Please wait a minute...

Current Issue

    25 May 2021, Volume 42 Issue 5
    Papers
    Spectrum knowledge graph: an intelligent engine facing future spectrum management
    Jiachen SUN, Jinlong WANG, Guoru DING, Jin CHEN, Yuping GONG
    2021, 42(5):  1-12.  doi:10.11959/j.issn.1000-436x.2021084
    Asbtract ( 819 )   HTML ( 192)   PDF (932KB) ( 974 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To solve the issues of simple representations on spectrum situation, much dependence on artificial experience in manual management and low efficiency and accuracy in the current spectrum management, meeting the requirements of automation, precision and real time for future spectrum management, the theory and technology of knowledge graph were introduced into spectrum management.The definition of spectrum knowledge graph, the knowledge schema it depends on and its representation in the form of triples were proposed.The intelligent spectrum management framework based on spectrum knowledge graph, consisting of the graph layer, the equipment layer and the scenario layer, was constructed.Typical applications based on spectrum knowledge graph were discussed, including the recommendation system for spectrum usage, the search engine on spectrum management, and question answering for spectrum management.Experiments demonstrate the spectrum knowledge graph can play a role of guidance by spectrum knowledge in spectrum usage recommendation.

    Fastly match threat response policies based on interval decision diagram
    Lingcui ZHANG, Fenghua LI, Liang FANG, Yunchuan GUO, Zifu LI
    2021, 42(5):  13-22.  doi:10.11959/j.issn.1000-436x.2021074
    Asbtract ( 366 )   HTML ( 59)   PDF (612KB) ( 407 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Due to the inaccuracy of threat detection and the scale of response policies, it is very difficult to accurately select response policies.To address the above problem, fuzzy interval decision diagram to quickly match response policy was proposed.Firstly, the response policy was formally and fuzzily defined.Considering threat type, threat level, attack frequency and propagation mode, an algorithm with fuzzy operator was designed to construct interval decision diagram.Further, a fuzzy match algorithm was proposed to quickly select response policies.Experimental results show the efficiency of the proposed approach.

    Abnormal traffic detection method based on LSTM and improved residual neural network optimization
    Wengang MA, Yadong ZHANG, Jin GUO
    2021, 42(5):  23-40.  doi:10.11959/j.issn.1000-436x.2021109
    Asbtract ( 1245 )   HTML ( 201)   PDF (2593KB) ( 1362 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Problems such as a difficulty in feature selection and poor generalization ability were prone to occur when traditional method was exploited to detect abnormal network traffic.Therefore, an abnormal traffic detection method based on the long short term memory network (LSTM) and improved residual neural network optimization was proposed.Firstly, the features and attributes of network traffic were analyzed, and the variability of the feature values was reduced by preprocessing of network traffic.Then, a three-layer stacked LSTM network was designed to extract network traffic features of different depths.Moreover, the problem of weak adaptability of feature extraction was solved.Finally, an improved residual neural network with skipping connecting line was designed to optimize the LSTM.The defects of deep neural network such as overfitting and gradient vanishing were optimized.The accuracy of abnormal traffic detection was improved.Experimental results show that the proposed method has higher training accuracy and better visibility of data processing.The classification accuracy rates under two classifications and multiple classifications are 92.3% and 89.3%.It has the lowest false positive rate when the parameters such as precision rate and recall rate are optimal.Moreover, it has strong robustness when the sample is destroyed.Furthermore, better generalization ability can be achieved.

    Block-chain abnormal transaction detection method based on adaptive multi-feature fusion
    Huijuan ZHU, Jinfu CHEN, Zhiyuan LI, Shangnan YIN
    2021, 42(5):  41-50.  doi:10.11959/j.issn.1000-436x.2021030
    Asbtract ( 722 )   HTML ( 90)   PDF (577KB) ( 942 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Aiming at the problem that the performance of intelligent detection models was limited by the representation ability of original data (features), a residual network structure ResNet-32 was designed to automatically mine the intricate association relationship between original features, so as to actively learn the high-level abstract features with rich semantic information.Low-level features were more transaction content descriptive, although their distinguishing ability was weaker than that of the high-level features.How to integrate them together to obtain complementary advantages was the key to improve the detection performance.Therefore, multi feature fusion methods were proposed to bridge the gap between the two kinds of features.Moreover, these fusion methods can automatically remove the noise and redundant information from the integrated features and further absorb the cross information, to acquire the most distinctive features.Finally, block-chain abnormal transaction detection model (BATDet) was proposed based on the above presented methods, and its effectiveness in the abnormal transaction detection is verified.

    Secure data offloading strategy for multi-UAV wireless networks based on minimum energy consumption
    Gaofeng CUI, Yuanyuan XU, Shanghong ZHANG, Weidong WANG
    2021, 42(5):  51-62.  doi:10.11959/j.issn.1000-436x.2021085
    Asbtract ( 545 )   HTML ( 106)   PDF (577KB) ( 740 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To solve the problems of ground passive eavesdropping when ground users offload data to the multi-UAV(unmanned aerial vehicle) edge computing network, a secure data offloading strategy that minimized system energy consumption by jointly optimizing user matching and resource allocation was proposed.Considering the constraints of system delay, communication resources and computing resources, the probability of security interruption was used to restrict the security performance of the data offload process.By using block coordinate descent and successive convex approximation algorithm, the user transmission power, offload factor, UAV computing resource allocation and jamming power were jointly optimized.A pair-wise stable user matching algorithm was proposed to minimize the total energy consumption of UAV system.Simulation results demonstrate that the algorithm can realize the safe offloading of data, and has good performance in energy consumption and delay by comparing with the conventional strategies.

    Scatterer information based indoor NLOS multiple base station cooperative localization algorithm
    Liangbo XIE, Sheng LI, Mu ZHOU, Ze LI, Zengshan TIAN, Ya WANG, Changyou FU
    2021, 42(5):  63-74.  doi:10.11959/j.issn.1000-436x.2021070
    Asbtract ( 468 )   HTML ( 56)   PDF (1084KB) ( 301 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In indoor environments, the localization accuracy of existing line of sight (LOS) solutions will deteriorate severely in non-line-of-sight (NLOS) environment.In order to solve this problem, an scatterer information based indoor NLOS multiple base stations cooperative localization algorithm was proposed, which could realize localization when no LOS path was available.Firstly, the target NLOS area and scatterer blur area were collaboratively determined through multiple AP and joint scene prior information.Secondly, the areas of scatterer were further constrained according to the angle of arrival.Then, an error minimization equation based on the differential time of flight was established by employing angle, scatterer and time.Finally, a hybrid algorithm using genetic algorithm and Levenberg Marquardt algorithm was proposed to solve the objective equation.Simulation and measurement results show that the proposed algorithm can localize the target with only NLOS paths.

    Attribute-based revocable collaborative access control scheme
    Changgen PENG, Zongfeng PENG, Hongfa DING, Youliang TIAN, Rongfei LIU
    2021, 42(5):  75-86.  doi:10.11959/j.issn.1000-436x.2021058
    Asbtract ( 357 )   HTML ( 42)   PDF (524KB) ( 311 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To solve the dynamic update of access rights in attribute-based collaborative access control, a novel scheme was proposed with the revocation of attribute, user and collaborative policy.A formal definition and a security model were presented, the group-based attribute group were changed to reflect the update of rights, and further, an efficient re-encryption algorithm was used to realize the immediate revocation of attributes and users.The translation value was used to achieve the revocation of collaborative policy by update corresponding ciphertext.The security analysis shows the scheme can guarantee data confidentiality, forward/backward security, and resist collusion attack under chosen plaintext attack.Compared with the related works, the proposal achieved more complete and efficient revocation scheme.

    Optimal relay selection for full duplex SWIPT-NOMA systems with maximal throughput
    Taoshen LI, Anni SHI, Zhe WANG, Lu HE
    2021, 42(5):  87-97.  doi:10.11959/j.issn.1000-436x.2021061
    Asbtract ( 268 )   HTML ( 49)   PDF (817KB) ( 475 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To improve the performance of 5G communication system, a full duplex Internet of things (IoT) relay system model was built by introducing the non-orthogonal multi-access (NOMA) technology.For the relay system of simultaneous wireless information and power transfer (SWIPT), it was considered that the relay node can harvest the energy of the source node, the self-interference signal of the loop channel and the free energy access point (EAP), and NOMA technology was used to forward the source node signal and its own signal to different destination nodes.Based on the model, a power distribution collaboration SWIPT relay selection strategy was proposed to optimize system throughput.Firstly, the problem model was established based on the constraints of communication quality of service and transmission power of source nodes.And then, the original nonlinear 0-1 programming problem was converted into a pair of coupling optimization problem by mathematical transformation, and the optimal relay selection of outer optimization problem was solved based on the optimal solution of the internal optimization problem.Finally, an optimal relay selection algorithm was used to maximize system throughput.Simulation results show that the proposed model and strategy are superior to the traditional maximum-minimum relay selection schemes in terms of throughput gain, and the consideration of EAP can significantly improve the interrupt performance.

    Approach of target tracking combining particle filter and metric learning
    Hongyan WANG, Libin ZHANG, Guoqiang CHEN, Zumin WANG, Zhiyuan GUAN
    2021, 42(5):  98-110.  doi:10.11959/j.issn.1000-436x.2021087
    Asbtract ( 216 )   HTML ( 34)   PDF (1376KB) ( 348 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Focusing on the issue of the significant degradation of target tracking performance caused by adverse factors in complex environment, a target tracking method based on particle filtering and metric learning was proposed.First of all, a convolutional neural network (CNN) was offline-trained via the proposed method to effectively obtain the target characteristics.After that, the distance measurement matrix optimization model to minimize the prediction error could be constructed on the basis of the metric learning for kernel regression (MLKR) method, and the resultant model could be handled via using the gradient descent approach to obtain the optimal solution of the candidate target.Moreover, based on the predicted value of the optimal candidate target, the reconstruction error was calculated to construct the target observation model.Finally, a long-short-term update strategy was introduced to achieve the effective target tracking under the particle filter tracking framework.The experiment results show that the proposed method has higher tracking accuracy and better robustness in complex environments.

    Design of hybrid precoding with successive interference cancellation and alternating direction method of multipliers
    Xiongwen ZHAO, Yao LIU, Yu ZHANG, Suiyan GENG, Peng QIN, Zhenyu ZHOU
    2021, 42(5):  111-121.  doi:10.11959/j.issn.1000-436x.2021114
    Asbtract ( 210 )   HTML ( 27)   PDF (1241KB) ( 497 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To solve the problem of large power consumption caused by a large number of phase shifter (PS) in millimeter wave multi-antenna systems, a new type of dynamic connection structure was designed.With the goal of maximizing spectrum efficiency, two hybrid precoding schemes, successive interference cancellation (SIC) and successive interference cancellation-alternating direction multiplier (SIC-ADMM), were proposed.In SIC scheme, the sum-rate problem was decomposed into multiple sub-rate problems of different radio frequency links, the analog part was solved by iteration, and the digital part was solved by a low-dimensional equivalent matrix.Based on SIC scheme, an improved SIC-ADMM scheme was further proposed by studying the multi-variable sub-rate problem to achieve rapid convergence and reduce computational complexity effectively.The simulation results show that the proposed schemes have good spectrum and energy efficiencies by comparison with the existing schemes, and are more suitable for large-scale antenna systems.In addition, when a certain percentage of PS is turned off, the proposed scheme can greatly improve energy efficiency by sacrificing a small amount of spectrum efficiency.

    Parallel association rules incremental mining algorithm based on information entropy and genetic algorithm
    Yimin MAO, Qianhu DENG, Zhigang CHEN
    2021, 42(5):  122-136.  doi:10.11959/j.issn.1000-436x.2021052
    Asbtract ( 324 )   HTML ( 37)   PDF (710KB) ( 447 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Aiming at the problems that in the big data environment, the Can-tree based incremental association rule algorithm had problems such as too much space occupation of the tree structure, inability to dynamically set the support threshold, and too much time consumption during the data transfer process between the Map and Reduce stages, the Map Reduce-based parallel association rules incremental mining algorithm using information entropy and genetic algorithm (MR-PARIMIEG)was proposed.Firstly, a similar items merging based on information entropy (SIM-IE) was designed to merge similar data items, and a Can tree based on the merged data set was constructed, thereby reducing the space occupation of the tree structure.Secondly, the dynamic support threshold obtaining using genetic algorithm (DST-GA) was proposed to obtain the relatively optimal dynamic support threshold in the big data environment, and frequent itemset mining was performed according to this threshold to avoid the unnecessary time consumption caused by mining redundant frequent patterns.Finally, in the process of MapReduce parallel operation, the parallel LZO data compression algorithm was used to compress the output data of the Map stage, thereby reducing the size of the transmitted data, and finally improving the running speed of the algorithm.Experimental simulation results show that MR-PARIMIEG has better performance when mining frequent item sets in the big data environment, and it is suitable for parallel processing of larger data sets.

    BCP-based joint delegation learning model and protocol
    Sheng GAO, Kang XIANG, Youliang TIAN, Weijie TAN, Tao FENG, Xiaoxue WU
    2021, 42(5):  137-148.  doi:10.11959/j.issn.1000-436x.2021089
    Asbtract ( 346 )   HTML ( 31)   PDF (628KB) ( 362 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to realize data security sharing and reduce the computing costs of clients in data mining process, a joint delegation learning model and protocol based on BCP homomorphic encryption algorithm was proposed.Firstly, a privacy preserving method based on false records was proposed for the security of decision tree model.Secondly, in view of the vertical and horizontal distribution of data, the corresponding delegation learning protocols based on privacy preserving delegation dot product algorithm and privacy preserving delegation entropy algorithm was proposed.Finally, the security proof and the performance analysis of delegation learning protocols and decision tree model structure were given.The results show that the privacy protection method based on false records does not affect the final model construction, and the final model obtained by each client is the same as that constructed by real data.

    Research on computing offloading method for maritime observation monitoring sensor network
    Xin SU, Haoyang XUE, Yiqing ZHOU, Jinxiu ZHU
    2021, 42(5):  149-163.  doi:10.11959/j.issn.1000-436x.2021067
    Asbtract ( 368 )   HTML ( 99)   PDF (1039KB) ( 569 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Considering the differences in computing capacity and communication resources of the maritime network nodes, a maritime network connectivity probability based method was proposed for selecting edge computing service nodes.Because of the different node densities in the near-shore and far-shore scenarios, two offloading models were established accordingly.In the near-shore scenario, a multi-node cooperative offloading method was proposed by using the genetic algorithm based on maritime multi-node cooperative offloading.In the far-shore scenario, a fault-tolerant offloading method was proposed based on the particle swarm algorithm with grouping cross learning.Simulation results show that compared with conventional methods, the proposed methods save over 30% network delay and reduces about 20% network costs, which can greatly enhance the maritime user experiences.

    Comprehensive Reviews
    Survey of DNS covert channel
    Jiawen DIAO, Binxing FANG, Xiang CUI, Zhongru WANG, Ruiling GAN, Lin FENG, Hai JIANG
    2021, 42(5):  164-178.  doi:10.11959/j.issn.1000-436x.2021090
    Asbtract ( 1407 )   HTML ( 203)   PDF (859KB) ( 873 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    DNS covert channel is an important security issue that cannot be ignored in network security.The operation of using DNS to access the server is widely used in the network communication of traditional PC, smart phones and new infrastructure.Basic defense facilities such as firewalls generally do not filter DNS data too much.The ubiquity and concealment make it an ideal secret channel for attackers.It is necessary to pay attention to the existing research results and development trends.The development process was summarized into three stages, and the situation of each stage was analyzed.Formally it was defined and the construction mechanism was deeply analyzed.The existing abnormal points that cannot be bypassed were analyzed and summarized, the detection methods were summarized and divided into traditional detection methods and artificial intelligence-powered detection methods, the existing problems were raised.Based on the above classification, the construction and detection frontiers of DNS covert channel was reviewed, and an in-depth analysis was conducted from different perspectives such as development trends, technical mechanisms, and detection methods.Finally, the main research direction of the current was summarized, and its future development trend was prospected.

    Research progress of mimic multi-execution scheduling algorithm
    Zhengbin ZHU, Qinrang LIU, Dongpei LIU, Chong WANG
    2021, 42(5):  179-190.  doi:10.11959/j.issn.1000-436x.2021072
    Asbtract ( 359 )   HTML ( 39)   PDF (491KB) ( 256 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Mimic defense is the new active defense technology based on the dynamic heterogeneous redundant architecture.With inherent uncertainty, heterogeneous, redundant and negative feedback features, it can significantly improve the robustness and security of system.Among them, the scheduling algorithm is the key to mimic defense technology, which advantages and disadvantages directly affect the ability of system to resist attacks based on known or unknown vulnerabilities.Based on this, the principle and goal of mimic scheduling algorithm were firstly introduced.Then the state-of-the-art of mimic scheduling algorithms were analyzed and summarized from three aspects, such as scheduling object, scheduling quantity and scheduling timing.Finally, the future research direction and trend of mimic scheduling algorithms were prospected.

    Correspondences
    Deep reinforcement learning based task allocation mechanism for intelligent inspection in energy Internet
    Siya XU, Yifei XING, Shaoyong GUO, Chao YANG, Xuesong QIU, Luoming MENG
    2021, 42(5):  191-204.  doi:10.11959/j.issn.1000-436x.2021071
    Asbtract ( 477 )   HTML ( 80)   PDF (1131KB) ( 659 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to reduce the cost and improve efficiency of power line inspection, UAV (unmanned aerial vehicle), which use mobile edge computing technology to access and process service data, are used to inspect power lines in the energy internet.However, due to the dynamic changes of UAV data transmission demand and geographical location, the edge server load will be unbalanced, which causes higher service processing delay and network energy consumption.Thus, an intelligent inspection task allocation mechanism for energy internet based on deep reinforcement learning was proposed.First, a two-layer edge network task offloading model was established to archive joint optimization of multi-objectives, such as delay and energy consumption.It was designed by comprehensively considering the route of UAV and edge nodes, different demands of services and limited service capabilities of edge nodes.Furthermore, based on Lyapunov optimization theory and dual-time-scaled mechanism, proximal policy optimization algorithm based deep reinforcement learning was used to solve the connection relationship and offloading strategy of edge servers between fixed edge sink layer and mobile edge access layer.The simulation results show that, the proposed mechanism can reduce the service request delay and system energy consumption while ensuring the stability of system.

    Blockchain-based distributed EHR fine-grained traceability scheme
    Zuobin YING, Yuanping SI, Jianfeng MA, Ximeng LIU
    2021, 42(5):  205-215.  doi:10.11959/j.issn.1000-436x.2021033
    Asbtract ( 538 )   HTML ( 93)   PDF (669KB) ( 659 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Aiming at the key management of electronic health records (EHR) in a distributed system and user identity tracing issues, a distributed EHR fine-grained traceability scheme based on blockchain was proposed.Combining chameleon hash and zero-knowledge proof technology, the registration of nodes on the blockchain and the generation of identity certificates were realized, and the traceability of malicious users on the blockchain was realized.Besides, given the single point of failure problem of key management, the attribute-based encryption scheme of distributed ciphertext strategy was designed to achieve secure and fine-grained data access control, and multiple decryption agency blockchain nodes were set up to jointly distribute the attribute private keys of user nodes.The security analysis shows that the traceable distributed key generation attribute-based encryption algorithm based on the blockchain is adaptively secure under the random oracle model, and through experiments, the feasibility and practicability of the proposed scheme are shown.

    Research on linear solvability of network coding based cooperative recovery scheme
    Jun YIN, Xueqi SHA, Lei WANG, Dengyin ZHANG, Yuwang YANG
    2021, 42(5):  216-229.  doi:10.11959/j.issn.1000-436x.2021050
    Asbtract ( 185 )   HTML ( 22)   PDF (858KB) ( 407 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The linear solvability of network coding based cooperative recovery/repair (CR) scheme was studied.Specifically, the solvability analysis model for network coding based CR scheme was established, the upper and lower bounds of the probability for any receiver to decode all original information under arbitrary order of Galois coding field were proposed and proved, and an on-line solvability judgement algorithm was designed by improvement of Gauss-Jordan algorithm.Numerical results validate the compactness of the proposed upper and lower bounds as well as the short-time decoding waiting delay of the improved Gauss-Jordan algorithm.Node deployment experiments show that the decoding complexity of the improved Gauss Jordan algorithm is reduced by 35% compared with the traditional Gauss algorithm.

Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Editor-in-Chief: Zhang Ping
Associate Editor-in-Chief:
Zhang Yanchuan, Ma Jianfeng, Yang Zhen, Shen Lianfeng, Tao Xiaofeng, Liu Hualu
Editorial Director: Wu Nada, Zhao Li
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Post: 100079
Tel: 010-53933889、53878169、
53859522、010-53878236
Email: xuebao@ptpress.com.cn
Email: txxb@bjxintong.com.cn
ISSN 1000-436X
CN 11-2102/TN
Visited
Total visitors:
Visitors of today:
Now online: