Please wait a minute...

Current Issue

    20 December 2020, Volume 36 Issue 12
    Viewpoint Focus
    Overview and prospect of 5G security
    Zhiqiang YANG,Li SU,Minpeng QI,Bo YANG
    2020, 36(12):  1-19.  doi:10.11959/j.issn.1000-0801.2020317
    Asbtract ( 938 )   HTML ( 95)   PDF (1233KB) ( 1305 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    From 4G to 5G,as the result of network evolution and service promotion,the concepts and principles of security in design were deeply integrated,the security capabilities were enhanced.The root of 5G security design-building secure networks and services in the open environment were analyzed.Furthermore,according to the understanding of the 5G security specifications designed by 3GPP,ITU and GSMA,the security framework and these new technologies were analyzed in detail from three aspects:network security assurance,service security capabilities and security assessment methodologies.The overview of 5G security trends and the key works in the long run were summarized.

    Research and Development
    Learning attribute network algorithm based on high-order similarity
    Shaoqing WU,Yihong DONG,Xiong WANG,Yan CAO,Yu XIN
    2020, 36(12):  20-32.  doi:10.11959/j.issn.1000-0801.2020309
    Asbtract ( 228 )   HTML ( 27)   PDF (857KB) ( 470 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Due to the lack of deep-level information mining and utilization in the existing network representation learning methods,the potential pattern structure similarity was proposed by further exploring the potential information in the network.The similarity score between network structures was defined to measure the similarity between various structures so that nodes could cross irrelevant vertices to obtain high-order similarities on the global structure.In order to achieve the best effect,deep learning was used to fuse multiple information sources to participate in training together to make up for the deficiency of random walks.In the experiment,Lap,DeepWalk,TADW,SDNE and CANE were selected as comparison methods,and three real-world networks were used as data sets to verify the validity of the model,and experiments of node classification and link reconstruction are carried out.In the node classification,the average performance is improved by 1.7 percentage points for different datasets and training proportions.In the link reconstruction experiment,only half the dimension is needed to achieve better performance.Finally,the performance improvement of the model under different network depths was discussed.By increasing the depth of the model,the average performance of node classification increased by 1.1 percentage points.

    Dual threshold cooperative spectrum sensing algorithm based on stochastic resonance
    Shunlan LIU, Yide XIAO, Jianrong BAO
    2020, 36(12):  33-40.  doi:10.11959/j.issn.1000-0801.2020248
    Asbtract ( 187 )   HTML ( 22)   PDF (452KB) ( 262 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In view of the poor performance of the existing spectrum sensing algorithm in the low signal-noise ratio (SNR) environment and the limitations of traditional stochastic resonance (SR) detection methods for weak signals in practical applications,a dual threshold cooperative spectrum sensing algorithm based on stochastic resonance (DCSSR) by setting the optimal threshold was proposed and the optimal number of cooperative users was calculated.At last,the performance of the proposed algorithm was analyzed.This algorithm further improves the detection performance of the spectrum sensing algorithm under low signal-to-noise ratio by passing the statistical data located in the double-threshold uncertain region through a stochastic resonance system.Simulation results show that the detection performance of DCSSR algorithm is improved compared with traditional single threshold energy cooperation algorithm,double threshold energy cooperation algorithm and single threshold stochastic resonance cooperation algorithm.When the SNR is -20 dB,the proposed DCSSR algorithm improves the detection probability by 80% compared with the traditional single threshold energy detection cooperation algorithm.

    Research and Development
    Technical research of a new type of optical fibre with ultra-low-loss and large effective area
    Di HAN,Hua XIAO,Yuan ZHONG,Xuegang LAO,Chao HAN
    2020, 36(12):  41-48.  doi:10.11959/j.issn.1000-0801.2020312
    Asbtract ( 181 )   HTML ( 22)   PDF (857KB) ( 286 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The technical solutions of double-cladding waveguide structure and pure SiO2core were taken,the G.654.E type ULA-130 fibre ultra-low-loss and large effective area was realized by F-doping design and optimization of the viscosity match between core and caldding.Then the study on various optical characteristics of the ULA-130 fibre was carried out,utilizing self-built optical fibre nonlinear coefficient measurement system and self-designed optical fibre macro-bending loss winding device,as well as the avaliable techniques.The attenuation coefficient,effective area and nonlinear coefficient at 1 550 nm of the ULA-130 fibre was 0.159 dB/km,133 μm2and 1.67×10-10W-1separately.According to the theoretical calculation and technical analysis,the ULA-130 fibre posseses excellent attenuation and nonlinear performance,which is applicable in high capacity,high bitrate and long-range optical backbone network system.Compared to conventional G.652.D fibre,the ULA-130 fibre could improve the optical singal-noise ration and the performance of transmission system dramatically.

    Research on the driving force model of internet public opinion based on system dynamics
    Feng CAO,Zhenji ZHANG,Xiaolan GUAN
    2020, 36(12):  49-58.  doi:10.11959/j.issn.1000-0801.2020322
    Asbtract ( 428 )   HTML ( 29)   PDF (910KB) ( 334 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Internet public opinion,as a reflection of social public opinion in the internet space,in turn affects the development process of social entity events.Improving the ability to deal with online public opinion has become an important task for party committees and government departments at all levels.The rules and characteristics of the spread of online public opinion were analyzed,system dynamics was used to analyze the driving factors of the ecological spread of online public opinion,the relationship between factors was analyzed through causal loop diagrams,and a model of the driving force of online public opinion was established.Finally,the model was simulated and analyzed,in order to put forward suggestions for actively managing the spread of online public opinion.

    Requirement and challenge of holographic-type communication to the future network
    Xiaozhi YUAN,Li PENG,Linfeng ZHANG
    2020, 36(12):  59-64.  doi:10.11959/j.issn.1000-0801.2020307
    Asbtract ( 630 )   HTML ( 51)   PDF (629KB) ( 683 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the acceleration of 5G global commercial deployment process,various emerging immersive network applications represented by holographic communication have put forward significant requirements and tests on the structure and capability of the existing network architecture.The wide application of holographic communication services in many fields was introduced,and the current situation was analyzed that 5G network can not meet the rapid development needs of holographic immersion applications.The performance requirements of holographic communication applications in bandwidth,delay,computing power,synchronization,quality of service,reliability,security and other aspects of the future network performance were analyzed.The application scenarios and key technologies of holographic communication were summarized.Through the investigation and analysis of the possible evolution routes of the future network,the direction of the future network evolution and development was pointed out.

    An adaptive video stream transmission control method for wireless heterogeneous networks based on A3C
    Zhiqiang LUO,Wei WANG,Xiaorong ZHU
    2020, 36(12):  65-76.  doi:10.11959/j.issn.1000-0801.2020308
    Asbtract ( 231 )   HTML ( 19)   PDF (961KB) ( 384 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The adaptive bit rate (ABR) algorithm has become the focus research in video transmission.However,due to the characteristics of 5G wireless heterogeneous networks,such as large fluctuation of channel bandwidth and obvious differences between different networks,the adaptive video stream transmission with multi-terminal cooperation was faced with great challenges.An adaptive video stream transmission control method based on deep reinforcement learning was proposed.First of all,a video stream dynamic programming model was established to jointly optimize the transmission rate and diversion strategy.Since the solution of this optimization problem depended on accurate channel estimation,dynamically changing channel state was difficult to achieve.Therefore,the dynamic programming problem was improved to reinforcement learning task,and the A3C algorithm was used to dynamically determine the video bit rate and diversion strategy.Finally,the simulation was carried out according to the measured network data,and compared with the traditional optimization method,the method proposed better improved the user QoE.

    Topic:Cloud Native Technology
    Kubernetes based converged cloud native infrastructure solution and key technologies
    Zhenwei HE,Danchi HUANG,Liyun YAN,Yuanzhi LIN,Xinzhang YANG
    2020, 36(12):  77-88.  doi:10.11959/j.issn.1000-0801.2020314
    Asbtract ( 768 )   HTML ( 120)   PDF (876KB) ( 6200 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With a wide range of applications in IT domain and CT domain of cloud native technology,cloud native infrastructure is becoming the next generation of cloud infrastructure.The mainstream technology system and its limitations of cloud native infrastructure were analyzed,a lightweight converged cloud native infrastructure and its management scheme based on kubernetes was proposed,and the key technologies and application scenarios of converged cloud native infrastructure were discussed.

    Cloud native based lightweight 5GC product and key technologies
    Changyi CHEN,Gang LU,Lisha ZHOU,Zeyuan HUANG,Zhuangzhan MA
    2020, 36(12):  89-95.  doi:10.11959/j.issn.1000-0801.2020318
    Asbtract ( 606 )   HTML ( 33)   PDF (781KB) ( 790 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the development of 5G,the 5G private network enables the industry and shows great market opportunities.Lightweight 5G core products based on cloud native are the most important components of the 5GC private network.Lightweight 5G core products,using cloud native technology for design and development deployment,can maximize the realization of Agile development,rapid deployment,customized resources and flexible service innovation of lightweight 5G core.The product definition,requirement,application and industry were analyzed.And key technologies were analyzed,including lightweight framework,lightweight operation,multi-protocol access and high availability disaster recovery technology.

    Cloud native approach of agile cloud-network converged application delivery
    Yong CHEN,Wensheng YAO,Jingxiang CHEN,Huan LIANG,Jing LI
    2020, 36(12):  96-104.  doi:10.11959/j.issn.1000-0801.2020319
    Asbtract ( 310 )   HTML ( 29)   PDF (881KB) ( 654 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    ion:Cloud-network convergence is the strategy many telecom operators are implementing for the new information infrastructure,as the technicalbasis cloud native technology prompts the capability integration and business innovation.Leveraging the cloud native DevOps tool-chain and methodology becomes the mainstream in cloud application,for agile delivery of high-quality service and bringing the business value.Principles and solutions of leveraging DevOps in cloud-network converged application were given in three aspects:agile process adoption,key technology and DevOps platform establishment,from the view point of telecom operator.Case study of DevOps platform inproduction environment was presented in the end.

    Cloud native intelligent operation and maintenance technology
    Long XUE,Gang LU,Qi ZHOU,Huiyan ZHANG,Tingjun WAN
    2020, 36(12):  105-112.  doi:10.11959/j.issn.1000-0801.2020320
    Asbtract ( 575 )   HTML ( 51)   PDF (1046KB) ( 629 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Relying on the advantages of simple and fast applications,easy deployment of applications,and on-demand scaling of running applications,cloud native technology has been rapidly promoted.However,with the application of cloud native,the system architecture has become more complex and the scale of resources has become larger,and there is an urgent need for more intelligent operation and maintenance.Using intelligent operation and maintenance can better assist cloud-native application development,reduce operation and maintenance costs,and improve service quality.The application scenarios,key points,classic practices and existing problems of intelligent operation and maintenance were analyzed,and a cloud-native intelligent operation and maintenance architecture were proposed,and the main principles of the three scenarios:the trend prediction,data anomaly detection and fault location diagnosing in the core service algorithm platform were introduced in detail,and finally the future of intelligent operation and maintenance were looked forward.

    DevOps implementation method and practice in software development outsourcing scenarios
    Baozhong WANG,Wensheng YAO,Huan LIANG,Hongming QIAO,Yong CHEN
    2020, 36(12):  113-122.  doi:10.11959/j.issn.1000-0801.2020321
    Asbtract ( 355 )   HTML ( 37)   PDF (716KB) ( 415 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The current DevOps implementation research mainly focuses on the scenario of collaboration among different teams within the same company.The DevOps implementation issues in the development outsourcing scenario for the first time were clearly put forward,the significance of implementing DevOps under the outsourcing scenario was summarized,the difficulties of implementation DevOps in the outsourcing scenario were analyzed,where the development and operation teams belong to two different enterprises of Party A and Party B,and the method of iterative implementation of DevOps was proposed,how to select an appropriate entry point for optimization and improvement was explained,and an explanation of the practical application of this method was given.

    Topic:Application and Terminal Security
    Application protection in 5G cloud network using zero trust architecture
    Guofeng HE
    2020, 36(12):  123-132.  doi:10.11959/j.issn.1000-0801.2020325
    Asbtract ( 470 )   HTML ( 40)   PDF (1300KB) ( 840 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Based on the analysis of security requirements in the era of 5G cloud-network convergence,the basic principles of zero trust were studied,including not rely on location,untrusted traffic,and dynamic access control.The basic architecture of zero-trust was studied,combining with 5G cloud network architecture,the feasible application protection solutions include the customer-built OTT model,the use of the existing VPDN model,and the public zero-trust architecture model was proposed and compared.The application scenarios of customers in 5G cloud network were analyzed,including remote access,secure cloud,mobile office,etc.In these scenarios,the value that zero-trust architecture can bring to customers was proposed,such as application hiding and dynamic control,ensure the application safety.

    Adaptive security architecture defense platform based on software defined security
    Mengyao LU,Hongyu TANG,Wei TANG,Jian ZHANG
    2020, 36(12):  133-138.  doi:10.11959/j.issn.1000-0801.2020315
    Asbtract ( 199 )   HTML ( 25)   PDF (876KB) ( 298 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Based on continuous monitoring and retrospective analysis,adaptive security architecture was constructed to be security defense system integrating prevention,detection,response and prediction,which possesses intelligent and elastic defense ability concerning about advanced directive attacks.An essential implementable adaptive security defense platform was therefore introduced and applied correspondingly according to a thorough research of adaptive security architecture and software defined security,combined with internet security environment.Besides,website application security issues were also analyzed.

    Security of the deployment of SDN-based IoT using blockchain
    Ping XIE,Xiaosong LIU
    2020, 36(12):  139-146.  doi:10.11959/j.issn.1000-0801.2020323
    Asbtract ( 396 )   HTML ( 56)   PDF (1029KB) ( 258 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Compared with the traditional internet,the SDN-based internet of things (IoT) has a wider coverage,more connected devices,more complex data transmission.There are many security technical challenges.The security challenges of SDN-based IoT deployment were firstly analyzed,and then the advantages of blockchain technology in solving those security issues were introduced.Finally,to add a blockchain-based security layer was proposed,which acted as a security gateway,data entering the IoT was verified accurately one time.Each security gateway was added to the blockchain system as an equal blockchain node,combined with the traceability and non-tampering of the blockchain system,the security performance and efficiency of SDN-based IoT deployments was improved.

    Research and practice of mobile application lifecycle management platform
    Ming YIN,Lin LI
    2020, 36(12):  147-154.  doi:10.11959/j.issn.1000-0801.2020316
    Asbtract ( 240 )   HTML ( 29)   PDF (1002KB) ( 438 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    According to the development status of various security services for mobile applications,the mainstream mobile application security detection and monitoring technology was studied.Based on the concept of full life cycle management in software industry,a variety of security concepts and security technologies were reasonably integrated into each stage of the whole life cycle of mobile applications.Based on this,a mobile application lifecycle management platform with comprehensive security functions and multi system cooperation was designed and constructed.

    Causes and optimization of the false alarm rate of code review system
    Yuanying XIAO,Yaodong YOU,Lixi XIANG
    2020, 36(12):  155-162.  doi:10.11959/j.issn.1000-0801.2020324
    Asbtract ( 250 )   HTML ( 18)   PDF (837KB) ( 451 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Code review technology has become a pivotal part in the construction of network security.Analysis of the test reports obtained by the current code auditing system shows that there are many false positives in the report.The shortcomings in the development of the code audit system were summarized,the principles of different detection algorithms were briefly described,the causes of false alarm rates were analyzed,corresponding optimization ideas were proposed,the technical principles of optimization were explained,and the application scenarios of optimization schemes were described.

Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Posts and Telecom Press Co., Ltd.
Publisher: Beijing Xintong Media Co., Ltd.
Editor-in-Chief: Chen Shanzhi
Editorial Director: Li Caishan
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Postal Code: 100079
Tel: 010-53879277
        010-53879278
        010-53879279
E-mail: dxkx@ptpress.com.cn
Mailing Code: 2-397
ISSN 1000-0801
CN 11-2103/TN
Visited
Total visitors:
Visitors of today:
Now online: