Every year thousands of urban and industrial fires occur, which leads to the destruction of infrastructure, buildings, and loss of lives. One of the reasons behind this is the delayed transmission of information to the fire station and the nearer hospitals for ambulance service as the transmission of information is dependent on observer at the location where the fire is caught and cellular network. This paper proposed an automated routing protocol for the urban vehicular ad-hoc network to send the information from the location where the fire is caught to the nearest fire stations and hospitals with optimum service time. This transmission of information involves Road Side Unit (RSU) at the junction and the vehicles present in the transmission path. Selection of route to transmit faulty vehicle information from the RSU to the required faulty vehicle is based on a parameter called path value. The computation of path value is done by the attributes such as expected End To End (E2E) delay, the shortest distance to destination, the density of vehicle between the junctions, and attenuation. From the current junction, the selection of the next junction is based on minimum path value. The proposed routing protocol considers the performance parameters such as E2E delay, total service time (TST), number of network fragments or network gaps, number of hops, and attenuation for the propagation path for the evaluation of the proposed methodology. The proposed routing algorithm is implemented through OmNet++ and SUMO. Results obtained for the proposed routing protocol is compared with three existing VANET protocols (GSR, A-STAR, and ARP) in terms of End To End delay, number of hops, number of vehicular gaps, and Total Service Time (TST).
相似文献• |
Adaptive zero-knowledge proofs: We ask whether it is possible to construct adaptive zero-knowledge proofs (with unconditional soundness) for all of NP\mathcal{NP}. Beaver (STOC [1996]) showed that known zero-knowledge proofs are not adaptively secure, and in addition showed how to construct zero-knowledge
arguments (with computational soundness). 相似文献
14.
Goldreich and Lindell (CRYPTO ’01) recently presented the first protocol for password-authenticated key exchange in the standard
model (with no common reference string or set-up assumptions other than the shared password). However, their protocol uses
several heavy tools and has a complicated analysis.
We present a simplification of the Goldreich–Lindell (GL) protocol and analysis for the special case when the dictionary is
of the form
i.e., the password is a short string chosen uniformly at random (in the spirit of an ATM PIN number). The security bound achieved
by our protocol is somewhat worse than the GL protocol. Roughly speaking, our protocol guarantees that the adversary can “break”
the scheme with probability at most
, whereas the GL protocol guarantees a bound of
.
We also present an alternative, more natural definition of security than the “augmented definition” of Goldreich and Lindell,
and prove that the two definitions are equivalent.
An extended abstract of this paper appeared in the First Theory of Cryptography Conference (TCC ’04) [22].
Minh-Huyen Nguyen: Supported by NSF grant CCR-0205423 and ONR grant N00014-04-1-0478.
Salil Vadhan: Supported by NSF grant CCR-0205423, a Sloan Research Fellowship, and ONR grant N00014-04-1-0478. Part of this
work done while at the Radcliffe Institute for Advanced Study. 相似文献
15.
Brassard and Crépeau [BCr] introduced a simple technique for producing zero-knowledge proof systems based on blobs. As is to be expected, their implementation rests on an unproven cryptographic assumption, specifically, that it is easy to generate numbers that are difficult to factor. In this paper we present an implementation of blobs based on a different cryptographic assumption, specifically, that it is easy to generate primes p over which it is difficult to compute discrete logarithms. If, in addition, we can produce a generator for Z
p
*
, this implementation then has the advantage that it leads to proof systems which are perfect zeroknowledge, rather than only almost perfect zero-knowledge.The relationship between factoring and finding discrete logarithms is not well understood, although Bach [Bac1] is an important contribution. Given our current state of number theoretic knowlege, there is no reason to prefer the cryptographic assumption required by one of these implementations over that required by the other. In any event, we introduce the notion of a product blob, whose favorable properties depend only on at least one of these assumptions holding.The first author was supported in part by NSA Grant MDA 904-84-H-00171. The second author was supported in part by NSF Grant DCR-8602562. 相似文献
16.
A New Bluetooth Scatternet Formation Protocol 总被引:6,自引:0,他引:6
A Bluetooth ad hoc network can be formed by interconnecting piconets into scatternets. The constraints and properties of Bluetooth scatternets present special challenges in forming an ad hoc network efficiently. In this paper, we present and analyze a new randomized distributed protocol for Bluetooth scatternet formation. We prove that our protocol achieves O(logn) time complexity and O(n) message complexity. The scatternets formed by our protocol have the following properties: (1) any device is a member of at most two piconets, and (2) the number of piconets is close to be optimal. These properties can help prevent overloading of any single device and lead to low interference between piconets. We validate the theoretical results by simulations, which also show that the scatternets formed have O(logn) diameter. As an essential part of the scatternet formation protocol, we study the problem of device discovery: establishing multiple connections simultaneously with many Bluetooth devices. We investigate the collision rate and time requirement of the inquiry and page processes. Our simulation results indicate that the total number of packets sent is O(n) and that the maximum number of packets sent by any single device is O(logn). 相似文献
17.
Mao-Lun ChiangAuthor Vitae 《Ad hoc Networks》2012,10(3):388-400
Reliability is an important research topic in the study of distributed systems. Under many circumstances, a healthy processor in a distributed system needs to reach a common agreement before performing some special tasks even if the faults exist. In order to achieve fault-tolerance in distributed systems, one must deal with the Byzantine Agreement (BA) problem. Most BA problem require all the healthy processors to obtain an agreement at the same round, this kind of agreement is called an Immediate Byzantine Agreement (IBA). Another kind of agreement, Eventual Byzantine Agreement (EBA), allows its participants to reach a common agreement at different rounds when the fact < fp (fact is the number of actual arbitrary faulty processors; fp is the number of tolerate arbitrary faulty processors). However, the traditional EBA problem is solved in well-defined networks, but the Mobile Ad hoc NETworks (MANETs) are increasing in popularity. Therefore, EBA problem is revisited under dual failure mode (processors and transmission media) in the MANET. The proposed protocol, Early Dual Agreement Protocol (EDAP), can achieve agreement while tolerating the maximum number of faulty processors and transmission media in a MANET by using the minimum number of message exchanges. Furthermore, our protocol can manage and organize the network efficiently even if the processors move around the network. 相似文献
18.
In this paper, we present a Petri net model for performance evaluation of IEEE 802.11 distributed coordination function as a popular media access control layer protocol in mobile ad hoc network. The goal of this evaluation is to examine this protocol under the existing of misbehavior nodes that selfishly try to grasp common channel in a neighbor area. The presented model consists of 2 separate models based on stochastic reward net (SRN), as a variation of stochastic Petri net. The first model, which is called one node operation model , is supposed for presenting all distributed coordination function operations in a single node such as collision avoidance, request to send/clear to send (RTS/CTS) handshake, and backoff mechanism. The next SRN model, all node operation model , is used for modeling nodes competition for occupying channel in a neighbor area. The models could be adjusted to a dynamic network with any number of nodes, dimension scale, and nodes' speed. For evaluation purpose, 4 distinct attack types implemented by modifying associated transitions in SRN models. The proposed SRN model has been quantified by deriving 2 performances metrics as Throughput and Delay . Both metrics are also compared to the value obtained from NS‐2 in terms of different number of nodes and 3 packet generation rates. Three additional metrics measuring the channel usage are also quantified in terms of different attack strategies using only presented SRN model. 相似文献
19.
Definitions and properties of zero-knowledge proof systems 总被引:4,自引:0,他引:4
In this paper we investigate some properties of zero-knowledge proofs, a notion introduced by Goldwasser, Micali, and Rackoff. We introduce and classify two definitions of zero-knowledge: auxiliary-input zero-knowledge and blackbox-simulation zero-knowledge. We explain why auxiliary-input zero-knowledge is a definition more suitable for cryptographic applications than the original [GMR1] definition. In particular, we show that any protocol solely composed of subprotocols which are auxiliary-input zero-knowledge is itself auxiliary-input zero-knowledge. We show that blackbox-simulation zero-knowledge implies auxiliary-input zero-knowledge (which in turn implies the [GMR1] definition). We argue that all known zero-knowledge proofs are in fact blackbox-simulation zero-knowledge (i.e., we proved zero-knowledge using blackbox-simulation of the verifier). As a result, all known zero-knowledge proof systems are shown to be auxiliary-input zero-knowledge and can be used for cryptographic applications such as those in [GMW2].We demonstrate the triviality of certain classes of zero-knowledge proof systems, in the sense that only languages in BPP have zero-knowledge proofs of these classes. In particular, we show that any language having a Las Vegas zero-knowledge proof system necessarily belongs to RP. We show that randomness of both the verifier and the prover, and nontriviality of the interaction are essential properties of (nontrivial) auxiliary-input zero-knowledge proofs.This research was partially supported by the Fund for Basic Research Administered by the Israeli Academy of Sciences and Humanities. Preliminary versions of this work have appeared in [O1] and [O2]. 相似文献
20.
Robust and Efficient Sharing of RSA Functions 总被引:3,自引:0,他引:3
We present two efficient protocols which implement robust threshold RSA signature schemes, where the power to sign is shared
by N players such that any subset of T+1 or more signers can collaborate to produce a valid RSA signature on any given message, but no subset of T or less corrupted players can forge a signature. Our protocols are robust in the sense that the correct signature is computed
even if up to T players behave in an arbitrarily malicious way during the signature protocol. This, in particular, includes the cases of
players who refuse to participate or who introduce erroneous values into the computation. Our robust protocols achieve optimal
resiliency as they can tolerate up to (N-1)/2 faults, and their efficiency is comparable with the efficiency of the underlying threshold RSA signature scheme. Our protocols
require RSA moduli which are the product of two safe primes, and that the underlying (centralized) RSA signature scheme is
unforgeable. Our techniques also apply to the secure sharing of the RSA decryption function.
We show that adding robustness to the existing threshold RSA schemes reduces to solving the problem of how to verify an RSA
signature without a public verification
Received 21 March 1997 and revised 28 September 1999 相似文献
|