Kui Ren | SUNY: University at Buffalo (original) (raw)

Papers by Kui Ren

Research paper thumbnail of Data security and privacy in wireless body area networks

IEEE Wireless Communications, 2010

... SECURE AND DEPENDABLE DISTRIBUTED DATA STORAGE ... Chessa et al. [5] proposed a secure distri... more ... SECURE AND DEPENDABLE DISTRIBUTED DATA STORAGE ... Chessa et al. [5] proposed a secure distributed data storage and sharing scheme for mobile wireless networks, based on the Redundant Residue Number System (RRNS). ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Privacy-Aware Attribute-Based Encryption with User Accountability

As a new public key primitive, attribute-based encryption (ABE) is envisioned to be a promising t... more As a new public key primitive, attribute-based encryption (ABE) is envisioned to be a promising tool for implementing fine-grained access control. To further address the concern of user access privacy, privacy-aware ABE schemes are being developed to achieve hidden access policy recently. For the purpose of secure access control, there is, however, still one critical functionality missing in the existing ABE schemes, which is user accountability. Currently, no ABE scheme can completely prevent the problem of illegal key sharing among users. In this paper, we tackle this problem by firstly proposing the notion of accountable, anonymous, and ciphertext-policy ABE (CP-A3BE, in short) and then giving out a concrete construction. We start by improving the state-of-the-art of anonymous CP-ABE to obtain shorter public parameters and ciphertext length. In the proposed CP-A3BE construction, user accountability can be achieved in black-box model by embedding additional user-specific information into the attribute private key issued to that user, while still maintaining hidden access policy. The proposed constructions are provably secure.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing

Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. It move... more Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. It moves the application software and databases to the centralized large data centers, where the management of the data and services may not be fully trustworthy. This unique paradigm brings about many new security challenges, which have not been well understood. This work studies the problem of ensuring the integrity of data storage in Cloud Computing. In particular, we consider the task of allowing a third party auditor (TPA), on behalf of the cloud client, to verify the integrity of the dynamic data stored in the cloud. The introduction of TPA eliminates the involvement of client through the auditing of whether his data stored in the cloud is indeed intact, which can be important in achieving economies of scale for Cloud Computing. The support for data dynamics via the most general forms of data operation, such as block modification, insertion and deletion, is also a significant step toward practicality, since services in Cloud Computing are not limited to archive or backup data only. While prior works on ensuring remote data integrity often lacks the support of either public verifiability or dynamic data operations, this paper achieves both. We first identify the difficulties and potential security problems of direct extensions with fully dynamic data updates from prior works and then show how to construct an elegant verification scheme for seamless integration of these two salient features in our protocol design. In particular, to achieve efficient data dynamics, we improve the Proof of Retrievability model [1] by manipulating the classic Merkle Hash Tree (MHT) construction for block tag authentication. Extensive security and performance analysis show that the proposed scheme is highly efficient and provably secure.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Sophisticated Privacy-Enhanced Yet Accountable Security Framework for Metropolitan Wireless Mesh Networks

Abstract— Recently, multi-hop wireless mesh networks (WMNs) have attracted increasing attention a... more Abstract— Recently, multi-hop wireless mesh networks (WMNs) have attracted increasing attention and deployment as a low-cost approach to provide broadband Internet access at metropolitan scale. Security and privacy issues are of most concern in pushing the success of WMNs ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Defending against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems

Bookmarks Related papers MentionsView impact

Research paper thumbnail of On Broadcast Authentication in Wireless Sensor Networks

IEEE Transactions on Wireless Communications, 2007

Broadcast authentication is a critical security service in wireless sensor networks (WSNs), since... more Broadcast authentication is a critical security service in wireless sensor networks (WSNs), since it enables users to broadcast the WSN in an authenticated way. Symmetric key based schemes such as muTESLA and multilevel muTESLA have been proposed to provide such services for WSNs; however, these schemes all suffer from serious DoS attacks due to the delay in message authentication. This paper presents several effective public key based schemes to achieve immediate broadcast authentication and thus overcome the vulnerability presented in the muTESLA-like schemes. Several cryptographic techniques, including Merkle hash tree and identity-based signature scheme, are adopted to minimize the scheme overhead regarding the costs on both computation and communication. A quantitative energy consumption analysis of the proposed schemes is given in detail. We believe that this paper can serve as the start point towards fully solving the important multisender broadcast authentication problem in WSNs.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of On Broadcast Authentication in Wireless Sensor Networks

IEEE Transactions on Wireless Communications, 2007

Broadcast authentication is a critical security service in wireless sensor networks (WSNs), since... more Broadcast authentication is a critical security service in wireless sensor networks (WSNs), since it enables users to broadcast the WSN in an authenticated way. Symmetric key based schemes such as muTESLA and multilevel muTESLA have been proposed to provide such services for WSNs; however, these schemes all suffer from serious DoS attacks due to the delay in message authentication. This paper presents several effective public key based schemes to achieve immediate broadcast authentication and thus overcome the vulnerability presented in the muTESLA-like schemes. Several cryptographic techniques, including Merkle hash tree and identity-based signature scheme, are adopted to minimize the scheme overhead regarding the costs on both computation and communication. A quantitative energy consumption analysis of the proposed schemes is given in detail. We believe that this paper can serve as the start point towards fully solving the important multisender broadcast authentication problem in WSNs.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Routing optimization security in mobile IPv6

Computer Networks, 2006

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Routing optimization security in mobile IPv6

Computer Networks, 2006

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A new approach for random key pre-distribution in large-scale wireless sensor networks

Wireless Communications and Mobile Computing, 2006

... key chain Ci, node y immediately knows that it shares key kci,l with node x upon receiving no... more ... key chain Ci, node y immediately knows that it shares key kci,l with node x upon receiving node x's broadcast message. ... ki) to secure the communication ... For a WSN of network size n and neigh-borhood size n , prequired can be calculated using Equa-tion (3). Then the key pool ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A new approach for random key pre-distribution in large-scale wireless sensor networks

Wireless Communications and Mobile Computing, 2006

... key chain Ci, node y immediately knows that it shares key kci,l with node x upon receiving no... more ... key chain Ci, node y immediately knows that it shares key kci,l with node x upon receiving node x's broadcast message. ... ki) to secure the communication ... For a WSN of network size n and neigh-borhood size n , prequired can be calculated using Equa-tion (3). Then the key pool ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Energy-aware geographic routing in lossy wireless sensor networks with environmental energy supply

Page 1. Permission to make digital or hard copies of all or part of this work for personal or cla... more Page 1. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Energy-aware geographic routing in lossy wireless sensor networks with environmental energy supply

Page 1. Permission to make digital or hard copies of all or part of this work for personal or cla... more Page 1. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Ensuring data storage security in Cloud Computing

Abstract—Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise... more Abstract—Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. In contrast to tradi-tional solutions, where the IT services are under proper physical, logical and personnel controls, Cloud Computing moves the application ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Ensuring data storage security in Cloud Computing

Abstract—Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise... more Abstract—Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. In contrast to tradi-tional solutions, where the IT services are under proper physical, logical and personnel controls, Cloud Computing moves the application ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Energy aware efficient geographic routing in lossy wireless sensor networks with environmental energy supply

Wireless Networks, 2009

Wireless sensor networks are characterized by multihop wireless lossy links and resource constrai... more Wireless sensor networks are characterized by multihop wireless lossy links and resource constrained nodes. Energy efficiency is a major concern in such networks. In this paper, we study Geographic Routing with Environmental Energy Supply (GREES) and propose two protocols, GREES-L and GREES-M, which combine geographic routing and energy efficient routing techniques and take into account the realistic lossy wireless channel condition and the renewal capability of environmental energy supply when making routing decisions. Simulation results show that GREESs are more energy efficient than the corresponding residual energy based protocols and geographic routing protocols without energy awareness. GREESs can maintain higher mean residual energy on nodes, and achieve better load balancing in terms of having smaller standard deviation of residual energy on nodes. Both GREES-L and GREES-M exhibit graceful degradation on end-to-end delay, but do not compromise the end-to-end throughput performance.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Energy aware efficient geographic routing in lossy wireless sensor networks with environmental energy supply

Wireless Networks, 2009

Wireless sensor networks are characterized by multihop wireless lossy links and resource constrai... more Wireless sensor networks are characterized by multihop wireless lossy links and resource constrained nodes. Energy efficiency is a major concern in such networks. In this paper, we study Geographic Routing with Environmental Energy Supply (GREES) and propose two protocols, GREES-L and GREES-M, which combine geographic routing and energy efficient routing techniques and take into account the realistic lossy wireless channel condition and the renewal capability of environmental energy supply when making routing decisions. Simulation results show that GREESs are more energy efficient than the corresponding residual energy based protocols and geographic routing protocols without energy awareness. GREESs can maintain higher mean residual energy on nodes, and achieve better load balancing in terms of having smaller standard deviation of residual energy on nodes. Both GREES-L and GREES-M exhibit graceful degradation on end-to-end delay, but do not compromise the end-to-end throughput performance.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of On Broadcast Authentication in Wireless Sensor Networks

Page 1. 4136 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 11, NOVEMBER 2007 On Broad... more Page 1. 4136 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 11, NOVEMBER 2007 On Broadcast Authentication in Wireless Sensor Networks Kui Ren, Member, IEEE, Wenjing Lou, Member, IEEE, Kai ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of On Broadcast Authentication in Wireless Sensor Networks

Page 1. 4136 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 11, NOVEMBER 2007 On Broad... more Page 1. 4136 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 11, NOVEMBER 2007 On Broadcast Authentication in Wireless Sensor Networks Kui Ren, Member, IEEE, Wenjing Lou, Member, IEEE, Kai ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance

Recently, distributed data storage has gained increasing popularity for efficient and robust data... more Recently, distributed data storage has gained increasing popularity for efficient and robust data management in wireless sensor networks (WSNs). The distributed architecture makes it challenging to build a highly secure and dependable yet lightweight data storage system. On the one hand, sensor data are subject to not only Byzantine failures, but also dynamic pollution attacks, as along the time the

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Data security and privacy in wireless body area networks

IEEE Wireless Communications, 2010

... SECURE AND DEPENDABLE DISTRIBUTED DATA STORAGE ... Chessa et al. [5] proposed a secure distri... more ... SECURE AND DEPENDABLE DISTRIBUTED DATA STORAGE ... Chessa et al. [5] proposed a secure distributed data storage and sharing scheme for mobile wireless networks, based on the Redundant Residue Number System (RRNS). ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Privacy-Aware Attribute-Based Encryption with User Accountability

As a new public key primitive, attribute-based encryption (ABE) is envisioned to be a promising t... more As a new public key primitive, attribute-based encryption (ABE) is envisioned to be a promising tool for implementing fine-grained access control. To further address the concern of user access privacy, privacy-aware ABE schemes are being developed to achieve hidden access policy recently. For the purpose of secure access control, there is, however, still one critical functionality missing in the existing ABE schemes, which is user accountability. Currently, no ABE scheme can completely prevent the problem of illegal key sharing among users. In this paper, we tackle this problem by firstly proposing the notion of accountable, anonymous, and ciphertext-policy ABE (CP-A3BE, in short) and then giving out a concrete construction. We start by improving the state-of-the-art of anonymous CP-ABE to obtain shorter public parameters and ciphertext length. In the proposed CP-A3BE construction, user accountability can be achieved in black-box model by embedding additional user-specific information into the attribute private key issued to that user, while still maintaining hidden access policy. The proposed constructions are provably secure.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing

Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. It move... more Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. It moves the application software and databases to the centralized large data centers, where the management of the data and services may not be fully trustworthy. This unique paradigm brings about many new security challenges, which have not been well understood. This work studies the problem of ensuring the integrity of data storage in Cloud Computing. In particular, we consider the task of allowing a third party auditor (TPA), on behalf of the cloud client, to verify the integrity of the dynamic data stored in the cloud. The introduction of TPA eliminates the involvement of client through the auditing of whether his data stored in the cloud is indeed intact, which can be important in achieving economies of scale for Cloud Computing. The support for data dynamics via the most general forms of data operation, such as block modification, insertion and deletion, is also a significant step toward practicality, since services in Cloud Computing are not limited to archive or backup data only. While prior works on ensuring remote data integrity often lacks the support of either public verifiability or dynamic data operations, this paper achieves both. We first identify the difficulties and potential security problems of direct extensions with fully dynamic data updates from prior works and then show how to construct an elegant verification scheme for seamless integration of these two salient features in our protocol design. In particular, to achieve efficient data dynamics, we improve the Proof of Retrievability model [1] by manipulating the classic Merkle Hash Tree (MHT) construction for block tag authentication. Extensive security and performance analysis show that the proposed scheme is highly efficient and provably secure.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Sophisticated Privacy-Enhanced Yet Accountable Security Framework for Metropolitan Wireless Mesh Networks

Abstract— Recently, multi-hop wireless mesh networks (WMNs) have attracted increasing attention a... more Abstract— Recently, multi-hop wireless mesh networks (WMNs) have attracted increasing attention and deployment as a low-cost approach to provide broadband Internet access at metropolitan scale. Security and privacy issues are of most concern in pushing the success of WMNs ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Defending against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems

Bookmarks Related papers MentionsView impact

Research paper thumbnail of On Broadcast Authentication in Wireless Sensor Networks

IEEE Transactions on Wireless Communications, 2007

Broadcast authentication is a critical security service in wireless sensor networks (WSNs), since... more Broadcast authentication is a critical security service in wireless sensor networks (WSNs), since it enables users to broadcast the WSN in an authenticated way. Symmetric key based schemes such as muTESLA and multilevel muTESLA have been proposed to provide such services for WSNs; however, these schemes all suffer from serious DoS attacks due to the delay in message authentication. This paper presents several effective public key based schemes to achieve immediate broadcast authentication and thus overcome the vulnerability presented in the muTESLA-like schemes. Several cryptographic techniques, including Merkle hash tree and identity-based signature scheme, are adopted to minimize the scheme overhead regarding the costs on both computation and communication. A quantitative energy consumption analysis of the proposed schemes is given in detail. We believe that this paper can serve as the start point towards fully solving the important multisender broadcast authentication problem in WSNs.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of On Broadcast Authentication in Wireless Sensor Networks

IEEE Transactions on Wireless Communications, 2007

Broadcast authentication is a critical security service in wireless sensor networks (WSNs), since... more Broadcast authentication is a critical security service in wireless sensor networks (WSNs), since it enables users to broadcast the WSN in an authenticated way. Symmetric key based schemes such as muTESLA and multilevel muTESLA have been proposed to provide such services for WSNs; however, these schemes all suffer from serious DoS attacks due to the delay in message authentication. This paper presents several effective public key based schemes to achieve immediate broadcast authentication and thus overcome the vulnerability presented in the muTESLA-like schemes. Several cryptographic techniques, including Merkle hash tree and identity-based signature scheme, are adopted to minimize the scheme overhead regarding the costs on both computation and communication. A quantitative energy consumption analysis of the proposed schemes is given in detail. We believe that this paper can serve as the start point towards fully solving the important multisender broadcast authentication problem in WSNs.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Routing optimization security in mobile IPv6

Computer Networks, 2006

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Routing optimization security in mobile IPv6

Computer Networks, 2006

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A new approach for random key pre-distribution in large-scale wireless sensor networks

Wireless Communications and Mobile Computing, 2006

... key chain Ci, node y immediately knows that it shares key kci,l with node x upon receiving no... more ... key chain Ci, node y immediately knows that it shares key kci,l with node x upon receiving node x's broadcast message. ... ki) to secure the communication ... For a WSN of network size n and neigh-borhood size n , prequired can be calculated using Equa-tion (3). Then the key pool ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A new approach for random key pre-distribution in large-scale wireless sensor networks

Wireless Communications and Mobile Computing, 2006

... key chain Ci, node y immediately knows that it shares key kci,l with node x upon receiving no... more ... key chain Ci, node y immediately knows that it shares key kci,l with node x upon receiving node x's broadcast message. ... ki) to secure the communication ... For a WSN of network size n and neigh-borhood size n , prequired can be calculated using Equa-tion (3). Then the key pool ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Energy-aware geographic routing in lossy wireless sensor networks with environmental energy supply

Page 1. Permission to make digital or hard copies of all or part of this work for personal or cla... more Page 1. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Energy-aware geographic routing in lossy wireless sensor networks with environmental energy supply

Page 1. Permission to make digital or hard copies of all or part of this work for personal or cla... more Page 1. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Ensuring data storage security in Cloud Computing

Abstract—Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise... more Abstract—Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. In contrast to tradi-tional solutions, where the IT services are under proper physical, logical and personnel controls, Cloud Computing moves the application ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Ensuring data storage security in Cloud Computing

Abstract—Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise... more Abstract—Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. In contrast to tradi-tional solutions, where the IT services are under proper physical, logical and personnel controls, Cloud Computing moves the application ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Energy aware efficient geographic routing in lossy wireless sensor networks with environmental energy supply

Wireless Networks, 2009

Wireless sensor networks are characterized by multihop wireless lossy links and resource constrai... more Wireless sensor networks are characterized by multihop wireless lossy links and resource constrained nodes. Energy efficiency is a major concern in such networks. In this paper, we study Geographic Routing with Environmental Energy Supply (GREES) and propose two protocols, GREES-L and GREES-M, which combine geographic routing and energy efficient routing techniques and take into account the realistic lossy wireless channel condition and the renewal capability of environmental energy supply when making routing decisions. Simulation results show that GREESs are more energy efficient than the corresponding residual energy based protocols and geographic routing protocols without energy awareness. GREESs can maintain higher mean residual energy on nodes, and achieve better load balancing in terms of having smaller standard deviation of residual energy on nodes. Both GREES-L and GREES-M exhibit graceful degradation on end-to-end delay, but do not compromise the end-to-end throughput performance.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Energy aware efficient geographic routing in lossy wireless sensor networks with environmental energy supply

Wireless Networks, 2009

Wireless sensor networks are characterized by multihop wireless lossy links and resource constrai... more Wireless sensor networks are characterized by multihop wireless lossy links and resource constrained nodes. Energy efficiency is a major concern in such networks. In this paper, we study Geographic Routing with Environmental Energy Supply (GREES) and propose two protocols, GREES-L and GREES-M, which combine geographic routing and energy efficient routing techniques and take into account the realistic lossy wireless channel condition and the renewal capability of environmental energy supply when making routing decisions. Simulation results show that GREESs are more energy efficient than the corresponding residual energy based protocols and geographic routing protocols without energy awareness. GREESs can maintain higher mean residual energy on nodes, and achieve better load balancing in terms of having smaller standard deviation of residual energy on nodes. Both GREES-L and GREES-M exhibit graceful degradation on end-to-end delay, but do not compromise the end-to-end throughput performance.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of On Broadcast Authentication in Wireless Sensor Networks

Page 1. 4136 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 11, NOVEMBER 2007 On Broad... more Page 1. 4136 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 11, NOVEMBER 2007 On Broadcast Authentication in Wireless Sensor Networks Kui Ren, Member, IEEE, Wenjing Lou, Member, IEEE, Kai ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of On Broadcast Authentication in Wireless Sensor Networks

Page 1. 4136 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 11, NOVEMBER 2007 On Broad... more Page 1. 4136 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 11, NOVEMBER 2007 On Broadcast Authentication in Wireless Sensor Networks Kui Ren, Member, IEEE, Wenjing Lou, Member, IEEE, Kai ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance

Recently, distributed data storage has gained increasing popularity for efficient and robust data... more Recently, distributed data storage has gained increasing popularity for efficient and robust data management in wireless sensor networks (WSNs). The distributed architecture makes it challenging to build a highly secure and dependable yet lightweight data storage system. On the one hand, sensor data are subject to not only Byzantine failures, but also dynamic pollution attacks, as along the time the

Bookmarks Related papers MentionsView impact