o
m
p
E
n
g
,
Vo
l.
9
,
No
.
4
,
A
u
g
u
s
t
201
9
:
2
6
8
2
-
2690
2690
[2
8
]
C.
T
.
H
s
u
e
h
,
e
t
a
l
.
,
“
A
S
e
c
u
r
e
S
c
h
e
m
e
a
g
a
in
st
P
o
w
e
r
Ex
h
a
u
s
ti
n
g
A
t
tac
k
s
i
n
Hie
ra
rc
h
ica
l
W
i
re
les
s
S
e
n
so
r
Ne
tw
o
rk
s,
”
IE
EE
S
e
n
s
o
rs
J
o
u
r
n
a
l
,
v
o
l
/
iss
u
e
:
15
(
6
)
,
p
p
.
3
5
9
0
-
3
6
0
2
,
2015.
[2
9
]
C.
M
.
P
i
n
t
e
a
,
e
t
a
l
.
,
“
De
n
ia
l
jam
m
in
g
a
tt
a
c
k
s
o
n
w
ire
les
s
se
n
s
o
r
n
e
t
w
o
rk
u
s
i
n
g
se
n
si
ti
v
e
a
g
e
n
ts
,
”
L
o
g
i
c
J
o
u
r
n
a
l
o
f
th
e
IGP
L
,
v
o
l
/
iss
u
e
:
24
(
1
)
,
p
p
.
9
2
-
103,
2016.
[3
0
]
G
.
Ha
n
,
e
t
a
l
.
,
“
I
n
tr
u
si
o
n
De
te
c
t
i
o
n
A
lg
o
r
it
h
m
Ba
s
e
d
o
n
Ne
ig
h
b
o
r
I
n
f
o
rm
a
t
i
o
n
a
g
a
i
n
st
S
i
n
k
h
o
le
A
tt
a
c
k
i
n
W
ire
les
s
S
e
n
s
o
r
Ne
tw
o
rk
s,
”
T
h
e
C
o
m
p
u
ter
J
o
u
r
n
a
l
,
v
o
l
/i
ss
u
e
:
58
(
6
)
,
p
p
.
1
2
8
0
-
1
2
9
2
,
2
0
1
5
.
[3
1
]
R.
S
o
o
sa
h
a
b
i
a
n
d
M
.
N
.
P
o
u
r
,
“
S
c
a
la
b
le
P
H
Y
-
L
a
y
e
r
S
e
c
u
r
i
ty
f
o
r
D
ist
ri
b
u
te
d
De
tec
ti
o
n
i
n
W
irele
ss
S
e
n
s
o
r
Ne
tw
o
rk
s,
”
2
0
1
2
I
EE
E
Ve
h
ic
u
l
a
r
T
e
c
h
n
o
l
o
g
y
C
o
n
fer
e
n
c
e
(
V
T
C
F
a
l
l)
,
Q
u
e
b
e
c
Ci
ty
,
QC
,
p
p
.
1
-
5
,
2012
.
[3
2
]
J
.
M
e
ta
n
a
n
d
K.
N.
N
.
M
u
r
t
h
y
,
“
F
S
DA
:
F
ra
m
e
w
o
rk
f
o
r
S
e
c
u
re
D
a
ta
A
g
g
re
g
a
t
i
o
n
i
n
W
i
re
le
ss
S
e
n
s
o
r
Ne
tw
o
rk
f
o
r
E
n
h
a
n
c
i
n
g
Ke
y
M
a
n
a
g
e
m
e
n
t
,
”
I
n
t
e
r
n
a
t
i
o
n
a
l
J
o
u
r
n
a
l
o
f
El
e
c
tr
ic
a
l
a
n
d
C
o
m
p
u
t
e
r
E
n
g
i
n
e
e
ri
n
g
(
IJ
EC
E)
,
v
ol
/
iss
u
e
:
8
(
6
)
,
p
p
.
4
6
8
4
-
4
6
9
2
,
2
0
1
8
.
[3
3
]
B.
E
.
M
a
n
j
u
n
a
t
h
a
n
d
P
.
V
.
Ra
o
,
“
Ba
la
n
c
i
n
g
T
ra
d
e
o
f
f
b
e
tw
e
e
n
Da
t
a
S
e
c
u
r
it
y
a
n
d
E
n
e
rg
y
M
o
d
e
l
f
o
r
W
irele
ss
S
e
n
s
o
r
Ne
tw
o
rk
,
”
I
n
ter
n
a
t
i
o
n
a
l
J
o
u
r
n
a
l
o
f
E
lec
tr
ic
a
l
a
n
d
C
o
m
p
u
ter
E
n
g
i
n
e
e
r
i
n
g
(
IJ
EC
E)
,
v
ol
/
iss
u
e
:
8
(
2
)
,
p
p
.
1
0
4
8
-
1
0
5
5
,
2018
.
[3
4
]
E
.
F
issa
o
u
i,
e
t
a
l
.
,
“
S
c
a
la
b
i
li
ty
a
w
a
re
e
n
e
rg
y
c
o
n
su
m
p
t
i
o
n
a
n
d
d
i
ss
i
p
a
ti
o
n
m
o
d
e
l
s
f
o
r
w
ire
les
s
s
e
n
s
o
r
n
e
tw
o
rk
s
,”
In
ter
n
a
ti
o
n
a
l
J
o
u
r
n
a
l
o
f
E
lec
tri
c
a
l
a
n
d
C
o
m
p
u
ter
E
n
g
i
n
e
e
r
i
n
g
(
IJ
E
CE)
,
v
ol
/i
ss
u
e
:
7
(
1
)
,
p
p
.
4
2
4
-
4
3
1
,
2
0
1
7
.
[3
5
]
D.
T
a
n
g
,
e
t
a
l
.
,
“
C
o
st
-
a
w
a
re
se
c
u
re
r
o
u
t
i
n
g
(
CA
S
E
R)
p
ro
t
o
c
o
l
d
e
s
i
g
n
f
o
r
w
i
re
le
ss
se
n
s
o
r
n
e
tw
o
rk
s
,”
IE
EE
T
r
a
n
s
.
P
a
r
a
l
le
l
D
is
tr
i
b
.
S
y
s
t.
,
v
o
l
.
26,
p
p
.
9
6
0
-
973
,
2013
.
[3
6
]
S.
R
o
y
a
n
d
A
.
K.
Da
s
,
“
S
e
c
u
re
h
i
e
ra
rc
h
ica
l
r
o
u
t
i
n
g
p
r
o
t
o
c
o
l
(S
HR
P
)
f
o
r
w
irele
ss
se
n
s
o
r
n
e
tw
o
rk
,”
i
n
J
.
L
.
M
a
u
r
i
,
e
t
al
.
,
(e
d
s
.
)
,
S
S
CC
2
0
1
4
.
C
CI
S
,
v
o
l
.
4
6
7
,
p
p
.
2
0
-
29
,
2
0
1
4
.
B
I
O
G
RAP
H
I
E
S
O
F
AUTH
O
RS
J
y
o
ti
M
e
ta
n
h
a
s
r
e
c
e
i
v
e
d
B.
E.
fro
m
P
u
n
e
Un
iv
e
rsity
,
P
u
n
e
,
In
d
i
a
in
2
0
0
2
a
n
d
M
.
T
e
c
h
f
ro
m
V
T
U,
Ba
n
g
a
lo
re
,
In
d
ia
in
2
0
0
9
.
S
h
e
jo
i
n
e
d
De
p
a
rtm
e
n
t
o
f
Co
m
p
u
ter
S
c
ien
c
e
&
En
g
in
e
e
rin
g
,
A
CS
Co
ll
e
g
e
o
f
En
g
in
e
e
rin
g
Ba
n
g
a
lo
re
a
s
A
ss
istan
t
P
ro
f
e
ss
o
r
sin
c
e
2
0
1
2
.
He
r
re
se
a
rc
h
in
tere
st
in
c
lu
d
e
s
Cry
p
to
g
ra
p
h
y
,
W
irele
ss
S
e
n
so
r
Ne
tw
o
rk
s
a
n
d
S
e
c
u
rit
y
.
S
h
e
is
a
L
ife
M
e
m
b
e
r
o
f
th
e
In
d
ian
S
o
c
iety
f
o
r
T
e
c
h
n
ica
l
Ed
u
c
a
ti
o
n
(IS
T
E).
K
.
N
.
Na
r
a
sh
in
h
a
M
u
r
th
y
re
c
e
iv
e
d
h
is
P
h
D
f
ro
m
A
n
a
a
Un
iv
e
r
sity
,
Ch
e
n
n
a
i,
In
d
ia
in
2
0
1
3
.
His
re
se
a
rc
h
a
re
a
in
c
lu
d
e
s
Im
a
g
e
p
ro
c
e
ss
in
g
,
W
irele
ss
S
e
n
so
r
Ne
tw
o
rk
,
S
e
c
u
rit
y
a
n
d
Ke
y
M
a
n
a
g
m
e
n
e
t.
A
t
p
re
se
n
t
h
e
is
w
o
rk
in
g
a
s
a
P
ro
f
e
ss
o
r
in
th
e
d
e
p
a
rtm
e
n
t
o
f
f
a
c
u
lt
y
o
f
e
n
g
in
e
e
rin
g
,
Ch
rist
U
n
iv
e
rsity
,
B
a
n
a
g
lo
re
,
In
d
ia.
He
is
h
a
v
in
g
m
o
re
th
a
n
1
7
y
e
a
rs
o
f
tea
c
h
in
g
e
x
p
e
rien
c
e
.
Evaluation Warning : The document was created with Spire.PDF for Python.