Please wait a minute...

Current Issue

    20 February 2017, Volume 33 Issue 2
     
    CAI Kang, ZHOU Tao, ZHANG Jianwu
    2017, 33(2):  0. 
    Asbtract ( 161 )   PDF (398KB) ( 229 )   Knowledge map   
    Related Articles | Metrics
     
    Special topics:intelligent terminals and network security
    Intelligent terminal device identification method of internet of things
    Qingwang XIAO,Jinhua WANG,Yixiang ZHU
    2017, 33(2):  3-8.  doi:10.11959/j.issn.1000-0801.2017044
    Asbtract ( 585 )   HTML ( 32)   PDF (948KB) ( 2087 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The correct identification of the terminal of the internet of things is an important prerequisite to establish a secure connection of the internet of things.The identification of the intelligent terminal is particularly important.The device identification method of intelligent terminals in internet of things under the existing technology was investigated.From the perspective of the security of the internet of things,the security problem that the device identification method was too simple to be easily falsified of the existing scheme was analyzed.Combining the achievements of project research in the field of internet of things and the experience of the industry,the identification method of multidimensional device feature information of IoT intelligent terminals was proposed.

    Initialization scheme of the trusted execution environment based on the user card
    Lei WANG,Meng LU
    2017, 33(2):  9-14.  doi:10.11959/j.issn.1000-0801.2017034
    Asbtract ( 381 )   HTML ( 4)   PDF (1009KB) ( 775 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Smartphones with a trusted execution environment (TEE) has an authority issue of the certificate with the loading stage.Based on the analysis of the initialization architecture and initializing scheme of the trusted execution environment,by using trust chain technology,a scheme was proposed to initialize the trusted terminal of the operator's card as the trusted root,and ideas were provided for the telecom operators to use the user card resources to participate in the construction of the industrial chain of the trusted execution environment.

    A digital signature scheme based on shared key in intelligent terminal
    Guorong LIU,Dongxin LIU,Laifu WANG,Jun SHEN,Huamin JIN
    2017, 33(2):  15-21.  doi:10.11959/j.issn.1000-0801.2017049
    Asbtract ( 315 )   HTML ( 1)   PDF (1193KB) ( 395 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In traditional internet,digital certificate in USB key is the most mature technology of application security assurance.But it is difficult to use in mobile internet,because of the restriction of intelligent terminal interface.A digital signature scheme based on shared key in intelligent terminal was discussed to lower the threshold.The shared key supported multiple digital certificates,and was shared by multiple applications through the unified management.After that,the security of the scheme was analyzed,and a scheme integrated digital certificate and fingerprint identification was discussed to enhance user convenience.

    Multi-server identity authentication scheme based on biometric and chaotic maps
    Jianwu ZHANG,Zejin YAO,Zhendong WU
    2017, 33(2):  22-31.  doi:10.11959/j.issn.1000-0801.2017045
    Asbtract ( 276 )   HTML ( 1)   PDF (1574KB) ( 510 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Password-based user remote authentication system has been widely used in recent years,the study found that a single password system is so vulnerable to dictionary analysis and brute force attack as well as other attacks that the security is not high.Biometric and password combination authentication method gradually added to the remote authentication system in order to improve the security level of authentication system.However,the existing authentication systems work in a single server environment,if extended to a multi-server environment,biometric templates and passwords will encounter single point breakthrough and cross-crack problem.In order to overcome the above problems,a multi-server key authentication scheme based on biometric and chaotic map was proposed.The scheme was based on smart cards,passwords and biometrics,which could significantly improve the security and the ability of anti-password guessing of multi-server authentication systems.

    Android security reinforcing scheme of intelligent terminal based on certificate chain authentication mechanism
    Jiaren JIANG,GLiu JIAN,Weiqing WANG
    2017, 33(2):  32-35.  doi:10.11959/j.issn.1000-0801.2017050
    Asbtract ( 267 )   HTML ( 5)   PDF (737KB) ( 377 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the prosperous development of information technologies and mobile internet popularity of information-based on a global basis,it is necessary to analyze and research the security problems for Android,which is one of the most important technologies in the emerging field of mobile internet and intelligent terminals.The certificate chain authentication mechanism played a critical role as protecting the core of the terminals against some intrusion attacks in the security phases.

    Research on enhancing the security of IoT terminals based on non-IP and SCEF technology
    Yao HE,Hai HUANG
    2017, 33(2):  36-41.  doi:10.11959/j.issn.1000-0801.2017035
    Asbtract ( 455 )   HTML ( 7)   PDF (997KB) ( 632 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Android intelligent terminal system was studied,and Android security reinforcing scheme of intelligent terminal based on certificate chain authentication mechanism was put forward.The security problems that Android system showed were analyzed,and the advantage of the Android security reinforcing scheme was compared with Android system.The certificate chain authentication mechanism played a critical role as protecting the core of the terminals against some intrusion attacks in the security phases.

    Review of iOS malicious application analysis
    Yixiang ZHU,Kang ZHANG,Weiqing WANG
    2017, 33(2):  42-47.  doi:10.11959/j.issn.1000-0801.2017048
    Asbtract ( 323 )   HTML ( 6)   PDF (1030KB) ( 385 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The security architecture and distribution of iOS were introduced.The threats to user's data security and privacy from iOS malicious applications were analyzed.The reasons that the number of iOS malicious applications is less than Android malicious applications were discussed.The attacking methods of emerging iOS malicious applications were summed up.And prospect for future mitigation and confrontation strategies were given.

    Research on malicious behavior detection based on iOS system
    Yuliang WANG,Xiaodong CHEN,Tun WU
    2017, 33(2):  48-54.  doi:10.11959/j.issn.1000-0801.2017047
    Asbtract ( 245 )   HTML ( 4)   PDF (1244KB) ( 648 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Firstly,the cases of malicious application of multiple iOS platforms were enumerated.The main malicious behavior of mobile application under iOS platform was analyzed by dissecting the misuse of crime and the bad influence.The key technologies of malicious behavior detection process were studied.The iOS application malicious behavior detection model was put forward.Finally,iOS application malicious behavior detection solution was given.

    Research and development
    Joint optimization of power and channel access in cognitive radio network
    Jiang ZHU,Qingmin DU,Shaowei BA
    2017, 33(2):  55-65.  doi:10.11959/j.issn.1000-0801.2017013
    Asbtract ( 247 )   HTML ( 2)   PDF (1660KB) ( 350 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In cognitive radio networks,according to the problem of all users can access the same channel to communicate,two joint optimization schemes for different scenarios were proposed.When the system is infeasible,a scheme of joint optimal power and admission control was proposed.As admission control is the NP problem,the LP-SO was used to achieve optimize control.At the same time,the convergence of the proposed algorithm was analyzed and proved.When the system is feasible,a scheme of joint optimal power and transmission rate allocation was proposed,using the improved Lagrange duality algorithm to achieve optimize control.The numerical results show that compared with other admission control algorithms,the time complexity of proposed algorithm is increased,but it can converge quickly,effectively improves the number of admitted uses while reducing power consumption.In addition,the proposed algorithm can allocate transmission rate more fairly.

    Slice scheduling strategy in LTE wireless network virtualization
    Xiaodan PANG,Weiwei LI,Qian SUN,Lin TIAN
    2017, 33(2):  66-72.  doi:10.11959/j.issn.1000-0801.2017041
    Asbtract ( 502 )   HTML ( 11)   PDF (1163KB) ( 694 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The future mobile communication network slicing mechanism was studied.A slice scheduler of flow level in medium access control (MAC) layer within the base station was used to utilize the shared resources between operators by predetermined proportion in the downlink LTE system.According to the different service level agreement parameters,the wireless resources are allocated for operators,which is the owner of slices in wireless network virtualization.System level simulation experiment and the comparison of the utilization between different slice methods were carried out.Compared to fixed slice method,the NVS method ensures that the users in different slices can achieve better utilization of wireless resources.In addition,the slices for services were established according to the difference of real-time(RT)and non-real-time(NRT)traffic requests,which minimizes the packet loss rate and ensures performance of the whole system.

    Adaptive transmission power allocation algorithm in device to device manner of 5G mobile networks
    Yupeng WANG,Xin DAI,Kaili LI
    2017, 33(2):  73-78.  doi:10.11959/j.issn.1000-0801.2017028
    Asbtract ( 322 )   HTML ( 1)   PDF (962KB) ( 506 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    As a strong supplementary technique to the traditional mobile communication networks,the concept of device to device was introduced into the future 5G mobile communication networks.To solve the problems of base station-free transmission manner and the complex interference environment induced by the non-coordinated user data transmission,an adaptive transmission power allocation algorithm based on game theory and fuzzy logic was proposed,to utilize the system power and frequency in a more efficient way while minimizing the interference to other users.Through the simulation results,the proposed algorithm outperformed the conventional equal power allocation and distributed water-filling algorithms in the aspect of user received data rates.

    Bifunctional watermarking for copyright protection and content authentication with perfectly blind detection
    Dong XUE,Yaxun ZHOU,Wei JIN
    2017, 33(2):  79-89.  doi:10.11959/j.issn.1000-0801.2017017
    Asbtract ( 333 )   HTML ( 7)   PDF (1652KB) ( 371 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In view of the limitation that most of the watermarking algorithms are single in functions and unable to achieve perfectly blind detection,a bifunctional watermarking algorithm with perfectly blind detection for copyright protection and content authentication was proposed.The algorithm adopted the idea of region segmentation for sub-block,and the generation and embedding of watermark were respectively carried out in the different regions of the same sub-block.A feature watermark was generated by judging the parity of the first digit from the average of maximum singular values,and the watermark was embedded by adjusting two DCT coefficients of adjacent blocks in the same position.Both the image copyright protection and content authentication functions were achieved by comparing the generated feature watermark and blindly extracting authentication watermark in the detection.Compared to some of the reported watermarking schemes,the proposed algorithm not only has better robustness against the common attacks to realize the copyright protection,but also has a good sensitivity to malicious image tampering to accurately locate the tampered area.

    An energy saving clustering algorithm based on artificial bee colony in ultra dense network
    Pengguang ZHOU,Junwei HUANG,Renchi ZHANG,Hao XU
    2017, 33(2):  90-97.  doi:10.11959/j.issn.1000-0801.2017038
    Asbtract ( 342 )   HTML ( 3)   PDF (1304KB) ( 430 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In ultra dense network (UDN),the dense deployment of low power base station (BS) will increase the system's energy consumption and cause the waste of the scarce spectrum resources.Aiming to explore the feasible method of energy saving system and interference coordination,BS sleeping-waking-active mechanism in UDN was proposed,which would reduce the opening time of the sleeping BS.Also an adjusted artificial bee colony algorithm was proposed which used the least colors to dye the BS in topology,then power allocation of active BS in different cluster was optimized.Simulations show that the sleeping-waking-active mechanism can improve the energy efficiency of the system,and the clustering algorithm can promote the spectrum efficiency and throughput.

    Modified absolute value cumulating spectrum sensing algorithm in cognitive radio
    Zhiyong HE
    2017, 33(2):  98-103.  doi:10.11959/j.issn.1000-0801.2017029
    Asbtract ( 231 )   HTML ( 5)   PDF (970KB) ( 346 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Absolute value cumulating (AVC) algorithm is a common spectrum sensing method in Laplacian noise (LED) surroundings,however,the ‘spikes or outliers' in Laplacian noise can't be fully smoothed,which results in bad detection performance.Aiming at this problem,an modified AVC spectrum sensing algorithm was proposed.The principle was to do the processing of the absolute value of the received signal and the processing result was accumulated as the test statistic to determine whether there was the main user and realize the spectrum sensing.In addition,the central limit theorem was used to deduce the probability density curve of the proposed test statistic in the absence of the primary user,and the theoretical decision threshold was given.Numerical results show that the proposed algorithm outperforms the AVC sensing algorithm and energy detection algorithm with Laplacian noise about 1 dB and 4 dB respectively.

    Design and implementation of software router supporting segment routing
    Xiaomin GAO,Xuejing LIU,Jiawei LI,Hongbin LUO,Ping DONG
    2017, 33(2):  104-112.  doi:10.11959/j.issn.1000-0801.2017032
    Asbtract ( 446 )   HTML ( 6)   PDF (1414KB) ( 627 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Segment routing (SR) is a routing mechanism proposed by IETF in recent years,which aims to make the IP/MPLS network service-oriented and more efficient.SR eliminates the complex control plane protocol (LDP/RSVP-TE) of the MPLS network,while SR implements the traffic engineering mechanism.Different from the explicit path in the RSVP tunnel which maintains the state of each flow in the middle of the tunnel,the explicit path based on SR only maintains the state of flow at the entrance border router of the SR domain.For this reason,SR improves the scalability of the network.Therefore the research of the SR mechanism is very important to the next generation internet.The realization mechanism of SR was studied,using the click router.The SR control plane subsystem based on PCE architecture and each module of MPLS-based SR data plane subsystem were implemented and deployed in practice to verify the feasibility of the software router in actual deployment.

    Multi-objective layered diagnosis model of electric power ICT network based on extenics
    Li LI,Tiantian LUO,Yana ZHANG,Runze WU
    2017, 33(2):  113-119.  doi:10.11959/j.issn.1000-0801.2017008
    Asbtract ( 373 )   HTML ( 1)   PDF (1020KB) ( 398 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Electric power ICT network is an important part of power system,which plays a vital role in the security,stability and economic operation of power network.A diagnostic index system of electric power ICT network was established and a multi-objective layered diagnosis model of electric power ICT network system based on extension rating was proposed.This evaluation method could not only evaluate the impact factors of the electric power ICT network,but also diagnose and rate the whole electric power ICT network.

    Pedestrian surveillance system based on mobile vehicle
    Huijun XING,Shuo CHANG
    2017, 33(2):  120-127.  doi:10.11959/j.issn.1000-0801.2017042
    Asbtract ( 311 )   HTML ( 1)   PDF (1381KB) ( 299 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Pedestrian surveillance is one of the most important aspects in the surveillance system.Traditional surveillance equipment can only cover the limit area.Namely,once the surveillance equipment is implemented,it can only monitor a specific region.Besides,the surveillance system can't detect if there is a person in the surveillance picture or not.The professional staffs are needed to determine whether there is a person in the surveillance picture.To solve this problem,a computer vision based on mobile pedestrian surveillance system was designed.By implementing a surveillance camera on a mobile small vehicle and remotely control it,the system could switch the monitoring area.Besides,the system could classify and locate the pedestrian in the picture with the deep convolutional neural network and correlation filters.Finally,the system was tested on the spot,which verified the feasibility of the system.

    Operation technology wide-angle
    Development and experiment research of 25 Gbit/s passive optical network
    Dan GENG,Yong GUO,Yongjia YIN,Zhuang MA,Weiliang ZHANG
    2017, 33(2):  128-132.  doi:10.11959/j.issn.1000-0801.2017039
    Asbtract ( 425 )   HTML ( 5)   PDF (705KB) ( 511 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the new service development of high-definition video and virtual reality and the requirement of transporting the fifth generation mobile fronthaul/backhaul signals,passive optical network (PON)is required to transmit signals above 10 Gbit/s.When the line rate is above 10 Gbit/s,chromatic dispersion and power budget are the main constraint factor of system performance.Development and difficulty of 25 Gbit/s PON were introduced.25 Gbit/s PON was studied in experiment using 25 Gbit/s EML laser with zero dispersion wavelength,25 Gbit/s APD and 10 Gbit/s APD.Experiment results show that 32 dBm optical power budget(N2 level in 10 Gbit/s symmetric EPON)was achieved when EML transmit optical power is+5 dBm and 25 Gbit/s APD is used without optical amplifier.

    Development and thinking of Broadband Beijing construction
    Hua JIN,Zhaohan LI,Hui CHEN
    2017, 33(2):  133-137.  doi:10.11959/j.issn.1000-0801.2017033
    Asbtract ( 283 )   HTML ( 2)   PDF (971KB) ( 267 )   Knowledge map   
    References | Related Articles | Metrics

    The Ministry of Industry and Information Technology (MIIT) organized series of investigation activities around the subject of “‘Broadband China' strategy implementation”in 2016,aiming at promoting“Broadband China”construction as well as summing up good experience and typical practice.Based on the research of broadband network construction progress in Beijing,the achievements of broadband network construction in Beijing in recent years were reviewed.Secondly,the successful practice and excellent experience in the implementation of“Broadband China”was summarized.The existed difficulties on broadband networks promoting were analyzed and some suggestions and solutions were put forward.

    Scheme and practice of IPTV user viewing behavior analysis based on MapR
    Ai FANG,Yuzhong HANG,Xiong XU,Duo JIN
    2017, 33(2):  138-144.  doi:10.11959/j.issn.1000-0801.2017030
    Asbtract ( 320 )   HTML ( 4)   PDF (971KB) ( 351 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Interactive TV business open platform is the internet and IPTV transformation practice for operators.It's the interconnected hub between users,terminals,content,business and other.The platform now has millions of active users,generating nearly 1 TB of daily viewing activity and system log data.They can be used for business analysis,user portraits and system analysis.MapR was one of the large data processing frameworks suitable for this kind of analysis.The main features and core components of MapR were introduced combined with actual demand,and the architecture design and application effect of analysis system based on MapR was elaborated.

    VoLTE call setup delay optimization based on signaling message
    Bao GUO,Yang ZHANG
    2017, 33(2):  144-153.  doi:10.11959/j.issn.1000-0801.2017040
    Asbtract ( 940 )   HTML ( 33)   PDF (1743KB) ( 988 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    VoLTE wireless spectrum utilization efficiency is better than that of the traditional CS voice.The introduction of high-definition voice and video codes significantly improves the communication quality.VoLTE call setup duration has been significantly shortened compared to the traditional CS voice.Analyzing the factors in causing call setup delay of VoLTE was focused,and corresponding solutions about the VoLTE call setup delay optimization was put forward based on the signaling message in different stages,including paging,domain selection,resource reservation.

    Scheme of mobile informatization in electric power enterprise
    Hualu ZHANG,Wei JIA,Tianbing ZHANG,Zhongran ZHOU
    2017, 33(2):  154-163.  doi:10.11959/j.issn.1000-0801.2017007
    Asbtract ( 324 )   HTML ( 7)   PDF (1554KB) ( 692 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The electric power enterprises' mobile information development trend was analyzed,an enterprises' mobile informatization scheme based on enterprise “mobile platform and mobile applications”was put forward,including the overall technical route and the overall architecture,the design of enterprise's unified mobile internet application support platform,the construction scheme of mobile application based on the mobile platform and the safety design of mobile informatization implementation.At present,the scheme has been successfully applied in the state grid corporation.

    Research and design in dual network scheme of power corporation based on network isolation and secure data exchange
    Jing WANG,Kunlun GAO,Bo ZHANG
    2017, 33(2):  163-176.  doi:10.11959/j.issn.1000-0801.2017043
    Asbtract ( 472 )   HTML ( 8)   PDF (1623KB) ( 1160 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    It is a common concern for power enterprises of how to ensure the safety and stability of power production management and information network for group-oriented power generation enterprises.The dual-network architecture of group-type power generation enterprise was designed based on network isolation and the safe data exchange technology.Based on the protection of network security isolation,the private protocol interaction technology was introduced to meet the growing business development needs of power enterprises.The overall technical route of logical strong isolation was proposed,the design scheme of construction of information internal and external network,the application and deployment,and information exchange in typical application scenarios was put forward.In addition,in order to realize the centralized monitoring and unified protection after isolation,the design scheme of deploying unified monitoring,unified anti-virus,unified terminal management and unified authentication system was put forward.

Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Posts and Telecom Press Co., Ltd.
Publisher: Beijing Xintong Media Co., Ltd.
Editor-in-Chief: Chen Shanzhi
Editorial Director: Li Caishan
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Postal Code: 100079
Tel: 010-53879277
        010-53879278
        010-53879279
E-mail: dxkx@ptpress.com.cn
Mailing Code: 2-397
ISSN 1000-0801
CN 11-2103/TN
Visited
Total visitors:
Visitors of today:
Now online: