Please wait a minute...

Current Issue

    25 April 2022, Volume 43 Issue 4
    Topics: Key Technologies of the Polymorphic Network Environment
    Construction technologies of polymorphic network environment based on codesign of domain-specific software/hardware
    Yuxiang HU, Zixi CUI, Ziyong LI, Yongji DONG, Pengshuai CUI, Jiangxing WU
    2022, 43(4):  3-13.  doi:10.11959/j.issn.1000-436x.2022086
    Asbtract ( 475 )   HTML ( 150)   PDF (1899KB) ( 611 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The deeply integration of information network and economic society has brought the trend of symbiotic coexistence, dynamic concurrency, evolution and revolution of network modals.Firstly, in order to satisfy the requirements of vertical industry applications, a scheme of the polymorphic network element based on codesign of domain-specific hardware/software was proposed, the key technologies to construct polymorphic network environment were discussed as well.Then, to solve the resource competition problem between diversified network modals, a heterogeneous resource allocation and replacement method was proposed by integration of computing, storage and forwarding, which dynamically adjusted the resource-allocation strategy according to the traffic volume to realize the efficient resource utilization.Experimental results show that the proposed scheme can provide the basic platform support for the construction of polymorphic network by separation of technical systems and supporting environment.

    Programmable data processing method and system design for polymorphic network
    Jinlin WANG, Li’nan JING, Xiao CHEN, Jiali YOU
    2022, 43(4):  14-25.  doi:10.11959/j.issn.1000-436x.2022070
    Asbtract ( 450 )   HTML ( 101)   PDF (1029KB) ( 549 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Aiming at the problems of compatible with multiple route identification, network protocols and network application data processing faced by multimodal networks, a programmable data processing method compatible with multiple modes was proposed.Through the mode recognition and classify module to identify packets of different network modes, the data type, offset and length were used to represent multiple types of data, and the modal data processing pipeline was formed by using the matching action data table with selectable matching algorithm and processing action to process data of different types of network.A prototype system for data processing of polymorphic network was implemented and verified by using the proposed method.Experimental results show that the modal data processing pipeline can isolate the network of different modes and ensure the performance independence, the type of matching algorithm and the length of the processed data will affect the forwarding performance of the system, while the type of data will not.

    Research on heterogeneous identifier namespace management and control architecture in polymorphic network environment
    Shuai GAO, Xindi HOU, Ningchun LIU, Hongke ZHANG
    2022, 43(4):  26-35.  doi:10.11959/j.issn.1000-436x.2022084
    Asbtract ( 385 )   HTML ( 70)   PDF (1036KB) ( 576 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Aiming at the interoperability and conversion problem of heterogeneous identifier namespace, a heterogeneous identifier namespace management and control architecture was proposed based on the polymorphic network environment.Firstly, the design objectives and principles of heterogeneous identifier namespace management and control were given.A theoretical model was also proposed for the network identifier namespace selection and conversion process, and the distributed heterogeneous cyberspace compatibility problem was thus transformed into a centralized network layer function configuration problem.Secondly, based on the proposed theoretical model, the key applications and functional modules for managing the heterogeneous identifier namespace were designed on the control plane.Then, the specific workflow of heterogeneous identifier namespace management and control was presented.Finally, based on the polymorphic network environment, a prototype verification system was built to validate the proposed heterogeneous space management and control architecture as well as the related functions.

    Architecture and mechanisms for secure and efficient internetworking of heterogeneous network
    Hongbin LUO, Shan ZHANG, Zhiyuan WANG
    2022, 43(4):  36-49.  doi:10.11959/j.issn.1000-436x.2022079
    Asbtract ( 550 )   HTML ( 87)   PDF (1183KB) ( 662 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    An architecture named CoLoR (coupling service location and inter-domain routing) was introduced to securely and efficiently interconnect networks with different architectures (called heterogeneous networks below).First, the fundamental challenges and scientific problems that have to be addressed by CoLoR were raised.Then, the core aspects of CoLoR were described, including how to characterize and represent the cyberphysical system comprised by heterogeneous networks, the network architecture, the basic communication model and how secure internetworking was achieved.After that, results from prototype implementation were presented to demonstrate the feasibility and capability of CoLoR, including defending against attacks and preventing data leakage.Finally, some open issues were outlined for future studies.

    Communication topology reconstruction method for multi-agent cooperative control in polymorphic networks
    Ruyun ZHANG, Geyang XIAO, Qihe SHAN, Tao ZOU, Dan LI, Fei TENG
    2022, 43(4):  50-59.  doi:10.11959/j.issn.1000-436x.2022077
    Asbtract ( 559 )   HTML ( 62)   PDF (1274KB) ( 876 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    As the task objectives and working environment become more and more complex and changeable, considering the limitations of the cooperative control of a single multi-agent system under the unilateralism communication network, a communication topology reconstruction method for multi-agent cooperative control in polymorphic networks was studied.Firstly, the multi-lateral distributed cooperative control framework was constructed based on multi-agent system in the polymorphic network environment.Secondly, a communication topology reconstruction method was proposed for multiple multi-agent systems with different functions after networking, and a distributed control protocol was designed to achieve multi-consensus.Finally, a simulation example was given to verify that the proposed method can complete the communication topology reconstruction of multi-agent cooperative control in polymorphic network.

    Dual time scale resource allocation for RAN slicing in software-defined oriented polymorphic IoV
    Weijing QI, Qingyang SONG, Lei GUO
    2022, 43(4):  60-70.  doi:10.11959/j.issn.1000-436x.2022067
    Asbtract ( 390 )   HTML ( 51)   PDF (1112KB) ( 593 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To effectively meet the differentiated quality of service (QoS) requirements of various vehicular applications, a dual time scale resource allocation algorithm for radio access network (RAN) slicing in software-defined polymorphic Internet of vehicles (IoV) was proposed.Considering the constraints of the minimum rate requirement of enhanced mobile broadband (eMBB) slice users, vehicle-to-vehicle (V2V) link reliability, the maximum power of nodes, the maximum number of RBs, a joint optimization problem of caching, spectrum, power allocation was formulated, with the aim of minimizing the average delay of ultra-reliable and low-latency communication (URLLC) slice users.By using the Hungarian algorithm, linear integer programming method and the double deep Q-Learning network (DDQN) algorithm, the original NP-hard problem was solved in dual time scales.The simulation results show that the proposed algorithm is superior to the traditional algorithm in ensuring the QoS requirements of different slice users and improving the spectrum utilization.

    Research on a knowledge-defined polymorphic network attainable service architecture
    Jingyu WANG, Zirui ZHUANG
    2022, 43(4):  71-82.  doi:10.11959/j.issn.1000-436x.2022076
    Asbtract ( 422 )   HTML ( 49)   PDF (2266KB) ( 508 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Given the consideration of future generation mobile communication network systems with decoupled administration, control, and data planes, a knowledge-defined polymorphic network (KDPN) attainable service architecture was proposed.In the proposed architecture, while mimicking the biological polymorphism, “network knowledge” was acted as a genetic core connecting all the planes, where local network knowledge was extracted from different scenarios and layers of the network.By constructing a network knowledge graph with unified logic, and depending on the service requirement for specific knowledge, different local knowledge could be exchanged and collaborated.Network knowledge will provide guidance and foundation for general network optimization and management across different service scenarios, service layers, and service objectives.KDPN will help the communication networks cope with sophisticated and dynamic service demands and provide dynamic and diversified services to general users promptly and effectively with quality of experience assurances.

    Papers
    Efficient distributed model sharing strategy for data privacy protection in Internet of vehicles
    Zijia MO, Zhipeng GAO, Yang YANG, Yijing LIN, Shan SUN, Chen ZHAO
    2022, 43(4):  83-94.  doi:10.11959/j.issn.1000-436x.2022074
    Asbtract ( 766 )   HTML ( 156)   PDF (967KB) ( 805 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Aiming at the efficiency problem of privacy data sharing in the Internet of vehicles (IoV), an efficient distributed model sharing strategy based on blockchain was proposed.In response to the data sharing requirements among multiple entities and roles in the IoV, a master-slave chain architecture was built between vehicles, roadside units, and base stations to achieve secure sharing of distributed models.An asynchronous federated learning algorithm based on motivate mechanism was proposed to encourage vehicles and roadside units to participate in the optimization process.An improved DPoS consensus algorithm with hybrid PBFT was constructed to reduce communication costs and improve consensus efficiency.Experimental analysis shows that the proposed mechanism can improve the efficiency of data sharing and has certain scalability.

    Post-quantum verifier-based three-party password authenticated key exchange protocol
    Huanhuan LIAN, Huiying HOU, Yunlei ZHAO
    2022, 43(4):  95-106.  doi:10.11959/j.issn.1000-436x.2022062
    Asbtract ( 222 )   HTML ( 29)   PDF (922KB) ( 356 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In view of the fact that server stored the passwords directly in plaintext, there was a risk of server compromise, and two-party PAKE protocol was not suitable for large-scale communication systems, a three-party verifier-based password authenticated key exchange protocol from lattices was proposed.Hashing scheme and zero-knowledge password policy check were combined to realize the generation of verifier and the password checking.A novel verifier-based 3PAKE protocol was constructed by using CCA-secure public-key encryption from lattices, which realized mutual authentication.Security and performance analysis shows that the proposed protocol has better advantages in communication efficiency and security.

    SCMA codebooks design for Rayleigh fading channel
    Tuofeng LEI, Shuyan NI, Naiping CHENG, Xin SONG
    2022, 43(4):  107-113.  doi:10.11959/j.issn.1000-436x.2022064
    Asbtract ( 275 )   HTML ( 20)   PDF (746KB) ( 415 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    According to the symbol error eate (SER) of the superimposed constellation, the near-optimal space code multiple access (SCMA) codebooks were explored under uplink and downlink Rayleigh fading channels, respectively.A near-optimal codebook design scheme was proposed based on the mathematical model between the superimposed constellation and the SER formula.And the proposed design procedures could be summarized as follows, design the factor graph matrix, match the best codeword pair, and find the optimal angle.Numerical results are provided to demonstrate that the proposed scheme can achieve near-optimal SER performance.

    Lost-minimum post-training parameter quantization method for convolutional neural network
    Fan ZHANG, Yun HUANG, Zizhuo FANG, Wei GUO
    2022, 43(4):  114-122.  doi:10.11959/j.issn.1000-436x.2022068
    Asbtract ( 281 )   HTML ( 40)   PDF (1275KB) ( 477 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To solve the problem that that no dataset is available for model quantization in data-sensitive scenarios, a model quantization method without using data sets was proposed.Firstly, according to the parameters of batch normalized layer and the distribution characteristics of image data, the simulated input data was obtained by error minimization method.Then, by studying the characteristics of data rounding, a factor dynamic rounding method based on loss minimization was proposed.Through quantitative experiments on classification models such as GhostNet and target detection models such as M2Det, the effectiveness of the proposed quantification method for image classification and target detection models was verified.The experimental results show that the proposed quantization method can reduce the model size by about 75%, effectively reduce the power loss and improve the computing efficiency while basically maintaining the accuracy of the original model.

    Continuous noise covert transmission scheme based on QCSK
    Ying HUANG, Zehan WAN, Jing LEI, Ke LAI
    2022, 43(4):  123-132.  doi:10.11959/j.issn.1000-436x.2022083
    Asbtract ( 248 )   HTML ( 32)   PDF (1311KB) ( 365 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The existing embedded scheme requires far lower transmission power of the covert system than that of the host system, and thus decreasing the reliability of covert transmission.To figure out the above limitations, a continuous noise covert communication scheme based on quadrature chaos shift keying (QCSK) was proposed.The QCSK signal containing covert information and artificial noise were transmitted alternately, and the illegal energy detection was effectively resisted by the continuity of noise which has strong concealment in both time and frequency domains.Furthermore, extremely low power was not required to meet the demand of convert communication in QCSK, whereas allowing the increase of transmit power under the condition that the performance of the host system to improve the performance of covert transmission.Theoretical analysis and simulation results show that the bit error rate (BER) of covert transmission brings two orders of magnitude improvement compared with the existing scheme at BER=1×10-7 for host system.

    Improved transmit beamforming design based on ADMM for low probability of intercept of FDA-MIMO radar
    Pengcheng GONG, Yuntao WU
    2022, 43(4):  133-142.  doi:10.11959/j.issn.1000-436x.2022065
    Asbtract ( 249 )   HTML ( 22)   PDF (1628KB) ( 405 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Considering the low probability of intercept problem that the signal-dependent interference and the target were located in the same angle, an improved transmit beamforming design based on the alternating direction method of multipliers (ADMM) was proposed for multiple-input multiple-output with frequency diverse array radar.The transmit energy was minimized at the target under constraints of the energy at each transmitter and signal clutter-plus-noise ratio requirement.Subsequently, a cyclic algorithm was developed to tackle the non-convex design problem.Firstly, the optimal receive filter was obtained by generalized Rayleigh quotient.And then the transmit beamforming was optimized by employing auxiliary variables and ADMM to solve quadratic programming problem with fractional inequality constraint.Moreover, both the convergence and computational complexity of the proposed algorithm were discussed.Simulation results show that, compared with the semi-denite programming method, the proposed method not only attains the given antenna power, but also achieves the better mainlobe focusing performance at the target.Furthermore, the null levels at the clutter locations and the jamming directions obtained by the proposed method are -50 dB above.

    Device-independent Wi-Fi fingerprinting indoor localization model based on domain adaptation
    Zenghua ZHAO, Yuefan TONG, Jiayang CUI
    2022, 43(4):  143-153.  doi:10.11959/j.issn.1000-436x.2022069
    Asbtract ( 302 )   HTML ( 33)   PDF (1459KB) ( 299 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In real-world large-scale deployments of indoor localization, Wi-Fi fingerprinting approaches suffer from device diversity problem which impacts the localization accuracy significantly.A device-independent Wi-Fi fingerprint indoor localization model DeviceTransfer was proposed.Based on the domain adaptation theory of deep learning, the device type of the smartphone was taken as the domain, the task-related and device-independent Wi-Fi data features were extracted through adversarial training, and the learned source domain location information was transferred to the target domain.Pre-training and joint training were employed to improve model training stability and to accelerate convergence.The performance of DeviceTransfer was evaluated using four types of smartphones in two real-world indoor environments: a school building and a shopping mall.The experimental results show that DeviceTransfer effectively extracts device-independent Wi-Fi fingerprint features.Using only one type of phone to collect Wi-Fi fingerprints, online localization using other types still achieves high localization accuracy, thus reducing localization cost significantly.

    Research on a real-time receiving scheme of streaming data
    Xiaoyan ZHANG, Zhihao LIU, Xiaofeng DU, Tianbo LU
    2022, 43(4):  154-163.  doi:10.11959/j.issn.1000-436x.2022080
    Asbtract ( 176 )   HTML ( 21)   PDF (1313KB) ( 280 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Discussing the common scenarios in modern data warehouse systems that need to receive a large amount of streaming data, connect it with the existing data on the disk, and then store it in the warehouse.By rationally setting disk paging and applying cache modules to disperse the disk I/O pressure, a more efficient data receiving scheme was proposed based on the existing research, and a consistent Hash function was introduced and extended to distributed environment and a D-CACHEJOIN algorithm applied to distributed environment was proposed.The cost model of the algorithm was calculated by theory and simulation experiment was performed using data that obey the Zipfian distribution.The experiment results show that the proposed algorithm has higher efficiency than existing algorithms in practical application scenarios close to reality, and can be quickly and easily extended to distributed environments.

    Secure and efficient batch authentication scheme based on dynamic revocation mechanism in space information network
    Yinghui ZHANG, Lingyun HU, Yixin LI, Jianting NING, Dong ZHENG
    2022, 43(4):  164-176.  doi:10.11959/j.issn.1000-436x.2022063
    Asbtract ( 240 )   HTML ( 46)   PDF (1450KB) ( 360 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A secure and efficient batch authentication scheme based on dynamic revocation mechanism was proposed for the problem of cross-domain authentication of a large number of mobile users in space information networks.Early key negotiation was achieved by predicting the satellite trajectory and updating the session key in real time.Algorithms were designed for a single as well as a large number of mobile terminals to perform signing and verification, which effectively reduce the computational burden of satellites.Cuckoo filters were adopted by the new scheme to achieve dynamic revocation and malicious access control of mobile terminals.Finally, under the Diffie-Hellman assumption, the proposed scheme was proved to be resistant to replay and man-in-the-middle attacks based on a random oracle model and automated validation of internet security protocols and applications.Security goals such as traceability and revocability were achieved by the scheme, thus improving the efficiency of transmission and computation by more than 80% and 20%, respectively, compared with the existing optimal scheme.

    Design of fairness-driven RSMA-SDMA precoding
    Yanjing SUN, Fengzhi CHENG, Jiasi ZHOU, Song LI
    2022, 43(4):  177-185.  doi:10.11959/j.issn.1000-436x.2022085
    Asbtract ( 261 )   HTML ( 34)   PDF (777KB) ( 414 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In view of the minimum user rate and system fairness when the transmit power was limited, a user access mode selection transmission strategy by joint rate-splitting multiple access (RSMA) and space division multiple access (SDMA) was proposed.The precoding design problem of maximizing system fairness was modeled.In order to solve the discrete non-convex optimization problem formed, it was decomposed into two non-convex sub-problems, such as the user access mode selection and the inner optimal precoding design.For the precoding design, a quadratic transform of multidimensional and complex FP was used to transform the precoding design into double rotation, and the closed-form expression of the optimal solution for the outer user access mode selection was obtained.Convex optimization was used to solve the inner precoding design problem, and successively optimize the user access mode selection.An algorithm based on fractional optimization was proposed for the problem, and the optimal precoding vector was designed using the quadratic transform of multidimensional and complex FP to maximize the minimum user rate under power constraints.The simulation results prove that compared with RSMA, SDMA and other transmission strategies, the fairness-driven RSMA-SDMA precoding design improves the minimum user rate of the system and guarantees the system fairness.

    Comprehensive Reviews
    Survey on key technologies of covert channel in ubiquitous network environment
    Fenghua LI, Chaoyang LI, Chao GUO, Zifu LI, Liang FANG, Yunchuan GUO
    2022, 43(4):  186-201.  doi:10.11959/j.issn.1000-436x.2022072
    Asbtract ( 517 )   HTML ( 62)   PDF (852KB) ( 1048 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In the ubiquitous network environment, covert channel bypasses the system’s security strategy to transmit covert information by modifying the system’s shared resources, which poses a serious security threat to the computer and network system.The researches on covert channel in ubiquitous network environment were summarized and analyzed from three aspects of measurement, construction and detection.First, the typical covert channel metrics including the capacity, robustness, anti-detection, regularity and shape were summarized.Second, the construction technologies of covert channel were summarized and analyzed from six aspects of resource sharing, capacity, robustness, anti-detection, advantages and disadvantages in the first time.Third, the detection technologies of covert channel were compared and analyzed from five aspects of the type of covert channel, accuracy, whether it can be blind detection, the advantages and disadvantages.Finally, the development trends of covert channel were summarized and future research directions were prospected.

    Review on 5G-satellite integrated network
    Li YANG, Chengsheng PAN, Xiangguang KONG, Qilong HUANG, Yaowen QI
    2022, 43(4):  202-215.  doi:10.11959/j.issn.1000-436x.2022066
    Asbtract ( 764 )   HTML ( 128)   PDF (1069KB) ( 911 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Based on the reviews of standardizations and many other works of 5G-satellite integrated network (5GSIN), the research progress of 5GSIN key technologies, applications and network architectures were expounded and analyzed.Aiming at the key problems caused by the strong heterogeneity and large spatio-temporal scale of 5GSIN, the multi-layer distributed network architecture was proposed, and the architecture management method was designed.Finally, several key directions of the future development of 5GSIN were analyzed from the perspective of intelligence, in order to provide some references for research in related fields.

    Correspondences
    Joint beamforming design for distributed IRS assisted millimeter wave MU-MISO system
    Zhongjie LI, Jiyuan XIONG, Wei GAO, Jinying WEI
    2022, 43(4):  216-226.  doi:10.11959/j.issn.1000-436x.2022058
    Asbtract ( 393 )   HTML ( 58)   PDF (819KB) ( 495 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A joint beamforming design scheme for distributed intelligent reflecting surface (IRS) assisted multi-user communication was proposed to solve the reliable communication problem in the downlink of millimeter-wave multi user-multiple input single output (MU-MISO) system in non line of sight scenarios.Considering the power and constant-mode constraints, the active beamforming of the base station and passive beamforming of multiple IRS were modeled as a joint non-convex optimization problem with the objective of user weighting and sum rate maximization.A closed-form fractional programming technique was used to decouple this joint optimization problem into an easily solvable equivalent problem.A non-convex block coordinate descent algorithm was used to alternately optimize the active beamforming and passive beamforming matrices according to the prox-linear rule and the distributed successive convex approximation rule.The convergence proof and complexity analysis of the proposed algorithm were also given.The simulation results demonstrate that the algorithm can converge fast, and can effectively improve the system transmission rate with reduced complexity compared with the two baseline algorithms.

    Research on ciphertext search and sharing technology in edge computing mode
    Jifeng WANG, Guofeng WANG
    2022, 43(4):  227-238.  doi:10.11959/j.issn.1000-436x.2022039
    Asbtract ( 256 )   HTML ( 49)   PDF (28435KB) ( 182 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Aiming at the problem of edge computing data security, a ciphertext search and sharing solution was proposed, where the above-mentioned edge computing advantages were used to achieve user privacy data protection, edge nodes were used to construct encrypted inverted indexes, indexes and keys between edge nodes and cloud computing platforms were securely shared, and ciphertext search, secure data sharing, and dynamic index update were realized without changing the edge computing architecture and cloud computing architecture.Finally, compared to existing schemes, performance and security were analyzed and discussed, which proves that the proposed scheme has high security strength under ciphertext search attack model, and the ciphertext search efficiency and document dynamic update function are taken into account based on encrypted inverted index.

Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Editor-in-Chief: Zhang Ping
Associate Editor-in-Chief:
Zhang Yanchuan, Ma Jianfeng, Yang Zhen, Shen Lianfeng, Tao Xiaofeng, Liu Hualu
Editorial Director: Wu Nada, Zhao Li
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Post: 100079
Tel: 010-53933889、53878169、
53859522、010-53878236
Email: xuebao@ptpress.com.cn
Email: txxb@bjxintong.com.cn
ISSN 1000-436X
CN 11-2102/TN
Visited
Total visitors:
Visitors of today:
Now online: