Please wait a minute...

Current Issue

    20 April 2020, Volume 36 Issue 4
    Topic: Internet of Vehicles and Security
    Overview on key technology and solution of C-V2X for internet of vehicles
    Zhenjiang DONG,Yongcheng GU,Jian LIANG,Zhenjiang HUANG,Jie WANG,Dacheng LI
    2020, 36(4):  3-14.  doi:10.11959/j.issn.1000-0801.2020134
    Asbtract ( 665 )   HTML ( 68)   PDF (679KB) ( 1402 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    C-V2X is regarded as one of the most promising applications of 5G.Firstly,the necessity and the technical problems in the construction of the integration development of intelligent driving and C-V2X were introduced.Then,combined with the total solution of V2X,the functional positioning,key technology trends,problems and product morphology of each network element were studied.Typical internet of vehicles services were combed out and a typical service sequence flow diagram was presented.Finally,the key technologies in the future development of internet of vehicles were prospected.

    Analysis of the communication standardization and industry development of internet of vehicles
    Lin LIN,Lu LI,Yuming GE
    2020, 36(4):  15-26.  doi:10.11959/j.issn.1000-0801.2020122
    Asbtract ( 379 )   HTML ( 34)   PDF (634KB) ( 1047 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The internet of vehicles has become an important strategic direction for the development of the global automobile industry.China accelerates the top-level design,takes the research and deployment of a wireless communication network for vehicles based on C-V2X (now including LTE-V2X and NR-V2X) technology.And it is also required to promote the collaborative deployment of 5G and the internet of vehicles.On the basis of reviewing the latest standardization progress of 3GPP and CCSA in C-V2X,the technical standards problems found in the C-V2X“Four Layers” interoperability application demonstration were refined,and some reference suggestions were proposed for China to improve the C-V2X technical standards.

    C-V2X city-scale demonstration application
    Wei LIU,Yipeng ZHANG,Xuying GUAN,Shangchao KUANG,Feng LI
    2020, 36(4):  27-35.  doi:10.11959/j.issn.1000-0801.2020129
    Asbtract ( 377 )   HTML ( 44)   PDF (1938KB) ( 809 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    China Mobile Communication Group Co.,Ltd.and industry parties have created the world’s first C-V2X city-scale demonstration application in Wuxi.The overall situation,goals and end-to-end technical solution of the project were introduced,including the overall system architecture,platform technical solution,V2X communication network technical solution,roadside system and terminal technical solution.At the same time,the project’s achievements in demonstration effects,technical verification,and industrial advancement were summarized,and the next plan for the project was proposed.The purpose was to provide reference for the development of other domestic demonstration areas,and to promote the rapid development of the internet of vehicles industry.

    A survey of cybersecurity for intelligent connected-automated vehicle
    Yufeng LI,Xiaoyuan LU,Chenhong CAO,Jiangtao LI,Hongyi ZHU,Nan MENG
    2020, 36(4):  36-45.  doi:10.11959/j.issn.1000-0801.2020127
    Asbtract ( 873 )   HTML ( 111)   PDF (842KB) ( 1459 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The automotive industry is experiencing a shift to an intelligent and connected paradigm.(Semi-) Autonomous vehicles use a new generation of information and communication technologies to realize a full range of interactions between vehicles and cloud,vehicles and vehicles,vehicles and roads,and vehicles and pedestrian,etc.When cars started to become connected computers on wheels,network security became a major challenge,and because the scope of cyber threats extended from virtual space to physical space,the harm of cybersecurity had risen to human life.The electronic/electrical structure,in-vehicle network structure,and out-of-vehicle network structure of intelligent vehicles were introduced,the security requirements of vehicle networks were elaborated,several cyber-attacks against connected-automated vehicle (CAV) were pointed out,the available defense measures against these attacks were addressed.The advantages and disadvantages of these measures were summarized.Finally,possible defense measures and directions in the future were discussed to further ensure the security of CAV.

    Expressway 5G-V2X:technology,solution and application
    Dongsheng WU,Chuanqi WANG,Wei JIN,Fengna LI
    2020, 36(4):  46-52.  doi:10.11959/j.issn.1000-0801.2020132
    Asbtract ( 485 )   HTML ( 40)   PDF (1429KB) ( 1223 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    5G-V2X is widely used in the fields of automatic driving,intelligent transportation and smart city.Expressway is one of the typical traffic scenes.The technology,solution and application of 5G-V2X in the expressway scene was explored.Through the construction of “perception,communication and computing” three technical capabilities,the scheme of expressway 5G-V2X was proposed.At last,the typical applications such as the application of expressway logistics and the application of expressway congestion control were introduced.

    Key technology and application of intelligent connected patrol vehicles for security scenario
    Yuchao LIU,Ziyue LI
    2020, 36(4):  53-60.  doi:10.11959/j.issn.1000-0801.2020133
    Asbtract ( 214 )   HTML ( 15)   PDF (1243KB) ( 524 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Practical applications combined with industry scene is a common problem in the present artificial intelligence technology.Facing the security application scenario,the practice landing of unmanned technology -- intelligent connected patrol vehicle was studied.Integrating different sensors such as camera,LiDAR,inertial navigation system (INS),etc,the awareness system can accurately identify the platform itself,road conditions and target behavior using key technology such as artificial intelligence (AI),data fusion.Combining human intelligence (HI) in scene cognition of human experience and artificial intelligence (AI) in cognition of computing,a hybrid intelligent cognitive system using to security scene was built.Based on human in the loop system architecture and technology such as 5G ,vehicle to everything (V2X),edge computing,etc,different interactions between human ,machine and environment were designed,which ensured the safe and reliable operation of the system and increased the work efficiency by a wide margin.

    Intelligent collaborative management technology of virtual resources based on internet of vehicles remote driving
    Xinyu PENG,Yang ZHOU,Zhenjiang DONG
    2020, 36(4):  61-68.  doi:10.11959/j.issn.1000-0801.2020123
    Asbtract ( 270 )   HTML ( 13)   PDF (1198KB) ( 588 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Starting from the application scenario of internet of vehicles remote driving,the specific requirements of remote driving for network communication were analyzed.The technical analysis scheme was put forward systematically.First of all,mobile edge computing technology was introduced on the terminal side to provide,low latency,large bandwidth and high reliability edge computing services.Secondly,virtual resource cooperative scheduling and intelligent fault prediction technology were analyzed on the network side,to complete the global management of network resources for remote driving.Finally,the related technologies of the intelligent vehicle integrated control service and SDN cloud control center were analyzed on the platform side,so that the intelligent application of remote driving vehicle was realized.

    Research on the construction and operation mode of urban cellular vehicle to everything
    Zhenting CHANG,Zhendong XIE,Zhiguo DONG
    2020, 36(4):  69-73.  doi:10.11959/j.issn.1000-0801.2020125
    Asbtract ( 212 )   HTML ( 22)   PDF (600KB) ( 406 )   Knowledge map   
    References | Related Articles | Metrics

    With the support of national policies,cities are actively promoting the development of cellular vehicle to everything industry.Combined with the actual situation of cellular vehicle to everything industry and the development of “one city,one network and one platform” in the future,the main participants,construction and operation contents that affect the project were analyzed,various construction and operation modes of cellular vehicle to everything project were summarized and analyzed,and the next development was prospected.

    Research and Development
    Accuracy analysis on access hyper-point real-time detection algorithms in high-speed network
    Haiqing YU,Wei DING,Jie XU
    2020, 36(4):  74-82.  doi:10.11959/j.issn.1000-0801.2020117
    Asbtract ( 159 )   HTML ( 7)   PDF (1390KB) ( 378 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Real-time access hyper-point helps managers better control the network.Under high-speed network conditions,the difficulty in accessing hyper-point detection lies in the pressure exerted by large traffic on computing.Based on the 40 Gbit/s bandwidth network environment,from the perspective of accuracy analysis,the flow record statistics algorithm and the estimation-based superpoint detection algorithm were compared.The flow record statistical algorithm was improved by the threshold model based on heavy-tailed distribution.The estimation-based superpoint detection algorithm was implemented in the GPU environment by SRLA.The research results show that the estimation-based hyper-point detection algorithm which has obviously higher accuracy and more room for improvement is more suitable for real-time detection of hyper-point in high-speed network than the flow record statistical algorithm.

    BP neural network based Doppler frequency offset estimation method for 5G high-speed mobile system
    Zenghao WANG,Lihua YANG,Lu CHENG,Jie ZHANG,Yan LIANG
    2020, 36(4):  83-90.  doi:10.11959/j.issn.1000-0801.2020124
    Asbtract ( 283 )   HTML ( 11)   PDF (844KB) ( 451 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A BP neural network based Doppler frequency offset estimation method was proposed.The proposed method was mainly divided into two stages:offline training and online estimation.Firstly,the training samples were constructed by using random Doppler frequency offset and received pilot signals,and then the training samples were used to train the BP neural network offline,which could complete the mapping relationship between input and output data.Then,based on the trained network,the received pilot signal was used to estimate the Doppler frequency offset online.Simulation results show that the performance of the proposed method is far superior to the existing method,and it has low computational complexity.

    A mutual and anonymous heterogeneous signcryption scheme between PKI and IBC
    Huifang JI,Liandong LIU,Yanyan HUANG,Qingfeng CHENG
    2020, 36(4):  91-98.  doi:10.11959/j.issn.1000-0801.2020120
    Asbtract ( 169 )   HTML ( 10)   PDF (661KB) ( 407 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Anonymous heterogeneous signcryption scheme can not only transfer data confidentially for users in heterogeneous cryptographic environment,but also provide privacy protection for users of both sending and receiving sides.The security of an anonymous heterogeneous signcryption scheme was analyzed and that it did not satisfy confidentiality and anonymity was pointed out.A new MAHSC (mutual and anonymous heterogeneous signcryption) scheme was proposed.It was analyzed that its security satisfied the confidentiality of messages,the unforgeability of signatures and the anonymity of sender’s identity.The results of efficiency and security analysis show that the proposed scheme is feasible.

    Low-complexity massive MIMO channel estimation for mmWave systems via matrix completion
    Jiafeng QIU
    2020, 36(4):  99-106.  doi:10.11959/j.issn.1000-0801.2020051
    Asbtract ( 257 )   HTML ( 14)   PDF (695KB) ( 400 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Due to the high computational complexity of mmWave massive MIMO systems realizing reliable channel estimation,a low-complexity mmWave beamspace channel estimation algorithm was proposed utilizing the inherent low-rank of the mmWave channel.The proposed algorithm jointly exploited the channel sparsity in the beamspace domain and its low-rank property in the antenna domain to provide more accurate recovery,especially for shorter training intervals.By regarding the channel estimation as matrix completion problem,the proposed algorithm was based on the alternating direction method of multipliers with fast convergence properties and exploited fast randomized singular value thresholding to significantly reduce the corresponding complexity.The simulation result shows that the proposed algorithm can achieve satisfactory channel estimation performance while maintaining low complexity.

    RWA algorithm based on cost of photoelectric conversion device
    Daoyun HU,Zhentai YANG,Qianchun LU,Jin QI
    2020, 36(4):  107-114.  doi:10.11959/j.issn.1000-0801.2020116
    Asbtract ( 150 )   HTML ( 7)   PDF (832KB) ( 412 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Over the past decade,carrier operator implement fine-grained traffic scheduling in optical transport network(OTN) by deploying optical-electric conversion(OEO) devices on ROADM,which can improve the spectrum utilization.However,OEO device is very expensive,which will increase the CAPEX and OPEX of carrier operator.A problem about traffic scheduling and the deployment of OEO devices in OTN was proposed.Then,the ILP model of this problem was built and it was proved NP-hard.Additionally,two novel algorithms named OEO-RWA and SA-RWA were proposed.At last,these algorithms were demonstrated can not only ensure flexibility of traffic scheduling,but also can reduce the number of OEO device through simulation.

    A survey of efficient deep neural network
    Rui MIN
    2020, 36(4):  115-124.  doi:10.11959/j.issn.1000-0801.2020119
    Asbtract ( 534 )   HTML ( 71)   PDF (715KB) ( 671 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Recently,deep neural network (DNN) has achieved great success in the field of AI such as computer vision and natural language processing.Thanks to a deeper and larger network structure,DNN’s performance is rapidly increasing.However,deeper and lager deep neural networks require huge computational and memory resources.In some resource-constrained scenarios,it is difficult to deploy large neural network models.How to design a lightweight and efficient deep neural network to accelerate its running speed on embedded devices is a great research hotspot for advancing deep neural network technology.The research methods and work of representative high-efficiency deep neural networks in recent years were reviewed and summarized,including parameter pruning,model quantification,knowledge distillation,network search and quantification.Also,vadvantages and disadvantages of different methods as well as applicable scenarios were analyzed,and the future development trend of efficient neural network design was forecasted.

    Operation Technology
    Key technology of data center network for cloud network convergence
    Jianglong WANG,Bo LEI,Yunpeng XIE,Qi HE,Yunhe LI
    2020, 36(4):  125-135.  doi:10.11959/j.issn.1000-0801.2020118
    Asbtract ( 649 )   HTML ( 101)   PDF (2743KB) ( 1174 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    “New infrastructure” brings new opportunities for the development of data centers.Data center has become an important part of the operator’s cloud-network convergence infrastructure,providing a strong technical foundation for innovative applications in the 5G + AI era.The new requirements of the data center network in the cloud network convergence background were analyzed.The key technologies in ultra-large-scale networking,ultra-low latency lossless network,and unified service end-to-end bearer were given.Finally,a large-scale cloud data center networking solution were presented,and the key technologies were verified.

    Construction of operation and maintenance management platform based on internet plus
    Zhen YANG,Yanning CAO
    2020, 36(4):  136-144.  doi:10.11959/j.issn.1000-0801.2020131
    Asbtract ( 171 )   HTML ( 15)   PDF (758KB) ( 366 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    At present,the application of E-government in China is getting more and more widespread.With the gradual increase of running online for business systems,the focus of technical support enterprises will shift their phases from system constructions to the operation and maintenance with the main features of deepening applications and improving response and disposal capabilities.In the new era,face boundary migration,weak early warning,complex troubleshooting,employee turnover and funds cutting etc.in system management,combined with the practice of the operation,several suggestions were put forward for the construction of “internet + operation & maintenance” management platform in terms of such aspect as connection,innovation,openness and feedback of internet ,so as to further improve services level and efficiency for government affairs system.

    Research and application of media streams based on entropy and FAHP
    Qizhu ZHONG
    2020, 36(4):  145-153.  doi:10.11959/j.issn.1000-0801.2020027
    Asbtract ( 118 )   HTML ( 3)   PDF (675KB) ( 334 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Aiming at the problem of end-to-end user perception evaluation method for mobile internet media streams was still vacant,a method based on entropy and fuzzy hierarchy was proposed to evaluate media streams.Firstly,XDR data indicators were processed by box-line graph method.Then,entropy method and fuzzy hierarchy method were used to revise the evaluation.The whole network process of the whole video service was modified from multi-dimension to realize the perception evaluation of the use of mobile internet video users.At the same time,the end-to-end health evaluation of the network was also realized.The results of a series of simulation experiments show that the proposed method can improve the accuracy of media stream evaluation while avoiding one-sided evaluation of a single index.It provids a method and solution for the optimization of the overall internet quality and multi-dimensional network fault location.

    Prototype development and demonstration of unified management-control system of access-type OTN
    Ruiquan JING,Guoyong ZHAO,Yunbin XU,Xiaoli HUO
    2020, 36(4):  154-160.  doi:10.11959/j.issn.1000-0801.2020030
    Asbtract ( 297 )   HTML ( 23)   PDF (1296KB) ( 447 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The decoupling of client-side OTN and network-side OTN equipment is a prerequisite for improving OTN networking flexibility and reducing the cost.Based on the concept of the management-control continuum (MCC),a unified management-control system architecture for access-type OTN equipment was proposed,including the management-control interface and GCC interoperability specification,and auto-discovery process.A unified management-control system (UMS) of the access-type OTN equipment was developed to realize the unified management and control of multi-vendor equipments.

    Operation support system of power communication network based on cloud platform
    Zhimin YANG,Danke HONG,Li WANG,Junyi XIE
    2020, 36(4):  161-169.  doi:10.11959/j.issn.1000-0801.2020057
    Asbtract ( 153 )   HTML ( 10)   PDF (1293KB) ( 422 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Electric power communication network operation support system is a technical support system for daily dispatching and operation of communication network.Its safe and reliable operation is very important for the safe operation of communication network.A high availability architecture of power communication network operation support system based on cloud platform was presented,and its practice in power enterprises was introduced.Finally,the system high availability evaluation model and simulation results were given.The results show that the system architecture significantly improves the reliability of the system.

    Improvement of SRv6 SID structure
    Yonglin TANG,Feng LIU
    2020, 36(4):  170-174.  doi:10.11959/j.issn.1000-0801.2020121
    Asbtract ( 267 )   HTML ( 11)   PDF (3336KB) ( 440 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    IPv6-based segment routing (SRv6) is a new technology addressed by IETF in recent years.In draft-ietf-spring-srv6-network-programming,the 128-bit segment identifier (SID) was structured,and how to be processed in one node was described.The SID structure defined by the draft was improved.A field named “network”was defined in the SID to identify different virtual sub-networks.It was also pointed out that the SID list in the segment routing header (SRH) did not carry the “Network”,and only carried the locator,function and argument,which could effectively reduce the requirements of the multi-layer SRv6 segment identifier list requirements on the chip processing capability and reduce the overhead in SRv6 networks.To improve the effective utilization of network bandwidth,and at the same time lay a solid foundation for the use of SRv6 network slicing,and promote the large-scale use of SRv6.

Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Posts and Telecom Press Co., Ltd.
Publisher: Beijing Xintong Media Co., Ltd.
Editor-in-Chief: Chen Shanzhi
Editorial Director: Li Caishan
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Postal Code: 100079
Tel: 010-53879277
        010-53879278
        010-53879279
E-mail: dxkx@ptpress.com.cn
Mailing Code: 2-397
ISSN 1000-0801
CN 11-2103/TN
Visited
Total visitors:
Visitors of today:
Now online: