I
nte
rna
t
io
na
l J
o
urna
l o
f
Adv
a
nces in Applie
d Science
s
(
I
J
AAS)
Vo
l.
6
,
No
.
1
,
M
ar
ch
2
0
1
7
,
p
p
.
2
2
~
3
0
I
SS
N:
2252
-
8814
22
J
o
ur
na
l ho
m
ep
a
g
e
:
h
ttp
:
//ia
e
s
jo
u
r
n
a
l.c
o
m/o
n
lin
e/in
d
ex
.
p
h
p
/I
J
AAS
M
TKD:
An
a
lg
o
r
ith
m
f
o
r
Multi
-
Ti
er Key
Distri
buti
o
n f
o
r
securing
G
ro
up C
o
m
m
unica
tion
in
WSN
Anna
pu
r
na
H
S
1
,
M
.
Sid
da
pp
a
2
1
De
p
t
o
f
CS
E,
S
S
A
HE,
T
u
m
k
u
r,
In
d
ia
2
De
p
a
rte
m
e
n
t
o
f
CS
E,
S
S
IT
,
T
u
m
k
u
r,
In
d
ia
Art
icle
I
nfo
AB
ST
RAC
T
A
r
ticle
his
to
r
y:
R
ec
eiv
ed
J
an
8
,
2
0
1
6
R
ev
i
s
ed
Feb
1
1
,
2
0
1
7
A
cc
ep
ted
Feb
1
9
,
2
0
1
7
S
e
c
u
rit
y
is
o
n
e
o
f
th
e
in
h
e
re
n
t
c
h
a
ll
e
n
g
e
s
in
th
e
a
re
a
o
f
w
ire
les
s
se
n
so
r
n
e
tw
o
rk
.
A
t
p
re
se
n
t,
m
a
jo
ro
ty
o
f
th
e
se
c
u
rit
y
a
l
g
o
rit
h
m
a
re
in
c
o
rp
o
ra
ted
w
it
h
m
a
ss
iv
e
it
e
ra
ti
o
n
s
o
f
c
r
y
p
to
g
ra
p
h
y
a
s
we
ll
a
s
c
o
m
p
lex
m
a
th
e
m
a
ti
c
a
l
m
o
d
e
ll
in
g
th
a
t
re
su
lt
in
d
e
g
ra
d
a
ti
o
n
o
f
q
u
a
li
ty
o
f
se
rv
ic
e
.
T
h
e
p
re
se
n
t
p
a
p
e
r
tak
e
s
th
e
c
a
s
e
stu
d
y
o
f
g
ro
u
p
c
o
m
m
u
n
ica
ti
o
n
in
w
irele
ss
se
n
so
r
n
e
tw
o
rk
a
n
d
in
tro
d
u
c
e
s
a
sig
n
if
i
c
a
n
t
p
ro
to
c
o
l
t
h
a
t
a
ss
ist
in
g
e
n
e
ra
ti
o
n
o
f
jo
in
t
k
e
y
w
it
h
a
n
a
id
o
f
u
n
i
q
u
e
a
n
d
li
g
h
tw
e
ig
h
t
c
ry
p
to
g
ra
p
h
y
.
T
h
e
o
u
tco
m
e
o
f
th
e
stu
d
y
w
a
s
c
o
m
p
a
re
d
w
it
h
th
e
m
o
st
sig
n
if
ica
n
t
a
n
d
sta
n
d
a
rd
w
o
rk
o
f
g
ro
u
p
c
o
m
m
u
n
ica
ti
o
n
to
f
in
d
t
h
a
t
p
r
o
p
o
se
d
sy
ste
m
is
in
a
d
h
e
re
n
c
e
o
f
ti
m
e
a
n
d
sp
a
c
e
c
o
m
p
le
x
it
y
.
K
ey
w
o
r
d
:
Gr
o
u
p
C
o
m
m
u
n
icatio
n
Ke
y
Ma
n
a
g
e
m
e
n
t
P
air
w
is
e
Ke
y
Dis
tr
ib
u
tio
n
W
ir
eless
Sen
s
o
r
Net
w
o
r
k
Co
p
y
rig
h
t
©
201
7
In
s
t
it
u
te o
f
A
d
v
a
n
c
e
d
E
n
g
i
n
e
e
rin
g
a
n
d
S
c
ien
c
e
.
Al
l
rig
h
ts
re
se
rv
e
d
.
C
o
r
r
e
s
p
o
nd
ing
A
uth
o
r
:
H.
S An
n
ap
u
r
n
a
,
d
ep
ar
tm
e
n
t o
f
C
o
m
p
u
ter
Scie
n
ce
&
E
n
g
g
i
n
er
in
g
Sri
Sid
d
h
ar
th
a
A
ca
d
e
m
y
o
f
Hi
g
h
er
E
d
u
ca
tio
n
,
T
u
m
k
u
r
,
I
n
d
i
a.
1.
I
NT
RO
D
UCT
I
O
N
W
ir
eless
s
e
n
s
o
r
n
et
w
o
r
k
(
W
S
N)
,
co
n
ce
r
n
ed
t
h
e
a
w
ar
e
n
es
s
o
f
t
h
e
e
x
p
lo
r
e
s
ec
tio
n
s
o
t
h
er
th
e
n
t
w
o
d
ec
ad
es
o
w
i
n
g
to
its
p
r
o
b
ab
le
b
en
ef
it
in
o
b
s
er
v
e
th
e
r
e
m
o
t
e
d
ata
an
d
in
h
er
en
t
is
s
u
es
i
n
th
e
p
r
o
ce
d
u
r
e.
T
h
e
d
ata
th
at
f
lo
w
s
i
n
a
m
o
n
g
th
e
s
en
s
o
r
n
o
d
es i
n
w
ir
eles
s
s
e
n
s
o
r
n
et
w
o
r
k
co
n
s
is
t o
f
p
h
y
s
icall
y
ca
p
tu
r
ed
d
ata
f
r
o
m
th
e
r
ea
d
in
g
s
o
f
s
e
n
s
o
r
s
,
a
m
o
b
ile
co
d
e,
s
ec
u
r
it
y
u
s
i
n
g
k
e
y
m
an
a
g
e
m
e
n
t
tech
n
iq
u
e
s
,
an
d
l
o
ca
tio
n
in
f
o
r
m
atio
n
o
f
th
e
s
e
n
s
o
r
n
o
d
es.
O
w
in
g
to
th
e
les
s
er
a
m
o
u
n
t
o
f
o
b
tain
ab
l
e
o
f
co
m
p
u
tatio
n
a
l
o
r
ig
in
i
n
th
e
m
in
ia
tu
r
e
s
e
n
s
o
r
n
o
d
es
an
d
w
ir
ele
s
s
co
m
m
u
n
i
ca
tio
n
s
o
ca
il,
w
s
n
en
d
u
r
e
f
r
o
m
p
r
o
b
ab
le
s
ec
u
r
it
y
th
r
ea
t
a
s
p
ec
t
[
1
]
.
T
h
er
e
ar
e
b
asicall
y
t
w
o
t
y
p
es
o
f
at
tack
s
in
s
en
s
o
r
n
et
w
o
r
k
e.
g
.
ac
ti
v
e
an
d
p
ass
i
v
e
attac
k
s
[
2
]
.
T
h
e
m
alicio
u
s
n
o
d
es
ca
n
en
h
a
n
ce
th
eir
attac
k
in
g
ca
p
ab
ilit
ies
b
y
in
tr
u
d
in
g
th
e
p
r
iv
at
e
in
f
o
r
m
at
io
n
f
r
o
m
m
o
b
ile
c
o
d
es
as
w
el
l
as
b
y
ac
ce
s
s
i
n
g
t
h
e
in
f
o
r
m
atio
n
p
er
tain
i
n
g
to
th
e
p
o
s
itio
n
i
n
g
o
f
th
e
n
o
d
es
[
3
]
.
Usi
n
g
v
ar
i
o
u
s
ea
v
esd
r
o
p
p
in
g
tech
n
iq
u
e,
it
is
p
o
s
s
ib
le
f
o
r
th
e
m
al
icio
u
s
n
o
d
e
to
in
co
r
p
o
r
ate
a
m
al
icio
u
s
p
r
o
g
r
a
m
m
es
o
n
th
e
m
o
b
ile
co
d
e
an
d
th
er
eb
y
s
p
r
ea
d
in
g
t
h
e
m
al
icio
u
s
m
o
b
ile
co
d
e
in
th
e
e
n
ti
r
e
n
et
w
o
r
k
.
T
h
e
m
alicio
u
s
n
o
d
e
ca
n
also
u
s
e
th
e
p
o
s
itio
n
i
n
f
o
r
m
atio
n
to
id
e
n
ti
f
y
t
h
e
b
est
n
o
d
e
to
in
v
o
k
e
t
h
eir
attac
k
s
t
h
er
eb
y
p
o
ten
t
ial
l
y
m
a
k
i
n
g
s
ec
u
r
it
y
b
r
ea
ch
.
O
w
in
g
to
t
h
e
w
ir
ele
s
s
m
ed
i
u
m
o
f
co
m
m
u
n
icatio
n
i
n
w
ir
ele
s
s
s
en
s
o
r
n
et
w
o
r
k
,
it
is
v
er
y
c
h
alle
n
g
in
g
task
to
id
en
ti
f
y
t
h
e
m
al
icio
u
s
n
o
d
es
an
d
d
esig
n
a
s
ec
u
r
it
y
p
o
licy
to
d
en
y
th
e
ac
ce
s
s
in
th
e
n
et
w
o
r
k
.
T
h
e
m
alicio
u
s
n
o
d
es
ar
e
q
u
ite
c
ap
ab
le
en
o
u
g
h
to
ac
ce
s
s
t
h
e
e
n
tire
n
et
w
o
r
k
u
s
i
n
g
p
o
ten
t
ial
co
m
p
u
ter
s
a
n
d
s
o
p
h
is
ticated
co
m
m
u
n
icatio
n
eq
u
ip
m
e
n
ts
.
T
h
e
m
al
icio
u
s
n
o
d
es
ca
n
also
s
ee
d
th
e
m
s
el
v
es
in
th
e
n
et
w
o
r
k
en
v
ir
o
n
m
e
n
t
w
i
th
o
u
t
e
v
en
g
et
tin
g
ca
u
g
h
t
[
4
]
.
I
t
is
s
aid
t
h
at
s
in
k
i
s
co
n
s
id
er
ed
as
th
e
m
o
s
t
r
eliab
le
co
r
e
o
f
th
e
w
ir
ele
s
s
s
en
s
o
r
n
et
w
o
r
k
t
h
at
s
to
r
es
s
ig
n
i
f
ica
n
t
i
n
f
o
r
m
atio
n
a
b
o
u
t
th
e
s
ec
u
r
it
y
p
r
o
to
co
ls
,
r
ea
d
in
g
s
o
f
s
en
s
o
r
s
,
an
d
r
o
u
tin
g
i
n
f
o
r
m
atio
n
.
T
h
es
e
ar
e
v
er
y
cr
itical
i
n
g
r
o
u
p
co
m
m
u
n
icatio
n
.
I
n
s
m
all
s
ca
le
s
en
s
o
r
n
et
w
o
r
k
,
it
is
ea
s
ier
to
ca
p
tu
r
e
th
e
d
ata,
p
r
o
c
es
s
it,
an
d
f
o
r
w
ar
d
to
s
i
n
k
.
B
u
t
in
r
an
d
o
m
a
n
d
d
y
n
a
m
ic
n
et
wo
r
k
o
f
lar
g
e
s
ize,
i
t
u
s
u
all
y
d
o
n
’
t
g
o
b
y
s
i
n
g
le
h
o
p
co
m
m
u
n
icatio
n
.
T
h
e
n
o
d
es
ar
e
f
o
r
m
u
lated
i
n
g
r
o
u
p
s
,
w
h
er
e
ea
c
h
g
r
o
u
p
m
e
m
b
er
in
ter
ac
t
s
w
i
th
o
th
er
g
r
o
u
p
m
e
m
b
er
to
f
o
r
w
ar
d
t
h
e
p
r
o
ce
s
s
ed
d
ata
f
r
o
m
o
n
e
to
an
o
t
h
er
p
o
in
t.
T
h
e
Evaluation Warning : The document was created with Spire.PDF for Python.
IJ
AA
S
I
SS
N:
2252
-
8814
MT
K
D:
A
n
a
lg
o
r
ith
m
fo
r
Mu
lti
-
Tier
K
ey
Di
s
tr
ib
u
tio
n
…
(
A
n
n
a
p
u
r
n
a
H
S
)
23
p
r
o
ce
s
s
o
f
d
ata
ag
g
r
eg
atio
n
co
m
p
letel
y
f
ail
s
w
ith
o
u
t
g
r
o
u
p
co
m
m
u
n
icatio
n
.
He
n
ce
,
it
is
v
e
r
y
i
m
p
o
r
tan
t
th
a
t
a
r
o
b
u
s
t
s
ec
u
r
it
y
tec
h
n
iq
u
e
to
b
e
d
ev
elo
p
ed
to
ad
d
r
ess
t
h
e
s
e
cu
r
it
y
is
s
u
es
in
g
r
o
u
p
co
m
m
u
n
icatio
n
s
y
s
te
m
i
n
w
ir
ele
s
s
s
en
s
o
r
n
et
w
o
r
k
.
C
r
y
p
to
g
r
ap
h
y
[
5
]
is
t
h
e
m
o
s
t
f
r
e
q
u
en
tl
y
ad
o
p
ted
tech
n
iq
u
e
to
in
co
r
p
o
r
ate
s
ec
u
r
it
y
w
h
ile
p
er
f
o
r
m
in
g
g
r
o
u
p
co
m
m
u
n
icat
io
n
i
n
w
ir
eles
s
s
en
s
o
r
n
et
w
o
r
k
.
Ho
w
e
v
er
,
co
n
v
en
t
io
n
al
cr
y
p
to
g
r
ap
h
ic
al
g
o
r
ith
m
s
li
k
e
SH
A
,
A
E
S,
al
th
o
u
g
h
h
a
v
e
g
o
o
d
s
ec
u
r
it
y
f
ea
t
u
r
es,
b
u
t
th
e
y
s
u
f
f
er
s
f
r
o
m
li
m
ita
tio
n
s
to
o
.
A
d
o
p
tin
g
a
cr
y
p
to
g
r
ap
h
ic
tech
n
iq
u
e
also
h
av
e
v
ar
io
u
s
li
m
ita
tio
n
s
to
o
e.
g
.
i)
it
c
an
e
n
s
u
r
e
a
n
e
f
f
ec
tiv
e
k
e
y
m
a
n
a
g
e
m
e
n
t,
b
u
t
ca
n
n
o
t
j
o
in
tl
y
e
n
s
u
r
e
t
h
e
co
m
m
u
n
icatio
n
p
er
f
o
r
m
a
n
ce
o
f
t
h
e
lar
g
e
s
ca
le
n
et
w
o
r
k
,
e
s
p
ec
iall
y
t
h
e
ti
m
e
cr
itical
ap
p
licatio
n
s
in
w
ir
eles
s
s
en
s
o
r
n
et
w
o
r
k
,
ii)
cr
y
p
to
g
r
a
p
h
ic
p
r
o
to
co
ls
w
o
r
k
s
i
n
r
ec
u
r
s
iv
e
m
an
n
er
w
ith
v
ar
io
u
s
iter
ativ
e
an
d
co
m
p
lex
s
tep
s
o
f
en
cr
y
p
tio
n
s
an
d
t
h
er
eb
y
t
h
e
y
g
i
v
es
r
i
s
e
to
b
o
th
ti
m
e
an
d
s
p
ac
e
co
m
p
le
x
it
y
,
w
h
ile
w
o
r
k
i
n
g
o
n
s
ec
u
r
e
gr
o
u
p
k
e
y
m
an
a
g
e
m
en
t
tech
n
iq
u
e
s
,
iii)
ad
o
p
tio
n
o
f
cr
y
p
to
g
r
ap
h
ic
tech
n
iq
u
e
e
m
p
h
a
s
ize
m
u
ch
o
n
k
e
y
g
en
er
atio
n
b
u
t
n
o
t
m
u
c
h
o
n
en
s
u
r
e
a
s
ec
o
n
d
la
y
er
o
f
p
r
o
tectio
n
o
f
th
e
g
en
er
ated
k
e
y
i
n
ca
s
e
o
f
d
if
f
er
en
t
ad
v
er
s
ar
ial
ac
tiv
it
ies,
iv
)
t
h
e
co
n
v
e
n
tio
n
al
m
ec
h
an
i
s
m
o
f
b
r
o
ad
ca
s
tin
g
o
f
t
h
e
en
cr
y
p
ted
k
e
y
s
(
as
a
m
o
b
ile
co
d
e)
ca
n
b
e
o
v
er
h
ea
r
b
y
t
h
e
m
alicio
u
s
n
o
d
e.
Hen
ce
,
k
ee
p
in
g
al
l
t
h
ese
i
s
s
u
es
in
m
i
n
d
,
th
e
p
r
esen
t
p
ap
er
in
tr
o
d
u
ce
s
a
tech
n
iq
u
e
o
f
s
ec
u
r
e
g
r
o
u
p
k
e
y
co
m
m
u
n
icatio
n
.
Sectio
n
2
d
is
c
u
s
s
es a
b
o
u
t t
h
e
p
r
io
r
r
esear
ch
w
o
r
k
f
o
llo
w
ed
b
y
b
r
ief
d
is
c
u
s
s
io
n
o
f
p
r
o
b
lem
id
en
ti
f
icatio
n
in
S
ec
tio
n
3
.
Sectio
n
4
d
is
cu
s
s
e
s
ab
o
u
t
th
e
p
r
o
p
o
s
ed
s
y
s
te
m
f
o
llo
w
ed
b
y
ill
u
s
tr
ate
d
d
escr
ip
tio
n
o
f
d
esig
n
p
r
in
c
ip
les
in
Sec
tio
n
5
.
A
l
g
o
r
ith
m
i
m
p
le
m
en
ta
tio
n
i
s
d
is
cu
s
s
ed
in
Sect
io
n
6
f
o
llo
w
e
d
b
y
r
e
s
u
lt d
is
c
u
s
s
io
n
i
n
Secti
o
n
7
.
Sectio
n
8
s
u
m
m
ar
izes t
h
e
p
ap
er
.
2.
RE
L
AT
E
D
WO
RK
T
h
e
s
tu
d
y
to
w
ar
d
s
s
ec
u
r
e
g
r
o
u
p
co
m
m
u
n
icatio
n
i
s
m
o
r
e
th
a
n
a
d
ec
ad
e
o
ld
an
d
t
h
er
e
ar
e
v
ar
io
u
s
tech
n
iq
u
es
th
a
t
h
a
v
e
b
ee
n
i
n
t
r
o
d
u
ce
d
b
y
t
h
e
v
ar
io
u
s
r
esear
ch
er
s
.
T
h
is
s
ec
tio
n
d
is
cu
s
s
e
s
s
o
m
e
o
f
t
h
e
r
ec
en
t
s
tu
d
ie
s
f
o
u
n
d
in
s
tan
d
ar
d
r
esear
ch
m
a
n
u
s
cr
ip
t
th
at
f
o
cu
s
e
s
o
n
i)
s
ec
u
r
e
g
r
o
u
p
co
m
m
u
n
icatio
n
a
n
d
ii)
k
e
y
d
is
tr
ib
u
tio
n
m
ec
h
an
i
s
m
.
C
h
ei
k
h
r
o
u
h
o
u
et
al.
[
6
]
h
av
e
i
n
tr
o
d
u
ce
d
a
p
r
o
to
co
l
f
o
r
en
s
u
r
in
g
s
ec
u
r
e
g
r
o
u
p
co
m
m
u
n
ica
tio
n
o
v
er
r
in
g
b
ased
to
p
o
l
o
g
y
o
f
w
ir
eles
s
s
e
n
s
o
r
n
et
w
o
r
k
.
T
h
e
au
t
h
o
r
s
h
a
v
e
d
is
cu
s
s
ed
th
eir
o
u
tco
m
e
s
c
o
n
s
id
er
in
g
s
to
r
ag
e
co
s
t
w
h
ich
w
a
s
f
o
u
n
d
to
b
e
ef
f
icie
n
t
co
m
p
ar
ed
to
ex
is
tin
g
tech
n
iq
u
e.
Ho
w
e
v
er
,
th
e
li
m
ita
tio
n
o
f
th
e
s
t
u
d
y
i
s
th
e
d
ep
en
d
en
c
y
o
f
k
e
y
s
to
r
ag
e
o
f
s
ize
1
6
0
b
its
u
s
in
g
ellip
t
ical
cu
r
v
e
cr
y
p
to
g
r
ap
h
y
.
B
ec
h
k
i
t
et
al.
[
7
]
h
av
e
in
tr
o
d
u
ce
d
a
p
r
e
-
d
is
tr
ib
u
tio
n
o
f
k
e
y
s
f
o
r
en
s
u
r
in
g
n
et
w
o
r
k
s
ca
lab
ilit
y
.
T
h
e
ad
v
an
ta
g
e
o
f
th
e
p
r
o
to
co
l
w
as
it
s
eq
u
al
k
e
y
r
i
n
g
s
ize
an
d
li
m
i
ta
tio
n
o
f
th
e
s
c
h
e
m
e
w
as
n
o
n
-
v
o
latile
n
at
u
r
e
o
f
th
e
s
e
s
s
io
n
k
e
y
s
h
ar
i
n
g
w
h
ic
h
is
n
o
t a
ct
u
all
y
r
esil
ie
n
t
ag
ai
n
s
t
m
an
y
leth
a
l a
ttac
k
s
in
w
ir
eles
s
s
e
n
s
o
r
n
et
w
o
r
k
s
.
Kh
a
lid
et
a
l.
[
8
]
h
as j
o
in
tl
y
u
s
ed
co
m
b
i
n
ato
r
ial
an
d
tr
av
er
s
al
d
e
s
ig
n
p
r
in
cip
le
f
o
r
p
er
f
o
r
m
i
n
g
s
ec
u
r
e
d
is
tr
ib
u
tio
n
o
f
k
e
y
s
.
T
h
e
s
t
u
d
y
also
b
ea
r
s
th
e
li
m
i
tatio
n
o
f
h
i
g
h
er
d
ep
en
d
en
c
y
o
f
s
ec
r
et
k
e
y
w
h
ic
h
i
s
n
o
t
s
ec
u
r
ed
.
Mo
r
eo
v
er
th
e
s
y
s
te
m
i
s
o
n
l
y
r
esil
ie
n
t
ag
ain
s
t
n
o
d
e
ca
p
tu
r
e
attac
k
a
n
d
n
o
t
f
o
r
o
th
er
ty
p
es
o
f
attac
k
s
.
Mi
et
al.
[
9
]
h
av
e
e
m
p
h
asiz
ed
o
n
p
o
s
itio
n
in
g
o
f
th
e
s
ec
r
et
k
e
y
s
w
h
ile
p
er
f
o
r
m
d
is
tr
ib
u
tio
n
u
s
in
g
Glo
b
al
P
o
s
i
tio
n
in
g
S
y
s
te
m
,
w
h
ich
i
s
a
n
e
x
p
en
s
iv
e
p
r
o
ce
s
s
o
f
in
co
r
p
o
r
at
in
g
s
ec
u
r
it
y
.
Oli
v
eir
a
et
al.
[
1
0
]
h
av
e
p
r
o
p
o
s
ed
a
t
ec
h
n
iq
u
e
o
f
p
air
i
n
g
b
a
s
ed
en
c
r
y
p
tio
n
o
n
r
ea
l
-
ti
m
e
m
o
tes.
A
lt
h
o
u
g
h
t
h
e
k
e
y
s
ize
in
3
8
6
b
its
in
R
A
M,
th
er
e
is
a
f
u
r
t
h
er
p
r
o
b
ab
ilit
y
o
f
m
i
n
i
m
i
zin
g
t
h
e
s
ize.
Su
c
h
k
e
y
-
s
ize
is
n
o
t
co
m
p
a
tib
le
f
o
r
h
ig
h
er
iter
ati
o
n
s
o
r
f
o
r
lar
g
e
s
ca
le
w
ir
eless
s
e
n
s
o
r
n
e
t
w
o
r
k
.
San
c
h
ez
et
al.
[
1
1
]
h
av
e
p
r
o
p
o
s
ed
a
s
ec
u
r
it
y
p
r
o
to
co
l
f
o
r
w
ir
ele
s
s
b
o
d
y
ar
ea
n
et
w
o
r
k
.
A
lt
h
o
u
g
h
th
e
s
ch
e
m
e
e
n
ab
les
f
lex
ib
ili
t
y
i
n
d
ec
r
y
p
tio
n
o
p
er
atio
n
,
th
e
s
ec
u
r
it
y
o
f
t
h
e
g
e
n
er
ated
k
e
y
is
n
o
t
m
u
c
h
e
m
p
h
asized
.
Mo
r
eo
v
er
,
th
e
p
r
o
ce
s
s
s
u
f
f
er
s
f
r
o
m
r
ec
u
r
s
i
v
e
r
o
u
n
d
s
o
f
en
cr
y
p
tio
n
.
B
ellaz
r
eg
an
d
B
o
u
d
r
ig
a
[
1
2
]
h
av
e
p
r
esen
ted
a
k
e
y
m
a
n
a
g
e
m
e
n
t
tech
n
iq
u
e
to
e
n
s
u
r
e
s
ec
u
r
e
g
r
o
u
p
k
e
y
s
tr
u
ct
u
r
e
a
s
w
ell
as
to
ad
d
r
ess
n
ee
d
o
f
d
y
n
a
m
ic
t
u
n
n
e
lin
g
.
T
h
e
ad
v
an
ta
g
e
o
f
th
i
s
s
c
h
e
m
e
i
s
r
eg
u
lar
u
p
d
ates
o
f
k
e
y
s
an
d
th
e
li
m
ita
tio
n
o
f
t
h
e
s
ch
e
m
e
is
it
s
u
p
p
o
r
ts
o
n
l
y
o
n
e
-
tu
n
n
el
p
er
g
r
o
u
p
f
o
r
en
ab
lin
g
co
m
m
u
n
icatio
n
.
T
h
e
s
c
h
e
m
e
also
d
o
esn
’
t
ex
p
licit
l
y
d
is
c
u
s
s
ab
o
u
t
th
e
ti
m
e
a
n
d
s
to
r
ag
e
co
m
p
lex
it
y
.
Mo
r
ch
o
n
et
al.
[
1
3
]
h
av
e
p
r
o
p
o
s
ed
a
co
s
t
-
e
f
f
ec
ti
v
e
p
r
ed
is
tr
ib
u
tio
n
o
f
k
e
y
s
th
a
t
p
r
o
v
id
es
id
en
tit
y
-
b
ased
s
ec
u
r
it
y
in
w
ir
eless
s
e
n
s
o
r
n
et
w
o
r
k
.
On
e
ad
v
an
ta
g
e
o
f
t
h
e
s
c
h
e
m
e
is
it
i
s
in
d
ep
en
d
en
t
o
f
a
n
y
in
ter
ac
tio
n
p
r
o
ce
s
s
to
g
e
n
er
at
e
o
r
au
th
e
n
ticate
k
e
y
s
.
Ho
w
e
v
er
,
th
e
o
u
tco
m
e
w
as
test
ed
w
it
h
v
er
y
les
s
s
ize
o
f
d
ata
an
d
m
a
y
n
o
t
b
e
ap
p
licab
le
in
m
u
lti
-
h
o
p
co
m
m
u
n
icat
io
n
o
f
k
e
y
s
.
W
an
g
et
al.
