Please wait a minute...

Current Issue

    20 March 2018, Volume 34 Issue 3
    Viewpoint focusing
    Convergence of communication and computing in future mobile communication systems
    Yiqing ZHOU,Guojie LI
    2018, 34(3):  1-7.  doi:10.11959/j.issn.1000-0801.2018120
    Asbtract ( 1007 )   HTML ( 91)   PDF (732KB) ( 2246 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    An overview and summary was provided on the convergence of communication and computing and the future research directions were clarified.As two key technologies of information science,communication and computing were born to be converged.In current mobile communication systems,from a single device or technique point of view,communication and computing had been well converged.However,to break the bottleneck of traditional mobile communication systems,it was necessary to converge communication and computing in a system level.Existing research demonstrates that a systematic convergence of communication and computing will reduce the channel capacity requirement on the mobile system and thus enhancing the system capability to support more services.Facing future mobile communication system,communication and computing convergence should be further studied in-depth from defining system service capabilities (basic theory),building a scalable,remodelable,transparent,modular system architecture and investigating service-aware cross-layer information exchange mechanisms,thus the sustainable development of mobile communication system could be promoted.

    Topic:Cyberspace Security
    Survey on network security based on blockchain
    Ye CHEN,Dongjin XU,Liang XIAO
    2018, 34(3):  10-16.  doi:10.11959/j.issn.1000-0801.2018135
    Asbtract ( 1354 )   HTML ( 105)   PDF (748KB) ( 2140 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the development of the mobile internet and IoT (internet of things),mass data are stored in the cyberspace.The network security and privacy are of great significance.The blockchain-based network security mechanism has the properties of decentralization,tamper-resistance,traceability,high availability and credibility,and can be applied to improve network security.The application of blockchain in the network security was explored.The main technologies and the future research direction of the blockchain-based network security mechanism were analyzed.Firstly,the blockchain-based data protection scheme was analyzed,which applied the tamper-resistance of the blockchain to improve the authenticity and reliability of data.Secondly,the blockchain-based IoT device management scheme was analyzed,which applied the blockchain to record and execute the device control instruction and improve the authority and communication of the IoT devices.Lastly,the blockchain-based domain name system was analyzed,which applied the decentralization of the blockchain to resist distributed denial of service effectively.

    DNS root domain name analysis system based on block chain
    Tianshu ZHUANG,Wenfeng LIU,Dong LI
    2018, 34(3):  17-22.  doi:10.11959/j.issn.1000-0801.2018125
    Asbtract ( 886 )   HTML ( 86)   PDF (681KB) ( 1384 )   Knowledge map   
    References | Related Articles | Metrics

    The centralized resolution system of the domain name system (DNS) implies an unavoidable risk of abuse of power,a top-level domain may be deleted from the root zone.By analyzing the related work on the root zone decentralization,the most were mainly to deploy new root resolution services outside the current root servers,but not to decentralize the root zone data.A scheme to decentralize the root zone data was proposed,and the decentralization of root zone data distribution and analysis were achieved through a peer-to-peer coalition between national roots.Trust from peer-to-peer to collective,with features such as autonomy,openness,equality,and transparency,and implements a distributed consensus on root zone data through blockchain technology were transformed by the program,thereby ensuring root zone data consistency.

    Physical layer security for the air-space-ground communication networks
    Shuai HAN,Xiangxue TAI,Weixiao MENG
    2018, 34(3):  23-31.  doi:10.11959/j.issn.1000-0801.2018129
    Asbtract ( 526 )   HTML ( 8)   PDF (1973KB) ( 796 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    As a typical application of wireless communications,the air-space-ground communications networks are facing serious wireless communications security issues due to its inherent broadcast nature and wide coverage.Especially in the field of military satellite communications,the requirement of secure communications security is even more crucial.How to realize the security of communications is a problem must be faced.A model for physical layer security communication in air-space-ground communication network was proposed which was a cooperative layer-direct connect mixed-to-ground physical layer secure communication model.Based on this model,the security of the system was further improved by studying the relay selection problem and the power distribution problem of satellite and relay,and an overall scheme to enhance the confidentiality of the communication network was also proposed.

    Method of fingerprint and voiceprint based decision level fusion recognition
    Jianwu ZHANG,Jiajia YANG,Zhendong WU
    2018, 34(3):  32-40.  doi:10.11959/j.issn.1000-0801.2018130
    Asbtract ( 447 )   HTML ( 7)   PDF (1632KB) ( 753 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Because of strong complementarity in the recognition environment and the low correlation characteristics of the two features,a fingerprint and voiceprint based decision level fusion recognition method was proposed.After extracting the features and recognition of corresponding fingerprint and voiceprint,the second comparison of choosing model (SCCM) was used to classify at the decision-making level and judge whether to enable voiceprint recognition according to the category,reduced the average data processing volume of the dual-mode fushion system by 32.8%.Experiments applied to FVC2002DB1 fingerprint library and self-collecting voiceprint library.The experimental results show that the multi-biometrics fusion effectively solves the single-modal recognition limitation and the recognition rate improves nearly 5.08% and 4.60% as well as get a more stable system.

    Open platform and key technology of mobile application security depth detection capability
    Nishui CAI,Yirong SHI,Chenxu QIU
    2018, 34(3):  41-49.  doi:10.11959/j.issn.1000-0801.2018126
    Asbtract ( 345 )   HTML ( 9)   PDF (2016KB) ( 656 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The challenges that telecom operators faced in mobile network application security monitoring services were focused on,including mobile malicious application entry,real-time monitoring and early warning,rapid blocking,timely warning,massive data processing capabilities,customized services,etc.Based on this,the telecom operator's deep application of mobile application security,the service mode of the open platform and the distributed service mode of the open platform were discussed,and the platform's current network deployment plan was put forward.

    Big data security analysis method based on self-update threat intelligence database
    Yanfang HOU,Jinhua WANG
    2018, 34(3):  50-58.  doi:10.11959/j.issn.1000-0801.2018127
    Asbtract ( 575 )   HTML ( 21)   PDF (1057KB) ( 1303 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Big data security analysis method is generally based on the existing signature database to detect and match malicious behaviors.This method can only detect known attacks and can't analyze and judge new types of unknown attacks and complex variant attacks.Through the big data analysis technology,the collected data was extracted for safety value,and the value conversion from the collected data,threat information,threat knowledge to threat intelligence was realized,high-value threat intelligence of forming hidden,value selective,adversarial,predictive,and decision-making,evidence-based,time-sensitive was formed.Firstly,the limitations of the existing security analysis methods were analyzed.Then the construction method of threat intelligence database was introduced in detail.Finally,the security analysis method of big data based on self-renewing threat information database was described.The analysis of big data security based on the self-updated threat intelligence database could mine the hidden threats in internet data effectively and strengthen the existing security protection capabilities of internet companies so that the preemptive defense initiative could be mastered during the security game.

    Research and development
    A two level multi-antenna blind spectrum detection about spatial spectrum
    Zhiqiang BAO,Yanrui CUI,Xiao XU
    2018, 34(3):  59-66.  doi:10.11959/j.issn.1000-0801.2018090
    Asbtract ( 308 )   HTML ( 8)   PDF (860KB) ( 322 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to improve the perceptual performance,the array spatial spectrum search technology was applied to the spectrum sensing field.A blind spectrum detection algorithm based on two stage detection of spatial spectral values was proposed.Firstly,the maximum and minimum values of the spatial spectrum were used as the test statistics to detect the spectrum.Then the mean value of spatial spectrum for the undetected part was used in the second level detection.By using the advantage of the spatial matching filter,the new algorithm achieved higher detection probability under the low SNR and low sampling rate,and the threshold of detection was accurately deduced based on probability theory.The simulation and comparison results show that TDSS algorithm has better detection effects than some existing classical blind spectrum sensing algorithms.

    Energy-efficiency based buffer-aided relay selection scheme in SWIPT
    Xinlong HONG,Xiaorong XU,Yingbiao YAO
    2018, 34(3):  67-75.  doi:10.11959/j.issn.1000-0801.2018111
    Asbtract ( 422 )   HTML ( 6)   PDF (888KB) ( 447 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Aiming at the problem of buffer-aided half-duplex (HD) relay selection in simultaneous wireless information and power transfer(SWIPT) with energy constraint,energy-efficiency priority based buffer-aided relay selection scheme in SWIPT was investigated.Moreover,SWIPT system energy efficiency was studied,and an appropriate mathematical model was constructed to perform energy efficiency based buffer-aided optimal receive/transmit relay selection in SWIPT.Numerical results show that the proposed scheme effectively reduces SWIPT outage probability and achieves the tradeoff between energy efficiency and outage performance in buffer-aided SWIPT.

    A quality assessment metric for stereoscopic image in free viewpoint video system
    Shipei WANG,Zongju PENG,Fen CHEN,Gangyi JIANG,Mei YU
    2018, 34(3):  76-85.  doi:10.11959/j.issn.1000-0801.2018038
    Asbtract ( 286 )   HTML ( 8)   PDF (1441KB) ( 535 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A quality assessment metric of stereoscopic image in free viewpoint video system was proposed.After the reference and distorted images being decomposed by wavelet then weighted by contrast sensitivity function respectively,the content score was obtained by calculating the average structural similarity.After the center region being found in the binocular matching region,the average phase similarity was calculated on the region to obtain depth perception.The distortion region perceived by the human eye in the matching region by using the threshold,the average structural similarity was calculated between this region and the corresponding region of the other view image by disparity mapping,then the binocular characteristic score was obtained.The final image quality can be obtained by fusing score of each part.The experimental results show that the proposed algorithm has better consistency with subjective perception and it is more in line with human visual characteristics.

    Detection of phishing websites based on the improved TrustRank algorithm
    Hao HAN,Bowen LIU,Guoyuan LIN
    2018, 34(3):  86-94.  doi:10.11959/j.issn.1000-0801.2018046
    Asbtract ( 578 )   HTML ( 16)   PDF (888KB) ( 661 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Anti-phishing methods just generally detect phishing sites based on comparing the similarity of pages features,which could be anti-detected when attackers are clear about the extraction process of features.Therefore,a method based on web pages relationship was proposed to detect phishing websites.According to this method,phishing websites were detected by an improved TrustRank algorithm which set up a collection of web pages and used the link relationship between phishing websites and other websites.Experiments show that the improved TrustRank algorithm can focus the trust values of phishing websites on some range with the lower false positive rate,the lower false negative rate and the higher speed compared to other methods.

    A video encryption in HEVC entropy coding based on magic square
    Bowen XU,Xiaodong WANG,Lei GUO,Jian WANG
    2018, 34(3):  95-104.  doi:10.11959/j.issn.1000-0801.2018015
    Asbtract ( 409 )   HTML ( 10)   PDF (1279KB) ( 650 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In view of the multimedia information security,based on the entropy module on high efficiency video coding (HEVC/H.265),combined with the magic square,a real time and high efficiency encryption technique for high-definition video streaming was proposed.The algorithm which had an effective use of transform coefficient sparsity enabled coefficient group (CG) of transform block (TB) scrambling,and used a selective encryption on syntax elements in CG's entropy.The experiments prove that the investigated scheme has high security,which can guarantee the standard compliance and the demand of video encryption while having a low impact on encoding-rate performance.

    Tag's ownership transfer protocol based on quadratic residue
    Rui XIE,Zhifeng HAO
    2018, 34(3):  105-111.  doi:10.11959/j.issn.1000-0801.2018107
    Asbtract ( 274 )   HTML ( 2)   PDF (720KB) ( 457 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A proprietary transfer protocol with higher security and lower cost was proposed.In order to ensure the communication entity authentication premise,two remainder theorems for information transmission encryption were used in the proposed protocol; in the process of mutual recognition of communication entities,the addition of random numbers could make the protocol effectively resist such attacks as replay and desynchronization.After the transfer of ownership occurs,new communication entities would be located.The authentication key needed to be dynamical,so as to reduce the storage space of communication entities.The performance comparison between the proposed protocol and other protocols for safety show that the proposed protocol has the security required for the transfer of ownership and low cost.

    A weighted sparse constraint Capon beamforming algorithm
    Yongxin DU,Xin MA,Baoshan LI,Ling QIN
    2018, 34(3):  112-118.  doi:10.11959/j.issn.1000-0801.2018019
    Asbtract ( 299 )   HTML ( 2)   PDF (1475KB) ( 1062 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Aiming at the problem of high sidelobes and nulls was not deep of Capon beamformer,the methods of reducing sidelobes and nulls were studied,a weighted sparse constraint Capon beamforming algorithm was proposed.Firstly,using the correlation operation of sidelobe array manifold matrix and the covariance matrix obtained the interference and noise energy were roughly posterior distribution in different directions.Then,different values were weighted in different directions according to the results,and restrained the interference.Simulation results show that the approach can reduce the sidelobes and deepen the null to fall the depth of the beam pattern,and improve the ability of suppress noise and interference.The proposed method is robust to both expected and array errors.

    A band-limited receiver technology based on PAM4 modulation for the short distance optical transmission system
    Qun LIU,Huiqin DU,Xianglin WU
    2018, 34(3):  118-123.  doi:10.11959/j.issn.1000-0801.2018091
    Asbtract ( 359 )   HTML ( 6)   PDF (919KB) ( 1654 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In intensity modulation and direct detection of the short distance optical transmission system,there is some serious ISI (inter symbol interference) for the detected PAM4 signal due to the band-limited performance for the optical devices.A band-limited compensation algorithm based on DFE (decision feedback equalizer) combined FTN (fast than Nyquist) transmission was proposed.Then the algorithm performance gain was simulated in different band-limited scenarios,and the simulation results show that this algorithm can be useful to demodulate PAM4 receiver signal.What is more,there is about 1 dB performance gain at the bit error rate (BER) of 10-3for the serious conditions.

    Wide angle of operation technology
    Network slice technology in 5G radio access network
    Yi WANG,Fengya LUO,Guolin SUN
    2018, 34(3):  124-131.  doi:10.11959/j.issn.1000-0801.2018093
    Asbtract ( 721 )   HTML ( 27)   PDF (1261KB) ( 1870 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    As a core content in SDN(software defined networking) technical framework,network slice has become a key technology in 5G network evolving processing.In the meanwhile,radio resource management should be focused on virtulized resource and sliced design in the RAN(radio access network),which is being confronted with much more ubiquitous access in 5G evolution.Based on the technical demand and function scenario definition for network slicing in RAN management,the states of the art in radio resource management were discussed,and moreover,the challenges in RAN design were also proposed,which would perform references for the future research.

    Reflections on operators' competition in big data of internet of things
    Nan LIU,Lu LIU,Di ZHANG,Jinwu WEI,Yunyong ZHANG
    2018, 34(3):  132-137.  doi:10.11959/j.issn.1000-0801.2018108
    Asbtract ( 405 )   HTML ( 10)   PDF (775KB) ( 779 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    By analyzing the layout of different industry in the big data of IoT,promoting IoT big data is the breakthrough to the innovative business of operators.Different strategies in the aspects of data,platform and application should be carried out in order to build core competitiveness for operators in big data of IoT.

    Optimization and application of the carrier DNS data analysis technology
    Wei PENG,Xiaodong HE,Xiaoming LU,Chuanxin JI
    2018, 34(3):  138-144.  doi:10.11959/j.issn.1000-0801.2018092
    Asbtract ( 361 )   HTML ( 8)   PDF (1355KB) ( 649 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The principles of DNS data analysis and the limitations of traditional DNS data analysis method were analyzed.According to the trend of the development of the IP network,an analysis technology based on the Hadoop towards huge amounts of DNS data was proposed.Also the architecture,implementation scheme and advantages of the technology scheme were described,then the effect of Hadoop DNS data analysis which applied in the telecom network was expounded.The research results can provide scientific reference for the development and optimization of the telecom network.

    Signaling collection and monitoring technology based on FKS
    Baoyou WANG,Jian YAO,Zhengqing ZHANG
    2018, 34(3):  145-155.  doi:10.11959/j.issn.1000-0801.2018096
    Asbtract ( 411 )   HTML ( 5)   PDF (2582KB) ( 451 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The signaling data of telecom operators,which have a wide range of applications and great of values,is big data in real sense.In order to serve the real-time marketing scenarios better,the real-time processing and analysis ability of signaling data must be improved effectively.Firstly,the scheme of signaling collection and processing based on FKS was introduced,which combined the advantages of components such as Flume,Kafka and Spark Streaming,and played an important supporting role for operators to build real-time decision center.Furthermore,the Kafka monitoring program for topic consumption of consumer groups was proposed,which provided effective means for warning faults of real-time flow collection.The monitoring solution could effectively reduce the message queue congestion,avoid the risk of data loss,and also could obtain good application effects in practice.

    Management and operationof internet oriented energy for sustainable ICT
    Baochang LIU,Song CI
    2018, 34(3):  156-161.  doi:10.11959/j.issn.1000-0801.2018102
    Asbtract ( 310 )   HTML ( 5)   PDF (1352KB) ( 597 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To overcome the challenges posed by energy consumption on ICT,it is necessary to think more out of the box instead of merely focusing on issues in ICT itself.The unidirectional energy flow in the traditional power grid was introduced that could not fulfill the ever-increasing load requirement which had been inspired by the Moore's law in last decades.The seamlessly integration of energy flow and information flow was proposed to support the sustainability of future ICT.The result shows where software-defined digital energy system and its seamlessly integration with the internet are essential.

    Power information column
    Communication service escape strategy oriented to the smart distribution grid
    Wei DENG,Junyu LIU,Zhe LIU,Shuxian LI
    2018, 34(3):  162-169.  doi:10.11959/j.issn.1000-0801.2018117
    Asbtract ( 322 )   HTML ( 5)   PDF (863KB) ( 495 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the development of the smart grid,the communication network for distribution grid plays a more and more importantl supporting role in smart distribution grid.There are various types of communication services in distribution grid,and they differ in communication requirements.A single network cannot meet the needs of all of them.Thus,it is necessary to introduce the heterogeneous network architecture into smart distribution.To improve the reliability of distribution grid,a multi-objective escape strategy based on heterogeneous access networks was proposed,which considered the current state of the communication and services requirements.Based on the network capacity,a multi-objective model subjected to the service functions of real-time (RT) and non-real-time (NRT) services was consouctd by this strategy.And then NSGA-II was adopted to get the Pareto front.The simulation results show that the strategy can guarantee the escape rate and timelines of RT and NRT distribution services.

    Analysis of time delay jitter of communication system on fault location of power line based on traveling wave method
    Mingzhen LI,Jianming LIU,Hang WANG,Wenjun ZHOU
    2018, 34(3):  170-176.  doi:10.11959/j.issn.1000-0801.2018132
    Asbtract ( 303 )   HTML ( 0)   PDF (899KB) ( 506 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to study the time delay jitter of communication system on fault location of power line,a mathematical model of the delay jitter based on Poisson distribution was presented.The characteristic of the random delay jitter for single and multiple node cases were analyzed.Results show the delay jitter is remarkable when the communication load is high,and is insensitive when the communication load is low in the single node case.The total delay jitter is lower than the sum of the jitter in the queues on a path,and the position of the heavy load node in the path has a large influence on the total path jitter.The delay jitter with its influencing factors should be taken into account to perform optimal network design.

    Power allocation of MIMO system with RF mismatch in TD-LTE power wireless private network
    Bao FENG,Tao MA,Shilong CAI,Yang LI
    2018, 34(3):  177-182.  doi:10.11959/j.issn.1000-0801.2018022
    Asbtract ( 527 )   HTML ( 4)   PDF (915KB) ( 475 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the development of smart distribution network,the power wireless private network using TD-LTE technology has gradually become a hot research topic.Among them,multiple-input multiple-output (MIMO) system is a key technology of TD-LTE power wireless private network.In TD-LTE,time-division duplex is often used to estimate channel information and perform appropriate power allocation to maximize the spectral efficiency of the communication system.However,due to the mismatch of radio frequency link,the complete uplink and downlink channels in the actual communication system can not achieve complete symmetry.The performance of MIMO system under radio frequency mismatch was analyzed and the suboptimal power allocation scheme was given.Combining with the approximate capacity expression,the spectral efficiency of the system under radio frequency mismatch and matching was analyzed.Simulation results show that compared with the optimal power allocation,the system capacity will suffer some loss due to the sub-optimal power allocation algorithm,but there is still some performance improvement compared with the equal power allocation algorithm,and does not require complicated calibration process.The realization of the operation proves the validity of the sub-optimal power allocation algorithm.

    Off-line emergency communication method of power internet of things based on edge computing
    Donghong FU,Dan LIU,Guijun SHI,Anxin WANG,Chunxue FAN,Haijun WANG,Yiying ZHANG
    2018, 34(3):  183-191.  doi:10.11959/j.issn.1000-0801.2018012
    Asbtract ( 470 )   HTML ( 8)   PDF (997KB) ( 1043 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A new multi-mode node was designed for the emergency communication with the demand of electricity.The node had the multi-mode communication capability of the private network and the public network technology,which could switch smoothly in three modes:the power private network,the wireless Ad Hoc network and the wireless public network.Data were automatically uploaded to the multi-mode terminal,multi-mode terminal through the mode of rapid switching,with the public network resources to achieve rapid network recovery and continuous transmission of data to achieve off-line emergency communications.Meanwhile,an intelligent routing algorithm based on smoothness was proposed,and the three principles of edge network communication were defined.Through the edge calculation method,the calculation and updating of the smoothness were realized to ensure the intelligent,efficient and reliable operation of the edge network in the offline state.

    Service impact analysis and visualization display based on massive real-time monitoring data
    Junwen LIU,Shuo CUI,Xiaomeng LI,Zhihong LI,Yang LI
    2018, 34(3):  192-196.  doi:10.11959/j.issn.1000-0801.2018121
    Asbtract ( 254 )   HTML ( 2)   PDF (937KB) ( 479 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the development of electric power informatization,electric power information systems,interactive data and resource systems are also increasing.The amount of data generated during daily operation,has been a serious challenge to system operation and fault judge.But the traditional way of monitoring is simply to carry out data collection and indifferentiated recording,but no effective information is extracted from the monitoring data,while the means of monitoring can't be intuitive to reflect the system physical layer and business layer topology.Through the collection of electric power information system massive real-time monitoring data,and the collected data for effective extraction,the formation of information was interrelated,the mapping relationship between platform monitoring and upper service was established,thus the visualization of data flow was realized.

Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Posts and Telecom Press Co., Ltd.
Publisher: Beijing Xintong Media Co., Ltd.
Editor-in-Chief: Chen Shanzhi
Editorial Director: Li Caishan
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Postal Code: 100079
Tel: 010-53879277
        010-53879278
        010-53879279
E-mail: dxkx@ptpress.com.cn
Mailing Code: 2-397
ISSN 1000-0801
CN 11-2103/TN
Visited
Total visitors:
Visitors of today:
Now online: