I
nte
rna
t
io
na
l J
o
urna
l o
f
I
nfo
rm
a
t
ics a
n
d Co
m
m
un
ica
t
io
n T
ec
hn
o
lo
g
y
(
I
J
-
I
CT
)
Vo
l.
1
5
,
No
.
1
,
Ma
r
ch
2
0
2
6
,
p
p
.
42
8
~
43
7
I
SS
N:
2
2
5
2
-
8
7
7
6
,
DOI
: 1
0
.
1
1
5
9
1
/iji
ct.
v
1
5
i
1
.
p
p
42
8
-
43
7
428
J
o
ur
na
l ho
m
ep
a
g
e
:
h
ttp
:
//ij
ict.
ia
esco
r
e.
co
m
Reputatio
n
-
enha
nced t
wo
-
wa
y
hy
brid alg
o
rithm
for det
ecting a
t
tacks
in
W
SN
Div
y
a
B
ha
ra
t
hi Selv
a
ra
j
,
Veni
Su
n
da
ra
m
D
e
p
a
r
t
me
n
t
o
f
C
o
mp
u
t
e
r
S
c
i
e
n
c
e
,
K
a
r
p
a
g
a
m A
c
a
d
e
m
y
o
f
H
i
g
h
e
r
Ed
u
c
a
t
i
o
n
,
C
o
i
m
b
a
t
o
r
e
,
I
n
d
i
a
Art
icle
I
nfo
AB
S
T
RAC
T
A
r
ticle
his
to
r
y:
R
ec
eiv
ed
Oct
1
7
,
2
0
2
4
R
ev
is
ed
Oct
1
8
,
2
0
2
5
Acc
ep
ted
No
v
5
,
2
0
2
5
Wi
re
les
s
se
n
so
r
n
e
two
r
k
s
(W
S
N
s)
a
re
su
sc
e
p
ti
b
le
to
a
v
a
riety
o
f
a
tt
a
c
k
s,
su
c
h
a
s
d
a
ta
tam
p
e
rin
g
a
tt
a
c
k
s,
b
lac
k
h
o
le
a
tt
a
c
k
s,
a
n
d
g
ra
y
h
o
le
a
tt
a
c
k
s,
th
a
t
c
a
n
a
ffe
c
t
th
e
re
li
a
b
il
it
y
o
f
c
o
m
m
u
n
ica
ti
o
n
.
We
p
ro
p
o
se
d
a
r
e
p
u
tatio
n
-
e
n
h
a
n
c
e
d
tw
o
-
wa
y
h
y
b
r
id
a
l
g
o
ri
t
h
m
(RCHA
)
th
a
t
u
se
s
c
ry
p
t
o
g
ra
p
h
ic
h
a
sh
fu
n
c
ti
o
n
s
a
n
d
re
p
u
tatio
n
-
b
a
se
d
tr
u
st
m
a
n
a
g
e
m
e
n
t
to
d
e
tec
t
a
n
d
d
e
-
e
sc
a
lat
e
a
tt
a
c
k
s
a
c
c
u
ra
tely
.
Th
e
RCHA
a
lg
o
rit
h
m
imp
lem
e
n
ts
two
h
a
sh
fu
n
c
ti
o
n
s
RACE
in
te
g
ri
ty
p
rimiti
v
e
s’
e
v
a
lu
a
ti
o
n
m
e
ss
a
g
e
d
ig
e
st
(RIP
E
M
D) an
d
se
c
u
re
h
a
sh
a
lg
o
rit
h
m
(S
HA
-
3
),
t
o
in
it
ia
te
th
e
in
te
g
rit
y
c
h
e
c
k
fo
r
th
e
e
n
ti
re
p
a
c
k
e
t
se
n
t
a
c
ro
ss
th
e
n
e
two
rk
.
E
v
e
ry
n
o
d
e
in
th
e
WS
N t
ra
c
k
s a
re
p
u
tati
o
n
sc
o
re
fo
r
e
a
c
h
n
e
ig
h
b
o
r
th
e
n
o
d
e
is
c
o
n
n
e
c
ted
to
,
a
n
d
th
is
sc
o
re
is
d
y
n
a
m
ica
ll
y
u
p
d
a
te
d
b
a
se
d
o
n
th
e
b
e
h
a
v
i
o
r
o
f
e
a
c
h
n
e
i
g
h
b
o
r.
If
a
n
e
ig
h
b
o
r
i
n
g
n
o
d
e
’s
re
p
u
tatio
n
d
ro
p
s
b
e
lo
w
a
t
h
re
sh
o
l
d
,
t
h
e
n
o
d
e
is
se
n
t
a
m
a
li
c
io
u
sn
e
ss
d
e
sig
n
a
ti
o
n
.
At
th
a
t
ti
m
e
,
t
h
e
n
o
d
e
will
b
ro
a
d
c
a
st
a
n
a
lert
m
e
ss
a
g
e
to
it
s
n
e
ig
h
b
o
r
in
g
n
o
d
e
s
a
n
d
b
e
g
i
n
t
o
re
ro
u
te
it
s
d
a
ta
t
h
ro
u
g
h
o
n
e
o
f
i
ts
tru
ste
d
n
e
ig
h
b
o
rs
to
e
n
su
re
th
e
re
li
a
b
il
i
ty
o
f
t
h
e
c
o
m
m
u
n
ica
ti
o
n
.
T
h
e
s
imu
latio
n
re
su
lt
s
re
p
o
rte
d
th
a
t
th
e
RCHA
a
lg
o
rit
h
m
imp
r
o
v
e
d
th
e
a
c
c
u
ra
c
y
o
f
t
h
e
a
tt
a
c
k
d
e
tec
ti
o
n
ra
te
a
n
d
t
h
e
n
u
m
b
e
r
o
f
p
a
c
k
e
ts
d
e
li
v
e
re
d
c
o
m
p
a
re
d
to
trad
it
io
n
a
l
a
tt
a
c
k
d
e
tec
ti
o
n
m
e
t
h
o
d
s
.
T
h
e
RCHA
a
lg
o
rit
h
m
wa
s
a
b
le
to
m
a
in
tain
l
o
w
c
o
m
p
u
tati
o
n
a
l
a
n
d
e
n
e
rg
y
o
v
e
rh
e
a
d
f
o
r
th
e
WS
N,
m
a
k
in
g
it
a
n
a
tt
ra
c
ti
v
e
o
p
ti
o
n
f
o
r
a
re
so
u
rc
e
-
c
o
n
stra
in
e
d
a
p
p
li
c
a
ti
o
n
i
n
a
WS
N.
G
iv
e
n
th
e
tren
d
s t
o
wa
rd
s
m
o
re
c
o
ll
a
b
o
ra
ti
v
e
n
e
two
rk
s,
th
e
re
p
u
tati
o
n
m
e
c
h
a
n
i
sm
in
th
e
RCHA
a
lg
o
rit
h
m
imp
r
o
v
e
s
th
e
o
v
e
ra
ll
re
li
a
b
il
i
ty
a
n
d
c
a
p
a
b
il
i
ti
e
s
o
f
th
e
WS
N,
re
g
a
rd
les
s
o
f
a
d
v
e
rsa
ries
.
K
ey
w
o
r
d
s
:
Dete
ctin
g
attac
k
s
Mitig
atin
g
attac
k
s
Secu
r
e
h
ash
alg
o
r
ith
m
T
wo
-
way
h
y
b
r
id
Alg
o
r
ith
m
W
ir
eles
s
s
en
s
o
r
n
etwo
r
k
s
T
h
is i
s
a
n
o
p
e
n
a
c
c
e
ss
a
rticle
u
n
d
e
r th
e
CC B
Y
-
SA
li
c
e
n
se
.
C
o
r
r
e
s
p
o
nd
ing
A
uth
o
r
:
Div
y
a
B
h
ar
ath
i
Selv
ar
aj
Dep
ar
tm
en
t o
f
C
o
m
p
u
ter
Scie
n
ce
,
Kar
p
ag
a
m
Aca
d
em
y
o
f
H
ig
h
er
E
d
u
ca
tio
n
C
o
im
b
ato
r
e,
I
n
d
ia
E
m
ail: d
iy
a2
3
n
o
v
@
g
m
ail.
co
m
1.
I
NT
RO
D
UCT
I
O
N
T
h
e
m
ain
tex
t
f
o
r
m
at
co
n
s
is
ts
o
f
a
f
lat
lef
t
-
r
i
g
h
t
co
l
u
m
n
s
o
n
A4
p
ap
er
(
q
u
a
r
to
)
.
T
h
e
m
ar
g
in
tex
t
wir
eless
s
en
s
o
r
n
etwo
r
k
s
(
W
SN)
ar
e
s
p
atially
d
is
tr
ib
u
ted
s
en
s
o
r
n
o
d
es
th
at
s
en
s
e
p
h
y
s
ical
o
r
en
v
ir
o
n
m
en
tal
p
ar
am
eter
s
an
d
c
o
m
m
u
n
icate
th
e
s
en
s
ed
d
ata
to
s
in
k
s
.
B
ein
g
d
e
p
lo
y
ed
in
o
p
en
,
m
o
s
tly
u
n
atten
d
ed
lo
ca
tio
n
s
,
W
SN
s
ar
e
v
er
y
s
u
s
ce
p
tib
le
to
s
ev
er
al
ty
p
es
o
f
s
ec
u
r
ity
attac
k
s
lik
e
ea
v
esd
r
o
p
p
in
g
,
d
ata
tam
p
er
in
g
,
d
en
ial
-
of
-
s
er
v
ice
(
Do
S),
an
d
n
o
d
e
c
ap
tu
r
e
attac
k
s
.
T
h
ese
s
ec
u
r
ity
th
r
e
ats
h
av
e
a
m
ajo
r
im
p
ac
t
o
n
n
e
two
r
k
p
er
f
o
r
m
a
n
ce
an
d
in
teg
r
ity
o
f
th
e
d
ata
o
f
u
tm
o
s
t
p
r
i
o
r
ity
f
o
r
m
ilit
a
r
y
,
h
ea
lth
ca
r
e,
an
d
en
v
ir
o
n
m
en
tal
m
o
n
ito
r
in
g
ap
p
licatio
n
s
[
1
]
-
[
6
]
.
E
x
is
tin
g
s
ec
u
r
ity
s
o
lu
tio
n
s
,
s
u
ch
as
cr
y
p
to
g
r
ap
h
ic
p
r
o
t
o
co
ls
,
r
ep
r
esen
t
a
m
in
im
u
m
r
eq
u
ir
em
e
n
t
f
o
r
p
r
o
tectin
g
d
a
ta
tr
an
s
m
is
s
io
n
b
u
t
ten
d
to
b
e
in
s
u
f
f
icien
t
in
co
u
n
ter
m
ea
s
u
r
es
ag
ain
s
t
in
s
id
er
attac
k
s
an
d
e
x
tr
em
ely
d
y
n
am
i
c
m
alicio
u
s
ac
tiv
ities
[
7
]
-
[
1
1
]
.
R
ep
u
tatio
n
-
b
ased
tr
u
s
t
m
a
n
a
g
em
en
t
h
as
b
ee
n
a
g
o
o
d
co
m
p
lem
en
tar
y
s
o
lu
tio
n
en
a
b
lin
g
n
o
d
es
to
m
ak
e
ju
d
g
m
en
ts
a
b
o
u
t
n
eig
h
b
o
r
s
’
tr
u
s
t
o
n
th
e
b
asis
o
f
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
t J I
n
f
&
C
o
m
m
u
n
T
ec
h
n
o
l
I
SS
N:
2
2
5
2
-
8
7
7
6
R
ep
u
ta
tio
n
-
en
h
a
n
ce
d
tw
o
-
w
a
y
h
yb
r
id
a
lg
o
r
ith
m
fo
r
d
etec
tin
g
a
tta
ck
s
in
WS
N
(
Divy
a
B
h
a
r
a
th
i S
elva
r
a
j)
429
ex
p
er
ien
ce
.
Ne
v
er
th
eless
,
r
ep
u
tatio
n
s
y
s
tem
s
th
em
s
elv
es
ar
e
v
u
ln
er
a
b
le
to
f
alse
p
o
s
it
iv
es
an
d
ad
v
a
n
ce
d
attac
k
s
[
1
2
]
-
[
1
5
]
.
T
o
s
u
r
p
ass
t
h
ese
lim
itatio
n
s
,
h
y
b
r
id
m
ec
h
an
is
m
s
in
teg
r
atin
g
cr
y
p
to
g
r
ap
h
ic
v
er
if
icatio
n
an
d
r
ep
u
tatio
n
-
b
ased
tr
u
s
t
ass
ess
m
en
t
h
av
e
b
ee
n
e
x
p
lo
r
e
d
.
T
h
e
r
ep
u
tatio
n
-
en
h
a
n
ce
d
two
-
w
ay
h
y
b
r
id
alg
o
r
ith
m
(
R
C
HA)
i
s
in
tr
o
d
u
ce
d
t
o
ad
v
a
n
ce
s
ec
u
r
ity
with
two
cr
y
p
to
g
r
ap
h
ic
h
ash
f
u
n
ctio
n
s
,
R
AC
E
in
teg
r
ity
p
r
i
m
itiv
es’
ev
alu
atio
n
m
ess
ag
e
d
ig
est
(
R
I
PEM
D)
an
d
SHA
-
3
,
f
o
r
s
tr
ict
d
ata
in
te
g
r
i
ty
test
in
g
,
a
lo
n
g
with
d
y
n
am
ic
r
ep
u
tatio
n
s
co
r
es
f
o
r
p
r
ec
is
e
m
alicio
u
s
n
o
d
e
id
e
n
tific
atio
n
.
W
ith
th
e
u
s
e
o
f
th
ese
a
p
p
r
o
ac
h
es,
R
C
H
A
im
p
r
o
v
es
d
etec
tio
n
ac
cu
r
ac
y
an
d
r
ep
els
attac
k
s
ef
f
ec
tiv
e
ly
wh
ile
m
ain
tain
in
g
en
e
r
g
y
u
s
e
u
n
d
er
c
o
n
tr
o
l,
cr
u
cial
in
th
e
s
ce
n
ar
i
o
o
f
th
e
a
v
ailab
le
r
eso
u
r
c
es
in
s
en
s
o
r
n
o
d
es.
Desig
n
,
d
ev
elo
p
m
en
t,
a
n
d
test
in
g
o
f
R
C
HA
u
n
d
er
v
ar
io
u
s
W
SN
attac
k
s
t
r
ateg
ies
ar
e
p
r
esen
ted
in
th
is
p
ap
er
,
s
h
o
win
g
h
o
w
it
ca
n
p
r
o
v
id
e
s
ec
u
r
e
an
d
r
eliab
le
co
m
m
u
n
icatio
n
.
T
h
e
m
ain
co
n
tr
ib
u
tio
n
s
ar
e:
−
I
n
tr
o
d
u
ce
s
a
n
o
v
el
two
-
way
h
y
b
r
id
ap
p
r
o
ac
h
th
at
i
n
teg
r
ates
cr
y
p
t
o
g
r
a
p
h
ic
h
ash
f
u
n
ctio
n
s
(
R
I
PEM
D
an
d
SHA
-
3
)
with
a
d
y
n
a
m
ic
r
ep
u
tatio
n
-
b
ased
s
y
s
tem
to
en
h
an
ce
attac
k
d
etec
tio
n
an
d
d
ata
in
te
g
r
ity
in
W
SNs
.
−
Dev
elo
p
s
a
r
ea
l
-
tim
e
r
ep
u
tatio
n
s
co
r
in
g
m
ec
h
an
is
m
th
at
c
o
n
tin
u
o
u
s
ly
u
p
d
ates
b
ased
o
n
n
o
d
e
b
eh
av
io
r
,
en
ab
lin
g
ac
c
u
r
ate
id
en
tific
atio
n
an
d
is
o
latio
n
o
f
m
alicio
u
s
n
o
d
es.
−
Pro
p
o
s
es
a
tr
u
s
t
-
awa
r
e
r
er
o
u
tin
g
m
eth
o
d
th
at
co
llab
o
r
ates
with
h
ig
h
-
r
ep
u
tatio
n
n
eig
h
b
o
r
in
g
n
o
d
es
to
en
s
u
r
e
r
eliab
le
d
ata
d
eliv
er
y
a
n
d
p
r
e
v
en
t n
etwo
r
k
d
is
r
u
p
tio
n
ca
u
s
ed
b
y
c
o
m
p
r
o
m
is
ed
n
o
d
e
s
.
−
Dem
o
n
s
tr
ates
th
r
o
u
g
h
s
im
u
l
atio
n
th
at
R
C
HA
ac
h
iev
es
h
ig
h
er
d
etec
tio
n
ac
cu
r
ac
y
,
i
m
p
r
o
v
e
d
p
ac
k
et
d
eliv
er
y
r
atio
(
PDR
)
,
an
d
lo
wer
en
er
g
y
co
n
s
u
m
p
tio
n
co
m
p
ar
ed
t
o
tr
ad
itio
n
al
s
ec
u
r
it
y
m
ec
h
an
is
m
s
in
W
SN
s
.
Or
g
an
izatio
n
o
f
th
e
p
ap
er
:
I
n
th
is
p
a
p
er
,
th
e
in
t
r
o
d
u
ctio
n
o
f
d
etec
tin
g
an
d
m
itig
atin
g
attac
k
s
in
W
SN
is
ex
p
lain
ed
.
T
h
e
r
elate
d
wo
r
k
s
ar
e
d
is
cu
s
s
ed
in
s
ec
tio
n
2
.
T
h
e
d
ev
elo
p
m
en
t
is
ex
p
lain
ed
in
s
ec
tio
n
3
.
T
h
e
r
es
u
lts
ar
e
d
is
cu
s
s
ed
in
s
ec
tio
n
4
.
T
h
e
c
o
n
clu
s
io
n
s
ar
e
d
is
cu
s
s
ed
in
s
ec
tio
n
5
.
Fin
ally
,
th
e
r
ef
e
r
en
ce
s
ar
e
ad
d
ed
in
s
ec
tio
n
6
.
2.
RE
S
E
ARCH
M
E
T
H
O
D
Kee
r
th
ik
a
an
d
Sh
an
m
u
g
a
p
r
i
y
a
[
1
6
]
a
d
d
r
ess
ed
th
e
s
er
io
u
s
s
ec
u
r
ity
ch
allen
g
es
o
f
W
SNs
.
T
h
ey
s
tr
ess
ed
th
e
th
r
ea
ts
f
ac
ed
b
y
W
SN
s
f
r
o
m
b
o
th
ac
tiv
e
an
d
p
ass
iv
e
attac
k
s
,
ev
en
th
o
u
g
h
W
SNs
o
p
er
ate
in
s
u
ch
a
lig
h
t
an
d
th
i
n
en
v
i
r
o
n
m
e
n
t,
i.e
.
,
r
eso
u
r
ce
-
co
n
s
tr
ain
ed
.
T
h
ey
p
r
esen
ted
W
SNs
b
y
s
h
o
wi
n
g
s
ev
er
al
attac
k
s
s
u
ch
as
s
in
k
h
o
le,
Sy
b
il,
ea
v
es
d
r
o
p
p
in
g
an
d
d
is
cu
s
s
ed
th
eir
ad
v
er
s
e
ef
f
ec
ts
o
n
d
ata
in
teg
r
ity
an
d
th
e
o
v
er
all
n
etwo
r
k
p
er
f
o
r
m
an
ce
.
T
h
e
a
u
th
o
r
s
ex
p
l
o
r
ed
m
an
y
o
f
t
h
e
s
ec
u
r
ity
co
u
n
ter
m
ea
s
u
r
es
th
at
h
a
d
em
er
g
e
d
an
d
h
o
w
th
ey
ad
d
r
ess
ed
th
ese
s
ec
u
r
ity
th
r
ea
ts
with
r
ele
v
an
ce
t
o
th
e
f
u
n
d
am
en
tal
lig
h
tweig
h
t
a
n
d
en
er
g
y
-
ef
f
icien
t
p
r
o
p
er
t
ies o
f
W
SNs
.
T
h
ese
au
th
o
r
s
’
r
esear
c
h
p
r
o
v
i
d
ed
th
e
b
asis
o
f
u
n
d
er
s
tan
d
in
g
W
SN
s
ec
u
r
ity
c
h
allen
g
es
in
h
ig
h
ly
d
y
n
am
ic
an
d
r
eso
u
r
ce
-
co
n
s
tr
ain
ed
en
v
ir
o
n
m
e
n
ts
.
Kh
an
et
a
l.
[
1
7
]
ex
a
m
in
ed
h
o
w
ar
tific
ial
n
eu
r
al
n
etwo
r
k
s
(
ANNs)
en
h
a
n
ce
s
ec
u
r
ity
in
W
SNs
.
T
h
ey
h
ig
h
lig
h
ted
h
o
w
tr
ad
itio
n
al
s
ec
u
r
ity
m
ea
s
u
r
es
wer
e
lim
ited
in
d
etec
tin
g
d
y
n
a
m
ic
an
d
ad
v
a
n
ce
d
th
r
ea
ts
.
T
h
e
y
s
h
o
wed
h
o
w
th
e
in
cr
ea
s
in
g
ly
u
tili
ze
d
ANNs
o
f
f
er
ed
an
ad
ap
tiv
e
lear
n
in
g
ca
p
ab
ilit
y
th
at
allo
wed
,
am
o
n
g
o
th
e
r
s
,
n
o
v
el
r
ea
l
-
tim
e
th
r
ea
t d
etec
tio
n
an
d
class
if
ic
atio
n
.
T
h
eir
r
esear
ch
o
n
th
e
lim
itati
o
n
s
o
f
cu
r
r
en
t
a
p
p
r
o
ac
h
es
to
en
h
an
ce
r
esil
ien
ce
im
p
r
o
v
es
e
f
f
icien
cies
in
th
r
ea
t
r
esp
o
n
s
es
f
o
r
W
SNs
,
allo
wed
f
u
tu
r
e
im
p
lem
en
tatio
n
in
to
W
SN
s
with
in
tellig
en
t
m
o
d
els.
Ku
m
ar
et
a
l.
[
1
8
]
in
v
esti
g
ated
th
e
r
o
le
o
f
m
ac
h
i
n
e
lea
r
n
in
g
m
et
h
o
d
o
lo
g
ies
f
o
r
s
ec
u
r
in
g
W
SN
in
5
G
co
n
tex
ts
.
T
h
e
au
th
o
r
s
wer
e
lar
g
ely
ass
ess
in
g
ev
en
tu
al
r
is
k
p
r
o
b
a
b
ilit
ies
an
d
th
e
d
e
p
lo
y
m
en
t
o
f
d
e
v
ices/s
tr
ateg
ies
to
en
h
an
ce
r
esil
ien
cy
in
th
e
W
SN.
T
h
e
au
th
o
r
s
’
co
n
tr
ib
u
tio
n
was
to
d
em
o
n
s
tr
ate
th
at
in
tellig
en
t
m
o
d
els
wer
e
b
ein
g
u
s
ed
to
p
r
ed
ict
o
r
p
r
o
ac
tiv
ely
p
r
ev
en
t
p
o
ten
tial
s
ec
u
r
ity
th
r
ea
ts
.
T
h
is
h
as
b
ee
n
a
m
ajo
r
s
tep
f
o
r
war
d
in
th
e
d
ev
elo
p
m
e
n
t
o
f
ad
ap
tiv
e
an
d
s
ca
lab
le
s
ec
u
r
ity
m
ec
h
an
is
m
s
in
th
e
W
SN o
f
to
d
ay
’
s
wo
r
ld
.
L
ai
et
a
l.
[
1
9
]
ex
am
in
e
d
th
e
p
o
ten
tial
f
o
r
o
n
l
in
e
lear
n
in
g
s
tr
ateg
ies
to
h
an
d
le
Do
S
attac
k
s
in
W
SN
.
T
h
e
r
esear
ch
er
s
f
o
cu
s
ed
o
n
th
e
d
y
n
am
ic
n
atu
r
e
o
f
attac
k
s
an
d
th
e
im
m
ed
iacy
o
f
th
e
n
ee
d
to
p
r
o
v
id
e
d
etec
tio
n
.
T
h
e
a
u
th
o
r
s
wer
e
ab
le
to
u
s
e
ad
a
p
tiv
e
m
o
d
els
t
o
p
r
o
v
id
e
im
p
r
o
v
e
d
ac
c
u
r
ac
y
an
d
tim
elin
ess
f
o
r
p
o
ten
tial
m
alicio
u
s
ev
en
ts
.
T
h
e
ar
ticle
h
ig
h
lig
h
ted
a
n
d
ex
p
l
o
r
ed
th
e
r
o
le
o
f
co
n
tin
u
al
lear
n
in
g
in
d
e
v
elo
p
in
g
W
SN
s
ec
u
r
ity
.
Ma
d
h
u
r
i
an
d
Go
g
te
[
2
0
]
p
r
esen
ted
a
n
o
v
el
ap
p
r
o
ac
h
f
o
r
an
in
tr
u
s
io
n
d
e
tectio
n
s
y
s
tem
th
at
f
o
cu
s
es
o
n
n
o
d
e
-
le
v
el
d
r
o
p
a
ttack
s
in
W
SNs
.
T
h
e
r
esear
ch
elab
o
r
ated
a
d
etec
tio
n
ap
p
r
o
ac
h
th
at
p
r
o
v
i
d
ed
b
etter
ac
cu
r
ac
y
in
m
alicio
u
s
n
o
d
e
d
etec
tio
n
with
an
en
h
an
ce
d
d
etec
tio
n
alg
o
r
ith
m
.
T
h
e
s
tu
d
y
u
n
d
er
s
co
r
ed
th
e
p
o
ten
tial
n
o
d
e
-
lev
el
th
r
ea
ts
an
d
ev
en
th
e
n
ee
d
f
o
r
lo
ca
lized
p
r
o
tectio
n
.
T
h
e
s
tu
d
y
ad
d
ed
k
n
o
wled
g
e
to
war
d
s
lig
h
tweig
h
t a
n
d
e
f
f
icien
t secu
r
ity
s
y
s
tem
s
f
o
r
r
eso
u
r
ce
-
c
o
n
s
tr
ain
ed
W
SNs
.
Mo
u
n
d
o
u
n
g
a
an
d
Sato
r
i
[
2
1
]
p
r
o
p
o
s
ed
a
s
to
ch
asti
c
m
ac
h
i
n
e
lear
n
in
g
-
b
ased
f
r
am
ewo
r
k
f
o
r
attac
k
d
etec
tio
n
in
W
SNs
.
T
h
e
s
tu
d
y
ex
am
in
e
d
th
e
u
n
ce
r
tain
ty
a
n
d
v
a
r
iatio
n
o
f
s
en
s
o
r
d
ata
th
r
o
u
g
h
p
r
o
b
a
b
ilis
tic
lear
n
in
g
tech
n
i
q
u
es.
T
h
eir
s
to
ch
asti
c
m
ac
h
in
e
lear
n
in
g
-
b
ased
ap
p
r
o
ac
h
is
r
o
b
u
s
t
in
id
e
n
tify
in
g
an
an
o
m
aly
i
n
a
d
y
n
am
ic
m
o
d
el.
T
h
eir
co
n
tr
ib
u
tio
n
e
n
h
an
ce
d
th
e
r
eliab
ilit
y
o
f
in
tr
u
s
io
n
d
etec
tio
n
s
y
s
tem
s
in
W
SNs
.
Ozto
p
r
ak
et
a
l.
[
2
2
]
p
u
b
lis
h
e
d
a
t
h
o
r
o
u
g
h
r
e
v
iew
co
v
er
in
g
th
e
asp
ec
ts
o
f
s
ec
u
r
ity
ch
a
llen
g
es,
m
itig
atio
n
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N:
2
2
5
2
-
8
7
7
6
I
n
t J I
n
f
&
C
o
m
m
u
n
T
ec
h
n
o
l,
Vo
l.
1
5
,
No
.
1
,
Ma
r
ch
2
0
2
6
:
42
8
-
43
7
430
s
tr
ateg
ies,
an
d
tr
en
d
s
in
W
SNs
.
T
h
e
p
ap
er
o
u
tlin
ed
a
v
ar
iet
y
o
f
th
r
ea
t
m
o
d
els,
s
u
ch
as
in
ter
n
al
an
d
e
x
ter
n
al
th
r
ea
ts
,
as
well
as
p
r
o
v
id
ed
a
r
ev
iew
o
f
cu
r
r
e
n
t
co
u
n
ter
m
ea
s
u
r
es.
Fu
r
th
er
m
o
r
e,
it
f
o
cu
s
ed
o
n
th
e
n
ec
ess
ity
o
f
ev
o
lv
in
g
s
ec
u
r
ity
m
eth
o
d
s
f
o
r
m
o
d
er
n
ap
p
licatio
n
s
an
d
th
e
id
en
tific
atio
n
o
f
f
u
tu
r
e
W
SN
s
ec
u
r
ity
r
esear
c
h
d
ir
ec
tio
n
s
.
Pre
m
k
u
m
ar
et
a
l.
[
2
3
]
b
u
ilt
a
s
ca
lab
le
an
d
en
er
g
y
-
f
r
ien
d
ly
clu
s
ter
-
b
ased
an
o
m
aly
d
etec
ti
o
n
s
y
s
tem
to
p
r
o
tect
ag
ain
s
t
Do
S
attac
k
s
in
W
SNs
.
W
h
er
e
m
o
s
t
p
r
ev
io
u
s
r
esear
ch
o
n
ly
an
aly
ze
d
m
et
h
o
d
s
to
d
etec
t
D
o
S
attac
k
s
in
W
SNs
,
th
e
h
ier
ar
ch
ical
clu
s
ter
in
g
-
b
ased
m
o
d
el
d
ev
elo
p
ed
as
p
ar
t
o
f
th
eir
r
esear
ch
co
u
ld
m
itig
ate.
Ov
er
all,
th
e
r
esear
c
h
ad
d
r
ess
ed
th
e
in
ten
ti
o
n
o
f
p
r
o
v
id
i
n
g
p
r
o
lo
n
g
e
d
n
etwo
r
k
life
tim
e,
wh
ile
n
o
t
n
e
g
o
tiatin
g
th
e
p
r
o
tectio
n
o
f
th
e
W
SN.
T
h
e
r
esu
lts
in
d
icate
d
th
at
th
e
ap
p
r
o
ac
h
is
ef
f
ec
tiv
e
f
o
r
d
etec
tio
n
m
eth
o
d
s
in
m
u
ch
lar
g
er
s
en
s
o
r
d
ep
l
o
y
m
en
ts
.
R
am
esh
et
a
l.
[
2
4
]
p
r
esen
ted
a
n
o
p
tim
i
ze
d
d
ee
p
n
eu
r
al
n
etwo
r
k
m
o
d
el
aim
ed
a
t
d
etec
tin
g
Do
S
attac
k
s
in
wi
r
eless
v
id
eo
s
en
s
o
r
n
etwo
r
k
s
.
T
h
e
wo
r
k
s
o
u
g
h
t
im
p
r
o
v
e
m
en
t
o
v
er
m
o
d
els’
ca
p
ab
ilit
y
to
r
etr
iev
e
g
r
ea
te
r
r
ea
l
-
tim
e
d
etec
tio
n
p
er
f
o
r
m
a
n
c
e
with
r
e
d
u
ce
d
f
alse
p
o
s
itiv
es.
T
h
e
co
n
v
o
lu
tio
n
al
n
eu
r
al
n
etwo
r
k
ar
c
h
itectu
r
e
was
u
s
ed
with
tr
ad
itio
n
al
m
eth
o
d
s
an
d
d
em
o
n
s
tr
ated
s
ig
n
if
ican
tly
g
r
ea
ter
ac
cu
r
ac
y
.
T
h
ese
au
th
o
r
s
'
wo
r
k
in
d
icate
d
th
at
d
ee
p
lear
n
in
g
ap
p
r
o
ac
h
es
p
r
o
v
id
e
o
p
p
o
r
tu
n
ities
to
p
r
o
tect
an
d
s
ec
u
r
e
m
u
ltime
d
ia
-
b
ased
W
S
N
ap
p
licatio
n
s
.
Sad
ia
et
a
l.
[2
5
]
d
ev
elo
p
e
d
an
in
tr
u
s
io
n
d
et
ec
tio
n
s
y
s
tem
b
ased
o
n
m
ac
h
in
e
lea
r
n
in
g
s
p
ec
if
ic
ally
f
o
r
W
SNs
.
T
h
eir
wo
r
k
o
f
f
er
ed
a
u
n
iq
u
e
s
o
l
u
tio
n
b
y
h
ar
n
ess
in
g
m
u
ltip
le
class
if
ier
s
to
im
p
r
o
v
e
th
e
ac
cu
r
ac
y
o
f
th
r
ea
t
d
etec
tio
n
a
n
d
p
r
o
v
id
e
a
d
ap
tab
ilit
y
to
t
h
e
in
tr
u
s
io
n
d
etec
t
io
n
s
y
s
tem
.
T
h
e
s
tu
d
y
r
ec
o
g
n
ize
d
ch
allen
g
es
in
th
e
s
tate
o
f
th
e
ar
t,
in
clu
d
in
g
en
er
g
y
e
f
f
icien
cy
an
d
d
ata
im
b
alan
ce
,
wh
ile
o
f
f
er
in
g
a
p
r
ac
tical
an
s
wer
r
eg
ar
d
in
g
in
tellig
en
t
an
d
lig
h
tweig
h
t
s
ec
u
r
ity
in
W
S
N
en
v
ir
o
n
m
en
ts
.
T
ab
le
1
illu
s
tr
ates th
e
v
ar
io
u
s
attac
k
s
o
n
W
S
Ns.
T
h
e
tab
le
s
h
o
ws th
e
ac
cu
r
ac
y
o
f
ea
ch
au
th
o
r
’
s
r
esear
ch
.
T
ab
le
1
.
C
o
m
p
a
r
is
o
n
tab
le
o
f
v
ar
io
u
s
au
th
o
r
s
’
wo
r
k
o
n
attac
k
d
etec
tio
n
in
W
SNs
A
u
t
h
o
r
s
Y
e
a
r
A
l
g
o
r
i
t
h
m
/
Te
c
h
n
i
q
u
e
C
o
n
t
r
i
b
u
t
i
o
n
A
c
c
u
r
a
c
y
S
a
l
mi
a
n
d
O
u
g
h
d
i
r
[
2
6
]
2
0
2
3
D
e
e
p
l
e
a
r
n
i
n
g
mo
d
e
l
s (e
.
g
.
,
C
N
N
,
R
N
N
)
Ev
a
l
u
a
t
e
d
p
e
r
f
o
r
ma
n
c
e
o
f
d
e
e
p
l
e
a
r
n
i
n
g
t
e
c
h
n
i
q
u
e
s fo
r
D
o
S
a
t
t
a
c
k
d
e
t
e
c
t
i
o
n
i
n
W
S
N
s
9
5
%
S
u
j
i
h
e
l
e
n
e
t
a
l
.
[
2
7
]
2
0
2
2
N
o
d
e
r
e
p
l
i
c
a
t
i
o
n
a
t
t
a
c
k
d
e
t
e
c
t
i
o
n
a
l
g
o
r
i
t
h
m
P
r
o
p
o
se
d
a
d
i
s
t
r
i
b
u
t
e
d
m
e
c
h
a
n
i
sm
f
o
r
d
e
t
e
c
t
i
n
g
n
o
d
e
r
e
p
l
i
c
a
t
i
o
n
a
t
t
a
c
k
s
i
n
W
S
N
s
9
6
.
3
%
S
u
d
a
r
a
n
d
D
e
e
p
a
l
a
k
s
h
m
i
[
2
8
]
2
0
2
2
F
l
o
w
-
b
a
se
d
M
L
(
e
.
g
.
,
S
V
M
,
r
a
n
d
o
m
f
o
r
e
s
t
)
D
e
t
e
c
t
e
d
a
n
d
mi
t
i
g
a
t
e
d
l
o
w
-
r
a
t
e
D
D
o
S
a
t
t
a
c
k
s
i
n
S
D
N
u
si
n
g
M
L
w
i
t
h
t
r
a
f
f
i
c
f
l
o
w
a
n
a
l
y
s
i
s
9
4
%
W
a
n
g
e
t
a
l
.
[
2
9
]
2
0
2
4
G
D
3
N
(
G
r
a
p
h
-
b
a
se
d
d
y
n
a
mi
c
d
e
t
e
c
t
i
o
n
n
e
t
w
o
r
k
)
D
e
v
e
l
o
p
e
d
a
n
a
d
a
p
t
i
v
e
c
l
u
s
t
e
r
i
n
g
me
t
h
o
d
f
o
r
se
l
e
c
t
i
v
e
f
o
r
w
a
r
d
i
n
g
a
t
t
a
c
k
d
e
t
e
c
t
i
o
n
i
n
h
a
r
sh
e
n
v
i
r
o
n
me
n
t
s
9
7
.
5
%
Zh
a
i
e
t
a
l
.
[
3
0
]
2
0
2
2
Ti
mes
t
a
m
p
-
b
a
se
d
M
A
C
+
Li
g
h
t
w
e
i
g
h
t
p
r
o
t
o
c
o
l
D
e
si
g
n
e
d
a
s
e
c
u
r
e
,
e
n
e
r
g
y
-
e
f
f
i
c
i
e
n
t
s
e
r
v
i
c
e
f
o
r
a
t
t
a
c
k
d
e
t
e
c
t
i
o
n
i
n
W
S
N
s u
s
i
n
g
M
A
C
a
u
t
h
e
n
t
i
c
a
t
i
o
n
9
3
.
7
%
3.
M
AT
E
R
I
AL
S AN
D
M
E
T
H
O
DS
T
h
e
R
C
HA
a
lg
o
r
ith
m
id
en
t
if
ies
an
d
r
em
o
v
es
attac
k
s
in
W
SNs
wh
ile
s
im
u
ltan
eo
u
s
ly
f
u
s
in
g
r
ep
u
tatio
n
-
b
ased
tr
u
s
t
ev
alu
a
tio
n
an
d
cr
y
p
to
g
r
ap
h
ic
in
teg
r
ity
ch
ec
k
s
.
E
ac
h
n
o
d
e
m
ain
tain
s
a
d
y
n
am
i
c
r
ep
u
tatio
n
s
co
r
e
o
f
its
n
eig
h
b
o
r
in
g
n
o
d
es
b
y
ass
ess
in
g
th
eir
r
ec
en
t
co
m
m
u
n
icatio
n
b
e
h
av
io
r
.
E
ac
h
d
ata
p
ac
k
et
is
ad
d
itio
n
ally
h
ash
ed
u
s
in
g
R
I
PEM
D
an
d
SHA
-
3
to
d
e
tect
tam
p
er
in
g
a
n
d
u
n
au
th
o
r
i
ze
d
m
o
d
i
f
icatio
n
s
.
W
h
en
ev
er
a
m
alicio
u
s
n
o
d
e
i
s
d
etec
ted
,
s
p
ec
ial
ale
r
t
m
ess
ag
es
ar
e
p
r
o
p
ag
ated
o
u
t
to
th
e
r
est
o
f
th
e
n
o
d
es
s
u
ch
th
at
co
m
m
u
n
icatio
n
is
r
e
r
o
u
ted
t
h
r
o
u
g
h
a
s
tr
in
g
o
f
tr
u
s
ted
n
o
d
es.
Fu
r
th
e
r
,
b
y
allo
wi
n
g
th
e
n
o
d
es
to
b
e
awa
r
e
o
f
r
eh
a
b
ilit
atio
n
/m
itig
atio
n
s
o
f
m
alicio
u
s
n
o
d
es,
it
e
n
h
an
ce
s
th
e
n
o
d
es’
p
r
o
b
a
b
ilit
y
o
f
h
av
i
n
g
s
ec
u
r
e,
r
eliab
le
co
m
m
u
n
icatio
n
s
an
d
f
u
r
th
er
r
ed
u
ce
s
th
e
lik
eli
h
o
o
d
an
d
ef
f
ec
t
o
f
attac
k
s
.
Fig
u
r
e
1
s
h
o
ws
th
e
o
v
e
r
all
ar
ch
itectu
r
e.
Fig
u
r
e
1
.
Ov
e
r
all
ar
ch
itectu
r
e
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
t J I
n
f
&
C
o
m
m
u
n
T
ec
h
n
o
l
I
SS
N:
2
2
5
2
-
8
7
7
6
R
ep
u
ta
tio
n
-
en
h
a
n
ce
d
tw
o
-
w
a
y
h
yb
r
id
a
lg
o
r
ith
m
fo
r
d
etec
tin
g
a
tta
ck
s
in
WS
N
(
Divy
a
B
h
a
r
a
th
i S
elva
r
a
j)
431
R
C
H
A
W
SN
s
’
ar
ch
itectu
r
e
u
s
es
s
ev
er
al
lay
er
s
o
f
s
ec
u
r
ity
to
p
r
o
v
id
e
ef
f
e
ctiv
e
attac
k
d
etec
tio
n
an
d
m
itig
atio
n
.
Sen
s
o
r
n
o
d
es
ex
ch
an
g
e
m
ess
ag
es
an
d
s
en
d
in
f
o
r
m
atio
n
,
an
d
a
b
e
h
av
io
r
an
aly
s
is
m
o
d
u
le
m
o
n
ito
r
s
th
em
co
n
tin
u
o
u
s
ly
.
T
wo
h
ash
f
u
n
ctio
n
s
(
R
I
PEM
D
an
d
SHA
-
3
)
ar
e
u
tili
ze
d
f
o
r
d
at
a
in
teg
r
ity
ch
ec
k
s
.
A
r
ep
u
tatio
n
s
y
s
tem
q
u
a
n
ti
f
ies
n
o
d
e
t
r
u
s
t
b
ased
o
n
b
eh
a
v
io
r
a
n
d
h
ash
v
er
i
f
icatio
n
o
u
tco
m
e.
W
h
en
s
u
c
h
an
o
m
alies
as
h
ash
m
is
m
atch
e
s
o
r
p
lain
p
ac
k
et
lo
s
s
ar
e
id
e
n
tifie
d
,
th
e
s
y
s
tem
d
etec
ts
th
e
ev
il
n
o
d
e,
s
en
d
s
alar
m
s
ig
n
als,
an
d
u
p
d
ates
r
e
p
u
tatio
n
v
al
u
es.
Mitig
atio
n
is
u
ltima
tely
r
ea
l
ized
b
y
f
o
r
wa
r
d
in
g
d
ata
th
r
o
u
g
h
h
ig
h
-
r
e
p
u
tatio
n
,
tr
u
s
ted
n
o
d
es
to
en
s
u
r
e
s
ec
u
r
e
c
o
m
m
u
n
icatio
n
.
3
.
1
.
Det
ec
t
ing
a
nd
m
it
ig
a
t
ing
a
t
t
a
ck
s
in WSNs
Attack
d
etec
tio
n
an
d
m
itig
atio
n
in
W
SNs
co
n
s
i
s
t
o
f
id
en
tify
in
g
r
o
g
u
e
o
r
m
alicio
u
s
ac
tiv
ities
lik
e
d
ata
tam
p
er
in
g
,
p
ac
k
et
lo
s
s
,
o
r
illeg
al
ac
ce
s
s
an
d
attem
p
tin
g
to
less
en
th
eir
ef
f
ec
ts
.
De
tectio
n
is
g
en
er
ally
d
o
n
e
u
s
in
g
tr
u
s
t
m
o
d
els,
an
o
m
aly
d
etec
tio
n
,
o
r
c
r
y
p
to
g
r
ap
h
y
.
Dete
ctio
n
p
r
o
m
p
ts
m
it
ig
atio
n
th
r
o
u
g
h
t
h
e
is
o
latio
n
o
f
r
o
g
u
e
n
o
d
es,
n
o
tific
atio
n
o
f
b
o
r
d
e
r
n
o
d
es,
an
d
d
ata
r
e
-
r
o
u
tin
g
th
r
o
u
g
h
tr
u
s
ted
ch
an
n
els.
T
h
e
o
b
jectiv
e
is
to
u
p
h
o
ld
d
at
a
in
teg
r
ity
,
n
etwo
r
k
a
v
ailab
ilit
y
,
an
d
s
y
s
tem
-
wid
e
d
ep
en
d
ab
i
lity
in
t
h
e
ev
en
t
o
f
attac
k
s
.
Fig
u
r
e
2
s
h
o
ws
an
ex
am
p
le
o
f
a
W
SN
s
u
ch
th
at
n
o
d
es
(
A
to
N)
ar
e
estab
lis
h
ed
to
cr
ea
te
an
in
f
o
r
m
atio
n
n
etwo
r
k
.
All
th
e
n
o
d
es
ar
e
s
en
s
o
r
s
,
an
d
in
f
o
r
m
atio
n
m
o
v
es
am
o
n
g
s
t
th
em
in
m
u
lti
-
h
o
p
m
o
d
e.
I
t sh
o
ws s
o
m
e
o
f
th
e
attac
k
s
i
n
W
SN.
F
ig
u
r
e
2
.
So
m
e
o
f
th
e
attac
k
s
in
W
SN
3
.
2
.
Reput
a
t
io
n
-
enha
nced
t
wo
-
wa
y
hy
brid a
lg
o
rit
hm
T
h
e
two
-
way
h
y
b
r
id
al
g
o
r
ith
m
with
r
ep
u
tatio
n
e
n
h
an
ce
m
e
n
t
(
R
C
HA)
id
en
tifie
s
an
d
p
r
e
v
en
ts
W
SN
attac
k
s
b
y
ap
p
ly
in
g
th
e
i
n
ter
s
ec
tio
n
o
f
r
ep
u
tatio
n
-
b
ased
m
o
n
ito
r
i
n
g
a
n
d
c
r
y
p
t
o
g
r
ap
h
ic
h
ash
f
u
n
ctio
n
s
(
R
I
PEM
D
an
d
SHA
-
3
)
.
No
d
e
s
h
o
ld
a
d
y
n
am
ic
n
eig
h
b
o
r
in
g
n
o
d
e
r
ep
u
tatio
n
s
co
r
e
b
ased
o
n
th
eir
ac
tiv
ities
,
in
clu
d
in
g
p
ac
k
et
f
o
r
war
d
in
g
a
n
d
in
teg
r
ity
.
Ma
licio
u
s
n
o
d
es
ar
e
id
en
tifie
d
an
d
m
ar
k
e
d
as
s
u
s
p
icio
u
s
b
y
u
s
in
g
lo
w
-
s
co
r
in
g
n
o
d
es,
a
n
d
war
n
i
n
g
m
ess
ag
es
ar
e
f
o
r
war
d
ed
to
s
u
r
r
o
u
n
d
in
g
n
o
d
es.
T
h
e
n
et
wo
r
k
s
u
b
s
eq
u
en
tly
s
teer
s
clea
r
o
f
r
o
u
tin
g
th
r
o
u
g
h
m
alicio
u
s
n
o
d
es,
en
s
u
r
in
g
s
ec
u
r
e
an
d
c
r
ed
ib
le
d
ata
tr
an
s
m
is
s
io
n
.
Fig
u
r
e
3
illu
s
tr
ates a
s
ec
u
r
e
d
ata
tr
an
s
f
er
p
r
o
ce
s
s
in
th
e
W
SN u
s
in
g
R
C
HA.
I
t
s
tar
ts
with
th
e
d
ep
lo
y
m
en
t
o
f
s
en
s
o
r
n
o
d
es
a
n
d
d
ata
t
r
an
s
f
er
,
t
h
en
d
u
al
h
ash
es
(
S
HA
-
3
an
d
R
I
PEM
D)
ar
e
g
en
er
ated
to
en
s
u
r
e
d
ata
in
teg
r
ity
v
er
if
icatio
n
.
T
h
er
e
is
a
r
e
p
u
tatio
n
m
o
d
u
le
th
at
m
o
n
ito
r
s
n
o
d
e
ac
tiv
ity
,
lab
elin
g
th
em
as
tr
u
s
t
ed
o
r
m
alicio
u
s
.
On
ce
a
n
an
o
m
aly
is
d
etec
ted
,
alar
m
s
ar
e
a
ctiv
ated
,
an
d
d
ata
is
p
ass
ed
th
r
o
u
g
h
tr
u
s
ted
n
o
d
es i
n
o
r
d
e
r
to
d
eliv
er
it in
a
s
ec
u
r
e
way
to
th
e
b
ase
s
tatio
n
.
3
.
2
.
1
.
Set
up
s
im
ula
t
io
n e
nv
iro
nm
ent
T
h
er
e
ar
e
m
a
n
y
way
s
to
ex
ec
u
te
an
d
test
th
e
R
C
HA
alg
o
r
ith
m
.
A
v
ar
iety
o
f
s
i
m
u
latio
n
en
v
ir
o
n
m
e
n
ts
ar
e
av
ailab
le,
in
clu
d
i
n
g
NS2
/
NS3
,
OM
NeT
++
,
MA
T
L
AB
,
o
r
C
o
n
tik
i
-
C
o
o
ja;
ea
ch
will
v
ar
y
d
e
p
en
d
i
n
g
o
n
h
o
w
co
m
p
lex
a
n
d
/o
r
v
is
u
al
th
e
s
im
u
latio
n
n
ee
d
s
to
b
e.
I
n
t
h
is
s
im
u
latio
n
ass
ig
n
m
en
t,
an
a
r
b
itra
r
y
n
u
m
b
er
o
f
s
en
s
o
r
n
o
d
es
ca
n
b
e
d
e
p
lo
y
e
d
eith
er
in
a
r
an
d
o
m
m
an
n
e
r
o
r
in
a
g
r
id
m
an
n
er
in
to
a
d
eter
m
in
is
tic
ar
ea
,
wh
ich
ca
n
b
e
a
W
SN.
T
h
e
n
o
d
es
ca
n
co
m
m
u
n
icate
with
ea
ch
o
t
h
er
u
s
in
g
C
B
R
,
UDP,
o
r
T
C
P
tr
af
f
ic
m
o
d
els
to
s
im
u
late
th
e
r
ea
l
tr
an
s
m
is
s
io
n
o
f
r
ea
l
-
tim
e
d
ata.
M
o
d
alities
o
f
attac
k
s
ca
n
also
o
cc
u
r
t
o
test
h
o
w
well
th
e
R
C
H
A
ca
n
d
etec
t
an
d
m
itig
ate
th
r
ea
ts
,
s
u
ch
as
b
lack
h
o
le
(
p
ac
k
et
d
r
o
p
p
in
g
)
,
g
r
ay
h
o
le
(
s
el
ec
tiv
e
f
o
r
war
d
in
g
)
,
Sy
b
il
(
id
en
tity
s
p
o
o
f
in
g
)
,
a
n
d
d
ata
tam
p
e
r
in
g
(
p
ay
l
o
ad
t
am
p
er
in
g
)
attac
k
s
,
to
ass
ess
h
o
w
m
u
c
h
tr
u
s
t
is
d
eg
r
ad
e
d
,
h
o
w
s
ta
b
le
th
e
m
is
r
o
u
tin
g
g
ets,
o
r
h
o
w
s
ev
er
ely
t
h
e
d
ata
ca
n
b
e
co
m
p
r
o
m
is
ed
.
All
o
f
th
ese
attac
k
s
wer
e
in
clu
d
ed
i
n
th
e
s
im
u
latio
n
s
etu
p
to
em
u
late
W
SN c
o
n
d
itio
n
s
wh
ile
u
n
d
er
th
r
ea
t a
p
p
r
o
p
r
iately
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N:
2
2
5
2
-
8
7
7
6
I
n
t J I
n
f
&
C
o
m
m
u
n
T
ec
h
n
o
l,
Vo
l.
1
5
,
No
.
1
,
Ma
r
ch
2
0
2
6
:
42
8
-
43
7
432
Fig
u
r
e
3
.
R
C
HA
ar
ch
itectu
r
e
3
.
2
.
2
.
No
de
re
pu
t
a
t
io
n sy
s
t
em
I
n
t
h
e
R
C
HA
alg
o
r
ith
m
,
ea
ch
s
en
s
o
r
n
o
d
e
in
th
e
W
SN
s
tar
ts
with
a
n
eu
tr
al
r
ep
u
tatio
n
s
c
o
r
e
o
f
0
.
5
,
wh
ich
in
d
icate
s
a
s
em
i
-
tr
u
s
t
s
tate
with
th
e
s
en
s
o
r
n
o
d
e.
As
n
o
d
es
p
e
r
f
o
r
m
ac
tio
n
s
,
th
eir
n
eig
h
b
o
r
in
g
n
o
d
es
will
cr
ea
te
a
s
et
o
f
m
ea
s
u
r
em
en
ts
b
ased
o
n
t
h
e
th
r
ee
p
a
r
am
eter
s
:
th
e
ac
cu
r
ac
y
o
f
p
ac
k
et
f
o
r
war
d
in
g
(
co
n
f
ir
m
i
n
g
p
ac
k
ets
g
et
r
elay
ed
)
,
r
esp
o
n
s
e
tim
e
(
co
n
f
ir
m
in
g
wh
eth
er
r
esp
o
n
s
es
o
r
ac
k
n
o
wled
g
m
en
ts
o
cc
u
r
o
n
tim
e)
,
an
d
d
ata
in
teg
r
ity
(
v
er
if
y
in
g
th
at
th
e
d
ata
tr
an
s
m
itted
r
em
ain
s
u
n
ch
an
g
e
d
th
r
o
u
g
h
cr
y
p
to
g
r
ap
h
ic
h
as
h
f
u
n
ctio
n
s
s
u
ch
as
SHA
-
3
o
r
R
I
PEM
D)
.
E
ac
h
s
en
s
o
r
n
o
d
e,
b
ased
o
n
its
o
b
s
er
v
atio
n
s
o
f
a
n
o
d
e’
s
ac
tio
n
s
,
will
p
r
o
d
u
ce
b
in
ar
y
tr
u
s
t
v
alu
es
,
wh
er
e
B
=1
in
d
icate
s
tr
u
s
t
b
eh
av
io
r
as
a
s
en
s
o
r
n
o
d
e
an
d
B
=0
in
d
icate
s
tr
u
s
t
f
o
r
u
n
tr
u
s
two
r
th
y
o
r
m
al
icio
u
s
b
eh
av
io
r
.
T
h
is
will
s
u
p
p
ly
a
b
ase
f
o
r
d
y
n
am
ically
u
p
d
atin
g
th
e
n
o
d
e
’
s
r
ep
u
tatio
n
s
co
r
e
o
v
e
r
tim
e.
=
∙
+
(
1
−
)
∙
(
1
)
W
h
er
e
is
u
p
d
ated
r
ep
u
tatio
n
,
α
is
th
e
weig
h
tin
g
f
ac
to
r
(
e.
g
.
,
0
.
7
)
,
an
d
B
is
a
b
in
ar
y
tr
u
s
t
b
eh
av
io
r
(
1
f
o
r
g
o
o
d
,
0
f
o
r
m
alicio
u
s
)
.
I
n
(
1
)
is
an
ap
p
r
o
ac
h
th
at
en
s
u
r
es
tr
u
s
t
is
ad
ap
tiv
ely
ass
ig
n
ed
b
ased
o
n
co
n
s
is
ten
t
b
eh
av
io
r
.
3
.
2
.
3
.
At
t
a
c
k
det
ec
t
io
n lo
g
ic
I
n
t
h
e
R
C
HA
alg
o
r
ith
m
,
att
ac
k
d
etec
tio
n
r
elies
o
n
o
n
g
o
in
g
m
o
n
ito
r
in
g
a
n
d
r
ea
s
o
n
in
g
o
f
n
o
d
e
b
eh
av
io
r
th
r
o
u
g
h
b
o
th
r
ep
u
tat
io
n
an
d
r
ec
eiv
ed
d
ata
in
teg
r
it
y
ch
ec
k
in
g
.
A
n
o
d
e
’
s
b
eh
a
v
io
r
b
ec
o
m
es
s
u
s
p
ec
t
wh
en
o
n
e
o
r
m
o
r
e
o
f
th
e
f
o
llo
win
g
o
cc
u
r
s
:
I
f
a
n
o
d
e
co
n
tin
u
o
u
s
ly
d
r
o
p
s
p
ac
k
ets,
o
r
s
h
o
ws
ev
id
en
ce
th
at
i
t
m
o
d
if
ied
d
ata
alo
n
g
th
e
wa
y
,
th
r
o
u
g
h
ac
k
n
o
wled
g
m
en
ts
o
r
m
is
m
atch
ed
h
ash
v
alu
es
,
it
is
co
n
s
id
er
ed
s
u
s
p
icio
u
s
b
eh
av
io
r
.
E
ac
h
n
o
d
e’
s
b
eh
a
v
io
r
is
s
co
r
ed
o
v
er
tim
e,
as
estab
lis
h
ed
b
y
th
e
r
ep
u
tatio
n
s
co
r
in
g
m
ec
h
an
is
m
.
I
f
a
n
o
d
e’
s
r
ec
eiv
ed
r
ep
u
tatio
n
d
ip
s
b
en
ea
th
a
t
h
r
esh
o
ld
(
e.
g
.
,
<
0
.
3
g
iv
en
a
s
ca
le
f
r
o
m
0
-
1
)
,
it
is
co
n
s
id
er
ed
n
o
t
tr
u
s
two
r
th
y
b
e
h
av
io
r
.
E
s
s
en
tially
,
th
is
d
ec
r
e
ase
in
s
co
r
e
ca
n
b
e
ex
p
ec
ted
b
y
m
u
ltip
le
b
in
a
r
y
tr
u
s
t
v
io
latio
n
s
(
e.
g
.
,
n
o
t
f
o
r
war
d
in
g
d
ata,
tam
p
er
in
g
)
.
I
f
th
e
r
ec
eiv
er
en
c
o
u
n
ter
s
an
e
x
ce
s
s
iv
e
am
o
u
n
t
o
f
m
is
m
atch
ed
r
ec
o
m
p
u
ted
h
ash
v
alu
es
with
th
o
s
e
r
ec
eiv
ed
in
th
e
p
ac
k
et
(
R
I
PEM
D
an
d
SHA
-
3
)
,
th
er
e
is
s
tr
o
n
g
ev
id
en
ce
o
f
d
is
ag
r
ee
m
e
n
t
at
wh
ich
s
u
s
p
icio
n
lies
with
th
e
s
en
d
er
.
On
ce
a
n
o
d
e
is
f
lag
g
e
d
as
m
a
licio
u
s
:
u
p
o
n
s
en
s
in
g
a
s
u
s
p
icio
u
s
n
o
d
e,
th
e
d
etec
tin
g
n
o
d
e
n
o
tifie
s
its
n
eig
h
b
o
r
s
b
y
b
r
o
ad
ca
s
tin
g
an
aler
t
m
ess
ag
e.
3
.
2
.
4
.
M
it
ig
a
t
io
n str
a
t
e
g
y
I
n
th
e
R
C
HA
alg
o
r
ith
m
,
th
e
m
itig
atio
n
ap
p
r
o
ac
h
co
n
s
is
ts
o
f
an
aler
tin
g
p
h
ase,
in
wh
ich
t
h
e
d
etec
tin
g
n
o
d
e
t
r
an
s
m
its
a
war
n
in
g
to
all
its
n
eig
h
b
o
r
n
o
d
es
ab
o
u
t
th
e
n
o
d
e
s
u
s
p
ec
ted
o
f
b
ei
n
g
m
alicio
u
s
.
T
h
e
alg
o
r
ith
m
ca
n
also
p
er
f
o
r
m
r
o
u
tin
g
ac
tio
n
s
to
m
itig
ate
o
v
er
b
a
d
r
o
u
tes
b
y
tr
y
in
g
t
o
av
o
id
r
o
u
tes
with
r
ep
u
tatio
n
o
f
ze
r
o
,
a
n
d
tr
y
to
u
s
e
h
ig
h
r
ep
u
tatio
n
s
o
v
er
lo
w
r
ep
u
tatio
n
s
wh
en
p
o
s
s
ib
le.
Ad
d
itio
n
ally
,
th
er
e
is
p
r
o
v
is
io
n
f
o
r
r
ep
u
tatio
n
r
ec
o
v
er
y
,
wh
er
e
if
th
e
n
o
d
e
im
p
r
o
v
es
o
v
er
tim
e
(
i.e
.
,
f
o
r
war
d
s
p
ac
k
ets
co
r
r
ec
tly
an
d
d
o
es
n
o
t
ch
a
n
g
e
p
ac
k
ets),
th
e
y
ca
n
b
e
g
in
to
in
cr
ea
s
e
its
r
ep
u
tatio
n
g
r
a
d
u
ally
a
n
d
h
a
v
e
a
ch
an
ce
o
f
r
ejo
in
in
g
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
t J I
n
f
&
C
o
m
m
u
n
T
ec
h
n
o
l
I
SS
N:
2
2
5
2
-
8
7
7
6
R
ep
u
ta
tio
n
-
en
h
a
n
ce
d
tw
o
-
w
a
y
h
yb
r
id
a
lg
o
r
ith
m
fo
r
d
etec
tin
g
a
tta
ck
s
in
WS
N
(
Divy
a
B
h
a
r
a
th
i S
elva
r
a
j)
433
th
e
n
etwo
r
k
f
air
ly
.
Ov
er
all,
th
ese
ap
p
r
o
ac
h
es
will
en
ab
le
b
o
th
s
ec
u
r
e
an
d
ef
f
icien
t
u
s
e
o
f
W
SN
f
o
r
co
m
m
u
n
icatio
n
.
Alg
o
r
ith
m
1
d
em
o
n
s
tr
ate
th
e
ess
en
tial
d
ef
in
itio
n
o
f
R
C
HA.
T
h
e
aim
is
t
o
en
h
an
ce
s
ec
u
r
ity
th
r
o
u
g
h
a
p
e
r
f
o
r
m
an
ce
-
b
ased
r
ep
u
tatio
n
m
ec
h
an
is
m
o
f
co
n
tin
u
o
u
s
ly
e
v
alu
ates
n
o
d
e
b
e
h
av
io
r
s
in
ten
d
e
d
to
s
ec
u
r
e
co
m
m
u
n
icatio
n
in
W
SNs
.
Alg
o
r
ith
m
1
.
R
ep
u
tatio
n
-
en
h
a
n
ce
d
two
-
way
h
y
b
r
id
alg
o
r
ith
m
(
R
C
HA)
Input:
N ← Set of all sensor nodes
P ← Set of packets transmitted
T ← Reputation threshol
d (e.g., 0.3)
α ← Weight factor for reputation update (e.g., 0.7)
Initialize:
For each node ni
∈
N:
Set reputation[ni] ← 0.5
For each packet p
∈
P:
sender ← Source node of p
receiver ← Destination node of p
Step 1: Data Integr
ity Check
hash1 ← RIPEMD(data)
hash2 ← SHA3(data)
if hash1 and hash2 match the expected values:
Behavior ← 1
else:
Behavior ← 0
Step 2: Update the Reputation of the sender
reputation[sender] ← α * reputation[sender] + (1
-
α) * Behavior
Step 3: Detection and Alert
if reputation[sender] < T:
Mark the sender as malicious
Broadcast an ALERT to the neighbors of the sender
Step 4: Mitigation
For ea
ch neighbor node n:
if reputation[n] ≥ T:
Reroute packets via node n
if else:
Avoid sending packets through node
else:
Continue normal communication
End For
Output:
Secure routing pat
hs, avoiding malicious nodes
Reputation scores of all nodes
4.
RE
SU
L
T
S AN
D
D
I
SCU
SS
I
O
NS
T
h
e
r
esu
lts
o
f
th
is
s
tu
d
y
ev
al
u
ated
th
e
R
C
HA
alg
o
r
ith
m
b
ased
o
n
W
SN
s
im
u
latio
n
p
ar
a
m
eter
s
an
d
d
eter
m
in
ed
a
p
o
s
itiv
e
im
p
ac
t
o
n
attac
k
d
etec
tio
n
as
well
as
a
p
o
s
itiv
e
im
p
ac
t
o
n
d
ata
d
eliv
er
y
r
eliab
ilit
y
.
R
C
H
A
m
eth
o
d
was
ab
le
to
ac
h
iev
e
a
b
etter
d
etec
tio
n
ac
c
u
r
ac
y
wh
en
m
ea
s
u
r
i
n
g
r
eliab
ilit
y
s
y
s
tem
s
th
an
th
e
co
m
m
o
n
tr
u
s
t
-
b
ased
ap
p
r
o
ac
h
o
r
th
e
co
m
m
o
n
cr
y
p
to
g
r
ap
h
ic
ap
p
r
o
ac
h
,
as
it
was
ab
le
to
u
s
e
d
u
al
h
ash
v
er
if
icatio
n
(
R
I
PEM
D
an
d
S
HA
-
3
)
alo
n
g
with
ad
ap
tiv
e
r
e
p
u
tatio
n
s
co
r
in
g
an
d
s
u
cc
ess
f
u
lly
f
o
u
n
d
m
alicio
u
s
node
s
wh
ile
m
ain
tain
in
g
a
b
etter
PDR
.
Al
s
o
,
th
e
o
v
er
h
e
ad
f
r
o
m
u
s
in
g
h
ash
in
g
was
n
ea
r
n
eg
lig
ib
le
in
co
m
p
ar
is
o
n
to
th
e
en
h
an
ce
m
en
t
in
s
ec
u
r
ity
o
f
f
er
ed
b
y
h
ash
in
g
.
E
n
e
r
g
y
co
n
s
u
m
p
tio
n
was
f
o
u
n
d
t
o
b
e
b
alan
ce
d
with
th
e
R
C
HA
m
eth
o
d
o
f
f
er
in
g
tr
u
s
t
-
b
ased
s
elec
tiv
e
r
er
o
u
tin
g
.
Ov
er
all,
th
e
R
C
H
A
m
eth
o
d
p
er
f
o
r
m
ed
b
etter
th
an
b
aselin
e
m
eth
o
d
s
wh
en
s
ec
u
r
in
g
co
m
m
u
n
icatio
n
in
W
SN
s
y
s
tem
s
.
T
ab
le
2
s
h
o
ws
th
e
s
im
u
latio
n
p
ar
a
m
eter
s
u
s
ed
i
n
m
itig
atio
n
attac
k
s
in
W
SNs
.
T
h
ese
p
a
r
am
eter
s
ca
n
b
e
t
u
n
ed
b
ased
o
n
th
e
s
ce
n
ar
io
(
e.
g
.
,
m
ilit
ar
y
v
s
en
v
ir
o
n
m
e
n
tal
W
SN)
an
d
th
e
s
i
ze
o
f
th
e
n
etwo
r
k
.
Fig
u
r
e
4
s
h
o
ws
th
e
d
etec
tio
n
ac
cu
r
ac
y
o
f
watc
h
d
o
g
,
p
ath
r
a
ter
,
SAODV
an
d
p
r
o
p
o
s
ed
R
C
HS.
T
h
is
s
h
o
ws
th
e
ef
f
icien
cy
o
f
th
e
p
r
o
p
o
s
ed
m
eth
o
d
s
in
d
etec
tin
g
an
d
m
iti
g
atin
g
attac
k
s
in
W
SN
s
.
I
n
th
is
ch
ar
t,
th
e
x
-
ax
is
s
h
o
ws
th
e
n
o
d
e
s
izes
an
d
th
e
y
-
ax
is
s
h
o
ws
th
e
ac
cu
r
ac
y
v
a
lu
es.
Fig
u
r
e
5
s
h
o
ws
th
e
PDR
o
f
watc
h
d
o
g
,
p
ath
r
ate
r
,
SA
ODV
an
d
p
r
o
p
o
s
ed
R
C
H
S.
T
h
is
s
h
o
ws
th
e
ef
f
ici
en
cy
o
f
th
e
p
r
o
p
o
s
ed
m
eth
o
d
in
d
etec
tin
g
an
d
m
itig
atin
g
a
ttack
s
in
W
SNs
.
I
n
th
is
ch
ar
t,
th
e
x
-
a
x
is
s
h
o
ws th
e
n
o
d
e
s
izes a
n
d
t
h
e
y
-
a
x
is
s
h
o
ws th
e
PDR
v
alu
es in
p
er
ce
n
tag
e.
Fig
u
r
e
6
s
h
o
ws
th
e
en
er
g
y
co
n
s
u
m
p
tio
n
o
f
watc
h
d
o
g
,
p
ath
r
ater
,
SAODV
an
d
p
r
o
p
o
s
ed
R
C
HS.
T
h
is
s
h
o
ws
th
e
ef
f
icien
cy
o
f
th
e
p
r
o
p
o
s
ed
m
eth
o
d
s
in
d
etec
tin
g
an
d
m
itig
atin
g
attac
k
s
in
W
SN
s
.
I
n
th
is
ch
ar
t,
th
e
x
-
ax
is
s
h
o
ws
th
e
n
o
d
e
s
izes
an
d
th
e
y
-
ax
is
s
h
o
ws
th
e
en
e
r
g
y
co
n
s
u
m
p
tio
n
v
al
u
es
in
jo
u
l
es.
Fig
u
r
e
7
s
h
o
ws
th
e
d
elay
o
f
watc
h
d
o
g
,
p
at
h
r
a
ter
,
SAODV
an
d
p
r
o
p
o
s
ed
R
C
HS.
T
h
is
s
h
o
ws
th
e
ef
f
icien
cy
o
f
th
e
p
r
o
p
o
s
ed
m
eth
o
d
s
in
d
etec
tin
g
an
d
m
iti
g
atin
g
attac
k
s
in
W
SN
s
.
I
n
th
is
ch
ar
t,
th
e
x
-
ax
is
s
h
o
ws th
e
n
o
d
e
s
izes a
n
d
th
e
y
-
ax
is
s
h
o
ws
th
e
d
elay
v
alu
es
in
s
ec
o
n
d
s
.
Fig
u
r
e
8
s
h
o
ws
th
e
th
r
o
u
g
h
p
u
t
o
f
watc
h
d
o
g
,
p
at
h
r
ater
,
SAODV
an
d
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N:
2
2
5
2
-
8
7
7
6
I
n
t J I
n
f
&
C
o
m
m
u
n
T
ec
h
n
o
l,
Vo
l.
1
5
,
No
.
1
,
Ma
r
ch
2
0
2
6
:
42
8
-
43
7
434
p
r
o
p
o
s
ed
R
C
HS.
T
h
i
s
s
h
o
ws
th
e
ef
f
icien
cy
o
f
th
e
p
r
o
p
o
s
ed
m
eth
o
d
s
in
d
etec
tin
g
an
d
m
itig
atin
g
attac
k
s
in
W
SN
s
.
I
n
th
is
ch
ar
t,
th
e
x
-
ax
is
s
h
o
ws
th
e
n
o
d
e
s
izes
an
d
t
h
e
y
-
a
x
is
s
h
o
ws
th
e
th
r
o
u
g
h
p
u
t
v
alu
es
in
M
b
p
s
.
Fig
u
r
e
9
s
h
o
ws
th
e
o
v
er
h
ea
d
co
m
p
ar
is
o
n
o
f
watc
h
d
o
g
,
p
at
h
r
ater
,
SAODV
an
d
p
r
o
p
o
s
ed
R
C
H
S.
T
h
is
s
h
o
ws
th
e
ef
f
icien
c
y
o
f
th
e
p
r
o
p
o
s
ed
m
eth
o
d
s
in
d
etec
tin
g
an
d
m
it
ig
atin
g
attac
k
s
in
W
SNs
.
I
n
th
is
ch
ar
t,
th
e
x
-
ax
is
s
h
o
ws th
e
n
o
d
e
s
izes a
n
d
th
e
y
-
ax
is
s
h
o
ws th
e
o
v
er
h
ea
d
v
al
u
es b
ased
o
n
p
ac
k
ets.
T
ab
le
2
.
Simu
latio
n
p
ar
am
eter
s
P
a
r
a
me
t
e
r
Ty
p
i
c
a
l
v
a
l
u
e
/
r
a
n
g
e
D
e
scri
p
t
i
o
n
S
i
mu
l
a
t
i
o
n
a
r
e
a
5
0
0
m
×
5
0
0
m
/
1
,
0
0
0
m ×
1
,
0
0
0
m
D
e
f
i
n
e
s t
h
e
p
h
y
si
c
a
l
s
p
a
c
e
f
o
r
W
S
N
d
e
p
l
o
y
me
n
t
.
N
u
mb
e
r
o
f
n
o
d
e
s
5
0
–
200
To
t
a
l
se
n
so
r
n
o
d
e
s
d
e
p
l
o
y
e
d
i
n
t
h
e
n
e
t
w
o
r
k
.
N
o
d
e
p
l
a
c
e
m
e
n
t
R
a
n
d
o
m
/
G
r
i
d
H
o
w
a
r
e
n
o
d
e
s
d
i
st
r
i
b
u
t
e
d
a
c
r
o
ss
t
h
e
a
r
e
a
.
Tr
a
n
sm
i
ssi
o
n
r
a
n
g
e
5
0
–
1
0
0
m
e
t
e
r
s
M
a
x
i
m
u
m
c
o
mm
u
n
i
c
a
t
i
o
n
d
i
s
t
a
n
c
e
b
e
t
w
e
e
n
n
o
d
e
s.
I
n
i
t
i
a
l
e
n
e
r
g
y
p
e
r
n
o
d
e
2
–
5
J
o
u
l
e
s
U
sed
t
o
e
v
a
l
u
a
t
e
e
n
e
r
g
y
e
f
f
i
c
i
e
n
c
y
.
M
A
C
p
r
o
t
o
c
o
l
I
EEE
8
0
2
.
1
5
.
4
/
C
S
M
A
/
C
A
M
e
d
i
u
m
a
c
c
e
ss
c
o
n
t
r
o
l
p
r
o
t
o
c
o
l
f
o
r
W
S
N
s.
R
o
u
t
i
n
g
p
r
o
t
o
c
o
l
A
O
D
V
/
LEA
C
H
/
R
C
H
A
(
c
u
s
t
o
m)
R
o
u
t
i
n
g
met
h
o
d
t
o
e
v
a
l
u
a
t
e
a
n
d
c
o
mp
a
r
e
.
Tr
a
f
f
i
c
t
y
p
e
C
B
R
(
C
o
n
st
a
n
t
B
i
t
R
a
t
e
)
Ty
p
e
o
f
d
a
t
a
t
r
a
n
smis
si
o
n
p
a
t
t
e
r
n
.
P
a
c
k
e
t
si
z
e
6
4
–
5
1
2
b
y
t
e
s
S
i
z
e
o
f
e
a
c
h
t
r
a
n
sm
i
t
t
e
d
d
a
t
a
p
a
c
k
e
t
.
S
i
mu
l
a
t
i
o
n
t
i
me
5
0
0
–
1
0
0
0
s
e
c
o
n
d
s
To
t
a
l
d
u
r
a
t
i
o
n
o
f
t
h
e
si
m
u
l
a
t
i
o
n
.
H
a
sh
a
l
g
o
r
i
t
h
ms
u
s
e
d
R
I
P
EM
D
,
S
H
A
-
3
U
sed
f
o
r
a
d
a
t
a
i
n
t
e
g
r
i
t
y
c
h
e
c
k
.
A
t
t
a
c
k
t
y
p
e
s
i
mu
l
a
t
e
d
B
l
a
c
k
h
o
l
e
,
g
r
a
y
h
o
l
e
,
d
a
t
a
t
a
m
p
e
r
i
n
g
To
e
v
a
l
u
a
t
e
R
C
H
A
’
s d
e
t
e
c
t
i
o
n
a
n
d
m
i
t
i
g
a
t
i
o
n
a
b
i
l
i
t
y
.
R
e
p
u
t
a
t
i
o
n
t
h
r
e
s
h
o
l
d
0
.
3
–
0
.
5
B
e
l
o
w
a
r
e
w
h
i
c
h
n
o
d
e
s
t
h
a
t
a
r
e
c
o
n
s
i
d
e
r
e
d
m
a
l
i
c
i
o
u
s.
R
e
p
u
t
a
t
i
o
n
u
p
d
a
t
e
r
a
t
e
B
a
se
d
o
n
α (
e
.
g
.
,
0
.
7
)
W
e
i
g
h
t
i
n
g
f
a
c
t
o
r
i
n
r
e
p
u
t
a
t
i
o
n
c
a
l
c
u
l
a
t
i
o
n
.
Fig
u
r
e
4
.
Dete
ctio
n
ac
c
u
r
ac
y
c
o
m
p
ar
is
o
n
c
h
ar
t
Fig
u
r
e
5
.
PDR
co
m
p
ar
is
o
n
ch
ar
t
Fig
u
r
e
6
.
E
n
er
g
y
co
n
s
u
m
p
tio
n
co
m
p
ar
is
o
n
ch
ar
t
Fig
u
r
e
7
.
Dela
y
c
o
m
p
a
r
is
o
n
c
h
ar
t
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
t J I
n
f
&
C
o
m
m
u
n
T
ec
h
n
o
l
I
SS
N:
2
2
5
2
-
8
7
7
6
R
ep
u
ta
tio
n
-
en
h
a
n
ce
d
tw
o
-
w
a
y
h
yb
r
id
a
lg
o
r
ith
m
fo
r
d
etec
tin
g
a
tta
ck
s
in
WS
N
(
Divy
a
B
h
a
r
a
th
i S
elva
r
a
j)
435
Fig
u
r
e
8
.
T
h
r
o
u
g
h
p
u
t c
o
m
p
ar
i
s
o
n
ch
ar
t
Fig
u
r
e
9
.
Ov
e
r
h
ea
d
c
o
m
p
a
r
is
o
n
ch
ar
t
5.
CO
NCLU
SI
O
N
T
h
e
R
C
HA
p
r
o
v
id
es
a
r
o
b
u
s
t
s
ec
u
r
ity
f
r
am
ewo
r
k
f
o
r
id
en
t
if
y
in
g
an
d
ad
d
r
ess
in
g
attac
k
s
in
W
SNs
.
T
h
e
alg
o
r
ith
m
c
o
m
b
in
es two
c
r
y
p
to
g
r
ap
h
ic
h
ash
f
u
n
ctio
n
s
(
R
I
PEM
D
an
d
SHA
-
3
)
with
a
d
y
n
am
ic
r
e
p
u
tatio
n
-
b
ased
tr
u
s
t
m
an
ag
em
en
t
m
ec
h
an
is
m
to
en
s
u
r
e
d
ata
in
teg
r
ity
alo
n
g
with
a
s
ec
u
r
e
ch
an
n
el
o
f
co
m
m
u
n
icatio
n
.
R
C
H
A
is
ef
f
ec
tiv
e
at
d
etec
tin
g
m
alicio
u
s
n
o
d
es
b
ased
o
n
a
b
n
o
r
m
al
p
ac
k
et
f
lo
w
an
d
co
m
m
u
n
icatio
n
p
atter
n
s
th
r
o
u
g
h
b
o
th
lay
er
s
an
d
th
en
a
d
ap
ts
th
e
r
o
u
tin
g
p
r
o
ce
s
s
to
r
e
m
o
v
e
c
o
m
p
r
o
m
is
ed
n
o
d
es
d
y
n
am
ically
.
R
C
HA’
s
d
u
al
-
lay
er
o
f
s
ec
u
r
ity
p
r
o
v
id
e
s
a
h
ig
h
d
eg
r
ee
o
f
in
ter
n
al
a
n
d
ex
ter
n
al
attac
k
d
etec
tio
n
,
al
o
n
g
with
a
r
elativ
ely
lo
w
d
eleg
ate
r
ate.
T
h
e
u
s
e
o
f
a
weig
h
ted
r
ep
u
tatio
n
m
o
d
el
p
r
o
v
id
es
d
y
n
a
m
ic
u
p
d
ates
to
n
o
d
e
tr
u
s
t
lev
els
b
ased
o
n
ac
tu
al
b
eh
av
i
o
r
in
r
ea
l
tim
e.
T
h
is
d
y
n
am
ic
a
p
p
r
o
ac
h
to
r
e
p
u
tatio
n
r
ein
f
o
r
ce
s
th
e
n
etwo
r
k
’
s
r
esil
ien
ce
ag
ain
s
t
ev
o
l
v
in
g
f
o
r
m
s
o
f
attac
k
s
,
in
clu
d
in
g
b
la
ck
h
o
le,
g
r
ay
h
o
le,
an
d
d
ata
m
o
d
if
icatio
n
attac
k
s
.
Af
ter
r
u
n
n
in
g
s
im
u
latio
n
ex
p
er
im
en
ts
,
th
e
R
C
HA
i
s
a
m
o
r
e
s
ec
u
r
e
an
d
ef
f
ec
tiv
e
m
eth
o
d
th
an
p
r
e
v
io
u
s
ly
av
ailab
le
m
eth
o
d
s
;
it
also
p
r
o
d
u
ce
s
less
co
m
p
u
tatio
n
al
o
r
en
er
g
y
o
v
er
(
b
o
th
o
f
w
h
ich
ar
e
v
er
y
im
p
o
r
tan
t
co
n
s
id
er
in
g
th
at
n
o
d
es
ar
e
en
e
r
g
y
-
co
n
s
tr
ain
ed
)
.
T
h
e
m
itig
ati
o
n
o
p
tio
n
s
t
o
c
o
m
b
at
th
e
m
alicio
u
s
n
o
d
e
i
n
clu
d
e
co
o
p
er
atio
n
am
o
n
g
n
o
d
es,
wh
ich
ad
d
s
ev
en
m
o
r
e
r
eliab
ilit
y
to
th
e
m
itig
atio
n
p
la
n
,
in
c
r
ea
s
in
g
th
e
c
h
an
ce
s
o
f
s
u
cc
ess
f
u
l
d
eliv
er
y
o
f
m
ess
ag
es
in
h
o
s
tile
en
v
ir
o
n
m
en
ts
.
Fu
tu
r
e
wo
r
k
c
o
u
ld
ex
p
lo
r
e
h
o
w
m
ac
h
in
e
lear
n
in
g
tech
n
iq
u
es
co
u
ld
b
e
u
s
ed
to
p
r
ed
ict
p
atter
n
s
o
f
m
alicio
u
s
b
eh
av
io
r
ac
cu
r
atel
y
,
an
d
also
b
y
in
co
r
p
o
r
atin
g
en
er
g
y
-
awa
r
e
tr
u
s
t u
p
d
ates in
W
SN w
i
th
v
er
y
lim
ited
r
eso
u
r
ce
s
.
F
UNDING
I
NF
O
R
M
A
T
I
O
N
T
h
is
r
esear
ch
d
id
n
o
t
r
ec
ei
v
e
an
y
ex
te
r
n
al
f
u
n
d
i
n
g
.
T
h
e
p
u
b
licatio
n
ch
ar
g
es
we
r
e
p
e
r
s
o
n
al
ly
f
u
n
d
ed
b
y
th
e
a
u
th
o
r
s
.
AUTHO
R
CO
NT
RI
B
UT
I
O
NS
ST
A
T
E
M
E
N
T
T
h
is
jo
u
r
n
al
u
s
es
th
e
C
o
n
tr
ib
u
to
r
R
o
les
T
ax
o
n
o
m
y
(
C
R
ed
iT)
to
r
ec
o
g
n
ize
in
d
iv
id
u
al
au
th
o
r
co
n
tr
ib
u
tio
n
s
,
r
ed
u
ce
au
th
o
r
s
h
ip
d
is
p
u
tes,
an
d
f
ac
ilit
ate
co
llab
o
r
atio
n
.
Na
m
e
o
f
Aut
ho
r
C
M
So
Va
Fo
I
R
D
O
E
Vi
Su
P
Fu
Div
y
a
B
h
ar
ath
i Selv
ar
aj
✓
✓
✓
✓
✓
✓
✓
✓
✓
✓
Ven
i Su
n
d
ar
am
✓
✓
✓
✓
✓
✓
✓
✓
C
:
C
o
n
c
e
p
t
u
a
l
i
z
a
t
i
o
n
M
:
M
e
t
h
o
d
o
l
o
g
y
So
:
So
f
t
w
a
r
e
Va
:
Va
l
i
d
a
t
i
o
n
Fo
:
Fo
r
mal
a
n
a
l
y
s
i
s
I
:
I
n
v
e
s
t
i
g
a
t
i
o
n
R
:
R
e
so
u
r
c
e
s
D
:
D
a
t
a
C
u
r
a
t
i
o
n
O
:
W
r
i
t
i
n
g
-
O
r
i
g
i
n
a
l
D
r
a
f
t
E
:
W
r
i
t
i
n
g
-
R
e
v
i
e
w
&
E
d
i
t
i
n
g
Vi
:
Vi
su
a
l
i
z
a
t
i
o
n
Su
:
Su
p
e
r
v
i
s
i
o
n
P
:
P
r
o
j
e
c
t
a
d
mi
n
i
st
r
a
t
i
o
n
Fu
:
Fu
n
d
i
n
g
a
c
q
u
i
si
t
i
o
n
CO
NF
L
I
C
T
O
F
I
N
T
E
R
E
S
T
ST
A
T
E
M
E
NT
Au
th
o
r
s
s
tate
n
o
co
n
f
lict o
f
in
t
er
est.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N:
2
2
5
2
-
8
7
7
6
I
n
t J I
n
f
&
C
o
m
m
u
n
T
ec
h
n
o
l,
Vo
l.
1
5
,
No
.
1
,
Ma
r
ch
2
0
2
6
:
42
8
-
43
7
436
DATA AV
AI
L
AB
I
L
I
T
Y
-
Data
av
ailab
ilit
y
d
o
es n
o
t a
p
p
l
y
to
th
is
p
ap
e
r
as n
o
n
ew
d
ata
wer
e
cr
ea
ted
o
r
an
aly
ze
d
in
th
is
s
tu
d
y
.
RE
F
E
R
E
NC
E
S
[
1
]
A
.
P
.
A
b
i
d
o
y
e
a
n
d
B
.
K
a
b
a
s
o
,
“
L
i
g
h
t
w
e
i
g
h
t
mo
d
e
l
s
f
o
r
d
e
t
e
c
t
i
o
n
o
f
d
e
n
i
a
l
‐
o
f
‐
serv
i
c
e
a
t
t
a
c
k
i
n
w
i
r
e
l
e
ss
sen
s
o
r
n
e
t
w
o
r
k
s
,
”
I
ET N
e
t
w
o
rks
,
v
o
l
.
1
0
,
n
o
.
4
,
p
p
.
1
8
5
–
1
9
9
,
Ju
l
.
2
0
2
1
,
d
o
i
:
1
0
.
1
0
4
9
/
n
t
w
2
.
1
2
0
1
1
.
[
2
]
Z.
A
l
a
n
s
a
r
i
,
N
.
B
.
A
n
u
a
r
,
A
.
K
a
ms
i
n
,
a
n
d
M
.
R
.
B
e
l
g
a
u
m,
“
A
s
y
st
e
ma
t
i
c
r
e
v
i
e
w
o
f
r
o
u
t
i
n
g
a
t
t
a
c
k
s
d
e
t
e
c
t
i
o
n
i
n
w
i
r
e
l
e
ss
se
n
s
o
r
n
e
t
w
o
r
k
s,”
Pe
e
rJ
C
o
m
p
u
t
e
r
S
c
i
e
n
c
e
,
v
o
l
.
8
,
p
.
e
1
1
3
5
,
O
c
t
.
2
0
2
2
,
d
o
i
:
1
0
.
7
7
1
7
/
p
e
e
r
j
-
c
s.
1
1
3
5
.
[
3
]
N
.
A
l
i
k
h
a
n
d
A
.
R
a
j
a
b
z
a
d
e
h
,
“
U
s
i
n
g
a
l
i
g
h
t
w
e
i
g
h
t
sec
u
r
i
t
y
me
c
h
a
n
i
sm
t
o
d
e
t
e
c
t
a
n
d
l
o
c
a
l
i
z
e
j
a
m
mi
n
g
a
t
t
a
c
k
i
n
w
i
r
e
l
e
ss
se
n
s
o
r
n
e
t
w
o
r
k
s,”
O
p
t
i
k
,
v
o
l
.
2
7
1
,
p
.
1
7
0
0
9
9
,
D
e
c
.
2
0
2
2
,
d
o
i
:
1
0
.
1
0
1
6
/
j
.
i
j
l
e
o
.
2
0
2
2
.
1
7
0
0
9
9
.
[
4
]
M
.
A
.
A
l
m
a
i
a
h
,
“
A
n
e
w
sc
h
e
m
e
f
o
r
d
e
t
e
c
t
i
n
g
ma
l
i
c
i
o
u
s
a
t
t
a
c
k
s
i
n
w
i
r
e
l
e
ss
sen
so
r
n
e
t
w
o
r
k
s
b
a
s
e
d
o
n
b
l
o
c
k
c
h
a
i
n
t
e
c
h
n
o
l
o
g
y
,
”
i
n
Art
i
f
i
c
i
a
l
i
n
t
e
l
l
i
g
e
n
c
e
a
n
d
b
l
o
c
k
c
h
a
i
n
f
o
r f
u
t
u
r
e
c
y
b
e
rse
c
u
ri
t
y
a
p
p
l
i
c
a
t
i
o
n
s
,
2
0
2
1
,
p
p
.
2
1
7
–
2
3
4
.
[
5
]
E.
A
l
o
t
a
i
b
i
,
R
.
B
i
n
S
u
l
a
i
ma
n
,
a
n
d
M
.
A
l
mai
a
h
,
“
A
sse
ssm
e
n
t
o
f
c
y
b
e
r
sec
u
r
i
t
y
t
h
r
e
a
t
s
a
n
d
d
e
f
e
n
se
me
c
h
a
n
i
sms
i
n
w
i
r
e
l
e
ss
s
e
n
s
o
r
n
e
t
w
o
r
k
s,”
J
o
u
r
n
a
l
o
f
C
y
b
e
r
S
e
c
u
ri
t
y
a
n
d
R
i
sk
Au
d
i
t
i
n
g
,
v
o
l
.
2
0
2
5
,
n
o
.
1
,
p
p
.
4
7
–
5
9
,
F
e
b
.
2
0
2
5
,
d
o
i
:
1
0
.
6
3
1
8
0
/
j
c
sr
a
.
t
h
e
st
a
p
.
2
0
2
5
.
1
.
5
.
[
6
]
M
.
D
e
n
e
r
,
C
.
O
k
u
r
,
S
.
A
l
,
a
n
d
A
.
O
r
man
,
“
W
S
N
-
B
F
S
F
:
a
n
e
w
d
a
t
a
s
e
t
f
o
r
a
t
t
a
c
k
s
d
e
t
e
c
t
i
o
n
i
n
w
i
r
e
l
e
ss
sen
s
o
r
n
e
t
w
o
r
k
s
,
”
I
EEE
I
n
t
e
r
n
e
t
o
f
T
h
i
n
g
s
J
o
u
r
n
a
l
,
v
o
l
.
1
1
,
n
o
.
2
,
p
p
.
2
1
0
9
–
2
1
2
5
,
Ja
n
.
2
0
2
4
,
d
o
i
:
1
0
.
1
1
0
9
/
JI
O
T.
2
0
2
3
.
3
2
9
2
2
0
9
.
[
7
]
R
.
K
.
D
h
a
n
a
r
a
j
,
R
.
H
.
Jh
a
v
e
r
i
,
L
.
K
r
i
s
h
n
a
sam
y
,
G
.
S
r
i
v
a
st
a
v
a
,
a
n
d
P
.
K
.
R
.
M
a
d
d
i
k
u
n
t
a
,
“
B
l
a
c
k
-
h
o
l
e
a
t
t
a
c
k
mi
t
i
g
a
t
i
o
n
i
n
me
d
i
c
a
l
sen
s
o
r
n
e
t
w
o
r
k
s
u
s
i
n
g
t
h
e
e
n
h
a
n
c
e
d
g
r
a
v
i
t
a
t
i
o
n
a
l
se
a
r
c
h
a
l
g
o
r
i
t
h
m,
”
I
n
t
e
rn
a
t
i
o
n
a
l
J
o
u
rn
a
l
o
f
U
n
c
e
rt
a
i
n
t
y
,
F
u
zzi
n
e
s
s
a
n
d
K
n
o
w
l
e
d
g
e
-
B
a
se
d
S
y
s
t
e
m
s
,
v
o
l
.
2
9
,
n
o
.
S
u
p
p
0
2
,
p
p
.
2
9
7
–
31
5
,
D
e
c
.
2
0
2
1
,
d
o
i
:
1
0
.
1
1
4
2
/
S
0
2
1
8
4
8
8
5
2
1
4
0
0
1
6
X
.
[
8
]
K
.
D
o
sh
i
,
Y
.
Y
i
l
ma
z
,
a
n
d
S
.
U
l
u
d
a
g
,
“
Ti
m
e
l
y
d
e
t
e
c
t
i
o
n
a
n
d
mi
t
i
g
a
t
i
o
n
o
f
s
t
e
a
l
t
h
y
D
D
o
S
a
t
t
a
c
k
s
v
i
a
I
o
T
n
e
t
w
o
r
k
s,
”
I
EEE
T
r
a
n
s
a
c
t
i
o
n
s
o
n
D
e
p
e
n
d
a
b
l
e
a
n
d
S
e
c
u
r
e
C
o
m
p
u
t
i
n
g
,
v
o
l
.
1
8
,
n
o
.
5
,
p
p
.
1
–
1
,
2
0
2
1
,
d
o
i
:
1
0
.
1
1
0
9
/
TD
S
C
.
2
0
2
1
.
3
0
4
9
9
4
2
.
[
9
]
M
.
A
.
E
l
sa
d
i
g
,
“
D
e
t
e
c
t
i
o
n
o
f
d
e
n
i
a
l
-
of
-
serv
i
c
e
a
t
t
a
c
k
i
n
w
i
r
e
l
e
ss
s
e
n
s
o
r
n
e
t
w
o
r
k
s:
a
l
i
g
h
t
w
e
i
g
h
t
ma
c
h
i
n
e
l
e
a
r
n
i
n
g
a
p
p
r
o
a
c
h
,
”
I
EEE
A
c
c
e
ss
,
v
o
l
.
1
1
,
p
p
.
8
3
5
3
7
–
8
3
5
5
2
,
2
0
2
3
,
d
o
i
:
1
0
.
1
1
0
9
/
A
C
C
ESS
.
2
0
2
3
.
3
3
0
3
1
1
3
.
[
1
0
]
G
.
G
.
G
e
b
r
e
mar
i
a
m
,
J.
P
a
n
d
a
,
a
n
d
S
.
I
n
d
u
,
“
Lo
c
a
l
i
z
a
t
i
o
n
a
n
d
d
e
t
e
c
t
i
o
n
o
f
mu
l
t
i
p
l
e
a
t
t
a
c
k
s
i
n
w
i
r
e
l
e
ss
s
e
n
s
o
r
n
e
t
w
o
r
k
s
u
si
n
g
a
r
t
i
f
i
c
i
a
l
n
e
u
r
a
l
n
e
t
w
o
r
k
,
”
Wi
re
l
e
s
s
C
o
m
m
u
n
i
c
a
t
i
o
n
s
a
n
d
Mo
b
i
l
e
C
o
m
p
u
t
i
n
g
,
v
o
l
.
2
0
2
3
,
p
p
.
1
–
2
9
,
Jan
.
2
0
2
3
,
d
o
i
:
1
0
.
1
1
5
5
/
2
0
2
3
/
2
7
4
4
7
0
6
.
[
1
1
]
M
.
H
a
n
i
f
e
t
a
l
.
,
“
A
I
-
b
a
sed
w
o
r
m
h
o
l
e
a
t
t
a
c
k
d
e
t
e
c
t
i
o
n
t
e
c
h
n
i
q
u
e
s
i
n
w
i
r
e
l
e
ss
se
n
s
o
r
n
e
t
w
o
r
k
s
,
”
El
e
c
t
ro
n
i
c
s
,
v
o
l
.
1
1
,
n
o
.
1
5
,
p
.
2
3
2
4
,
Ju
l
.
2
0
2
2
,
d
o
i
:
1
0
.
3
3
9
0
/
e
l
e
c
t
r
o
n
i
c
s
1
1
1
5
2
3
2
4
.
[
1
2
]
M
.
N
.
U
.
I
sl
a
m,
A
.
F
a
h
m
i
n
,
M
.
S
.
H
o
ssa
i
n
,
a
n
d
M
.
A
t
i
q
u
z
z
a
m
a
n
,
“
D
e
n
i
a
l
-
of
-
ser
v
i
c
e
a
t
t
a
c
k
s
o
n
w
i
r
e
l
e
ss
s
e
n
s
o
r
n
e
t
w
o
r
k
a
n
d
d
e
f
e
n
se
t
e
c
h
n
i
q
u
e
s
,
”
W
i
re
l
e
ss
Pe
rs
o
n
a
l
C
o
m
m
u
n
i
c
a
t
i
o
n
s
,
v
o
l
.
1
1
6
,
n
o
.
3
,
p
p
.
1
9
9
3
–
2
0
2
1
,
F
e
b
.
2
0
2
1
,
d
o
i
:
1
0
.
1
0
0
7
/
s
1
1
2
7
7
-
020
-
0
7
7
7
6
-
3.
[
1
3
]
S
.
I
smai
l
,
Z.
El
M
r
a
b
e
t
,
a
n
d
H
.
R
e
z
a
,
“
A
n
e
n
s
e
m
b
l
e
-
b
a
s
e
d
ma
c
h
i
n
e
l
e
a
r
n
i
n
g
a
p
p
r
o
a
c
h
f
o
r
c
y
b
e
r
-
a
t
t
a
c
k
s
d
e
t
e
c
t
i
o
n
i
n
w
i
r
e
l
e
s
s
sen
s
o
r
n
e
t
w
o
r
k
s,”
A
p
p
l
i
e
d
S
c
i
e
n
c
e
s
,
v
o
l
.
1
3
,
n
o
.
1
,
p
.
3
0
,
D
e
c
.
2
0
2
2
,
d
o
i
:
1
0
.
3
3
9
0
/
a
p
p
1
3
0
1
0
0
3
0
.
[
1
4
]
K
.
J.
N
i
t
h
y
a
a
n
d
K
.
S
h
y
a
m
a
l
a
,
“
A
sy
st
e
ma
t
i
c
r
e
v
i
e
w
o
n
v
a
r
i
o
u
s
a
t
t
a
c
k
d
e
t
e
c
t
i
o
n
me
t
h
o
d
s
f
o
r
w
i
r
e
l
e
s
s
s
e
n
so
r
n
e
t
w
o
r
k
s,”
i
n
I
n
t
e
r
n
a
t
i
o
n
a
l
C
o
n
f
e
r
e
n
c
e
o
n
I
n
n
o
v
a
t
i
v
e
C
o
m
p
u
t
i
n
g
a
n
d
C
o
m
m
u
n
i
c
a
t
i
o
n
s:
Pro
c
e
e
d
i
n
g
s
o
f
I
C
I
C
C
2
0
2
1
,
2
0
2
2
,
p
p
.
1
8
3
–
2
0
4
.
[
1
5
]
A
.
Jo
h
n
,
I
.
F
.
B
i
n
I
sn
i
n
,
S
.
H
.
H
.
M
a
d
n
i
,
a
n
d
M
.
F
a
h
e
e
m,
“
C
l
u
s
t
e
r
-
b
a
se
d
w
i
r
e
l
e
ss
s
e
n
so
r
n
e
t
w
o
r
k
f
r
a
mew
o
r
k
f
o
r
d
e
n
i
a
l
-
of
-
serv
i
c
e
a
t
t
a
c
k
d
e
t
e
c
t
i
o
n
b
a
se
d
o
n
v
a
r
i
a
b
l
e
sel
e
c
t
i
o
n
e
n
s
e
mb
l
e
m
a
c
h
i
n
e
l
e
a
r
n
i
n
g
a
l
g
o
r
i
t
h
ms
,
”
I
n
t
e
l
l
i
g
e
n
t
S
y
s
t
e
m
s
w
i
t
h
A
p
p
l
i
c
a
t
i
o
n
s
,
v
o
l
.
2
2
,
p
.
2
0
0
3
8
1
,
J
u
n
.
2
0
2
4
,
d
o
i
:
1
0
.
1
0
1
6
/
j
.
i
sw
a
.
2
0
2
4
.
2
0
0
3
8
1
.
[
1
6
]
M
.
K
e
e
r
t
h
i
k
a
a
n
d
D
.
S
h
a
n
m
u
g
a
p
r
i
y
a
,
“
W
i
r
e
l
e
ss
se
n
so
r
n
e
t
w
o
r
k
s
:
a
c
t
i
v
e
a
n
d
p
a
ss
i
v
e
a
t
t
a
c
k
s
-
v
u
l
n
e
r
a
b
i
l
i
t
i
e
s
a
n
d
c
o
u
n
t
e
r
m
e
a
s
u
r
e
s,
”
G
l
o
b
a
l
T
r
a
n
si
t
i
o
n
s
Pro
c
e
e
d
i
n
g
s
,
v
o
l
.
2
,
n
o
.
2
,
p
p
.
3
6
2
–
3
6
7
,
N
o
v
.
2
0
2
1
,
d
o
i
:
1
0
.
1
0
1
6
/
j
.
g
l
t
p
.
2
0
2
1
.
0
8
.
0
4
5
.
[
1
7
]
S
.
K
h
a
n
,
M
.
A
.
K
h
a
n
,
a
n
d
N
.
A
l
n
a
z
z
a
w
i
,
“
A
r
t
i
f
i
c
i
a
l
n
e
u
r
a
l
n
e
t
w
o
r
k
-
b
a
s
e
d
mec
h
a
n
i
sm
t
o
d
e
t
e
c
t
se
c
u
r
i
t
y
t
h
r
e
a
t
s
i
n
w
i
r
e
l
e
ss
se
n
s
o
r
n
e
t
w
o
r
k
s,”
S
e
n
s
o
rs
,
v
o
l
.
2
4
,
n
o
.
5
,
p
.
1
6
4
1
,
M
a
r
.
2
0
2
4
,
d
o
i
:
1
0
.
3
3
9
0
/
s2
4
0
5
1
6
4
1
.
[
1
8
]
P
.
K
u
m
a
r
e
t
a
l
.
,
“
M
a
c
h
i
n
e
l
e
a
r
n
i
n
g
e
n
a
b
l
e
d
t
e
c
h
n
i
q
u
e
s
f
o
r
p
r
o
t
e
c
t
i
n
g
w
i
r
e
l
e
ss
s
e
n
s
o
r
n
e
t
w
o
r
k
s
b
y
e
st
i
ma
t
i
n
g
a
t
t
a
c
k
p
r
e
v
a
l
e
n
c
e
a
n
d
d
e
v
i
c
e
d
e
p
l
o
y
m
e
n
t
st
r
a
t
e
g
y
f
o
r
5
G
n
e
t
w
o
r
k
s,
”
Wi
r
e
l
e
ss
C
o
m
m
u
n
i
c
a
t
i
o
n
s
a
n
d
M
o
b
i
l
e
C
o
m
p
u
t
i
n
g
,
v
o
l
.
2
0
2
2
,
n
o
.
1
,
J
a
n
.
2
0
2
2
,
d
o
i
:
1
0
.
1
1
5
5
/
2
0
2
2
/
5
7
1
3
0
9
2
.
[
1
9
]
T.
T.
La
i
,
T
.
P
.
Tr
a
n
,
J.
C
h
o
,
a
n
d
M
.
Y
o
o
,
“
D
o
S
a
t
t
a
c
k
d
e
t
e
c
t
i
o
n
u
s
i
n
g
o
n
l
i
n
e
l
e
a
r
n
i
n
g
t
e
c
h
n
i
q
u
e
s
i
n
w
i
r
e
l
e
ss
s
e
n
s
o
r
n
e
t
w
o
r
k
s
,
”
Al
e
x
a
n
d
ri
a
E
n
g
i
n
e
e
ri
n
g
J
o
u
rn
a
l
,
v
o
l
.
8
5
,
p
p
.
3
0
7
–
3
1
9
,
D
e
c
.
2
0
2
3
,
d
o
i
:
1
0
.
1
0
1
6
/
j
.
a
e
j
.
2
0
2
3
.
1
1
.
0
2
2
.
[
2
0
]
K
.
M
a
d
h
u
r
i
a
n
d
N
.
G
o
g
t
e
,
“
A
n
e
w
l
e
v
e
l
i
n
t
r
u
s
i
o
n
d
e
t
e
c
t
i
o
n
sy
st
e
m
f
o
r
n
o
d
e
l
e
v
e
l
d
r
o
p
a
t
t
a
c
k
s
i
n
w
i
r
e
l
e
ss
sen
s
o
r
n
e
t
w
o
r
k
,
”
J
o
u
rn
a
l
o
f
Al
g
e
b
r
a
i
c
S
t
a
t
i
st
i
c
s
,
v
o
l
.
1
3
,
n
o
.
1
,
p
p
.
1
5
9
–
1
6
8
,
2
0
2
2
.
[
2
1
]
A
.
R
.
A
.
M
o
u
n
d
o
u
n
g
a
a
n
d
H
.
S
a
t
o
r
i
,
“
S
t
o
c
h
a
s
t
i
c
ma
c
h
i
n
e
l
e
a
r
n
i
n
g
b
a
se
d
a
t
t
a
c
k
s
d
e
t
e
c
t
i
o
n
sy
st
e
m
i
n
w
i
r
e
l
e
ss
s
e
n
s
o
r
n
e
t
w
o
r
k
s
,
”
J
o
u
rn
a
l
o
f
N
e
t
w
o
rk
a
n
d
S
y
s
t
e
m
s
Ma
n
a
g
e
m
e
n
t
,
v
o
l
.
3
2
,
n
o
.
1
,
p
.
1
7
,
Ja
n
.
2
0
2
4
,
d
o
i
:
1
0
.
1
0
0
7
/
s
1
0
9
2
2
-
023
-
0
9
7
9
4
-
5.
[
2
2
]
A
.
O
z
t
o
p
r
a
k
,
R
.
H
a
ssa
n
p
o
u
r
,
A
.
O
z
k
a
n
,
a
n
d
K
.
O
z
t
o
p
r
a
k
,
“
S
e
c
u
r
i
t
y
c
h
a
l
l
e
n
g
e
s,
mi
t
i
g
a
t
i
o
n
s
t
r
a
t
e
g
i
e
s
,
a
n
d
f
u
t
u
r
e
t
r
e
n
d
s
i
n
w
i
r
e
l
e
ss
sen
s
o
r
n
e
t
w
o
r
k
s:
a
r
e
v
i
e
w
,
”
A
C
M
C
o
m
p
u
t
i
n
g
S
u
r
v
e
y
s
,
v
o
l
.
5
7
,
n
o
.
4
,
p
p
.
1
–
2
9
,
A
p
r
.
2
0
2
5
,
d
o
i
:
1
0
.
1
1
4
5
/
3
7
0
6
5
8
3
.
[
2
3
]
M
.
P
r
e
mk
u
m
a
r
,
S
.
R
.
A
sh
o
k
k
u
m
a
r
,
V
.
Jee
v
a
n
a
n
t
h
a
m,
G
.
M
o
h
a
n
b
a
b
u
,
a
n
d
S
.
A
n
u
P
a
l
l
a
v
i
,
“
S
c
a
l
a
b
l
e
a
n
d
e
n
e
r
g
y
e
f
f
i
c
i
e
n
t
c
l
u
st
e
r
b
a
s
e
d
a
n
o
m
a
l
y
d
e
t
e
c
t
i
o
n
a
g
a
i
n
st
d
e
n
i
a
l
o
f
serv
i
c
e
a
t
t
a
c
k
s
i
n
w
i
r
e
l
e
ss
s
e
n
s
o
r
n
e
t
w
o
r
k
s,
”
W
i
re
l
e
ss
P
e
rso
n
a
l
C
o
m
m
u
n
i
c
a
t
i
o
n
s
,
v
o
l
.
1
2
9
,
n
o
.
4
,
p
p
.
2
6
6
9
–
2
6
9
1
,
A
p
r
.
2
0
2
3
,
d
o
i
:
1
0
.
1
0
0
7
/
s
1
1
2
7
7
-
0
2
3
-
1
0
2
5
2
-
3.
[
2
4
]
S
.
R
a
m
e
sh
,
C
.
Y
a
a
sh
u
w
a
n
t
h
,
K
.
P
r
a
t
h
i
b
a
n
a
n
d
h
i
,
A
.
R
.
B
a
s
h
a
,
a
n
d
T
.
Ja
y
a
san
k
a
r
,
“
A
n
o
p
t
i
m
i
z
e
d
d
e
e
p
n
e
u
r
a
l
n
e
t
w
o
r
k
b
a
s
e
d
D
o
S
a
t
t
a
c
k
d
e
t
e
c
t
i
o
n
i
n
w
i
r
e
l
e
ss
v
i
d
e
o
s
e
n
s
o
r
n
e
t
w
o
r
k
,
”
J
o
u
r
n
a
l
o
f
Am
b
i
e
n
t
I
n
t
e
l
l
i
g
e
n
c
e
a
n
d
H
u
m
a
n
i
ze
d
C
o
m
p
u
t
i
n
g
,
Ja
n
.
2
0
2
1
,
d
o
i
:
1
0
.
1
0
0
7
/
s
1
2
6
5
2
-
020
-
0
2
7
6
3
-
9.
[
2
5
]
H
.
S
a
d
i
a
e
t
a
l
.
,
“
I
n
t
r
u
si
o
n
d
e
t
e
c
t
i
o
n
sy
st
e
m
f
o
r
w
i
r
e
l
e
ss
s
e
n
s
o
r
n
e
t
w
o
r
k
s:
a
mac
h
i
n
e
l
e
a
r
n
i
n
g
b
a
s
e
d
a
p
p
r
o
a
c
h
,
”
I
EE
E
A
c
c
e
ss
,
v
o
l
.
1
2
,
p
p
.
5
2
5
6
5
–
5
2
5
8
2
,
2
0
2
4
,
d
o
i
:
1
0
.
1
1
0
9
/
A
C
C
ESS
.
2
0
2
4
.
3
3
8
0
0
1
4
.
[
2
6
]
S
.
S
a
l
mi
a
n
d
L
.
O
u
g
h
d
i
r
,
“
P
e
r
f
o
r
ma
n
c
e
e
v
a
l
u
a
t
i
o
n
o
f
d
e
e
p
l
e
a
r
n
i
n
g
t
e
c
h
n
i
q
u
e
s
f
o
r
D
o
S
a
t
t
a
c
k
s
d
e
t
e
c
t
i
o
n
i
n
w
i
r
e
l
e
s
s
s
e
n
s
o
r
n
e
t
w
o
r
k
,
”
J
o
u
r
n
a
l
o
f
B
i
g
D
a
t
a
,
v
o
l
.
1
0
,
n
o
.
1
,
p
.
1
7
,
F
e
b
.
2
0
2
3
,
d
o
i
:
1
0
.
1
1
8
6
/
s
4
0
5
3
7
-
0
2
3
-
0
0
6
9
2
-
w.
[
2
7
]
L.
S
u
j
i
h
e
l
e
n
e
t
a
l
.
,
“
N
o
d
e
r
e
p
l
i
c
a
t
i
o
n
a
t
t
a
c
k
d
e
t
e
c
t
i
o
n
i
n
d
i
st
r
i
b
u
t
e
d
w
i
r
e
l
e
ss
se
n
so
r
n
e
t
w
o
r
k
s
,
”
W
i
re
l
e
ss
C
o
m
m
u
n
i
c
a
t
i
o
n
s
a
n
d
Mo
b
i
l
e
C
o
m
p
u
t
i
n
g
,
v
o
l
.
2
0
2
2
,
n
o
.
1
,
J
a
n
.
2
0
2
2
,
d
o
i
:
1
0
.
1
1
5
5
/
2
0
2
2
/
7
2
5
2
7
9
1
.
[
2
8
]
K
.
M
.
S
u
d
a
r
a
n
d
P
.
D
e
e
p
a
l
a
k
s
h
m
i
,
“
F
l
o
w
-
b
a
s
e
d
d
e
t
e
c
t
i
o
n
a
n
d
m
i
t
i
g
a
t
i
o
n
o
f
l
o
w
-
r
a
t
e
D
D
O
S
a
t
t
a
c
k
i
n
s
d
n
e
n
v
i
r
o
n
me
n
t
u
s
i
n
g
mac
h
i
n
e
l
e
a
r
n
i
n
g
t
e
c
h
n
i
q
u
e
s
,
”
i
n
L
e
c
t
u
re
N
o
t
e
s i
n
N
e
t
w
o
rk
s
a
n
d
S
y
s
t
e
m
s
,
v
o
l
.
2
4
4
,
2
0
2
2
,
p
p
.
1
9
3
–
2
0
5
.
[
2
9
]
H
.
W
a
n
g
,
X
.
H
u
a
n
g
,
a
n
d
Y
.
W
u
,
“
G
D
3
N
:
a
d
a
p
t
i
v
e
c
l
u
st
e
r
i
n
g
-
b
a
s
e
d
d
e
t
e
c
t
i
o
n
o
f
se
l
e
c
t
i
v
e
f
o
r
w
a
r
d
i
n
g
a
t
t
a
c
k
s
i
n
W
S
N
s
u
n
d
e
r
v
a
r
i
a
b
l
e
h
a
r
sh
e
n
v
i
r
o
n
me
n
t
s,”
I
n
f
o
rm
a
t
i
o
n
S
c
i
e
n
c
e
s
,
v
o
l
.
6
6
5
,
p
.
1
2
0
3
7
5
,
A
p
r
.
2
0
2
4
,
d
o
i
:
1
0
.
1
0
1
6
/
j
.
i
n
s.
2
0
2
4
.
1
2
0
3
7
5
.
[
3
0
]
Z.
Z
h
a
i
e
t
a
l
.
,
“
L
i
g
h
t
w
e
i
g
h
t
s
e
c
u
r
e
d
e
t
e
c
t
i
o
n
se
r
v
i
c
e
f
o
r
m
a
l
i
c
i
o
u
s
a
t
t
a
c
k
s
i
n
W
S
N
w
i
t
h
t
i
m
e
s
t
a
m
p
-
b
a
s
e
d
M
A
C
,
”
I
EE
E
T
r
a
n
s
a
c
t
i
o
n
s
o
n
N
e
t
w
o
rk
a
n
d
S
e
rv
i
c
e
M
a
n
a
g
e
m
e
n
t
, v
o
l
.
1
9
,
n
o
.
4
,
p
p
.
5
2
9
9
–
5
3
1
1
,
D
e
c
.
2
0
2
2
,
d
o
i
:
1
0
.
1
1
0
9
/
TN
S
M
.
2
0
2
2
.
3
1
9
4
2
0
5
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
t J I
n
f
&
C
o
m
m
u
n
T
ec
h
n
o
l
I
SS
N:
2
2
5
2
-
8
7
7
6
R
ep
u
ta
tio
n
-
en
h
a
n
ce
d
tw
o
-
w
a
y
h
yb
r
id
a
lg
o
r
ith
m
fo
r
d
etec
tin
g
a
tta
ck
s
in
WS
N
(
Divy
a
B
h
a
r
a
th
i S
elva
r
a
j)
437
B
I
O
G
RAP
H
I
E
S O
F
AUTH
O
RS
Div
y
a
Bh
a
r
a
th
i
S
e
lv
a
r
a
j
p
u
rs
u
in
g
h
e
r
P
h
.
D.
i
n
C
o
m
p
u
ter
S
c
ien
c
e
a
t
Ka
rp
a
g
a
m
Ac
a
d
e
m
y
o
f
Hig
h
e
r
Ed
u
c
a
ti
o
n
,
I
n
d
ia.
S
h
e
c
o
m
p
lete
d
h
e
r
M
.
P
h
il
.
i
n
Co
m
p
u
ter
S
c
ien
c
e
a
t
P
S
G
Co
ll
e
g
e
o
f
Arts
a
n
d
S
c
ien
c
e
,
In
d
ia.
S
h
e
h
a
s
5
y
e
a
rs
o
f
tea
c
h
in
g
e
x
p
e
rien
c
e
.
He
r
a
re
a
s
o
f
re
se
a
rc
h
in
tere
st
in
c
lu
d
e
n
e
tw
o
r
k
in
g
,
WS
Ns
,
I
o
T,
a
n
d
n
e
two
rk
se
c
u
rit
y
.
S
h
e
h
a
s
p
u
b
li
s
h
e
d
Two
p
a
p
e
r
i
n
a
S
c
o
p
u
s
-
in
d
e
x
e
d
i
n
tern
a
ti
o
n
a
l
jo
u
rn
a
l
a
n
d
t
h
re
e
p
a
p
e
rs
in
re
p
u
ted
in
tern
a
ti
o
n
a
l
a
n
d
Na
ti
o
n
a
l
c
o
n
fe
re
n
c
e
s.
Ad
d
i
t
io
n
a
ll
y
,
sh
e
h
a
s
a
u
t
h
o
re
d
a
b
o
o
k
a
n
d
h
o
l
d
s
a
p
a
ten
t
i
n
th
e
n
e
two
rk
i
n
g
d
o
m
a
in
.
He
r
p
u
b
li
c
a
ti
o
n
s
fo
c
u
s
o
n
e
n
h
a
n
c
in
g
th
e
e
ffic
ien
c
y
a
n
d
se
c
u
rit
y
o
f
WS
Ns
a
n
d
Io
T
sy
ste
m
s.
S
h
e
is
c
u
rre
n
tl
y
w
o
rk
i
n
g
a
s
a
n
a
ss
istan
t
p
ro
fe
ss
o
r
a
t
Ka
rp
a
g
a
m
Ac
a
d
e
m
y
o
f
Hig
h
e
r
E
d
u
c
a
ti
o
n
,
I
n
d
ia.
S
h
e
c
a
n
b
e
c
o
n
tac
ted
a
t
e
m
a
il
:
d
iy
a
2
3
n
o
v
@g
m
a
il
.
c
o
m
.
Ve
n
i
S
u
n
d
a
r
a
m
wo
r
k
in
g
a
s
a
p
ro
fe
ss
o
r
i
n
th
e
De
p
a
rtme
n
t
o
f
Co
m
p
u
ter
S
c
ien
c
e
in
Ka
rp
a
g
a
m
Ac
a
d
e
m
y
o
f
Hi
g
h
e
r
E
d
u
c
a
ti
o
n
.
S
h
e
h
a
s
c
o
m
p
lete
d
h
e
r
Do
c
to
ra
l
d
e
g
re
e
fro
m
Bh
a
ra
th
iar
Un
i
v
e
rsity
.
S
h
e
h
a
s
1
9
y
e
a
rs
o
f
e
x
p
e
rien
c
e
in
tea
c
h
in
g
a
n
d
h
a
s
p
u
b
l
ish
e
d
4
7
re
se
a
rc
h
a
rti
c
les
a
n
d
h
a
s
a
tt
e
n
d
e
d
v
a
rio
u
s
n
a
ti
o
n
a
l
a
n
d
in
tern
a
ti
o
n
a
l
c
o
n
fe
re
n
c
e
s.
He
r
re
se
a
rc
h
a
re
a
in
c
lu
d
e
s
n
e
t
wo
rk
s
a
n
d
d
a
ta
m
in
i
n
g
.
S
h
e
c
a
n
b
e
c
o
n
tac
ted
a
t
e
m
a
il
:
v
e
n
ik
a
rt
h
ik
0
4
@
g
m
a
il
.
c
o
m
.
Evaluation Warning : The document was created with Spire.PDF for Python.