[
1
4
]
h
av
e
p
r
o
p
o
s
ed
a
p
r
ed
is
tr
ib
u
tio
n
p
o
lic
y
co
n
s
id
er
in
g
h
ex
a
g
o
n
a
l
g
r
id
s
co
n
s
is
t
in
g
o
f
g
r
o
u
p
s
an
d
k
e
y
s
.
Mie
t
tin
en
et
al.
[
1
5
]
h
av
e
p
r
esen
ted
a
s
ec
u
r
it
y
p
r
o
to
co
l
b
y
in
co
r
p
o
r
atin
g
a
n
a
u
th
e
n
tic
ated
p
air
in
g
s
y
s
te
m
b
ased
o
n
k
e
y
co
n
tex
t.
F
u
r
tak
an
d
C
h
u
d
zik
ie
w
icz
[
1
6
]
h
av
e
u
s
ed
as
y
m
m
etr
ic
k
e
y
p
air
as
w
el
l
as
elec
tr
o
n
ic
s
i
g
n
atu
r
e
to
p
r
o
v
id
e
s
ec
u
r
e
au
th
e
n
tica
tio
n
i
n
w
ir
ele
s
s
s
e
n
s
o
r
n
et
w
o
r
k
.
Xi
et
al.
[
1
7
]
h
av
e
p
r
esen
ted
a
k
e
y
esti
m
at
in
g
p
r
o
ce
s
s
th
at
i
s
d
o
n
e
in
f
aster
m
a
n
n
er
a
s
co
m
p
ar
e
d
to
attac
k
er
.
Ho
w
e
v
er
,
v
ar
io
u
s
attac
k
er
h
a
v
e
v
ar
io
u
s
p
atter
n
s
o
f
g
en
er
ati
n
g
attac
k
s
,
th
e
au
th
o
r
s
h
a
v
e
n
o
t
d
is
cr
ete
m
en
t
io
n
ed
t
h
e
n
a
m
es
o
f
t
h
e
at
tack
.
Mo
r
eo
v
er
th
e
o
u
t
co
m
e
s
o
f
t
h
e
s
t
u
d
y
w
er
e
n
o
t
f
o
u
n
d
to
b
e
b
en
ch
m
a
r
k
ed
.
Hen
ce
,
it
ca
n
b
e
s
ee
n
t
h
at
th
er
e
ex
i
s
t
v
ar
io
u
s
s
ec
u
r
it
y
p
r
o
to
co
ls
in
th
e
r
esear
c
h
p
ap
er
s
w
it
h
ad
v
an
ta
g
es
a
n
d
li
m
itat
io
n
s
.
T
h
e
p
r
i
m
e
tr
ad
e
-
o
f
f
f
o
u
n
d
in
all
th
e
s
tu
d
y
i
s
d
ep
en
d
en
c
y
o
f
b
r
o
ad
ca
s
tin
g
t
h
e
k
e
y
.
W
e
co
m
m
en
t
t
h
at
b
r
o
ad
ca
s
tin
g
o
f
th
e
k
e
y
i
s
v
er
y
s
en
s
iti
v
e
o
p
er
atio
n
an
d
is
h
ig
h
l
y
p
r
o
n
e
to
ca
p
tu
r
e
if
p
r
o
p
er
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
2
5
2
-
8814
IJ
AA
S
Vo
l
.
6
,
No
.
1
,
Ma
r
ch
201
7
:
23
–
31
24
en
cr
y
p
tio
n
s
c
h
e
m
e
i
s
n
o
t
i
m
p
le
m
en
ted
.
An
o
t
h
er
tr
ad
e
-
o
f
f
f
o
u
n
d
i
s
m
aj
o
r
it
y
o
f
t
h
e
s
c
h
e
m
e
is
b
ased
o
n
en
h
a
n
ce
m
en
t
o
f
co
n
v
e
n
tio
n
al
cr
y
p
to
g
r
ap
h
ic
s
c
h
e
m
e
w
i
th
le
s
s
n
o
v
elt
y
i
n
m
at
h
e
m
atica
l
ap
p
r
o
ac
h
es.
T
h
e
th
ir
d
tr
ad
e
-
o
f
f
s
ee
n
i
n
all
t
h
e
s
t
u
d
ie
s
ar
e
ab
o
u
t
th
e
k
e
y
s
ize
s
,
w
h
ic
h
is
1
2
8
,
2
1
6
,
1
6
0
,
o
r
5
1
2
b
its
.
A
lt
h
o
u
g
h
th
e
k
e
y
s
izes
s
ee
m
s
to
b
e
s
m
aller
b
u
t
as
m
aj
o
r
ity
o
f
t
h
e
ex
i
s
ti
n
g
ap
p
r
o
ac
h
es
s
to
r
es
th
i
s
,
g
r
o
s
s
l
y
t
h
e
s
izes
o
f
th
e
m
a
tr
i
x
h
o
ld
in
g
th
e
k
e
y
s
b
ec
o
m
e
s
e
v
e
n
tu
a
ll
y
lar
g
er
.
3.
P
RO
B
L
E
M
I
DE
NT
I
F
I
CA
T
I
O
N
T
h
e
s
u
g
g
est
s
y
s
te
m
is
m
o
s
tl
y
t
h
e
m
a
tter
co
n
n
ec
ted
w
ith
co
n
s
er
v
ati
v
e
k
e
y
m
a
n
ag
e
m
e
n
t
m
et
h
o
d
ap
p
r
o
p
r
iate
in
W
SN.
Fo
r
a
n
ef
f
ec
ti
v
e
k
e
y
m
an
a
g
e
m
en
t
m
et
h
o
d
,
th
e
s
tr
u
ct
u
r
e
s
h
o
u
ld
m
a
k
e
ce
r
tai
n
ex
p
o
n
en
t
iall
y
s
u
p
er
io
r
lev
el
o
f
r
esil
ie
n
c
y
,
co
n
f
lict,
a
n
d
r
e
v
o
ca
tio
n
.
T
h
e
b
r
ief
d
is
cu
s
s
io
n
s
o
n
t
h
e
id
e
n
ti
f
ied
p
r
o
b
lem
s
ar
e:
a.
W
o
r
k
to
w
ar
d
p
r
ev
en
tio
n
s
y
s
te
m
is
m
o
r
e
i
m
p
o
r
tan
t
co
m
p
ar
ed
to
w
o
r
k
to
w
ar
d
s
d
etec
tio
n
s
y
s
te
m
.
W
h
atev
er
i
s
t
h
e
p
atter
n
o
f
atta
ck
,
u
s
u
a
ll
y
th
e
attac
k
er
co
m
p
r
o
m
is
e
a
n
o
d
e
an
d
it
eit
h
er
p
er
f
o
r
m
a
r
ep
lica
o
f
co
m
p
r
o
m
i
s
ed
n
o
d
e
o
r
it
its
el
f
p
ar
ticip
ate
in
d
ata
d
i
s
s
e
m
i
n
atio
n
p
r
o
ce
s
s
.
T
h
e
n
o
d
es
ar
e
u
s
u
all
y
r
ep
r
esen
ted
b
y
n
o
d
e
I
D,
f
o
r
w
h
ic
h
r
ea
s
o
n
,
it
b
ec
o
m
es
d
i
f
f
ic
u
lt
f
o
r
th
e
o
th
er
n
o
d
e
to
u
n
d
er
s
tan
d
th
e
o
r
ig
in
atio
n
p
o
in
t o
f
attac
k
.
b.
T
h
e
ad
v
er
s
ar
y
ca
n
a
ls
o
g
e
n
er
ate
co
llu
d
i
n
g
attac
k
s
.
Hen
ce
,
wh
en
t
h
e
s
e
n
s
o
r
n
o
d
es e
x
ec
u
te
d
is
tr
ib
u
tio
n
o
f
th
eir
k
e
y
s
,
t
h
eir
n
e
g
o
tiatio
n
n
e
ar
n
o
d
es (
if
an
y
)
u
lti
m
ate
l
y
co
m
es c
o
n
ce
r
n
i
n
g
t
h
e
k
e
y
-
i
n
f
o
r
m
atio
n
.
c.
A
n
o
d
e
i
n
a
n
et
w
o
r
k
i
s
co
n
ce
s
s
io
n
th
at
it
e
s
co
r
ts
to
s
u
s
ce
p
tib
ilit
y
e
f
f
ec
t
o
t
h
er
n
o
d
es
to
o
.
T
h
e
co
m
p
r
o
m
is
ed
s
e
n
s
o
r
n
o
d
e
s
h
o
u
ld
n
o
t d
is
clo
s
e
a
n
y
p
r
iv
a
te
in
f
o
r
m
atio
n
o
f
t
h
e
o
th
er
n
o
d
es.
d.
Su
p
er
io
r
it
y
o
f
th
e
p
r
ese
n
ted
s
y
s
te
m
is
f
le
x
ib
ilit
y
to
w
ar
d
s
p
r
ec
is
e
f
o
r
m
o
f
at
tack
s
.
He
n
ce
,
w
h
e
n
t
h
e
attac
k
s
ce
n
ar
io
ch
a
n
g
e
s
,
th
e
s
o
lu
tio
n
to
th
w
ar
t
th
e
attac
k
is
n
o
lo
n
g
er
ap
p
licab
le.
Hen
ce
,
t
h
er
e
is
a
n
ee
d
o
f
a
s
y
s
te
m
t
h
at
i
n
tr
o
d
u
ce
s
a
tech
n
iq
u
e
f
o
r
cir
cu
m
v
e
n
ti
n
g
m
aj
o
r
ity
o
f
t
h
e
let
h
al
attac
k
s
to
w
ar
d
s
k
e
y
m
an
a
g
e
m
e
n
t sc
h
e
m
es i
n
w
ir
el
ess
s
e
n
s
o
r
n
et
w
o
r
k
.
4.
M
UL
T
I
-
T
I
E
R
K
E
Y
D
I
S
T
RI
B
UT
I
O
N
I
N
W
SN
T
h
e
m
o
d
el
is
co
i
n
ed
as
MT
KD
i.e
.
Mu
l
ti
-
T
ier
Ke
y
d
i
s
tr
ib
u
tio
n
m
ec
h
a
n
i
s
m
th
a
t
is
m
a
in
l
y
d
esi
g
n
e
d
to
in
co
r
p
o
r
ate
h
ig
h
er
lev
e
l
o
f
s
ec
u
r
it
y
m
ec
h
a
n
is
m
i
n
k
e
y
m
an
a
g
e
m
e
n
t
d
u
r
i
n
g
d
ata
ag
g
r
eg
atio
n
i
n
w
ir
eles
s
s
en
s
o
r
n
et
w
o
r
k
as
w
ell
a
s
to
p
er
f
o
r
m
g
r
o
u
p
co
m
m
u
n
icatio
n
.
S
i
m
u
l
a
t
i
o
n
P
a
r
a
m
e
t
e
r
s
o
f
W
S
N
N
o
d
e
I
D
T
i
m
e
S
t
a
m
p
P
r
e
l
o
a
d
e
d
k
e
y
s
K
e
y
P
o
o
l
D
e
s
i
g
n
F
o
r
m
u
l
a
t
i
o
n
o
f
G
r
o
u
p
s
S
e
t
C
o
n
d
i
t
i
o
n
f
o
r
g
r
o
u
p
c
o
m
m
T
i
e
r
-
1
T
i
e
r
-
2
T
i
e
r
-
3
T
i
e
r
-
n
S
i
n
g
l
e
H
o
p
M
u
l
t
i
H
o
p
N
o
d
e
I
n
d
e
x
e
r
P
a
r
a
m
K
e
y
M
a
n
a
g
e
m
e
n
t
J
o
i
n
t
k
e
y
C
h
e
c
k
T
i
m
e
&
S
p
a
c
e
C
o
m
p
l
e
x
i
t
y
S
H
A
-
2
/
M
D
5
K
e
y
V
o
l
a
t
i
l
i
t
y
R
e
f
r
e
s
h
U
s
e
d
J
o
i
n
t
k
e
y
s
A
p
p
l
y
S
e
t
T
h
e
o
r
y
Fig
u
r
e
1
.
P
r
o
p
o
s
ed
M
T
KD
Sc
h
e
m
a
Fig
u
r
e
.
1
h
i
g
h
l
ig
h
ts
th
e
s
ch
e
m
a
o
f
t
h
e
p
r
o
p
o
s
ed
s
y
s
te
m
c
o
n
s
id
er
in
g
v
ar
io
u
s
r
a
n
g
e
s
o
f
attac
k
s
e.
g
.
No
d
e
C
ap
tu
r
e
A
ttac
k
,
Den
ia
l
-
Of
-
Ser
v
ice,
T
u
n
n
el
in
g
A
t
ta
ck
,
S
y
b
i
l
attac
k
.
S
u
p
p
o
r
ted
b
y
e
m
p
ir
ical
a
n
d
m
at
h
e
m
a
tical
m
o
d
ellin
g
,
t
h
e
p
r
o
p
o
s
ed
s
y
s
te
m
e
n
s
u
r
es
co
m
p
lete
s
ec
u
r
it
y
o
f
g
r
o
u
p
co
m
m
u
n
ica
tio
n
f
o
r
lar
g
e
s
ca
le
w
ir
ele
s
s
s
e
n
s
o
r
n
et
w
o
r
k
.
T
h
e
elab
o
r
ated
d
is
cu
s
s
io
n
o
f
Fig
u
r
e
1
an
d
its
m
at
h
e
m
atica
l
s
tr
ateg
ies
is
d
o
n
e
w
it
h
r
esp
ec
t to
d
esig
n
p
r
in
cip
l
es in
n
ex
t
s
ec
tio
n
.
Evaluation Warning : The document was created with Spire.PDF for Python.
IJ
AA
S
I
SS
N:
2252
-
8814
MT
K
D:
A
n
a
lg
o
r
ith
m
fo
r
Mu
lti
-
Tier
K
ey
Di
s
tr
ib
u
tio
n
…
(
A
n
n
a
p
u
r
n
a
H
S
)
25
5.
DE
S
I
G
N
P
RINC
I
P
L
E
O
F
M
T
K
D
T
h
e
d
esig
n
o
f
th
e
p
r
o
p
o
s
ed
M
T
KD
m
o
d
el
is
co
m
p
lete
l
y
b
as
ed
o
n
th
e
n
o
v
el
m
at
h
e
m
atica
l
ap
p
r
o
ac
h
th
at
i
n
itiate
s
b
y
co
n
s
id
er
in
g
t
w
o
-
d
i
m
e
n
s
io
n
al
m
atr
ix
o
f
s
i
n
g
le
-
tier
o
f
ar
ch
itectu
r
e
d
esi
g
n
s
(
K
P
,
S
N
)
,
w
h
er
e
K
P
is
th
e
s
et
o
f
k
e
y
i
n
d
ex
er
s
,
w
h
ile
S
N
is
t
h
e
m
o
te
th
a
t c
o
n
s
is
t o
f
s
p
ec
if
i
c
k
e
y
in
d
e
x
e
r
f
r
o
m
K
P
.
T
h
e
in
d
ex
er
s
w
il
l
co
n
s
i
s
ts
o
f
m
ai
n
l
y
th
r
ee
in
f
o
r
m
at
io
n
i.e
.
n
o
d
e
I
D,
ti
m
e
s
ta
m
p
,
p
r
elo
ad
ed
k
ey
.
T
h
e
p
r
o
ce
s
s
o
f
k
e
y
-
allo
ca
tio
n
a
n
d
g
i
v
i
n
g
a
m
at
h
e
m
atica
l
s
h
ap
e
is
n
o
t
ea
s
y
as
i
t
is
q
u
ite
p
o
s
s
ib
le
t
h
at
e
v
er
y
s
en
s
o
r
n
o
d
es
h
av
e
d
if
f
er
e
n
t
n
u
m
b
er
o
f
k
e
y
s
.
H
en
ce
,
to
ea
s
e
o
f
f
th
e
co
m
p
u
tatio
n
,
MT
KD
co
n
s
id
er
s
eq
u
al
n
u
m
b
er
o
f
k
e
y
d
is
tr
ib
u
tio
n
in
e
v
er
y
s
e
n
s
o
r
n
o
d
es.
I
t
ap
p
lies
s
et
th
eo
r
y
to
m
ap
th
e
k
e
y
p
o
o
ls
an
d
it
s
as
s
o
ciate
d
r
elatio
n
s
h
ip
w
it
h
s
ec
u
r
e
k
e
y
-
m
an
a
g
e
m
en
ts
.
K
1
K
2
K
3
K
4
K
5
K
6
K
7
K
P
=
K
1
+
K
2
+
K
3
+
K
4
K
8
K
Q
=
K
5
+
K
6
+
K
7
+
K
8
K
P
∩
K
Q
=
{
K
4
,
K
8
}
K
P
K
Q
Fig
u
r
e
2
.
Set
T
h
eo
r
etica
l
R
ep
r
esen
tat
io
n
o
f
Ke
y
P
o
o
ls
T
h
e
ab
o
v
e
Fig
u
r
e
2
s
h
o
w
s
t
h
e
co
n
d
itio
n
o
f
th
e
k
e
y
-
d
i
s
tr
ib
u
t
i
o
n
s
c
h
e
m
e
in
MT
KD
as
w
ell
as
f
i
n
d
i
n
g
th
e
j
o
in
t
-
k
e
y
to
en
ab
le
s
ec
u
r
ed
g
r
o
u
p
co
m
m
u
n
icatio
n
.
I
t
s
h
o
w
s
th
a
t
t
w
o
k
e
y
-
p
o
o
ls
K
P
{=K
1
+K
2
+K
3
+K
4
}
an
d
K
Q
{=K
5
+K
6
+K
7
+K
8
}
f
o
r
P
TH
g
r
o
u
p
an
d
Q
th
g
r
o
u
p
in
w
ir
ele
s
s
s
e
n
s
o
r
n
et
w
o
r
k
,
wh
ich
h
a
s
t
h
eir
o
w
n
in
d
iv
id
u
al
k
e
y
s
.
T
h
e
s
y
s
te
m
f
o
r
m
u
lates
a
co
n
d
itio
n
o
f
K
P
∩K
Q
to
e
x
tr
ac
t
th
e
j
o
in
t
k
e
y
th
at
i
s
r
eq
u
ir
ed
to
p
er
f
o
r
m
g
r
o
u
p
co
m
m
u
n
ica
tio
n
.
He
n
ce
,
t
h
e
f
o
r
m
u
lat
io
n
o
f
j
o
in
t
k
e
y
i
s
K
J
=
K
P
∩K
Q.
T
h
e
co
n
d
it
io
n
s
tate
s
th
at
an
y
s
e
n
s
o
r
n
o
d
e
o
f
P
TH
g
r
o
u
p
w
ill
b
e
ab
le
to
p
e
r
f
o
r
m
co
m
m
u
n
icat
io
n
w
it
h
o
th
er
s
en
s
o
r
n
o
d
e
o
f
Q
th
g
r
o
u
p
w
ill
r
eq
u
ir
e
to
h
a
v
e
K
j
(
s
u
c
h
t
h
at
K
J
≠
0
)
.
I
n
t
h
i
s
p
r
o
ce
s
s
,
t
h
e
s
e
n
s
o
r
n
o
d
es
w
ill
b
r
o
ad
ca
s
t
o
n
l
y
th
eir
in
d
ex
er
s
.
B
ased
o
n
th
e
m
o
d
el
lin
g
,
MK
T
D
d
esi
g
n
s
a
n
al
g
o
r
ith
m
,
w
h
ic
h
i
s
v
er
y
s
i
m
p
le
a
n
d
y
et
u
n
iq
u
e,
to
b
e
r
u
n
n
i
n
g
i
n
a
s
en
s
o
r
m
o
te.
T
h
e
s
y
s
te
m
w
il
l
en
ab
le
th
e
o
n
e
n
o
d
e
in
P
TH
g
r
o
u
p
to
esti
m
at
e
j
o
in
t
k
e
y
K
J
w
it
h
o
th
er
n
o
d
e
in
Q
th
g
r
o
u
p
.
I
n
th
is
ex
a
m
p
le,
th
e
j
o
in
t
k
e
y
i
s
K
4
an
d
K
8
,
w
h
ich
i
s
ag
a
in
s
u
b
j
ec
ted
to
en
cr
y
p
tio
n
alo
n
g
w
it
h
t
h
e
i
n
d
ex
er
s
o
f
t
wo
n
o
d
es
σ
P
an
d
σ
Q.
O
n
e
i
n
te
r
esti
n
g
f
ac
t
o
f
s
ec
u
r
it
y
i
s
t
h
at
as
K
4
a
n
d
K
8
ar
e
u
n
iq
u
e,
h
en
ce
p
er
f
o
r
m
i
n
g
co
n
ca
ten
atio
n
o
f
t
h
e
m
w
il
l a
l
s
o
y
i
eld
a
u
n
iq
u
e
v
alu
e.
T
h
e
m
ec
h
a
n
is
m
s
w
il
l
al
s
o
t
h
e
ad
j
ac
en
t
n
o
d
es
in
p
r
o
x
i
m
it
y
o
f
tr
an
s
m
i
tti
n
g
n
o
d
es
to
ev
al
u
ate
t
h
e
co
m
m
o
n
i
n
d
ex
er
s
b
et
w
ee
n
n
o
d
e
in
P
TH
g
r
o
u
p
an
d
n
o
d
e
in
Q
th
g
r
o
u
p
as
w
el
l
as
in
d
e
x
er
s
o
f
th
e
ir
j
o
in
t
k
e
y
to
o
.
T
h
e
ad
v
an
tag
e
o
f
th
is
m
ath
e
m
at
ical
m
o
d
ell
in
g
i
s
t
h
at
a
s
t
h
e
ad
j
ac
en
t
n
o
d
e
ca
n
n
o
t
p
o
s
s
es
b
o
th
t
h
e
k
e
y
in
f
o
r
m
at
io
n
(
K
4
a
n
d
K
8
)
s
o
it
is
n
ea
r
to
i
m
p
o
s
s
ib
le
to
g
u
e
s
s
t
h
e
co
n
ca
t
en
ated
v
al
u
es
o
f
b
o
th
t
h
e
k
e
y
s
(
K
4
an
d
K
8
)
.
T
h
is
p
r
in
cip
le
en
s
u
r
es
t
h
at
e
v
en
a
leg
iti
m
ate
m
e
m
b
er
,
w
h
o
is
n
o
t
th
e
tr
an
s
m
i
tti
n
g
(
o
r
clu
s
te
r
h
ea
d
)
n
o
d
e
ca
n
p
o
s
s
es
t
h
e
j
o
in
t
k
e
y
K
J
at
an
y
in
s
ta
n
ce
o
f
ti
m
e.
Ho
w
ev
er
,
t
h
er
e
is
an
o
t
h
er
v
u
ln
er
ab
le
s
it
u
atio
n
esp
ec
ial
l
y
i
n
ca
s
e
o
f
n
o
d
e
ca
p
tu
r
e
attac
k
,
w
h
ic
h
co
m
p
letel
y
co
m
p
r
o
m
is
e
th
e
s
en
s
o
r
n
o
d
e
an
d
it
s
r
eso
u
r
ce
s
.
I
n
s
u
ch
a
ttack
s
ce
n
ar
io
,
it
is
q
u
ite
p
o
s
s
ib
le
th
at
t
h
e
co
m
p
r
o
m
i
s
ed
m
e
m
b
e
r
n
o
d
e
m
a
y
p
er
f
o
r
m
co
ll
u
d
in
g
attac
k
s
a
n
d
e
x
tr
ac
t
th
e
v
al
u
es
o
f
K
4
an
d
K
8
.
I
n
o
r
d
er
to
r
esis
t su
c
h
ev
e
n
t,
t
h
e
p
r
o
p
o
s
ed
s
y
s
te
m
w
i
ll i
n
co
r
p
o
r
ate
v
o
latili
t
y
o
f
all
t
h
e
j
o
in
t
k
e
y
s
,
w
h
ic
h
m
ea
n
s
i
n
th
is
ca
s
e,
o
n
e
K
4
a
n
d
K
8
ar
e
ev
alu
a
ted
as
j
o
in
t
k
e
y
a
n
d
th
e
n
o
d
e
u
s
e
s
it
to
p
er
f
o
r
m
co
m
m
u
n
ica
tio
n
.
O
n
ce
t
h
e
co
m
m
u
n
icatio
n
i
s
o
v
er
,
K
4
an
d
K
8
is
r
ef
r
esh
ed
to
g
en
er
ate
n
e
w
k
e
y
v
a
lu
e
s
u
n
k
n
o
w
n
to
th
e
attac
k
er
.
Se
n
s
o
r
n
et
w
o
r
k
p
er
f
o
r
m
s
co
m
m
u
n
ica
tio
n
o
f
d
ata
u
s
i
n
g
v
ar
io
u
s
r
o
u
tin
g
p
r
in
cip
les,
w
h
ic
h
ar
e
d
escr
ib
ed
i
n
ter
m
s
o
f
T
ier
s
o
f
ar
ch
itectu
r
e:
a.
T
ier
-
1
:
A
m
e
m
b
er
n
o
d
e
ca
p
tu
r
es
th
e
d
ata
an
d
f
o
r
w
ar
d
s
t
h
e
d
ata
to
clu
s
ter
h
ea
d
.
I
t
h
as
to
en
s
u
r
e
th
at
it
i
s
ac
tu
all
y
f
o
r
w
ar
d
in
g
t
h
e
d
ata
t
o
th
e
c
lu
s
ter
h
ea
d
a
n
d
n
o
t
a
n
y
r
o
g
u
e
n
o
d
es
(
in
ca
s
e
o
f
ea
v
e
s
d
r
o
p
p
in
g
o
r
tu
n
n
eli
n
g
attac
k
)
.
He
n
ce
,
th
e
p
r
o
p
o
s
ed
p
r
in
cip
le
en
s
u
r
e
t
w
o
f
ac
ts
i.e
.
i)
o
w
i
n
g
to
o
n
e
in
d
ex
er
s
as
ti
m
e
-
s
ta
m
p
,
t
h
e
d
ata
r
ed
u
n
d
a
n
c
y
ca
n
b
e
ad
d
r
ess
ed
in
th
e
p
r
i
m
ar
y
lev
el
o
f
d
ata
d
is
s
e
m
in
a
tio
n
p
r
o
ce
s
s
,
an
d
ii)
all
th
e
m
e
m
b
er
n
o
d
es
s
h
o
u
ld
ev
alu
a
te
j
o
in
t
k
e
y
s
f
o
r
clu
s
ter
h
ea
d
in
s
eq
u
e
n
tial
m
a
n
n
er
.
H
en
ce
,
s
ec
u
r
it
y
w
it
h
d
ata
r
ed
u
n
d
a
n
c
y
i
s
ad
d
r
ess
ed
in
T
ier
-
1
o
f
ar
ch
itect
u
r
e.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
2
5
2
-
8814
IJ
AA
S
Vo
l
.
6
,
No
.
1
,
Ma
r
ch
201
7
:
23
–
31
26
b.
T
ier
-
2
:
A
f
ter
th
e
d
ata
is
g
at
h
er
ed
f
r
o
m
t
h
e
m
e
m
b
er
n
o
d
es,
th
e
cl
u
s
ter
h
ea
d
m
u
s
t
f
i
n
d
a
w
a
y
to
f
o
r
w
ar
d
th
e
d
ata
to
th
e
s
i
n
k
.
A
s
t
h
er
e
a
r
e
v
ar
io
u
s
r
o
u
ti
n
g
alg
o
r
it
h
m
s
ex
is
t
in
g
[
1
8
]
[
1
9
]
[
2
0
]
th
at
is
co
m
p
a
tib
le
w
it
h
s
in
g
le
-
h
o
p
(
d
ir
ec
tl
y
to
s
in
k
)
an
d
m
u
lti
-
h
o
p
(
v
ia
o
th
er
clu
s
ter
h
ea
d
s
to
s
in
k
)
,
s
o
p
r
es
en
t
tech
n
iq
u
e
p
er
f
o
r
m
s
m
u
l
ti
-
la
y
er
ed
au
t
h
e
n
ticatio
n
tec
h
n
iq
u
e
to
en
cr
y
p
t
t
h
eir
d
ata.
Fo
r
s
in
g
le
h
o
p
n
et
wo
r
k
,
th
e
j
o
in
t
k
e
y
i
s
en
cr
y
p
ted
j
u
s
t
o
n
e
ti
m
e
,
h
o
w
e
v
er
,
f
o
r
m
u
l
ti
-
h
o
p
n
et
wo
r
k
,
th
e
en
cr
y
p
tio
n
o
f
th
e
j
o
in
t
-
k
e
y
is
d
o
n
e
b
ased
o
n
th
e
n
u
m
b
er
o
f
h
o
p
s
,
it
r
eq
u
ir
es
th
e
d
ata
to
tr
a
v
el.
Hen
ce
,
th
e
p
r
o
p
o
s
ed
s
y
s
te
m
e
n
s
u
r
es
s
ec
u
r
it
y
o
v
er
ea
ch
u
n
it li
n
k
o
f
co
m
m
u
n
icatio
n
s
.
c.
T
ier
-
3
:
Af
ter
t
h
e
ac
co
m
p
li
s
h
m
e
n
t
o
f
co
m
m
u
n
icatio
n
,
it
is
ess
e
n
tia
l
t
h
at
u
s
ed
j
o
in
t
k
e
y
s
ar
e
s
i
m
u
lt
a
neo
us
ly
r
ef
r
es
h
ed
to
r
esis
t
t
h
e
p
o
s
s
ib
ilit
y
o
f
u
s
i
n
g
s
t
ale
k
e
y
s
.
T
h
e
p
r
o
p
o
s
ed
s
y
s
te
m
d
o
esn
’
t
w
ait
f
o
r
co
m
p
lete
co
m
m
u
n
icatio
n
t
o
h
ap
p
en
f
r
o
m
s
o
u
r
ce
to
d
esti
n
atio
n
,
r
at
h
er
,
it
m
a
k
es
t
h
e
j
o
in
t
k
e
y
v
o
latile
in
ev
er
y
s
in
g
le
li
n
k
u
t
ilizati
o
n
in
t
h
e
co
m
m
u
n
icatio
n
p
r
o
ce
s
s
.
Hen
ce
,
it
s
i
g
n
i
f
ica
n
tl
y
r
ed
u
ce
s
t
h
e
o
v
er
h
ea
d
as
w
ell
d
o
esn
’
t
y
ield
s
ig
n
i
f
ican
t sto
r
ag
e
co
m
p
le
x
it
y
.
d.
T
ier
-
n
:
A
t
p
r
esen
t
th
er
e
ar
e
v
ar
io
u
s
tech
n
iq
u
e
s
o
f
r
ec
o
n
f
i
g
u
r
ab
le
ar
ch
itectu
r
e,
w
h
er
e
th
e
w
ir
ele
s
s
s
e
n
s
o
r
n
et
w
o
r
k
is
i
n
te
g
r
ated
w
it
h
o
p
tical
n
et
w
o
r
k
[
21
]
o
r
clo
u
d
en
v
ir
o
n
m
e
n
t
[
2
2
]
o
r
an
y
o
t
h
er
n
et
w
o
r
k
i
n
g
tech
n
o
lo
g
ies.
T
h
e
p
r
o
p
o
s
ed
s
y
s
te
m
s
u
p
p
o
r
ts
eq
u
al
lev
el
o
f
s
ec
u
r
it
y
b
y
en
s
u
r
i
n
g
th
at
o
n
l
y
th
e
co
m
m
u
n
icatio
n
n
o
d
es
d
o
h
av
e
ac
ce
s
s
o
n
j
o
in
t
k
e
y
s
.
T
h
is
p
r
in
cip
le
is
h
i
g
h
l
y
r
esil
ie
n
t
a
g
a
in
s
t
m
a
x
i
m
u
m
attac
k
s
o
n
s
ec
u
r
i
t
y
k
e
y
s
.
6.
AL
G
O
RI
T
H
M
I
M
P
L
E
M
E
NT
A
T
I
O
N
T
h
e
p
r
o
p
o
s
ed
s
y
s
te
m
is
d
esig
n
ed
u
s
i
n
g
Ma
tlab
.
T
h
e
i
m
p
le
m
e
n
tat
io
n
o
f
th
e
MK
T
D
is
d
o
n
e
co
n
s
id
er
in
g
5
0
0
s
en
s
o
r
n
o
d
es
o
n
1
2
0
0
x
1
0
0
0
m
2
s
i
m
u
latio
n
ar
ea
.
T
h
e
p
r
elim
i
n
ar
y
p
h
ase
o
f
t
h
e
s
i
m
u
latio
n
i
s
ca
r
r
ied
o
u
t
b
y
co
n
s
id
er
i
n
g
ass
ig
n
in
g
s
et
o
f
i
n
d
ex
er
s
r
an
d
o
m
l
y
to
a
ll
t
h
e
s
en
s
o
r
n
o
d
es
p
r
esen
t
i
n
th
e
n
et
w
o
r
k
.
T
h
e
s
y
s
te
m
al
s
o
p
r
o
v
id
es
a
k
e
y
alo
n
g
w
i
th
t
h
e
s
e
in
d
e
x
er
s
.
T
h
e
co
m
m
u
n
icat
io
n
o
n
l
y
in
i
tiates
o
f
t
w
o
n
o
d
es
f
r
o
m
d
i
f
f
er
e
n
t
g
r
o
u
p
s
ar
e
f
o
u
n
d
w
i
th
j
o
in
t
k
e
y
s
.
T
h
e
p
r
o
p
o
s
ed
s
y
s
te
m
o
f
f
er
s
s
ec
u
r
it
y
o
n
e
v
er
y
tier
o
f
p
r
o
p
o
s
ed
ar
ch
itectu
r
e.
Fo
r
t
h
is
p
u
r
p
o
s
e
t
h
e
s
y
s
te
m
in
i
tiall
y
co
n
s
id
er
s
as
s
u
m
i
n
g
attac
k
e
r
m
o
d
u
le
t
h
at
h
as
r
ec
en
tl
y
i
n
tr
u
d
ed
t
h
e
n
et
w
o
r
k
eith
er
u
s
i
n
g
i
n
s
id
e
o
r
o
u
ts
id
e
attac
k
i
n
g
s
tr
ate
g
y
.
E
x
is
ti
n
g
te
ch
n
iq
u
es
u
s
u
a
ll
y
i
s
ex
p
er
i
m
e
n
ted
u
s
in
g
1
2
8
o
r
5
1
2
b
it
o
f
en
cr
y
p
tio
n
k
e
y
s
.
Ho
w
e
v
er
,
th
e
p
r
o
p
o
s
ed
s
y
s
te
m
o
f
f
er
s
h
i
g
h
est
le
v
el
o
f
f
le
x
ib
ilit
y
b
y
o
f
f
er
i
n
g
d
i
f
f
er
en
tial
t
h
e
k
e
y
s
ize.
T
h
is
is
t
h
e
m
o
s
t
u
n
iq
u
e
f
ea
tu
r
e
s
o
f
MK
T
D
d
esig
n
p
r
in
cip
le.
B
ec
au
s
e
o
f
t
h
is
p
r
in
cip
le,
MK
T
D
o
f
f
er
s
s
ec
u
r
it
y
i
n
ev
er
y
t
ie
r
s
o
f
p
r
o
p
o
s
ed
a
r
ch
itectu
r
e.
Dep
en
d
in
g
o
n
t
h
e
t
y
p
e
o
f
ap
p
l
icatio
n
to
b
e
u
s
ed
,
th
e
p
r
o
p
o
s
ed
s
y
s
te
m
al
s
o
o
f
f
er
s
h
i
g
h
er
f
le
x
ib
ilit
y
to
u
s
e
a
n
y
d
ep
lo
y
m
e
n
t
s
tr
ateg
i
es
f
o
r
s
e
n
s
o
r
n
o
d
es.
Ho
w
e
v
er
,
th
e
ex
p
er
i
m
en
t
s
h
av
e
b
e
en
ca
r
r
ied
o
u
t
an
d
o
u
tco
m
es
w
er
e
a
n
al
y
ze
d
m
ai
n
l
y
w
it
h
an
aid
o
f
r
a
n
d
o
m
d
ep
lo
y
m
e
n
t
s
tr
ate
g
ies.
A
n
o
d
e
b
elo
n
g
i
n
g
to
P
TH
g
r
o
u
p
ca
n
o
n
l
y
es
tab
lis
h
s
ec
u
r
e
co
m
m
u
n
ica
tio
n
w
it
h
n
o
d
e
in
Q
th
gr
o
u
p
,
i
f
th
e
y
h
a
v
e
j
o
in
t
k
e
y
.
T
h
e
d
esig
n
s
o
f
th
e
j
o
in
t k
e
y
p
la
y
s
a
cr
itical
r
o
le
an
d
th
er
ef
o
r
e,
th
e
y
w
er
e
in
co
r
p
o
r
ated
w
it
h
f
o
llo
w
in
g
f
e
atu
r
es e
.
g
.
a.
O
w
in
g
to
d
if
f
er
en
tial
k
e
y
s
ize
,
th
e
s
to
r
ag
e
co
s
t
is
m
i
n
i
m
ize
d
th
at
is
d
ir
ec
tl
y
eq
u
i
v
ale
n
t
to
th
e
s
et
o
f
t
h
e
s
ec
r
et
k
e
y
s
b
ein
g
s
to
r
ed
in
m
a
tr
ix
,
b.
I
n
cr
ea
s
es
p
r
o
b
ab
ilit
y
o
f
t
w
o
g
r
o
u
p
s
to
p
er
f
o
r
m
co
m
m
u
n
ica
t
io
n
as
it
s
u
p
p
o
r
ts
b
o
th
s
i
n
g
le
an
d
m
u
l
ti
-
h
o
p
co
m
m
u
n
icatio
n
tec
h
n
iq
u
e
c.
R
ed
u
ce
d
s
p
atial
d
is
ta
n
ce
b
et
wee
n
th
e
t
w
o
co
m
m
u
n
icatio
n
n
o
d
es e
ith
er
in
s
a
m
e
o
r
in
d
if
f
er
en
t g
r
o
u
p
s
d.
O
w
in
g
to
v
o
latile
n
at
u
r
e
o
f
t
h
e
k
e
y
s
an
d
en
cr
y
p
tio
n
tec
h
n
iq
u
e,
th
e
k
e
y
s
ar
e
h
i
g
h
l
y
s
ec
u
r
ed
in
ca
s
e
o
f
an
y
attac
k
s
in
w
ir
ele
s
s
s
e
n
s
o
r
n
et
w
o
r
k
s
e.
D
u
e
to
f
r
eq
u
en
t
u
p
d
ates
o
f
k
e
y
s
a
f
ter
t
h
e
ex
p
ir
y
o
f
t
h
e
o
ld
j
o
in
t
k
e
y
s
,
it
lead
s
to
s
i
g
n
if
ica
n
tl
y
les
s
o
v
er
h
e
ad
f
o
r
th
e
p
u
r
p
o
s
e
o
f
g
en
er
ati
n
g
n
e
w
j
o
in
t
k
e
y
s
.
Hen
ce
,
m
e
m
o
r
y
s
ize
is
to
tall
y
i
n
d
ep
en
d
en
t
o
f
n
u
m
b
er
o
f
co
m
m
u
n
ica
tio
n
b
ei
n
g
ta
k
i
n
g
p
lace
.
An
in
ter
e
s
ti
n
g
p
o
in
t
to
o
b
s
er
v
e
in
th
e
p
r
o
p
o
s
ed
alg
o
r
ith
m
d
esig
n
is
th
a
t
j
o
in
t
k
e
y
s
ar
e
ac
ce
s
s
ib
le
to
o
n
l
y
co
m
m
u
n
icat
i
n
g
n
o
d
es
s
t
r
ictl
y
.
E
v
e
n
n
e
ig
h
b
o
r
n
o
d
es
d
o
n
’
t
h
av
e
ac
ce
s
s
ib
ilit
y
.
He
n
ce
,
in
ca
s
e
o
f
a
n
y
r
o
u
tin
g
attac
k
s
o
r
n
o
d
e
co
m
p
r
o
m
izatio
n
attac
k
s
th
at
i
n
tr
u
d
e
s
a
n
y
m
e
m
b
er
n
o
d
es
d
o
esn
’
t
h
av
e
an
y
i
m
p
ac
t
o
n
s
ec
u
r
e
g
r
o
u
p
co
m
m
u
n
ica
tio
n
i
n
t
h
e
p
r
esen
t
s
ce
n
ar
io
.
I
n
m
an
y
e
x
i
s
ti
n
g
s
y
s
te
m
[
2
3
]
[
2
4
]
[
2
5
]
,
it
w
as
f
o
u
n
d
t
h
a
t
s
en
s
o
r
n
o
d
es
b
r
o
ad
ca
s
t
k
e
y
i
n
f
o
r
m
atio
n
to
o
th
er
n
o
d
es;
h
o
w
e
v
er
,
th
er
e
is
a
p
o
s
s
ib
ili
t
y
th
at
a
n
a
ttack
er
ca
n
p
o
s
s
es
t
h
is
k
e
y
i
n
f
o
r
m
atio
n
d
u
r
in
g
b
r
o
ad
ca
s
tin
g
p
r
o
ce
s
s
o
f
t
h
e
s
o
u
r
ce
n
o
d
e.
Ho
w
ev
e
r
,
MK
T
D
s
ch
e
m
e
d
o
esn
’
t
b
r
o
ad
ca
s
t
an
y
k
e
y
in
d
ex
er
s
f
o
r
th
e
p
u
r
p
o
s
e
o
f
ex
tr
ac
tin
g
j
o
in
t
k
e
y
s
,
h
e
n
ce
;
it
is
c
o
m
p
lete
l
y
r
esil
ie
n
t
ag
ain
s
t
m
ax
i
m
u
m
p
o
s
s
ib
le
t
h
r
ea
ts
.
T
h
e
alg
o
r
ith
m
d
es
ig
n
ed
ag
ai
n
s
t th
e
p
r
o
p
o
s
ed
m
at
h
e
m
atica
l
m
o
d
el
ca
n
b
e
r
ep
r
esen
ted
as:
Alg
o
rit
h
m
: M
u
lt
i
-
T
ier
Ke
y
D
i
s
tr
ib
u
tio
n
in
W
SN
I
np
ut
: W
SN N
o
d
e
p
ar
a
m
eter
s
Evaluation Warning : The document was created with Spire.PDF for Python.
IJ
AA
S
I
SS
N:
2252
-
8814
MT
K
D:
A
n
a
lg
o
r
ith
m
fo
r
Mu
lti
-
Tier
K
ey
Di
s
tr
ib
u
tio
n
…
(
A
n
n
a
p
u
r
n
a
H
S
)
27
O
utput
: G
en
er
atio
n
o
f
J
o
in
t
Ke
y
ST
AR
T
1
.
I
n
itialize
th
e
s
ize
o
f
k
e
y
(
k
)
(
~1
2
8
b
it)
2
.
I
n
itialize
th
e
i
n
d
ex
er
o
f
i
a
n
d
j
n
o
d
e
Id
i
=[
x
,
y
,
z]
I
d
j
=
[
x
1
,y
1
, z
1
];
3
.
IF
(
z=
=z
1
)
4
.
Re
t
urn
'
No
J
o
in
t K
e
y
’
;
5
.
R
etu
r
n
NU
L
L
;
6
.
E
L
SE
7
.
g
=a
b
s
(
(
x
-
x
1
)
2
+4
(
y
-
y
1
));
8
.
IF
(
s
q
r
t(
g
)
~=
0
)
|
|
2
4
)
(
1
2
1
1
1
z
y
y
x
x
x
x
K
j
K
J1
=K
J1
+1
;
K
J1
=r
o
u
n
d
(
K
J1
);
|
|
2
4
)
(
1
2
1
1
2
z
y
y
x
x
x
x
K
j
K
J2
=K
J2
+1
K
J2
=r
o
u
n
d
(
K
J2
);
9
.
IF
(K
JI
<k
,
K
J2
<
k
)
1
0
.
X
ij
=
co
n
ca
t (
K
J1
, K
J
2
)
11.
X
ij
=m
a
x
i
m
u
m
(
X
ij
);
12.
Data
=c
o
n
ca
t (
X
ij
,
I
d
i
,
I
d
j
);
13.
Gen
er
ate
J
o
in
t K
ey
14.
K
J
=E
n
cr
y
p
t (
Data
,
‘
SH
A
2
/MD5
’
)
;
15.
Ret
urn
K
J
;
1
6
.
Use K
J
in
co
m
m
u
n
icatio
n
1
7
.
E
L
SE
1
8
.
R
etu
r
n
'
No
J
o
in
t K
e
y
'
1
9
.
E
ND
I
F
2
0
.
E
L
SE
2
1
.
R
etu
r
n
'
No
J
o
in
t K
e
y
'
2
2
.
E
ND
I
F
2
3
.
E
ND
I
F
E
ND
T
h
e
p
r
o
p
o
s
ed
alg
o
r
ith
m
co
n
s
id
er
s
i
n
o
d
e
to
p
o
s
s
es
(
x
,
y
,
z)
in
d
ex
er
th
at
in
ten
d
s
t
o
p
er
f
o
r
m
co
m
m
u
n
icatio
n
w
i
th
j
n
o
d
e
w
ith
(
x
1
,
y
1
,
z
1
)
in
d
ex
er
s
.
T
h
e
f
ir
s
t
co
m
p
o
n
e
n
t
o
f
t
h
e
in
d
ex
e
r
s
(
x
,
x
1
)
s
p
ec
if
ie
s
n
o
d
e
id
en
tit
y
,
t
h
e
s
ec
o
n
d
co
m
p
o
n
en
t
o
f
t
h
e
in
d
e
x
er
s
s
p
ec
if
i
es
ti
m
e
s
ta
m
p
(
y
,
y
1
)
,
an
d
t
h
ir
d
co
m
p
o
n
e
n
t
o
f
t
h
e
in
d
ex
er
s
s
p
ec
i
f
ies
k
e
y
(
z,
z
1
)
.
Hen
ce
,
w
h
e
n
z
i
s
f
o
u
n
d
eq
u
iv
ale
n
t
to
z
1
,
t
h
an
n
o
d
e
i
a
n
d
j
ar
e
s
aid
to
b
e
in
co
n
d
itio
n
f
o
r
n
o
t
g
e
n
er
atin
g
th
e
j
o
in
t
k
e
y
s
.
T
h
is
p
o
s
s
ib
il
i
t
y
is
s
et
as
it
i
s
p
o
s
s
ib
le
t
h
a
t
ce
r
tain
attac
k
er
s
atte
m
p
ts
to
i
n
tr
u
d
e
t
h
e
n
et
w
o
r
k
an
d
s
tea
l
th
e
k
e
y
i
n
f
o
r
m
atio
n
eit
h
er
z
o
r
z
1
.
I
n
s
u
ch
ca
s
e
s
,
th
e
in
tr
u
d
er
s
w
ill
p
o
s
s
es
eit
h
er
z
o
r
z
1
an
d
n
o
t
th
e
b
o
th
.
Hen
ce
if
ei
th
er
z
o
r
z
1
is
co
m
p
r
o
m
is
ed
an
d
r
ep
lica
k
e
y
i
s
b
r
o
ad
ca
s
ted
in
t
h
e
n
et
w
o
r
k
,
t
h
a
n
MT
KD
m
u
s
t
e
n
s
u
r
e
to
id
en
ti
f
y
s
u
ch
r
ep
licated
k
e
y
s
a
n
d
m
u
s
t
b
r
ea
k
th
e
co
m
m
u
n
icatio
n
if
it
is
f
o
u
n
d
.
Hen
ce
,
t
h
e
alg
o
r
ith
m
h
as
t
h
e
c
ap
ab
ilit
y
to
i
d
en
tify
t
h
e
k
e
y
r
ep
licas
in
tr
o
d
u
ce
d
b
y
m
alicio
u
s
n
o
d
e.
I
n
ca
s
e
o
f
th
e
s
itu
a
tio
n
w
h
e
n
z
≠
z
1
,
th
a
n
a
j
o
in
t k
e
y
is
ex
tr
ac
ted
u
s
i
n
g
|
|
2
4
)
(
1
2
1
1
z
y
y
x
x
x
x
K
j
(
1
)
Hen
ce
,
i
f
th
e
s
ec
o
n
d
co
m
p
o
n
e
n
t
o
f
eq
.
(
1
)
ex
i
s
ts
th
a
n
it
is
p
o
s
s
ib
le
to
ex
tr
ac
t
t
w
o
j
o
in
t
k
e
y
s
K
J1
an
d
K
J2
(
j
u
s
t
lik
e
K
4
an
d
K
8
in
t
h
e
ex
a
m
p
le)
.
T
h
e
s
y
s
te
m
p
er
f
o
r
m
s
co
n
ca
te
n
atio
n
o
f
b
o
th
th
e
ex
tr
ac
ted
k
e
y
s
an
d
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
2
5
2
-
8814
IJ
AA
S
Vo
l
.
6
,
No
.
1
,
Ma
r
ch
201
7
:
23
–
31
28
p
er
f
o
r
m
s
en
cr
y
p
tio
n
b
y
ad
d
itio
n
all
y
co
n
ca
te
n
ati
n
g
w
i
th
i
n
d
ex
er
s
o
f
i
an
d
j
n
o
d
e.
A
s
th
e
p
r
o
p
o
s
ed
s
y
s
te
m
i
s
d
esig
n
ed
to
ad
d
r
ess
th
e
s
ec
u
r
it
y
i
s
s
u
es
i
n
m
u
lti
-
tier
ar
c
h
itec
tu
r
e
o
f
g
r
o
u
p
co
m
m
u
n
icatio
n
in
w
ir
ele
s
s
s
en
s
o
r
n
et
w
o
r
k
,
s
o
t
h
e
v
alu
e
s
to
b
e
a
s
s
i
g
n
ed
f
o
r
x
,
y
,
an
d
z
f
o
r
i
n
o
d
e
r
em
ai
n
s
co
n
s
tan
t,
w
h
ile
t
h
e
v
alu
e
o
f
x
1
,
y
1
,
an
d
z
1
ar
e
alter
ed
b
ased
o
n
n
u
m
b
er
o
f
t
ier
s
to
b
e
ad
d
r
es
s
ed
.
T
h
er
e
is
also
a
p
o
s
s
ib
ilit
y
t
h
at
th
e
in
tr
u
d
er
m
ig
h
t
k
n
o
w
t
h
e
s
c
h
e
m
e
o
f
g
e
n
er
ati
n
g
th
e
j
o
in
t
k
e
y
s
,
b
u
t
u
n
til
a
n
d
u
n
le
s
s
it
d
o
n
’
t
h
av
e
k
e
y
s
(
lik
e
z
an
d
z
1
)
,
it
w
il
l
n
ev
er
b
e
ab
le
to
ex
tr
ac
t th
e
e
n
cr
y
p
ted
j
o
in
t k
e
y
s
.
7.
RE
SU
L
T
ANAL
YSI
S
Fo
r
th
e
p
u
r
p
o
s
e
o
f
p
er
f
o
r
m
i
n
g
co
m
p
ar
ativ
e
r
es
u
lt
a
n
al
y
s
i
s
,
th
e
p
r
o
p
o
s
ed
s
y
s
te
m
co
n
s
id
er
s
th
e
w
o
r
k
d
o
n
e
b
y
Z
h
an
g
et
al.
[
2
6
]
w
h
o
h
as
in
tr
o
d
u
ce
d
a
tech
n
iq
u
e
f
o
r
p
air
w
is
e
k
e
y
e
s
tab
lis
h
m
e
n
t
p
o
lic
y
i
n
s
e
n
s
o
r
n
et
w
o
r
k
s
.
T
h
e
p
r
im
e
h
ig
h
li
g
h
t
s
o
f
m
e
th
o
d
o
lo
g
y
u
s
ed
i
n
Z
h
a
n
g
et
al.
[
2
6
]
w
o
r
k
ar
e
e.
g
.
i)
u
s
ed
m
e
s
h
s
tr
u
c
tu
r
e
to
s
to
r
e
th
e
s
ee
d
o
f
k
e
y
,
ii)
n
ei
g
h
b
o
r
s
en
s
o
r
ca
n
e
x
tr
ac
t
th
e
p
air
w
i
s
e
k
e
y
i
n
f
o
r
m
atio
n
f
o
r
ac
co
m
p
li
s
h
in
g
g
r
o
u
p
co
m
m
u
n
icatio
n
,
iii)
t
h
e
k
e
y
e
s
tab
lis
h
m
e
n
t
is
ca
r
r
ied
o
u
t
b
y
s
y
s
te
m
au
th
o
r
it
y
,
r
o
u
ter
s
,
a
n
d
s
en
s
o
r
n
o
d
es,
i
v
)
Used
A
E
S
al
g
o
r
ith
m
o
f
1
2
8
b
i
t
f
o
r
cip
h
er
in
g
t
h
e
k
e
y
.
T
h
e
o
u
tco
m
e
o
f
th
e
w
o
r
k
b
ein
g
ca
r
r
ied
o
u
t
b
y
Z
h
a
n
g
e
t
al.
[
2
6
]
is
ev
alu
ated
u
s
i
n
g
s
to
r
ag
e
co
s
t
m
ai
n
l
y
.
He
n
ce
,
alth
o
u
g
h
th
e
m
o
t
iv
e
o
f
Z
h
a
n
g
et
al.
[
2
6
]
is
s
a
m
e
lik
e
u
s
,
b
u
t
t
h
e
y
d
if
f
er
in
t
h
eir
ap
p
r
o
ac
h
.
I
n
o
r
d
er
to
ca
r
r
y
o
u
t
co
m
p
ar
at
iv
e
a
n
al
y
s
i
s
,
th
e
co
r
e
alg
o
r
ith
m
o
f
Z
h
an
g
et
al.
[
2
6
]
w
as e
x
p
er
i
m
e
n
t in
s
i
m
ilar
p
lat
f
o
r
m
to
test
i
f
y
th
e
o
u
tco
m
e
s
.
Fig
u
r
e
3
s
h
o
w
ca
s
es
t
h
e
o
u
tco
m
e
ac
co
m
p
li
s
h
ed
b
y
th
e
p
r
o
p
o
s
ed
MT
KD
w
ith
Z
h
a
n
g
et
al.
[
26
]
s
tu
d
y
w
it
h
r
esp
ec
t
to
p
r
o
ce
s
s
in
g
ti
m
e.
T
h
e
o
u
tco
m
e
s
h
o
w
s
t
h
at
Z
h
an
g
et
al.
[
2
6
]
ap
p
r
o
ac
h
s
ig
n
if
ican
tl
y
tak
e
s
m
o
r
e
p
r
o
ce
s
s
in
g
ti
m
e
w
i
th
t
h
e
i
n
cr
e
ase
o
f
iter
atio
n
,
w
h
er
e
ea
c
h
it
er
atio
n
w
ill
s
i
g
n
i
f
y
in
cr
ea
s
in
g
d
ata
d
is
s
e
m
i
n
atio
n
p
r
o
ce
s
s
.
T
h
e
d
ata
p
ac
k
et
w
a
s
test
ed
w
it
h
5
0
0
-
15000
b
y
tes
o
f
d
ata
i
n
i
n
cr
ea
s
i
n
g
o
r
d
er
to
ch
ec
k
h
o
w
lo
n
g
th
e
s
y
s
te
m
ta
k
e
s
to
p
r
o
ce
s
s
th
e
co
r
e
alg
o
r
ith
m
.
Z
h
a
n
g
et
al.
[
2
6
]
ap
p
r
o
ac
h
alth
o
u
g
h
is
m
o
r
e
r
e
s
ilie
n
t
ag
ai
n
s
t
n
o
d
e
ca
p
tu
r
e
attac
k
,
b
u
t
lo
o
k
i
n
g
in
t
o
th
e
in
cr
e
m
e
n
ti
n
g
p
atter
n
o
f
th
e
c
u
r
v
e,
it
ca
n
n
o
t
b
e
s
aid
to
b
e
r
o
b
u
s
t
ag
ai
n
s
t
Den
ial
-
of
-
Ser
v
ice
attac
k
.
A
lt
h
o
u
g
h
a
u
t
h
o
r
s
h
a
v
e
d
is
c
u
s
s
ed
a
r
o
b
u
s
t
ac
co
m
p
lis
h
m
en
t
o
f
co
m
p
u
tatio
n
a
l
co
m
p
le
x
it
y
in
t
h
eir
r
esear
ch
p
ap
er
,
b
u
t
w
h
e
n
th
e
attac
k
er
m
o
d
u
le
i
s
ch
an
g
ed
,
th
e
o
u
t
co
m
e
s
h
o
w
s
to
n
o
en
h
a
n
ce
m
en
t
i
n
p
r
o
ce
s
s
i
n
g
ti
m
e.
P
r
o
p
o
s
ed
MK
T
D
u
s
es
a
n
o
v
el
ap
p
r
o
ac
h
w
h
er
e
cr
y
p
to
g
r
ap
h
ic
e
n
cr
y
p
tio
n
is
ex
tr
e
m
e
l
y
le
s
s
a
n
d
m
o
r
e
i
s
m
ath
e
m
atica
l
m
o
d
ellin
g
f
o
r
en
c
r
y
p
ti
n
g
j
o
in
t
k
e
y
,
f
o
r
w
h
ic
h
r
ea
s
o
n
,
th
e
r
ec
u
r
s
i
v
e
p
r
o
ce
s
s
in
en
cr
y
p
tio
n
is
r
ed
u
ce
d
an
d
s
y
s
te
m
p
o
ten
tia
ll
y
u
p
d
ates
th
e
u
s
ed
k
e
y
i
n
v
er
y
f
aster
tr
ac
k
.
Hen
ce
p
r
o
p
o
s
ed
s
y
s
te
m
is
o
b
s
er
v
ed
w
it
h
le
s
s
ti
m
e
co
m
p
le
x
it
y
.
Fig
u
r
e
4
s
h
o
w
s
t
h
e
s
to
r
a
g
e
co
m
p
le
x
it
y
o
f
th
e
p
r
o
p
o
s
ed
an
d
ex
i
s
ti
n
g
s
y
s
te
m
.
Z
h
a
n
g
et
al.
[
2
6
]
h
as
ad
o
p
ted
A
E
S
alg
o
r
ith
m
w
it
h
1
2
8
b
it
en
cr
y
p
tio
n
tech
n
iq
u
e
alo
n
g
w
it
h
s
to
r
ag
e
o
f
t
h
e
k
e
y
s
in
t
h
e
m
a
tr
ix
.
Ho
w
e
v
er
t
h
e
p
r
o
p
o
s
ed
s
y
s
te
m
i
s
i
n
d
ep
en
d
en
t
o
f
a
n
y
s
u
ch
th
i
n
g
s
.
Nei
th
er
MT
KD
s
to
r
e
s
an
y
j
o
in
t
k
e
y
a
f
ter
p
er
f
o
r
m
in
g
e
n
cr
y
p
tio
n
n
o
t
i
t
is
b
r
o
ad
ca
s
ted
f
o
r
w
h
ic
h
r
ea
s
o
n
th
e
s
to
r
ag
e
f
ac
to
r
is
al
m
o
s
t
u
n
if
o
r
m
l
y
d
is
tr
ib
u
ted
w
it
h
f
le
x
ib
le
s
ize
o
f
k
e
y
s
.
T
h
e
p
r
o
p
o
s
ed
s
tu
d
y
i
s
t
h
e
f
ir
s
t
o
f
its
k
in
d
to
e
x
h
ib
it
t
h
e
f
ac
t
th
at
it
is
p
o
s
s
ib
le
to
p
er
f
o
r
m
en
cr
y
p
t
io
n
w
it
h
lo
w
er
v
a
lu
e
s
o
f
s
ta
n
d
ar
d
1
2
8
b
it
w
it
h
s
ec
u
r
it
y
o
p
tio
n
s
m
o
r
e
th
an
e
x
is
ti
n
g
cr
y
p
to
g
r
ap
h
ic
p
r
o
to
co
ls
.
T
h
e
co
m
p
ar
ati
v
e
an
a
l
y
s
is
o
f
t
h
e
p
r
o
p
o
s
ed
an
d
Z
h
a
n
g
et
al.
[
2
6
]
Fig
u
r
e
3
.
An
al
y
s
is
o
f
T
im
e
C
o
m
p
lex
i
t
y
Fig
u
r
e
4
An
al
y
s
i
s
o
f
Sto
r
ag
e
C
o
m
p
le
x
it
y
Evaluation Warning : The document was created with Spire.PDF for Python.
IJ
AA
S
I
SS
N:
2252
-
8814
MT
K
D:
A
n
a
lg
o
r
ith
m
fo
r
Mu
lti
-
Tier
K
ey
Di
s
tr
ib
u
tio
n
…
(
A
n
n
a
p
u
r
n
a
H
S
)
29
T
ab
le
1
Dif
f
er
en
ce
B
et
w
ee
n
P
r
o
p
o
s
ed
&
E
x
is
tin
g
S
y
s
te
m
M
T
K
D
Z
h
a
n
g
e
t
a
l
.
[
2
6
]
F
o
c
u
se
s On
N
o
d
e
C
a
p
t
u
r
e
A
t
t
a
c
k
,
D
e
n
i
a
l
-
Of
-
S
e
r
v
i
c
e
,
T
u
n
n
e
l
i
n
g
A
t
t
a
c
k
,
S
y
b
i
l
a
t
t
a
c
k
F
o
c
u
se
s o
n
N
o
d
e
c
a
p
t
u
r
e
a
t
t
a
c
k
U
se
s fl
e
x
i
b
l
e
k
e
y
si
z
e
<
o
r
>
1
2
8
b
i
t
d
e
p
e
n
d
i
n
g
o
n
t
h
e
r
e
q
u
i
r
e
me
n
t
U
se
s 1
2
8
b
i
t
o
f
k
e
y
S
e
c
u
r
i
t
y
i
n
c
o
r
p
o
r
a
t
i
o
n
s
i
n
a
l
l
t
h
e
st
a
g
e
s o
f
c
o
mm
u
n
i
c
a
t
i
o
n
s
(
n
-
T
i
e
r
)
S
e
c
u
r
i
t
y
i
n
c
o
r
p
o
r
a
t
i
o
n
s
i
n
o
n
l
y
g
r
o
u
p
c
o
mm
u
n
i
c
a
t
i
o
n
(
1
-
t
i
e
r
)
S
t
o
r
e
s o
n
l
y
g
r
o
u
p
k
e
y
(
p
r
e
l
o
a
d
e
d
)
t
o
p
e
r
f
o
r
m g
r
o
u
p
c
o
mm
u
n
i
c
a
t
i
o
n
,
D
o
e
sn
’
t
st
o
r
e
Jo
i
n
t
k
e
y
.
S
t
o
r
e
s se
e
d
s o
f
k
e
y
i
n
me
sh
c
l
i
e
n
t
N
o
n
e
e
d
t
o
p
e
r
f
o
r
m b
r
o
a
d
c
a
s
t
i
n
g
k
e
y
i
n
f
o
r
mat
i
o
n
t
o
e
x
t
r
a
c
t
Jo
i
n
t
k
e
y
B
r
o
a
d
c
a
st
k
e
y
s i
n
f
o
r
mat
i
o
n
8.
CO
NCLU
SI
O
N
C
r
y
p
to
g
r
ap
h
y
p
la
y
s
a
cr
itica
l
r
o
le
in
p
er
f
o
r
m
i
n
g
en
cr
y
p
tio
n
r
etain
i
n
g
t
h
e
d
ata
an
d
ch
a
n
n
el
s
ec
u
r
it
y
.
I
t
h
as
a
ls
o
co
n
tr
ib
u
ted
to
s
tr
en
g
t
h
en
th
e
g
r
o
u
p
co
m
m
u
n
ica
tio
n
in
w
ir
eles
s
s
e
n
s
o
r
n
et
w
o
r
k
.
W
h
eth
er
i
t
is
i
n
s
id
er
o
r
o
u
ts
id
er
attac
k
,
it
s
ig
n
i
f
ic
a
n
tl
y
a
f
f
ec
ts
t
h
e
p
er
f
o
r
m
a
n
ce
o
f
th
e
s
ec
u
r
it
y
p
r
o
to
co
l.
Hen
ce
,
w
e
h
a
v
e
ca
r
r
ied
o
u
t
al
m
o
s
t
al
l
th
e
r
ec
e
n
t
s
tan
d
ar
d
w
o
r
k
in
t
h
e
li
n
e
o
f
s
ec
u
r
it
y
i
n
g
r
o
u
p
co
m
m
u
n
icatio
n
an
d
f
o
u
n
d
t
h
at
t
h
er
e
ar
e
v
ar
io
u
s
tec
h
n
iq
u
e
s
to
s
tr
en
g
t
h
g
r
o
u
p
co
m
m
u
n
icatio
n
s
y
s
t
e
m
.
Ho
w
ev
e
r
,
w
e
h
a
v
e
n
o
t
ca
m
e
ac
r
o
s
s
m
u
c
h
s
ig
n
i
f
ica
n
t
id
ea
th
at
co
n
s
id
er
s
b
o
th
g
r
o
u
p
co
m
m
u
n
icatio
n
as
w
e
ll
a
s
d
ata
a
g
g
r
eg
atio
n
p
r
o
ce
s
s
in
w
ir
eles
s
s
en
s
o
r
n
et
w
o
r
k
.
RE
F
E
R
E
NC
E
S
[
1
]
N.M
e
g
h
a
n
a
th
a
n
,
S
.
B
o
u
m
e
rd
a
ss
i,
N.
Ch
a
k
i,
D.
Na
g
a
m
a
lai,
“
Re
c
e
n
t
T
re
n
d
s
i
n
Ne
tw
o
rk
S
e
c
u
rit
y
a
n
d
A
p
p
li
c
a
ti
o
n
s:
T
h
ird
In
ter
n
a
ti
o
n
a
l
Co
n
f
e
re
n
c
e
”
,
T
h
e
T
h
ird
I
n
ter
n
a
ti
o
n
a
l
Co
n
fer
e
n
c
e
o
n
Ne
two
rk
S
e
c
u
ri
ty a
n
d
A
p
p
li
c
a
ti
o
n
s
,
2
0
1
0
[
2
]
R.
S
h
y
a
m
a
l
a
,
S
.
V
a
ll
i
,
“
Im
p
a
c
t
o
f
Blac
k
h
o
le
a
n
d
Ru
sh
in
g
A
tt
a
c
k
o
n
th
e
L
o
c
a
ti
o
n
-
Ba
se
d
R
o
u
ti
n
g
P
r
o
t
o
c
o
l
f
o
r
W
irele
ss
S
e
n
so
r
Ne
t
w
o
rk
s”
,
Ad
v
a
n
c
e
in
C
o
mp
u
ter
&
In
fo
rm
,
T
e
c
h
n
o
lo
g
y
,
p
p
.
3
4
9
-
3
5
9
,
2
0
1
2
[
3
]
T
.
S
h
im
e
a
ll
,
J.
S
p
rin
g
,
“
In
tr
o
d
u
c
t
io
n
t
o
I
n
f
o
rm
a
ti
o
n
S
e
c
u
rit
y
:
A
S
trate
g
ic
-
Ba
se
d
A
p
p
ro
a
c
h
”
,
Ne
wn
e
s
C
o
mp
u
te
,
p
p
.
3
8
2
,
2
0
1
3
[
4
]
J.S
e
n
,
“
S
e
c
u
rit
y
a
n
d
p
riv
a
c
y
c
h
a
ll
e
n
g
e
s
in
c
o
g
n
it
iv
e
w
irele
ss
se
n
so
r
n
e
tw
o
rk
s”
,
a
rX
iv
p
re
p
ri
n
t
a
r
X
iv
:
1
3
0
2
.
2
2
5
3
,
2
0
1
3
[
5
]
G
.
S
h
a
rm
a
a
,
S
.
Ba
laa
,
A
.
K.V
e
rm
a
a
,
“
S
e
c
u
rit
y
F
ra
m
e
w
o
rk
s
f
o
r
W
irele
ss
S
e
n
so
r
Ne
tw
o
rk
s
-
Re
v
ie
w”
,
2
n
d
In
ter
n
a
t
io
n
a
l
C
o
n
f
e
re
n
c
e
o
n
C
o
mm
u
n
ica
t
io
n
,
Co
m
p
u
t
in
g
&
S
e
c
u
rit
y
,
S
c
iV
e
rse
S
c
ien
c
e
Dire
c
t,
2
0
1
2
[
6
]
C.
Ch
e
ik
h
ro
u
h
o
u
,
A
.
Ko
u
b
â
a
,
G
.
Din
i,
a
n
d
M
.
A
b
id
,
"
RiS
e
G
:
a
rin
g
b
a
se
d
se
c
u
re
g
ro
u
p
c
o
m
m
u
n
ica
ti
o
n
p
r
o
to
c
o
l
f
o
r
re
so
u
rc
e
-
c
o
n
stra
in
e
d
w
irele
ss
s
e
n
so
r
n
e
tw
o
rk
s
"
,
Per
so
n
a
l
a
n
d
Ub
i
q
u
it
o
u
s
Co
m
p
u
ti
n
g
,
Vo
l.
1
5
,
No
.
8
,
p
p
.
7
8
3
-
7
9
7
,
2
0
1
1
[
7
]
W
.
Be
c
h
k
it
,
Y.
Ch
a
ll
a
l,
a
n
d
A
.
B
o
u
a
b
d
a
ll
a
h
,
"
A
n
e
w
sc
a
lab
le
k
e
y
p
re
-
d
istri
b
u
ti
o
n
sc
h
e
m
e
f
o
r
w
sn
.
"
In
Co
mp
u
ter
Co
mm
u
n
ica
ti
o
n
s a
n
d
Ne
two
rk
s (
ICCCN)
,
2
1
st
In
ter
n
a
ti
o
n
a
l
Co
n
f
e
r
e
n
c
e
,
p
p
.
1
-
7
,
2
0
1
2
[
8
]
S
.
Kh
a
li
d
,
F
.
A
h
m
a
d
,
a
n
d
M
.
R.
B
e
g
,
"
S
e
c
u
re
Ke
y
P
re
-
d
istri
b
u
ti
o
n
i
n
W
irele
ss
S
e
n
so
r
Ne
t
w
o
rk
s Us
in
g
Co
m
b
in
a
to
rial
De
sig
n
a
n
d
T
ra
v
e
rsa
l
De
si
g
n
Ba
se
d
Ke
y
Distrib
u
ti
o
n
"
,
I
n
ter
n
a
ti
o
n
a
l
J
o
u
rn
a
l
o
f
S
m
a
rt
S
e
n
so
rs
a
n
d
A
d
Ho
c
Ne
two
rk
s
(IJSS
A
N),
V
o
l.
1
,
Iss
.
4
,
2
0
1
2
[
9
]
Q.M
i,
J.A
.
S
tan
k
o
v
ic
,
a
n
d
R.
S
t
o
leru
,
"
P
ra
c
ti
c
a
l
a
n
d
se
c
u
re
lo
c
a
li
z
a
ti
o
n
a
n
d
k
e
y
d
istri
b
u
ti
o
n
f
o
r
w
irele
ss
se
n
so
r
n
e
tw
o
rk
s
"
,
Ad
Ho
c
Ne
two
rk
s
,
Vo
l
.
1
0
,
No
.
6
,
p
p
.
9
4
6
-
9
6
1
,
2
0
1
2
[
1
0
]
L
.
B.
Oliv
e
ira,
M
.
S
c
o
tt
,
J.
L
o
p
e
z
,
a
n
d
R.
Da
h
a
b
,
"
T
in
y
P
BC:
P
a
iri
n
g
s
f
o
r
a
u
th
e
n
ti
c
a
ted
id
e
n
ti
ty
-
b
a
se
d
n
o
n
-
in
tera
c
ti
v
e
k
e
y
d
istri
b
u
ti
o
n
i
n
se
n
s
o
r
n
e
tw
o
r
k
s"
,
Co
mp
u
ter
Co
mm
u
n
ica
ti
o
n
s
,
V
o
l
.
3
4
,
N
o
.
3
,
p
p
.
4
8
5
-
4
9
3
,
2
0
1
1
[
1
1
]
P
.
P
-
S
a
n
c
h
e
z
,
J.E
.
T
a
p
iad
o
r
,
P
.
P
-
L
o
p
e
z
,
a
n
d
G
.
S
-
T
a
n
g
il
,
"
S
e
c
u
re
P
u
b
li
sh
-
S
u
b
sc
ri
b
e
P
ro
t
o
c
o
ls
f
o
r
He
tero
g
e
n
e
o
u
s
M
e
d
ica
l
W
irele
ss
Bo
d
y
A
re
a
Ne
t
w
o
r
k
s
"
,
S
e
n
so
rs
,
V
o
l.
1
4
,
No
.
1
2
,
p
p
.
2
2
6
1
9
-
2
2
6
4
2
,
2
0
1
4
[
1
2
]
R.
Be
ll
a
z
re
g
a
n
d
N.
Bo
u
d
rig
a
,
“
D
y
n
T
u
n
Ke
y
:
a
d
y
n
a
m
ic
d
istri
b
u
t
e
d
g
ro
u
p
k
e
y
tu
n
n
e
li
n
g
m
a
n
a
g
e
m
e
n
t
p
ro
t
o
c
o
l
f
o
r
h
e
tero
g
e
n
e
o
u
s w
irele
ss
se
n
so
r
n
e
tw
o
rk
s
”
,
W
ire
les
s Co
mm
u
n
ica
ti
o
n
a
n
d
Ne
two
rk
in
g
,
2
0
1
4
[
1
3
]
O.
G
-
M
o
rc
h
o
n
,
R.
Rietm
a
n
,
L
.
To
lh
u
ize
n
,
“
HIM
M
O
-
A
L
ig
h
tweig
h
t,
F
u
ll
y
C
o
ll
u
sio
n
Res
ista
n
t
Ke
y
Pre
-
Distrib
u
ti
o
n
S
c
h
e
me
”
,
Re
tri
e
v
e
d
2
0
1
4
[
1
4
]
X
.
W
a
n
g
a
,
P
.
L
ia,
Y.
S
u
ia,
a
n
d
H.
Ya
n
g
a
,
"
A
H
e
x
a
g
o
n
-
b
a
se
d
Ke
y
P
re
-
d
istri
b
u
ti
o
n
S
c
h
e
m
e
f
o
r
W
irele
ss
S
e
n
so
r
Ne
tw
o
rk
s"
,
J
o
u
rn
a
l
o
f
I
n
fo
rm
a
ti
o
n
&
Co
mp
u
t
a
ti
o
n
a
l
S
c
ien
c
e
,
Vo
l.
1
1
(
8
),
p
p
.
2
4
7
9
-
2
4
9
1
,
2
0
1
4
[
1
5
]
M
.
M
ietti
n
e
n
,
N.
A
so
k
a
n
,
T
.
D.Ng
u
y
e
n
,
A
-
R.
S
a
d
e
g
h
i,
a
n
d
M
.
S
o
b
h
a
n
i,
“
Co
n
tex
t
-
Ba
se
d
Zero
-
In
tera
c
ti
o
n
P
a
iri
n
g
a
n
d
Ke
y
E
v
o
lu
ti
o
n
f
o
r
A
d
v
a
n
c
e
d
P
e
r
so
n
a
l
De
v
ice
s”
,
In
Pro
c
e
e
d
in
g
s
o
f
th
e
ACM
S
IGS
AC
Co
n
fer
e
n
c
e
o
n
Co
mp
u
ter
a
n
d
Co
mm
u
n
ica
ti
o
n
s S
e
c
u
rity
,
p
p
.
8
8
0
-
8
9
1
,
2
0
1
4
[
1
6
]
J.
F
u
rtak
,
a
n
d
J.
C
h
u
d
z
ik
iew
ic
z
,
"
T
h
e
c
o
n
c
e
p
t
o
f
a
u
th
e
n
ti
c
a
ti
o
n
in
W
S
Ns
u
sin
g
T
P
M
"
,
Co
m
p
u
ter
S
c
ien
c
e
a
n
d
In
f
o
rm
a
ti
o
n
S
y
ste
m
s,
V
o
l.
3
,
p
p
.
1
8
3
–
1
9
0
,
2
0
1
4
[
1
7
]
W
.
X
i,
X
-
Y.
L
i,
C.
Qia
n
,
J.
Ha
n
,
S
.
T
a
n
g
,
J.
Z
h
a
o
,
a
n
d
K.
Z
h
a
o
,
"
Ke
e
p
:
F
a
st
S
e
c
re
t
Ke
y
Ex
trac
ti
o
n
P
ro
t
o
c
o
l
f
o
r
D2
D Co
m
m
u
n
ica
ti
o
n
"
,
IEE
E
,
2
0
1
4
[
1
8
]
M
.
M
a
sd
a
ri
a
n
d
M
.
T
a
n
a
b
i,
“
M
u
lt
ip
a
th
Ro
u
ti
n
g
p
r
o
to
c
o
ls
i
n
W
irele
ss
S
e
n
so
r
Ne
tw
o
rk
s:
A
S
u
rv
e
y
a
n
d
A
n
a
ly
sis
”
,
In
ter
n
a
t
io
n
a
l
J
o
u
rn
a
l
o
f
F
u
t
u
re
Ge
n
e
ra
ti
o
n
Co
mm
u
n
ica
t
io
n
a
n
d
Ne
two
rk
in
g
,
V
o
l
.
6
,
No
.
6
,
p
p
.
1
8
1
-
1
9
2
,
2
0
1
3
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
2
5
2
-
8814
IJ
AA
S
Vo
l
.
6
,
No
.
1
,
Ma
r
ch
201
7
:
23
–
31
30
[
1
9
]
M
.
Ra
d
i,
B.
De
z
f
o
u
li
,
K.A
.
Ba
k
a
r,
a
n
d
M
.
L
e
e
,
“
M
u
lt
ip
a
t
h
ro
u
ti
n
g
in
w
irele
ss
se
n
so
r
n
e
tw
o
rk
s:
su
rv
e
y
a
n
d
re
se
a
r
c
h
c
h
a
ll
e
n
g
e
s"
,
S
e
n
so
rs
,
Vo
l.
1
2
,
No
.
1
,
p
p
.
6
5
0
-
6
8
5
,
2
0
1
2
[
2
0
]
D.
M
it
tal,
S
.
Ka
u
r,
“
E
n
h
a
n
c
e
d
L
o
c
a
ti
o
n
-
Aw
a
re
Ro
u
ti
n
g
P
ro
to
c
o
l
f
o
r
W
irele
ss
S
e
n
so
r
Ne
tw
o
rk
”
,
In
ter
n
a
ti
o
n
a
l
J
o
u
rn
a
l
o
f
S
c
ien
c
e
a
n
d
M
o
d
e
rn
E
n
g
i
n
e
e
rin
g
(
IJ
IS
M
E),
V
o
l
.
1
,
Iss
u
e
.
1
2
,
2
0
1
3
[
2
1
]
C.
Re
a
rd
o
n
,
A
.
D.F
a
lco
,
K.W
e
ln
a
,
a
n
d
T
.
Kra
u
ss
,
"
Op
ti
c
a
l
b
e
a
m
-
s
tee
rin
g
f
o
r
w
irele
s
s
se
n
so
r
n
e
tw
o
rk
s"
,
In
L
EO
S
An
n
u
a
l
M
e
e
ti
n
g
C
o
n
fer
e
n
c
e
Pro
c
e
e
d
in
g
s,
L
EOS
,
p
p
.
5
8
3
-
5
8
4
,
2
0
0
9
[
2
2
]
M
.
I.
A
fz
a
l,
W
.
M
a
h
m
o
o
d
,
S
.
M
.
S
a
ji
d
,
a
n
d
S
.
S
e
o
y
o
n
g
,
"
Op
ti
c
a
l
w
ir
e
les
s
c
o
m
m
u
n
ica
ti
o
n
a
n
d
re
c
h
a
rg
in
g
m
e
c
h
a
n
is
m
o
f
w
irele
ss
se
n
so
r
n
e
tw
o
rk
b
y
u
sin
g
CCRS
"
,
In
t
e
rn
a
ti
o
n
a
l
J
o
u
r
n
a
l
o
f
Ad
v
a
n
c
e
S
c
ien
c
e
a
n
d
T
e
c
h
n
o
lo
g
y
,
Vo
l.
1
3
,
5
9
-
6
8
,
2
0
0
9
[
2
3
]
H.
Ch
a
n
,
A
.
P
e
rrig
,
a
n
d
D.
S
o
n
g
,
"
R
a
n
d
o
m
k
e
y
p
re
d
istri
b
u
t
io
n
sc
h
e
m
e
s
f
o
r
se
n
so
r
n
e
tw
o
rk
s"
,
I
n
S
e
c
u
rity
a
n
d
Priva
c
y
,
P
ro
c
e
e
d
in
g
s.
S
y
m
p
o
siu
m
,
p
p
.
1
9
7
-
2
1
3
,
2
0
0
3
[
2
4
]
H.Ch
a
n
,
A
.
P
e
rrig
,
a
n
d
D.
S
o
n
g
,
"
Ke
y
d
istri
b
u
t
io
n
tec
h
n
i
q
u
e
s
f
o
r
se
n
so
r
n
e
tw
o
rk
s"
,
In
W
ire
les
s
s
e
n
so
r
n
e
two
rk
s
S
p
rin
g
e
r
,
p
p
.
2
7
7
-
3
0
3
,
2
0
0
4
[
2
5
]
S
.
A
.
Ca
m
tep
e
,
a
n
d
B.
Ye
n
e
r,
"
K
e
y
d
istrib
u
ti
o
n
me
c
h
a
n
isms
fo
r
wire
les
s
se
n
so
r
n
e
two
rk
s:
a
su
rv
e
y
"
,
R
e
n
ss
e
lae
r
P
o
ly
tec
h
n
ic In
stit
u
te,
T
ro
y
,
Ne
w
Yo
rk
,
T
e
c
h
n
ica
l
Re
p
o
rt,
2
0
0
5
[
2
6
]
Y.Z
h
a
n
g
,
L
.
X
u
,
Y.
X
ian
g
,
a
n
d
X
.
Ha
u
a
n
g
,
“
A
M
a
tri
x
-
Ba
se
d
P
a
irw
ise
K
e
y
Estab
li
sh
m
e
n
t
S
c
h
e
m
e
f
o
r
W
irele
s
s
M
e
sh
Ne
tw
o
rk
s
Us
in
g
P
re
De
p
lo
y
m
e
n
t
Kn
o
w
led
g
e
”
,
IEE
E
T
ra
n
sa
c
ti
o
n
o
n
Eme
rg
e
n
c
ies
T
o
p
ics
in
Co
mp
u
t
in
g
,
Vo
l
.
1
,
No
.
2
,
2
0
1
3
Evaluation Warning : The document was created with Spire.PDF for Python.