Please wait a minute...

Current Issue

    21 January 2022, Volume 42 Issue 12
    Papers
    QML: a hybrid spatial index structure
    Dong CUI, Qiaoyan WEN, Hua ZHANG, Huawei WANG
    2021, 42(12):  1-16.  doi:10.11959/j.issn.1000-436x.2021229
    Asbtract ( 377 )   HTML ( 40)   PDF (3116KB) ( 464 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to enrich the functionalities of existing learned multidimensional indexes and improve the efficiency, the dynamic data segmentation algorithm DDSA was proposed, which could preserve the data distribution characteristics.A hybrid spatial index was constructed by combining the QuadTree and Z-order curve (QML).The range query algorithm were designed and KNN query algorithm respectively.The proposed index allowed flexible fast queries and updates with preserving the characteristics of data distribution.Experimental results show that QML optimizes the query efficiency on the premise of achieving rich functionalities, and the time complexity of data update is O(1).Compared with R*-tree, the storage consumption of QML is reduced by about 33%, and the update efficiency is improved by 40%~80% .The query efficiency is similar to the optimal tree Index.

    Identity-based puncturable signature scheme
    Dongmei YANG, Yue CHEN, Jianghong WEI, Xuexian HU
    2021, 42(12):  17-26.  doi:10.11959/j.issn.1000-436x.2021223
    Asbtract ( 383 )   HTML ( 60)   PDF (1905KB) ( 461 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To overcome the shortcomings of available forward-secure identity-based signature (IBS) scheme in terms of actual practicability and secret key update efficiency, the notion of identity-based puncturable signature (IBPS) scheme was proposed based on the idea of puncturable public-key encryption scheme.Specifically, the syntax and security notion of IBPS were given, and then a concrete IBPS scheme was constructed based on Bloom filter.Under the computational Diffie-Hellman assumption, the proposed scheme achieved the existential unforgeability in the random oracle model.The performance analysis and implementation results demonstrate that, compared with traditional forward-secure IBS schemes, the proposed scheme provides more practical fine-grained forward secrecy, and has higher efficiency of secret key update.

    Index modulation aided frequency hopping anti-jamming and encryption method based on rotation scrambling
    Xinjin LU, Jing LEI, Yuxin SHI
    2021, 42(12):  27-34.  doi:10.11959/j.issn.1000-436x.2021239
    Asbtract ( 168 )   HTML ( 27)   PDF (2488KB) ( 294 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to improve the anti-jamming ability and security of the wireless communication system, an index frequency-hopping anti-interference encryption method based on rotation scrambling was designed, which could be simply called encrypted index modulation frequency hopping spread spectrum (EIM-FHSS).Firstly, the wireless secret key was used to control multiple orthogonal frequency hopping patterns to determine the available frequencies at the current moment.The index of the active frequency (the frequency point with the modulation symbol) was used to transmit the bit information.Secondly, the secret key was used to employ scrambling encryption on the mapping table between information bits and the indexes, to ensure the security of the index bits.Finally, constellation rotation encryption was used on the symbols transmitted on the active frequency in the scheme, which ensured the security of symbol bits.Theoretical analysis and simulation results show that the proposed EIM-FHSS method has stronger security and anti-jamming abilities than the traditional IM-FHSS methods.

    Side channel leakage assessment with the Bartlett and multi-classes F-test
    Yaru WANG, Ming TANG
    2021, 42(12):  35-43.  doi:10.11959/j.issn.1000-436x.2021235
    Asbtract ( 257 )   HTML ( 30)   PDF (1198KB) ( 437 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to solve the problem that when test vector leakage assessment (TVLA) technology is used for side channel leakage detection, the mean difference between the two groups of power consumption samples (fixed plaintext and random plaintext) is small, and the t-test may miss detection and lead to false negative evaluation.The Bartlett and multi-classification F-test side channel leakage assessment method (Bartlett-F test) was proposed.In the Bartlett-F test, the Bartlett-test was used to the power samples with greater variance difference than mean difference to solve the problem of missing detection, and the multi-classification F-test was used to the power samples with greater mean difference than variance difference to solve the problem of false negative evaluation.In the test, there is leakage if the P-value is less than the threshold.The experimental results show that when the mean difference is less than the variance difference, the sample size required by Bartlett-test is 1.5×104 when the P-value of Bartlett-test is less than the threshold, while the sample size required by t-test is larger.When the variance difference is less than the mean difference, the sample size required by t-test is 2.0×102 when the P-value of t-test is less than the threshold, while the sample size required by F-test is only 1/10 of t-test.Therefore, Bartlett-F test can solve the problems of TVLA technology in leak detection.

