ROR Model Clause Samples
The ROR (Return on Revenue) Model clause defines how compensation or payments are calculated based on a percentage of the revenue generated from a specific activity, product, or service. In practice, this clause sets out the formula for determining payments, often specifying the revenue streams included, the applicable percentage, and the timing of payments. For example, a service provider might receive a fixed percentage of all sales revenue generated through their efforts. The core function of this clause is to align the interests of the parties by tying compensation directly to actual revenue performance, thereby sharing both risk and reward.
ROR Model. In this section, we use the universally-accepted real-or-random (ROR) model [25] in order to prove the security of the session key in our proposed protocol.We provide the similar proof as adopted in [26,27]. Short Discussion about ROR Model In the ROR model [25], the malicious attacker A is modeled using the DY model, which interacts with the instance of the participants in the protocol. In our proposed protocol, vi, RSUj and TA are considered as participants. Additionally, Pt1 , Pt2 , and Pt3 , which are called oracles denoting the vi RSUj TA instances t1, t2, and t3 of vi, RSUj, and TA, respectively. Table 2 shows various queries that simulate attacks, such as eavesdropping, modifying, and deleting or inserting the transmitted messages among the entities. h(·) and Collision-resistant one-way hash function Hash are modeled as a random oracle and they can be used by all participants including ▇. ▇▇▇▇ et al. [28] showed that the password chosen by the user follows the ▇▇▇▇’▇ law, which is quite different from the uniform distribution. They also found that the size of password dictionary is quite limited in the sense that users do not generally use the entire space of the passwords; instead, they use a small space of the allowed characters space. We apply the ▇▇▇▇’▇ law in order to prove the session key security of our proposed protocol.
Theorem 1. If AdvP is the advantage function of an attacker A in breaking the session key SK security of the proposed protocol P, respectively, qh, qsend, and |Hash| are the number of Hash queries, Send queries, and the range space of the hash function, respectively. Subsequently, q2 h + |Hash| 2max where C′ and s′ are the ▇▇▇▇’▇ parameters [28].
Table 2. Various queries and their meanings. Execute(Pt1 , Pt2 , Pt3 ) This query means that the model of the eavesdropping attack between the vi RSUj TA entities vi , RSUj and TA via an insecure channels. vi CorruptOBU(Pt1 ) Under this corrupt on-board-unit (OBU) query, A can fetch all sensitive credentials stored in the OBU of vi . This is modeled as an active attack. Send(Pt ) Under this query, can transmits a message to Pt, and in response, it also receives a message from Pt. This is also modeled as an active attack. Reveal(Pt ) The query means that A reveals session key SK created by Pt and its partner to Test(Pt ) Before the game begins, under this query, an unbiased coin c is flipped. Depending on the output, the following decisions are made. At executes this query and if the...
ROR Model. In this section, we examine the security of the proposed protocol using the commonly known ROR model [21-24]. 𝐼𝐷𝑁 𝑋𝑁 This model considers the sensor node SN, the hub node HN, HN|≡ SN➛−→HN, HN⊲{SN➛→HN, 𝑟2, 𝑡𝑖} 𝐼𝐷𝑁 and the intermediate node IN as three actors. In this model, we SN➛→ 2 𝑖 HN|≡SN|~{ 𝑋𝑁HN, 𝑟 , 𝑡 } SN➛−−→HN
(1) use the following notations: • Participant: Let П𝑡1 , П𝑡2 and П𝑡3 represent the SN, From formula (1), A2, and R4 we can get: 𝐼𝑁 𝐻𝑁 HN|≡#(𝑡𝑖) 𝑋𝑁 HN|≡#{SN➛→HN, 𝑟2, 𝑡𝑖} Using formula (1), formula (2), and R2 we can get:
(2) IN, and HN instances 𝑡1, 𝑡2 and 𝑡3, respectively. These occurrences are also known as oracles.
ROR Model. The main participants in this model are: user Ui, central server Server and device node SDj. Participants: We use Πu , Πv , Πt to represent instances u, v, t of Ui Server SDj Ui, Server and SDj. They are also called oracles. SDj Ui SDj Partnering: When Πt and Πu are in mutual authentication, Πt of Ui SDj is the partner of Πu of Ui and vice-versa.
