{"title":"Evaluation of Statistical Tests for Randomness Using Conditional Entropy","authors":"Chengbing Liu, Xuejia Lai","doi":"10.1109/CyberC.2013.93","DOIUrl":"https://doi.org/10.1109/CyberC.2013.93","url":null,"abstract":"Random sequences are widely used in the field of computer science. In practice, random sequences are generated by pseudorandom number generators which are in fact deterministic algorithms. Statistical tests are used to check whether there are regularities in a sequence generated by a pseudorandom number generator. Currently there are many statistical tests available, which focus on different aspects of a sequence, but it remains open how these tests are correlated. In this paper, we select a set of statistical tests from different test suites, adapt them for testing short sequences if necessary, and evaluate these tests by calculating their conditional entropy, which reflects the coverage of each test in the whole test suite. Finally we propose a new test suite which has a larger coverage than the original test suite.","PeriodicalId":133756,"journal":{"name":"2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116126640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of Image Transmission for Wireless Sensor Networks in the Mine Tunnel","authors":"Jing Zhang, Erbao He, Xiaoqian Zheng","doi":"10.1109/CyberC.2013.62","DOIUrl":"https://doi.org/10.1109/CyberC.2013.62","url":null,"abstract":"The research aimed to use Wireless Sensor Networks(WSNs) applying in the mine tunnel environmental monitoring. The wireless sensor node has a camera which can transmit live image signal in order to monitor the status in the mine tunnel when an exception occurs that the wireless sensor nodes perceived such as humidity increases, gas concentration increases, etc. The quality of image signal depends on Group of Pictures (GOP) structure and Quantization Scale(Qscale). In this paper, the effects of the GOP length and Qscale to the image quality for wireless sensor networks in the mine tunnel are investigated. The encoded image signal converted in to trace files using the tools-MyEvalvid-NT, and then run in a simulated network environment -NS2. The image files which the sink node received are examined in terms of average PSNR. The simulation results indicate that in range of setting parameters, by increasing the GOP length and the value of Qscale, the average PSNR decreases gradually, the image quality is worse, which is significant for our future research on wireless sensor networks applying in the mine tunnel environmental monitoring.","PeriodicalId":133756,"journal":{"name":"2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115156002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Evaluation of Intellectus WSN Monitoring and Debugging Tool Using the Indriya Testbed","authors":"T. Campana, G. O’hare","doi":"10.1109/CYBERC.2013.72","DOIUrl":"https://doi.org/10.1109/CYBERC.2013.72","url":null,"abstract":"Within wireless sensor networks (WSN), network topology and connectivity is one of the key elements that needs to be known in order to perform fault detection and isolation identification. Knowledge of connectivity is fundamental to understanding the operation of a given sensor network. The Intellect us methodology described herein can be used to monitor such connectivity. This paper evaluates Intellect us through the injection of particular test cases within a test bed, Intellect us is capable of building an overview of a network topology as a bi-product of such experiments which assists in the better understanding of the real WSN (link connectivity, network topology and sensor node roles). Spatial and temporal correlations from each nodes local decision can, when aggregated, provide a global overview of the topology network.","PeriodicalId":133756,"journal":{"name":"2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125026702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"UFO: A United Framework for Target Localization in Wireless Sensor Networks","authors":"Jiuyang Tang, Guoming Tang, Daquan Tang, W. Xiao","doi":"10.1109/CyberC.2013.69","DOIUrl":"https://doi.org/10.1109/CyberC.2013.69","url":null,"abstract":"Recently, various range-free based target localization applications and systems are developed in Wireless Sensor Networks. Nevertheless, few of them can be reused or grafted by others, which has led to serious waste. In this paper, a Unified Framework for target lOcalization (UFO) is proposed and an adaptive grids dividing algorithm is addressed within the framework. Based on the common ground of current typical range-free localization methods, UFO is constructed by four major modules to achieve candidate area acquisition and target location determination: sensor deployment and signal process module, candidate area acquisition module, target localization module and parameter setting module. Not only can UFO construct a localization framework quickly, the computing complexity of loaded localization methods is expected to be decreased by bringing in adaptive grids dividing. In our simulations, the UFO assembled with schemes from node sequences based localization method is tested, and the results from our framework are compared with the original method's. Performance evaluation shows us both UFO and original schemes perform well at localizing accuracy, while the former has a big advantage at real-time capacity.","PeriodicalId":133756,"journal":{"name":"2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124882401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modeling and Simulation of Pathloss and Fading for Air-Ground Link of HAPs within a Network Simulator","authors":"Yi Zheng, Yuwen Wang, Fanji Meng","doi":"10.1109/CyberC.2013.78","DOIUrl":"https://doi.org/10.1109/CyberC.2013.78","url":null,"abstract":"Development in Near Space Vehicle communication has increased the need for simulation to test and analyze protocols for this emerging technology. Network simulators lack a realistic near space path loss and fading module which would allow having accurate simulation. To explore and simulate accurately the influence of rain, cloud, gaseous absorption and multipath fading on the air-ground link, the mathematical and simulation models for the rain attenuation, cloud attenuation, gaseous absorption attenuation and Ricean fading were implemented. Moreover, modeling and simulation were done within QualNet. Simulation results quantitatively show the effects of rain attenuation, cloud attenuation, gaseous absorption attenuation and Ricean fading on the performance of packet delivery rate of the High Altitude Platform station (HAPs) air-ground link. Thus, simulation of the air-ground link becomes more accurate and reasonable. Simultaneously, the used simulation platform is also improved by integrating new models.","PeriodicalId":133756,"journal":{"name":"2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"464 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127218020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Anonymous Multi-receiver Certificate-Based Encryption","authors":"Chun-I Fan, Pei-Jen Tsai, Jheng-Jia Huang, Wen-Tsuen Chen","doi":"10.1109/CyberC.2013.13","DOIUrl":"https://doi.org/10.1109/CyberC.2013.13","url":null,"abstract":"In a multi-receiver encryption environment, a sender can randomly choose a set of authorized receivers while distributing messages to them efficiently and securely. Recently, more and more researchers concern the privacy of receivers. They mentioned that an authorized receiver does not want other entities, except the service provider, to be able to derive her/his identity in many applications such as pay-TV. However, most of these protocols either provide no formal security proofs or are inefficient owing to high computation cost. In this paper, we construct a provably secure and efficient anonymous multi-receiver certificated-based encryption scheme, PMCE, which avoids the key escrow problem while preserving the implicit certification of identity-based setting. The proposed PMCE gets rid of pairing computation to encrypt a message and only needs one pairing computation to decrypt the cipher text. Finally, we define the security models and offer formal proofs to all properties including receiver anonymity.","PeriodicalId":133756,"journal":{"name":"2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125349111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
He Zhao, Chenglei Peng, Yao Yu, Yu Zhou, Ziqiang Wang, S. Du
{"title":"Cost-Aware Automatic Virtual Machine Scaling in Fine Granularity for Cloud Applications","authors":"He Zhao, Chenglei Peng, Yao Yu, Yu Zhou, Ziqiang Wang, S. Du","doi":"10.1109/CyberC.2013.26","DOIUrl":"https://doi.org/10.1109/CyberC.2013.26","url":null,"abstract":"It is a tendency for enterprises to deploy their applications on Infrastructure as a Service (IaaS) platforms. Many latest IaaS service providers offer Virtual Machine (VM) instances with various capacities and prices by the minute. In this paper, based on the observation that the workload of nowaday applications fluctuates frequently, we propose a cost-aware automatic VM scaling method of fine granularity to satisfy the Service Level Agreement (SLA) and minimize the rent of VMs down to the minute. In the environment with sporadic and sharp swings of workload, our approach acts quickly to get suitable VM scaling scheme to stabilize the response time, reduce the SLA violations and save the rent of VM usage.","PeriodicalId":133756,"journal":{"name":"2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125352976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jie Li, Erling Gong, Zhiqiang Sun, Long Li, Hongwei Xie
{"title":"An Interference-Based Distributed TDMA Scheduling Algorithm for Aeronautical Ad Hoc Networks","authors":"Jie Li, Erling Gong, Zhiqiang Sun, Long Li, Hongwei Xie","doi":"10.1109/CyberC.2013.84","DOIUrl":"https://doi.org/10.1109/CyberC.2013.84","url":null,"abstract":"The Aeronautical Ad hoc networks (AANET) is a new sort of ad hoc networks, in which the nodes move fleetly and the corresponding topology changes rapidly. The design issue of Medium Access Control (MAC) for AANET is very important and the most frequently used MAC protocol is redesigned based on Time Division Multiple Access (TDMA). We describe a new Interference-based Distributed TDMA Algorithm (IDTA) for AANET. IDTA does not need central control and runs in parallel at every node in the network using an interference-based network model. Only local information is exchanged and needed. IDTA is able to meet different needs of different links and has the ability to provide QoS. Compared to other distribute Spatial reuse TDMA (STDMA) algorithms, IDTA runs at both the receiver and sender of a link other than only at the receiver. This reduces the computational burden of the receiver and needs less operation time for assignment. Therefore IDTA is more appropriate for the highly-dynamic aeronautical environment. The OMNET++ simulation shows that the IDTA can significantly reduce the end to end delay than other distribute STDMA algorithm in the aeronautical environment.","PeriodicalId":133756,"journal":{"name":"2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126834893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Light-Weight Rule-Based Monitoring System for Web of Things","authors":"Li Yangqun","doi":"10.1109/CyberC.2013.49","DOIUrl":"https://doi.org/10.1109/CyberC.2013.49","url":null,"abstract":"Sensors can sense different phenomena of the real world, such as environmental temperature, humidity and pressure, so they have wide applications in the fields of all kinds of sensing and monitoring. However, heterogeneous sensing devices, networks and data hinder the integration of the applications. Multi-source data fusion technology is used to monitor different environmental parameters by a variety of different types of sensors and then to process the different environmental parameters by the mathematical algorithm to judge the occurrence of some phenomenon. A large number of calculations are needed in the algorithm and different algorithms are used for the particular issues. The technology of Web of Things is used to shield the difference of the underlying sensing devices, networks and data by Web technology in order to provide a good platform for information integration. Based on this, a light-weight rule-based practical method is adopted to integrate the fine-grained multi-source data sensed under WoT platform into the high-level information, which can support multiple application scenarios at the same time and sends the procured information to the decision center by the real-time Web technology.","PeriodicalId":133756,"journal":{"name":"2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123695595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Architecture Research and Design Implementation of Multi-data and Multi-path Communication Control System","authors":"Li Xiu-xiu, He Ya-xi, Yue You-ling","doi":"10.1109/CYBERC.2013.40","DOIUrl":"https://doi.org/10.1109/CYBERC.2013.40","url":null,"abstract":"The paper focuses on the architecture research and design implementation of multi-data and multi-path communication control system based on the Flex 4.0 development platform. It develops a new communication protocol and completes the software implementation. The system includes three parts: multi-path route service, multi-data transmission, information propagation and aggregation.","PeriodicalId":133756,"journal":{"name":"2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122589091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}