    Efficient PAPR reduction algorithm in OFDM based on nonlinear piecewise companding
    Zhitong XING, Yun LI, Deyi PENG, Bensi ZHANG, Kaiming LIU, Yuan’an LIU
    2021, 42(12):  44-53.  doi:10.11959/j.issn.1000-436x.2021230
    Asbtract ( 242 )   HTML ( 32)   PDF (1482KB) ( 214 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Focusing on the high peak-to-average power ratio (PAPR) problem in orthogonal frequency division multiplexing (OFDM) systems, a generalized hybrid of rayleigh and sine distribution based nonlinear companding algorithm for PAPR reduction in OFDM systems was provided.For the proposed algorithm, signal samples with small amplitudes remain unchanged.For the signal samples with large amplitudes, their probability density function were changed from rayleigh distribution to sine-based distribution.The proposed algorithm can effectively reduce the PAPR, and at the same time, maintain the bit error rate performance and power spectral density performance.Simulation results indicate that with the same PAPR performance, compared with referred companding schemes, the proposed algorithm has lower bit error rate and out of band radiation.

    Joint channel and impulsive noise estimation method for MIMO-OFDM systems
    Xinrong LYU, Youming LI, Qiang GUO
    2021, 42(12):  54-64.  doi:10.11959/j.issn.1000-436x.2021238
    Asbtract ( 215 )   HTML ( 40)   PDF (957KB) ( 288 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Aiming at the impulsive noise occurring in MIMO-OFDM systems, a joint channel and impulsive noise estimation method based on the multiple measurement vector compressed sensing theory was proposed.The channel impulse response and the impulsive noise were combined to form a row sparse matrix to be estimated, and a multiple measurement vector compressed sensing model based on all subcarriers was constructed.As the measurement matrix was partially unknown due to the presence of unknown transmitted symbols in data tones, the multiple response sparse Bayesian learning theory and expectation maximization framework were adopted to jointly estimate the channel impulse response, the impulsive noise, and the data symbols which were regarded as unknown parameters.Compared with the existing methods, the proposed method not only utilizes all subcarriers but also does not use any a priori information of the channel and impulsive noise.The simulation results show that the proposed method achieves significant improvement on the channel estimation and bit error rate performance.

    Research on 5G-TSN joint scheduling mechanism based on radio channel information
    Lei SUN, Jianquan WANG, Shangjing LIN, Zhangchao MA, Wei LI, Liang Qilian, Rong HUANG
    2021, 42(12):  65-75.  doi:10.11959/j.issn.1000-436x.2021224
    Asbtract ( 623 )   HTML ( 59)   PDF (1473KB) ( 414 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To solve the deterministic transmission problem of periodic and time-triggered industrial traffics in wireless environment, a joint optimization mechanism of 5G and time sensitive networking based on radio channel information was considered.Based on improved traffic process architecture in time sensitive network, the traffics bearing on radio channel with worse quality could be processed in priority.In 5G networks, the relationship among radio channel quality, resource numbers and the maximum transmission times over radio was modeled, and the maximum transmission times satisfied data transmission reliable probability could be computed from the model,then the transmission time budget in 5G system for multiple industrial traffics bearing on diverse radio resources could be adjusted dynamically by retransmission factors.Simulation results demonstrate that the proposed joint scheduling mechanism achieves less TSN transmission delay of industrial traffics bearing on worse quality radio resources and can eliminate jitter caused by retransmission due to variation of 5G radio channel, which can guarantee end-to-end deterministic delay for industrial traffics.

    Interdomain routing instability traceable detection method based on route state causal chain
    Di CHEN, Han QIU, Wanli ZHANG, Huihu ZHU, Junhu ZHU, Qingxian WANG
    2021, 42(12):  76-87.  doi:10.11959/j.issn.1000-436x.2021221
    Asbtract ( 214 )   HTML ( 24)   PDF (1995KB) ( 389 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To solve the problem of detection time limitation caused by route update delay and the possible tampering of traceability information in existing route instability traceable detection methods, an interdomain routing instability traceable detection method based on route state causal chain was proposed.By analyzing the causal relationship of route states, the route state update token that can describe the route state change and transfer process was defined.Route state update tokens were published and stored in the blockchain during the route update propagation to construct the decentralized and tamper-resistant route state causal chain.By analyzing the route state causal chain, the type of route instability was judged, and the failed links or policy-conflict AS sequences were located to achieve route instability traceable detection.The capability of proposed method to trace the failure link and the policy-conflict AS sequence which could lead to convergence delay and persistent route oscillation respectively was proven theoretically, and validating experiment based on software routers in typical topology was carried out.The experimental results demonstrate that the proposed method can timely detect route instability caused by the dynamic changes of both policy and topology, and determine type and root cause of route instability without modifying BGP.

    Research on single snapshot DOA estimation algorithm based on incompletely overlapped signal
    Mingchao QU, Weijian SI, Yazhi YUAN
    2021, 42(12):  88-95.  doi:10.11959/j.issn.1000-436x.2021232
    Asbtract ( 210 )   HTML ( 26)   PDF (739KB) ( 364 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To address the problem that traditional direction-of-arrival (DOA) estimation algorithms did not fully utilize the signal characteristics of active decoys and radar, which led to poor angular resolution of anti-radiation missile, a single snapshot direction finding algorithm for polarization sensitive array based on incompletely overlapped signals was proposed.Specifically, the signal data received by the array was firstly processed by polarization smoothing.After that, exploiting the signal characteristics of incompletely overlapped signals of radar and active decoys, the constructed conjugate replication augmented matrix was differentiated to obtain each signal’s conjugate replication augmented matrix.Finally, DOA estimation results of each signal were acquired by solving a convex optimization problem.Numerical results demonstrate that the proposed method shows superior estimation accuracy and lower computational complexity compared with the conventional algorithms.

    Efficient handover authentication and secure key-updating mechanism for B5G networks
    Qimei CUI, Wenjing ZHAO, Xiaoyang GU, Zengbao ZHU, Xiaoxuan ZHU, Xiaofeng TAO, Wei NI
    2021, 42(12):  96-108.  doi:10.11959/j.issn.1000-436x.2021240
    Asbtract ( 440 )   HTML ( 47)   PDF (2204KB) ( 501 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to solve the problems of 5G network handover authentication and key update mechanism, such as lacking of forward security, being vulnerable to bypass attack and having signaling congestion, for 5G enhanced (B5G) network, an efficient handover authentication and security key-updating mechanism based on no certificate was proposed.The certificateless key agreement mechanism was introduced in the network edge side, which made the mobile terminals in-itiate the key-updating request actively and complete the whole certificateless key-updating process on the fly.The security of the key-updating mechanism was proved theoretically based on the Diffie-Hellman problem under the eCK security model.Simulation results demonstrate that the proposed mechanism not only meets the forward security of mobile terminal key management, but also has lower communication and computing overheads compared with other similar handoff authentication.

    Vehicular delay tolerant network routing algorithm based on optimized multi-period Bayesian network
    Jiagao WU, Yahang GUO, Shenlei CAI, Linfeng LIU
    2021, 42(12):  109-120.  doi:10.11959/j.issn.1000-436x.2021222
    Asbtract ( 171 )   HTML ( 14)   PDF (1076KB) ( 313 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Aiming at the instability of communication link caused by the high-speed movement of vehicle nodes in vehicular delay tolerant network (VDTN), considering the characteristics of regularity and periodicity of vehicle nodes movement, a VDTN routing algorithm based on optimized multi-period Bayesian network (BN) was proposed.Firstly, a new multi-period BN model and its dynamic reward mechanism for node classification were proposed to describe the movement pattern of vehicle nodes with higher accuracy.Then, two novel time-optimal-partition algorithms of multi-period BN were proposed including binary search K2GA (BS-K2GA) algorithm and simulated annealing K2GA (SA-K2GA) algorithm, where BS-K2GA algorithm had the advantages of simplicity and efficiency, while SA-K2GA could effectively avoid falling into the local optimal solution and further optimize the performance.The simulation results show that the proposed VDTN routing algorithm based on optimized multi-period BN model can significantly improve the message delivery ratio and reduce the delivery delay.Thus, the effectiveness of the approach is validated.

    Pol-CCES based modulation recognition method under impulsive noise
    Jiang’an DAI, Shengyang LUAN, Minglong ZHAO, Zhaojun ZHANG, Tianshuang QIU
    2021, 42(12):  121-133.  doi:10.11959/j.issn.1000-436x.2021231
    Asbtract ( 170 )   HTML ( 14)   PDF (7827KB) ( 115 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To realize signal classification in impulsive noise environment, a modulation recognition scheme based on polished cyclic correntropy spectrum and shallow residual network was proposed.The proposed scheme not only has low computational complexity but also shows robustness to impulsive noise.Simulation results demonstrate the proposed solution’s superior performance under impulsive noise, even when the generalized signal-to-noise ratio is very low.

    Research on caching strategy based on transmission delay in Cell-Free massive MIMO systems
    Rui WANG, Min SHEN, Yun HE, Xiangyan LIU
    2021, 42(12):  134-143.  doi:10.11959/j.issn.1000-436x.2021234
    Asbtract ( 282 )   HTML ( 17)   PDF (1029KB) ( 423 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To meet the ultra-low latency and ultra-high reliability requirements of users in the future mobile Internet, the wireless caching technology was combined with Cell-Free massive MIMO systems.The caching model was designed based on AP cooperative caching and regional popularity evaluation.The transmission delay expression involving AP clustering, cooperative caching, and regional popularity was derived, and the content placement problem was expressed as total content transmission delay minimization.Through the demonstration of the NP-hard and submodular monotony of the optimization problem, the greedy algorithm-based optimization strategy was proposed.Simulation results show that the proposed strategy can effectively reduce the content transmission delay and improve the cache hit rate.

    Suppression of co-channel interference in NGSO constellation system with interference alignment
    Bing DU, Jiawang LI, Xianmei WANG, Wei LI, Xiangnan LIU, Haijun ZHANG
    2021, 42(12):  144-151.  doi:10.11959/j.issn.1000-436x.2021236
    Asbtract ( 280 )   HTML ( 23)   PDF (1174KB) ( 373 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Aiming at the problem that in the current space, non-geostationary satellite orbit (NGSO) constellation systems were increasing day by day, there are more and more satellite networks nearby orbiting using the same frequency band, and the problem of co-channel interference between NGSO constellation systems and between NGSO constellation systems and traditional geostationary satellite orbit (GSO) constellation systems had become increasingly serious, the interference alignment algorithms of wireless communication was proposed, which matches the precoding matrix of the characteristic channel at the transmitter according to the transmission channel information of the satellite network to alleviate the co-channel interference problem of the low-orbit satellite network.The ChinaSat, OneWeb and Fortran systems were used to simulate and compare the interference values before and after using the interference alignment algorithms, which proves the feasibility of the proposed method and provides a reference for future research on such problems.

    Low-cost group-based identity security authentication protocol for NB-IoT nodes
    Xiangmao CHANG, Jun ZHAN, Zhiwei WANG
    2021, 42(12):  152-162.  doi:10.11959/j.issn.1000-436x.2021228
    Asbtract ( 253 )   HTML ( 31)   PDF (1233KB) ( 433 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To address the problem of huge number of signaling requests when large-scale devices request authentication in NB-IoT network, a low-cost group identity security authentication protocol based on Schnorr aggregate signature and Chinese reminder theorem was proposed.The protocol enabled the server to perform one-time authentication of the device group with a size-fixed group authentication request, which effectively reduced the bandwidth consumption of the authentication request.The protocol used a session key distribution mechanism based on the Chinese remaining theorem, allowing the server to complete the distribution of keys for each device in the group by size-fixed message.The results of security verification and the performance analysis show that the proposed protocol has reliable safety and superior performance in terms of transmission load and bandwidth consumption.

    Balanced optimal almost binary sequence pairs of period N≡1(mod4)
    Xiuping PENG, Hongxiao LI, Shide WANG, Hongbin LIN
    2021, 42(12):  163-171.  doi:10.11959/j.issn.1000-436x.2021078
    Asbtract ( 163 )   HTML ( 9)   PDF (685KB) ( 260 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Based on the combinatorial design theory, the constructions of balanced optimal almost binary sequence pairs of period N≡1(mod 4)were researched.The maximal cross-correlation values θc were obtained by different combinations of (almost) binary sequence pairs.Furthermore, three new bounds on the autocorrelation values under the precondition of the value of θc=1,2,3 were presented individually.Meanwhile,four types of balanced(almost)optimal almost binary sequence pairs were generated, which satisfied the cross-correlation values and autocorrelation theory bounds.Through the constructions, the range of the cross-correlation values is expanded and the cross-correlation value of the optimal binary sequence pairs is further reduced.More than odd, the value of sequence length parameter f can be any integer, which enriches the existence space of the optimal binary sequence pair.

    Performance enhancement scheme for IRS-assisted cognitive backscatter communication network
    Bin LYU, Yi CAO, Jian LI, Ting QI
    2021, 42(12):  172-181.  doi:10.11959/j.issn.1000-436x.2021233
    Asbtract ( 298 )   HTML ( 43)   PDF (1250KB) ( 311 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to achieve the self-sustainable cognitive radio network (CRN) and improve its communication efficiency, an efficient multi-mode switching scheme assisted by the intelligent reflecting surface (IRS) for the overlay scenario was proposed.In particular, the secondary transmitter (ST) could work in either backscatter communication (BackCom) mode or harvest-then-transmit (HTT) mode.The IRS was exploited to enhance the energy harvesting, information backscattering, and information transmission efficiencies at the ST.To maximize the system sum-rate, an optimization problem about the phase shirts at the IRS, time scheduling, and power allocation was formulated.Since the formulated problem was non-convex, an efficient block coordinate descent (BCD) based algorithm was proposed to achieve the sub-optimal solution.Simulation results confirm that the proposed scheme can achieve up to 200% sum-rate gain over the benchmark schemes.

    Spectrum sensing method based on residual dense network
    Jianxin GAI, Xianfeng XUE, Ruixiang NAN, Jingyi WU
    2021, 42(12):  182-191.  doi:10.11959/j.issn.1000-436x.2021220
    Asbtract ( 216 )   HTML ( 23)   PDF (1245KB) ( 430 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Aiming at the problem that the traditional spectrum sensing method based on convolutional neural network(CNN) did not make full use of image feature and the ability of extracting the image feature was limited by the shallow network structure, a spectrum sensing method based on the residual dense network (ResDenNet) was proposed.By adding dense connections in the traditional neural network, the information reuse of the image feature was achieved.Meanwhile, shortcut connections were employed at both ends of the dense unit to implement deeper network training.The spectrum sensing problem was transformed into the image binary classification problem.Firstly, the received signals were integrated into a matrix, which was normalized and transformed by gray level.The obtained gray level images were used as the input of the network.Then, the network was trained through dense learning and residual learning.Finally, the online data was input into the ResDenNet and spectrum sensing was implemented based on image classification.The numerical experiments show that the proposed method is superior to the traditional ones in terms of performance.When the SNR is as low as -19 dB, the detection probability of the proposed method is still high up to 0.96 with a low false alarm probability of 0.1, while a better generalization ability is displayed.

    Dual verifiable cloud storage scheme based on blockchain
    Tao FENG, Fanqi KONG, Chunyan LIU, Rong MA, Albettar Maher
    2021, 42(12):  192-201.  doi:10.11959/j.issn.1000-436x.2021225
    Asbtract ( 295 )   HTML ( 42)   PDF (1192KB) ( 450 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In response to the problem that in the industrial Internet of things (IIoT), industrial equipment stored data in the cloud, causing data to be easily tampered with and unable to track malicious users, causing a vicious circle, with the help of the traceability and immutability of the blockchain, a dual verifiable cloud storage scheme based on the blockchain was proposed.Firstly, homomorphic encryption technology was used to encrypt data and upload it to the cloud , which ensured transmission security and realized data privacy protection.Secondly, the aggregated ciphertext and uploader information were stored on the blockchain, which could effectively avoid the risk of data being tampered with by illegal users, and could trace malicious users to achieve double verification of cloud data integrity.Finally, a safety analysis was carried out to prove that the proposed scheme is safer and more reliable than similar schemes.

    Forensic of video object removal tamper based on 3D dual-stream network
    Lizhi XIONG, Mengqi CAO, Zhangjie FU
    2021, 42(12):  202-211.  doi:10.11959/j.issn.1000-436x.2021226
    Asbtract ( 279 )   HTML ( 27)   PDF (3285KB) ( 316 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to solve the problems of inaccurate temporal detection and location of the object removal tampered video, a video tamper forensics method based on 3D dual-stream network was proposed.Firstly, the spatial rich model (SRM) layer was used to extract the high-frequency information from video frames.Secondly, the improved 3D convolution (C3D) network was used as the feature extractor of the dual-stream network to extract the high-frequency information and low-frequency information from the high-frequency frame and the original video frame respectively.Finally, through compact bilinear pooling (CBP) layer, two sets of different feature vectors were fused into one set of feature vectors for classification prediction.The experimental results demonstrate that the classification accuracy of the proposed method in all video frames has an advantage in SYSU-OBJFORG dataset, which makes the temporal detection and location of object removal tampered video more accurate.

    Comprehensive Review
    Overview of research on trusted attestation technology of cloud virtualization platform
    Bibo TU, Jie CHENG, Haojun XIA, Kun ZHANG, Ruina SUN
    2021, 42(12):  212-225.  doi:10.11959/j.issn.1000-436x.2021213
    Asbtract ( 368 )   HTML ( 52)   PDF (1363KB) ( 467 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the rapid development of cloud computing, the security issues of cloud platforms have also attracted much attention.Trusted computing is an essential supporting technology in the cloud computing security system.Trusted attestation is an important feature in trusted computing.The use of trusted attestation technology verifies whether the cloud virtualization platform is trustworthy, thereby providing a foundation for ensuring the security of the cloud platform.Now based on the definition of trusted attestation, the research progress of key technologies such as the root of trust virtualization, platform identity authentication, platform status certification, and trusted attestation framework for virtual machines were systematically sorted out, typical schemes were analyzed and compared.Furthermore, the limitations of existing work were discussed.Finally, the future research trend of this area were pointed out.

    Correspondences
    Communication-radar coexistence design based on block diagonalization
    Kaifeng HAN, Litao HUANG, Li CHEN, Zhiqin WANG
    2021, 42(12):  226-235.  doi:10.11959/j.issn.1000-436x.2021227
    Asbtract ( 195 )   HTML ( 12)   PDF (1691KB) ( 370 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Aiming at the problem of coexistence of communication and radar at the same frequency, a block diagonalization design scheme was proposed.Firstly, an optimization problem was established to maximum the communication system’s sum rate subject to no interference at the radar side and the power budget.To solve this problem, the constraint that the interference between communication users is zero was introduced, so that the non-convex original problem could have a closed-form solution.Then, based on the restriction on the number of base station’s transmit antennas caused by introducing the constraint, two other algorithms were proposed to further consider the block diagonalization design when the constraint was not met.The simulation results show that the proposed algorithms can introduce the constraint to solve the original problem in various scenarios with relative-low computation complexity, which can be implemented in practice.

    Electronic evidence sharing scheme of Internet of vehicles based on signcryption and blockchain
    Xiaodong YANG, Wanting XI, Jiaqi WANG, Aijia CHEN, Caifen WANG
    2021, 42(12):  236-246.  doi:10.11959/j.issn.1000-436x.2021237
    Asbtract ( 296 )   HTML ( 41)   PDF (28947KB) ( 227 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To solve the problems of privacy and security in the electronic evidence sharing of Internet of vehicles, a sharing scheme of electronic evidence in the Internet of vehicles based on signcryption and blockchain was proposed.The evidence ciphertext and the evidence report were stored in the cloud server and the block chain respectively to realize the secure storage and sharing of the electronic evidence.The identity-based signcryption technology was used to ensure the confidentiality of data, and the proxy re-encryption technology was used to realize the sharing of electronic evidence of Internet of vehicles by insurance companies.The aggregation signature technique was introduced to reduce the computation cost of multi vehicle user signature verification.The reliability of electronic evidence was improved by using credibility incentive mechanism.Security analysis shows that the proposed scheme achieves data confidentiality, integrity, verifiability and unforgeability.Compared with the existing schemes, the proposed scheme has certain advantages in terms of computational overhead.

Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Editor-in-Chief: Zhang Ping
Associate Editor-in-Chief:
Zhang Yanchuan, Ma Jianfeng, Yang Zhen, Shen Lianfeng, Tao Xiaofeng, Liu Hualu
Editorial Director: Wu Nada, Zhao Li
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Post: 100079
Tel: 010-53933889、53878169、
53859522、010-53878236
Email: xuebao@ptpress.com.cn
Email: txxb@bjxintong.com.cn
ISSN 1000-436X
CN 11-2102/TN
Visited
Total visitors:
Visitors of today:
Now online: