Please wait a minute...

Current Issue

    25 December 2010, Volume 31 Issue 12
    Papers
    Error detection and concealment based on characteristic clustering of image
    Guo-bo LI,Gang CHEN,Bai-feng WU
    2010, 31(12):  1-11.  doi:1000-436X(2010)12-0001-11
    Asbtract ( 0 )   HTML ( 1)   PDF (263KB) ( 69 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Most existing concealing algorithms couldn’t detect transmitting errors.Two error detecting and concealing algorithms was proposed based on characteristic clustering (CCEDC) and information hiding techniques in spatial domain and transform domain respectively.The proposed algorithms firstly clustered the DCT direct coefficients and low-frequency coefficients of blocks,and then embedded the clustering numbers into the least significant bit (LSB) plane of the corresponding pixels or middle-frequency coefficients.Therefore,the errors could be detected by comparing the consistency among clustering numbers and could be recovered using the clustering centers.The comparison experiments show that proposed algorithms have an advantage over other congener methods with respect to the capability of keeping balance among hiding capacity,the quality of stegano and recovered images,and the robustness against noise.

    Study on dynamic trust metric of trusted network based on state and behavior associated
    Dao-feng LI,Yi-xian YANG,Li-ze GU,Bin SUN
    2010, 31(12):  12-19.  doi:1000-436X(2010)12-0012-08
    Asbtract ( 0 )   HTML ( 2)   PDF (136KB) ( 57 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Intergrated the factors that state and behavior of ent ies,a new dynamic trust model of trusted network was proposed.The trust information was obtained through the associated analysis of state and behavior of entities.The relation of trust,state and behavior of the entities was also studied,and a new dynamic trust measurement of trusted network was proposed.The simulation results show that the new trust model has advantages in providing real-time dynamic trust.It is highly effective in countering malicious entities regarding strategic altering behavior and malicious attack,presenting better choice in task assignment in the network,providing help to make the secure police for the network security,and enhancing trustworthily of network.

    Social network-based trustworthy routing in delay tolerant networks
    Hai-zheng YU,Jian-feng MA,Hong BIAN
    2010, 31(12):  20-26.  doi:1000-436X(2010)12-0020-07
    Asbtract ( 80 )   HTML ( 2)   PDF (119KB) ( 248 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A trustworthy routing protocol was proposed based on social networks for delay tolerant networks (DTN),which ensured the messages to be sent to the destination node efficiently and reliably against more selfness nodes.With a method of relation evaluation among nodes in social networks,the relation intensity matrix between the groups was figured out.The source node chose proper member nodes as next intermediate node to forward the messages according to the relation intensity matrix,which avoided the messages to be sent to the selfness nodes and reduced the probability of dropping the messages.At the same time,due to intermittent connectivity of DTN,a method of identity-based cryptography was introduced during the process of messages forwarding,it ensured the security of messages forwarding.The experiments show that our method can ensure the security and efficiency of messages to the destination.

    Research of service-differentiated admission control based on Markov decision processes in heterogeneous wireless networks
    Qiang DENG,Shan-zhi CHEN,Bo HU,Yan SHI
    2010, 31(12):  27-36.  doi:1000-436X(2010)12-0027-10
    Asbtract ( 95 )   HTML ( 4)   PDF (236KB) ( 192 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Service-differentiated admission control was studied in heterogeneous wireless networks.Capacity regions of voice and data services in CDMA cellular network and WLAN were derived.A theoretical model of admission control with differentiated services was proposed on basis of Markov decision processes theory,in which the admission actions were specified for each traffic service and system state transition probabilities were formulated.Furthermore,a fuzzy logic admission utility evaluation mechanism was presented based on the analysis of relationship of QoS requirements and network state,then the optimal admission control icy that maximizes overall utility with new and handoff call blocking probability constraints was formulated.The simulation results reveal that network dynamics can be captured by the proposed utility evaluation mechanism.And the average utility earned in the optimal admission control policy was significantly larger than two other schemes in which service differentiation and mobility are not considered,in addition,the new and handoff call blocking probability can be strictly constrained.

