6 resultados para Stateless Roaming Credentials

em Indian Institute of Science - Bangalore - Índia


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper explains the algorithm of Modified Roaming Optimization (MRO) for capturing the multiple optima for multimodal functions. There are some similarities between the Roaming Optimization (RO) and MRO algorithms, but the MRO algorithm is created to overcome the problems facing while applying the RO to the problems possessing large number of solutions. The MRO mainly uses the concept of density to overcome the challenges posed by RO. The algorithm is tested with standard test functions and also discussions are made to improve the efficacy of the MRO algorithm. This paper also gives the results of MRO applied for solving Inverse Kinematics (IK) problem for SCARA and PUMA robots.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Because of frequent topology changes and node failures, providing quality of service routing in mobile ad hoc networks becomes a very critical issue. The quality of service can be provided by routing the data along multiple paths. Such selection of multiple paths helps to improve reliability and load balancing, reduce delay introduced due to route rediscovery in presence of path failures. There are basically two issues in such a multipath routing Firstly, the sender node needs to obtain the exact topology information. Since the nodes are continuously roaming, obtaining the exact topology information is a tough task. Here, we propose an algorithm which constructs highly accurate network topology with minimum overhead. The second issue is that the paths in the path set should offer best reliability and network throughput. This is achieved in two ways 1) by choice of a proper metric which is a function of residual power, traffic load on the node and in the surrounding medium 2) by allowing the reliable links to be shared between different paths.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A low-power frequency multiplication technique, developed for ZigBee (IEEE 802.15.4) like applications is presented. We have provided an estimate for the power consumption for a given output voltage swing using our technique. The advantages and disadvantages which determine the application areas of the technique are discussed. The issues related to design, layout and process variation are also addressed. Finally, a design is presented for operation in 2.405-2.485-GHz band of ZigBee receiver. SpectreRF simulations show 30% improvement in efficiency for our circuit with regard to conversion of DC bias current to output amplitude, against a LC-VCO. To establish the low-power credentials, we have compared our circuit with an existing technique; our circuit performs better with just 1/3 of total current from supply, and uses one inductor as against three in the latter case. A test chip was implemented in UMC 0.13-mum RF process with spiral on-chip inductors and MIM (metal-insulator-metal) capacitor option.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

User authentication is essential for accessing computing resources, network resources, email accounts, online portals etc. To authenticate a user, system stores user credentials (user id and password pair) in system. It has been an interested field problem to discover user password from a system and similarly protecting them against any such possible attack. In this work we show that passwords are still vulnerable to hash chain based and efficient dictionary attacks. Human generated passwords use some identifiable patterns. We have analysed a sample of 19 million passwords, of different lengths, available online and studied the distribution of the symbols in the password strings. We show that the distribution of symbols in user passwords is affected by the native language of the user. From symbol distributions we can build smart and efficient dictionaries, which are smaller in size and their coverage of plausible passwords from Key-space is large. These smart dictionaries make dictionary based attacks practical.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

As populations of the world's largest animal species decline, it is unclear how ecosystems will react to their local extirpation. Due to the unique ecological characteristics of megaherbivores such as elephants, seed dispersal is one ecosystem process that may be affected as populations of large animals are decimated. In typically disturbed South Asian ecosystems, domestic bovids (cattle, Bos primigenius, and buffalo, Bubalus bubalis) may often be the species most available to replace Asian elephants (Elephas maximus) as endozoochorous dispersers of large-fruited mammal-dispersed species. We use feeding trials, germination trials, and movement data from the tropical moist forests of Buxa Tiger Reserve (India) to examine whether domestic bovids are viable replacements for elephants in the dispersal of three largefruited species: Dillenia indica, Artocarpus chaplasha, and Careya arborea. We find that (1) once consumed, seeds are between 2.5 (C. arborea) and 26.5 (D. indica) times more likely to pass undigested into elephant dung than domestic bovid dung; and (2) seeds from elephant dung germinated as well as or better than seeds taken from bovid dung for all plant species, with D. indica seeds from elephant dung 1.5 times more likely to germinate. Furthermore, since wild elephants have less constrained movements than even free-roaming domestic bovids, we calculate that maximum dispersal by elephants is between 9.5 and 11.2 times farther than that of domestic bovids, with about 20% of elephant-dispersed seeds being moved farther than the maximum distance seeds are moved by bovids. Our findings suggest that, while bovids are able to disperse substantial numbers of seeds over moderate distances for two of the three study species, domestic bovids will be unable to routinely emulate the reliable, long-distance dispersal of seeds executed by elephants in this tropical moist forest. Thus while domestic bovids can attenuate the effects of losing elephants as dispersers, they may not be able to prevent the decline of various mammal-dispersed fruiting species in the face of overhunting, habitat fragmentation, and climate change.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A routing protocol in a mobile ad hoc network (MANET) should be secure against both the outside attackers which do not hold valid security credentials and the inside attackers which are the compromised nodes in the network. The outside attackers can be prevented with the help of an efficient key management protocol and cryptography. However, to prevent inside attackers, it should be accompanied with an intrusion detection system (IDS). In this paper, we propose a novel secure routing with an integrated localized key management (SR-LKM) protocol, which is aimed to prevent both inside and outside attackers. The localized key management mechanism is not dependent on any routing protocol. Thus, unlike many other existing schemes, the protocol does not suffer from the key management - secure routing interdependency problem. The key management mechanism is lightweight as it optimizes the use of public key cryptography with the help of a novel neighbor based handshaking and Least Common Multiple (LCM) based broadcast key distribution mechanism. The protocol is storage scalable and its efficiency is confirmed by the results obtained from simulation experiments.