Please wait a minute...

Current Issue

    23 July 2015, Volume 31 Issue 6
    Topics: Information Security
    Research on Security of Virtualization on Cloud Computing
    Xiaodi Wang,Yunyong Zhang,Di Liu,Ni Zhang,Yiming Yu
    2015, 31(6):  1-5.  doi:10.11959/j.issn.1000-0801.2015154
    Asbtract ( 449 )   HTML ( 11)   PDF (3719KB) ( 1737 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In recent years,followed by developing and popularizing of cloud computing service,the security problems appear. One of the problems,virtualization security,draws most attention of cloud services providers and security manufacturers. The main security threats of cloud computing virtualization environment were combed and cloud computing virtualization security technology architecture which contains virtualization security technology framework based on KVM and virtualization centralized management and control platform was proposed. Also WoCloud security management platform prototype system was developed according to technical architecture,and theoretical verification for cloud computing virtualization security technology architecture was carried out.

    Research on“Wo Connect”Uniform Authentication Technology
    Di Liu,Yunyong Zhang,Ni Zhang,Manjun Zhang
    2015, 31(6):  6-11.  doi:10.11959/j.issn.1000-0801.2015156
    Asbtract ( 420 )   HTML ( 6)   PDF (1948KB) ( 439 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Recently,many web user data leak incidents outbreak. In order to protect web user personal information,an analysis was made on security threats for web user,emphasizing security requirements. And a web-based strong authentication scheme,“Wo Connect”uniform authentication solution,was proposed. Based on user mobile phone number identifier,this solution provides the third party website uniform security authentication ability,enabling user to enjoy security and convenience authentication and authorization user experience.

    Research on SIM Card-Based Mobile Digital Signature and Authentication for Financial Services
    Bo Hu,Binfeng Yan,Jianshu Qiu,Shuanghe Dong
    2015, 31(6):  12-17.  doi:10.11959/j.issn.1000-0801.2015157
    Asbtract ( 329 )   HTML ( 6)   PDF (2056KB) ( 572 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the development of smart phones and mobile internet,it is a trend that leveraging mobile devices to perform user authentication for cross industry application,such as electric bank. Traditional USB key based digital signature and authentication has been replaced by authentication based on mobile devices. Requirements for mobile digital signature and authentication method based on smart phones and SIM card were analyzed,architecture and service procedures for SIM card-based mobile digital signature and authentication were proposed.

    Link Failure Recovery Based on SDN
    Le Hou,Shuo Wang,Yikai Lin,Botao Yao,Jiang Liu
    2015, 31(6):  18-23.  doi:10.11959/j.issn.1000-0801.2015158
    Asbtract ( 489 )   HTML ( 15)   PDF (4014KB) ( 665 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    As part of network security,network disaster backup and recovery has been a focus,and traditional network lacks of automation failure detection and recovery too1. SDN broke the traditional network design idea,the separation of control plane and data plane was realized,and the network of programmable ability was opened. Based on SDN,automatic network fault recovery and detection has become a possibility. A link failure detection and automatic recovery program based on SDN was designed. The entire network topology could be obtained,and network link state could be monitored through link discovery protoco1. Through the centralized management and control features of SDN,fast detection and link failure recovery were achieved.

    Video Fingerprint Management System:Exploration and Practice on Video Content Security Protection
    Yufeng Li,Shoulian Qian,Julong Lan,Xiaoqiang Guo,Bo Chen
    2015, 31(6):  24-31.  doi:10.11959/j.issn.1000-0801.2015148
    Asbtract ( 331 )   HTML ( 4)   PDF (2739KB) ( 668 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Increasingly serious network security situation has made video website,broadcasting network and other video sending systems become more and more vulnerable to network attack. The video fingerprint management system which could protect video security on transmit line in real time was proposed. The system can locate on the entrance line of the video website and broadcasting network,run independently and stand guard its entryway to ensure that no illegal video can be send into the network even though the sending systems be hacked. Moreover,the system can locate on carrying network line and provide solutions for supervision of video fragmentation under multiple-screen fusion situation and copyright protection on transmit line in real time.

    Broadcasting Bidirectional Access Network Intrusion Detection System Facing Tri-Networks Integration
    Han Qiu,Julong Lan,Yangfeng Ou,Chuanhao Zhang,Yanhong Wang
    2015, 31(6):  32-38.  doi:10.11959/j.issn.1000-0801.2015149
    Asbtract ( 326 )   HTML ( 5)   PDF (1992KB) ( 464 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    China’s broadcasting bidirectional access network now rarely takes effective measures to protect its boarder safety. In view of this situation,a network intrusion detection system for the border safety was proposed and an example product called SunGnet703 was given. The system can detect network attacks passing through the border in real time with four notable features,non-aided deployment,high reliable operation,not able to be detected to ensure its own safety and fu11 data collection,and hopefully it can give a simple and easy-to-accomplish solution to protect the border safety.

    research and development
    Coalition Formation Games for Bandwidth Sharing in VANET
    Qixin Zhang,Tao Yang,Hui Feng,Bo Hu
    2015, 31(6):  47-53.  doi:10.11959/j.issn.1000-0801.2015150
    Asbtract ( 354 )   HTML ( 3)   PDF (1733KB) ( 546 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    There has been significant interest and development in vehicular Ad Hoc network(VANET)during the last several years. An aggregated networking architecture using Wi-Fi,WiMAX and 3G/LTE technologies was proposed. In this architecture,a proper way was chosen by vehicles to achieve 1ow-cost network access. This model used a coalition formation game for bandwidth sharing among vehicles,where each can take an individual decision to join or leave a coalition,depending on its utility. It was showed that the vehicles could self-organize into a Nash-stable partition and adapt this partition to environmental changes. Simulation results show that,this approach works efficiently in bandwidth sharing in VANET compared to optimal partition.

    RESEARCH AND DEVELOPMENT
    Dynamic modulation recognition in ACM process under rainfall environment
    Wang Chuang, Zhang Genxin,Xie Zhidong
    2015, 31(6):  2015155.  doi:10.11959/j.issn.1000-0801.2015155
    Asbtract ( 242 )   PDF (3456KB) ( 203 )   Knowledge map   
    References | Related Articles | Metrics
    The modulation recognition of satellite communication signal plays a significant role in non-cooperative communication. Aiming at the issue of modulation recognition in a rainfall environment, a model of the rainfall environment was built and then blind modulation recognition was studied in this environment. When building model, effect of antenna noise temperature caused by the rain attenuation was taken into account. To recognizes four modulation adopted by DVB-S2 standard, the algorithm based on higher-order cumulant was used. The results show that correct rates of modulation recognition change little according to different rainfall environment and the recognition accuracy is relatively high, quantitatively more than 90%.
    research and development
    A Polymorphic Routing Derivation Mechanism Based on Markov Decision Process
    Yan Zhang,Julong Lan,Peng Wang,Yuxiang Hu
    2015, 31(6):  54-60.  doi:10.11959/j.issn.1000-0801.2015115
    Asbtract ( 263 )   HTML ( 5)   PDF (2142KB) ( 505 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Based on routing structure of self-organization and self-regulation to provide personalized routing service for the diverse business requirements,polymorphic routing mechanism provides an effective solution to meet the current and future business which needs diverse routing services. Considering the memoryless and sequential decision-making features of the polymorphic derivation process,it was modeled as a Markov decision process,and a polymorphic derivation method based on the enhanced learning was put forward.The experimental results show that the polymorphic derivation method can flexibly and effectively construct the diverse routing services for polymorphic routing mechanism.

    KMOBPSO-Based High Reliability Controller Placement Algorithm in SDN
    Jingting Xu,Hua Qu,Jihong Zhao
    2015, 31(6):  61-67.  doi:10.11959/j.issn.1000-0801.2015153
    Asbtract ( 253 )   HTML ( 4)   PDF (1470KB) ( 484 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    N+1 redundancy backup model was applied to controller placement problem in SDN in order to solve single node failure problem and to improve system reliability with taking system cost and latency into consideration,and the problem was abstracted as a multi-objective optimization problem. Meanwhile,an algorithm called KMOBPSO was proposed to calculate the result of high-reliability controller placement in SDN merged with K-means clustering algorithm and genetic operators. Simulations show that the proposed algorithm who has high accuracy,uniform distribution and wide coverage of Pareto front,can significantly improve the reliability of controller placement in SDN.

    Research on Collaborative Recommendation Method Based on Multiple Data Sources of Social Network
    Ruiqin Wang,Jun Pan,Yixiao Li
    2015, 31(6):  68-74.  doi:10.11959/j.issn.1000-0801.2015113
    Asbtract ( 299 )   HTML ( 4)   PDF (1415KB) ( 503 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    As an effective recommendation method,collaborative filtering typically has the data sparsity and cold-start problems. It was proposed that using multiple data sources of social network to overcome the above problems. First of a11,both the rating similarity and the social trust between users were considered to resolve the data sparsity problem. Then a simple and effective trust reasoning method was proposed to identify the implicit trust relationship between users. In order to solve the cold-start problem,information of the category of items and domain experts was used for joint recommendation. Experimental results show that the proposed algorithm has significantly better precision and reca11 than existing methods.

    Research on the Influence of Dust to WCDMA Signal of the Edge of Desert
    Jie Chen,Na Yao
    2015, 31(6):  75-78.  doi:10.11959/j.issn.1000-0801.2015146
    Asbtract ( 247 )   HTML ( 3)   PDF (1407KB) ( 367 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A modified path-loss model for the Alar terrain by taking the effect of dust and sand storm into account was proposed. A dust factor was introduced into the model by curve fitting operation from measured strength of the received signal from a WCDMA base station. The model verification was fulfilled by comparing with the measurement data in the scenario of no dust and performed via MATLAB. Finally,the simulation and comparison were given before and after optimization,which show that the optimized model is much closer to the practical communication channe1. The introduction of dust factor has a great guiding significance to the design and network layout of transmission system for mobile communications network.

    A Network Traffic Classification Method for Class-Imbalanced Data
    Xiaohui Guan,Yaguan Qian
    2015, 31(6):  79-85.  doi:10.11959/j.issn.1000-0801.2015085
    Asbtract ( 253 )   HTML ( 5)   PDF (2208KB) ( 501 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    It is very common that flow distribution of class is not uniform in attack traffic. It wi11 lead to a 1ow classification accuracy in network intrusion detection. For overcoming this class imbalance phenomenon,a pipelining ensemble approach in different feature spaces was proposed,which translates multi-class classification to two-class classification. Based on the pipelining ensemble,it could be further conduct oversampling and customized feature selection for minority class,which may avoid the disturbance from majority class. The experiment result shows that the proposed approach can efficiently improve the accuracy of minority class of attack traffic.

    Wide operation technology
    Research on 4G Mobile Terminal Data Throughput Test
    Liang Kang,Lianbo Song,Long Sun,Hao Duo
    2015, 31(6):  86-91.  doi:10.11959/j.issn.1000-0801.2015140
    Asbtract ( 421 )   HTML ( 7)   PDF (991KB) ( 1047 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Data throughput test of 4G mobile terminal was used to validate whether the data throughput can meet the standard requirements,which has important influence on ensuring the high speed access. Three algorithms of the data throughput test:instrument test,indoor network test,and field test,were introduced. Comparing the test environment,efficiency,problem reproduction and user experience,an introduction of the current status of data throughput test algorithm was given. Furthermore,a trends of the development in the future was presented.

    Research on Key Technologies of Unified Operation Oriented Fixed-Mobile-Convergence Smart Pipe
    Jing Han,Yasong Wang,Xin Sun,Jianquan Wang
    2015, 31(6):  92-97.  doi:10.11959/j.issn.1000-0801.2015125
    Asbtract ( 333 )   HTML ( 7)   PDF (2222KB) ( 432 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to meet the convergence needs of fixed smart pipe and mobile smart pipe,the unified operation oriented fixed-mobile-convergence smart pipe architecture was proposed firstly. Then the evolution of fixed-mobile-convergence smart pipe was analyzed. Finally,key technologies related were described in detail,containing convergence in network capability open platform layer,convergence in control layer,convergence in network layer,convergence of billing,and dynamic policy controlling.

    Construction of DPI Intelligent Network System Based on SDN/NFV
    Jie Pan,Zhuoning Xi,Peng Lin
    2015, 31(6):  1-107.  doi:10.11959/j.issn.1000-0801.2015143
    Asbtract ( 439 )   HTML ( 8)   PDF (1658KB) ( 835 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    DPI devices are widely used in a variety of analysis system of network traffic and business. It is the first step to complete the traffic identification and processing,and has been widely deployed in the network. With the development of DPI technology,the rise of administrative cost and capital cost brought by massive embedded DPI devices is also increasingly prominent. The current situation and existing problems of traditional DPI deployment scenarios were elaborated,and a more advanced intelligent network system and deployment scenarios with DPI software embedded on the basis of SDN/NFV technology were described.

    Topics: Information Security
    Progress and Security Analysis of Quantum Cryptography Communication
    Junsen Lai,Bingbing Wu,Shaohui Li,Wenyu Zhao,Haiyi Zhang
    2015, 31(6):  39-45.  doi:10.11959/j.issn.1000-0801.2015142
    Asbtract ( 518 )   HTML ( 14)   PDF (1325KB) ( 1415 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Quantum cryptography communication,which provided unconditional security by means of quantum key distribution and one-time pad encryption,has become one focus of communication academia and industry. The quantum key distribution protocol,devices,and network architecture were reviewed. The security loopholes and quantum hacking schemes of practical system were analyzed. Corresponding security countermeasures were summarized. Recent progress of measurement-device-independent quantum key distribution was also introduced. In the end,the security challenge,development direction and prospects of quantum cryptography communication were also discussed.

    Wide operation technology
    Research on Migration or Deployment of Telecom Network Management System on Cloud Computing Network
    Afang Song,Lian Lin,Faguang Wang
    2015, 31(6):  103-108.  doi:10.11959/j.issn.1000-0801.2015060
    Asbtract ( 368 )   HTML ( 8)   PDF (769KB) ( 486 )   Knowledge map   
    References | Related Articles | Metrics

    According to the present situation of cloud computing technology and communication network management system,the existing network management system on the server hardware type,storage mode,special peripherals,and disaster recovery aspects of clouding related features were analyzed. Some key problems of system migration or deployment process on cloud computing network were analyzed. The specific method of system resources distribution and calculation,expansion reference coefficients,Oracle database cloud concern points,double disaster recovery system,same city or remote cities disaster recovery systems in cloud solutions were explored. A cloud migration scheme of fully meet or part to meet network management systems was proposed.

    Research on Grid Management Application Based on the Behavior of User——The New Attempt of Channel Centralized Operation and Management
    Liangliang Su,Rui Wang,Lei Lei
    2015, 31(6):  109-115.  doi:10.11959/j.issn.1000-0801.2015131
    Asbtract ( 355 )   HTML ( 3)   PDF (2559KB) ( 1075 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    From the aspect of grid management and system implementation,the key theory and process of grid management were focused on,including grid dividing,methods of user’s behavior indexing etc. It was also demonstrated that the key technologies of how to use GIS to support grid management applications with actual cases,and how those cases effectively support microce11 management and channel centralization.

    Power information column
    Network Virtualization Interconnection Technology
    Sai Ma,Hui Huang,Shijun Xia,Yaohui Jin,Xuan Luo
    2015, 31(6):  116-122.  doi:10.11959/j.issn.1000-0801.2015092
    Asbtract ( 217 )   HTML ( 2)   PDF (1838KB) ( 475 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Industry and the Academia have carried out various kinds of network virtualization technologies to cope with the growing requirement of cloud network. The diversity in network virtualization technologies wi11 lead to the co-existence of various kinds of technologies in cloud environment. However,the differences among network virtualization technologies separate the overa11 network resources into several isolated“islands”. In order to solve the problem,a solution called network virtualization interconnection technology was introduced. The key challenges of realizing the interconnection were discussed,then a novel software defined networking based interconnection architecture Omni-Bridge was proposed. Finally,a prototype of Omni-Bridge was introduced and a functional validation experiment was presented.

    nPower information column
    Data Visualization Design of Real-Time Power Grid Operation State Monitor
    Siqi He,Chunyu Deng,Yupeng Shao,Yueyue Wang
    2015, 31(6):  123-127.  doi:10.11959/j.issn.1000-0801.2015133
    Asbtract ( 366 )   HTML ( 7)   PDF (1768KB) ( 804 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The electricity load data of the urban distribution network from Zhejiang province was chosen as work case. By conducting data visualization design from the prospects of designing psychology and interaction design and sending graphical signal to staff,a solution of monitoring the operation state of power was explored. The solution has the effect of relating the date,depriving information,reducing work complicity and increasing the work efficiency. Furthermore,it is a solution with expansibility and universality.

    Power information column
    Research on Heterogeneous Data Integration in Electric Power Enterprise
    Degang Zhang,Yi Wu,Shaoquan Zhang,Qingjun Peng
    2015, 31(6):  128-131.  doi:10.11959/j.issn.1000-0801.2015135
    Asbtract ( 306 )   HTML ( 3)   PDF (1256KB) ( 409 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Integration of heterogeneous data sources is the necessary method to improve the level of informatization for electric power enterprises. To provide a common data service platform for the massive data mining,analysis,interaction and sharing among different systems,a data exchange and sharing platform of power enterprise was described to provide standardization of data communication format,data storage and related service interfaces,and the enterprise achieves heterogeneous data exchange and sharing by this platform within the enterprise. Applications result shows that the platform integrates heterogeneous data and places a solid foundation for the power enterprise informatization.

    Construction and Application for Operation-BusinessOriented Mobile GIS Service Platform
    Jia Wu,Dan Su,Wang Li,Weiguo Yuan,Rui Yang
    2015, 31(6):  132-136.  doi:10.11959/j.issn.1000-0801.2015063
    Asbtract ( 290 )   HTML ( 3)   PDF (1384KB) ( 545 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Transport inspection services for mobile applications using fu11 text office mode,mobile applications cannot achieve the graphical visualization of GIS management. Therefore,based on geographic information system,GPS and wireless communications technology,a unified mobile GIS application platform was constructed. The platform uses the mobile GIS spatial data security encryption technology,power navigation map engine technology,navigation path analysis techniques. The platform was used to asset management of transport inspection service,equipment inspection,fault repair,defect management. The platform effectively improves the efficiency of mobile operating and the management of transport inspection.

    Research and Application on Communication Resource Management System in Nuclear Power Plants
    Kai Ji
    2015, 31(6):  137-141.  doi:10.11959/j.issn.1000-0801.2015127
    Asbtract ( 269 )   HTML ( 3)   PDF (1870KB) ( 507 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to unify communication resources management of nuclear power plant,ensure the communication network work high reliably,reduce the maintenance cost and increase its work efficiency,the communication resource management system for nuclear power plants was designed and built. Through the management platform,communication system work efficiency was improved,strong support for higher authorities was provided to macro management communication resources,paperless work was achieved in communication field,all the communication resources such as communication wiring layout,voice equipments,power grid communication information were collected and managed automatically. As an outcome,an one-stop communication management system for users application,resources distribution,inquiry and answer,and automatic statistics was came to work.

Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Posts and Telecom Press Co., Ltd.
Publisher: Beijing Xintong Media Co., Ltd.
Editor-in-Chief: Chen Shanzhi
Editorial Director: Li Caishan
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Postal Code: 100079
Tel: 010-53879277
        010-53879278
        010-53879279
E-mail: dxkx@ptpress.com.cn
Mailing Code: 2-397
ISSN 1000-0801
CN 11-2103/TN
Visited
Total visitors:
Visitors of today:
Now online: