Please wait a minute...

Current Issue

    20 September 2018, Volume 34 Issue 9
    Topic:quantum secure communication technology and application
    Analysis on the progress of quantum secure communication test evaluation and standardization
    Junsen LAI,Bingbing WU,Rui TANG,Mengyu Ding,Wenyu ZHAO,Haiyi ZHANG
    2018, 34(9):  2-9.  doi:10.11959/j.issn.1000-0801.2018245
    Asbtract ( 354 )   HTML ( 8)   PDF (804KB) ( 569 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Quantum key distribution (QKD) based quantum secure communication (QSC) is one of the promising solutions for improving information security.With the development of experimental network construction and demonstrational application,the demand of QSC test evaluation and standardization is becoming more urgent.Based on the introduction of technology and architecture of QSC system,the latest progress of QSC test evaluation and standardization was reviewed,typical questions in test evaluation and standardization were analyzed,and development trends and prospects were also discussed.

    Quantum secure communication network architecture and mobile application solution
    Jianquan WANG,Zhangchao MA,Xinzhong LI,Lei SUN,Changwei HU
    2018, 34(9):  10-19.  doi:10.11959/j.issn.1000-0801.2018256
    Asbtract ( 653 )   HTML ( 29)   PDF (1294KB) ( 994 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    As the first practical representative technology in the new quantum revolution,quantum key distribution (QKD) brings a promising solution to achieve long-term security guarantee,which has made series of progress from research to practical deployment and applications in recent years.The architecture design of quantum secure communication network was firstly discussed,which extended point-to-point QKD link to multi-user QKD network.Furthermore,combining with the classical cryptography,an enhanced solution was proposed to apply the quantum key generated by QKD to the mobile terminals,which offered the possibility to apply QKD in general mobile applications.

    Traffic planning of backbone link of quantum secure communication network
    Lei YUAN,Meisheng ZHAO
    2018, 34(9):  20-27.  doi:10.11959/j.issn.1000-0801.2018255
    Asbtract ( 322 )   HTML ( 4)   PDF (726KB) ( 385 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Quantum secure communication network is a new kind of security network.It is a new problem that how to improve the bandwidth utilization ratio of the backbone link of quantum secure communication network and the network performance-price ratio by reasonable traffic planning method.The particularity of traffic planning in the quantum secure communication network was analyzed,and a traffic planning model was given.Based on this model,the user wide area encrypted communication bandwidth could be planned in the case of determining the key distribution bandwidth of the backbone link.At the same time,the model could be used to adjust the bandwidth of key distribution in network bottleneck links and improve the network performance.Finally,the application of the proposed flow planning method was demonstrated by numerical simulation.

    Research and experiment of open quantum cryptography communication system architecture and co-fiber transmission technology
    Jianjun TANG,Junjie LI,Chengliang ZHANG,Yuhua CONG,Haomin GONG
    2018, 34(9):  28-36.  doi:10.11959/j.issn.1000-0801.2018253
    Asbtract ( 585 )   HTML ( 7)   PDF (1427KB) ( 817 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Based on the study of the mechanism of quantum encryption system,the system architecture of open quantum cryptographic communication was proposed.In order to better integrate with the existing communication system,a quantum key distribution (QKD) system and a large capacity optical communication co-fiber transmission scheme were proposed,and the QKD system and 80×100 Gbit/s DWDM were verified through experiments.The feasibility of the system common fiber transmission was realized under the condition of ultra 100 km common fiber transmission,the QKD bit rate >1.0 kbit/s and 8 Tbit/s DWDM system without error bit and the practical threshold of the commercial encryption device key rate>1.0 kbit/s was achieved.

    Noise suppression in the co-propagation of quantum signals and classical optical signals
    Yongmei SUN,Jianing NIU,Yuefeng JI
    2018, 34(9):  37-47.  doi:10.11959/j.issn.1000-0801.2018257
    Asbtract ( 409 )   HTML ( 8)   PDF (1184KB) ( 632 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    At present,the technologies of device and system required for the fiber-based point-to-point quantum key distribution (QKD) are gradually becoming mature and showing the trend of commercial application.Therefore,how to multiplex quantum signals and classical optical signals in a single fiber to greatly increase the capacity and save fiber resources has been becoming one of the hotspots of academia in recent years.The noise impairments in the co-propagation of quantum signals and classical optical signals over a single fiber were mainly studied.Firstly,the influences of the main noises,four-wave mixing (FWM) and Raman scattering on the quantum channels were analyzed.Next,an unequal-frequency-spacing-based FWM noise suppression algorithm and a wavelength assignment algorithm for joint suppression of FWM and Raman scattering were proposed for different application scenarios with different channel space and transmission distance.Finally,the superiorities of the proposed algorithms were verified through numerical simulations.The research results provide feasible noise suppression schemes for different application scenarios in the future.

    Study of “quantum + classical” wavelength division multiplexing technique in optical network
    Yi QIAN,Xiangyu LIN,Dong WANG,Xiaobao HU,Jinjian CHEN,Wenhao CHEN
    2018, 34(9):  48-62.  doi:10.11959/j.issn.1000-0801.2018258
    Asbtract ( 898 )   HTML ( 20)   PDF (2245KB) ( 639 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The co-propagation of quantum key distribution (QKD) and classical optical communication via wavelength division multiplexing (WDM) was studied,based on 40 MHz system clock decoy BB84 QKD.In the bi-directional CWDM scheme,1.2 kbit/s key generation rate was achieved while the quantum wavelength (1 550.12 nm) ,synchronization wavelength (1 310 nm),forward direction error-free 100 Mbit/s data wavelength (1 590 nm) and backward direction error-free 100 Mbit/s data wavelength (1 610 nm) were multiplexed over 70 km fiber.In the dual-fiber unidirectional CWDM scheme,1.58 kbit/s key generation rate was achieved while the quantum wavelength (1 550.12 nm),synchronization wavelength (1 610 nm) and forward direction error-free 10 Gbit/s data wavelength (1 310 nm) were multiplexed over 55 km fiber.In the dual-fiber unidirectional DWDM scheme,1.16 kbit/s key generation rate was achieved while the quantum wavelength (1 550.12 nm),synchronization wavelength (1 610 nm) and two forward direction error-free 100 Gbit/s DP-QPSK data wavelength (emulated,1 551.72 nm and 1 552.52 nm) were multiplexed over 70 km fiber.

    research and development
    A low complexity precoding based on weighted two diagonal iteration in massive MIMO system
    Haiyan CAO,Dong ZHOU,Fangmin XU,Xin FANG,Xiumin WANG
    2018, 34(9):  63-69.  doi:10.11959/j.issn.1000-0801.2018187
    Asbtract ( 806 )   HTML ( 8)   PDF (1007KB) ( 471 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In massive MIMO systems,with the increase of the number of users and antennas,the complexity of the downlink zero forcing (ZF) precoding increases due to the existence of large matrix inversion.In order to reduce the complexity,an improved weighted two diagonal iteration precoding algorithm based on the Jacobi iterative algorithm was proposed.The low-two diagonal matrix was taken as iterative matrix,and the iterative results were weighed addition with the last results to accelerate the convergence speed of the iteration.According to the diagonally dominant characteristic of channel matrix in massive MIMO systems,the first term of the Neumann approximation of matrix inversion was used as the initial value of the iteration to accelerate the iteration further.Compared with the traditional ZF precoding,the proposed scheme can reduce the complexity with an order of magnitude and ensure the performance of the precoding scheme.

    Performance analysis of 60 GHz pulse multiuser communication system based on cross-layer strategy
    Xuehua LI,Chen SHEN,Yuanyuan YAO
    2018, 34(9):  70-77.  doi:10.11959/j.issn.1000-0801.2018224
    Asbtract ( 744 )   HTML ( 1)   PDF (1045KB) ( 368 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Due to the advantages of license-free,strong directionality,high system capacity,and high transmission rate of Gbit/s,60 GHz band is listed as one of the candidate bands for new radios (new radio).In 5G ultra-dense networking scenario,the randomness of node switching caused by the decrease of the distance between network nodes may cause severe multiple access interference and resource mismatch problems.In this regard,based on the concept of cross-layer collaborative design,a resource scheduling strategy based on fairness was proposed.The multiple access performance of the strategy was simulated in a 60 GHz pulsed wireless communication system based on TH-PAM (time hopping pulse amplitude modulation).Simulation results show that compared with the system with pure physical layer optimization algorithm,the multiple access system which adopts this strategy shows stronger fairness and lower system error rate,but it needs increase the transmission power to meet the requirements of the coverage of the equivalent communication system.That is,there is a certain trade-off between the energy and fairness of the system,which can be used to guide the structure and deployment of the actual communication system.

    Optimal approach of suppressing WSN malware propagation based on cloud computing and dynamic Bayesian game
    Shigen SHEN,Sheng FENG,Haiping ZHOU,Longjun HUANG,Keli HU,Qiying CAO
    2018, 34(9):  78-86.  doi:10.11959/j.issn.1000-0801.2018259
    Asbtract ( 270 )   HTML ( 5)   PDF (923KB) ( 650 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To apply intrusion detection system (IDS) efficiently so as to suppress WSN malware propagation,a cloud-based network infrastructure for realizing functions of WSN IDS was presented,considering the real basis that the resources of WSN nodes were limited whilst the resources of cloud computing platform were almost unlimited.Based on the analysis of the game process between a sensor node and the corresponding WSN IDS agent,a WSN-malware-propagation-suppression game model was constructed by employing the dynamic Bayesian game,and the requirements of energy consumption in sending monitored data and privacy protection for sensor nodes were satisfied.According to the proposed game type and refined Bayesian equilibrium,the optimal strategie for suppressing WSN malware was proposed as well the algorithm for actual application was given.The factors that influence WSN IDS agents to select their optimal strategies were analyzed,and the experimental foundation was provided for the application of the proposed approach.

    Low-complexity variable step-size sign algorithm based on Weibull distribution function
    Rui ZHANG,Guchen SHI,Banteng LIU,Yourong CHEN
    2018, 34(9):  87-96.  doi:10.11959/j.issn.1000-0801.2018223
    Asbtract ( 298 )   HTML ( 2)   PDF (1038KB) ( 388 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The performance of the traditional second-order statistics based channel estimation methods degrade seriously in the presence of impulsive noises.In order to deal with this problem,a Weibull distribution function based variable step-size sign algorithm for channel estimation under impulsive noises was proposed.The proposed method was robust against impulsive noises and it could improve the convergence speed of the sign algorithm with the Weibull distribution function based variable step-size method.Computational complexity analysis and simulation results demonstrate that the proposed algorithm can achieve the same steady-state estimation error with faster convergence speed and lower computational complexity.

    Pre-sorting method of complex system radar signals
    Zeheng YUAN,Runlan TIAN,Xiaofeng WANG
    2018, 34(9):  97-104.  doi:10.11959/j.issn.1000-0801.2018225
    Asbtract ( 368 )   HTML ( 8)   PDF (893KB) ( 450 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The overall pulse parameters of complex system radar signals are varied and overlap seriously.The accuracy rate of the method using overall pulse parameter sorting is seriously decreased,but the intra pulse characteristic parameters are relatively stable.A method for pre-sorting radar signals in complex systems was proposed by extracting the phase coefficient of the intra-pulse characteristic parameters of the signal,combining the more stable inter-pulse parameters,and using the improved support vector clustering algorithm.Simulation results show that in the pre-sorting of complex system radar signals,the problem of increasing-batch can be solved effectively and the accuracy of sortingcan be improved.

    Mutual coupling error modeling and correction of shared aperture interleaved sparse array antennas
    Junming ZHUANG,Longjun LI
    2018, 34(9):  105-110.  doi:10.11959/j.issn.1000-0801.2018186
    Asbtract ( 279 )   HTML ( 3)   PDF (960KB) ( 467 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The shared aperture interleaved sparse array antenna is an effective way to implement a multi-function array antenna.The existing parameterized mutual coupling elimination methods are all developed for uniform array antennas.The mutual coupling matrix which is studied is a regular square matrix and is not applicable to the mutual coupling matrix model of the shared aperture interleaved sparse array antenna.After fully considering the speciality of “sparse” and “azimuth dependence” of mutual coupling in sub-arrays of a shared aperture interleaved sparse array antenna,the conventional mutual coupling matrix extension was expressed as “non-square” “enhanced mutual coupling matrix”.Coupling effects between subarrays and subarrays in interleaved arrays of sparse arrays were modeled,and the modeling and correction of mutual coupling errors in shared aperture sparse array antennas were finally achieved through the parameterization of “enhanced mutual coupling matrix”.Simulation results verify the effectiveness and feasibility of the proposed method.

    Analysis and verification on one-dimensional location performance of shortwave single station
    Ting LI
    2018, 34(9):  111-117.  doi:10.11959/j.issn.1000-0801.2018228
    Asbtract ( 208 )   HTML ( 3)   PDF (761KB) ( 421 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the low sensitivity of beam field and noise-sensitive of high resolution spatial spectrum algorithm,the low location precision under the complex electromagnetic environment becomes a severe problem.The Capon and Root-MUSIC (CRMU) joint algorithm was proposed to research the one-dimensional location technology.The proposed algorithm could not only avoid the high operation caused by the peak search but also suppress the noise,which contributed to reduce the root mean square error (RMSE) of azimuth.Then,the simulation results demonstrate that the RMSE of the proposed algorithm is at least 0.2 degrees less than that of the Root-MUSIC algorithm.In addition,the location error of the proposed algorithm is less than 3% in the practical application of one-dimensional location of shortwave single station,which satisfies the demand that the location error should be below 5%.

    An intelligent migration mechanism for MEC application instances based on differentiated services
    Haipeng LIU
    2018, 34(9):  118-129.  doi:10.11959/j.issn.1000-0801.2018242
    Asbtract ( 558 )   HTML ( 14)   PDF (810KB) ( 384 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Based on the application instance smart relocation scheme proposed by ETSI,a differentiated service based andenhanced scheme was put forward.Four state message synchronization modes were defined according to the number of users to be migrated and the number of services,so that operators could have greater flexibility in handling users and services with different service performance priority requests,providing more choices for differentiated services and billing.

    summarize
    An overview of ultra-wideband indoor positioning algorithms
    Hongmei ZHAO,Jielei ZHAO
    2018, 34(9):  130-142.  doi:10.11959/j.issn.1000-0801.2018227
    Asbtract ( 621 )   HTML ( 26)   PDF (3238KB) ( 2506 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The multipath effect,NLOS and other factors,will cause a certain degree of measurement error in ultra-wideband positioning system.Various positioning technologies and their implementation principles were introduced in detail.And focusing on the time difference of arrival(TDOA)technology with better positioning performance,from the model to solve for all kinds of localization algorithm based on TDOA were systematically introduced,including the implementation principle and design process of various algorithms,and the performance analysis of the various algorithms under LOS and NLOS.

    Wide Angle of operation technology
    Research and practice on self-organization architecture of smart pipe in mobile internet
    Fei XUE,Yuhui XU,Liang ZHANG,Ying LI
    2018, 34(9):  143-152.  doi:10.11959/j.issn.1000-0801.2018243
    Asbtract ( 1140 )   HTML ( 9)   PDF (1376KB) ( 432 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    According to the 3GPP specification,a new self-organization network of smart pipe in mobile internet was addressed.By introducing integrated policy control function,the external signals were supervised periodically,and the best optimized network strategies were predicted by the recurrent neural network algorithm,delivered by PCRF,and updated automatically with feedback of the regulations.This solution was effectively applied in scenarios such as speed limit of large traffic users,network protection under high load,and online advertisement recommendation etc.

    Resource management scheme of power fiber to the home network slicing
    Weichun GE,Huanhuan LUO,Guiping ZHOU,Yingjie WANG,Xiangyu KONG,Luyao GUAN,Chuang SONG,Min ZHANG,Qing LI
    2018, 34(9):  153-159.  doi:10.11959/j.issn.1000-0801.2018221
    Asbtract ( 380 )   HTML ( 7)   PDF (1004KB) ( 408 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to solve the problems,such as inflexible control and management,the variety of services and complex quality of services,a network slicing resource management scheme based on PFTTH network and corresponding multi-services dynamic resource allocation algorithm based on network-slicing-aware was proposed.Simulation results show that the proposed scheme and algorithm can effectively implement QoS guarantee of different network slicing,significantly increase the network resource utilization.

