I
nte
rna
t
io
na
l J
o
urna
l o
f
E
lect
rica
l a
nd
Co
m
p
ute
r
E
ng
in
ee
ring
(
I
J
E
CE
)
Vo
l.
10
,
No
.
5
,
Octo
b
er
2
0
2
0
,
p
p
.
5
4
0
9
~
5
4
1
9
I
SS
N:
2
0
8
8
-
8708
,
DOI
: 1
0
.
1
1
5
9
1
/
i
j
ec
e
.
v
1
0
i
5
.
pp
5
4
0
9
-
5
4
1
9
5409
J
o
ur
na
l ho
m
ep
a
g
e
:
h
ttp
:
//ij
ec
e.
ia
esco
r
e.
co
m/in
d
ex
.
p
h
p
/I
JE
C
E
A surv
ey
on secu
r
ity a
nd priva
cy
is
sues
in
Io
V
T
a
nv
i G
a
rg
1
,
Na
v
id K
a
g
a
l
wa
lla
2
,
P
ra
t
ha
m
e
s
h Ch
uri
3
,
Am
b
i
k
a
P
a
w
a
r
4
,
Sa
nja
y
Deshm
u
kh
5
1
,
2,
3,
5
De
p
a
rtm
e
n
t
o
f
Co
m
p
u
ter E
n
g
in
e
e
rin
g
,
M
u
k
e
sh
P
a
tel
S
c
h
o
o
l
o
f
T
e
c
h
n
o
lo
g
y
M
a
n
a
g
e
m
e
n
t
a
n
d
E
n
g
in
e
e
rin
g
,
NMIM
S
Un
iv
e
rsity
,
In
d
ia
3,
4
De
p
a
rtm
e
n
t
o
f
Co
m
p
u
ter E
n
g
in
e
e
rin
g
,
S
y
m
b
io
sis In
stit
u
te
o
f
T
e
c
h
n
o
lo
g
y
,
In
d
ia
Art
icle
I
nfo
AB
ST
RAC
T
A
r
ticle
his
to
r
y:
R
ec
eiv
ed
Dec
23
,
2
0
1
9
R
ev
i
s
ed
A
p
r
17
,
2
0
2
0
A
cc
ep
ted
A
p
r
28
,
2
0
2
0
A
s
a
n
u
p
-
a
n
d
-
c
o
m
in
g
b
ra
n
c
h
o
f
th
e
I
n
tern
e
t
o
f
th
in
g
s
,
i
n
tern
e
t
o
f
v
e
h
icle
s
(Io
V
)
is
im
a
g
in
e
d
to
f
il
l
in
a
s
a
f
u
n
d
a
m
e
n
tal
in
f
o
rm
a
ti
o
n
d
e
t
e
c
ti
n
g
a
n
d
p
ro
c
e
ss
in
g
p
latf
o
rm
f
o
r
a
stu
te
t
ra
n
sp
o
rtati
o
n
f
ra
m
e
w
o
rk
s.
T
o
d
a
y
,
v
e
h
icle
s
a
re
p
ro
g
re
ss
iv
e
l
y
b
e
in
g
a
s
so
c
iate
d
w
it
h
th
e
In
tern
e
t
o
f
T
h
in
g
s
w
h
ich
e
m
p
o
w
e
r
th
e
m
to
g
i
v
e
p
e
rv
a
siv
e
a
c
c
e
s
s
to
d
a
ta
to
d
riv
e
rs
a
n
d
trav
e
lers
w
h
il
e
m
o
v
in
g
.
Be
th
a
t
a
s
it
m
a
y
,
a
s
th
e
q
u
a
n
t
it
y
o
f
a
ss
o
c
iate
d
v
e
h
icle
s
c
o
n
ti
n
u
e
s
e
x
p
a
n
d
in
g
,
n
e
w
p
re
re
q
u
isit
e
s,
(
f
o
r
e
x
a
m
p
le,
c
o
n
siste
n
t,
se
c
u
re
,
v
ig
o
ro
u
s,
v
e
rsa
ti
le
d
a
ta
trad
e
a
m
o
n
g
v
e
h
icl
e
s,
p
e
o
p
le,
a
n
d
sid
e
o
f
th
e
r
o
a
d
f
ra
m
e
w
o
rk
s)
o
f
v
e
h
icu
lar
s
y
ste
m
s
a
re
d
e
v
e
lo
p
i
n
g
.
Rig
h
t
n
o
w
,
th
e
u
n
iq
u
e
id
e
a
o
f
v
e
h
icu
lar
sp
e
c
ially
a
p
p
o
in
te
d
sy
ste
m
s
is
b
e
in
g
c
h
a
n
g
e
d
in
t
o
a
n
o
th
e
r
id
e
a
c
a
ll
e
d
th
e
i
n
tern
e
t
o
f
v
e
h
icle
s
(Io
V
)
.
W
e
talk
a
b
o
u
t
t
h
e
issu
e
s
f
a
c
e
d
in
im
p
le
m
e
n
ti
n
g
a
se
c
u
re
Io
V
a
rc
h
i
te
c
tu
re
.
W
e
e
x
a
m
in
e
th
e
v
a
rio
u
s
c
h
a
ll
e
n
g
e
s
in
im
p
le
m
e
n
ti
n
g
se
c
u
rit
y
a
n
d
p
ri
v
a
c
y
in
Io
V
b
y
re
v
i
e
w
in
g
p
a
st
p
a
p
e
rs
a
lo
n
g
w
it
h
p
o
in
ti
n
g
o
u
t
re
se
a
rc
h
g
a
p
s
a
n
d
p
o
ss
i
b
le
f
u
tu
re
w
o
rk
a
n
d
p
u
tt
in
g
f
o
rth
o
u
r
o
n
in
f
e
re
n
c
e
s rela
ti
n
g
to
e
a
c
h
p
a
p
e
r.
K
ey
w
o
r
d
s
:
Au
t
h
en
t
icatio
n
I
n
ter
n
et
o
f
v
e
h
icles
P
r
iv
ac
y
Secu
r
it
y
Co
p
y
rig
h
t
©
2
0
2
0
In
stit
u
te o
f
A
d
v
a
n
c
e
d
E
n
g
i
n
e
e
rin
g
a
n
d
S
c
ien
c
e
.
Al
l
rig
h
ts re
se
rv
e
d
.
C
o
r
r
e
s
p
o
nd
ing
A
uth
o
r
:
T
an
v
i G
ar
g
,
Dep
ar
t
m
en
t o
f
C
o
m
p
u
ter
E
n
g
i
n
ee
r
in
g
,
SVKM
’
s
NM
I
MS
M
u
k
es
h
P
atel
Sch
o
o
l o
f
T
ec
h
n
o
lo
g
y
Ma
n
ag
e
m
e
n
t a
n
d
E
n
g
in
ee
r
i
n
g
,
Vile
P
ar
le,
Mu
m
b
ai,
I
n
d
ia.
E
m
ail:
g
ar
g
9
9
2
5
@
g
m
ail.
co
m
1.
I
NT
RO
D
UCT
I
O
N
I
n
to
d
a
y
’
s
d
a
y
a
n
d
ag
e,
tr
a
n
s
p
o
r
tatio
n
in
m
an
y
co
u
n
tr
ies
i
s
b
ein
g
in
cr
ea
s
in
g
l
y
s
tr
ain
ed
d
u
e
to
an
in
cr
ea
s
i
n
g
n
u
m
b
er
o
f
p
eo
p
le.
I
n
m
an
y
ca
s
es,
t
h
e
tr
a
n
s
p
o
r
tatio
n
s
y
s
te
m
i
s
o
b
s
o
lete,
to
o
co
s
tl
y
to
u
p
g
r
ad
e
a
n
d
ch
an
g
i
n
g
it
w
o
u
ld
p
r
o
v
e
to
b
e
to
o
m
a
m
m
o
t
h
a
ta
s
k
.
An
o
n
g
o
in
g
r
ep
o
r
t
n
o
ticed
th
at
th
e
q
u
an
tit
y
o
f
v
e
h
icle
s
(
tr
av
eller
an
d
b
u
s
i
n
ess
)
u
tili
ze
d
o
v
er
all
is
s
o
m
e
w
h
a
t
h
i
g
h
er
t
h
an
o
n
e
b
illi
o
n
[
1
]
an
d
is
r
elie
d
u
p
o
n
to
ar
r
iv
e
at
t
w
o
b
illi
o
n
b
y
2
0
3
5
[
2
]
.
T
h
e
g
ig
a
n
tic
d
e
v
elo
p
m
e
n
t
i
n
th
e
n
u
m
b
er
o
f
v
e
h
icles
ca
u
s
e
s
an
i
n
cr
e
m
e
n
t
i
n
v
e
h
icl
e
b
lo
ck
ag
e
o
n
s
tr
ee
t
s
,
ex
p
a
n
d
ed
f
atali
ties
a
n
d
m
is
h
a
p
s
[
3
]
,
an
d
ex
p
an
d
ed
co
n
ta
m
in
a
tio
n
le
v
el
s
.
Hen
ce
co
n
s
id
er
ab
le
ch
an
g
es
i
n
t
h
e
tr
an
s
p
o
r
tatio
n
f
r
a
m
e
w
o
r
k
to
ad
ap
t
to
r
is
in
g
p
r
er
eq
u
is
it
es
o
f
n
e
w
v
e
h
icle
s
,
tr
av
eller
s
,
a
n
d
d
r
iv
er
s
is
a
p
u
r
p
o
s
e.
W
ith
n
e
w
id
ea
l
m
o
d
els,
f
o
r
ex
a
m
p
le,
t
h
e
i
n
ter
n
e
t
o
f
th
i
n
g
s
(
I
o
T
)
,
d
is
tr
ib
u
ted
co
m
p
u
ti
n
g
,
an
d
o
n
g
o
i
n
g
ad
v
a
n
ce
s
i
n
f
i
g
u
r
i
n
g
a
n
d
s
y
s
te
m
s
ad
m
i
n
is
tr
ati
o
n
ad
v
an
ce
s
h
av
e
p
r
o
m
p
ted
th
e
i
m
p
r
o
v
e
m
e
n
t
o
f
a
w
id
e
s
co
p
e
o
f
k
ee
n
g
ad
g
et
s
f
r
eq
u
e
n
tl
y
f
u
r
n
i
s
h
ed
w
i
th
i
m
p
lan
ted
p
r
o
ce
s
s
o
r
s
an
d
r
e
m
o
te
co
r
r
esp
o
n
d
en
ce
ad
v
an
ce
s
.
T
h
ese
s
av
v
y
g
ad
g
ets
ar
e
b
ein
g
co
n
v
e
y
ed
to
g
i
v
e
a
p
r
o
tecte
d
an
d
in
cr
ea
s
i
n
g
l
y
r
ea
s
o
n
ab
le
co
n
d
i
tio
n
t
h
r
o
u
g
h
th
e
ir
i
n
ter
co
n
n
ec
tio
n
a
n
d
i
n
ter
o
p
er
ab
ilit
y
,
m
ak
in
g
a
n
o
th
er
id
ea
o
f
I
o
T
.
A
ls
o
,
as
r
ap
id
v
er
s
atile
I
n
ter
n
et
g
et
to
tu
r
n
s
o
u
t
to
b
e
p
r
o
g
r
ess
iv
el
y
m
o
d
er
ate
an
d
p
er
v
asiv
e
,
p
h
y
s
ical
b
o
u
n
d
ar
ies,
f
o
r
ex
am
p
le,
s
ep
ar
atio
n
b
ec
o
m
es
a
n
o
n
-
s
u
b
s
ta
n
ce
an
d
o
p
en
d
o
o
r
s
f
o
r
n
e
w
ite
m
s
a
n
d
ad
m
in
i
s
tr
atio
n
s
f
o
r
s
o
ciet
y
d
ev
elo
p
at
a
q
u
ick
er
r
ate,
p
r
o
m
p
t
in
g
b
etter
w
a
y
s
o
f
l
if
e.
Fe
w
o
f
t
h
ese
tec
h
n
o
lo
g
ical
ad
v
an
ce
m
e
n
ts
h
a
v
e
f
u
r
t
h
er
led
f
o
r
th
e
m
o
r
e
co
m
p
lex
b
u
t
ef
f
ic
i
en
t
b
r
an
c
h
in
t
h
e
d
ep
ar
t
m
en
t
o
f
tr
an
s
p
o
r
tatio
n
a
n
d
t
h
at
i
s
t
h
e
I
n
ter
n
et
o
f
Ve
h
icle
s
.
I
o
V
r
eq
u
ir
es
s
o
f
t
w
ar
e
to
tr
ac
k
s
it
s
m
o
v
e
m
e
n
t
an
d
s
a
f
e
g
u
ar
d
it
s
n
et
w
o
r
k
f
r
o
m
m
al
icio
u
s
attac
k
s
.
I
o
V
ex
h
ib
it
s
el
f
-
d
r
iv
i
n
g
,
s
af
et
y
d
r
i
v
i
n
g
,
s
o
cial
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8708
I
n
t J
E
lec
&
C
o
m
p
E
n
g
,
Vo
l.
10
,
No
.
5
,
Octo
b
e
r
2
0
2
0
:
5
4
0
9
-
5419
5410
d
r
iv
in
g
,
m
o
b
ile
ap
p
licatio
n
s
an
d
elec
tr
ic
v
e
h
icle
s
.
T
h
e
w
h
o
le
s
y
s
te
m
co
-
o
r
d
in
at
es
an
d
m
ai
n
tai
n
s
co
m
m
u
n
icatio
n
b
et
w
ee
n
v
e
h
ic
le,
r
o
ad
s
,
r
o
ad
s
id
e
u
n
it
s
,
s
e
n
s
o
r
s
,
h
u
m
a
n
s
all
b
ei
n
g
t
h
e
p
ar
t
o
f
t
h
e
n
et
w
o
r
k
[
4
]
.
I
o
V
s
y
n
c
h
r
o
n
ize
s
t
w
o
h
ig
h
-
te
ch
d
r
ea
m
s
:
1
)
v
eh
icle
'
s
n
et
w
o
r
k
in
g
a
n
d
2
)
v
eh
icle
's
i
n
telli
g
e
n
ce
[
5
]
an
d
ce
n
tr
es
ar
o
u
n
d
t
h
e
r
ec
o
n
ciliat
io
n
o
f
o
b
j
ec
ts
,
f
o
r
ex
a
m
p
le,
p
eo
p
le,
v
eh
icles,
th
i
n
g
s
,
s
y
s
te
m
s
,
a
n
d
s
itu
atio
n
s
to
m
a
k
e
a
n
astu
te
s
y
s
te
m
d
ep
en
d
e
n
t
o
n
c
o
m
p
u
ti
n
g
a
n
d
co
m
m
u
n
ica
tio
n
ab
ilit
ies
t
h
at
aid
s
ad
m
i
n
i
s
tr
at
io
n
s
,
(
f
o
r
ex
a
m
p
le,
w
o
r
ld
w
id
e
tr
af
f
ic
p
r
o
d
u
cti
v
i
t
y
a
n
d
th
e
e
x
ec
u
ti
v
es
ad
m
i
n
is
tr
atio
n
d
ep
en
d
en
t
o
n
co
n
ta
m
i
n
atio
n
lev
e
ls
,
s
tr
ee
t
co
n
d
itio
n
s
,
clo
g
tr
af
f
ic
lev
el,
o
r
v
eh
icu
lar
s
ec
u
r
it
y
ad
m
i
n
is
tr
atio
n
s
)
f
o
r
en
o
r
m
o
u
s
u
r
b
an
ar
ea
s
o
r
ev
en
an
en
tire
n
atio
n
.
B
y
u
tili
z
in
g
cle
v
er
f
r
a
m
e
w
o
r
k
s
o
n
v
e
h
icles
a
n
d
d
iv
er
s
e
d
i
g
ital
p
h
y
s
ical
f
r
a
m
e
w
o
r
k
s
,
(
f
o
r
ex
a
m
p
le,
s
en
s
o
r
s
,
v
e
h
icle
s
,
an
d
ce
l
l
p
h
o
n
es)
i
n
u
r
b
an
co
m
m
u
n
ities
w
e
ca
n
b
u
ild
u
p
a
w
o
r
ld
w
id
e
s
y
s
te
m
t
h
at
o
f
f
er
s
v
ar
io
u
s
t
y
p
es
o
f
as
s
is
ta
n
ce
to
v
eh
icle
s
an
d
th
e
p
eo
p
le
r
elate
d
w
it
h
th
e
m
.
I
o
V
lik
e
w
i
s
e
allu
d
es
to
v
e
h
icles,
p
eo
p
le,
s
eg
m
en
t
s
o
f
th
e
tr
an
s
p
o
r
tatio
n
f
r
a
m
e
w
o
r
k
,
an
d
a
lo
t
o
f
g
ad
g
ets
ap
p
o
r
tio
n
ed
in
n
atu
r
e,
ass
o
ciate
d
th
r
o
u
g
h
a
n
all
i
n
ter
n
et
p
r
o
v
i
d
er
-
b
ase
d
f
o
u
n
d
atio
n
,
th
at
tr
ad
es
d
ata
s
tr
aig
h
tf
o
r
w
ar
d
l
y
o
r
b
y
i
m
p
licatio
n
to
co
n
tr
ib
u
te
to
w
ar
d
a
p
r
o
g
r
ess
iv
el
y
ef
f
ec
ti
v
e,
m
o
r
e
s
ec
u
r
e,
an
d
g
r
ee
n
er
u
n
i
v
er
s
e
o
f
tr
an
s
p
o
r
tatio
n
[
6
].
T
h
e
f
u
n
d
a
m
en
tal
co
n
tr
ib
u
tio
n
s
o
f
th
is
p
ap
er
in
co
r
p
o
r
ate:
f
ir
s
t,
a
r
ev
ie
w
o
f
t
h
e
v
ar
i
o
u
s
p
r
o
to
co
ls
,
alg
o
r
ith
m
s
u
s
ed
b
y
alr
ea
d
y
p
u
b
lis
h
ed
p
ap
er
s
to
h
elp
s
ec
u
r
e
I
o
V
alo
n
g
w
it
h
t
h
e
r
esear
ch
g
a
p
s
,
f
u
t
u
r
e
w
o
r
k
an
d
in
f
er
en
ce
s
o
f
ea
c
h
p
ap
er
;
s
ec
o
n
d
an
al
y
s
is
o
f
v
ar
io
u
s
p
ap
er
s
th
at
ca
n
tac
k
le
m
o
s
t
o
f
th
e
ch
allen
g
es
p
r
ese
n
t
i
n
th
e
s
ec
u
r
it
y
a
n
d
p
r
iv
a
c
y
o
f
I
o
V
b
y
co
n
s
tr
u
cti
n
g
a
n
i
n
-
d
ep
th
tab
le;
f
i
n
all
y
,
w
e
d
is
c
u
s
s
o
u
r
s
o
l
u
tio
n
an
d
in
f
er
en
ce
s
to
ac
co
m
p
li
s
h
a
v
er
s
atile,
s
tr
o
n
g
,
s
ec
u
r
e,
an
d
co
m
p
letel
y
o
p
er
atio
n
al
I
o
V
co
n
d
itio
n
.
2.
L
I
T
E
R
AT
U
RE
R
E
VI
E
W
I
n
[
7
]
,
th
e
au
th
o
r
h
as
s
tated
th
at
an
au
to
n
o
m
o
u
s
v
eh
ic
le
u
n
it
(
A
UV)
m
u
s
t
h
a
v
e
s
ec
u
r
it
y
r
e
q
u
ir
e
m
e
n
ts
s
u
c
h
as
p
r
iv
ac
y
,
co
n
f
id
en
tia
lit
y
,
i
n
teg
r
it
y
,
d
is
tr
ib
u
ted
d
en
ial
o
f
s
er
v
ice
(
DDo
S)
p
r
o
tectio
n
an
d
au
t
h
e
n
ticatio
n
.
A
ttac
k
s
w
h
ich
d
is
ab
le
t
h
e
s
tee
r
in
g
o
r
b
r
ak
e
s
y
s
te
m
o
f
a
v
e
h
i
cle
ar
e
m
o
r
e
m
alicio
u
s
o
n
AU
Vs
th
a
n
o
n
n
o
r
m
al
ca
r
s
s
i
n
ce
th
er
e
is
n
o
d
r
iv
er
t
o
u
s
e
h
is
/
h
er
i
n
t
u
itio
n
to
m
in
i
m
ize
d
a
m
ag
e.
T
h
u
s
s
tan
d
ar
d
s
m
u
s
t
b
e
d
e
f
in
ed
to
p
r
o
tect
A
UVs
f
r
o
m
b
o
th
i
n
te
r
n
al
an
d
ex
ter
n
al
attac
k
s
.
M
u
ltif
ac
to
r
au
t
h
e
n
ticatio
n
f
ac
to
r
ca
n
b
e
o
n
e
w
a
y
to
p
r
o
tect
an
AUV
s
i
n
ce
it
d
i
s
ti
n
g
u
i
s
h
es
b
et
w
ee
n
d
ata
r
ea
d
in
g
an
d
s
y
s
te
m
co
n
tr
o
l
w
i
th
p
r
io
r
it
y
g
iv
e
n
to
s
y
s
te
m
co
n
tr
o
l.
I
n
th
i
s
s
c
h
e
m
e,
to
o
b
tain
d
ata
to
r
ea
d
r
eq
u
ir
es
o
n
l
y
o
n
e
cr
ed
en
tial
f
ac
to
r
b
u
t
to
ac
ce
s
s
s
y
s
te
m
co
n
tr
o
l
an
d
v
e
h
icle
o
n
b
o
ar
d
eq
u
ip
m
e
n
t r
eq
u
ir
e
s
a
u
th
o
r
izatio
n
f
r
o
m
m
u
ltip
le
a
u
t
h
o
r
ities
.
An
AUV
s
h
o
u
ld
also
b
e
ab
l
e
to
p
r
io
r
itize
ac
tiv
ities
an
d
ac
ti
o
n
s
d
ep
en
d
in
g
s
it
u
atio
n
s
.
I
n
[
8
]
,
ad
ap
tiv
e
p
r
iv
ac
y
i
s
i
m
p
le
m
e
n
ted
w
h
er
ei
n
t
h
e
p
r
iv
ac
y
m
o
d
el
is
c
h
o
s
en
b
y
t
h
e
u
s
er
wh
ich
h
elp
s
to
p
r
ev
en
t
d
ata
b
r
ea
ch
in
g
a
n
d
m
an
ip
u
latio
n
f
r
o
m
u
n
au
t
h
o
r
iz
ed
u
s
er
.
T
h
is
p
ap
er
d
is
cu
s
s
e
s
lettin
g
u
s
er
s
ch
o
o
s
e
th
eir
d
eg
r
ee
o
f
p
r
iv
ac
y
an
d
f
i
n
d
a
b
alan
ce
b
et
w
ee
n
r
eso
u
r
ce
u
s
a
g
e
a
n
d
p
r
iv
ac
y
p
r
o
to
co
l.
T
h
e
p
r
o
p
o
s
ed
ar
ch
itect
u
r
e
is
:
-
T
h
e
r
atio
n
ale
f
o
r
A
d
ap
tatio
n
:
T
h
is
w
o
r
k
s
o
n
th
e
p
r
iv
ac
y
r
e
q
u
ir
e
m
e
n
ts
a
n
d
r
ed
u
cin
g
co
m
m
u
n
icat
io
n
an
d
co
m
p
u
tatio
n
al
o
v
er
h
ea
d
s
-
An
o
n
y
m
o
u
s
a
u
t
h
e
n
ticatio
n
:
th
is
v
er
i
f
ies
w
h
et
h
er
th
e
u
s
er
i
s
a
v
alid
m
e
m
b
er
o
f
t
h
e
g
r
o
u
p
an
d
th
e
n
ev
er
y
m
e
m
b
er
is
tr
ea
ted
t
h
e
s
a
m
e
-
P
r
o
b
ab
ilis
tic
v
er
if
ica
tio
n
:
i
n
a
co
m
m
o
n
s
e
t
th
e
p
r
iv
ac
y
d
e
g
r
ee
an
d
co
m
p
u
tatio
n
al
o
v
er
h
ea
d
is
ca
lcu
lated
w
it
h
a
p
r
o
b
ab
ilit
y
m
et
h
o
d
-
Gr
o
u
p
m
a
n
ag
e
m
e
n
t:
th
i
s
m
et
h
o
d
w
o
r
k
s
o
n
g
r
o
u
p
s
as
u
s
er
s
ar
e
ch
ar
ac
ter
i
s
ed
in
g
r
o
u
p
s
th
er
e
f
o
r
e
h
er
e
th
e
k
e
y
s
,
i
n
f
o
r
m
atio
n
an
d
g
r
o
u
p
in
g
ar
e
tak
e
n
ca
r
e
o
f
.
I
n
[
9
]
,
th
e
p
ap
e
r
d
is
cu
s
s
es
v
ar
io
u
s
p
r
iv
ac
y
a
n
d
s
ec
u
r
it
y
attac
k
s
as
w
el
l
as
th
e
co
u
n
t
er
m
ea
s
u
r
e
s
r
eq
u
ir
ed
.
I
t
d
r
aw
s
atten
tio
n
to
au
th
e
n
ticatio
n
attac
k
s
w
h
i
ch
in
cl
u
d
e
S
y
b
il
attac
k
,
Ma
s
q
u
er
ad
in
g
attac
k
,
GP
S
d
ec
ep
tio
n
,
W
o
r
m
h
o
le
attac
k
;
s
ec
r
ec
y
attac
k
s
,
av
a
ilab
il
i
t
y
attac
k
s
,
r
o
u
ti
n
g
attac
k
s
a
n
d
d
ata
au
th
en
tici
t
y
attac
k
s
.
T
h
e
s
ec
u
r
it
y
r
eq
u
ir
e
m
en
ts
o
f
a
s
ec
u
r
e
I
o
V
ar
ch
it
ec
tu
r
e
m
u
s
t
i
n
cl
u
d
e
av
ailab
ili
t
y
,
h
ig
h
m
o
b
ilit
y
o
f
I
o
V
en
titi
es,
lo
w
er
r
o
r
s
to
ler
an
ce
,
k
e
y
d
i
s
tr
ib
u
tio
n
m
a
n
a
g
e
m
en
t a
n
d
p
r
iv
ate
r
o
u
ti
n
g
o
f
d
ata.
T
h
e
co
u
n
ter
m
ea
s
u
r
es to
t
h
ese
attac
k
s
i
n
cl
u
d
e:
-
T
h
r
ea
t
m
o
d
elli
n
g
:
P
etr
i
n
et
m
o
d
ellin
g
ca
n
b
e
u
s
ed
in
v
eh
ic
u
lar
au
t
h
e
n
ticatio
n
,
m
o
d
ellin
g
an
d
co
n
tr
o
l
o
f
co
m
p
le
x
v
e
h
ic
u
lar
n
et
w
o
r
k
s
.
Ma
th
e
m
at
ical
an
d
Gr
ap
h
-
b
a
s
ed
ap
p
r
o
ac
h
es
ca
n
also
b
e
u
s
ed
to
m
o
d
el
n
et
w
o
r
k
a
n
d
in
t
e
g
r
it
y
at
tack
s
.
-
I
n
tr
u
s
io
n
d
etec
tio
n
s
y
s
te
m
:
p
r
o
tects
ag
ai
n
s
t
o
u
ts
id
e
as
s
au
lts
b
y
g
at
h
er
in
g
a
n
d
d
is
s
ec
ti
n
g
d
a
ta
f
r
o
m
i
n
ter
io
r
s
y
s
te
m
f
r
a
m
e
w
o
r
k
s
to
c
h
ec
k
i
f
th
er
e
ex
is
t in
f
r
i
n
g
e
m
e
n
t a
g
a
in
s
t th
e
s
ec
u
r
it
y
ap
p
r
o
ac
h
.
-
Ho
n
e
y
p
o
t:
T
h
e
s
y
s
te
m
ca
n
i
n
clu
d
e
s
tr
ate
g
ie
s
t
o
p
u
r
p
o
s
ely
e
n
g
ag
e
a
n
d
d
ec
eiv
e
h
ac
k
e
r
s
an
d
id
en
ti
f
y
m
alicio
u
s
ac
ti
v
itie
s
in
t
h
e
I
o
V
ar
ch
itectu
r
e.
I
n
[
1
0
]
,
th
e
p
ap
e
r
talk
s
ab
o
u
t
v
eh
ic
u
lar
f
o
g
,
w
h
ich
i
s
lik
e
th
e
I
n
ter
n
e
t
clo
u
d
f
o
r
v
e
h
icl
es
w
h
ic
h
p
r
o
v
id
e
s
er
v
ices
to
a
u
to
n
o
m
o
u
s
ca
r
s
.
T
h
e
co
m
m
o
n
s
ec
u
r
it
y
r
eq
u
ir
e
m
e
n
t
s
w
h
ic
h
m
u
s
t
b
e
p
r
esen
t
i
n
clu
d
e
co
n
f
id
e
n
tialit
y
,
i
n
te
g
r
it
y
,
p
r
iv
ac
y
,
an
d
a
u
t
h
e
n
ticatio
n
.
P
h
y
s
ical
attac
k
s
,
lik
e
d
is
ab
li
n
g
a
b
r
ak
e
o
r
s
teer
i
n
g
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
t J
E
lec
&
C
o
m
p
E
n
g
I
SS
N:
2
0
8
8
-
8708
A
s
u
r
ve
y
o
n
s
ec
u
r
ity
a
n
d
p
r
iva
cy
is
s
u
es in
I
o
V
(
Ta
n
vi
Ga
r
g
)
5411
s
y
s
te
m
p
o
s
e
g
r
a
v
e
t
h
r
ea
ts
in
I
o
V.
T
o
av
er
t
m
is
h
ap
s
,
ac
ce
s
s
to
o
n
b
o
ar
d
u
n
it
s
(
OB
Us)
a
n
d
C
A
N
b
u
s
m
u
s
t
b
e
all
o
w
ed
u
s
in
g
ac
ce
s
s
co
n
tr
o
l
m
ec
h
a
n
is
m
s
.
A
s
i
m
p
le
p
ass
w
o
r
d
an
d
id
ar
e
n
o
t
a
s
ec
u
r
e
m
ea
n
s
o
f
allo
w
i
n
g
ac
ce
s
s
to
t
h
e
OB
U
s
.
Do
S
at
tack
s
m
u
s
t
also
b
e
ta
k
e
n
i
n
t
o
co
n
s
id
er
atio
n
w
h
ile
d
e
s
ig
n
in
g
t
h
e
v
e
h
ic
u
lar
n
et
w
o
r
k
.
R
ad
io
Fre
q
u
e
n
c
y
J
am
m
in
g
ca
n
also
p
o
s
e
a
th
r
ea
t
s
i
n
ce
i
t
ca
n
cr
ea
te
lar
g
e
co
m
m
u
n
icatio
n
b
lin
d
ar
ea
s
in
w
h
ic
h
m
ess
a
g
e
s
ca
n
n
o
t
b
e
s
en
t.
T
h
is
co
u
ld
lead
to
ce
r
tain
w
ar
n
in
g
m
e
s
s
a
g
es
n
ev
er
r
ea
ch
in
g
t
h
eir
in
te
n
d
ed
tar
g
et.
I
n
[
1
1
]
,
th
e
p
ap
er
d
is
cu
s
s
es
e
n
e
m
y
en
d
ea
v
o
u
r
s
to
u
tili
ze
d
ata
to
b
u
ild
u
p
th
e
m
ap
p
in
g
co
n
n
ec
tio
n
a
m
o
n
g
n
o
m
p
s
e
u
d
o
n
y
m
v
ir
t
u
al
m
ac
h
i
n
e
(
VM
)
ch
ar
ac
ter
s
b
y
co
o
r
d
in
ati
n
g
a
s
i
m
ilar
ex
p
licit
ar
ea
d
ata,
w
h
ic
h
r
aises
g
e
n
u
in
e
w
o
r
r
ies
ab
o
u
t
ar
ea
p
r
o
tectio
n
.
T
h
e
l
o
ca
tio
n
-
b
ased
s
er
v
ice
(
L
B
S)
s
u
p
p
lier
s
g
et
VM
ch
ar
ac
ter
s
an
d
co
n
ti
n
u
o
u
s
ar
e
a
d
ata
o
f
v
eh
icle
s
f
r
o
m
th
eir
L
B
S
d
em
a
n
d
s
.
T
h
e
t
w
o
i
n
f
o
r
m
atio
n
an
d
p
r
o
tectio
n
s
p
illag
e
o
f
o
u
t
s
id
er
ad
m
in
is
tr
atio
n
s
a
n
d
w
ellb
ein
g
m
es
s
ag
es
in
co
r
p
o
r
ate
ar
ea
an
d
p
er
s
o
n
alit
y
-
r
elate
d
d
ata
(
e.
Fo
r
s
af
e
d
r
iv
in
g
,
v
e
h
icl
es
in
ter
m
itte
n
tl
y
co
m
m
u
n
ica
te
w
el
lb
ein
g
m
e
s
s
a
g
es
{P
s
e
u
d
o
n
y
m
,
L
o
ca
tio
n
,
Velo
cit
y
,
C
o
n
ten
t,
T
im
e}
to
e
n
co
m
p
as
s
i
n
g
n
eig
h
b
o
u
r
s
.
T
h
e
t
y
p
es o
f
attac
k
s
o
n
v
ir
t
u
al
m
ac
h
in
e
s
i
n
clu
d
e:
-
Ob
s
er
v
atio
n
m
ap
p
in
g
attac
k
:
T
h
e
ar
r
an
g
e
m
en
t
is
to
s
u
p
p
la
n
t
th
e
VM
p
er
s
o
n
alit
y
b
y
ir
r
eg
u
lar
id
en
tifie
r
s
an
d
o
cc
asio
n
al
l
y
ch
a
n
g
e
t
h
e
id
en
ti
f
ier
s
u
tili
zi
n
g
a
V
M
id
en
ti
f
ier
s
r
ep
lace
m
e
n
t
s
ch
e
m
e
(
VI
R
S),
w
h
ic
h
ca
u
s
es t
h
e
m
ap
p
in
g
r
ela
tio
n
s
h
ip
to
f
all
f
lat.
-
L
i
n
k
a
g
e
m
ap
p
in
g
attac
k
:
A
p
s
eu
d
o
n
y
m
c
h
an
g
i
n
g
s
y
n
ch
r
o
n
izatio
n
s
ch
e
m
e
(
P
C
SS
)
i
s
p
r
o
p
o
s
ed
to
p
r
o
tect
ag
ain
s
t
t
h
is
as
s
au
l
t.
R
ig
h
t
n
o
w
,
th
e
p
r
o
ce
d
u
r
e
o
f
p
s
eu
d
o
n
y
m
o
r
alias
an
d
VM
ch
ar
ac
te
r
s
u
b
s
tit
u
tio
n
i
s
s
y
n
ch
r
o
n
ized
to
s
af
eg
u
ar
d
ag
ain
s
t
li
n
k
ag
e
m
ap
p
in
g
as
s
au
lt
s
,
w
h
ich
u
p
g
r
ad
es
th
e
s
ec
u
r
it
y
i
n
s
u
r
a
n
ce
lev
el
d
u
r
in
g
d
r
iv
in
g
.
I
n
[
1
2
]
,
th
e
p
ap
er
p
o
in
ts
o
u
t
t
h
at
f
o
r
t
h
e
s
a
f
e
r
o
u
te,
f
o
r
w
ar
d
i
m
p
ac
t
w
ar
n
i
n
g
,
co
n
v
er
g
e
n
ce
cr
ash
es,
tr
af
f
ic
s
h
o
c
k
w
av
e
s
,
p
lato
o
n
in
g
an
d
w
ar
n
in
g
s
ab
o
u
t
s
tr
ee
t
h
az
ar
d
s
is
an
u
n
q
u
e
s
tio
n
ab
le
r
eq
u
ir
e
m
e
n
t
f
o
r
V2
V
s
y
s
te
m
.
T
h
e
s
ec
u
r
it
y
i
s
s
u
e
w
i
t
h
V2
I
co
m
m
u
n
ica
tio
n
i
s
t
h
at
s
in
ce
it
u
s
es c
e
n
tr
al
n
av
i
g
ato
r
s
,
all
th
e
in
f
o
r
m
a
tio
n
is
u
p
lo
ad
ed
o
n
th
e
n
a
v
i
g
ato
r
.
T
h
e
n
av
i
g
ato
r
s
to
r
es
cr
itical
i
n
f
o
r
m
atio
n
lik
e
th
e
s
o
u
r
ce
,
d
esti
n
a
tio
n
a
n
d
s
p
ee
d
o
f
th
e
v
eh
ic
le.
T
h
e
s
y
s
te
m
g
e
n
er
ates
p
er
s
o
n
al
d
ata
th
at
is
p
r
o
tecte
d
b
y
ag
g
r
e
g
atio
n
s
er
v
er
s
s
u
ch
a
s
elec
tr
o
n
ic
f
r
o
n
tier
f
o
u
n
d
atio
n
b
u
t
th
er
e
is
a
p
o
s
s
ib
ilit
y
th
at
t
h
e
a
g
g
r
eg
ato
r
co
llu
d
es
to
co
m
p
r
o
m
is
e
th
e
p
r
iv
ac
y
o
f
th
e
u
s
er
a
n
d
t
h
er
ef
o
r
e,
t
h
e
p
ap
er
u
tili
ze
s
t
h
e
co
n
ce
p
t
o
f
h
a
y
s
tac
k
p
r
iv
ac
y
.
I
n
h
a
y
s
tack
p
r
iv
ac
y
,
th
e
v
e
h
icle
s
w
it
h
s
i
m
ilar
ch
ar
ac
ter
i
s
tics
ar
e
g
r
o
u
p
ed
an
d
o
n
ly
th
e
c
o
m
m
o
n
g
r
o
u
p
ch
ar
ac
ter
is
tic
s
ar
e
v
is
ib
le
h
en
ce
m
ai
n
tai
n
in
g
i
n
d
iv
id
u
al
p
r
iv
ac
y
.
T
h
is
is
d
o
n
e
w
h
e
n
ea
ch
d
ata
o
w
n
er
p
r
iv
atize
s
th
eir
d
a
ta
alo
n
g
w
it
h
th
a
t
a
p
r
o
g
r
ess
io
n
o
f
B
er
n
o
u
lli
tr
ails
r
an
d
o
m
ize
s
th
e
ap
p
r
o
p
r
iat
e
r
esp
o
n
s
e
an
d
ca
n
f
r
a
m
e
a
l
ast
to
talled
an
s
w
er
o
v
er
th
e
p
o
p
u
lace
.
I
n
[
1
3
]
,
th
e
p
ap
er
ex
am
i
n
es
th
e
d
esig
n
,
ap
p
licatio
n
s
,
an
d
s
ec
u
r
it
y
,
p
r
o
tectio
n
,
an
d
f
air
n
ess
o
f
f
o
g
-
b
ased
v
e
h
icu
lar
cr
o
w
d
s
e
n
s
i
n
g
(
FC
V
S).
Ma
n
ip
u
lat
io
n
o
f
cr
o
w
d
s
en
s
in
g
r
ep
o
r
ts
m
a
y
d
ir
ec
t
l
y
i
m
p
ac
t
th
e
p
er
f
o
r
m
an
ce
o
f
an
I
o
V
ar
ch
itect
u
r
e
a
n
d
f
u
r
t
h
er
m
is
lead
u
s
er
s
to
m
a
k
e
f
al
s
e
d
ec
is
io
n
s
.
Sen
s
o
r
s
o
n
-
b
o
ar
d
v
eh
ic
les
co
llect
a
lo
t
o
f
s
en
s
it
iv
e
d
ata
s
u
c
h
as
P
I
I
an
d
also
t
h
e
tr
aj
ec
to
r
y
o
f
a
s
p
ec
i
f
ic
v
e
h
icle
d
eter
m
i
n
ed
b
y
u
s
i
n
g
s
u
cc
es
s
i
v
e
r
ep
o
r
ts
.
I
m
p
er
s
o
n
atio
n
a
ttack
s
a
n
d
S
y
b
il
a
ttack
s
m
a
y
i
m
p
ac
t
th
e
I
o
V
s
y
s
te
m
b
y
g
e
n
er
atin
g
f
o
r
g
ed
an
d
f
al
s
e
r
ep
o
r
ts
w
h
i
ch
co
u
ld
h
a
m
p
er
o
th
er
u
s
er
s
.
T
o
ac
h
iev
e
h
ig
h
-
q
u
al
it
y
r
e
s
u
lt
s
in
f
o
g
b
ased
n
et
w
o
r
k
s
,
th
e
tas
k
s
a
n
d
lo
ca
tio
n
a
w
ar
e
n
es
s
p
r
o
p
er
ty
s
h
o
u
l
d
b
e
ex
p
o
s
ed
b
u
t
th
e
id
en
tit
i
es
o
f
th
e
v
eh
ic
les
p
er
f
o
r
m
in
g
t
h
ese
tas
k
s
m
u
s
t
b
e
p
r
o
tecte
d
.
T
h
is
is
w
o
r
t
h
a
s
f
ar
as
p
r
o
tectio
n
s
i
n
ce
th
e
c
lo
u
d
ca
n
'
t
in
ter
f
ac
e
th
e
c
h
ar
ac
ter
s
o
f
clie
n
ts
w
it
h
th
e
s
u
b
s
ta
n
ce
o
f
u
n
d
er
ta
k
in
g
s
,
y
et
ac
h
ie
v
es
t
h
e
er
r
a
n
d
s
v
ia
b
ly
.
A
d
r
a
w
b
ac
k
i
s
th
at
p
s
eu
d
o
n
y
m
s
n
ee
d
to
b
e
r
e
f
r
es
h
ed
f
o
r
ea
ch
er
r
an
d
w
h
ich
is
tr
o
u
b
leso
m
e
o
n
t
h
e
p
s
eu
d
o
n
y
m
ad
m
in
is
tr
atio
n
f
o
r
th
e
t
w
o
c
lien
t
s
a
n
d
th
e
c
l
o
u
d
,
an
d
g
r
o
u
p
s
ig
n
at
u
r
es
ar
e
co
m
m
o
n
l
y
co
m
p
u
tatio
n
al
l
y
w
a
s
te
f
u
l
f
o
r
clie
n
ts
.
T
h
e
p
ap
e
r
p
r
o
p
o
s
es
s
o
m
e
s
tu
r
d
y
s
ec
u
r
it
y
a
n
d
p
r
o
tectio
n
in
s
u
r
a
n
ce
p
lan
s
f
o
r
v
eh
ic
u
lar
cr
o
w
d
s
e
n
s
i
n
g
ap
p
licatio
n
s
,
lik
e:
-
Secu
r
e
ta
s
k
in
g
a
n
d
r
ep
o
r
tin
g
:
P
r
o
x
y
r
e
-
en
cr
y
p
t
io
n
a
n
d
s
ea
r
ch
ab
le
en
cr
y
p
tio
n
alo
n
g
w
i
t
h
a
tr
u
s
ted
t
h
ir
d
p
ar
ty
s
h
o
u
ld
b
e
in
v
o
l
v
ed
in
t
h
e
k
e
y
m
an
a
g
e
m
e
n
t.
-
P
r
iv
ac
y
-
p
r
eser
v
in
g
n
av
ig
at
io
n
:
I
n
[
14
]
,
Ni
et
al.
p
r
o
p
o
s
ed
a
p
r
o
tectio
n
s
av
i
n
g
o
n
g
o
in
g
r
o
u
te
f
r
a
m
e
w
o
r
k
to
ac
co
m
p
li
s
h
tr
af
f
ic
-
m
in
d
f
u
l r
o
u
te
f
o
r
d
r
iv
er
s
b
y
u
s
i
n
g
v
e
h
ic
u
lar
cr
o
w
d
s
e
n
s
in
g
.
-
Secu
r
e
an
d
DE
d
u
p
licated
c
r
o
w
d
s
en
s
i
n
g
:
I
n
f
o
r
m
atio
n
e
n
cr
y
p
tio
n
g
i
v
es
a
m
o
d
er
n
wa
y
to
d
ea
l
w
it
h
f
o
r
estall
i
n
f
o
r
m
atio
n
s
p
illa
g
e
,
th
en
ca
r
r
y
in
g
a
co
lo
s
s
a
l
d
eter
r
en
t
to
th
e
i
n
ter
m
ed
iates
f
o
r
r
ec
o
g
n
izin
g
th
e
r
ed
u
p
licated
r
ep
o
r
ts
.
T
o
ad
d
r
ess
th
ese
i
s
s
u
es
,
N
i
et
al.
[
15
]
p
lan
n
ed
a
h
az
e
b
ased
s
ec
u
r
e
a
n
d
d
ed
u
p
licated
cr
o
w
d
s
e
n
s
in
g
s
y
s
te
m
.
R
ig
h
t
n
o
w
,
f
o
g
n
o
d
e
s
ar
e
in
cl
u
d
ed
to
b
r
ief
l
y
s
to
r
e
cr
o
w
d
s
en
s
i
n
g
r
ep
o
r
ts
,
an
d
ac
k
n
o
w
led
g
e
p
r
o
f
icien
t
an
d
m
a
k
e
s
u
r
e
ab
o
u
t
in
f
o
r
m
atio
n
d
ed
u
p
licatio
n
an
d
co
m
m
it
m
en
t
co
llec
tio
n
.
I
n
[
1
6
]
,
th
is
p
ap
er
d
is
cu
s
s
e
s
th
e
s
e
v
er
al
k
e
y
s
ec
u
r
it
y
an
d
s
cien
ti
f
ic
d
i
f
f
icu
lt
ies
i
n
h
a
ze
h
elp
ed
v
eh
ic
les.
Ag
g
r
es
s
o
r
s
ca
n
b
e
p
o
r
tr
ay
ed
a
s
i
n
ter
io
r
o
r
o
u
t
s
id
e
an
d
ass
a
u
lt
s
ca
n
b
e
d
y
n
a
m
ic
o
r
d
etac
h
ed
.
An
i
n
ac
tiv
e
a
s
s
a
u
lt
d
o
esn
't
w
r
ec
k
t
h
e
u
s
e
f
u
ln
e
s
s
o
f
a
v
eh
ic
u
lar
f
o
g
r
eg
i
s
ter
in
g
f
r
a
m
e
w
o
r
k
h
o
w
e
v
er
en
d
ea
v
o
u
r
s
to
u
n
v
ei
l
r
eser
v
e
d
in
f
o
r
m
a
tio
n
.
A
f
u
n
ctio
n
i
n
g
ass
au
lt
is
a
n
en
d
ea
v
o
u
r
to
i
n
ten
tio
n
all
y
c
u
t
o
f
f
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8708
I
n
t J
E
lec
&
C
o
m
p
E
n
g
,
Vo
l.
10
,
No
.
5
,
Octo
b
e
r
2
0
2
0
:
5
4
0
9
-
5419
5412
th
e
ac
ti
v
ities
o
f
a
v
eh
ic
u
lar
h
az
e
r
eg
is
ter
i
n
g
f
r
a
m
e
w
o
r
k
(
e.
g
.
,
DDo
S
ass
au
lt
s
,
alter
i
n
g
d
ata
o
f
b
r
il
lian
t
v
eh
ic
les
o
r
th
e
ch
o
ice
r
ep
o
r
ts
o
f
f
o
g
n
o
d
es
an
d
clo
u
d
s
er
v
er
s
,
an
d
in
f
o
r
m
atio
n
e
x
f
i
ltra
ti
o
n
)
.
T
h
e
f
o
llo
w
in
g
p
r
o
p
er
ties
s
h
o
u
ld
b
e
i
m
p
le
m
e
n
ted
in
v
eh
ic
u
lar
f
o
g
co
m
p
u
ti
n
g
:
-
C
o
n
f
id
en
tia
lit
y
an
d
I
n
teg
r
it
y
:
I
n
v
e
h
ic
u
lar
f
o
g
co
m
p
u
tin
g
i
n
teg
r
it
y
o
f
d
ata
is
cr
u
cial
s
in
ce
ta
m
p
er
in
g
m
a
y
r
esu
lt i
n
d
is
astro
u
s
co
n
s
eq
u
e
n
ce
s
.
-
No
n
-
r
ep
u
d
iatio
n
:
No
e
n
ti
t
y
i
n
t
h
e
s
y
s
te
m
ca
n
u
n
d
o
an
ac
tio
n
d
o
n
e
p
r
ev
io
u
s
l
y
s
u
c
h
a
s
th
e
s
en
d
i
n
g
o
r
r
ec
eiv
in
g
o
f
i
n
f
o
r
m
atio
n
.
-
Av
ailab
ilit
y
:
W
h
e
n
e
v
er
an
au
th
o
r
ized
v
eh
icle
atte
m
p
ts
to
ac
ce
s
s
a
f
o
g
n
o
d
e
o
r
cl
o
u
d
s
er
v
er
,
it
is
al
w
a
y
s
r
ea
d
y
f
o
r
d
ata
r
etr
iev
al
o
r
tr
an
s
f
er
.
-
R
elaib
ilit
y
an
d
Fo
r
en
s
ics:
Gu
a
r
an
tees t
h
at
th
e
ca
p
ac
it
y
to
d
is
tin
g
u
i
s
h
,
g
at
h
er
,
an
d
ex
a
m
i
n
e
th
e
in
f
o
r
m
a
tio
n
f
r
o
m
k
ee
n
v
e
h
icle
s
,
h
az
e
h
u
b
s
an
d
t
h
e
f
u
n
d
a
m
en
ta
l
f
o
u
n
d
atio
n
f
o
r
f
o
llo
w
i
n
g
a
n
d
r
ec
o
g
n
izin
g
as
s
aila
n
ts
co
n
tin
u
o
u
s
l
y
is
w
o
r
k
i
n
g
.
T
h
ese
p
r
ev
io
u
s
l
y
m
e
n
tio
n
e
d
p
r
er
eq
u
is
ites
ca
n
b
e
ac
c
o
m
p
li
s
h
ed
b
y
u
ti
lizin
g
cr
y
p
to
g
r
ap
h
ic
p
r
o
ce
d
u
r
es.
Ho
m
o
m
o
r
p
h
ic
e
n
cr
y
p
tio
n
ca
n
b
e
u
t
ilized
to
ac
co
m
p
li
s
h
m
y
s
ter
y
an
d
u
s
e
f
u
ln
e
s
s
.
I
n
[
1
7
]
,
th
e
p
ap
e
r
p
r
o
p
o
s
es
a
s
ch
e
m
e
w
h
ich
e
n
s
u
r
es
lo
ca
tio
n
p
r
iv
ac
y
-
p
r
eser
v
at
io
n
w
it
h
a
r
ep
o
r
t
an
d
d
ata
ap
p
r
o
p
r
iatio
n
in
I
o
V
w
it
h
th
e
ch
a
n
g
ed
p
aillier
cr
y
p
to
s
y
s
te
m
,
w
h
ich
e
m
p
o
w
er
s
t
h
e
r
o
ad
s
id
e
u
n
it
(
R
SU
)
to
g
ath
er
a
n
d
co
n
v
e
y
t
h
e
tac
tile
in
f
o
r
m
at
io
n
p
r
o
d
u
ce
d
b
y
v
eh
ic
les.
T
h
e
p
ap
er
s
u
g
g
est
s
p
r
o
tectio
n
s
av
i
n
g
v
eh
ic
u
lar
tactile
i
n
f
o
r
m
atio
n
a
s
s
o
r
t
m
e
n
t
co
n
s
p
ir
e
in
I
o
V.
T
h
e
p
lan
b
o
ls
ter
s
th
e
R
SU
to
p
lay
o
u
t
th
e
p
r
o
tectio
n
s
af
e
g
u
ar
d
in
g
co
m
p
o
s
ite
in
f
o
r
m
atio
n
r
ep
o
r
ts
to
tal
an
d
th
e
o
u
tco
m
e
ca
n
b
e
r
ec
o
v
er
ed
a
n
d
r
e
-
s
cr
a
m
b
led
b
y
th
e
co
n
f
id
ed
in
r
u
s
h
h
o
u
r
g
r
id
lo
ck
th
e
ex
ec
u
ti
v
es
e
x
p
er
t
f
o
r
ad
d
itio
n
al
p
r
ep
ar
in
g
.
T
h
e
p
ap
er
p
r
o
p
o
s
es
a
p
r
o
tectio
n
s
av
in
g
tan
g
ib
le
i
n
f
o
r
m
atio
n
p
r
o
cu
r
e
m
en
t
co
n
s
p
i
r
e
in
I
o
V.
T
h
e
p
r
o
p
o
s
ed
p
lo
t
e
m
p
o
w
er
s
a
v
eh
ic
le
to
g
et
t
h
e
tactile
in
f
o
r
m
a
tio
n
ca
u
g
h
t
b
y
d
if
f
er
en
t
v
e
h
icle
s
b
y
s
a
f
el
y
q
u
es
tio
n
i
n
g
th
e
in
f
o
r
m
at
io
n
.
T
h
e
R
S
U
re
-
en
co
d
es
th
e
ac
c
u
m
u
lated
tactile
in
f
o
r
m
atio
n
in
to
cip
h
er
tex
t
s
th
a
t
m
u
s
t
b
e
co
m
p
letel
y
r
ec
o
u
p
ed
b
y
th
e
i
n
f
o
r
m
atio
n
q
u
es
tio
n
i
n
g
v
eh
icle,
w
h
ile
w
ith
o
u
t
t
h
e
e
x
p
o
s
u
r
e
o
f
th
e
i
n
f
o
r
m
a
tio
n
q
u
esti
o
n
in
g
ar
ea
.
T
h
er
e
i
s
a
lo
w
d
ata
q
u
er
y
in
g
f
ail
u
r
e
r
ate
an
d
t
h
e
s
c
h
e
m
e
is
ef
f
ec
tiv
e
i
n
ter
m
s
o
f
lo
w
co
m
p
u
tatio
n
co
s
t
a
n
d
co
m
m
u
n
icatio
n
o
v
er
h
ea
d
.
T
h
e
p
ap
er
s
tates
t
h
at
t
h
e
s
ec
u
r
i
t
y
r
eq
u
ir
e
m
e
n
ts
o
f
t
h
e
m
o
d
el
p
r
o
p
o
s
ed
s
h
o
u
ld
in
cl
u
d
e
lo
ca
tio
n
p
r
iv
ac
y
p
r
ese
r
v
atio
n
,
co
llu
s
io
n
r
esi
s
ta
n
ce
a
n
d
d
ata
in
teg
r
i
t
y
.
I
n
[
1
8
]
,
th
e
p
ap
e
r
d
is
cu
s
s
e
s
s
e
cu
r
it
y
a
n
d
p
r
iv
ac
y
u
s
i
n
g
th
e
f
o
llo
w
i
n
g
:
-
Au
t
h
en
t
icate
d
cr
o
w
d
s
o
u
r
ce
d
d
ata
:
T
h
e
s
o
f
t
w
ar
e
co
n
tr
o
lli
n
g
th
e
v
e
h
icle
i
s
p
r
o
n
e
to
m
alicio
u
s
at
tack
s
m
is
lead
in
g
/
f
o
r
cin
g
t
h
e
v
e
h
icl
e
to
ta
k
e
a
d
if
f
er
en
t
/d
esire
d
r
o
u
te.
T
h
ese
s
p
o
o
f
ed
m
es
s
ag
es
s
h
o
u
ld
b
e
d
etec
ted
an
d
s
ep
ar
ated
.
T
h
is
is
s
ec
u
r
ed
b
y
co
llect
in
g
t
h
e
d
ata
an
d
g
en
er
ati
n
g
k
e
y
s
,
s
h
ar
in
g
t
h
e
d
ata
o
n
au
th
o
r
ized
p
u
b
lic
p
latf
o
r
m
a
n
d
b
r
o
ad
ca
s
tin
g
d
ata.
T
h
e
p
latf
o
r
m
is
a
u
t
h
o
r
ized
an
d
ev
er
y
in
f
o
r
m
atio
n
i
s
v
er
if
ied
.
T
h
is
is
s
o
th
at
al
l
th
e
in
f
o
r
m
atio
n
cir
c
u
lated
is
u
n
d
er
th
e
s
u
p
er
v
i
s
io
n
a
n
d
n
o
s
u
ch
v
e
h
icle
s
ar
e
m
is
led
.
-
Scalab
le
P
r
iv
ac
y
:
Di
f
f
er
en
t
m
eth
o
d
s
li
k
e
d
i
f
f
er
en
tial
p
r
iv
ac
y
w
o
r
k
o
n
p
r
o
tecti
n
g
th
e
p
r
iv
a
c
y
o
f
t
h
e
p
er
s
o
n
g
iv
in
g
t
h
e
m
t
h
e
o
p
tio
n
to
c
o
n
tr
o
l
th
eir
f
lo
w
o
f
in
f
o
r
m
at
io
n
.
T
h
is
tr
ad
es
ac
cu
r
ac
y
f
o
r
p
r
iv
ac
y
b
u
t
i
n
th
e
ca
s
e
to
r
etai
n
p
r
iv
ac
y
ac
cu
r
ac
y
i
s
s
ac
r
i
f
iced
.
T
o
n
o
t
p
lay
w
it
h
b
o
th
,
s
ca
lab
le
p
r
iv
ac
y
p
la
y
s
a
p
ar
t
w
h
er
e
th
e
d
ata
is
ex
tr
ac
ted
f
r
o
m
a
b
ig
co
m
m
o
n
g
r
o
u
p
w
h
er
e
o
n
l
y
t
h
e
co
m
m
o
n
ch
ar
ac
ter
is
tics
ar
e
d
is
p
la
y
ed
m
a
k
i
n
g
it d
i
f
f
icu
l
t t
o
d
is
to
r
t th
e
o
w
n
er
's d
ata.
I
n
[
1
9
]
,
th
e
p
ap
er
talk
s
ab
o
u
t
th
e
n
o
v
e
l
o
n
b
o
ar
d
u
n
it
s
w
i
th
t
h
r
ee
-
lev
el
s
ec
u
r
it
y
a
r
ch
itect
u
r
e
(
NOT
SA
)
.
T
h
er
e
ar
e
d
if
f
er
en
t t
y
p
es o
f
attac
k
s
t
h
at
a
f
f
ec
t th
e
C
A
N
(
co
n
tr
o
ller
ar
ea
n
et
w
o
r
k
)
lik
e:
-
Sh
o
r
t
-
r
a
n
g
e
at
tack
: a
ttac
k
er
b
ec
o
m
e
s
a
p
ar
t o
f
th
e
n
et
w
o
r
k
-
L
o
n
g
-
r
an
g
e
attac
k
: a
ttack
er
tr
ac
k
s
t
h
e
m
o
v
e
m
en
t b
y
a
ttack
i
n
g
t
h
e
n
a
v
i
g
atio
n
an
d
r
ad
io
f
u
n
ctio
n
d
ev
ices.
-
Do
S a
ttack
: T
h
e
attac
k
er
s
e
n
d
s
a
lar
g
e
a
m
o
u
n
t o
f
u
s
eles
s
d
ata
in
to
th
e
s
y
s
te
m
-
E
av
esd
r
o
p
p
in
g
at
tack
:
T
h
e
att
ac
k
er
s
tea
ls
th
e
p
r
iv
ate
in
f
o
r
m
atio
n
ab
o
u
t
th
e
v
icti
m
a
n
d
t
h
is
in
f
o
r
m
a
tio
n
ca
n
h
elp
ac
ce
s
s
o
th
er
in
f
o
r
m
a
t
io
n
o
n
th
e
n
et
w
o
r
k
.
-
R
ep
la
y
attac
k
:
A
ttac
k
i
n
g
t
h
e
c
o
n
tr
o
ller
r
ep
ea
ted
ly
h
a
m
p
er
s
t
h
e
n
o
r
m
a
l f
u
n
c
tio
n
i
n
g
o
f
t
h
e
C
A
N
-
Fo
r
g
er
y
attac
k
: T
h
e
attac
k
er
f
ak
es to
b
e
a
u
s
er
d
ev
ice
a
n
d
co
n
tr
o
ls
all
th
e
co
m
m
a
n
d
s
T
h
e
NOT
SA
h
as
f
o
u
r
s
ec
u
r
it
y
ar
ea
s
w
it
h
d
if
f
er
e
n
t f
u
n
ctio
n
s
:
-
A
r
ea
A
:
co
r
e
s
ec
u
r
it
y
ar
ea
s
,
t
h
is
k
ee
p
s
in
ch
ec
k
all
t
h
e
u
s
e
r
s
ac
ce
s
s
in
g
d
ata
an
d
au
t
h
o
r
is
in
g
i
n
f
o
r
m
atio
n
ex
ch
a
n
g
e
-
A
r
ea
B
:
s
ig
n
al
tr
an
s
m
itti
n
g
ar
ea
,
th
is
h
a
s
th
e
tr
an
s
m
itter
s
th
at
h
elp
ar
ea
A
tak
e
d
ec
is
io
n
s
,
an
al
y
s
e
d
ev
ice
s
in
ar
ea
C
an
d
m
ak
e
j
u
d
g
e
m
e
n
t
s
in
ar
ea
D.
-
A
r
ea
C
:
co
n
s
i
s
ts
o
f
a
n
ex
ter
n
al
h
ar
d
w
ar
e
d
ev
ice
ac
ce
s
s
ar
ea
,
k
ee
p
s
in
ch
ec
k
th
e
e
x
t
er
n
al
d
ev
ices
t
o
p
r
ev
en
t f
r
a
u
d
u
le
n
t a
ct
s
o
n
C
AN.
-
A
r
ea
D:
t
h
i
s
i
s
t
h
e
e
x
ter
n
al
n
et
w
o
r
k
ac
ce
s
s
ar
ea
,
t
h
is
co
n
tr
o
ls
al
l
t
h
e
tr
af
f
ic
d
ata
an
d
co
m
m
u
n
icat
io
n
in
f
o
r
m
atio
n
a
m
id
s
t th
e
v
eh
ic
le
s
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
t J
E
lec
&
C
o
m
p
E
n
g
I
SS
N:
2
0
8
8
-
8708
A
s
u
r
ve
y
o
n
s
ec
u
r
ity
a
n
d
p
r
iva
cy
is
s
u
es in
I
o
V
(
Ta
n
vi
Ga
r
g
)
5413
T
o
m
a
k
e
NOT
S
A
th
e
s
ec
u
r
e
a
r
ch
itect
u
r
e,
it u
s
e
s
a
th
r
ee
-
lev
e
l secu
r
it
y
p
r
ec
au
tio
n
:
-
R
o
b
u
s
t
s
ec
u
r
it
y
v
er
i
f
icati
o
n
an
d
au
t
h
en
t
icatio
n
to
ex
ter
n
al
n
et
w
o
r
k
s
a
n
d
d
ev
ice:
t
h
i
s
s
a
y
s
th
at
al
l
th
e
ex
ter
n
al
d
ev
ice
s
n
ee
d
to
b
e
au
th
e
n
ticated
a
n
d
it is
d
o
n
e
w
it
h
t
h
e
alg
o
r
it
h
m
as d
is
c
u
s
s
e
d
in
th
e
p
ap
er
-
Mu
ltip
r
o
ce
s
s
o
r
au
t
h
e
n
ticatio
n
:
to
au
th
e
n
ticate
t
h
e
s
e
d
ev
ices
an
d
n
et
w
o
r
k
s
a
n
u
n
clo
n
ab
le
f
u
n
ct
io
n
is
u
s
ed
th
at
p
r
ep
ar
es a
n
u
n
p
r
ed
ictab
le
r
esp
o
n
s
e
to
ch
alle
n
g
e
s
.
-
Har
d
w
ar
e
is
o
latio
n
:
t
h
i
s
p
r
ev
en
ts
th
e
v
e
h
icle
s
i
n
t
h
e
n
et
wo
r
k
f
r
o
m
b
ein
g
co
n
tr
o
lled
an
d
also
p
r
ev
en
t
s
w
eir
d
m
a
licio
u
s
in
f
o
r
m
at
io
n
f
r
o
m
e
n
ter
in
g
t
h
e
n
et
w
o
r
k
T
o
p
r
ev
en
t d
if
f
er
e
n
t t
y
p
e
s
o
f
a
ttack
s
o
n
th
e
n
et
w
o
r
k
t
h
e
s
ec
u
r
it
y
an
al
y
s
is
s
a
y
s
:
-
T
h
at
w
h
e
n
th
e
attac
k
er
d
is
g
u
is
es
its
e
lf
t
h
e
n
th
e
o
n
l
y
w
a
y
to
d
if
f
er
en
tiate
b
et
w
ee
n
th
e
leg
iti
m
ate
an
d
illeg
it
i
m
a
te
u
s
er
s
is
w
h
en
k
e
y
s
ar
e
d
ec
r
y
p
ted
to
o
b
tain
t
h
e
c
er
tif
icate
an
d
th
e
d
if
f
er
en
ce
is
s
p
o
tted
s
a
v
i
n
g
th
e
n
et
w
o
r
k
.
-
T
h
e
u
n
clo
n
ab
le
f
u
n
ctio
n
i
s
also
u
s
ed
s
o
t
h
at
t
h
e
d
e
cisi
o
n
ca
n
’
t
b
e
p
r
ed
icted
an
d
h
e
n
ce
f
o
r
th
th
e
ea
v
e
s
d
r
o
p
p
in
g
attac
k
i
s
av
o
id
ed
.
I
n
[
20
]
,
th
e
p
ap
e
r
d
is
cu
s
s
e
s
is
s
u
es i
n
th
e
co
g
n
i
tiv
e
i
n
ter
n
et
o
f
v
eh
icle
s
(
C
I
o
V)
ar
e:
-
Vu
l
n
er
ab
ilit
y
Sca
n
n
in
g
f
o
r
I
o
V:
th
e
C
I
OV
d
o
es
n
o
t
h
a
v
e
a
d
ev
ice
w
h
ich
ca
n
d
et
ec
t
an
d
ac
t
o
n
v
u
l
n
er
ab
ilit
ie
s
.
-
Saf
e
co
m
m
u
n
icatio
n
o
n
in
ter
i
o
r
n
et
w
o
r
k
o
f
I
o
V:
th
i
s
s
a
y
s
t
h
at
w
h
e
n
C
AN
s
e
n
d
s
m
es
s
a
g
es
to
th
e
en
g
i
n
e
co
n
tr
o
l
u
n
it
(
E
C
U)
,
it
ca
n
n
o
t
d
if
f
er
e
n
tiate
w
h
i
ch
n
o
d
e
s
en
d
s
th
i
s
m
e
s
s
a
g
e
w
h
ich
m
a
y
ca
u
s
e
f
o
r
g
er
y
an
d
s
p
o
o
f
in
g
.
-
Secu
r
it
y
o
n
e
x
ter
n
al
n
et
w
o
r
k
o
f
I
o
V:
in
ter
ac
tio
n
ti
m
e
s
h
o
u
l
d
b
e
lo
w
er
ed
an
d
d
i
f
f
icu
l
t
p
r
o
b
le
m
s
s
h
o
u
ld
b
e
s
o
lv
ed
w
it
h
a
lo
w
-
co
s
t
f
u
n
ctio
n
.
-
I
n
teg
r
it
y
P
r
o
tectio
n
an
d
Secu
r
it
y
Up
g
r
ad
e
f
o
r
E
C
U
Fi
r
m
w
a
r
e:
th
e
tr
u
s
t
w
o
r
t
h
i
n
es
s
an
d
s
e
cu
r
it
y
s
h
o
u
ld
b
e
g
u
ar
a
n
teed
w
it
h
s
o
m
e
p
o
lic
y
a
n
d
au
t
h
en
t
icatio
n
s
ch
e
m
e.
I
n
[
2
1
]
,
th
e
p
ap
er
s
a
y
s
t
h
at
t
h
er
e
th
r
ee
t
y
p
es
o
f
n
o
d
es,
i.e
.
(
i)
ca
r
s
,
(
ii)
b
u
s
es
a
n
d
(
iii)
p
ed
estrian
s
,
th
at
f
o
r
m
s
o
cial
in
ter
n
et
o
f
v
eh
icles
(
SIO
V
)
.
T
h
ese
n
o
d
es
ar
e
m
ad
e
k
ee
p
in
g
t
h
e
co
m
m
o
n
in
ter
ests
a
n
d
ar
e
f
u
ll
y
co
-
o
p
er
ated
.
I
n
p
r
iv
ac
y
-
p
r
eser
v
in
g
i
n
ter
est
-
b
ased
f
o
r
w
ar
d
in
g
s
ch
e
m
e
th
e
co
m
m
u
n
it
y
e
n
er
g
y
i
s
o
f
t
w
o
t
y
p
es:
I
n
tr
a
a
n
d
I
n
ter
co
m
m
u
n
i
t
y
e
n
e
r
g
y
.
T
h
e
p
r
iv
ac
y
-
p
r
eser
v
in
g
in
ter
e
s
t
-
b
ased
f
o
r
w
ar
d
in
g
s
c
h
e
m
e
f
o
r
s
o
cial
in
ter
n
e
t o
f
v
e
h
icle
s
(
P
R
I
F)
s
ch
e
m
e
in
c
lu
d
e:
-
S
y
s
te
m
i
n
itial
izatio
n
:
a
tr
u
s
te
d
au
th
o
r
it
y
(
T
A
)
cr
ea
tes
a
g
r
o
u
p
an
d
g
en
er
ates
a
g
r
o
u
p
I
D.
Fo
r
an
y
n
o
d
e
to
j
o
in
th
ese
g
r
o
u
p
s
,
t
h
e
tr
u
s
t
au
t
h
o
r
it
y
r
ec
o
r
d
s
it
an
d
p
r
o
d
u
ce
s
an
au
th
e
n
ticatio
n
i
n
t
h
e
f
o
r
m
o
f
a
ce
r
tif
ica
te.
T
h
is
is
g
i
v
e
n
to
th
e
n
o
d
e
o
v
er
a
p
r
iv
ate
au
t
h
en
tica
ted
ch
an
n
e
l.
-
P
r
iv
ac
y
-
p
r
eser
v
in
g
au
th
e
n
tica
tio
n
:
w
h
e
n
a
u
s
er
clai
m
s
to
b
e
ass
o
ciate
d
w
it
h
a
p
ar
ticu
lar
g
r
o
u
p
th
en
h
i
s
clai
m
i
s
v
alid
ated
b
y
ex
ec
u
ti
n
g
th
e
p
r
iv
ac
y
a
u
th
e
n
ticat
io
n
.
-
Fo
r
w
a
r
d
in
g
p
r
o
ce
s
s
:
w
h
e
n
th
e
v
eh
icle
s
ar
e
in
th
e
n
et
w
o
r
k
,
ea
ch
n
o
d
e
w
ill
co
m
m
u
n
ica
te
w
it
h
ea
ch
o
th
er
v
ar
io
u
s
s
tr
ateg
ie
s
ar
e
u
s
ed
to
d
o
th
is
an
d
m
a
in
ta
in
p
r
iv
ac
y
.
-
Me
s
s
a
g
e
s
c
h
ed
u
lin
g
a
n
d
b
u
f
f
e
r
m
a
n
ag
e
m
e
n
t:
th
i
s
u
s
e
s
t
h
e
al
g
o
r
ith
m
s
to
m
an
a
g
e
e
f
f
icie
n
t
f
o
r
w
ar
d
in
g
a
n
d
au
th
e
n
tica
tin
g
t
h
e
m
e
s
s
a
g
es a
n
d
b
u
f
f
er
s
.
I
n
[
2
2
]
,
th
e
p
ap
er
r
ev
ie
w
s
th
e
b
en
ef
its
o
f
I
o
Vs,
a
p
r
o
p
o
s
e
d
s
ev
e
n
-
la
y
er
ar
c
h
itect
u
r
e
o
f
I
o
V
alo
n
g
w
it
h
th
e
p
r
o
to
co
ls
in
v
o
l
v
ed
w
it
h
I
o
Vs.
T
h
e
s
ec
u
r
i
t
y
is
s
u
e
w
ith
I
o
V
an
d
p
r
ev
e
n
ti
n
g
it
f
r
o
m
c
y
b
er
attac
k
s
i
s
cr
itical
.
A
s
ec
u
r
it
y
r
u
p
tu
r
e
c
o
u
ld
h
a
v
e
e
x
tr
e
m
e
r
a
m
if
icati
o
n
s
f
o
r
d
r
iv
er
s
,
tr
av
eller
s
an
d
d
if
f
er
e
n
t
v
e
h
icles
.
T
h
e
Natio
n
al
I
n
s
tit
u
te
o
f
Sta
n
d
ar
d
s
an
d
T
ec
h
n
o
lo
g
y
p
r
o
p
o
s
ed
a
s
tr
u
ct
u
r
e
to
i
m
p
r
o
v
e
c
y
b
er
s
ec
u
r
it
y
a
n
d
it
o
u
g
h
t
to
b
e
f
o
llo
w
ed
f
o
r
I
o
V
also
.
T
h
e
d
if
f
er
e
n
t
s
ec
u
r
it
y
p
r
er
eq
u
is
ites
ar
e:
Au
t
h
e
n
ticatio
n
,
I
n
teg
r
i
t
y
,
C
o
n
f
id
en
tia
lit
y
,
Da
ta
n
o
n
-
r
ep
u
d
iatio
n
,
ac
ce
s
s
co
n
tr
o
l,
av
ail
ab
ilit
y
an
d
a
n
ti
-
j
a
m
m
in
g
.
I
n
[
2
3
]
,
th
is
p
ap
er
s
a
y
s
,
t
h
a
t
th
e
s
ec
u
r
it
y
m
o
d
el
o
f
p
s
e
u
d
o
n
y
m
m
a
n
a
g
e
m
e
n
t
h
a
s
t
h
r
ee
la
y
er
s
,
i.e
.
C
lo
u
d
la
y
er
,
f
o
g
la
y
er
a
n
d
u
s
er
la
y
er
.
T
h
is
ar
ch
i
tect
u
r
e
r
ed
u
ce
s
o
v
er
h
ea
d
m
a
n
ag
e
m
en
t,
d
is
tr
ib
u
tes
p
s
eu
d
o
n
y
m
in
a
t
i
m
e
l
y
f
a
s
h
io
n
.
T
h
e
p
r
o
p
o
s
ed
p
r
iv
ac
y
-
p
r
es
er
v
atio
n
p
s
eu
d
o
n
y
m
s
ch
e
m
e
a
ls
o
ca
lled
at
th
e
P
3
s
ch
e
m
e
t
h
at
th
e
lo
ca
l a
u
th
o
r
it
y
g
en
er
ates a
n
d
m
a
n
a
g
es it
s
p
s
e
u
d
o
n
y
m
. T
h
is
is
d
o
n
e
b
y
:
-
S
y
s
te
m
i
n
itializa
tio
n
a
n
d
k
e
y
g
e
n
er
atio
n
:
i
n
itialize
t
h
e
v
e
h
icle,
g
e
n
er
ate
k
e
y
an
d
th
e
p
s
eu
d
o
n
y
m
f
o
g
ass
i
g
n
s
th
e
p
s
e
u
d
o
n
y
m
s
to
th
e
v
eh
icle
s
.
-
B
asic
o
p
er
atio
n
f
o
r
p
s
e
u
d
o
n
y
m
m
a
n
ag
e
m
e
n
t:
s
ec
u
r
it
y
m
e
s
s
ag
es
a
lo
n
g
w
it
h
a
ce
r
t
if
ica
te,
an
d
ti
m
e
-
s
ta
m
p
th
at
n
o
ti
f
y
t
h
e
u
s
er
to
ch
a
n
g
e
i
ts
p
s
eu
d
o
n
y
m
.
-
L
o
ca
l
p
s
e
u
d
o
n
y
m
r
eq
u
e
s
ti
n
g
:
b
ef
o
r
e
ch
an
g
i
n
g
th
e
p
s
eu
d
o
n
y
m
,
t
h
e
v
e
h
icle
r
eq
u
est
s
p
s
e
u
d
o
n
y
m
f
o
r
a
n
e
w
p
s
eu
d
o
n
y
m
.
-
C
o
n
te
x
t
-
a
w
ar
e
p
s
e
u
d
o
n
y
m
c
h
an
g
i
n
g
g
r
o
u
p
:
t
h
is
d
ep
en
d
s
o
n
th
e
n
u
m
b
er
o
f
v
e
h
icle
s
s
o
th
a
t
th
e
p
r
i
v
ac
y
i
s
m
ai
n
tai
n
ed
an
d
t
h
e
tr
ac
k
i
n
g
i
s
d
if
f
ic
u
lt
s
i
n
ce
m
a
n
y
n
e
w
p
s
eu
d
o
n
y
m
s
ar
e
g
en
er
ated
m
ai
n
tain
i
n
g
p
r
iv
ac
y
b
y
e
v
al
u
ati
n
g
u
s
i
n
g
a
m
etr
ic
c
alled
p
s
eu
d
o
n
y
m
e
n
tr
o
p
y
.
-
L
o
ca
l
p
s
e
u
d
o
n
y
m
c
h
a
n
g
i
n
g
:
a
f
ter
t
h
e
r
eq
u
est
in
g
c
h
an
g
e
a
n
d
v
er
if
y
i
n
g
th
e
s
ta
m
p
ed
m
es
s
ag
e,
th
e
v
e
h
icle
ch
an
g
es i
ts
p
s
e
u
d
o
n
y
m
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8708
I
n
t J
E
lec
&
C
o
m
p
E
n
g
,
Vo
l.
10
,
No
.
5
,
Octo
b
e
r
2
0
2
0
:
5
4
0
9
-
5419
5414
-
C
r
o
s
s
-
r
eg
io
n
p
s
e
u
d
o
n
y
m
r
eq
u
esti
n
g
:
w
h
en
th
e
v
eh
ic
le
i
s
c
h
an
g
i
n
g
i
ts
r
e
g
io
n
,
it
r
eq
u
est
s
a
p
s
eu
d
o
n
y
m
i
n
th
e
n
e
w
r
e
g
io
n
to
g
e
t r
eg
is
ter
ed
in
th
e
d
atab
ase
o
f
t
h
at
r
eg
io
n
.
-
C
r
o
s
s
-
r
eg
io
n
p
s
eu
d
o
n
y
m
c
h
an
g
i
n
g
:
t
h
e
n
e
w
r
eg
io
n
r
ec
eiv
es
th
e
r
eq
u
e
s
t,
v
er
if
ie
s
i
t
an
d
ch
a
n
g
es
th
e
p
s
eu
d
o
n
y
m
On
ev
a
lu
at
io
n
,
t
h
is
p
ap
er
m
a
in
tai
n
s
i
n
te
g
r
it
y
an
d
a
n
o
n
y
m
it
y
o
f
th
e
v
eh
icle
an
d
f
u
lf
ils
th
e
b
asi
c
s
ec
u
r
it
y
r
eq
u
ir
e
m
en
t
s
b
y
ta
k
i
n
g
ca
r
e
o
f
v
ar
io
u
s
attac
k
s
.
I
n
[
2
4
]
,
th
e
p
ap
er
r
ev
ie
w
s
th
e
ASC
p
r
o
to
co
l
an
d
p
o
in
ts
o
u
t
t
h
e
p
r
o
b
lem
s
p
lag
u
in
g
t
h
e
A
S
C
p
r
o
to
co
l
s
u
ch
as
s
ca
lab
ilit
y
p
r
o
b
lem
,
s
ec
u
r
it
y
p
r
o
b
lem
s
li
k
e
lo
ca
tio
n
s
p
o
o
f
in
g
attac
k
,
o
f
f
l
in
e
id
en
tit
y
g
u
es
s
i
n
g
attac
k
,
etc.
T
h
e
p
r
o
p
o
s
ed
p
r
o
to
co
l
r
eq
u
ir
es
a
u
s
er
to
r
eg
is
ter
w
i
th
a
tr
u
s
ted
au
t
h
o
r
i
t
y
.
T
h
e
tr
u
s
t
au
t
h
o
r
i
t
y
p
ick
s
a
s
et
o
f
s
y
s
te
m
p
ar
a
m
e
ter
s
u
s
in
g
o
n
e
-
w
a
y
h
as
h
,
w
h
ic
h
ar
e
p
r
i
m
e
f
ield
,
g
e
n
er
at
o
r
f
ield
,
a
p
r
iv
ate
a
n
d
p
u
b
lic
k
e
y
an
d
a
s
er
v
er
s
ec
r
et.
A
u
s
e
r
ch
o
o
s
es
a
u
n
iq
u
e
id
en
tit
y
a
n
d
s
en
d
s
it
to
th
e
tr
u
s
t
au
t
h
o
r
it
y
.
T
h
e
tr
u
s
t
au
t
h
o
r
it
y
v
er
i
f
ies
t
h
e
id
en
tit
y
a
n
d
s
u
b
s
eq
u
en
tl
y
,
a
s
m
ar
t
ca
r
d
is
is
s
u
ed
.
T
h
e
s
m
ar
t
ca
r
d
co
n
tain
s
t
h
e
s
y
s
te
m
p
ar
am
eter
s
a
n
d
s
h
o
u
l
d
b
e
in
s
er
te
d
in
to
th
e
v
e
h
icle.
T
h
e
u
s
er
u
s
es
th
e
s
m
ar
t
ca
r
d
to
co
n
n
ec
t
to
th
e
tr
u
s
t
au
t
h
o
r
ity
at
a
n
ea
r
b
y
r
o
ad
s
id
e
u
n
it
to
o
b
tain
a
s
ess
io
n
k
e
y
.
T
h
e
p
r
o
p
o
s
ed
p
r
o
to
c
o
l c
an
p
r
o
v
id
e
m
u
t
u
al
au
th
e
n
ticatio
n
b
as
ed
b
y
co
n
tr
ad
ictio
n
.
T
h
e
p
ap
er
d
escr
ib
es v
ar
io
u
s
“g
a
m
e
s
”
w
h
ic
h
ar
e
s
i
m
u
la
tio
n
s
o
f
t
h
e
p
r
o
to
co
l.
A
t
t
h
e
e
n
d
o
f
t
h
e
g
a
m
es,
i
t
is
p
r
o
v
ed
th
at
th
e
ad
v
a
n
tag
e
o
f
th
e
attac
k
er
is
n
e
g
li
g
ib
le.
I
n
[
2
5
]
,
th
e
p
ap
er
p
r
o
p
o
s
e
s
a
Secu
r
i
t
y
an
d
P
r
iv
ac
y
-
B
a
s
e
d
A
cc
e
s
s
C
o
n
tr
o
l
(
SP
B
AC
)
m
o
d
el
f
o
r
th
e
W
eb
o
f
ass
o
ciate
d
v
e
h
icl
es.
T
h
is
m
o
d
el
ac
tu
al
izes
m
a
d
e
s
u
r
e
ab
o
u
t
co
r
r
esp
o
n
d
en
ce
,
to
tall
y
u
n
r
elate
d
co
n
s
en
ts
r
eleg
a
ted
to
clien
ts
s
itti
n
g
i
n
t
h
e
v
e
h
icles
o
f
a
s
i
m
i
lar
ar
m
ad
a.
I
t
p
er
m
it
s
s
p
ec
ialis
t
s
to
g
et
to
in
f
o
r
m
atio
n
a
n
d
g
u
ar
an
tee
s
t
h
e
u
s
e
o
f
d
y
n
a
m
ic
s
ep
ar
atio
n
o
f
d
u
t
y
(
DSD)
i
n
f
er
ab
le
f
r
o
m
c
o
n
f
lic
tin
g
co
n
s
e
n
ts
.
T
h
e
s
ec
u
r
it
y
o
f
ar
m
ad
a
is
ex
ec
u
ted
in
la
y
er
s
w
h
ich
ar
e
s
ep
ar
ately
o
v
er
s
ee
n
b
y
v
ar
io
u
s
o
f
f
icia
ls
w
h
o
ar
e
u
n
co
n
s
cio
u
s
o
f
m
o
v
e
m
en
t
i
n
d
if
f
er
en
t
la
y
er
s
.
I
t
p
o
r
tr
ay
s
a
b
it
b
y
b
it
tech
n
iq
u
e
f
o
r
ch
ec
k
i
n
g
ac
ce
s
s
o
f
a
co
n
f
ir
m
ed
clien
t.
E
v
en
t
h
o
u
g
h
SP
B
A
C
i
s
m
o
r
e
s
ec
u
r
e
th
a
n
R
B
AC
,
D
A
C
a
n
d
MA
C
m
o
d
els,
th
e
li
m
ita
tio
n
s
ar
e
th
at
th
e
ch
ild
h
o
o
d
d
ir
ec
to
r
ies
in
DSD
d
o
n
o
t
ac
q
u
ir
e
task
s
f
r
o
m
v
ar
io
u
s
lev
elled
p
ar
en
t
in
d
e
x
es
an
d
d
u
p
licatin
g
an
d
m
o
v
in
g
t
h
e
r
e
g
is
tr
y
i
s
b
ey
o
n
d
t
h
e
r
ea
l
m
o
f
i
m
a
g
i
n
atio
n
r
ig
h
t
n
o
w
.
I
n
[
2
6
]
,
th
e
p
ap
er
p
r
o
p
o
s
es
a
d
ata
co
llectio
n
ap
p
r
o
ac
h
b
ased
o
n
a
h
eter
o
g
en
eo
u
s
t
w
o
-
tier
f
o
g
ar
ch
itect
u
r
e
f
o
r
f
o
g
-
b
ased
v
e
h
icle
cr
o
w
d
s
e
n
s
in
g
(
FB
VC
)
w
h
ic
h
ai
m
s
to
ac
h
ie
v
e
p
r
iv
ac
y
p
r
eser
v
atio
n
,
d
ata
ag
g
r
e
g
atio
n
,
a
n
d
tr
ac
ea
b
ilit
y
.
T
h
e
p
er
f
o
r
m
an
ce
ess
e
n
tials
t
h
at
m
u
s
t
b
e
ap
p
lie
d
w
h
e
n
d
esig
n
i
n
g
cr
o
w
d
-
s
en
s
in
g
u
p
lo
ad
in
g
a
n
d
p
r
iv
ac
y
p
r
o
tectio
n
m
ec
h
an
i
s
m
ar
e:
P
r
iv
ac
y
p
r
eser
v
at
io
n
,
d
ata
ag
g
r
eg
a
tio
n
,
s
ec
u
r
e
co
m
m
u
n
icatio
n
,
m
alicio
u
s
v
eh
icle
s
.
T
h
e
p
r
o
p
o
s
ed
m
o
d
el
h
as
f
o
u
r
la
y
er
s
w
h
ic
h
ar
e:
-
Sen
s
in
g
la
y
er
–
P
er
f
o
r
m
s
p
r
iv
ac
y
p
r
o
tectio
n
an
d
r
ev
o
ca
tio
n
.
-
L
o
w
er
tier
Fo
g
–
P
er
f
o
r
m
s
j
o
in
t tr
ac
ea
b
ilit
y
.
-
Up
p
er
-
tier
Fo
g
–
P
er
f
o
r
m
s
s
ec
u
r
e
q
u
er
y
f
o
r
m
atio
n
a
n
d
ca
r
r
ies o
u
t th
is
s
ec
u
r
e
q
u
er
y
.
-
Ser
v
ice
L
a
y
er
–
P
er
f
o
r
m
s
d
ata
s
u
p
p
o
r
t,
d
ata
o
u
ts
o
u
r
cin
g
an
d
task
as
s
i
g
n
m
e
n
t
.
T
h
e
Fo
g
-
b
ased
j
o
in
t
r
ev
o
ca
ti
o
n
m
ec
h
an
is
m
i
n
v
o
l
v
es
t
h
e
f
o
llo
w
i
n
g
s
tep
s
:
I
n
itializatio
n
,
Ma
p
lis
t
p
r
e
-
tr
ea
t
m
e
n
t
b
y
f
o
g
b
u
s
es,
I
n
v
alid
d
ata
id
en
ti
f
icatio
n
,
a
n
d
Fo
g
B
ased
s
ec
u
r
it
y
s
ea
r
c
h
.
I
n
[
2
7
]
,
t
h
e
p
lato
o
n
in
g
co
n
tr
o
l
s
y
s
te
m
i
s
o
n
e
o
f
t
h
e
v
ar
io
u
s
s
y
s
te
m
s
u
s
e
d
to
co
n
tr
o
l
au
to
n
o
m
o
u
s
v
e
h
icles.
I
t
i
n
v
o
lv
es
a
s
y
s
te
m
t
h
a
t
co
n
tr
o
ls
th
e
lead
v
e
h
icle
’
s
s
p
ee
d
an
d
d
ir
ec
tio
n
.
T
h
is
d
ata
c
an
b
e
u
s
ed
b
y
th
e
t
h
ir
d
p
er
s
o
n
th
at
lead
s
to
d
ata
p
r
iv
ac
y
an
d
p
o
s
s
ib
l
y
s
er
v
ice
co
n
f
id
e
n
tialit
y
f
ail
u
r
e.
T
h
e
p
r
iv
ac
y
m
o
d
els d
is
c
u
s
s
ed
ar
e
:
-
Dif
f
er
en
t
ial
p
r
iv
ac
y
:
T
h
is
p
r
o
v
id
es p
r
iv
ac
y
w
h
e
n
t
w
o
d
atab
ases
d
if
f
er
b
y
a
s
i
n
g
le
ele
m
e
n
t
.
-
Dis
tr
ib
u
tio
n
al
p
r
iv
ac
y
:
T
h
is
al
lo
w
s
p
r
i
v
ac
y
w
h
e
n
d
atab
ases
d
if
f
er
i
n
all
o
f
t
h
eir
ele
m
e
n
t
s
.
-
C
r
o
w
d
-
b
len
d
i
n
g
p
r
i
v
ac
y
:
T
h
is
p
o
lic
y
s
a
y
s
ta
k
e
a
r
a
n
d
o
m
b
u
n
c
h
o
f
p
eo
p
le
an
d
ca
teg
o
r
is
es
b
ased
o
n
co
m
m
o
n
p
o
in
t
s
s
o
t
h
at
w
h
e
n
d
ata
is
ac
ce
s
s
ed
o
n
l
y
g
e
n
e
r
al
ch
ar
ac
ter
is
tic
s
t
u
r
n
u
p
o
f
th
e
cr
o
w
d
an
d
in
d
iv
id
u
al
p
r
iv
ac
y
is
g
u
ar
a
n
te
ed
.
-
R
an
d
o
m
r
esp
o
n
s
e
m
o
d
el
:
as
t
h
is
p
ap
er
s
u
g
g
es
ts
a
R
an
d
o
m
R
esp
o
n
s
e
m
o
d
el
-
b
ased
n
o
is
e
at
th
e
E
n
co
d
er
S
h
u
f
f
ler
tr
u
s
t
li
m
i
t
to
f
o
r
estall
v
in
d
ict
iv
e
s
h
u
f
f
ler
.
I
t
r
ec
o
m
m
en
d
s
h
a
v
i
n
g
a
n
ed
g
e
at
s
h
u
f
f
ler
an
al
y
s
er
tr
u
s
t
li
m
it
to
tu
r
n
a
w
a
y
d
an
g
er
s
a
n
d
ea
v
e
s
d
r
o
p
p
in
g
.
I
n
tr
o
d
u
ce
n
o
is
e
at
s
h
u
f
f
ler
an
al
y
s
er
in
t
er
f
ac
e
to
s
a
v
e
i
t
f
r
o
m
t
h
e
m
al
icio
u
s
an
al
y
s
er
.
-
E
SA
-
e
x
te
n
d
in
g
p
r
iv
ac
y
:
th
is
is
a
s
o
f
t
w
ar
e
t
h
at
d
ea
ls
w
it
h
en
co
d
in
g
,
s
h
u
f
f
le
a
n
d
an
al
y
s
e.
I
t
en
co
d
e
s
th
e
r
ec
o
r
d
s
an
d
s
h
u
f
f
le
s
th
e
m
an
d
an
al
y
s
e
t
h
e
in
co
m
i
n
g
s
h
u
f
f
led
r
ec
o
r
d
s
b
ased
o
n
th
e
en
cr
y
p
ted
k
e
y
s
.
I
n
[
2
8
]
,
T
h
e
P
ap
e
r
p
r
o
p
o
s
es
an
e
f
f
ec
tiv
e
p
r
i
v
ac
y
-
p
r
es
er
v
in
g
v
alid
atio
n
co
n
s
p
ir
e
f
o
r
en
er
g
y
in
ter
n
e
t
-
b
ased
v
e
h
icle
-
to
-
g
r
id
co
m
m
u
n
icatio
n
u
t
ilizi
n
g
li
g
h
t
w
ei
g
h
t
cr
y
p
to
g
r
ap
h
ic
n
ati
v
es,
f
o
r
ex
a
m
p
le,
s
i
n
g
le
d
ir
ec
tio
n
n
o
n
-
i
m
p
ac
t
h
a
s
h
ca
p
ac
ities
.
R
ig
h
t
n
o
w
,
ca
n
s
af
el
y
g
et
to
ad
m
i
n
i
s
tr
atio
n
s
g
a
v
e
b
y
a
s
p
ec
ialis
t
o
r
g
an
izatio
n
u
tili
zi
n
g
th
e
s
y
m
m
etr
ic
k
e
y
s
et
u
p
b
et
w
ee
n
th
e
m
.
T
o
g
u
ar
an
tee
d
ep
en
d
ab
le
ac
tiv
it
y
f
o
r
estalli
n
g
E
I
f
r
o
m
c
y
b
er
attac
k
s
is
a
n
ee
d
.
T
h
e
p
r
o
p
o
s
ed
p
lo
t
d
ep
en
d
s
o
n
h
ash
ca
p
ac
ities
an
d
a
th
r
e
e
-
p
ar
t
y
v
er
i
f
icat
io
n
an
d
k
e
y
tr
ad
e
co
n
v
e
n
tio
n
t
h
e
p
r
o
p
er
in
v
esti
g
a
tio
n
d
e
m
o
n
s
tr
ated
t
h
at
t
h
e
p
lan
i
s
A
K
E
-
s
ec
u
r
e
w
h
ich
i
s
ex
p
ec
ted
to
ac
co
m
p
lis
h
p
r
o
te
ctio
n
f
r
o
m
p
a
n
to
m
i
m
e
ass
a
u
lt
s
o
r
r
ep
la
y
as
s
a
u
lts
,
m
ee
t
in
g
k
e
y
s
ec
u
r
it
y
an
d
s
o
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
t J
E
lec
&
C
o
m
p
E
n
g
I
SS
N:
2
0
8
8
-
8708
A
s
u
r
ve
y
o
n
s
ec
u
r
ity
a
n
d
p
r
iva
cy
is
s
u
es in
I
o
V
(
Ta
n
vi
Ga
r
g
)
5415
f
o
r
th
.
I
n
f
o
r
m
al
s
ec
u
r
it
y
a
n
al
y
s
i
s
in
cl
u
d
es
t
h
e
f
o
llo
w
i
n
g
p
o
in
ts
:
P
r
o
tectio
n
ag
ain
s
t
f
o
r
g
er
y
attac
k
s
an
d
I
n
ter
ce
p
tio
n
attac
k
s
,
P
r
iv
ac
y
o
f
t
h
e
u
s
er
,
P
r
o
tectio
n
ag
ai
n
s
t c
o
m
p
r
o
m
is
ed
u
s
er
’
s
d
ev
ice
a
n
d
P
r
o
tectio
n
ag
ain
s
t
p
h
y
s
ical
attac
k
s
.
3.
T
H
RE
A
T
S
T
O
SE
CURE A
P
RIVAT
E
N
E
T
WO
RK
O
F
I
O
V
Dis
cu
s
s
ed
b
elo
w
ar
e
t
h
e
m
a
in
attac
k
s
an
d
t
h
r
ea
ts
to
t
h
e
p
r
iv
ac
y
m
en
tio
n
ed
i
n
t
h
e
p
ap
er
s
,
lik
e
t
h
e
a
u
t
h
o
r
[
2
9
]
,
m
e
n
tio
n
s
ab
o
u
t
t
h
e
v
ar
io
u
s
w
a
y
s
a
n
d
th
e
n
ee
d
to
p
r
o
tect
an
d
m
o
n
ito
r
d
ata
s
h
ar
i
n
g
to
p
r
eser
v
e
p
r
iv
ac
y
.
T
h
e
p
ap
er
s
m
en
tio
n
t
h
e
attac
k
s
d
ea
lt
w
it
h
attac
k
s
an
d
t
h
e
s
o
l
u
tio
n
s
t
o
th
ese
attac
k
s
,
t
h
a
t
h
ap
p
en
i
n
v
ar
io
u
s
o
th
er
f
iel
d
s
lik
e
h
ea
l
th
ca
r
e,
v
ar
io
u
s
t
ec
h
n
o
lo
g
ical
d
ev
ices
a
s
ad
d
r
ess
e
d
in
[
3
0
-
31
],
h
av
e
al
s
o
cr
ea
ted
a
ch
ao
s
in
t
h
e
I
o
V
s
ec
to
r
.
T
h
ese
attac
k
s
a
s
ex
p
lai
n
ed
ar
e:
-
S
y
b
il
attac
k
:
I
t
is
a
n
e
x
tr
e
m
e
attac
k
o
n
v
eh
icu
lar
ad
h
o
c
n
et
w
o
r
k
s
(
V
ANE
T
)
in
w
h
i
ch
th
e
a
ttack
e
r
p
er
n
icio
u
s
l
y
cla
i
m
s
o
r
ta
k
es
d
if
f
er
en
t
ch
ar
ac
ter
s
an
d
u
til
ize
th
ese
p
er
s
o
n
alitie
s
to
u
p
s
et
th
e
u
s
e
f
u
l
n
es
s
o
f
th
e
V
A
NE
T
ar
r
an
g
e
b
y
d
is
p
er
s
in
g
b
o
g
u
s
ch
ar
ac
ter
s
.
-
I
m
p
er
s
o
n
atio
n
attac
k
:
m
alicio
u
s
attac
k
er
s
m
a
y
ac
t
lik
e
le
g
it
i
m
ate
u
s
er
s
an
d
s
e
n
d
r
ep
o
r
ts
t
o
ea
r
n
b
en
ef
it
s
an
d
th
u
s
i
n
s
er
t
f
o
r
g
ed
r
ep
o
r
ts
w
h
ic
h
ca
n
co
n
f
u
s
e
a
n
d
m
i
s
lea
d
cu
s
to
m
er
s
.
T
h
is
i
s
an
i
m
p
er
s
o
n
atio
n
attac
k
.
-
Do
S
an
d
DDo
S
attac
k
s
:
D
en
ial
-
of
-
Ser
v
ice
(
Do
S
)
ass
au
lts
m
ea
n
t
o
m
ak
e
s
u
b
s
ta
n
ti
al
ex
er
cises
o
f
a
f
r
a
m
e
w
o
r
k
i
n
ac
ce
s
s
ib
le.
B
ec
au
s
e
o
f
a
Do
S
a
s
s
a
u
lt,
at
tack
e
r
s
s
ca
n
't
s
p
ea
k
w
it
h
o
n
e
an
o
t
h
er
,
an
d
v
e
h
icle
s
d
o
n
'
t
g
e
t
o
r
g
an
ize
d
ata,
f
o
r
e
x
a
m
p
le,
s
tr
ee
t
s
tat
u
s
,
b
r
in
g
i
n
g
ab
o
u
t
ex
tr
e
m
e
o
u
tco
m
es.
I
n
a
Dis
tr
ib
u
te
d
Den
ial
-
of
-
Ser
v
ice
(
DDo
S)
as
s
au
lt,
n
o
d
es
co
u
ld
d
is
p
atch
an
ass
a
u
lt
f
r
o
m
v
ar
io
u
s
ar
ea
s
,
in
th
i
s
m
a
n
n
er
m
ak
in
g
a
n
y
d
is
co
v
er
y
h
ar
d
er
.
No
d
es
p
r
o
p
ellin
g
a
DDo
S
ass
a
u
lt
co
u
ld
e
x
p
ec
t
to
h
u
r
t
th
e
v
e
h
icles
i
n
th
e
s
y
s
te
m
y
et,
in
ad
d
itio
n
,
R
S
Us,
w
h
ic
h
ar
e
a
s
ig
n
i
f
i
ca
n
t p
ar
t o
f
th
e
f
o
u
n
d
atio
n
i
n
V
A
NE
T
s
.
-
Data
n
o
n
-
r
ep
u
d
iatio
n
:
I
t
is
a
l
eg
al
id
ea
th
a
t
is
b
r
o
ad
l
y
u
tili
z
ed
in
d
ata
s
ec
u
r
it
y
a
n
d
allu
d
e
s
to
ass
i
s
tan
ce
,
w
h
ic
h
co
n
f
ir
m
s
th
e
r
o
o
t o
f
in
f
o
r
m
at
io
n
an
d
t
h
e
tr
u
s
t
w
o
r
th
i
n
ess
o
f
t
h
e
in
f
o
r
m
a
tio
n
.
-
R
ep
la
y
attac
k
s
:
I
t
ex
p
lo
it
s
t
h
e
co
n
d
itio
n
s
o
f
t
h
e
n
e
t
w
o
r
k
b
y
s
to
r
in
g
t
h
e
m
e
s
s
a
g
es
to
r
eu
s
e
it
later
w
h
e
n
i
t
b
ec
o
m
e
s
in
v
alid
an
d
is
n
o
t tr
u
e.
-
Fo
r
g
er
y
attac
k
s
: T
h
e
attac
k
er
f
ak
es to
b
e
a
u
s
er
d
ev
ice
a
n
d
co
n
tr
o
ls
all
th
e
co
m
m
a
n
d
s
-
E
av
esd
r
o
p
p
in
g
attac
k
:
also
k
n
o
w
n
as
s
n
if
f
i
n
g
o
r
s
n
o
o
p
in
g
attac
k
,
h
ap
p
en
s
w
h
e
n
an
u
n
ap
p
r
o
v
ed
p
ar
ty
tak
es,
alter
s
o
r
er
ases
b
asic d
at
a
th
at
is
tr
a
n
s
m
itted
b
et
w
ee
n
t
w
o
elec
tr
o
n
ic
g
ad
g
et
s
.
-
Au
x
iliar
y
at
tack
: W
h
er
e
th
e
at
tack
er
co
llu
d
es to
co
m
p
r
is
e
t
h
e
p
r
iv
ac
y
b
y
t
h
e
ag
g
r
eg
ato
r
s
-
Ma
n
i
n
t
h
e
Mid
d
le
(
MI
T
M)
Attack
s
: T
h
e
m
a
n
-
in
-
t
h
e
-
m
id
d
le
id
ea
is
t
h
e
p
lace
a
n
ag
g
r
es
s
o
r
o
r
p
r
o
g
r
am
m
er
ca
p
tu
r
es
a
co
r
r
esp
o
n
d
en
ce
b
et
w
ee
n
t
w
o
f
r
a
m
e
w
o
r
k
s
.
I
t
is
a
h
az
ar
d
o
u
s
ass
a
u
lt
s
i
n
ce
i
t
is
o
n
e
w
h
er
e
th
e
a
s
s
aila
n
t
ac
t
s
li
k
e
th
e
f
i
r
s
t
s
e
n
d
er
.
As
t
h
e
a
s
s
aila
n
t
h
as
th
e
f
ir
s
t
co
r
r
esp
o
n
d
en
ce
,
th
e
y
ca
n
f
o
o
l
th
e
b
en
e
f
iciar
y
i
n
to
s
p
ec
u
latio
n
th
e
y
ar
e
as
y
et
g
etti
n
g
a
r
ea
l m
es
s
ag
e
.
I
n
T
ab
le
1
,
w
e
ad
d
r
ess
th
e
d
if
f
er
e
n
t
p
r
o
tectio
n
an
d
s
ec
u
r
it
y
is
s
u
es
a
n
d
d
r
aw
a
co
r
r
elatio
n
th
at
ex
p
r
ess
es
all
t
h
e
i
s
s
u
es
h
ap
p
en
in
g
in
d
i
f
f
er
en
t
p
ap
er
s
.
T
h
is
en
co
u
r
a
g
es
u
s
to
d
is
ti
n
g
u
i
s
h
s
er
io
u
s
is
s
u
e
s
an
d
th
u
s
l
y
,
ca
u
s
es u
s
to
ch
ip
a
w
a
y
at
th
e
m
a
n
d
in
f
er
a
s
o
lu
tio
n
r
e
m
e
m
b
er
i
n
g
th
e
s
e.
T
ab
le
1
.
P
r
iv
ac
y
a
n
d
s
ec
u
r
it
y
i
s
s
u
es a
d
d
r
ess
ed
in
p
r
ev
io
u
s
lit
er
atu
r
e
[
1
3
]
[
1
5
]
[
2
6
]
[
2
2
]
[
2
3
]
[
2
4
]
[
1
2
]
[
2
1
]
[
2
5
]
[
1
7
]
[
1
9
]
[
1
6
]
T
r
u
st
e
d
T
h
i
r
d
-
P
a
r
t
y
V
a
l
i
d
a
t
i
o
n
D
a
t
a
e
n
c
r
y
p
t
i
o
n
A
u
t
h
e
n
t
i
c
a
t
i
o
n
S
y
b
i
l
A
t
t
a
c
k
s
I
mp
e
r
so
n
a
t
i
o
n
A
t
t
a
c
k
s
P
r
i
v
a
c
y
Te
c
h
n
i
q
u
e
s fo
r
v
e
h
i
c
l
e
s
P
r
i
v
a
c
y
t
e
c
h
n
i
q
u
e
s fo
r
n
a
v
i
g
a
t
i
o
n
F
a
i
r
n
e
ss
D
o
S
A
t
t
a
c
k
s
D
D
o
S
A
t
t
a
c
k
s
D
a
t
a
n
o
n
-
r
e
p
u
d
i
a
t
i
o
n
A
c
c
e
ss C
o
n
t
r
o
l
R
e
p
l
a
y
A
t
t
a
c
k
s
F
o
r
g
e
r
y
A
t
t
a
c
k
s
Ea
v
e
sd
r
o
p
p
i
n
g
a
t
t
a
c
k
A
u
x
i
l
i
a
r
y
a
t
t
a
c
k
C
o
l
l
u
si
o
n
R
e
si
st
a
n
c
e
D
a
t
a
I
n
t
e
g
r
i
t
y
M
a
n
i
n
t
h
e
M
i
d
d
l
e
A
t
t
a
c
k
s
S
e
ssi
o
n
K
e
y
S
e
c
u
r
i
t
y
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8708
I
n
t J
E
lec
&
C
o
m
p
E
n
g
,
Vo
l.
10
,
No
.
5
,
Octo
b
e
r
2
0
2
0
:
5
4
0
9
-
5419
5416
4.
P
RO
P
O
SE
D
SO
L
UT
I
O
NS
T
O
T
H
E
CH
AL
L
E
NG
E
S
O
F
SE
C
UR
I
T
Y
AND
P
R
I
V
ACY
I
S
SU
E
S
I
N
I
O
V
As
s
h
o
w
n
ab
o
v
e,
ar
e
s
o
m
e
o
f
th
e
m
aj
o
r
p
r
o
b
lem
s
th
a
t
ac
t
as
a
b
ar
r
ier
f
o
r
a
s
ec
u
r
e
an
d
s
a
f
e
n
et
w
o
r
k
th
at
a
ls
o
h
i
n
d
er
s
w
i
th
t
h
e
p
r
iv
ac
y
o
f
it
s
clie
n
t
s
.
T
o
en
h
a
n
ce
t
h
e
q
u
alit
y
o
f
t
h
e
ar
ch
it
ec
tu
r
e
a
n
d
p
r
ev
e
n
t
m
is
h
ap
s
d
u
e
to
attac
k
s
,
t
h
er
e
ar
e
a
f
e
w
s
o
lu
tio
n
s
s
u
g
g
e
s
ted
b
elo
w
:
4
.
1
.
Aut
hentic
a
t
io
n
T
h
is
g
u
ar
a
n
tees
t
h
at
a
n
y
t
wo
co
r
r
esp
o
n
d
en
ce
u
n
its
ca
n
v
er
if
y
t
h
e
in
f
o
r
m
at
io
n
i
n
tr
an
s
m
i
s
s
io
n
.
Sen
s
iti
v
e
d
ata
ca
n
b
e
s
af
eg
u
ar
d
ed
u
s
in
g
d
ata
en
cr
y
p
tio
n
.
Ho
w
e
v
er
,
d
ata
en
cr
y
p
tio
n
tr
ig
g
er
s
h
u
g
e
o
b
s
tacle
s
i
n
ter
m
s
o
f
i
n
f
o
r
m
atio
n
s
h
ar
in
g
a
n
d
s
ea
r
ch
i
n
g
s
i
n
ce
in
I
o
V,
s
h
a
r
ed
d
ata
is
u
s
ed
b
y
o
th
er
v
eh
i
cles
in
t
h
e
n
et
w
o
r
k
to
k
n
o
w
t
h
e
r
ea
l
-
ti
m
e
i
n
f
o
r
m
a
tio
n
o
f
tr
a
f
f
ic
etc.
So
u
r
ce
s
o
f
d
ata
m
u
s
t
b
e
v
er
i
f
ied
to
m
ak
e
s
u
r
e
t
h
at
u
n
tr
u
s
ted
o
r
m
alic
io
u
s
r
ep
o
r
ts
d
o
n
o
t r
ea
ch
cu
s
to
m
er
s
s
i
n
ce
th
i
s
m
a
y
le
ad
cu
s
to
m
er
s
to
m
ak
e
w
r
o
n
g
d
ec
is
io
n
s
.
4
.
2
.
Acc
ess
co
ntr
o
l
T
h
is
in
ten
d
s
to
co
n
s
tr
ai
n
f
o
g
n
o
d
e
j
u
s
t
to
le
g
al
ele
m
en
t
s
.
T
h
is
ca
n
b
e
i
m
p
r
o
v
ed
b
y
u
s
i
n
g
E
C
U
s
.
C
o
n
tr
o
l
ca
n
also
b
e
g
i
v
e
n
to
t
h
e
tr
u
s
ted
t
h
ir
d
p
ar
t
y
w
h
o
a
u
t
h
en
t
icate
s
th
e
u
s
er
s
b
e
f
o
r
e
ad
d
in
g
o
r
g
i
v
in
g
o
u
t
an
y
i
n
f
o
r
m
atio
n
to
th
e
OB
Us.
4
.
3
.
Co
nfident
ia
lity
Gu
ar
an
tee
s
t
h
at
an
y
ill
icit e
n
d
ea
v
o
u
r
s
to
m
es
s
w
it
h
in
f
o
r
m
a
t
io
n
at
-
r
es
t o
r
d
ata
-
in
-
tr
a
n
s
it i
n
v
eh
ic
u
lar
h
az
e
r
eg
is
ter
in
g
f
r
a
m
e
w
o
r
k
w
i
ll b
e
id
en
tif
ied
an
d
f
o
r
estalled
.
4
.
4
.
I
nte
g
rit
y
Gu
ar
an
tee
s
t
h
at
an
y
ill
icit
a
n
d
u
n
la
w
f
u
l
e
n
d
ea
v
o
u
r
s
to
alte
r
th
e
d
ata
b
ein
g
tr
an
s
m
i
tted
o
r
p
u
t
a
w
a
y
w
il
l b
e
d
is
ti
n
g
u
i
s
h
ed
.
I
n
a
v
eh
icu
lar
f
o
g
co
m
p
u
ti
n
g
f
r
a
m
e
w
o
r
k
,
it is
b
asic
th
at
th
e
tr
u
s
t
w
o
r
t
h
in
e
s
s
p
r
er
eq
u
is
ite
is
m
et
s
in
ce
u
n
s
a
n
ctio
n
ed
alte
r
atio
n
m
a
y
b
r
i
n
g
ab
o
u
t
g
en
u
i
n
e
as
w
ell
as
d
ep
lo
r
ab
le
o
u
tco
m
es,
p
ar
tic
u
lar
l
y
i
n
lif
e
-
b
asic
v
eh
ic
u
lar
ap
p
licatio
n
s
etti
n
g
s
,
f
o
r
ex
a
m
p
le,
a
tr
af
f
ic
co
n
tr
o
l f
r
a
m
e
w
o
r
k
.
4
.
5
.
No
n
-
re
pu
dia
t
io
n
Gu
ar
an
tee
s
t
h
at
a
n
y
ar
ticle
i
n
th
e
f
r
a
m
e
w
o
r
k
ca
n
't
f
ix
a
p
ast
ac
ti
v
it
y
,
f
o
r
e
x
a
m
p
le,
t
h
e
s
en
d
in
g
o
r
g
etti
n
g
o
f
in
f
o
r
m
a
tio
n
.
4
.
6
.
Av
a
ila
bil
it
y
A
t
w
h
ate
v
er
p
o
in
t,
v
e
h
icu
lar
ap
p
licatio
n
en
d
ea
v
o
u
r
s
to
g
et
to
th
e
f
o
g
n
o
d
es
o
r
clo
u
d
s
er
v
er
s
,
th
e
y
s
h
o
u
ld
co
n
s
i
s
te
n
tl
y
b
e
p
r
ep
ar
ed
f
o
r
tr
an
s
m
is
s
io
n
o
r
r
ec
o
v
er
y
o
f
i
n
f
o
r
m
atio
n
f
i
g
u
r
e
.
4
.
7
.
Relia
bil
it
y
Gu
ar
an
tee
s
t
h
at
all
t
h
e
d
ata
co
llected
f
r
o
m
f
o
g
n
o
d
es
an
d
s
m
ar
t
v
e
h
icle
s
ar
e
n
o
t
f
ictitio
u
s
o
r
u
n
tr
u
e.
Fo
r
th
is
t
h
e
r
o
u
ter
s
s
h
o
u
ld
r
o
u
te
th
e
d
ata
to
th
e
r
eq
u
ir
ed
ce
n
t
r
al
s
y
s
te
m
b
y
lo
o
k
i
n
g
at
th
e
lo
ca
tio
n
,
p
r
ev
en
ti
n
g
co
n
f
u
s
io
n
o
f
d
ata.
T
h
e
d
ata
r
ec
eiv
ed
s
h
o
u
ld
also
b
e
ti
m
e
-
s
ta
m
p
ed
an
d
ta
k
en
i
n
to
co
n
s
id
er
atio
n
f
o
r
o
n
l
y
a
p
ar
ticu
lar
a
m
o
u
n
t
o
f
ti
m
e
af
ter
w
h
ich
th
e
p
ac
k
et
w
ill
d
is
ca
r
d
an
d
n
e
w
i
n
f
o
r
m
atio
n
h
a
s
to
co
m
e
i
n
.
T
h
e
u
s
er
s
s
e
n
d
in
g
t
h
i
s
in
f
o
r
m
atio
n
h
a
s
to
b
e
r
eg
is
ter
ed
w
it
h
t
h
e
s
y
s
te
m
.
T
r
u
s
t
is
a
n
i
m
p
o
r
tan
t
co
n
ce
p
t
to
ac
co
m
p
li
s
h
s
ec
u
r
it
y
in
th
e
s
y
s
te
m
,
w
h
er
e
ea
c
h
v
eh
i
cle
o
n
c
e
f
u
r
n
i
s
h
ed
w
it
h
a
f
it
tin
g
tr
u
s
t
m
o
d
el
ca
n
a
s
s
e
s
s
th
e
d
ep
en
d
ab
ilit
y
o
f
th
e
g
o
t d
ata
an
d
its
s
e
n
d
er
[
32
].
4
.
8
.
P
re
v
ent
io
n a
g
a
ins
t
a
t
t
a
ck
s
Sev
er
al
d
i
f
f
er
en
t
k
in
d
s
o
f
m
alicio
u
s
attac
k
s
ca
n
b
e
t
r
ied
ag
ai
n
s
t
th
e
d
ata
g
en
er
ated
lik
e
i
m
p
er
s
o
n
atio
n
attac
k
s
,
f
o
r
g
er
y
a
ttack
s
,
DOS
attac
k
s
,
S
y
b
i
l
attac
k
s
,
etc.
Of
te
n
,
m
al
icio
u
s
attac
k
er
s
m
a
y
ac
t
lik
e
le
g
it
i
m
ate
u
s
er
s
a
n
d
s
e
n
d
r
ep
o
r
ts
to
ea
r
n
b
en
e
f
it
s
a
n
d
t
h
u
s
i
n
s
er
t
f
o
r
g
ed
r
ep
o
r
ts
w
h
ic
h
ca
n
co
n
f
u
s
e
a
n
d
m
is
lead
cu
s
to
m
er
s
.
T
h
is
is
a
n
i
m
p
er
s
o
n
atio
n
attac
k
.
Attack
er
s
m
a
y
lik
e
w
is
e
f
o
r
g
e
d
if
f
er
en
t
p
er
s
o
n
alit
ies
to
co
n
v
e
y
u
n
iq
u
e
o
r
in
d
is
ti
n
g
u
is
h
ab
le
in
f
o
r
m
at
io
n
to
g
et
m
o
r
e
r
e
w
ar
d
s
o
r
p
r
ev
ail
i
n
th
e
f
ac
t
u
al
ch
o
i
ce
p
r
o
ce
d
u
r
e
o
n
r
ep
o
r
ts
.
T
h
is
i
s
a
S
y
b
i
l
ass
a
u
lt.
T
o
o
p
p
o
s
e
s
u
c
h
a
s
s
a
u
lts
,
b
o
y
co
tt
b
ased
v
er
i
f
i
ca
tio
n
o
u
g
h
t
to
b
e
m
an
u
f
ac
t
u
r
ed
,
an
d
p
r
o
d
u
ctiv
e
d
is
co
v
er
y
tec
h
n
iq
u
e
s
o
n
S
y
b
il
ag
g
r
ess
o
r
s
ar
e
r
eq
u
ir
ed
f
o
r
th
e
clo
u
d
.
I
n
DO
S
ass
a
u
lts
,
a
s
er
v
er
is
b
lo
ck
ed
b
y
lo
ad
s
o
f
u
s
e
less
i
n
f
o
r
m
ati
o
n
an
d
to
p
r
ev
en
t
t
h
ese
attac
k
s
,
t
h
er
e
n
ee
d
to
b
e
au
th
e
n
tica
ted
u
s
er
s
w
h
o
ca
n
s
en
d
an
d
ac
ce
s
s
i
n
f
o
r
m
atio
n
t
h
r
o
u
g
h
t
h
e
s
er
v
er
,
av
o
id
i
n
g
a
n
y
r
a
n
d
o
m
attac
k
s
.
I
n
f
o
r
g
er
y
a
ttack
s
,
th
e
attac
k
er
ac
ts
as
a
u
s
er
d
ev
ice
o
r
th
e
OB
U
s
en
d
i
n
g
o
u
t
co
m
m
an
d
s
to
co
n
tr
o
l
th
e
n
e
t
w
o
r
k
,
to
co
n
tr
o
l
th
i
s
t
y
p
e
o
f
attac
k
s
,
t
h
e
o
r
ig
i
n
al
OB
U
s
h
o
u
ld
b
e
p
r
o
tecte
d
w
it
h
all
s
tep
s
o
f
au
th
e
n
tica
tio
n
a
n
d
allo
w
o
n
l
y
v
er
if
ied
u
s
er
s
s
h
o
u
ld
b
e
allo
w
ed
to
en
ter
t
h
e
n
et
w
o
r
k
p
r
ev
en
ti
n
g
a
n
y
o
u
t
s
id
er
g
etti
n
g
ac
ce
s
s
to
an
y
p
ar
t
o
f
th
e
s
y
s
te
m
.
An
ea
v
esd
r
o
p
p
in
g
attac
k
,
th
e
attac
k
er
ac
ce
s
s
es
th
e
lo
ca
tio
n
o
f
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
t J
E
lec
&
C
o
m
p
E
n
g
I
SS
N:
2
0
8
8
-
8708
A
s
u
r
ve
y
o
n
s
ec
u
r
ity
a
n
d
p
r
iva
cy
is
s
u
es in
I
o
V
(
Ta
n
vi
Ga
r
g
)
5417
th
e
u
s
er
,
d
r
iv
i
n
g
in
f
o
r
m
a
tio
n
an
d
to
p
r
ev
en
t
th
is
t
h
e
co
n
c
ep
t
o
f
p
s
eu
d
o
n
y
m
s
ca
n
b
e
u
s
ed
s
in
ce
t
h
e
n
a
m
e
ch
an
g
es
n
o
w
a
n
d
th
e
n
th
e
u
s
e
r
w
o
n
'
t
b
e
ab
le
to
tr
ac
k
th
e
ac
tiv
itie
s
o
f
t
h
e
v
e
h
icle
m
ai
n
tai
n
in
g
t
h
e
in
d
i
v
id
u
a
l
p
r
iv
ac
y
o
f
t
h
e
v
e
h
icle.
Dep
lo
y
m
e
n
t
o
f
an
u
n
a
u
t
h
o
r
ized
d
e
v
ice
ca
n
lead
to
f
al
s
e
d
ata
in
j
ec
tio
n
w
h
ich
ca
n
s
ev
er
el
y
h
a
m
p
er
th
e
p
er
f
o
r
m
a
n
ce
o
f
t
h
e
n
et
w
o
r
k
[
3
3
].
4
.
9
.
P
ri
v
a
cy
An
o
n
y
m
it
y
tech
n
iq
u
e
s
lik
e
p
s
eu
d
o
n
y
m
s
,
g
r
o
u
p
s
i
g
n
at
u
r
es,
an
d
k
-
a
n
o
n
y
m
it
y
ca
n
b
e
u
s
ed
to
p
r
o
tect
v
eh
ic
les
’
p
r
iv
ac
y
.
B
y
u
s
in
g
s
u
ch
tec
h
n
iq
u
es,
v
i
n
d
icti
v
e
a
g
g
r
ess
o
r
s
ar
e
n
o
t a
b
le
to
s
ep
ar
ate
v
eh
ic
les d
ep
en
d
e
n
t
o
n
s
w
ar
m
d
etec
tin
g
in
f
o
r
m
a
tio
n
.
I
n
an
y
ca
s
e,
it
tu
r
n
s
o
u
t
to
b
e
d
if
f
icu
lt
f
o
r
th
e
clo
u
d
to
ap
p
r
o
p
r
iate
ad
v
an
ta
g
es
to
th
e
co
m
p
ar
i
n
g
v
eh
ic
les
as
p
er
th
eir
p
ar
ticu
la
r
co
m
m
it
m
e
n
ts
to
u
n
d
er
tak
i
n
g
s
o
n
ce
t
h
e
g
r
o
u
p
d
etec
tin
g
r
ep
o
r
ts
ar
e
k
ep
t
u
n
k
n
o
w
n
.
W
h
et
h
er
o
r
n
o
t
s
w
ar
m
d
etec
tin
g
in
f
o
r
m
a
tio
n
is
co
n
v
e
y
ed
n
a
m
eles
s
l
y
,
clien
t
s
m
i
g
h
t
n
ee
d
to
d
is
c
h
ar
g
e
t
h
eir
g
r
o
u
p
d
etec
tin
g
er
r
an
d
s
w
it
h
o
u
t
u
n
v
e
ili
n
g
th
eir
ch
ar
ac
ter
s
.
T
h
e
ass
ig
n
m
en
t
s
m
ad
e
o
p
en
m
a
y
co
n
tai
n
s
o
m
e
f
r
a
g
ile
d
ata
f
r
o
m
w
h
ich
t
h
e
a
g
g
r
e
s
s
o
r
s
ca
n
f
o
r
esee
t
h
e
r
ea
s
o
n
s
w
h
y
cl
ien
t
s
n
ee
d
to
g
i
v
e
th
e
s
e
er
r
an
d
s
.
Su
b
s
eq
u
e
n
tl
y
,
h
o
w
to
d
esig
n
ate
t
h
e
clo
u
d
to
p
lay
o
u
t
th
e
g
r
o
u
p
d
etec
tin
g
a
s
s
i
g
n
m
en
t
s
is
f
u
n
d
a
m
en
tal
f
o
r
clie
n
ts
w
i
th
t
h
e
r
ea
s
o
n
s
f
o
r
s
ec
u
r
it
y
p
r
o
tectio
n
an
d
th
e
n
atu
r
e
o
f
ad
m
in
i
s
tr
atio
n
e
n
s
u
r
es.
T
o
g
e
t
g
r
ea
t
o
u
tco
m
es,
o
n
e
e
x
c
h
an
g
e
o
f
f
is
to
u
n
co
v
er
t
h
e
u
n
d
er
tak
in
g
s
,
h
o
w
e
v
er
,
s
ec
u
r
e
t
h
e
p
er
s
o
n
ali
ties
o
f
t
h
e
clien
t
s
.
T
h
is
s
ca
r
i
f
icat
io
n
i
s
a
d
eq
u
ate
f
o
r
clie
n
ts
s
i
n
ce
t
h
e
c
lo
u
d
ca
n
'
t
i
n
ter
f
ac
e
th
e
p
er
s
o
n
alitie
s
o
f
clien
t
s
w
i
th
th
e
s
u
b
s
ta
n
ce
o
f
ass
i
g
n
m
e
n
ts
,
h
o
w
e
v
er
,
ac
h
iev
e
s
th
e
er
r
an
d
s
s
u
cc
e
s
s
f
u
ll
y
.
An
o
th
er
tech
n
iq
u
e
f
o
r
ac
co
m
p
lis
h
i
n
g
s
ec
u
r
it
y
co
u
ld
b
e
b
y
ac
tu
al
izin
g
o
u
tr
ag
eo
u
s
f
o
c
u
s
es
p
r
o
tectio
n
[
3
4
]
w
h
ic
h
ab
u
s
es
t
h
e
id
ea
o
f
th
e
en
d
f
o
cu
s
e
s
th
at
ar
e
r
eg
u
lar
b
et
w
ee
n
v
e
h
ic
u
lar
s
o
cial
n
et
w
o
r
k
s
(
VSNs
)
clien
t
s
to
m
ak
e
s
h
ar
ed
zo
n
es to
a
n
o
n
y
m
ize
th
e
m
.
4
.
1
0
.
T
rus
t
ed
t
hird
-
pa
rt
y
in
v
o
lv
e
m
ent
A
tr
u
s
ted
t
h
ir
d
p
ar
ty
i
s
r
eq
u
ir
e
d
to
au
th
en
ticate
t
h
e
u
s
er
s
b
ef
o
r
e
ad
d
in
g
th
e
m
to
th
e
g
r
o
u
p
an
d
g
i
v
i
n
g
th
e
m
t
h
e
s
ec
u
r
it
y
k
e
y
.
T
h
er
ef
o
r
e,
w
e
n
ee
d
an
u
n
b
iased
th
ir
d
p
ar
ty
to
au
th
o
r
ize
ev
e
r
y
v
eh
ic
le
en
ter
in
g
th
e
n
et
w
o
r
k
an
d
ac
ti
v
it
y
t
h
at
t
ak
es p
lace
p
r
ev
en
t
in
g
m
alicio
u
s
attac
k
s
li
k
e
i
m
p
er
s
o
n
atio
n
attac
k
s
,
f
o
r
g
er
y
etc.
5.
CO
NCLU
SI
O
N
Fra
m
e
w
o
r
k
in
I
o
V
s
to
r
es
a
g
r
ea
t
d
ea
l
o
f
i
n
d
iv
id
u
al
i
n
f
o
r
m
atio
n
li
k
e
ar
ea
,
s
o
u
r
ce
p
o
s
i
tio
n
,
g
o
al,
an
d
s
o
o
n
an
d
in
th
is
w
a
y
k
ee
p
in
g
u
p
s
ec
u
r
it
y
a
n
d
p
r
o
tecti
o
n
is
an
ex
ce
p
tio
n
a
ll
y
m
i
n
o
r
u
n
d
er
tak
in
g
f
o
r
th
e
m
.
An
ac
h
ie
v
e
m
en
t
i
n
t
h
e
f
ie
ld
o
f
I
o
V
h
as
p
r
o
m
p
ted
d
if
f
er
e
n
t
r
esear
ch
i
n
th
e
f
ield
,
r
ec
o
m
m
e
n
d
in
g
v
ar
io
u
s
k
i
n
d
s
o
f
s
ec
u
r
it
y
an
d
p
r
o
tectio
n
c
h
a
llen
g
es
i
n
t
h
i
s
f
ield
a
n
d
th
eir
an
s
w
er
s
.
T
h
er
e
i
s
a
cr
itical
n
ee
d
t
o
ad
d
r
ess
th
i
s
s
u
b
j
ec
t a
s
a
r
esu
lt o
f
t
h
e
p
r
o
g
r
ess
io
n
i
n
v
eh
icle
s
an
d
e
v
er
y
t
h
i
n
g
b
ei
n
g
tr
a
n
s
f
er
r
ed
o
n
th
e
w
e
b
.
T
h
is
p
ap
er
ex
am
in
e
s
th
e
d
i
f
f
er
en
t
is
s
u
e
s
th
at
t
h
w
ar
t
t
h
e
s
ec
u
r
it
y
a
n
d
p
r
o
tectio
n
o
f
I
o
V
lik
e
DO
S
ass
a
u
lts
,
R
ep
la
y
a
s
s
a
u
lts
,
Fo
r
g
er
y
ass
a
u
lt
s
,
a
n
a
s
s
o
ciatio
n
o
f
o
u
ts
id
er
a
n
d
s
o
f
o
r
t
h
.
T
o
b
ea
t
th
e
s
e
i
s
s
u
es,
it
is
ex
a
m
in
ed
t
h
at
b
o
th
th
e
c
lien
t
s
an
d
t
h
e
s
tr
u
ct
u
r
es
s
h
o
u
ld
b
e
p
r
o
d
u
ctiv
e
an
d
co
n
tr
ib
u
te
s
i
m
ilar
l
y
to
k
ee
p
u
p
th
e
u
n
iq
u
e
n
es
s
o
f
th
e
clie
n
t
.
W
e
h
av
e
p
r
o
p
o
s
ed
a
c
o
u
p
le
o
f
ar
r
an
g
e
m
e
n
ts
i
n
th
is
p
ap
er
to
m
an
a
g
e
th
e
r
ef
er
e
n
ce
d
ass
a
u
lt
s
.
T
h
e
f
u
tu
r
e
e
x
ten
t
o
f
t
h
is
p
ap
er
will
b
e
a
p
lan
o
f
a
m
o
d
el
t
h
at
g
iv
e
s
a
n
s
w
er
s
to
th
ese
d
i
f
f
icu
l
ties
.
RE
F
E
R
E
NC
E
S
[1
]
I.
W
a
g
n
e
r
,
“
Nu
m
b
e
r
o
f
P
a
ss
e
n
g
e
r
Ca
rs
a
n
d
Co
m
m
e
r
c
ial
V
e
h
i
c
les
in
Us
e
W
o
rld
w
id
e
F
ro
m
2
0
0
6
to
2
0
1
5
in
(1
,
0
0
0
Un
it
s)
,
”
S
ta
ti
sta
,
2
0
1
8
.
[2
]
J.
Vo
e
lck
e
r
,
“
It’s
Off
icia
l:
W
e
No
w
Ha
v
e
On
e
Bil
li
o
n
V
e
h
icle
s
o
n
t
h
e
P
lan
e
t
,
”
Gr
e
e
n
Ca
r
Rep
o
rts
,
2
0
1
1
.
[3
]
S
.
A
l
-
S
u
lt
a
n
,
e
t
a
l.
,
“
A
c
o
m
p
re
h
e
n
siv
e
su
rv
e
y
o
n
v
e
h
icu
lar
a
d
h
o
c
n
e
tw
o
rk
,
”
J
o
u
rn
a
l
o
f
Ne
tw
o
rk
a
n
d
Co
mp
u
t
er
Ap
p
l
ic
a
ti
o
n
s
,
v
o
l
.
3
7
,
n
o
.
1
,
p
p
.
3
8
0
-
3
9
2
,
Ja
n
.
2
0
1
4
.
[4
]
M.
N.
O.
S
a
d
ik
u
,
e
t
a
l.
,
“
In
tern
e
t
o
f
V
e
h
icle
s:
a
n
In
tro
d
u
c
ti
o
n
,”
In
ter
n
a
t
io
n
a
l
J
o
u
r
n
a
l
o
f
Ad
v
a
n
c
e
d
Res
e
a
rc
h
in
Co
mp
u
ter
S
c
ien
c
e
a
n
d
S
o
f
twa
re
En
g
i
n
e
e
rin
g,
v
o
l.
8
,
n
o
.
1
,
p
p
.
1
1
-
1
3
,
Ja
n
.
2
0
1
8
.
[5
]
Y.
F
a
n
g
c
h
u
n
,
e
t
a
l.
,
“
A
n
o
v
e
rv
ie
w
o
f
In
tern
e
t
o
f
V
e
h
icle
s,”
Ch
i
n
a
Co
mm
u
n
ica
ti
o
n
s
,
v
o
l
.
1
1
,
n
o
.
1
0
,
p
p
.
1
-
1
5
,
2
0
1
4
.
[6
]
M
.
Nitt
i,
e
t
a
l.
,
“
On
a
d
d
i
n
g
th
e
so
c
ial
d
im
e
n
sio
n
to
th
e
In
tern
e
t
o
f
V
e
h
icle
s:
F
rien
d
sh
i
p
a
n
d
m
id
d
le
w
a
re
,
”
in
Pro
c
e
e
d
in
g
s o
f
IEE
E
I
nt
e
rn
a
t
i
o
n
a
l
Bl
a
c
k
S
e
a
Co
n
f
e
re
n
c
e
o
n
Co
mm
u
n
ica
ti
o
n
s a
n
d
Ne
t
w
o
rk
in
g
,
O
d
e
ss
a
,
Uk
ra
in
e
,
p
p
.
1
3
4
-
138
,
2
0
1
4
.
[7
]
M
.
G
e
rla
,
e
t
a
l.
,
“
In
tern
e
t
o
f
V
e
h
icle
s:
F
ro
m
In
telli
g
e
n
t
G
rid
to
A
u
to
n
o
m
o
u
s
Ca
rs
a
n
d
V
e
h
icu
lar
Clo
u
d
s
,
”
2
0
1
4
IEE
E
W
o
rld
Fo
r
u
m o
n
In
ter
n
e
t
o
f
T
h
i
n
g
s (
W
F
-
Io
T
),
S
e
o
u
l
,
p
p
.
2
4
1
-
2
4
6
,
2
0
1
4
.
[8
]
K
.
S
h
a
,
e
t
a
l.
,
“
A
d
a
p
ti
v
e
P
riv
a
c
y
-
P
re
se
rv
in
g
A
u
th
e
n
ti
c
a
ti
o
n
in
V
e
h
icu
lar
Ne
tw
o
rk
s
,
”
2
0
0
6
Fi
rs
t
In
ter
n
a
ti
o
n
a
l
Co
n
fer
e
n
c
e
o
n
Co
mm
u
n
ica
t
io
n
s a
n
d
Ne
tw
o
rk
in
g
in
C
h
i
n
a
,
Be
ij
in
g
,
p
p
.
1
-
8
,
2
0
0
6
.
[9
]
Y
.
S
u
n
,
e
t
a
l.
,
“
S
e
c
u
rit
y
a
n
d
P
r
iv
a
c
y
in
th
e
I
n
tern
e
t
o
f
V
e
h
icl
es
,
”
2
0
1
5
I
n
ter
n
a
ti
o
n
a
l
C
o
n
fer
e
n
c
e
o
n
Id
e
n
ti
fi
c
a
ti
o
n
,
In
fo
rm
a
t
io
n
,
a
n
d
Kn
o
wled
g
e
in
th
e
In
ter
n
e
t
o
f
T
h
in
g
s (
IIKI)
,
Be
ij
in
g
,
p
p
.
1
1
6
-
1
2
1
,
2
0
1
5
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8708
I
n
t J
E
lec
&
C
o
m
p
E
n
g
,
Vo
l.
10
,
No
.
5
,
Octo
b
e
r
2
0
2
0
:
5
4
0
9
-
5419
5418
[1
0
]
E.
K.
L
e
e
,
e
t
a
l.
,
“
In
ter
n
e
t
o
f
V
e
h
icle
s:
F
ro
m
In
telli
g
e
n
t
G
rid
t
o
A
u
to
n
o
m
o
u
s
Ca
rs
a
n
d
Ve
h
icu
lar
F
o
g
s,
”
In
ter
n
a
t
io
n
a
l
J
o
u
rn
a
l
o
f
Distri
b
u
t
e
d
S
e
n
so
r
Ne
two
rk
s
,
v
o
l.
1
2
,
n
o
.
9
,
p
p
.
1
-
1
4
,
2
0
1
6
.
[1
1
]
J
.
Ka
n
g
,
e
t
a
l.
,
“
L
o
c
a
ti
o
n
P
riv
a
c
y
A
tt
a
c
k
s
a
n
d
De
f
e
n
se
s
in
Clo
u
d
-
En
a
b
led
I
n
tern
e
t
o
f
V
e
h
icle
s
,
”
in
IEE
E
W
ire
les
s
Co
mm
u
n
ica
ti
o
n
s
,
v
o
l
.
2
3
,
n
o
.
5
,
p
p
.
5
2
-
5
9
,
Oc
t
.
2
0
1
6
.
[1
2
]
J
.
Jo
y
a
n
d
M
.
G
e
rla,
“
In
tern
e
t
o
f
V
e
h
icle
s
a
n
d
A
u
to
n
o
m
o
u
s
Co
n
n
e
c
ted
Ca
r
-
P
riv
a
c
y
a
n
d
S
e
c
u
rit
y
I
ss
u
e
s
,
”
2
0
1
7
2
6
t
h
In
ter
n
a
ti
o
n
a
l
C
o
n
fer
e
n
c
e
o
n
Co
mp
u
ter
Co
mm
u
n
ica
ti
o
n
a
n
d
N
e
two
rk
s (
ICCCN)
,
V
a
n
c
o
u
v
e
r,
p
p
.
1
-
9
,
2
0
1
7
.
[1
3
]
J
.
Ni,
e
t
a
l
.
,
“S
e
c
u
ri
ty
,
P
riv
a
c
y
,
a
n
d
F
a
ir
n
e
ss
in
F
o
g
-
Ba
se
d
V
e
h
i
c
u
lar
Cro
w
d
se
n
sin
g
,
”
in
IEE
E
C
o
mm
u
n
ic
a
ti
o
n
s
M
a
g
a
zin
e
,
v
o
l.
5
5
,
n
o
.
6
,
p
p
.
1
4
6
-
1
5
2
,
Ju
n
.
2
0
1
7
.
[1
4
]
J.
Ni
,
e
t
a
l.
,
“
P
riv
a
c
y
-
P
re
se
rv
in
g
Re
a
l
-
T
i
m
e
Na
v
ig
a
ti
o
n
S
y
ste
m
U
sin
g
V
e
h
icu
lar
Cro
w
d
so
u
rc
i
n
g
,
”
Pro
c
e
e
d
in
g
s
o
f
2
0
1
6
IE
EE
Veh
icu
la
r
T
e
c
h
n
o
lo
g
y
Co
n
fer
e
n
c
e
(
VT
C
-
Fa
ll
)
,
p
p
.
1
-
5
,
2
0
1
6
.
[1
5
]
J.
Ni,
e
t
a
l.
,
“
S
e
c
u
re
a
n
d
De
d
u
p
li
c
a
ted
S
p
a
ti
a
l
Cro
w
d
so
u
rc
in
g
:
A
F
o
g
-
Ba
se
d
A
p
p
ro
a
c
h
,
”
Pro
c
e
e
d
in
g
s
o
f
IEE
E
Glo
b
a
l
Co
mm
u
n
ica
ti
o
n
s Co
n
fer
e
n
c
e
(
GLOBE
COM
)
,
p
p
.
1
-
6
,
2
0
1
6
.
[1
6
]
C
.
Hu
a
n
g
,
e
t
a
l.
,
“
V
e
h
ic
u
lar
F
o
g
Co
m
p
u
ti
n
g
:
A
rc
h
it
e
c
tu
re
,
Us
e
Ca
se
,
a
n
d
S
e
c
u
rit
y
a
n
d
F
o
re
n
si
c
Ch
a
ll
e
n
g
e
s
,
”
in
IEE
E
Co
mm
u
n
ica
t
io
n
s M
a
g
a
zi
n
e
,
v
o
l.
5
5
,
n
o
.
1
1
,
p
p
.
1
0
5
-
1
1
1
,
No
v
.
2
0
1
7
.
[1
7
]
Q
.
Ko
n
g
,
e
t
a
l.
,
“
A
p
riv
a
c
y
-
p
re
s
e
rv
in
g
se
n
so
ry
d
a
ta
sh
a
rin
g
sc
h
e
m
e
in
I
n
tern
e
t
o
f
V
e
h
icle
s
,
”
F
u
t
u
re
Ge
n
e
ra
ti
o
n
Co
mp
u
ter
S
y
ste
ms
,
v
o
l.
9
2
,
p
p
.
6
4
4
-
6
5
5
,
M
a
r
.
2
0
1
9
.
[1
8
]
J
.
Jo
y
,
e
t
a
l.
,
“
In
tern
e
t
o
f
V
e
h
icle
s:
En
a
b
li
n
g
sa
f
e
,
se
c
u
re
,
a
n
d
p
riv
a
te
v
e
h
icu
lar
Cro
w
d
so
u
rc
in
g
,
”
In
ter
n
e
t
T
e
c
h
n
o
l
o
g
y
L
e
tt
e
rs
,
v
o
l.
1
,
n
o
.
1
,
p
p
.
1
-
6,
2
0
1
7
.
[1
9
]
L
.
Wan
g
,
e
t
a
l.
,
“
NO
T
S
A
:
No
v
e
l
OBU
w
it
h
T
h
re
e
-
Lev
e
l
S
e
c
u
rit
y
A
rc
h
it
e
c
tu
re
f
o
r
In
tern
e
t
o
f
V
e
h
icle
s
,
”
in
IEE
E
In
ter
n
e
t
o
f
T
h
in
g
s J
o
u
r
n
a
l
,
v
o
l.
5
,
n
o
.
5
,
p
p
.
3
5
4
8
-
3
5
5
8
,
Oc
t
.
2
0
1
8
.
[2
0
]
Y
.
Qia
n
,
e
t
a
l.
,
“
S
e
c
u
re
En
f
o
rc
e
m
e
n
t
in
Co
g
n
it
iv
e
In
tern
e
t
o
f
V
e
h
icle
s
,
”
in
IEE
E
In
ter
n
e
t
o
f
T
h
in
g
s
J
o
u
rn
a
l
,
v
o
l.
5
,
n
o
.
2
,
p
p
.
1
2
4
2
-
1
2
5
0
,
A
p
r
.
2
0
1
8
.
[2
1
]
L
.
Zh
u
,
e
t
a
l.
,
“
P
RI
F
:
A
P
riv
a
c
y
-
P
re
se
rv
in
g
In
tere
st
-
Ba
se
d
F
o
rw
a
rd
in
g
S
c
h
e
m
e
f
o
r
S
o
c
ial
In
tern
e
t
o
f
V
e
h
icle
s
,
”
in
IEE
E
In
ter
n
e
t
o
f
T
h
i
n
g
s J
o
u
rn
a
l
,
v
o
l
.
5
,
n
o
.
4
,
p
p
.
2
4
5
7
-
2
4
6
6
,
A
u
g
.
2
0
1
8
.
[2
2
]
J
.
C
.
Ca
stil
lo
,
e
t
a
l.
,
“
In
tern
e
t
o
f
V
e
h
icle
s: A
rc
h
it
e
c
tu
re
,
P
ro
t
o
c
o
ls,
a
n
d
S
e
c
u
rit
y
,
”
In
ter
n
e
t
o
f
T
h
in
g
s
J
o
u
rn
a
l
,
v
o
l.
5
,
n
o
.
5
,
p
p
.
3
7
0
1
-
3
7
0
9
,
Oc
t
.
2
0
1
8
.
[2
3
]
J
.
Ka
n
g
,
e
t
a
l.
,
“
P
riv
a
c
y
-
P
re
se
rv
e
d
P
se
u
d
o
n
y
m
S
c
h
e
m
e
f
o
r
F
o
g
Co
m
p
u
ti
n
g
S
u
p
p
o
rted
I
n
tern
e
t
o
f
V
e
h
icle
s
,
”
in
IEE
E
T
ra
n
sa
c
ti
o
n
s
o
n
I
n
tel
li
g
e
n
t
T
ra
n
sp
o
rta
t
io
n
S
y
ste
ms
,
v
o
l.
1
9
,
n
o
.
8
,
p
p
.
2
6
2
7
-
2
6
3
7
,
A
u
g
.
2
0
1
8
.
[2
4
]
C
.
C
h
e
n
,
e
t
a
l.
,
“
A
S
e
c
u
re
A
u
th
e
n
ti
c
a
ti
o
n
P
r
o
to
c
o
l
f
o
r
In
tern
e
t
o
f
V
e
h
icle
s
,
”
in
IEE
E
Acc
e
ss
,
v
o
l.
7
,
p
p
.
1
2
0
4
7
-
1
2
0
5
7
,
2
0
1
9
[2
5
]
M
.
A
.
H
a
b
ib
,
e
t
a
l.
,
“
S
e
c
u
rit
y
a
n
d
p
riv
a
c
y
b
a
s
e
d
a
c
c
e
ss
c
o
n
tro
l
m
o
d
e
l
f
o
r
in
tern
e
t
o
f
c
o
n
n
e
c
ted
v
e
h
icle
s
,
”
Fu
tu
re
Ge
n
e
ra
ti
o
n
Co
mp
u
ter
S
y
ste
ms
,
v
o
l.
9
7
,
p
p
.
6
8
7
-
6
9
6
,
A
u
g
.
2
0
1
9
.
[2
6
]
G
.
S
u
n
,
e
t
a
l.
,
“
S
e
c
u
rit
y
a
n
d
p
riv
a
c
y
p
re
se
r
v
a
ti
o
n
in
f
o
g
-
b
a
se
d
c
ro
w
d
se
n
sin
g
o
n
t
h
e
in
ter
n
e
t
o
f
v
e
h
icle
s
,
”
J
o
u
rn
a
l
o
f
Ne
two
rk
a
n
d
Co
m
p
u
ter
A
p
p
li
c
a
ti
o
n
s
,
v
o
l
.
1
3
4
,
p
p
.
8
9
-
9
9
,
M
a
y
2
0
1
9
.
[2
7
]
M
.
P
o
d
d
a
r,
e
t
a
l.
,
“
P
riv
a
c
y
in
th
e
In
tern
e
t
o
f
V
e
h
icle
s:
M
o
d
e
ls,
A
l
g
o
rit
h
m
s,
a
n
d
A
p
p
li
c
a
ti
o
n
s
,”
2
0
1
9
In
ter
n
a
t
io
n
a
l
Co
n
fer
e
n
c
e
o
n
In
f
o
rm
a
ti
o
n
Ne
two
rk
in
g
(
ICOIN)
,
Ku
a
la L
u
m
p
u
r,
M
a
la
y
sia
,
p
p
.
7
8
-
8
3
,
2
0
1
9
.
[2
8
]
P
.
G
o
p
e
a
n
d
B.
S
ik
d
a
r,
“
A
n
Eff
icie
n
t
P
riv
a
c
y
-
p
re
se
r
v
in
g
A
u
th
e
n
ti
c
a
ti
o
n
S
c
h
e
m
e
f
o
r
En
e
rg
y
In
tern
e
t
-
b
a
se
d
V
e
h
icle
-
to
-
G
rid
C
o
m
m
u
n
ica
ti
o
n
,
”
in
IEE
E
T
ra
n
sa
c
ti
o
n
s
o
n
S
ma
rt
Gr
id
,
v
o
l.
1
0
,
n
o
.
6
,
p
p
.
6
6
0
7
-
6
6
1
8
,
No
v
.
2
0
1
9
.
[2
9
]
Ch
u
ri,
P
ra
th
a
m
e
sh
P
.
,
a
n
d
A
m
b
ik
a
V
.
P
a
w
a
r,
"
A
S
y
ste
m
a
ti
c
R
e
v
ie
w
o
n
P
riv
a
c
y
P
re
se
rv
in
g
D
a
ta
P
u
b
li
sh
i
n
g
T
e
c
h
n
iq
u
e
s
,
"
J
o
u
rn
a
l
o
f
E
n
g
i
n
e
e
rin
g
S
c
ien
c
e
&
T
e
c
h
n
o
lo
g
y
Rev
iew,
v
o
l.
1
2
,
n
o
.
6
,
p
p
.
1
7
-
2
5
,
2
0
1
9
.
[3
0
]
Ka
g
a
l
wa
ll
a
,
N.,
G
a
rg
,
T
.
,
Ch
u
ri,
P
.
a
n
d
P
a
w
a
r,
A
.
,
“
A
S
u
rv
e
y
o
n
im
p
le
m
e
n
ti
n
g
p
riv
a
c
y
in
He
a
l
th
c
a
re
:
A
n
In
d
ian
P
e
rsp
e
c
ti
v
e
,
”
In
ter
n
a
ti
o
n
a
l
J
o
u
r
n
a
l
o
f
Ad
v
a
n
c
e
d
T
re
n
d
s
in
Co
m
p
u
ter
S
c
ien
c
e
a
n
d
En
g
in
e
e
rin
g
Av
a
il
a
b
le,
v
o
l.
8
,
n
o
.
3
,
p
p
.
9
6
3
-
9
8
2
,
2
0
1
9
.
[3
1
]
Ka
p
o
o
r,
V
i
d
h
i,
Rish
a
b
h
S
in
g
h
,
Rish
a
b
h
Re
d
d
y
,
a
n
d
P
ra
th
a
m
e
sh
Ch
u
ri,
"
P
riv
a
c
y
Iss
u
e
s
in
W
e
a
ra
b
le
T
e
c
h
n
o
lo
g
y
:
A
n
In
tri
n
sic
Re
v
iew
,
"
S
S
RN
3
5
6
6
9
1
8
,
2
0
2
0
.
[3
2
]
F.
A
h
m
a
d
,
e
t
a
l.
,
“
T
ru
st
M
a
n
a
g
e
m
e
n
t
in
V
e
h
icu
lar
A
d
-
Ho
c
Ne
t
wo
rk
s
a
n
d
In
tern
e
t
-
of
-
V
e
h
icle
s:
Cu
rre
n
t
T
re
n
d
s
a
n
d
F
u
tu
re
Re
se
a
rc
h
Dire
c
ti
o
n
s
,
”
Glo
b
a
l
A
d
v
a
n
c
e
me
n
ts
in
C
o
n
n
e
c
ted
a
n
d
I
n
telli
g
e
n
t
M
o
b
il
it
y
:
Eme
rg
in
g
Res
e
a
rc
h
a
n
d
Op
p
o
rt
u
n
i
ti
e
s
,
p
p
.
1
3
5
-
1
6
5
,
2
0
1
9
.
[3
3
]
A
.
A
.
A
.
A
ri,
e
t
a
l.
,
“
En
a
b
li
n
g
P
riv
a
c
y
a
n
d
S
e
c
u
rit
y
in
Clo
u
d
o
f
T
h
in
g
s: arc
h
it
e
c
tu
re
,
a
p
p
li
c
a
ti
o
n
s,
se
c
u
rit
y
&
p
riv
a
c
y
c
h
a
ll
e
n
g
e
s
,
”
Ap
p
li
e
d
Co
mp
u
ti
n
g
a
n
d
In
f
o
rm
a
ti
c
s
,
2
0
1
9
.
[3
4
]
M
.
Ba
b
a
g
h
a
y
o
u
a
n
d
A
.
A
.
A
.
A
ri
,
“
L
o
c
a
ti
o
n
-
P
riv
a
c
y
Ev
a
lu
a
ti
o
n
with
in
t
h
e
Ex
tre
m
e
P
o
in
ts
P
riv
a
c
y
(EP
P
)
S
c
h
e
m
e
f
o
r
V
A
NET
Us
e
rs
,
”
In
tern
a
ti
o
n
a
l
Jo
u
r
n
a
l
o
f
S
trate
g
ic
In
f
o
rm
a
ti
o
n
T
e
c
h
n
o
l
o
g
y
a
n
d
A
p
p
li
c
a
ti
o
n
s,
v
o
l.
1
0
,
n
o
.
2
,
p
p
.
4
4
-
5
8
,
2
0
1
9
.
B
I
O
G
RAP
H
I
E
S
O
F
AUTH
O
RS
M
s.
Ta
n
v
i
G
a
r
g
is
a
Co
m
p
u
ter
S
c
ien
c
e
u
n
d
e
rg
ra
d
u
a
te
f
ro
m
S
V
KM’s
NMIM
S
M
u
k
e
sh
P
a
te
l
S
c
h
o
o
l
o
f
T
e
c
h
n
o
l
o
g
y
M
a
n
a
g
e
m
e
n
t
a
n
d
En
g
in
e
e
rin
g
,
M
u
m
b
a
i,
In
d
ia.
He
r
a
re
a
o
f
in
tere
st
in
c
lu
d
e
s se
c
u
rit
y
a
n
d
p
riv
a
c
y
.
Evaluation Warning : The document was created with Spire.PDF for Python.