Please wait a minute...

����Ŀ¼

    15 December 2018, Volume 4 Issue 12
    Comprehensive Review
    Overview of mobile communication network authentication
    Xinxin HU, Caixia LIU, Shuxin LIU, Wei YOU, Kang QIAO
    2018, 4(12):  1-15.  doi:10.11959/j.issn.2096-109x.2018096
    Asbtract ( 1807 )   HTML ( 62)   PDF (855KB) ( 4508 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the increasingly serious security situation of mobile communication network,it becomes an important issue about how to protect the privacy of legitimate users while providing high-quality communication services,and how to protect the carrier network from being invaded becomes an important issue in the field of mobile communication security.Authentication is an important means for users and networks to authenticate each other's legitimacy.Authentication methods are also evolving along with network evolution.Starting with the authentication methods of past mobile communication networks (GSM,CDMA,UMTS,LTE),the advantages and disadvantages of each generation of authentication technology are analysed,along with which the authentication technology and unified authentication technology of the fifth-generation (5G) mobile communication to be commercialized are emphatically analysed.In the last,reasonable prospect for the development of authentication technology in the future are proposed.

    Papers
    Based on linear systolic array for convolutional neural network’s calculation optimization and performance analysis
    Qinrang LIU,Chongyang LIU,Jun ZHOU,Xiaolong WANG
    2018, 4(12):  16-24.  doi:10.11959/j.issn.2096-109x.2018100
    Asbtract ( 2375 )   HTML ( 47)   PDF (759KB) ( 2692 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Concerning the issue that the convolutional neural network (CNN) accelerator design on most FPGA ends fails to effectively use the sparsity and considering both bandwidth and energy consumption,two improved CNN calculation optimization strategies based on linear systolic array architecture are proposed.Firstly,convolution is transformed into matrix multiplication to take advantage of sparsity.Secondly,in order to solve the problem of large I/O demand in traditional parallel matrix multiplier,linear systolic array is used to improve the design.Finally,a CNN acceleration comparative analysis of the advantages and disadvantages between parallel matrix multiplier and two improved linear systolic arrays is presented.Theoretical proof and analysis show that compared with the parallel matrix multiplier,the two improved linear systolic arrays make full use of sparsity,and have the advantages of less energy consumption and less I/O bandwidth occupation.

    Recommendation algorithm based on GMM clustering and FOA-GRNN model
    Yipeng LI,Yeli RUAN,Jie ZHANG
    2018, 4(12):  25-31.  doi:10.11959/j.issn.2096-109x.2018097
    Asbtract ( 1282 )   HTML ( 10)   PDF (658KB) ( 1005 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Aiming at the problem of low recommendation accuracy caused by sparse data in traditional item-based recommendation algorithm,a recommendation algorithm based on GMM clustering and FOA-GRNN model is proposed.The algorithm firstly uses Gaussian mixture model (GMM) to cluster the item features,then constructs the score matrix according to the clustering results,and fills the score matrix with slope one algorithm.Finally,the user's score based on similarity prediction is taken as input,and the final score is output through FOA-GRNN model.Experimental results based on movielens-2k dataset show that the proposed algorithm can deal with highly sparse data better and has better recommendation accuracy than the other three algorithms.

    VMI-based virtual machine remote attestation scheme
    Wei WANG, Xingshu CHEN, Xiao LAN, Xin JIN
    2018, 4(12):  32-43.  doi:10.11959/j.issn.2096-109x.2018098
    Asbtract ( 1286 )   HTML ( 25)   PDF (1044KB) ( 1633 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The virtual machine attestation scheme proposed by trusted computing group (TCG) can provide attestation service of virtual machine for cloud computing.However,the service using the scheme proposed by the TCG directly would be threatened by the cuckoo attack and its performance would be lower.Therefore,a new virtual machine remote attestation scheme based on virtual machine introspection (VMI) was proposed.Firstly,it eliminated the path to perform cuckoo attacks in virtual machines via obtaining virtual machines′ remote attestation evidence in virtual machine monitor (VMM).Secondly,it used physical trusted platform module (TPM) to ensure the integrity of virtual machines’ remote attestation evidence and reduced the number of attestation identity key (AIK) certificates required during remote attestation to balance the load of private CA.Experiments show that the proposed scheme can verify the status of virtual machines correctly and increase the performance of bulk virtual machines’ remote attestation significantly.

    Construction of the content extraction signature scheme based on the thought of the batch scheme
    Zixin TANG,Xinyi HUANG
    2018, 4(12):  44-53.  doi:10.11959/j.issn.2096-109x.2018102
    Asbtract ( 1103 )   HTML ( 11)   PDF (642KB) ( 740 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The Waters scheme was transformed into the content extraction signature scheme at the bridge of the thought from the batch signature scheme.The proposed scheme is improved by the RSAProd scheme,presented by Steinfeld,Bull,Zheng (ICISC 2001).The operation time is saved in every stage at the slight sacrifice of the length of extraction signatures.The security was proved that the proposed scheme is existentially unforgeable under chosen message attacks while the privacy is maintained.

    Analysis of communication data of mobile terminal based on protocol reversal
    Mingyuan ZHANG,Xinyu QI,Yubo SONG,Rongrong GU,Aiqun HU,Zhenchao ZHU
    2018, 4(12):  54-61.  doi:10.11959/j.issn.2096-109x.2018099
    Asbtract ( 1151 )   HTML ( 20)   PDF (1206KB) ( 1194 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The most problem in analysis of communication protocols and communication data for mobile terminals is that many mobile applications do not have the relevant public technical documents,and it is difficult to know the type of communication protocol it adopts.The instruction execution sequence analysis technique takes the instruction sequence executed by the program as a research object,and inversely infers the message format and the state machine to obtain the communication protocol.However,due to the incomplete collection of sequence information,the state machine infers that the inference is incomplete and cannot be effective.A novel protocol reverse scheme based on state machine comparison is proposed,which can be used for the forensics of mobile terminal communication data.The scheme first uses PIN for dynamical identification of the taint,and track it and analyzes the trajectory to obtain the message format.Secondly,the message clustering is performed on the basis of the message format to infer the protocol state machine.Finally,the LCS algorithm is used to compare the state machines to get a complete protocol state machine.This article tests and evaluates the scheme based on two types of application design experiments on the Android platform.The experimental results show that the results are both complete and real-time,and have practical value.

    Scheme of extending elliptic curve method to three phases
    Guiwen LUO
    2018, 4(12):  62-66.  doi:10.11959/j.issn.2096-109x.2018101
    Asbtract ( 1113 )   HTML ( 9)   PDF (517KB) ( 932 )   Knowledge map   
    References | Related Articles | Metrics

    Elliptic curve method for integer factorization (ECM) is one of the most popular integer factorization algorithms,and it was firstly proposed by Lenstra in 1985.The original ECM contained just first phase.Since its invention,researches about the algorithm and implementation emerged up,among which the most important improvement is the extension to two phases proposed by Brent and Montgomery.This improvement tremendously strengthened ECM's capacity and efficiency.Elliptic curve method was extended to three phases.Extension method is kind of like “mixing together” the first phase and second phase.Compared to the best current two phases ECM,the new algorithm shows 2 advantages.First,under the same factorization parameters,the proposed algorithm improves the probability of finding out prime factor at the expense of negligible increasement of time.Second,when searching the same prime factor,the proposed algorithm can utilize smaller “smoothness parameters”.

Copyright Information
Bimonthly, started in 2015
Authorized by:Ministry of Industry and Information Technology of the People's Republic of China
Sponsored by:Posts and Telecommunications Press
Co-sponsored by:Xidian University, Beihang University, Huazhong University of Science and Technology, Zhejiang University
Edited by:Editorial Board of Chinese Journal of Network and Information Security
Editor-in-Chief:FANG Bin-xing
Executive Editor-in-Chief:LI Feng-hua
Director:Xing Jianchun
Address:F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Tel:010-53879136/53879138/53879139
Fax:+86-81055464
ISSN 2096-109X
CN 10-1366/TP
visited
Total visitors:
Visitors of today:
Now online: