Low-Cost information transfer system between vehicles on roads
The authentication process is a key component to increase security in a vehicle network. Most of the authentication protocols proposed in the literature are based on asymmetric cryptography, and specifically on the use of the RSA algorithm. In addition, the use of digital certificates and a public k...
- Autores:
-
Viloria, Amelec
Pineda Lezama, Omar Bonerge
Varela, Noel
- Tipo de recurso:
- Article of journal
- Fecha de publicación:
- 2019
- Institución:
- Corporación Universidad de la Costa
- Repositorio:
- REDICUC - Repositorio CUC
- Idioma:
- eng
- OAI Identifier:
- oai:repositorio.cuc.edu.co:11323/8312
- Acceso en línea:
- https://hdl.handle.net/11323/8312
https://doi.org/10.1007/978-981-15-9019-1_41
https://repositorio.cuc.edu.co/
- Palabra clave:
- Mutual authentication protocol
Vehicle
Diffie-Hellman algorithm
Vanet network
- Rights
- openAccess
- License
- Attribution-NonCommercial-NoDerivatives 4.0 International
id |
RCUC2_65c0872337a2d7e9a45370811a4c0c05 |
---|---|
oai_identifier_str |
oai:repositorio.cuc.edu.co:11323/8312 |
network_acronym_str |
RCUC2 |
network_name_str |
REDICUC - Repositorio CUC |
repository_id_str |
|
dc.title.eng.fl_str_mv |
Low-Cost information transfer system between vehicles on roads |
title |
Low-Cost information transfer system between vehicles on roads |
spellingShingle |
Low-Cost information transfer system between vehicles on roads Mutual authentication protocol Vehicle Diffie-Hellman algorithm Vanet network |
title_short |
Low-Cost information transfer system between vehicles on roads |
title_full |
Low-Cost information transfer system between vehicles on roads |
title_fullStr |
Low-Cost information transfer system between vehicles on roads |
title_full_unstemmed |
Low-Cost information transfer system between vehicles on roads |
title_sort |
Low-Cost information transfer system between vehicles on roads |
dc.creator.fl_str_mv |
Viloria, Amelec Pineda Lezama, Omar Bonerge Varela, Noel |
dc.contributor.author.spa.fl_str_mv |
Viloria, Amelec Pineda Lezama, Omar Bonerge Varela, Noel |
dc.subject.eng.fl_str_mv |
Mutual authentication protocol Vehicle Diffie-Hellman algorithm Vanet network |
topic |
Mutual authentication protocol Vehicle Diffie-Hellman algorithm Vanet network |
description |
The authentication process is a key component to increase security in a vehicle network. Most of the authentication protocols proposed in the literature are based on asymmetric cryptography, and specifically on the use of the RSA algorithm. In addition, the use of digital certificates and a public key infrastructure is considered. Therefore, the authentication process is often complex. In order to propose a secure solution, without the use of digital certificates and the RSA algorithm, a mutual authentication protocol based on the Diffie-Hellman algorithm is presented to establish a session key between vehicle (OBU) and road unit (RSU). From the session key, a secure communication channel can be established to transmit the identifier of each participant and the respective security parameters. To perform the authentication process, the entities perform low-cost computational operations such as hash and XOR functions. Once the mutual authentication protocol is completed, the vehicle and the road unit can exchange messages securely. |
publishDate |
2019 |
dc.date.issued.none.fl_str_mv |
2019-02-27 |
dc.date.accessioned.none.fl_str_mv |
2021-06-01T00:31:37Z |
dc.date.available.none.fl_str_mv |
2021-06-01T00:31:37Z |
dc.type.spa.fl_str_mv |
Artículo de revista |
dc.type.coar.fl_str_mv |
http://purl.org/coar/resource_type/c_2df8fbb1 |
dc.type.coar.spa.fl_str_mv |
http://purl.org/coar/resource_type/c_6501 |
dc.type.content.spa.fl_str_mv |
Text |
dc.type.driver.spa.fl_str_mv |
info:eu-repo/semantics/article |
dc.type.redcol.spa.fl_str_mv |
http://purl.org/redcol/resource_type/ART |
dc.type.version.spa.fl_str_mv |
info:eu-repo/semantics/acceptedVersion |
format |
http://purl.org/coar/resource_type/c_6501 |
status_str |
acceptedVersion |
dc.identifier.isbn.spa.fl_str_mv |
9789811555589 |
dc.identifier.uri.spa.fl_str_mv |
https://hdl.handle.net/11323/8312 |
dc.identifier.doi.spa.fl_str_mv |
https://doi.org/10.1007/978-981-15-9019-1_41 |
dc.identifier.instname.spa.fl_str_mv |
Corporación Universidad de la Costa |
dc.identifier.reponame.spa.fl_str_mv |
REDICUC - Repositorio CUC |
dc.identifier.repourl.spa.fl_str_mv |
https://repositorio.cuc.edu.co/ |
identifier_str_mv |
9789811555589 Corporación Universidad de la Costa REDICUC - Repositorio CUC |
url |
https://hdl.handle.net/11323/8312 https://doi.org/10.1007/978-981-15-9019-1_41 https://repositorio.cuc.edu.co/ |
dc.language.iso.none.fl_str_mv |
eng |
language |
eng |
dc.relation.references.spa.fl_str_mv |
N.A. Balaji, R. Sukumar, M. Parvathy, Enhanced dual authentication and key management scheme for data authentication in vehicular ad hoc network. Comput. Electr. Eng. 76, 94–110 (2019) K. Lim, K.M. Tuladhar, X. Wang, W. Liu, A Scalable and Secure Key Distribution Scheme for Group Signature-Based Authentication in VANET, in 2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON) (IEEE, 2017), pp 478–483 H. Tan, D. Choi, P Kim, S. Pan, I. Chung, Secure certificateless authentication and road message dissemination protocol in VANETs. Wireless Communications and Mobile Computing (2018) O. Chikhaoui, A.B. Chehida, R. Abassi, S.G. El Fatmi, A Formal Ticket-Based Authentication Scheme for VANETs. in Artificial Intelligence and Security Challenges in Emerging Networks (IGI Global, 2019), pp 188–220 S. Jiang, X. Zhu, L. Wang, An efficient anonymous batch authentication scheme based on HMAC for VANETs. IEEE Trans. Intell. Transp. Syst. 17(8), 2193–2204 (2016) C. Lai, D. Zheng, Q. Zhao, X. Jiang, SEGM: A secure group management framework in integrated VANET-cellular networks. Veh. Commun. 11, 33–45 (2018) S. Paul, S. Kumar, R.R. Suman, A quantum secure entity authentication protocol design for network security. Int. J. Info. Sec. Privacy (IJISP) 13(4), 1–11 (2019) U. Rajput, F. Abbas, H. Oh, A hierarchical privacy preserving pseudonymous authentication protocol for VANET. IEEE Access 4, 7770–7784 (2016) C. Vásquez, et al., Conglomerates of Bus Rapid Transit in Latin American Countries, ed. by A. Pandian, K. Ntalianis, R. Palanisamy, Intelligent Computing, Information and Control Systems. ICICCS 2019. Advances in Intelligent Systems and Computing, vol 1039 (Springer, Cham, 2020), pp. 188–220 N. Malik, P. Nanda, A. Arora, X. He, D. Puthal, Blockchain Based Secured Identity Authentication and Expeditious Revocation Framework for Vehicular Networks. in 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE) (IEEE, 2018), pp. 674–679 T. Gao, S. Deng, A Pseudonym Ring Building Scheme for Anonymous Authentication in VANETs. in International Conference on Broadband and Wireless Computing, Communication and Applications (Springer, Cham, 2018), pp. 481–489 M. Ma, D. He, H. Wang, N. Kumar, K.K.R. Choo, An efficient and provably secure authenticated key agreement protocol for fog-based vehicular ad-hoc networks. IEEE Int. Things J. 6(5), 8065–8075 (2019) L.F. Roman, P.R. Gondim, Authentication protocol in CTNs for a CWD-WPT charging system in a cloud environment. Ad Hoc Netw. 97, 102004 (2020) X. Li, Y. Han, J. Gao, J. Niu, Secure hierarchical authentication protocol in VANET. IET Inf. Secur. 14(1), 99–110 (2019) A. Viloria G. Wang, M. Gaitan, Segmentation of Sales for a Mobile Phone Service Through CART Classification Tree Algorithm. in V. Vijayakumar, V. Neelanarayanan, P. Rao, J. Light, Proceedings of 6th International Conference on Big Data and Cloud Computing Challenges. Smart Innovation, Systems and Technologies, vol 164 (Springer, Singapore, 2020) A. Viloria, et al., Hybrid Cloud Computing Architecture Based on Open Source Technology. in G. Wang, M. Bhuiyan, S. De Capitani di Vimercati, Y. Ren, Dependability in Sensor, Cloud, and Big Data Systems and Applications. DependSys 2019. Communications in Computer and Information Science, vol 1123 (Springer, Singapore, 2019) |
dc.rights.spa.fl_str_mv |
Attribution-NonCommercial-NoDerivatives 4.0 International |
dc.rights.uri.spa.fl_str_mv |
http://creativecommons.org/licenses/by-nc-nd/4.0/ |
dc.rights.accessrights.spa.fl_str_mv |
info:eu-repo/semantics/openAccess |
dc.rights.coar.spa.fl_str_mv |
http://purl.org/coar/access_right/c_abf2 |
rights_invalid_str_mv |
Attribution-NonCommercial-NoDerivatives 4.0 International http://creativecommons.org/licenses/by-nc-nd/4.0/ http://purl.org/coar/access_right/c_abf2 |
eu_rights_str_mv |
openAccess |
dc.format.mimetype.spa.fl_str_mv |
application/pdf |
dc.source.spa.fl_str_mv |
Advances in Electrical and Computer Technologies |
institution |
Corporación Universidad de la Costa |
dc.source.url.spa.fl_str_mv |
https://link.springer.com/chapter/10.1007%2F978-981-15-9019-1_41 |
bitstream.url.fl_str_mv |
https://repositorio.cuc.edu.co/bitstreams/b1e48605-d6c0-49e1-8766-398bc36d1b93/download https://repositorio.cuc.edu.co/bitstreams/74e9e7d1-2c7f-4ae8-801e-63279c6c76a9/download https://repositorio.cuc.edu.co/bitstreams/f240c727-c61e-4c1e-958c-6f2b658da688/download https://repositorio.cuc.edu.co/bitstreams/f8e1f9b0-9f74-4c57-a13f-da21f70af806/download https://repositorio.cuc.edu.co/bitstreams/b42d505d-55bf-4c6c-865e-42986696aa61/download |
bitstream.checksum.fl_str_mv |
27a243fec15e5c81cea30ae165f44b39 4460e5956bc1d1639be9ae6146a50347 e30e9215131d99561d40d6b0abbe9bad 93288c247fd1fc7453ea87076aa8d9b1 cc448339704894e43a299986d6788bc8 |
bitstream.checksumAlgorithm.fl_str_mv |
MD5 MD5 MD5 MD5 MD5 |
repository.name.fl_str_mv |
Repositorio de la Universidad de la Costa CUC |
repository.mail.fl_str_mv |
repdigital@cuc.edu.co |
_version_ |
1811760818582192128 |
spelling |
Viloria, AmelecPineda Lezama, Omar BonergeVarela, Noel2021-06-01T00:31:37Z2021-06-01T00:31:37Z2019-02-279789811555589https://hdl.handle.net/11323/8312https://doi.org/10.1007/978-981-15-9019-1_41Corporación Universidad de la CostaREDICUC - Repositorio CUChttps://repositorio.cuc.edu.co/The authentication process is a key component to increase security in a vehicle network. Most of the authentication protocols proposed in the literature are based on asymmetric cryptography, and specifically on the use of the RSA algorithm. In addition, the use of digital certificates and a public key infrastructure is considered. Therefore, the authentication process is often complex. In order to propose a secure solution, without the use of digital certificates and the RSA algorithm, a mutual authentication protocol based on the Diffie-Hellman algorithm is presented to establish a session key between vehicle (OBU) and road unit (RSU). From the session key, a secure communication channel can be established to transmit the identifier of each participant and the respective security parameters. To perform the authentication process, the entities perform low-cost computational operations such as hash and XOR functions. Once the mutual authentication protocol is completed, the vehicle and the road unit can exchange messages securely.Viloria, AmelecPineda Lezama, Omar BonergeVarela, Noelapplication/pdfengAttribution-NonCommercial-NoDerivatives 4.0 Internationalhttp://creativecommons.org/licenses/by-nc-nd/4.0/info:eu-repo/semantics/openAccesshttp://purl.org/coar/access_right/c_abf2Advances in Electrical and Computer Technologieshttps://link.springer.com/chapter/10.1007%2F978-981-15-9019-1_41Mutual authentication protocolVehicleDiffie-Hellman algorithmVanet networkLow-Cost information transfer system between vehicles on roadsArtículo de revistahttp://purl.org/coar/resource_type/c_6501http://purl.org/coar/resource_type/c_2df8fbb1Textinfo:eu-repo/semantics/articlehttp://purl.org/redcol/resource_type/ARTinfo:eu-repo/semantics/acceptedVersionN.A. Balaji, R. Sukumar, M. Parvathy, Enhanced dual authentication and key management scheme for data authentication in vehicular ad hoc network. Comput. Electr. Eng. 76, 94–110 (2019)K. Lim, K.M. Tuladhar, X. Wang, W. Liu, A Scalable and Secure Key Distribution Scheme for Group Signature-Based Authentication in VANET, in 2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON) (IEEE, 2017), pp 478–483H. Tan, D. Choi, P Kim, S. Pan, I. Chung, Secure certificateless authentication and road message dissemination protocol in VANETs. Wireless Communications and Mobile Computing (2018)O. Chikhaoui, A.B. Chehida, R. Abassi, S.G. El Fatmi, A Formal Ticket-Based Authentication Scheme for VANETs. in Artificial Intelligence and Security Challenges in Emerging Networks (IGI Global, 2019), pp 188–220S. Jiang, X. Zhu, L. Wang, An efficient anonymous batch authentication scheme based on HMAC for VANETs. IEEE Trans. Intell. Transp. Syst. 17(8), 2193–2204 (2016)C. Lai, D. Zheng, Q. Zhao, X. Jiang, SEGM: A secure group management framework in integrated VANET-cellular networks. Veh. Commun. 11, 33–45 (2018)S. Paul, S. Kumar, R.R. Suman, A quantum secure entity authentication protocol design for network security. Int. J. Info. Sec. Privacy (IJISP) 13(4), 1–11 (2019)U. Rajput, F. Abbas, H. Oh, A hierarchical privacy preserving pseudonymous authentication protocol for VANET. IEEE Access 4, 7770–7784 (2016)C. Vásquez, et al., Conglomerates of Bus Rapid Transit in Latin American Countries, ed. by A. Pandian, K. Ntalianis, R. Palanisamy, Intelligent Computing, Information and Control Systems. ICICCS 2019. Advances in Intelligent Systems and Computing, vol 1039 (Springer, Cham, 2020), pp. 188–220N. Malik, P. Nanda, A. Arora, X. He, D. Puthal, Blockchain Based Secured Identity Authentication and Expeditious Revocation Framework for Vehicular Networks. in 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE) (IEEE, 2018), pp. 674–679T. Gao, S. Deng, A Pseudonym Ring Building Scheme for Anonymous Authentication in VANETs. in International Conference on Broadband and Wireless Computing, Communication and Applications (Springer, Cham, 2018), pp. 481–489M. Ma, D. He, H. Wang, N. Kumar, K.K.R. Choo, An efficient and provably secure authenticated key agreement protocol for fog-based vehicular ad-hoc networks. IEEE Int. Things J. 6(5), 8065–8075 (2019)L.F. Roman, P.R. Gondim, Authentication protocol in CTNs for a CWD-WPT charging system in a cloud environment. Ad Hoc Netw. 97, 102004 (2020)X. Li, Y. Han, J. Gao, J. Niu, Secure hierarchical authentication protocol in VANET. IET Inf. Secur. 14(1), 99–110 (2019)A. Viloria G. Wang, M. Gaitan, Segmentation of Sales for a Mobile Phone Service Through CART Classification Tree Algorithm. in V. Vijayakumar, V. Neelanarayanan, P. Rao, J. Light, Proceedings of 6th International Conference on Big Data and Cloud Computing Challenges. Smart Innovation, Systems and Technologies, vol 164 (Springer, Singapore, 2020)A. Viloria, et al., Hybrid Cloud Computing Architecture Based on Open Source Technology. in G. Wang, M. Bhuiyan, S. De Capitani di Vimercati, Y. Ren, Dependability in Sensor, Cloud, and Big Data Systems and Applications. DependSys 2019. Communications in Computer and Information Science, vol 1123 (Springer, Singapore, 2019)PublicationORIGINALLow-Cost Information Transfer System Between Vehicles on Roads.pdfLow-Cost Information Transfer System Between Vehicles on Roads.pdfapplication/pdf75980https://repositorio.cuc.edu.co/bitstreams/b1e48605-d6c0-49e1-8766-398bc36d1b93/download27a243fec15e5c81cea30ae165f44b39MD51CC-LICENSElicense_rdflicense_rdfapplication/rdf+xml; charset=utf-8805https://repositorio.cuc.edu.co/bitstreams/74e9e7d1-2c7f-4ae8-801e-63279c6c76a9/download4460e5956bc1d1639be9ae6146a50347MD52LICENSElicense.txtlicense.txttext/plain; charset=utf-83196https://repositorio.cuc.edu.co/bitstreams/f240c727-c61e-4c1e-958c-6f2b658da688/downloade30e9215131d99561d40d6b0abbe9badMD53THUMBNAILLow-Cost Information Transfer System Between Vehicles on Roads.pdf.jpgLow-Cost Information Transfer System Between Vehicles on Roads.pdf.jpgimage/jpeg36952https://repositorio.cuc.edu.co/bitstreams/f8e1f9b0-9f74-4c57-a13f-da21f70af806/download93288c247fd1fc7453ea87076aa8d9b1MD54TEXTLow-Cost Information Transfer System Between Vehicles on Roads.pdf.txtLow-Cost Information Transfer System Between Vehicles on Roads.pdf.txttext/plain1274https://repositorio.cuc.edu.co/bitstreams/b42d505d-55bf-4c6c-865e-42986696aa61/downloadcc448339704894e43a299986d6788bc8MD5511323/8312oai:repositorio.cuc.edu.co:11323/83122024-09-17 12:50:00.179http://creativecommons.org/licenses/by-nc-nd/4.0/Attribution-NonCommercial-NoDerivatives 4.0 Internationalopen.accesshttps://repositorio.cuc.edu.coRepositorio de la Universidad de la Costa CUCrepdigital@cuc.edu.coQXV0b3Jpem8gKGF1dG9yaXphbW9zKSBhIGxhIEJpYmxpb3RlY2EgZGUgbGEgSW5zdGl0dWNpw7NuIHBhcmEgcXVlIGluY2x1eWEgdW5hIGNvcGlhLCBpbmRleGUgeSBkaXZ1bGd1ZSBlbiBlbCBSZXBvc2l0b3JpbyBJbnN0aXR1Y2lvbmFsLCBsYSBvYnJhIG1lbmNpb25hZGEgY29uIGVsIGZpbiBkZSBmYWNpbGl0YXIgbG9zIHByb2Nlc29zIGRlIHZpc2liaWxpZGFkIGUgaW1wYWN0byBkZSBsYSBtaXNtYSwgY29uZm9ybWUgYSBsb3MgZGVyZWNob3MgcGF0cmltb25pYWxlcyBxdWUgbWUobm9zKSBjb3JyZXNwb25kZShuKSB5IHF1ZSBpbmNsdXllbjogbGEgcmVwcm9kdWNjacOzbiwgY29tdW5pY2FjacOzbiBww7pibGljYSwgZGlzdHJpYnVjacOzbiBhbCBww7pibGljbywgdHJhbnNmb3JtYWNpw7NuLCBkZSBjb25mb3JtaWRhZCBjb24gbGEgbm9ybWF0aXZpZGFkIHZpZ2VudGUgc29icmUgZGVyZWNob3MgZGUgYXV0b3IgeSBkZXJlY2hvcyBjb25leG9zIHJlZmVyaWRvcyBlbiBhcnQuIDIsIDEyLCAzMCAobW9kaWZpY2FkbyBwb3IgZWwgYXJ0IDUgZGUgbGEgbGV5IDE1MjAvMjAxMiksIHkgNzIgZGUgbGEgbGV5IDIzIGRlIGRlIDE5ODIsIExleSA0NCBkZSAxOTkzLCBhcnQuIDQgeSAxMSBEZWNpc2nDs24gQW5kaW5hIDM1MSBkZSAxOTkzIGFydC4gMTEsIERlY3JldG8gNDYwIGRlIDE5OTUsIENpcmN1bGFyIE5vIDA2LzIwMDIgZGUgbGEgRGlyZWNjacOzbiBOYWNpb25hbCBkZSBEZXJlY2hvcyBkZSBhdXRvciwgYXJ0LiAxNSBMZXkgMTUyMCBkZSAyMDEyLCBsYSBMZXkgMTkxNSBkZSAyMDE4IHkgZGVtw6FzIG5vcm1hcyBzb2JyZSBsYSBtYXRlcmlhLg0KDQpBbCByZXNwZWN0byBjb21vIEF1dG9yKGVzKSBtYW5pZmVzdGFtb3MgY29ub2NlciBxdWU6DQoNCi0gTGEgYXV0b3JpemFjacOzbiBlcyBkZSBjYXLDoWN0ZXIgbm8gZXhjbHVzaXZhIHkgbGltaXRhZGEsIGVzdG8gaW1wbGljYSBxdWUgbGEgbGljZW5jaWEgdGllbmUgdW5hIHZpZ2VuY2lhLCBxdWUgbm8gZXMgcGVycGV0dWEgeSBxdWUgZWwgYXV0b3IgcHVlZGUgcHVibGljYXIgbyBkaWZ1bmRpciBzdSBvYnJhIGVuIGN1YWxxdWllciBvdHJvIG1lZGlvLCBhc8OtIGNvbW8gbGxldmFyIGEgY2FibyBjdWFscXVpZXIgdGlwbyBkZSBhY2Npw7NuIHNvYnJlIGVsIGRvY3VtZW50by4NCg0KLSBMYSBhdXRvcml6YWNpw7NuIHRlbmRyw6EgdW5hIHZpZ2VuY2lhIGRlIGNpbmNvIGHDsW9zIGEgcGFydGlyIGRlbCBtb21lbnRvIGRlIGxhIGluY2x1c2nDs24gZGUgbGEgb2JyYSBlbiBlbCByZXBvc2l0b3JpbywgcHJvcnJvZ2FibGUgaW5kZWZpbmlkYW1lbnRlIHBvciBlbCB0aWVtcG8gZGUgZHVyYWNpw7NuIGRlIGxvcyBkZXJlY2hvcyBwYXRyaW1vbmlhbGVzIGRlbCBhdXRvciB5IHBvZHLDoSBkYXJzZSBwb3IgdGVybWluYWRhIHVuYSB2ZXogZWwgYXV0b3IgbG8gbWFuaWZpZXN0ZSBwb3IgZXNjcml0byBhIGxhIGluc3RpdHVjacOzbiwgY29uIGxhIHNhbHZlZGFkIGRlIHF1ZSBsYSBvYnJhIGVzIGRpZnVuZGlkYSBnbG9iYWxtZW50ZSB5IGNvc2VjaGFkYSBwb3IgZGlmZXJlbnRlcyBidXNjYWRvcmVzIHkvbyByZXBvc2l0b3Jpb3MgZW4gSW50ZXJuZXQgbG8gcXVlIG5vIGdhcmFudGl6YSBxdWUgbGEgb2JyYSBwdWVkYSBzZXIgcmV0aXJhZGEgZGUgbWFuZXJhIGlubWVkaWF0YSBkZSBvdHJvcyBzaXN0ZW1hcyBkZSBpbmZvcm1hY2nDs24gZW4gbG9zIHF1ZSBzZSBoYXlhIGluZGV4YWRvLCBkaWZlcmVudGVzIGFsIHJlcG9zaXRvcmlvIGluc3RpdHVjaW9uYWwgZGUgbGEgSW5zdGl0dWNpw7NuLCBkZSBtYW5lcmEgcXVlIGVsIGF1dG9yKHJlcykgdGVuZHLDoW4gcXVlIHNvbGljaXRhciBsYSByZXRpcmFkYSBkZSBzdSBvYnJhIGRpcmVjdGFtZW50ZSBhIG90cm9zIHNpc3RlbWFzIGRlIGluZm9ybWFjacOzbiBkaXN0aW50b3MgYWwgZGUgbGEgSW5zdGl0dWNpw7NuIHNpIGRlc2VhIHF1ZSBzdSBvYnJhIHNlYSByZXRpcmFkYSBkZSBpbm1lZGlhdG8uDQoNCi0gTGEgYXV0b3JpemFjacOzbiBkZSBwdWJsaWNhY2nDs24gY29tcHJlbmRlIGVsIGZvcm1hdG8gb3JpZ2luYWwgZGUgbGEgb2JyYSB5IHRvZG9zIGxvcyBkZW3DoXMgcXVlIHNlIHJlcXVpZXJhIHBhcmEgc3UgcHVibGljYWNpw7NuIGVuIGVsIHJlcG9zaXRvcmlvLiBJZ3VhbG1lbnRlLCBsYSBhdXRvcml6YWNpw7NuIHBlcm1pdGUgYSBsYSBpbnN0aXR1Y2nDs24gZWwgY2FtYmlvIGRlIHNvcG9ydGUgZGUgbGEgb2JyYSBjb24gZmluZXMgZGUgcHJlc2VydmFjacOzbiAoaW1wcmVzbywgZWxlY3Ryw7NuaWNvLCBkaWdpdGFsLCBJbnRlcm5ldCwgaW50cmFuZXQsIG8gY3VhbHF1aWVyIG90cm8gZm9ybWF0byBjb25vY2lkbyBvIHBvciBjb25vY2VyKS4NCg0KLSBMYSBhdXRvcml6YWNpw7NuIGVzIGdyYXR1aXRhIHkgc2UgcmVudW5jaWEgYSByZWNpYmlyIGN1YWxxdWllciByZW11bmVyYWNpw7NuIHBvciBsb3MgdXNvcyBkZSBsYSBvYnJhLCBkZSBhY3VlcmRvIGNvbiBsYSBsaWNlbmNpYSBlc3RhYmxlY2lkYSBlbiBlc3RhIGF1dG9yaXphY2nDs24uDQoNCi0gQWwgZmlybWFyIGVzdGEgYXV0b3JpemFjacOzbiwgc2UgbWFuaWZpZXN0YSBxdWUgbGEgb2JyYSBlcyBvcmlnaW5hbCB5IG5vIGV4aXN0ZSBlbiBlbGxhIG5pbmd1bmEgdmlvbGFjacOzbiBhIGxvcyBkZXJlY2hvcyBkZSBhdXRvciBkZSB0ZXJjZXJvcy4gRW4gY2FzbyBkZSBxdWUgZWwgdHJhYmFqbyBoYXlhIHNpZG8gZmluYW5jaWFkbyBwb3IgdGVyY2Vyb3MgZWwgbyBsb3MgYXV0b3JlcyBhc3VtZW4gbGEgcmVzcG9uc2FiaWxpZGFkIGRlbCBjdW1wbGltaWVudG8gZGUgbG9zIGFjdWVyZG9zIGVzdGFibGVjaWRvcyBzb2JyZSBsb3MgZGVyZWNob3MgcGF0cmltb25pYWxlcyBkZSBsYSBvYnJhIGNvbiBkaWNobyB0ZXJjZXJvLg0KDQotIEZyZW50ZSBhIGN1YWxxdWllciByZWNsYW1hY2nDs24gcG9yIHRlcmNlcm9zLCBlbCBvIGxvcyBhdXRvcmVzIHNlcsOhbiByZXNwb25zYWJsZXMsIGVuIG5pbmfDum4gY2FzbyBsYSByZXNwb25zYWJpbGlkYWQgc2Vyw6EgYXN1bWlkYSBwb3IgbGEgaW5zdGl0dWNpw7NuLg0KDQotIENvbiBsYSBhdXRvcml6YWNpw7NuLCBsYSBpbnN0aXR1Y2nDs24gcHVlZGUgZGlmdW5kaXIgbGEgb2JyYSBlbiDDrW5kaWNlcywgYnVzY2Fkb3JlcyB5IG90cm9zIHNpc3RlbWFzIGRlIGluZm9ybWFjacOzbiBxdWUgZmF2b3JlemNhbiBzdSB2aXNpYmlsaWRhZA== |