    Fuzzy trust model for wireless sensor networks with intrusion tolerance
    Liang-min WANG,Yuan-bo GUO,Yong-zhao ZHAN
    2010, 31(12):  37-44.  doi:1000-436X(2010)12-0037-08
    Asbtract ( 90 )   HTML ( 3)   PDF (176KB) ( 636 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To protect key services of wireless sensor networks of data fusion and package forward,a fuzzy trust model based on trust and confidence and its evaluation algorithms were presented,in which the value of confidence was used to describe the impreciseness of the value of the trust.Then the simulation and the example were given to show the performances of using the model to detect or tolerate the insidious attacks.Finally,the package drop ration of the networks with the trust evaluation system was simulated and the comparison with the related work was discussed.

    Access control oriented quantified trust degree representation model for distributed systems
    Bo LANG
    2010, 31(12):  45-54.  doi:1000-436X(2010)12-0045-10
    Asbtract ( 89 )   HTML ( 2)   PDF (147KB) ( 201 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Based on the research fruit of social trust in sociology,the semantics,properties and elements of trust in the context of access control of distributed systems were defined.By combining fuzzy set theory with probability theory,a mathematical definition of trust was given,a quantified trust degree representation model including an integrated trust evaluation model and a trust calculating algorithm was established.The model integrates multiple elements of trust,and is in accordance with the decreasing and enhancing rules of the recommended trust.

    Approach of detecting LDoS attack based on time window statistic
    Zhi-jun WU,Hua-long ZENG,Meng YUE
    2010, 31(12):  55-62.  doi:1000-436X(2010)12-0055-08
    Asbtract ( 68 )   HTML ( 1)   PDF (139KB) ( 821 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Through analysised of normal traffic and attack flow,statistic result showed that the normal traffic throughout had an obviously degrade and attack flow had a short time abnormity pulse with higher amplitude.An approach of detecting LDoS attack based on time window statistic was presented.Experiments on different length of sample time were conducted in a test environment established on simulation network.Test results show that the detection probability is more than 96%,false negative and false positive are less than 3%.

    Multi-antenna space-time blind receiving approach based on independent component analysis
    Hong-ji XU,Ju LIU,Shu-zheng XU,Hua-zhong YANG,Wen-jun ZHUANG
    2010, 31(12):  63-71.  doi:1000-436X(2010)12-0063-09
    Asbtract ( 54 )   HTML ( 3)   PDF (244KB) ( 167 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    An independent component analysis (ICA) technique was considered to be exploited to the wireless communication contexts,and it was used to detect the transmitted signals blindly,which not channel estimation.By analyzing the essential structures of STBC(space-time block coding) and V-BLAST(vertical Bell-Labs layered space time) systems,several specific models for the ICA were established.The robustness against channel estimation errors and the flexibility of the system design could be obtained by using the ICA based schemes.Simulation results demonstrate the effectiveness of the proposed approach,furthermore,the complexity and convergence of the ICA based chemes are also discussed.

    Hybrid artificial fish swarm based handover decision scheme with ABC supported
    Xing-wei WANG,Pei-yu QIN,Lei GUO,Min HUANG,Ding-de JIANG
    2010, 31(12):  72-81.  doi:1000-436X(2010)12-0072-10
    Asbtract ( 48 )   HTML ( 1)   PDF (225KB) ( 244 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Oriented to the actual requirements in NGI (next gener ion Internet),a handover decision scheme with ABC (always best connected) supported was proposed.With knowledge of fuzzy mathematics and microeconomics introduced,application types,QoS (quality of service) requirements,access networks and terminals were described.With access network conditions,application requirements,user preferences to access network coding schemes,user preferences to access network providers,terminal velocities and terminal battery capacities considered comprehensively,an optimal handover solution of assigning N terminals to M access networks was found based on hybrid artificial f swarm algorithm with mutation and simulated annealing introduced.By gaming analysis,Pareto optimum under Nash equilibrium among all party utilities was achieved or approached for the found solution.Simulation results showed that the proposed scheme was effective with better performance.

    Research on deep differential fault analysis against MIBS
    Xin-jie ZHAO,Tao WANG,Su-zhen WANG,Yang WU
    2010, 31(12):  82-89.  doi:1000-436X(2010)12-0082-08
    Asbtract ( 53 )   HTML ( 2)   PDF (166KB) ( 347 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The MIBS algorithm and its differential fault analysis principle were presented,then three differential fault analysis methods against MIBS were proposed based on different depth of fault model and verified through experiments.Experiment results demonstrate that due to its Feistel structure and S-box differential feature,MIBS is vulnerable to deep differential fault attack.The best result is that after injecting one 4-bit fault into the 30th round left register,both the fault location and fault differential are unknown,the 64-bit MIBS master key searching space can be reduced to 224 and be recovered after one minute brute-force-search.Moreover,the fault analysis method can provide some ideas on differ ial fault analysis against other block ciphers using S-box.

    DPM-based method for tracking maneuvering targets in wireless sensor networks
    Jin-zhao LIN,Guo-jun LI,Xiao-na ZHOU,Dao-jun ZHOU,Yong JIANG
    2010, 31(12):  90-96.  doi:1000-436X(2010)12-0090-07
    Asbtract ( 72 )   HTML ( 3)   PDF (167KB) ( 257 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Focused on energy efficiency issues under tracking targets within WSN,a new dynamic power management (DPM) method for tracking distributed targets was proposed combining with the network energy consumption model and wake-up mechanism.With precedent location information of maneuvering target,the algorithm involved both cancelling noise by wavelet filter and predicting target state by autoregressive transformation is introduced to awaken wireless sensor nodes so that their sleep time is prolonged and energy consumption is reduced.According to the current location of maneuvering target,related nodes in an appointed cluster of WSN constitute a distributed dynamic tracking unit,and the cluster head is responsible for collecting the measurement information from the nodes in the tracking unit.A locating algorithm based on the relative position of two circulars formed on the bases of measurement information is adopted to simplify the process of locatiny and tracking target.Simulation results show that the DPM-based method can reduce the nodes’ energy consumption,meet e locating and tracking accuracy,and can be applied to locate and track the maneuvering targets on the earth surface.

    Technical Reports
    Research on side information generation algorithm for Wyner-Ziv video coding
    Bin SONG,Hong HE,Hai-hua LIU,Hao QIN
    2010, 31(12):  97-103.  doi:1000-436X(2010)12-0097-07
    Asbtract ( 43 )   HTML ( 1)   PDF (190KB) ( 180 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To reduce the block artifacts and ghosting artifacts of side-information frame in Wyner-Ziv video coding,an overlapped block bi-directional motion compensation algorithm based on the original-image correlation was proposed.Firstly,the correlation of the original image in the encoder is calculated and sent to the decoder.Secondly,the correlation data is used to motion estimation in the decoder to get more accurate motion vector.Then the side information is generated by bi-directional motion compensation.Compared with the existing algorithm,the proposed method can increase the average PSNR (peak signal-to-noise ratio)by 1.5~3dB,and also significantly improve the subjective quality of the side information.

    Research of the mathematic model of synthetic range profile
    Yue-bin CHEN,Wei PENG,Jing FAN,Fei GAO
    2010, 31(12):  111-116.  doi:1000-436X(2010)12-0111-06
    Asbtract ( 30 )   HTML ( 1)   PDF (136KB) ( 118 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The general model of target echo signal was derived for any synthetic wideband waveforms,and some reasons causing the distortion of synthetic range profile were analyzed.A novel method and a new criterion were proposed based on the results.At the same time,the relationship between a moving target’s characteristic and the proposed criterion is theoretically evaluated in detail.Simulation results show that the analysis conclusions are accurate.

    Research on packet convergence sublayer classification algorithm for WiMAX system
    Qing-bo ZHANG,Jia-ming HE,Yan ZHU
    2010, 31(12):  117-122.  doi:1000-436X(2010)12-0117-06
    Asbtract ( 52 )   HTML ( 1)   PDF (159KB) ( 125 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The mapping relation between the higher-layer protocol data and connection was analyzed in WiMAX system.And a packet convergence sublayer classification algorithm based on non-collision hashing and address-blocking XOR look-up was proposed,thus realized the quick look-up and classification of higher-layer protocol data.The complexity and the increase renewal function of algorithm was analyzed quantitatively.The simulation results show that the classification algorithm satisfies QoS(quality of service) requests with the performances of delay and memory,moreover timeliness is also enhanced greatly.

    Watermarking algorithm for image authentication based on second generation Bandelet
    Xu-chong LIU,Yong LUO,Jian-xin WANG,Jie WANG
    2010, 31(12):  123-130.  doi:1000-436X(2010)12-0123-08
    Asbtract ( 55 )   HTML ( 2)   PDF (224KB) ( 195 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A watermarking algorithm for image authentication was designed,which was based on second generation Bandelet translation and statistical model.The image rectional flow was constructed by using Bandelet,and it could depict the characteristic of the image.By applying noise visibility function,the noise visibility intensity algorithm which was based on Gaussian statistical models was proposed.The blocks of image which contain more texture information were selected to hide the image directional flow,based on the noise visibility intensity algorithm.The image was authenticated through comparing the hiding information and the carrier image directional flow created by Bandelet.Experimental results show that the algorithm can resist the JPEG compression and noise attack strongly and guarantee the quality of the sight.It is a blind detection algorithm,and this algorithm has high concealment performance and security.

    Identity-based group key management scheme for space networks
    Chang-yuan LUO,Wei LI,Shi-wei HUO
    2010, 31(12):  127-110.  doi:1000-436X(2010)12-0104-07
    Asbtract ( 69 )   HTML ( 4)   PDF (102KB) ( 549 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The available group key management schemes are not suitable for space networks.Aiming at the problem,an identity-based space networks group key management scheme was proposed.It constructed a service nodes set using satellite nodes to assist multicast group with calculatin sting common parameters,and resolved the problem of imbalance consumption.The service node providing service for the same was dynamic and changeable,which could avoid single-point failure.The proposed scheme can achieve security requirements and has less calculating,storing and communicating expense compared with available schemes.

    Concise Papers
    System of systems method and formal function decomposition for software systems
    Han-hua LU,Shun-yi ZHANG,Ya-shi WANG,Li-juan MIN
    2010, 31(12):  131-139.  doi:1000-436X(2010)12-0131-09
    Asbtract ( 62 )   HTML ( 2)   PDF (143KB) ( 374 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Based on the theory and method of system of system (SoS),the research work for the formal functional decomposition and estimation of large scale and open software systems was described,which were often emerged in IOT(internet of things) and cloud computing environments.It was proposed that abstraction description was necessary for the SoS properties of a large scale and open software Based on system abstract,formal methods for functional decomposition and estimation were described.The applications of the methods in system development and stable intermediate form building were discussed.The methods proposed here are helpful for improving the processes of implementation,deployment and maintenance of large scale and open software systems in IOT and cloud computing environments.

    Distance-based target tracking algorithm in binary sensor network
    Xiao-yan SUN,Jian-dong LI,Peng-yu HUANG,Wen-zhu ZHANG
    2010, 31(12):  140-146.  doi:1000-436X(2010)12-0140-07
    Asbtract ( 45 )   HTML ( 1)   PDF (192KB) ( 201 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A distance-based target tracking algorithm for binary sensor network was proposed.This algorithm can decide the output bit information and compute the weighting s multaneously.The simulation is used to validate the effectiveness of distance-based weighting scheme.This algorithm has good performance,when the target moves linearly,curvilinear,or randomly through the sensing field,and the error distribution of single target position is in[0,0.2].

Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Editor-in-Chief: Zhang Ping
Associate Editor-in-Chief:
Zhang Yanchuan, Ma Jianfeng, Yang Zhen, Shen Lianfeng, Tao Xiaofeng, Liu Hualu
Editorial Director: Wu Nada, Zhao Li
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Post: 100079
Tel: 010-53933889、53878169、
53859522、010-53878236
Email: xuebao@ptpress.com.cn
Email: txxb@bjxintong.com.cn
ISSN 1000-436X
CN 11-2102/TN
Visited
Total visitors:
Visitors of today:
Now online: