{"title":"A Trust Management Model in Centralized Cognitive Radio Networks","authors":"Qingqi Pei, Rui Liang, Hongning Li","doi":"10.1109/CyberC.2011.104","DOIUrl":"https://doi.org/10.1109/CyberC.2011.104","url":null,"abstract":"Cognitive radio network is composed of many cognitive users with sensing and learning modules, and its spectrum allocation changes from the primary user exclusive the resource to both users sharing the licensed spectrum. Trustworthy data of the perception and learning is the most important precondition whether the decision-making is fair and accurate. In this paper, a trust management model for centralized cognitive radio networks is proposed, which is on the base of the social sciences to build a trust mechanism through the whole cognitive cycle to solve the security threats brought by the untrustworthy entities, such as selfish, malicious, and faultless nodes. Analysis shows that the model can detect the malicious behavior and improve the fairness and robustness of the network.","PeriodicalId":227472,"journal":{"name":"2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128150429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Simplified Solution of a PEPA Model of Kerberos Protocol","authors":"Yishi Zhao, N. Thomas","doi":"10.1109/CyberC.2011.50","DOIUrl":"https://doi.org/10.1109/CyberC.2011.50","url":null,"abstract":"In this paper an authentication protocol, Kerberos, is investigated. To consider the scenario where there are multiple realms, a simplification is applied. The simplified model is equivalent to original model in terms of the steady state distribution. It is analysed numerically using a fluid flow approximation and is verified by stochastic simulation.","PeriodicalId":227472,"journal":{"name":"2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128545636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Noise-Robust EASI Algorithm for Noisy Blind Interference-Signal Separation","authors":"Yu-ling Duan, Hang Zhang","doi":"10.1109/CyberC.2011.92","DOIUrl":"https://doi.org/10.1109/CyberC.2011.92","url":null,"abstract":"This paper presents an improved Equivariant Adaptive Separation via Independence (EASI) algorithm to deal with the blind interference-signal separation in the noisy circumstance. This algorithm gets an unbiased estimate for separation matrix by adopting the noise bias removal technique, then, eliminates the noise in the estimate signals according to the probability density function (PDF) of the noise farther. The simulation result shows that the separation performance of the proposed algorithm is better and the error bit ratio (BER) is lower than those of the conventional EASI algorithm under the same signal noise ratio (SNR) case.","PeriodicalId":227472,"journal":{"name":"2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"242 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133637448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Framwork for a University Display Platform by Using Cloud Computing","authors":"Zhen-heng Liu, Changxin Zhang, T. Reynolds","doi":"10.1109/CyberC.2011.75","DOIUrl":"https://doi.org/10.1109/CyberC.2011.75","url":null,"abstract":"This paper discusses to use of cloud computing technology to provide a flexible virtual platform for teachers and students in university to display their creative artifacts on the Internet. The authors compare two kinds of virtualisation technology and introduce the system architecture for the creative platform. The platform allows teachers and students to display their achievements by using the unified portal. It can be used to improve the creative ability of users and save hardware and software resources in university.","PeriodicalId":227472,"journal":{"name":"2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131398290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Approach to Improving Trust Estimation in Service-Based Systems","authors":"S. Yau, Peng Sun","doi":"10.1109/CyberC.2011.64","DOIUrl":"https://doi.org/10.1109/CyberC.2011.64","url":null,"abstract":"Service-based systems (SBSs) are distributed systems which have many advantages, including rapid composition of services for distributed applications. In these systems, various capabilities are provided by service providers as services interconnected by networks. It is important for users of SBSs to have confidence in the trustworthiness of service providers. Existing approaches to trust estimation for SBSs do not incorporate human factors, such as interpersonal relationships. In addition, the trust computation in existing trust models is based on pairwise relationship, which does not include the transitivity of trust. In this paper, an approach to improving the trust estimation for SBSs by incorporating two important aspects of interpersonal relationships is presented.","PeriodicalId":227472,"journal":{"name":"2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"443 1-3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116584024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"QoS Evaluation of HTTP over Satellites","authors":"L. Audah, Zhili Sun, H. Cruickshank","doi":"10.1109/CyberC.2011.38","DOIUrl":"https://doi.org/10.1109/CyberC.2011.38","url":null,"abstract":"This paper presents the studies for the end-to-end QoS of IP over integrated terrestrial and Next Generation Satellite Network (NGSN) using HTTP web application. We compare between Big-LEO and EuroSkyWay like satellites constellations for the QoS parameters (e.g. delay, loss ratio, throughput and connection duration) of request-response HTTP connections from a remote server in London and a remote client in Boston. We model the HTTP request-response with multiple connections and response files sizes variations. We create the network scenario with error model to simulate the transmission loss environment using NS-2 simulation software. A Differentiated Services (Diffserv) queue interface is placed in the terrestrial network on the server side to regulate and differentiate the traffic flows across the narrow bandwidth of the satellite links. The results showed a good performance evaluation comparison of the QoS parameters involved in the HTTP web communications across LEO and GEO satellite systems.","PeriodicalId":227472,"journal":{"name":"2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122337238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A QoS Approach for Detecting and Managing a Fault Alarm Storm","authors":"Jian Yang, Li Li, Su-bin Shen, C. Yang","doi":"10.1109/CyberC.2011.30","DOIUrl":"https://doi.org/10.1109/CyberC.2011.30","url":null,"abstract":"When a large communication network encounters abnormal situations, such as multiple cable cuts or a failure of interface protocol leading to large numbers of propagating alarms may potentially cause many symptom events in multiple network domains. As a result, a network management system may be overwhelmed with a heavy alarm load scenario (a.k.a alarm storm). Appropriate fault management tools are required to provide auto-monitoring capabilities which indicate the health and status of the system and auto-alerting capabilities, which alert to conditions that impact system performance. This paper provides a method and strategy for managing a fault alarm storm by detecting unusual system performance behavior and implementing a reliably handling mechanism to maintain adequate system application performance. The paper explores a QoS approach to calculate inter-process latency based on dynamic states of various types of alarms and behaviors of system performance. It provides quality of service trending projection functionality of inter-process latency to manage CPU and memory capacity and to trigger the control mechanism in order to protect system resources. Based on this approach, it enables more efficient/accurate system performance measurement algorithms to handle the most import alarms need to be taken care of at the most critical situations.","PeriodicalId":227472,"journal":{"name":"2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127233446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Method Based on Kalman Filtering Theory for Solving Two Point Boundary Value Problems","authors":"Zhaohui Dang, Yulin Zhang","doi":"10.1109/CyberC.2011.57","DOIUrl":"https://doi.org/10.1109/CyberC.2011.57","url":null,"abstract":"This paper describes a simple and efficient approach to the two point boundary value problem. This approach based on the Kalman filtering theory has an ingenious iteration form. The calculated results are in excellent agreement with exact solutions. Some examples indicate that the new method has higher precision than Simple Shooting method.","PeriodicalId":227472,"journal":{"name":"2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124180313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using UICDS to Share Data in the Real-Time Decision Support System for Pandemic Response","authors":"Robert Kelley, Aman Gupta, Anup Kumar, S. Heragu","doi":"10.1109/CyberC.2011.106","DOIUrl":"https://doi.org/10.1109/CyberC.2011.106","url":null,"abstract":"This paper presents our experience using the Unified Incident Command Decision Support System (UICDS) middleware platform developed by the U.S. Department of Homeland Security to facilitate sharing data between our Real-Time Decision Support System (RTDSS) and third party data sources. We describe the basics of UICDS and further show how we integrated UICDS one of our projects.","PeriodicalId":227472,"journal":{"name":"2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115581519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bowen Li, Panlong Yang, Jinlong Wang, Qi-hui Wu, Nan Xia
{"title":"Non-Bayesian Learning of Channel Sensing Order for Dynamic Spectrum Access Networks","authors":"Bowen Li, Panlong Yang, Jinlong Wang, Qi-hui Wu, Nan Xia","doi":"10.1109/CyberC.2011.91","DOIUrl":"https://doi.org/10.1109/CyberC.2011.91","url":null,"abstract":"In this paper, we consider sequential channel sensing and accessing with unknown channel availability probabilities. In such sequential channel sensing framework, it is critical important to arrange the channel sensing order properly at the beginning of each time slot, so as to balance the tradeoff between finding an idle channel as soon as possible in current slot (exploitation by sensing currently looks better channel preferentially) and making the channel statistics more precise to benefit the following sensing order arrangement (exploration by sensing the channels currently looks suboptimal). To handle this tradeoff balancing problem, we propose five online learning algorithms: Pure Exploitation (PE), Exploitation with Optimism Initial Estimation (EOIE), UCB-based Order (UCBO), $varepsilon$-greedy Order and SoftMax Order. The latter three algorithms are extended from three classic algorithms on handling multi-armed bandit problem: UCB1cite{Auer_02}, $varepsilon$-greedycite{Cesa_98} and SoftMaxcite{Cesa_98}. Among these algorithms, UCBO is the only one that we have proved to be a zero-regret strategy, which means the system is guaranteed to achieve optimal sensing order by applying UCBO, if enough slots are played. We then evaluate the algorithms by simulations. The results are a little surprising but meaningful. We find that the PE algorithm, which is treated as a simple strategy with poor performance for traditional multi-armed bandit problems, performs very well in the order learning problem when the number of channels is small. And our proposed EOIE algorithm performs nearly optimal in all cases. In contrast, the UCB-based Order converges too slowly for actual application, although it provides theoretical zero-regret guarantee as we have proved.","PeriodicalId":227472,"journal":{"name":"2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114964910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}