    Design of reliability for layered decoupled virtual nodes
    Yangchun LI,Yongbing FAN,Nan CHEN,Tian CHEN
    2018, 34(9):  160-168.  doi:10.11959/j.issn.1000-0801.2018206
    Asbtract ( 170 )   HTML ( 4)   PDF (1489KB) ( 416 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Firstly,the concept of random events was introduced into the communication process,and the serial and parallel reliability algorithms were introduced.Secondly,the reliability design of virtual hosts,clusters and spine-leaf switching networks and their calculation methods were analyzed.Finally,the connection based on each component unit was analyzed.Based on the connection relationships among the components,the reliability design scheme of virtual nodes and its reliability algorithm was proposed.

    Microservice system based on container cloud
    Di YANG
    2018, 34(9):  169-178.  doi:10.11959/j.issn.1000-0801.2018168
    Asbtract ( 763 )   HTML ( 32)   PDF (1159KB) ( 628 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Lack of the procedure of deploying containerized services in microservice systems,the continuous delivery only put executable codes or programs to the production environment.There is no solution for problems of the test version and configuration updates.The microservice system based on container cloud was proposed.Continuous integration for containerized services and the method that supports debugging tests for multi-version of multi-services were designed.Goals of non-stop production and seamless switch between versions were achieved.These services were monitored and managed by an operation and maintenance platform.After production environment verification,the proposed system supports services running without stop and immediate response and satisfies the needs of production.

    Security monitoring system of intelligent substation based on IoT
    Yeshen HE,Kun LIANG,Wei TAN,Xin HU
    2018, 34(9):  179-185.  doi:10.11959/j.issn.1000-0801.2018119
    Asbtract ( 405 )   HTML ( 10)   PDF (1127KB) ( 712 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Through the deployment of the internet of things,such as intelligent terminal,sensing sensor etc.,in the intelligent substation,a scene awareness mechanism was established under the mixed conditions to intelligent functions,such as the smart sensing of substation environment,infrastructure support,personnel exchanges,abnormal conditions judgments and other factors,and the multi-dimensional depth perception was realized.Meanwhile,interoperability of the perception network,the establishment of intelligent substation security monitoring system could be achieved by using wired and wireless fusion of multi-state communication technology.The system can multi-dimensionally perceive and monitoring the security of substation environment,which effectively enhances the smart substation intelligent monitoring level to ensure safe and stable operation of the substation.

    Ecologic planning and application of broadband access network based on geographic grid
    Qi ZHANG
    2018, 34(9):  186-192.  doi:10.11959/j.issn.1000-0801.2018112
    Asbtract ( 228 )   HTML ( 4)   PDF (2079KB) ( 291 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the development of broadband services,fixed broadband access network is at the top speed in construction.Multi-carriers pay more attention on both network scale and ability to keep the necessary advantages in access availability and effectiveness.On the other hand,the network construction is also depended on both the co-operation with service development and the match with fundamental resources.The balance of the above factors is the key role in actual network planning and construction.Considering the present planning method of broadband access network,the bottleneck was analyzed and concluded.Based on multi-dimension geographic grid,the ‘cubic model’,containing services,network ability and fundamental resources,were also developed and introduced.Finally,supported by the big data of network statistic,the model was applied and also verified in actual planning environment on the according self-researched planning platform.

Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Posts and Telecom Press Co., Ltd.
Publisher: Beijing Xintong Media Co., Ltd.
Editor-in-Chief: Chen Shanzhi
Editorial Director: Li Caishan
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Postal Code: 100079
Tel: 010-53879277
        010-53879278
        010-53879279
E-mail: dxkx@ptpress.com.cn
Mailing Code: 2-397
ISSN 1000-0801
CN 11-2103/TN
Visited
Total visitors:
Visitors of today:
Now online: