Entry Awerbuch:2008:ODS from tissec.bib
Last update: Sun Oct 15 02:58:48 MDT 2017
Top |
Symbols |
Numbers |
Math |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{Awerbuch:2008:ODS,
author = "Baruch Awerbuch and Reza Curtmola and David Holmer and
Cristina Nita-Rotaru and Herbert Rubens",
title = "{ODSBR}: an on-demand secure {Byzantine} resilient
routing protocol for wireless ad hoc networks",
journal = j-TISSEC,
volume = "10",
number = "4",
pages = "6:1--6:??",
month = jan,
year = "2008",
CODEN = "ATISBQ",
DOI = "https://doi.org/10.1145/1284680.1341892",
ISSN = "1094-9224 (print), 1557-7406 (electronic)",
ISSN-L = "1094-9224",
bibdate = "Thu Jun 12 17:52:24 MDT 2008",
bibsource = "http://portal.acm.org/;
http://www.math.utah.edu/pub/tex/bib/tissec.bib",
abstract = "Ah hoc networks offer increased coverage by using
multihop communication. This architecture makes
services more vulnerable to internal attacks coming
from compromised nodes that behave arbitrarily to
disrupt the network, also referred to as Byzantine
attacks. In this work, we examine the impact of several
Byzantine attacks performed by individual or colluding
attackers. We propose ODSBR, the first on-demand
routing protocol for ad hoc wireless networks that
provides resilience to Byzantine attacks caused by
individual or colluding nodes. The protocol uses an
adaptive probing technique that detects a malicious
link after log n faults have occurred, where n is the
length of the path. Problematic links are avoided by
using a route discovery mechanism that relies on a new
metric that captures adversarial behavior. Our protocol
never partitions the network and bounds the amount of
damage caused by attackers. We demonstrate through
simulations ODSBR's effectiveness in mitigating
Byzantine attacks. Our analysis of the impact of these
attacks versus the adversary's effort gives insights
into their relative strengths, their interaction, and
their importance when designing multihop wireless
routing protocols.",
acknowledgement = ack-nhfb,
articleno = "6",
fjournal = "ACM Transactions on Information and System Security",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J789",
keywords = "ad hoc wireless networks; Byzantine failures;
on-demand routing; security",
}
Related entries
- ad,
2(2)177,
11(1)3,
12(1)2,
18(1)1
- adaptive,
11(4)19,
15(4)17,
18(4)12
- adversarial,
11(4)19,
13(4)38,
14(3)27,
14(4)28,
15(3)12,
17(3)11
- adversary,
11(3)13,
11(4)19,
11(4)23,
13(3)21,
14(4)28,
15(2)9,
15(3)12,
15(3)14,
17(2)7,
17(3)9,
17(3)11,
18(1)4,
18(2)5,
18(4)14
- amount,
12(3)16,
12(3)17,
13(4)29,
14(1)12,
16(3)10,
16(4)14,
17(3)10,
17(4)15,
18(1)4,
18(4)14
- analysis,
1(1)66,
2(1)34,
2(2)138,
2(3)230,
2(3)332,
4(1)1,
6(4)443,
7(2)175,
7(4)489,
8(3)312,
9(3)292,
9(4)391,
10(1)2,
10(3)9,
10(3)10,
10(3)11,
10(4)2,
11(2)3,
11(3)13,
11(3)15,
11(4)17,
11(4)18,
11(4)23,
12(1)4,
12(2)10,
12(3)16,
13(1)10,
13(3)25,
13(3)26,
13(3)27,
13(4)41,
14(1)6,
14(1)8,
14(1)13,
14(2)15,
14(4)28,
15(3)14,
15(4)17,
15(4)18,
16(1)2,
16(1)4,
16(2)8,
16(3)10,
16(3)11,
16(4)14,
16(4)17,
17(1)1,
17(1)4,
17(2)7,
17(3)9,
17(4)14,
18(1)1,
18(1)4,
18(2)6
- architecture,
2(2)177,
2(3)269,
4(3)289,
8(2)187,
11(1)2,
11(1)3,
13(4)37,
14(1)3,
15(1)2,
15(3)13,
16(1)1,
16(2)5,
16(3)11,
17(2)8,
18(2)8
- attacker,
2(2)159,
8(1)78,
10(1)4,
10(4)3,
11(3)12,
11(3)15,
12(1)4,
12(2)12,
12(3)17,
12(4)22,
13(4)37,
14(1)7,
14(1)13,
14(4)31,
15(1)2,
15(4)16,
17(2)8,
17(3)11,
17(4)13,
17(4)16,
18(1)1,
18(2)7,
18(4)13
- behave,
12(2)11,
12(3)19,
18(3)9,
18(4)14
- behavior,
2(3)295,
2(4)354,
11(4)19,
12(1)5,
12(3)14,
12(3)19,
14(1)10,
14(4)32,
15(1)2,
15(2)10,
15(3)14,
16(3)12,
17(2)8,
18(2)5,
18(2)7,
18(3)9
- bound,
9(4)391,
11(2)3,
11(4)19,
12(3)16,
13(3)27,
14(1)14,
15(3)13,
16(1)2,
16(1)4,
17(3)11,
18(1)4
- Byzantine,
9(4)421,
13(4)38,
17(4)13
- capture,
2(2)159,
9(2)162,
11(3)13,
11(3)14,
15(2)10,
16(2)8,
17(3)11,
17(4)13
- caused,
14(3)24,
17(4)13
- communication,
4(3)289,
4(4)371,
7(4)523,
10(3)9,
11(1)2,
11(2)2,
11(2)3,
11(3)14,
11(4)18,
12(1)2,
12(3)15,
12(3)16,
12(4)21,
12(4)22,
13(1)8,
13(4)29,
14(1)4,
14(1)12,
15(1)5,
15(2)6,
15(2)7,
15(2)9,
15(3)14,
16(3)10,
16(4)15,
17(1)4,
17(3)9,
18(2)5,
18(2)7
- compromised,
2(3)332,
11(3)12,
11(3)15,
11(4)18,
12(2)13,
13(4)30,
13(4)38,
15(1)5
- coverage,
12(1)4,
16(2)7,
16(4)17
- Curtmola, Reza,
14(1)7,
14(1)12
- damage,
2(3)295,
11(4)20,
12(2)12
- demonstrate,
2(3)295,
10(1)4,
10(4)1,
10(4)4,
11(1)3,
11(3)16,
11(4)22,
12(1)4,
12(3)19,
13(1)10,
13(4)30,
13(4)31,
13(4)38,
14(3)27,
15(1)2,
15(1)4,
15(2)7,
15(3)12,
15(3)13,
15(4)16,
16(3)9,
16(3)10,
17(2)8,
17(3)10,
17(3)12,
17(4)16,
18(2)8,
18(4)12,
18(4)14
- designing,
2(1)34,
16(4)15,
18(4)13
- detect,
2(3)295,
11(3)14,
11(3)15,
12(2)10,
12(2)11,
12(2)13,
12(3)19,
14(1)13,
15(2)6,
16(2)5,
16(4)14,
17(4)16,
18(2)7,
18(3)9
- discovery,
11(2)1,
11(4)22,
17(4)13
- disrupt,
11(4)23,
17(1)4
- effectiveness,
10(4)4,
11(3)12,
11(4)22,
12(2)12,
15(3)11,
15(3)12,
17(3)9
- effort,
2(2)138,
2(3)332,
15(3)13,
16(3)10
- examine,
11(2)3,
13(4)35,
14(4)31,
18(2)6,
18(4)12,
18(4)13
- failure,
2(4)354,
11(3)13,
13(4)34,
14(1)3
- fault,
11(3)13,
16(3)9
- first,
2(1)34,
2(1)105,
2(4)354,
9(2)181,
11(2)3,
11(2)4,
11(3)13,
11(4)18,
11(4)22,
12(1)3,
12(1)5,
12(3)18,
12(4)22,
13(4)31,
13(4)32,
14(1)13,
14(3)25,
14(4)30,
14(4)31,
15(4)17,
15(4)18,
16(3)10,
17(1)4,
17(2)6,
17(3)11,
18(1)4,
18(3)9,
18(4)12,
18(4)13
- give,
9(4)391,
11(2)4,
11(3)13,
11(4)22,
12(1)2,
12(1)6,
13(3)20,
13(3)21,
13(4)39,
14(3)26,
16(1)3,
18(1)1
- have,
1(1)66,
1(1)93,
2(1)65,
2(2)138,
2(3)230,
2(3)269,
10(1)2,
10(1)4,
10(2)5,
10(3)10,
10(3)12,
10(4)4,
10(4)5,
11(1)2,
11(2)1,
11(2)5,
11(3)15,
11(3)16,
11(4)17,
11(4)18,
11(4)21,
12(1)1,
12(1)2,
12(2)10,
12(2)13,
12(3)15,
12(3)16,
12(3)17,
12(4)20,
13(3)20,
13(3)26,
13(3)27,
13(3)28,
13(4)32,
13(4)36,
13(4)39,
13(4)40,
14(1)6,
14(1)7,
14(1)10,
14(1)13,
14(1)14,
14(3)27,
14(4)28,
14(4)29,
15(2)7,
15(2)9,
15(2)10,
15(3)12,
15(4)18,
16(2)7,
16(2)8,
16(3)10,
16(4)15,
16(4)16,
17(1)3,
17(3)11,
17(3)12,
17(4)13,
17(4)15,
18(1)1,
18(1)3,
18(2)5,
18(2)7,
18(4)13
- hoc,
2(2)177,
11(1)3,
12(1)2,
18(1)1
- impact,
11(4)17,
12(3)14,
13(3)22,
13(4)35,
13(4)36,
15(1)4,
16(2)8,
16(4)17,
17(3)11,
18(2)5
- importance,
11(4)19,
15(1)5
- increased,
14(1)7,
17(4)15,
18(2)5
- individual,
2(3)295,
10(1)4,
11(1)3,
11(4)18,
14(3)26,
17(1)1,
17(2)8,
18(2)6
- insights,
10(4)1,
11(4)20,
14(1)4,
18(1)1
- interaction,
2(4)390,
10(3)12,
12(2)8,
12(4)21,
14(1)6,
16(3)9
- internal,
12(3)15,
13(1)10
- length,
12(3)18,
18(4)13
- link,
11(3)13,
17(1)1,
17(2)6
- log,
2(2)159,
13(4)30,
15(2)9,
17(3)12,
18(2)7
- make,
2(3)332,
9(1)31,
10(1)2,
10(3)11,
11(1)4,
11(3)13,
11(3)14,
11(4)22,
11(4)23,
12(1)1,
12(3)15,
13(3)22,
13(3)26,
13(3)28,
13(4)35,
14(4)29,
15(1)3,
15(1)4,
15(4)17,
16(3)10,
17(3)10,
18(1)1,
18(2)7,
18(4)13
- malicious,
2(2)177,
2(3)295,
10(3)11,
11(2)2,
11(3)13,
11(3)14,
11(3)15,
11(4)22,
11(4)23,
12(2)12,
12(3)14,
14(1)13,
15(1)2,
15(4)17,
16(2)6,
16(3)12,
16(4)13,
16(4)14,
17(3)10,
17(3)12,
17(4)13,
18(2)5
- mechanism,
2(2)177,
3(1)51,
10(2)8,
10(4)4,
11(2)5,
11(3)12,
11(3)16,
12(1)4,
12(2)9,
12(2)11,
12(2)13,
12(3)15,
12(3)19,
12(4)22,
13(3)21,
13(3)24,
13(3)25,
13(3)28,
13(4)29,
14(1)3,
14(1)11,
14(3)24,
14(3)27,
15(1)5,
15(2)6,
15(2)10,
16(1)3,
16(2)5,
16(3)12,
17(1)3,
17(2)5,
17(3)10,
18(4)14
- metric,
2(2)138,
2(3)295,
11(2)2,
15(2)10,
18(3)11
- mitigating,
17(1)1
- more,
2(1)3,
2(1)65,
2(3)332,
9(2)181,
9(4)391,
9(4)421,
9(4)461,
10(1)4,
10(3)9,
10(4)1,
10(4)4,
11(2)3,
11(2)4,
11(2)6,
11(3)14,
11(4)21,
12(1)1,
12(2)8,
12(2)10,
12(2)12,
12(2)13,
12(3)18,
13(1)10,
13(3)20,
13(3)21,
13(3)22,
13(3)28,
13(4)32,
13(4)34,
13(4)39,
14(3)27,
14(4)31,
15(1)2,
15(1)5,
15(2)8,
15(2)9,
15(3)11,
15(3)12,
15(4)16,
16(1)2,
16(2)8,
16(3)10,
16(3)11,
16(4)17,
17(1)2,
17(1)3,
17(3)9,
17(4)14,
17(4)16,
18(1)1,
18(3)11,
18(4)13
- never,
11(4)17,
13(1)10,
14(3)27
- new,
1(1)3,
1(1)93,
2(1)105,
2(2)138,
2(3)295,
9(2)181,
9(4)461,
10(1)3,
10(2)6,
11(4)17,
12(1)2,
12(1)3,
12(2)11,
12(3)14,
12(3)15,
12(3)16,
12(4)21,
12(4)22,
13(2)15,
13(4)29,
13(4)34,
14(1)4,
14(1)5,
14(1)6,
14(1)13,
14(3)23,
14(3)27,
14(4)30,
15(1)3,
15(2)7,
15(2)9,
15(2)10,
15(3)12,
15(4)15,
16(2)5,
16(2)7,
16(3)12,
16(4)16,
16(4)17,
17(1)4,
17(2)7,
17(3)10,
17(4)15,
18(1)1,
18(1)2,
18(3)10,
18(3)11
- Nita-Rotaru, Cristina,
7(3)457,
13(4)38,
14(1)7,
17(4)13
- node,
10(1)3,
10(4)1,
11(2)3,
11(3)12,
11(3)13,
11(3)14,
11(3)15,
11(4)18,
11(4)22,
11(4)23,
12(1)2,
12(3)18,
13(3)25,
13(4)29,
13(4)34,
13(4)38,
14(1)7,
14(3)27,
17(4)13
- offer,
1(1)93,
9(4)461,
10(4)1,
12(1)3,
13(4)29,
13(4)31,
16(2)7,
17(1)4,
18(1)3
- partition,
11(3)13,
11(4)18
- path,
2(2)138,
8(2)153,
9(4)421,
10(1)3,
11(2)3,
12(2)10,
12(2)13,
12(3)18
- performed,
2(3)332,
3(4)262,
9(4)421,
11(4)18,
13(4)40
- problematic,
16(1)2
- propose,
1(1)26,
2(1)65,
2(2)138,
2(3)269,
9(2)162,
9(4)391,
9(4)421,
10(1)3,
10(1)4,
10(3)12,
10(4)1,
10(4)3,
10(4)4,
11(1)3,
11(1)4,
11(3)12,
11(3)15,
11(4)18,
11(4)19,
11(4)23,
12(1)4,
12(2)8,
12(2)11,
12(2)13,
12(3)18,
13(3)28,
13(4)32,
13(4)36,
13(4)40,
13(4)41,
14(1)5,
14(1)10,
14(1)11,
14(3)24,
14(3)26,
14(4)30,
15(2)7,
15(4)17,
16(1)2,
16(4)15,
16(4)16,
17(1)1,
17(3)10,
17(3)11,
17(3)12,
17(4)13,
17(4)14,
18(1)2,
18(2)7
- provide,
1(1)3,
1(1)93,
2(1)3,
2(1)34,
2(1)65,
2(1)105,
2(3)230,
2(4)390,
7(2)319,
10(1)3,
10(2)8,
10(3)10,
10(4)2,
11(1)3,
11(1)4,
11(2)2,
11(3)12,
11(3)13,
11(4)17,
11(4)20,
11(4)23,
12(1)2,
12(1)3,
12(2)8,
12(2)9,
12(3)14,
12(3)15,
12(3)16,
12(4)22,
13(3)22,
13(3)24,
13(4)31,
13(4)34,
13(4)38,
13(4)41,
14(1)4,
14(1)7,
14(1)8,
14(3)25,
14(4)28,
15(2)6,
15(2)10,
15(4)17,
15(4)18,
16(1)3,
16(2)5,
16(3)9,
16(3)11,
16(4)17,
17(2)5,
17(3)11,
17(3)12,
17(4)16,
18(1)1,
18(1)2,
18(2)5,
18(2)7,
18(4)13,
18(4)14
- relative,
16(2)8,
17(2)7,
17(2)8,
18(4)14
- rely,
10(4)3,
11(2)6,
12(1)3,
13(4)38,
14(1)9,
15(1)3,
16(1)1,
16(4)13,
16(4)14,
18(1)2
- resilience,
11(1)2,
11(3)13,
14(4)28
- resilient,
11(3)13,
11(4)22,
12(4)20,
15(4)17,
17(4)13
- Rotaru, Cristina, Nita-,
7(3)457,
13(4)38,
14(1)7,
17(4)13
- routing,
4(1)1,
10(3)11,
12(1)3,
13(4)29,
15(3)14
- secure,
1(1)93,
2(2)159,
2(2)177,
2(3)332,
2(4)390,
4(1)72,
4(2)103,
4(2)134,
4(4)321,
5(3)290,
6(4)472,
7(4)523,
9(1)1,
9(1)31,
9(1)94,
9(2)162,
9(4)461,
10(2)8,
10(3)10,
10(3)11,
10(4)3,
11(2)4,
11(2)5,
11(3)13,
11(3)14,
11(4)18,
11(4)22,
11(4)23,
12(1)2,
12(1)3,
12(1)6,
12(3)16,
12(3)18,
12(4)21,
12(4)22,
13(1)9,
13(3)21,
13(3)28,
13(4)29,
14(3)23,
14(3)27,
14(4)31,
15(2)6,
15(2)9,
16(3)11,
16(4)15,
17(2)5,
17(2)6,
17(4)13,
18(2)5,
18(4)13
- service,
2(4)354,
4(4)453,
6(4)472,
10(1)2,
10(2)8,
10(3)11,
10(4)4,
11(1)2,
11(1)4,
11(3)15,
11(4)19,
12(2)12,
12(3)16,
13(4)38,
13(4)39,
13(4)41,
14(1)5,
14(3)23,
15(2)6,
15(3)12,
15(3)13,
16(2)5,
16(2)6,
16(3)11,
16(3)12,
16(4)14,
17(4)13,
17(4)15,
18(1)1,
18(1)2,
18(4)12,
18(4)13
- several,
1(1)93,
2(1)65,
2(2)138,
2(3)230,
2(3)295,
10(1)2,
10(1)4,
10(2)6,
10(2)7,
10(3)12,
11(1)4,
11(2)4,
11(4)17,
12(2)8,
12(4)20,
13(3)27,
13(4)30,
13(4)39,
13(4)41,
14(3)27,
14(4)29,
14(4)31,
15(2)6,
15(2)10,
16(3)12,
17(1)4,
17(3)9,
17(3)10,
18(1)1
- simulation,
11(2)3,
11(3)13,
11(3)15,
11(4)18,
11(4)22,
14(1)3,
15(3)11,
17(3)9
- strength,
2(3)269,
2(4)416,
10(2)5,
11(1)2,
11(4)22,
17(2)7,
18(1)1,
18(4)13
- technique,
1(1)3,
2(2)138,
2(3)230,
2(3)295,
2(4)416,
7(2)274,
9(4)391,
9(4)461,
10(2)6,
10(3)9,
11(2)2,
11(3)12,
11(3)16,
11(4)17,
11(4)18,
11(4)22,
12(1)4,
12(2)11,
12(2)13,
12(3)16,
12(3)18,
13(3)22,
13(3)25,
13(3)28,
13(4)32,
13(4)33,
13(4)35,
13(4)36,
13(4)39,
14(1)3,
14(1)5,
14(1)6,
14(1)13,
14(3)24,
14(4)32,
15(1)2,
15(1)5,
15(2)7,
15(2)8,
15(3)12,
15(4)17,
15(4)18,
16(1)2,
16(2)6,
16(2)7,
16(3)11,
16(4)13,
16(4)14,
17(3)9,
17(3)12,
17(4)16,
18(1)2,
18(2)6,
18(3)11
- through,
5(4)367,
6(1)1,
9(2)162,
10(3)12,
10(4)2,
11(2)2,
11(3)12,
11(4)22,
11(4)23,
12(2)8,
12(2)13,
13(2)12,
13(3)25,
14(1)13,
15(3)12,
15(4)16,
16(2)5,
16(2)7,
16(3)9,
17(4)14,
18(1)2,
18(2)7,
18(3)11
- use,
2(1)3,
2(1)105,
2(2)138,
2(2)177,
2(3)230,
2(3)269,
2(3)332,
2(4)354,
2(4)390,
4(2)103,
7(1)21,
9(4)391,
9(4)421,
9(4)461,
10(1)4,
10(2)5,
10(3)11,
10(4)1,
10(4)3,
10(4)5,
11(1)2,
11(1)3,
11(1)4,
11(2)1,
11(2)4,
11(3)13,
11(3)14,
11(4)18,
11(4)19,
11(4)21,
11(4)22,
12(2)10,
12(3)16,
12(3)18,
13(3)22,
13(3)24,
13(3)25,
13(4)29,
13(4)31,
13(4)36,
14(1)6,
14(1)8,
14(1)10,
14(1)11,
14(4)31,
14(4)32,
15(1)3,
15(1)4,
15(1)5,
15(2)7,
15(3)12,
15(4)15,
15(4)16,
15(4)17,
16(2)8,
16(4)15,
16(4)17,
17(2)5,
17(2)6,
17(2)7,
17(2)8,
17(4)15,
17(4)16,
18(1)1,
18(2)6,
18(3)9,
18(4)14
- using,
2(2)138,
2(2)177,
2(3)332,
4(3)289,
6(2)258,
6(3)327,
9(2)113,
9(2)162,
9(2)181,
9(3)292,
9(3)325,
9(4)461,
10(1)4,
10(2)8,
10(3)11,
10(4)3,
11(1)2,
11(2)1,
11(2)2,
11(2)3,
11(3)14,
11(4)19,
11(4)21,
12(2)10,
12(2)11,
13(1)2,
13(1)8,
13(3)20,
13(3)26,
13(4)31,
13(4)35,
13(4)39,
14(1)3,
14(1)12,
14(1)14,
14(3)27,
15(1)2,
15(3)11,
15(3)12,
15(4)15,
15(4)17,
16(1)1,
16(1)2,
16(1)4,
16(2)5,
16(2)6,
16(3)10,
16(4)17,
17(1)1,
17(2)5,
17(3)10,
17(3)11,
17(4)13,
17(4)14,
17(4)16,
18(2)7,
18(2)8,
18(3)10,
18(3)11,
18(4)14
- vulnerable,
10(3)11,
10(4)5,
11(3)15,
11(4)22,
12(2)11,
13(1)10,
13(3)25,
14(3)24,
14(3)27,
15(4)16,
16(4)13,
17(1)4
- when,
2(3)295,
10(2)7,
10(3)12,
10(4)4,
11(2)3,
11(2)6,
11(3)15,
11(3)16,
11(4)17,
11(4)18,
12(2)10,
12(2)11,
12(4)20,
12(4)22,
13(1)10,
13(3)27,
13(4)32,
13(4)34,
13(4)35,
13(4)37,
15(2)6,
15(2)9,
15(2)10,
15(3)14,
16(1)3,
16(2)8,
17(3)9,
17(4)13,
18(3)9,
18(4)12
- where,
2(3)230,
9(4)461,
10(4)4,
10(4)5,
11(3)12,
11(3)13,
11(4)19,
12(1)3,
12(3)15,
12(3)16,
12(4)20,
13(3)20,
13(3)22,
13(4)33,
13(4)37,
14(1)7,
15(2)6,
15(3)12,
15(3)13,
16(1)4,
16(2)5,
17(3)10,
17(4)16,
18(1)2,
18(2)8
- wireless,
7(2)319,
8(2)228,
9(2)162,
11(2)1,
11(2)2,
11(3)12,
11(3)13,
11(3)14,
11(4)19,
11(4)22,
11(4)23,
14(1)5,
14(1)7,
17(2)5
- work,
2(2)138,
2(3)269,
2(4)416,
10(3)10,
11(2)2,
11(2)3,
11(3)15,
11(4)17,
11(4)19,
12(2)10,
12(2)11,
12(2)12,
12(3)16,
12(3)17,
12(3)18,
13(3)25,
13(4)38,
14(1)2,
14(1)14,
15(2)7,
15(2)10,
15(3)12,
15(4)15,
15(4)17,
16(1)3,
16(1)4,
16(2)8,
16(3)10,
16(3)11,
16(4)13,
16(4)15,
17(3)12,
18(2)6,
18(4)13